An ad hoc network is a network made of movable nodes built on the fly and constructed dynamically when there is no longer an infrastructure or pre-built network on the scene. The nodes can also perform both end-to-end terminals and shape MANET roles, meaning they contribute to each route's configurations. The data must travel through several intermediate nodes during the route while routing a given flow from a source to a destination. The data should be larger than needed for just a single application use. The intermediate nodes forward data to the intended destination, taking into account the locations to which it must be sent to arrive correctly. The routing protocol in an Ad hoc network (human-made network) uses nodes to look at different device locations and procedures for any data path they choose before deciding on the route and ways in which they exchange data are viable. Anomaly, since the existing trust among the various nodes and dynamic topology, leaves the routing protocols susceptible to Denial of service attacks like a black hole, wormhole, Denial of service, and being non-integrated into a central infrastructure present a condition which MANETs are subject to such as Conventional networks typically work by injecting some control packets and tracking the target's movement once the user is already on the wireless. Still, in a MANET, the attacker acts before the mark has moved into the wireless medium. Maliciously exploiting various routing information has the potential to drive the system into a situation of more significant disorder, which will eventually lead to widespread network failure. This existing AODV attack, called the Blackhole attack, might have worked by purposefully withholding important routing information from end-users who could have benefitted from it, which is just what the adversary does in this task. In this scenario, the data packets are never delivered, and the system suffers a total data loss. The variety of detection and protection techniques employed against the blackhole attacker significantly lower the number of suspects. Therefore, this paper advocate for OSPFV [for wireless LANs] protocol integration with built-in security, where Threshold evaluation and cryptographic verification are employed. In this paper, two protocols: the blackhole attack and the proposed AODV-BS protocols, are simulated on different MANET models, and the two other network metrics are used: Network Packet Delivery Ratio and the normalized Out of Routing Overhead Utilization and Network Delay are calculated, and then their performance is studied to discover the result.