• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Silent Zone for Source-Location Privacy Based on Context-Awareness in WSNs

    2018-03-29 07:36:11ZhouQianQinXiaolinDingYouwei

    Zhou Qian,Qin Xiaolin ,Ding Youwei

    1.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,P.R.China;

    2.Jiangsu Key Laboratory of Internet of Things and Control Technology,Nanjing 211106,P.R.China

    0 Introduction

    The sensors,due to their small size,and strong networking performance,are easy to maintain and deploy[1,2].Sensor networks are widely used in some sensitive environments such as the battlefield,and some wild animal reserve areas.For instance,in a wireless sensor network(WSN)for monitoring wild endangered animals,an electric sensor carried by apanda can send its own information to the sensors nearby,and then the event is transmitted through the WSN to the monitor center(sink).The first sensor that receives the signals from the monitoring asset such as the panda,is called the source node,as shown in Fig.1.An attacker in the vicinity of V1,carrying apiece of signal detection equipment to eavesdrop,moves to V2according to the context infor-mation of the network such as the packet′s sending time and the location of the sending node,and he will repeat this process until he approaches the source node,namely the location of the panda.In the end,the privacy of the source location is disclosed.

    Fig.1 Attack based on context

    In practice,the object sensed by the source node normally demands for key protection,so the source location should not be revealed in the process of data transmission,in order to avoid severe loss of economy or resources.As a kind of privacy information,the source location can only be visited by the authorized person.The privacy can be classified into the content-based and the context-based[3].The content-based privacy refers to the integrity and confidentiality of the content,that is,the content cannot be tampered.The privacy discussed in this paper is based on the context,which can be obtained by attackers to infer the source location.

    The prior technologies for preserving the source privacy are implemented mainly by changing or increasing the current routing paths,such as phantom routing,multi-path routing,dummy sources injection and other security routing mechanisms.These technologies may achieve a certain safety at high expense of delay or energy cost,so they are not feasible for the wireless sensor networks(WSNs)application which have high requirements of efficient energy or real-time response.For instance,the main idea of multipath[4]is that packets are sent firstly to the pseudo source,and then to the sink by single path routing or flooding.Because the attacker is not visible in WSNs,in order to choose the pseudo node[5],we need to know the entire network topology.Hence,the methods for choosing pseudo sources are normally very complex,leading to great energy cost and packet delay[6].Furthermore,the routing with topology information is vulnerable to traffic analysis of global attackers[7].

    In an event-driven WSN,the routing is normally on-demand.For a specific event,it will choose the corresponding routing strategy.For example,in a wildlife reserve,for the requirement of privacy,a security routing is applied to transmit animal information through the monitoring WSN.In addition,the sensors will work as soon as an emergency is detected,when a shortest-path routing or flooding is usually applied due to the shortest delay.However,these schemes are vulnerable for revealing the location privacy[4]easily.In order to deal with these problems,it is urgent to find a kind of secure mechanism that not only has little impact on the original routing,but also can resist the attacker′s traffic analysis[8].

    With the development of hardware technologies and reduction of the cost,some monitoring sensors which are applied in critical applications,such as border surveillance and endangered animal reservation,are equipped with the sensor modules for detection of moving objects[9]and electric signals.These sensors can automatically recognize one moving attacker[10,11],and then broadcast the location of the attacker to its neighbors by beacon signals.Rios et al.proposed a greedy routing algorithm of context-aware location privacy(CALP)[12]and silent zone(SZ)scheme based on such attacker-recognition technology.However,according to the Kerckhoffs′principle,the attacker will know the whole design of the secure system.We assume that the attacker knows the routing protocol and can decrypt the security protocol.Although CALP is also based on the shortest path,the packet would have great delay,because the privacy preserving function depends on the beacon scheduling to update the routing table every time,when the period of beacon increases.The application of beacons has brought new challenges to the network performance[13].Despite the high privacy of SZ by isolating attackers from the whole network,the packet fails to be delivered successfully when a patient attacker stays near the sink.

    The scheme presented in this study is independent from beacon frequency and can subtly entice adversaries far away from the real routing path.Therefore,as our scheme causes the least impact on the original routing,the packet can be delivered efficiently to the sink with no more delay.In this process,the location privacy is also preserved by stopping attackers from receiving any information.The main contributions of this paper are summarized as follows:

    (1)We propose an intelligent silent zone(ISZ)mechanism to preserve the source location privacy,by enticing the attackers away from real packet routing path in a silent zone.

    (2)ISZ can preserve the source location privacy even when the attacker knows the routing protocol.Besides,this scheme is applied in a universal scenario regardless of the routing policy.

    (3)The path bias is introduced to measure the impact of secure policies on the current routing.ISZ mechanism can maintain the original path to the great extent.

    1 Related Work

    The research on the source location privacy(SLP)[2,14]in WSNs has been drawing significant attention.According to their abilities,attackers come in two varieties,local and global.The global[7,15]one can know the whole network traffic.In order to resist the attacker′s global traffic analysis,dummy packets are usually injected in the real packet transmission interval,resulting in considerable energy cost.And the multi-path routing[6]can enhance the load balance and quality of service(QOS),which makes the global attacker difficult to track the packets[5].The local attacker[16]can receive the information in the vicinity of him,while multiple local attackers can cooperate with one each other to get a wider range of network information[17].As a local attacker,whose location is still invisible like a ghost to the entire network,he can analyze the network traffic to infer the source location.Previous studies have shown that there are mainly three techniques to hide the traffic.One is the phantom routing[4]proposed by kamat et al.in their panda-h(huán)unter model for the first time,which includes the first step of having random walk to a phantom source,followed by the shortest path or flooding to the sink in the end.However,as random walk increases,the packet gradually approaches the source node[4,18],indicating the revelation of the source location in turn for a random walk phase.Shortly afterwards,some improved algorithms such as greedy random walk (GROW)[19]are proposed,which are associated with more energy cost to reduce the transmission delay and improve the security.The other two schemes are dummy packets mechanism[3,20]and pseudo source node mechanism[7,21].These two methods can resist more powerful attackers,but because the number and the location of pseudo nodes are randomly distributed,some unnecessary energy cost is unavoidable.

    With the development of the hardware,the attacker will be in visible for the wireless sensor network.By using the characteristics of attacker perceiving[12],nodes relatively far from the attacker are chosen as the shortest path to the sink,which brings a new idea for solving this kind of problem.Moving object recognition technology[9-11]in resisting the attacker,enhances the certainty of the strategy,instead of randomness.However,the authorized moving objects can be allowed to enter the WSN,such as scientists detecting data in the field.Merely a simple authentication mechanism[22,23]can exclude the unauthorized migration of mobile objects.Between the external moving objects and sensors,the establishment of session key based on elliptic curve cryptography(ECC)is more simplified with smaller public key,compared with non-ECC mechanisms.

    To further reduce the overhead of data transmission,according to the characteristics of the IEEE 802.15.4MAC layer,Shao et al.[24]made use of the payload of beacons to transmit data,which will be extracted through programs in the application layer.In addition,the Mac layer for maintaining a reliable communication link,can also be used to broadcast information by beacons.The MAC mentioned here is beacon-enabled,and the influence of varied MAC protocols on the network performance is different.According to Ref.[25],a short interval between beacons will cause too much synchronization overhead,while a long interval will result in a longer guardian time for the time drift.The beacon interval can be adjusted adaptively according to the network traffic,such as changing the duty ratio to increase the throughput for tunable media access control(TMAC)and sync-MAC(S-MAC)[26].The frequency can also be changed by the software depending on the specific application.There are two advantages of using beacons to transmit the data,the first is energy saving,and the second is to hide the path.

    2 Problem Description

    2.1 Network model

    In a homogeneous wireless sensor network,there are Nnodes{ni|1≤i≤N},and each sensor has the same computing and storage capacity,with every node of niknown their location(xi,yi)and the sink(xs,ys).

    Assuming that the sensors are deployed in a free plane space,the distance between sensors is the Euclidean distance.If the location of node v1and v2are located respectively in (x1,y1)and(x2,y2),the distance between v1and v2is

    If there are a few neighbors in a sparse network,an attacker is easier to locate the sender near him.So the nodes of network are densely connected.

    In the view of the external attacker,the format and the size of each packet is the same,and the node′s identity information is encrypted to prevent an attacker from decrypting the contents of packets,therefore he cannot distinguish between true packets and pseudo ones.

    As mentioned earilier,the attacker-recognition module can tell the location of the attacker H(xh,yh).The authorization mechanism is introduced to eliminate the interference in the process of identifying moving objects,and the unauthorized target(with electromagnetic signal)is regarded as an attacker.The moving object authorization is ignored,for example,the scientists carry a personal device to examine the data collected in the field,so such moving object is not an attacker.

    2.2 Attack model

    Due to the limited communication range of each sensor node in WSNs,the packets are transmitted hop by hop.The attacker locates the base station or the data source by using the time dependence of the packets and the traffic patterns.According to the attacker's reaction when he receives a packet,attackers come into two types[27]:(1)The patient attacker,he will not move until he receives a new packet,and then moves to the direct direction of the packet sending;(2)The cautious attacker,if he has been waiting at a node for a new packet for a fixed time,he will return back to the last location.No standards can be used to distinguish the ability of these two type attackers,for the perceptive attacker has the path analysis ability.While in some cases,the patient attacker can provide much more safety,which will be elaborated in Section 4.Therefore,when designing privacy schemes,we should take these two types of attackers into account.

    We assume that the attacker is local and passive.Local means that the attacker′s observing scope is only the sensors in his vicinity,and passive indicates that the attacker does not have any functional impact on the sensor network.The attacker knows the location of the sink node.As an external attacker,he can only eavesdrop on the packets in WSNs,but not control any internal sensor nodes.

    According to the angle and the strength of the received transmission signal,the attacker strarts from the sink node and follows the direction of the direct sender to capture him.If the attacker does not receive any packets within a certain period of time T,he will have random walk to find a node sending apacket,and continue to eavesdrop.Here:

    (1)If the time of Tis short,it is a curious attacker;

    (2)If Tis infinite,it is a patient attacker.

    An attacker moves at a constant speed of VA,where VA≤Vmand Vmrepresents the speed of packets between nodes.The eavesdropping range of an attacker is not greater than the communication range of a node,that is,D ≤ R,where Dand Rrepresent the eavesdropping range and the communication radius of the sensor node,respectively.

    3 Method

    3.1 Attack-preserving technology

    Traditional intrusion detection system is unable to detect the attacker since the passive attacker has no affection on the whole network.While because of the inherent character of the attacker as a moving object with electromagnetic signal,sensor nodes equipped with special models can monitor and track unauthorized moving objects[28].

    The sensor node applied here includes two functional models:M-DS and control mode,as shown in Fig.2.

    Fig.2 Functional models

    The module is used to detect whether an attacker is nearby,relying on the existing technology.If an attacker approaches,an alarm is sent by the M-DS module to the control module.The control module then transmits beacon signals to inform sensors nearby.

    3.2 Silent zone scheme

    SZ scheme is introduced by Rios in Ref.[12].The main idea is that as soon as the mobile attacker is detected by the sensor nearby,the senor will notify all other neighbours of the attacker′s location,and the neighbours that receive the warning message will be set silent.All silent nodes fail to forward packets any more,even if they receive these packets and then discard them.We call these nodes as SILENT,which can be achieved by the software.

    Definition 1There are four possible states defined by an enum.SLEEP and ACTIVE are steady states and SEND is transient,and SILENT is also a transient state that the nodes will simply discard or store the packets they receive,without forwarding it.

    Once an attacker appears,all nodes within the security boundary are notified by the aforementioned beacons.If the node H _node is the first one that detects the attacker,it can determine the location of the attacker,and then send a beacon.Taking H_node as the center of a disk,all the sensors within communication radius R will receive the Rsignal and set their states to be silent.

    Each node knows the location of the sink and its own,and can send information by beacon signals.Intuitively,the SZ mechanism significantly decreases the number of real packets captured by an attacker.According to the attack model in Section 2.2,the attacker will walk randomly until he captures a packet in the network.When the attacker is close to the real data transmission path,the next delivery will deviate from the original route.Such deviation will lead to an increase in the path length and the energy consumption of the network.With the increasing number of walk steps,the walk area is increasing accordingly.If the source node is close to the sink node,the attacker can find the source node in a short time by completely random walking.

    In order to prevent attackers from receiving new packets by SZ mechanism,there are two disadvantages when an attacker is near the sink node:(1)It would make packets not arrive at the destination,resulting in a very low delivery rate.The corresponding solution is that when the attacker is in the vicinity of the sink,the minimum safety distance is set small,and when the attack-er is far away,the minimum safety distance is changed back to the communication radius.(2)It would make the attacker easier to find the source node nearby,because no packer is captured by the attacker,and then he will have a random walk,as discussed before.

    The advantages of completely isolating the attacker from real packets is obvious.The attacker can not receive any context information any more,meanwhile he has random walk.Given the current node position as CN0(x0,y0)after h step,the coordinate can be followed as

    X=CNi-CNi-1(i>0),where Xis an independent distribution of random variables,namely{(1,0),(-1,0),(0,1),(0,-1)}.

    k·hwalkis distance from CN0to the location after hwalkstep,where{k|0<k<1},the asymptotic probability of k·hwalkis as follows

    When the number of hwalkcontinues to increase,the probability of going back to the original location for the attacker tends to 1.The attacker can only walk around for ensuring the location privacy of the source node.When the distance between the source node and the sink is relatively small,the source node is within this small range.As the hwalkincreases,the source node could be found only in a limited time.However,it has been proved that when the source node is far away from the attacker,the probability of finding the sink node is very small.Therefore,one of the design goals in this paper is to let the attacker move away from the source node,which can be achieved as long as the moving direction of packets captured by the attacker is opposite to that of the source.

    When the attacker is near the original routing path,the longer the minimum safety distance is,the more deviation of the routing path will be.It will lead to great energy consumption.Worst of all,it will result in the instability of the network.In order to make privacy protection mechanisms to be more widely used,it is necessary to let the attacker far from the source,and at the same time to remain the original routing path unbiased.The routing path bias is defined in the next section.The smaller routing path bias,the higher quality of network service.

    3.3 The proposed mechanism

    First,we need to define the routing path bias.The smaller routing path bias will has the less impact on the original routing path.

    Definition 2Givenμas the mean length of routing paths.When the security mechanism is applied and the length of the ith routing path is counti,the routing path bias S2is defined as follows

    To minimize the routing path bias,we need to optimize SZ scheme.This article presents a novel solution called ISZ,whose main idea is that the routing for real packets is complemented outside the silent zone,and while the packet routes are near the silent zone,a false packet is sent to a bait node chosen intelligently,to entice the attacker away from the original routing path.The false packets can get through the silent zone,which will be described as shown in Table 1.Here,the greedy shortest path routing is chosen for the efficient purpose.The specific steps of ISZ will be described below.

    Communication between sensors,we adopt acknowledgement mechanism to ensure the reliability of data transmission.As shown in Fig.3,when the node Aforwards a packet Mto B,A will receive an implicit confirmation when Bforwards the packet Mdownstream.If Adoes not hear B′s acknowledgement in some abnormal situations,such as interruption of link or silent state of nodes,the node A will notify its neighbors of their current states,and then select the next hop node prior to retransmitting the packet.The blue shadow section indicates the zone or area of an attacker′s eavesdropping.Fig.3illustrates an attacker walking away from the delivery path of the real packet.The dashed arrow represents the state that after the node A has delivered a packet to B successfully,B is broadcasting a packet.If B receives an acknowledgement from C,the dashed arrow will change into the solid line like that from Ato B.

    Fig.3 Packet transmission outside the silent zone

    The number of the relaying nodes and selection strategies varies depending on the routing protocols.For the greedy shortest path routing protocol,we assume that the node Ois supposed to be the next hop of A.When Oreceives A′s signal,the state of Ois silent(in shadow warning area).As mentioned above,Ochanges into a silent state when it receives the warning beacon signal from H_node.Therefore,the packet will be discarded,as shown in Fig.4(a).Provided that the node Acannot receive the acknowledgement from the node O,it will reselect a new relay for the real packet and simultaneously send a false packet M.The detailed process is carried out in two phases,an update phase and an operational phase.

    Fig.4 Illustration of a packet delivery process

    We assume that each sensor has a list of its neighbors.In the update phase,the node Aobtains all the information of its neighbor nodes which belongs to SET-Nei_A,using one-h(huán)op broadcast message.According to the states information of neighbors,the currently active neighbors′information is updated as SET_Active_A,where SET_Active_A=SET_Nei_ASET_Silent_Zone.In the operational phase,Band B′are chosen to be the successor of A.The node Bis for the real packet M,and B′is for the false packet M ,as shown in Table 1.From the perspective of an attacker,Mhas no difference from M.The node which receives M,will continue to deliver Mto the next hop Next_Hop_Real according to the original routing outside the silent zone.While the node chosen to forward Mwill elect the next hop Next_Hop_Fals according to Algorithm 1.

    Table 1 Two types of packets

    Algorithm 1The next hop outside the silent zone

    In the update phase,the node Acan identify the silent nodes by the feedback from its neighbors.For example,the nodes which are geographically adjacent in the silent zone,such as O and O1,are concluded to be in silent states because they are unable to send acknowledgements to A.The nodes which send acknowledgements are intuitively evaluated to be active,as shown in Fig.5.Although there are some nodes that do not send signals because of other abnormal factors,such as energy depletion,one of the reasons that these nodes are not identified to be silent is that their geographical locations are not contiguous.However,such abnormal situation is beyond our scope of discussion,and there are only two states are taken into account,silent and active.After the update,as shown in Fig.4(b),the active node B,which is closest to the sink,is chosen according to the greedy shortest path routing protocol.As each node knows the location of its own and the sink according to the neighbor list as shown in Table 2,where Ddenotes the distance,we also can select the node B′to forward the false packet,and the selection principle is that the node should be close to the silent zone but away from the node O.As shown in Fig.5,B3is the best node because it is further away from Othan B1 and B2and closer to the silent zone than B4.Obviously,B′is the locally optimal relaying node,if X,B′∈SET_Active_A∧X≠B′,∠BOX≤∠BOB′.

    Fig.5 Neighbours′state

    Table 2 List of A′s neighbors

    Algorithm 2 Choosing a bait node intelligently in silent zone

    Step 1First,the neighbors′states are obtained by the current node,and two sets are classified:the set of silent neighbors SET_Silent_Current and active neighbors SET_Active_Nenode.

    Step 2If there is one of the silent neighbors of the current node in SET_Silent_Curren,and this neighbor node′ meets the requirement,namely d(node′,O)> R,where Ris the attack radius,node′is the bait_node we are looking for.Otherwise,go to step 3.

    Step 3If the node′is not in the silent zone or d(node′,O)≤R,the current node will continue to search the next hop Next_Hop_False(Current_node),which is the nearest to the silent zone,as presented in Algorithm 1.Move to the next hop,and initialize this node into the Current_node.

    Repeat the above steps until the required bait_node is met,as shown in Fig.4(c).The false packet continues to being forwarded prior to being broadcast by the bait node.The one-h(huán)op broadcast packet entices the attacker to move away from the original routing path.The nodes which receive this fake packet simply discards it.Besides,in order to select the optimal bait_node,we need to ensure our network is deployed densely.

    3.4 Privacy analysis

    As shown in Fig.6,the network employing ISZ mechanism will have the following two states depending on the location of an attacker.The first state is cautionary when the attacker is close to the routing path.For the contextual privacy,a longer route is chosen to avoid the attacker′s eavesdropping.In the meantime,the attacker will receive false packets from a bait_node,instead of real messages.As a consequence,the attacker will move to the bait_node,which is far away from the original routing,and achieve the second state,that is,safe state.In the safe state,the routing bias caused by the SZ mechanism will gradually disappear and the packet will be delivered by the original routing.

    Definition 3In order to measure the privacy performance of the network,for a single attacker with definite attack model,safety period and capture likelihood[4]are adopted.

    (1)safety period§ :The number of monitoring data sent by the source node,before the attackers capture it.

    (2)likelihood L:In a fixed time,the probability that attackers capture the source node.

    Fig.6 Two state models

    Before the source node is captured,the more packets are sent,the longer the safety period is,and the higher the privacy level is.Within a fixed time and distance from the source node to the sink,s-d,the higher the capture likelihood is,the worse the privacy level is.

    As mentioned before there are two states in Fig.6.We assume that the probability of the network in the cautionary state is PC.As the area of the silent zone increases to cover the attacking range,the attacker can no longer receive any real packets.Therefore,the real packet capture likelihood is 0.Meanwhile,the attacker will track the false packets.Consequently,the network changes into a safe state,whose probability is assumed to be PS,as shown in Fig.6(b),when the attacker can receive neither real nor false packets.For a patient attacker,he will stay there all the time(for a long time),and the privacy of the network is guaranteed,that is,the source capture likelihood is 0.For a curious attacker in the safe state,he will have random walk,so the source capture likelihood is L=PS/N (Nis the number of sensor nodes in the network).When he moves close to the routing path,he will be enticed by the bait node.As a result,the source capture likelihood for a curious attacker in the cautionary state is L=PC×0=0,because he will receive none of real packets and move to a false direction.So,the probability of capturing the source for a curious attacker is PS/N,where PC+PS=1.

    As seen from Fig.6intuitively,the attacker does not interfere with the network in the safe state,while in the cautionary state,the length of real-packet path increases and false packets will generate extra energy.Therefore,we will briefly estimate the energy consumption theoretically,and in the next section,the performance of our proposed mechanism in the network will be verified experimentally.

    3.5 Energy analysis of ISZ

    Initially,an attacker starts from the sink,and the source begins to deliver the data to the sink.Assuming that the energy caused by beacons is negligible,the delay and the energy cost in the network is mainly attributed by packet transmission and reception.Therefore,the routing path length and the number of packets sent and received are mainly calculated.

    In the best case,the attacker is far away from the real transmission path,as shown in Fig.6(b).Without false packets,the energy is simply related to the routing protocol.Generally,since the shortest path costs the least energy,assuming the shortest path length is h,the total energy consumption of transmission for each event to the sink is=h·Esr,where Esris the energy cost of the transmission and reception of each packet for a single node.The path bias is affected by the attackering area.In the worst case,the real routing path and the false path nearly circle around the attacking range,as shown in Fig.6(a).Let the radius of the eavesdropping area be Rhops,and assuming that the real packet length is h,the total energy consumed for each event to the sink in the worst case is a-average energy is

    4 Performance Evaluation

    A simulator Castalia based on OMnet+ +is applied to verify the efficiency of our methods.We deploy a squared field of 100×100m,where all sensors are distributed uniformly.The sink is arranged randomly in the central.Assuming that there is only an attacker,we let the monitored source asset be located in different distance from the sink.The MAC protocol is based on IEEE 802.15.4,including information load part as mentioned above.Once an attacker is detected,an alarm beacon is sent.Although ISZ does not reply on the routing protocol,in this comparative evaluation,we use ISZ based on shortest-path routing(SP),which is also applied as a baseline to reflect the impact of other approaches along with phantom routing(PR)and CALP[12].The phantom algorithm has been discussed in the second chapter,and the process of attacker-detection in CALP is also based on the beacon technique.The main process of CALP is that each node maintains a routing table containing all its neighbors.When an attacker is found,a beacon is broadcast to update the routing table,in which the node closet to the shortest path and furthest to the attacker is chosen as the next hop node.Here we will analysis not only the curious but also the patient attacker.The beacon does not cost additional energy,but dummy packets does.The simulation is carried out for 50times,and a total of 500new packets are sent from the source node for each time.

    (1)Delay.Delay means the sending time of a packet from the source to the sink,which includes two aspects:one is the delay caused by the beacons,and the other is packet delay due to routing policies,such as re-transmission time,routing path and etc..Therefore,relying on the beacons to update the routing table,CALP policy have a great delay,which depends on the beacon updating frequency and the path length.The path length in CALP changes when the attack type changes.Compared with the curious attacker,the patient attacker causes much more delay in CALP,as shown in Fig.7.Because CALP needs more time for beacons to update the routing,it causes more delay than other mechanisms.

    Similar to CALP,the path bias of SZ is also affected by attack types.When a curious attacker does not receive any packets,he would be likely to walk randomly around the sink.Therefore,the delivery path to the sink is unstable,and the latency in this case is slightly higher than that in PR and SP,as shown in Fig.6(a).Nevertheless,for a patient attacker,SZ leads to significantly higher delay than that of SP,as shown in Fig.7(b).Because when the attacker is near the sink,the path bias is great,leading to more than 97%of packets that can not be delivered to the sink.Suffering from great delay,some packets jump 157hops before reaching the sink node.The delay in phantom routing is higher than that in SP for the additional steps by random walk.The phantom routing method will not be affected by the attack types,so the packet delay has nothing to do with the patient or curious attacks.

    Delivery time in ISZ,similar to that in SP,only depends on the path length (i.e.,the source to the sink distance is s-d),regardless of beacon intervals,which have affection on network traffic.In fact,the curious attacker will have random walk for he can not receive any packets near the sink.In ISZ,it is less likely to get close to silent zones in the vicinity of source routing,so it will not cause much bias to the original path as pure SZ method does,and the increased traffic is very limited.An attacker starts from the sink and the initial data approaches to the sink when ISZ mechanism plays a role,especially for a patient attacker who will be enticed away from the original path,causing no more additional delay.

    Fig.7 Packets delay comparison using different mechanisms for two kinds of attackers

    (2)Privacy.There are two main measures of privacy:safety period and capture likelihood.We conducted 50experiments,and use the capture times to measure the source privacy in a given time.The less times to be captured are,the longer the safety period will be.The smaller the capture likelihood is,the higher the privacy will be.As shown in Fig.8,with the increase of s-d,the privacy of the shortest path do not increase.On the contrary,it is the worst,because once a packet is captured,the attacker will follow the shortest path to find the source.As our experiment shown,the capture likelihood of a curious attacker is less than that of a patient attacker.That is because the curious attacker will walk away from the sink if he waits awhile without receiving any packets.Thus,the patient attacker has a higher capture likelihood.Phantom routing in the simulation is no better than the shortest path when a patient attacker,as s-d increases,the random walk increases,the curious attacker would receive none of packets due to leaving away from the real transmission path,and lose some chances to capture sources.The essence of CALP is the greedy shortest path routing,but choosing the most furthest one from the attacker.Obviously,since CALP is related to the eavesdropping range of the attacker,in the simulation when the communication radius is set as the same as the eavesdropping range,the patient attacker can receive a few real packets in the vicinity of the sink,while the curious attacker also can catch the source after random walk if the attacker does not receive any information,when s-dis short.

    Because he cannot receive any packets in SZ,the curious attacker will have random walk according to the probability distribution of random walk in Eq.(3).When the source is close to the sink,the attacker would walk to the source and capture it,as shown in Fig.8(a).For the patient attacker,he will not receive any packets for tracing source and stay where he is.Therefore,SZ has the better privacy for a patient attacker than that for a curious attacker.In ISZ,when the distance between the sink and the source is short,the attacker has high capture likelihood for h is small at this time.Because of the interference by dummy packets,ISZ has more privacy than SZ when facing a curious attacker,as shown in Fig.8(b).With the increase of s-d,the corresponding routing path h will increase.Both for curious and patience,ISZ has excellent performance in preserving the privacy of the source location.

    Fig.8 Privacy performance comparison using different mechanisms for two kinds of attackers

    (3)Path bias.According to Definition 2,the path bias shows the impact of security mechanisms on the original routing.The pure SP routing has almost no bias because the path is deterministic.Four kinds of privacy schemes are ana-lyzed here,and the shortest path is selected as the original routing path.As shown in Fig.9,PR has the biggest path bias,compared with other three mechanisms.The path bias of PR depends the number of hops of random walk,irrelevant to the types of attackers.The bias value for PR is unstable,because the direction of random walk is uncertain.If the direction is against the sink,the bias will increase.While if the some steps are canceled each other by random walk,the bias might just remain low.

    When a curious attacker moves near the original routing path as shown in Fig.9(b),CALP always selects the furthest node from the attacker as long as the attacker is still nearby.Consequently,the original path shifts many times.If the attacker does not receive any packets,he will have random walk,and the shift will not disappear until the attacker moves far away from the original path.In the SZ scheme,when the source is closer to the sink,that is,s-dis small,the curious at-tacker will capture some packets and stay on the path,resulting in a great path bias.As s-dincreases,the curious attacker may walk randomly to a safe state,so the path bias declines relatively.The ISZ scheme causes the smallest path bias because every time when an attacker approaches near the original routing,false packets will entice him far away from the original routing,and the curious attacker will have random walk.As s-d increases,the probability of capturing the source becomes smaller,as well as the path bias.

    When facing apatient attacker,as shown in Fig.9(a),the bias for SZ is not found.It is because when the patient attacker is near to the sink,more than 97%of packets can not reach the sink,as mentioned before that some packets jump 157hops before reaching the sink,leading to enormous bias.In addition,the path bias is related to the attacking range,which is set the same as the area of sensor communication.For CALP,when a patient attacker can not receive any packet,he will stay near the original path,so the bias will always exist,slightly larger than that for a curious one.The path bias of ISZ for a patient attacker is even smaller than that for a curious one.Once a patient attacker is enticed by false packets far away from the original routing,and can not receive any packets,he will no longer move.Thus the network will maintain a safe state for a long time and the following packets are delivered by the shortest path.

    (4)Energy.The research has shown that for wireless sensors,the energy cost by executing 3 million of general program instructions is equivalent to that by transmitting data in the distance of 100m[29].

    The parameters used in this simulation are listed in Table 3.

    It can be seen that with fixed number of packets and routing policies in the network,theenergy consumption related to the distance between nodes is O(d2).The total amount of the energy is related to the path length squared,so the routing algorithm itself affects the energy consumption.In Fig.10(a),the abnormal case of SZ occurs when facing apatience attacker,and the packet is always around the sink but can not arrive,which consumes much more energy.Obviously,ISZ mechanism is less likely to interfere with the original routing path.We implement the shortest path,CALP,SZ and ISZ to compare with the shortest path routing,showing the effect on the energy consumption of the whole network.Beacon scheduling itself does not generate additional energy consumption,although CALP has high delay,still maintaining the energy level of the shortest path.While for ISZ,dummy packets cause additional energy,as mentioned before,dummy packets only occur when there is a silent zone near the real routing path.In the simulation,after the attacker was tempted to leave the original path,the situation is not distinct between SZ and ISZ.Therefore,when the three strategies in the face of the curious attacker,the actual difference might not be too much,as shown in Fig.10(b).As sorted by the energy efficiency,ISZ has the best energy performance.

    Table 3 Parameters setting

    Fig.9 Path bias comparison using different mechanisms for two kinds of attackers

    Fig.10 Energy cost comparison using different mechanisms for two kinds of attackers

    5 Conclusions

    In this article,we propose an improved solution for source location privacy in WSNs,which is vulnerable to backtracking attack by a local adversary.The proposed solution of ISZ can be suitable to many event-driven WSNs applications by preventing a local attacker from receiving contextual information.Compared with SZ,ISZ combines an isolated area as a trap for adversary and entices the adversary far away from the original routing path.As shown in the results,the ISZ method outperforms its counterparts e.g.,PR and SP in the safety period as well as in energy consumption.However,cautious local adversaries as well as beaconing influence on WSNs are rarely considered.Further researches are needed to ad-dress these issues.

    Acknowledgements

    This work was supported by the National Natural Science Foundation of China (Nos.61373015,61300052,41301047),the Priority Academic Program Development of Jiangsu Higher Education Institutions,and the Important National Science and Technology Specific Project(No.BA2013049)。

    [1] CONTI M,WILLEMSEN J,CRISPO B.Providing source location privacy in wireless sensor networks:A survey[J].IEEE Communications Surveys Tutorials,2013,15(3):1238-1280.

    [2] WANG B,ZHANG X.WSNs routing protocol of airfield lighting monitoring system based on energy balance[J].Journal of Nanjing University of Aeronautics and Astronautics,2015,47(4):525-533.

    [3] ZHOU Qian,QIN Xiaolin,DING Youwei.Preserving source-location privacy efficiently based on attack perceiving in wireless sensor network[J].Journal on Communications,2018,39(1):101-116.

    [4] KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source-location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems.Columbus:IEEE,2005:599-608.

    [5] ZHANG Y,WANG G,HU Q,et al.Design and

    performance study of a topology-h(huán)iding multipath routing protocol for mobile ad hoc networks[C]//35th Annual IEEE International Conference on Computer Communications.Orlando:IEEE,2012:10-18.

    [6] RAHAT A,EVERSON R,F(xiàn)IELDSEND J,et al.Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks[J].Ad Hoc Networks,2016,52:130-145.

    [7] MEHTA K,LIU D,WRIGHT M.Protecting location privacy in sensor networks against a global eavesdropper[J].IEEE Transactions on Mobile Computing,2012,11(2):320-336.

    [8] YANG Y,SHAO M,ZHU S,et al.Towards statistically strong source anonymity for sensor networks[J].ACM Trans Sen Netw,2013,9(3):34:1-34:23.

    [9] LOUREN O P,BATISTA P,OLIVEIRA P,et al.Simultaneous localization and mapping in sensor networks:A GES sensor-based filter with moving object tracking[C]//European Control Conference.Linz:IEEE,2015:2354-2359.

    [10]NANDHINI S,RADHA S.Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks[C]//International Conference on Wireless Communications,Signal Processing and Networking.Chennai:IEEE,2016:1117-1122.

    [11]APICHARTTRISORN D, APICHARTTRISORN K,KASETKASEM T.A moving object tracking algorithm using support vector machines in binary sensor networks[C]//13th International Symposium on Communications and Information Technologies.Surat Thani:IEEE,2013:529-534.

    [12]RIOS R,LOPEZ J.Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J].The Computer Journal,2011,54(10):1603-1615.

    [13]BURATTI C.Performance analysis of IEEE 802.15.4 beacon-enabled mode[J].IEEE Transactions on Vehicular Technology,2010,59(4):2031-2045.

    [14]BRADBURY M,LEEKE M,JHUMKA A.A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]//IEEE Trustcom/BigDataSE/ISPA.Helsinki:IEEE,2015:531-538.

    [15]OUYANG Y,LE Z,LIU D,et al.Source location privacy against laptop-class attacks in sensor networks[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York:IEEE,2008:1-10.

    [16]RAJ M,LI N,LIU D,et al.Using data mules to preserve source location privacy in wireless sensor networks[J].Pervasive and Mobile Computing,2014,11(2):244-260.

    [17]JHUMKA A,LEEKE M,SHRESTHA S.On the use of fake sources for source location privacy:Trade-offs between energy and privacy[J].The Computer Journal,2011,54(6):860-874.

    [18]SHI R,GOSWAMI M,GAO J,et al.Is random walk truly memoryless:Traffic analysis and source location privacy under random walks[C]//The 32nd IEEE International Conference on Computer Communications.Turin:IEEE,2013:3021-3029.

    [19]XI Y,SCHWIEBERT L,SHI W.Preserving source location privacy in monitoring-based wireless sensor networks[C]//The 20th IEEE International Parallel Distributed Processing Symposium.Rhodes Island:IEEE,2006:355-355.

    [20]ALOMAIR B,CLARK A,CUELLAR J,et al.Toward a statistical framework for source anonymity in sensor networks[J].IEEE Transactions on Mobile Computing,2013,12(2):248-260.

    [21]MEHTA K,LIU D,WRIGHT M.Location privacy in sensor networks against a global eavesdropper[C]//International Conference on Network Protocols.Beijing:IEEE,2007:314-323.

    [22]AMIN R,BISWAS G P.A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J].Ad Hoc Networks,2016,36(1):58-80.

    [23]SRINIVAS J,MUKHOPADHYAY S,MISHRA D.Secure and efficient user authentication scheme for multi-gateway wireless sensor networks[J].Ad Hoc Networks,2017,54:147-169.

    [24]SHAO M,HU W,ZHU S,et al.Cross-layer enhanced source location privacy in sensor networks[C]//6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Rome:IEEE,2009:1-9.

    [25]XING Y,CHEN Y,YI W.Optimal beacon interval for TDMA-based MAC in wireless sensor networks[C]//11th International Conference on Innovations in Information Technology.Dubai:IEEE,2015:156-161.

    [26]LIU C J,HUANG P,XIAO L.TAS-MAC:A traffic-adaptive synchronous MAC protocol for wireless sensor networks[J].ACM Trans Sen Netw,2016,12(1):1-30.

    [27]ZHOU L,WAN C,HUANG J,et al.The location privacy of wireless sensor networks:Attacks and countermeasures[J].Wireless Networks,2014,8(5):521-534.

    [28]BAO Y,JI C,CHEN G,et al.WSN node applied to large-scale unattended monitoring[J].Transactions of Nanjing University of Aeronautics and Astronautics,2016,33(3):386-395.

    [29]POTTIE G,KAISER W.Wireless integrated network sensors[J].Communications of ACM,2000,43(5):51-58.

    国产精品成人在线| 69精品国产乱码久久久| 男女边摸边吃奶| 中文字幕人妻丝袜制服| 久久久国产欧美日韩av| 咕卡用的链子| 国产97色在线日韩免费| 国产成人免费观看mmmm| 成年女人毛片免费观看观看9 | 狠狠狠狠99中文字幕| 国产精品 国内视频| 一级,二级,三级黄色视频| 国产精品偷伦视频观看了| 国产av又大| aaaaa片日本免费| 亚洲综合色网址| 99热网站在线观看| 91av网站免费观看| 亚洲久久久国产精品| 日韩 欧美 亚洲 中文字幕| 男人舔女人的私密视频| 999精品在线视频| av线在线观看网站| 日韩视频在线欧美| 亚洲成人国产一区在线观看| 中文字幕人妻丝袜一区二区| av有码第一页| 久久人妻福利社区极品人妻图片| 露出奶头的视频| h视频一区二区三区| 老司机在亚洲福利影院| 50天的宝宝边吃奶边哭怎么回事| 国产日韩一区二区三区精品不卡| 久久久精品94久久精品| 久久久精品94久久精品| 国产人伦9x9x在线观看| 黑人欧美特级aaaaaa片| 在线观看免费高清a一片| 天天躁日日躁夜夜躁夜夜| www日本在线高清视频| 国产精品免费视频内射| 天堂俺去俺来也www色官网| 国产欧美日韩一区二区三区在线| 国产精品麻豆人妻色哟哟久久| 国产一卡二卡三卡精品| 国产一卡二卡三卡精品| 免费看a级黄色片| 国产精品亚洲一级av第二区| 侵犯人妻中文字幕一二三四区| 一级a爱视频在线免费观看| 国产成人欧美| 啦啦啦免费观看视频1| 精品乱码久久久久久99久播| 天天添夜夜摸| 大型av网站在线播放| 一区在线观看完整版| e午夜精品久久久久久久| 夫妻午夜视频| 精品国内亚洲2022精品成人 | 一本—道久久a久久精品蜜桃钙片| 可以免费在线观看a视频的电影网站| 日本av免费视频播放| 久久亚洲真实| 考比视频在线观看| 久久国产精品大桥未久av| 菩萨蛮人人尽说江南好唐韦庄| 窝窝影院91人妻| 黄色 视频免费看| 国产欧美日韩精品亚洲av| 欧美乱妇无乱码| 国产在线精品亚洲第一网站| 国产精品久久久久久精品古装| 久久精品国产a三级三级三级| 一本大道久久a久久精品| 国产亚洲精品一区二区www | 自拍欧美九色日韩亚洲蝌蚪91| 日本av手机在线免费观看| 国产高清视频在线播放一区| 国产精品二区激情视频| 欧美亚洲 丝袜 人妻 在线| 久久这里只有精品19| 国内毛片毛片毛片毛片毛片| 亚洲美女黄片视频| 国产精品国产av在线观看| 久久精品成人免费网站| 亚洲国产欧美在线一区| 少妇猛男粗大的猛烈进出视频| 男人舔女人的私密视频| 19禁男女啪啪无遮挡网站| 欧美日韩亚洲综合一区二区三区_| 精品乱码久久久久久99久播| 亚洲中文字幕日韩| 国产高清国产精品国产三级| 黄色怎么调成土黄色| 在线 av 中文字幕| 亚洲第一av免费看| 免费观看人在逋| 国产成人影院久久av| 热99re8久久精品国产| 最近最新中文字幕大全电影3 | 欧美日韩中文字幕国产精品一区二区三区 | 欧美黑人欧美精品刺激| 男女下面插进去视频免费观看| 亚洲中文av在线| 国产一区二区三区综合在线观看| 久久国产精品影院| 国精品久久久久久国模美| 超碰成人久久| 99re在线观看精品视频| 免费观看人在逋| 热99re8久久精品国产| 亚洲精品国产色婷婷电影| 一本久久精品| 99久久人妻综合| 波多野结衣av一区二区av| 成年版毛片免费区| 日日爽夜夜爽网站| 人人妻人人爽人人添夜夜欢视频| 免费观看a级毛片全部| 午夜成年电影在线免费观看| 久热爱精品视频在线9| 两个人免费观看高清视频| 国产精品九九99| 久久精品国产亚洲av高清一级| 久久久久久久精品吃奶| 这个男人来自地球电影免费观看| 国产有黄有色有爽视频| 日韩人妻精品一区2区三区| 91麻豆av在线| 757午夜福利合集在线观看| 日本黄色视频三级网站网址 | 老司机靠b影院| 天天躁狠狠躁夜夜躁狠狠躁| 国产成人系列免费观看| 欧美日韩黄片免| 亚洲精品国产一区二区精华液| 人人妻人人澡人人看| 国产高清国产精品国产三级| 国产亚洲av高清不卡| 国产淫语在线视频| 天天操日日干夜夜撸| 无人区码免费观看不卡 | h视频一区二区三区| 国产精品.久久久| 国产又爽黄色视频| 欧美日韩亚洲高清精品| 在线观看www视频免费| 日韩免费av在线播放| 人人妻人人爽人人添夜夜欢视频| 在线av久久热| 欧美国产精品va在线观看不卡| 午夜免费成人在线视频| 久久人妻熟女aⅴ| 日本一区二区免费在线视频| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲人成电影免费在线| 久久精品91无色码中文字幕| 久久久久国内视频| 日韩大码丰满熟妇| 久久热在线av| 99国产极品粉嫩在线观看| 女性生殖器流出的白浆| 午夜老司机福利片| 精品福利观看| 欧美精品高潮呻吟av久久| 宅男免费午夜| 一本一本久久a久久精品综合妖精| 久久狼人影院| 精品亚洲乱码少妇综合久久| 欧美精品高潮呻吟av久久| 精品国产乱码久久久久久男人| 精品久久久久久电影网| 亚洲国产欧美网| 亚洲国产成人一精品久久久| 91麻豆精品激情在线观看国产 | 在线观看免费午夜福利视频| 免费女性裸体啪啪无遮挡网站| 18禁国产床啪视频网站| 久久免费观看电影| 黄色a级毛片大全视频| 亚洲五月色婷婷综合| 日韩欧美一区视频在线观看| 亚洲精华国产精华精| 国产精品 欧美亚洲| 亚洲国产欧美一区二区综合| 无遮挡黄片免费观看| 成人国产一区最新在线观看| 99久久人妻综合| 嫩草影视91久久| 日韩成人在线观看一区二区三区| 纯流量卡能插随身wifi吗| 男女午夜视频在线观看| 另类亚洲欧美激情| 十八禁网站免费在线| 亚洲av电影在线进入| 中文字幕另类日韩欧美亚洲嫩草| cao死你这个sao货| 制服诱惑二区| aaaaa片日本免费| 高清在线国产一区| 午夜日韩欧美国产| 9热在线视频观看99| 乱人伦中国视频| 老熟女久久久| 午夜福利一区二区在线看| 五月天丁香电影| 精品一区二区三区视频在线观看免费 | 1024视频免费在线观看| 亚洲天堂av无毛| 久久精品人人爽人人爽视色| 99国产精品一区二区蜜桃av | 日韩视频在线欧美| 亚洲精品美女久久久久99蜜臀| 久久中文字幕人妻熟女| 1024视频免费在线观看| 国产精品成人在线| 久久天躁狠狠躁夜夜2o2o| 色精品久久人妻99蜜桃| 18禁美女被吸乳视频| 免费观看人在逋| 精品国产乱码久久久久久男人| 男女下面插进去视频免费观看| 一边摸一边抽搐一进一小说 | 一区二区三区国产精品乱码| 亚洲av成人不卡在线观看播放网| 精品免费久久久久久久清纯 | 美女高潮到喷水免费观看| 电影成人av| 国产区一区二久久| 一本色道久久久久久精品综合| 久久人妻av系列| 女人爽到高潮嗷嗷叫在线视频| 下体分泌物呈黄色| 99久久人妻综合| 免费看a级黄色片| 在线永久观看黄色视频| 国产一卡二卡三卡精品| 国产在线免费精品| 中亚洲国语对白在线视频| 国产麻豆69| 操美女的视频在线观看| 欧美久久黑人一区二区| 亚洲欧美精品综合一区二区三区| 韩国精品一区二区三区| 久久久国产欧美日韩av| 久久av网站| 电影成人av| 精品国产一区二区久久| 亚洲情色 制服丝袜| 脱女人内裤的视频| 精品国产国语对白av| 日本黄色视频三级网站网址 | 色婷婷久久久亚洲欧美| 亚洲精品中文字幕在线视频| videos熟女内射| 啦啦啦 在线观看视频| 亚洲国产av影院在线观看| 国产亚洲精品一区二区www | 午夜福利在线免费观看网站| 首页视频小说图片口味搜索| 丝瓜视频免费看黄片| 一夜夜www| www.熟女人妻精品国产| 国产亚洲精品第一综合不卡| 亚洲av国产av综合av卡| 成人影院久久| 久久精品aⅴ一区二区三区四区| 香蕉国产在线看| 五月天丁香电影| 日韩欧美三级三区| 精品一区二区三区四区五区乱码| 国产成人欧美| 国内毛片毛片毛片毛片毛片| 久久久久久久久免费视频了| 麻豆乱淫一区二区| 99久久人妻综合| 制服人妻中文乱码| 国产精品1区2区在线观看. | a级片在线免费高清观看视频| 叶爱在线成人免费视频播放| 国产精品 国内视频| 日本vs欧美在线观看视频| 黄色毛片三级朝国网站| 热99国产精品久久久久久7| 国产精品亚洲一级av第二区| 亚洲国产欧美日韩在线播放| 亚洲欧美色中文字幕在线| 国产精品二区激情视频| 老司机影院毛片| 男人操女人黄网站| 淫妇啪啪啪对白视频| 欧美日韩亚洲高清精品| 色精品久久人妻99蜜桃| 欧美乱码精品一区二区三区| 色在线成人网| 国产区一区二久久| 日韩免费高清中文字幕av| 国产亚洲欧美在线一区二区| 法律面前人人平等表现在哪些方面| 精品国产亚洲在线| 十八禁人妻一区二区| 午夜日韩欧美国产| 极品少妇高潮喷水抽搐| 中文字幕人妻熟女乱码| 九色亚洲精品在线播放| 亚洲性夜色夜夜综合| 50天的宝宝边吃奶边哭怎么回事| 午夜福利欧美成人| 久久这里只有精品19| 香蕉久久夜色| 少妇被粗大的猛进出69影院| 一进一出抽搐动态| 午夜精品国产一区二区电影| 日韩有码中文字幕| 亚洲中文字幕日韩| 国产黄频视频在线观看| 又紧又爽又黄一区二区| 久久久久久久久久久久大奶| 成年版毛片免费区| a级毛片在线看网站| 高清欧美精品videossex| 亚洲人成77777在线视频| 丁香六月欧美| bbb黄色大片| 久久青草综合色| 精品人妻在线不人妻| 一级,二级,三级黄色视频| 亚洲午夜精品一区,二区,三区| www.999成人在线观看| 如日韩欧美国产精品一区二区三区| 精品高清国产在线一区| 大香蕉久久网| 亚洲欧美日韩高清在线视频 | 精品人妻熟女毛片av久久网站| av网站在线播放免费| videos熟女内射| 久久久精品国产亚洲av高清涩受| av线在线观看网站| 老司机午夜十八禁免费视频| av天堂在线播放| 国产精品美女特级片免费视频播放器 | 欧美精品高潮呻吟av久久| 一区二区三区精品91| 色尼玛亚洲综合影院| 又大又爽又粗| 制服人妻中文乱码| 亚洲精品在线美女| 国产野战对白在线观看| 日本黄色日本黄色录像| 亚洲人成伊人成综合网2020| 少妇被粗大的猛进出69影院| 欧美日韩亚洲国产一区二区在线观看 | 成人国产一区最新在线观看| 一级毛片精品| 午夜激情久久久久久久| 免费久久久久久久精品成人欧美视频| av一本久久久久| 国产亚洲欧美精品永久| 久久久精品94久久精品| 美女扒开内裤让男人捅视频| 日韩中文字幕视频在线看片| 国产亚洲午夜精品一区二区久久| 欧美一级毛片孕妇| 三级毛片av免费| bbb黄色大片| 久久久国产成人免费| 男人操女人黄网站| 亚洲黑人精品在线| 亚洲av第一区精品v没综合| 国产又色又爽无遮挡免费看| 国产一区有黄有色的免费视频| 国产又色又爽无遮挡免费看| 国产精品久久久av美女十八| 三上悠亚av全集在线观看| 99国产精品免费福利视频| 丝袜喷水一区| 国产午夜精品久久久久久| 免费观看人在逋| 国产成人影院久久av| 亚洲国产av新网站| 精品一区二区三区四区五区乱码| 精品免费久久久久久久清纯 | 欧美成狂野欧美在线观看| 国产97色在线日韩免费| 欧美中文综合在线视频| 黄色视频在线播放观看不卡| 在线十欧美十亚洲十日本专区| 18禁裸乳无遮挡动漫免费视频| 色综合欧美亚洲国产小说| svipshipincom国产片| 成人精品一区二区免费| 91九色精品人成在线观看| 脱女人内裤的视频| 啦啦啦在线免费观看视频4| 黑人猛操日本美女一级片| 欧美久久黑人一区二区| 桃花免费在线播放| 精品久久久久久电影网| 99久久精品国产亚洲精品| 男女高潮啪啪啪动态图| 最新美女视频免费是黄的| 91九色精品人成在线观看| 国产精品亚洲一级av第二区| 欧美日韩亚洲高清精品| 国产日韩欧美视频二区| 一区二区三区乱码不卡18| 欧美精品亚洲一区二区| 悠悠久久av| 丁香六月天网| h视频一区二区三区| 久久久国产精品麻豆| 一级,二级,三级黄色视频| 成人国产av品久久久| 91精品三级在线观看| 欧美在线一区亚洲| 嫁个100分男人电影在线观看| av又黄又爽大尺度在线免费看| 中文字幕高清在线视频| 天堂俺去俺来也www色官网| 成人国产一区最新在线观看| 久久久精品免费免费高清| 亚洲精品在线美女| 丝袜喷水一区| 国内毛片毛片毛片毛片毛片| 老汉色∧v一级毛片| 亚洲第一av免费看| 黄色视频不卡| 亚洲视频免费观看视频| 十八禁网站网址无遮挡| 在线看a的网站| 一区二区三区精品91| 性高湖久久久久久久久免费观看| 国产黄色免费在线视频| 日韩中文字幕视频在线看片| 午夜福利欧美成人| 久久毛片免费看一区二区三区| 国产有黄有色有爽视频| 国产成人一区二区三区免费视频网站| 亚洲精品国产一区二区精华液| 国产日韩一区二区三区精品不卡| 亚洲国产欧美在线一区| 国精品久久久久久国模美| 久久久久久人人人人人| 一个人免费在线观看的高清视频| 大码成人一级视频| 侵犯人妻中文字幕一二三四区| 99国产精品免费福利视频| 夜夜夜夜夜久久久久| 757午夜福利合集在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 成人av一区二区三区在线看| 欧美黑人欧美精品刺激| 国产精品偷伦视频观看了| 久久久久久久久免费视频了| 丝袜在线中文字幕| 久久毛片免费看一区二区三区| 久久久久久久精品吃奶| 纵有疾风起免费观看全集完整版| 成人手机av| 亚洲国产欧美在线一区| 欧美 亚洲 国产 日韩一| 老熟妇仑乱视频hdxx| 人人妻人人爽人人添夜夜欢视频| 99国产精品一区二区蜜桃av | 丝袜喷水一区| 天天影视国产精品| 黄频高清免费视频| 亚洲人成伊人成综合网2020| 国产免费视频播放在线视频| 动漫黄色视频在线观看| 欧美激情极品国产一区二区三区| 电影成人av| 久久久久国内视频| 亚洲avbb在线观看| 国产精品熟女久久久久浪| 色在线成人网| 天天添夜夜摸| 亚洲人成伊人成综合网2020| 日日摸夜夜添夜夜添小说| 精品国产超薄肉色丝袜足j| 1024香蕉在线观看| 国产成人精品无人区| 午夜老司机福利片| av国产精品久久久久影院| 一级a爱视频在线免费观看| 日韩视频在线欧美| 十八禁网站免费在线| 亚洲av电影在线进入| a在线观看视频网站| 两个人看的免费小视频| 水蜜桃什么品种好| 丁香欧美五月| 色94色欧美一区二区| tocl精华| 1024视频免费在线观看| 色播在线永久视频| 国产亚洲精品第一综合不卡| 国产成人精品无人区| 欧美乱妇无乱码| 啦啦啦中文免费视频观看日本| 麻豆乱淫一区二区| a级片在线免费高清观看视频| 中亚洲国语对白在线视频| 在线观看免费日韩欧美大片| 久久人妻av系列| 欧美日韩亚洲高清精品| 国产亚洲欧美在线一区二区| 欧美人与性动交α欧美精品济南到| 国产一区二区 视频在线| 亚洲熟女毛片儿| 久久毛片免费看一区二区三区| 亚洲黑人精品在线| 国产亚洲午夜精品一区二区久久| 亚洲色图av天堂| 国产免费av片在线观看野外av| 久久精品成人免费网站| av天堂久久9| 女人被躁到高潮嗷嗷叫费观| 五月开心婷婷网| 菩萨蛮人人尽说江南好唐韦庄| 亚洲欧美日韩高清在线视频 | 国产在线一区二区三区精| 欧美日韩中文字幕国产精品一区二区三区 | 国产精品亚洲一级av第二区| 嫩草影视91久久| 精品久久久久久久毛片微露脸| 国产成人免费观看mmmm| 久久热在线av| 国产精品久久久久成人av| 国产野战对白在线观看| 午夜福利免费观看在线| 五月开心婷婷网| 最近最新中文字幕大全电影3 | 欧美日韩精品网址| 亚洲国产毛片av蜜桃av| 51午夜福利影视在线观看| 国产成人欧美在线观看 | 国产成人av激情在线播放| 精品少妇一区二区三区视频日本电影| 国产高清激情床上av| 久久免费观看电影| 色综合欧美亚洲国产小说| 午夜两性在线视频| 亚洲视频免费观看视频| 亚洲人成电影观看| 国产精品一区二区免费欧美| 国产精品久久久久久精品电影小说| 在线永久观看黄色视频| 久久久久久人人人人人| 美女午夜性视频免费| a在线观看视频网站| 一边摸一边抽搐一进一出视频| 黄色视频,在线免费观看| 丝袜美足系列| 天天添夜夜摸| 热re99久久国产66热| 亚洲男人天堂网一区| 久久午夜综合久久蜜桃| 欧美黑人精品巨大| 久久久国产一区二区| 久久国产精品男人的天堂亚洲| 免费不卡黄色视频| 97在线人人人人妻| av片东京热男人的天堂| 无遮挡黄片免费观看| 色婷婷av一区二区三区视频| 乱人伦中国视频| 久久香蕉激情| 国产高清视频在线播放一区| 国产精品偷伦视频观看了| 欧美成人午夜精品| cao死你这个sao货| 又黄又粗又硬又大视频| 极品教师在线免费播放| 99国产精品99久久久久| 91精品三级在线观看| 91老司机精品| 亚洲精品美女久久久久99蜜臀| 91老司机精品| 国产精品二区激情视频| 午夜免费鲁丝| 日本精品一区二区三区蜜桃| 亚洲欧美日韩高清在线视频 | aaaaa片日本免费| 男人舔女人的私密视频| 国产成人av教育| 老熟女久久久| 国产成人一区二区三区免费视频网站| 大型黄色视频在线免费观看| 美女主播在线视频| 成人国产一区最新在线观看| 国产成人免费观看mmmm| 国产欧美日韩一区二区三区在线| 99香蕉大伊视频| 三上悠亚av全集在线观看| 一进一出抽搐动态| 女人被躁到高潮嗷嗷叫费观| 69精品国产乱码久久久| 久久久久久久国产电影| 免费不卡黄色视频| 精品国产一区二区三区四区第35| 国产高清videossex| 人人妻人人爽人人添夜夜欢视频| 中文字幕av电影在线播放| 啦啦啦 在线观看视频| 99国产精品99久久久久| 午夜福利在线免费观看网站| 一区二区三区乱码不卡18| 欧美激情高清一区二区三区| 一本大道久久a久久精品| 中文字幕人妻丝袜制服| 国产精品熟女久久久久浪| 交换朋友夫妻互换小说| 欧美精品亚洲一区二区| 丝袜人妻中文字幕|