• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card

    2018-04-08 03:11:20JaewookJungDonghoonLeeHakjunLeeandDonghoWon

    Jaewook Jung, Donghoon Lee, Hakjun Lee, and Dongho Won

    1.Introduction

    With the rapid development of the Internet service and electronic commerce technology, many people rely on computer networks to exchange information, access resource,and process data in wireless networks now. Such public wireless networks may be intruded by malicious attackers and other unauthorized users. To ensure the secure environment, the password-based user authentication technique is one of the most widely adopted mechanisms to deal with the secret data over the public channels.

    Since Lamport[1]first proposed a user authentication protocol in 1981, numerous user authentication schemes have been proposed[2]-[9]afterwards. In 2009, Xu et al.[2]proposed a smart-card-based password authentication scheme. They claimed that the scheme can resist various types of attacks even if the information stored in the smart card is revealed.However, in 2010, Song[3]proved that Xu et al.’s scheme[2]cannot be secure against an impersonation attack, and then Song[3]proposed an improved scheme. In the same year, Sood et al.[4]also found that Xu et al.’s scheme[2]cannot resist the off-line guessing attack and forgery attack, and then presented an enhanced scheme. Unfortunately, in 2013, Chen et al.[5]demonstrated that Song’s scheme[3]is vulnerable to stolen smart card attack. Chen et al.[5]also proved that Sood et al.’s scheme[4]does not provide mutual authentication, which means that a legitimate user has no way to verify the validity of the server. Then Chen et al.[5]proposed a robust smart-card-based remote user password authentication scheme. However, in 2013, Li et al.[6]pointed out that Chen et al.’s scheme[5]cannot ensure the perfect forward secrecy and detect the wrong password in login phase. Besides that, the password change of Chen et al.’s scheme[5]is inefficient since the user has to communicate with the server to update his/her password. Then Li et al.[6]proposed an enhanced user authentication scheme.

    Recently, Liu et al.[7]pointed out that Li et al.’s scheme[6]is insecure against the man-in-the-middle attack and insider attack. To address the weaknesses in the Li et al.’s scheme[6],Liu et al. proposed an improved smart card based password authentication scheme[7]. However, after careful analysis, we find that Liu et al.’s scheme is vulnerable to off-line password guessing attack and user impersonation attack as well as it fails to preserve user anonymity in login phase. In order to eliminate all the above problems existed in Liu et al.’s scheme, a security enhanced anonymous user authenticated key agreement scheme is proposed.

    The remainder of the paper is organized as follows: Section 2 describes a review of Liu et al.’s scheme. Section 3 points out the weaknesses of Liu et al.’s scheme. The proposed scheme and security analysis of the proposed scheme are presented in Sections 4 and 5, respectively. Lastly, Section 6 concludes this paper.

    2.Review of Liu et al.’s Scheme

    This section describes Liu et al.’s authentication scheme[7]which involves four phases: Registration, login, authentication,and password change. For convenience, the notations used throughout this paper are summarized in Table 1.

    2.1 Registration Phase

    Step 1. The user Uiselects his/her IDiand PWi, and generates random number r. Then Uicomputesand sends a registration requestto the server S through a secure channel.

    Table 1: Notations

    Step 2. The server S computes,, and. The server S storesinto a smart card and issues this smart card to the user Uithrough a secure channel.

    Step 3. The user Uistores the random number r into the card. Finally, the smart card contains.

    2.2 Login Phase

    Step 1. The user Uiinserts his/her smart card into a card reader and inputs IDiand PWi. The smart card computesand, then compares Ci′ with the stored value Ci. If this condition is hold,the smart card acknowledges the legitimacy of Ui, and proceeds with the next steps. Otherwise, it terminates this phase.

    Step 2. The smart card generates a random number α,computesand.

    Step 3. Finally, the user Uisends login request messageto the server S.

    2.3 Authentication Phase

    Step 1. The server S checks the validity of timestampand computes, then compares Di′ with the received value Di. If this condition is hold, the procedure goes to the next steps. Otherwise, this phase is terminated.

    Step 2. The server S generates a random number β,computesand. Then the server S sends the authentication messageto Ui.

    Step 3. The user Uichecks the validity of timestampand computes, then compares F′ with the received valueiFi. If this condition is hold, the Uiacknowledges the legitimacy of the S, and proceeds with the next step. Otherwise, it terminates this phase.

    Step 4. Finally, the user Uicomputes a session keyand the server S also computes the same shared session key

    2.4 Password Change Phase

    Step 1. The Uiinserts his/her smart card into a card reader and inputs IDiand password PWi.

    Step 2. The smart card computes, then compareswith the stored value Ci. If it is hold, Uiselects a new passwordOtherwise, this phase is terminated.

    Step 3. The smart card computesand. Finally, the smart card replaces (Bi, Ci) with (,), respectively.

    3.Security Weaknesses of Liu et al.’s Scheme

    In this section, the weaknesses of Liu et al.’s scheme[7]are demonstrated. We find that Liu et al.’s scheme cannot resist the off-line password guessing attack and user impersonation attack as well as it fails to preserve user anonymity. The details of these weaknesses are described as follows.

    3.1 Failure to Preserve User Anonymity

    User anonymity is a highly desirable property for user authentication scheme, as the leakage of user’s identity may allow an unauthorized entity to track the user’s login record and behavior pattern. However, in Liu et al.’s scheme,user’s identity IDiis in plaintext form in the login request. Using an eavesdropping attack, the attacker can maliciously monitor the public channels[8]-[10], and also identify some of the valuable information in messages transmitted over these public channels[11]-[17]. In this manner, an attacker can eavesdrop on login messages to collect the plaintext identities without difficulty. For this reason, user anonymity cannot be preserved in Liu et al.’s scheme[7].

    3.2 Off-Line Password Guessing Attack

    In Liu et al.’s scheme[7], the attacker can obtain the informationin the smart card after physically monitoring power consumption[10], and intercept login request message. Then the off-line password guessing attack can be done by performing the following steps:

    Step 1. The attacker extracts the stored parametersfrom the stolen smart card by using the power consumption attack[10].

    Step 2. The attacker obtains the exact user’s identity IDiby executing the steps discussed in subsection 3.1.

    Step 3. The attacker selects a password candidate

    Step 4. By using the obtained user’s identity IDi, the attacker computes

    Step 5. The attacker repeats above steps from step 3 to step 4 until the computed result Ci*equals the stored Ci.

    If they are equal, PWi*= PWi, this means that the attacker has successfully obtained the user’s password PWiby offline password guessing attack.

    3.3 User Impersonation Attack

    In this subsection, we demonstrate that an attacker can successfully login to the server S by using the stolen smart card of a user Ui. The steps are as follows:

    Step 1. The attacker obtains the user’s identity IDiby executing the steps discussed in subsection 3.1 and also obtains the user’s password PWiby executing the steps discussed in subsection 3.2.

    Step 2. The attacker generates a random number R, and computesThen The attacker sends the forged messageto the server S for login request.

    Step 3. Upon receiving the forged login request messagefrom the attacker, the server S first checks the validity of timestamp. After that, S computesthen compares Di′ with the received value

    Step 4. Finally, the server S successfully verifies the forged login request messagebecause the computed value Di′ correctly equals the received valueWith these correct verifications, the server S accepts the forged login request and allows the attacker to login.

    Through the aforementioned steps, we can see that the attacker can successfully impersonate the legal Ui.

    4.Proposed Scheme

    In this section, we propose a security enhanced authentication and key agreement scheme to overcome the security weaknesses in Liu et al.’s scheme[7]. The proposed scheme also consists of four phases: Registration, login,authentication, and password change. The notations in the scheme are summarized in Table 1. Fig. 1 provides an illustration of login and authentication phases of the proposed scheme.

    4.1 Registration Phase

    Step 1. The user Uiselects his/her IDiand PWiand generates the random number r. Then Uicomputes h(r||PWi)and sends a registration requestto the server S through a secure channel.

    Step 2. The server S computes,The server S stores {Bi, Ci, h(·)} into a smart card and issues this smart card to the user Uithrough a secure channel.

    Step 3. The user Uistores the random number r into the card. Finally, the smart card contains {Bi, Ci, h(·), r}.

    4.2 Login Phase

    Step 1. The user Uiinserts his/her smart card into a card reader and inputs IDiand PWi. The smart card computesthen compares Ci′ with the stored value Ci. If this condition is hold,the smart card acknowledges the legitimacy of the Ui, and proceeds with the next steps. Otherwise, it terminates this phase.

    Step 2. The smart card generates a random number α and computes,, and.

    Step 3. Finally, the user Uisends the login request message{Di, Ei, Fi, Ti} to the server S.

    4.3 Authentication Phase

    Step 1. The server S checks the validity of timestampand computes, then compares Fi′ with the received value Fi. If this condition is hold, the procedure goes to the next steps. Otherwise, this phase is terminated.

    Step 2. The server S generates a random number β, and computes. Then the server S sends the authentication message {Gi, Hi, Ts} to Ui.

    Step 3. The user Uichecks the validity of timestampand computesand, then compares Gi′ with the received value Gi. If this condition is hold, Uiacknowledges the legitimacy of the S, and proceeds with the next step. Otherwise, it terminates this phase.

    4.4 Password Change Phase

    Step 1. The user Uiinserts his/her smart card into a card reader, inputs IDiand password PWi.

    Fig. 1. Login and authentication phase of the proposed scheme.

    Step 2. The smart card computesthen compareswith the stored Ci. If it is hold, Uiselects a new password. Otherwise, this phase is terminated.

    Step 3. The smart card computesandFinally, the smart card replaces (Bi, Ci) with,).

    5.Security Analysis of Proposed Scheme

    In this section, we will analyze the proposed scheme in terms of security. Table 2 shows the security comparisons of the proposed scheme and other related schemes[5]-[7]. The detail descriptions are as follows.

    Table 2: Security comparisons of the proposed scheme and other related schemes

    5.1 Preserve User Anonymity

    Suppose that the attacker has intercepted the user Ui’s login request {Di, Ei, Fi, Ti}. However, it is not feasible to derive IDifrom the login request because the login request includes Diinstead of IDi. Therefore, the use of Diwill ensure any information related to the user identity could not be acquired by the attacker.

    5.2 Provide Mutual Authentication

    In the scheme, the server S can authenticate the user by checking whether the login request {Di, Ei, Fi, Ti} is correct.Also, the user Uican authenticate the server S by checking whether the authentication message {Fi, Gi, Ts} is correct.

    5.3 Resistance to Off-Line Password Guessing Attack

    To successfully carry out a password guessing attack in the proposed scheme, the attacker has to know the user’s IDi. However, it is impossible for the attacker to obtain the user’s identity IDiin the proposed scheme. Thus, the proposed scheme is secure against the off-line password guessing attack.

    5.4 Resistance to Insider Attack

    In the proposed scheme, the user Uisends the password information to the server S in the form of h (r||PWi) instead of the form PWi. Accordingly, the inside attacker is unable to acquire the user’s password PWi.

    5.5 Resistance to User Impersonation Attack

    If an attacker tries to impersonate a legal user Uiin order to cheat the server S, the attacker needs to modify {Di, Ei, Fi, Ti}to start a new session. In order to change these values, the attacker has to guess the secret key x. However, the probability of successfully guessing x is negligible.

    5.6 Resistance to Replay Attack

    An attacker can intercept data packets and try to resend it to server in order to launch the replay attack. However, the login request message of the proposed scheme includes a current timestamp, i.e., Tiof {Di, Ei, Fi, Ti}. Hence, the proposed scheme can withstand against the replay attack.

    6.Conclusions

    We have proposed an enhanced user authentication scheme in order to remedy the security weaknesses of Liu et al.’s scheme[7]. The proposed scheme achieves the mutual authentication and the user anonymity. In addition, the proposed scheme can withstand the password guessing attack, user impersonation attack, and insider attack even if the attacker obtains the user’s smart card. The security of the proposed scheme has been analyzed and the result shows that the scheme is more secure than other related schemes.

    [1]L. Lamport, “Password authentication with insecure communication,”Communications of the ACM, vol. 24, no.11, pp. 770-772, 1981.

    [2]J. Xu, W.-T. Zhu, and D.-G. Feng, “An improved smart card based password authentication scheme with provable security,”Computer Standards and Interfaces, vol. 31, no. 4,pp. 723-728, 2009.

    [3]R. Song, “Advanced smart card based password authentication protocol,”ComputerStandardsand Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.

    [4]S. K. Sood, A. K. Sarje, and K. Singh, “An improvement of Xuet al.’s authentication scheme using smart cards,” inProc. of the 3rd Annual ACM Bangalore Conf., India, 2010,pp. 22-23.

    [5]B.-L. Chen, W.-C. Kuo, and L.-C. Wu, “Robust smart-cardbased remote user password authentication scheme,”Intl.Journal of Communication Systems, vol. 27, no. 2, pp. 377-389, 2012.

    [6]X. Li, J. Niu, M. K. Khan, and J. Liao, “An enhanced smart card based remote user password authentication scheme,”Journal of Network and Computer Applications, vol. 36, no.5, pp. 1365-1371, 2013.

    [7]Y.-J. Liu, C.-C. Chang, and S.-C. Chang, “An efficient and secure smart card based password authentication scheme,”Intl. Journal of Network Security, vol. 19, no. 1, pp. 1-10, 2016.

    [8]D. Kang, J. Jung, J. Mun, D. Lee, Y. Choi, and D. Won,“Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain,”Security and Communication Networks, vol. 9, no. 11, pp. 1462-1476,2016.

    [9]Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won,“Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,”Sensors,vol. 14, no. 6, pp. 10081-10106, 2014.

    [10]P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,”inProc. of Annual Intl. Cryptology Conf., 1999, pp. 388-397.

    [11]J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won, “Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks,”Sensors, vol. 14, no. 4, pp. 6443-6462, 2014.

    [12]J. Moon, Y. Choi, J. Kim, and D. Won, “An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps,”Journal of Medical Systems, vol. 40, no. 3, pp. 1-11, 2016.

    [13]Y. Chung, S. Choi, Y. Lee, N. Park, and D. Won, “An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service inwireless sensor networks,”Sensors, vol. 16, no. 10, pp. 1653: 1-21, 2016.

    [14]J. Moon, Y. Choi, J. Jung, and D. Won, “An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards,”Plos One, vol. 10, no. 12, pp. e0145263: 1-15, 2015.

    [15]F. B. Degefa, D. Lee, J. Kim, Y. Choi, and D. Won,“Performance and security enhanced authentication and key agreement protocol for SAE/LTE network,”Computer Networks, vol. 94, no. 15, pp. 145-163, 2016.

    [16]J. Nam, K. K. R. Choo, S. Han, M. Kim, J. Paik, and D.Won, “Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation,”Plos One,vol. 10, no. 4, pp. 0116709: 1-21, 2015.

    [17]Y. Choi, Y. Lee, and D. Won, “Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction,”Intl. Journal of Distributed Sensor Networks,, vol. 2016, no. 2, pp. 1-16, 2016.

    久久精品国产99精品国产亚洲性色| av电影中文网址| 天堂影院成人在线观看| 精品国产乱码久久久久久男人| 国产一区二区在线av高清观看| 国产精品免费一区二区三区在线| 美女午夜性视频免费| 啦啦啦免费观看视频1| 欧美日韩黄片免| 国产黄片美女视频| 香蕉久久夜色| 国产成人精品久久二区二区免费| 一级毛片高清免费大全| 久久 成人 亚洲| 亚洲第一电影网av| 国产人伦9x9x在线观看| svipshipincom国产片| 欧美另类亚洲清纯唯美| bbb黄色大片| 日韩有码中文字幕| 精品一区二区三区四区五区乱码| 国产片内射在线| 人妻久久中文字幕网| 国产精品永久免费网站| 亚洲avbb在线观看| 日本在线视频免费播放| svipshipincom国产片| 午夜久久久久精精品| 国产精品亚洲av一区麻豆| 欧美色欧美亚洲另类二区| 日本一区二区免费在线视频| 亚洲成人久久爱视频| 国产成人av教育| 狂野欧美激情性xxxx| 十分钟在线观看高清视频www| 热99re8久久精品国产| 麻豆成人午夜福利视频| 中文字幕人妻熟女乱码| 日本一区二区免费在线视频| 可以在线观看的亚洲视频| 99热6这里只有精品| 满18在线观看网站| 少妇被粗大的猛进出69影院| 亚洲久久久国产精品| 91麻豆精品激情在线观看国产| 亚洲av成人av| 成人免费观看视频高清| 欧美日韩亚洲综合一区二区三区_| 少妇裸体淫交视频免费看高清 | 国产伦一二天堂av在线观看| 国产亚洲精品综合一区在线观看 | 久久国产精品人妻蜜桃| 精品久久久久久久久久久久久 | 又紧又爽又黄一区二区| 999精品在线视频| 亚洲欧美日韩无卡精品| 亚洲第一av免费看| 亚洲精品久久成人aⅴ小说| 美女午夜性视频免费| 91麻豆精品激情在线观看国产| 黄片小视频在线播放| 亚洲,欧美精品.| a级毛片a级免费在线| 少妇裸体淫交视频免费看高清 | 美女免费视频网站| av在线播放免费不卡| 国产真人三级小视频在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 久久狼人影院| 久久精品国产清高在天天线| 日本精品一区二区三区蜜桃| 国产一区二区激情短视频| 亚洲九九香蕉| 又大又爽又粗| 后天国语完整版免费观看| 黄色片一级片一级黄色片| 久久九九热精品免费| 亚洲aⅴ乱码一区二区在线播放 | 日韩 欧美 亚洲 中文字幕| 男女做爰动态图高潮gif福利片| 久久国产精品男人的天堂亚洲| 国产真人三级小视频在线观看| 欧美激情 高清一区二区三区| 19禁男女啪啪无遮挡网站| 性色av乱码一区二区三区2| 国产亚洲av嫩草精品影院| 精品熟女少妇八av免费久了| 老司机午夜福利在线观看视频| 亚洲人成网站高清观看| 中文字幕高清在线视频| 国产精品99久久99久久久不卡| 欧美日韩黄片免| 日本免费一区二区三区高清不卡| 久久欧美精品欧美久久欧美| 亚洲男人天堂网一区| 久久中文字幕人妻熟女| 男人的好看免费观看在线视频 | 97超级碰碰碰精品色视频在线观看| 成年女人毛片免费观看观看9| xxx96com| 国产成人精品久久二区二区免费| 国产精品亚洲美女久久久| 久久久久国产精品人妻aⅴ院| 不卡一级毛片| 午夜福利18| 欧美激情 高清一区二区三区| 18禁美女被吸乳视频| 在线观看免费日韩欧美大片| 久久久久久亚洲精品国产蜜桃av| 欧美中文综合在线视频| 国产激情偷乱视频一区二区| 女同久久另类99精品国产91| 自线自在国产av| 国产av一区二区精品久久| 国产精品日韩av在线免费观看| 成人午夜高清在线视频 | 国产精品一区二区精品视频观看| 国产视频一区二区在线看| 午夜影院日韩av| 1024香蕉在线观看| 精品免费久久久久久久清纯| 俺也久久电影网| 国产成人av教育| 国产av一区在线观看免费| 亚洲自偷自拍图片 自拍| av免费在线观看网站| 亚洲专区中文字幕在线| 美女午夜性视频免费| 90打野战视频偷拍视频| 免费人成视频x8x8入口观看| 久久九九热精品免费| 中出人妻视频一区二区| 中文字幕久久专区| 老司机在亚洲福利影院| 国产爱豆传媒在线观看 | 深夜精品福利| 成人午夜高清在线视频 | 精品国产亚洲在线| 国产男靠女视频免费网站| 亚洲av美国av| 国产黄色小视频在线观看| 别揉我奶头~嗯~啊~动态视频| 精品久久久久久成人av| 色综合婷婷激情| 妹子高潮喷水视频| 国产私拍福利视频在线观看| 成人亚洲精品一区在线观看| 久久天躁狠狠躁夜夜2o2o| aaaaa片日本免费| 黄色丝袜av网址大全| 麻豆一二三区av精品| 久久香蕉精品热| 一边摸一边做爽爽视频免费| 老汉色∧v一级毛片| 男女午夜视频在线观看| 深夜精品福利| 狠狠狠狠99中文字幕| 日韩一卡2卡3卡4卡2021年| 九色国产91popny在线| 精品国产国语对白av| 亚洲电影在线观看av| av在线播放免费不卡| 成人免费观看视频高清| 高清毛片免费观看视频网站| www国产在线视频色| 中文字幕高清在线视频| 久久久久久免费高清国产稀缺| 亚洲精品一区av在线观看| 久久天堂一区二区三区四区| 免费高清在线观看日韩| 91国产中文字幕| 欧美中文日本在线观看视频| 久久久久久久久中文| 一二三四在线观看免费中文在| 欧美又色又爽又黄视频| 99热只有精品国产| 久久精品91无色码中文字幕| 免费在线观看成人毛片| 观看免费一级毛片| 欧美激情久久久久久爽电影| 午夜福利在线在线| 99在线人妻在线中文字幕| 日韩高清综合在线| 特大巨黑吊av在线直播 | 国产av不卡久久| 午夜福利视频1000在线观看| 国产亚洲欧美精品永久| 国产成+人综合+亚洲专区| 97碰自拍视频| 国产黄a三级三级三级人| 母亲3免费完整高清在线观看| 亚洲一区高清亚洲精品| 午夜免费鲁丝| 在线观看www视频免费| 久久中文看片网| 18美女黄网站色大片免费观看| 可以免费在线观看a视频的电影网站| 久久久久久久久中文| 久久久久亚洲av毛片大全| 亚洲熟妇熟女久久| 大香蕉久久成人网| 国产激情久久老熟女| 国产精品亚洲美女久久久| 自线自在国产av| 日韩三级视频一区二区三区| 一边摸一边抽搐一进一小说| 成熟少妇高潮喷水视频| 中文字幕精品免费在线观看视频| 精品电影一区二区在线| 亚洲精品国产精品久久久不卡| 桃红色精品国产亚洲av| 国内久久婷婷六月综合欲色啪| 亚洲va日本ⅴa欧美va伊人久久| 国产高清视频在线播放一区| 日韩欧美三级三区| 免费看十八禁软件| 亚洲精品国产一区二区精华液| 熟妇人妻久久中文字幕3abv| 久久精品人妻少妇| 国产av不卡久久| 91国产中文字幕| 九色国产91popny在线| 又紧又爽又黄一区二区| 国产精品久久久人人做人人爽| 欧美成人性av电影在线观看| 日本撒尿小便嘘嘘汇集6| 中文字幕久久专区| 亚洲一区二区三区色噜噜| 88av欧美| 视频在线观看一区二区三区| 精品久久久久久成人av| 午夜激情av网站| 中文字幕人成人乱码亚洲影| 国产亚洲精品久久久久5区| 18禁黄网站禁片免费观看直播| 啦啦啦 在线观看视频| 中文字幕人妻熟女乱码| 黄色毛片三级朝国网站| 老熟妇仑乱视频hdxx| 美女高潮喷水抽搐中文字幕| 嫁个100分男人电影在线观看| 亚洲欧洲精品一区二区精品久久久| 777久久人妻少妇嫩草av网站| 男人舔女人下体高潮全视频| 免费人成视频x8x8入口观看| 熟女少妇亚洲综合色aaa.| 又黄又爽又免费观看的视频| 久久久国产欧美日韩av| 香蕉丝袜av| 婷婷丁香在线五月| 日本熟妇午夜| 男女下面进入的视频免费午夜 | 美女扒开内裤让男人捅视频| www日本在线高清视频| 男女下面进入的视频免费午夜 | 校园春色视频在线观看| 亚洲自偷自拍图片 自拍| 亚洲精品久久成人aⅴ小说| 18禁裸乳无遮挡免费网站照片 | 婷婷精品国产亚洲av| 亚洲精品久久成人aⅴ小说| 一夜夜www| 一卡2卡三卡四卡精品乱码亚洲| 成人永久免费在线观看视频| 男人舔女人的私密视频| 99在线人妻在线中文字幕| 热99re8久久精品国产| 女人爽到高潮嗷嗷叫在线视频| 神马国产精品三级电影在线观看 | 黄色视频不卡| 精品欧美国产一区二区三| 成人18禁高潮啪啪吃奶动态图| 亚洲欧美精品综合一区二区三区| 精品一区二区三区视频在线观看免费| 少妇被粗大的猛进出69影院| 午夜福利在线观看吧| 国产激情久久老熟女| 日本成人三级电影网站| 亚洲熟妇中文字幕五十中出| 18禁黄网站禁片午夜丰满| 亚洲av中文字字幕乱码综合 | 精品熟女少妇八av免费久了| 国产激情偷乱视频一区二区| 亚洲美女黄片视频| 最近最新中文字幕大全免费视频| 婷婷丁香在线五月| 激情在线观看视频在线高清| 午夜福利一区二区在线看| 免费看十八禁软件| 最新美女视频免费是黄的| 亚洲三区欧美一区| 国产精品久久久久久精品电影 | 久久久久久免费高清国产稀缺| 波多野结衣高清作品| 国产欧美日韩一区二区精品| 一级毛片精品| 亚洲 欧美 日韩 在线 免费| 亚洲熟妇中文字幕五十中出| 99久久国产精品久久久| 欧美日本视频| 国产不卡一卡二| 午夜免费激情av| 一级毛片精品| 男女下面进入的视频免费午夜 | 免费在线观看日本一区| 少妇粗大呻吟视频| 欧美日韩中文字幕国产精品一区二区三区| 免费在线观看亚洲国产| 欧美绝顶高潮抽搐喷水| 亚洲精品久久成人aⅴ小说| 桃红色精品国产亚洲av| 一级毛片精品| 老汉色∧v一级毛片| 搡老妇女老女人老熟妇| 色尼玛亚洲综合影院| 老汉色∧v一级毛片| 长腿黑丝高跟| 99久久精品国产亚洲精品| 亚洲专区国产一区二区| 长腿黑丝高跟| 中文字幕精品亚洲无线码一区 | 国产一级毛片七仙女欲春2 | 美女扒开内裤让男人捅视频| 亚洲精品国产区一区二| 国产黄a三级三级三级人| 欧美日韩一级在线毛片| 韩国av一区二区三区四区| 最好的美女福利视频网| 免费人成视频x8x8入口观看| 中文字幕最新亚洲高清| 12—13女人毛片做爰片一| 日韩欧美免费精品| 校园春色视频在线观看| 亚洲电影在线观看av| 精品久久久久久久毛片微露脸| 欧美国产日韩亚洲一区| 久久香蕉精品热| 欧美性猛交╳xxx乱大交人| 久久午夜综合久久蜜桃| 99久久久亚洲精品蜜臀av| 国产一区二区三区在线臀色熟女| 亚洲精品国产一区二区精华液| 亚洲精品在线美女| 黑丝袜美女国产一区| 日本在线视频免费播放| 国产黄片美女视频| 亚洲国产欧洲综合997久久, | 夜夜看夜夜爽夜夜摸| 啦啦啦 在线观看视频| 成人三级做爰电影| 在线观看免费视频日本深夜| 久久久水蜜桃国产精品网| 欧美成人免费av一区二区三区| 亚洲精品中文字幕在线视频| 国内毛片毛片毛片毛片毛片| 夜夜夜夜夜久久久久| 国语自产精品视频在线第100页| 国产精品一区二区三区四区久久 | 精品高清国产在线一区| 香蕉av资源在线| 别揉我奶头~嗯~啊~动态视频| 欧美性长视频在线观看| 国产成人精品久久二区二区免费| 日韩免费av在线播放| 国产成人精品无人区| 脱女人内裤的视频| 成人三级黄色视频| 最近最新免费中文字幕在线| 啦啦啦观看免费观看视频高清| 最好的美女福利视频网| 老鸭窝网址在线观看| 日日爽夜夜爽网站| av欧美777| 男人操女人黄网站| 天天一区二区日本电影三级| 久久中文看片网| 两人在一起打扑克的视频| 亚洲专区国产一区二区| 琪琪午夜伦伦电影理论片6080| www.精华液| 久久久久久人人人人人| 国产高清有码在线观看视频 | 99在线视频只有这里精品首页| 日韩国内少妇激情av| 在线天堂中文资源库| 色av中文字幕| 每晚都被弄得嗷嗷叫到高潮| 免费看美女性在线毛片视频| 最新美女视频免费是黄的| 国产在线观看jvid| 人成视频在线观看免费观看| 国产1区2区3区精品| 久久婷婷人人爽人人干人人爱| 国产极品粉嫩免费观看在线| 手机成人av网站| 变态另类丝袜制服| 国产精品 欧美亚洲| 此物有八面人人有两片| 日韩av在线大香蕉| 精品一区二区三区av网在线观看| 99国产极品粉嫩在线观看| 桃红色精品国产亚洲av| 看黄色毛片网站| 久久中文看片网| 亚洲成国产人片在线观看| 色哟哟哟哟哟哟| 夜夜爽天天搞| 人妻丰满熟妇av一区二区三区| 中文字幕人成人乱码亚洲影| 久99久视频精品免费| 免费无遮挡裸体视频| 国产私拍福利视频在线观看| 97超级碰碰碰精品色视频在线观看| 日本黄色视频三级网站网址| 性色av乱码一区二区三区2| 黄色a级毛片大全视频| 一级a爱片免费观看的视频| 欧美乱码精品一区二区三区| 成人精品一区二区免费| 亚洲片人在线观看| 日韩有码中文字幕| 亚洲成人免费电影在线观看| 男女之事视频高清在线观看| 亚洲精品av麻豆狂野| av欧美777| 欧美色视频一区免费| 精品国产乱子伦一区二区三区| av在线播放免费不卡| 在线观看午夜福利视频| 一本精品99久久精品77| av天堂在线播放| 欧美乱妇无乱码| 黄色成人免费大全| 99国产综合亚洲精品| 窝窝影院91人妻| 日韩欧美三级三区| 国产精品久久电影中文字幕| 嫩草影视91久久| 久久精品成人免费网站| 搡老熟女国产l中国老女人| 国产精品,欧美在线| 亚洲欧美精品综合久久99| 久久久久亚洲av毛片大全| 国产精华一区二区三区| 欧美国产精品va在线观看不卡| АⅤ资源中文在线天堂| 99热这里只有精品一区 | 男女视频在线观看网站免费 | 无限看片的www在线观看| 亚洲精品色激情综合| 人妻久久中文字幕网| 亚洲av成人不卡在线观看播放网| 99riav亚洲国产免费| 在线十欧美十亚洲十日本专区| a级毛片a级免费在线| 久久久久久久久免费视频了| 国产在线观看jvid| 人人妻人人澡人人看| 日本黄色视频三级网站网址| 18禁美女被吸乳视频| 国产精品野战在线观看| 国产精品免费一区二区三区在线| 亚洲av电影不卡..在线观看| 韩国精品一区二区三区| 午夜福利在线观看吧| 无限看片的www在线观看| 久久香蕉国产精品| 91大片在线观看| 亚洲片人在线观看| 久久久久久亚洲精品国产蜜桃av| 亚洲精品中文字幕在线视频| www.www免费av| 欧美日韩瑟瑟在线播放| 久久久国产精品麻豆| 淫妇啪啪啪对白视频| 日本 av在线| www国产在线视频色| 欧美+亚洲+日韩+国产| 好男人在线观看高清免费视频 | 两个人视频免费观看高清| 国产亚洲精品综合一区在线观看 | 黄色视频不卡| 在线播放国产精品三级| 亚洲成人精品中文字幕电影| 99国产极品粉嫩在线观看| 好男人在线观看高清免费视频 | 午夜福利在线观看吧| 又黄又爽又免费观看的视频| 免费高清在线观看日韩| 国产1区2区3区精品| 免费高清视频大片| 成人18禁高潮啪啪吃奶动态图| 亚洲片人在线观看| 色综合欧美亚洲国产小说| 无遮挡黄片免费观看| 日韩有码中文字幕| 精品国产亚洲在线| 色播亚洲综合网| 欧美精品啪啪一区二区三区| 成在线人永久免费视频| 亚洲av成人一区二区三| 国产黄a三级三级三级人| 久久国产精品人妻蜜桃| 久久精品国产亚洲av香蕉五月| 精品午夜福利视频在线观看一区| 2021天堂中文幕一二区在线观 | 国产高清视频在线播放一区| 欧美色视频一区免费| 少妇粗大呻吟视频| 成年人黄色毛片网站| 久久香蕉精品热| 中亚洲国语对白在线视频| www日本在线高清视频| 日韩视频一区二区在线观看| 99国产精品99久久久久| 啦啦啦 在线观看视频| 日韩大尺度精品在线看网址| 一进一出好大好爽视频| 国产片内射在线| 午夜福利一区二区在线看| 国产激情久久老熟女| 国产不卡一卡二| 色综合欧美亚洲国产小说| 亚洲真实伦在线观看| 99热6这里只有精品| 18禁观看日本| 一进一出抽搐动态| ponron亚洲| 两性夫妻黄色片| 999久久久精品免费观看国产| 给我免费播放毛片高清在线观看| 熟女电影av网| 又大又爽又粗| 午夜两性在线视频| 亚洲色图 男人天堂 中文字幕| 国产99白浆流出| 久久久久九九精品影院| 国产精品亚洲一级av第二区| av超薄肉色丝袜交足视频| 欧美日韩精品网址| 99国产精品一区二区蜜桃av| 又黄又爽又免费观看的视频| 亚洲欧美一区二区三区黑人| 一本大道久久a久久精品| 国产亚洲精品久久久久5区| 欧美精品啪啪一区二区三区| 黄色视频不卡| 国产成人欧美在线观看| 男女午夜视频在线观看| 精品一区二区三区四区五区乱码| 久久香蕉精品热| 嫩草影院精品99| 国产成人啪精品午夜网站| 免费在线观看影片大全网站| 国产亚洲欧美在线一区二区| 国产国语露脸激情在线看| 黄色毛片三级朝国网站| 色哟哟哟哟哟哟| 久久久久久国产a免费观看| 国产精品美女特级片免费视频播放器 | 午夜老司机福利片| 999久久久国产精品视频| 日韩一卡2卡3卡4卡2021年| 欧美日本亚洲视频在线播放| 成年免费大片在线观看| 国产成人系列免费观看| 婷婷丁香在线五月| 亚洲片人在线观看| 色尼玛亚洲综合影院| 国产蜜桃级精品一区二区三区| 国产aⅴ精品一区二区三区波| 国产成年人精品一区二区| 欧美最黄视频在线播放免费| 琪琪午夜伦伦电影理论片6080| 亚洲国产欧美网| 久久中文字幕一级| 99国产精品一区二区三区| 亚洲黑人精品在线| 久热爱精品视频在线9| 黄片大片在线免费观看| 妹子高潮喷水视频| 欧美日韩福利视频一区二区| 久久精品人妻少妇| aaaaa片日本免费| 欧美日本亚洲视频在线播放| 婷婷丁香在线五月| 欧美午夜高清在线| 人人澡人人妻人| 国产一区二区在线av高清观看| 精品卡一卡二卡四卡免费| 香蕉丝袜av| 婷婷亚洲欧美| 中亚洲国语对白在线视频| 熟女电影av网| 欧美色视频一区免费| 每晚都被弄得嗷嗷叫到高潮| 黄色片一级片一级黄色片| 免费看a级黄色片| 久久久久国产一级毛片高清牌| 久久精品aⅴ一区二区三区四区| 最新美女视频免费是黄的| 免费电影在线观看免费观看| 人人澡人人妻人| 女性生殖器流出的白浆| 一区二区三区国产精品乱码| 国产精品av久久久久免费| 老熟妇乱子伦视频在线观看| 这个男人来自地球电影免费观看| 精品一区二区三区视频在线观看免费| 在线观看日韩欧美| 亚洲精品一区av在线观看| 久久久久久亚洲精品国产蜜桃av| 欧美在线黄色| 国产av一区在线观看免费| 岛国视频午夜一区免费看|