• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart Security Framework for Educational Institutions Using Internet of Things(IoT)

    2019-11-07 03:12:12AfzalBadshahAnwarGhaniMuhammadAhsanQureshiandShahaboddinShamshirband
    Computers Materials&Continua 2019年10期

    Afzal Badshah,Anwar Ghani,Muhammad Ahsan Qureshi and Shahaboddin Shamshirband

    Abstract:Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.

    Keywords:Internet of things,smart security framework,massacres,terrorism,smart emergency alert.

    1 Introduction

    Educational institutions massacres are the severe threat to security in increasing terrorist attacks.These are easy targets.The recent history reveals that thousands of children have been killed in such as attacks.In 2004,334 students killed and 783 were injured in Beslan School Siege,Russia.In 2000,191 students were killed and hundreds were injured in Walisongo School in Indonesia.In 1990,158 students were killed and hundreds were injured in Eastern University,Srilanka.In 2016,153 students were killed and hundreds were injured in Army Public School Peshawar,Pakistan.

    Numbers of security system have been devolved.Security agencies have launched the number of initiatives to notify the attack on the institutions immediately.Emergency mobile phone numbers,alarm systems,and smart security cameras installed.Instead of spending billions of assets on security,no new technologies have been adopted to undertake these issues smartly.All these existing systems need to be updated to the new demands of threat and technology.The basic alarm system is not a valid solution for increasing attacks on educational institutions.To safeguard our children and assets,a smart alarming system must be installed in institutions[Tsakalozos,Verroios,Roussopoulos et al.(2017)].

    IoT is becoming very popular in academia and day to day life as an emerging intelligent technology,in which smart devices are connected to the cloud.It uses the idea of fog and cloud computing to process a large amount of data.Its basic concept is to connect the smart devices to the cloud through the internet.IoT facilitates users to take the whole world on the smartphone.IoT is changing human lives by making it smart and easy.Data management,wireless communications,and real-time decisions are the key features of IoT.There has been a great deal of IoT research on different applications,such as smart homes,e-health systems,wearable devices,etc.According to the Industrial Analytical Firm(IAF),it is expected that about 50 billion devices will be connected to the internet up to 2020.Embedded technology is used in devices and sensors.Wireless technology enables them to connect with other devices or internet[Vermesan and Friess(2014)].

    Smart home,smart e-health,and smart cities are popular topics in recent years,but Smart Security Frameworks have not been well investigated.IoT is the ideal technology to deal with such issues.The most beneficial is that existing infrastructure such as security cameras and control rooms may be utilized to convert them to the SSF.

    The main contribution of this article is

    ●To design an SSF for educational institutions to instantly notify the concern departments to resist or to minimize the disaster.

    ●To remotely monitor and control the sensors and security devices during normal or in operational conditions to get full control over it at any time and from any place.Not only to monitor them but also to remotely program and configure all these devices.

    ●Collecting and analyzing data of all sensors and security devices to make smart decisions during an emergency or in abnormal situations.

    Figure 1:Data flow diagram of smart security framework

    In the proposed SSF,different types of sensors,security threat detectors,and security cameras are used.These devices are connected to the Emergency Control Room(ECR)and Central Emergency Control Center(CECC)by wire and wireless technologies.In an emergency situation,the proposed system instantly notifies the concerns within a second and starts all sensors and security cameras streaming to ECR.Panic button,installed on the smart watch,is used to activate the SSF manually.Fig.1 shows the data flow of Smart Security Framework.

    SSF uses several types of algorithms to get data from all installed security devices.These algorithms help to categorize the alert.An alarm is issued to the concern departments with live streaming.The CECC is the centralized place in the region.CECC has members from police,rescue and ambulance services.Live updates and attack nature is displayed on monitoring screens.All top stack holders control and monitor the operation from that centres to make smart decisions.Tab.1 shows the symbols used in formulation.

    The rest of the paper is arranged as follows.Section 2 reviews the related work on IoT,sensors and security systems.Section 3 discusses the proposed SSF model,different types of sensors,ECR and CECC for SSF.Section 4 discusses the proposed algorithms for the smart alerting system,smart decision and alarms.Section 5 discusses the experimental setup.The proposed system simulation was run for numbers of times to demonstrate the supremacy of the proposed approach.Finally,Section 6 concludes all work.

    Table 1: Symbols used in the article

    2 Related work

    IoT is getting a full range of attention in today academia and market.Sensors are making this world smarter.Smart security systems are getting more attention due to the wide spread of terrorism.In Advanced Safety Life Support System,different sensors is used[Lei,Liao,Huang et al.(2010)].The system gathers different information such as contactless fingerprint and vein sensor,the intelligent detector of moving objects,the self-management security system on a Web and the 3D facial shape measurement system etc.This is a lowcost security system and can be installed by those organizations that cannot support costly security system.This work is limited only to the fingerprint security.Cho et al.designed low power CMIOS Image Sensor with a variable resolution technique for a smart security[Cho,Kim,Sohn et al.(2016)].CIS is based on the high-resolution mode.During normal conditions,the pixel of the picture drops to one-fourth of the original pixels.When any movement is detected,the high pixel is restored,and data is being transmitted to the server.In normal conditions,no data is transmitted to the server to save the cost.This work is limited only to video streaming and cost saving in security systems.

    Radio Frequency(RF)is widely used in security projects.Bhawana et al.[Bhawna and Shweta(2017)]used RF to design a smart threat alert system.They proposed an emergency alert system combined with IoT to overcome some drawbacks of present EASs.It uses various types of detectors to identify transmission of various frequencies.They used Raspberry Pi to generate and detect different types of transmissions.This work is limited to radio frequency detection only.The same RF technology was used[Ruinian and Capurso(2017)]to design smart shopping system.The first time,UHFRFID was used to enhance the shopping experience and security issues.They developed a prototype to test the smart shopping system.With a smart cart system,billing can be conducted from the shopping cart itself,preventing customers from waiting in a long queue at the checkout.This work is limited to shopping billing security.This article helped us in SSF framework creation.

    Now a day,IoT is widely used in electricity grids and electrical appliances.It is the primary market of the IoT industry.Guneet Bedi discussed the specific role of IoT in different smart systems[Guneet,Ganesh,Rajendra et al.(2018)].They provided a detailed assessment of the technical parameters of IoT.IoT reduces energy wastage and generates savings.it improves the efficiency,reliability,resiliency,security,and sustainability of the electric power networks.This article helped us to get familiar with IoT devices and its working.Li et al.[Li and Dong(2018)]developed a deep learning framework for large data coming from IoT sensors deployed in the complex environment.Because the nodes have limited capabilities of processing and storing,so they worked on the offloading framework to increase the performance of deep learning applications with edge computing.This article helps us how to process a large amount of data coming from different smart devices.Shoaib et al.[Shoaib,Havinga,Paul et al.(2016)]discussed the use of smoke sensors in smart devices,Deve et al.[Deve,Hanacke and Silva(2016)]discussed a smart system for fire detection and notification.Junhui et al.[Junhui and Guorong(2016)]worked on metal detectors.Alharbi et al.[Alharbi and David(2018)]discussed the motion detectors and lighting system for the city.Packet Tracer is the CISCO devices based network simulator.In its 7 versions,they have embedded IoT simulation tools.It is widely used for IoT devices simulation.Vijaya[Vijaya(2016)]discussed the use of Packet Tracer for different networking projects.They introduced a structured learning approach to learn Packet Tracer.These structure clear students in use of physical devices like router,access points,switch and their configurations.They introduced errors deliberately to remove errors in the simulations.In our proposed framework,we used Packet Tracer to simulate and evaluate the proposed framework.This article helped us in Packet Tracer usage.

    3 System model

    SSF uses IoT,fog and cloud concepts.IoT devices sense the environment.This data is further forwarded toward fog cloud servers.In case of alerts or request,this is streamed to cloud centers.Higher authorities take decisions according to the sensing data.The great type of decisions and operations depends on the good type of sensing and communicating data to the control centers.In this section,we evaluated the functioning of the proposed framework.This could be precise advantageous to combine IoT into safety and emergency alerting schemes.Several sorts of sensors are utilized to implement the SSF.All the sensors remain active and connected to the internet round the clock.Fig.2 shows the proposed structure of the Smart Security Framework.

    Figure 2:Proposed structure of smart security framework

    3.1 Smart sensor board

    Smart Sensor Board is a circuit board which has different types of sensors.Every sensor board has pressure,temperature,humidity,smoke,motion,flames and high-sensitive voice sensors.Smart board uses embedded technology.Algorithms are used to transmit its data to the ECR and to the CECC.Other smart security tools such as smart metal detectors,the smart walk through gats,smart alarm system and also security cameras are used.In case of any exceptions,it automatically notifies the concern admins.Smart sensor board uses Algorithm 1 to initialize the SSF.Tab.2 shows the threshold values used in the experimental setup.

    3.1.1 Temperature sensor

    The temperature fluctuates during flames,firing or explosion.This fluctuation is used to categorize the alert and to determine the reason.ECR is alerted if the temperature rises from the initial threshold value.An emergency alert is sent to the CECC if the temperature rises from the second threshold value.The temperature reading is continuously displayed on the ECR display board.

    Table 2: Threshold values used in article

    3.1.2 Vibration/wind sensor

    Firing or explosion produces a strong wave force.Vibration sensors in smart board detect any type of vibration in the walls.The “x” and “y” vibration can easily be detected and categorized that what object has hit the wall.This vibration helps the CECC team to categorize the type of alert.If vibration increases from the first threshold,an alert is sent to ECR and if passes by the second threshold value,CECC is notified.

    3.1.3 Light sensor

    Light fluctuates during flames,firing,and explosion.These fluctuations help to categorize the nature of the alert.

    3.1.4 Smoke sensor

    Smoke is the indication of flames or firing.In the case of fire,it timely informs the concern authorities.If the smoke crosses the initial threshold value,ECR is alerted,secondly,CECC is notified.Smoke reading is continuously displayed on the ECR display board.

    3.1.5 Sound sensor

    The intensity of sounds not only help to alert the smart security system in an emergency but also help the CECC officials to categorize the alert.It also helps during operations.voice recognition software may also be used to categorize firing,explosions and screaming.

    3.1.6 Air pressure sensor

    During the analysis of the nature of the alert,an air pressure sensor plays a good part.If the air pressure sensor is forcefully activated,it clearly shows that some explosion has taken place.Air pressure fluctuations also help to categorize the alert.

    3.1.7 Metal detector

    The smart metal detector and walk through gates are placed on the entrance.If metal is detected on someone entry,ECR is notified.This also helps to monitor the security guards too,because most of the security guards do not properly scan the people at the entrance.On such phenomenon,security guards may be directed to rescan the person.

    3.1.8 Panic button

    The panic button is installed on the smart watch.It is a traditional button instead of touch functionality.More than one person has the smart watch panic button so to press it instantly in case of any attack or danger.

    Type of alert may be classified by different sensors data such as the temperature,light intensity,wave shocks,value of smoke,and intensity of sound etc.

    3.2 Emergency control room

    Fog computing is the edge of IoT and cloud computing.Instead of sending all data to the cloud for processing,primarily,it is send to local devices for processing.The ECR uses the concept of fog computing.This saves the cost of sending all streaming to cloud servers.Although CECC may access the gateway any time to monitor the situations.All the sensors,metal detectors,security cameras,emergency alarm and the panic button is connected to ECR.All initial alerts is notified to ECR.

    For the proposed simulation,we are using the following threat categorization techniques to categorize the alert.Implementers' or organization may alter it according to the requirements and sensitivity of the security.

    Eq.(9)shows the situation when anyone sensor reading crosses the first threshold values.If temperature,smoke,vibration or noise little bit increases from the normal situation then ECR is notified.

    Eq.(10)shows the situation when almost all sensors reading crosses the first threshold values.If temperature,smoke,vibration or noise all reading increases from the normal situation then ECR and CECC is notified.

    Eq.(11)shows the situation when sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold value then ECR as well as CECC is notified.

    Eq.(12)shows the situation when almost all sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold values then CECC is notified.

    Eq.(13)shows abnormal attacked position in the institutions.CECC is informed in such like situations.

    3.2.1 Smart watch

    A panic button is installed on the smart watch.It is a traditional button which can be pressed easily,instead of a touch sensor.It has all the smartphone sensors and Wi-Fi connection.When the panic button is pressed,all the smart watch sensors are activated and data is automatically streamed to the ECR and CECC.More than one person has the smart watch button due to security issues.

    3.2.2 Smart phone

    The ECR applications are also run on several smartphones to instantly generate an alert.Smartphones are popularly used devices today.In the proposed scenario they are connected with the ECR.All sensors can be accessed on a smartphone.In case of an emergency,its application opens automatically to categorize the threat.If the user fails to respond,the system automatically categorizes the threat.

    3.2.3 Laptop

    The smart home gateway is used to integrate all the smart devices.This gateway is connected to the laptop to monitor the system.LCD monitor may also be used to monitor the system.The laptop is used tomake changes in connections,functions or algorithms.3.2.4 Security cameras

    Smart security cameras are the most important part of the security systems.The modern Digital Video Recorder(DVR)has advance types of software which help in threat detection.Smart cameras are used to record the videos,detect any motions,detect faces and also for voice alerts.In educational institutions,because there are too many students,so we are not going to use its voice and face recognition functionality for threat detection.In case of any alert,cameras streaming is directed to the CECC.In normal situations,video streaming is not forwarded to the CECC to save the cost and traffic load.Security cameras existing functionality may be used to get alert at ECR.

    3.2.5 Emergency gate

    Every organization has emergency doors and gates for emergency exit.In an emergency,it is not possible to manually open these doors for the exit.We have proposed to attach these doors and gates with SSF.In SSF,as the alert is notified,all the connected emergency doors get open automatically.

    3.3 Cloud server

    The IoT and cloud,both services work together.IoT has billion of devices and produces massive data.Cloud computing provides the infrastructure to process and store this large amount of data.In an emergency call,the cloud server starts to receive live streaming from different sensors.With the help of different algorithms,the nature of the attack is categorized.Notifications are sent to concern departments.Incoming streaming is directed toward CECC.

    3.4 Central emergency control center

    CECC is a building or room where all emergency alerts are received from the region.Every district has its own CECC.CECC guarantees a 24/7 service through a complex communications' system.It also uses the emergency numbers to receive emergency phone calls.CECC permits the police,the armed forces,civil protection department and the rescue department to take urgent action.Initially,CECC is monitored by an operator.In case of an emergency,stockholders officer take the control of CECC.CECC has the representatives of police,the ambulance services,the fire brigade,and rescue services.Live streaming of all the sensors are shown in CECC.All concern stack holders monitor the issue.They manage the response to the alert.Hospitals are updated according to the situations.

    Figure 3:Conditional data flow of smart security system

    4 Proposed algorithms

    The proposed system notifies the concerns in case of an emergency.Fig.3 shows the conditional flow of the proposed framework.In the normal situation,data is only streamed to the ECR situated within the organization to save the network cost.Although,CECC may get the live streaming of sensors any time.In case of an alert detection,all sensors data is directed to the CECC.Fig.3 shows the conditional data flow of Smart Security Framework

    An Algorithm 1 is embedded in smart-board and ECR.It reads temperature,pressure,smoke,motion and sounds etc.If the values increase from the threshold values,emergency notification is sent to the ECR and CECC and the smart emergency alarm starts ringing.

    Algorithm 2 works in Emergency Control Room and in home-gateway.As emergency accrues,alert categorization application automatically opens on smartphones and ECR alarm starts ringing to categorize the alert.If the user fails to respond to the application,It automatically sends the alert to CECC.

    Algorithm 3 is used in CECC.As the alert is received,CECC starts to get data from all the sensors placed in different locations.According to the data,the nature of alert is categorized.Notification and live streaming are issued to the concern departments.

    5 Experimental setup and evaluation

    This section first describes the experimental setup and then presents the performance evaluation of the proposed framework.We used Cisco Packet Tracer 7 and Java,which is popularly used simulation tool for IoT network simulation.Cisco Packet Tracer 7 is specially designed to simulate IoT applications.This package includes different IoT devices,sensors,gateways and IoT servers for simulation.

    5.1 Experimental setup

    In the laboratory setup,we distributed the work into three layers.In the first layer,all sensors read the environment.On the second layer,fog computing technologies are utilized to analyze these data and send an alarm to the ECR&CECC.On the third layer,all the concern departments and CECC works.All the sensors are remotely monitored and controlled and smart decisions are made.Fig.4 shows the simulation structure of Smart Security Framework.

    Figure 4:Simulation structure of smart security framework

    5.1.1 Sensor board

    Several types of sensors are connected to Microprocessor Control Unit(MCU).MCU is a small circuit board,which have links to install sensors on it.Using IoT cable,we connected temperature,motion,smoke,sound sensors and also the panic button to it.We programmed the MCU using java language to read data from all the connected sensors and transmit it to the ECR.To make the sensor board remote connection with the home gateway,IP address is assigned to the home gateway and set the MCU default gateway as the home gateway.We programmed the MCU to transmit its reading toward the home gateway.

    5.1.2 Emergency control room

    After making all connections,we connected the MCU board with home gateway.The home gateway is a wireless switch device,which can connect numbers of devices.It uses the fog computing concepts to process initial data on edge before sending it to the cloud.Digital Video Recorder(DVR),which has connections to numbers of cameras,are also connected to the home gateway.Home gateway has a wireless card to easily connect wireless devices to it.Laptop,smartphone,and smart watch are connected to the home gateway to get notifications from all sensor devices during on warning.Sirens installed in different locations of the institution are also connected to the home gateway.This emergency alarm ring during any alert.MCU circuit boards are used to connect emergency doors to the home gateway.In case of an emergency,all emergency doors open automatically.The laptop is used to get access to the home gateway and to implement programs on different sensor devices.It also facilitates to impose different types of conditions on the sensors and other connected IoT devices.To monitor SSF,we first converted the home gateway as IoT server.To implement the program,we opened the IoT monitor application,registered gateway as IoT server.The same application helps to program and executes the devices remotely.We wrote proposed algorithms here to get detail monitoring data from different sensors and to analyze that data.ECR and CECC are notified as any threat is detected.For example,when the panic button is pressed it instantly play the emergency alarm at ECR and CECC.

    5.1.3 Central emergency control center

    We used switches to create different departments.CECC is the central place where all the security devices are monitored.When a warning is identified,its emergency alarm starts ringing.The concern location is monitored online to get detail information about any warning.CECC has the authorization to access the local gateway.Alarm and the display screens are connected with the MCU board.Laptop and smartphone are also connected to the internal switch.MCU is programmed to receive notification from all over security devices.When an alert is received,the alarm system starts ringing.

    5.2 Evaluation of proposed system

    The proposed system is tested for different types of Alerts.We examined its functionality and performance.Average results of different tests are shown in below tables.Fig.5 shows the snapshot of CISCO Packet Tracer results.

    Figure 5:Running time of IoT devices

    Tab.3 describes the test of a motion sensor.To check the operation of a motion sensor,we switched the Packet Tracer to simulation mode and brought the Alt+Mouse closer to it which is the default trigger of the motion sensor.As we brought it closer,the emergency alarm system of ECR started ringing.Same movement option is displayed on CECC.Packet Tracer result shows that the response time of the motion sensor is 0.01 seconds while the transfer time to the emergency alarm is 1.557 seconds.

    Table 3: Motion sensor test

    Tab.4 explains the working of a metal detector.To evaluate the performance of the metal detector,we run the Packet Tracer in simulation mode and brought the metal closer to the metal detector which is its default trigger.As we brought it closer,the emergency alarm system of ECR started ringing.Packet Tracer results show that the response time of the metal sensor is 0.01 seconds.Transfer time of metal sensor signal to CECC is 2.19 seconds.

    Table 4: Metal sensor

    Tab.5 displays the functioning of a temperature sensor.Temperature sensor reads the temperature of the current environment and detail is sent to the ECR.A check has been placed on temperature to ring the alarm if the temperature passes by 50C.Temperature sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of metal sensor signal to CECC is 1.226 seconds.

    Table 5: Temperature reader

    Tab.6 shows the working of a smoke sensor.The smoke sensor detects the smoke of current environment and detail is shown on ECR display.A check has been placed on smoke to ring the alarm if the smoke crosses 50 pp.The smoke sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of the metal sensor signal to CECC is 1.524 seconds.

    Table 6: Smoke sensor

    Tab.7 demonstrates the working of the panic button.To check the panic button,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the emergency alarm of ECR and CECC started ringing.Packet Tracer result shows that the response time of the panic button is 0.01 seconds and the transfer time of the emergency signal to CECC is 1.674 seconds.

    Table 7: Panic button

    Tab.8 shows the operations of security cameras.Security cameras video is displayed 24/7 at ECR.The video is streamed to CECC only in emergency detection.However,CECC may watch this online streaming at any time.To assess the working of security cameras,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the security cameras video is directed toward the server.Packet Tracer result shows that the response time of security camera is 0.01 seconds and the transfer time of the emergency signal to CECC is 0.111 seconds.

    Table 8: Security cameras

    Tab.9 represents the working of emergency gates.We have connected one door to the Smart Security Framework to check it is working.Emergency gates are open only on an emergency call.To check the working of the emergency gate,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the gates open automatically.Packet Tracer result shows that the response time of gate is 0.01 seconds.

    Table 9: Emergency doors

    Tab.10 shows the different protocols used by different devices during transmission.We used the ping command to note the protocol used and time taken in the transfer.Fig.5(d)shows that when the IoT protocols and micro-controller are used the transfer time increases.

    Table 10: Protocol used in simulation

    Fig.9 shows the results of Packet Tracer.We checked it only for the ping command to note down the total time taken in request transfer.Tab.10 shows the protocol used in communication.The result shows that transfer time increases where MCU is used.It also uses the IoT protocol to communicate.In the proposed simulation,we are keeping the wire length constant.The result shows that the transfer time also increases if we increase intermediate communication nodes.

    Figure 6:Packet Tracer simulation results

    The above result and discussion shows that SSF is very good initiative towards instant notification about security issues.Security departments will be able to instantly move toward the threat direction.With this setup,control centers official will be able to properly guide the operation to minimize the losses.

    6 Conclusion and future work

    In this article,Smart Security Framework(SSF)has been introduced for educational institutions.The recent past massacres have taken many precious lives.This might be depreciated by adopting an efficient and smart alerting system.SSF is efficient and intelligent in alerting concerns in case of an emergency.Different types of sensors are placed in different locations of the building,reading environment 24/7.In case of any warning detection,an alert is sent to the Emergency Control Room(ECR)and also to Central Emergency Control Center(CECC).Smart emergency doors are connected with the proposed system which automatically opens in case of any alert detection.SSS is not confined only to the educational institutions,it may also be used in any other organizations for security objects.Our future plane is to extend this framework for the Smart Security Framework for the City(SSSC).In the SSSC,sensors will be placed in streets,public places and especially religion places to notify the concern on time.

    最黄视频免费看| 日本a在线网址| 又紧又爽又黄一区二区| 久久影院123| av在线播放精品| xxxhd国产人妻xxx| 9191精品国产免费久久| 久久人人爽av亚洲精品天堂| 欧美97在线视频| 欧美黑人精品巨大| 女人被躁到高潮嗷嗷叫费观| 精品亚洲乱码少妇综合久久| 黑人欧美特级aaaaaa片| 两个人看的免费小视频| 天堂8中文在线网| 真人做人爱边吃奶动态| 一本大道久久a久久精品| 国产免费一区二区三区四区乱码| 亚洲av片天天在线观看| 真人做人爱边吃奶动态| 中文字幕色久视频| 国产精品av久久久久免费| 国产免费一区二区三区四区乱码| 狂野欧美激情性xxxx| 99精品久久久久人妻精品| 精品一区二区三区四区五区乱码 | 亚洲精品日韩在线中文字幕| 国产精品久久久人人做人人爽| 久久人人97超碰香蕉20202| 国产深夜福利视频在线观看| 超碰97精品在线观看| 高清av免费在线| 欧美日韩亚洲国产一区二区在线观看 | 亚洲九九香蕉| 国产黄色免费在线视频| 日本一区二区免费在线视频| 成人国产av品久久久| 亚洲欧美日韩另类电影网站| 18禁观看日本| h视频一区二区三区| 午夜免费成人在线视频| 亚洲国产成人一精品久久久| 丝袜脚勾引网站| 国产99久久九九免费精品| 亚洲精品久久午夜乱码| 日韩大片免费观看网站| 日本wwww免费看| 中文字幕人妻熟女乱码| 丝袜美腿诱惑在线| 亚洲,欧美,日韩| 美女视频免费永久观看网站| 老司机深夜福利视频在线观看 | 18禁国产床啪视频网站| 午夜福利,免费看| 老司机在亚洲福利影院| 男人爽女人下面视频在线观看| 亚洲欧美日韩高清在线视频 | 欧美黑人精品巨大| 亚洲国产精品国产精品| 国产一区有黄有色的免费视频| 婷婷色av中文字幕| 乱人伦中国视频| 日韩制服丝袜自拍偷拍| 下体分泌物呈黄色| 老司机亚洲免费影院| 午夜福利影视在线免费观看| 9热在线视频观看99| 日韩av免费高清视频| 精品久久蜜臀av无| 亚洲一码二码三码区别大吗| 人妻人人澡人人爽人人| 国产视频首页在线观看| 人成视频在线观看免费观看| 日本av免费视频播放| 在线av久久热| 国产成人一区二区三区免费视频网站 | 成人亚洲欧美一区二区av| 大话2 男鬼变身卡| 美女午夜性视频免费| 91成人精品电影| 午夜两性在线视频| 看免费av毛片| www.熟女人妻精品国产| 别揉我奶头~嗯~啊~动态视频 | 欧美黄色淫秽网站| 大型av网站在线播放| 美女大奶头黄色视频| 亚洲视频免费观看视频| 18禁国产床啪视频网站| 精品国产一区二区三区四区第35| 久久久久久久大尺度免费视频| 日韩一区二区三区影片| 美女福利国产在线| 亚洲情色 制服丝袜| 伦理电影免费视频| 午夜激情久久久久久久| 首页视频小说图片口味搜索 | 午夜福利一区二区在线看| 少妇粗大呻吟视频| 久久人人爽av亚洲精品天堂| 欧美日韩亚洲综合一区二区三区_| 久久久精品免费免费高清| 国产淫语在线视频| 日韩欧美一区视频在线观看| 日韩电影二区| 中文字幕亚洲精品专区| 国产日韩欧美亚洲二区| 精品一区二区三卡| 亚洲成人国产一区在线观看 | 日本五十路高清| 中国国产av一级| 满18在线观看网站| 18禁观看日本| 80岁老熟妇乱子伦牲交| 亚洲成av片中文字幕在线观看| 久久人妻熟女aⅴ| 亚洲欧洲国产日韩| 日韩一卡2卡3卡4卡2021年| 亚洲国产精品一区三区| www.精华液| 成年女人毛片免费观看观看9 | 大片电影免费在线观看免费| 校园人妻丝袜中文字幕| 啦啦啦在线观看免费高清www| 精品一区二区三区av网在线观看 | 精品国产超薄肉色丝袜足j| 丝袜喷水一区| 国产精品免费视频内射| 超碰97精品在线观看| 97人妻天天添夜夜摸| 首页视频小说图片口味搜索 | 国产高清国产精品国产三级| 国产有黄有色有爽视频| 精品一品国产午夜福利视频| 飞空精品影院首页| 日韩免费高清中文字幕av| 久久国产精品人妻蜜桃| netflix在线观看网站| av片东京热男人的天堂| 一级毛片女人18水好多 | 看十八女毛片水多多多| 欧美成狂野欧美在线观看| 视频在线观看一区二区三区| 如日韩欧美国产精品一区二区三区| 欧美日韩一级在线毛片| 国产精品 国内视频| 最新在线观看一区二区三区 | 蜜桃国产av成人99| 成人午夜精彩视频在线观看| 无遮挡黄片免费观看| av在线app专区| 在线观看www视频免费| 亚洲一区中文字幕在线| 久久精品久久久久久久性| 欧美国产精品va在线观看不卡| 男人舔女人的私密视频| 熟女av电影| 黄色视频不卡| 天天操日日干夜夜撸| 国产成人一区二区三区免费视频网站 | 亚洲国产欧美一区二区综合| 久久九九热精品免费| 久久精品亚洲av国产电影网| 国产精品人妻久久久影院| 国产一区二区 视频在线| 精品国产一区二区久久| 久久这里只有精品19| 亚洲国产av新网站| 国产精品亚洲av一区麻豆| 自拍欧美九色日韩亚洲蝌蚪91| 中国国产av一级| 99久久99久久久精品蜜桃| 午夜福利影视在线免费观看| 妹子高潮喷水视频| 久久精品aⅴ一区二区三区四区| 99国产精品免费福利视频| 久久精品国产亚洲av高清一级| 久久精品久久久久久噜噜老黄| 首页视频小说图片口味搜索 | 欧美日韩亚洲高清精品| 国产伦理片在线播放av一区| 免费人妻精品一区二区三区视频| 丰满迷人的少妇在线观看| 老汉色∧v一级毛片| 国产在线免费精品| 美女扒开内裤让男人捅视频| 久久久久网色| 国产又色又爽无遮挡免| 一区在线观看完整版| 好男人视频免费观看在线| 欧美+亚洲+日韩+国产| 久久人妻福利社区极品人妻图片 | 午夜福利视频在线观看免费| 久久精品成人免费网站| 丝袜美足系列| 亚洲欧美色中文字幕在线| 伊人亚洲综合成人网| 国产精品一区二区在线不卡| 欧美成人精品欧美一级黄| 在线精品无人区一区二区三| 久久久久久亚洲精品国产蜜桃av| 国产片特级美女逼逼视频| 久久国产精品男人的天堂亚洲| 免费高清在线观看日韩| 日本vs欧美在线观看视频| 女性被躁到高潮视频| 尾随美女入室| 成人三级做爰电影| av线在线观看网站| 精品福利永久在线观看| 国产免费一区二区三区四区乱码| 欧美老熟妇乱子伦牲交| 日韩av免费高清视频| 亚洲av综合色区一区| 一级毛片黄色毛片免费观看视频| 国产精品免费大片| 狠狠精品人妻久久久久久综合| 国产熟女欧美一区二区| 久久99热这里只频精品6学生| 国产深夜福利视频在线观看| 亚洲一区二区三区欧美精品| 91九色精品人成在线观看| 国产精品久久久人人做人人爽| av福利片在线| 韩国高清视频一区二区三区| 国产有黄有色有爽视频| av天堂久久9| av天堂在线播放| 日韩av在线免费看完整版不卡| 高清不卡的av网站| 亚洲视频免费观看视频| 熟女少妇亚洲综合色aaa.| 午夜视频精品福利| 一级片免费观看大全| 少妇猛男粗大的猛烈进出视频| 美女午夜性视频免费| 在线观看免费午夜福利视频| 一边摸一边做爽爽视频免费| 人成视频在线观看免费观看| 中文字幕高清在线视频| 亚洲av美国av| 国产成人啪精品午夜网站| 久久精品国产a三级三级三级| 免费女性裸体啪啪无遮挡网站| 国产视频首页在线观看| 国产高清视频在线播放一区 | 精品久久久久久久毛片微露脸 | 欧美日韩精品网址| 每晚都被弄得嗷嗷叫到高潮| 一本一本久久a久久精品综合妖精| 这个男人来自地球电影免费观看| 欧美中文综合在线视频| 欧美日韩精品网址| 亚洲,欧美精品.| 一区二区三区乱码不卡18| 黄色a级毛片大全视频| 国产精品免费视频内射| 尾随美女入室| 国产国语露脸激情在线看| 欧美国产精品一级二级三级| 在线 av 中文字幕| 国产在线观看jvid| 男女下面插进去视频免费观看| 亚洲情色 制服丝袜| 晚上一个人看的免费电影| 亚洲成人国产一区在线观看 | 日本五十路高清| 巨乳人妻的诱惑在线观看| 黄色一级大片看看| 午夜福利在线免费观看网站| 亚洲黑人精品在线| 青草久久国产| 成人影院久久| 欧美日韩av久久| 国产伦理片在线播放av一区| 国产成人精品无人区| 国产成人啪精品午夜网站| 亚洲欧美激情在线| 人妻一区二区av| 国产精品秋霞免费鲁丝片| 精品少妇久久久久久888优播| 女性被躁到高潮视频| 国产欧美日韩一区二区三 | 亚洲欧美中文字幕日韩二区| 日韩 欧美 亚洲 中文字幕| 亚洲精品自拍成人| 国产成人av激情在线播放| 91成人精品电影| 亚洲国产欧美一区二区综合| 黑人欧美特级aaaaaa片| 丝瓜视频免费看黄片| 欧美日韩亚洲综合一区二区三区_| 性少妇av在线| 99国产精品一区二区三区| 久久天堂一区二区三区四区| 婷婷色综合大香蕉| 精品卡一卡二卡四卡免费| 天天影视国产精品| 最新的欧美精品一区二区| 久久ye,这里只有精品| 精品国产一区二区三区四区第35| 一级毛片 在线播放| 婷婷成人精品国产| 日本色播在线视频| 悠悠久久av| 最新的欧美精品一区二区| 曰老女人黄片| 欧美精品人与动牲交sv欧美| 国产老妇伦熟女老妇高清| 亚洲国产日韩一区二区| 人人澡人人妻人| 欧美变态另类bdsm刘玥| 各种免费的搞黄视频| 狠狠精品人妻久久久久久综合| 亚洲一区二区三区欧美精品| 亚洲精品一卡2卡三卡4卡5卡 | 色精品久久人妻99蜜桃| 中文乱码字字幕精品一区二区三区| 国产精品九九99| 精品一区二区三区av网在线观看 | 久久人人爽人人片av| 你懂的网址亚洲精品在线观看| 人人妻人人添人人爽欧美一区卜| 黄片小视频在线播放| 国产精品免费大片| 成年动漫av网址| 久久久精品国产亚洲av高清涩受| 国产亚洲一区二区精品| 久久天躁狠狠躁夜夜2o2o | 亚洲黑人精品在线| 九色亚洲精品在线播放| 中国美女看黄片| 久久久久网色| 在线看a的网站| 亚洲自偷自拍图片 自拍| 国产精品二区激情视频| www.熟女人妻精品国产| 国产xxxxx性猛交| 日韩中文字幕视频在线看片| 欧美97在线视频| 亚洲天堂av无毛| 亚洲欧美激情在线| 成年人黄色毛片网站| 韩国高清视频一区二区三区| 汤姆久久久久久久影院中文字幕| 美女国产高潮福利片在线看| 大型av网站在线播放| 久久99热这里只频精品6学生| 国产欧美日韩一区二区三 | 2018国产大陆天天弄谢| 乱人伦中国视频| 欧美日韩视频精品一区| 99热全是精品| 母亲3免费完整高清在线观看| 欧美性长视频在线观看| 精品免费久久久久久久清纯 | 交换朋友夫妻互换小说| 一边摸一边抽搐一进一出视频| 国产有黄有色有爽视频| 国语对白做爰xxxⅹ性视频网站| 亚洲精品美女久久av网站| 午夜免费鲁丝| 国产亚洲欧美在线一区二区| 99九九在线精品视频| 欧美日韩综合久久久久久| 国产精品三级大全| 午夜免费观看性视频| 美女主播在线视频| 纯流量卡能插随身wifi吗| 欧美日韩一级在线毛片| 99久久人妻综合| 婷婷色综合大香蕉| 99久久人妻综合| 日本一区二区免费在线视频| 十八禁高潮呻吟视频| 操美女的视频在线观看| 免费黄频网站在线观看国产| 亚洲精品乱久久久久久| 在线观看人妻少妇| e午夜精品久久久久久久| 精品亚洲成国产av| 久久久久久亚洲精品国产蜜桃av| 日本五十路高清| 十分钟在线观看高清视频www| 人人妻,人人澡人人爽秒播 | 免费久久久久久久精品成人欧美视频| 黄色一级大片看看| 久久99一区二区三区| 伦理电影免费视频| 欧美黑人精品巨大| 午夜日韩欧美国产| 欧美亚洲日本最大视频资源| kizo精华| 黄频高清免费视频| 久久ye,这里只有精品| 亚洲成人免费av在线播放| 十八禁人妻一区二区| 免费在线观看视频国产中文字幕亚洲 | 亚洲国产中文字幕在线视频| 欧美亚洲日本最大视频资源| 国产精品久久久久久人妻精品电影 | 波多野结衣av一区二区av| 青草久久国产| 国产片特级美女逼逼视频| 欧美激情极品国产一区二区三区| 国产成人一区二区三区免费视频网站 | 赤兔流量卡办理| 777米奇影视久久| 精品亚洲成a人片在线观看| 少妇人妻 视频| 涩涩av久久男人的天堂| 18禁裸乳无遮挡动漫免费视频| 久久人人97超碰香蕉20202| 国产成人91sexporn| 少妇 在线观看| 亚洲激情五月婷婷啪啪| 精品福利观看| 久久99精品国语久久久| 国产亚洲一区二区精品| 日本午夜av视频| 性色av一级| av福利片在线| 久久久国产欧美日韩av| 狂野欧美激情性xxxx| 日韩精品免费视频一区二区三区| 成年美女黄网站色视频大全免费| 精品久久久久久电影网| 日韩中文字幕欧美一区二区 | 黑人巨大精品欧美一区二区蜜桃| av片东京热男人的天堂| 日韩精品免费视频一区二区三区| 精品一区在线观看国产| 欧美人与善性xxx| 在线观看免费高清a一片| 国产精品一区二区在线观看99| 男男h啪啪无遮挡| 日韩,欧美,国产一区二区三区| 一级毛片女人18水好多 | 中文字幕精品免费在线观看视频| 精品免费久久久久久久清纯 | 亚洲一区二区三区欧美精品| 每晚都被弄得嗷嗷叫到高潮| 亚洲国产av影院在线观看| 国产精品久久久av美女十八| 中文字幕最新亚洲高清| 国产一区二区三区综合在线观看| 校园人妻丝袜中文字幕| 国产精品av久久久久免费| 日本欧美国产在线视频| 免费高清在线观看视频在线观看| 搡老岳熟女国产| av网站在线播放免费| 日韩欧美一区视频在线观看| 精品第一国产精品| 大香蕉久久网| 青春草亚洲视频在线观看| 99re6热这里在线精品视频| 国产日韩一区二区三区精品不卡| 日韩,欧美,国产一区二区三区| 日日夜夜操网爽| 香蕉丝袜av| 久久久久国产精品人妻一区二区| 国产黄色免费在线视频| 亚洲精品在线美女| 99久久精品国产亚洲精品| 亚洲第一av免费看| 国产精品一区二区免费欧美 | 观看av在线不卡| 新久久久久国产一级毛片| 免费久久久久久久精品成人欧美视频| 亚洲成人国产一区在线观看 | 一级毛片黄色毛片免费观看视频| 一边摸一边抽搐一进一出视频| 久久天躁狠狠躁夜夜2o2o | 久久久精品国产亚洲av高清涩受| 免费黄频网站在线观看国产| 国产成人啪精品午夜网站| 亚洲久久久国产精品| 国产1区2区3区精品| 欧美激情高清一区二区三区| 欧美成人午夜精品| 日韩伦理黄色片| 极品少妇高潮喷水抽搐| 777米奇影视久久| 国产精品国产av在线观看| 久久久久久久精品精品| 99精国产麻豆久久婷婷| 一级黄色大片毛片| 一区二区av电影网| 国产主播在线观看一区二区 | 午夜福利免费观看在线| 精品国产国语对白av| 高清黄色对白视频在线免费看| 777久久人妻少妇嫩草av网站| 视频在线观看一区二区三区| 久久人人97超碰香蕉20202| 成人三级做爰电影| 日韩,欧美,国产一区二区三区| 精品国产国语对白av| 亚洲国产欧美一区二区综合| 亚洲国产欧美日韩在线播放| 欧美黄色淫秽网站| 久久av网站| 丰满少妇做爰视频| 天天躁夜夜躁狠狠久久av| 另类精品久久| 亚洲成国产人片在线观看| 午夜免费男女啪啪视频观看| 日日爽夜夜爽网站| 国产精品久久久久久人妻精品电影 | av天堂久久9| 国产成人精品在线电影| www日本在线高清视频| 18在线观看网站| 久久人人97超碰香蕉20202| 熟女少妇亚洲综合色aaa.| 国产欧美日韩精品亚洲av| 一区二区三区乱码不卡18| 久久久久久久久久久久大奶| 久久久久久久国产电影| 亚洲免费av在线视频| 亚洲精品一二三| 国产成人a∨麻豆精品| 九草在线视频观看| 日韩免费高清中文字幕av| 视频在线观看一区二区三区| 亚洲精品一区蜜桃| 高清av免费在线| 欧美激情 高清一区二区三区| 黄片播放在线免费| 成年美女黄网站色视频大全免费| 亚洲三区欧美一区| 欧美黄色淫秽网站| 热99久久久久精品小说推荐| 中文字幕高清在线视频| 中国美女看黄片| 国产爽快片一区二区三区| 亚洲综合色网址| 在线精品无人区一区二区三| 咕卡用的链子| 久久九九热精品免费| 一个人免费看片子| 日本av手机在线免费观看| 免费高清在线观看日韩| 亚洲熟女毛片儿| 色婷婷av一区二区三区视频| 亚洲第一青青草原| 2021少妇久久久久久久久久久| 1024视频免费在线观看| 亚洲少妇的诱惑av| 久久人人爽av亚洲精品天堂| 精品免费久久久久久久清纯 | 女警被强在线播放| 赤兔流量卡办理| 99九九在线精品视频| 久久99精品国语久久久| 日本五十路高清| 欧美久久黑人一区二区| 你懂的网址亚洲精品在线观看| 国产日韩欧美视频二区| 首页视频小说图片口味搜索 | 亚洲欧美一区二区三区久久| 久久99精品国语久久久| 色精品久久人妻99蜜桃| 国产在线一区二区三区精| 美女扒开内裤让男人捅视频| 久久久国产精品麻豆| 秋霞在线观看毛片| 免费不卡黄色视频| 中文字幕人妻丝袜一区二区| 老司机深夜福利视频在线观看 | 久久精品久久精品一区二区三区| 精品国产一区二区三区久久久樱花| 亚洲欧美日韩另类电影网站| 成人国产av品久久久| 中文字幕制服av| 久久久久视频综合| 九草在线视频观看| 丝袜脚勾引网站| 性少妇av在线| 99国产精品免费福利视频| 2021少妇久久久久久久久久久| 日本av免费视频播放| 男人添女人高潮全过程视频| 高潮久久久久久久久久久不卡| 久久人妻熟女aⅴ| 在线亚洲精品国产二区图片欧美| 777米奇影视久久| 欧美日本中文国产一区发布| 亚洲午夜精品一区,二区,三区| 欧美日韩视频精品一区| 亚洲精品久久成人aⅴ小说| netflix在线观看网站| 日本av免费视频播放| h视频一区二区三区| 亚洲国产最新在线播放| 亚洲av国产av综合av卡| 亚洲av成人不卡在线观看播放网 | 国产精品一二三区在线看| 少妇人妻久久综合中文| 久久精品国产亚洲av涩爱| 中文乱码字字幕精品一区二区三区| av福利片在线| 亚洲精品一二三| 夜夜骑夜夜射夜夜干| 精品国产乱码久久久久久小说| 精品视频人人做人人爽| 热re99久久国产66热| 中文欧美无线码| 丝袜喷水一区| 一级毛片女人18水好多 | 热re99久久精品国产66热6| 美女扒开内裤让男人捅视频| 美女脱内裤让男人舔精品视频| 性色av一级|