• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Energy-Efficient Protocol Using an Objective Function &Random Search with Jumps for WSN

    2019-03-18 08:15:20MohammedKaddiKhelifaBenahmedandMohammedOmari
    Computers Materials&Continua 2019年3期

    Mohammed Kaddi ,Khelifa Benahmed and Mohammed Omari

    Abstract:Wireless Sensor Networks (WSNs) have hardware and software limitations and are deployed in hostile environments.The problem of energy consumption in WSNs has become a very important axis of research.To obtain good performance in terms of the network lifetime,several routing protocols have been proposed in the literature.Hierarchical routing is considered to be the most favorable approach in terms of energy efficiency.It is based on the concept parent-child hierarchy where the child nodes forward their messages to their parent,and then the parent node forwards them,directly or via other parent nodes,to the base station (sink).In this paper,we present a new Energy-Efficient clustering protocol for WSNs using an Objective Function and Random Search with Jumps(EEOFRSJ) in order to reduce sensor energy consumption.First,the objective function is used to find an optimal cluster formation taking into account the ratio of the mean Euclidean distance of the nodes to their associated cluster heads (CH) and their residual energy.Then,we find the best path to transmit data from the CHs nodes to the base station(BS) using a random search with jumps.We simulated our proposed approach compared with the Energy-Efficient in WSNs using Fuzzy C-Means clustering (EEFCM) protocol using Matlab Simulink.Simulation results have shown that our proposed protocol excels regarding energy consumption,resulting in network lifetime extension.

    Keywords:WSNs,clustering,energy Consumption,lifetime extension,random search with jumps,EEOFRSJ,EEFCM.

    1 Introduction

    The sensor networks are becoming more and more widespread.They are used in various fields.Their applications are more and more numerous and diversified.They can be classified mainly in military applications,environmental applications,medical and commercial applications [Akyildiz,Su,Sankarasubramaniam et al.(2002a)].

    The WSN consists of hundreds and thousands of sensor nodes,which are randomly deployed in the sensor field and form a self-organized network system by radio communications.The sensor nodes have the ability to monitor physical or environmental conditions,such as temperature,sound and pressure.The sensor nodes detect,collect,andtransmit information from the region that is covered by the entire sensor array,and transmit it to each other or directly to the user [Akyildiz,Su,Sankarasubramaniam et al.(2002b)].

    These sensor nodes consist of a sensing subsystem,a processing subsystem,a communication subsystem,and a power subsystem.Depending on the specificity of the application,the sensor nodes may also include additional components such as a location search system to determine their location (e.g.,GPS),a mobilizer to change their location or configuration (for example,the orientation of the antenna),and characterized by:low cost,low power,small size and short communication distance.WSNs are also characterized by the constraint of energy because data transmission is frequent and energy can be consumed quickly [Giuseppe,Marco,Mario et al.(2009)].This makes the data routing very special to reduce power consumption and extend the lifetime of WSNs.The general architecture and the major components of a wireless sensor node are shown in Fig.1.

    Figure1:Sensor node structure

    In WSNs,it is necessary to ensure distributed energy consumption within the network.This energy is consumed by various network features such as radio (communication),protocols (medium access control (MAC),routing),central processing unit (computation,aggregation) and acquisition.Therefore,the lifetime of the entire sensor array depends essentially on the lifetime of the individual node’s battery.For a sensor node,the energy consumed by communication tasks using radio transmissions is the dominant factor.

    Many new algorithms have been proposed for the problem of data routing in sensor networks.These routing mechanisms have considered the characteristics of the sensor nodes with the requirements of the application and the architecture.All routing protocols can be classified into three categories as shown in Fig.2:data-centric,hierarchical,and location-based.Data-centric protocols are query-based and depend on the naming of the desired data,which helps eliminate the many redundant transmissions.Hierarchical protocols aim at grouping the nodes so that the CHs can do some aggregation and data reduction to save energy.Location-based protocols use position information to transmit data to the desired regions,rather than the entire network.

    Figure2:Categories of WSNs routing protocols

    In data-centric routing,the BS sends requests to certain regions and waits for data from the sensors in the selected regions.Since the data is requested by the queries,an attribute-based naming is needed to specify the properties of the data.SPIN (Sensor Protocols for Information via Negotiation) is the first data-centric protocol that considers data negotiation between nodes to eliminate redundant data and save energy.Later,the DD (Directed Diffusion) protocol was developed and became progress in the routing of centric data.Then,many other protocols have been proposed on the basis of a similar concept such as Flooding and Gossiping,EAR (Energy-Aware Routing) and RR (Rumor Routing).

    The primary purpose of hierarchical routing is to effectively maintain the power consumption of sensor nodes by involving them in multi-hop communication in a particular cluster and by aggregating and merging data to reduce the number of messages sent to the sink.Cluster formation is usually based on the energy reserve of sensors and the proximity of the sensor to the CH.LEACH [Heinzelman,Chandrakasan and Balakrishnan (2002)] is one of the first hierarchical routing approaches for sensor networks.The idea proposed in LEACH has been a source of inspiration for many hierarchical routing protocols [Arati and Dharma (2001); Arati and Dharma (2002)],although some protocols have been developed independently [Lakshminarayanan and Randy (2000); Younis,Youssef and Arisha (2002)].So,this category includes also:PEGASIS-E [Vibha and Ajay (2013)],TEEN and APTEEN [Arati and Dharma (2001)],Energy-aware routing for cluster-based sensor networks [Younis,Youssef and Arisha(2002)],Self-organizing protocol [Lakshminarayanan and Randy (2000)].

    Most routing protocols for sensor networks require location information for the sensor nodes.In most cases,location information is needed to calculate the distance between two particular nodes so that energy consumption can be estimated.Since there is no addressing scheme for sensor networks as Internet Protocol address (IP address) and nodes are spatially deployed in a region,location information can be used to route the data in an energy efficient manner.For example,if the region to be detected is known using the location of the sensors,the request can be broadcast only to that particular region which will eliminate the number of transmissions significantly.Some of the protocols cited here are designed primarily for ad hoc mobile networks and consider node mobility in design.However,they are equally applicable to sensor networks where there is little or no mobility.Note that there are other location protocols designed for ad hoc wireless networks,such as cartesian routing and path-based routing.However,many of these protocols are not applicable to sensor networks because they do not consider energy.In this group,there are some of the routing protocols such as MECN (Minimum Energy Communication Network),SMECN (Small Minimum Energy Communication Network),GAF (Geographic Adaptive Fidelity) and GEAR (Geographic and Energy Aware Routing).

    In this paper,in order to extend a WSNs lifetime,we choose the hierarchical type as a routing protocol to send the collected data from the monitored zone to the BS.We present in this work a novel energy efficient clustering scheme which uses an objective function to form the clusters,and random search with jumps to determine an optimal path to send the aggregated data from the CHs nodes to the BS in a multi-hop mode.

    The rest of this paper is organized as follows.In section two,the state-of-the-art techniques are shortly discussed.The local search and random search techniques are presented in the third section.Section four explains our proposed protocol (EEOFRSJ)which is based on multi-hop clustering using a random search with jumps.In section five,we present a performance evaluation of the proposed protocol via simulations and comparison with a peer protocol.Finally,Section six concludes the paper with some proposed future works.

    2 Related work

    In the hierarchical structure,there are two main categories:cluster-based approach and chain-based approach.In the first,the nodes are organized in clusters,where each cluster has his leader to collect data and transmit it to the BS.In the second type,the node is organized in a chain.

    In the literature,there are several protocols and energy-efficient hierarchical routing algorithms for WSNs have been proposed to save energy and therefore extend the network lifetime.In the following paragraphs we present LEACH protocol and its variants,and then we explain the basic functions of ten protocols related to our work.

    2.1 Leach and its variants

    Low-Energy Adaptive Clustering Hierarchy (LEACH) [Heinzelman,Chandrakasan and Balakrishnan (2002)] is one of the most popular distributed cluster-based routing protocols.The idea of LEACH consists in forming a cluster of sensor nodes based on the amplitude of the received signal and using the CHs elected as routers.

    The process of cluster formation in LEACH is illustrated in Fig.3.

    Figure3:Cluster formation in LEACH

    Execution process of LEACH based upon setup phase and data transmission phase; the duration of the second phase is longer than that of the first phase in order to minimize the overhead.In the first phase,the CH is randomly selected by generating a number (for each node n) that belongs to the interval [0-1].If the random number is less than the threshold value obtained by T(n) function,the node n becomes the CH in this round.Otherwise,the node joins the closest cluster.

    Where p is the CH probability,G is the set of nodes that have not been chosen as CH before (1/p) rounds and r is the current round number.

    Based on division multiple access (TDMA) schedule,the sensor nodes transmit their data to the CHs during their respective slots in the data transmission phase.These CHs collect data from all cluster members; fuse and aggregate gathered data using merge procedures,and transmit this data directly to the BS.Data collection is periodically sent to a central sink.In the LEACH protocol variants,we find that some protocols use the centralized approach while others use the decentralized approach for cluster formation.In the first types,the CHs nodes are chosen by the BS.Therefore,each node sends its characteristics such as its location and energy level to the BS.The global positioning system (GPS) or other tracking methods produce better clustering and require less transmission energy.The BS will select only the nodes that will become CH nodes with required characteristics and broadcast this information to all nodes in the network.LEACH-C protocol [Dhawan and Waraich (2014); Gnanambigai,Rengarajan and Anbukkarasi(2014)] and LEACH-F protocol [Dhawan and Waraich (2014); Manimala and Senthamil selvi (2013)] are examples of this type.When the BS cannot track nodes (no GPS),each sensor sends its own characteristics such as its position and to the final destination regardless of the position of the rest of the nodes in the network.As an example of this type,there is LEACH-B [Braman and Umapathi (2014); Usha and Sankarram (2014)]protocol and LEACH-A protocol [Zhao and Yang (2014)].

    Unlike the LEACH protocol where CH sends data to the BS directly in a single hop; there are other LEACH protocol versions that use a multi-level hierarchy instead of being sent directly to the BS.

    The TL-LEACH protocol [Kaur,Sharma and Kaur (2013)] operates in a two-level hierarchy.The aggregated data of each CH is collected by a CH nearer to the BS.The improvement of this protocol reduces the data transmission energy.Cluster nodes die early relative to other nodes,far from the BS,and TL-LEACH improves energy efficiency by using a CH node as a relay.

    In MH-LEACH protocol [Gnanambigai,Rengarajan and Anbukkarasi (2014); Kaur,Sharma and Kaur (2013)],the cluster member nodes send data to their respective CH nodes,which then transfer data to the CH rather than the BS directly.This protocol adopts an optimal path between the CH and the BS.

    Table1:Comparison between LEACH protocol variants

    2.2 Others hierarchical routing protocol

    PEGASIS-E (Power Efficient Gathering in Sensor Information System Extended) [Vibha and Ajay (2013)] is a chain-based protocol is an extension of PEGASIS.The basic idea of this protocol is that the nodes will be organized in a chain.So,that the nodes transmit and communicate only with their nearest neighbors.The only node that sends data from the chain directly to the BS is the leader.The chain formation criterion in PEGASIS-E is based on the average distance between the sensor nodes.PEGASIS-E protocol offers better performance in terms of energy dissipation and the amount of information sent to BS compared with classical PEGASIS.

    Hadjila [Hadjila (2014)] proposes various solutions for the routing of the data in a WSN.First,he presents three routing algorithms based on the clustering with different approaches for the choice of the CHs and the transmission of the data towards the BS.Then,he is interested in another approach based on the chains.The choice of CHs is an important point in the design of routing protocols; he uses an original approach based on fuzzy logic to solve this problem.Finally,he combines cluster-based and chain-based approaches with metaheuristic “ant colony” to build shorter chains in clusters and thus reduce distances in order to save energy in transmissions.

    In order to minimize energy consumption,Elkhediri et al.[Elkhediri,Nasria,Weic et al.(2014)] propose a method for optimizing the low energy adaptive hierarchy (O-LEACH)in order to improve the LEACH and LEACH-C protocols.The purpose of this method is to dynamically select the cluster based on the residual energy of the sensor nodes.In the proposed O-LEACH Algorithm the BS initiates the routing process for which the CH election in each round is based on the energy value of each sensor that must be greater than ten percent of its residual energy value.After selecting CH,the latter waits for the member nodes,creates the TDMA table and sends it to its members.Then the transmission phase will take place and if the energy is less than ten percent of its value,the process of LEACH will be launched.The results of the simulation show that the proposed algorithm provides greater stability compared to LEACH and LEACH-C.

    To study the impact of the heterogeneity of the nodes in terms of energy in hierarchically grouped WSNs,Kumar et al.[Kumar,Aseri and Patel (2009)] introduce an energyefficient heterogeneous clustered scheme for WSNs (EEHC) based on the weighted election probabilities of each node to become a CH based on the residual energy in each node.Kumar et al.[Kumar,Aseri and Patel (2009)] assume that a percentage of the sensor node population is equipped with additional energy resources.The optimal probability that a node will be elected as a CH is a function of spatial density when the nodes are uniformly distributed over the sensor field.This grouping is optimal in the sense that the energy consumption is well distributed on all the sensors and that the total consumption of energy is minimal.This optimal grouping depends strongly on the energy model used.The results of the simulation show that this approach is more effective in extending network life compared to LEACH.

    Nawaz et al.[Nawaz and Bazaz (2010)] present a protocol for routing and aggregating data from WSNs.The proposed technique combines a gradient-based routing scheme with the hierarchical scheme of the LEACH protocol.With hybridization between these two protocols and taking into account the residual energy factor of the nodes when selecting the CHs a robust data aggregation and routing strategy is developed.The simulation results show that energy-efficient clustering and low-cost multi-hop communication increase the network’s lifetime over the LEACH routing protocol.

    The objective of the research presented in Omar et al.[Omar,Burairah and AbdSamad(2017)] is to improve the LEACH protocol by proposing a new method for selecting CHs.This method is based on the center of gravity and the center of mass,taking into account the three dimensions of node energy,distance,and density.This would reliably improve WSN network performance by reducing power dissipation and extending network life.Data is transferred from CH to BS using the concept that considers two-hop transmission where all CHs first collect data from surrounding sensors and then send them to the BS.The results confirmed that the proposed improvement allows for the correct selection of CHs in high-density areas.

    A cluster-based,energy-centric protocol was developed in Sarma et al.[Sarma and Gopi(2014)] to extend the life of the sensor network using the jumper firefly algorithm.The cluster configuration is performed using the firefly algorithm whose protocol is a centralized algorithm in which all clustering procedures will be performed at the BS.The latter runs the firefly algorithm to determine the best CHs that can minimize the cost function.A new cost function has been defined to minimize the intra-cluster distance in order to optimize the energy consumption of the network.It uses a high-energy node as a CH and produces clusters that are positioned evenly throughout the sensor’s field.The main idea of the proposed protocol is the selection of the intra-cluster distance between itself and the cluster member and the optimization of the energy management of the network.The BS has identified the optimal set of cluster leaders and their associated cluster members.The BS transmits information containing the CH Id (Identity) for each node to all nodes in the network.

    In Oudani et al.[Oudani,Krit,Kabrane et al.(2017)],the focus is primarily on energy efficiency using the cluster-based hierarchical approach to propose a new method for maximizing network sensor lifetime.The proposed method is to conserve energy consumption when transmitting data to the BS based on improving the LEACH algorithm protocol,just to minimize the distance between BS and CH and to minimize the number of dead headshots relative to BS.This method consists of locating the selected CHs of the nodes that are far from BS at half the topology of the network; the goal of this work is to avoid the death of nodes which are very far from the BS and to give the node located at the half of the topology and the BS so that become CHs.the results are demonstrated by the simulation results,using Matlab Simulink,which show that this approach guarantees low power consumption and improves network lifetime by up to 45% compared to the LEACH protocol.

    Hadjila et al.[Hadjila,Guyennet and Feham (2013)] propose an algorithm named EEFCM (Energy-Efficient in WSNs using Fuzzy C-Means Clustering),where the cluster formation mode works in three steps.In the first step,the clusters are formed using the Fuzzy C-Means method.Each cluster containing a set of nodes and the number of nodes is not necessarily equal in the clusters.In the second step,the CH is initially elected in each group in a random way because all the nodes have the same amount of initial energy;the election is performed after a rotation mechanism based on the remaining energy applied to select the next CH.Ordinary nodes send their collected data to the corresponding cluster leader.In the third step,the CHs receive and aggregate the data in order to send it to the BS.The data transmission between the CHs and the BS is performed in multi-hop mode.Calculation of the distances between the CHs and distances between the CHs and the BS allows building several chains,where each CH sends its collected data to the nearest CH.The nearest CH of the BS sends its data as well as data of other CHs directly to the BS.

    In order to reduce energy consumption for WSN,authors in Wang et al.[Wang,Ju,Gao et al.(2018)] have proposed a new coverage control algorithm based on the particle swarms optimization (PSO).In order to achieve a balance between the coverage rate and the energy cost,the detection radius of each node must be adjusted.In the first phase,they randomly deployed the nodes in the area.Then,they partitioned the network into several grids.Afterward,they calculated the energy consumption and the coverage rate of each grid.In order to adjust the detection radius of the nodes in different networks,they adopted a PSO technique in the last phase.The results of the simulation show that the proposed algorithm can effectively improve the coverage rate and reduce the energy consumption compared with the other PSO variants presented in the literature.

    In Tab.2,a comparison of these routing protocols was made based on various clustering parameters.

    Table2:Comparison between nine routing protocols based on clustering parameters

    3 Local search and random search

    There are two types of metaheuristics:local searches,also known as single-solution methods,and population-based methods.Local research tends to intensify research by exploiting some of the research space while population-based methods tend to diversify it by exploring different parts of the research space.

    The search space associated with a combinatorial optimization problem is often nonenumerable in a reasonable amount of time.In fact,we try to link some solutions together,so that one solution can be obtained from another.It is necessary to define a relation of a neighborhood which is an application that associates with any solution (of the search space) a set of solutions called neighbors.

    Local searches are methods based on a neighborhood relationship and a procedure exploiting that neighborhood.The local searches are differentiated by the procedure of exploitation of the neighborhood; the neighborhood being able to be regarded as a parameter of this method.Local search is the oldest method of resolution.It starts with an initial solution,and,at each iteration,it replaces the current solution with the version that optimizes the objective function.The search ends when all the candidate neighbors are not optimal with respect to the current solution,so the local optimum is reached.

    Algorithm 1:Pseudo code of a local search S ← S0; {generate an initial solution S0} While (stopping condition is not satisfied) do Generate N (s); {neighborhood generation} If no better neighbors then S ← S '; {selection of the best neighbor S' belongs to N (s) } endif; end while;

    Random search is the simplest stochastic method.This method consists in drawing at each iteration a random solution.The objective functionfis evaluated at this point.The new value is compared to the previous one.If it is better than the previous one,this value is saved,along with the corresponding solution,and the process continues.Otherwise,we start from the previous point and start the process,until the stopping conditions are reached.

    4 Our contribution

    In cluster-based hierarchical routing algorithms,data transmission takes place in two phases:the transmission of data from ordinary nodes to CHs,then from CHs to the BS.The main challenges of energy-efficient cluster-based hierarchical routing protocols are the choice of CHs and the method of route data to BS.

    With regard to the first challenge,most of the hierarchical protocols described in the previous section are based on the principle of LEACH protocol or based on one factor in order to determine the different clusters.In the LEACH protocol and in some of its variants,the CHs are not uniformly distributed in the sensing area,which means that the CHs can be at the edges of the cluster.Consequently,some nodes will have no CH in their neighborhoods.Also,the protocols proposed in Elkhediri et al.[Elkhediri,Nasria,Weic et al.(2014)],Kumar et al.[Kumar,Aseri and Patel (2009)] and Nawaz et al.[Nawaz and Bazaz (2010)] take the residual energy of the nodes like a factor of clustering,and the authors in Sarma et al.[Sarma and Gopi (2014)] and Oudani et al.[Oudani,Krit,Kabrane et al.(2017)] choose the distance between nodes as the factor to determine the CHs.

    In order to determine the best CHs,we choose the residual energy of nodes and their distances to the elected CH as factors of the objective function.

    Regarding the second challenge,some of the above-discussed protocols only address the single-hop routing of CHs to the BS.Indeed,they assume that cluster leaders can communicate directly with the BS.This becomes impossible when the extent of the network increases and this will cause a strong energy dissipation of the CH node if the BS is far from it.

    In our proposed protocol,we adopt a hierarchical approach with multi-hop routing as to remedy this problem such as that used by Nawaz et al.[Nawaz and Bazaz (2010)] and Omar et al.[Omar,Burairah and AbdSamad (2017)],but by using a new technique.

    4.1 Network model

    In this paper,we use the same sensor network model as used by Heinzelman et al.[Heinzelman,Chandrakasan and Balakrishnan (2002)].In our model,the nodes are uniformly distributed in N*M surveillance zone.

    During the deployment of the nodes,we took into account the following criteria:

    ? The sink node and all other nodes are stationary.The location of the nodes has to be known either through GPS or an automatic position detection mechanism.

    ? The nodes are all homogeneous,and they have the same initial energy E0,sensing rangeRsand radio communication rangeRc.

    ? Each node can have different roles:monitoring nodes,relay nodes,and CHs.

    ? The BS is not limited in terms of energy,memory and computing power.

    ? The links are symmetrical so that the energy necessary to transmit a message from nodeito nodejis the same as from nodejto nodei.

    ? Data fusion is used to reduce the total sent data.

    4.2 Energy consumption model

    In our proposed protocol,we use the same simple model shown in Heinzelman et al.[Heinzelman,Chandrakasan and Balakrishnan (2002)] for the radio hardware energy consumption where the transmitter dissipates energy to run the radio electronics and the power amplifier,and the receiver dissipates energy to run the radio electronics.Both the free-space channel (energy dissipation ofd2) and the multi-path channel (energy dissipation ofd4) are used according to the distance (d) between the transmitter and the receiver.Thus,the energy consumption for the transmission of a packet ofLbits at a distanced (ETX(L,d))is given by the following equation:

    To receive a message ofLbits,the receiver consumesERX(L):

    WhereEelec(L,d)is sufficient energy to transmit or receive a 1 bit,εfsis the amplifier parameter of transmission corresponding to the free-space,εmpis the amplifier parameter of transmission corresponding to the two-ray models,andd0is the threshold transmission distance which is given by:

    Figure4:Energy model used

    4.3 The proposed technique

    Our proposed protocol consists of three phases.The first phase is the cluster creation phase.In this stage,the clusters will be formed through the use of an objective function called “Cost”.The second phase is the inter-cluster communication phase.In this stage,we determine the optimal mode of communication between the CHs by using a random search with jumps.The third phase is the data transmission phase:both intra-cluster and inter-cluster data transmission are launched.

    Cluster creation phase:

    ? CHs election;

    ? Clusters and CHs (CHi) are fixed;

    ? Scheduling transmission plan of each ordinary node by CH.

    Since our proposed protocol is a centralized algorithm in which all clustering operations will be performed at the BS,we assume that the BS has all the information about the energy levels and the location of all network nodes.In this phase,the BS chooses randomly 10% (like exist in Hadjila et al.[Hadjila,Guyennet and Feham (2013)]) of nodes having an energy level greater than or equal to the average residual energy (ARE)of the entire network as candidate node (Eq.(5)).

    WhereE(ni)is the current residual energy of the living node i andMis the total live nodes.

    The BS runs and calculates the various parameters defined below to determine the bestkCHs from candidate nodes of the current cycle for an optimal condition (We chosek=5%like Heinzelman et al.[Heinzelman,Chandrakasan and Balakrishnan (2002)]).Then the ordinary nodes join the nearest CH to form the clusters.Therefore,an objective function called “Cost” is used to select the best CHs (Eq.(9)).The smallest value of the cost function represents the best combination of CHs among others:

    The Euclidean distance is used to calculate the distance between CH and the cluster member node:

    Wherexi and yi (respectively xjand yi) are the coordinates of member nodei(respectiveley CHj).

    The functionf1is used to maximize the ratio of the mean Euclidean distance of the nodes to their associated CH.

    Where d(ni,CHk) is the Euclidean distance between the node i and its CHkand |Ck| is the number of nodes that belong to the CkCluster.

    The functionf2is to minimize the ratio of the total energy of all the ordinary nodes and the total current energy of the CHs in the current iteration:

    Where M is the total number of ordinary nodes,K is the total number of CHs,E(ni)is the current energy of ordinary nodei,and E(CHi) is the current energy of the CHi.

    So,the objective function used to select the best CH is:

    Wherewis used to control the contribution of each of the sub-objectivesf1andf2.

    When the CHs are elected,the nodes decide which cluster to join based on the power of the signals received from the CHs.If two received signals have the same power,then the CH to be joined is chosen randomly.If the received signal is powerful,the node will need less energy to transmit its data to the CH.Each ordinary node transmits a join request to the chosen CH using a CSMA (Carrier Sense Multiple Access) MAC protocol.The join request consists of the node Id,the CH Id,and a header.During this phase,all CHs must keep their radio turned on.After receiving requests from all the joining nodes,each CH allocates a specified duration to the cluster members to establish a communication link,so these nodes can go into sleep mode for the rest of the time.For this reason,each CH allocates to each member node a turn in a TDMA scheduling,and it is only during the allocated time that the nodes can transmit their collected data to the CH.This allows the nodes to turn off their radio antennas and go to the sleeping state to save more energy.In addition,using the TDMA schedule will allow nodes to avoid collisions and interference between nodes in the cluster.

    Inter-cluster communication phase

    Once the clusters are established,the BS applies the second proposed algorithm using a metaheuristic technique called random search to obtain a shorter path to the BS.The latter sends organizational information of the selected chain to all CHs.

    The shorter path is obtained by calculating the costs of the different paths connecting all CH.The cost of each path is the sum of the costs of all the links that make this path.The link cost between two nodes is calculated by considering the transmission power and the receiving power of CHs.So,the link cost between two nodesiandjCan be computed using Eq.(10):

    WhereLCi;jis the link cost betweeniandj,TPiis the transmission power ofiandRPjis the receiving power ofj.

    The best path that connects all CHs is obtained by running the following algorithm,which is our second proposed algorithm using a jump in random search method.

    To determine the best path,we consider the case of sending the data directly from CHs to the BS as an initial solution (S0).Then we classify the set of possible solutions into several subsets.Each subset contains different paths but the last node Id (leader) of each path is identical.So,the subset differs depending on the leader number (the last nodes of the path) chosen to collect all data from other CHs in order to be sent to the BS.The BS randomly chooses a solution from one of these subsets,calculates its cost and compares it with the cost of the current solution.If it is the best one,it is chosen as an optimal solution.Otherwise,the BS chooses another solution among the solutions of the same subset to find the best local solution until the maximum number of iterations is exceeded with no improvement.In this case,the BS makes a jump by selecting another subset and repeats the same procedure.

    Figure5:Example of intra-cluster and inter-cluster communication

    Algorithm 3 is used to find the optimal path between the CHs.

    Algorithm 3:Inter-cluster communication procedure Input:SC: set of solutions; S0 :initial solution; V (SC) :subset solutions; OS :optimal solution; CS :current solution; OSC :optimal solution cost; CSC :current solution cost; J :jumper; I, R:Counter; Output:Construct_ inter-cluster communication paths Initialization:OS ← S0 ; CS ← S0 ; CSC ← CS0 ; OSC ← CS0 ; I ←0 ; R ←0 ; Begin While (I < iterations number) do {test of max of iterations number for selecting the best path in the current round } If (R < = J) Then { jump test} U ← Rand [ V (SC)]; { randomly select a new path from a subset} If (CSC (U) < OSC) Then OS ← U ; Else R ← R + 1; End If; CS ← OS ; I ← I + 1; Else U ← Rand [ SC- V (SC)] {randomly select a new solutions from another subset} If (CSC (U) < OSC) Then OS ← U ; End If; CS ← OS ; I ← I + 1; R ←0; End If; End While; End.

    In this phase,the objective of the proposed protocol is to reduce the number of nodes directly communicating with the BS by forming paths of communication between CHs.these paths reduce the data transmission distance from the CHs to the BS,passing by several jumps.

    Data transmission phase

    After running the two previous procedures,the BS sends all the information obtained to begin intra-cluster and inter-cluster data transmission.The steps of this phase are:

    ? Activate the radio of the CHs and nodes that want to send the data according to their TDMA;

    ? Put off the radio of the other ordinary nodes;

    ? Communication from ordinary nodes to CHs (intra-cluster);

    ? When the CHs receive data from all members of the group,they perform data processing functions (aggregation and data compression);

    ? The CHs transmit aggregated and compressed data to BS according to multi-hop communication using the optimal found solution (inter-cluster).

    5 Simulation & results

    5.1 Simulation settings

    To validate the performance of our proposed approach,we use the MATLAB language as a simulation environment.We have kept the same energy model as well as the same hypotheses previously assumed.Two parameters are chosen to evaluate the proposed protocol,which are the consumed energy and the number of live nodes.We named our proposed protocol “EEOFRSJ” (Energy-Efficient clustering protocol for WSNs using an Objective Function and Random Search with Jumps).

    In the simulation,we use a network of 100 nodes distributed over an area of 100*100 m2.The position of the BS is outside the surveillance zone at location (50,150).In each round,the live nodes transmit one packet of data.In our simulation,the size of the data packet is 1000 bits.Each node has initial energy equal to 0.1 J.For the contribution of both sub-objectivesf1andf2to be equal,we choosew=0,5.There is no stopping criterion,the simulation only ends when all the nodes consume all their energy.Tab.3 summarizes all the simulation parameters taken in this simulation.

    Our simulation is divided into two parts:

    First part

    In this part,we evaluate the performance of EEOFRSJ and compare its performance with EEFCM [Hadjila,Guyennet and Feham (2013)] using the same simulation parameters shown in the Tab.3.

    Second part

    In order to show the impact of scalability on EEOFRSJ,we performed other simulations using the same parameters (Tab.3) with different networks sizes.We compared EEOFRSJ with EEFCM varying the network size between 300 nodes and 600 nodes.

    Table3:Simulation parameters

    5.2 Results of simulation and analysis

    The results obtained are shown in the following figures:

    Fig.6 shows the simulation results of the energy consumption of nodes in each round for our protocol EEOFRSJ compared with EEFCM protocol.

    Figure6:Energy consumption vs. number of rounds

    Fig.7 represents a comparison between both protocols in term of number of the live nodes in each round.

    Figure7:Number of live nodes vs. number of rounds

    Fig.8 and Fig.9 represent the variation of energy consumption with respect to the number of rounds in different networks containing respectively 300 nodes and 600 nodes for both protocols.

    Figure8:Energy consumption in a 300-node WSN vs. number of rounds

    Figure9:Energy consumption in a 600-node WSN vs. number of rounds

    The last two figures show the simulation results of live nodes according to the number of rounds in different networks.

    Figure10:Number of live nodes in a 300-node WSN vs. number of rounds

    Figure11:Number of live nodes in a 600-node WSN vs. number of rounds

    5.3 Results analyses

    We performed several simulations (20 times) of EEOFRSJ routing protocols using the same simulation parameters.The results of the above figures represent an averaging of these simulations.

    We observe from the simulation result shown in Fig.6 that EEFCM protocol consumes a lot of energy compared to our EEOFRSJ protocol.

    The simulation results in Fig.7 show that the first node dies in EEFCM protocol after 1411 rounds,but after 1500 in EEOFRSJ protocol.We also observe that the last node dies in EEFCM protocol after 1751 rounds,while in EEOFRSJ protocol,the last node dies after 1812.

    According to the simulation results shown in Fig.8 and Fig.9,EEOFRSJ shows higher efficiency in term of both consumption energy and network lifetime compared with EEFCM protocol.This is due to the effectiveness of the objective function used for selecting the best CHs as well as also the algorithm used for data transmission from CHs to BS.

    In Fig.10 and Fig.11,we observe that EEOFRSJ consumes lesser energy and it has a long network lifetime compared with EEFCM protocol.EEOFRSJ maintained the same high efficiency compared to EEFCM protocol even with higher network sizes.We can deduce that our approach fits better with a large-scale network.

    6 Conclusion

    In WSNs,the concept of clustering is particularly effective when faced with the problem of energy consumption.In this paper,we have proposed an approach called EEOFRSJ which consists firstly of forming clusters by using an objective function based on the distance between ordinary nodes and their CHs,as well as their residual energy.The mode of data transmission to the BS is based on a random search algorithm with jumps.The results of the simulations show that our protocol has better performance compared to EEFCM protocol in terms of energy consumption and network lifetime.In addition,the scalability of the EEOFRSJ protocol is also verified by simulation.As a future work,we suggest the comparison of our protocol with other WSN clustering protocols,including more affecting simulation parameters,and testing them in mobile WSNs.

    90打野战视频偷拍视频| 久久精品国产亚洲av涩爱| 在线观看人妻少妇| 国产主播在线观看一区二区 | 欧美日韩视频精品一区| 美女主播在线视频| 欧美黄色淫秽网站| 欧美xxⅹ黑人| 国产成人精品无人区| 五月开心婷婷网| 欧美激情极品国产一区二区三区| 看免费成人av毛片| 色94色欧美一区二区| 波野结衣二区三区在线| 啦啦啦 在线观看视频| 男女免费视频国产| 18在线观看网站| 欧美日韩一级在线毛片| 国产一区二区在线观看av| 男人操女人黄网站| 少妇人妻久久综合中文| 亚洲国产欧美在线一区| 国产成人av激情在线播放| 9色porny在线观看| 在现免费观看毛片| 日韩一区二区三区影片| 又黄又粗又硬又大视频| 欧美精品啪啪一区二区三区 | 亚洲伊人久久精品综合| 制服诱惑二区| 大香蕉久久成人网| 欧美日韩一级在线毛片| 亚洲免费av在线视频| 亚洲精品乱久久久久久| xxx大片免费视频| 狠狠婷婷综合久久久久久88av| 国产野战对白在线观看| 亚洲第一av免费看| 精品视频人人做人人爽| 18禁观看日本| 1024香蕉在线观看| kizo精华| 一本一本久久a久久精品综合妖精| 亚洲精品美女久久久久99蜜臀 | 久久ye,这里只有精品| 亚洲 欧美一区二区三区| h视频一区二区三区| 日本欧美视频一区| 男女床上黄色一级片免费看| 欧美激情 高清一区二区三区| 久久人妻熟女aⅴ| 这个男人来自地球电影免费观看| 免费观看a级毛片全部| 99热网站在线观看| 伦理电影免费视频| 欧美日韩一级在线毛片| 欧美日韩视频精品一区| 亚洲av男天堂| 国产97色在线日韩免费| 少妇人妻 视频| 男女边吃奶边做爰视频| 精品久久久精品久久久| 亚洲中文字幕日韩| 亚洲成人免费电影在线观看 | 国产成人影院久久av| 国产色视频综合| 久久午夜综合久久蜜桃| 50天的宝宝边吃奶边哭怎么回事| 国产一区亚洲一区在线观看| 在线av久久热| av网站在线播放免费| 欧美中文综合在线视频| 亚洲美女黄色视频免费看| 亚洲国产欧美在线一区| 天堂8中文在线网| 99久久99久久久精品蜜桃| www日本在线高清视频| 一边摸一边做爽爽视频免费| 三上悠亚av全集在线观看| 久久久国产欧美日韩av| 男女床上黄色一级片免费看| 亚洲成色77777| 久久人妻福利社区极品人妻图片 | 欧美人与性动交α欧美软件| 亚洲精品一卡2卡三卡4卡5卡 | 久久精品国产综合久久久| 麻豆乱淫一区二区| a级毛片黄视频| 99九九在线精品视频| 精品国产超薄肉色丝袜足j| 亚洲国产精品国产精品| 日韩电影二区| 美女高潮到喷水免费观看| 大话2 男鬼变身卡| 亚洲激情五月婷婷啪啪| 777米奇影视久久| www.熟女人妻精品国产| 午夜免费鲁丝| 五月天丁香电影| 热re99久久精品国产66热6| 精品亚洲乱码少妇综合久久| 另类亚洲欧美激情| 十八禁网站网址无遮挡| 另类亚洲欧美激情| 九草在线视频观看| 亚洲av日韩在线播放| 中文欧美无线码| 国产一区二区三区av在线| 日本猛色少妇xxxxx猛交久久| 国产一区亚洲一区在线观看| 欧美国产精品va在线观看不卡| videos熟女内射| 亚洲精品美女久久久久99蜜臀 | 丰满饥渴人妻一区二区三| 午夜福利乱码中文字幕| 宅男免费午夜| 少妇裸体淫交视频免费看高清 | 一区二区三区精品91| 国产欧美日韩精品亚洲av| 在线看a的网站| 亚洲五月婷婷丁香| 性少妇av在线| 青青草视频在线视频观看| 男男h啪啪无遮挡| 美女国产高潮福利片在线看| 中文乱码字字幕精品一区二区三区| 丝瓜视频免费看黄片| 国产精品九九99| 一级,二级,三级黄色视频| 性少妇av在线| 99国产精品99久久久久| 亚洲欧美一区二区三区国产| 国产在线免费精品| 一级毛片我不卡| 欧美精品亚洲一区二区| 国产精品免费视频内射| 天天躁狠狠躁夜夜躁狠狠躁| www.999成人在线观看| 黄色一级大片看看| 久久久久久久久久久久大奶| 色婷婷av一区二区三区视频| 男女高潮啪啪啪动态图| 国产精品 欧美亚洲| 久久99热这里只频精品6学生| 国产黄色视频一区二区在线观看| 在线观看人妻少妇| 天天添夜夜摸| 一区在线观看完整版| 成年女人毛片免费观看观看9 | 美女扒开内裤让男人捅视频| 91精品国产国语对白视频| 国产黄色视频一区二区在线观看| 嫩草影视91久久| kizo精华| 亚洲国产欧美一区二区综合| 一级毛片 在线播放| 久久久精品94久久精品| 在现免费观看毛片| 久久久久久久大尺度免费视频| 性高湖久久久久久久久免费观看| 嫁个100分男人电影在线观看 | 日本91视频免费播放| 人妻 亚洲 视频| 国产精品av久久久久免费| 国产精品亚洲av一区麻豆| 久久热在线av| 日韩一区二区三区影片| tube8黄色片| 黄色视频不卡| 一区二区三区精品91| xxx大片免费视频| av电影中文网址| 亚洲国产精品成人久久小说| 国产三级黄色录像| 国产人伦9x9x在线观看| 狠狠精品人妻久久久久久综合| 久久精品国产亚洲av高清一级| 国产精品一区二区在线不卡| 久久久国产欧美日韩av| 欧美人与性动交α欧美精品济南到| 成人永久免费在线观看视频| 他把我摸到了高潮在线观看| www国产在线视频色| 久久国产精品影院| 黑丝袜美女国产一区| 日韩欧美在线二视频| 亚洲成人久久性| 亚洲无线在线观看| 精品无人区乱码1区二区| 亚洲午夜理论影院| 两个人免费观看高清视频| 国产黄色小视频在线观看| 麻豆国产av国片精品| 欧美久久黑人一区二区| 国产精品1区2区在线观看.| 亚洲男人天堂网一区| 午夜福利在线观看吧| 可以免费在线观看a视频的电影网站| 9191精品国产免费久久| 色在线成人网| 亚洲av熟女| 亚洲国产中文字幕在线视频| 国产乱人伦免费视频| 一a级毛片在线观看| 久久中文字幕人妻熟女| 亚洲成人久久爱视频| 中文字幕高清在线视频| 一级a爱片免费观看的视频| 午夜福利在线观看吧| 人妻久久中文字幕网| 99国产精品一区二区三区| 国产一区二区三区视频了| 精华霜和精华液先用哪个| 午夜亚洲福利在线播放| 亚洲一区高清亚洲精品| 一本大道久久a久久精品| 日本五十路高清| 国产三级黄色录像| 在线观看日韩欧美| 中文字幕av电影在线播放| 老司机靠b影院| 在线天堂中文资源库| 一级作爱视频免费观看| 丁香六月欧美| 999久久久国产精品视频| 90打野战视频偷拍视频| xxxwww97欧美| 一本大道久久a久久精品| 精品国产一区二区三区四区第35| 国产精品 国内视频| 国产av一区在线观看免费| 日韩免费av在线播放| 亚洲精华国产精华精| 色播在线永久视频| 天堂√8在线中文| 最新在线观看一区二区三区| 亚洲全国av大片| 最近最新免费中文字幕在线| 国产伦一二天堂av在线观看| av有码第一页| 两个人看的免费小视频| 丰满的人妻完整版| 美女扒开内裤让男人捅视频| 久久国产乱子伦精品免费另类| 一本一本综合久久| 午夜两性在线视频| 最近最新免费中文字幕在线| 岛国在线观看网站| 欧美日韩亚洲综合一区二区三区_| 午夜成年电影在线免费观看| 日日摸夜夜添夜夜添小说| 国产精品久久电影中文字幕| 久久国产精品影院| 91成年电影在线观看| 欧美国产日韩亚洲一区| 久久久久久九九精品二区国产 | 黄色女人牲交| 欧美日韩福利视频一区二区| 成人精品一区二区免费| 麻豆久久精品国产亚洲av| 久久久久久久久久黄片| 可以在线观看的亚洲视频| 亚洲一区二区三区不卡视频| 一a级毛片在线观看| 久久久国产成人免费| www日本在线高清视频| 国产av不卡久久| 欧美成人免费av一区二区三区| 妹子高潮喷水视频| 久久久久国内视频| 中文字幕高清在线视频| 国产高清激情床上av| 麻豆国产av国片精品| 一本大道久久a久久精品| 日韩欧美一区视频在线观看| 欧美成狂野欧美在线观看| 色播在线永久视频| 久久天堂一区二区三区四区| 亚洲成a人片在线一区二区| 欧美乱码精品一区二区三区| 色综合亚洲欧美另类图片| 国产麻豆成人av免费视频| 欧美乱色亚洲激情| 亚洲精品久久成人aⅴ小说| 久久香蕉激情| 婷婷亚洲欧美| 美女高潮到喷水免费观看| 成人亚洲精品av一区二区| 悠悠久久av| 天天添夜夜摸| 久久伊人香网站| 午夜视频精品福利| 精品免费久久久久久久清纯| 美女扒开内裤让男人捅视频| 身体一侧抽搐| 国产精品av久久久久免费| 久久午夜综合久久蜜桃| 男人舔奶头视频| 一个人观看的视频www高清免费观看 | 在线观看免费日韩欧美大片| 久久久久久久久中文| 波多野结衣av一区二区av| 午夜福利在线观看吧| 真人做人爱边吃奶动态| 无遮挡黄片免费观看| 老鸭窝网址在线观看| 国产精品电影一区二区三区| 男女午夜视频在线观看| 亚洲一码二码三码区别大吗| 日韩大尺度精品在线看网址| 国产三级在线视频| 一区二区三区精品91| 9191精品国产免费久久| 国产私拍福利视频在线观看| 黄色片一级片一级黄色片| 好看av亚洲va欧美ⅴa在| 在线观看一区二区三区| a在线观看视频网站| 在线观看舔阴道视频| 国产91精品成人一区二区三区| 成年人黄色毛片网站| 日日摸夜夜添夜夜添小说| 日韩欧美国产一区二区入口| 精品久久久久久久毛片微露脸| 一卡2卡三卡四卡精品乱码亚洲| 在线观看免费视频日本深夜| 午夜福利18| 国产精品 国内视频| 一本精品99久久精品77| 老司机在亚洲福利影院| www.999成人在线观看| 国产国语露脸激情在线看| 成年版毛片免费区| 久久久国产欧美日韩av| 午夜福利在线观看吧| 久久久久免费精品人妻一区二区 | 欧美色欧美亚洲另类二区| 大型黄色视频在线免费观看| 一级作爱视频免费观看| 男人舔女人的私密视频| 国产熟女午夜一区二区三区| 久久久久久九九精品二区国产 | 亚洲精品av麻豆狂野| 亚洲av成人av| 久久 成人 亚洲| 国产精品一区二区三区四区久久 | 亚洲国产看品久久| 欧美成人免费av一区二区三区| 国产成人系列免费观看| 欧美成人免费av一区二区三区| 亚洲国产精品999在线| 在线av久久热| 国产真人三级小视频在线观看| 欧美中文日本在线观看视频| 巨乳人妻的诱惑在线观看| 成年女人毛片免费观看观看9| 亚洲美女黄片视频| 亚洲成国产人片在线观看| 午夜影院日韩av| 十分钟在线观看高清视频www| 2021天堂中文幕一二区在线观 | 男女下面进入的视频免费午夜 | 婷婷精品国产亚洲av在线| 99久久国产精品久久久| 男女午夜视频在线观看| 久久久久国产一级毛片高清牌| 国产野战对白在线观看| 免费看日本二区| 久久久国产欧美日韩av| 色综合欧美亚洲国产小说| 欧美在线黄色| 丰满人妻熟妇乱又伦精品不卡| 男女做爰动态图高潮gif福利片| 法律面前人人平等表现在哪些方面| avwww免费| 成人亚洲精品av一区二区| 一a级毛片在线观看| 国产激情久久老熟女| av欧美777| 国产久久久一区二区三区| 久热这里只有精品99| 99热这里只有精品一区 | 一二三四在线观看免费中文在| 99久久无色码亚洲精品果冻| 精品不卡国产一区二区三区| 亚洲成av人片免费观看| 国内少妇人妻偷人精品xxx网站 | 国产欧美日韩一区二区精品| 999久久久国产精品视频| 午夜老司机福利片| 日本五十路高清| 欧美黄色淫秽网站| 日韩精品免费视频一区二区三区| 成人18禁在线播放| 亚洲精品色激情综合| 怎么达到女性高潮| 露出奶头的视频| 国产亚洲精品一区二区www| 黄频高清免费视频| 午夜激情av网站| 午夜福利在线观看吧| 久久香蕉精品热| 亚洲成av人片免费观看| 亚洲 国产 在线| 在线看三级毛片| 在线视频色国产色| svipshipincom国产片| 香蕉av资源在线| 精品一区二区三区av网在线观看| 国产黄a三级三级三级人| 一区二区三区国产精品乱码| 久久人妻福利社区极品人妻图片| 曰老女人黄片| 国产精华一区二区三区| 一区二区三区高清视频在线| 亚洲成a人片在线一区二区| 国产精品久久久av美女十八| 国产久久久一区二区三区| 久久中文看片网| 怎么达到女性高潮| 亚洲狠狠婷婷综合久久图片| 欧美绝顶高潮抽搐喷水| 老鸭窝网址在线观看| 亚洲熟女毛片儿| 国产熟女午夜一区二区三区| 女人高潮潮喷娇喘18禁视频| 99热这里只有精品一区 | 国产99白浆流出| 午夜精品久久久久久毛片777| 大型黄色视频在线免费观看| 免费看日本二区| 国产主播在线观看一区二区| 淫妇啪啪啪对白视频| 国产精品久久久久久精品电影 | 99国产综合亚洲精品| 欧美绝顶高潮抽搐喷水| 免费看十八禁软件| 亚洲成人久久性| 无人区码免费观看不卡| 久久国产精品男人的天堂亚洲| 日韩欧美在线二视频| 在线免费观看的www视频| 欧美最黄视频在线播放免费| 久久中文字幕一级| 国产精品一区二区精品视频观看| 男人操女人黄网站| 国产三级在线视频| 日本在线视频免费播放| 一二三四社区在线视频社区8| 亚洲中文日韩欧美视频| 国内毛片毛片毛片毛片毛片| 亚洲精品一卡2卡三卡4卡5卡| 久久九九热精品免费| 少妇粗大呻吟视频| e午夜精品久久久久久久| 国产又爽黄色视频| xxx96com| 亚洲狠狠婷婷综合久久图片| 99久久99久久久精品蜜桃| 精品一区二区三区四区五区乱码| 亚洲国产欧美网| 18禁黄网站禁片免费观看直播| 久久精品国产亚洲av高清一级| 成人永久免费在线观看视频| 露出奶头的视频| 日日摸夜夜添夜夜添小说| 十八禁网站免费在线| 九色国产91popny在线| 欧美午夜高清在线| 亚洲欧美精品综合久久99| 亚洲国产毛片av蜜桃av| 女警被强在线播放| 精品一区二区三区视频在线观看免费| 一个人观看的视频www高清免费观看 | 亚洲 欧美一区二区三区| 他把我摸到了高潮在线观看| 熟女少妇亚洲综合色aaa.| 91成人精品电影| 午夜激情福利司机影院| 国产成人欧美| 两性夫妻黄色片| 在线观看www视频免费| 久久精品成人免费网站| 国产乱人伦免费视频| 国产精品久久久久久人妻精品电影| 免费在线观看视频国产中文字幕亚洲| a级毛片a级免费在线| 一级毛片高清免费大全| 国产午夜精品久久久久久| 99精品在免费线老司机午夜| 亚洲精品美女久久av网站| 日本一本二区三区精品| 久久久久久久久久黄片| 久久热在线av| 欧美黄色片欧美黄色片| 国产aⅴ精品一区二区三区波| 黄色女人牲交| 国产人伦9x9x在线观看| 一本大道久久a久久精品| 琪琪午夜伦伦电影理论片6080| 少妇熟女aⅴ在线视频| 91国产中文字幕| 波多野结衣高清无吗| 法律面前人人平等表现在哪些方面| 亚洲av成人av| 在线十欧美十亚洲十日本专区| 18禁裸乳无遮挡免费网站照片 | 久久久久九九精品影院| 韩国精品一区二区三区| 国产久久久一区二区三区| 国产午夜精品久久久久久| 女性被躁到高潮视频| 亚洲色图 男人天堂 中文字幕| 波多野结衣av一区二区av| 精品第一国产精品| 国产精品自产拍在线观看55亚洲| 婷婷精品国产亚洲av| 日韩有码中文字幕| 在线观看一区二区三区| 免费观看精品视频网站| 亚洲七黄色美女视频| 国产一级毛片七仙女欲春2 | 亚洲精品色激情综合| 国产伦在线观看视频一区| 俺也久久电影网| 日韩欧美国产一区二区入口| 国产av一区在线观看免费| 国产亚洲欧美在线一区二区| 精品福利观看| 无人区码免费观看不卡| 日韩欧美一区二区三区在线观看| 色综合婷婷激情| 色精品久久人妻99蜜桃| 伊人久久大香线蕉亚洲五| 校园春色视频在线观看| 日韩三级视频一区二区三区| 不卡av一区二区三区| tocl精华| 中文字幕人成人乱码亚洲影| 啦啦啦韩国在线观看视频| 亚洲av第一区精品v没综合| 身体一侧抽搐| 欧美日韩亚洲国产一区二区在线观看| 亚洲精品国产精品久久久不卡| 在线十欧美十亚洲十日本专区| 国产欧美日韩一区二区精品| 中文字幕人成人乱码亚洲影| 丁香六月欧美| 久久天躁狠狠躁夜夜2o2o| 伊人久久大香线蕉亚洲五| 国产精品永久免费网站| 免费高清在线观看日韩| 精品不卡国产一区二区三区| 十分钟在线观看高清视频www| 88av欧美| www日本在线高清视频| 国产真实乱freesex| 久久亚洲精品不卡| 国产亚洲精品综合一区在线观看 | 中文在线观看免费www的网站 | 成年女人毛片免费观看观看9| 亚洲精品美女久久久久99蜜臀| 岛国在线观看网站| 可以在线观看的亚洲视频| 成人三级黄色视频| 日日夜夜操网爽| 日韩av在线大香蕉| 日韩欧美国产一区二区入口| 观看免费一级毛片| 性色av乱码一区二区三区2| 身体一侧抽搐| 亚洲国产中文字幕在线视频| а√天堂www在线а√下载| 国产av又大| 色婷婷久久久亚洲欧美| 久久久久国内视频| 亚洲国产欧美日韩在线播放| 日韩欧美免费精品| 女性被躁到高潮视频| 后天国语完整版免费观看| 久久久国产欧美日韩av| 熟女少妇亚洲综合色aaa.| 日本精品一区二区三区蜜桃| 看片在线看免费视频| 狠狠狠狠99中文字幕| 亚洲成人免费电影在线观看| 国产区一区二久久| 在线永久观看黄色视频| 看黄色毛片网站| 亚洲五月天丁香| 男人舔奶头视频| 正在播放国产对白刺激| 亚洲国产精品999在线| 亚洲成a人片在线一区二区| 淫妇啪啪啪对白视频| 国产成人欧美| 俺也久久电影网| 亚洲色图av天堂| 欧美黑人巨大hd| 欧美乱色亚洲激情| 国内毛片毛片毛片毛片毛片| 91在线观看av| 免费观看人在逋| 不卡av一区二区三区| 亚洲av第一区精品v没综合| 欧美国产精品va在线观看不卡| 欧美激情高清一区二区三区| 天天一区二区日本电影三级| 男女视频在线观看网站免费 | 午夜福利高清视频| e午夜精品久久久久久久| 日韩成人在线观看一区二区三区| 99久久综合精品五月天人人| 精品国产一区二区三区四区第35| 国产成人啪精品午夜网站|