• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Light Weight Cryptographic Address Generation (LWCGA) Using System State Entropy Gathering for IPv6 Based MANETs

    2017-04-09 05:52:55ReshmiMurugan
    China Communications 2017年9期
    關(guān)鍵詞:單字南昌大學(xué)除險(xiǎn)

    Reshmi T.R*, Murugan K

    1 VIT University, Chennai, India

    2 Anna University, Chennai, India

    * The corresponding author, email: reshmi.tr@vit.ac.in

    I. INTRODUCTION

    Mobile Ad-hoc Networks (MANETs) are infrastructure-less networks with self-configured hosts communicated via multi-hop communications. IPv6 autoconfiguration was designed to automatically attach a new node to a network and obtain information needed for connectivity. The main goal of autoconfiguration is to have the entire process occur automatically without human interaction, which eases the formation of spontaneous MANETs.Generally key exchange schemes are used to ensure secured communication in MANETs.But these automatic key exchanges can occur only between hosts with established IPv6 addresses. So IPsec is incapable of performing an automatic key exchange, and secure auAtoconfiguration process.

    IPv6 uses a hierarchical addressing scheme for the ease of address management. The IPv6 provides an active network interface with a default IPv6 address called the link-local address. This address is fully functional within the local segment and is not routed by routers.Hosts use this address to communicate with other hosts in same network. The 128-bit link local address consists of two 64-bit portions:a special link-local prefix (FE80:: /10) and a MAC address derived Extended Unique Identifier (EUI-64). The 48-bit MAC is first divided into two 24-bit halves and is filled with 16-bit FFFE in the middle. The 7th bit of the interface identifier (IID) signifies whether the address is global (0) or local (1). The 8th bit is called the group bit; and it signifies whether the address is unicast (0) or multicast (1). The EUI-64 based address generation in Stateless Address Autoconfiguration (SLAAC) [2] is shown in figure 1.

    When a node generates a tentative link-local address, it is checked for duplication on the subnet by the Neighbor Discovery Protocol(NDP) [1] assisted process called Duplicate Address Detection (DAD). Each network interface card (NIC) has multiple valid IPv6 addresses such as link-local, assigned unicast, solicited-node multicast, and all-nodes multicast addresses etc. The interfaces are configured with the all-nodes and solicited-node multicast group addresses to perform DAD. During DAD process, the Neighbor Solicitation (NS)messages are sent to the solicited-node multicast address. A Neighbor Advertisement (NA)message allows two nodes to detect the use of the same addresses on the network. When a duplicate is detected, the node with a permanent address, sends back an NA message to the requestor’s solicited node multicast address stating the collision. The node then performs regeneration of addresses and DAD up to two more times, after which a warning is written to the system log and the interface attempting to autoconfigure is disabled. If no duplication is detected, the address is considered unique and is assigned as permanent address.

    Fig. 1 EUI-64 generation in SLAAC

    The link-local address is used as an initial default address to retrieve the global and other network-prefix addresses. In a network, when a node receives a Router Advertisement (RA)(unsolicited or as a reply for Router Solicitation (RS)), it creates an IPv6 address appropriate for the advertised network prefix. These addresses are created by attaching the advertised prefix to the already derived EUI-64.

    The EUI-64 in IPv6 addresses remains stable for each subnet with the same network interface address, even when the client moves across different networks. So the one-to-one mapping of MAC addresses and EUI-64 in IPv6 addresses paves way to many privacy and security issues. When a node continues using the identity of a EUI-64 based link-local address and retrieves other addresses, it will be permanently bounded to the node and hence the mobility pattern of the node can be easily tracked. Beyond creating privacy issues,it also poses as potential source for information leakage. The EUI-64 based addresses in SLAAC are prone to different types of attacks given below.

    ● Impersonation: The lack of link layer control and spoofed MAC addresses can indulge any node to claim to be the existing member node in a network by generating the genuine member’s EUI-64 based address. These attacks can impersonate as both routers and hosts too. The address spoofing of router results in higher damage,as it can imply man-in-the-middle attacks.

    ● Denial of Service (DoS): Spoofing of DAD replies can introduce DoS attacks as the neighbor nodes consider that the network is undergoing a network merge or partition.Thereby the attackers will never allow genuine member nodes to participate or get services in the network.

    The SeND augmented IPv6 packets with the different fields of CGA options is given in figure 2.

    The above three categories of attacks are launched by altering the Internet Control Message Protocol Version 6 (ICMPv6) messages exchanged during autoconfiguration. The details of the ICMPv6 message exchanges are given in table 1.

    “沒(méi)錯(cuò),這兩棟樓之間的距離并不遠(yuǎn)。如果用木板架起一座橋的話,就好解釋多了?!被翳F不動(dòng)聲色地說(shuō),“可是,我向陸叔叔的助手了解過(guò)了,這段時(shí)間他根本就沒(méi)出過(guò)工作室的門(mén)。”

    ii. L1 Data Cache: The L1 cache also known as the primary cache memory in the processor core possesses information of the latest data used by a processor. In the LW-CGA, the cache lines of the L1 data cache are assumed to be in one of the seven possible states. This data is usually mapped in the SCROLL table between any one of the available 32 byte block .The L1 cache is selected as one of the 7512 possible states.The processor might additionally possess L2 and L3 caches which are not considered in this implementation.

    Table I ICMP message exchanged during autocofiguration

    Table II Attacks launched during autoconfiguration

    Table III ICMPv6 option types in SeND

    Fig. 2 SeND augmented IPv6 packet format

    The proposal is a light weight cryptographic address generation which is an alternate for CGA in SeND, The proposed scheme aims to bring a new address generation technique to adapt to MANET environment and is not targeted to improve the security of the scheme.The motivation of the proposed scheme is to assure:

    (1) The IPv6 addresses after CGA generation does not any way relate to MAC addresses and are unique within each subnet for each address in the same network interface of the same client.

    The LW-CGA includes several options to regenerate the CGA, resulting in different IPv6 addresses. These regenerations are explicitly prompted by a function call REGENERATE( )in the daemon. The various options provided by the LW-CGA regeneration are listed below.

    (3) The CGA based IPv6 addresses are reconfigured during network merging, partitioning or renumbering.

    The paper is organized into five sections.Section 1 discusses the introduction of the paper following the discussion of the existing work in Section 2. The Section 3 discusses the proposed work and the working of the scheme.Section 4 discusses the experimental setup and evaluations. Section 5 discusses the conclusion and the future works.

    II. BACKGROUND

    The SeND uses an asymmetric cryptography to enforce authentication and integrity without changing the zero configuration standard of the ND protocol. SeND encodes its ICMPv6 messages [6] by using few new option types that are not used in the regular ND messages.The table 3 lists the new ICMPv6 option types used in SeND. RSA keys and Cryptographically Generated Address (CGA) [5] are used to ensure authenticity in SeND. CGA alike regular IPv6 address has two 64-bit portions.

    ● Redirection: The methodology of redirection attack is almost similar to the impersonation attack. The attacker misdirects the target node or nodes attempting to connect to the destination nodes by directing to any other unsafe destination to capture the communication packets or interrupt the node communication. Attackers may also announce the change in router address, or network prefixes to interrupt the node communications.

    The first 64 bits represents the network prefix and the second represents the IID, which is derived using the SeND specific CGA generation process. The augmented option fields of CGA in SeND includes Public Key,128-bit-modifier, 64-bit subnet prefix of the address and 8-bit collision count. The SeND uses two hash functions using the parameters given in the CGA option field. The HASH1 and HASH2 functions play a major role in CGA generation. The generations of CGAs involve determining the public key of the owner address, selecting the appropriate security-level (Sec) ranging from 0 to 7and generation of a random 128 bit modifier. Then it is subjected to SHA-1 hashing and is looped continuously with various values assigned to the modifier until 16 × Sec leftmost-bits of HASH2 equals zero. This final modifier value is again used along with the various other CGA parameters as the input to the HASH1. HASH1 is the leftmost 64-bit of the SHA-1 hash function.It concatenates the modifier, subnet, collision count and the public key fields of CGA options. HASH1 resultant is modified and used as the IID in CGA. The seventh bit of HASH1 is modified to represent whether the address is global or local. The eighth bit represents whether the address represents unicast or multicast groups. TheHASH1 uses a hash extension technique using the Security Parameter (Sec) to decide the strength of the hash function. In CGA Sec is used as the first 3 bits of the IID. The CGA generation process is represented in figure 3.

    During the verification process, the CGA options in the ICMPv6 packets are first extracted to calculate the HASH1 and HASH2 values. At first the bit sequence (excluding seventh and eighth bit) of the calculated HASH1 is compared with the IID. The SeND daemon then compares the 16 x Sec leftmost bits of HASH2 to zero. If any of these comparisons fails, the packet processing is stopped and the packet is discarded. Following these verification the digital signatures are verified.The RSA signature method helps to prove whether the public key corresponds to the private key of the packet sender. This binds the CGA and the key pair of the same origin.Even though authentication is well addressed by CGA and RSA, authorization is still a challenging issue in SeND. Hence this scheme is prone to rouge router attacks like poisoned router, malicious router, default router kill etc.(discussed in table 2).

    Both packet size and the computational intensity for CGA generation in SeND is a major concern for MANETs. In general,MANETs are at risk as it would be easy for an attacker to flood the network with large, expensive-to-process packets, consuming bandwidth, resources and energy, resulting in limited responsiveness of the nodes. Due to the frequent exchange of packets during merging and partitioning of MANETs, SeND employs reconfiguration of nodes that would greatly increase the resource consumption of nodes.

    A SeND context is an internal data structure that stores information about the interface,options, prefixes, and keys used by packets.So for every packet that fails or pass the verification process adds a context to the stored information, and hence adds unnecessary computation. The computational cost of a CGA generation, with a non-zero Sec value,increases the address configuration time. Even though there are many modifications suggested in SeND, these schemes couldn’t overcome the issues faced by the existing schemes. The privacy addresses generated in a scheme proposed by Narten et al. [7] used the Message Digest (MD5) on the message stored in a stable storage to retrieve the addresses. But these addresses can be easily predicted by tracking the file usage history. Bos et al. [8] proposed an analyzed optimal CGA generation, but the scheme is for infrastructure based networks and hence is not adopted for MANETs. Jiang[9] introduced an interactive method of address generation with DHCPv6, but the dynamic nature of MANETs restricted assigning dedicated services and interactive communication packets.

    Fig. 3 CGA generation

    The extended SeND [10] and windows based SeND [11], were not implemented and standardized because of the limitation of applicability. The cryptographic algorithms of SeND are extended or modified in many schemes [12-19] by replacing RSA with ECC and newly designed cryptographic algorithms to reduce the computational complexity of authentication. But as MANETs are provided with low resources, these schemes may drain the resources and hence are not applicable for MANETs. SAVI [20] scheme is a link-layer authentication protocol scheme which ensures the authenticity of the packets exchanged during autoconfiguration. But it fails to assure protection against other ND vulnerabilities.The surveys [21-23] on the existing schemes emphasize the requirement for a light weight and empirically strong CGA generation for resource constrained MANETs and is the motivation for the proposed work.

    III. PROPOSED WORK

    The SeND protocol designed to overcome the security threats during autoconfiguration has proven to face security and technical issues in MANETs (discussed in Section 2). The paper proposes an unpredictable random number based address generation using internal system states, for ensuring security of autoconfiguration with minimum resource consumption. The internal system states based address generation is an inspirational proposal of Hardware Volatile Entropy Gathering and Expansion(HAVEGE) [24]. Pseudo random numbers exhibiting high degree of randomness are needed for highly secured cryptographic algorithms.

    A heuristic algorithm that relies on entropy gathered from unpredictable system events is proposed. This entropy gathering technique is used in pseudorandom number generator to generate the IID during autoconfiguration. The algorithm implements a hardware clock cycle counter to gather the entropy from the system states of the nodes. The system states are hardware mechanisms that improve performance of caches, branch predictors and external devices. These system states are not architectural, but volatile and cannot be directly monitored by the user and hence are used as source for highly random pseudorandom numbers.Since the system state includes thousands of internal volatile hardware states, it is impossible for the user to reproduce the generated bit sequences. Any attempt to indirectly gather the bit sequence triggers the internal state of the system and therefore, reproducing the bit sequences is virtually impossible. Although the proposed address generation method is a light weight scheme with fewer computations,it has proven compliance to all the security standards discussed in NIST statistical test suite [25]. The internal system states based address generation called as Light Weight Cryptographic Address Generation (LW-CGA) is a novel light weight autoconfiguration scheme designed to ensure high security and adaptability in MANETs.

    3.1 Light weight cryptographic address generation (LW-CGA)

    iv. Regeneration at regular intervals: The regeneration at regular interval is an option included for maintenance and security purposes. The option has been included to add the renumbering features.

    The algorithmic steps are given below.

    Step 1:The functionCLKREAD()is defined to read and return the hardware clock counter value of the node.

    Step 2:Two concurrentSCROLLoperations are performed in parallel in a table of 4B. The table 1s twice the size of L1 data cache. If theSCROLLis random, then the probability of a hit in the cache is very close to 1/2 on each data reading from the table.

    陳邦設(shè)強(qiáng)調(diào),“我們?cè)跈z驗(yàn)工作成效時(shí),要以企業(yè)增效、員工增收、企業(yè)經(jīng)營(yíng)質(zhì)量持續(xù)增長(zhǎng)、企業(yè)團(tuán)隊(duì)能力持續(xù)提升為標(biāo)準(zhǔn)”。因?yàn)?,只有合理、高效地進(jìn)行企業(yè)人事管理,才能增加員工對(duì)企業(yè)的信任感;也只有這樣,團(tuán)隊(duì)對(duì)企業(yè)文化的認(rèn)同感才會(huì)轉(zhuǎn)化為強(qiáng)大的力量,推動(dòng)企業(yè)蒸蒸日上地發(fā)展。

    Step 3:Two data dependent tests are introduced on iterations ofSCROLLto make its behavior depend on branch prediction information. For both branches, the probability of the branch being taken is 1/2 if the content of the table 1s random.

    每個(gè)調(diào)類(lèi)有15個(gè)單字,共有75個(gè)單字,為防止受試有不熟悉的字,75個(gè)單字提前打印以供受試熟悉。錄音和語(yǔ)音分析軟件為Praat,錄音在安靜環(huán)境中進(jìn)行,每人相同字表都錄音兩次,3人均為一次性錄完.

    在中職教育以及旅游業(yè)快速發(fā)展的過(guò)程中,中職旅游專(zhuān)業(yè)教育也進(jìn)一步擴(kuò)張。當(dāng)前,中職旅游管理專(zhuān)業(yè)已經(jīng)慢慢發(fā)展成為較為成熟的發(fā)展體系,不過(guò)在教學(xué)過(guò)程中并沒(méi)有徹底擺脫傳統(tǒng)的灌輸式教學(xué)模式,這樣就導(dǎo)致培養(yǎng)的人才不能滿足社會(huì)發(fā)展需要。因此,旅游業(yè)重點(diǎn)關(guān)注的問(wèn)題是各院校如何培養(yǎng)適應(yīng)社會(huì)需要的旅游管理專(zhuān)業(yè)人才。通過(guò)實(shí)踐調(diào)查研究發(fā)現(xiàn),我國(guó)當(dāng)前在旅游管理專(zhuān)業(yè)人才培養(yǎng)以及教育改革方面的研究比較少,特別是在“互聯(lián)網(wǎng)+”時(shí)代,更應(yīng)該加強(qiáng)此方面的探索。

    Step 4:TheSCROLLis iterated to the number of unrolled steps (y) for data reads from instruction cache. This maximizes the number of instruction blocks (and associated branch prediction information) extracted from the instruction cache on each operating system interrupts.

    Step 5:The two distinct data read (Steps 3 and 4) acquired duringSCROLLperforms Exclusive-OR (XOR) in memory table. If memory table 1s directly read for random number generation, then an observer can follow up theSCROLLfor a while and try to guess the partial content of the table. XOR is used to hide the content of theSCROLLtable from any possible observer.

    Step 6:The 64 bit Least Significant Bits(LSB) extracted from random bits of the output of the algorithm are used as IID for CGA generation.

    3.1.1 System states for random number generation

    The system states of the nodes are unpredictable 5olatile hardware states and are activated by the instruction cache and branch predictors.Any node with a processor can implement the algorithm and collect the system states. The volatile states of the nodes are influenced by the following components.

    方法二:將a,b看成一元二次方程x2=3x-1的兩根,用根與系數(shù)的關(guān)系分別求出a+b,ab的值代入式子得到18.

    Fig. 4 Algorithm of CGA generation in LW-CGA

    i. DATA Translation Look-aside Buffer(TLB): The TLB buffer is a table consisting of information of the pages in the memory that are accessed by the processor. Each entry of a page in the TLB possesses about 129 states which invoke system states. The LWCGA is constructed with a loop that access 128 pages of memory.

    The various sub classes of attacks launched in the networks during autoconfiguration are also given in table 2. These attacks are launched in both infrastructure and ad-hoc networks with the ICMPv6 messages. The survey[3] states that most of the attacks launched in ad-hoc networks are still not addressed and exist as an open research area. The unique or unpredictable 1nterface identifier based address can reduce the chances of exposure to these attacks. But today there are many solutions available to alter the unique MAC addresses of the devices and hence it is impossible to assure uniqueness of MAC addresses. More over MANETs are dynamic, with frequent merging and partitioning; therefore setting a static policy and expecting it to uphold a secure state is unrealistic. Moreover the Neighbor Discovery(ND) was not designed to deal with security issues and is not suitable for MANETs. Secure Neighbor Discovery Protocol (SeND)[4] addresses few of these issues and it was targeted for infrastructure based networks. As MANETs are infrastructure-less multi-hop communication networks with high resource consumption, there are many technical issues for the implementation of SeND in MANETs.

    iii. L1 Instruction Cache: The L1 instruction cache consists of 256 sets in which, each set possesses 7 possible states. The LW-CGA is made of a loop body that performs self-modifying paces over the level 1 instruction cache.

    3.1.2 Regeneration options of LW-CGA

    由圖16可以獲得faFM和waFM歐式空間點(diǎn)的坐標(biāo)變換,faFM在Lv、Q方向的變動(dòng)范圍分別為-0.08 mm~0.08 mm和-0.1 mm~0.1 mm,waFM在Lv、Q方向的變動(dòng)范圍都為-0.2 mm~0.2 mm。

    (2) The CGA based IPv6 addresses cannot be predicted by the attacker.

    i. Regeneration on updated RA and NA: The RA and NA message contains new prefix advertisements or updates to indicate prefix-change or MANET merging or partitioning. So whenever an advertisement with new prefix is received the daemon calls REGENERATE( )

    綜上所述,再次定位CT2圖像較首次定位CT1圖像肺的體積增大,腫瘤靶區(qū)體積縮小,能夠減小患肺及全肺受照射劑量,可減輕放療副作用及保護(hù)正常器官,值得臨床關(guān)注。

    ii. Regeneration on interface status change:The option enables a new IID generation when a node enables a network interface.So when an interface is enabled state it will be configured with a new address even if the network-prefix remains the same. By default as in existing schemes, each node with multiple interfaces will be configured with different IIDs.

    裝配式建筑結(jié)構(gòu)對(duì)住宅產(chǎn)業(yè)的發(fā)展和推動(dòng)起到了很大的促進(jìn)作用,這與日本政府的干預(yù)和大力支持是密不可分的:日本政府方面制定了一系列的建設(shè)住宅工業(yè)化方針,并建立了相應(yīng)統(tǒng)一的標(biāo)準(zhǔn)。這樣就解決了標(biāo)準(zhǔn)化與住宅多樣化、復(fù)雜化之間的各種矛盾。通過(guò)在不斷的探索和研究中,繼續(xù)進(jìn)一步的快速進(jìn)步。

    iii. Regeneration on user choice: The CGA generation can be explicitly invoked by the user based on his/her choice. This feature is added for testing purpose and entropy calculation on each generation.

    The LW-CGA algorithm uses a heuristic algorithm to collect entropy of system states and generate a sequence of random number bits as IID. A hardware clock counter is used to gather the sequence of uncertainty of the system states. The entropy gathered from the system states are generated from the instruction cache and branch prediction structures. A function to read the hardware clock called CLKREAD( )is used and it verifies the difference with last read values. The counter INTERRUPTCOUNT is incremented by function CLKREAD( ) when the difference of the clock read is higher than a threshold level MAX indicating an interrupt between two successive reads. Throughout the algorithm,CLKREAD( )is called several times and the resultant is combined by XOR and shifts in an arrayENTROPY[ ].Since the entropy in the least significant bits (LSB)of the hardware clock counter is more than the most significant (MSB), the read value is combined with circular shift of the previously accumulated data for even diffusion of entropy throughout the arrayENTROPY [ ].The entropy collection loop runs until theINTERRUPTCOUNTreaches a predefined threshold.BUFFERSIZEis the size of the table used to gather the values of the hardware clock counter. At an instance the content of theENTROPY[ ]is saved and reinitialized to zero. The savedENTROPY[ ]is combined with a simple pseudorandom number generator. ADYNAMTABLE[]is used to record the two instants of updates in the singleENTROPY[ ]table.SCROLL[ ]is a memory table which is twice the size of the L1 Cache (discussed in Section 3.2.1 and is assumed in power of 2). TheSCROLL[ ]stores the resultant empirically strong random number which is assigned as the IID of the CGA addresses. The random bit sequence from the internal micro architectural status of a system and integration to the link local address makes the addresses unpredictable. The figure 4 shows the pseudocode of LW-CGA algorithm.

    IV. EXPERIMENTAL EVALUATIONS

    The LW-CGA and SeND autoconfiguration schemes are implemented in real networks for experimental evaluations. The flow chart of LW-CGA and SeND implementation is shown in figure 5.

    4.1 Experimental set-up

    ● IID regeneration time is the time taken for the IID regeneration by CGA regeneration without key generation. The CGA regeneration of SeND requires a HASH1 calculation alone, whereas only a random number generation in LW-CGA.

    The LW-CGA as like SeND uses the RSA based key (1024 bits) exchange scheme during the first CGA generation. But during regeneration of CGA (caused by node mobility or change in network gateway), the keys are not regenerated but verified for authenticity. In SeND scheme, the HASH1 alone is recomputed during CGA regeneration. The SeND evaluation of Sec values higher than 1are not validated as it is proven to be impractical [23].The following parameters are used for evaluations.

    ● IID generation time is the total time duration for the generation of public key, their verification and computation of CGA followed by IID configuration

    如今,因?yàn)閾?dān)心夫人摔著,潘際鑾院士不再騎車(chē)載她了,而是改為手牽手,去菜場(chǎng)、去學(xué)校、去訪學(xué)……時(shí)時(shí)刻刻不分離。潘際鑾是南昌大學(xué)的老校長(zhǎng),南昌大學(xué)有一條“際鑾路”,老兩口回南昌大學(xué)故地重游,牽手走在這條路上,也被學(xué)生拍到了。

    新的有機(jī)硅樹(shù)脂工廠將位于陶氏在張家港的有機(jī)硅一體化生產(chǎn)基地。該基地坐落于江蘇揚(yáng)子江國(guó)際化學(xué)工業(yè)園,于2006年開(kāi)工建設(shè),2010年投產(chǎn),占地近百萬(wàn)平方米,是中國(guó)最大的有機(jī)硅生產(chǎn)基地。

    The Linux kernel version of 2.6.34 is used in nodes for the implementation of the LW-CGA and SeND autoconfiguration schemes. The experimental analysis can be interrupted by the scheduler as its time is accounted for the measurements. Hence single mode Linux kernels are used for experimentations. The SLAAC implementation of IPv6 is modified for the implementations. The modified kernel provides several sys-controls which can be read and written to and by user-space programs,controlling the operation of IPv6 privacy extensions. SeND-CGA project developed and maintained by Huawei Technologies Corp.and BUPT (Beijing University of Post and Telecommunications) [26], is implemented as a modified kernel and invoked with a daemon.The LW-CGA is an extension of HAVEGE[24] and the same is implemented as a modified kernel. The kernel sys-controls are adjusted to characterize MANETs. No changes pertaining to IPv6, ICMPv6, and NDv6 parameters were made, so as to preserve the other network layer features. SeND is compiled with the minimal options required to compile on Linux and is used for the testing.

    ● Entropy is the measure of randomness in a closed system. The entropy of a random variable X with probabilities pi, …, pnis defined as

    Fig. 5 Flow Chart of LW-CGA and SeND Implementations

    The NIST Test Suite [25] is a statistical package with 15 tests to test the randomness or entropy of the binary sequences generated by the algorithms. We have conducted NIST tests to test the randomness of binary sequences generated by SHA-1 in SeND and random number generator in LW-CGA. These tests focus on a variety of non-randomness that could exist in a sequence. Various statistical tests were applied to the bit sequence generated by LW-CGA and SeND to compare and evaluate the randomness. The randomness of bit sequences was characterized and described in terms of probability. These statistical tests were formulated to test a specific null hypothesis (H0). The null hypothesis was the sequence being tested is random. Associated with this null hypothesis is the alternative hypothesis (Ha), for which the sequence is not random. For each test, the decision declares the acceptance or rejection of null hypothesis,i.e., whether the sequence generated is truly random or not. In each test, a relevant randomness statistic was chosen to determine the acceptance or rejection of the null hypothesis

    A mathematical method was used to determine the theoretical reference distribution of this statistic under null hypothesis. A critical value was selected from this reference distribution (typically, this value is “far out” in the tails of the distribution say, out at the 99% point). During the tests, the statistic value computed on the bit sequence was compared to the critical value. If the test statistic value was higher than the critical value, the null hypothesis was rejected. Otherwise, the null hypothesis was accepted. For these tests, the probability of randomness determined as P-value was compared with the derived significant level (α). If P-value ≥α, then the bit sequence was considered random and if it was not so, then it was considered non-random.Typically, α was chosen in the range 0.001 and 0.01.

    Fifteen tests of NIST Statistical Test Suite have significant purpose to confirm the randomness of the bit sequence. The Block and Frequency Monobit tests determine whether the number of ones and zeros in a sequence are approximately the same as expected for a truly random sequence. The Binary Matrix Rank Test checks for linear dependence among fixed length substrings of the original sequence. The Longest Run Test determine whether the length of the longest run of ones within the tested sequence is consistent with the length of the longest run of ones as expected in a random sequence. The Run Test determines whether the oscillation between ones and zeros of various lengths is as expected for a random sequence. Spectral Discrete Fourier Test (DFT) detects repetitive patterns in the tested sequence to indicate a deviation from the assumption of randomness. Non-Overlapping Template Matching Test checks whether too many occurrences of a given non-periodic pattern occur in tested sequence. Overlapping Template Matching Test determines the number of occurrences of pre-specified target strings. It uses the same m bit window as in Non-Overlapping Template Matching Test, to search for a specific m bit pattern (B). The difference is that when the pattern is found, the window slides only one bit before resuming the search.

    唐詩(shī)的模糊美初探 ……………………………………………………………… 王華琴,張青華,張 紅(5.76)

    The Maurer’s Universal Test detects whether the sequence is significantly compressed without loss. The Linear Complexity Test determines whether the sequence is complex enough to be considered random. The Serial Test determines whether the number of occurrences of the 2m m bit overlapping patterns is approximately the same as expected for a random sequence. Approximate Entropy Test compares the frequency of overlapping blocks of two consecutive lengths (m and m+1) against the expected result for a random sequence. The Cumulative Sum (cusum) Test determines whether the cumulative sum of the partial sequences in the sequence is too large or too small relative to the expected behavior of cumulative sum for random sequences. The Random Excursion Test determines whether the number of visits to a particular state within a cycle deviates from that expected for a random sequence. The Random Excursion Variant Test detects deviations from the expected number of visits to various states in random scroll.

    4.2 Experimental results

    The CGA generation time of SeND and LWCGA is measured with an internal counter clock. The experimental results of more than 100 samples have been averaged to validate the analysis. The result shown in table 4 concludes that the LW-CGA takes less time when compared to SeND. The key generation time is almost the same for both the schemes, but the verification and CGA generation time is high in SeND which contributes to extra time consumption.

    該水庫(kù)防滲工程施工結(jié)束后,經(jīng)蓄水檢驗(yàn),主副壩下游坡原潮濕散浸現(xiàn)象完全消失;據(jù)壩后量水三角堰量測(cè),主壩為0.33L/s,副壩為0.015L/s,相比除險(xiǎn)加固前均大為減少,達(dá)到除險(xiǎn)加固目的。

    The CGA generation time for Sec=1 is greater than Sec=0 of SeND. The difference in time is to generate the modifier that requires further time for calculating HASH2 values until the 16 x Sec leftmost bits are zeros. Hence at Sec=1 the key generation followed by verification, HASH1 and HASH2 computation for CGA generation time contribute to the total IID generation time. At Sec=0, the key generation time, verification time and HASH1 computation time for CGA generation time only contribute to the total IID generation time. The HASH1 and HASH2 computation involves the use of public key as a parameter;hence these computations are sequential and are interdependent (discussed in Section 2).The LW-CGA uses a key exchange scheme for verification and validation of the keys generated. The CGA generation scheme in LW-CGA is not dependent on the keys and involves random bit generations from entropy gathered from system states. LW-CGA scheme uses a less computational intensive method for CGA generation and hence the time taken for the IID generation is comparatively very less compared to the SeND.

    The CGA regeneration time of SeND at Sec=0 and Sec=1 does not involve key exchanges and verifications, but computation of HASH1. The LW-CGA just recertifies the authenticity of the keys and regenerates the random number. The results conclude that the time required for CGA generation in LW-CGA is very less when compared to SeND.

    The security of the schemes can be evaluated with the entropy of the algorithms. The security flaws of SHA-1 have invoked many on-going works in the CGA and SeND maintenance working group in IETF. These have issued the recommendation of SHA-2, SHA-256 etc. But these schemes are highly computational intensive and fail in resource constrained environments. The SHA-1 in SeND and random number generator in LW-CGA are tested using the NIST statistical test suite [25].The recommended statistical tests are done to evaluate the performance in security algorithms. For a p-value ≥ 0.001, the sequence is considered to be random with a confidence of 99.9% or else non random with a confidence of 99.9%. The analysis shows that random number generator of LW-CGA performs well in cryptanalysis.

    圖5是原始WENO-CU6-M2格式及其改進(jìn)A和改進(jìn)B在400個(gè)網(wǎng)格點(diǎn)上計(jì)算得到的t = 0.038時(shí)刻的密度和速度曲線及局部放大. 它們?cè)趫D5(a)和圖5(b)中初看起來(lái)沒(méi)有差別, 但在圖5(c)和圖5(d)的局部放大圖中可觀察到, 原始WENO-CU6-M2格式的密度曲線和x≈0.865附近的激波出現(xiàn)了微小的偽波, 而兩種改進(jìn)格式消除了這些偽波.

    V. CONCLUSION AND FUTURE WORKS

    SeND uses RSA and SHA-1 implementation for ensuring privacy enabled autoconfiguration. The generation time and the computational intensity of CGA make SeND implementation impractical for MANETs. Moreover the improved security level of SeND varying from 0 to 7 worsens the computational intensity and battery consumption in wireless devices. Thepaper proposed a light weight cryptographic scheme called LW-CGA that ensures high security with minimal and faster computations.The random number generations in the scheme uses an entropy gathering algorithm from the system states and are independent of the keys.The bit sequences generated by the algorithm are impossible for guessing and cannot be even monitored by the system users. Hence the scheme is highly random and assures security.It’s proven that the usages of LW-CGA satisfies all the characteristic requirements of cryptographic algorithms and are more suitable for constrained devices like PDA and Tablet PC.The schemes are evaluated with real time implementation to study CGA generation using SHA-1 in SeND and random number generation in LW-CGA. The experimental results show significantly reduced address generation time while using LW-CGA. The NIST statistical tests demonstrate that a higher security is assured with LW-CGA without the need for a high cost algorithm. Future works of the authors mainly focus on more light weight techniques for privacy enabled autoconfiguration in MANETs.

    Table IV IID generation time of SeND (at Sec=0 and Sec=1) and LW-CGA

    Table V IID regeneration time of SeND (at Sec=0 and Sec=1) and LW-CGA

    Table VI NIST statistical tests on SeND and LW-CGA

    [1] T. Narten et al., “Neighbor Discovery for IP Version 6 (IPv6),” RFC 4861, Sept. 2007; htp://tools.ietf.org/ html/rfc4861.

    [2] S. Thomson, T. Narten, and T. Jinmei, “IPv6 Stateless Address Autoconfiguration,” RFC 4862,Sept. 2007; htp://tools.ietf.org/html/rfc4862.

    [3] P. Nikander, J. Kempf, and E. Nordmark, “IPv6 Neighbor Discovery (ND) Trust Models and hreats,” RFC 3756, May 2006, htp://tools.ietf.org/html/rfc3756.

    [4] J. Arkko et al., “SEcure Neighbor Discovery(SEND),” RFC 3971, Mar. 2005, htp://tools.ietf.org/html/rfc3971.

    [5] T. Aura, “Cryptographically Generated Addresses (CGA),” RFC 3972, Mar. 2005, htp://tools.ietf.org/html/rfc3972.

    [6] Conta, S. Deering, and M. Gupta, “Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Speciication,”RFC 4443, Mar. 2006, htp://tools.ietf.org/html/rfc4443.

    [7] T. Narten, R. Draves, and S. Krishnan, “Privacy Extensions for Stateless Address Autoconiguration in IPv6,” RFC 4941, Sept. 2007, htp://tools.ietf.org/html/ rfc4941.

    [8] J.W. Bos, O. Ozen, and J.-.P Hubaux, “Analysis and Optimization of Cryptographically Generated Addresses,” LNCS 5735, Springer, pp. 17–32,2009.

    [9] S. Jiang, “Analysis of Possible DHCPv6 and CGA Interactions,” draft, 12 Mar. 2012, htp://tools.ietf.org/html/drat-ietf-csi-dhcpv6-cga-ps-09.

    [10] S. Chiu and E. Gamess, “A Free and Didactic Implementation of the SEND Protocol for IPv6”,Machine Learning and Systems Engineering, vol.68, S.-I. Ao, B. Rieger, and M.A. Amouzegar, eds.Springer, pp. 451–463, 2010.

    [11] H. Raiee, A. AlSa’deh, and C. Meinel, “WinSEND:Windows Secure Neighbor Discovery,” 4th Int’l Conf. Security of Information and Networks(SIN 11), ACM, pp.243–246, 2011.

    [12] Kukek and B.A. Zeeb, “Native Send Kernel API for BSD,” 2010; htp://people.freebsd.org/~anchie/SeND_AsiaBSDCon_2010.pdf.

    [13] T. Cheneau, A. Boudguiga, and M. Laurent,“Significantly Improved Performances of the Cryptographically Generated Addresses thanks to ECC and GPGPU,” Computers & Security, vol.29, no. 4, pp. 419–431, 2010.

    [14] S. Guangxue et al., “A Quick CGA Generation Method,” 2nd Int’l Conf. Future Computer and Communication (ICFCC), IEEE, pp. V1-769–V1-773, 2010.

    [15] S. Jiang and S. Xia, “Configuring Cryptographically Generated Addresses (CGA) Using DHCPv6,” 11 Apr. 2012, http://tools.ietf.org/html/draft-ietf-dhc-cga-config-dhcpv6-02.

    [16] T. Aura and M. Roe, “Strengthening Short Hash Values,” http://citeseerx.ist.psu.edu/viewdoc/summary?doi 10.1.1.145.7681

    [17] Gont, F., and W. Liu, “A Method for Generating Semantically Opaque Interface Identifiers (IIDs)with the Dynamic Host Configuration Protocol for IPv6 (DHCPv6)”, RFC 7943, 2016.

    [18] Shah JL, “A novel approach for securing IPv6 link local communication”, Information Security Journal: A Global Perspective, Vol. 22, 1-5, 2016.

    [19] Rehman SU, Manickam S, “Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process”, International Journal of Security and Its Applications,Vol. 10(4), 143-54, 2016.

    [20] Supriyanto, Iznan Husainy Hasbullah, Raja Kumar Murugesan, Sureswaran Ramadass, “Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods”, IETE Technical Review, Vol 30,2013.

    [21] Minoli, Daniel, and Jake Kouns, “Security in an IPv6 environment”, CRC Press, 2016.

    [22] Rehman SU, Manickam S, “Significance of duplicate address detection mechanism in IPv6 and its security issues: A survey”. Indian Journal of Science and Technology, 8(30), 2015.

    [23] A.AlSa’deh and C. Meinel, “Secure Neighbor Discovery: Review, Challenges, Perspectives,and Recommendations”, IEEE Security & Privacy Magazine, Vol. 10, no. 4, pp. 26 –34, August 2012.

    [24] Seznec, N. Sendrier, “HAVEGE: a user-level software heuristic for generating empirically strong random numbers”, ACM Transaction on Modeling and Computer Simulations (TOMACS), Vol.13, Issue 4, October 2003.

    [25] National Institute of Standards and Technology,NIST Special Publication 800-22rev1a, “A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications”,http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf, April 2010.

    [26] https://code.google.com/p/ipv6-send-cga/downloads/list

    猜你喜歡
    單字南昌大學(xué)除險(xiǎn)
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    不忘初心創(chuàng)沂沭泗基建新篇 除險(xiǎn)加固保南四湖治水安瀾
    治淮(2021年12期)2021-12-31 05:46:30
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)稿約》
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)稿約》
    河北大名話單元音韻母、單字調(diào)及雙音節(jié)非輕聲詞連調(diào)的實(shí)驗(yàn)語(yǔ)音學(xué)初探
    “對(duì)仗不宜分解到單字”毋庸置疑——答顧紳先生“四點(diǎn)質(zhì)疑”
    鹽城方言單字調(diào)聲學(xué)實(shí)驗(yàn)研究
    太浦閘除險(xiǎn)加固工程通過(guò)竣工驗(yàn)收
    淺談水庫(kù)的除險(xiǎn)加固
    河南科技(2014年8期)2014-02-27 14:08:04
    色尼玛亚洲综合影院| 免费在线观看视频国产中文字幕亚洲| 日本黄色片子视频| 欧美黑人巨大hd| 国产一区二区三区在线臀色熟女| 他把我摸到了高潮在线观看| av在线蜜桃| 欧美日韩瑟瑟在线播放| 天堂av国产一区二区熟女人妻| 伦理电影免费视频| 国产日本99.免费观看| 精品欧美国产一区二区三| 老鸭窝网址在线观看| or卡值多少钱| 国产一区二区激情短视频| 久久中文看片网| 亚洲国产看品久久| 久久精品人妻少妇| 小说图片视频综合网站| 无限看片的www在线观看| 99国产精品99久久久久| 真人一进一出gif抽搐免费| 亚洲精品国产精品久久久不卡| 欧美又色又爽又黄视频| 午夜视频精品福利| 日本黄色视频三级网站网址| 欧美不卡视频在线免费观看| 在线观看舔阴道视频| 中文字幕久久专区| 久久人妻av系列| 国产69精品久久久久777片 | 757午夜福利合集在线观看| 怎么达到女性高潮| 国产 一区 欧美 日韩| 丰满人妻熟妇乱又伦精品不卡| 欧美中文日本在线观看视频| 可以在线观看的亚洲视频| 夜夜爽天天搞| 女生性感内裤真人,穿戴方法视频| 18禁国产床啪视频网站| 亚洲成人中文字幕在线播放| 亚洲真实伦在线观看| 日韩欧美国产一区二区入口| 三级国产精品欧美在线观看 | 亚洲欧美日韩卡通动漫| 亚洲av第一区精品v没综合| 日日干狠狠操夜夜爽| 偷拍熟女少妇极品色| 天堂动漫精品| 一区福利在线观看| 国产一区在线观看成人免费| 欧美+亚洲+日韩+国产| av在线蜜桃| 不卡一级毛片| 99久久久亚洲精品蜜臀av| 国产爱豆传媒在线观看| 久久久久久九九精品二区国产| 99久久久亚洲精品蜜臀av| 不卡一级毛片| 亚洲熟女毛片儿| 国产精品久久久久久久电影 | 真实男女啪啪啪动态图| 91老司机精品| 亚洲欧洲精品一区二区精品久久久| 黑人欧美特级aaaaaa片| 国产人伦9x9x在线观看| 国产激情欧美一区二区| 亚洲中文日韩欧美视频| 在线国产一区二区在线| 韩国av一区二区三区四区| 99精品在免费线老司机午夜| 波多野结衣巨乳人妻| 国产亚洲精品av在线| 亚洲国产精品合色在线| 又黄又爽又免费观看的视频| 国产成+人综合+亚洲专区| 超碰成人久久| 婷婷亚洲欧美| 国产精品1区2区在线观看.| 人妻夜夜爽99麻豆av| 亚洲中文字幕日韩| 亚洲午夜精品一区,二区,三区| 韩国av一区二区三区四区| 亚洲va日本ⅴa欧美va伊人久久| 曰老女人黄片| 婷婷亚洲欧美| 变态另类成人亚洲欧美熟女| 日本成人三级电影网站| 又黄又爽又免费观看的视频| 黄色成人免费大全| 日本黄色视频三级网站网址| 成人av一区二区三区在线看| 国产爱豆传媒在线观看| 午夜视频精品福利| 国产男靠女视频免费网站| 久久精品夜夜夜夜夜久久蜜豆| 国产又色又爽无遮挡免费看| 日本 av在线| 1024香蕉在线观看| 老汉色av国产亚洲站长工具| 天堂动漫精品| 欧美性猛交黑人性爽| 最近视频中文字幕2019在线8| 国产精品爽爽va在线观看网站| 精品免费久久久久久久清纯| 日本 欧美在线| 香蕉国产在线看| 在线免费观看不下载黄p国产 | 久99久视频精品免费| av女优亚洲男人天堂 | 亚洲成人免费电影在线观看| 午夜福利在线观看免费完整高清在 | 99久久无色码亚洲精品果冻| 麻豆av在线久日| 色精品久久人妻99蜜桃| 国产亚洲精品久久久com| 国产日本99.免费观看| 午夜成年电影在线免费观看| 精品国产乱子伦一区二区三区| 成人精品一区二区免费| 国产精品野战在线观看| 特级一级黄色大片| 国产精品乱码一区二三区的特点| 国产精品99久久99久久久不卡| 成人特级黄色片久久久久久久| 精品人妻1区二区| 色在线成人网| 一区福利在线观看| 久久精品影院6| 舔av片在线| а√天堂www在线а√下载| 黄片大片在线免费观看| 亚洲人与动物交配视频| 久久久国产成人精品二区| 天堂影院成人在线观看| 亚洲中文日韩欧美视频| 国产精品一区二区精品视频观看| av在线蜜桃| 亚洲精品在线观看二区| 中文字幕人成人乱码亚洲影| 18禁国产床啪视频网站| 亚洲欧美日韩高清在线视频| 免费观看精品视频网站| 啦啦啦观看免费观看视频高清| 亚洲av片天天在线观看| 国产亚洲精品综合一区在线观看| 国内精品一区二区在线观看| 动漫黄色视频在线观看| 欧美又色又爽又黄视频| 久久精品aⅴ一区二区三区四区| 久久久水蜜桃国产精品网| 亚洲欧美一区二区三区黑人| 久久久久九九精品影院| 很黄的视频免费| www.熟女人妻精品国产| 看片在线看免费视频| 亚洲国产精品合色在线| 两个人的视频大全免费| 波多野结衣高清无吗| 久久亚洲精品不卡| 久久香蕉国产精品| 日日干狠狠操夜夜爽| 18美女黄网站色大片免费观看| 久久久国产成人免费| 国产单亲对白刺激| 午夜精品一区二区三区免费看| 国产伦一二天堂av在线观看| 亚洲电影在线观看av| 国产精品久久久av美女十八| 国产精品久久久人人做人人爽| or卡值多少钱| 国产成人影院久久av| 精品久久蜜臀av无| 欧美最黄视频在线播放免费| 亚洲自偷自拍图片 自拍| 精品国产亚洲在线| 欧美日本亚洲视频在线播放| 亚洲,欧美精品.| 精品免费久久久久久久清纯| bbb黄色大片| 国产精品永久免费网站| 欧美高清成人免费视频www| 婷婷精品国产亚洲av| 亚洲精品在线观看二区| 国产精品一及| 天天添夜夜摸| 男人和女人高潮做爰伦理| 美女高潮的动态| 99热精品在线国产| 亚洲色图av天堂| 好男人电影高清在线观看| 黄色女人牲交| 黄色视频,在线免费观看| 青草久久国产| 亚洲第一欧美日韩一区二区三区| 国产1区2区3区精品| 精品不卡国产一区二区三区| 欧美又色又爽又黄视频| 国产精品,欧美在线| 性色av乱码一区二区三区2| 午夜精品久久久久久毛片777| 好男人在线观看高清免费视频| 日韩欧美免费精品| 九九久久精品国产亚洲av麻豆 | 久久午夜亚洲精品久久| 制服人妻中文乱码| 成年女人毛片免费观看观看9| 久久伊人香网站| 黑人操中国人逼视频| 免费av不卡在线播放| 12—13女人毛片做爰片一| 女人高潮潮喷娇喘18禁视频| 美女黄网站色视频| 观看美女的网站| 性色avwww在线观看| 成人鲁丝片一二三区免费| 脱女人内裤的视频| 小说图片视频综合网站| 婷婷精品国产亚洲av在线| 亚洲精品美女久久久久99蜜臀| 中亚洲国语对白在线视频| 18禁黄网站禁片午夜丰满| xxx96com| 成人国产综合亚洲| 国产乱人视频| 国产成人福利小说| 欧美xxxx黑人xx丫x性爽| 国产成人欧美在线观看| 一级毛片精品| 在线观看66精品国产| 最好的美女福利视频网| 欧美黑人欧美精品刺激| 老鸭窝网址在线观看| 欧美中文日本在线观看视频| 亚洲 欧美一区二区三区| 成年版毛片免费区| 午夜免费成人在线视频| 久久精品影院6| 午夜精品在线福利| 亚洲欧美精品综合久久99| 在线观看舔阴道视频| 日本黄大片高清| 国产不卡一卡二| 精品国产乱码久久久久久男人| 三级毛片av免费| 午夜精品一区二区三区免费看| 亚洲色图av天堂| 久久人人精品亚洲av| 淫秽高清视频在线观看| 黄片大片在线免费观看| 人妻久久中文字幕网| 亚洲av片天天在线观看| 国产极品精品免费视频能看的| 黑人巨大精品欧美一区二区mp4| 亚洲中文字幕日韩| 在线观看一区二区三区| 亚洲av电影在线进入| 两性夫妻黄色片| 国产激情久久老熟女| 亚洲无线观看免费| 两个人的视频大全免费| 国产高清激情床上av| 午夜亚洲福利在线播放| 首页视频小说图片口味搜索| 亚洲午夜理论影院| 日本黄大片高清| 午夜免费观看网址| 最近最新中文字幕大全免费视频| 美女 人体艺术 gogo| 人妻丰满熟妇av一区二区三区| 一区二区三区激情视频| 久久99热这里只有精品18| 亚洲欧美日韩卡通动漫| 亚洲精品456在线播放app | 99精品在免费线老司机午夜| 九九在线视频观看精品| 一区福利在线观看| 亚洲国产精品成人综合色| 欧美丝袜亚洲另类 | 午夜精品在线福利| 久久久久精品国产欧美久久久| 免费无遮挡裸体视频| 久久精品aⅴ一区二区三区四区| 啪啪无遮挡十八禁网站| 日本在线视频免费播放| 白带黄色成豆腐渣| 国产伦精品一区二区三区视频9 | 日韩 欧美 亚洲 中文字幕| 性色av乱码一区二区三区2| 国产精品亚洲av一区麻豆| 熟妇人妻久久中文字幕3abv| 两个人的视频大全免费| 免费高清视频大片| 久9热在线精品视频| 男女那种视频在线观看| 麻豆成人av在线观看| 色噜噜av男人的天堂激情| 国产高清有码在线观看视频| 国产69精品久久久久777片 | 美女高潮喷水抽搐中文字幕| 一本久久中文字幕| 男女那种视频在线观看| 我的老师免费观看完整版| 床上黄色一级片| 久久久国产成人免费| 欧美一级a爱片免费观看看| 国产一级毛片七仙女欲春2| 亚洲av美国av| 99在线视频只有这里精品首页| 欧美最黄视频在线播放免费| 亚洲 国产 在线| 久久精品影院6| 给我免费播放毛片高清在线观看| 高潮久久久久久久久久久不卡| 日本黄大片高清| 变态另类丝袜制服| 国产成人一区二区三区免费视频网站| 亚洲专区字幕在线| 一a级毛片在线观看| 91久久精品国产一区二区成人 | 久久久久久久精品吃奶| svipshipincom国产片| 亚洲欧美精品综合一区二区三区| 国产精品av视频在线免费观看| 国产精品久久视频播放| 国产高清videossex| 亚洲 欧美 日韩 在线 免费| 亚洲精品国产精品久久久不卡| 最新在线观看一区二区三区| 欧美精品啪啪一区二区三区| 在线永久观看黄色视频| 久久久久九九精品影院| 99热精品在线国产| 神马国产精品三级电影在线观看| 性色av乱码一区二区三区2| 亚洲精品456在线播放app | 欧美3d第一页| 麻豆一二三区av精品| 成人国产一区最新在线观看| 久久中文字幕人妻熟女| 国产久久久一区二区三区| 精品一区二区三区视频在线观看免费| 国产一区二区激情短视频| 国产97色在线日韩免费| 手机成人av网站| 国产精品免费一区二区三区在线| 国产美女午夜福利| 国产亚洲精品av在线| 欧美在线黄色| 高清毛片免费观看视频网站| 波多野结衣巨乳人妻| 亚洲成人中文字幕在线播放| 老鸭窝网址在线观看| 91老司机精品| ponron亚洲| 精品免费久久久久久久清纯| www.熟女人妻精品国产| 我的老师免费观看完整版| 久久久久久国产a免费观看| 欧美黄色淫秽网站| 国产精品一区二区精品视频观看| 长腿黑丝高跟| 老司机午夜十八禁免费视频| 免费无遮挡裸体视频| 亚洲熟妇中文字幕五十中出| 成人av在线播放网站| 搡老熟女国产l中国老女人| 美女午夜性视频免费| 香蕉国产在线看| 好看av亚洲va欧美ⅴa在| 国产主播在线观看一区二区| 免费观看的影片在线观看| 亚洲av片天天在线观看| 在线观看一区二区三区| 国产欧美日韩一区二区精品| 欧美日韩国产亚洲二区| 国产麻豆成人av免费视频| 看黄色毛片网站| 精品久久久久久,| 午夜福利在线观看吧| 啦啦啦韩国在线观看视频| 丁香欧美五月| 美女cb高潮喷水在线观看 | 国产私拍福利视频在线观看| 国产美女午夜福利| 国产精品一区二区三区四区免费观看 | 村上凉子中文字幕在线| 18美女黄网站色大片免费观看| 精品国产乱子伦一区二区三区| av中文乱码字幕在线| 色播亚洲综合网| 美女被艹到高潮喷水动态| 搡老岳熟女国产| 毛片女人毛片| 特级一级黄色大片| 色吧在线观看| 欧美3d第一页| 国产99白浆流出| 欧美激情在线99| 国产激情偷乱视频一区二区| 91av网一区二区| 国产精华一区二区三区| 搡老熟女国产l中国老女人| 他把我摸到了高潮在线观看| 热99re8久久精品国产| av天堂中文字幕网| 黄色女人牲交| xxxwww97欧美| 国产亚洲av高清不卡| or卡值多少钱| 级片在线观看| 亚洲美女黄片视频| 久久性视频一级片| 久久精品国产综合久久久| 热99在线观看视频| 亚洲成人久久爱视频| 国产精品98久久久久久宅男小说| 九色成人免费人妻av| 午夜福利成人在线免费观看| 黄色 视频免费看| 两个人视频免费观看高清| 国产精品电影一区二区三区| 美女午夜性视频免费| 午夜激情福利司机影院| 欧美日韩综合久久久久久 | 日本五十路高清| 亚洲aⅴ乱码一区二区在线播放| 久久久精品大字幕| 国产一区在线观看成人免费| 1024手机看黄色片| 国产午夜精品论理片| 岛国视频午夜一区免费看| 狂野欧美激情性xxxx| 身体一侧抽搐| 最近最新中文字幕大全免费视频| 淫妇啪啪啪对白视频| 国产真人三级小视频在线观看| 女警被强在线播放| 在线观看免费视频日本深夜| 国产精品女同一区二区软件 | 日本一本二区三区精品| 91av网一区二区| 久久久国产成人免费| 免费无遮挡裸体视频| 噜噜噜噜噜久久久久久91| 午夜久久久久精精品| 色在线成人网| 精品一区二区三区视频在线 | 国产精品一区二区三区四区免费观看 | 极品教师在线免费播放| www.精华液| 亚洲 国产 在线| 国模一区二区三区四区视频 | 国产av不卡久久| 黄色丝袜av网址大全| 国产男靠女视频免费网站| 禁无遮挡网站| 国内精品一区二区在线观看| 99热只有精品国产| 成人鲁丝片一二三区免费| 我的老师免费观看完整版| 色播亚洲综合网| 欧美乱码精品一区二区三区| 日韩欧美三级三区| 亚洲国产中文字幕在线视频| 久久久久亚洲av毛片大全| svipshipincom国产片| 欧美丝袜亚洲另类 | 精品国产亚洲在线| 免费观看人在逋| 啦啦啦韩国在线观看视频| 久久亚洲精品不卡| 欧美丝袜亚洲另类 | 人人妻人人澡欧美一区二区| 香蕉国产在线看| 婷婷精品国产亚洲av| 日本a在线网址| 国产免费男女视频| 国产一区二区激情短视频| 男女那种视频在线观看| 久久久成人免费电影| 最新在线观看一区二区三区| 亚洲人成电影免费在线| 成年版毛片免费区| 91久久精品国产一区二区成人 | 成人鲁丝片一二三区免费| 一进一出抽搐gif免费好疼| 黄片大片在线免费观看| 亚洲欧美精品综合一区二区三区| 国产伦人伦偷精品视频| 黑人操中国人逼视频| 国产成人福利小说| av黄色大香蕉| 草草在线视频免费看| 欧美成人免费av一区二区三区| 女人高潮潮喷娇喘18禁视频| 99精品久久久久人妻精品| 午夜福利在线观看免费完整高清在 | 亚洲,欧美精品.| 亚洲国产精品久久男人天堂| 午夜福利欧美成人| 在线看三级毛片| 亚洲专区中文字幕在线| 午夜精品在线福利| 国产精品久久久久久久电影 | 国产亚洲av嫩草精品影院| av福利片在线观看| 久久久久久久精品吃奶| 国产熟女xx| 噜噜噜噜噜久久久久久91| 久久久久久久久中文| 日韩三级视频一区二区三区| svipshipincom国产片| 成人三级黄色视频| x7x7x7水蜜桃| 久久精品人妻少妇| 亚洲欧美日韩高清专用| 三级男女做爰猛烈吃奶摸视频| 日本a在线网址| 看黄色毛片网站| 国产午夜精品久久久久久| 高潮久久久久久久久久久不卡| 99精品欧美一区二区三区四区| 一进一出抽搐动态| 老汉色∧v一级毛片| 国产精华一区二区三区| 亚洲欧美精品综合一区二区三区| 黄色视频,在线免费观看| 看黄色毛片网站| 一个人免费在线观看的高清视频| 成人欧美大片| 九九热线精品视视频播放| 99国产精品99久久久久| 麻豆国产97在线/欧美| 观看免费一级毛片| 一a级毛片在线观看| 国产v大片淫在线免费观看| 久久人人精品亚洲av| 国产97色在线日韩免费| av中文乱码字幕在线| 亚洲人成伊人成综合网2020| 日本免费一区二区三区高清不卡| 国产欧美日韩一区二区精品| 99视频精品全部免费 在线 | 成人永久免费在线观看视频| 亚洲无线在线观看| 看片在线看免费视频| 一个人免费在线观看的高清视频| 久久久久免费精品人妻一区二区| 欧美性猛交黑人性爽| 9191精品国产免费久久| 国产一区二区三区在线臀色熟女| 久久久久久久久中文| 一个人免费在线观看的高清视频| 看免费av毛片| 国产av不卡久久| 啦啦啦观看免费观看视频高清| 久久精品国产清高在天天线| 亚洲天堂国产精品一区在线| 久久天堂一区二区三区四区| 国产久久久一区二区三区| 国产伦精品一区二区三区视频9 | 久久久久国内视频| 国产精品一区二区精品视频观看| 夜夜爽天天搞| 国产乱人伦免费视频| 最近最新免费中文字幕在线| 黄色成人免费大全| 免费搜索国产男女视频| h日本视频在线播放| 亚洲aⅴ乱码一区二区在线播放| 亚洲午夜精品一区,二区,三区| 亚洲国产精品成人综合色| 欧美激情久久久久久爽电影| 国产高清有码在线观看视频| 亚洲午夜精品一区,二区,三区| 啪啪无遮挡十八禁网站| 白带黄色成豆腐渣| 这个男人来自地球电影免费观看| 亚洲 欧美 日韩 在线 免费| 久久午夜亚洲精品久久| 日本免费一区二区三区高清不卡| 午夜激情欧美在线| 午夜影院日韩av| 成人三级做爰电影| 男女做爰动态图高潮gif福利片| www.熟女人妻精品国产| 久久久久久久久久黄片| 欧美最黄视频在线播放免费| 欧美日韩中文字幕国产精品一区二区三区| 久久久久免费精品人妻一区二区| 51午夜福利影视在线观看| 欧美不卡视频在线免费观看| 这个男人来自地球电影免费观看| 亚洲成人免费电影在线观看| 欧美成狂野欧美在线观看| 免费av不卡在线播放| 久久久久九九精品影院| 国产一级毛片七仙女欲春2| av女优亚洲男人天堂 | 男人的好看免费观看在线视频| 我的老师免费观看完整版| 老司机午夜十八禁免费视频| 久久久国产欧美日韩av| 午夜成年电影在线免费观看| 欧美黄色片欧美黄色片| 国产欧美日韩精品一区二区| 国产av不卡久久| 亚洲国产欧美网| 精品免费久久久久久久清纯| 国产黄片美女视频| 又大又爽又粗| 国内少妇人妻偷人精品xxx网站 | 精品人妻1区二区| 99久国产av精品|