• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    2022-08-24 03:27:04UsmanAliMohdYamaniIdnaIdrisJaroslavFrndaMohamadNizamBinAyubRoobaeaAlroobaeaFahadAlmansourNuraModiShagariInsafUllahandIhsanAli
    Computers Materials&Continua 2022年5期

    Usman Ali,Mohd Yamani Idna Idris,Jaroslav Frnda,Mohamad Nizam Bin Ayub,Roobaea Alroobaea,F(xiàn)ahad Almansour,Nura Modi Shagari,Insaf Ullah and Ihsan Ali

    1Department of Computer System and Technology,F(xiàn)aculty of Computer Science and Information Technology,University of Malaya,Kuala Lumpur,50603,Malaysia

    2Department of Computer Science,University of Swat,Saidu Sharif,19130,Pakistan

    3Center for Research in Mobile Cloud Computing,University of Malaya,Kuala Lumpur,50603,Malaysia

    4Department of Quantitative Methods and Economic Informatics,F(xiàn)aculty of Operation and Economics of Transport and Communications,University of Zilina,010 26 Zilina,Slovakia

    5Department of Computer Science,College of Computers and Information Technology,Taif University,Taif,21944,Saudi Arabia

    6Department of Computer Science,College of Sciences and Arts in Rass,Qassim University,Buraydah,51452,Saudi Arabia

    7Department of Computer Science,Hamdard Institute of Engineering and Technology,Islamabad,44000,Pakistan

    Abstract:Industrial internet of things(IIoT)is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits.However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels.Therefore, this necessitates the design of an efficient security mechanism for IIoT environment.In this paper, we propose a hyperelliptic curve cryptography(HECC)based IIoT Certificateless Signcryption(IIoT-CS) scheme, with the aim of improving security while lowering computational and communication overhead in IIoT environment.HECC with 80-bit smaller key and parameters sizes offers similar security as elliptic curve cryptography(ECC)with 160-bit long key and parameters sizes.We assessed the IIoT-CS scheme security by applying formal and informal security evaluation techniques.We used Real or Random(RoR)model and the widely used automated validation of internet security protocols and applications(AVISPA) simulation tool for formal security analysis and proved that the IIoT-CS scheme provides resistance to various attacks.Our proposed IIoT-CS scheme is relatively less expensive compared to the current state-of-the-art in terms of computational cost and communication overhead.Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively,compared to the most recent protocol.

    Keywords: IoT security; authentication protocols; hyperelliptic curve cryptography; certificateless public key cryptography

    1 Introduction

    The Internet of Things (IoT) is a rapidly evolving infrastructure which allows traditional systems to connect with one another by incorporating new devices such as sensors, actuators, and other smart devices.The integration of IoT and wireless sensor networks (WSN) has boosted the usage of IoT in our everyday lives, such as health tracking, smart houses, smart cities, and smart transportation [1].The widespread use of IoT can also be seen in an industrial environment known as Industrial IoT (IIoT) or Industry 4.0, including industrial automation, aviation, smart retail, smart farming, and power systems [2–4].The IIoT refers to the use of well-connected IoT devices for collecting and communicating real-time events in industrial systems to reduce human effort and operational costs and to enhance manufacturing and industrial processes.However,these interconnected smart devices and networks have been used to enable a variety of cyberattacks due to the inadequate computational resources and communication over insecure wireless channels.Therefore, this necessitates the design of an efficient and secure mechanisms for IIoT environment.The limited battery life of smart devices is one of the main obstacles in the design of security solutions for IIoT applications.As a result, a current research focus is on developing a secure and efficient solutions for resource-constrained IoT devices.The security requirements for IIoT data, such as confidentiality, integrity, authenticity, and non-repudiation must always be ensured due to the resource-constrained IoT devices and communications over an insecure network.A signature-then-encryption mechanism is one solution to ensure such security requirements, however, this approach is not appropriate for low computing IoT devices as it produces the message’s signature and encryption in two separate steps.To enhance the performance, Zheng [5]introduced Signcryption techniques, which incorporates signature and encryption in a single logical step.However, Zheng approach is based on public key cryptography (PKC).In PKC based schemes, the public key of a participating entity contains a random number belonging to some group that does not offer authenticity to the participating entity as the group elements provide no identity to the participating entities [6].To address the flaws in PKC based schemes, the notion of public key infrastructure (PKI) was introduced in which a certificate authority (CA) is used that binds the public key with certificates [7].However, this mechanism suffers from certificate storage, distribution, and manufacturing difficulties [8].To overcome these shortcomings, the idea of identity-based cryptography (IBC) was suggested in [9].IBC enables the participating entities to produce public keys directly from their identities, such as e-mail and phone numbers, without the need for CA, and the private key for each participating entity is generated by the trusted server which acts as the key generation center (KGC).The principle Signcryption was implemented to merge the features of signature and encryption into a single step [10].However, IBC based schemes suffer from the key escrow problem in which the KGC has the complete knowledge of the private keys of all participants.To address this problem, the idea of Certificateless Public Key Infrastructure (CPKI) was suggested in [11].In CPKI, a participant’s private key is made up of two parts:one part is the private key provided by the KGC, and the second part is a secret value generated by the participant itself.The concept of Certificateless Signcryption (CS)was introduced, in which the principle of Signcryption was implemented to merge the features of signature and encryption into a single step [12].

    Normally, the above-mentioned Signcryption schemes’security and efficiency depend on some computationally difficult problems, for instance, RSA, bilinear pairing (BP), and elliptic curve cryptography (ECC).The RSA [13,14] scheme is not appropriate for resource constraint devices because it contains large factorization and uses a 1024-bit large key size [15].Furthermore, BP is 14.31 times worse than RSA [16].ECC has been introduced to address the shortcomings of RSA and BP [17].In comparison to BP and RSA, ECC uses less parameter size, public key, and private key sizes.Furthermore, the efficiency and security of the ECC is based on 160-bit key size [18].However, ECC based schemes are still inefficient for resource constraint IoT devices.To enhance the efficiency of ECC based schemes, the idea of hyper elliptic curve cryptography (HECC) was introduced [19].The HECC offers the similar level of security as ECC by utilizing 80-bit small key sizes [20–22].Thus, HECC is considered a better choice for resource constraint IoT devices.In this paper, we proposed HECC based IIoT certificateless Signcryption (IIoT-CS) scheme for secure communication in IIoT environment.

    1.1 Motivation and Contributions

    Recently, Garg et al.[23] Proposed authentication scheme for IIoT environment.We found that their scheme is based on a hierarchical approach in which two participating IoT nodes cannot perform mutual authentication directly without an active server.In their scheme, the intended IoT nodes need to perform an authentication process with the server before they start communication,which increases the communication overhead for each IoT node.Furthermore, the efficiency and security of their scheme is based on ECC which suffer from high computational overhead due to the large parameters and key sizes compared to HECC.Their scheme’s verification is not proved using formal security verification tools such as RoR.To address these shortcomings, we propose HECC based IIoT-CS scheme for secure IIoT communications.As we mentioned in the introduction, the HECC offers a similar level of security as ECC, RSA, and bilinear pairing by using a smaller key size, which reduces the computational and communication overhead.We verified the security of IIoT-CS scheme using the RoR model and AVISPA simulation tool.We also performed the informal security analysis of the proposed scheme.Furthermore, the results proved the efficiency of IIoT-CS scheme.

    1.2 Outline of the Paper

    The remainder of the paper is presented as follows.Section 2 contains related work; Section 3 shows the system model and threat models; Section 4 presents the proposed scheme; Section 5 demonstrates the proof of correctness; Section 6 presents the security evaluation; Section 7 presents the comparative analysis; Section 8 discusses the conclusion and finally Section 9 shows future work.

    2 Related Work

    Information security is important to protect critical information in modern communication systems where the communication is held through an insecure public networks.The research community is also echoing the significance of such a topic [24–26].Hassija et al.[27] addressing the evolving security issues in IoT environments, emphasizing the significance of maintaining secure communication among IoT nodes.To safeguard sensitive data/information, it must be concealed from unauthorized access (confidentiality), identify who sent the message (authentication),be protected from alteration (integrity), and be available to a legitimate user [28].Therefore,encryption techniques are used to ensure confidentiality, whereas digital signatures are applied to guarantee integrity and authenticity.In the conventional encryption mechanism known as signature-then-encryption in which the sender has to first sign and then encrypt the data.However,this approach has some drawbacks, such as requiring more machine cycles and energy, which reduces the performance.To address these shortcomings, the concept of Signcryption was introduced in [5].However, this approach is based on PKC in which the public key of a participating entity contains a random number belonging to some group that does not offer authenticity to the participating entity as the group elements provide no identity to the participating entities [6].To address Signcryption flaws in [5], IBS scheme were suggested in [10].However, it turned out that IBS scheme suffer from the key escrow problem.To address this issue, CS scheme was introduced in [12].Following this scheme, another CS scheme based on random oracle model (ROM) was proposed [29].Wahid et al.[30] proposed EC-based CS efficient scheme.Zhou et al.[31] proposed a new SM based CS scheme.They used the modified decisional bilinear Diffie Hellman problem and square computational Diffie Hellman problem to prove their scheme’s security requirements.Rastegari et al.[32] proposed SM based CS scheme.Yu et al.[33] proposed a new CS scheme and demonstrated their scheme’s security by using ROM.Lin et al.[34] presented the cryptanalysis of the of scheme in [33] and found that since the requirements of confidentiality and unforgeability are not fulfilled, their scheme may be completely thwarted.Zhou [35] suggested a new BP based CS scheme using SM for security proof.

    3 System and Threat Model

    This section shows the details of the system model and threat model considered for the proposed IIoT-CS scheme.

    3.1 System Model

    Primarily, an IIoT environment consists of multiple IoT domains made up of IoT devices called nodes such as sensors, actuators, and other devices as shown in Fig.1.These IoT devices routinely collect information and transmit it to other devices in the network.The focus of this article is to design an authentication schemes to secure the communication among IoT nodes.The IoT nodes have minimal computing resources, while the KGC is a trusted server which has ample resources.We further assume that certain cryptographic elements are preloaded into the memory of all participating nodes and the nodes have to transmit their public keys and identities to KGC and other nodes to which they want to communicate.

    Figure 1:System model of the proposed scheme

    3.2 Threat Model

    In the proposed scheme, we considered a powerful threat model called Dolev-Yao (DY)threat model [36], which allows an adversary to execute passive and active attacks.According to DY threat model, the adversary has access to the communication network and can listen in to all communications between participating entities.Furthermore, the adversary has complete knowledge of all public parameters of participants in the system, however the adversary has no access to the participant’s private data.Furthermore, the adversary can impersonate any device in the system by replaying messages previously eavesdropped from the communication channel.

    4 Proposed Scheme

    The proposed IIoT-CS scheme is based on HEC certificateless Signcryption and involves two phases, namely:pre-deployment phase and authentication phase, as shown in Fig.2.The notations used in the proposed IIoT-CS scheme are shown in Tab.1.

    Figure 2:Flow of interaction in the proposed IIoT-CS scheme

    4.1 Pre-Deployment Phase

    The predeployment phase is performed by the system administrator before the effective deployment of the system.In this phase, the IoT nodes are equipped with the basic cryptographic parameters necessary to establish secret session keys.This process is divided into two parts,namely, the system initialization stage and the registration stage.

    Table 1:Notations used in the proposed IIoT-CS scheme

    4.1.1 System Initialization Phase

    This process is carried out by the KGC, during which the following cryptographic information are initialized and made public.

    i) The hyperelliptic curveE/Fqover a prime finite fieldFq.

    ii) The algebraic closuref*ofFq.

    iii) The Divisor groupDof the curveE.

    iv) Hashing functionH:{0, 1} →, where, = {1, 2,..., q - 1}

    In addition, the KGC generates its master private keyVs∈Rand master public keyUs=Vs.D.Finally, it makes the public parametersparams= {Fq,f*,q,x,y,D,Us,H}, publicly available to all participants.

    4.1.2 Registration Phase

    During the registration stage, the system’s IoT nodes communicate with the KGC across a secure network in order to obtain dedicated cryptographic components.During the registration stage, the IoT nodes participating in the system communicate with the KGC through a secure communication channel to register their self and receive dedicated cryptographic information from the KGC.The flow of interaction of IoT nodes with the KGC is described below and shown in Fig.2.

    Step 1:The intended IoT node (sayith-node), that requires to be registered with the KGC,generates its identityIDiand private key as Vi∈R.Next, the node computes the first part of its public key asUi=Vi.D.The node then, computes a stringWi=(IDi||Ui), and transmits it to the KGC using a secure channel.

    Step 2:Upon receiving {Wi}, the KGC performs the following operations to compute the corresponding second part of the private and public keys on behalf ofith-node.

    i) The KGC selects a random value ri∈R, compute Yi=ri.D and sets it as the second part of the public key of theith-node.

    ii) The KGC computes hi=H(Wi||Yi) and Xi=((ri+hi.Vs) mod q) and sets Xias the second part of the private key of theith-node.The KGC delivers Xiand Yito theith-nodeusing a secure channel.

    Step 3:Upon receiving the second part of its private and public keys from KGC, theith-nodecan verify the authenticity of these keys by using the equation Xi.D=Yi+hi.Us.If this equation is validated, then the keys could be deemed valid and correctly generated by the KGC.Thus, theith-nodecan set its full private key as (Vi, Xi) and full public key as (Ui, Yi).

    4.2 Authentication Phase

    The authentication process is initiated by an IoT node (sayith-node) with the intention of communicating with the other IoT nodes (sayjth-node) as depicted in Fig.2.As described in the predeployment phase, each IoT node is preloaded with certain cryptographic information.Furthermore, to begin the authentication process, theith-nodegenerate a messageM1=〈Wi, Yi〉and transmit it to thejth-node.On receivingM1 thejth-nodereplies with a new messageM2=〈Wj, Yj〉.On receivingM2 from thejth-node, theith-nodegenerates a fresh session key, ciphertext,and signature by using the certificateless Signcryption operation as described below.

    i) Generate a timestamp Ti, select a fresh nonce ni∈{1,2,3,...,q-1}and a random secret valueb∈{1,2,3,...,q-1}and computeZ=b.D.

    ii) Computeα=Yj+US.H(Wj||Yj)

    iii) Compute a secret session keySK=b(Uj+α)

    iv) Compute cipher text C=ESK(IDi,m,ni), where m is plaintext.

    v) Computes the digital signatureS=(Xi+H(IDi||m||ni)(Vi+b)) mod q

    vi) Theith-nodesendsM3=〈Ti,C,S,Z〉to thejth-nodeusing insecure channel.

    On receiving M3, thejth-nodecheck the validity of Tiand if it is found to be valid, then proceed with the authentication procedure, otherwise terminate the session.Thejth-nodevalidates the digital signature and decrypt the ciphertext by using certificateless Un-Signcryption operation as described below.

    i) Computes the secret session keySK′=Z(Vj+Xj)

    ii) Perform decryption operation DSK′ (C)= (IDi,m,ni)

    iii) computeβ=Yi+US.H(Wi||Yi)

    iv) if S.D=β+H (IDi||m||ni). (Z+Ui) is hold, thenith-nodeis authenticated successfully.

    Thejth-nodeComputeKij=Vj.Uiand compute the messageAuth=H(Wi⊕Wj⊕ni⊕Kij).

    Finally, thejth-nodegenerate time stamp Tjand send the messageM4=〈Tj,Auth〉 to theith-node.Theith-nodeafter receiving M4 from thejth-node, first validate Tjand if it is found to be valid, then proceed with the authentication procedure, otherwise terminate the session.

    Theith-nodecomputeKji=Vi.UjandAuth′=H(Wi⊕Wj⊕ni⊕Kji).

    IfAuth=Auth′, then thejth-nodeis authenticated successfully.

    5 Proof of Correctness

    This section presents the proof of the correctness of the secret session key and signature verification.

    5.1 Proof of Secret Session Key SK′=SK

    SK′=Z(Vj+Xj),where Z=b.D and Xj=rj+Vs.H(Wj||Yj)

    ?b.D(Vj+rj+Vs.H(Wj||Yj))

    ?b.Vj.D+b.rj.D+b.Vs.D.H(Wj||Yj)

    ?b(Vj.D+rj.D+Vs.D.H(Wj||Yj)), whereUj=Vj.D,Yj=rj.D, andUs=Vs.D

    ?b(Uj+Yj+Us.H(Wj||Yj)), whereα=Yj+Us.H(Wj||Yj)

    ?b(Uj+α)=SKhence proof of correctness is verified.

    5.2 Proof of Signature Verification

    β+(Z+Ui)H(IDi||m||ni)=S.D

    β+ (Z+Ui).H(IDi||m||ni), whereβ=Yi+Us.H(Wi||Yi)

    ?Yi+Us.H(Wi||Yi)+ (Z+Ui).H(IDi||m||ni)

    ?Yi+Us.H(Wi||Yi)+Z.H(IDi||m||ni)+Ui.H(IDi||m||ni), where Yi=ri.D,Us=Vs.D,Z=b.Dand Ui=Vi.D

    ?ri.D+Vs.D.H(Wi||Yi)+b.D.H(IDi||m||ni)+Vi.D.H(IDi||m||ni)

    ? (ri+Vs.H(Wi||Yi)+(b+Vi).H(IDi||m||ni))D, where Xi=ri+Vs.H(Wi||Yi)

    ? (Xi+(b+Vi).H(IDi||m||ni))D, whereS=Xi+(b+Vi).H(IDi||m||ni)

    ?S.D, hence correctness of digital signature is verified.

    6 Security Evaluation

    We conducted both formal and informal security assessments to illustrate the potential of the IIoT-CS scheme against various attacks.The two computational problems that are useful in performing the formal security analysis are described below.

    Definition 1:Collision-Resistant One-Way Hash Function (H (.):{0,1}*→{0,1}n)

    It is a “deterministic mathematical function that accepts a variable-length input string and produces a n-bit fixed-length output string”.

    Definition 2:(Hyper Elliptic Curve Discrete Logarithm Problem (HECDLP))

    According to HECDLP, it is infeasible for an attacker to extract a value j from the relationL=j.D, whereas j ∈is the random number from= {1, 2,..., q - 1}.

    6.1 Formal Security Analysis Using RoR Model

    We used ROR model [37] in which an adversary simulates real attacks to target the communication between IoT nodes.In the proposed IIoT-CS scheme, an adversary is represented byAdand the participating nodes are represented byith-nodeandjth-node.Further, we assume the instances ofith-nodeandjth-nodeare represented byΦ= {Φi andΦj}.Adinitiates the following queries to interact withΦ.

    i)Execute query:Adeavesdrops on the communication channel and intercepts all communication betweenΦ.

    ii)Send query:Adtransmits a message toΦand obtains a reply from it consequently.

    iii)Reveal query:Adattempts to recover the session key betweenΦi andΦj.

    iv)Test query:AdrequestsΦfor session key and it responds with a random bit c.

    Moreover, H(.) is modeled as a random oracle which is available to all participants and adversaryAd.In the proposed IIoT-CS scheme, we demonstrated the existence of session key security (semantic security) by using Theorem 1 as stated below.

    Theorem 1:AssumeAdruns in a polynomial timeptand attempts to break the session key security betweenΦi and nodeΦj thenAd’s advantage in breaching the session key security can be written as follows:

    where the variables |Hash|,, and(pt) represent the range space of H(.), the number of hash queries, and the non-negligible winning advantage of breaking HECDLP respectively.

    Proof of Theorem 1:To prove Theorem 1, we used three GamesGi(i=1,2,3).Within each gameGi,Adattempts to guess the bitcby applying the test query.If, is an event whereAdaccurately guessesc, soAd’s advantage is as follows:

    Game G1:This game is similar like the real scheme that runs in RoR model.We obtain the following result in this game.

    Game G2:InG2, Ad intercepts all messages exchanged betweenΦi andΦj, these messages arem1={Wi, Yi}, m2={Wj, Yj}, m3={C, R, S, Z}andm4={Auth}.Next,Ademploys the Execute query to retrieve the session key, then employs the Reveal and Test queries to examine if the obtained session key is original or randomly generated.In the proposed IIoT-CS scheme, the session key can be produced asSK=b(Uj+α)=SK′=Z(Vj+Xj).To obtain this key correctly,Adneeds the secret valuesb,VjandXj.It implies that just eavesdropping of m1, m2, m3, and m4 would not improveAd’s winning probability.Hence, G1 and G2 are indistinguishable as shown in the following equation.

    Game 3:This game makes use of the Send and Hash queries.InG2, we know that eavesdropping onm1,m2,m3, andm4betweenΦi andΦj, would not result in hash collision as these messages are safeguarded by HECDLP and hash function.HECDLP protects the variablesb,Vs, Vi, andVjused withinZ, Us, UiandUjrespectively, while the hash function protects the variable S and the encryption algorithm protects the variablesC, and Auth.Moreover,G2andG3are indistinguishable except G3 solves HECDLP and performs the Hash and Send queries.The advantage of solving HECDLP byAis(pt), and, as per the birthday paradox, using such a hash oracle query has a probability.Overall, the following result is obtained.

    NowAdexecutes all queries and guessing the bitc, the following result is obtained

    From Eqs.(3) and (4), we obtain the following result.

    From Eqs.(6) and (7), we obtain the following result.

    Similarly, from Eqs.(5) and (8), we obtain the following result.

    Now multiplying Eq.(9) by “2” we obtain the following result.

    6.2 Formal Security Verification Using AVISPA

    We used AVISPA tool [38] to verify the proposed IIoT-CS scheme security towards known attacks.AVISPA gives the results by using the keywords SAFE, or UNSAFE, which denotes whether the protocol is secure or not secure against various attacks.We applied two backends of AVISPA simulation tool, namely:OFMC and CL-ATSe to verify the security of our scheme.The result show that the IIoT-CS scheme is secure against various attacks under the DY threat model as shown in Fig.3.

    6.3 Informal Security Analysis

    The following assumptions were taken into account for the informal security analysis.The secret values (b, Vs, Vi and Vj) are only known to the corresponding participating entity (KGC and IoT nodes) and the adversary has no knowledge about it.The encryption algorithm (ESK) is secure enough that an attacker cannot not decryptCand {Auth}.

    Figure 3:AVISPA simulation results for the proposed IIoT-CS scheme

    6.3.1 Confidentiality

    Confidentiality refers to the assurance that private information will be kept secret during transmission.In the start, theith-nodeandjth-nodeshare their public keys and identities in the form of plain text with each other because they are not required to be kept secret.Theith-node,then transmit the message {Ti, C, S, Z} to thejth-node.The time stampTiwhich discloses no information.The adversary cannot interpret the ciphertextCas it requires the secret session key SK which depends on the private random numberb.According to HECDLP, an adversary is unable to computebgivenZandD.Similarly,Adis unable to extract any knowledge from S because it depends on the private values (Viandb) ofith-node.The messages {Tj,Auth} sent by thejth-nodeto theith-nodealso reveals no information.Tjis the time stamp andAuthis a hash message in which an adversary cannot extract any information.As a result, the existing protocol successfully provides confidentiality features.

    6.3.2 Authentication

    To ensure secure communication between IoT nodes, they must authenticate each other at the start within each session and vice versa.

    ith-nodeauthentication:Thejth-nodecalculates the session key SK after obtaining the message{C, S, Z} fromith-node.Thejth-nodeverify the signatureS= Xi+(b+Vi).H(IDi||m||ni)of theith-nodeby using the equationS.D=β+ (Z+Ui)H(IDi||m||ni).If this equation hold then theith-nodeis successfully authenticated by thejth-node.Suppose an adversary imitates to be a legitimate node, in that scenario, it would need to generate a valid S.However,Sis based on the private values ofith-nodewhich are only known to theith-nodeso any adversary would not be able to produce the right value of S.

    jth-nodeauthentication:After receiving{Auth} from thejth-node, theith-nodecomputes{Auth′}.Theith-nodecheck ifAuth=Auth′, thenjth-nodeis successfully authenticated by theith-node.If an adversary pretends itself as a legitimate node, it must send the right message {Auth}.However,{Auth} is hashed message which is based on private key ofjth-node, making it difficult for an adversary to transmit the right message {Auth}.

    6.3.3 Non-Repudiation

    The value ofStransferred to thejth-nodeby theith-nodeis based on the private key ofithnode.Similarly, the message {Auth} sent by thejth-nodeto theith-nodeis based on the private key of thejth-node.If thejth-nodeverifiedith-nodesignature i.e., ifS.D=β+ (Z+Ui)H(IDi||m||ni)is hold, theith-nodewill not deny that it sent the message to thejth-node, and ifAuth=Auth′,thejth-nodewill not deny that it delivered the message to theith-node.

    6.3.4 Integrity

    The proposed scheme can verify that whether a cipher textCwas changed or not during the communication, by using the equationS.D=β+ (Z+Ui)H(IDi||m||ni).If an adversary modifiesC, then this equation will not hold, otherwise this equation will hold.Similarly, if an adversary modifies the message {Auth}, it can be quickly detected because it would not be the same as {Auth′}.In both cases, the authentication would not succeed, and the session would be terminated.Thus, integrity is ensured in the proposed scheme.

    6.3.5 Unforgeability

    In the proposed IIoT-CS scheme, ifAdtries to produce a legitimate signature, thenAdmust compute the equationS=Xi+(b+Vi).H(IDi||m||ni).For this,Adwould need the private key pair (Vi, Xi) of theith-node.To compute the private keys,Admust solve HECDP which is infeasible.Hence, the proposed IIoT-CS schemes provides security against unforgeability.

    6.3.6 Forward Secrecy

    In the proposed IIoT-CS scheme, the secret session key is renewed after every session completion process.The secret session key depends on the private valuesb,VjandXjof participating nodes, and it is infeasible for an adversary to find these private values due to HECDLP.Thus,the adversaryAdis not able to read and use the previous messages later.Hence, the proposed scheme ensures forward secrecy.

    6.3.7 Security from Replay Attack

    An adversary can obtain the previous messages {Wi, Yi}, {Wj, Yj}, {Ti, C, S, Z}, and {Tj,Auth} eavesdropping on the communication channel betweenith-nodeandjth-node.The adversary replays such messages to produce an invalid effect.In the proposed IIoT-CS scheme, the value of C depends on fresh nonce ni, the valueSdepends on the fresh private random numbers b andVi, the value ofZdepends on b, and the value ofAuthdepends on ni and private keyVj.This means that for every session the values ofC,S,Z, andAuthare updated.Therefore, the adversary in the next communication session is incapable to utilize the past messages.Thus, the proposed IIoT-CS scheme ensures security against replay attack.

    6.3.8 Security from Eavesdropping Attacks

    In the proposed IIoT-CS scheme, the messages are transmitted in plain text, hashed and cipher text format.The plain text messages contain no confidential information and provide no advantage to the adversary.Furthermore, all messages containing confidential information are always protected by using HECDLP, one-way hash function and encryption algorithm, rendering the retrieval of the confidential information computationally infeasible for an adversary.Therefore,the proposed IIoT-CS scheme prevents eavesdropping attacks.

    6.3.9 Security from Denial of Service(DoS)Attack

    In the proposed IIoT-CS scheme, the participating nodes first check the validity of the received timestamps.If the timestamps are not valid, then the messages are rejected.Furthermore,the information transmitted are complemented by an integrity checks in the form of signature and the encrypted message always contain the latest timestamp.Thus, the proposed scheme can identify incorrect messages and avoid DoS attacks by essentially terminating the session.

    6.3.10 Security Against Impersonation Attack

    In node impersonation attack, an adversary mimics the behavior of legitimate IoT nodes by eavesdropping on the communication channel.In the proposed IIoT-CS scheme, if theAdmimics the behavior of a valid sender node (ith-node).In doing so,Adproduces a message {Wa,Ya} and sends it to a valid receiver node (jth-node).Thejth-nodereplies the adversary with a message {Wj,Yj}.The adversaryA, when receiving {Wj, Yj}, generate the message {C′,S′,Z′} and send it to thejth-node.As the adversary is incapable to compute the private keys of a valid sender node,the message {C′,S′,Z′} transmitted by the adversary is incorrect.Thejth-node, upon obtaining this inaccurate message {C′,S′,Z′}, decryptC′to validate the signature, but sinceS′.D≠β+ (Z′+Ui).H(IDi||m||ni), thus the authentication fails.Furthermore, the adversaryAdis unable to mimics the behavior of the valid receiver (jth-node) because it is not feasible forAdto compute the private keyVjofjth-node, and thus is unable to correctly produce the message {Auth}, as a result the nodes finish the session.Thus, the proposed scheme ensures security against impersonation attack.

    6.3.11 Security from Man in the Middle(Mitm)Attack

    In MitM attack, an adversary attempts to modify the messages fromith-nodeto thejthnodeand vice versa.The adversary pretends itself as a valid participating entity and passes the updated messages to either node.The proposed scheme performs the mutual authentication using the messages {C,S,Z} and {Auth}.Adcan only spoof a valid participant if it can produce any of these messages correctly.However, according to HECDLP the retrieval of the private key is computationally not feasible.Thus, the proposed scheme can easily withstand MitM attacks.

    6.3.12 Security from Key Compromise Attack

    The private keyVjand secret valuebare used to obtain the secret session keySK, the adversary is incapable to get the private values due to HECDLP, as a result the adversary can’t generate the secret session key and hence, the proposed IIoT-CS scheme can ensure security against key compromise attack.

    7 Comparative Analysis

    This section presents the comparative analysis of computational cost, communication overhead and security features.

    7.1 Computational Cost

    The computational overhead depends on the execution time of different cryptographic operations involved in an authentication scheme.Garg et al.[23] show that the time required to execute elliptic curve scalar multiplication (ECSM) and hash-to-point (HtP) operations is 0.986 and 14.293 ms, respectively, using MIRACL [39].The execution time of Hyperelliptic Curve Divisor Multiplication (HECDM) is considered as 0.48 ms [40].The time consumption of cryptographic operations is very small compared to the time consumption of ECSM and HECDM and therefore can be ignored.In the proposed scheme, each sender node (ith-node) and the receiver node (jthnode) performs 3 HECDM operations.Therefore, the time consumed by the sender and receiver node together is 6 × 0.48 = 2.88 ms.The KGC performs 3 HECDM operations for at least 2 IoT nodes in the system to authenticate each other.Therefore, the time consumed by the KGC is 3× 0.48 = 1.44 ms.The total time consumed by the KGC and nodes to for mutual authentication is 2.88 ms + 1.44 ms = 4.32 ms.The comparison of the computational cost of IIoT-CS scheme with the existing schemes [15,23,41] is shown in Tab.2 and Fig.4a.It is clear from the results that IIoT-CS scheme is less expensive in computational cost as compared to the existing schemes.

    Figure 4:Comparative analysis of (a) computational cost and (b) communication overhead

    Table 2:Computational cost analysis

    7.2 Communication Overhead

    Communication overhead can be determined from the number of bits sent and received by the participating IoT nodes in the authentication phase.We assumed SHA-256 as our hash function, which generates 256-bits output and 128-bit AES as our encryption algorithm which generates 128-bits ciphertext.In the proposed IIoT-CS scheme, an IoT node is required to send two messages {Wi,Yi} and {Ti,C,S,Z} and receive two messages {Wj,Yj} and {Tj,Auth}.The communication overhead of an IoT node to send the message {Wi,Yi} and {Ti,C,S,Z} is 160+ 80 + 80 + 128 + 256 + 80 = 784 bits.Whereas the communication overhead of an IoT node to receive the messages{Wj,Yj} and {Tj,Auth} is 160 + 80 + 80 + 128 = 448 bits.The overall communication overhead of an IoT node is 784 + 448 = 1232 bits.The comparison of the communication overhead of IIoT-CS scheme with the existing schemes [15,23,41] is shown in Tab.3 and Fig.4b.It is clear from the results that IIoT-CS scheme incurs the lowest communication overhead as compared to the existing schemes.

    Table 3:Communication overhead analysis

    7.3 Comparison of Security Attributes

    We compare the proposed scheme’s security functionality with existing state-of-the-art [15,23,41].The proposed scheme offers mutual authentication, non-repudiation, unforgeability, forward secrecy, resist, replay, eavesdropping, DoS, impersonation, MitM, and key compromise attacks as shown in the Tab.4.It is obvious that the proposed IIoT-CS scheme is by far the most secure scheme amongst the existing protocols.

    Table 4:Comparison of the security features

    8 Conclusion

    In this study, we used HEC based CS scheme in the developing of an efficient and secure authentication mechanism for IIoT environment.The proposed scheme uses 80-bit HEC rather than 160-bit ECC for security and performance.We apply both formal and informal security analysis to evaluate the proposed scheme’s security.We performed the formal security analysis by using AVISPA tool and RoR model, which affirms the security of the proposed scheme.It has been shown in the analysis that the proposed scheme offers confidentiality, mutual authentication,integrity, and non-repudiation and is also robust to a range of security attacks such as replay,eavesdropping, impersonation, MitM, DoS, and key compromise attacks etc.Our proposed scheme is relatively less expensive compared to the current state-of-the-art.Our proposed scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead, respectively, compared to the most recent protocol.Thus, our proposed scheme is a viable option for IoT devices with inadequate resources.

    9 Future Work

    We want to incorporate and evaluate the proposed IIoT-CS scheme in a real-world IIoT environment in the future.This will make more improvements to the proposed scheme and will encourage us to evaluate its security and efficiency more accurately.

    Funding Statement:This work is supported by the University of Malaya IIRG Grant (IIRG008A-19IISSN), Ministry of Education FRGS Grant (FP055-2019A).This work was also supported by Grant System of University of Zilina No.1/2020.(Project No.7962) and partially supported by the Slovak Grant Agency for Science (VEGA) under Grant Number 1/0157/21.The authors are grateful to the Taif University Researchers Supporting Project (Number TURSP-2020/36), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品偷伦视频观看了| 亚洲av片天天在线观看| 精品熟女少妇八av免费久了| 欧美日韩福利视频一区二区| 日韩一卡2卡3卡4卡2021年| 一边摸一边抽搐一进一小说| 午夜老司机福利片| 午夜精品久久久久久毛片777| 精品国产一区二区久久| 99精品久久久久人妻精品| 性少妇av在线| √禁漫天堂资源中文www| 国产av一区在线观看免费| 91大片在线观看| 不卡av一区二区三区| 热re99久久精品国产66热6| 91字幕亚洲| 久久国产乱子伦精品免费另类| 国产亚洲精品第一综合不卡| 亚洲片人在线观看| 宅男免费午夜| 91av网站免费观看| 高清毛片免费观看视频网站 | 天天添夜夜摸| 亚洲精品中文字幕一二三四区| 99在线视频只有这里精品首页| 国产精品亚洲av一区麻豆| 国内久久婷婷六月综合欲色啪| 国产成人欧美在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品国产色婷婷电影| 亚洲色图综合在线观看| 亚洲自偷自拍图片 自拍| 变态另类成人亚洲欧美熟女 | 国产精品影院久久| 日本 av在线| av有码第一页| 啪啪无遮挡十八禁网站| 国产熟女午夜一区二区三区| 国产单亲对白刺激| 淫妇啪啪啪对白视频| 久久 成人 亚洲| 国产精品99久久99久久久不卡| 国产精品香港三级国产av潘金莲| 18美女黄网站色大片免费观看| 美女扒开内裤让男人捅视频| 欧美成人午夜精品| 亚洲久久久国产精品| 在线观看免费日韩欧美大片| 中文字幕av电影在线播放| 亚洲成人久久性| 欧美日本中文国产一区发布| 热99re8久久精品国产| 一区二区三区国产精品乱码| 新久久久久国产一级毛片| 亚洲狠狠婷婷综合久久图片| 青草久久国产| 精品久久蜜臀av无| 夫妻午夜视频| 国产精品 欧美亚洲| 亚洲情色 制服丝袜| 亚洲精品国产色婷婷电影| 99久久99久久久精品蜜桃| 水蜜桃什么品种好| 黑人巨大精品欧美一区二区蜜桃| 黄色视频,在线免费观看| 人成视频在线观看免费观看| 麻豆国产av国片精品| 狂野欧美激情性xxxx| 黄色a级毛片大全视频| a级毛片黄视频| 男人舔女人的私密视频| 久久精品aⅴ一区二区三区四区| 91麻豆精品激情在线观看国产 | 男男h啪啪无遮挡| 999久久久国产精品视频| 国产黄a三级三级三级人| tocl精华| 日韩大尺度精品在线看网址 | 成人免费观看视频高清| 国产单亲对白刺激| 亚洲欧美激情在线| 国产精品一区二区三区四区久久 | 国产精品九九99| av福利片在线| 一本综合久久免费| 一区福利在线观看| 国产色视频综合| 夜夜躁狠狠躁天天躁| 欧美亚洲日本最大视频资源| av在线天堂中文字幕 | 国产精品影院久久| 夜夜爽天天搞| 日韩人妻精品一区2区三区| 亚洲久久久国产精品| 午夜精品在线福利| 精品卡一卡二卡四卡免费| 新久久久久国产一级毛片| 国产伦人伦偷精品视频| 久久午夜综合久久蜜桃| 每晚都被弄得嗷嗷叫到高潮| 成人免费观看视频高清| 成人亚洲精品av一区二区 | 麻豆国产av国片精品| 国产1区2区3区精品| 日韩精品青青久久久久久| 久久久久久大精品| www.精华液| 亚洲人成网站在线播放欧美日韩| 在线天堂中文资源库| bbb黄色大片| 精品久久久精品久久久| 午夜福利欧美成人| 欧美乱妇无乱码| 中文字幕av电影在线播放| 国产av在哪里看| 亚洲欧美一区二区三区黑人| 欧美久久黑人一区二区| 黑人巨大精品欧美一区二区蜜桃| 中文字幕人妻丝袜制服| 久久人人爽av亚洲精品天堂| 国产亚洲精品第一综合不卡| a在线观看视频网站| xxxhd国产人妻xxx| 日韩成人在线观看一区二区三区| 桃红色精品国产亚洲av| 久久精品国产综合久久久| 亚洲国产精品999在线| 亚洲国产精品一区二区三区在线| 伦理电影免费视频| 亚洲全国av大片| 亚洲九九香蕉| 精品久久久久久成人av| 三上悠亚av全集在线观看| 国产三级黄色录像| 精品欧美一区二区三区在线| 动漫黄色视频在线观看| 少妇裸体淫交视频免费看高清 | 搡老岳熟女国产| 日韩人妻精品一区2区三区| 国产精品一区二区免费欧美| 日韩欧美国产一区二区入口| 久久久久国内视频| 色播在线永久视频| 一进一出好大好爽视频| 性少妇av在线| 久久精品91蜜桃| 欧美日韩中文字幕国产精品一区二区三区 | 神马国产精品三级电影在线观看 | 久久精品91蜜桃| 国产免费现黄频在线看| 高清av免费在线| 在线观看66精品国产| 久久久水蜜桃国产精品网| 精品久久久久久电影网| 九色亚洲精品在线播放| 欧美日韩中文字幕国产精品一区二区三区 | 欧美色视频一区免费| 亚洲国产欧美网| 国产真人三级小视频在线观看| 国产黄色免费在线视频| 欧美乱码精品一区二区三区| 亚洲成人国产一区在线观看| 欧美丝袜亚洲另类 | 国产精品国产av在线观看| 一级片免费观看大全| 久久青草综合色| 最好的美女福利视频网| 亚洲精华国产精华精| 免费在线观看日本一区| 午夜免费成人在线视频| 18禁裸乳无遮挡免费网站照片 | 国产亚洲欧美98| 777久久人妻少妇嫩草av网站| 国产精品一区二区免费欧美| 乱人伦中国视频| cao死你这个sao货| 亚洲色图综合在线观看| 两个人免费观看高清视频| 亚洲色图 男人天堂 中文字幕| 欧美日韩国产mv在线观看视频| 国产主播在线观看一区二区| 97超级碰碰碰精品色视频在线观看| 欧美不卡视频在线免费观看 | 成人永久免费在线观看视频| 亚洲成av片中文字幕在线观看| 性少妇av在线| 亚洲一区二区三区色噜噜 | 黄色毛片三级朝国网站| 精品国产美女av久久久久小说| 国产欧美日韩综合在线一区二区| 亚洲欧美精品综合一区二区三区| 国内毛片毛片毛片毛片毛片| 成人18禁高潮啪啪吃奶动态图| 亚洲 国产 在线| 日韩av在线大香蕉| 丝袜美足系列| 久久天堂一区二区三区四区| 亚洲欧美精品综合久久99| 精品一区二区三区视频在线观看免费 | 国产成人av教育| 色老头精品视频在线观看| 天堂动漫精品| 精品久久久久久成人av| 亚洲全国av大片| 老鸭窝网址在线观看| 国产99久久九九免费精品| 亚洲成人免费av在线播放| 1024视频免费在线观看| 高清欧美精品videossex| 日韩欧美三级三区| 中出人妻视频一区二区| 韩国精品一区二区三区| 这个男人来自地球电影免费观看| 不卡av一区二区三区| 亚洲av成人av| 国产亚洲欧美精品永久| 国产av在哪里看| 嫁个100分男人电影在线观看| netflix在线观看网站| 欧美午夜高清在线| 精品午夜福利视频在线观看一区| 韩国精品一区二区三区| 后天国语完整版免费观看| 国产精品乱码一区二三区的特点 | 国产熟女午夜一区二区三区| 女同久久另类99精品国产91| 欧美日韩乱码在线| 精品高清国产在线一区| 国产欧美日韩一区二区三| 免费不卡黄色视频| 丰满饥渴人妻一区二区三| 欧美激情高清一区二区三区| 91精品国产国语对白视频| 日韩精品免费视频一区二区三区| 十分钟在线观看高清视频www| 天堂俺去俺来也www色官网| 欧美日韩乱码在线| 午夜日韩欧美国产| 黄色视频不卡| 久久人妻av系列| 成人三级黄色视频| 99久久精品国产亚洲精品| 丰满饥渴人妻一区二区三| 天堂中文最新版在线下载| 久久青草综合色| 一区二区日韩欧美中文字幕| 国产单亲对白刺激| 免费看a级黄色片| 成人手机av| 又黄又粗又硬又大视频| 亚洲av电影在线进入| 制服人妻中文乱码| 午夜a级毛片| 亚洲人成伊人成综合网2020| 久久久久久人人人人人| 大香蕉久久成人网| 在线观看66精品国产| 欧美激情高清一区二区三区| 亚洲午夜理论影院| 中文字幕人妻丝袜一区二区| 欧美大码av| 丁香欧美五月| 亚洲免费av在线视频| 身体一侧抽搐| 中文欧美无线码| 欧美日韩瑟瑟在线播放| av在线天堂中文字幕 | 国产一卡二卡三卡精品| 亚洲欧美精品综合久久99| 自线自在国产av| 黄片大片在线免费观看| 亚洲欧美日韩另类电影网站| 久久人妻福利社区极品人妻图片| 色综合婷婷激情| 亚洲成av片中文字幕在线观看| 精品久久久久久成人av| 欧美在线黄色| 少妇的丰满在线观看| 18禁观看日本| 欧美成狂野欧美在线观看| 亚洲av五月六月丁香网| 日日干狠狠操夜夜爽| 在线国产一区二区在线| 久久久久久久午夜电影 | 久久中文字幕人妻熟女| 亚洲午夜理论影院| 亚洲av电影在线进入| 人人妻人人添人人爽欧美一区卜| 一区二区日韩欧美中文字幕| 熟女少妇亚洲综合色aaa.| 最好的美女福利视频网| 色婷婷av一区二区三区视频| www.自偷自拍.com| 99精品久久久久人妻精品| 亚洲三区欧美一区| 又大又爽又粗| 女同久久另类99精品国产91| 在线观看午夜福利视频| 变态另类成人亚洲欧美熟女 | 亚洲男人的天堂狠狠| 亚洲成人免费av在线播放| 国产欧美日韩综合在线一区二区| 老熟妇仑乱视频hdxx| 亚洲人成电影观看| 在线观看免费视频日本深夜| 久久久久国内视频| 一边摸一边做爽爽视频免费| 国产精品久久视频播放| 久热爱精品视频在线9| 日日干狠狠操夜夜爽| 亚洲欧美一区二区三区久久| 免费高清在线观看日韩| 黑人操中国人逼视频| 日本黄色日本黄色录像| 一级毛片女人18水好多| 十八禁网站免费在线| 伦理电影免费视频| 亚洲视频免费观看视频| 级片在线观看| 黄片小视频在线播放| 欧洲精品卡2卡3卡4卡5卡区| 一区福利在线观看| 法律面前人人平等表现在哪些方面| 美女大奶头视频| 两人在一起打扑克的视频| 精品电影一区二区在线| 国产成人av教育| 欧美一区二区精品小视频在线| 国产精品成人在线| 久久精品91蜜桃| 99riav亚洲国产免费| 曰老女人黄片| 夜夜爽天天搞| 久热爱精品视频在线9| av网站免费在线观看视频| 亚洲va日本ⅴa欧美va伊人久久| 天天添夜夜摸| 精品卡一卡二卡四卡免费| 国产精品日韩av在线免费观看 | 久久久国产成人精品二区 | 欧美中文综合在线视频| 欧美黑人精品巨大| 黄色丝袜av网址大全| 久久精品国产亚洲av香蕉五月| 久久草成人影院| 欧美日本亚洲视频在线播放| 亚洲成a人片在线一区二区| 99久久人妻综合| 无人区码免费观看不卡| 日本五十路高清| 精品无人区乱码1区二区| 精品电影一区二区在线| x7x7x7水蜜桃| 村上凉子中文字幕在线| 国产成人欧美在线观看| 精品国产一区二区三区四区第35| 91麻豆av在线| 国产高清激情床上av| 亚洲精品国产一区二区精华液| 啦啦啦免费观看视频1| 日本vs欧美在线观看视频| 在线观看66精品国产| 久久中文字幕一级| 一边摸一边抽搐一进一小说| 88av欧美| 性欧美人与动物交配| 水蜜桃什么品种好| 国产精品爽爽va在线观看网站 | 好男人电影高清在线观看| 一个人观看的视频www高清免费观看 | 涩涩av久久男人的天堂| a级毛片在线看网站| 欧美乱码精品一区二区三区| 91精品三级在线观看| 男女高潮啪啪啪动态图| 亚洲全国av大片| 在线观看午夜福利视频| 在线观看舔阴道视频| 80岁老熟妇乱子伦牲交| 免费在线观看亚洲国产| 天堂俺去俺来也www色官网| 88av欧美| 在线av久久热| 丰满饥渴人妻一区二区三| 一夜夜www| 久久久久久久久免费视频了| 欧美在线黄色| 亚洲一区高清亚洲精品| 自线自在国产av| 久9热在线精品视频| 侵犯人妻中文字幕一二三四区| 欧美激情高清一区二区三区| 久久人人爽av亚洲精品天堂| 国产主播在线观看一区二区| 性少妇av在线| 欧美亚洲日本最大视频资源| 最近最新中文字幕大全免费视频| 欧美最黄视频在线播放免费 | 99国产精品一区二区蜜桃av| 99精品在免费线老司机午夜| 亚洲成人精品中文字幕电影 | 中文亚洲av片在线观看爽| 国产野战对白在线观看| 国产一区二区在线av高清观看| 国产日韩一区二区三区精品不卡| 神马国产精品三级电影在线观看 | 久久影院123| 女人高潮潮喷娇喘18禁视频| 免费在线观看黄色视频的| 一边摸一边做爽爽视频免费| 啪啪无遮挡十八禁网站| 亚洲欧美一区二区三区久久| 免费高清在线观看日韩| 在线国产一区二区在线| 国产一区二区在线av高清观看| 国产高清videossex| 无遮挡黄片免费观看| a级毛片在线看网站| 色播在线永久视频| 啦啦啦 在线观看视频| 国产在线精品亚洲第一网站| 久久精品国产清高在天天线| 狂野欧美激情性xxxx| 嫩草影视91久久| 热99re8久久精品国产| 不卡一级毛片| 夜夜爽天天搞| 美国免费a级毛片| 亚洲av成人av| 91大片在线观看| 99久久久亚洲精品蜜臀av| 香蕉国产在线看| 美女国产高潮福利片在线看| 亚洲九九香蕉| 成人精品一区二区免费| 国产精品一区二区三区四区久久 | 国产无遮挡羞羞视频在线观看| 中文字幕人妻丝袜制服| av电影中文网址| 国产一区二区三区在线臀色熟女 | 在线天堂中文资源库| 国产极品粉嫩免费观看在线| 亚洲自偷自拍图片 自拍| 国产亚洲欧美在线一区二区| 男女高潮啪啪啪动态图| 精品日产1卡2卡| 99国产极品粉嫩在线观看| 免费看十八禁软件| 欧美不卡视频在线免费观看 | 亚洲色图综合在线观看| 国内毛片毛片毛片毛片毛片| 亚洲欧美精品综合一区二区三区| 久9热在线精品视频| 国产av在哪里看| 国产亚洲欧美精品永久| 美女高潮喷水抽搐中文字幕| 9191精品国产免费久久| 啪啪无遮挡十八禁网站| 老司机靠b影院| 亚洲欧美激情综合另类| 男女做爰动态图高潮gif福利片 | 欧美日韩瑟瑟在线播放| 国产精华一区二区三区| 日本五十路高清| 美女扒开内裤让男人捅视频| www.999成人在线观看| 黑人操中国人逼视频| 免费搜索国产男女视频| 老汉色∧v一级毛片| 老司机午夜十八禁免费视频| 欧美黑人精品巨大| 国产激情欧美一区二区| 一夜夜www| 亚洲熟女毛片儿| 99久久国产精品久久久| 搡老岳熟女国产| 国产aⅴ精品一区二区三区波| 五月开心婷婷网| 国产精品乱码一区二三区的特点 | 国产成人av激情在线播放| 亚洲人成77777在线视频| 757午夜福利合集在线观看| 国产区一区二久久| 午夜免费观看网址| 在线国产一区二区在线| 电影成人av| 亚洲人成网站在线播放欧美日韩| 国产精品秋霞免费鲁丝片| 一级a爱片免费观看的视频| 久久午夜综合久久蜜桃| 日韩视频一区二区在线观看| 亚洲专区国产一区二区| 国产成人av教育| 国产不卡一卡二| 国产在线精品亚洲第一网站| 国产有黄有色有爽视频| 日韩中文字幕欧美一区二区| 很黄的视频免费| 亚洲片人在线观看| 免费一级毛片在线播放高清视频 | 欧美另类亚洲清纯唯美| 一二三四社区在线视频社区8| 国产伦一二天堂av在线观看| 18禁裸乳无遮挡免费网站照片 | 国产成+人综合+亚洲专区| 18美女黄网站色大片免费观看| 亚洲全国av大片| 校园春色视频在线观看| 99精品欧美一区二区三区四区| 在线观看舔阴道视频| 视频在线观看一区二区三区| 99久久人妻综合| 黑人猛操日本美女一级片| 国产精品日韩av在线免费观看 | 婷婷六月久久综合丁香| 精品高清国产在线一区| 色精品久久人妻99蜜桃| 久久欧美精品欧美久久欧美| 成年女人毛片免费观看观看9| 欧美激情 高清一区二区三区| 99久久99久久久精品蜜桃| 1024视频免费在线观看| 亚洲精品在线观看二区| 国产人伦9x9x在线观看| 99国产综合亚洲精品| 女同久久另类99精品国产91| 免费在线观看亚洲国产| 18禁国产床啪视频网站| av电影中文网址| 91国产中文字幕| 精品久久久久久,| 91老司机精品| 亚洲av第一区精品v没综合| 亚洲 欧美 日韩 在线 免费| 在线av久久热| www.999成人在线观看| 免费日韩欧美在线观看| 亚洲人成电影观看| 亚洲欧美日韩无卡精品| 国内久久婷婷六月综合欲色啪| 久久久国产精品麻豆| 老司机在亚洲福利影院| 国产精品秋霞免费鲁丝片| 少妇被粗大的猛进出69影院| 免费观看精品视频网站| 精品福利永久在线观看| 国产深夜福利视频在线观看| 制服人妻中文乱码| 久久人妻熟女aⅴ| 亚洲精品国产区一区二| av网站在线播放免费| 国产黄a三级三级三级人| 欧美日韩精品网址| 亚洲人成伊人成综合网2020| 久久精品国产清高在天天线| 国产成+人综合+亚洲专区| 欧美乱妇无乱码| 国产又爽黄色视频| 免费一级毛片在线播放高清视频 | 久久影院123| av在线天堂中文字幕 | 人成视频在线观看免费观看| 欧美+亚洲+日韩+国产| 级片在线观看| 免费女性裸体啪啪无遮挡网站| 亚洲精品国产区一区二| 亚洲avbb在线观看| 精品久久久久久久毛片微露脸| 中文亚洲av片在线观看爽| 性欧美人与动物交配| 亚洲精品美女久久av网站| 侵犯人妻中文字幕一二三四区| 桃红色精品国产亚洲av| 日本欧美视频一区| 免费一级毛片在线播放高清视频 | 黑人欧美特级aaaaaa片| 天天添夜夜摸| 国产无遮挡羞羞视频在线观看| 成熟少妇高潮喷水视频| 1024香蕉在线观看| 不卡av一区二区三区| 操出白浆在线播放| 国产91精品成人一区二区三区| 国产精品久久久久成人av| 在线观看日韩欧美| 少妇被粗大的猛进出69影院| 一本综合久久免费| 99精品久久久久人妻精品| 国产精品久久久人人做人人爽| 成人永久免费在线观看视频| 69精品国产乱码久久久| 丰满的人妻完整版| 老司机深夜福利视频在线观看| 亚洲人成电影免费在线| 亚洲激情在线av| 在线十欧美十亚洲十日本专区| 一区二区三区精品91| 午夜福利欧美成人| 久久精品国产综合久久久| 波多野结衣一区麻豆| 黄色女人牲交| 超碰成人久久| 午夜老司机福利片| 日本精品一区二区三区蜜桃| 国产乱人伦免费视频| 国产97色在线日韩免费| 黄色视频不卡| 中文亚洲av片在线观看爽| 成熟少妇高潮喷水视频| 亚洲性夜色夜夜综合| 成人av一区二区三区在线看| 高清在线国产一区| а√天堂www在线а√下载| 亚洲全国av大片|