Wireless networks use some kind of radio frequencies in air to transmit and receive data instead of using some physical cables. Wireless networks are formed by routers and hosts. Ad-hoc networks are wireless networks, in which nodes communicate with each other using multi-hop links. Network which support wireless architecture are known as mobile Adhoc Network [1]. Such networks can be used to enable next generation battlefield applications, including situation awareness systems for maneuvering war fighters, and remotely deployed unmanned micro-sensor networks. MANETs have some exceptional characteristic features such as undependable wireless media (links) used for communication flanked by hosts, determinedly changing network topologies and memberships, inadequate bandwidth, battery, existence, and working out power of nodes etc. Ad hoc networks make available a prospect of creating a network in situations where creating the infrastructure would be impossible or prohibitively expensive. Unlike a network with predetermined infrastructure, mobile nodes in ad hoc networks do not communicate by means of access points. Every mobile node operates as a host when requesting/providing information from/to other nodes in the network, and acts as router when ascertaining and maintaining routes for other nodes in the network [2].
The dynamic nature of ad hoc networks requires that prevention techniques should be complemented by detection techniques, which scrutinize security condition of the network and identify malicious behavior. One of the most decisive predicaments in MANETs is the sanctuary vulnerabilities of the routing protocols. A set of nodes in a MANET may be compromised in such a way that it may not be possible to detect their malicious behavior easily. Such nodes can generate new routing messages to advertise non- existent links, provide incorrect link state information, and flood other nodes with routing traffic. An OADV is a source initiated on-demand routing protocol. On the other hand, AODV [3] is susceptible to the well recognized black hole attack. In black hole attack an attacker node transmits infected packet to an unknown receiver. When a node receives it gets infected and behaves like malicious node and transmitted multiple of reflected packets to others and same procedure used to infect the whole network. The Black Hole attack [4, 5] is a class of denial of service where a malevolent node can magnetize all packets by untrustworthily claiming a fresh route to the target and then saturate up them devoid of forwarding them to the target. Cooperative Black hole means the malicious nodes operate in a group [6].