• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    2019-02-28 07:09:04LiangKouYiqiShiLiguoZhangDuoLiuandQingYang
    Computers Materials&Continua 2019年2期

    Liang Kou, Yiqi Shi, Liguo Zhang, Duo Liu, and Qing Yang

    Abstract: With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak computing power, limited power supply, and open communication links. We proposed a novel lightweight authentication protocol based on password, smart card and biometric identification that achieves mutual authentication among User, GWN and sensor node. Biometric identification can increase the nonrepudiation feature that increases security. After security analysis and logical proof, the proposed protocol is proven to have a higher reliability and practicality.

    Keywords: Authentication, biometrics, smart card, multi-factor.

    1 Introduction

    Nowadays, IoT (Internet of Things) is gaining widespread attention from governments,enterprises and academics for several reasons. IoT First of all, the IoT is an important part of the new generation of information technology and plays a catalytic role in social development. Second, the application of the IoT will have enormous economic benefits.According to the estimation of relevant experts, the output value of the IoT will reach one trillion level. The Internet of things is mainly composed of perception layer, transport layer and network layer [Sathishkumar and Patel (2014)]. In this paper, we mainly consider the protection of perception data and regard the wireless sensor networks(WSNs) as the perception layer of the IoT. WSNs are the network that consists of large number of sensor nodes in a self-organized manner. The sensor nodes have the following characteristics, such as limited battery capacity, simple CPU, small storage and communication capability which cause the sensor nodes to suffering from various attacks in hostile environment [Lin, Zhu and Zheng (2017); Wu, Yan, Wang et al. (2017)].

    There are usually two methods for users to access the perceptual data collected by sensor nodes. One is that the user sends query instructions through the WSNs base station or gateway node, and then gets the perceptual data by the corresponding node. The security of this method is guaranteed by the security strategy of WSNs itself and it suffers from large time delay [Das, Sharma and Chatterjee (2012); Qazi (2004)]. The other is that user obtains the real-time data directly from the sensor nodes independent of base station or gateway node. This method has high real-time performance and is suitable for all kinds of real-time applications, but this method needs to consider the legitimacy of the user's identity in particular.

    Identity authentication plays a very important role in ensuring that only legitimate users can access resources or services, and key agreement can guarantee that only legitimate communicators can obtain correct communication content. Due to the poor computing power of sensor nodes, traditional security protocols that require large computing power cannot be directly applied in wireless sensor networks. Therefore a lightweight security protocol is needed to secure the WSNs.

    The user authentication protocols mainly compose of two-factor user authentication(based on the password and the smart card) and three-factor user authentication (based on two-factor authentication combined with the biometric factor). Practice has proved that three factor biometric-based user authentication is more secure than two-factor user authentication. Biometric identification has the following advantages in the field of user authentication, so it attracts much attention from experts and scholars [Qazi (2004)].

    ● Biometric identification will not be lost or forgotten;

    ● Biometric identification is not easy to be replicated;

    ● Biometric identification is not easy to be forged or distributed;

    ● Biometric identification is not easy to be guessed.

    At present, security solutions to deal with hostile attack in WSNs mostly focus on key management, authentication and secure routing [Balakrishnan and Rino (2016); Amin and Biswas (2015)]. Two-factor authentication [Das, Sharma and Chatterjee (2012); Fan,Ping and Fu (2010); He, Gao and Chan (2010); Khurram and Khaled (2010); Lee, Li and Chen (2011)] combining password and smart card is a common solution for researchers,but two-factor authentication is still not reliable because smart cards are easy to lose and the password is also easily guessed by an attacker. He et al. [He, Kumar and Chilamkurti(2014)] devised a mutual authentication and key agreement scheme based on temporal credential, which can effectively deal with the simulated attacks on user or sensor node,offline password guessing attacks and user anonymous attacks. Their scheme can be put into practical applications in WSNs. However, this solution cannot satisfactorily certify after tracking attacks, insider attacks and identity guessing attacks. In order to solve the above problem, Jiang et al. [Jiang, Ma and Lu (2015)] proposed a linkless enhanced authentication strategy. They took full account of the sensor node's burden and reduced the energy consumption while defending against a series of security threats. Later, They designed a privacy-aware two-factor authentication scheme based on the research results of elliptic curve cryptography (ECC), which took into account the efficiency of WSNs and the safety features in a variety of environments [Jiang, Kumar and Ma (2016)]. Amin et al. [Amin and Biswas (2015)] improved the sensor network architecture and designed a low-energy user authentication and key agreement scheme to achieve two-way authentication, dynamic addition of nodes and password updates, which has improved the session key protection. Choi et al. [Choi, Lee and Kim (2014)] uses a heuristic analysis method and an ECC to improve a user authentication protocol that can reduce the energy consumption of WSNs and provide mutual authentication and key agreement between users and sensors. It can also resist session key attacks and sensor energy exhaustion attacks. In Sahingoz [Sahingoz (2013)], the author presented a key management framework for distributed WSNs that share the keys between sensor nodes and their neighbors. In addition, they used UAV as a management center of asymmetric key to achieve a multi-level dynamic key management. Three-factor user authentication based on biometric [Park and Park (2016)] in the WSNs shows the superior to traditional twofactor user authentication schemes. In this paper, we provide a new user authentication protocol for WSNs using smart card combining with biometric identification. The proposed authentication protocol should achieve these goals: (1) mutual authentication between the user and the sensor node; (2) anonymity: the attacker cannot get the user's identity; (3) session key generation: after the authentication procedure, a session key should be generate shared by the user and the sensor node; (4) GWN does not store the registered user's password and biometric template; (5) attack resistance: the protocol should be robust against a variety of attacks; (6) password update offline. The proposed protocol is lightweight and superior than the exiting protocols on the computational complexity. The security of the proposed protocol is proved by BAN-logic.

    The remainder of the paper is organized as follows. In Section 2, we present the related work of user authentication. In Section 3, we review the Althobaiti's protocol and analyze the security vulnerability of Althobaiti’s protocol. In Section 4, we describe our proposed new user authentication protocol for WSNs. In Section 5, we perform the security analysis of our scheme by BAN-logic and compare the performance with the existing protocols. In Section 6, we conclude our research.

    2 Preliminaries

    2.1 Attacker threat model

    In order to conduct security analysis of the Althobaiti’s protocol and our proposed protocol, we make use of the Dolev-Yao threat model [Ramanujam, Sundararajan and Suresh (2014)] and its improved model [Kim, Lee and Jeon (2014)]. In the unsecured open communications, the attacker has the following abilities:

    ● An attacker can gain all the messages transmitted over a public channel;

    ● An attacker can impersonate other communication entities to send messages to users;

    ● An attacker cannot get correct random number;

    ● An attacker cannot decrypt the message without the correct key;

    ● An attacker cannot crack the encryption algorithm;

    ● Once an attacker steals the user’s smart card, he can get all the information stored in the card;

    ● The ID and password of the user are usually low-entropy;

    ● An attacker cannot crack the encryption algorithm;

    ● The gateway node cannot be compromised.

    2.2 Fuzzy extractor

    Due to the fact that various of noises can lead to the failure of the biometric information acquisition, a fuzzy extractor method [Dodis and Reyzin (2004)] is proposed to extract the correct data with a given error tolerance. A fuzzy extractor method mainly contains two functions:Gen(·)and Rep(·)( )(R,P)BIO

    Gen =

    Rep( B IO')=RifBIO is similar to BIO'within a predefined threshold.

    The function Genmaps the input biometric information to a secret string R∈{0,1}land auxiliary informationP. The functionRep can reproduce theRwith the auxiliary informationPandBIO'which is similar toBIOin some degree.

    2.3 Notations

    The notations used throughout this paper are described in Tab. 1.

    Table 1: Notations and parameters

    3 Review of Althobaiti’s protocol

    In this section, we review Althobaiti et al.’ user authentication protocol [Moreover and Section (2013)]. The notations used in the paper are listed in Tab. 1. Althobaiti’s protocol takes advantage of the biometric identification to enhance security and it includes three processes: registration phase, login phase and authentication phase.

    3.1 Registration phase

    When the new user Uiwants to access the perceptual data collected by the sensor node Sj, he needs to register to theGWN firstly. The Registration Phase of user Uiincludes the following procedures:

    ● TheGWN selects and saves a random key ekifor the new user Ui;

    ● The user Uiinputs his identity identification IDiand biometric information BIOi.Then computes BE = h( Bi) ⊕ekiand storesBE in the device of Ui;

    ● TheGWN calculates Fi=h(IDi⊕X), and send the message {I Di,Fi}to the Uivia secure channel;

    ● The Uistores the data {IDi,Fi,h(eki),BE}.

    3.2 Login phase

    The login phase of user Uiincludes the following procedures:

    ● The user Uiinputs IDiand BIOiand calculates N=h(Bi),eki'= BE⊕h(Bi);

    ●Uicalculates h (e ki')and verifies if h( e ki')= h(e ki). If yes,Uisends the login request message{I Di,request}toGWN. If no, it terminates the operation.

    3.3 Authentication phase

    The authentication phase realizes mutual authentication between user Uiand sensor node Sj. A detailed description of this phase is as follows:

    ● AfterGWN receives the message {I Di,request},GWNsends a authentication request{R}whereR selected randomly to Uias the login response. After Uireceives{R},Uiperforms the encryption {R ,T1}→ Eeki{R ,T1}based on the key eki, where T1represents the timestamp of Ui.Uisends the authentication request message Eeki{R ,T1}toGWN via public channel.

    ●GWN receives the message Eeki{R ,T1}at T2and decrypts the message to acquire the Deki{R,T1}according to eki. ThenGWN verifies if≤ ΔT. If no, it terminates the operation. If yes, sensor nodeSjresponses to Ui.

    ●GWN calculates

    where,T3represents the current timestamp ofGWN.GWN sends the message{I Di,Yi,T3}via public channel.

    ●Sjreceives the message {I Di,Yi,T3}at T4.Sjverifies if≤ ΔT. If no, it terminates the operation. If yes, it calculates the following equations:

    ●Uireceives the message {L ,T5}at T6and verifies if≤ ΔT. If no,Uiterminates the operation. If yes,Uicomputes the following equations:

    4 Security analysis of Althobaiti’s protocol

    Althobaiti’s protocol is a typical light-weight user authentication protocol based on biometric identification. It reduces computational complexity effectively because it only applies hash function, XOR operation, concatenation operation and symmetric encryption without complex asymmetric encryption. It can resist attacks such as stolen smart card attack and stolen verifier attack. However, Althobaiti’s protocol is only based on biometric identification that has some Security Flaws. We utilize the Dolev-Yao attacker expansion model to analyze the security flaws existing in the Althobaiti’s protocol.

    4.1 Node compromise attack

    Assume that an attackerA first captures a sensor node Sj, then obtains secret keyX.The attackerA intercepts messages {IDi,Yi,T3}and {L,T5}thenAcalculates the following formulas:

    A can may get the correct value Viby constantly trying different T5, where Viis the session key shared byUiand Sj.Αcan steal the session key through the following steps:

    Step two:A intercepts messages {IDi,Yi' ,T3'}and {L',T5'}and obtains the parametersX,IDiand T5', then calculates Vi'=h(), soA acquires the session key between Uiand Sj. WhenAsuccessfully compromises a node, he can obtain session keys for all nodes. So this protocol cannot resist the node compromise attack.

    4.2GWNimpersonation attack

    We can prove that an attackerA can impersonate theGWNto authenticate sensor node.The detail steps are as follows.

    Step one:Acaptures the sensor node, gets the secret keyX, and intercepts the message{}in the authentication phase.

    Step two:Acalculates the follow formulas:

    where,ID'jrepresents theID of sensor node Sj'queried by Ui,T3'represents the current timestamp ofA.Asends the message {}to Sj'via the public channel.Step three: AfterSj'receives the message {}, he verifies the freshness of T3'. If it fails to meet the requirement, the operation is terminated. ElseSj'calculates the following formulas:

    where,T5'represents the current timestamp of Sj' .Sj'sends the message {L',T5'}to Ui.Because the attacker can calculate the session key Vi'through X,IDiand T5', the protocol cannot resist theGWN impersonation attack.

    4.3 Man-in-the-middle attack

    An attacker can implement the Man-in-the-middle attack through the following processes:Step one:A captures node Sj, obtains the secret keyX , and intercepts the message{IDi,Yi,T3}.

    Step two:A calculates the following equations:

    Step three: After Sjreceives message {}, it verifies the freshness of the,and computes the following equations:

    Step four:Aintercepts message { L*,}and computes Vi**=h().A decrypts L*to obtain RM*,C*. Besides,A can create response message RM**to replace RM*,and calculates:

    Finally,A sends the message {L**,T5*}to Ui.Uiwill authenticate { L**,T5*}successfully and regardRM**as the legal response, so the protocol cannot resist the Man-in-themiddle attack.

    4.4 Privileged-insider attack

    In the Registration PhaseGWN randomly generates ekifor Uiand storesin the database. Privileged-insider attack can obtain theekito decrypt message Eeki{R,T1}and forge a fakedUi. So the protocol cannot resist the Privileged-insider attack.

    5 The proposed user authentication protocol

    In order to improve the existing security flaws of Althobaiti's protocol, we propose a novel user authentication protocol based on biometric identification combined with smart card and password. The proposed protocol includes registration phase, login phase,authentication phase, and biometric identity update phase.

    5.1 Registration phase

    In this phase,Uiregister withGWN. Fig. 1 illustrates the registration phase and it is performed as follows.

    Figure 1: Registration phase

    ● Step 1:Uichooses IDi,PWi, and imprints biometric BIOi, and computes(Ri,Pi)=Gen(BIOi)and Ai=h(IDi,PWi,Ri). Then sendstoGWNvia a secure channel.

    ● Step 2:GWN checks if IDiexists in the database, if no,Uiis recommended to select a new identity; otherwise,GWNpicksxSC,xiand K randomly, and computes Bi=h(I Di, XGWN,xi)

    5.2 Login phase

    When Uiwants to access the node Sj, the login request is launched at first by Uiwith SC . Fig. 2 illustrates the login phase and it is performed as follows.

    Figure 2: Login phase

    ● Step 1:UiinsertsSC and enters IDi,PWiand imprint BIOi.

    ● Step 2:SC computes Ri'=Rep(BIOi,Pi),Ai'=h(I Di,PWi,Ri')and checks whetherequals to Di. If yes,SC picks two random number Niand ni, and computes

    5.3 Authentication phase

    Fig. 3 illustrates the authentication phase and it is performed as follows.

    ● Step 1:GWN checks the validity of IDiand the freshness of n1. If yes, it computes(IDi,IDSC,Ni)=Dk(UV1),Ci=h(IDi,IDSC,XGWN), and Bi=h(IDi,XGWN,xi), and checks whetherh(Bi,Ci,Ni,n1)equals to VC1. If yes,GWN computes IDj=UV2⊕h(IDi,Ni,n1),

    ● Step 2:Sjchecks the freshness of n2. If n2meets freshness requirement,Sjcomputes

    Then, it checks whetherh(IDi,IDj,IDGWN,Yj,Ni,n2)equals to VC2. Next,Sjpicks Njand n3randomly and computes

    After that,SjsendstoGWN , where n3is a random number.

    ● Step 3:GWN checks the freshness of n3. If n3meets the freshness requirement,GWN computes:

    ThenGWNchecks whether h(skg,Yj,Ni,Nj,n3)equals to VC3. If yes,GWN computes:

    ● Step 4:Uichecks the freshness of n4. If n4meets freshness requirement,Uicomputes:

    Then he checks whether h(sku,Bi,Ci,IDi,IDj,Nj,n4)equals to VC4. If yes,Uiaccepts GWNand Sj, and agree the session key sku= sks=sk.

    Figure 3: Authentication phase

    5.4 Update phase

    A legal user can update the old password PWiand the biometric BIOias follows:

    ● Step 1:Uiinserts the smart cardSC into a card reader, then Uiinputs the IDi, old passwordPWiand imprints old biometric BIOi.

    ● Step 2:SC computes Ri=Rep(BIOi,Pi),Ai=h(IDi,PWi,Ri), and checks whether h(Ai,xSC,IDSC)equals to SC . If yes,Dicomputes:

    ● Step 3:SC computes:

    ● Step 4: The smart card updates the parameter towithout GWN.

    6 Security analysis and performance comparison

    6.1 Proof of authentication and key agreement based on BAN Logic

    6.1.1 The BAN logic postulates

    Table 2: Notations and parameters of ban logic

    (1) Message meaning rule of shared key

    (2) Nonce verification rule

    (3) Jurisdiction rule

    (4) Freshness-conjunction rule

    6.1.2 Security goal

    6.1.3 Idealized form

    6.1.4 Assumptions

    We make the assumptions about the initial state of the scheme to analyze the proposed scheme as follows.

    6.1.5 Security analysis of the idealized form of the proposed scheme

    According to m2, we can easily obtain

    According to A6and the message-meaning rule, we have

    According to A1and the freshness-conjunction rule, we have

    According to P2,P3and the non-verification rule, we have

    According to m3, we have

    According to A7and the message-meaning rule, we have

    According to A2and the freshness-conjunction rule, we have

    Then from P6,P7and the non-verification rule, we have

    According to m4, we have

    According to A8and the message-meaning rule, we have

    According to A3and freshness-conjunction rule, we have

    Then according to P10,P11and the non-verification rule, we have

    According to m5, we have

    According to A4and the message-meaning rule, we have

    According to A5and freshness-conjunction rule, we have

    Then, from P14,P15and the non-verification rule, we have

    Because sk=h(IDi,IDj,Ni,Nj)according to P16and P12, we have

    Likewise, according to P4and P8, we have

    According to P9,P17and jurisdiction rule, we have

    Likewise, according to P10,P18and jurisdiction rule, we have

    According to G1,G2,G3and G4, we conclude that both Uiand Sjbelieve they share the session key users identity, password,SC and biometrics. It can be concluded that our proposed scheme not only provides mutual authentication between user, sensor node and GWN, but also generates a shared session key for subsequent communication.

    6.2 Security aalysis against vrious atacks

    ● Node capture attack:Assume that an adversaryA physically captures a sensor node Sj, he can access real-time perception data collected by Sj. What is more,Acan obtain the secret information including node key and session keysk . Due to the fact that sk is generated by the Niand Njcorresponding to Uiand Sj, so the session key is different from each other because both the User and Sensor Node are different. One compromising node cannot reveal the information of other nodes and users. Legal users can still communicate with other nodes securely. The proposed protocol can resist Node capture attack.

    ● Off-line password guessing attack:Assume that an adversaryA may attempt to guess the password PWi. He can obtain AiAisuccessfully, if he steal the data from the smart card. He can obtain PWisuccessfully only if he knows Riwhich is very relevant to the biometric identification BIOi.BIOicannot be forged because of its uniqueness. It is impracticable to guess the password PWicorrectly in our protocol.

    ● Smart card loss attack:Assume that the smart card of a legal user is stolen by an adversaryA , and he wants to carry out Smart card loss attack.A can get the informationstored in the smart card. AlthoughA can obtainand Ai=h(IDi,PWi,Ri), he cannot obtain PWidue to the one-way function andRiwithout biometric identification BIOi. The proposed protocol can resist Offline password guessing attack.

    ●GWN impersonation attack:Assume that an attackerAphysically captures a sensor nodeSjand impersonatesGWN to attack sensor node SNj'. In order to be authenticated by the sensor nodeSNj' ,A needs to forge message m3. ThoughAcan obtainyjbecause he captures Sj, he cannot calculate yj'response to SNj'.yj'is the key factors for generatingGV1,GV2and VC2, soA cannot forge message legal m3. The proposed protocol can resist GWN impersonation attack.

    ● Man-in-the-middle attack and replay attack:Assume that an adversaryA can intercept legitimate login request message. Due to the feature of one-way hash function,Acannot obtain the keyK , the random number Ni,passwordPWiand biometric identification value Rirelated Ui, soAcannot forge message m2. What's more, the login request message m2is related to n1varying with time, so the intercepted m2will be invalid over time. Therefore, our protocol can withstands Man-in-the-middle attack and Replay attack.

    ● Denial of Service Attack:In the proposed protocol,Ui,SjandGWNverify the freshness of fresh factors n1,n2,n3and n4during the authentication process,respectively. Each message for verification such as m2,m3,m4and m5contains a fresh factor. In addition, each of Ui,SjandGWNverifies if the received value is equal to the recalculated value. The proposed protocol can resist denial of service attack.

    ● Mutual Authentication:The proposed protocol achieve the mutual authentication of each entities Ui,SjandGWN.GWN authenticates Uiby verifying the validity of m2generated by Ui. Then SjandGWNconduct two-way authentication by checking the validity ofm3generated byGWNand m4generated by Sj. The authentication between Uiand Sjis proved by m5generated byGWN. All the legal messages are only produced by legalUi,SjandGWN. Therefore, our protocol provides proper mutual authentication.

    Tab. 3 shows the security features supported by our protocol and existing protocols [Kim(2014); Chang, Lee, Lin et al. (2015); Yoon and Yoo (2014)]. It is clear to see that our protocol has superiority on the extra important security features compared with existing protocols. We note that the protocol of Kim et al. [Kim (2014); Chang, Lee, Lin et al.(2015); Yoon and Yoo (2014)] is susceptible to several attacks, such as man-in-themiddle attack and impersonation attack. The protocol of Chang et al. [Chang, Lee, Lin et al. (2015)] is prone to man-in-the-middle attack and unauthorized access attack. The protocol of Yoon et al. [Yoon and Yoo (2014)] cannot provide user anonymity which may lead to the privacy information disclosure. Our protocol provides the formal BAN-logic to prove security. Due to biometrics application, our protocol can offer nonrepudiation which is regarded as a practical application.

    Table 3: Anti-attack performance

    6.3 Performance comparisons

    Tab. 4 shows the computational load imposed by the authentication protocol in the registration, login, and authentication phases. We denote Th,Tx,TFand TEas one-way hashing operation, XOR operation, fuzzy extractor operation(Gen( ·)or Rep(·)) and symmetric-key encryption or symmetric-key decryption operation ,respectively. In order to reduce computational load, we only use one-way hashing operation and XOR operation to authenticate sensor node. So our protocol is ideal for resource-constrained WSNs.

    Table 4: Computational Load Comparison

    7 Conclusion

    Before introducing our protocol, we review the Althobaiti et al. protocol and analyze its security vulnerabilities. Then we propose a novel three-factor user authentication protocol for the information perception of IoT. The proposed protocol can achieve fast authentication process without biometric templates. It not only effectively solves the possible security threats of information perception of IoT, but also realizes easily without changing any hardware conditions. In addition, our protocol can not only be applied to IoT authentication, but also be applied to any scene that needs to protect privacy data and sensitive data. In order to improve algorithm security, the future work may improve the algorithm by applying the lightweight encryption algorithm.

    Acknowledgement:This work is supported by the National Science Foundation of China(Grant No. 61501132, Grant Nos. 61771154, 61301095, 61370084), the China Postdoctoral Science Foundation No. 2016M591515, the Heilongjiang Postdoctoral Sustentation Fund with No. LBH-Z14055, Harbin Application Technology Research and Development Project(Grant Nos. 2016RAQXJ063, 2016RAXXJ013).

    欧美最新免费一区二区三区| 国产午夜精品论理片| 熟妇人妻不卡中文字幕| 精品久久久久久久久av| 伦精品一区二区三区| 成人性生交大片免费视频hd| 精品人妻视频免费看| 精品久久久噜噜| 久久99热这里只频精品6学生| 熟妇人妻久久中文字幕3abv| 最近2019中文字幕mv第一页| 九色成人免费人妻av| 国产免费福利视频在线观看| av线在线观看网站| 偷拍熟女少妇极品色| 亚洲精品视频女| 青春草视频在线免费观看| 午夜福利在线观看吧| 在线播放无遮挡| 免费观看性生交大片5| 日韩欧美 国产精品| 国产v大片淫在线免费观看| 欧美一区二区亚洲| 国产精品综合久久久久久久免费| 精品亚洲乱码少妇综合久久| 色播亚洲综合网| 91aial.com中文字幕在线观看| 在线播放无遮挡| 成人性生交大片免费视频hd| 国产男人的电影天堂91| 午夜福利在线在线| 亚洲成色77777| 免费人成在线观看视频色| 国产69精品久久久久777片| 美女内射精品一级片tv| 一级毛片 在线播放| 男的添女的下面高潮视频| 亚洲在久久综合| 晚上一个人看的免费电影| 国产亚洲av嫩草精品影院| 亚洲av电影在线观看一区二区三区 | 亚洲自偷自拍三级| 午夜日本视频在线| 99热这里只有是精品在线观看| 欧美三级亚洲精品| 伊人久久精品亚洲午夜| 欧美97在线视频| 亚洲精品中文字幕在线视频 | 美女大奶头视频| 午夜福利在线观看免费完整高清在| 少妇高潮的动态图| 免费av观看视频| 极品少妇高潮喷水抽搐| 婷婷色av中文字幕| 亚洲欧美中文字幕日韩二区| 免费观看性生交大片5| 青春草亚洲视频在线观看| 国产伦精品一区二区三区视频9| 两个人的视频大全免费| 国产精品一区二区三区四区免费观看| 国产淫语在线视频| 欧美高清性xxxxhd video| 国产淫片久久久久久久久| 69人妻影院| 又粗又硬又长又爽又黄的视频| 国产一区二区在线观看日韩| 1000部很黄的大片| 欧美不卡视频在线免费观看| 欧美高清成人免费视频www| 精品国内亚洲2022精品成人| 国产精品蜜桃在线观看| 国产人妻一区二区三区在| 国产成人a∨麻豆精品| 亚洲精品国产成人久久av| 婷婷六月久久综合丁香| 婷婷色麻豆天堂久久| 色综合色国产| 精品久久久久久久人妻蜜臀av| 中文字幕亚洲精品专区| 久久精品夜色国产| 午夜福利视频1000在线观看| 天美传媒精品一区二区| 国产一区亚洲一区在线观看| 99久久人妻综合| 秋霞在线观看毛片| 国产精品一区www在线观看| 性插视频无遮挡在线免费观看| 一级a做视频免费观看| 久久99热这里只有精品18| 国产三级在线视频| 成人毛片60女人毛片免费| .国产精品久久| 不卡视频在线观看欧美| 少妇的逼水好多| 丝袜喷水一区| 国产乱人偷精品视频| 免费看日本二区| 最近2019中文字幕mv第一页| 久久国内精品自在自线图片| 卡戴珊不雅视频在线播放| 日本av手机在线免费观看| 天美传媒精品一区二区| 搡老妇女老女人老熟妇| 乱人视频在线观看| 观看美女的网站| av在线播放精品| 在线观看免费高清a一片| 亚洲aⅴ乱码一区二区在线播放| 色播亚洲综合网| 男女视频在线观看网站免费| 亚洲国产精品成人综合色| 最近中文字幕高清免费大全6| 在线观看免费高清a一片| 欧美激情在线99| 91久久精品国产一区二区成人| 一区二区三区四区激情视频| 国精品久久久久久国模美| 国精品久久久久久国模美| 日本爱情动作片www.在线观看| 免费观看的影片在线观看| 午夜精品国产一区二区电影 | a级毛片免费高清观看在线播放| 麻豆国产97在线/欧美| 亚洲国产欧美人成| 一级毛片电影观看| 男女国产视频网站| 18禁在线播放成人免费| 卡戴珊不雅视频在线播放| 观看美女的网站| 日本爱情动作片www.在线观看| 日韩成人av中文字幕在线观看| 日本爱情动作片www.在线观看| 卡戴珊不雅视频在线播放| 亚洲精品影视一区二区三区av| 久久午夜福利片| 国产精品久久视频播放| 六月丁香七月| 欧美成人一区二区免费高清观看| 免费观看无遮挡的男女| 亚洲婷婷狠狠爱综合网| 美女cb高潮喷水在线观看| 久久国内精品自在自线图片| 日韩亚洲欧美综合| 男人爽女人下面视频在线观看| 成年人午夜在线观看视频 | 亚洲人成网站高清观看| 天堂网av新在线| 赤兔流量卡办理| 国产成人午夜福利电影在线观看| 久久亚洲国产成人精品v| 搞女人的毛片| 精品熟女少妇av免费看| 男的添女的下面高潮视频| 午夜日本视频在线| 欧美日韩在线观看h| 日韩精品有码人妻一区| 亚洲av.av天堂| 欧美精品国产亚洲| 一级毛片电影观看| 一级毛片久久久久久久久女| 视频中文字幕在线观看| 欧美日韩国产mv在线观看视频 | 精品国产一区二区三区久久久樱花 | 亚洲欧美日韩东京热| 久久久久久久久久人人人人人人| 日本免费在线观看一区| 亚洲激情五月婷婷啪啪| 亚洲成人精品中文字幕电影| 久久精品久久久久久噜噜老黄| 亚洲精品色激情综合| 国产精品日韩av在线免费观看| 舔av片在线| 女人十人毛片免费观看3o分钟| 亚洲av男天堂| 天堂影院成人在线观看| 亚洲在线自拍视频| 成人一区二区视频在线观看| 久久亚洲国产成人精品v| 成年版毛片免费区| 国产午夜福利久久久久久| 亚洲精品aⅴ在线观看| 日韩av在线免费看完整版不卡| 久久精品国产自在天天线| 亚洲怡红院男人天堂| 亚洲av成人av| 99久久精品热视频| 婷婷六月久久综合丁香| 国内少妇人妻偷人精品xxx网站| 神马国产精品三级电影在线观看| 黄片无遮挡物在线观看| 亚洲av.av天堂| 91久久精品国产一区二区三区| 91久久精品国产一区二区成人| 精品欧美国产一区二区三| 在线免费观看不下载黄p国产| 欧美日韩亚洲高清精品| 中文字幕人妻熟人妻熟丝袜美| 18+在线观看网站| 色网站视频免费| 日韩av不卡免费在线播放| 在线观看一区二区三区| 日韩大片免费观看网站| 淫秽高清视频在线观看| 女人十人毛片免费观看3o分钟| 毛片女人毛片| 色视频www国产| 中文在线观看免费www的网站| 日韩一区二区视频免费看| 黄色一级大片看看| 免费观看av网站的网址| 日韩伦理黄色片| 一区二区三区四区激情视频| 成人鲁丝片一二三区免费| 97热精品久久久久久| 国产精品女同一区二区软件| 久久国内精品自在自线图片| 观看免费一级毛片| 永久免费av网站大全| 国产 亚洲一区二区三区 | 天天一区二区日本电影三级| 啦啦啦韩国在线观看视频| 国产探花在线观看一区二区| 高清视频免费观看一区二区 | 女人十人毛片免费观看3o分钟| 2021少妇久久久久久久久久久| 韩国av在线不卡| 精品久久久久久久久久久久久| 精品国内亚洲2022精品成人| 国内精品一区二区在线观看| 亚洲真实伦在线观看| 久久99热这里只有精品18| 亚洲精品国产成人久久av| 一级毛片我不卡| 久久久久性生活片| 中文字幕人妻熟人妻熟丝袜美| 久久久久久久久中文| 美女脱内裤让男人舔精品视频| 蜜臀久久99精品久久宅男| 亚洲伊人久久精品综合| 九色成人免费人妻av| 成人午夜高清在线视频| 最后的刺客免费高清国语| 国产黄色视频一区二区在线观看| 成年av动漫网址| a级一级毛片免费在线观看| 久久久久久久久久人人人人人人| 亚洲精品久久久久久婷婷小说| 亚洲国产精品专区欧美| 91久久精品国产一区二区三区| 97热精品久久久久久| 精品国产超薄肉色丝袜足j| 日韩电影二区| 久久久久久久久久久免费av| 男女边摸边吃奶| 各种免费的搞黄视频| 天美传媒精品一区二区| 国产精品免费视频内射| 日本91视频免费播放| 大香蕉久久网| 只有这里有精品99| 亚洲av福利一区| 欧美日韩国产mv在线观看视频| 热re99久久精品国产66热6| h视频一区二区三区| 亚洲成人av在线免费| 日本午夜av视频| 91久久精品国产一区二区三区| 春色校园在线视频观看| 在线观看www视频免费| 国产日韩欧美在线精品| 成人免费观看视频高清| 免费高清在线观看视频在线观看| 日韩大片免费观看网站| 啦啦啦视频在线资源免费观看| 人妻系列 视频| 精品一品国产午夜福利视频| 久久久久久久久久人人人人人人| 久久99精品国语久久久| 亚洲综合色网址| 亚洲国产欧美网| 中文字幕亚洲精品专区| 欧美老熟妇乱子伦牲交| 一级,二级,三级黄色视频| 午夜激情久久久久久久| www日本在线高清视频| 在线观看人妻少妇| 亚洲成色77777| 亚洲熟女精品中文字幕| 又粗又硬又长又爽又黄的视频| 一本久久精品| 日韩三级伦理在线观看| 亚洲精品日本国产第一区| 久久亚洲国产成人精品v| 亚洲av.av天堂| 99热全是精品| 中文字幕另类日韩欧美亚洲嫩草| 亚洲欧洲精品一区二区精品久久久 | 久久亚洲国产成人精品v| 欧美bdsm另类| videossex国产| 在线亚洲精品国产二区图片欧美| 国产免费又黄又爽又色| 九色亚洲精品在线播放| 午夜福利视频在线观看免费| 99精国产麻豆久久婷婷| 日韩伦理黄色片| 久久精品久久精品一区二区三区| 国产无遮挡羞羞视频在线观看| 另类亚洲欧美激情| 国产熟女午夜一区二区三区| 午夜91福利影院| 久久久精品94久久精品| 春色校园在线视频观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品 国内视频| 色视频在线一区二区三区| 亚洲国产毛片av蜜桃av| 美女主播在线视频| 婷婷色综合www| 国产一区有黄有色的免费视频| 精品酒店卫生间| 亚洲国产看品久久| 国产成人精品久久久久久| 夫妻午夜视频| 在现免费观看毛片| 免费黄频网站在线观看国产| 中文字幕另类日韩欧美亚洲嫩草| 一级毛片 在线播放| 又黄又粗又硬又大视频| 一个人免费看片子| 免费观看av网站的网址| 大码成人一级视频| 国产老妇伦熟女老妇高清| 久热这里只有精品99| 超色免费av| 中文字幕av电影在线播放| 极品少妇高潮喷水抽搐| 伦理电影大哥的女人| 少妇被粗大猛烈的视频| 黄色毛片三级朝国网站| 女人高潮潮喷娇喘18禁视频| 香蕉丝袜av| 大码成人一级视频| 国产黄色视频一区二区在线观看| 18+在线观看网站| 免费高清在线观看视频在线观看| 国产精品女同一区二区软件| 免费看av在线观看网站| 黄色配什么色好看| 久久久久视频综合| 在线 av 中文字幕| 精品视频人人做人人爽| 老鸭窝网址在线观看| 欧美国产精品一级二级三级| 久久人人爽人人片av| 久久久久国产网址| 日韩不卡一区二区三区视频在线| 热re99久久国产66热| 欧美av亚洲av综合av国产av | 欧美在线黄色| 男女啪啪激烈高潮av片| 青春草亚洲视频在线观看| 亚洲精品中文字幕在线视频| 精品酒店卫生间| 日韩制服骚丝袜av| 春色校园在线视频观看| 精品视频人人做人人爽| 边亲边吃奶的免费视频| 欧美精品av麻豆av| 国产成人欧美| 波野结衣二区三区在线| 亚洲成国产人片在线观看| 不卡av一区二区三区| 久久这里有精品视频免费| 在线观看免费日韩欧美大片| 人人澡人人妻人| 午夜福利视频在线观看免费| 寂寞人妻少妇视频99o| 97在线视频观看| 美女视频免费永久观看网站| 亚洲人成77777在线视频| 大码成人一级视频| 一级a爱视频在线免费观看| 欧美老熟妇乱子伦牲交| 日韩伦理黄色片| 精品久久久精品久久久| 国产av一区二区精品久久| 99香蕉大伊视频| 一级毛片我不卡| 80岁老熟妇乱子伦牲交| 亚洲美女黄色视频免费看| 卡戴珊不雅视频在线播放| 午夜福利视频在线观看免费| 成人毛片a级毛片在线播放| 中文字幕最新亚洲高清| 在线亚洲精品国产二区图片欧美| 99精国产麻豆久久婷婷| 高清av免费在线| 妹子高潮喷水视频| 免费高清在线观看日韩| 又粗又硬又长又爽又黄的视频| 久久人人爽人人片av| 国产一区二区激情短视频 | 国产一区二区 视频在线| 999精品在线视频| 亚洲人成77777在线视频| 午夜激情久久久久久久| 韩国高清视频一区二区三区| videosex国产| 又粗又硬又长又爽又黄的视频| 建设人人有责人人尽责人人享有的| www.av在线官网国产| 99久久中文字幕三级久久日本| 777久久人妻少妇嫩草av网站| 欧美人与善性xxx| 日本vs欧美在线观看视频| 老司机影院成人| 午夜福利,免费看| 亚洲av成人精品一二三区| 亚洲四区av| www.熟女人妻精品国产| 最近2019中文字幕mv第一页| 伦精品一区二区三区| 免费播放大片免费观看视频在线观看| 亚洲国产色片| 91精品三级在线观看| 久久久久久伊人网av| 777久久人妻少妇嫩草av网站| 99国产精品免费福利视频| 亚洲综合色惰| 亚洲精品第二区| 看免费成人av毛片| 亚洲成国产人片在线观看| 亚洲精品成人av观看孕妇| 亚洲中文av在线| 国产精品人妻久久久影院| 国产精品一二三区在线看| 波野结衣二区三区在线| 色哟哟·www| 国产精品久久久久久久久免| 丝袜美腿诱惑在线| 精品一区在线观看国产| 精品国产超薄肉色丝袜足j| 精品国产一区二区三区久久久樱花| 最近中文字幕高清免费大全6| 97人妻天天添夜夜摸| 热99久久久久精品小说推荐| 免费播放大片免费观看视频在线观看| 国产一区二区 视频在线| 午夜激情av网站| 欧美日本中文国产一区发布| 日韩三级伦理在线观看| 建设人人有责人人尽责人人享有的| 久久久久久久久久久免费av| 熟女少妇亚洲综合色aaa.| 欧美 日韩 精品 国产| 国产av精品麻豆| 亚洲国产精品一区三区| 丁香六月天网| 亚洲熟女精品中文字幕| 免费日韩欧美在线观看| 老汉色av国产亚洲站长工具| 久久久久国产一级毛片高清牌| 国产精品久久久久久精品古装| 99国产综合亚洲精品| 美女xxoo啪啪120秒动态图| 午夜影院在线不卡| 免费播放大片免费观看视频在线观看| 亚洲欧美精品综合一区二区三区 | 欧美日韩成人在线一区二区| 高清欧美精品videossex| 91精品三级在线观看| 久久久精品94久久精品| 久久久国产欧美日韩av| 黄片无遮挡物在线观看| 欧美国产精品va在线观看不卡| 国产探花极品一区二区| 日韩av免费高清视频| 老熟女久久久| 亚洲天堂av无毛| a 毛片基地| 午夜福利在线免费观看网站| 青春草亚洲视频在线观看| 一个人免费看片子| 69精品国产乱码久久久| 最近的中文字幕免费完整| av.在线天堂| 啦啦啦视频在线资源免费观看| 亚洲欧美成人精品一区二区| 亚洲精品乱久久久久久| 亚洲国产成人一精品久久久| 亚洲精品自拍成人| 夜夜骑夜夜射夜夜干| 国产欧美亚洲国产| 国产人伦9x9x在线观看 | 日本wwww免费看| 妹子高潮喷水视频| 亚洲激情五月婷婷啪啪| 夜夜骑夜夜射夜夜干| 大香蕉久久网| 青春草亚洲视频在线观看| 国产xxxxx性猛交| 免费播放大片免费观看视频在线观看| 一二三四在线观看免费中文在| 最近中文字幕2019免费版| 国产免费视频播放在线视频| 久久av网站| 欧美中文综合在线视频| 国产亚洲精品第一综合不卡| av福利片在线| 激情视频va一区二区三区| 亚洲av欧美aⅴ国产| 9热在线视频观看99| 99精国产麻豆久久婷婷| av在线播放精品| 黄片小视频在线播放| 国产男人的电影天堂91| 亚洲av在线观看美女高潮| 欧美日韩视频精品一区| 最近2019中文字幕mv第一页| 熟女电影av网| 一二三四中文在线观看免费高清| 免费看不卡的av| √禁漫天堂资源中文www| h视频一区二区三区| 夫妻午夜视频| 午夜福利一区二区在线看| 国产亚洲午夜精品一区二区久久| 天天影视国产精品| 女人精品久久久久毛片| 久久精品国产亚洲av天美| 99香蕉大伊视频| 热re99久久精品国产66热6| 最新的欧美精品一区二区| 少妇人妻精品综合一区二区| 男女边摸边吃奶| 国产 精品1| 国产成人精品久久二区二区91 | xxx大片免费视频| 精品亚洲成a人片在线观看| 亚洲av男天堂| 女人高潮潮喷娇喘18禁视频| 精品一区二区免费观看| av线在线观看网站| 国产熟女午夜一区二区三区| 欧美 日韩 精品 国产| 亚洲天堂av无毛| 国产精品久久久久久精品古装| 欧美精品一区二区免费开放| 亚洲国产欧美日韩在线播放| 欧美日韩视频精品一区| 在线观看www视频免费| 一区二区三区精品91| 欧美+日韩+精品| 欧美国产精品一级二级三级| 青春草视频在线免费观看| 中文字幕色久视频| 午夜福利视频在线观看免费| 99热网站在线观看| 极品少妇高潮喷水抽搐| 性少妇av在线| 日本91视频免费播放| 99久久中文字幕三级久久日本| 97在线人人人人妻| 七月丁香在线播放| 91成人精品电影| 亚洲综合色惰| 日本91视频免费播放| 亚洲综合色惰| 天天躁狠狠躁夜夜躁狠狠躁| av又黄又爽大尺度在线免费看| 久久久久久久大尺度免费视频| 男女下面插进去视频免费观看| 美女国产高潮福利片在线看| 免费观看在线日韩| 久久97久久精品| a级片在线免费高清观看视频| 久久ye,这里只有精品| 高清视频免费观看一区二区| 一区二区三区四区激情视频| 国产精品一区二区在线观看99| 一级毛片我不卡| 国产成人精品久久久久久| 久久久久国产精品人妻一区二区| a级毛片在线看网站| 建设人人有责人人尽责人人享有的| 波多野结衣一区麻豆| 久久精品国产亚洲av天美| 一本色道久久久久久精品综合| 巨乳人妻的诱惑在线观看| 欧美中文综合在线视频| 日韩精品免费视频一区二区三区| 日本猛色少妇xxxxx猛交久久| 久久精品熟女亚洲av麻豆精品| 亚洲欧洲日产国产| 日韩精品免费视频一区二区三区| 有码 亚洲区| 亚洲人成网站在线观看播放| 制服人妻中文乱码| 成年人免费黄色播放视频| 午夜91福利影院| 成人毛片60女人毛片免费| 秋霞在线观看毛片| 制服诱惑二区| 九九爱精品视频在线观看| 18禁裸乳无遮挡动漫免费视频| 精品一区二区三卡| 夫妻午夜视频| 人人妻人人爽人人添夜夜欢视频| 国产av国产精品国产| 欧美日韩综合久久久久久| 久久久久精品性色| 91国产中文字幕| 亚洲av在线观看美女高潮| 精品午夜福利在线看|