ability to communicate with each other without having fixed infrastructure or centralized
access point such as a base station. This kind of networks is very susceptible to adversary's
malicious attacks, due to the dynamic changes of the network topology, trusting the nodes to
each other, lack of fixed substructure for the analysis of nodes behaviors and constrained
resources. One of these attacks is black hole attack. In this attack, malicious nodes inject …