Black hole attack is one of the advance attacking which attacker uses the routing protocol to advertise itself as
having the best path to the node whose packets it want to intercept. An hacker use the flooding based protocol for
listing the request for a route from the initiator, then hacker create a reply message he has the shortest path to the
receiver . As this message from the hacker reached to the initiator before the reply from the actual node, then
initiator wills consider that, it is the shortest path to the receiver. So that a malicious fake route is create.