1) The document discusses a cooperative black hole attack in mobile ad-hoc networks where multiple malicious nodes work together.
2) In a cooperative black hole attack, malicious nodes falsely claim to have valid routes to the destination when sending route reply messages in response to route requests, with the intent of intercepting packets.
3) The authors propose a new methodology to identify multiple black hole nodes cooperating and prevent the attack by modifying the AODV routing protocol and using additional routing tables.