The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.
Check threshold value: Next check the packet delivery ratio, if packet delivery ratio drops to threshold then move to next step. The threshold value is calculated using dynamic threshold algorithm indicated in [3]. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source nodes select one-hop neighbor node nr as the destination and send the RREQ to that node as shown in Fig 2. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also Reply RREP. It indicates that there is Attacker in Reply