• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    2021-12-11 13:30:16TariqMahmoodButtRabiaRiazChinmayChakrabortySanamShahlaRizviandAnandPaul
    Computers Materials&Continua 2021年8期

    Tariq Mahmood Butt,Rabia Riaz,Chinmay Chakraborty,Sanam Shahla Rizvi and Anand Paul

    1Department of CS&IT,University of Azad Jammu and Kashmir,Muzaffarabad,13100,Pakistan

    2Birla Institute of Technology,Mesra,Jharkhand,814142,India

    3Raptor Interactive(Pty)Ltd.,Eco Boulevard,Witch Hazel Ave,Centurion,0157,South Africa

    4The School of Computer Science and Engineering,Kyungpook National University,Daegu,41566,Korea

    Abstract: Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday lifefor numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme (COBBAS).The proposed scheme is based on biometric data, and uses lightweight operations to enhance the efficiency of the network in terms of time, storage, and battery consumption.A formal security analysis of COBBAS using Burrows-Abadi-Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks, denial-of-service attacks, and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost.

    Keywords:Internet of things; wireless sensor networks; authentication;Burrows-Abadi-Needham logic; fuzzy extractor; elliptic curve cryptography

    1 Introduction

    The core purpose of the Internet of things (IoT) is a convergence of the physical and digital worlds.On the IoT, a set of sensors is attached to a thing (object or device) from which sensors collect various data and transmit it to a central system via a public network.The central system organizes data and extracts results before sending it to an authorized recipient.Consequently,an authorized user can remotely connect with that object or thing.Statistics show that the IoT market is continuously growing.By 2019, the IoT market growth was 212 billion US dollars,and in 2020, it is expected to reach up to 248 billion US dollars [1].Moreover, the number of connected devices is expected to reach 100 billion by 2030.There are many examples of IoT, such as smart cities, smart homes, industry and building automation systems, and health care systems.A wireless sensor network (WSN) embedded in a building/home provides services such as heat control, air conditions, refrigerator, and lighting control, security and surveillance.Conventional cryptographic algorithms may not be practicable for WSN or IoT due to insufficient computational and storage resources of remote sensor systems.Furthermore, traditional password-based protocols can be vulnerable because they are easily breakable, especially by social engineering.In the IoT, a user registers on a network themselves to acquire data from the sensors.This registration is performed by a gateway node; after successful registration, a user may be able to access secret information.During the registration or login phase, an intruder can easily obtain data and secret information because this information is transmitted through public networks.In such situations, an efficient, lightweight, and intelligent scheme is required to ensure the security of wireless sensors.To ensure that communication between a user and sensor nodes remains secure,various authentication schemes have been proposed over the last decades; however, most of these schemes fail to provide sufficient security for practical applications and future development.In this study, we propose an authentication scheme using light operations, providing a higher level of security than previously proposed related schemes.

    For the analysis of the proposed scheme, we use the Dolev-Yao model [2], which is based on the assumption that an adversary can attack at any time and at any level.In the login and authentication phase, an adversary can steal the password or impersonate a legal user or node.Similarly, an adversary can repudiate and change the content of a message.An attacker can also send fake messages to the gateway and sensor nodes, and involve the nodes in useless tasks.All the above threats are considered in the proposed protocol.We have relied on hashing and encryption algorithms for security.This protocol also uses ECC and RC5 to protect networks from attackers.The contributions of this research are briefly summarized below.

    ? A detailed analysis of recent biometric-based authentication schemes, highlighting their limitations, is presented, particularly a cryptanalysis of the scheme proposed by Riaz et al.[3].

    ? A new scheme named Cogent Biometric-Based Authentication Scheme (COBBAS) is proposed that provides sufficient security and lightweight operations, enhancing the network efficiency in terms of communication and computational overload.

    ? Time stamps have been used in the majority of existing schemes to ensure data freshness.Because a time stamp requires clock synchronization between the user’s mobile device or PC and a WSN, it is an unreasonable way to ensure data freshness.COBBAS uses a nonce value instead of a time stamp to ensure data freshness.

    ? The authenticity of the proposed scheme is formally analyzed using Burrows-Abadi-Needham (BAN) logic.Moreover, the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used to demonstrate that the proposed scheme is secure.

    ? Informal security analysis of COBBAS is performed to check its protection against various cybersecurity attacks.

    ? The efficiency of the proposed scheme in terms of time and computational cost is also compared with recent existing schemes.

    In the remaining paper, Section 2 provides a comprehensive literature review of prior schemes.The detailed work of the Secure User Biometric Based Authentication Scheme (SUBBASe) and its limitations are presented in Section 3.The proposed scheme is explained in Section 4.The results, including formal and informal analyses, are presented in Section 5.Section 6 concludes.

    2 Literature Review

    To ensure the security of WSNs, many password-based authentication schemes have been proposed over the last few decades [4-13].More recently, Jian Jun et al.[14] proposed a biometric authentication scheme consisting of four phases:registration, login, authentication, and password change.As transmitted messages are not encrypted in this scheme, if an unauthorized user obtains control over a sensor node, he/she can easily capture all the information stored on that sensor node.In this scheme, secure channels are not provided; thus, it has major problems with data confidentiality and integrity.

    Khan and Alghathbar’s (K-A) scheme [10] is a password-based authentication scheme; however, it is defenseless against non-repudiation and mutual authentication between the user and gateway node.Yuan modified the K-A scheme to remove these weaknesses in their protocol [15].In addition, Das proposed a scheme that consists of a registration phase, login, authentication,and a key agreement phase.His scheme resists insider attacks, online password-guessing attacks,and biometric key-guessing attacks.The author passwords, smart cards, and user biometrics for authentication.Hence, this authentication scheme depends on three factors [16].

    To address the weaknesses of Yuan’s scheme, Wei et al.[17] proposed a scheme that suffers from many vulnerabilities such as the misuse of biometrics, stolen smart card attacks, gateway node impersonation attacks, and a lack of session key establishment.Wei et al.proposed a threephase scheme that removed some of the weaknesses of the Yuan scheme.Similarly, Wu et al.[18]identified the weaknesses in Das’scheme; i.e., it is defenseless against offline password-guessing and de-synchronization attacks.To improve Das’scheme, Wu et al.proposed a two-step registration phase of user registration and sensor node registration.In this scheme, they provide a secure mechanism against insider, offline password-guessing, user forgery, and gateway forgery attacks.

    Park et al.[19] proposed a three-factor authentication scheme.This scheme draws its efficiency from the use of elliptic curve cryptography and a fuzzy extractor.Maurya et al.[20] proposed another fuzzy extractor-and ECC-based scheme consisting of four phases.However, Maurya’s scheme was inefficient with regard to computation time.

    Kang et al.[21] proposed a scheme to address the problems of a lack of user anonymity and offline password-guessing attacks in previous schemes.Their analysis shows that their scheme provides a high level of security without the need for time synchronization.The Bi-Phase Authentication Scheme (BAS) [22] was proposed to improve Wong et al.[6] scheme.BAS consists of initial and final authentication phases, and uses special hardware called Full Function Devices(FFDs) and Reduced Function Devices (RFDs).BAS has several weaknesses; for instance, the protocol requires extra hardware, message confidentiality is not considered, and a session key is not established after user authentication.

    To address the weaknesses of the BAS scheme, the SUBBASe was proposed in [3].SUBBASe provides mutual authentication and network defense against several common security attacks such as stolen verifier attacks, message confidentiality, replay attacks, guessing attacks, and network traffic attacks.However, it suffers from security vulnerabilities such as biometric recognition errors, user anonymity issues, perfect forward secrecy, and gateway node impersonation attacks.To overcome the vulnerabilities of SUBBASe, Riaz et al.[23] proposed a scheme with two phases.The first phase was “Registration” and the second was “Login and Authentication.” This scheme overcomes the weaknesses of SUBBASe, removes biometric recognition errors, and ensures user anonymity.However, it still suffers from gateway node impersonation attacks and Sybil attacks.In addition, these schemes use a time stamp to ensure data freshness.Because the time stamp requires clock synchronization between a user’s mobile device or PC and the WSN, this timestamp is not a practical way to ensure data freshness.

    Authentication in WSNs has attracted considerable research attention in the domain of IoT and smart homes.In 2019, Shin et al.[24] proposed a smart card-based authentication scheme for smart homes.Their scheme consists of five phases, but takes considerable time to complete its run.Lightweight three-factor authentication schemes have been proposed for IoT and 5G in [25,26] respectively.

    All these schemes require smart cards to store user biometric information and provide authentication.These schemes provides desirable attributes for IoT environments, and authors’shows that the computation and communication costs of their proposed scheme are suitable for extremely low-cost IoT devices.However, the need for smart cards was removed using the scheme proposed in [27].Biometric and smartcard-based authentication schemes have been proposed for health care in [28,29].A stream-based authentication mechanism, using key authorization infrastructure,specifically addressing security concerns of multi-homing sub-aqueous big data networks was presented in [30].A novel Fractal-Based Authentication Technique was proposed by implementing a Sierpinski triangle in [31].Their scheme reduces the probability of password guessing, and provides security against attacks such as shoulder surfing.To reduce energy consumption in IoT, a game-based mechanism was suggested in [32], and an electoral system was proposed in [33].These schemes select the most appropriate cluster heads or community heads to enhance the efficiency of a network.Human activity recognition in home automation systems is an emerging topic addressed in [34].Their scheme provides an efficient technique to observe human behavior within a smart home.The study of human behaviors can also be helpful in designing authentication mechanisms.

    All these schemes are valuable additions to IoT systems; however, they also suffer from several security threats.To overcome the flaws in these schemes, we propose a scheme called“COBBAS.” It not only provides sufficient security, but also uses nonce values instead of time stamps to ensure data freshness.Furthermore, this scheme removes biometric recognition errors using fuzzy extraction.The authenticity of the proposed scheme is formally analyzed using BAN logic.Moreover, the AVISPA tool is used to prove that the proposed scheme is secure.

    3 Review of SUBBASe

    In this section, we first provide a brief description of the details of SUBBASe [3], and then,conduct a security analysis to explain its vulnerabilities.For convenience, the notations used in this paper are given in Tab.1.

    This scheme has two phases.In the first phase, the user enrolls themselves with the network,which is called the enrollment phase.The second is an authentication phase where the user is authenticated by a trusted node, and the required information is provided to the user.

    Table 1:Notations used in SUBBASe and proposed scheme

    Before deployment, each node in the network is preloaded with the following information:ID of sensor node and secret valuexo.We describe both phases and security weaknesses below.

    3.1 Enrollment Phase

    (a) In the enrollment phase, the user registers with the network.The user imprints their biometric data, and calculates its hash value.Then, the user inputsIDiand sends it to a trusted node, i.e.,IDiandAi.

    (b) The trusted node receives the value from the user and calculatess, which is a hash value of theIDiof a user and a secretxo, i.e.,s=h(IDi||xo).Then, the trusted node sends this value to the user.

    3.2 Authentication Phase

    (a) In this phase, the user imprints fingerBiand calculates the hash value of biometricA′i =h(Bi).Then, the user inputs his/herIDi, takes a time stampTo, requests informationRI,and sends the following message to the sensor node.

    (b) After receiving a message from the user, the sensor node calculates the time interval ifT1?T0>ΔT;if this condition is true, the request will be rejected.Otherwise, the sensor node computesy, and sends the following message to the trusted node.

    (c) The trusted node receives the message and checks the time stamp ifT3?T2>ΔTthen request will be rejected; otherwise, the trusted node checksA’iand comparesAiwith the previously savedAi.IfAi =A′iis not satisfied, then the trusted node sends a reject message{reject...}to the sensor node; otherwise, it sendsM5=[In-Progress...]The message inprogress means that all parameters have been verified, and data will be provided presently after some calculations.Then, the trusted node calculatessand sends the following message toSN.

    (d) The sensor node first verifies the timestamp; if conditionT5?T4>ΔTbecomes true, then the request is rejected.In this case, the sensor node computess=h(IDi||xo), calculates the valuesd=(RI)andsk=h(IDi||T6||s), and encrypts the data with the help of this session key.Subsequently, this sensor node and user will use this session key to access a session.ESK(d)represents the encryption of the required user information.

    (e) The user verifies the time stamp ifT7?T6≥ΔTis true; if they haves, then they can obtain their required information.The user first calculates their session key, and then,decrypts dataewith the help of a session key.The user calculates the session key withIDi T6ands,sk=h(IDi||T6||s).Withsk, users can decrypt the required information,DSK(e).

    3.3 Weaknesses of SUBBASE

    3.3.1 Insecure User ID

    In SUBBASe, theIDiof the user is sent on public network without encryption.In the enrollment phase, the user inputs his/herIDi, imprints his/her biometricBi, calculatesAi, which is the hash ofBi, and sends it to the trusted node (TN).Similarly, in the authentication phase, the user imprints fingerBiand calculates the hash value of biometricA′i=h(Bi).The user inputs his/herIDi, takes a time stampToand requested informationRI, and sends the following message to the sensor node.M1=IDi,RI,A′i,To.In both phases,IDiis sent openly on a public network,making it insecure.

    3.3.2 Biometric Recognition Error

    A hash function returns a different value even if a single bit changes in input.Conversely,biometric input contains various noise and cannot reproduce 100% identical output over multiple access attempts.In the enrollment phase, the users imprint their biometricBiand calculate its hash valueAi.Moreover, in the authentication phase, the user again imprints fingerBiand calculates the hash value of biometricA′i =h(Bi).Based on the above discussion, it is possible that a user’s device will produce a different hash valueAi.Consequently, errors in biometric recognition will occur, causing termination of the authentication process.

    3.3.3 Vulnerable Session Key

    The session keys perform a crucial role in security.Moreover, sensor nodes have limited computational resources.The SUBBASe session key (sk) is created by the sensor node through the following operations; the sensor node computess=h(IDi||xo)to calculatesk=h(IDi||T6||s).Then, the sensor node and user will use this key as a session key for the ongoing session.ESK(d)represents the encryption of the required user information.Session keyskis calculated using parametersIDi,T6, ands.As we know thatIDiis not encrypted, the adversary can easily obtain it.Similarly,s=h(IDi||xo)also depends onIDiandxo.In other words, the session key only depends onIDi,xo, andT6, which is not efficient.Moreover, the calculation of hash values by a sensor node is not efficient in terms of the computational load.This task can instead be performed by a trusted node that has high computational capacity.

    4 Proposed Scheme:COBBAS

    In proposed scheme, the following information is preloaded onto the network nodes.

    ? The nodeID

    ? A secret valuexo

    The secret valuexois shared among the user, sensor node (SN), and gateway node (GN).The login and authentication phases are performed by both the sensor and gateway nodes.Two types of devices are used in WSNs, namely FFDs and RFDs.In this scheme, an FFD acts as an authenticator, whereas an RFD continuously manages communication among the devices.In this scheme, the fingerprint of a user is collected, and a random string is generated using a fuzzy extractor.The collection of fingerprints does not require special hardware, because a user can easily imprint his/her biometric on his/her personal tablet or PC to login into the network.COBBAS usesSHA-256to perform a one-way hash function.It uses RC5 with a key size of 20 bytes, as this size is the most suitable for resource-constrained devices.The phases of the proposed scheme are described below.

    4.1 Registration Phase

    In the registration phase, the user is registered with the network.The steps are briefly discussed below.

    (a) The user inputs his/herIDi, passwordPW, and biometricBiusing a tablet or PC.The user computesID?iand a hash of his/her passwordHPW, and generates random stringsRiandPfefrom inputBiusing the fuzzy extractor Gen algorithm:Gen(Bi) = Ri,Pfe.Moreover, the user calculatesAiandHPWfromRiandPW, respectively.Then, the user sends messageM1, comprising the following values to the gateway node through a secure channel.

    (b) The gateway node calculates the authentication measures using the received values.The gateway node calculatesNi, which will be used by the gateway node to authenticate the user during the login and authentication phase.Siis used for user anonymity, andMiis used by the sensor node to authenticate the gateway node in the login and authentication phase.The gateway node broadcastsM2, which comprises the following values (Ni,Si,Mi),to the user and sensor node.

    (c) The gateway node broadcasts the above parameters to the user and all nodes in the network.After this step, the registration phase is complete.Fig.1 describes the process of registration.

    Figure 1:Registration phase of proposed scheme

    4.2 Login and Authentication Phase

    The steps included in login and authentication phase are given below.

    (a) The user again enters his/herIDiand passwordPW?, and imprints his/her biometricB?i.UsingB?iand a helping stringPfe, the user generatesR?iwith the help of the fuzzy extractorRepalgorithm asRep(B?i,Pfe) =Ri.Then, the user calculates the hash ofR?i,A?i=h(R?i)and the hash of the password,HPW?=h(PW?).Moreover, the user calculates variableYiasYi =IDi⊕Ni, whereNiisNi =HPW⊕xo.Subsequently, this user calculatesID?iasID?i =Yi⊕HPW?.The user selects a random numberruand nonce valueNa, and calculatesXi =(Pec×ru)⊕xo, which is the product of a point on an elliptic curve and a generated random numberruthat is then XOR with secret valuexo.Finally, the user sends the following message to the gateway node.

    (b) The gateway node first verifies the user asIDi = ID?i⊕xo.If the condition holds true,then the gateway node proceeds further; otherwise, the request is rejected.Moreover, the gateway node comparesA?iandHPW?; with the previously saved valuesAiandHPW.If all these conditions are satisfied, then the gateway node calculatesS?i = xo⊕ID?iandM?i =S?i⊕h(A?i⊕HPW?).Moreover, GN generates a random numberrsand calculates the public keyDi =rs×pecandCi =X?i×rs.The gateway node then sends the following message along with the required informationRIto the sensor node.

    (c) The sensor node first verifies the gateway node and user by comparingMi = M?iand calculatesX?i =Xi⊕xo.The sensor node calculates the session key usingIDi,Ci,Na, andxoasSKs =h(Ci||IDi||Na||xo).It encrypts the required informationRIusing the sensor session keySKsase=ESKs(RI).Moreover, SN generates a nonceNsand sends messageM5to the user.

    (d) The user calculatesCiwith the help ofDi,Ci=Di×ru.The user then calculates the session keySKu =h(Ci||IDi||Na||xo)and decrypts dataewith the help of their session keySKuasDSKu (e)=RI.

    (e) The user sends an acknowledgment to the sensor node to ensure mutual authentication as(Ns⊕xo)SKu.The authentication phase ends with this step.

    (f) The sequence of message exchanges in the login and authentication phases are shown in Fig.2.

    Figure 2:Login and authentication phases of proposed scheme

    5 Results

    5.1 Formal Security Analysis Using BAN Logic

    COBBAS provides mutual authentication between the sensor node and user.In this section,we prove this using BAN logic [35].The postulates of BAN logic are described, and the formal proof of the proposed scheme, which comprises “Assumptions,” “Messages,” “Goals,” and“Analysis” parts, is given below.The basic symbols used for BAN logic are described in Tab.2.

    Table 2:Notations and symbols used in BAN logic

    5.1.1 Inference Rules

    Rule 1:Message meaning rule:If U believes that he/she shares key K with S and U sees message X encrypted with key K, U believes that S once said X.

    Rule 2:Nonce verification rule:If U believes X is fresh and S once said X, U believes S believes X.

    Rule 3:Belief ruleIf U believes that X once said (X, Y), then U believes that S once said (X).

    Rule 4:Freshness rule:If part of a message is fresh, then the entire message is fresh.

    Rule 5:Jurisdiction rule:If U believes that S has jurisdiction over X and believes S believes X, U believes X.

    Rule 6:Seeing rule:If U sees (X, Y), then U sees X as well.In addition, the second seeing rulemeans that U can see message X only if he/she knows the shared secret key K.

    5.1.2 Idealized Form

    The message exchange of COBBAS in idealized form is given below.

    Message 1:U→GN:〈ID?i,(ru×Pec)xo,Na, (Bi)xo, (HPW)xo〉

    Message 2:GN→SN:〈Na, (Bi,IDi, HPW)xo, (ru×Pec)xo, (rs×Pec)xo〉

    Message 3:SN→U:〈(rs×Pec)xo,NS, (Usk?SN)xo〉

    Message 4:U→SN:〈NS, (Usk?SN)xo〉

    5.1.3 Goals

    To ensure secure operation, the proposed protocol should meet the following security goals.

    Goal 1:U|≡USN (U believes that U shares a secret session key with SN)

    Goal 2:SN |≡USN (SN believes that U shares a secret session key with SN)

    Goal 3:U|≡SN |≡USN (U believes that SN believes that U shares a secret session key with SN)

    Goal 4:SN|≡U |≡USN (SN believes that U believes that U shares a secret session key with SN)

    5.1.4 Assumptions

    To proceed with the proof, following assumptions are made.

    Assumption 7:U |≡#(Na)

    Assumption 8:SN |≡#(Ns)

    5.1.5 Analysis

    Step 1:From Message 1,

    Step 2:From the message meaning rule and Assumption 2

    Step 3:From Message 2,

    Step 4:From the message meaning rule and Assumption 4

    Step 5:From Message 3,

    Step 6:From the message meaning rule and Assumption 6

    Step 7:From Message 4,

    Step 8:From the message meaning rule and Assumption 5

    Step 9:From Step 6, the freshness rule, and Assumption 7,

    Step 10:From Step 6 and the second seeing rule,

    Step 11:From Step 8, the freshness rule, and Assumption 8,

    Step 12:From Step 8 and the second seeing rule,

    Step 13:From Steps 6 and 9, the nonce verification rule, and Assumption 7,

    Step 14:From the nonce verification rule, Assumption 8, and Steps 8 and 11,

    Key freshness is vital to security protocols.The results of Step 9, i.e., Eq.(10), prove that the user trusts the freshness of the key shared between the user and sensor node.Similarly, from Step 11 Eq.(12), it is clear that the sensor node also believes that the key shared between itself and the user is fresh.Moreover, Step 10 shows that the user believes that he/she and the sensor node share the same secret key (Goal 1).Step 12 verifies that the sensor node also believes that it shares the same secret key with the user (Goal 2).Steps 13 and 14 verify that the user believes that the sensor node believes that the user and sensor node share the same secret key and vice versa (Goals 3 and 4).

    5.2 Formal Security Analysis with AVISPA

    AVISPA is an automated protocol validation tool.This tool uses high-level protocol specification language (HLPSL) [36].AVISPA provides a suite of applications for building and analyzing formal models of security protocols written in HLPSL.

    In this section, it is proven that the proposed scheme is safe against intruder attacks.The session key generated by the sensor node is safely received by the user.HLPSL is a rolebased language.In the proposed scheme, three entities are involved:user (U), gateway node(GN), and sensor node (SN).The roles of these entities are described in the HLPSL code in Figs.3-5, respectively.

    Figure 3:Role specification of user in HLPSL

    Once the basic roles have been defined, we need to define a composed role and session role(Fig.6) to integrate them so that several roles can be executed together.Lastly, the environment role is defined in Fig.7, which contains “intruder knowledge” and “goal section.”

    The results of the AVISPA analysis, using on-the-fly model-checker (OFMC) and attack search (AtSeE) backends to ensure the security of the proposed protocol, are shown in Figs.8 and 9.To estimate its security against a replay attack, the OFMC checks whether a legitimate entity can execute the protocol by searching for a passive adversary.Moreover, the OFMC checks whether the proposed protocol is secure against the man-in-the-middle attack using the Dolev-Yao model.

    The OFMC backend takes 0.04 s to visit eight nodes.The replay attack and Dolev-Yao model checks were performed successfully, showing that the proposed protocol is safe against replay and man-in-the-middle attacks.Figs.7-9 show the goals section and simulation results.

    Figure 4:Role specification of gateway in HLPSL

    Figure 5:Role specification of sensor node

    5.3 Informal Analysis

    This section presents the security analysis of COBBAS with a focus on the shortcomings of previous authentication mechanisms, i.e., user anonymity, integrity, and biometric recognition error.It also provides an in-depth analysis of how the proposed scheme is resilient against various security attacks.

    5.3.1 User Anonymity

    The proposed scheme ensures the user’s anonymity because of the shared secretxo.The user calculates a variableYi, which isXORwithIDiandNi.Here,Niwas shared by the gateway node during the registration phase.Then, the user calculatesID?i=YiHPW* and sends this result to the gateway node.The use of previously shared secrets and values confirms that the user is anonymous.

    Figure 6:Role session

    Figure 7:Environment and goals in HLPSL

    5.3.2 Replay Attack

    In this scheme, the user sendsNa, a nonce value, to the gateway node.A nonce is the number generated by a node or user for one session only.These variables cannot be used in the next section.The nonceNasent from the user will be received by the sensor node.The sensor node encryptsNaand sends it to the user.The user receives the values and other data with his/her generated nonce.This confirms that the message has not been replayed.

    5.3.3 Biometric Recognition

    The proposed scheme avoids biometric recognition errors using a fuzzy extractor.When the user inputs his/her biometricBiusing a tablet or computer, the protocol first calculatesRiandPfeusing the fuzzy extractor, whereRiis a random string that representsBiandPfeis a helping string.

    Figure 8:Simulation results with OFMC

    Figure 9:Simulation results with ATSE

    When the user wants to login to the network again, the fuzzy extractor calculatesR?iusing theRepalgorithm, which takesB?iandPfeas input and calculatesR?iaccordingly.

    The advantage of a fuzzy extractor is that, if there is a small difference betweenBiandB?ifor the same user, the fuzzy extractor can calculateRivia helping stringPfe.

    5.3.4 Integrity

    The integrity of a scheme is established if an adversary cannot alter the contents of a transmitted message.In this scheme, integrity is ensured using hash functions.TheIDiof the user is sent asID?i=YiHPW*, whereYiis calculated with the help ofNiandxo.Similarly, the password of the user is shared by hashing the value of the passwordPW, which is calculated asHPW=h(PW).Moreover, the biometric imprint of the user is secured through hashing asRi =Gen(Bi)andAi =h(Ri).

    5.3.5 Complexity of Equipment

    Previously proposed schemes using smart cards or biometrics required special hardware.To use smart cards, a card reader is necessary.In this scheme, the user imprints his/her biometrics on his/her tablet or PC to login to the network.Hence, special hardware is not required in this scheme.

    5.3.6 Insider Attack

    An insider attack is launched by an adversary through an authorized system.It is difficult to identify and protect against insider attacks.

    In this scheme, this type of attack is not beneficial for the attacker because of one-way hashing.All the information that is sent is calculated using a one-way hash function.

    5.3.7 Password-Guessing Attack

    The proposed scheme resists password-guessing attacks because the user imprints his/her personal biometrics for logging in.The password is encrypted with a one-way hash function.Even the gateway node does not know the original password.Hence, it is difficult for an adversary to obtain the original password or biometric imprint of the user.

    Tab.3 compares the proposed scheme with previous related schemes based on various security features.It clearly shows that the proposed scheme provides mutual authentication and session key establishment, and is robust to biometric recognition error.

    Table 3:Comparison of security features with related schemes

    5.4 Performance Analysis of COBBAS

    MICAz motes were used to evaluate the time utilization and energy consumption of the COBBAS protocol on sensor nodes.

    The results are then compared with the related schemes proposed by Wei et al.[17], Maurya et al.[20], Shin et al.[24], Park et al.[19], SUBBASe [3], and Riaz et al.[23].The time and energy consumed by the related schemes were also calculated for the MICAz motes.The MICAz mote is constructed using second-and third-generation sensor node technology by Crossbow Technology USA [37].MICAz motes can measure biometric pressure and seismic waves, and are equipped with humidity, light, and temperature sensors [38].

    The currentIon the MICAz mote is 8 mA, and its voltage is 3 V [20].The total energy required for elliptic-curve Diffie-Hellman (ECDH) key exchange is 57 mJ [3].Therefore, the time required for key exchange can be calculated by:

    whereEis the energy consumed,Vis the voltage of the node,Iis the current in mA, and t is the time required for key exchange.Therefore, the time required for oneECDHkey exchange (TECDH)on the MICAz mote is 2.375 ms.In addition, the computational cost for the fuzzy extractor is lesser than the cost of hashing [17].Therefore, for simplicity, we assumed the same values for both operations.The time for the one-way hash function (TH) was 3.636 [24].Here,TRC5denotes the time required to perform oneRC5encryption or decryption on the MICAz mote.On the MICAz mote, execution time for one RC5 encryption or decryption was 0.26 ms [3].Moreover, the time for symmetric key encryption/decryption cost is one hash function [3].Therefore, we assumed that the time for symmetric key encryption decryption (Tsym) on the MICAz mote was 3.636 ms.The computational times on the MICAz mote for different cryptographic operations is given in Tab.4

    Table 4:Execution time and energy consumption on sensor node

    According to [24], the execution time of a one-way hash function (T’H) on a PC is 2.58μs.The time required for ECC point multiplication (T’P) on a PC was 1.226 ms, while the time for ECC point multiplication (TP) on the MICAz sensor was 114 ms.The time required for symmetric key encryption decryption (T’sym) on a PC was 8.7 ms [20].The computational time on PC for different cryptographic operations, as considered in, [20,24] is given in Tab.5.

    5.4.1 Time Analysis

    In this section, the proposed scheme and existing schemes are compared in terms of time consumption.We have compared only the login and authentication phases of COBBAS with previous schemes because registration and password updates are not used frequently.Tab.6 summarizes the time analysis.

    Table 5:Execution time on PC/device

    Table 6:Comparison of time consumption with related schemes

    Table 7:Comparison of energy consumption with related schemes

    Tab.6 shows that the times required for Maurya et al.[20] scheme, Wei et al.[17] scheme,Park et al.[19] scheme, Shin et al.[24] scheme, Riaz et al.[23] scheme, and SUBBASe [3] were 43.4, 37.0,245.1, 21.9, 236.7,and 22.4 ms, respectively.The time required for the COBBAS scheme was 13.3 ms.The authentication time of the proposed scheme is much faster than that of the current schemes.Moreover, this comparison shows that the proposed scheme outperforms and provides a higher level of security, even with light computation.

    5.4.2 Energy Analysis

    The authentication process is completed by exchanging several messages among the entities involved in the network.During this process, energy is consumed by the sensor node.This section compares the energy consumption of the proposed scheme with related schemes.We measured the energy consumed by the proposed protocol and related schemes on the MICAz mote.The energy is calculated with the help of Eq.16.The energy consumed by each protocol for one node’s authentication is given in Tab.7.This table shows the energy consumed by SUBBASe [3],Wei et al.[17], Park et al.[19] Maurya et al.[20], Riaz et al.[23] and Shin et al.[24] schemes are 537.6, 888, 5882.4, 1041.6, 5680.8, and 525.6 J, respectively.The energy consumed by the proposed method was only 319.2 J, which shows that the proposed scheme is efficient compared to related schemes in terms of energy input.

    6 Conclusions

    In this study, we analyzed various studies related to authentication mechanisms in recent years.To overcome the flaws in previous schemes, we proposed an efficient authentication scheme,comprising only two phases using simple and lightweight computations.The COBBAS scheme protects WSNs from different types of attacks, and provides user anonymity along with biometric error recovery.The mutual authentication of the proposed scheme was proved using BAN logic.In addition, AVISPA analysis proved that the proposed scheme is safe from intruder-based interventions.Furthermore, an informal security analysis showed that COBBAS provides better security than previous schemes with reasonable resource utilization.Additionally, its computational cost and energy consumption are believed to be suitable for resource-constrained networks.Moreover,the proposed scheme is energy efficient, and provides a higher level of security than related proposed schemes.

    Funding Statement:This project was funded by the National Research Foundation of Korea.Grant Number:2020R1A2C1012196.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av天堂中文字幕网| 色哟哟·www| 亚洲专区中文字幕在线| 亚洲中文字幕日韩| 色噜噜av男人的天堂激情| 久久亚洲精品不卡| 久久久精品欧美日韩精品| 亚洲av第一区精品v没综合| 欧美在线一区亚洲| 欧美xxxx黑人xx丫x性爽| 欧美潮喷喷水| 亚洲va日本ⅴa欧美va伊人久久| 国内精品美女久久久久久| 五月伊人婷婷丁香| 亚洲av一区综合| 成人性生交大片免费视频hd| 天堂影院成人在线观看| 日韩强制内射视频| 久久精品影院6| 男插女下体视频免费在线播放| 如何舔出高潮| 欧美精品啪啪一区二区三区| 精品人妻视频免费看| 91久久精品国产一区二区三区| 亚洲精品影视一区二区三区av| 亚洲一区高清亚洲精品| 搞女人的毛片| 3wmmmm亚洲av在线观看| 亚洲aⅴ乱码一区二区在线播放| 两人在一起打扑克的视频| 免费人成在线观看视频色| 夜夜看夜夜爽夜夜摸| 国产主播在线观看一区二区| 中国美女看黄片| 亚洲av不卡在线观看| 午夜日韩欧美国产| 日本与韩国留学比较| 欧美性猛交黑人性爽| 真人一进一出gif抽搐免费| 亚洲天堂国产精品一区在线| 国产视频一区二区在线看| 五月伊人婷婷丁香| 男女视频在线观看网站免费| 国产久久久一区二区三区| 日韩,欧美,国产一区二区三区 | 久久久久国内视频| 国产 一区 欧美 日韩| 国语自产精品视频在线第100页| 97人妻精品一区二区三区麻豆| 乱人视频在线观看| 一级av片app| 国产亚洲精品av在线| 久久热精品热| 99九九线精品视频在线观看视频| 极品教师在线视频| 一个人看的www免费观看视频| 欧美日韩精品成人综合77777| 一级毛片久久久久久久久女| 婷婷丁香在线五月| 99视频精品全部免费 在线| 草草在线视频免费看| 免费人成视频x8x8入口观看| av在线蜜桃| 成人无遮挡网站| 久久久久国内视频| 日本一本二区三区精品| 精品一区二区三区人妻视频| 丰满乱子伦码专区| 免费看av在线观看网站| 看十八女毛片水多多多| 99热只有精品国产| 亚洲成人久久爱视频| 免费一级毛片在线播放高清视频| 国产男靠女视频免费网站| 国产精品爽爽va在线观看网站| 国产人妻一区二区三区在| 亚洲av成人精品一区久久| 成人特级黄色片久久久久久久| 色吧在线观看| 国产精品一区www在线观看 | 最近中文字幕高清免费大全6 | 国产乱人视频| 亚洲七黄色美女视频| 男人狂女人下面高潮的视频| 亚洲精品一卡2卡三卡4卡5卡| www.色视频.com| 亚洲av第一区精品v没综合| 久久精品国产亚洲网站| 久久久久国产精品人妻aⅴ院| 黄片wwwwww| 我要看日韩黄色一级片| 男女视频在线观看网站免费| 久久精品国产亚洲av天美| 日韩欧美在线乱码| 国产精品福利在线免费观看| 国产精品女同一区二区软件 | 人人妻人人看人人澡| 午夜福利高清视频| 狂野欧美激情性xxxx在线观看| 久久九九热精品免费| 国产久久久一区二区三区| 看免费成人av毛片| 日韩中字成人| 69av精品久久久久久| 亚洲成a人片在线一区二区| 窝窝影院91人妻| 熟女电影av网| 免费高清视频大片| 亚洲av免费高清在线观看| 精品日产1卡2卡| 亚洲精华国产精华液的使用体验 | 日本在线视频免费播放| 国产黄片美女视频| 一a级毛片在线观看| a级毛片a级免费在线| 亚洲欧美日韩高清专用| 联通29元200g的流量卡| 日本黄大片高清| 成人国产麻豆网| 欧美一区二区国产精品久久精品| 99国产精品一区二区蜜桃av| 免费看av在线观看网站| 免费看光身美女| av在线观看视频网站免费| 国产av不卡久久| 国产成人影院久久av| 蜜桃久久精品国产亚洲av| 不卡视频在线观看欧美| 人人妻,人人澡人人爽秒播| 噜噜噜噜噜久久久久久91| 乱系列少妇在线播放| 直男gayav资源| 亚洲欧美日韩东京热| av在线观看视频网站免费| 淫秽高清视频在线观看| 久9热在线精品视频| 免费一级毛片在线播放高清视频| 91久久精品电影网| 校园人妻丝袜中文字幕| 老女人水多毛片| 999久久久精品免费观看国产| 久久人人爽人人爽人人片va| 两人在一起打扑克的视频| 国产精品一区二区三区四区免费观看 | 亚洲精品乱码久久久v下载方式| 麻豆一二三区av精品| 国产精品亚洲一级av第二区| 国产精品免费一区二区三区在线| 成人性生交大片免费视频hd| 欧美+日韩+精品| 亚洲精品在线观看二区| 最近中文字幕高清免费大全6 | 成人精品一区二区免费| 人人妻人人澡欧美一区二区| 久久久精品欧美日韩精品| 日韩 亚洲 欧美在线| 欧美一级a爱片免费观看看| 在线观看66精品国产| 成人国产麻豆网| 嫩草影院入口| 精品久久久噜噜| 亚洲经典国产精华液单| 九九久久精品国产亚洲av麻豆| 亚洲av免费在线观看| 国产91精品成人一区二区三区| 在线观看午夜福利视频| 黄色丝袜av网址大全| 国产一区二区三区视频了| 香蕉av资源在线| 日本爱情动作片www.在线观看 | 精品99又大又爽又粗少妇毛片 | 午夜精品久久久久久毛片777| 亚洲精华国产精华液的使用体验 | 午夜免费男女啪啪视频观看 | 精品人妻1区二区| 成人特级av手机在线观看| 在线免费观看不下载黄p国产 | 色哟哟·www| 热99re8久久精品国产| 久久人妻av系列| 午夜福利在线观看免费完整高清在 | 国产aⅴ精品一区二区三区波| 精品不卡国产一区二区三区| 久久中文看片网| 成人无遮挡网站| 内地一区二区视频在线| 三级男女做爰猛烈吃奶摸视频| 久久精品久久久久久噜噜老黄 | 一卡2卡三卡四卡精品乱码亚洲| 国产探花极品一区二区| 久久人人精品亚洲av| 九色成人免费人妻av| 久久久色成人| 韩国av一区二区三区四区| 久久亚洲精品不卡| 国产中年淑女户外野战色| 国产亚洲精品综合一区在线观看| 九九久久精品国产亚洲av麻豆| 亚洲最大成人手机在线| 久久久精品大字幕| 97碰自拍视频| 国产精品女同一区二区软件 | 黄片wwwwww| 国产一区二区三区在线臀色熟女| 午夜精品在线福利| 在线国产一区二区在线| 一区福利在线观看| av女优亚洲男人天堂| 国产精品乱码一区二三区的特点| 日本 av在线| 校园人妻丝袜中文字幕| 尤物成人国产欧美一区二区三区| 12—13女人毛片做爰片一| 国产一区二区亚洲精品在线观看| 蜜桃亚洲精品一区二区三区| 亚洲欧美日韩东京热| avwww免费| 在线观看午夜福利视频| 国产在线精品亚洲第一网站| 国产乱人视频| 嫩草影院入口| 美女被艹到高潮喷水动态| 我的老师免费观看完整版| 九色成人免费人妻av| 禁无遮挡网站| 久久久久久久久中文| 神马国产精品三级电影在线观看| 岛国在线免费视频观看| 午夜福利成人在线免费观看| 黄色配什么色好看| 精品乱码久久久久久99久播| 无人区码免费观看不卡| 少妇熟女aⅴ在线视频| 亚洲成人中文字幕在线播放| 18禁裸乳无遮挡免费网站照片| 成人美女网站在线观看视频| 中文字幕av成人在线电影| 最近视频中文字幕2019在线8| 亚洲精品影视一区二区三区av| 极品教师在线视频| 亚洲va日本ⅴa欧美va伊人久久| 黄色日韩在线| 日本精品一区二区三区蜜桃| 麻豆av噜噜一区二区三区| 久久久久国产精品人妻aⅴ院| 亚洲自偷自拍三级| 亚洲人成伊人成综合网2020| 人妻制服诱惑在线中文字幕| 在线免费观看的www视频| 春色校园在线视频观看| 国产成人a区在线观看| 国产 一区精品| 午夜老司机福利剧场| 国产探花在线观看一区二区| 国产高清视频在线观看网站| 性欧美人与动物交配| 国产白丝娇喘喷水9色精品| 亚洲av.av天堂| 日本一二三区视频观看| 日日摸夜夜添夜夜添小说| 午夜福利在线在线| 久久午夜亚洲精品久久| 国产伦一二天堂av在线观看| 香蕉av资源在线| 国产精品美女特级片免费视频播放器| 亚洲一区二区三区色噜噜| 夜夜爽天天搞| 欧美绝顶高潮抽搐喷水| 国产亚洲91精品色在线| 久久久久久久亚洲中文字幕| 美女免费视频网站| 女人被狂操c到高潮| 夜夜看夜夜爽夜夜摸| 欧美成人性av电影在线观看| 99热精品在线国产| 一进一出好大好爽视频| 51国产日韩欧美| 亚洲欧美日韩东京热| 国产黄a三级三级三级人| 老司机午夜福利在线观看视频| 不卡视频在线观看欧美| 搡女人真爽免费视频火全软件 | 亚洲美女视频黄频| 久久精品国产亚洲av香蕉五月| 国产一区二区三区在线臀色熟女| 午夜免费激情av| 真实男女啪啪啪动态图| 免费在线观看影片大全网站| av中文乱码字幕在线| 国产一区二区亚洲精品在线观看| 美女cb高潮喷水在线观看| 亚洲图色成人| 国产白丝娇喘喷水9色精品| 亚洲成人中文字幕在线播放| 国产高清有码在线观看视频| 亚洲男人的天堂狠狠| 在线国产一区二区在线| 国产蜜桃级精品一区二区三区| 国产单亲对白刺激| 免费在线观看影片大全网站| а√天堂www在线а√下载| 午夜日韩欧美国产| 欧美黑人欧美精品刺激| 99热这里只有精品一区| 久久热精品热| 欧美色视频一区免费| 国产伦一二天堂av在线观看| 女生性感内裤真人,穿戴方法视频| 男女那种视频在线观看| 一区福利在线观看| 很黄的视频免费| 小说图片视频综合网站| 夜夜爽天天搞| 国产成人一区二区在线| 亚洲自拍偷在线| 美女xxoo啪啪120秒动态图| 乱系列少妇在线播放| 又爽又黄a免费视频| 国产精品1区2区在线观看.| 一区福利在线观看| 少妇猛男粗大的猛烈进出视频 | 精品国产三级普通话版| 黄色视频,在线免费观看| 国产高清有码在线观看视频| 午夜福利成人在线免费观看| 亚洲自拍偷在线| 日本一二三区视频观看| 看十八女毛片水多多多| 天堂√8在线中文| 免费看av在线观看网站| 我的老师免费观看完整版| 日本免费a在线| 日日摸夜夜添夜夜添小说| 国产不卡一卡二| 久久久久性生活片| 亚洲精品一卡2卡三卡4卡5卡| 久久久久久国产a免费观看| 如何舔出高潮| 在线观看av片永久免费下载| 国产亚洲av嫩草精品影院| 伦精品一区二区三区| 女生性感内裤真人,穿戴方法视频| 校园春色视频在线观看| 亚洲成人中文字幕在线播放| 在线免费十八禁| 婷婷精品国产亚洲av| 日韩强制内射视频| 联通29元200g的流量卡| 99久久中文字幕三级久久日本| 国产视频内射| 日韩欧美国产一区二区入口| 禁无遮挡网站| 日韩中文字幕欧美一区二区| 欧美激情在线99| 国产激情偷乱视频一区二区| 婷婷六月久久综合丁香| 久久久国产成人精品二区| 国产爱豆传媒在线观看| 国产亚洲精品久久久com| 成人精品一区二区免费| 国产精品久久久久久精品电影| 亚洲成a人片在线一区二区| 在线a可以看的网站| 国产精品久久久久久av不卡| 日韩精品中文字幕看吧| 免费观看人在逋| 亚洲性久久影院| 床上黄色一级片| 直男gayav资源| 自拍偷自拍亚洲精品老妇| 给我免费播放毛片高清在线观看| 国产精品久久久久久久电影| av视频在线观看入口| 尾随美女入室| 天堂√8在线中文| 欧美最黄视频在线播放免费| 男女下面进入的视频免费午夜| 国产美女午夜福利| 99久久久亚洲精品蜜臀av| 欧美成人a在线观看| 欧美不卡视频在线免费观看| 国产精品女同一区二区软件 | 最好的美女福利视频网| 精品久久久久久久末码| 内射极品少妇av片p| 亚洲熟妇熟女久久| 午夜久久久久精精品| 日韩欧美精品v在线| 人妻少妇偷人精品九色| 12—13女人毛片做爰片一| 免费人成视频x8x8入口观看| 不卡视频在线观看欧美| 亚洲国产欧洲综合997久久,| 欧美日韩亚洲国产一区二区在线观看| 中文字幕av成人在线电影| 久99久视频精品免费| 不卡视频在线观看欧美| 99国产精品一区二区蜜桃av| 男女那种视频在线观看| 少妇被粗大猛烈的视频| 亚洲美女搞黄在线观看 | 欧美又色又爽又黄视频| 久99久视频精品免费| 亚洲国产精品合色在线| 精品久久久久久久久av| 真实男女啪啪啪动态图| 亚洲乱码一区二区免费版| 久久精品国产亚洲网站| 午夜福利高清视频| 午夜福利视频1000在线观看| 一区二区三区激情视频| 欧美成人性av电影在线观看| 亚洲色图av天堂| 我要搜黄色片| 国产精品人妻久久久久久| 久久久久久伊人网av| 免费黄网站久久成人精品| 少妇人妻一区二区三区视频| 日本撒尿小便嘘嘘汇集6| 国内精品美女久久久久久| 亚洲五月天丁香| 久久久久国产精品人妻aⅴ院| 国产一区二区三区在线臀色熟女| 淫妇啪啪啪对白视频| 国产av在哪里看| 国产高清有码在线观看视频| 久久国产精品人妻蜜桃| 亚洲精品成人久久久久久| 国产高清有码在线观看视频| 级片在线观看| 成人特级黄色片久久久久久久| 丰满乱子伦码专区| 蜜桃亚洲精品一区二区三区| 动漫黄色视频在线观看| 亚洲aⅴ乱码一区二区在线播放| 女的被弄到高潮叫床怎么办 | 亚洲精品久久国产高清桃花| 国产午夜福利久久久久久| 熟女人妻精品中文字幕| 免费看a级黄色片| 午夜福利成人在线免费观看| 美女黄网站色视频| 日韩一区二区视频免费看| 黄色视频,在线免费观看| 亚洲va日本ⅴa欧美va伊人久久| 色精品久久人妻99蜜桃| 国产高潮美女av| 两人在一起打扑克的视频| 黄片wwwwww| 老师上课跳d突然被开到最大视频| 男人和女人高潮做爰伦理| 国产毛片a区久久久久| 欧美成人性av电影在线观看| 久久久久久久久久成人| 欧美zozozo另类| 国产午夜精品论理片| av在线天堂中文字幕| 日韩在线高清观看一区二区三区 | 成人鲁丝片一二三区免费| 亚洲电影在线观看av| 欧美性感艳星| 国产精品1区2区在线观看.| 一个人观看的视频www高清免费观看| 欧美一级a爱片免费观看看| 琪琪午夜伦伦电影理论片6080| 美女被艹到高潮喷水动态| 亚洲熟妇熟女久久| av在线老鸭窝| 久久人人爽人人爽人人片va| 亚洲av成人精品一区久久| 精品午夜福利在线看| 观看免费一级毛片| 免费高清视频大片| 联通29元200g的流量卡| 婷婷六月久久综合丁香| 久久精品国产鲁丝片午夜精品 | 国产亚洲精品久久久com| 久久精品91蜜桃| 午夜老司机福利剧场| 亚洲精品一卡2卡三卡4卡5卡| 日韩av在线大香蕉| 日本-黄色视频高清免费观看| 国模一区二区三区四区视频| 日韩中文字幕欧美一区二区| 给我免费播放毛片高清在线观看| 精品一区二区三区视频在线观看免费| 久久九九热精品免费| 日本黄色视频三级网站网址| 精品欧美国产一区二区三| 中文亚洲av片在线观看爽| 俺也久久电影网| 亚洲专区国产一区二区| 一个人观看的视频www高清免费观看| 成人高潮视频无遮挡免费网站| 最近中文字幕高清免费大全6 | 日韩欧美精品v在线| 日本黄色片子视频| avwww免费| 蜜桃久久精品国产亚洲av| 美女高潮喷水抽搐中文字幕| 十八禁国产超污无遮挡网站| 久久精品影院6| 日日摸夜夜添夜夜添小说| 成年女人永久免费观看视频| 色综合婷婷激情| 综合色av麻豆| 国产精品一区二区三区四区免费观看 | 国产黄色小视频在线观看| 蜜桃久久精品国产亚洲av| 亚洲专区中文字幕在线| 精品免费久久久久久久清纯| 在线观看舔阴道视频| 国产一区二区亚洲精品在线观看| 性欧美人与动物交配| 亚洲色图av天堂| 国产高清视频在线观看网站| 啦啦啦啦在线视频资源| 中文字幕av成人在线电影| 一边摸一边抽搐一进一小说| 精品久久久久久久久久免费视频| 久久精品夜夜夜夜夜久久蜜豆| 国产精品久久久久久久久免| 国产女主播在线喷水免费视频网站 | 亚洲色图av天堂| 精品免费久久久久久久清纯| 日韩国内少妇激情av| 中文字幕熟女人妻在线| 啦啦啦观看免费观看视频高清| 亚州av有码| 国产精品伦人一区二区| 男女啪啪激烈高潮av片| 好男人在线观看高清免费视频| 亚洲无线观看免费| 国产精品久久久久久av不卡| 国语自产精品视频在线第100页| 一进一出抽搐动态| 久久国产乱子免费精品| 蜜桃久久精品国产亚洲av| 亚洲综合色惰| 欧美极品一区二区三区四区| 一a级毛片在线观看| 级片在线观看| 亚洲熟妇熟女久久| 婷婷亚洲欧美| 最近在线观看免费完整版| 国产精品亚洲美女久久久| 哪里可以看免费的av片| 免费看光身美女| 国产高清有码在线观看视频| 亚洲av五月六月丁香网| 国内精品宾馆在线| 亚洲精品在线观看二区| 好男人在线观看高清免费视频| 夜夜看夜夜爽夜夜摸| 禁无遮挡网站| 国产高清视频在线播放一区| 国产亚洲av嫩草精品影院| 淫秽高清视频在线观看| 亚洲性久久影院| 成人午夜高清在线视频| 熟女电影av网| 精品欧美国产一区二区三| 久久人人精品亚洲av| 桃色一区二区三区在线观看| 国产不卡一卡二| 精品久久久久久久久久久久久| 亚洲熟妇中文字幕五十中出| 免费在线观看日本一区| 欧美在线一区亚洲| h日本视频在线播放| 午夜福利视频1000在线观看| 熟女电影av网| 啦啦啦啦在线视频资源| 午夜影院日韩av| 啦啦啦啦在线视频资源| 成人三级黄色视频| 亚洲第一电影网av| 国产一区二区三区在线臀色熟女| 国产精品亚洲美女久久久| 桃红色精品国产亚洲av| h日本视频在线播放| 日韩高清综合在线| 国内精品美女久久久久久| 三级毛片av免费| 搡女人真爽免费视频火全软件 | 亚洲精品久久国产高清桃花| 国产高清视频在线播放一区| 亚洲成a人片在线一区二区| 18禁黄网站禁片免费观看直播| 99热这里只有精品一区| 亚洲国产欧洲综合997久久,| 成人综合一区亚洲| 极品教师在线免费播放| 在线观看66精品国产| 午夜精品在线福利| 午夜影院日韩av| 亚洲avbb在线观看| 最近视频中文字幕2019在线8| 全区人妻精品视频| 日本黄色片子视频| 搡女人真爽免费视频火全软件 | 人妻久久中文字幕网| 亚洲av日韩精品久久久久久密| 亚洲中文字幕日韩| 国产v大片淫在线免费观看| 成人精品一区二区免费| 日韩中文字幕欧美一区二区| 久9热在线精品视频| 国产毛片a区久久久久| 午夜老司机福利剧场| 人人妻,人人澡人人爽秒播| 久久精品国产鲁丝片午夜精品 | 亚洲久久久久久中文字幕| 国产成人福利小说| 精品久久久久久久人妻蜜臀av|