This document discusses the "black hole attack" in mobile ad hoc networks using the AODV routing protocol. In a black hole attack, a malicious node advertises itself as having the shortest route to a destination node in order to intercept packets. The document surveys various techniques to detect and prevent black hole attacks, including intrusion detection systems, route confirmation approaches, waiting for multiple route replies, statistical anomaly detection, and prior-receive reply methods. Each approach has advantages and disadvantages in detecting malicious nodes and ensuring secure transmission in the network.