• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Silent Zone for Source-Location Privacy Based on Context-Awareness in WSNs

    2018-03-29 07:36:11ZhouQianQinXiaolinDingYouwei

    Zhou Qian,Qin Xiaolin ,Ding Youwei

    1.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,P.R.China;

    2.Jiangsu Key Laboratory of Internet of Things and Control Technology,Nanjing 211106,P.R.China

    0 Introduction

    The sensors,due to their small size,and strong networking performance,are easy to maintain and deploy[1,2].Sensor networks are widely used in some sensitive environments such as the battlefield,and some wild animal reserve areas.For instance,in a wireless sensor network(WSN)for monitoring wild endangered animals,an electric sensor carried by apanda can send its own information to the sensors nearby,and then the event is transmitted through the WSN to the monitor center(sink).The first sensor that receives the signals from the monitoring asset such as the panda,is called the source node,as shown in Fig.1.An attacker in the vicinity of V1,carrying apiece of signal detection equipment to eavesdrop,moves to V2according to the context infor-mation of the network such as the packet′s sending time and the location of the sending node,and he will repeat this process until he approaches the source node,namely the location of the panda.In the end,the privacy of the source location is disclosed.

    Fig.1 Attack based on context

    In practice,the object sensed by the source node normally demands for key protection,so the source location should not be revealed in the process of data transmission,in order to avoid severe loss of economy or resources.As a kind of privacy information,the source location can only be visited by the authorized person.The privacy can be classified into the content-based and the context-based[3].The content-based privacy refers to the integrity and confidentiality of the content,that is,the content cannot be tampered.The privacy discussed in this paper is based on the context,which can be obtained by attackers to infer the source location.

    The prior technologies for preserving the source privacy are implemented mainly by changing or increasing the current routing paths,such as phantom routing,multi-path routing,dummy sources injection and other security routing mechanisms.These technologies may achieve a certain safety at high expense of delay or energy cost,so they are not feasible for the wireless sensor networks(WSNs)application which have high requirements of efficient energy or real-time response.For instance,the main idea of multipath[4]is that packets are sent firstly to the pseudo source,and then to the sink by single path routing or flooding.Because the attacker is not visible in WSNs,in order to choose the pseudo node[5],we need to know the entire network topology.Hence,the methods for choosing pseudo sources are normally very complex,leading to great energy cost and packet delay[6].Furthermore,the routing with topology information is vulnerable to traffic analysis of global attackers[7].

    In an event-driven WSN,the routing is normally on-demand.For a specific event,it will choose the corresponding routing strategy.For example,in a wildlife reserve,for the requirement of privacy,a security routing is applied to transmit animal information through the monitoring WSN.In addition,the sensors will work as soon as an emergency is detected,when a shortest-path routing or flooding is usually applied due to the shortest delay.However,these schemes are vulnerable for revealing the location privacy[4]easily.In order to deal with these problems,it is urgent to find a kind of secure mechanism that not only has little impact on the original routing,but also can resist the attacker′s traffic analysis[8].

    With the development of hardware technologies and reduction of the cost,some monitoring sensors which are applied in critical applications,such as border surveillance and endangered animal reservation,are equipped with the sensor modules for detection of moving objects[9]and electric signals.These sensors can automatically recognize one moving attacker[10,11],and then broadcast the location of the attacker to its neighbors by beacon signals.Rios et al.proposed a greedy routing algorithm of context-aware location privacy(CALP)[12]and silent zone(SZ)scheme based on such attacker-recognition technology.However,according to the Kerckhoffs′principle,the attacker will know the whole design of the secure system.We assume that the attacker knows the routing protocol and can decrypt the security protocol.Although CALP is also based on the shortest path,the packet would have great delay,because the privacy preserving function depends on the beacon scheduling to update the routing table every time,when the period of beacon increases.The application of beacons has brought new challenges to the network performance[13].Despite the high privacy of SZ by isolating attackers from the whole network,the packet fails to be delivered successfully when a patient attacker stays near the sink.

    The scheme presented in this study is independent from beacon frequency and can subtly entice adversaries far away from the real routing path.Therefore,as our scheme causes the least impact on the original routing,the packet can be delivered efficiently to the sink with no more delay.In this process,the location privacy is also preserved by stopping attackers from receiving any information.The main contributions of this paper are summarized as follows:

    (1)We propose an intelligent silent zone(ISZ)mechanism to preserve the source location privacy,by enticing the attackers away from real packet routing path in a silent zone.

    (2)ISZ can preserve the source location privacy even when the attacker knows the routing protocol.Besides,this scheme is applied in a universal scenario regardless of the routing policy.

    (3)The path bias is introduced to measure the impact of secure policies on the current routing.ISZ mechanism can maintain the original path to the great extent.

    1 Related Work

    The research on the source location privacy(SLP)[2,14]in WSNs has been drawing significant attention.According to their abilities,attackers come in two varieties,local and global.The global[7,15]one can know the whole network traffic.In order to resist the attacker′s global traffic analysis,dummy packets are usually injected in the real packet transmission interval,resulting in considerable energy cost.And the multi-path routing[6]can enhance the load balance and quality of service(QOS),which makes the global attacker difficult to track the packets[5].The local attacker[16]can receive the information in the vicinity of him,while multiple local attackers can cooperate with one each other to get a wider range of network information[17].As a local attacker,whose location is still invisible like a ghost to the entire network,he can analyze the network traffic to infer the source location.Previous studies have shown that there are mainly three techniques to hide the traffic.One is the phantom routing[4]proposed by kamat et al.in their panda-h(huán)unter model for the first time,which includes the first step of having random walk to a phantom source,followed by the shortest path or flooding to the sink in the end.However,as random walk increases,the packet gradually approaches the source node[4,18],indicating the revelation of the source location in turn for a random walk phase.Shortly afterwards,some improved algorithms such as greedy random walk (GROW)[19]are proposed,which are associated with more energy cost to reduce the transmission delay and improve the security.The other two schemes are dummy packets mechanism[3,20]and pseudo source node mechanism[7,21].These two methods can resist more powerful attackers,but because the number and the location of pseudo nodes are randomly distributed,some unnecessary energy cost is unavoidable.

    With the development of the hardware,the attacker will be in visible for the wireless sensor network.By using the characteristics of attacker perceiving[12],nodes relatively far from the attacker are chosen as the shortest path to the sink,which brings a new idea for solving this kind of problem.Moving object recognition technology[9-11]in resisting the attacker,enhances the certainty of the strategy,instead of randomness.However,the authorized moving objects can be allowed to enter the WSN,such as scientists detecting data in the field.Merely a simple authentication mechanism[22,23]can exclude the unauthorized migration of mobile objects.Between the external moving objects and sensors,the establishment of session key based on elliptic curve cryptography(ECC)is more simplified with smaller public key,compared with non-ECC mechanisms.

    To further reduce the overhead of data transmission,according to the characteristics of the IEEE 802.15.4MAC layer,Shao et al.[24]made use of the payload of beacons to transmit data,which will be extracted through programs in the application layer.In addition,the Mac layer for maintaining a reliable communication link,can also be used to broadcast information by beacons.The MAC mentioned here is beacon-enabled,and the influence of varied MAC protocols on the network performance is different.According to Ref.[25],a short interval between beacons will cause too much synchronization overhead,while a long interval will result in a longer guardian time for the time drift.The beacon interval can be adjusted adaptively according to the network traffic,such as changing the duty ratio to increase the throughput for tunable media access control(TMAC)and sync-MAC(S-MAC)[26].The frequency can also be changed by the software depending on the specific application.There are two advantages of using beacons to transmit the data,the first is energy saving,and the second is to hide the path.

    2 Problem Description

    2.1 Network model

    In a homogeneous wireless sensor network,there are Nnodes{ni|1≤i≤N},and each sensor has the same computing and storage capacity,with every node of niknown their location(xi,yi)and the sink(xs,ys).

    Assuming that the sensors are deployed in a free plane space,the distance between sensors is the Euclidean distance.If the location of node v1and v2are located respectively in (x1,y1)and(x2,y2),the distance between v1and v2is

    If there are a few neighbors in a sparse network,an attacker is easier to locate the sender near him.So the nodes of network are densely connected.

    In the view of the external attacker,the format and the size of each packet is the same,and the node′s identity information is encrypted to prevent an attacker from decrypting the contents of packets,therefore he cannot distinguish between true packets and pseudo ones.

    As mentioned earilier,the attacker-recognition module can tell the location of the attacker H(xh,yh).The authorization mechanism is introduced to eliminate the interference in the process of identifying moving objects,and the unauthorized target(with electromagnetic signal)is regarded as an attacker.The moving object authorization is ignored,for example,the scientists carry a personal device to examine the data collected in the field,so such moving object is not an attacker.

    2.2 Attack model

    Due to the limited communication range of each sensor node in WSNs,the packets are transmitted hop by hop.The attacker locates the base station or the data source by using the time dependence of the packets and the traffic patterns.According to the attacker's reaction when he receives a packet,attackers come into two types[27]:(1)The patient attacker,he will not move until he receives a new packet,and then moves to the direct direction of the packet sending;(2)The cautious attacker,if he has been waiting at a node for a new packet for a fixed time,he will return back to the last location.No standards can be used to distinguish the ability of these two type attackers,for the perceptive attacker has the path analysis ability.While in some cases,the patient attacker can provide much more safety,which will be elaborated in Section 4.Therefore,when designing privacy schemes,we should take these two types of attackers into account.

    We assume that the attacker is local and passive.Local means that the attacker′s observing scope is only the sensors in his vicinity,and passive indicates that the attacker does not have any functional impact on the sensor network.The attacker knows the location of the sink node.As an external attacker,he can only eavesdrop on the packets in WSNs,but not control any internal sensor nodes.

    According to the angle and the strength of the received transmission signal,the attacker strarts from the sink node and follows the direction of the direct sender to capture him.If the attacker does not receive any packets within a certain period of time T,he will have random walk to find a node sending apacket,and continue to eavesdrop.Here:

    (1)If the time of Tis short,it is a curious attacker;

    (2)If Tis infinite,it is a patient attacker.

    An attacker moves at a constant speed of VA,where VA≤Vmand Vmrepresents the speed of packets between nodes.The eavesdropping range of an attacker is not greater than the communication range of a node,that is,D ≤ R,where Dand Rrepresent the eavesdropping range and the communication radius of the sensor node,respectively.

    3 Method

    3.1 Attack-preserving technology

    Traditional intrusion detection system is unable to detect the attacker since the passive attacker has no affection on the whole network.While because of the inherent character of the attacker as a moving object with electromagnetic signal,sensor nodes equipped with special models can monitor and track unauthorized moving objects[28].

    The sensor node applied here includes two functional models:M-DS and control mode,as shown in Fig.2.

    Fig.2 Functional models

    The module is used to detect whether an attacker is nearby,relying on the existing technology.If an attacker approaches,an alarm is sent by the M-DS module to the control module.The control module then transmits beacon signals to inform sensors nearby.

    3.2 Silent zone scheme

    SZ scheme is introduced by Rios in Ref.[12].The main idea is that as soon as the mobile attacker is detected by the sensor nearby,the senor will notify all other neighbours of the attacker′s location,and the neighbours that receive the warning message will be set silent.All silent nodes fail to forward packets any more,even if they receive these packets and then discard them.We call these nodes as SILENT,which can be achieved by the software.

    Definition 1There are four possible states defined by an enum.SLEEP and ACTIVE are steady states and SEND is transient,and SILENT is also a transient state that the nodes will simply discard or store the packets they receive,without forwarding it.

    Once an attacker appears,all nodes within the security boundary are notified by the aforementioned beacons.If the node H _node is the first one that detects the attacker,it can determine the location of the attacker,and then send a beacon.Taking H_node as the center of a disk,all the sensors within communication radius R will receive the Rsignal and set their states to be silent.

    Each node knows the location of the sink and its own,and can send information by beacon signals.Intuitively,the SZ mechanism significantly decreases the number of real packets captured by an attacker.According to the attack model in Section 2.2,the attacker will walk randomly until he captures a packet in the network.When the attacker is close to the real data transmission path,the next delivery will deviate from the original route.Such deviation will lead to an increase in the path length and the energy consumption of the network.With the increasing number of walk steps,the walk area is increasing accordingly.If the source node is close to the sink node,the attacker can find the source node in a short time by completely random walking.

    In order to prevent attackers from receiving new packets by SZ mechanism,there are two disadvantages when an attacker is near the sink node:(1)It would make packets not arrive at the destination,resulting in a very low delivery rate.The corresponding solution is that when the attacker is in the vicinity of the sink,the minimum safety distance is set small,and when the attack-er is far away,the minimum safety distance is changed back to the communication radius.(2)It would make the attacker easier to find the source node nearby,because no packer is captured by the attacker,and then he will have a random walk,as discussed before.

    The advantages of completely isolating the attacker from real packets is obvious.The attacker can not receive any context information any more,meanwhile he has random walk.Given the current node position as CN0(x0,y0)after h step,the coordinate can be followed as

    X=CNi-CNi-1(i>0),where Xis an independent distribution of random variables,namely{(1,0),(-1,0),(0,1),(0,-1)}.

    k·hwalkis distance from CN0to the location after hwalkstep,where{k|0<k<1},the asymptotic probability of k·hwalkis as follows

    When the number of hwalkcontinues to increase,the probability of going back to the original location for the attacker tends to 1.The attacker can only walk around for ensuring the location privacy of the source node.When the distance between the source node and the sink is relatively small,the source node is within this small range.As the hwalkincreases,the source node could be found only in a limited time.However,it has been proved that when the source node is far away from the attacker,the probability of finding the sink node is very small.Therefore,one of the design goals in this paper is to let the attacker move away from the source node,which can be achieved as long as the moving direction of packets captured by the attacker is opposite to that of the source.

    When the attacker is near the original routing path,the longer the minimum safety distance is,the more deviation of the routing path will be.It will lead to great energy consumption.Worst of all,it will result in the instability of the network.In order to make privacy protection mechanisms to be more widely used,it is necessary to let the attacker far from the source,and at the same time to remain the original routing path unbiased.The routing path bias is defined in the next section.The smaller routing path bias,the higher quality of network service.

    3.3 The proposed mechanism

    First,we need to define the routing path bias.The smaller routing path bias will has the less impact on the original routing path.

    Definition 2Givenμas the mean length of routing paths.When the security mechanism is applied and the length of the ith routing path is counti,the routing path bias S2is defined as follows

    To minimize the routing path bias,we need to optimize SZ scheme.This article presents a novel solution called ISZ,whose main idea is that the routing for real packets is complemented outside the silent zone,and while the packet routes are near the silent zone,a false packet is sent to a bait node chosen intelligently,to entice the attacker away from the original routing path.The false packets can get through the silent zone,which will be described as shown in Table 1.Here,the greedy shortest path routing is chosen for the efficient purpose.The specific steps of ISZ will be described below.

    Communication between sensors,we adopt acknowledgement mechanism to ensure the reliability of data transmission.As shown in Fig.3,when the node Aforwards a packet Mto B,A will receive an implicit confirmation when Bforwards the packet Mdownstream.If Adoes not hear B′s acknowledgement in some abnormal situations,such as interruption of link or silent state of nodes,the node A will notify its neighbors of their current states,and then select the next hop node prior to retransmitting the packet.The blue shadow section indicates the zone or area of an attacker′s eavesdropping.Fig.3illustrates an attacker walking away from the delivery path of the real packet.The dashed arrow represents the state that after the node A has delivered a packet to B successfully,B is broadcasting a packet.If B receives an acknowledgement from C,the dashed arrow will change into the solid line like that from Ato B.

    Fig.3 Packet transmission outside the silent zone

    The number of the relaying nodes and selection strategies varies depending on the routing protocols.For the greedy shortest path routing protocol,we assume that the node Ois supposed to be the next hop of A.When Oreceives A′s signal,the state of Ois silent(in shadow warning area).As mentioned above,Ochanges into a silent state when it receives the warning beacon signal from H_node.Therefore,the packet will be discarded,as shown in Fig.4(a).Provided that the node Acannot receive the acknowledgement from the node O,it will reselect a new relay for the real packet and simultaneously send a false packet M.The detailed process is carried out in two phases,an update phase and an operational phase.

    Fig.4 Illustration of a packet delivery process

    We assume that each sensor has a list of its neighbors.In the update phase,the node Aobtains all the information of its neighbor nodes which belongs to SET-Nei_A,using one-h(huán)op broadcast message.According to the states information of neighbors,the currently active neighbors′information is updated as SET_Active_A,where SET_Active_A=SET_Nei_ASET_Silent_Zone.In the operational phase,Band B′are chosen to be the successor of A.The node Bis for the real packet M,and B′is for the false packet M ,as shown in Table 1.From the perspective of an attacker,Mhas no difference from M.The node which receives M,will continue to deliver Mto the next hop Next_Hop_Real according to the original routing outside the silent zone.While the node chosen to forward Mwill elect the next hop Next_Hop_Fals according to Algorithm 1.

    Table 1 Two types of packets

    Algorithm 1The next hop outside the silent zone

    In the update phase,the node Acan identify the silent nodes by the feedback from its neighbors.For example,the nodes which are geographically adjacent in the silent zone,such as O and O1,are concluded to be in silent states because they are unable to send acknowledgements to A.The nodes which send acknowledgements are intuitively evaluated to be active,as shown in Fig.5.Although there are some nodes that do not send signals because of other abnormal factors,such as energy depletion,one of the reasons that these nodes are not identified to be silent is that their geographical locations are not contiguous.However,such abnormal situation is beyond our scope of discussion,and there are only two states are taken into account,silent and active.After the update,as shown in Fig.4(b),the active node B,which is closest to the sink,is chosen according to the greedy shortest path routing protocol.As each node knows the location of its own and the sink according to the neighbor list as shown in Table 2,where Ddenotes the distance,we also can select the node B′to forward the false packet,and the selection principle is that the node should be close to the silent zone but away from the node O.As shown in Fig.5,B3is the best node because it is further away from Othan B1 and B2and closer to the silent zone than B4.Obviously,B′is the locally optimal relaying node,if X,B′∈SET_Active_A∧X≠B′,∠BOX≤∠BOB′.

    Fig.5 Neighbours′state

    Table 2 List of A′s neighbors

    Algorithm 2 Choosing a bait node intelligently in silent zone

    Step 1First,the neighbors′states are obtained by the current node,and two sets are classified:the set of silent neighbors SET_Silent_Current and active neighbors SET_Active_Nenode.

    Step 2If there is one of the silent neighbors of the current node in SET_Silent_Curren,and this neighbor node′ meets the requirement,namely d(node′,O)> R,where Ris the attack radius,node′is the bait_node we are looking for.Otherwise,go to step 3.

    Step 3If the node′is not in the silent zone or d(node′,O)≤R,the current node will continue to search the next hop Next_Hop_False(Current_node),which is the nearest to the silent zone,as presented in Algorithm 1.Move to the next hop,and initialize this node into the Current_node.

    Repeat the above steps until the required bait_node is met,as shown in Fig.4(c).The false packet continues to being forwarded prior to being broadcast by the bait node.The one-h(huán)op broadcast packet entices the attacker to move away from the original routing path.The nodes which receive this fake packet simply discards it.Besides,in order to select the optimal bait_node,we need to ensure our network is deployed densely.

    3.4 Privacy analysis

    As shown in Fig.6,the network employing ISZ mechanism will have the following two states depending on the location of an attacker.The first state is cautionary when the attacker is close to the routing path.For the contextual privacy,a longer route is chosen to avoid the attacker′s eavesdropping.In the meantime,the attacker will receive false packets from a bait_node,instead of real messages.As a consequence,the attacker will move to the bait_node,which is far away from the original routing,and achieve the second state,that is,safe state.In the safe state,the routing bias caused by the SZ mechanism will gradually disappear and the packet will be delivered by the original routing.

    Definition 3In order to measure the privacy performance of the network,for a single attacker with definite attack model,safety period and capture likelihood[4]are adopted.

    (1)safety period§ :The number of monitoring data sent by the source node,before the attackers capture it.

    (2)likelihood L:In a fixed time,the probability that attackers capture the source node.

    Fig.6 Two state models

    Before the source node is captured,the more packets are sent,the longer the safety period is,and the higher the privacy level is.Within a fixed time and distance from the source node to the sink,s-d,the higher the capture likelihood is,the worse the privacy level is.

    As mentioned before there are two states in Fig.6.We assume that the probability of the network in the cautionary state is PC.As the area of the silent zone increases to cover the attacking range,the attacker can no longer receive any real packets.Therefore,the real packet capture likelihood is 0.Meanwhile,the attacker will track the false packets.Consequently,the network changes into a safe state,whose probability is assumed to be PS,as shown in Fig.6(b),when the attacker can receive neither real nor false packets.For a patient attacker,he will stay there all the time(for a long time),and the privacy of the network is guaranteed,that is,the source capture likelihood is 0.For a curious attacker in the safe state,he will have random walk,so the source capture likelihood is L=PS/N (Nis the number of sensor nodes in the network).When he moves close to the routing path,he will be enticed by the bait node.As a result,the source capture likelihood for a curious attacker in the cautionary state is L=PC×0=0,because he will receive none of real packets and move to a false direction.So,the probability of capturing the source for a curious attacker is PS/N,where PC+PS=1.

    As seen from Fig.6intuitively,the attacker does not interfere with the network in the safe state,while in the cautionary state,the length of real-packet path increases and false packets will generate extra energy.Therefore,we will briefly estimate the energy consumption theoretically,and in the next section,the performance of our proposed mechanism in the network will be verified experimentally.

    3.5 Energy analysis of ISZ

    Initially,an attacker starts from the sink,and the source begins to deliver the data to the sink.Assuming that the energy caused by beacons is negligible,the delay and the energy cost in the network is mainly attributed by packet transmission and reception.Therefore,the routing path length and the number of packets sent and received are mainly calculated.

    In the best case,the attacker is far away from the real transmission path,as shown in Fig.6(b).Without false packets,the energy is simply related to the routing protocol.Generally,since the shortest path costs the least energy,assuming the shortest path length is h,the total energy consumption of transmission for each event to the sink is=h·Esr,where Esris the energy cost of the transmission and reception of each packet for a single node.The path bias is affected by the attackering area.In the worst case,the real routing path and the false path nearly circle around the attacking range,as shown in Fig.6(a).Let the radius of the eavesdropping area be Rhops,and assuming that the real packet length is h,the total energy consumed for each event to the sink in the worst case is a-average energy is

    4 Performance Evaluation

    A simulator Castalia based on OMnet+ +is applied to verify the efficiency of our methods.We deploy a squared field of 100×100m,where all sensors are distributed uniformly.The sink is arranged randomly in the central.Assuming that there is only an attacker,we let the monitored source asset be located in different distance from the sink.The MAC protocol is based on IEEE 802.15.4,including information load part as mentioned above.Once an attacker is detected,an alarm beacon is sent.Although ISZ does not reply on the routing protocol,in this comparative evaluation,we use ISZ based on shortest-path routing(SP),which is also applied as a baseline to reflect the impact of other approaches along with phantom routing(PR)and CALP[12].The phantom algorithm has been discussed in the second chapter,and the process of attacker-detection in CALP is also based on the beacon technique.The main process of CALP is that each node maintains a routing table containing all its neighbors.When an attacker is found,a beacon is broadcast to update the routing table,in which the node closet to the shortest path and furthest to the attacker is chosen as the next hop node.Here we will analysis not only the curious but also the patient attacker.The beacon does not cost additional energy,but dummy packets does.The simulation is carried out for 50times,and a total of 500new packets are sent from the source node for each time.

    (1)Delay.Delay means the sending time of a packet from the source to the sink,which includes two aspects:one is the delay caused by the beacons,and the other is packet delay due to routing policies,such as re-transmission time,routing path and etc..Therefore,relying on the beacons to update the routing table,CALP policy have a great delay,which depends on the beacon updating frequency and the path length.The path length in CALP changes when the attack type changes.Compared with the curious attacker,the patient attacker causes much more delay in CALP,as shown in Fig.7.Because CALP needs more time for beacons to update the routing,it causes more delay than other mechanisms.

    Similar to CALP,the path bias of SZ is also affected by attack types.When a curious attacker does not receive any packets,he would be likely to walk randomly around the sink.Therefore,the delivery path to the sink is unstable,and the latency in this case is slightly higher than that in PR and SP,as shown in Fig.6(a).Nevertheless,for a patient attacker,SZ leads to significantly higher delay than that of SP,as shown in Fig.7(b).Because when the attacker is near the sink,the path bias is great,leading to more than 97%of packets that can not be delivered to the sink.Suffering from great delay,some packets jump 157hops before reaching the sink node.The delay in phantom routing is higher than that in SP for the additional steps by random walk.The phantom routing method will not be affected by the attack types,so the packet delay has nothing to do with the patient or curious attacks.

    Delivery time in ISZ,similar to that in SP,only depends on the path length (i.e.,the source to the sink distance is s-d),regardless of beacon intervals,which have affection on network traffic.In fact,the curious attacker will have random walk for he can not receive any packets near the sink.In ISZ,it is less likely to get close to silent zones in the vicinity of source routing,so it will not cause much bias to the original path as pure SZ method does,and the increased traffic is very limited.An attacker starts from the sink and the initial data approaches to the sink when ISZ mechanism plays a role,especially for a patient attacker who will be enticed away from the original path,causing no more additional delay.

    Fig.7 Packets delay comparison using different mechanisms for two kinds of attackers

    (2)Privacy.There are two main measures of privacy:safety period and capture likelihood.We conducted 50experiments,and use the capture times to measure the source privacy in a given time.The less times to be captured are,the longer the safety period will be.The smaller the capture likelihood is,the higher the privacy will be.As shown in Fig.8,with the increase of s-d,the privacy of the shortest path do not increase.On the contrary,it is the worst,because once a packet is captured,the attacker will follow the shortest path to find the source.As our experiment shown,the capture likelihood of a curious attacker is less than that of a patient attacker.That is because the curious attacker will walk away from the sink if he waits awhile without receiving any packets.Thus,the patient attacker has a higher capture likelihood.Phantom routing in the simulation is no better than the shortest path when a patient attacker,as s-d increases,the random walk increases,the curious attacker would receive none of packets due to leaving away from the real transmission path,and lose some chances to capture sources.The essence of CALP is the greedy shortest path routing,but choosing the most furthest one from the attacker.Obviously,since CALP is related to the eavesdropping range of the attacker,in the simulation when the communication radius is set as the same as the eavesdropping range,the patient attacker can receive a few real packets in the vicinity of the sink,while the curious attacker also can catch the source after random walk if the attacker does not receive any information,when s-dis short.

    Because he cannot receive any packets in SZ,the curious attacker will have random walk according to the probability distribution of random walk in Eq.(3).When the source is close to the sink,the attacker would walk to the source and capture it,as shown in Fig.8(a).For the patient attacker,he will not receive any packets for tracing source and stay where he is.Therefore,SZ has the better privacy for a patient attacker than that for a curious attacker.In ISZ,when the distance between the sink and the source is short,the attacker has high capture likelihood for h is small at this time.Because of the interference by dummy packets,ISZ has more privacy than SZ when facing a curious attacker,as shown in Fig.8(b).With the increase of s-d,the corresponding routing path h will increase.Both for curious and patience,ISZ has excellent performance in preserving the privacy of the source location.

    Fig.8 Privacy performance comparison using different mechanisms for two kinds of attackers

    (3)Path bias.According to Definition 2,the path bias shows the impact of security mechanisms on the original routing.The pure SP routing has almost no bias because the path is deterministic.Four kinds of privacy schemes are ana-lyzed here,and the shortest path is selected as the original routing path.As shown in Fig.9,PR has the biggest path bias,compared with other three mechanisms.The path bias of PR depends the number of hops of random walk,irrelevant to the types of attackers.The bias value for PR is unstable,because the direction of random walk is uncertain.If the direction is against the sink,the bias will increase.While if the some steps are canceled each other by random walk,the bias might just remain low.

    When a curious attacker moves near the original routing path as shown in Fig.9(b),CALP always selects the furthest node from the attacker as long as the attacker is still nearby.Consequently,the original path shifts many times.If the attacker does not receive any packets,he will have random walk,and the shift will not disappear until the attacker moves far away from the original path.In the SZ scheme,when the source is closer to the sink,that is,s-dis small,the curious at-tacker will capture some packets and stay on the path,resulting in a great path bias.As s-dincreases,the curious attacker may walk randomly to a safe state,so the path bias declines relatively.The ISZ scheme causes the smallest path bias because every time when an attacker approaches near the original routing,false packets will entice him far away from the original routing,and the curious attacker will have random walk.As s-d increases,the probability of capturing the source becomes smaller,as well as the path bias.

    When facing apatient attacker,as shown in Fig.9(a),the bias for SZ is not found.It is because when the patient attacker is near to the sink,more than 97%of packets can not reach the sink,as mentioned before that some packets jump 157hops before reaching the sink,leading to enormous bias.In addition,the path bias is related to the attacking range,which is set the same as the area of sensor communication.For CALP,when a patient attacker can not receive any packet,he will stay near the original path,so the bias will always exist,slightly larger than that for a curious one.The path bias of ISZ for a patient attacker is even smaller than that for a curious one.Once a patient attacker is enticed by false packets far away from the original routing,and can not receive any packets,he will no longer move.Thus the network will maintain a safe state for a long time and the following packets are delivered by the shortest path.

    (4)Energy.The research has shown that for wireless sensors,the energy cost by executing 3 million of general program instructions is equivalent to that by transmitting data in the distance of 100m[29].

    The parameters used in this simulation are listed in Table 3.

    It can be seen that with fixed number of packets and routing policies in the network,theenergy consumption related to the distance between nodes is O(d2).The total amount of the energy is related to the path length squared,so the routing algorithm itself affects the energy consumption.In Fig.10(a),the abnormal case of SZ occurs when facing apatience attacker,and the packet is always around the sink but can not arrive,which consumes much more energy.Obviously,ISZ mechanism is less likely to interfere with the original routing path.We implement the shortest path,CALP,SZ and ISZ to compare with the shortest path routing,showing the effect on the energy consumption of the whole network.Beacon scheduling itself does not generate additional energy consumption,although CALP has high delay,still maintaining the energy level of the shortest path.While for ISZ,dummy packets cause additional energy,as mentioned before,dummy packets only occur when there is a silent zone near the real routing path.In the simulation,after the attacker was tempted to leave the original path,the situation is not distinct between SZ and ISZ.Therefore,when the three strategies in the face of the curious attacker,the actual difference might not be too much,as shown in Fig.10(b).As sorted by the energy efficiency,ISZ has the best energy performance.

    Table 3 Parameters setting

    Fig.9 Path bias comparison using different mechanisms for two kinds of attackers

    Fig.10 Energy cost comparison using different mechanisms for two kinds of attackers

    5 Conclusions

    In this article,we propose an improved solution for source location privacy in WSNs,which is vulnerable to backtracking attack by a local adversary.The proposed solution of ISZ can be suitable to many event-driven WSNs applications by preventing a local attacker from receiving contextual information.Compared with SZ,ISZ combines an isolated area as a trap for adversary and entices the adversary far away from the original routing path.As shown in the results,the ISZ method outperforms its counterparts e.g.,PR and SP in the safety period as well as in energy consumption.However,cautious local adversaries as well as beaconing influence on WSNs are rarely considered.Further researches are needed to ad-dress these issues.

    Acknowledgements

    This work was supported by the National Natural Science Foundation of China (Nos.61373015,61300052,41301047),the Priority Academic Program Development of Jiangsu Higher Education Institutions,and the Important National Science and Technology Specific Project(No.BA2013049)。

    [1] CONTI M,WILLEMSEN J,CRISPO B.Providing source location privacy in wireless sensor networks:A survey[J].IEEE Communications Surveys Tutorials,2013,15(3):1238-1280.

    [2] WANG B,ZHANG X.WSNs routing protocol of airfield lighting monitoring system based on energy balance[J].Journal of Nanjing University of Aeronautics and Astronautics,2015,47(4):525-533.

    [3] ZHOU Qian,QIN Xiaolin,DING Youwei.Preserving source-location privacy efficiently based on attack perceiving in wireless sensor network[J].Journal on Communications,2018,39(1):101-116.

    [4] KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source-location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems.Columbus:IEEE,2005:599-608.

    [5] ZHANG Y,WANG G,HU Q,et al.Design and

    performance study of a topology-h(huán)iding multipath routing protocol for mobile ad hoc networks[C]//35th Annual IEEE International Conference on Computer Communications.Orlando:IEEE,2012:10-18.

    [6] RAHAT A,EVERSON R,F(xiàn)IELDSEND J,et al.Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks[J].Ad Hoc Networks,2016,52:130-145.

    [7] MEHTA K,LIU D,WRIGHT M.Protecting location privacy in sensor networks against a global eavesdropper[J].IEEE Transactions on Mobile Computing,2012,11(2):320-336.

    [8] YANG Y,SHAO M,ZHU S,et al.Towards statistically strong source anonymity for sensor networks[J].ACM Trans Sen Netw,2013,9(3):34:1-34:23.

    [9] LOUREN O P,BATISTA P,OLIVEIRA P,et al.Simultaneous localization and mapping in sensor networks:A GES sensor-based filter with moving object tracking[C]//European Control Conference.Linz:IEEE,2015:2354-2359.

    [10]NANDHINI S,RADHA S.Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks[C]//International Conference on Wireless Communications,Signal Processing and Networking.Chennai:IEEE,2016:1117-1122.

    [11]APICHARTTRISORN D, APICHARTTRISORN K,KASETKASEM T.A moving object tracking algorithm using support vector machines in binary sensor networks[C]//13th International Symposium on Communications and Information Technologies.Surat Thani:IEEE,2013:529-534.

    [12]RIOS R,LOPEZ J.Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J].The Computer Journal,2011,54(10):1603-1615.

    [13]BURATTI C.Performance analysis of IEEE 802.15.4 beacon-enabled mode[J].IEEE Transactions on Vehicular Technology,2010,59(4):2031-2045.

    [14]BRADBURY M,LEEKE M,JHUMKA A.A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]//IEEE Trustcom/BigDataSE/ISPA.Helsinki:IEEE,2015:531-538.

    [15]OUYANG Y,LE Z,LIU D,et al.Source location privacy against laptop-class attacks in sensor networks[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York:IEEE,2008:1-10.

    [16]RAJ M,LI N,LIU D,et al.Using data mules to preserve source location privacy in wireless sensor networks[J].Pervasive and Mobile Computing,2014,11(2):244-260.

    [17]JHUMKA A,LEEKE M,SHRESTHA S.On the use of fake sources for source location privacy:Trade-offs between energy and privacy[J].The Computer Journal,2011,54(6):860-874.

    [18]SHI R,GOSWAMI M,GAO J,et al.Is random walk truly memoryless:Traffic analysis and source location privacy under random walks[C]//The 32nd IEEE International Conference on Computer Communications.Turin:IEEE,2013:3021-3029.

    [19]XI Y,SCHWIEBERT L,SHI W.Preserving source location privacy in monitoring-based wireless sensor networks[C]//The 20th IEEE International Parallel Distributed Processing Symposium.Rhodes Island:IEEE,2006:355-355.

    [20]ALOMAIR B,CLARK A,CUELLAR J,et al.Toward a statistical framework for source anonymity in sensor networks[J].IEEE Transactions on Mobile Computing,2013,12(2):248-260.

    [21]MEHTA K,LIU D,WRIGHT M.Location privacy in sensor networks against a global eavesdropper[C]//International Conference on Network Protocols.Beijing:IEEE,2007:314-323.

    [22]AMIN R,BISWAS G P.A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J].Ad Hoc Networks,2016,36(1):58-80.

    [23]SRINIVAS J,MUKHOPADHYAY S,MISHRA D.Secure and efficient user authentication scheme for multi-gateway wireless sensor networks[J].Ad Hoc Networks,2017,54:147-169.

    [24]SHAO M,HU W,ZHU S,et al.Cross-layer enhanced source location privacy in sensor networks[C]//6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Rome:IEEE,2009:1-9.

    [25]XING Y,CHEN Y,YI W.Optimal beacon interval for TDMA-based MAC in wireless sensor networks[C]//11th International Conference on Innovations in Information Technology.Dubai:IEEE,2015:156-161.

    [26]LIU C J,HUANG P,XIAO L.TAS-MAC:A traffic-adaptive synchronous MAC protocol for wireless sensor networks[J].ACM Trans Sen Netw,2016,12(1):1-30.

    [27]ZHOU L,WAN C,HUANG J,et al.The location privacy of wireless sensor networks:Attacks and countermeasures[J].Wireless Networks,2014,8(5):521-534.

    [28]BAO Y,JI C,CHEN G,et al.WSN node applied to large-scale unattended monitoring[J].Transactions of Nanjing University of Aeronautics and Astronautics,2016,33(3):386-395.

    [29]POTTIE G,KAISER W.Wireless integrated network sensors[J].Communications of ACM,2000,43(5):51-58.

    欧美三级亚洲精品| 听说在线观看完整版免费高清| 日韩欧美精品免费久久| 中文字幕免费在线视频6| 欧美变态另类bdsm刘玥| 夜夜看夜夜爽夜夜摸| 欧美bdsm另类| 亚洲国产欧美人成| 亚洲精品成人av观看孕妇| 亚洲人成网站高清观看| 国产有黄有色有爽视频| 亚洲国产精品专区欧美| 成人无遮挡网站| 国产精品蜜桃在线观看| 亚洲在久久综合| 久久热精品热| 丰满乱子伦码专区| 免费在线观看成人毛片| 中文字幕av在线有码专区| 永久网站在线| 亚洲熟妇中文字幕五十中出| 五月天丁香电影| 午夜久久久久精精品| 精品久久久久久久人妻蜜臀av| 亚洲欧美一区二区三区黑人 | 亚洲欧美清纯卡通| 亚洲人成网站在线播| 亚洲性久久影院| 亚洲精品aⅴ在线观看| 国产精品久久久久久精品电影| 免费观看性生交大片5| 久久久久性生活片| av在线亚洲专区| 日韩人妻高清精品专区| 亚洲欧洲日产国产| 99热6这里只有精品| 久久精品熟女亚洲av麻豆精品 | 校园人妻丝袜中文字幕| 欧美日韩亚洲高清精品| 精品酒店卫生间| 亚洲成人中文字幕在线播放| 日韩av在线大香蕉| 亚洲国产精品国产精品| 你懂的网址亚洲精品在线观看| 草草在线视频免费看| 嫩草影院新地址| 久久精品久久久久久久性| 免费看不卡的av| 精品人妻偷拍中文字幕| 一级a做视频免费观看| 男人和女人高潮做爰伦理| 精品人妻一区二区三区麻豆| 日本免费在线观看一区| 777米奇影视久久| 国语对白做爰xxxⅹ性视频网站| 欧美成人午夜免费资源| 熟女电影av网| 国产亚洲91精品色在线| 国产精品熟女久久久久浪| 久久久a久久爽久久v久久| 成人亚洲欧美一区二区av| eeuss影院久久| 69人妻影院| 一级av片app| 人妻一区二区av| 国产极品天堂在线| 69人妻影院| 欧美成人精品欧美一级黄| 亚洲性久久影院| 国产黄频视频在线观看| 日韩强制内射视频| 亚洲精品中文字幕在线视频 | 亚洲精品一二三| 国产永久视频网站| 美女黄网站色视频| 欧美xxxx性猛交bbbb| 日韩一区二区视频免费看| 成人毛片a级毛片在线播放| 2018国产大陆天天弄谢| 三级国产精品片| av在线亚洲专区| 国产 一区精品| 欧美性感艳星| 国产一级毛片在线| 国产高清不卡午夜福利| 亚洲伊人久久精品综合| 国产淫片久久久久久久久| 秋霞伦理黄片| 午夜福利在线在线| 少妇猛男粗大的猛烈进出视频 | 网址你懂的国产日韩在线| 日韩不卡一区二区三区视频在线| 在现免费观看毛片| 国产伦一二天堂av在线观看| 99久久精品热视频| 成人性生交大片免费视频hd| 欧美激情国产日韩精品一区| 亚洲欧美成人综合另类久久久| 在线观看免费高清a一片| 高清毛片免费看| 亚洲成人av在线免费| 亚洲av.av天堂| 毛片女人毛片| 国产精品不卡视频一区二区| 亚洲乱码一区二区免费版| 超碰av人人做人人爽久久| 国产一级毛片在线| 精品熟女少妇av免费看| 成人特级av手机在线观看| 国产视频内射| 成人亚洲欧美一区二区av| 日韩三级伦理在线观看| 亚洲国产精品成人久久小说| 欧美高清成人免费视频www| 亚洲乱码一区二区免费版| av在线播放精品| 亚洲图色成人| 肉色欧美久久久久久久蜜桃 | 亚洲国产精品成人久久小说| 亚洲欧美日韩东京热| 日韩精品有码人妻一区| 精品欧美国产一区二区三| 精品国内亚洲2022精品成人| 哪个播放器可以免费观看大片| 日韩av在线大香蕉| 真实男女啪啪啪动态图| 亚洲精品,欧美精品| 嫩草影院新地址| 99久久人妻综合| 日本-黄色视频高清免费观看| 日本猛色少妇xxxxx猛交久久| 亚洲精品第二区| 国产免费又黄又爽又色| 亚洲国产日韩欧美精品在线观看| 久99久视频精品免费| 国产v大片淫在线免费观看| 天堂网av新在线| 亚洲精品一二三| 亚洲国产高清在线一区二区三| 蜜臀久久99精品久久宅男| 久久久久久伊人网av| 亚洲美女视频黄频| 精品人妻视频免费看| 午夜日本视频在线| 中文天堂在线官网| 亚洲第一区二区三区不卡| 亚洲成人av在线免费| 一个人看的www免费观看视频| 久久精品国产鲁丝片午夜精品| 少妇人妻精品综合一区二区| 亚洲国产欧美人成| 麻豆国产97在线/欧美| 欧美xxxx黑人xx丫x性爽| 久久久久性生活片| 啦啦啦韩国在线观看视频| 亚洲精品日韩在线中文字幕| 18禁在线无遮挡免费观看视频| 中文字幕人妻熟人妻熟丝袜美| 亚洲av日韩在线播放| 淫秽高清视频在线观看| 熟妇人妻不卡中文字幕| 国产免费福利视频在线观看| 久久精品久久精品一区二区三区| 可以在线观看毛片的网站| 国产精品国产三级专区第一集| 久久99热这里只频精品6学生| 国产乱人偷精品视频| 国产一级毛片七仙女欲春2| 91久久精品国产一区二区三区| 亚洲精品中文字幕在线视频 | 国产精品人妻久久久影院| 亚洲人与动物交配视频| 免费av不卡在线播放| 亚洲av福利一区| 国产乱来视频区| 精品酒店卫生间| 精品午夜福利在线看| 久久精品国产亚洲网站| 国产av码专区亚洲av| 一级a做视频免费观看| 极品教师在线视频| 亚洲电影在线观看av| 国产视频首页在线观看| 天堂影院成人在线观看| 国产精品福利在线免费观看| 亚洲最大成人手机在线| 少妇高潮的动态图| 狂野欧美激情性xxxx在线观看| 久久久久久久大尺度免费视频| 天堂中文最新版在线下载 | 美女内射精品一级片tv| av在线亚洲专区| 一级毛片 在线播放| 国产中年淑女户外野战色| www.av在线官网国产| 国产欧美另类精品又又久久亚洲欧美| 麻豆av噜噜一区二区三区| 在线a可以看的网站| 亚洲欧洲日产国产| 国产大屁股一区二区在线视频| 亚洲精品日韩在线中文字幕| 亚洲最大成人手机在线| 国产精品.久久久| 1000部很黄的大片| 欧美性感艳星| 亚洲人成网站在线播| 亚洲精品aⅴ在线观看| 69人妻影院| 亚洲三级黄色毛片| 亚洲欧美成人综合另类久久久| 熟女人妻精品中文字幕| 九九在线视频观看精品| 69人妻影院| 国产色婷婷99| www.色视频.com| 午夜爱爱视频在线播放| 国产黄片美女视频| 在线观看美女被高潮喷水网站| 国产大屁股一区二区在线视频| 亚洲精品,欧美精品| 亚洲精品国产av成人精品| 亚洲欧美成人精品一区二区| 国产亚洲91精品色在线| 极品少妇高潮喷水抽搐| 黄片wwwwww| 人妻少妇偷人精品九色| 插逼视频在线观看| 两个人视频免费观看高清| 成人综合一区亚洲| 国产伦精品一区二区三区视频9| 久久久久精品性色| 插逼视频在线观看| 男女视频在线观看网站免费| 亚洲精华国产精华液的使用体验| 少妇的逼好多水| 亚洲人成网站在线播| 亚洲激情五月婷婷啪啪| 男人和女人高潮做爰伦理| 少妇熟女aⅴ在线视频| 欧美精品国产亚洲| 亚洲国产精品国产精品| 看非洲黑人一级黄片| 国产黄色视频一区二区在线观看| 精品国产露脸久久av麻豆 | 成人综合一区亚洲| 久久精品夜夜夜夜夜久久蜜豆| 免费黄色在线免费观看| 国产成人精品久久久久久| 国精品久久久久久国模美| 天堂av国产一区二区熟女人妻| 久久精品久久久久久噜噜老黄| 成年人午夜在线观看视频 | 亚洲av一区综合| 国产色婷婷99| 久久久久久久久久黄片| 日日啪夜夜爽| 免费观看a级毛片全部| 国产精品久久久久久精品电影小说 | 午夜激情福利司机影院| 永久免费av网站大全| 少妇猛男粗大的猛烈进出视频 | 日日啪夜夜撸| 春色校园在线视频观看| 亚洲av二区三区四区| 国产精品女同一区二区软件| 亚洲av中文字字幕乱码综合| 国产成人免费观看mmmm| 亚洲美女搞黄在线观看| 五月伊人婷婷丁香| 一级av片app| 中文字幕av成人在线电影| 亚洲国产最新在线播放| 久久久久国产网址| 一个人免费在线观看电影| 国产伦精品一区二区三区四那| 免费av毛片视频| 一级av片app| 亚洲精品乱码久久久久久按摩| 国产在视频线精品| 成年版毛片免费区| 免费观看无遮挡的男女| 亚洲在久久综合| 丰满乱子伦码专区| a级一级毛片免费在线观看| 美女黄网站色视频| videos熟女内射| 欧美bdsm另类| 韩国高清视频一区二区三区| 日日啪夜夜撸| 少妇熟女欧美另类| 亚洲av日韩在线播放| 午夜福利在线观看吧| 精品少妇黑人巨大在线播放| 欧美性猛交╳xxx乱大交人| 精品一区二区三卡| 欧美精品国产亚洲| 亚洲天堂国产精品一区在线| 亚洲av成人精品一二三区| 麻豆乱淫一区二区| 2022亚洲国产成人精品| 午夜激情欧美在线| 午夜福利高清视频| 日本一二三区视频观看| 国产老妇女一区| 一区二区三区四区激情视频| 特级一级黄色大片| 国产综合精华液| 国产午夜精品一二区理论片| 国产亚洲午夜精品一区二区久久 | 精品一区二区三区人妻视频| 亚洲av免费高清在线观看| 国产精品1区2区在线观看.| 69人妻影院| 国产伦理片在线播放av一区| 中国国产av一级| 久久久精品免费免费高清| 国产精品国产三级国产av玫瑰| 免费黄网站久久成人精品| 国产精品无大码| 亚洲精品成人av观看孕妇| 边亲边吃奶的免费视频| 中文乱码字字幕精品一区二区三区 | 国产精品女同一区二区软件| 少妇的逼水好多| 国产男人的电影天堂91| 国产免费又黄又爽又色| 2018国产大陆天天弄谢| 秋霞伦理黄片| 色综合站精品国产| 一级毛片aaaaaa免费看小| 免费不卡的大黄色大毛片视频在线观看 | 亚洲精品亚洲一区二区| 午夜激情福利司机影院| 国产极品天堂在线| 色视频www国产| 亚洲精品自拍成人| 国产乱来视频区| 亚洲av国产av综合av卡| 免费观看的影片在线观看| 国产成人a区在线观看| 日本与韩国留学比较| av国产久精品久网站免费入址| kizo精华| 免费看美女性在线毛片视频| 久久亚洲国产成人精品v| 激情五月婷婷亚洲| 91精品一卡2卡3卡4卡| 久久久久久久午夜电影| 欧美高清成人免费视频www| 久久久精品94久久精品| 欧美高清成人免费视频www| 久久久精品94久久精品| 日韩欧美一区视频在线观看 | 91精品一卡2卡3卡4卡| 丰满乱子伦码专区| 亚洲精品一二三| 日韩强制内射视频| av在线亚洲专区| 国产精品精品国产色婷婷| 精品久久久久久久人妻蜜臀av| 一级a做视频免费观看| 国产色婷婷99| 97在线视频观看| a级一级毛片免费在线观看| 国产黄a三级三级三级人| 中文字幕久久专区| 国产亚洲午夜精品一区二区久久 | 久久精品人妻少妇| a级毛色黄片| 汤姆久久久久久久影院中文字幕 | 日韩一区二区视频免费看| 天堂√8在线中文| 国产色婷婷99| 丰满乱子伦码专区| 国产伦在线观看视频一区| 搡老乐熟女国产| 啦啦啦韩国在线观看视频| 九色成人免费人妻av| 联通29元200g的流量卡| 欧美另类一区| 国产亚洲精品av在线| 欧美性猛交╳xxx乱大交人| 中文资源天堂在线| 日本爱情动作片www.在线观看| 亚洲最大成人中文| 色播亚洲综合网| 亚洲成色77777| 天天躁日日操中文字幕| 夜夜看夜夜爽夜夜摸| 免费观看的影片在线观看| 国产一级毛片七仙女欲春2| 久久久久网色| 亚洲精品乱码久久久久久按摩| 亚洲国产色片| 日韩av不卡免费在线播放| 精品人妻熟女av久视频| 国产黄频视频在线观看| 亚洲精品国产av蜜桃| 搡女人真爽免费视频火全软件| 内地一区二区视频在线| 99久久中文字幕三级久久日本| 国产一区有黄有色的免费视频 | 久久精品国产鲁丝片午夜精品| 久久久久久久久大av| 国产大屁股一区二区在线视频| 亚洲精品乱久久久久久| 日韩一区二区视频免费看| 淫秽高清视频在线观看| 日韩国内少妇激情av| 亚洲aⅴ乱码一区二区在线播放| 亚洲av二区三区四区| 一区二区三区乱码不卡18| 天堂中文最新版在线下载 | 国产精品伦人一区二区| 日本wwww免费看| 精品人妻一区二区三区麻豆| 欧美精品国产亚洲| 日韩在线高清观看一区二区三区| 国产黄片视频在线免费观看| 国产精品1区2区在线观看.| 亚洲精品国产av成人精品| 三级国产精品欧美在线观看| 亚洲综合精品二区| 国产一区二区三区综合在线观看 | 国产成人aa在线观看| 精品一区二区三区人妻视频| 18禁裸乳无遮挡免费网站照片| 看十八女毛片水多多多| 日本免费a在线| 免费av观看视频| 国产国拍精品亚洲av在线观看| av黄色大香蕉| 搡女人真爽免费视频火全软件| 久久精品久久久久久久性| 22中文网久久字幕| 毛片女人毛片| 欧美区成人在线视频| 男女视频在线观看网站免费| 伊人久久精品亚洲午夜| 国产高清国产精品国产三级 | 国产精品美女特级片免费视频播放器| 欧美区成人在线视频| 毛片一级片免费看久久久久| 91狼人影院| 欧美性猛交╳xxx乱大交人| 波多野结衣巨乳人妻| 日韩av免费高清视频| 国产色爽女视频免费观看| 色综合亚洲欧美另类图片| 免费黄网站久久成人精品| av国产免费在线观看| 少妇人妻精品综合一区二区| 一级毛片黄色毛片免费观看视频| 18禁在线无遮挡免费观看视频| 青春草视频在线免费观看| 日韩一本色道免费dvd| 日韩亚洲欧美综合| 欧美日韩一区二区视频在线观看视频在线 | av专区在线播放| av免费在线看不卡| 久久精品国产亚洲av天美| 国产一区二区在线观看日韩| 婷婷色av中文字幕| 久久99蜜桃精品久久| 非洲黑人性xxxx精品又粗又长| 久久久亚洲精品成人影院| 在线免费十八禁| 高清午夜精品一区二区三区| 卡戴珊不雅视频在线播放| 97超碰精品成人国产| 日本猛色少妇xxxxx猛交久久| 夜夜爽夜夜爽视频| 精品久久久久久电影网| 亚洲精品第二区| 国产高潮美女av| 大香蕉97超碰在线| 亚洲性久久影院| a级毛片免费高清观看在线播放| 成人午夜精彩视频在线观看| 一区二区三区四区激情视频| 天堂中文最新版在线下载 | 非洲黑人性xxxx精品又粗又长| 日本黄大片高清| 欧美日韩国产mv在线观看视频 | 成人亚洲精品av一区二区| 又大又黄又爽视频免费| 国产日韩欧美在线精品| 一级毛片久久久久久久久女| 欧美区成人在线视频| 日韩 亚洲 欧美在线| 日韩欧美精品v在线| 别揉我奶头 嗯啊视频| 日韩av免费高清视频| 国产探花极品一区二区| 国产亚洲精品久久久com| 免费高清在线观看视频在线观看| 亚洲图色成人| 色综合站精品国产| 白带黄色成豆腐渣| 简卡轻食公司| 久久精品国产自在天天线| 十八禁国产超污无遮挡网站| 欧美性感艳星| 一级毛片黄色毛片免费观看视频| 国产乱来视频区| 久久99热这里只有精品18| 久久这里有精品视频免费| 一个人免费在线观看电影| 国产有黄有色有爽视频| 国产视频内射| 一级毛片 在线播放| 免费av观看视频| 亚洲精品久久午夜乱码| 熟妇人妻久久中文字幕3abv| 美女xxoo啪啪120秒动态图| 精品久久久久久久人妻蜜臀av| 男女边吃奶边做爰视频| 国产精品人妻久久久久久| 久久久精品欧美日韩精品| 日韩在线高清观看一区二区三区| 成人特级av手机在线观看| 免费av观看视频| av在线天堂中文字幕| 蜜桃久久精品国产亚洲av| 天堂网av新在线| 国产av在哪里看| 欧美日韩国产mv在线观看视频 | 一级a做视频免费观看| 国产成人精品一,二区| 777米奇影视久久| 精品久久久噜噜| 亚洲av福利一区| 日韩电影二区| 欧美另类一区| 久久久久免费精品人妻一区二区| 搡老乐熟女国产| 国产午夜精品论理片| 日本爱情动作片www.在线观看| 久久久久国产网址| 少妇猛男粗大的猛烈进出视频 | 男插女下体视频免费在线播放| 美女脱内裤让男人舔精品视频| 午夜免费激情av| 精品熟女少妇av免费看| 男人和女人高潮做爰伦理| ponron亚洲| 久久精品夜色国产| 亚洲精品,欧美精品| 国产精品久久久久久久久免| 精华霜和精华液先用哪个| 特大巨黑吊av在线直播| 亚洲欧洲国产日韩| 色尼玛亚洲综合影院| 国产精品国产三级国产av玫瑰| 免费黄频网站在线观看国产| 中文精品一卡2卡3卡4更新| 日韩一区二区视频免费看| 淫秽高清视频在线观看| 人妻一区二区av| 久久综合国产亚洲精品| 精品少妇黑人巨大在线播放| 一二三四中文在线观看免费高清| 三级经典国产精品| 最后的刺客免费高清国语| 国产有黄有色有爽视频| 国产片特级美女逼逼视频| 国内少妇人妻偷人精品xxx网站| 国产乱来视频区| 久久精品国产自在天天线| 国产乱人偷精品视频| 国产成人91sexporn| 成年av动漫网址| 国产不卡一卡二| 尤物成人国产欧美一区二区三区| 国产成人91sexporn| videos熟女内射| 国产成人精品婷婷| 精品久久久久久久人妻蜜臀av| 舔av片在线| 国产探花极品一区二区| 日韩av在线大香蕉| 夜夜看夜夜爽夜夜摸| 久久久久网色| 久久99精品国语久久久| 久热久热在线精品观看| 日日撸夜夜添| 国产激情偷乱视频一区二区| 欧美日韩视频高清一区二区三区二| 国产精品.久久久| 国产真实伦视频高清在线观看| 非洲黑人性xxxx精品又粗又长| 熟妇人妻久久中文字幕3abv| 亚洲国产精品成人综合色| 夜夜看夜夜爽夜夜摸| 亚洲国产最新在线播放| 国产永久视频网站| 婷婷色av中文字幕| 在线观看一区二区三区| 国产综合懂色| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 高清日韩中文字幕在线| 99久久精品一区二区三区| 最近视频中文字幕2019在线8| 免费大片黄手机在线观看| 国产黄片视频在线免费观看| 亚洲成人av在线免费| 五月天丁香电影| 国产极品天堂在线| 国产91av在线免费观看| 黑人高潮一二区| 80岁老熟妇乱子伦牲交| 亚洲最大成人av| 国产高清不卡午夜福利| 亚洲精品日本国产第一区| 国产av在哪里看|