• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems

    2018-06-07 05:22:22LiquanChenSijieQianMingLimShihuiWang
    China Communications 2018年5期

    Liquan Chen, Sijie Qian, Ming Lim, Shihui Wang

    1 School of Information Science and Engineering, Southeast University, Nanjing 210096, China

    2 Research Center of Supply Chain and Operations Management, Coventry University, Coventry, CV1 5FB, UK

    I. INTRODUCTION

    In recent years, unmanned aerial vehicles(UAVs) have experienced rapid growth in civil and commercial areas such as precise agriculture, sky monitoring, cargo delivery, traffic control, rescue and search [1]. However, existing UAV systems mainly rely on the traditional direct ground-to-UAV communications over the unlicensed spectrum (e.g., ISM 2.4GHz),which is of limited data rate, unreliable, insecure, and can only operate within the visual line of sight (LoS) range [2]. As the number of UAVs and their related applications increase explosively in the coming years, it is imperative to develop innovative wireless communication technologies not only for supporting the ultra-reliable UAV remote command and control to ensure their safe operations, but also for enabling high-capacity mission-related information transmission.

    Integrating UAVs into cellular and satellite networks is a promising solution to achieve the above goals, where UAVs with their own missions could be connected with either cellular base stations (BSs) or satellites as special aerial users, referred to as network-connected UAVs (NC-UAVs) [3-4]. Thanks to the almost ubiquitous accessibility worldwide,network-connected UAVs are expected to significantly outperform the traditional direct ground-to-UAV communications.

    Based on the cellular and satellite networks, the controlling and accessing to NCUAVs have been spread all over the world.The security of the NC-UAVs is faced new challenges. Although the security and authentication mechanisms of cellular and satellite networks have ensured the security in the transmission link, the confidentiality, integrity and availability of NC-UAVs are needed to be improved based on high-level security mechanisms.

    Some researchers have proposed related security solutions for UAV communication systems. The communication security of UAV is analyzed in [5], while the vulnerability of UAVs to cyber attacks is presented in [6].GPS spoofing is used to capture and control the UAV [7] and a detection approach for GPS spoofing attacks to UAV is proposed in [8].Security testing of a UAV is presented in [9].All the above security analysis and testing are based on the direct ground-to-UAV communication systems. For NC-UAV communication systems, [10] presented a security authentication system using an encrypted channel on UAV network. Some technologies are proposed in [11] to improve the communication security of open source UAVs, while [12] presented a handover key management scheme in an LTE-based UAV system. However, the schemes in [10-12] do not effectively solve the security problems in the network-connected UAV communication systems.

    In a decentralized communication system,the enforcement principle of access control is supplemented by trust. An entity can be trusted if it predictably and observably behaves in a manner expected for its intended purpose.Trusted computing has been proposed by the trusted computing group (TCG) and added to the ISO/IEC 11889 standard [13]. Although TCG proposed some implementing methods in[13] with regard to embedded application environments, they are not sufficient for solving all the problems that emerge in embedded application systems, especially in the embedded NC-UAV systems. When trusted computing architecture is applied to NC-UAV communication systems, the computational capability,the security and efficiency requirements of such systems need to be concerned.

    With the trusted computing protocol, there are three stages for one node to accomplish trusted network access: user authentication,platform trusted authentication, and trusted network connection (TNC). A platform can be trusted if it predictably and observably behaves in a manner expected for its intended purpose. TPM is the trusted base in a trusted platform. We can use a platform authentication protocol to determine whether one node has the trusted TPM module and all the applications in this node run as expected.

    Because there is no human intervention in NC-UAV communication systems, user authentication is mainly replaced by platform authentication, whereas the following factors should be concerned. 1) Platform identity authentication and integrity checking of NCUAV are critical for such vehicle to be allowed to access in the ground control station (GCS).2) NC-UAV is always installed outdoors in lack of security, and thus it can easily be destroyed. Authentic trusted platform modules(TPMs) could even be stolen and used in adversary NC-UAV to cheat the authentication server. 3) We know that the computational capabilities of TPMs and Hosts are of low level because they are mainly based on embedded computing hardware. 4) Mutual authentication between NC-UAV and the authentication center is necessary for network-connected UAV systems.

    The solution first developed by TCG uses a trusted third party, privacy certification authority (Privacy CA), to realize platform authentication [14]. In the Privacy CA scheme,each TPM generates a key pair called the endorsement key (EK). Privacy CA is assumed to know EK of all valid TPMs and issues a certificate for a TPM. TPM can then forward this certificate to the Verifier and authenticate itself with regard to this AIK. This solution has the obvious limitation that the Privacy CA server needs to be involved in every transaction. Moreover, if the Privacy CA and the Verifier collude, the Verifier can uniquely identify a TPM.

    A new type of scheme, direct anonymous attestation (DAA), was thus developed by Brickell et al.[15] for remote authentication of a trusted computing platform while preserving the privacy of the platform. DAA is a new group signature scheme without the capability of opening a signature, but with the mechanism to detect a rogue member. In the DAA scheme, a suitable signature scheme is employed to issue certificates on a membership public key generated by a TPM. Then, to authenticate as a group member, TPM proves to the Verifier that it possesses a certificate on a public key for which it also knows the secret key. Many researchers have proposed different types of DAA schemes to meet the requirements in different applications and environments.

    The DAA scheme that holds anonymous and privacy properties has effectively resolved the limitations of the Privacy CA scheme,and it has the following characteristics: 1)Efficiency. When the platform receives the DAA credential from the Issuer, it can use this credential to conduct the signing and verification processing many times. 2) Anonymity. Because the DAA scheme applies the zero-knowledge proof theory to prove the trust of a new platform that possesses legitimate credentials, it can prevent adversaries from seeking the identity of the real communicating TPM. It is difficult for an adversary to track the identity of the target TPM even when the Verifier can collude with the credential Issuer[16-17]. 3) Privacy. The Issuer is the trusted credential issuer that has the EK lists to determine the legitimacy of the applying TPM,and the Verifier employs the Camenisch-Lysyanskaya (C-L) signature scheme [18] and respective discrete logarithm-based proofs to prove the possession of a certificate, whereas privacy and anonymity are guaranteed under the decisional Diffie-Hellman (DDH) assumption.

    The DAA scheme developed by Brickell et al. [15] is based on a strong RSA assumption and it is called the RSA-type DAA, (hereafter referred to as RSA-DAA). Theory analysis results have shown that the protocols and algorithms in RSA-DAA scheme are complicated and inefficient, it is not suitable for TPMs with fewer computational capabilities. In recent years, researchers have worked on how to create DAA schemes with elliptic curves cryptography (ECC) and pairings. We call these,the ECC-DAA schemes. In general, the ECCDAA scheme is more efficient in both computation and communication than the RSA-DAA scheme. TPM’s operation is much simpler and the key/signature length is much shorter in the ECC-DAA scheme than the RSA-DAA scheme.

    Many ECC-DAA schemes are based on the q-strong Diffie-Hellman (q-SDH), DDH,and computing Diffie-Hellman (CDH) difficult assumptions [16-17] [19-21]. They have reduced the computational workload in TPM and enhanced security among the Signer, Issuer, and Verifier. However, to the best of our knowledge, there is no exact DAA scheme that has been proposed to meet the requirements of NC-UAV communication systems.Based on the security requirements of less computational workload in TPM and the Host,mutual authentication requirement between the Signer and Verifier, and bundling rogue check requirement of TPM and the Host in NC-UAV communication systems, we propose an enhanced DAA with mutual authentication that can satisfy all these requirements.

    Our main contributions include 1) We present a security prototype for NC-UAV communication systems firstly. The security flaws and risks in NC-UAV platform authentication are analyzed, and a new trusted NC-UAV remote DAA scheme is proposed to meet the security requirements in UAV communication systems.2) A new mutual authentication-direct anonymous attestation (MA-DAA) scheme with less computation and mutual authentication for NC-UAV communication systems is proposed.The significant advantages of the new scheme are described as follows:

    a) We put off the J, K pairs and the computations in the Sign/Verify stage in [17],while the computation of variable D is transferred from TPM to the Issuer. Moreover, an efficient batch proof and verification scheme is used to reduce not only the computational workload of TPM, but also that of the Host.This is critical for NC-UAV systems because the Hosts in such systems are also mainly based on embedded hardware without a high-level of computational capabilities.

    b) The identity of TPM and the Host are authenticated in bundle and rogue-checked by the Issuers and Verifiers. This technique can avoid the security flaw where one NC-UAV uses a trusted TPM that is stolen from another trusted NC-UAV in order to pass verification and launch malicious attacks on the GCS center. This compromise problem is not concerned in the existing DAA schemes.

    c) We propose a new variable,c2= H2(f‖b sn ), and related algorithms to replace the J, K variables from [17] and perform rogue list checking and user-controlled linkability. The Verifier can check the received c2against the rogue list to find the rogue TPMs. Meanwhile, with the same bsn value, the Verifier can find the messages that originate from the same TPM by obtaining the same c2value. This scheme can reduce one multiplication computation induced by the J,K pair algorithm.

    d) We add mutual authentication to the DAA scheme. NC-UAV can also verify the trust of the Verifier with the help of the MAC mechanism and secret key between these entities. In NC-UAV communication systems, data are mostly transmitted from NC-UAV to GCS.In the existing DAA schemes, when there is an adversary that combines the function of the Verifier and GCS, NC-UAV’s privacy is compromised, and obtaining critical data from NC-UAV is facilitated. Such security vulnerability and flaw are dangerous for critical NCUAV data.

    e) In addition to enhancements in security,the MA-DAA scheme also reduces the computation workload of TPM and the Host at the Join, Sign, and Verify stage, and the communication payload. This is important for the NCUAV mostly powered by battery.

    The rest of the paper is organized as follows: Section 2 presents the network-connected UAV communication system and constructs a remote DAA scheme for NC-UAV to realize secure and efficient access. Then, an MADAA scheme is proposed in Section 3 that meets the security requirements in NC-UAV communication systems. In Section 4, performance analysis of the proposed MA-DAA scheme is presented. Experiment results also confirm the analysis conclusions. Finally, we conclude the paper in Section 5.

    II. NC-UAV COMMUNICATION SYSTEMS AND SECURITY

    UAV technology has emerged as a cutting-edge technology for next-generation. Various UAV applications have already started to emerge in various fields. Based on the cellular and satellite network connection facility, the number of network-connected UAV units will become huge, and many new characters are accompanied with the emerging of NC-UAV communications.

    In a normal NC-UAV communication system, NC-UAV, GCS, and transmission link are the three major components. Because NCUAV is mainly built on embedded hardware and run with embedded operating systems, its limited computational capability is the largest constraint for NC-UAV to conduct sophisticated computation and processing. Huge and intermittent data are transmitted downlink from NC-UAV to GCS. GCS is located on the core network side that collects and stores UAV data, and the authenticated NC-UAVs can connect to GCS and get the command and control.

    Because network-connected UAV units are widely spread in different environments and there are vulnerabilities in wireless access links, NC-UAV communication systems encounter the following security challenges.First, because NC-UAV units are unattended in most of the time, adversaries can damage them easily. Second, NC-UAV communication is based on wireless links, so eavesdropping in-the-middle is extremely simple to apply.Finally, because most NC-UAV units are characterized by low capabilities of power supply and computing resources, novel privacy and authentication algorithms cannot be easily implemented in such units. [9-12] have described different types of attacks that exist in NCUAV communication systems.

    In order to establish a trusting relationship in dispersed systems, we must collect security-relevant elements and capabilities to form a trust boundary. These include methods that extend the trust boundary and convey trust to an external entity. A TPM or trusted environment (TRE) provides a hardware security root of trust, allowing the system construction to combine the characteristics of trust and enforcement. TPM or TRE performs a secure start-up process that ensures the TPM or TRE reaches a determined trusted state. Then this trusted state can be transferred from TPM or TRE to the Host. The benefits of trust in NCUAV systems include: 1) A trusted running environment is provided against attacks on NC-UAV units. 2) The privacy of the data transmitted between the NC-UAV units and GCSs is ensured. 3) We can realize user authentication, platform authentication, and platform integrity verification based on the trusted condition in the NC-UAV units to construct a trusted network access architecture.For NC-UAV communication systems,platform authentication is more important than user authentication. Thus, in this paper, we focus on platform authentication research and propose a new DAA scheme to authenticate the trust of NC-UAV platforms securely and efficiently. In the DAA scheme, a TPM in NCUAV has to obtain a legitimate DAA credential from a trusted Issuer before processing the trusted platform verification with the Verifier.When NC-UAV obtains the legitimate DAA credential, it signs the DAA credential with its secret key. Finally, the Verifier validates the trust of the signed credential from NCUAV. In general, NC-UAV units obtain public secure parameters Parpkand EKs from the NC-UAV developers or suppliers in a secure environment or secure channel. Then they are delivered to the operators and deployed in the designated working fields. The installed NCUAV units connect and transmit data between them and the GCS. However, before connecting to the GCS, NC-UAV units have to perform remote anonymous attestation processing with platform validation authority (PVA)entities and the access control function model in the operator. Here, PVA entities are the verification system used to verify the trust of NC-UAV units. A practical DAA prototype for NC-UAV communication systems is presented in Figure 1.

    Fig. 1. DAA prototype for NC-UAV communication systems.

    In this DAA prototype, prior to the start of trusted proof processing, TPM in NC-UAV first needs to create secret key f. Once the DAA credential is received, the TPM platform signs message m or the Hash value of the NC-UAV platform integrity information with secret key f. In general, these processes can realize trusted proof of the platform and integrity check. Finally, this DAA signature is sent to the PVA verification server for PVA to verify and conduct rogue-checking of the received DAA signature.

    In the existing DAA schemes, the DAA Sign protocol between NC-UAV and the Issuer/Verifier is a single-side authentication protocol. There is no authentication program in NC-UAV to authenticate the identity and authority of the Issuer and Verifier. This is a security flaw that can threaten the privacy of NC-UAV units. For example, when one adversary constructs a device that contains the function of Issuer and Verifier, such device can easily pass the NC-UAV units’ DAA attestation processing, and then receive the critical data transmitted from those NC-UAV units.This is very dangerous for NC-UAV units used for critical tasks. Therefore, a new DAA scheme with mutual authentication should be proposed to solve this security problem, and the other vulnerabilities and inefficiency problems of the existing DAA schemes.

    III. THE PROPOSED MA-DAA SCHEME

    3.1 Preliminary knowledge

    We present the preliminary knowledge on the pairings and elliptic curve cryptography. Here,G1, G2and GTare the cyclic groups of prime order p, g1is the generator of G1, g2is the generator of G2. Computing the discrete logarithm on group G1, G2, and GTis difficult.

    If the mappinge: G1× G2→ GTcan meet the following constraint: 1),andx∈ G1, y ∈G2, then e( x, y) can be computed in polynomial time, 3) forand a, b∈Zp,, we call e: G1× G2→ GTis a bilinear mapping.

    In the pairings: G1× G2→ GT, G1and G2are the additive groups and GTis the multiplicative group whose prime order is p. However, when we want to evaluate the computational cost of different DAA scheme with respect to each player, G1is used to donate the cost of exponentiation computation in group G1,G2donates the cost of exponentiation computation in group G2, and GTdonates the cost of exponentiation computation in group GT.Meanwhile,donates the operation costs of multi-exponentiation with m times in group Gx(x is 1, 2, or T). We also let P denote the cost of a pairing computation, and Pmis the multiple operation costs of m pairings.

    According to [16], when asymmetric bilinear pairings and the Barreto-Naehrig curves are applied, and the bit sizes of G1and GTare the same, the computational cost of one G1is approximately 1/14 of the computational cost of one GT. This is based on the fact that G1is an elliptic curve over Fqand GTis a subgroup of Fq12which requires approximately 10Fqoperations. For the sake of TPM efficiency, it is important to reduce the GTgroup computations in TPM and the Host, or replace them with the G1group computations when we want to improve the performance of the DAA schemes in network-connected UAV systems.

    3.2 Proposed MA-DAA scheme

    A DAA scheme includes three partners: Issuer,Signer, and Verifier. The Issuer is responsible for verifying the legitimacy of the Signers and issues a DAA credential to each Signer. A Signer, which is a pair of Host and associated TPM, can prove membership to a Verifier by providing a DAA signature. The Verifier can verify the membership credential from the signature, but it cannot learn the identity of the Signer.

    In network-connected UAV communication systems, NC-UAV adopts the detection and alarm mechanism for vandalism resistance in order to protect NC-UAV from attack. In this paper, we adopt r′ instead of the (J, K) pair to detect connectivity such that the computation load of TPM Sign is reduced from 1G1/2G1[20] to 1G1. We change the way of DAA certificate generation, and transfer D=f· B computed in TPM to the Issuer. The Issuer can then determine value D using input value F based on the B-bLRSW assumption. The computation cost in TPM is no longer necessary,and thus the computation amount of TPM Join is reduced from 3G1[20] to 2G1. Therefore,not only the performance of TPM Sign, but also that of TPM Join are improved in the proposed MA-DAA scheme.

    The overall MA-DAA scheme includes the Setup protocol that established the system parameters, the Join protocol that obtains the certificate, and the Sign/Verify protocol.

    Setup protocol

    Assuming that: G1, G2, GTare cyclic groups with order of prime q, bilinear p a i r swe obtain the parameter set parCas

    In setup protocol, we define the Issuer parameter set as parI, which includes Issuer public key and private key as ipk and isk,isk: x, y←Zq, ipk:(X, Y), X = xP2∈G2,and Y = yP2∈G2. In addition, the Issuer generates a pair of keys (SKI,P KI) for mutual authentication. Moreover, the Issuer provides a unique value KIto generate secret value f.Then the parameter set parIis (ipk, KI,PKI).

    Suppose that the parameter parRfor TPM is H2, H2:{0,1}*? Zq. The public and private key pair for TPM is (SKT, PKT), parT: PKT.The public and private key pair of the Host is (SKH, PKH), parH: PKH. The public and private key pair of the Verifier is (SKV, PKV),parV: PKV. And the parameter for Sign/Verify is parS: H3:{0,1}*? Zq, H4:{0,1}*? Zq.

    After Setup protocol, the system public parameter set par is constructed as:

    Join protocol

    The Join protocol is realized based on the request/response interaction between the Issuer and TPM/Host. We divide the Join protocol into four parts in this order: Issuer request,TPM response, Issuer response, and Host verify. The overall process framework of the Join protocol is shown in Figure 2.

    The operation for the Issuer request is shown in Figure 3. First, the Issuer needs to confirm that it is a legitimate trusted platform that issues DAA certificates, whereas TPM needs to check the legitimacy of the Issuer. That is to say, an authentication channel should be established between the Issuer and TPM in advance. The establishment is completed with random numbers nI1and nI2chosen by the Issuer, which encrypts nI2with SKIand then encryptswith PKTfor the Host. Similarly to the Issuer,the Host generates a random number RAND,encrypts RAND with pre-shared private key SKH, and sends Cn‖R AND ‖ESKH(R AND )to TPM. TPM decrypts ESKH(R AND) with pre-shared public key PKHto obtain RAND'.The result of the comparison between RAND'and RAND indicates whether the Host is legitimate. Only when RAND' is equal to RAND,does the TPM continue the protocol. Next, if TPM can successfully decrypt Cnwith SKT,we can obtain the value ofand return nI1to the Issuer, which indicates that TPM owns its legitimate EK private key.In addition, TPM decrypts ESKI(nI2) with the legitimate EK public key of the Issuer and compares the decrypted result nI2' with nI2. If nI2' is equal to nI2, this indicates the legitimacy of the Issuer. Therefore, mutual authentication between the Issuer and TPM is completed. The operation process for the TPM response is shown in Figure 4.

    Fig. 2. Overall process framework for Join protocol.

    Fig. 3. Issuer request operation.

    Fig. 4. TPM response operation.

    Fig. 5. Issuer response operation.

    Fig. 6. Host verify operation.

    TPM generates secret value f with KIand TREid(the internal ID of TRE in NC-UAV),where f = H (1‖T REid‖KI). TPM generates comm from f, and sends it to the Issuer. The operation of the Issuer response is shown in Figure 5.

    The Issuer authenticates the comm value.That is to say, it examines the zero-knowledge proof result of TPM in order to check whether TPM owns a legitimate f. If the authentication is successful, the Issuer generates a DAA certificate with F in comm. It is important to note that in the proposed scheme, the computation of D in certificate cre is calculated as D=[yr] F, rather than the computation of D=[f] B using f as is done in [10].This is mainly because F is generated from value f. Finally, we generate DAA certification (A, B, C, D) based on the blind-bilinear B-bLRSW assumption. To summarize, the computation amount of TPM Join in the MADAA scheme is reduced to 2G1, which is caused by the change of computation of D value. The computation amount is the lower than those existing DAA schemes based on the LRSW and DDH assumptions.

    The operation for the Host verify is shown in Figure 6. After receiving certification cre,the Host verifies the correctness of cre. By adopting the batch authentication technology,the Host determines whether the certificate in the signature is correct using a P4computation, i.e., the Host handles four bilinear pairings in one process. The P4computation cost is less than four independent bilinear pair computation cost (4P) [22].

    Sign/Verify protocol

    The Sign/Verify protocol refers to the process that the TPM, along with the Host,performs the knowledge sign of message msg,generates DAA signature σ. , and then delivers σ to the Verifier. According to various operations that occur in chronological order in the Sign/Verify protocol, it can be divided into three parts: Host Sign, TPM Sign, and Verify.The overall process of the Sign/Verify protocol is shown in Figure 7.

    The Verifier generates a random number RANDVand encrypts it with its private key SKV, and then sendsto the Host.bsn is a base name selected by the Verifier and nvis also generated by the Verifier.

    The operation of the Host Sign is shown in Figure 8. The Host performs a blind computation of the DAA certification value(A, B, C, D) after receiving nv, base name bsn, RANDV, andfrom the Verifier in order to generate (R, S, T, E).Meanwhile, the Host generates a random number RAND and encrypts it with preshared private key SKH, which is similar to the procedure in the Join protocol.Next, the Host sends S ‖b sn‖ c1‖R AND ‖ESKH(R AND )‖R ANDV‖ESKV(R ANDV) t o TPM.

    The operation of TPM Sign is shown in Figure 9. After receiving message from the Host,TPM verifies the legitimacy of the Verifier and Host using the same method as the Join protocol. TPM calculates RANDV' and RAND'similarly to decryptingandwith pre-shared keys PKVand PKH, respectively, and compares RANDV'with RANDVand RAND' with RAND. Only when these two pairs of values are respectively equal, are the Verifier and Host proven to be legitimate.

    TPM continues to finish the remaining computation of the signature value after checking the legitimacy of the Host. TPM generates independent value c2for relevance detection.

    Fig. 8. Operation of Host sign.

    Fig. 9. Operation of TPM sign.

    Considering c2in equation (1) as a public signature member value, we perform the zero-knowledge proof for the possession of a legitimate DAA certification and generate c and s, whereas c2is added to the Hash computation of c. TPM sends c, s, c2, and random number nTtogether to the Host, and the final signature σ generated by the Host is(R, S, T, E, c, s, n2, nT,nv).

    The operation of Verify is shown in Figure 10. The Verifier performs the verify operation after receiving signature σ. First, the Verifier adds counterfeit f on the rogue list to the blind certificate as E=[f] S to determine whether the f value used in the signature has been disclosed, and verifies whether the blind signature value (R, S, T, E) is correct.Then, the Verifier determines whether the zero-knowledge proof of possessing a legitimate DAA certification in signature σ is correct. If it is correct, it indicates that the Signer owns a legitimate secret value f and legitimate DAA certificate based on the same f. If the Verifier has provided a specific bsn in advance, the relevance detection of the signature is also required. Relevance detection can be performed using signature member value c2generated from secret value f and base name bsn from the Verifier. Such detection plays a role similar to the J, K mechanism. The entire Verify process is successful only if all these verification steps are correctly completed.

    3.3 Security analysis of MA-DAA scheme

    Fig. 10. Operation of Verify processing.

    Firstly, we find that the security risks in [16]have been solved in the MA-DAA scheme.c2is kept within TPM before generating signature values s and c and not exposed to the Host. Therefore, there is no possibility for the attacker to obtain the c2value even if the Host is captured. At the time of c2generation and delivery of signature values s and c to the Host, the Host cannot change the c2value anymore. Because c2has been added to the Hash computation of the c value, any change from the Host is discovered by the Verifier.

    At the same time, TPM adds bsn to Hash verification in order to keep the Host from changing bsn maliciously and harm the relevance of the signature. As a result, the situation where the attacker might control the Host to undermine the relevance does not occur in the MA-DAA scheme. However,once TPM is captured, it is easy for TPM to damage the signature’s relevance. Physical protection measures are adopted for NC-UAV in order to protect the embedded TPM from destroyed. Compared with external NC-UAVs,the embedded TPM cannot easily be attacked.It is appropriate for the Verifier to trust the credibility of TPM and believe it can compute the value of c2correctly, instead of casually guessing a value to be c2. For this reason, c2can play a key role in performing relevance detection that is as good as J, K in existing schemes [19] [20]. The use of c2is sufficiently secure.

    Secondly, we analyze the correctness and security of the overall processes in the MADAA scheme. Athe time of verifying, the equation

    guarantees the correctness of the MADAA scheme. If equation (2) is true,andmust be true. This indicates that the DAA certificate of the signature is generated correctly. The security of the MA-DAA scheme is mainly defined as: provided that secret value f and the DAA certification have not been disclosed, an attacker cannot succeed.

    The security analysis is presented as follows. In the circumstance when no secret value for TPM or the DAA certification is disclosed,without the Verifier, an attacker should provide(R, S, T, E) alone to make equation (2) be true, which expects S=[y] R, T =[x] (R + E )to be true. Assume that attacker A selects R=[α]P1, S=[β]P1, T=[γ]P1, and E=[δ]P1, and the public key of the Issuer is known as X=[x] P2, Y=[y] P1. S =[ y ·α]P1is required for making S=[y] R true, which means that given [α]P1and [y] P1, the attacker must be able to compute [y·α]P1in order to solve the CDH problem in G1. This is obviously impossible for the CDH problem in group G1of a non-symmetric bilinear pair because it is generally considered as terribly difficult to be resolved in cryptography.

    In addition, unlike the existing DAA schemes, the MA-DAA scheme has the mutual authentication feature. Assume that, before any system setup, each Issuer has its private endorsement private key SKI, and each TPM gets the corresponding public key PKI. The Issuer generates a random number nI2and encrypts it with SKI. TPM admits the legitimacy of the Issuer if the result of decryptingwith PKIis equal to the received nI2. Considering that the Issuer has checked TPM in the Join protocol, mutual authentication is completed.

    In order to prevent a corrupted Host from taking an honest TPM to sign an illegal message, it is necessary to bind TPM and the Host when manufacturing the devices. A pair of pre-shared public/private key PKH/ SKHis embedded into TPM and the Host. During the Join and Sign protocols, the Host needs to generate a random number RAND and send RAND‖ESKH(R AND ) to TPM. TPM checks the consistency between DPKH(ESKH(R AND).and RAND in order to verify the Host’s legitimacy.

    Based on the above analysis results, it can find out that the MA-DAA scheme is sufficiently secure on the premise that TPM in NC-UAV is secure and credible. Compared with the existing DAA schemes based on the LRSW and DDH assumptions, there is no security weakness, but an efficiency improvement in the proposed MA-DAA scheme. MADAA scheme also has the highest running efficiency among all the DAA schemes based on the LRSW and DDH assumptions. Both the Join and Sign protocols in the MA-DAA scheme have been improved, the computation quantity of TPM Join has been reduced to 2G1, and that of TPM Sign is as low as 1G1.The benefits of security, low cost, high efficiency make the MA-DAA scheme satisfy the dual requirements of security and efficiency for NC-UAV systems. The following section provides a detailed analysis and experimental verification of the efficiency enhancement.

    3.4 Performance analysis of the MADAA scheme

    We compare the MA-DAA scheme with the existing DAA schemes in terms of the computation cost of all entities during the procedures of the Join and Sign/Verify protocols. A comparison of the computation cost in the Join protocol operation stage is listed in table 1.

    Table I. Computation cost comparison among MA-DAA and existing schemes in Join protocol.

    We can find that the TPM Join computation cost of the MA-DAA scheme is 2G1, which is the lowest among all the DAA schemes based on the LRSW and DDH assumptions,and the computation cost of the Host is only 1P4. However, at the same time, we can find that TPM offloads 1G1to the Issuer, and the computation cost of the Issuer is increased from 2G1+[20] to 3G1+. Considering the fact that the role of the Issuer is played by a server with powerful computing ability,offloading the computation cost can greatly improve the performance of the entire Join protocol.

    The comparison of the computation cost in the Sign/Verify protocol operations of the MA-DAA and the existing DAA schemes is listed in table 2.

    We can find from table 2 that in scheme[20], the computation cost of TPM Sign is 2G1when the signature is associated. With regard to the MA-DAA scheme, the computation cost of TPM Sign remains 1G1and it is the lowest among all the schemes without increasing the burden on the other protocol entities. This is because the MA-DAA scheme introduces equation (1) for signature relevance detection, and there is no need for TPM to perform any G1operations of J, K as in [20].The use of equation (1) not only reduces the entire Sign computation cost in the MA-DAA scheme, but it also maintains the same level of security as the scheme in [20].

    Furthermore, considering the communication bandwidth performance in NC-UAV communication systems and storage capacity of the vehicle, we need to analyze the size of the DAA certificates and signatures in the MADAA scheme. A smaller certificate and signature size indicate that smaller communication bandwidth and fewer storage resources are required. The comparison of the certificate and signature sizes in the MA-DAA and the other DAA schemes is listed in table 3.

    In table 3, q represents the order of finite field Zq, and h is the output of the Hash function. In Gi{ i =1,2,T }, Giconstitutes asymmetric bilinear pairing G1× G2→ GT; G and G constitute symmetric bilinear pairing G× G→G. We find out that the MA-DAA scheme improves the overall operational ef ficiency without additional demand for storage capacity or communication bandwidth. The certificate size of MA-DAA is 3G1and the signature size is 1q + 4G1+1h , both of which are small among all the DAA schemes.

    Assume that the required RSA key length is 3072 bits, the element sizes of G1, G2, and GTare 3072 bits [25], and the order of the finite field q is 256 bits. We can then compute the output signature size of the MA-DAA scheme as 12704 bits, which represents a 40%reduction in length compared with the signature size of the original BCC-DAA scheme(21707 bits in [26]). Therefore, the MA-DAA scheme has an obvious advantage in both security and performance over the BCC-DAA scheme and maintains the same security levelwhile increasing operational efficiency and reducing communication bandwidth. We can conclude that the MA-DAA scheme is suitable for the network-connected UAV communication system with limited computing and storage resources and low transmission bandwidth.

    Table II. Computation cost comparison among MA-DAA and the existing schemes in Sign/Verify protocol.

    IV. EXPERIMENT ANALYSIS OF MADAA SCHEME

    Here, we compare the experimental performance of the MA-DAA scheme with the existing scheme in [20] based on the NC-UAV computation environment. Here, an alternative simulation is used for the experiments. This means that, without considering the communication time between NC-UAV and the remote certificate Issuer and the communication time between NC-UAV and the remote Verifier, we simply focus on the time overhead on independent protocol operations of each protocol entity.

    Based on this assumption, we set the Host,Issuer, and Verifier to work on the same computer. The software simulation technique [27]is used to internally install TPM on the same computer, which communicates with TPM via the hardware interface. Statistics on the time overhead of each protocol are provided in the standalone simulation environment. The scheme’s parameters, such as par, are chosen according to [19].

    4.1 Experimental environment

    We construct the network-connected UAV experimental environment. The Host platform is the embedded computer with 2.8 GHz Intel Core(TM) i5 CPU, 4 GB of memory. The operating system is Ubuntu 9.10. The installed kernel is Linux 2.6.25. TPM simulator is tpm_emulator-0.5.1. TSS software stack [28] is trousers_0.3.1-7_i386.deb. Linux command line tools that TPM uses is tpm-tools_1.3.1-4_i386.deb. The other software packages include OpenSSL, opencryptoki, libtool, libtspi1, and libopencryptoki.

    4.2 Experiment results

    The Host computer exchanges messages with software TPM via the kernel simulated module/dev/tpm0. Here, the input data for one protocol is transferred by previously saved .txt files,whereas the protocol output data is stored in similar .txt files to allow other protocols to call them. For example, the DAA certificate,which NC-UAV obtains after the Join protocol, is stored in the form of credential.txt and is called in the Sign protocol. In addition, the public key data is pre-stored in the local public document for each entity’s visit.

    As described in Section 4.2, according to the operation order of the Join protocol in the MA-DAA scheme, it is divided into four parts:Issuer requirement, TPM response, Issuer response, and Host verification. In accordance with the Join protocol process of the MADAA scheme and use of the cryptographic algorithm library software package provided by OpenSSL, we employ the C language to write the client program edaa_join.c in Ubuntu 9.10. The main jobs of edaa_join.c include the Issuer requirement, Issuer response, and Host verification. The TPM response is ful filled by software TPM: it starts when the Host inputs data to device /dev/tpm0 and ends when the Host obtains the output from /dev/tpm0.

    The program computes the time overhead of each protocol in microseconds and runs by calling the timing function of the operating system. The experiment results after running edaa_join are shown in Figure 11.

    From Figure 11, we can find out that the time overhead requirement of the Issuer in the Join protocol of the MA-DAA scheme is (585782-584653)μs, namely, 1129 μs;the time overhead of the TPM response is(3306207-586079)μs, namely, 2720128 μs;the time overhead of the Issuer response is(3311957-3306799)μs, namely, 5158 μs;and the time overhead of the Host verification is (3357951-3311957)μs, namely, 45994μs.In addition, we find that some time overhead is required when TPM exchanges data with the Host. For example, if the Issuer asks for the Sign, it writes data to TPM, which costs(586079-585782)μs, namely, 297μs. Because the Host and Issuer modules originate from the same computer, their communication time is neglected. Similarly, the communication time between the Host and Verifier in the Sign protocol is also neglected. In this experiment, we simply consider the communication time between TPM and the Host.

    Fig. 11. Time overhead testing results for MA-DAA’s and [20]’s Join protocol.

    Table IV. Computation cost comparison between MA-DAA scheme and scheme of[20] in Join (unit μs).

    According to table 4, the main differences between the MA-DAA scheme and the scheme in [20] can be seen in two aspects. First, the MA-DAA scheme reduces the TPM Open process. Second, the time overhead of the Issuer response in the MA-DAA scheme is 996(5158-4162) μs larger than scheme [20]. The reason is that in the MA-DAA scheme, TPM does not have the TPM Open operation, whereas the Issuer makes the operation on behalf of TPM.This way, the Issuer ful fills the group G1exponential operation originally conducted by TPM. With the use of batch technology, the Issuer response costs only 996 μs more than the scheme in [20], which is small relative to the TPM Open cost of 1125081 μs. By computing the total time of the Join process of the MA-DAA scheme and the scheme in [20],we can find out that the Join protocol’s total time of the MA-DAA scheme is 2772409 μs.Compared with the time overhead of scheme[20] of 3896101 μs, the performance of the MA-DAA Join improves by up to approximately 29%.

    Moreover, two other source programs are written: edaa_sign.c and edaa_verify.c. In accordance with Section 4, the Sign/Verify in the MA-DAA scheme is divided into three parts:Host Sign, TPM Sign, and Verify. The main jobs of edaa_sign.c include Host Sign operations and data exchange with TPM, whereas edaa_verify.c mainly ful fills the Verify operations independently. Based on a comparison of the Join time overhead, Table 5 provides the final statistics comparison of the time overhead in the Sign/Verify of DAA.

    In table 5, the time overhead of the scheme in [20] is large. The improvement of the MADAA scheme is that, regardless of whether the signature has correlation, the computation of each entity is smaller than the signature in scheme [20]. The reason is that MA-DAA uses a new equation instead of J and K in [20]for signature correlation detection, such that TPM Sign makes fewer group G1exponential operations than [20], which is where the main advantage of the MA-DAA scheme lies.Comparing the total time of the two schemes,we find that the MA-DAA scheme costs 1200602μs. It is obvious that the performance of the MA-DAA scheme’s Sign/Verify improves by up to 49%.

    Table V. Computation cost comparison between MA-DAA scheme and scheme of[20] in Sign/Verify (unit μs).

    V. CONCLUSIONS

    Given that many NC-UAV units operate without human intervention, user authentication will be replaced by platform identity and integrity authentication in network-connected UAV communication systems. In this paper,we proved that, with the benefits of mutual authentication improvement in security, less computational cost, and higher efficiency,the proposed MA-DAA scheme is suitable for network-connected UAV communication systems and meets the requirements of NCUAV which is limited in computation and bandwidth resources. The MA-DAA scheme balances the requirements of security and efficiency and provides an effective anonymous platform-trusted authentication solution for NC-UAV communication systems. It is the first time that a trusted scheme is proposed in NC-UAV communication systems. With the support of this effective and secure MA-DAA scheme, the application of NC-UAVs will be extended.

    ACKNOWLEDGEMENTS

    This work was supported in part by the European Commission Marie Curie IRSES project“AdvIOT” and the National Natural Science Foundation of China (NSFC) under grant No.61372103.

    [1] L. Gupta, R. Jain, G. Vaszkun, “Survey of Important Issues in UAV Communication Networks”,IEEE Communications Surveys & Tutorials, vol.18, no. 2, 2016, pp. 1123-1152.

    [2] I. Bekmezci, O. K. Sahingoz, S. Temel, “Flying Ad-hoc Networks (FANETs): A Survey”, Ad Hoc Networks, vol. 11, no. 3, 2013, pp. 1254–1270.

    [3] K. Daniel, C. Wietfeld, “Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations”, the IEEE Conference on Technologies for Homeland Security, 2011.

    [4] T. C. Hong, K. Kang, K. Lim, et al., “Network Architecture for Control and Non-payload Communication of UAV”, International Conference on Information and Communication Technology Convergence, IEEE, 2016, pp. 762-764.

    [5] D. He, S. Chan, M. Guizani, “Communication Security of Unmanned Aerial Vehicles”, IEEE Wireless Communications, no. 99, 2016, pp. 2-7.

    [6] K. Hartmann, C. Steup. “The Vulnerability of UAVs to Cyber Attacks - An Approach to The Risk Assessment”, International Conference on Cyber Conflict, IEEE, 2013, pp. 1-23.

    [7] A. J. Kerns, D. P. Shepard, J. A. Bhatti, et al., “Unmanned Aircraft Capture and Control via GPS Spoo fing”, Journal of Field Robotics, vol. 31, no.4, 2014, pp. 617-636.

    [8] G. Panice, S. Luongo, G. Gigante, et al., “A SVM-based Detection Approach for GPS Spoofing Attacks to UAV”, International Conference on Automation and Computing, 2017, pp. 1-11.

    [9] S. Hagerman, A. Andrews, S. Oakes. “Security Testing of An Unmanned Aerial Vehicle(UAV)”, Cybersecurity Symposium, IEEE, 2017,pp. 26-31.

    [10] K. Yoon, D. Park, Y. Yim, et al., “Security Authentication System Using Encrypted Channel on UAV Network”, International Conference on Robotic Computing, IEEE, 2017, pp. 393-398.

    [11] M. Podhradsky, N. Hoffer, C. Coopmans, “Improving Communication Security of Open Source UAVs: Encrypting Radio Control Link”, International Conference of Unmanned Aircraft Systems, IEEE, 2017.

    [12] G. Wang, K. Lim, B. S. Lee, et al., “Handover Key Management in An LTE-based Unmanned Aerial Vehicle Control Network”, International Con-ference on Future Internet of Things and Cloud,IEEE, 2017, pp. 200-205.

    [13] ISO/IEC 11889: Information Technology-Security Techniques-Trusted Platform Module, http://www.trusted computinggroup.org, 2009.

    [14] TCG specification architecture overview, Reversion 1.4, http://www.trusted-computinggroup.org, 2011.

    [15] E. Brickell, J. Camenisch, and L. Chen, “Direct Anonymous Attestation”, The 11th ACM Conference on Computer and Communications Security, 2004, pp. 132-145.

    [16] L. Chen, P. Morrissey, N. P. Smart, “Pairings in Trusted Computing”, Galbraith, Paterson (eds.)Pairing 2008, LNCS, vol. 5209, 2008, pp. 1-17.

    [17] L. Chen, P. Morrissey, N. P. Smart, “Fixing the Pairing Based Protocols”, Cryptology ePrint Archive, Report 2009/198, http://eprint.iacr.org/2009/198.

    [18] J. Camenisch, A. Lysyanskaya, “Signature Schemes and Anonymous Credentials from Bilinear Maps”, CRYPTO 2004, LNCS, vol. 3152,2004, pp. 56-72.

    [19] L. Chen, D. Page, N. P. Smart, “On the Design and Implementation of an Efficient DAA scheme”, CARDIS 2010, LNCS, vol. 6035, 2010,pp. 223-238.

    [20] L. Chen, “A DAA Scheme Using Batch Proof and Verification”, TRUST 2010, LNCS, vol. 6101,2010, pp. 166-180.

    [21] E. Brickell, L. Chen, J. Li, Ssimplified Security Notions for Direct Anonymous Attestation and a Concrete Scheme from Pairings”, International Journal of Information Security, vol. 8, 2009, pp.315-330.

    [22] R. Granger, N. P. Smart, “On Computing Products of Pairings”, Cryptology ePrint Archive, Report 2006/172, http://eprint.iacr.org/2006/172.

    [23] L. Yang, J. Ma, W. Wang, “Multi-domain Direct Anonymous Attestation Scheme from Pairings”,Network and System Security, Springer International Publishing, 2014, pp. 566-573.

    [24] L. Tan, M. Zhou, “A New Process and Framework for Direct Anonymous Attestation Based on Asymmetric Bilinear Maps”, Wuhan University Journal of Natural Sciences, vol. 16, no. 5, 2011,pp. 369-375.

    [25] N. Koblitz, A. Menezes, “Pairing-based Cryptography at High Security Levels”, Cryptography and Coding LNCS, vol. 3796, 2005, pp. 13-36.

    [26] X. Chen, D. Feng, “Direct Anonymous Attestation for Next Generation TPM”, Journal of Computers, vol. 3, 2008, pp. 43-50.

    [27] M. Strasser, H. Stamer, “A software-based Trusted Platform Module Emulator”, TRUST 2008 LNCS, vol. 4968, 2008, pp. 33-47.

    [28] TCG, “TCG Software Stack (TSS) Specification”,https://www.trustedcomputing-group.org, 2005.

    色视频www国产| 亚洲精品日本国产第一区| 有码 亚洲区| 男女下面进入的视频免费午夜| 国产精品女同一区二区软件| 亚洲欧美精品专区久久| 国产黄片美女视频| 内射极品少妇av片p| 两个人的视频大全免费| 精品午夜福利在线看| 91久久精品国产一区二区成人| 国产av国产精品国产| 免费黄色在线免费观看| 80岁老熟妇乱子伦牲交| 男女边摸边吃奶| 丰满人妻一区二区三区视频av| 有码 亚洲区| 最后的刺客免费高清国语| 欧美 日韩 精品 国产| 欧美高清成人免费视频www| av.在线天堂| 国内揄拍国产精品人妻在线| 啦啦啦视频在线资源免费观看| 在线免费十八禁| 高清在线视频一区二区三区| 九九在线视频观看精品| 久久99热这里只有精品18| 亚洲人成网站在线播| 国产成人午夜福利电影在线观看| 久久女婷五月综合色啪小说| 草草在线视频免费看| 久久综合国产亚洲精品| 久久精品久久久久久久性| 精品视频人人做人人爽| 人妻夜夜爽99麻豆av| 亚洲av男天堂| 欧美成人一区二区免费高清观看| 中文字幕制服av| 欧美高清成人免费视频www| 我的老师免费观看完整版| 99热网站在线观看| 国产精品久久久久成人av| 久久精品国产a三级三级三级| 精品久久久精品久久久| 亚洲精品456在线播放app| 欧美3d第一页| 亚洲久久久国产精品| 日韩一本色道免费dvd| 国产亚洲91精品色在线| 亚洲欧美中文字幕日韩二区| h视频一区二区三区| 人体艺术视频欧美日本| 日韩大片免费观看网站| 亚洲av免费高清在线观看| av黄色大香蕉| 欧美三级亚洲精品| 2018国产大陆天天弄谢| 国产亚洲一区二区精品| 国产精品.久久久| 国产精品成人在线| 男男h啪啪无遮挡| 精品99又大又爽又粗少妇毛片| 成人一区二区视频在线观看| 午夜日本视频在线| 久久人人爽av亚洲精品天堂 | 大话2 男鬼变身卡| 亚洲精品色激情综合| 亚洲欧美清纯卡通| 人妻 亚洲 视频| 日韩av在线免费看完整版不卡| 国产亚洲91精品色在线| 秋霞在线观看毛片| 黄色一级大片看看| 亚洲综合色惰| 简卡轻食公司| 一个人看视频在线观看www免费| 国产精品国产三级专区第一集| 日本猛色少妇xxxxx猛交久久| 色婷婷久久久亚洲欧美| 欧美高清成人免费视频www| 汤姆久久久久久久影院中文字幕| 免费大片18禁| 国产v大片淫在线免费观看| 国产精品99久久久久久久久| 精品国产乱码久久久久久小说| 久久久精品94久久精品| 三级国产精品片| 亚洲性久久影院| av播播在线观看一区| 啦啦啦中文免费视频观看日本| 久久99热6这里只有精品| 久久av网站| 亚洲熟女精品中文字幕| 亚洲国产最新在线播放| 国产欧美日韩精品一区二区| 哪个播放器可以免费观看大片| 国产精品女同一区二区软件| 亚洲av在线观看美女高潮| 精品国产露脸久久av麻豆| xxx大片免费视频| 国产精品久久久久久精品电影小说 | 一个人免费看片子| 日日啪夜夜撸| 男男h啪啪无遮挡| 尤物成人国产欧美一区二区三区| 精品熟女少妇av免费看| 美女xxoo啪啪120秒动态图| 99热全是精品| 99精国产麻豆久久婷婷| 日韩强制内射视频| 特大巨黑吊av在线直播| 欧美日韩一区二区视频在线观看视频在线| 精品久久国产蜜桃| 纯流量卡能插随身wifi吗| 成人亚洲精品一区在线观看 | 女性被躁到高潮视频| 国产一区有黄有色的免费视频| 免费av不卡在线播放| 七月丁香在线播放| 大话2 男鬼变身卡| 黑人猛操日本美女一级片| 久久99热6这里只有精品| 不卡视频在线观看欧美| 亚洲欧美成人综合另类久久久| xxx大片免费视频| 国产黄色视频一区二区在线观看| 国产伦在线观看视频一区| 亚洲欧美日韩无卡精品| 亚洲精品国产av成人精品| 日韩视频在线欧美| 亚洲熟女精品中文字幕| 成人无遮挡网站| 精品一区二区三卡| 哪个播放器可以免费观看大片| 在线观看美女被高潮喷水网站| 熟女人妻精品中文字幕| 日韩,欧美,国产一区二区三区| 欧美bdsm另类| 日本欧美国产在线视频| 亚洲欧美日韩东京热| 搡女人真爽免费视频火全软件| 欧美成人a在线观看| 亚洲婷婷狠狠爱综合网| 观看免费一级毛片| 亚洲精品久久久久久婷婷小说| a级毛片免费高清观看在线播放| 久久精品夜色国产| 国产黄片美女视频| 91久久精品国产一区二区三区| 少妇 在线观看| 亚洲在久久综合| www.色视频.com| 五月天丁香电影| 尾随美女入室| 97超视频在线观看视频| 国产精品久久久久久精品古装| 精品少妇黑人巨大在线播放| 亚洲av福利一区| 噜噜噜噜噜久久久久久91| 国产精品国产三级国产专区5o| 欧美人与善性xxx| 少妇人妻久久综合中文| 亚洲国产精品成人久久小说| 内射极品少妇av片p| 亚洲伊人久久精品综合| 亚洲国产色片| www.av在线官网国产| 亚州av有码| 亚洲精品第二区| 久久久久国产网址| 国国产精品蜜臀av免费| 纯流量卡能插随身wifi吗| 免费观看在线日韩| 一级毛片电影观看| 在线亚洲精品国产二区图片欧美 | 老师上课跳d突然被开到最大视频| 日本-黄色视频高清免费观看| 日韩大片免费观看网站| 国产无遮挡羞羞视频在线观看| 亚洲在久久综合| 最近最新中文字幕免费大全7| 男人和女人高潮做爰伦理| av视频免费观看在线观看| 少妇被粗大猛烈的视频| av女优亚洲男人天堂| 国产毛片在线视频| av免费在线看不卡| 少妇熟女欧美另类| 全区人妻精品视频| 美女xxoo啪啪120秒动态图| 伊人久久国产一区二区| 国产乱人视频| 综合色丁香网| 日韩电影二区| 欧美bdsm另类| 日韩一区二区三区影片| 亚洲电影在线观看av| 日韩强制内射视频| 国产日韩欧美在线精品| 亚洲欧洲国产日韩| 国产人妻一区二区三区在| 日日摸夜夜添夜夜添av毛片| 五月玫瑰六月丁香| 亚洲av不卡在线观看| 午夜福利网站1000一区二区三区| 黄色怎么调成土黄色| 又黄又爽又刺激的免费视频.| 日韩人妻高清精品专区| 一级毛片我不卡| 日韩在线高清观看一区二区三区| 一区在线观看完整版| 国产亚洲精品久久久com| 亚洲欧美成人精品一区二区| 欧美精品国产亚洲| 国产在线一区二区三区精| 亚洲一区二区三区欧美精品| 中文字幕精品免费在线观看视频 | 国精品久久久久久国模美| 黄色欧美视频在线观看| 国产 一区精品| 日韩亚洲欧美综合| 国产成人freesex在线| 在线观看三级黄色| 亚洲精品乱码久久久v下载方式| 久久人妻熟女aⅴ| 黄色怎么调成土黄色| 精品久久久噜噜| 最黄视频免费看| 国产精品一区www在线观看| 性高湖久久久久久久久免费观看| 久久久精品94久久精品| 久久国产精品男人的天堂亚洲 | 国产黄色视频一区二区在线观看| 网址你懂的国产日韩在线| 男女边吃奶边做爰视频| 97在线人人人人妻| 欧美bdsm另类| 天堂俺去俺来也www色官网| 亚洲国产高清在线一区二区三| 日韩强制内射视频| 美女中出高潮动态图| 少妇人妻 视频| 亚洲精品成人av观看孕妇| 插逼视频在线观看| av卡一久久| 久久亚洲国产成人精品v| 少妇人妻久久综合中文| 如何舔出高潮| 亚洲真实伦在线观看| 最近手机中文字幕大全| 一个人看的www免费观看视频| 精品久久久久久久久av| av黄色大香蕉| 看非洲黑人一级黄片| 国产精品99久久99久久久不卡 | 国产高清三级在线| 免费人妻精品一区二区三区视频| 伦理电影免费视频| 在线观看美女被高潮喷水网站| 少妇人妻一区二区三区视频| 一级a做视频免费观看| 在线 av 中文字幕| 亚洲欧洲国产日韩| 大片免费播放器 马上看| videos熟女内射| 午夜福利在线观看免费完整高清在| 深夜a级毛片| 免费看av在线观看网站| 亚洲国产精品999| 国产午夜精品久久久久久一区二区三区| 欧美国产精品一级二级三级 | 女的被弄到高潮叫床怎么办| 国产一级毛片在线| 亚洲丝袜综合中文字幕| 永久网站在线| 18禁裸乳无遮挡动漫免费视频| 午夜福利视频精品| 亚洲精品乱码久久久v下载方式| 国产有黄有色有爽视频| 国产亚洲欧美精品永久| 少妇熟女欧美另类| 亚洲在久久综合| 全区人妻精品视频| 精品久久久久久久久亚洲| 嫩草影院入口| 在线观看人妻少妇| 日韩人妻高清精品专区| 成人18禁高潮啪啪吃奶动态图 | 麻豆成人午夜福利视频| 啦啦啦啦在线视频资源| 欧美一级a爱片免费观看看| 精品国产一区二区三区久久久樱花 | 国产永久视频网站| 久久ye,这里只有精品| 国产精品久久久久久久久免| 中国国产av一级| 国产精品秋霞免费鲁丝片| 国产高清不卡午夜福利| 欧美日韩视频精品一区| 国产精品女同一区二区软件| 亚洲av不卡在线观看| 成年av动漫网址| 成人一区二区视频在线观看| 波野结衣二区三区在线| 成人漫画全彩无遮挡| 欧美极品一区二区三区四区| 国产精品一区二区在线观看99| 久久99精品国语久久久| 免费大片18禁| 99热这里只有精品一区| 精品人妻偷拍中文字幕| 午夜免费鲁丝| 97在线人人人人妻| 久久久午夜欧美精品| 18禁在线播放成人免费| 一个人免费看片子| 日本色播在线视频| 中文字幕精品免费在线观看视频 | 国产色爽女视频免费观看| 日产精品乱码卡一卡2卡三| 午夜福利视频精品| 欧美日韩亚洲高清精品| 看十八女毛片水多多多| 免费不卡的大黄色大毛片视频在线观看| 最近2019中文字幕mv第一页| 成人高潮视频无遮挡免费网站| 日日撸夜夜添| 18禁裸乳无遮挡免费网站照片| 亚洲人成网站高清观看| 欧美bdsm另类| 久久午夜福利片| 在线观看免费视频网站a站| av.在线天堂| 精品少妇久久久久久888优播| 97在线人人人人妻| 国产精品成人在线| 午夜福利影视在线免费观看| 中国美白少妇内射xxxbb| 最近最新中文字幕免费大全7| 久久久久精品性色| 亚洲国产日韩一区二区| 日韩中文字幕视频在线看片 | 欧美精品一区二区大全| 亚洲色图综合在线观看| 免费看不卡的av| 啦啦啦在线观看免费高清www| 青春草国产在线视频| 夫妻性生交免费视频一级片| 男女边吃奶边做爰视频| 老熟女久久久| 一区二区三区精品91| 午夜老司机福利剧场| 亚洲,欧美,日韩| 国产欧美另类精品又又久久亚洲欧美| 国产美女午夜福利| 国产黄片美女视频| 成人18禁高潮啪啪吃奶动态图 | 2022亚洲国产成人精品| 丰满迷人的少妇在线观看| 国产精品伦人一区二区| 久久久久国产网址| 精品国产三级普通话版| 麻豆精品久久久久久蜜桃| 边亲边吃奶的免费视频| 亚洲成人手机| 内射极品少妇av片p| 日本色播在线视频| 国语对白做爰xxxⅹ性视频网站| 日日摸夜夜添夜夜添av毛片| 777米奇影视久久| 高清在线视频一区二区三区| 自拍偷自拍亚洲精品老妇| 亚洲国产最新在线播放| 日韩国内少妇激情av| 七月丁香在线播放| 成人二区视频| 亚洲av中文av极速乱| 欧美成人a在线观看| 亚洲欧美成人精品一区二区| 日韩中文字幕视频在线看片 | 亚洲精品日韩在线中文字幕| 性色avwww在线观看| 日韩在线高清观看一区二区三区| www.色视频.com| 99久久精品国产国产毛片| 亚洲经典国产精华液单| 色视频在线一区二区三区| 日韩视频在线欧美| 搡女人真爽免费视频火全软件| 久久精品国产亚洲网站| 两个人的视频大全免费| 91精品伊人久久大香线蕉| 欧美变态另类bdsm刘玥| 自拍欧美九色日韩亚洲蝌蚪91 | 麻豆乱淫一区二区| 三级国产精品欧美在线观看| 欧美日韩国产mv在线观看视频 | 国产亚洲最大av| 亚洲国产毛片av蜜桃av| 男女下面进入的视频免费午夜| 在线 av 中文字幕| 久久精品国产亚洲av涩爱| 精品久久久久久久久av| 国产 一区 欧美 日韩| 日本与韩国留学比较| 一本一本综合久久| 国产成人一区二区在线| 免费不卡的大黄色大毛片视频在线观看| 男人和女人高潮做爰伦理| 五月开心婷婷网| 啦啦啦视频在线资源免费观看| 成人高潮视频无遮挡免费网站| 激情五月婷婷亚洲| 欧美激情国产日韩精品一区| 国产av国产精品国产| 三级经典国产精品| 毛片女人毛片| 国产爱豆传媒在线观看| 少妇人妻精品综合一区二区| 成人黄色视频免费在线看| 国产欧美日韩一区二区三区在线 | 国产男女超爽视频在线观看| 亚洲四区av| 午夜福利高清视频| 国产69精品久久久久777片| 亚洲熟女精品中文字幕| 精品99又大又爽又粗少妇毛片| 欧美bdsm另类| av在线app专区| 777米奇影视久久| 国产伦精品一区二区三区四那| 亚洲国产欧美在线一区| 午夜免费男女啪啪视频观看| 国产黄片视频在线免费观看| 人体艺术视频欧美日本| a 毛片基地| 国产黄色免费在线视频| 欧美极品一区二区三区四区| 国产成人免费观看mmmm| 午夜免费观看性视频| 欧美性感艳星| h日本视频在线播放| 国产精品久久久久成人av| 欧美精品一区二区大全| 超碰97精品在线观看| 日韩精品有码人妻一区| 一级爰片在线观看| 午夜激情久久久久久久| 97超碰精品成人国产| 亚洲色图综合在线观看| 欧美日韩一区二区视频在线观看视频在线| 亚洲四区av| 久久久亚洲精品成人影院| 婷婷色av中文字幕| 亚洲综合色惰| 80岁老熟妇乱子伦牲交| av在线播放精品| 人体艺术视频欧美日本| 国产成人aa在线观看| 国产精品成人在线| 尤物成人国产欧美一区二区三区| 99热网站在线观看| 日韩欧美一区视频在线观看 | 最近2019中文字幕mv第一页| 国产 一区精品| 亚洲精品一区蜜桃| 国产在线视频一区二区| 精华霜和精华液先用哪个| 久久精品国产亚洲网站| 一区二区三区精品91| 亚洲精品国产av蜜桃| 久久久久视频综合| 中国美白少妇内射xxxbb| 国产精品久久久久久av不卡| 1000部很黄的大片| 亚洲精品456在线播放app| 草草在线视频免费看| 夜夜爽夜夜爽视频| 一级二级三级毛片免费看| 女人久久www免费人成看片| 一本一本综合久久| 国产亚洲5aaaaa淫片| 蜜桃久久精品国产亚洲av| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲电影在线观看av| 少妇 在线观看| 黄片wwwwww| 乱码一卡2卡4卡精品| 一级毛片电影观看| 国产精品一区二区三区四区免费观看| 毛片一级片免费看久久久久| 永久网站在线| 性色av一级| 国产成人91sexporn| 日韩一区二区视频免费看| 嫩草影院新地址| 最近中文字幕2019免费版| 国产精品99久久99久久久不卡 | 日韩欧美 国产精品| 成年免费大片在线观看| 久久久久久伊人网av| 80岁老熟妇乱子伦牲交| 卡戴珊不雅视频在线播放| 熟女电影av网| 亚洲欧美日韩另类电影网站 | 日韩 亚洲 欧美在线| 日本午夜av视频| 少妇精品久久久久久久| 99九九线精品视频在线观看视频| 伦理电影大哥的女人| av女优亚洲男人天堂| 日本av免费视频播放| 国产亚洲av片在线观看秒播厂| 国产男女内射视频| 久久久久国产网址| 国产片特级美女逼逼视频| 国产精品偷伦视频观看了| 亚洲精品一区蜜桃| 夫妻午夜视频| 久久精品国产亚洲av涩爱| 婷婷色综合www| 国产黄频视频在线观看| 精品亚洲成国产av| 久久综合国产亚洲精品| 日本免费在线观看一区| 99热这里只有是精品在线观看| 最黄视频免费看| 国产色婷婷99| 久久青草综合色| 国产成人精品久久久久久| 妹子高潮喷水视频| 亚洲av福利一区| 久久久久久久久久成人| 国内精品宾馆在线| 日本av免费视频播放| 又黄又爽又刺激的免费视频.| 成人特级av手机在线观看| 五月开心婷婷网| 国内精品宾馆在线| 日本午夜av视频| 欧美97在线视频| 一区二区三区四区激情视频| 国产高潮美女av| 极品教师在线视频| 一边亲一边摸免费视频| 伦理电影大哥的女人| 亚洲欧美一区二区三区国产| 国产精品秋霞免费鲁丝片| 国产精品国产av在线观看| 99久久综合免费| 亚洲精品日韩在线中文字幕| 国产深夜福利视频在线观看| 国产亚洲最大av| 人体艺术视频欧美日本| 美女高潮的动态| 国产精品人妻久久久影院| 亚洲人成网站在线观看播放| av卡一久久| 2022亚洲国产成人精品| 国产亚洲av片在线观看秒播厂| 欧美国产精品一级二级三级 | 亚洲成人中文字幕在线播放| 成人综合一区亚洲| 一二三四中文在线观看免费高清| 国产女主播在线喷水免费视频网站| 国产69精品久久久久777片| 免费不卡的大黄色大毛片视频在线观看| 97超碰精品成人国产| 国产在视频线精品| 日本午夜av视频| 成年女人在线观看亚洲视频| 久久 成人 亚洲| 亚洲精品乱码久久久久久按摩| 亚洲av不卡在线观看| 精品久久国产蜜桃| 亚洲成人av在线免费| 美女高潮的动态| 国产成人精品婷婷| 国产白丝娇喘喷水9色精品| 少妇熟女欧美另类| 亚州av有码| 国产成人freesex在线| 亚洲欧美中文字幕日韩二区| 99久久精品热视频| 国产精品99久久久久久久久| 亚洲国产精品成人久久小说| 菩萨蛮人人尽说江南好唐韦庄| 国产成人午夜福利电影在线观看| 美女内射精品一级片tv| 亚洲欧美精品专区久久| 日韩电影二区| 欧美日韩国产mv在线观看视频 | 丝瓜视频免费看黄片| 亚洲av电影在线观看一区二区三区| 99精国产麻豆久久婷婷| 免费看日本二区| 亚洲欧洲日产国产| 人体艺术视频欧美日本| 国产精品久久久久久久久免| 欧美少妇被猛烈插入视频| 一级毛片黄色毛片免费观看视频| 啦啦啦啦在线视频资源| 国产精品免费大片| 欧美最新免费一区二区三区| 婷婷色av中文字幕| 麻豆国产97在线/欧美| 色网站视频免费| 成人二区视频| 丰满乱子伦码专区| 国产精品久久久久久久电影| 狠狠精品人妻久久久久久综合| 精品久久国产蜜桃| 精品国产露脸久久av麻豆| 色视频www国产| 亚州av有码|