“…In addition, the majority of attacks that are custom fitted against vehicular networks are assiduous on the SDN-based VANET structures; for example, on-board altering, sticking, and application and program based attacks. The attacks as the replay, denial of service (DoS), the Sybil, the sink-gap, the malware injection, security infringement, falsification, and conveyed DoS are persevered in the SDN, VANETs, and SDN-based VANETs, yet with various prerequisites and effect on every innovation [92]. A few threats bargain sending, control, and application layers [58].…”