• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Flow-Based Authentication Handover Mechanism for Multi-Domain SDN Mobility Environment

    2017-04-09 05:52:57KeDingXiuleiWangGuominZhangZhenWangMingChen
    China Communications 2017年9期

    Ke Ding, Xiulei Wang*, Guomin Zhang, Zhen Wang, Ming Chen

    PLA University of Science & Technology, Nanjing 210007, China

    * The corresponding author, email: xiuleiwang1988@126.com

    I. INTRODUCTION

    Authentication, which is in charge of proving the authenticity of mobility entity to some central authority, is an important part of security handover mechanism. The long handover delay and high computation cost are two important issues to be solved in current authentication handover mechanisms [1]. In current mechanisms, an entity need to re-authenticate after the handover, which will inevitably disrupt the communication process. This will degrade the performance of the applications.Therefore, how to design a secure and efficient handover authentication mechanism in multi-domain mobile network is still a challenging task [2] [3] [4] [5], which mainly contains two parts.

    Firstly, in order to keep the communication undisrupted, the handover delay must be short.For instance, to reduce the impact of the bursting packet-loss caused by handover, the related agencies of IEEE have proposed a 50-ms limit on handover time, in which the authentication module should ideally take no more than 20ms. However, most of existing handover authentication protocols incur high communication and computation costs [1]. Secondly,security and privacy are serious concerns for the authentication process. In contrast, all existing handover authentication protocols are subjected to many security attacks. In most of the current handover authentication schemes,it is commonly assumed that APs are trustworthy and would keep users’ privacy-related information confidential. However, since such information is extremely sensitive and coveted by many companies, which may abuse privacy rules for profits, such assumptions may not be valid. According to the analysis above, most of existing handover authentication protocols fail to provide appropriate security and efficient guarantees.

    The emergence of Software-Defined Network (SDN) [21] [22] technique makes it possible to solve these two issues of the handover authentication in a new perspective. Literature[3] and [4] have investigated applying SDN in the handover scheme and the authentication mechanisms in a single SDN domain. Experimental results in literature [3] [4] and [23]have proven that SDN can greatly improve the efficiency and security in a single control domain. However, under multi-domain SDN environments, the authentication handover mechanisms are still lack of efficiency.

    In this paper, an authentication handover mechanism under multi-SDN domain (AHMMD) is introduced. The key point of AHMMD is that the controller can actively transferred the identity information of the mobile entity to neighbor controllers, which can noticeably reduce the delay while reducing the other costs.The handover protocols and algorithms are designed to support AHMMD mechanism and a prototype system is implemented.

    The remainder of this paper is organized as follows. The basic idea and modeling of AHMMD are given in section 2. Section 3 describes the handover protocol of AHMMD and section 4 gives the key algorithm of the handover time prediction. In section 5, the performance is evaluated. Finally, the conclusions are provided in section 6.

    In this paper, an authentication handover process for multi-domain SDN environment is presented and analyzed. Based on the programmable SDN wireless network architecture, an efficient secure SDN multi-domain authentication handover mechanism AHMMD is proposed.

    II. THE DESIGN OF AHMMD MECHANISM

    2.1 The basic idea of AHMMD

    According to the communication scenario of multi-domain SDN networks described in [6][7] [8], the communication process of AHMMD includes 4 phases.

    1. Controller Authentication Phase

    When a SDN network joins the Internet, the controller of the domain must immediately authenticate with the controllers of the neighbor SDN networks.

    2. Mobile Host Authentication Phase

    When a mobile host communicates with other hosts in a network, it should first associate and authenticate itself with the controller (also named as home controller) by the host-controller authentication protocol. Once they have authenticated with each other, the home controller will allocate the related communication resources for the host. At the same time, the home controller will dispatch the authentication and flow attribute information of the mobile host to the neighbor controllers through the secure communication channel established in the controller authentication phase.

    3. Inter-domain Routing Phase

    When a mobile host enters a visited domain, the visited controller does not need to authenticate the host again since the host’s home controller has already dispatched the identity and flow information to the visited controller in the host authentication phase.Therefore, the visited controller can directly use this information to establish the communication path with the host.

    4. Revocation Phase

    When a mobile host wants to terminate the communication, the current associated controller will revoke its related resources and distribute the revocation announce message to the neighbor domains, which indicate the neighbor controller to remove the mobile host authentication information dispatched before.

    In AHMMD, any flow will only be authenticated once in its initiation stage, and in the subsequent roaming process, the authentication information will be dispatched among the controllers. The neighbor controllers will complete the flow authentication in advance according to the dispatched information,which ensures the parallel execution of the authentication and movement. This is completely different from the current mobile authentication protocol which adopted the “mobile and re-authentication” style and can greatly reduce the impact of the authentication phases in the ongoing communication.

    2.2 AHMMD model

    In order to facilitate the analysis, the model of the AHMMD is described as follows.

    1. Assuming that the mobile network MN is composed of n controller domains D_Set ={Di| i = 1, 2… n}, and each control domain Diconsists of a controller Ciand a set of wireless OpenFlow APs controlled by Ci. When Dijoins the MN, the controller Ciwill be authenticated with the neighbor controllers of the MN through the authentication protocol Ctrl-Authen which is designed based on the public key cryptosystem, and the controller set C_Set= {Ci| i = 1, 2… n}.

    2. When the mobile host MHiaccesses MN through domain D0, it will be associated with AP0of D0. In the association phase, the home controller C0will create a unique BSSIDiand install LVAPion AP0for MHi[9]. After the association, MHiwill be authenticated with C0through the authentication protocol MNAuthen [10] [11]. C0will assign a unique IP address IPiof home domain for MHi. The identity, IP address and MAC address of the MHiwill be bound to the BSSIDi. Once the user initiates a connection to the destination address IPd, C0will authenticate the flow by the flow authentication protocol. At the same time, C0will determine whether to authorize the service to the user according to the access control policies configured by the network administrator. If the authentication process is passed, C0will establish a communication path Path0(IPi, IPd) and store the Secure Context Information SCIiwhich includes BSSIDi, LVAPi, MACi, IPi, AP0and public key information.

    Fig. 1 Working scene of MHi under AHMMD

    3. The controller C0will proactively push the message which includes SCIi[6] and Flowito the controller Ciof C_Set0according to the security protocol AuthInfo which is designed based on the symmetric cryptographic mechanism. The controller Ciwill receive the message and establish the communication path for Flowiin advance.

    4. When MHiis roaming to a neighbor domain Di, as the controller Cihas already pre-authenticated the authenticity of MHi, Ciwill compute new communication Pathi(IPi,IPd) for the flow. Once the migration of LVAPiis complete, the ongoing flow will not be disrupted.

    5. The MHiwill repeat steps 2~4 when it is roaming between adjacent domains. If flowiis terminated in the domain Ds, MHiwill send the revocation message to current service controller Csand the resource allocated to MHiwill be revoked by the Cs. At the same time,Cswill dispatch the revocation message to all neighbor domain controllers to inform them to revoke all resources which are pre-allocated to MHi.

    2.3 Example of model

    The working scenes of mobile host MHiunder the mechanism of AHMMD is shown in figure 1.

    1. When domains D0, D1, D2, …, Dnconsist of a mobile network MN, mutual authentication starts among each domain controller corresponding C0, C1, C2, …, C6through the protocol based on PKI, to form a reliable assembly of controller C Set, which is shown as ellipse coverage in the control surface in figure 1.

    2. When the mobile host MHiis connected to the network and has been sensed by controller C0of D0, mutual authentication starts between C0and MHiunder the protocol of MNAuthen. This process is on the basis of PKI which will cost 50ms or more. Once the authentication of network access completes,C0is interrelated with MHiand the communication is set up. While the continuous roaming destination of MHimust be one of the neighbors of D0, C0will initiatively send a notification message encrypted with symmetric key, carrying the information of security background of MHito the assemblage of neighbors via AuthInfo protocol.

    3. After the neighbor controller C5receives the authentication information SCIi,it will calculate the communication path for MHiin advance.

    4. When the MHiroams to D5and is connected to the wireless devices, communication can be at work directly without any problems of communication interrupted. At the same time, C5continues to announce its authentication information to its neighbor controller.

    5. When MHiwants to terminate the communication, it will send a revocation message to the associated controller via AuthInfo protocol. C5will take back the source allocated to it and forward the revocation message to neighbor controller through AuthInfo protocol to clear the authentication information related to MHi.

    III. THE DESIGN OF KEY PROTOCOL

    3.1 CtrlAuthen protocol

    The two adjacent controllers of the MN are authenticated according to the protocol Ctrl-Authen and the shared symmetric key is negotiated at the same time. The authentication process of two adjacent controllers Ciand Cjis shown in figure 2. The Authority Authentication Server (AAS) is responsible for the registration of the network entities and authorization of the services.

    Initialization: the entities Ciand Cjshould register their authentication informationandto AAS. The AAS will create the global unique identityand public/private key file for C and C.

    ijAll of the information will be stored in AAS.The public key, private key and identity will be distributed to each entity. For a new controller Ci, the AAS will send the identity and public key certificate file of the neighbor control Cjto the Ci.

    The process of CtrlAuthen protocol includes 4 steps.

    1. Cisends the authentication request to the neighbor controller Cj. Firstly, Ciwill sign theand noncewith its private keyThen the signature andwill be encrypted by the public key Cjand send to Cj.The format of the message is shown in Equation.1.

    2. After receiving the message from Ci, Cjwill decrypt the message by its private key and retrieveCjresearches the public key certificate of Cibased onand decrypts the message {hashwill recomputed the hash value based on the pre-distributed authentication message and. The new value will be compared with hashIf matched, Cjwill send the message which is shown in Equation 2 to Ci.

    Fig. 2 The ctrlAuthen protocol

    3. Cireceives the response message from Cjand retrieves the signature information by its private key. Cirecalculates the hash value byandIf the new hash value is matched with the value in response message,Cigenerates the random numberof symmetric key and encrypts the message with the public key certificate of Cj. The format of the message is shown in Equation 3.

    4. Cjdecrypts the session key negotiation message by its own private key and recalculates the signature as the process shown in step 3. If Cjis sure that the message is true, Cjgenerates the session key AK byand sends the message shown in Equation 4 to Ci.

    3.2 AuthInfo protocol

    The AuthInfo protocol is used to realize the authentication information distribution between the current controller and the neighbor controller. Based on the negotiation symmetric key of CtrlAuthen protocol, the working flow of the AuthInfo protocol is shown in figure 3.1. Cisigns the security authentication message and nonce based on the symmetric key which is negotiated with the neighborhood controller Cj. Then Cjencrypts the signature based on the private key of Ci. The format of message is shown in equation 5.

    Fig. 3 The authinfo protocol

    2. Cjdecrypts the message based on the public key certificates and sends response to Cias is shown in equation 6.

    IV. CORRECTNESS PROOF

    David Clark points out that to establish credible relationship among network entities, then transform the credible relationship to credible links, and finally form a credible cyberspace[16], a perfect trust mechanism should be involved into the security network system. Intuitively, the AHMMD mechanism we design has established credible authentication relationship both between entity and controller and between controllers. Meanwhile, the information encryption technology based on cryptography ensures a closed credible space during mobile.However the safety of such credible chains needs to be proved in theory. In this respect,we prove the safety of AHMMD based on methods of logical reasoning identification provided by the literature [17] in this chapter.

    4.1 Basic predicates and definition of derivation rules

    Supposing that a, b, s are the entity elements in collection of system entity; Kab, Kas, Kbsindividually sign the symmetric key shared by entities, Ka, Kb, Ksare the public keys of entity a, b, s respectively,are private keys corresponded with the public keys, and Na, Nb, Ncare specific description statements.It is also supposed that P, Q, R are entity variables, X, Y are variables of statement, while K is a variable of key. The symbol ‘,’ shows the link relationship between statements. The connection and communication among entities is expressed by the link among a variety of description statements.

    4.1.1 Basic predicates

    To show the relationship of identification of system entities, the literature [18] abstracts and defines predicates shown in table 1.

    4.1.2 Derivation rules

    Rule1:Authentic statements. This rule is used for deriving the authenticity of the grouping contents.

    For the shared key, the derivation rules is shown in formula (7).

    This derivation rule denotes that if P believes the symmetric key K shared with Q, and it receives messages encrypted by K which is sent by Q, P will believe that X is actually sent by Q.

    As to the encryption mechanism of asymmetric key and password, two derivations are listed as formula (8), (9).

    Rule2: No repeated authentication. This rule is mainly used to detect whether the message is up-to-date, meanwhile, the sender confides to this message still.

    Formula (10) indicates that P has reasons to believe that Q trusts X if P believes X to be new and trusts that X has been sent by Q at the same time.

    Rule3:Rule of jurisdiction. If P believes that Q has the jurisdiction over X, P will trust any X which is ruled by Q.

    Rule4:Rule of whole - part. Under the premise of knowing the key, an entity will see the whole parts of the sentence if it notices some parts.

    Rule5:Rule of part – whole. The context of a sentence is regarded as up-to-date if an entity confirms a part of it to be fresh.

    Rule6:Rule of Up-to-date-Solvable.

    4.2 Proof of safety in AHMMD

    In view of above-mentioned definition of predicate and rules of inference, this chapter will prove the safety of AHMMD.

    According to the description of entity iden-tification and flow identification process, the construction of this procedure is based on the hypotheses portrayed by the formula (15).

    In the formula, eisigns any entity that needs to be identified in controller domainAAS is authentication server; KAASis the public key of authentication server;is the public key of entityare respectively unrepeatable figures of homologous entity. It can be derivate as follows based on the communication process of flows and the hypothesis in formula (15) shown in the bottom at this page:

    Formula (16), (17) reveal that the phase of entity authentication guarantees the authentication of the controller to the entity identity,which means

    During the phase of key negotiation between entity eiand Ci, we can obtain formula(13), (14) shown in the top at next page:

    The inference process of formulas (16),(19) certifies: authentication of identification between controller and access entity can be achieved. At the same time, on the basis of identification, the next step, negotiation on shared key which authentication of flow requires, can be fulfilled. This provides the basis of further flow authentication.

    Figure 2 indicates the authentication process among controllers. The design of CtrlAuthen protocol is based on hypothesis shown in formula (20).

    We can arrive at the conclusion as formula(21) following relevant rules of derivation.

    Without loss of generality, the transmission process of authentication messages portrayed in figure 3 can be abstracted as shown in figure 4.

    In figure 4, A, B represent the authentication entity and its associated controller respectively. The communication process is based on the hypothesis indicated in formula (22).

    On the basis of basic assumptions and communication process of protocol, we can arrive at the conclusion of formula (23):

    The transmission and authentication of mobile terminals can be accomplished based on shared symmetric key negotiated among entities. By implementing the 3 communication protocols mentioned above in the system, the secure closed-loop space against authentication information can be established.

    Fig. 4 The authentication of flow

    V. HANDOVER SCHEME DESIGN

    5.1 Design of handover scheme of flow authentication

    To implement the efficient and safe handover of authentication communication among controllers in different domains, this section designs a handover scheme of flow authentication on the basis of inter-domain controller’s cooperative mechanism, which is shown in figure 5. As to arbitrary security management domain Diand Dj,their network management control logic is accomplished by controllers Ciand Cjof the domain. For the authentication mechanism, it is divided into intra-domain authentication mechanism and inter-domain authentication mechanism logically. The south interface of underlying controllers takes charge of handling the flow incidents, topology discovery, information statistics and some other fundamental functions. Authentication information database is responsible for storing entities and some other important messages relevant to flow authentication (examples: entity identifiers, MAC/IP address of mobile terminals, public key certificate of entities, Flow identification information, etc.). Intra-domain authentication applications are in charge of making initial authentication of entity and communication flow into realization.

    1. Handover of intra-domain authentication

    The intra-domain authentication mechanism based on flow authentication protocol can realize the initial authentication of entity communication flows. It will store current authentication entity and messages relevant to communication flow into database of authentication information. To support seamless switching behavior, wireless AP supporting OpenFlow Protocol designed in literature [9][19] [20] is applied in network infrastructure.In a single SDN domain, controllers can collect statistics of AP traffic load information and signal strength information of arbitrary mobile terminal MHiRSSI, which can be received in the range of intra-domain controlled AP communication. By running seamless handover algorithm, not only LVAP (migration among different AP), but also the realization of authentication handover by security authentication of context and flow information in corresponding terminals can both be implemented.

    Fig. 5 Frame of inter-domain authentication

    2. Handover of inter-domain authentication

    As is indicated in figure 5, inter-domain authentication mechanism is set up on the mechanism of controller collaboration. Inheriting the communication interface of controller collaboration module, it synergistically worked in the form of application agent program with modules relevant to the handover of authentication information. The main function modules of handover of authentication mechanism implemented in this article involve: discovery agent of domain controller, reachability agent,Push-Receive agent of authentication information, Publish-Subscribe System agent and the interface CCoP in charge of South-West Controller CoOperation Protocol. The fundamental functions are described as follows:

    ? The interface CCoP provides fundamental interface of South-West communication to controller side, which requires all application involving information exchange among controllers should call the communication function of this interface. The basic format of information handover among controllers has been defined in CCoP, on which inter-domain authentication protocol is built.Figure 6 portraits the basic format of CCoP,

    ? Neighbor controller discovers the agent.This agent mainly takes charge of providing realization mechanism for each domain to establish covered network. At present,the discovery mechanism in the field of controller is mainly consisted of two modes--passive and initiative. Under the mode of passive, every SDN domain of access network must be registered in AAS. AAS provides the controller with the assembly of neighbor controllers which may appear in current network, based on information it provided. Under the mode of initiative,controller discovers assemblage of neighbor controllers actively by running M-LLDP

    Protocol and build controller covered net.

    ? Reachability agent. It ensures the active of current neighbor controllers by sending Hello message to them periodically.

    ? Push-Receive module of inter-domain authentication information transfers authentication information of mobile terminals and communication flows among various control domains on the basis of seamless handover algorithm. The Push-Receive of inter-domain authentication information is an open problem. Any mechanism that can enhance the efficiency of mobile terminal communication and ensure the usage of network resource can perform verification by deployment.

    The module Pub_Sub is responsible for sending measurement and statistical instructions to the neighborhood controller to obtain key decision making information that authentication transmission algorithm requires.Provisional Interconnect device statistics is a primary parameter to seamless authentication handover, however, the current controller of mobile terminal cannot add up the information of device and flow. So command of related information statistics needs to be sent to neighbor by Pub_Sub Module. Simultaneously,neighbor controllers take charge of collecting statistics information of device and wireless signals of mobile terminals and returning to current controllers.

    Figure 6 defines the basic format of CCoP protocol.

    The type of protocol, which represents the communication protocol packed in Data Body is shown in table 2.

    Fig. 6 The format of CCoP protocol

    Table II The meaning of CCoP Type

    Fig. 7 the AR prediction model

    Here, we make a few modifications to M-LLDP, which makes it can not only discover neighbor relationships of multi-domain,but also return related information of neighbor switching devices. This makes sense to current controllers to discover the assemblage of neighbor switching devices and learn the mapping relationship between the current neighbor switching devices and the controller of domain it belongs to.

    5.2 The authentication handover algorithm

    Along with the security environment for authentication information delivering, fast authentication information distribution is the key problem to ensure the performance of the communication. Based on the neighbor controller set C_Sets{C1, C2, C3… Cn} which is discovered by the current controller Csbased on M-LLDP [12], a fast authentication handover algorithm AHBTTP based on best trigger time prediction is proposed in this section.

    In order to minimize the packet loss rate and maximum switch success ratio, the wireless handover problem can be formalized as formula (24).

    Ploss(t) denotes the packet loss ratio and Phf(t) denotes the handover failure probability when the host executes the handover operation at time t. This problem is analyzed in [13] and an optimization condition is given as formula.(25).

    We define the signal sensitivity as the minimum received signal strength which can be demodulated by the end system. Theandrepresents the signal sensitivity of the APsand APprespectively. The toptrepresents the best handover time. Thdenotes the handover delay of the end system. RSSIs(topt+Th) and RSSIp(topt+ Th) denote the prediction signal strength which is received by APsand APpat topt+ Th. In this paper, the handover time of AHMMD is mainly composed of handover and authentication delivery time, which can be obtained by measurement.

    For the current service controller Csof mobile host MHi, the handover AHBTTP algorithm is described in table 3. The set AP_Sets(AP1, AP2, AP3…APn) includes all the APs which is controlled by Csor directly connected with the current domain.

    The Prediction step K is discussed in the paper [13]. If the handover predicting value isand the sampling cycle is Tsamp, the value of K can be calculated by formula (27).

    The AR [14] prediction model is given as figure 7 and the prediction value is shown as formula (29).

    Wopt= {ωopt(0), ωopt(1)… ωopt(p-1)} is the optimum weight coefficient vector of the predictor when the least mean square criterion is adopted.

    VI. EVALUATION

    In order to evaluate the performance of the system, a prototype of the AHMMD is built which is shown in figure 8.

    As shown in figure 8, the prototype is composed of two SDN management domain A, B and core IP networks. Each SDN domain is composed of an OpenFlow switch, an Odin protocol [9] enabled OpenFlow wireless AP and the corresponding controller CAand CB.The AHMMD handover management functions are implemented in the typical network operation system Floodlight [15]. The network entities including controllers, mobile hosts must register on the authority authentication server AAS and AAS will distribute the authentication information to all controllers. The server which locates in the core network runs the typical applications such as Web, E-mail,FTP and Iperf. The CtrlAuthen and AuthInfo protocol is implemented based on the APIs of OpenSSL. All the computers in the prototypes are installed with Intel Core 2 Quad 2.4 GHZ CPU, 2G RAM and Ubuntu 14.04.

    Experiments 1: Communication Delay of CtrlAuthen Protocol

    The controller CAand CBmust register in AAS separately. The AAS will generate the public/private key file for them and distributes all the files to every registered controller. In order to establish a security overlay control network, CAand CBwill be authenticated through the CtrlAuthen protocol. Now the OpenSSL only has implemented the RSA public key algorithm and the key lengths of RSA are 1024 and 2048 bits. In order to record the authentication, we modified the CtrlAuthen protocol on CA. We measured the delay of the CtrlAuthen protocol when the public key lengths are 1024 and 2048 bits respectively.The measurement was repeated 30 times and the results are shown in figure 9. Suppose that the RSA1024and RSA2048denote the delay of different public key length.

    It can be seen from the figure 9 that along with the increase of the length of the public key, the controller authentication time also increases. The delays are 132.15ms for the situation of RSA2048and 81.68ms for RSA1024.

    Experiment 2: Communication Delay of AuthInfo Protocol

    Based on the experiment 1, we measuredthe communication delay of AuthInfo protocol. There are 2 classical symmetric key encrypt/decrypt algorithm 3DES and AES in the OpenSSL. The key length of 3DES is 192bits and the key length of AES includes 128, 192 and 256bits. We first implemented the 3DES algorithm in AuthInfo and measured the delay of AuthInfo under different message number:1, 10, 100 and 1000. Suppose that the length of the message is 100K bytes. The results are shown in figure 10.

    Table III The authentication handover algorithm based on the best trigger time

    Fig. 8 The prototype of AHMMD

    Fig. 9 The delay of CtrlAuthen protocol under the public length of 1024 and 2048 bits

    From figure 10 we can see that the delay of AuthInfo protocol is linearly related to the number of message transmitted. Generally, the amount of the data transmitted between different controllers is less than 1M bytes and the number of the message is less than 10. Figure 10 shows that the delay of AuthInfo is less than 16.5ms under the 3DES algorithm, which meets the design requirements.

    In order to evaluate the impact of different symmetric encrypt algorithm to the delay of AuthInfo, we implemented the AuthInfo protocol based on 3DE and AES. The length of AES encrypt key is implemented as 128 bits,192 bits and 256 bits. The amount of each message is set to be 1M bytes. The number of the messages transmitted is set to be 10. The measurement results are shown in figure 11.

    Fig. 10 The delay of AuthInfo based on 3DES algorithm for different number of message

    Fig. 11 The delay of AuthInfo under different length of symmetric keys

    Fig. 12 The delay of AHMMD compared with EAP

    It can be seen from the figure 11 that the delay of 3DES is longer than AES. At the same time, we can see that the average processing delay of AuthInfo can be reduced with the increase of the length of the key by comparing the different length of AES key. In general, all the delay of the classical symmetric encryption algorithm is less than 20ms, which can meet the practical application requirements.

    Conclusions:From the experiment 1 and experiment 2, we can see that the delay of CtrlAuthen and AuthInfo protocol based on the existing OpenSSL APIs can meet the practical application requirements of the existing system. Under the different length of public key,the maximum delay of the CtrlAuthen is less than 150ms. Under the general controller data traffic, the delay of the AuthenInfo based on different length of symmetric key is less than 20ms, which meets the wireless handover delay requirement.

    Experiment 3: The Communication Efficiency of Mobile Host under AHMMD Handover Algorithm

    We compared the handover efficient of AHMMD with current mechanisms. Based on the prototype of figure 8, the location of OFAPAand OFAPBare adjusted in order to make the wireless signal coverage area of OFAPAand OFAPBoverlap. The wirelesses signal strength of mobile host MH received by the APs is periodically measured on the controller and the handover algorithm which runs on the controller monitors the change of the RSSI signal.The Ping and Iperf application are running on the mobile host and communicating with the server which runs on the core networks. The mobile host MH completes the identity and flow authentication on its home controller and moves from OFAPAto OFAPBaccording to the predetermined trajectory. The controller runs the authentication handover applications to handle the handover of MH.

    The mobile host first moves from OFAPAto OFAPBand then goes back. Based on the measurement result of MH, the delay and throughout of AHMMD are compared with traditional authentication mechanism EAP.

    From figure 8 we can see that, in the traditional wireless handover mechanism, MH needs to re-discover and re-associate with AP. In this experiment, this process takes the mean value of 3 seconds. Based on the handover mechanism, the traditional authentication mechanism EAP further increases the delay. By measuring the EAP based on public key (the length of the public key is 1024),the mean value of the delay is about 100ms.Based on the measurement results of figure 12, it is found that in the case of no authentication handover mechanism running, there are two burst of the packet round-trip delay (RTT)when the handover occurs. The delay is about 3.4s and 2.9s, which is larger than the normal RTT.

    Fig. 13 The throughput of AHMMD compared with EAP

    As the delay of authentication and handover migration is 1s, the handover step, prediction threshold and signal sensitive degree of AHMMD are set to be 10, 0.5 and -70dB separately.Through the measurement results of figure 12, we can see that, as the CAdistributes the authentication information and finishes the migration of the LVAPMHof MH in advance, the RTT of packet has almost no increase.

    In addition to the measurement of communication delay, we also measured the throughput of MH. The results are shown in figure 13.From the results, we can see that the communication process will be interrupted and the throughput will become 0 when the handover occurs. After the re-association, the communication will be resumed. In the case of the traditional EAP authentication mechanism, in addition to the handover process, the authentication further increases the handover delay of host. In the case of AHMMD, the throughput of the host is almost not affected by any of the handover process.

    Conclusions:Through the measurement result of AHMMD, it can be seen that the handover mechanism based on prediction and pre-authentication can significantly reduce the impact of handover to the performance of communication, which also improves the security of the terminal seamless mobility and communication.

    VII. CONCLUSION

    In this paper, an authentication handover process for multi-domain SDN environment is presented and analyzed. The general problem of the efficiency and security is illustrated.Based on the programmable SDN wireless network architecture, an efficient secure SDN multi-domain authentication handover mechanism AHMMD is proposed. The general communication process of multi-domain SDN is described and the CtrlAuthen, MNAuthen and AuthInfo protocols are designed. Based on the cooperation communication APIs of the distributed multi-domain control plan, the CtrlAuthen and AuthInfo is implemented. In order to improve the handover efficiency, a SDN multi-domain authentication handover algorithm AHMMD is designed based on the optimal handover trigger time prediction,which ensures the authentication handover and will not affect the communication of host. The experiment results verify the effectiveness and feasibility of AHMMD.

    ACKNOWLEDGEMENT

    This research was supported in part by the National Natural Science Foundation of China under Grant No. 61402521, Jiangsu Province Natural Science Foundation of China under Grant No. BK20140068.

    [1] D. He, C. Chen, S. Chan, et al, “Secure and Efficient Handover Authentication Based on Bilinear pairing Functions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, 2012,pp. 48-53.

    [2] S. Kukliński, Y. Li, KT. Dinh, “Handover Management in SDN-based Mobile Networks,” Proc.GLOBECOM, 2015, pp.194-200.

    [3] M. Avula, SG. Lee, SM. Yoo, “Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks,” KSII Transactions on Internet and Information System, vol. 8, no. 6, 2014, pp.1982-2004.

    [4] D. He, S. Chan, M. Guizani, “Handover Authentication for Mobile Networks: Security and Effi-ciency Aspects,” IEEE Network, 2015, vol. 29, no.3, 2015, pp. 96-103.

    [5] CC. Chang, CY. Lee, YC. Chiu, “Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks,” Computer Communications, vol. 32, no. 4, 2009, pp.611-618.

    [6] X. Duan, X. Wang, “Authentication Handover and Privacy Protection in 5G HetNets using Software-defined Networking,” IEEE Communications Magazine, Vol. 53, No. 4, 2015. pp. 28-35.

    [7] L. Yuhong, W. Haimeng, L. Ming, et al, “Software Defined Networking for Distributed Mobility Management,” Proc. GLOBECOM Workshops,2014, pp. 885-889.

    [8] S. Kuklinski, Y. Li, KT. Dinh, “Handover Management in SDN-based Mobile Networks,” Proc.GLOBECOM Workshops, 2015, pp. 194-200.

    [9] J. Schulz-Zander, L. Suresh, N. Sarrar, et al, “Programmatic Orchestration of WifiNetworks,”Proc. Usenix Conference on Usenix Technical Conference, 2014, pp.347-358.

    [10] DMF. Mattos, LHG. Ferraz. “AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking,” Annals of Telecommunications, vol.71, no. 11-12, 2016, pp. 1-9.

    [11] XL. Wang, GM. Zhang, C. Hu, et al, “SDFAC:Software Defined Flow Access Control Mechanism,” Journal of Communications, vol. 36, no.Z1, 2015, pp. 188-196.

    [12] K. Pheminus, M. Bouet, J. Leguay, “DISCO: Distributed Multi-domain SDN Controllers,” Proc.Network Operations and Management Symposium, 2014, pp. 1-2.

    [13] J. Yan, L. Zhao, J. Li, “A Prediction-Based Handover Trigger Time Selection Strategy in Varying Network Overlapping Environment,” Proc. Vehicular Technology Conference, 2011, pp. 1-5.

    [14] JG. Proakis, DG. Manolak, “Digital Signal Processing: Principles, Algorithms and Applications,” Diabetes Care, vol. 25, no. 10, 2002, pp.1802-1806.

    [15] Floodlight. Http: //www.projectfloodlight.org/floodlight/.

    [16] YH. Li, HM. Wang, M Liu, et al, “Software Defined Networking for Distributed Mobility Management,” Proc. Software defined networking for distributed mobility management, 2013, pp.885-889.

    [17] M. Burrows, M. Abadi, R. Needham, “A Logic of Authentication,” ACM SIGOPS Operating Systems Review, vol. 23, no. 5, 1989, pp. 1-13.

    [18] V. Jacobson, DK. Smetters, JD. Thornton, et al,“Networking Named Content,” Proc. International Conference on Emerging Networking Experiments and Technologies, 2009, pp. 1-12.

    [19] AK. Rangisetti, BH. Bhopabhai, BP. Kumar, et al. “Load-aware Hand-offs in Software Defined Wireless LANs,” Proc. International Conference on Wireless and Mobile Computing, Networking and Communications, 2014, pp. 685-690.

    [20] WS. Kim, SH. Chung, CW. Ahn, et al. “Seamless Handover and Performance Anomaly Reduction Schemes Based on OpenFlow Access Point,”Proc. International Conference on Advanced Information Networking and Applications Workshop, 2014, pp. 316-321.

    [21] N. Gude, T. Koponen, J. Pettit, et al, “NOX: towards an operating system for networks,” Acm Sigcomm Computer Communication Review, vol.38, no.3, 2008, no. 105-110.

    [22] D. Kreutz, FMV. Ramos, P. Esteves-Verissimo, et al, “Software-Defined Networking: A Comprehensive Survey,” Proceedings of the IEEE, vol.103, no. 1, 2014, pp. 10-13.

    [23] W. Braun, M. Menth, “Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices,” Future Internet, vol. 6, no. 2, 2014, pp. 302-336.

    深夜精品福利| 亚洲精品国产av蜜桃| 亚洲第一青青草原| 国产熟女午夜一区二区三区| 国产成+人综合+亚洲专区| 18禁裸乳无遮挡动漫免费视频| 视频在线观看一区二区三区| 亚洲成av片中文字幕在线观看| 亚洲成人免费电影在线观看| 亚洲av成人一区二区三| 免费av中文字幕在线| 中亚洲国语对白在线视频| 在线永久观看黄色视频| 麻豆乱淫一区二区| 精品少妇一区二区三区视频日本电影| 老熟妇乱子伦视频在线观看 | 久久人人97超碰香蕉20202| 国产免费一区二区三区四区乱码| 美女扒开内裤让男人捅视频| 国产一区二区三区av在线| 亚洲国产看品久久| 国产又爽黄色视频| 国产在线视频一区二区| 18禁国产床啪视频网站| 亚洲va日本ⅴa欧美va伊人久久 | 男女下面插进去视频免费观看| 1024视频免费在线观看| 在线观看免费午夜福利视频| e午夜精品久久久久久久| 捣出白浆h1v1| 好男人电影高清在线观看| 国产日韩欧美视频二区| 午夜两性在线视频| 99国产精品一区二区三区| 日韩免费高清中文字幕av| 午夜激情av网站| 丝袜在线中文字幕| 日韩欧美一区视频在线观看| 午夜免费观看性视频| 三上悠亚av全集在线观看| 天堂8中文在线网| 日韩制服骚丝袜av| 汤姆久久久久久久影院中文字幕| 亚洲人成电影观看| www.av在线官网国产| 久久久久国内视频| 久久久久久亚洲精品国产蜜桃av| 久久性视频一级片| 人妻一区二区av| 久久狼人影院| 每晚都被弄得嗷嗷叫到高潮| 国产成人欧美| 日韩熟女老妇一区二区性免费视频| 别揉我奶头~嗯~啊~动态视频 | 国产亚洲一区二区精品| 亚洲专区字幕在线| 久久青草综合色| 2018国产大陆天天弄谢| 欧美少妇被猛烈插入视频| xxxhd国产人妻xxx| 精品人妻1区二区| 亚洲性夜色夜夜综合| 免费高清在线观看视频在线观看| 亚洲一区二区三区欧美精品| 高清视频免费观看一区二区| 12—13女人毛片做爰片一| 黑人巨大精品欧美一区二区mp4| 成年人午夜在线观看视频| 韩国精品一区二区三区| 51午夜福利影视在线观看| 精品久久蜜臀av无| 亚洲欧美日韩另类电影网站| 国产精品久久久人人做人人爽| av有码第一页| 久久女婷五月综合色啪小说| 国产日韩欧美在线精品| 国产精品一二三区在线看| 成年人午夜在线观看视频| 欧美性长视频在线观看| 日韩一区二区三区影片| 久久久久精品人妻al黑| 日本wwww免费看| 色播在线永久视频| 极品少妇高潮喷水抽搐| 男女免费视频国产| 久久国产精品人妻蜜桃| 亚洲av成人不卡在线观看播放网 | 天天躁日日躁夜夜躁夜夜| 国产野战对白在线观看| 久久精品国产亚洲av高清一级| 婷婷丁香在线五月| 亚洲三区欧美一区| 亚洲久久久国产精品| 国产熟女午夜一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 丝袜喷水一区| 色精品久久人妻99蜜桃| 日本av手机在线免费观看| 天堂俺去俺来也www色官网| 99精品欧美一区二区三区四区| 69精品国产乱码久久久| 亚洲欧美清纯卡通| 蜜桃在线观看..| 久久九九热精品免费| 人人妻人人添人人爽欧美一区卜| 在线亚洲精品国产二区图片欧美| 国产亚洲精品久久久久5区| 男人舔女人的私密视频| 性色av乱码一区二区三区2| 欧美一级毛片孕妇| 国产亚洲一区二区精品| 亚洲精品久久成人aⅴ小说| 免费高清在线观看日韩| 精品人妻在线不人妻| 亚洲 国产 在线| 在线 av 中文字幕| 真人做人爱边吃奶动态| 啦啦啦视频在线资源免费观看| 亚洲五月色婷婷综合| 久久中文看片网| 波多野结衣一区麻豆| 亚洲中文日韩欧美视频| 考比视频在线观看| 人人妻人人澡人人看| 美国免费a级毛片| 日韩视频在线欧美| 一区在线观看完整版| 丁香六月欧美| 在线观看免费视频网站a站| 最新的欧美精品一区二区| 50天的宝宝边吃奶边哭怎么回事| 国产亚洲av片在线观看秒播厂| 最近最新中文字幕大全免费视频| 欧美久久黑人一区二区| 女人高潮潮喷娇喘18禁视频| 欧美精品人与动牲交sv欧美| 91精品国产国语对白视频| videos熟女内射| 69av精品久久久久久 | 老司机福利观看| 高清av免费在线| 国产一区二区在线观看av| 最近最新免费中文字幕在线| 男人操女人黄网站| 少妇人妻久久综合中文| 久久久精品94久久精品| a级毛片黄视频| 另类精品久久| 亚洲精品av麻豆狂野| 麻豆乱淫一区二区| av欧美777| 亚洲成人国产一区在线观看| 97人妻天天添夜夜摸| 九色亚洲精品在线播放| 欧美日韩国产mv在线观看视频| 夜夜骑夜夜射夜夜干| 国产精品国产三级国产专区5o| 免费在线观看视频国产中文字幕亚洲 | 欧美国产精品va在线观看不卡| 亚洲中文字幕日韩| 久久亚洲精品不卡| 亚洲国产精品一区二区三区在线| 欧美黄色淫秽网站| 在线观看舔阴道视频| av天堂在线播放| 国产精品国产av在线观看| 精品久久久久久久毛片微露脸 | 91老司机精品| 欧美日韩精品网址| 另类精品久久| 国产精品99久久99久久久不卡| 亚洲一区中文字幕在线| 成年人午夜在线观看视频| 97在线人人人人妻| 一区二区日韩欧美中文字幕| 久久精品国产亚洲av高清一级| 男女高潮啪啪啪动态图| 涩涩av久久男人的天堂| 制服诱惑二区| 色老头精品视频在线观看| kizo精华| 亚洲美女黄色视频免费看| 日本wwww免费看| 在线观看免费视频网站a站| 精品视频人人做人人爽| av视频免费观看在线观看| 亚洲国产精品一区二区三区在线| 可以免费在线观看a视频的电影网站| 丰满少妇做爰视频| 老熟女久久久| 国产91精品成人一区二区三区 | 电影成人av| 亚洲色图综合在线观看| 80岁老熟妇乱子伦牲交| 桃花免费在线播放| 欧美日韩亚洲高清精品| av超薄肉色丝袜交足视频| 亚洲 欧美一区二区三区| 午夜影院在线不卡| 亚洲色图 男人天堂 中文字幕| 搡老熟女国产l中国老女人| 一区二区日韩欧美中文字幕| 一本—道久久a久久精品蜜桃钙片| 男人爽女人下面视频在线观看| av在线老鸭窝| 久热这里只有精品99| a级片在线免费高清观看视频| 欧美日韩中文字幕国产精品一区二区三区 | www.999成人在线观看| 1024视频免费在线观看| 国产成人av教育| 成人国产av品久久久| 亚洲av成人不卡在线观看播放网 | a在线观看视频网站| 久久ye,这里只有精品| 久久精品国产a三级三级三级| 老司机午夜福利在线观看视频 | 亚洲av成人不卡在线观看播放网 | 自线自在国产av| 午夜福利在线免费观看网站| 久久精品久久久久久噜噜老黄| 欧美中文综合在线视频| 亚洲国产精品一区三区| 欧美人与性动交α欧美软件| 丝袜在线中文字幕| 久久精品国产a三级三级三级| 亚洲久久久国产精品| 国产av又大| 人人妻人人添人人爽欧美一区卜| 青春草亚洲视频在线观看| av在线播放精品| 亚洲国产欧美在线一区| 多毛熟女@视频| 午夜91福利影院| 女人高潮潮喷娇喘18禁视频| 日韩大码丰满熟妇| 美女国产高潮福利片在线看| 90打野战视频偷拍视频| 亚洲欧洲日产国产| 精品久久久精品久久久| 一二三四在线观看免费中文在| 亚洲精品中文字幕在线视频| 久久国产精品男人的天堂亚洲| 精品乱码久久久久久99久播| 国产精品 国内视频| 99精品久久久久人妻精品| 制服人妻中文乱码| 婷婷成人精品国产| 视频在线观看一区二区三区| 国产精品久久久久成人av| 天天影视国产精品| 中文字幕另类日韩欧美亚洲嫩草| 久久人妻福利社区极品人妻图片| 美女大奶头黄色视频| av又黄又爽大尺度在线免费看| netflix在线观看网站| 在线观看免费高清a一片| 久久国产精品影院| 热99久久久久精品小说推荐| 久久精品亚洲av国产电影网| 欧美性长视频在线观看| 俄罗斯特黄特色一大片| 黑人欧美特级aaaaaa片| 老熟妇仑乱视频hdxx| 国产精品自产拍在线观看55亚洲 | 色婷婷av一区二区三区视频| 欧美另类一区| 精品少妇一区二区三区视频日本电影| 国产在线观看jvid| 亚洲精品中文字幕一二三四区 | av免费在线观看网站| 精品乱码久久久久久99久播| 精品免费久久久久久久清纯 | 91国产中文字幕| 捣出白浆h1v1| www.av在线官网国产| 亚洲五月婷婷丁香| xxxhd国产人妻xxx| 国产一卡二卡三卡精品| 高清在线国产一区| 国产精品香港三级国产av潘金莲| av又黄又爽大尺度在线免费看| 男人舔女人的私密视频| 99香蕉大伊视频| 国产视频一区二区在线看| 中文字幕人妻丝袜制服| 国产亚洲精品一区二区www | 精品一区在线观看国产| 无限看片的www在线观看| 婷婷成人精品国产| 搡老岳熟女国产| 国产精品自产拍在线观看55亚洲 | 日韩视频一区二区在线观看| 啦啦啦视频在线资源免费观看| 亚洲成人国产一区在线观看| 久久久久精品国产欧美久久久 | 99久久国产精品久久久| a 毛片基地| 欧美激情 高清一区二区三区| 久久精品亚洲av国产电影网| 久久久久视频综合| 精品卡一卡二卡四卡免费| 建设人人有责人人尽责人人享有的| 国产av一区二区精品久久| 国产福利在线免费观看视频| 爱豆传媒免费全集在线观看| 国产精品久久久久久精品古装| 国产精品 国内视频| 两性午夜刺激爽爽歪歪视频在线观看 | 新久久久久国产一级毛片| 国产成人系列免费观看| 亚洲人成77777在线视频| 如日韩欧美国产精品一区二区三区| 高清av免费在线| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲av美国av| 欧美人与性动交α欧美精品济南到| 人妻久久中文字幕网| 久久人人爽人人片av| 免费观看人在逋| 在线观看免费高清a一片| 日本精品一区二区三区蜜桃| 91老司机精品| 99re6热这里在线精品视频| 伦理电影免费视频| 久久天堂一区二区三区四区| 伦理电影免费视频| 蜜桃在线观看..| 亚洲欧洲日产国产| 欧美在线黄色| 超色免费av| 日本av手机在线免费观看| 国产亚洲av片在线观看秒播厂| 亚洲人成电影观看| 久久久久精品国产欧美久久久 | 欧美日韩国产mv在线观看视频| 蜜桃在线观看..| 大码成人一级视频| 亚洲欧美激情在线| 美女脱内裤让男人舔精品视频| 国产高清国产精品国产三级| 欧美av亚洲av综合av国产av| 男人操女人黄网站| 亚洲专区国产一区二区| 国产亚洲精品久久久久5区| 真人做人爱边吃奶动态| 久久国产精品男人的天堂亚洲| 在线观看免费日韩欧美大片| 丁香六月欧美| 国产三级黄色录像| 精品高清国产在线一区| 老司机影院毛片| 99国产精品99久久久久| 久久久国产精品麻豆| 国产av国产精品国产| 一二三四社区在线视频社区8| 亚洲国产精品一区三区| 99国产精品免费福利视频| 久久人人爽av亚洲精品天堂| 十八禁网站网址无遮挡| 啦啦啦视频在线资源免费观看| 久久久水蜜桃国产精品网| 久久久久久久久免费视频了| 老汉色av国产亚洲站长工具| 99国产精品99久久久久| 最近中文字幕2019免费版| 99久久综合免费| 久久精品人人爽人人爽视色| 天天躁日日躁夜夜躁夜夜| 99精国产麻豆久久婷婷| 不卡av一区二区三区| 精品国产乱码久久久久久男人| 一区二区三区乱码不卡18| 成在线人永久免费视频| 亚洲精品国产av成人精品| 精品国产一区二区三区久久久樱花| 久久精品国产综合久久久| 黄色视频,在线免费观看| 色播在线永久视频| 国产伦人伦偷精品视频| 9热在线视频观看99| 母亲3免费完整高清在线观看| 亚洲午夜精品一区,二区,三区| 国产成人精品久久二区二区91| 成年人午夜在线观看视频| 69av精品久久久久久 | 国产在线一区二区三区精| 日韩一卡2卡3卡4卡2021年| av在线app专区| 首页视频小说图片口味搜索| 国产淫语在线视频| 国产精品一区二区在线不卡| 91精品三级在线观看| 久久99热这里只频精品6学生| 老汉色av国产亚洲站长工具| 大片免费播放器 马上看| 国产一区二区三区在线臀色熟女 | 日韩欧美一区视频在线观看| 搡老乐熟女国产| 国产伦理片在线播放av一区| 国精品久久久久久国模美| videosex国产| 一本大道久久a久久精品| 高清黄色对白视频在线免费看| 我要看黄色一级片免费的| 高清黄色对白视频在线免费看| a 毛片基地| 又大又爽又粗| 免费在线观看影片大全网站| 精品国产一区二区久久| 无遮挡黄片免费观看| av又黄又爽大尺度在线免费看| 精品视频人人做人人爽| 久久热在线av| 国产一区二区激情短视频 | 久久免费观看电影| 不卡一级毛片| 国产精品秋霞免费鲁丝片| 97在线人人人人妻| 国产激情久久老熟女| 国产欧美日韩一区二区三 | 日韩欧美一区视频在线观看| www.999成人在线观看| 国产成人av教育| 国产无遮挡羞羞视频在线观看| 一二三四在线观看免费中文在| 欧美激情 高清一区二区三区| 午夜激情久久久久久久| 日韩制服丝袜自拍偷拍| 久久久久国内视频| 丝袜美足系列| 久久久欧美国产精品| 国产国语露脸激情在线看| 亚洲国产精品成人久久小说| 五月开心婷婷网| 国产精品欧美亚洲77777| 久久久久久久大尺度免费视频| 中文字幕另类日韩欧美亚洲嫩草| 国产日韩一区二区三区精品不卡| 99国产极品粉嫩在线观看| a在线观看视频网站| 岛国在线观看网站| 90打野战视频偷拍视频| 我的亚洲天堂| 欧美变态另类bdsm刘玥| 夜夜夜夜夜久久久久| 在线观看www视频免费| 精品久久久久久久毛片微露脸 | 午夜久久久在线观看| 婷婷色av中文字幕| cao死你这个sao货| 亚洲色图综合在线观看| 热99久久久久精品小说推荐| 国产精品亚洲av一区麻豆| 亚洲国产欧美日韩在线播放| 成人手机av| 国产无遮挡羞羞视频在线观看| 黄色片一级片一级黄色片| 欧美精品高潮呻吟av久久| 黑人猛操日本美女一级片| 深夜精品福利| 国产免费一区二区三区四区乱码| 精品福利永久在线观看| 丝袜在线中文字幕| 各种免费的搞黄视频| av视频免费观看在线观看| 黄片播放在线免费| 在线精品无人区一区二区三| 国产一区二区 视频在线| 久久久精品免费免费高清| 一区二区av电影网| 亚洲欧美精品综合一区二区三区| 亚洲成av片中文字幕在线观看| 狂野欧美激情性xxxx| 中文字幕制服av| 欧美精品人与动牲交sv欧美| 久久精品亚洲熟妇少妇任你| www.av在线官网国产| 91大片在线观看| 亚洲第一av免费看| 精品一区二区三区四区五区乱码| 女人高潮潮喷娇喘18禁视频| 国产亚洲午夜精品一区二区久久| 中文精品一卡2卡3卡4更新| 国产欧美日韩一区二区三 | 啦啦啦免费观看视频1| 国产精品一区二区在线不卡| 久久精品人人爽人人爽视色| 一边摸一边抽搐一进一出视频| 香蕉国产在线看| 国产在线一区二区三区精| 国产男女内射视频| 欧美激情极品国产一区二区三区| 欧美精品啪啪一区二区三区 | 手机成人av网站| 亚洲熟女精品中文字幕| 国产精品久久久av美女十八| 久久热在线av| 久久中文字幕一级| 黑人巨大精品欧美一区二区mp4| 日本一区二区免费在线视频| 日韩精品免费视频一区二区三区| 久久青草综合色| 欧美xxⅹ黑人| 日韩中文字幕欧美一区二区| 99久久精品国产亚洲精品| 80岁老熟妇乱子伦牲交| 中文字幕高清在线视频| 交换朋友夫妻互换小说| 悠悠久久av| 日韩中文字幕视频在线看片| 免费在线观看完整版高清| 午夜91福利影院| 久久精品成人免费网站| 不卡一级毛片| 欧美日韩福利视频一区二区| 纯流量卡能插随身wifi吗| 国产黄频视频在线观看| 黄色视频在线播放观看不卡| 伊人亚洲综合成人网| 一区二区三区乱码不卡18| 大香蕉久久网| 亚洲国产精品一区三区| 两个人免费观看高清视频| 一级片'在线观看视频| 在线观看人妻少妇| 三级毛片av免费| 韩国精品一区二区三区| 一区在线观看完整版| 999久久久精品免费观看国产| 亚洲精品久久久久久婷婷小说| 黑人巨大精品欧美一区二区mp4| 国产成人影院久久av| 亚洲精品第二区| 亚洲黑人精品在线| 99国产精品一区二区三区| 最近中文字幕2019免费版| 亚洲中文日韩欧美视频| 精品少妇黑人巨大在线播放| 亚洲精品国产一区二区精华液| 亚洲国产看品久久| 亚洲第一欧美日韩一区二区三区 | 男男h啪啪无遮挡| 国产一区二区三区在线臀色熟女 | 男人舔女人的私密视频| 精品熟女少妇八av免费久了| 飞空精品影院首页| 中文欧美无线码| 老司机亚洲免费影院| 国内毛片毛片毛片毛片毛片| 国产成人精品久久二区二区免费| 亚洲精品美女久久久久99蜜臀| 丰满迷人的少妇在线观看| 99re6热这里在线精品视频| 黄片播放在线免费| 久久久久精品人妻al黑| av国产精品久久久久影院| 老汉色av国产亚洲站长工具| 日日夜夜操网爽| 日韩视频一区二区在线观看| 国产精品熟女久久久久浪| 国产一区二区三区av在线| 欧美精品高潮呻吟av久久| 国产99久久九九免费精品| av网站免费在线观看视频| 18禁观看日本| 久久久精品94久久精品| 亚洲九九香蕉| 黄色 视频免费看| 午夜久久久在线观看| 午夜福利在线免费观看网站| 一区二区三区激情视频| 亚洲国产欧美在线一区| 国产一区二区激情短视频 | 麻豆av在线久日| 美女视频免费永久观看网站| 久久久久国内视频| 免费av中文字幕在线| 黄片小视频在线播放| 丝袜美足系列| 老鸭窝网址在线观看| 999久久久精品免费观看国产| av福利片在线| 国产亚洲精品第一综合不卡| 亚洲第一欧美日韩一区二区三区 | 一区二区三区激情视频| 亚洲综合色网址| 成人亚洲精品一区在线观看| 日韩中文字幕欧美一区二区| 婷婷丁香在线五月| 90打野战视频偷拍视频| 天堂俺去俺来也www色官网| 成人三级做爰电影| 性高湖久久久久久久久免费观看| 国产亚洲av高清不卡| 欧美黄色淫秽网站| 亚洲精品粉嫩美女一区| 又紧又爽又黄一区二区| 久久久久国产一级毛片高清牌| 美女高潮到喷水免费观看| 国产亚洲av高清不卡| 91麻豆av在线| 免费高清在线观看日韩| 999精品在线视频| 丰满人妻熟妇乱又伦精品不卡| 久久中文字幕一级| 中文字幕制服av| 久久影院123| 天天操日日干夜夜撸| 国产精品影院久久| 精品国产乱子伦一区二区三区 | 亚洲精品国产av蜜桃| 亚洲av电影在线观看一区二区三区| 亚洲欧美精品自产自拍| 99久久人妻综合|