• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Privacy Protection with Dynamic Pseudonym-Based Multiple Mix-Zones Over Road Networks

    2017-05-08 13:19:02QasimAliArainZhongliangDengImranmemonAsmaZubediJichaoJiaoAishaAshrafMuhammadSaadKhan
    China Communications 2017年4期

    Qasim Ali Arain , Zhongliang Deng , Imran memon , Asma Zubedi , Jichao Jiao , Aisha Ashraf , Muhammad Saad Khan

    1 Beijing University of posts and Telecommunication Beijing China

    2 College of Computer Science, Zhejiang University, Hangzhou 310027, China

    3 Department of Software Engineering Mehran UET Jamshoro.

    * The corresponding author, e-mail: Qasim_ali_arain@yahoo.com

    I. INTRODUCTION

    The advent of mobile communication and ubiquitous computing has extended the opportunities for users to make life easier by accessing vast information through location based services. However, when the users get registered with these services, they may be exposed to the threat of information disclosure[1,2]. Personal data privacy has not been a critical problem but due to the expansion of location based services, an adversary can track a user’s location by accessing his information.As a consequence, location privacy of user becomes a challenge [3,4]. The private information of a user, that is recorded during his visit to a hospital, library, and social networking website or while driving on a road becomes an invasive catalogue of data. Despite, it remains a strenuous task to achieve the desired level of protection by using a single mix-zone [5].Consequently, it gives the opportunity to any malevolent adversary to track the user and may cause harm.

    In the last decade, various pseudonym changing techniques for the protection of location privacy in VANETS have been proposed [6,7,8 9,10,11]. This can be achieved by changing the identifier of a target vehicle called the pseudonym that is chosen randomly. However this mechanism is performed by location server, therefore, by executing pseudonym change, the services from main server will be disturbed which is the cause of overhead in the network [12,13,14]. Despite,most of the current pseudonyms change mechanism ignores this crucial aspect15,16,17,18]but the problem persists because if single vehicle changes its pseudonym, it can be tracked easily by an attacker [19,20,21,25,26,27].Moreover, it has been further investigated that when multiple vehicles are inside mix-zone,they may change their pseudonyms [23,24].On the contrary, an attacker can easily discover mix-zones because, mix-zones are mostly,statically determined [25, 26]. So, this concept led to further research and explored the idea of dynamic mix zone [9, 26,27,28,29] which emphasizes on the technique of pseudonym change with dynamically determined mixzones. In [14] game theory approach has been proposed for non-cooperative location privacy.In this approach, selfish vehicles alter their pseudonyms when they have maximum payoff but it fails in the situations, where few vehicles may not change their pseudonym if they have achieved satisfactory level of location privacy. As a result, in most of the cases, the vehicles whose pseudonyms have expired may not have sufficient number of other vehicles willing to change their pseudonyms. This, in turn, adversely affects the location privacy provided to the vehicles in need.

    In this paper the authors proposed an advanced method to improve user privacy in terms of dynamic pseudonyms, while focusing on multiple mix-zones over road networks.

    After detailed analysis of existing limitations, we presented a protocol that will generate some inducement for vehicles to change their dynamic pseudonyms inside as well as outside the mix-zone. Our proposed model comprises of following important factors:

    (i) We have introduced a reputation method that gradually encourages each vehicle to change Dynamic Pseudonym Multiple Mixzones (DPMM) within the mix-zone as well as outside the mix-zone.

    (ii) We further propose dynamic pseudonym multiple mix-zones (DPMM) generation with privacy protection that comprises of various parameters for defending against constant attacks.

    (iii) The simulation results indicate that the proposed technique provides better results,acquiring high rate of protection with reduced number of changes in pseudonyms, along with presenting the best performance.

    II. SYSTEM MODEL

    2.1 General idea description

    We have proposed a Dynamic Pseudonym Multiple Mix-zone model (DPMM) for mobile travelers over Road networks. There are four main entities that can be shown in figure 1, i.e.mix zone, reported server, road side unit and vehicles. Mix zone is an area where vehicles change their pseudonyms; however vehicles can change their pseudonyms inside as well as outside mix zone. Reported server is an entity which allows communication between RSU and vehicle and it is also responsible to authenticate vehicle over the road network.Moreover, vehicles are connected to reported server (RS); they may change pseudonyms even when they are outside mix-zone. RSU is a computing device located on the road sides,which can provide connectivity to the vehicles. So, our proposed model based on secure communication between these four entities as shown in figure 1.

    2.2 Assumptions

    In this research model, we have proposed a protocol and have assumed that each vehicle has a unique ID (identity information in road network). This ID is only shared with reported server (RS). We also assumed that RS1, RS2… RSn all are connected with main RS servers and main RS verify each unique ID information and provide information to multiple reported server (RS), which is used for requesting a change in pseudonyms when vehicle travels inside or outside a mix-zone.It is further assumed that every vehicle is authenticated by a private or public key. This key allows a vehicle to acquire its pseudonym and its RS information from reported server.Moreover, mix-zone and reported server are trusted entities, while RSU (Road side unit which is providing connectivity between multiple RSUs and also communicate with reported server) is not a trusted entity. Under such circumstances, a reported server is responsible to control vehicles. RS information and public keys, both are available at reported server. Reported server broadcasts a public pseudonym for each vehicle which comes under its range or detected over road network. The availability feature of RS is almost perfect. Additionally,it has the information of RS private IDs and encrypted information of public keys associated with every vehicle. Thus, RS will acquire a vehicle’s public key and frequently update it.

    2.3 Model description

    (1) In our first approach, we have proposed that every vehicle gets associated with RS,where RS allocates a virtual identity and a secret pseudonym. The virtual ID (dummy identity of vehicle user instead of using real identity) is a node identity for vehicle user which is 128-bit address used for both node identity and locator. The virtual ID is pre-defined and randomly assigned by the main reported server. This ID is permanent and thus, no longer bound to the main reported server and/or locations. Once a vehicle receives a virtual identity and a private pseudonym, it will resend it to reported server which, in turn, broadcasts this new generated RS information. Hence, vehicle encryption includes public pseudonym, its virtual identity and timespan of RS information.Time span of RS information can be defined as time which is required for a vehicle to travel at a regular speed to cover distance between two reported servers. During this process,vehicle sends its virtual identity to RS, before its certificate expires. RS will resend newly generated private pseudonym to vehicle when it receives virtual identity of vehicle, while at the same time, it will update reported server regarding the vehicle’s information. Hence,reported server will broadcast certificate. In this approach, vehicles on road are identified by their virtual identity while pseudonyms allow them to communicate. However, in this approach only RS will communicate with road side unit (RSU) .The number of road side unit (RSU) may communicate with multiple reported servers which are installed within the infrastructure. Therefore, the capacity of multiple reported servers and number of vehicles to communicate with an infrastructure depends upon the radio coverage of existing RSUs in the nearby area. The bandwidth required to send a request and receive response of pseudonym will be analyzed in section III and its parameter is defined in Table 1.

    2) In our second approach, we have proposed that every vehicle has both its private and public key. As the vehicle acquires RS public key, it will be authenticated on road network by encrypting its private keys and public keys with RS public key. Hence, vehicle pair keys (i.e. private/public) get registered with RS and in turn, RS will send a set of information to vehicle by encrypting them with vehicle public key. This information contains a message that allows vehicles to create their private pseudonym and certificate. So based on this, when a vehicle receives a set of information, it creates a certificate and a private pseudonym. Once it is done, RS information will be broadcasted. As soon as RS information expires, it will generate a new private pseudonym that will be broadcasted. Pseudonyms are the only way to identify vehicles by using this approach. However, vehicles in second method are free to communicate their private pseudonyms and certificates, once they have been validated by RS.

    Fig. 1 Basic work Flow illustration of DPMM

    Table I Notation description

    First Approach: Steps are as Follows

    Second Approach: The steps are as follows:

    The RSUs are scattered equidistantly to measure expiration time of certificates and private pseudonyms. Consider “d” as a distance between each road side unit and communication range of each road side unit. Moreover,maximum and minimum speed on road are represented byrespectively. It is assumed that there must be at-least two vehicles which may travel at an average speed.The main goal of our approach is to allow at least two vehicles to acquire pseudonym on road during same time interval. It is denoted byThe ratio determined between distanceandwill be the expiry time “t” of certificate and private pseudonym, which is represented by. The communication range of each road side unit is equal to “d” as mentioned previously.Therefore, vehicle at any speed can communicate with at least one road side unit and is allowed to change its pseudonym at least once while on the road.

    Location privacy is an important aspect to consider in road networks, according to this,vehicles have to disseminate information to other vehicles which are coming under their premises for safety application or accident warning. To mitigate and manage an attacker from tracking a vehicle’s trajectory, it is required that vehicle must change their pseudonym at multiple time and location, however it is evident from the discussion that existing methods regarding pseudonym change are not capable enough for desired location privacy.Therefore, it is very easy for an attacker to quantify the vehicle’s movement by using relative coordinates, which in turn, manipulate vehicle’s location privacy. Moreover, due to less number of pseudonyms stored inside vehicle and bottleneck occurred due to high frequency of updating pseudonym. It is therefore evident that some selfish vehicles inside mix zone may not cooperate and do not proceed to alter their pseudonym when current strength of location privacy is larger or equivalent to the minimum level of location privacy.

    To cope with this critical (to location privacy) issue, we have proposed reputation based technique, which enable vehicles to cooperate for pseudonym change. Moreover, strength of location privacy increases, as number of vehicles cooperates, and the value of that increase depends upon the number of vehicles that will be cooperating. We have proposed that vehicle will change their pseudonym when they are inside as well as outside mix zone. It has been already mentioned in [26, 27, 25] the strength of the location privacy is directly proportional to number of vehicles that are cooperating,however, when number of vehicles cooperate,they will change their pseudonyms inside and outside of mix zone causing location privacy to increase. Let us consider the following example: if there are 10 vehicles entering the mix zone and four of these vehicles change their pseudonym inside mix zone, then it is very easy for an attacker to calculate entrance as well as exiting time and the related information. So, it is clear from above discussion that if less number of vehicles changes their pseudonym then location privacy decreases.But, if the number of vehicles changing their pseudonyms are large while entering and exiting mix zones i.e. 10 then it is very difficult to launch an attack. Also, some selfish vehicles do not change their pseudonyms so their strength of location privacy decreases.Overall conclusion is that, strength of the location privacy is proportional to number of vehicles that are cooperating. The strength of location privacy of DPMM improves because large numbers of vehicles are cooperating and changes their pseudonyms in order to increase their reputation. However, curves in EPCS(Efficient Pseudonym Changing Schemes for Location Privacy Protection) [25], RPCLP(Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks) [26]and MODP (Mix-zones Optimal Deployment for Protecting location privacy) [27] schemes have small fluctuations. This is because these three schemes do not have any incentive policy to encourage vehicles to cooperate for pseudonym changes.

    2.4 Attacks in multiple mix-zones over road networks

    In the following section, we shall discuss the possible attacks on the road network.

    (1) Fabrication Attacks: In this type of attack, an adversary may penetrate some malicious information into the network. When appropriate entity in the network would receive unauthorized packet, it can be misled to some anonymous destination. Moreover, It is very easy for an invader to initiate this type of attack by penetrating vague information into the network, however it is also possible that sender might assume that it is somebody else. These might include fabricate message and warning certificate identities [30, 31, 35].According to this construct, drivers manipulate messages by using broadcast method and then execute the attack by sending information into the network. Message Fabrication has two possible forms. According to first technique incorrect information related to attacker’s ID,speed and position of vehicle has been transferred to nearby vehicle or RSU. According to second construct, it has been assumed that,attacker will act as an emergency vehicle, in turns he/she can drive at a higher speed [32].Our system avoids this type of attack because of secure communication system architecture and RS server. Secondly, we cloak synchronization (between nodes) and IP filtering in our system.

    (2) Message Suppression Attacks: In this type of attacks, an adversary might drop down some critical information or some message which is sent to the receiver or hold that information to be used for later time. In road networks, this may create a very critical issue,like the information regarding the accident may not reach to the user in time. In case of any mishap, the information regarding that incident will not immediately be propagated to the insurance authorities. Moreover, these messages might contain very important information for the receiver. By acquiring these packets, attacker can manipulate and use them again at some other time. The main reason behind such type of attacks would be to handicap registration and insurance authorities from learning about road accidents and to generate delay in disseminating collision information to RSU. It is evident from the discussion that,attacker may restrict any message related to congestion warning and might use it at some other time , in response vehicles do not receive the warning and can be forced to wait in the traffic [33,34].

    (3) Alteration Attacks: Adversary, in such attacks, tries to change existing information by using delaying tactics or changing the actual information about the entry of vehicle that has been communicated. In such scenario, an adversary may alter the message by informing its neighbor vehicles on the road network that the road is clear but on the contrary, the road is blocked [30,36,37].

    (4) Denial of Service Attacks (DOS):These are very popular security threats in the communication network. In this type of anattack, the attacker acquires the control of the resources, blocking the channel used by vehicular network. This will restrict the information from arriving safely and timely at final destination. Hence, these types of attacks may hinder drivers who are dependent upon application’s information. In order to avoid such circumstances, the driver may switch between multiple channels or technologies if available like Bluetooth, LTE Wifiand DSRC [30, 38,39].

    Table II Simulation Parameters

    (5) Replay Attacks: An adversary attacks by repeating the communication of a message that has been received earlier. By doing this,he will take the advantage of current situation and plan some critical attacks. However message does not contain any time stamp value or sequence number information. It is well known fact that, keys can be reused and it might be possible to re send these stored messages with the same key by adding malicious information into the system without any detection. Moreover to avoid such type of attacks each and every packet must be authenticated,not only just encrypted and packets should have some timestamp information. Such type of attacks may launch to confuse the authorities to prevent identification of vehicles in hitand-run incidents [33, 34].

    III. EXPERIMENTS AND EVALUATION

    3.1 Experiment setup

    We have evaluated our proposed method with SUMO simulator [22-24], and real map Northwest Atlanta region Map is used. We have based our analysis covering a large area of 14 km x 12 km and over 10,000 vehicles moving at varying speed. The simulations have been run five times, moreover network parameters are set as shown in Table 2.

    3.2 Performance evaluation

    The simulation results have shown that vehicles passing through multiple mix-zones have changed their pseudonyms dynamically as depicted in fig.2 Five different numbers of mix-zones and their data mechanisms corresponding to dynamically changing pseudonyms have been considered respectively. It is worthy to note here that, due to dynamically changing pseudonyms in y-axis as shown in figure. 2, it is clear that DPMM is a better technique in terms of dynamically changing pseudonyms as compared to EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection) [25], RPCLP (Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks)[26] and MODP (Mix-zones Optimal Deployment for Protecting location privacy)[27].In particular,DPMM always performs the best. As a matter of fact, pseudonym-change badly influences communication performance. If a pseudonym change interval is longer, then the privacy exposure time increases. However, if pseudonym-change interval is shorter, then overhead increases because of frequent pseudonym change. Therefore, an algorithm is required that finds an optimal pseudonym-change interval for making a balance between communication overhead and location privacy.

    The average strength of location privacy for a number of vehicles, moving in SUMO simulation over Northwest Atlanta region map is shown in figure 3. The average strength of location privacy achieved by DPMM and EPCS is higher than RPCLP and MODP schemes,where certain selfish-vehicles inside mixzones possessed greater location privacy thus,refusing to change their pseudonyms. The average strength of location privacy in DPMM scheme is greater when compared with other three schemes because it causes DPMM to make vehicles change their dynamic pseudonyms when they pass inside and outside the mix-zones. We conclude that average strength of location privacy maintains a certain value when numbers of vehicles increase. We further measured distance between two nodes to calculate the average location strength by using equation 4.

    Delay Characteristics

    Fig. 2 Dynamic pseudonym changing

    In vehicle networks, mostly delay characteristics depend upon the road intersection.The adversary formulates road intersections with normal distributions. The delay characteristic has been investigated by using normal distribution that would use trajectory of vehicle on intersection. For example, if f is number of road segments that meets at an intersection,and we have f = 4; for vehicles arriving from u1, their delay characteristic is represented as:

    Where I = 1…… f and e1, e2, e3 and e4 indicates the direction respectively.

    Packet delivery Ratio

    The packet delay is the time packet takes to achieve the destination after it leaves the source. The average end to end delay Xavg can be calculated by equation given below where Wr is the emission instant of the package and Wt is the reception instant of the package.

    Location privacy inside mix-zone and outside mix-zone is represented by ?, however,it increases when vehicles cooperate. The strength of location privacy is directly proportional to the number of vehicles that are cooperating inside and outside mix-zone. Hence,after n number of rounds, final strength of location privacy is determined by:

    The average strength of location privacy and dynamic pseudonym’s lifetime is calculated for various seconds as shown in figure 4. The average strength of location privacy achieved by RPCLP scheme is highest as compared to DPMM and other two schemes.However, our DPMM scheme statistics still satisfies location privacy. Figure 4 shows that the average strength of location privacy maintains a certain value with increase of dynamic pseudonym’s lifetime whereas; dynamic pseudonym’s lifetime has little impact on average strength of location privacy.

    Fig. 3 Location privacy

    Fig. 4 Average strength of location privacy

    We have performed our simulations on several vehicle densities as shown in figure 5.It is evident from the experiments that with a rapid increase in number of vehicles, communication range decreases greatly as compared with the methods such as EPCS, RPCLP and MODP schemes in terms of time delay and throughput. However, with a shorter time delay, greater will be the DPMM scheme. We have compared figure 5 (a and b) for time delay, (c with d) for throughput and finally(e with f) for packet delivery ratio, and concluded that DPMM has outperformed EPCS,RPCLP and MODP in terms of time delay,through put and packet delivery ratio. Moreover, in figure 6 (a) and (b), we have observed

    probability changing pseudonyms inside mix zone and outside mix zone. It is evident from the performed experiments that DPMM scheme performs better in terms of number of vehicles verses probability changing pseudonym.

    Additionally, as the number of vehicles increases, DPMM will give the better results as compared to other three schemes. Finally,it has been evident from figure. 5 and 6 that better results are achieved when traffic on road becomes heavier and hence, throughput can get a greater value.

    Probability changing the pseudonymsis the probability that vehicle v is connected to RS and passed through number of mix-zones during the same interval.is the probability that a vehicle changes pseudonym inside and outside mix-zones while going through the road it has chosen to have pseudonym

    The number of mix-zones in the road system is given by graph and edge

    The maximum number of vehicles connected which pass through mix-zones on the road system are denoted as mix-zones_r and the dynamic pseudonyms are denoted as mix_rdpvt.Here, we define:

    So, the probability P of a particular vehicle connected to RS is shown as:

    IV. CONCLUSION

    In this research, we have proposed an advanced method to improve user privacy in terms of dynamic pseudonyms, while focusing on multiple mix-zones over road networks.Our technique is based on multiple mix-zones using advanced cryptographic communication schemes to protect user privacy against various attacks, where number of pseudonym search user requests are limited in given timeframe. After having a detailed analysis of available literature, we observed that existing schemes only deal with the methods that comprise of a single pseudonym change. However,an attacker can easily trace a single pseudonym change during any basic communication under mix-zone schemes. In this paper,we have gradually encouraged each vehicle to change their pseudonym dynamically by using (DPMM) approach inside and outside mix-zone. We have further proposed a new reputation based dynamic pseudonym change protocol for location privacy protection.

    Fig. 5 Performace Evaluation

    On the basis of detailed analysis of results,it has been inferred that our simulation results have outperformed existing techniques such as EPCS (Efficient Pseudonym Changing Schemes for Location Privacy Protection),RPCLP (Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks)and MODP (Mix-zones optimal deployment for protecting location privacy). Furthermore,we obtained better results in terms of achieving high privacy protection rate with a smaller number of pseudonym changes. In our future work, we will examine vehicle to vehicle communication privacy along with focusing on user behavior inside and outside mix-zones over road networks.

    ACKNOWLEDGMENT

    This paper has been supported by the National Natural Science Foundation of China (Grant No. 61401040,Grant No. 61372110).

    [1] Imran Memon (2015). Authentication User’s Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services. Wireless Personal Communications Volume 82, Issue 3 , pp 1585-1600.

    Fig. 6 Probability pseudonyms changing in various speed

    [2] Imran Memon(2015). A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks.Wireless Personal Communications Volume 85,Issue 3 , pp 1167-1191

    [3] Imran Memon, Ling Chen, Abdul Majid , Mingqi Lv, Ibrar Hussain, Gencai Chen(2015).Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist. Wireless Personal Communications Volume 80, Issue 4 , pp 1347-1362.

    [4] X. Liu, H. Zhao, M. Pan, H. Yue, X. Li, and Y. Fang,“Traffic-aware multiple mix zone placement for protecting location privacy,” Proc. - IEEE INFOCOM, pp. 972–980, 2012.

    [5] K. Moghraoui, “An Efficient Pseudonym Change Protocol Based on Trusted Neighbours for Privacy and Anonymity in VANETs,” pp. 93–99.

    [6] Yuanyuan Pan, Jianqing Li. Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications 36 (2013):1599–1609.

    [7] Song Guo, Deze Zeng, Yang Xiang. Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. Parallel and Distributed Systems, IEEE Transactions on, Issue Date:Nov. 2014.

    [8] Adetundji Adigun, Boucif Amar Bensaber, Ismail Biskri.Protocol of Change Pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), 2013 IEEE 38th Conference on. pp. 162–7, ISBN: 978-1-4799-0539-3, 21–24 October 2013, Sydney, NSW

    [9] J. Freudiger, M. H. Manshaei, J.-Y. L. Boudec, and J.-P. Hubaux, “On the age of pseudonyms in mobile ad hoc networks,” INFOCOM, 2010 Proceedings IEEE, pp. 1–9, Mar. 2010.

    [10] L. Buttyán, T. Holczer, A. Weimerskirch, and W.Whyte, “Slow: A practical pseudonym changing scheme for location privacy in vanets,” IEEE Vehicular Networking Conference, pp. 1–8, Oct.2009.

    [11] R. Lu, X. Lin, T. H. Luan, X. Liang, and X. S. Shen,“Pseudonym changing at social spots: An effective strategy for location privacy in vanets,”Vehicular Technology, IEEE Transactions on, vol.61, no. 1, pp. 86–96, Jan. 2012.

    [12] Imran Memon, Qasim Ali Arain(2016).Dynamic path privacy protection framework for continuous query service over road networks.World Wide Web.pp 1–33.doi:10.1007/s11280-016-0403-3

    [13] J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux, “Mixzones for location privacy in vehicular networks,” ACM Win-ITS,2007.

    [14] J. Freudiger, H.Manshaei, et.al, “On non-cooperative location privacy: a game-theoretic analysis,” In: Proceedings of the ACM Conference on Computer and Communications Security(CCS),Chicago: ACM, pp. 324-337, 2009

    [15] 10. Shiode, N., Li, C., Batty, M., Longley, P., &Maguire, D. (2002). The impact and penetration of location-based services. CASA Working Paper 50. http://www.casa.ucl.ac.uk/working_papers/paper50.pdf (accessed June 23, 2010).

    [16] . Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V., Veijalainen, J., Katanosov, A. et al. (2001).Developing GIS-supported location-based services. In Proc. of the international conference on Web information systems engineering (Vol.2, pp. 66–75)

    [17] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. “Silent cascade: enhancing location privacy without communication QoS degradation,” In Proceedings of SPC, pp. 165–180, 2006.

    [18] B. Palanisamy and L. Liu. “MobiMix: protecting location privacy with mix zones over road networks,” Proc. of 27th IEEE International Conference on Data Engineering (ICDE’11), pp.494-505, 2011.

    [19] Muhammad Hammad Memon, Jian-Ping Li, Imran Memon, Qasim Ali Arain(2016).GEO matching regions:multiple regions of interests using content based image retrieval based on relative locations.Multimedia Tools and Applications .pp 1–35.doi:10.1007/s11042-016-3834-z

    [20] T. Wang and L. Liu. Privacy-Aware Mobile Services over Road Networks In VLDB 2009

    [21] J. Meyerowitz and R. Choudhury. Hiding Stars with Fireworks:Location Privacy through Camouflage In MOBICOM 2009

    [22] U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http:// www.census. gov/ geo/ www/ tiger/

    [23] Simulation of urban mobility (SUMO). Available at http:// sumo. sourceforge. net

    [24] U.S. Geological Survey. http://www.usgs.gov

    [25] Yeong-Sheng Chen, Tang-Te Lo, Chiu-Hua Lee, Ai-Chun Pang(2013).Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs.2013 International Conference on Connected Vehicles and Expo (ICCVE).DOI 10.1109/ICCVE.2013.185

    [26] Bidi Ying, Dimitrios Makraki(2015 ).Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks.IEEE ICC 2015-Communications software, services and multimedia applicaations symposium.

    [27] yipin Sun , Bofeng Zhang, Baokang Zhao,Xiangyu Su, Jinshu Su(2015).Peer-to-Peer Networking and Applications November 2015,Volume 8, Issue 6, pp 1108-1121015).Mix-zones optimal deployment for protecting location privacy in VANET

    [28] Shangguang Wang, Tao Lei, Lingyan Zhang,Ching-Hsien Hsu, Fangchun Yang(2016). Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems Future Gener. Comput. Syst., 61 (2016),pp. 118–127.doi:10.1016/j.future.2015.10.004

    [29] S. Wang, C. Fan, C.-H. Hsu, Q. Sun, F(2014). Yang A vertical handoff method via self-selection decision tree for internet of vehicles IEEE Syst. J.(99) (2014), pp. 1–10

    [30] Rizwan Akhtar, Supeng Leng, Imran Memon,Mushtaq Ali, Liren Zhang(2015).Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery.Wireless Personal Communications January 2015,Volume 80, Issue 1, pp 85–96

    [31] I Aad, JP Hubaux, EW Knightly, ”Impact of Denial of Service Attacks on Ad Hoc Networks”,Networking, IEEE/ACM Transactions on Volume 16, August, 2008

    [32] Ohta, T., Ogasawara, K., & Kakuda, Y. (2010).End-to-end transfer rate adjustment mechanism for VANET. In 3rd Dependability conference, DEPEND (pp. 1–6), July 18–25, 2010.

    [33] Hamieh, A., Ben-Othman, J., & Mokdad, L.(2009). Detection of radio interference attacks in VANET. In IEEE global telecommunications conference, GLOBECOM (pp. 1–5), Nov. 30–Dec.4, 2009.

    [34] Sichitiu, M. L., & Kini, M. (2008). Inter-vehicle communication system: A survey. IEEE Communications Surveys and Tutorials, 10(2), 88–105.

    [35] Mishra, T., Garg, D., & Gore, M. M. (2011). A publish/subscribe communication infrastructure for VANET applications. In IEEE advanced information networking and applications (WAINA)workshops (pp. 442–446), March 22–25, 2011.

    [36] Soyoung, P., & Cliff, Z. C. (2008). Reliable traffic information propagation in vehicular ad hoc networks. IEEE Sarnoff Symposium Conference(pp. 1–6), April 28–30, 2008.

    [37] Muraleedharan, R., & Osadciw, L. A. (2009).Cognitive security protocol for sensor based VANET using swarm intelligence. In 43th IEEE Asilomar signals, systems and computers conference (pp. 288–290), July 1–4

    [38] Imran Memon, Ibrar Hussain, Rizwan Akhtar,Gencai Chen(2015).Enhanced Privacy and Authentication:An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme.Wireless Personal Communications September 2015, Volume 84, Issue 2, pp 1487–1508

    [39] Imran Memon, Mohammed Ramadan Mohammed, Rizwan Akhtar, Hina Memon, Muhammad HammadMemon, Riaz Ahmed Shaikh(2014).Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC).Wireless Personal Communications November 2014, Volume 79,Issue 1, pp 661–686

    高清日韩中文字幕在线| 女人被狂操c到高潮| 精品久久久噜噜| 国产黄片美女视频| 日本wwww免费看| 成人漫画全彩无遮挡| 一本一本综合久久| 久久久久久久久久久丰满| 国产探花极品一区二区| 亚洲精品,欧美精品| 2018国产大陆天天弄谢| 在线 av 中文字幕| 观看免费一级毛片| 大话2 男鬼变身卡| 99久久中文字幕三级久久日本| 少妇猛男粗大的猛烈进出视频 | 如何舔出高潮| 高清视频免费观看一区二区 | 狠狠精品人妻久久久久久综合| 中文资源天堂在线| 日日啪夜夜撸| 国产成人福利小说| 2021少妇久久久久久久久久久| 99热这里只有精品一区| 少妇熟女aⅴ在线视频| 只有这里有精品99| 中国国产av一级| 国产美女午夜福利| 亚洲国产日韩欧美精品在线观看| 亚洲真实伦在线观看| 97在线视频观看| 中文乱码字字幕精品一区二区三区 | 亚洲av中文字字幕乱码综合| 久久久亚洲精品成人影院| 国产精品一区二区三区四区久久| 日本一二三区视频观看| 久久久a久久爽久久v久久| 欧美日韩综合久久久久久| 久久久久精品久久久久真实原创| 天天躁日日操中文字幕| 久久精品国产亚洲av天美| 99久久九九国产精品国产免费| 亚洲精品日韩av片在线观看| 久久97久久精品| 女人被狂操c到高潮| 国产伦一二天堂av在线观看| 日本色播在线视频| 欧美成人a在线观看| 欧美极品一区二区三区四区| 欧美激情久久久久久爽电影| 婷婷六月久久综合丁香| 免费观看的影片在线观看| 中文在线观看免费www的网站| av天堂中文字幕网| 美女国产视频在线观看| 男人和女人高潮做爰伦理| 男女那种视频在线观看| 天天躁夜夜躁狠狠久久av| 国产成人福利小说| 成年免费大片在线观看| 成年版毛片免费区| 高清日韩中文字幕在线| 国产精品美女特级片免费视频播放器| 国产又色又爽无遮挡免| 国产精品福利在线免费观看| 日日摸夜夜添夜夜爱| 狠狠精品人妻久久久久久综合| 伦理电影大哥的女人| 男人舔女人下体高潮全视频| 丰满少妇做爰视频| 欧美潮喷喷水| 欧美日韩在线观看h| 日本av手机在线免费观看| 91精品国产九色| 日本熟妇午夜| 99久久中文字幕三级久久日本| 春色校园在线视频观看| 成人午夜精彩视频在线观看| 亚洲精品,欧美精品| 视频中文字幕在线观看| 亚洲国产成人一精品久久久| 欧美日韩一区二区视频在线观看视频在线 | 街头女战士在线观看网站| 久久久精品欧美日韩精品| 国产亚洲一区二区精品| www.av在线官网国产| 精品国产三级普通话版| 国语对白做爰xxxⅹ性视频网站| 国产亚洲av片在线观看秒播厂 | 欧美zozozo另类| 亚洲久久久久久中文字幕| 免费无遮挡裸体视频| 精品久久久久久电影网| 国产精品一区www在线观看| 日韩欧美一区视频在线观看 | 99热这里只有精品一区| 国产av码专区亚洲av| 在线免费观看的www视频| 久久国内精品自在自线图片| 国产欧美日韩精品一区二区| 亚洲精品乱码久久久久久按摩| 永久免费av网站大全| 男女下面进入的视频免费午夜| 国产一区亚洲一区在线观看| 六月丁香七月| 午夜免费激情av| 七月丁香在线播放| 国产精品美女特级片免费视频播放器| 嫩草影院新地址| av卡一久久| 在线免费十八禁| 国产精品蜜桃在线观看| 80岁老熟妇乱子伦牲交| 欧美最新免费一区二区三区| 日韩av在线免费看完整版不卡| 亚洲国产精品专区欧美| 国产精品精品国产色婷婷| 一本久久精品| 婷婷色av中文字幕| 成人综合一区亚洲| h日本视频在线播放| 男人舔奶头视频| 日韩欧美三级三区| 久久99热这里只频精品6学生| 亚洲av免费高清在线观看| 亚洲图色成人| 欧美人与善性xxx| 在线观看av片永久免费下载| 精品人妻熟女av久视频| 中文字幕亚洲精品专区| 国产成人freesex在线| 中文字幕av成人在线电影| 国产精品av视频在线免费观看| 国产成人福利小说| 亚洲四区av| 日韩欧美国产在线观看| 少妇高潮的动态图| 亚洲乱码一区二区免费版| xxx大片免费视频| 69av精品久久久久久| 三级毛片av免费| 欧美一级a爱片免费观看看| 国产伦在线观看视频一区| 一区二区三区高清视频在线| 久久99热这里只有精品18| 久久99热这里只频精品6学生| 一级黄片播放器| 天堂网av新在线| h日本视频在线播放| 亚洲欧美日韩无卡精品| 一级a做视频免费观看| 免费观看的影片在线观看| 精品人妻一区二区三区麻豆| 三级经典国产精品| 国产极品天堂在线| 免费观看无遮挡的男女| a级一级毛片免费在线观看| 国产精品福利在线免费观看| 精品久久久精品久久久| 麻豆成人av视频| 亚洲国产av新网站| 久久99热6这里只有精品| 成人亚洲精品一区在线观看 | 国产午夜精品论理片| 亚洲欧美成人综合另类久久久| 亚洲最大成人手机在线| 日韩,欧美,国产一区二区三区| 国产 亚洲一区二区三区 | 好男人在线观看高清免费视频| 看黄色毛片网站| 最新中文字幕久久久久| 午夜精品在线福利| 欧美激情国产日韩精品一区| 亚洲18禁久久av| a级毛色黄片| 国产精品1区2区在线观看.| 天堂√8在线中文| 干丝袜人妻中文字幕| 老司机影院毛片| 色哟哟·www| 极品教师在线视频| 日韩一本色道免费dvd| 日本爱情动作片www.在线观看| 亚洲国产成人一精品久久久| 精品人妻偷拍中文字幕| 六月丁香七月| 高清视频免费观看一区二区 | 亚洲欧美成人精品一区二区| 亚州av有码| a级毛色黄片| 国产老妇女一区| 91久久精品国产一区二区三区| 亚洲国产成人一精品久久久| 男女啪啪激烈高潮av片| 插阴视频在线观看视频| 一个人看视频在线观看www免费| 亚洲国产精品专区欧美| 国产视频内射| 大话2 男鬼变身卡| 日日摸夜夜添夜夜爱| 成年女人在线观看亚洲视频 | 亚洲精品影视一区二区三区av| 夜夜爽夜夜爽视频| 精品一区二区免费观看| 啦啦啦啦在线视频资源| 国产永久视频网站| 春色校园在线视频观看| 成年版毛片免费区| 搡老乐熟女国产| 99热这里只有精品一区| 久久99蜜桃精品久久| 国产在视频线精品| 久久精品国产亚洲av涩爱| 丰满人妻一区二区三区视频av| 人妻系列 视频| 国产男女超爽视频在线观看| 搡老妇女老女人老熟妇| 久久久久久久久中文| 亚洲美女视频黄频| 国产乱来视频区| 夫妻性生交免费视频一级片| 青青草视频在线视频观看| 久久久a久久爽久久v久久| 国产黄频视频在线观看| 男人爽女人下面视频在线观看| 少妇熟女aⅴ在线视频| 九色成人免费人妻av| 女人被狂操c到高潮| 国内精品美女久久久久久| 国产黄片视频在线免费观看| 联通29元200g的流量卡| 国内揄拍国产精品人妻在线| 日本黄色片子视频| 欧美精品一区二区大全| 亚洲va在线va天堂va国产| 国产伦理片在线播放av一区| 久久久久久久午夜电影| 国产午夜精品一二区理论片| 97超视频在线观看视频| 蜜桃久久精品国产亚洲av| 久久久亚洲精品成人影院| 丰满少妇做爰视频| 三级经典国产精品| 久久97久久精品| 午夜视频国产福利| 99热网站在线观看| 亚洲av电影不卡..在线观看| 亚洲乱码一区二区免费版| 国产老妇伦熟女老妇高清| 久久久久国产网址| 国产精品精品国产色婷婷| 成人美女网站在线观看视频| 成人国产麻豆网| 99热这里只有是精品在线观看| 全区人妻精品视频| 一区二区三区免费毛片| 久久久久国产网址| 国产黄色小视频在线观看| av专区在线播放| 久久久久久久久大av| 美女高潮的动态| 纵有疾风起免费观看全集完整版 | 国产探花极品一区二区| 国产精品一区二区三区四区久久| 午夜久久久久精精品| 国产 一区精品| 国产老妇伦熟女老妇高清| 免费av不卡在线播放| 国产综合精华液| 联通29元200g的流量卡| 日韩三级伦理在线观看| 极品少妇高潮喷水抽搐| 亚洲怡红院男人天堂| 国产乱来视频区| 麻豆久久精品国产亚洲av| 亚州av有码| 久久午夜福利片| 精品一区二区三区视频在线| 国产亚洲最大av| 日韩 亚洲 欧美在线| 精品一区二区三卡| 精品一区二区三区人妻视频| 高清日韩中文字幕在线| 插阴视频在线观看视频| 国产乱人偷精品视频| 日本免费在线观看一区| 久久精品国产自在天天线| 亚洲国产最新在线播放| 国产精品麻豆人妻色哟哟久久 | 五月玫瑰六月丁香| 成年人午夜在线观看视频 | av国产免费在线观看| 国内精品宾馆在线| 亚洲在久久综合| 亚洲综合色惰| 久久久久精品性色| 99久久精品一区二区三区| eeuss影院久久| 日韩 亚洲 欧美在线| 最近中文字幕2019免费版| 久久久精品欧美日韩精品| 真实男女啪啪啪动态图| 2022亚洲国产成人精品| 亚洲aⅴ乱码一区二区在线播放| 一级毛片aaaaaa免费看小| 亚洲自拍偷在线| 在线免费十八禁| 免费无遮挡裸体视频| 国产高清国产精品国产三级 | 日韩av在线大香蕉| 高清在线视频一区二区三区| 2022亚洲国产成人精品| 卡戴珊不雅视频在线播放| 亚洲av成人精品一区久久| 2022亚洲国产成人精品| 亚洲综合精品二区| 内射极品少妇av片p| 亚洲国产欧美人成| 丝瓜视频免费看黄片| 成人毛片a级毛片在线播放| 能在线免费看毛片的网站| 久久久久久久久中文| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 一区二区三区四区激情视频| 国产乱人偷精品视频| 国内少妇人妻偷人精品xxx网站| 欧美日韩视频高清一区二区三区二| 尤物成人国产欧美一区二区三区| 2021天堂中文幕一二区在线观| 日韩欧美精品免费久久| 国产免费又黄又爽又色| 久久久久精品久久久久真实原创| 国产乱来视频区| 波野结衣二区三区在线| 亚洲国产欧美人成| 99久久人妻综合| 国内少妇人妻偷人精品xxx网站| 丰满少妇做爰视频| 十八禁网站网址无遮挡 | 国产综合精华液| 日本一本二区三区精品| 日韩欧美精品v在线| 亚洲va在线va天堂va国产| 伦精品一区二区三区| 国产国拍精品亚洲av在线观看| 嘟嘟电影网在线观看| 大话2 男鬼变身卡| 一区二区三区免费毛片| 日韩成人伦理影院| av免费在线看不卡| 亚洲一区高清亚洲精品| 国产女主播在线喷水免费视频网站 | 国内精品宾馆在线| 欧美日本视频| 国产成人免费观看mmmm| 国内精品宾馆在线| 熟妇人妻久久中文字幕3abv| 免费电影在线观看免费观看| 免费黄色在线免费观看| 色综合色国产| 九色成人免费人妻av| 欧美日韩亚洲高清精品| 人妻夜夜爽99麻豆av| 啦啦啦中文免费视频观看日本| 精品久久久噜噜| 亚洲精品成人久久久久久| 日韩亚洲欧美综合| 九草在线视频观看| 一级a做视频免费观看| 色尼玛亚洲综合影院| 男女边摸边吃奶| 欧美zozozo另类| 国产午夜精品一二区理论片| 菩萨蛮人人尽说江南好唐韦庄| 日本一二三区视频观看| 久久精品国产亚洲av涩爱| 亚洲18禁久久av| 国产一级毛片在线| 日韩欧美精品v在线| 免费看日本二区| av国产免费在线观看| 中文字幕制服av| 五月伊人婷婷丁香| 狠狠精品人妻久久久久久综合| 免费播放大片免费观看视频在线观看| 高清在线视频一区二区三区| 色吧在线观看| 你懂的网址亚洲精品在线观看| 大片免费播放器 马上看| av天堂中文字幕网| 亚洲av免费高清在线观看| 我的老师免费观看完整版| 成年人午夜在线观看视频 | 一区二区三区乱码不卡18| 国产老妇女一区| 禁无遮挡网站| 国产爱豆传媒在线观看| 久久人人爽人人片av| av在线观看视频网站免费| 亚洲成人一二三区av| 欧美日韩精品成人综合77777| 久久久久久久国产电影| 日韩伦理黄色片| 丝瓜视频免费看黄片| 久久久久久久久大av| 亚洲人成网站高清观看| 精品久久久久久久久av| av在线亚洲专区| 观看美女的网站| 黄色配什么色好看| videossex国产| 亚洲第一区二区三区不卡| 最近手机中文字幕大全| 午夜福利高清视频| 青春草国产在线视频| 日本色播在线视频| 久久久久久久大尺度免费视频| 日韩不卡一区二区三区视频在线| 最近最新中文字幕大全电影3| 97超视频在线观看视频| 欧美变态另类bdsm刘玥| 一夜夜www| 伦理电影大哥的女人| 日韩欧美精品免费久久| ponron亚洲| 国产视频内射| 午夜福利在线在线| 熟女人妻精品中文字幕| 国产一级毛片七仙女欲春2| av在线播放精品| 精品国内亚洲2022精品成人| 亚洲精品乱码久久久久久按摩| 日日摸夜夜添夜夜爱| 91精品国产九色| 熟女电影av网| a级毛片免费高清观看在线播放| 国产中年淑女户外野战色| 伊人久久精品亚洲午夜| 亚洲最大成人av| 夜夜爽夜夜爽视频| 菩萨蛮人人尽说江南好唐韦庄| 蜜桃亚洲精品一区二区三区| 亚洲精品乱码久久久久久按摩| 亚洲精品国产av成人精品| 99久久九九国产精品国产免费| 最近视频中文字幕2019在线8| 国产色爽女视频免费观看| 精品一区二区免费观看| 成人亚洲精品av一区二区| 欧美日韩在线观看h| 老司机影院成人| 淫秽高清视频在线观看| 成年女人在线观看亚洲视频 | 国产成人福利小说| 亚洲在线自拍视频| 国产午夜精品久久久久久一区二区三区| 亚洲一区高清亚洲精品| 91av网一区二区| 成人鲁丝片一二三区免费| 亚洲精品,欧美精品| 麻豆av噜噜一区二区三区| 2021天堂中文幕一二区在线观| 午夜激情福利司机影院| 亚洲成人av在线免费| 午夜福利视频精品| 少妇高潮的动态图| 久久韩国三级中文字幕| 亚洲成色77777| 日韩成人av中文字幕在线观看| 欧美激情国产日韩精品一区| 九色成人免费人妻av| a级一级毛片免费在线观看| 国产一区二区亚洲精品在线观看| 国产伦精品一区二区三区四那| 少妇被粗大猛烈的视频| 狂野欧美白嫩少妇大欣赏| 国产午夜福利久久久久久| 好男人视频免费观看在线| 久久久久免费精品人妻一区二区| 国产精品三级大全| av专区在线播放| 国产高清国产精品国产三级 | 亚洲精品国产av成人精品| 成年版毛片免费区| 久久午夜福利片| 久久精品国产亚洲av涩爱| 欧美一区二区亚洲| 特级一级黄色大片| 视频中文字幕在线观看| 日韩在线高清观看一区二区三区| 久久久国产一区二区| 精品一区二区三卡| 精品午夜福利在线看| 国产色爽女视频免费观看| 一级毛片 在线播放| 日日啪夜夜爽| 国产精品av视频在线免费观看| 欧美极品一区二区三区四区| 国产一区二区在线观看日韩| 亚洲精品456在线播放app| 只有这里有精品99| 国产中年淑女户外野战色| 亚洲精品亚洲一区二区| 亚洲成人久久爱视频| 国产爱豆传媒在线观看| 亚洲成人久久爱视频| 日韩一本色道免费dvd| 精品人妻熟女av久视频| 成人毛片60女人毛片免费| 男人和女人高潮做爰伦理| 国产精品一区二区性色av| 男人爽女人下面视频在线观看| 两个人的视频大全免费| 精品人妻熟女av久视频| 日韩av在线免费看完整版不卡| 亚洲精品第二区| 精品人妻偷拍中文字幕| 中文字幕免费在线视频6| 国产国拍精品亚洲av在线观看| 不卡视频在线观看欧美| 国产精品嫩草影院av在线观看| 国产亚洲5aaaaa淫片| 久久久久久久久久久丰满| 丰满乱子伦码专区| 黄色一级大片看看| 午夜爱爱视频在线播放| 最新中文字幕久久久久| 天堂av国产一区二区熟女人妻| 少妇猛男粗大的猛烈进出视频 | 亚洲欧美成人综合另类久久久| 国产精品一区www在线观看| 麻豆精品久久久久久蜜桃| 赤兔流量卡办理| 日韩不卡一区二区三区视频在线| 最近2019中文字幕mv第一页| 久久久午夜欧美精品| 亚洲精品中文字幕在线视频 | 亚洲自拍偷在线| 极品教师在线视频| 少妇丰满av| 亚洲欧美中文字幕日韩二区| 欧美精品一区二区大全| 亚洲精品第二区| 日本色播在线视频| av黄色大香蕉| 免费不卡的大黄色大毛片视频在线观看 | 熟妇人妻久久中文字幕3abv| 亚洲一级一片aⅴ在线观看| 亚洲三级黄色毛片| 我要看日韩黄色一级片| 伦精品一区二区三区| 国产精品久久视频播放| 大陆偷拍与自拍| 成人性生交大片免费视频hd| 黄片无遮挡物在线观看| 在线免费观看不下载黄p国产| 蜜臀久久99精品久久宅男| 国产单亲对白刺激| 3wmmmm亚洲av在线观看| 天堂俺去俺来也www色官网 | 91在线精品国自产拍蜜月| 午夜福利网站1000一区二区三区| 超碰97精品在线观看| 国产一区亚洲一区在线观看| 免费大片黄手机在线观看| 国产精品美女特级片免费视频播放器| 亚洲国产av新网站| 特大巨黑吊av在线直播| 亚洲av福利一区| 欧美激情久久久久久爽电影| 亚洲人与动物交配视频| 一级毛片 在线播放| 亚洲在久久综合| 亚洲国产精品成人久久小说| 99久久精品热视频| 中国美白少妇内射xxxbb| 99久国产av精品国产电影| 精品久久久久久久久亚洲| 天堂av国产一区二区熟女人妻| 国模一区二区三区四区视频| 亚洲欧美日韩无卡精品| 欧美97在线视频| 少妇裸体淫交视频免费看高清| 亚洲精品aⅴ在线观看| 九九爱精品视频在线观看| 中国国产av一级| 亚洲电影在线观看av| 亚洲国产成人一精品久久久| 亚洲精品国产成人久久av| 亚洲国产高清在线一区二区三| 女的被弄到高潮叫床怎么办| 国产精品日韩av在线免费观看| 美女脱内裤让男人舔精品视频| 免费看av在线观看网站| 国产亚洲91精品色在线| 国产精品1区2区在线观看.| 久久精品国产亚洲网站| 美女黄网站色视频| 国产成人freesex在线| 最近的中文字幕免费完整| 日韩欧美三级三区| 99久久九九国产精品国产免费| 日韩一区二区三区影片| 久久人人爽人人爽人人片va| 免费av不卡在线播放| 婷婷色av中文字幕| 97在线视频观看| 日本免费在线观看一区| 国产91av在线免费观看| 成人漫画全彩无遮挡| av在线蜜桃| 日韩欧美国产在线观看| 国产av国产精品国产| 亚洲真实伦在线观看| 天堂网av新在线|