Introduction - If you have any usage issues, please Google them yourself
IDS system which generates first aodv scenario and then it can implement the black hole attack after that it is also detecting the attacker node and preventing the packets routing through them