• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    2021-12-10 11:57:14FarouqAliyuTarekSheltamiAshrafMahmoudLouaiAlAwamiandAnsarYasar
    Computers Materials&Continua 2021年10期

    Farouq Aliyu,Tarek Sheltami,Ashraf Mahmoud,Louai Al-Awami and Ansar Yasar

    1King Fahd University of Petroleum and Minerals,Dhahran,31261,Saudi Arabia

    2Transportation Research Institute(IMOB),Hasselt University,Hasselt,3500,Belgium

    Abstract:Fog computing(FC)is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network(close to the Internet of Things(IoT)devices).Fog nodes provide services in lieu of the cloud.Thus,improving the performance of the network and making it attractive to social media-based systems.Security issues are one of the most challenges encountered in FC.In this paper,we propose an anomalybased Intrusion Detection and Prevention System(IDPS)against Man-in-the-Middle(MITM)attack in the fog layer.The system uses special nodes known as Intrusion Detection System(IDS)nodes to detect intrusion in the network.They periodically monitor the behavior of the fog nodes in the network.Any deviation from normal network activity is categorized as malicious,and the suspected node is isolated.Exponentially Weighted Moving Average(EWMA)is added to the system to smooth out the noise that is typically found in social media communications.Our results(with 95%confidence)show that the accuracy of the proposed system increases from 80%to 95%after EWMA is added.Also,with EWMA,the proposed system can detect the intrusion from 0.25–0.5 s seconds faster than that without EWMA.However,it affects the latency of services provided by the fog nodes by at least 0.75–1.3 s.Finally,EWMA has not increased the energy overhead of the system,due to its lightweight.

    Keywords:Fog computing;man-in-the-middle attack;intrusion detection system and prevention system;network security;social media

    1 Introduction

    Lately,there is an explosion in the number of Things connected to the Internet[1].It is estimated that by the year 2025,the number of Internet of Things(IoT)devices may reach 21 billion[2].As a result,an overflow of data will be experienced at the cloud layer.Hence,the cloud will not provide service to the IoT effectively.Moreover,due to this increase in data,cloud servers consume more energy and time processing data of whom 40% could be processed physically close to the user[3].

    Due to the aforementioned problems,scientists proposed the deployment of a heterogeneous network close to the IoT devices.The network provides services to the IoT on behalf of the cloud.Thus,improving the system’s quality of service at an affordable rate.For example,Wu et al.[4]proposed a Fog Computing security as a Service(FCSS)system for information-centric social networks.The proposed system provides low-latency content filtering security service.In[5],the authors proposed a Fog Computing(FC)device called “Droplet” that is used as a distributed server for social network applications like Friendica[6].Abdurrahman et al.[7]used FC on the Hajj social network that manages pilgrims’activities in the Hajj season.The system provides services such as locating lost pilgrims,informing pilgrims on the bus timing,Hajj activities schedule,and other services at low latency.Other applications of FC in social media can be found in[8–10].

    Unfortunately,security in FC is becoming a great concern[11].One of the most notorious attacks in FC is man-in-the-middle(MITM)attack[12,13].A MITM attack is an insider attack where messages from the source node pass through a third party(attacker)before reaching the destination node while both the source and the destination are convinced that one is communicating directly with the other[14].The two main types of MITM attacks are passive and active attacks[15].A passive MITM attacker is only interested in the information transmitted.As such,he/she eavesdrops on the packets passing through without tempering with them,while an active attacker manipulates/modifies the packets received before forwarding them to the destination node.

    Some researchers[16,17],argue that the MITM could be the most prevalent attack on FC systems because it allows the attacker access to the information from the user as well as the cloud during the communication session.A recent research shows that MITM is very difficult to detect[18].Furthermore,an attacker is highly motivated to eavesdrop or temper with packets in an FC system because,in most cases,fog nodes process deeply personal information such as health information,and other sensitive information like the speed and destination of a vehicle,etc.It is easier for the attacker to attack the fog nodes than the server,since the fog nodes are resource-constrained devices.Traditional detection and prevention techniques for MITM attacks are impractical to implement in FC systems because fog nodes are often resource-constrained[19].Therefore,lightweight security techniques for detecting and preventing MITM attacks must be developed.

    In this paper,we extend our previous work on the development of IDPS for a MITM attack on a distributed FC system[1].The work focuses on MITM attacks at the fog layer,where one or more fog nodes are compromised and they serve as middlemen between the IoT nodes and the cloud.One of the most effective ways of preventing MITM is by packet encryption[20].It makes the packet useless and deters attackers.One recommended lightweight encryption technique is Advanced Encryption Standard(AES)[21],which we use in this paper.The contributions of this research are as follows:

    1)A novel IDPS for MITM in the fog layer of an FC system.

    2)Specialized nodes known as Intrusion Detection System(IDS)nodes for monitoring and probing the fog layer of an FC network.

    3)The use of Exponentially Weighted Moving Average(EWMA)[22,23]to overcome the noisy nature of the network.

    The remaining part of this paper is as follows:Section 2 is in two folds;Sections 2.1 and 2.2 provide a comprehensive literature review of the current Intrusion Detection Systems(IDS)and Intrusion Prevention Systems(IPS)available in the literature.Section 3 describes the proposed system,the network model,and the attacker model simulated in this paper.Section 4 discusses,in detail,the performance of the proposed system.Finally,Section 5 concludes the paper.

    2 Literature Review

    According to the International Organization for Standardization(ISO)and the International Electrotechnical Commission(IEC)[24];an Intrusion is the deliberate or accidental unauthorized access to information systems,networks,or a network-connected system.Tab.1 shows some network intrusions using Man-in-the-Middle(MITM)attacks and their mitigations.An Intrusion Detection System(IDS)is a system that detects attempted intrusion,or whether an intrusion is taking place,or has already occurred.An Intrusion Prevention System is a variant of IDS with active response upon intrusion,while an Intrusion Detection and Prevention System(IDPS)is a combination of IDS and IPS where IPS fends off attacks once they are detected by the IDS part of the system.

    Table 1:MITM vectors with their prevention and mitigations on traditional network

    Table 1:Continued

    The literature barely provides any solutions to insider threats like MITM for fog computing(FC)[46].This claim is supported by bibliometric analysis of the Web of Science database.We use the search term,“(intrusion detection AND fog)OR(edge AND intrusion detection)”.VOSviewer[47]is used to analyze the aforementioned database and as it shown in Fig.1,the MITM attack is not on the map.As such,this literature review touches on solutions in fog computing-related fields such as the Internet of Things(IoT),wireless sensor networks(WSN),cloud computing,etc.

    Figure 1:Bibliometric map of papers containing intrusion detection in fog computing

    The literature review section is divided into two subsections:Subsection 2.1 discusses the different Intrusion Detection Systems(IDSs),and Subsection 2.2 presents the different Intrusion Prevention Systems(IPSs)available in the literature.

    2.1 Man-in-the-Middle(MITM)Intrusion Detection Systems(IDS)

    An IDS is a passive system that detects,classifies,and alerts the network administrator of intrusions,attacks,or violations of the security policies[48].An IDS does not participate in mitigating or stopping the attack.To effectively detect MITM attacks,the behavior of nodes in the network must be observed.In a grey hole attack,the attacker forwards some of the packets while destroying others.Authors in[49]developed a technique for detecting grey hole attacks in Dynamic Source Routing(DSR)protocol.The system is a non-cryptographic technique.It compares the number of messages sent by a source and the number of messages received by a destination.When the receiver notices a difference in the two,it notifies an IDS node that the intermediate node is malicious.The IDS node,in turn,notifies other nodes in the network,thereby isolating the malicious node.

    On the contrary,unlike grey hole attacks,MITM attacks do not destroy packets.Therefore,the aforementioned technique cannot work for MITM attacks since all packets sent are eventually received at the destination.Authors in[50]proposed the use of packet arrival time to detect the possibility of an attack.The technique detects an attack along a path when the difference between the actual- and expected arrival time is greater than a threshold valueTdiff.However,using a fixed threshold to detect MITM attacks may be difficult because of the noisy and heterogeneous nature of an IoT network,which causes a wide variation in the arrival time of packets.

    Alternatively,Faria and Cheriton[51]proposed the use of signalprint to detect Masquerading and Resource Depletion attacks.A signalprint is analogous to a fingerprint in wireless devices.Each device has a unique signalprint.The authors argued that signalprint is;1)hard to spoof,2)strongly correlated with the physical location of clients,and 3)highly likely to have similar signalprints for packet bursts transmitted by a stationary node.In this technique,the server stores all Received Signal Strength Indicator(RSSI)of nodes in the network,which is appended to the packet automatically.The server then compares the RSSI in its database to that of the received packet;if the two differ by a threshold value,then the node is considered malicious.The authors used differential signal strength to ensure the development of a robust system.But it may still be difficult to account for the channel’s characteristics,especially in a noisy environment like offices where there are constant human activities.

    A packet experiencing a wormhole attack finds itself in a distant part of the network away from its destination[52].Glass and Portmann[53]developed a MAC-layer-based intrusion detection system.The system is designed to detect both MITM and Wormhole attacks.In this technique,the source and the destination secretly agree on the number of frames to be transmitted without acknowledgment.Therefore,an intruder is detected when it sends acknowledgment before the agreed number of packets are transmitted.The authors were able to show that with a small trade-off of bandwidth,their system provides accurate detection of attack events.

    Wang and Poster[54]proposed a network-based IDS to detect a wormhole attack using signed acknowledgment.The proposed system uses challenge-response acknowledgment,where the sender challenges the receiver with a message r and receiver adds a universally agreed secret value s,encrypt it with key k to form an acknowledgment packet {r,sk}.The receiver will carry out the same computation with the same values and compares it with the acknowledgment packet to determine whether the node is malicious.Since every packet has a unique acknowledgment,it is difficult for the adversary to carry out attacks undetected.However,the secret values and the encryption keys must be known by all legitimate nodes.

    Recently,artificial intelligence is being used in MITM IDS[55].Thamilarasu and Chawla[55]proposed an anomaly- and a network-based IDS for IoT using deep learning.The proposed system uses an independent integrated intrusion detection system that connects to the network and analyzes data at the transport layer.The system uses a virtual network client(VNC),a controller,and a connection prober:The VNC module is a client-based network emulator that is responsible for connecting with the IoT devices.The connection prober connects the VNC module with the connection prober.Then,the connection prober collects packets from the network and feeds them into a cache.The cache sends them to the data collection &transformation module,where they are reformatted.Finally,the reformatted data is fed to a feed-forward Deep Neural Network(DNN)developed using a Deep Belief Network(DBN),where intrusion detection takes place.The system was tested for opportunistic service attacks,black hole attacks,distributed denialof-service(DDoS)attacks,sinkhole attacks,and wormhole attacks using real-network traces.It shows an accuracy of approximately 98%.However,the system may incur overhead due to the IDS system replicating packets.In addition,machine learning has been used in developing IDS for fog computing[56,57].An et al.[56]proposed an IDS using an Extreme Learning Machine(ELM)called Sample Selected Extreme Learning Machine(SS-ELM).The technique uses the cloud to gather training samples from the fog nodes.The cloud then filters the samples and sends the samples worthy of training the fog nodes.The authors used KDD Cup 99 dataset.The authors show that SS-ELM outperforms the classical backpropagation algorithm and support vector machine(SVM)in terms of detection accuracy.In[57],the authors use a single-layer perceptron to develop an IDS that monitors attacks on the fog nodes rather than the network.The proposed system was tested and trained using Australian Defense Force Academy Windows Dataset(ADFA-WD)and Australian Defense Force Academy Linux Dataset(ADFA-LD).The proposed system shows 94% accuracy.However,the dataset trains the nodes on past events.Therefore,there is no guarantee that fog nodes can protect themselves from future attacks.

    2.2 Man-in-the-Middle(MITM)Intrusion Prevention Systems(IPS)

    An IPS is also known as Intrusion Detection and Prevention System(IDPS).It is an active system that detects and mitigates malicious activities in a network[58,59].A typical IDPS system uses anomaly detection,stateful protocol analysis,signature analysis,or a combination to detect cyberattacks.IDPS may be a single system or an amalgamation of many systems working together.

    Several works’techniques for securing IoT can be found in the literature[60–62].The most common way of preventing MITM attacks is by encrypting communication and isolating malicious and compromised nodes[46].However,the aforementioned solutions were designed for IoT systems(without fog computing).To the best of our knowledge,there are no standard security systems tailored for Fog computing in the market[46].

    Authors in[63]proposed an IoT-based authentication system.It is designed to guard against;man-in-the-middle,eavesdropping,replay attack,and key control attacks.The proposed system moved all computation to a Registration Authority(RA).An RA is a computer with more computational resources than IoT devices.Hence the IoT devices are alleviated from computation overhead due to authentication.The RA is tasked with the responsibility of authenticating and cataloging Things in the network.In a fog computing system,the fog nodes can be used as RAs.However,this will lead to a single point of failure as well as an increase in the complexity of the fog nodes.

    In[64],the authors adopted the public key cryptography employed for traditional Internet and IoT authentication scheme to cloud computing.However,Public Key Infrastructure(PKI)based authentication is not suited to Fog computing due to the cloud’s distance from the network’s edge.Also,the technique lacks scalability and efficiency.

    Authors in[65]view the fog computing architecture as a publish-subscribe system.The author developed a lightweight security solution for publish-subscribe protocol-based IoTs in Fog networks using Elliptic curve cryptography(ECC).The proposed technique reduces the number of handshakes and the size of messages transmitted in each handshake.Furthermore,ECC has a smaller size public key,which is convenient for the end devices.However,there is a computational overhead on the fog node.Thus,leading to energy consumption and an increase in latency.

    Truelink[66]is a true IDPS developed to guard IoT systems from wormhole attacks.The system consists of two phases:Rendezvous phase and Authentication phases.The earlier is part of the IDS subsystem,while the latter is part of the IPS subsystem.During the rendezvous phase,the sender and the receiver exchange nonce(αiandβj).The arrival time of the nonce helps the two nodes to deduce their adjacency.When there is a node in the middle of the duo,the transmission time will,in principle,be higher than a given threshold value.Hence,making stealth difficult for the attacker.In the Authentication phase,the sender(i)and the receiver(j)exchange sign messages(αiandβj).Thus,allowing both parties to mutually authenticate each other;as the source of the rendezvous packets.The proposed system assumes that arrival time is fixed,which is not the case in wireless networks.Often,the margin between the arrival times of malicious packets and the normal packets is narrow.

    Shafi,Saad,and Abdul proposed a software-defined network(SDN)based IDPS that works in both cloud and fog computing layer[67].The proposed system uses machine learning to detect the possibility of distributed denial of service(DDoS)in the network.The authors designed the SND controller for anomaly detection with three machine learning algorithms;Recurrent Multi-Layer Perceptron(MLP),Neural Network(RNN),and Alternate Decision Tree(ADT).Initially,the SDN controller uses RNN and MLP to vote “attack” or “normal”.In the event of a tie,the controller uses the ADT to break it.To mitigate the attack,the SDN controller issues an access list to the switches,who then serve as a sink for the incoming traffic from the blacklisted prefixes.The system is tested in both the cloud and the fog layer.The authors found that the proposed system performs better in terms of latency,throughput,and packet loss in the fog computingbased network.However,using three machine learning techniques will incur high overhead in memory and latency in both networks.

    Doshi,Mozaffari,and Yilmaz proposed a real-time host-based IDPS for DDoS in IoT[68].In the proposed system,IDS is deployed locally in each node.The nodes periodically analyze their neighbors using statistical techniques such as the mean and standard deviation,or upper and lower bounds of the packet transmission rate.When a node detects a deviation from the statistical data,the node carries out further analysis to determine the alarm’s accuracy.Then it localizes the threat.Finally,the node blocks the localized node.This technique has some limitations:The proposed system assumes that the network is static,which is not the case in most IoT-based networks—nodes come and go,and the topology is constantly changing.Also,it assumes that the behavior of the nodes in the network does not change over time.

    In Summary,a MITM attack can be investigated based on the following behaviors exhibited by a node:

    1)Change in content of a packet:This usually happens when malicious nodes deliberately alter transit packets.

    2)Delay in arrivals time of a packet:As a consequence of the malicious nodes copying passing by packets or modifying them,the arrival time of the packet to its destination increases.

    3)Change in the direction of a packet:The direction of a packet may be altered,especially in Wormhole attacks(which is a variant of MITM).Alternatively,the attacker may not know what to do with the packet if it has no complete knowledge of the protocol,this may also lead to the change in packet destination.

    In this paper,an IDPS system for MITM attack is proposed.The system has two types of nodes:Fog nodes and IDS nodes.The fog nodes are responsible for providing services to the IoT devices while the IDS nodes are special nodes known as IDS nodes that interrogate the fog nodes in the network and also observe their behaviors based on the three(3)outlined behaviors mentioned earlier to conclude whether a fog node is malicious.

    3 Proposed System

    The proposed system consists of two types of nodes in the fog layer:Fog nodes(FN)and Intrusion Detection System(IDS)nodes.Fig.2 shows a typical distributed fog network.Here,the Fog nodes receive requests from the IoT nodes,which are providing service on behalf of the cloud.Since the fog nodes are physically closer to the IoT nodes relative to the cloud,the network latency is reduced.Furthermore,they have more computing resources than the IoT nodes and can perform more complex tasks.

    Figure 2:A fog network

    The fog layer is the link between the IoT and the cloud layer.Depending on the design,the fog layer can connect to the cloud with one communication medium while using another to communicate with the IoT layer.Similarly,the same protocols or different ones can be used by the fog layer to connect with the cloud layer and the IoT layer.However,it is advantageous for the fog layer to use the same medium and protocol because it reduces the complexity of the design of the fog nodes.Also,it reduces the energy and latency of communication,since there is no need to convert packets format.

    The connection between the fog node and the cloud in most cases requires a change in medium and protocol stack.This is due to the long distance between them,may lead to significantly high latency.In this case,conversion from one protocol to another is worthwhile.In this paper,the performance of the fog layer is investigated when an IDPS is introduced.

    3.1 Network Model

    Fig.3 shows an application scenario for the proposed system.In Fig.3a,the fog nodes collect data from the IoT layer for service provision.Several services could be provided by the fog layer,for example;it can improve the connectivity of IoT nodes,provide social media analytics,and/or provide social media users with low-cost bandwidth.The nodes communicate over a wireless network.To ensure secure communication,the Advanced Encryption System(AES)is used by the nodes,which is an efficient encryption algorithm for Fog Computing(FC)and IoT[69].The latest ARM microcontrollers that are designed for IoT applications have an on-chip AES module[70].Also,Diffie-Hellman key exchange[71]is used by joining fog nodes to obtain a cryptographic key from the IDS nodes,which the IDS nodes obtained from the cloud.Like the fog nodes,the IDS nodes can communicate with the cloud but not with the IoT nodes.One or more IDS nodes can be deployed to observe a set/region of fog nodes.

    Fig.3a shows the framework of the proposed system and in Fig.3b shows the proposed system using OMNET++[72].The FNs are responsible for providing services to the IoT layer and the IDS nodes are responsible for;observing the network,detecting intrusion,and notifying other nodes in the network of impending threats.

    Figure 3:The proposed fog network(a)Application Scenario of proposed system(b)Simulation of proposed system

    3.2 Attacker Model

    In this model,we assume that the attacker carries out MITM in the fog layer.The attacker intercepts packets from the IoT,the fog layer,and the cloud.The attacker may have more resources than the fog nodes but fewer resources than the cloud.Also,the attacker may know about the existence of IDS nodes and the protocol they are using.However,he does not know the nature of the interrogation since it was chosen and pre-programmed before the deployment of the nodes.

    3.3 Proposed IDPS

    As shown in Fig.3,the IDS nodes observe the network by regularly interrogating the FNs.This is done through the use of interrogation packets.They are encrypted packets that consist of a prime number,which the FNs are expected to process and reply to the IDS node.The IDS node expects the receiver to decrypt the packet and multiply the payload by 2,then encrypt it and send the result back to the interrogator IDS node.Multiplication by 2 is chosen because it is easy.It is done by simply shifting the binary representation of the number to the left by one bit.When the IDS node receives the reply and compares the result with the original payload,it concludes whether the targeted FN is malicious.

    Moreover,the IDS also records the round-trip time(RTTpkt)of the interrogation packet.The target FN is considered a malicious node when its RTTpkt exceeds a certain threshold value.Finally,if the IDS node does not receive a reply(i.e.,RTTpkt = ∞),then it is assumed that the packet has been sent elsewhere in the network.There may be two reasons for such behavior,either the attacker is applying a wormhole attack,or the target node is ignorant of the network protocol.

    The algorithm in Fig.4 is the pseudocode describing how the IDS algorithm works.The IDS nodes send interrogation packets to FN one hope away from them,as shown by Line 8.The IDS then measures the roundtrip time(RTT).To smooth out the noise,EWMA is used,as shown in Line 15.This technique was not used in our previous paper[1].Whenever a given time(tout)is exceeded without the IDS node getting a reply,then the target node is deemed malicious.This is described by lines 19–24.However,when the packet is received on time,that is to say,RTTt0,this implies that the target node may have done some extra processing on the packet.To find out what the target node did to the packet the content is checked.Line 27 explains that the attack is probably a packet altering attack,or the attacker could not reply with the proper answer because they don’t know what to do with it(i.e.,lack of context).If the node replies with the correct answer,but the reply came after RTT exceeds t0,then the target node may have tried to alter other parts of the packet,or it has aborted the altering when it realized the packet is an interrogation packet.

    Line 37–42 shows how the IDS node alerts the fog nodes in its region about malicious nodes to ensure intrusion prevention.The IDS node broadcasts the ID of the malicious fog node to the fog nodes it manages.They add the culprit to their blacklists.Any node in the blacklist will be cut-off from the network.However,the IDS nodes still include it in their investigation in case the previous verdict was erroneous.Whenever a blacklisted node is found to be benign,is the IDS node removes from the blacklist.Then it notifies all nodes in its region to do the same.

    Tab.2 shows the Truth table that describes the rules followed by the IDS nodes.The rules help the IDS nodes to determine whether a node is malicious.The rules are as follows:(1)Δ>tout,whereΔis the instantaneous(EWMA computed)latency of the fog node under investigation,andtoutis time beyond which a packet is considered lost.(2)Δ>t0,where t0is the allowable network latency.(3)“Relaypktreceived”,checks whether the fog node’s reply to the investigation is received by the IDS,and(4)y /= x × 2,checks whether the answer replied by the fog node is correct.The fifth column of the table is the output.It is used to detect an attack.The last column of the table is the comment column that elaborates on why a combination of events is an attack or not an attack.The first five columns are Boolean with “1” representing true,which is affirming the heading of the column as the event that occurred and “0” otherwise.

    The algorithm in Fig.5 shows how the proposed system routes packets from the source to the destination.Nodes that are blacklisted by the IDS send their service requests to the cloud.They send their service to the cloud,because it is assumed that the cloud has abundant resources to protect itself from the attacker.Furthermore,this eliminates packet dropping on the account of the IDS wrongly classifying a benign FN as malicious.However,sending the packet to the cloud increases latency and energy consumption.But it is necessary because no FN in the fog layer will communicate with a supposed malicious node,as shown in Line 3.However,if the next hop is benign and the node is not found in the blacklist,then the packet is forwarded to it.The packet is forwarded until it reaches its destination.Since the nodes are deployed in a grid manner,packets are routed along the Y-axis towards the destination.Then the packets move along the X-axis until they reach their destination.This provides us with the shortest path since there are no diagonal connections in the network.Regarding the deployment of the proposed system,the IDS nodes acquire the key from the cloud and distribute them to the FNs.From then,on all packets are encrypted(excluding header)to prevent intrusion.

    Figure 4:Algorithm for the proposed IDS node

    4 Results

    We simulate the proposed system using OMNET++[72].We list the simulation parameters in Tab.3.We run the simulation for one thousand(1000)seconds,with a 95% confidence interval.Experiments are carried out to investigate the accuracy of the system developed in[1]and the accuracy of the proposed system with Exponentially Weighted Moving Average(EWMA).In addition,we compare the energy and latency of the two systems.The experiments are carried out using the deployment shown in Fig.3b.To fairly compare the two systems,we use the parameters in[1].For clarity,the technique used in[1]shall henceforth be referred to as No EWMA or NEWMA,while the technique in this paper shall be referred to as EWMA.

    In Eqs.(1)–(4)we calculate the following:

    Tcrypto:the latency for encryption or decryption,

    Prun:the power consumption of the MCU,

    Ecrypto:the energy consumed due to encryption or decryption and

    Psleep:the power consumption of the MCU when the Transceiver is sleeping.

    Table 2:Truth table for the IDS

    Figure 5:Routing algorithm

    4.1 Validation

    To validate the simulation,we use Eq.(5)to calculate the total time and it should be equal to the simulation time,where:

    P:packet size

    Nf_tx,Nf_rx:the number of transmissions and receptions in the fog layer respectively,

    Nc_tx,Nc_rx:the number of transmissions and receptions in the cloud layer respectively,

    Rf_tx,Rc_tx:transmission rates(Bps)for the fog and the cloud respectively,

    ρp:The Cumulative Time For The Processing And

    Ts:the cumulative time spent by the system sleeping.

    Table 3:Simulation parameters

    4.2 Accuracy

    This paper improves the proposed system in[1]by using EWMA on the IDPS’s input.Where the input is the latency of the interrogation packets that are sent to the fog nodes.Eq.(6)describes the EWMA for the IDPS in the proposed systems,where I is the instantaneous input,X(t-1)is the value from previous iterations,X(t)is the value of the present iteration,andλis the smoothing parameter.The smoothing parameter determines how long the effect of an input should last in terms of iteration,albeit its effect decays exponentially.Fig.6a shows the impact of EWMA on a unity input with each iteration.The input decays approximately to zero after 50,24,and 15 iterations,whereλis 0.1,0.2,and 0.3 respectively.This ability of EWMA to include past interrogation results helps it improve the performance of the proposed system.

    We compare EWMA with NEWMA,which is similar but does not account for noisy network environments.We use Eq.(7)to calculate the accuracy of the two systems at a PER of 0.1,which is a reasonable estimation for a noisy IoT environment[73,74].Tab.4 defines the terms in the equation.

    In Fig.6b,it can be seen that the EWMA outperforms NEWMA by 15%.This increase in accuracy is because the EWMA-based system decides includes the previous and the current input when classifying the fog nodes.However,it should be noted that the system accuracy degrades with an increase inλ.Asλincreases,only more recent interrogation results are considered.

    Another factor that affects the accuracy of the two systems is the noisiness of the network.Fig.6c investigates the accuracy of the proposed system in terms of PER.EWMA performs better than NEWMA,however,both systems degrade with an increase in PER.Fig.6d shows that the number of malicious MITM nodes in the networks has little or no effect on both systems.

    4.3 Energy

    Energy consumption is an important performance metric,especially for resource-constraint fog computing applications.NEWMA was simulated with a PER of 10% and then with a PER of 40%.Then,EWMA is simulated with all combinations ofλand PER for the values ofλ= 0.1,λ= 0.4,PER = 10%,and PER = 40%.These experiments are designed to investigate whether the proposed system can withstand high PER.

    Fig.7a shows the total energy consumption of all the fog nodes in the network.It can be seen that the energy consumption rate(i.e.,the slope)of the total energy consumed by fog nodes is the same in all cases where the PER is 0.1.However,the energy consumption rate increases as the PER increases to 0.4.Thus,we can conclude that the energy overhead of both networks is solely due to PER.The good news here is that adding EWMA to the system has improved the system accuracy without incurring energy overhead on the network.

    Figure 6:Accuracy of the proposed system compared to the accuracy of NEWMA(a)Decay of a value with iteration in EWMA(b)Accuracy of the system with change in λ(c)Accuracy at different packet error rate(PER),(d)Accuracy with number of malicious nodes

    Table 4:Definition of terms

    In Fig.7b,it can be seen that NEWMA has a higher energy consumption rate at PER =0.1 than at PER = 0.4.This anomaly is explained by Eq.(8):Since packet time-out(tout)?transmission time(ttx),then the smaller the value of PER,the larger the number of IDS investigation transmissions(N)to the fog nodes.In other words,when the channel is noisy,the IDS takes longer to finish an investigation round,because it has to wait fortoutseconds whenever a packet is lost,making the investigation session long.Hence,reducing the total number of investigation rounds and by extension,reducing the number of IDS’s transmissions.Next,to support this hypothesis,we carry out two identical simulations with PER = 0.1 and PER = 0.4,each for 1000 sec.The number of IDS investigation sessions are 467.8±1.62 and 395.8±1.84 at PER = 0.1 and PER = 0.4,respectively.

    Figure 7:Energy consumption of the proposed system compared to NEWMA(a)Energy consumption of Fog nodes(b)Energy consumption of IDS nodes(c)Total energy consumed by Fog nodes(d)Time response illustration of EWMA

    For the same reason,the EWMA-based system withλ= 0.1 and PER = 0.1(EWMA(λ=0.1PER=0.1)),and EWMA whereλ= 0.4 and PER = 0.1(EWMA(λ=0.4,PER=0.1))have the same energy consumption rate as NEWMA at PER = 0.1 as shown in Fig.7c.In addition,the delay in response of EWMA(λ=0.1,PER=0.1)and the high PER of EWMA(λ=0.4,PER=0.1)exacerbates the energy consumption overhead.This can be seen in Fig.7d where EWMA is tested with a uniform random variate which represents noise around the value of 0.5.The test showsλ= 0.1 gets closer to the mean value of 0.5 thanλ= 0.4,which oscillates.However,the accuracy ofλ=0.1 is at the expense of increased rise time.As shown in the figure,it can be seen that whenλ=0.1,it takes at least 20 iterations for the system to arrive at the mean.

    4.4 Latency

    One of the applications of fog computing is to reduce latency.The latency of service(LS)and the latency of detecting attacks(LDA)are investigated.The LS is the time it takes a request from the IoT layer to be serviced by fog nodes in the fog layer,while LDA is the time it takes the IDS node to detect an attack.The two latencies are investigated for NEWMA and EWMA with PER = 0.1 and PER = 0.4,and smoothing parametersλ= 0.1 andλ= 0.4.

    Fig.8a shows that both EWMA and the PER affect the latency of the proposed system.At the same PER,it can be seen that the system without EWMA has less latency than that with EWMA.Also,in the proposed system,we observe that the lower the PER the better the performance.In fact,when one observes the average latency of each experiment,it is clear that the smoothing parameter(λ)has little to no effect on the latency of service of the system.

    Figure 8:Latency of the proposed system compared to NEWMA(a)Latency of Services(b)Latency of Detection

    In Fig.8b shows that the average latency of the proposed system is slightly better with 0.5 s less in EWMA(λ=0.1,PER=0.1)and EWMA(λ=0.4,PER=0.1)than in NEWMA(λ=0.1)and NEWMA(λ=0.4).Moreover,we learn that the PER is inversely proportional to the latency of detection.This notion makes sense,since PER is the noise that prevents the system from accurately detecting an attack.Thus,the system needs more samples(of investigation)to make a detection.Hence,making the attack detection slower.

    5 Conclusion

    In this paper,an intrusion detection system for Man-in-the-Middle(MITM)attack is proposed.The system detects attacks through special intrusion detection nodes called IDS nodes.The IDS node periodically probes the fog nodes in its region by sending interrogation packets.The fog nodes must answer the question in the interrogation packet and reply immediately.The IDS node checks the answer given by the fog nodes and the roundtrip time(RTT)of the communication to determine whether the fog node under investigation is malicious.Since one of the factors considered by the IDS node is the reply time of the fog nodes,a noisy network may affect IDS nodes decisions.As such,an Exponentially Weighted Moving Average(EWMA)technique is used to overcome the noisy nature of the network.The simulation results showed that EWMA improves the accuracy of the system by 15% and can detect the intrusion 0.25–0.5 s faster than that without EWMA.However,the use of EWMA affects the latency of services provided by the fog nodes by at least 0.75–1.3 s.Finally,the energy consumption of the system shows identical behavior with and without EWMA.This lack of energy overhead is because EWMA is a lightweight technique consisting of only two multiplications and an addition.

    Funding Statement:The Authors would like to acknowledge the support of King Fahd University of Petroleum and Minerals for this research.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    秋霞在线观看毛片| 中文字幕av成人在线电影| 大陆偷拍与自拍| 国产精品一区二区三区四区免费观看| 女人久久www免费人成看片| 99久久九九国产精品国产免费| 精品国产一区二区三区久久久樱花 | 免费黄网站久久成人精品| 亚洲欧美中文字幕日韩二区| av卡一久久| 在线观看三级黄色| 男人舔奶头视频| 久久热精品热| 日韩大片免费观看网站| 亚洲最大成人手机在线| 男女无遮挡免费网站观看| av天堂中文字幕网| 丰满人妻一区二区三区视频av| 国产免费视频播放在线视频| 九九爱精品视频在线观看| 日韩,欧美,国产一区二区三区| 免费高清在线观看视频在线观看| 日韩强制内射视频| 99热6这里只有精品| 99久久精品国产国产毛片| 国产精品久久久久久久久免| 伦理电影大哥的女人| 日本午夜av视频| 国产精品女同一区二区软件| 晚上一个人看的免费电影| 欧美日本视频| av国产免费在线观看| 色视频在线一区二区三区| 麻豆乱淫一区二区| 不卡视频在线观看欧美| av国产免费在线观看| 啦啦啦中文免费视频观看日本| 建设人人有责人人尽责人人享有的 | 少妇猛男粗大的猛烈进出视频 | 最近最新中文字幕免费大全7| 大片免费播放器 马上看| 内地一区二区视频在线| 国产精品.久久久| 26uuu在线亚洲综合色| av在线播放精品| 特大巨黑吊av在线直播| 三级男女做爰猛烈吃奶摸视频| 亚洲av成人精品一二三区| 亚洲,一卡二卡三卡| 蜜桃亚洲精品一区二区三区| 国产黄片美女视频| 国产精品一及| 在线免费十八禁| 日韩电影二区| 日韩欧美 国产精品| 国产国拍精品亚洲av在线观看| 一本一本综合久久| 国产精品国产av在线观看| 亚洲精品日韩在线中文字幕| 最近中文字幕高清免费大全6| 男人狂女人下面高潮的视频| 女人久久www免费人成看片| 99热国产这里只有精品6| 我要看日韩黄色一级片| av卡一久久| 小蜜桃在线观看免费完整版高清| 久久精品国产a三级三级三级| 狠狠精品人妻久久久久久综合| 国产精品伦人一区二区| 久久久久性生活片| 亚洲图色成人| 日韩成人伦理影院| 在线精品无人区一区二区三 | 丝袜喷水一区| 美女脱内裤让男人舔精品视频| 亚洲综合色惰| 大香蕉97超碰在线| 久久久精品免费免费高清| 91午夜精品亚洲一区二区三区| 国产亚洲午夜精品一区二区久久 | 26uuu在线亚洲综合色| 一个人观看的视频www高清免费观看| 精品99又大又爽又粗少妇毛片| 亚洲色图av天堂| 男女下面进入的视频免费午夜| av卡一久久| 观看免费一级毛片| 人妻夜夜爽99麻豆av| 麻豆国产97在线/欧美| 国产美女午夜福利| 日韩欧美一区视频在线观看 | 国产熟女欧美一区二区| 高清av免费在线| 性色avwww在线观看| 男女那种视频在线观看| 只有这里有精品99| 亚洲精品影视一区二区三区av| 男女啪啪激烈高潮av片| 天美传媒精品一区二区| 亚洲精品一区蜜桃| 天天躁夜夜躁狠狠久久av| 激情 狠狠 欧美| 干丝袜人妻中文字幕| 日本熟妇午夜| 我的女老师完整版在线观看| 狂野欧美白嫩少妇大欣赏| 日韩成人伦理影院| 七月丁香在线播放| 少妇 在线观看| 伦精品一区二区三区| 精品人妻视频免费看| 亚洲国产精品专区欧美| 国产精品熟女久久久久浪| 亚洲精品国产av成人精品| 激情五月婷婷亚洲| 国产一级毛片在线| 性色av一级| videos熟女内射| 国产欧美亚洲国产| 免费高清在线观看视频在线观看| 精品午夜福利在线看| 18禁在线无遮挡免费观看视频| 成人鲁丝片一二三区免费| 日本一二三区视频观看| 国产精品人妻久久久久久| 97人妻精品一区二区三区麻豆| 久久韩国三级中文字幕| 成人欧美大片| 少妇人妻 视频| 国产精品熟女久久久久浪| 国产午夜精品一二区理论片| 国内揄拍国产精品人妻在线| 久久国内精品自在自线图片| 伦精品一区二区三区| 亚洲美女视频黄频| 国产精品99久久99久久久不卡 | 日本猛色少妇xxxxx猛交久久| 亚洲精品第二区| 国产一区二区三区综合在线观看 | 最近手机中文字幕大全| 久久久久久久久大av| 亚洲欧美日韩卡通动漫| 国产日韩欧美在线精品| 日韩欧美精品v在线| 男男h啪啪无遮挡| 久久久久久久亚洲中文字幕| 男女边摸边吃奶| 嫩草影院精品99| 女的被弄到高潮叫床怎么办| 精品国产露脸久久av麻豆| av又黄又爽大尺度在线免费看| 高清av免费在线| 成人亚洲欧美一区二区av| 亚洲精品乱码久久久久久按摩| 在线播放无遮挡| 天堂网av新在线| 亚洲电影在线观看av| 亚洲av.av天堂| 91久久精品国产一区二区成人| 狂野欧美白嫩少妇大欣赏| 亚洲天堂国产精品一区在线| 欧美激情久久久久久爽电影| 久久久久久久久久久免费av| av网站免费在线观看视频| 日韩大片免费观看网站| 欧美性感艳星| 免费观看的影片在线观看| 少妇 在线观看| 青春草视频在线免费观看| 在线精品无人区一区二区三 | 国产高潮美女av| 亚洲怡红院男人天堂| 久久久久久国产a免费观看| 视频中文字幕在线观看| 在线 av 中文字幕| 日本三级黄在线观看| 小蜜桃在线观看免费完整版高清| 国产成人一区二区在线| 国产精品一区二区在线观看99| 久久久午夜欧美精品| 日本午夜av视频| 日韩精品有码人妻一区| 最近最新中文字幕免费大全7| 日本wwww免费看| 黄色日韩在线| 全区人妻精品视频| 男的添女的下面高潮视频| 久久99精品国语久久久| 日韩大片免费观看网站| 五月玫瑰六月丁香| 久久6这里有精品| 日本欧美国产在线视频| 香蕉精品网在线| 亚洲精品成人av观看孕妇| 成人鲁丝片一二三区免费| 观看免费一级毛片| 国产成人精品福利久久| 久久99精品国语久久久| 国产欧美另类精品又又久久亚洲欧美| 成人漫画全彩无遮挡| 久久韩国三级中文字幕| 一区二区三区免费毛片| 2021少妇久久久久久久久久久| 亚洲精品第二区| 日本一本二区三区精品| 午夜免费男女啪啪视频观看| 免费看不卡的av| 不卡视频在线观看欧美| 午夜福利高清视频| 一边亲一边摸免费视频| 精品人妻熟女av久视频| 涩涩av久久男人的天堂| 日本一本二区三区精品| 不卡视频在线观看欧美| 国产黄频视频在线观看| 国产成人精品婷婷| 在线观看免费高清a一片| 免费看日本二区| 波多野结衣巨乳人妻| 肉色欧美久久久久久久蜜桃 | 免费黄网站久久成人精品| 日韩人妻高清精品专区| 禁无遮挡网站| 国产黄片美女视频| 69人妻影院| 国产色婷婷99| 日本-黄色视频高清免费观看| 日本午夜av视频| 亚洲性久久影院| 色网站视频免费| 亚洲精品成人久久久久久| 亚洲精品国产成人久久av| 久久久久精品性色| 80岁老熟妇乱子伦牲交| 亚洲精品久久久久久婷婷小说| 一级毛片久久久久久久久女| 成人综合一区亚洲| 国产精品久久久久久精品电影| 日韩一区二区三区影片| 国产成人精品久久久久久| 美女xxoo啪啪120秒动态图| 别揉我奶头 嗯啊视频| 亚洲国产高清在线一区二区三| 久久久久久国产a免费观看| 高清在线视频一区二区三区| 26uuu在线亚洲综合色| 少妇人妻精品综合一区二区| 亚洲欧美精品自产自拍| 亚洲国产最新在线播放| 欧美+日韩+精品| 啦啦啦在线观看免费高清www| 美女视频免费永久观看网站| 免费高清在线观看视频在线观看| 水蜜桃什么品种好| 免费观看在线日韩| 久久精品夜色国产| 国产黄片美女视频| 亚洲,一卡二卡三卡| 另类亚洲欧美激情| 国产成人精品婷婷| 最近最新中文字幕大全电影3| 国产午夜精品久久久久久一区二区三区| 男人和女人高潮做爰伦理| 久久鲁丝午夜福利片| 麻豆国产97在线/欧美| 国产精品一二三区在线看| 午夜免费男女啪啪视频观看| 美女国产视频在线观看| 一本一本综合久久| 亚洲av不卡在线观看| 国产国拍精品亚洲av在线观看| 久久久国产一区二区| 国产av国产精品国产| 晚上一个人看的免费电影| 国产精品99久久久久久久久| 交换朋友夫妻互换小说| 一级毛片 在线播放| 天天躁日日操中文字幕| 国产精品麻豆人妻色哟哟久久| 国产精品一区二区性色av| 国产亚洲午夜精品一区二区久久 | 国产黄片美女视频| 一区二区三区四区激情视频| 国产成人一区二区在线| 在线观看国产h片| 夜夜爽夜夜爽视频| 亚洲一级一片aⅴ在线观看| 如何舔出高潮| 成人毛片a级毛片在线播放| 欧美zozozo另类| 日日摸夜夜添夜夜添av毛片| 久久ye,这里只有精品| 欧美一级a爱片免费观看看| 日韩制服骚丝袜av| 久久精品国产a三级三级三级| 男女啪啪激烈高潮av片| 黄色视频在线播放观看不卡| 国内精品美女久久久久久| 天天躁日日操中文字幕| 亚洲最大成人中文| 免费观看性生交大片5| 免费看不卡的av| 九色成人免费人妻av| 国产 一区 欧美 日韩| 在线观看一区二区三区| 欧美日韩亚洲高清精品| 3wmmmm亚洲av在线观看| 久久久久久久大尺度免费视频| 免费看a级黄色片| 国产人妻一区二区三区在| 99视频精品全部免费 在线| 色播亚洲综合网| 国产精品99久久久久久久久| 少妇裸体淫交视频免费看高清| 国产色婷婷99| 九色成人免费人妻av| av在线老鸭窝| 亚洲自偷自拍三级| 欧美97在线视频| 18禁裸乳无遮挡动漫免费视频 | 国产成人精品婷婷| 黄色欧美视频在线观看| 欧美精品国产亚洲| 国产精品麻豆人妻色哟哟久久| 久久久成人免费电影| 亚洲精品国产av蜜桃| 欧美日韩在线观看h| 亚洲精品第二区| 22中文网久久字幕| 男人爽女人下面视频在线观看| 精品熟女少妇av免费看| 亚洲av免费高清在线观看| 欧美区成人在线视频| 亚洲国产精品成人综合色| 伊人久久精品亚洲午夜| 国精品久久久久久国模美| 特级一级黄色大片| 91在线精品国自产拍蜜月| 国产伦在线观看视频一区| 大片电影免费在线观看免费| 国产淫语在线视频| 国产成人福利小说| 亚洲av中文字字幕乱码综合| 日韩强制内射视频| 日日摸夜夜添夜夜添av毛片| 午夜亚洲福利在线播放| 岛国毛片在线播放| 在线观看免费高清a一片| www.av在线官网国产| 少妇裸体淫交视频免费看高清| 尾随美女入室| 综合色丁香网| 九草在线视频观看| 亚洲精品影视一区二区三区av| 色综合色国产| 美女内射精品一级片tv| 国产av码专区亚洲av| 午夜老司机福利剧场| 国产高清不卡午夜福利| 欧美日韩国产mv在线观看视频 | 少妇人妻久久综合中文| 又爽又黄a免费视频| 精品久久久久久电影网| 亚洲av在线观看美女高潮| 一区二区av电影网| 在线观看人妻少妇| 亚州av有码| 国产 一区 欧美 日韩| 免费电影在线观看免费观看| 免费少妇av软件| 黑人高潮一二区| 国产色爽女视频免费观看| 一本色道久久久久久精品综合| 国产大屁股一区二区在线视频| 久久久久久伊人网av| 乱码一卡2卡4卡精品| 免费不卡的大黄色大毛片视频在线观看| 乱码一卡2卡4卡精品| 国产成人91sexporn| 亚洲国产精品国产精品| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲精品日韩在线中文字幕| 美女高潮的动态| 深夜a级毛片| 极品教师在线视频| 在线观看一区二区三区| 新久久久久国产一级毛片| 少妇人妻久久综合中文| 午夜精品一区二区三区免费看| xxx大片免费视频| 中文字幕久久专区| av一本久久久久| 午夜免费男女啪啪视频观看| 午夜亚洲福利在线播放| 亚洲av二区三区四区| 亚洲精品影视一区二区三区av| 内射极品少妇av片p| 国产成人精品婷婷| 国产成人福利小说| 天美传媒精品一区二区| 久久精品夜色国产| 亚洲在久久综合| 国产真实伦视频高清在线观看| 亚洲最大成人手机在线| 色5月婷婷丁香| 爱豆传媒免费全集在线观看| 禁无遮挡网站| 九草在线视频观看| 国产黄a三级三级三级人| 国产精品蜜桃在线观看| 亚洲国产高清在线一区二区三| 国产黄a三级三级三级人| 欧美成人午夜免费资源| 久久久亚洲精品成人影院| 一区二区三区四区激情视频| 看黄色毛片网站| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 少妇高潮的动态图| 亚洲综合精品二区| 在线观看av片永久免费下载| 热re99久久精品国产66热6| av免费观看日本| 久久久久久久国产电影| 97超视频在线观看视频| 精品久久久久久久人妻蜜臀av| 成人漫画全彩无遮挡| 成人高潮视频无遮挡免费网站| 国产免费视频播放在线视频| 精品熟女少妇av免费看| 亚洲精品成人av观看孕妇| 少妇人妻一区二区三区视频| 尤物成人国产欧美一区二区三区| 一边亲一边摸免费视频| 久久久久久久久久成人| 欧美xxxx黑人xx丫x性爽| 永久网站在线| 99热全是精品| 视频区图区小说| 国产大屁股一区二区在线视频| 国产亚洲91精品色在线| 亚洲欧美成人精品一区二区| 免费观看无遮挡的男女| 肉色欧美久久久久久久蜜桃 | 亚洲精品自拍成人| 性色av一级| 视频区图区小说| 国产一区有黄有色的免费视频| 精品久久国产蜜桃| 国产毛片在线视频| 精品久久久久久久末码| 国产精品一区二区性色av| 国产中年淑女户外野战色| 成人黄色视频免费在线看| 22中文网久久字幕| 国内精品美女久久久久久| 免费观看无遮挡的男女| 伦精品一区二区三区| 久久久精品94久久精品| 国产色婷婷99| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产乱人偷精品视频| av免费观看日本| 又爽又黄无遮挡网站| 国产极品天堂在线| 午夜爱爱视频在线播放| 寂寞人妻少妇视频99o| 亚洲综合精品二区| 成年版毛片免费区| 搡老乐熟女国产| 成人一区二区视频在线观看| 美女国产视频在线观看| 熟妇人妻不卡中文字幕| 深夜a级毛片| 国产精品国产三级国产专区5o| 久久热精品热| 亚洲国产色片| 亚洲av日韩在线播放| 亚洲国产最新在线播放| 伦理电影大哥的女人| 国精品久久久久久国模美| 精品少妇黑人巨大在线播放| 成人漫画全彩无遮挡| 国产又色又爽无遮挡免| 精品久久久久久久久av| 国产成人精品一,二区| 日日撸夜夜添| 新久久久久国产一级毛片| 七月丁香在线播放| 人人妻人人看人人澡| 亚洲,一卡二卡三卡| 成年女人看的毛片在线观看| 国产亚洲一区二区精品| 一级毛片 在线播放| 赤兔流量卡办理| 丝袜美腿在线中文| 亚洲精品aⅴ在线观看| 欧美3d第一页| 免费电影在线观看免费观看| 91精品一卡2卡3卡4卡| 嫩草影院入口| 亚洲av欧美aⅴ国产| 极品教师在线视频| 亚洲av福利一区| 中国美白少妇内射xxxbb| 18禁在线无遮挡免费观看视频| 1000部很黄的大片| 麻豆精品久久久久久蜜桃| 国内揄拍国产精品人妻在线| 国产欧美日韩精品一区二区| 日本av手机在线免费观看| 九九在线视频观看精品| 99热这里只有是精品在线观看| 日韩制服骚丝袜av| 国产又色又爽无遮挡免| 一区二区三区免费毛片| 久久久午夜欧美精品| 直男gayav资源| 97在线视频观看| 白带黄色成豆腐渣| 在现免费观看毛片| 日本色播在线视频| 午夜精品一区二区三区免费看| 视频中文字幕在线观看| 国产免费福利视频在线观看| 美女视频免费永久观看网站| 国产亚洲91精品色在线| 久久久久国产网址| 亚洲国产精品成人久久小说| 26uuu在线亚洲综合色| 成人一区二区视频在线观看| 亚洲国产精品成人综合色| 成人毛片a级毛片在线播放| 在线亚洲精品国产二区图片欧美 | 久久久欧美国产精品| 免费观看性生交大片5| 麻豆久久精品国产亚洲av| 香蕉精品网在线| 久久久国产一区二区| 伊人久久精品亚洲午夜| 色婷婷久久久亚洲欧美| 亚洲成人中文字幕在线播放| 午夜精品一区二区三区免费看| 成人漫画全彩无遮挡| 女人久久www免费人成看片| 国产成人aa在线观看| 日本wwww免费看| 久久久精品免费免费高清| av卡一久久| 亚洲精品视频女| 国产乱人偷精品视频| 国产精品精品国产色婷婷| 日本免费在线观看一区| 成人鲁丝片一二三区免费| 五月玫瑰六月丁香| 九草在线视频观看| 狂野欧美白嫩少妇大欣赏| 少妇人妻久久综合中文| 国产毛片在线视频| 色婷婷久久久亚洲欧美| 最新中文字幕久久久久| 国产又色又爽无遮挡免| 最近手机中文字幕大全| 日本午夜av视频| av专区在线播放| 嫩草影院入口| 久久99精品国语久久久| 精品久久久噜噜| 亚洲aⅴ乱码一区二区在线播放| 国产永久视频网站| 极品少妇高潮喷水抽搐| 一级二级三级毛片免费看| 亚洲国产高清在线一区二区三| 国产精品久久久久久久久免| 夫妻午夜视频| 久久精品国产亚洲av涩爱| 精品久久久久久久末码| 天堂中文最新版在线下载 | 日韩欧美精品免费久久| 亚洲精品一二三| 久久韩国三级中文字幕| 网址你懂的国产日韩在线| 一级毛片电影观看| 美女被艹到高潮喷水动态| 综合色av麻豆| 日本熟妇午夜| 能在线免费看毛片的网站| 国产成人精品久久久久久| 午夜激情福利司机影院| av国产免费在线观看| 别揉我奶头 嗯啊视频| 亚洲国产欧美在线一区| 国产精品国产av在线观看| 国产高清有码在线观看视频| 人人妻人人澡人人爽人人夜夜| 亚洲欧美清纯卡通| 中文天堂在线官网| 日本黄色片子视频| 亚洲美女视频黄频| 国产色婷婷99| 国产视频首页在线观看| 伦精品一区二区三区| 王馨瑶露胸无遮挡在线观看| 国产成人精品久久久久久| 一级黄片播放器| 日本wwww免费看| 高清视频免费观看一区二区| 下体分泌物呈黄色| 国产精品一及| www.av在线官网国产| 久久久久性生活片| 久久人人爽人人爽人人片va| av天堂中文字幕网| 蜜桃亚洲精品一区二区三区| 激情五月婷婷亚洲| 亚洲欧美一区二区三区黑人 |