Security issues in opportunistic networks