• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    2021-12-11 13:30:20SungJungHsiaoandWenTsaiSung
    Computers Materials&Continua 2021年8期

    Sung-Jung Hsiao and Wen-Tsai Sung

    1Department of Information Technology,Takming University of Science and Technology,Taipei City,11451,Taiwan

    2Department of Electrical Engineering,National Chin-Yi University of Technology,Taichung,41170,Taiwan

    Abstract:This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology.Blockchain technology is applied to data transfer to build a highly secure wireless sensor network.In this network,the relay stations use microcontrollers and embedded devices,and the microcontrollers,such as Raspberry Pi and Arduino Yun,represents mobile databases.The proposed system uses microcontrollers to facilitate the connection of various sensor devices.By adopting blockchain encryption,the security of sensing data can be effectively improved.A blockchain is a concatenated transaction record that is protected by cryptography.Each section contains the encrypted hash of the previous section,the corresponding timestamp,and transaction data.The transaction data denote the sensing data of the wireless sensing network.The proposed system uses a hash value representation calculated by the Merkel-tree algorithm,which makes the transfer data of the system difficult to be tamped with.However,the proposed system can serve as a private cloud data center.In this study, the system visualizes the data uploaded by sensors and create relevant charts based on big data analysis.Since the webpage server of the proposed system is built on an embedded operating system,it is easy to model and visualize the corresponding graphics using Python or JavaScript programming language.Finally,this study creates an embedded system mobile database and web server, which can utilize JavaScript program language and Node.js runtime environment to apply blockchain technology to mobile databases.The proposed method is verified by the experiment using about 1600 data records.The results show that the possibility of data being changed is very small,and the probability of data being changed is almost zero.

    Keywords:Blockchain; embedded system; big data analysis; python;javascript; node.js

    1 Introduction

    This study, which is a wide stride forward in innovation, applies blockchain technology to a wireless sensor network (WSN).The proposed solution represents an improvement of the solution presented in [1] with additional extensions.The current wireless networks are built on the Internet of Things (IoT) structure and denoted as blockchain IoT [2].When blockchain is integrated with the Web platform technology, it is defined as a blockchain Web of Things [3,4].The advantage of blockchain is decentralization, which means that data are not dependent on a single server.Besides, using blockchain for filing distribution minimizes risks related to data storage [5].Many studies have shown that blockchain technology is reliable and has the potential to become the key to new IoT technologies [6,7].This paper proposes a blockchain method based on the WSN structure.The overall system architecture adopted in this study is presented in Fig.1.The devices on the left side in Fig.1 are sensors for measuring different parameters, such as temperature,humidity, and brightness.The proposed system uses an embedded hardware model for data measurement and a related artificial intelligence (AI) algorithm for initial data sorting [8].After initial data sorting, the data are saved in the database according to their type.Additionally, the system conducts data analysis and subsequently maps the data to webpage images using Python or JavaScript programming language.Then, the system awaits a user login to the cloud network to analyze and browse the graphical representation of the sensor data.Because the sensor data are accessed via Internet browsers, the proposed system is compatible with the operating systems of any mobile device.As long as a mobile device is equipped with a browser app, the user can conveniently log-in to the system and analyze the sensor data and graphical statistics [9,10].

    Figure 1:The proposed WSN with blockchain technology

    This paper applies many of the blockchain advantages.The most important characteristic of the proposed system is that decentralized and transmitted messages are not easily modified.Due to the use of distributed accounting and storage, there is no centralized hardware or management organization, the rights and obligations of all nodes are equal, and the data blocks in the system are jointly maintained by the nodes with maintenance functions in the entire system [11,12].When the information is verified and added to the blockchain, it is stored permanently [13-15].Unless it can simultaneously control more than 51% of nodes in the system, the modification of the database on the single node is invalid, so the blockchain data are extremely stable and reliable.Therefore, the sensing data of the proposed system are very safe and complete [16-19].

    2 Blockchain Structure

    The most distinctive feature of blockchain technology is the use of a peer-to-peer (P2P)network architecture to achieve decentralization.Early blockchain technology based on P2P networking has improved the decentralized network architecture [20,21].Much of the current research uses the familiar term “application” when referring to software programming.However, the programming application represents software used to define a specific target.Currently, millions of software applications have been in use, most of which follow the centralized server-client model.Although most network types are distributed, a few novel network architectures are decentralized [22,23].Traditional transactions on both client and server sides rely on credible central financial institutions serving as an intermediary, and any transaction through this centralized organization is recorded and regulated.In contrast, Bitcoin uses the P2P network protocol so that transactions can be made directly between users without the need for an intermediary [24-26].

    In this study, the blockchain transaction record is modified into a sensor data record and stored in data blocks.The block header encapsulates the current version number, the previous block address, timestamp, random number (nonce), target block value of the current block (bits),and the Merkle tree, such as a root value (Merkle-root).The block body mainly contains the data count and details of the obtained data.In the blockchain system, each piece of data are permanently recorded in a data block and can be queried later, similar to the information recorded in a book.The Merkle tree in a data block is digitally signed for each piece of data, thus ensuring that each piece of the obtained data are unforgettable and that no duplicate transactions are recorded.All acquired data are then processed by the Merkle-tree hash function to generate unique Merkle-root values in the block header [27,28].The structure of the blockchain is presented in Fig.2.

    Figure 2:Blockchain structure

    The timestamp and data cannot be modified, which is the most representative feature of the blockchain architecture.

    3 Cryptography Technology Application to Blockchain System

    The secure hash algorithms (SHAs) are a family of cryptographic hash functions and secure hash algorithms certified by the FIPS.A SHA algorithm can calculate different input data and produce a fixed-length string that is also called a message digest, which corresponds to a digital message [29,30].Hash functions have important applications in blockchain systems.The advantages of hash functions for storing blockchain data are as follows:

    a) The data processed by a hash function are unidirectional, and it is almost impossible to calculate the original input values from the processed output values.

    b) A hash function, such as SHA256, blocks the data to be processed, with each block containing 512 bytes, and the SHA256 uses the Merkle-Damgard conversion function to input the initial vector (256 bytes) and the first block data to generate 256 bytes.Furthermore, the Merkle-Damgard conversion is performed for the initial vector and the next number, and this process is repeated until the last data block.The final result is a 256-byte hash.Therefore, the longer the input data are, the longer the hash function will be.

    c) If there are many different (even if only one byte is different) input values of a hash function, the output result will be considerably different.The most commonly used hash function in blockchain systems is a dual SHA256 hash function.In general, raw data of different lengths are processed using two SHA256 hash functions, and binary numbers with a length of 256 bits are output for unification [31,32].The blockchain asymmetric encryption technology is presented in Fig.3.In Fig.3a typical asymmetric encryption algorithm, the elliptic curve cryptography (ECC) algorithm, is used.As shown in Fig.3,the blockchain system generally accepts a 256-bit random number as a private key from a cryptographically secure random source under the operating system.The total number of private keys is 2256, which makes hacking the key difficult [33-36].

    Figure 3:Blockchain asymmetric encryption technology

    The electronic versions of documents and fingerprints are messages and message digests.To protect the integrity of a message, the message must be processed by a cryptographic hash function algorithm, thus creating a compressed image of the message named the message digest, which is similar to a fingerprint.The process of creating a message digest is presented in Fig.4 [37].

    Although the two pairs, i.e., document-fingerprint and message-message digest, are similar,there are certain differences between them.Documents and fingerprints are physically connected,while messages and message summaries can be separated or sent separately.The most important thing is to protect message summaries from changes.To check the integrity of a message or file,the system executes the password hash function again.The system compares the newly generated digest with the old digest.If the two are the same, the original message has not been changed.The diagram of the file integrity checking process is presented in Fig.5.

    Figure 4:Message and message digest

    Figure 5:File integrity checking process

    4 Data Fusion Algorithms

    Multi-sensor data fusion refers to the fusion of data acquired by several sensors from different information sources.The system with data fusion function automatically analyzes data and performs data processing under certain criteria to achieve a better understanding of the observed phenomenon.The application of data fusion technology to water-environment monitoring and control systems to process the data provided by multiple heterogeneous sensors at multiple levels and from multiple aspects has many advantages.The water-environment detection system has many sensors, a wide distribution, and a large amount of information.In order to reduce the burden of communication lines and calculation amount in the fusion center, the system is divided into several subsystems that perform separate analyses, and then the analyses’results are integrated to obtain the fusion result of the entire system.Namely, in the proposed fusion system, a decentralized two-level fusion scheme is adopted for local fusion integrated with the global fusion, as shown in Fig.6.

    4.1 Local Fusion Algorithm

    Since the number of water detection points is often small, i.e., the subsystem dimensionality is low, local fusion can be realized by using the classic vector Kalman filter algorithm.Assuming that there is a total ofqwater detection points, the signals from each water detection point form aq-dimensional vector M(k)=[m1(k)m2(k)···mq(k)]T.The process noise is a sequence of independent white noise δ(k)=[δ1(k)δ2(k)···δq(k)]T.Then, the mathematical model of the multidimensional random signal can be expressed as:

    whereB=diag(b1b2···bq)denotes the coefficient matrix.

    Figure 6:The structure of the fusion system

    To optimally filter theq-dimensional random signalM(k), the firstrcomponents ofM(k)(r

    whereD=diag(d1d2···dr)denotes the observation matrix, andT(k)=[t1(k)t2(k)···tr(k)] is an additional measurement noise sequence.

    The vector Kalman filter algorithm can be expressed as follows:

    where (3) represents the filter estimation equation, (4) represents the filter gain equation, and (5)is the filter covariance equation.In (3)-(5),P1(k)=BP(k?1)BT+Q(k?1).

    The vector Kalman filter is a basic algorithm of prediction and correction as its recursive filtering.Using this algorithm, it is easy to use a computer to filter the real-time signal.The algorithm block diagrams of the main program and the subprogram of the vector Kalman filter are displayed in Figs.7 and 8, respectively.Fig.7 displays a state diagram of the Kalman filter with the feedback form, and Fig.8 shows the various state calculation and conversion processes of the Kalman filter.

    Figure 7:The main program of the vector Kalman filtering

    Figure 8:The subprogram of the vector Kalman filtering

    4.2 Global Fusion Algorithm

    The water data filtered and processed by the fusion station reflect the water environment more accurately than raw water data.The processing of data uploaded by each relay fusion station by the total inspection center station can be regarded as a system transformation from a set of input modes to a set of output modes.Therefore, the global fusion algorithm can be regarded as a forward neural network model, such as a single hidden layer neural network.

    The output of each relay fusion station forms a vectorM(k)= [m1(k)m2(k)···mn(k)]T,as the input signal of the neural network, and the output signal is expressed asN(k)= [n1(k)n2(k)···nn(k)]T; the exact expressions of input and output depend on actual engineering needs.

    Assume that the activation function of the hidden layer is the sigmoid function, which is expressed as:

    Then, the output is expressed as:

    Assuming the output layer has a linear activation function, the output of the entire network is expressed as:

    The forward neural network training is generally conducted using the backpropagation (BP)algorithm.However, the traditional BP algorithm is essentially the least squares estimation, having poor robustness and being very sensitive to outliers, so in this work, the robust BP algorithm(RBP) is used, and it can be expressed as:

    whereηdenotes the learning rate,αis the inertia term constant, and Ψ(e)=ρ′(e),ρ(e)is the Hampel function.

    The output function is denoted asOand can be expressed as:

    wheref(m)represents the Sigmoid function.

    5 Blockchain-Based WSN Structure

    Blockchain transmits data that are not rewritable, and thus, its level of security is very high.This security is especially beneficial when applied to confidential WSNs.A WSN is built using the latest blockchain configuration [13-15].Every main node is connected with several sensor devices, such as sensor1, sensor2, and sensor3, as presented in Fig.9.Also, each of the main nodes has a serial number to show the order of blockchain linking.In addition to collecting its own sensor data, each blockchain collects measurement data from the nodes of the other blocks as well.That is, when a new blockchain is created for a node block, the main node also acquires the sensor data.Thus, every node keeps sensor data for its own and for other nodes,and no single node is the central node, which demonstrates the application of decentralization.All blockchain nodes are connected via a P2P network and have the safest encryption determined based on the network cryptography calculations conducted by the internet research team [16-19].Also, each data block is controlled by an improved system program based on AI machine learning to manage the blockchain connection and overcome the shortcomings of the mining methods that were originally used by bitcoin.The connection method of blockchain nodes in a WSN is presented in Fig.9 [20].The node sequences labeled in Fig.9 are connected by the asymmetrical cryptographic algorithm, which mitigates the mining time and increases the processing efficiency.The proposed blockchain node linking is shown in Fig.10, where each node includes the hash function of the current and previous blocks.In fact, hash functions are long strings of words, but for simplicity, they are presented as a set of four single-digit numbers in this work.

    Figure 9:Integration of blockchain technology in a WSN system

    Figure 10:Normal blockchain linking of the main nodes in a WSN

    The sequence of blocks with incorrect hash functions is presented in Fig.11.In Fig.11, the values of the nodes in the sequence are different, which signifies erroneous linking.When such erroneous linking is detected, the system immediately terminates the linking and data transmission in that blockchain.Once the blockchain linking is complete, a short waiting time is required to ensure that the WSN data in each subarea have been uploaded completely.

    Figure 11:Abnormal blockchain linking of the main nodes in a WSN

    6 Private Blockchain Implementation

    The SHA256 algorithm will generate a 256-bit hash value for every messages regardless of the message length.The generated 256-bit hash value is called a message digest.The message digest is equivalent to an array with a length of 32 bytes, usually represented by a hexadecimal string with a length of 64 characters.The SHA256 algorithm uses eight initial hash values and 64 hash constants.Among them, the initial values of the eight hashes of the SHA256 algorithm are as follows:

    The initial values of hashes are derived from the decimal part of the square root of the first eight prime natural numbers, i.e., 2, 3, 5, 7, 11, 13, 17, and 19.For instance, the fractional part of√is approximately 0.414213562373095048 and 0.414213562373095048 ≈?16?1+a?16?2+0 ?16?3+···.Therefore, the decimal part of the square root of prime number two takes the first 32 bits, which corresponds to the hash value of 0x6a09e667.The 64 constants used in the SHA256 algorithm are shown in Tab.1.

    Table 1:The 64 constants used in the SHA256 algorithm

    Similar to the initial values of eight hashes, the constants are the first 64 prime natural numbers, and the decimal part of the cube root is taken from the first 32 bits.The implementation of blockchain in a wireless sensing network is as follows.Each block in this study contains the block number, sensor data, timestamp, and hash value of the previous block, as shown in Fig.12.Also, each block is the basic unit of the blockchain.The message content of each block includes:

    a.Block number,

    b.Timestamp, which represents the time when the block was generated,

    c.Measurement data of each sensor,

    d.Hash value of the previous block, and

    e.Nonce value.

    Figure 12:The block interface of the proposed method

    When the first block of Genesis is generated, the hash value of the previous block is set to zero.The first block implementation is completed.The proposed method calculates the block number, sensor data, timestamp, and hash value of the previous block, as listed below.The hash value has the following format:“No”+“Data”+“Timestamp”+“PreviousHashValue,” where the PreviousHashValue of the first block is 64 zeros, as shown in Fig.13.

    When the operator presses the mining button, the system starts the mining process.The hash value of this block is the hash value generated by our system, and the first four values are all ones.This nonce value is calculated using the block hash function.The condition for calculating the nonce value is that the first four characters of the block hash value are one.If the original block data are tampered with, the system will generate different nonce values, as shown in Fig.14.The operator then mines the hash value and nonce value of the second block.The number box is filled with 2, the sensor field is filled with new data, such as the data grid, the timestamp is automatically generated by the system, and the hash value of the first block is filled.Then, the mining button is pressed to calculate the hash value and nonce value of the second block, as shown in Fig.15.

    Figure 13:The calculation of the hash value of a block

    Figure 14:The calculation of random nonce safety value using the mining technology

    Figure 15:The calculation of the second block hash value and nonce value

    The hash value of block 2 is displayed in the box of the hash value of this block, and the nonce value is “59451,” as shown in Fig.16.

    Figure 16:The hash value and nonce value of block number 2

    Figure 17:The 54th block data

    In the experiment, a distributed network architecture was used to implement the wireless sensor network of the blockchain.The blockchain architecture proposed in this paper uses a decentralized network architecture.Assume that each block was generated every 30 min and that the proposed system had three peers when the block was generated from the first blockchain.In the peer network blockchain architecture, a block was generated every 30 min.When a block of data is tampered with, the system will immediately find the tampered place.As shown in Fig.17,in the peer 2 Network, the nonce and hash values of the 54th block are tampered with.When the system compares the networks of peers 1, 3 and 4, it finds that the data in the 54th block of the peer 2 network are different from that in the other blocks.

    7 Blockchain Pseudo-Code Description and Execution Comparison

    Blockchain is the basic technology of cryptocurrency, which has gained popularity and has been successfully implemented in many fields, including virtual reality, artificial intelligence, and big data.In order to demonstrate the performance of the proposed blockchain method, it was compared with the traditional method in the WSN system.The blockchain creation pseudo-code is given in Tab.2.

    The comparison of the number of data records that can be processed every half hour between the traditional method and the proposed blockchain method is presented in Fig.18.As shown in Fig.18, the proposed blockchain method had a smaller number of records than the traditional method.However, it should be noted that the main objective of the proposed method is improving the security of wireless sensor networks.The comparison of the probability of data tampering between the traditional method and the proposed blockchain method is presented in Fig.19.As shown in Fig.19, the higher the quantity of data was, the more easily the data of the wireless sensor network using the traditional methods could be tampered with.Generally, when the quantity of data processed by a system is high, the wireless sensing network data using the blockchain method are very difficult to tamper with and destroy.

    Table 2:Blockchain creation pseudo-code

    Figure 18:Comparison of the number of records between the traditional method and the proposed blockchain method

    Figure 19:Comparison of the probability of data tampering between the traditional method and the proposed blockchain method

    8 Results Analysis

    A wireless sensing network and blockchain integration technology were used to conduct various farmland environmental sensing experiments of rice growth.The observed data included temperature and humidity in the air, the illuminance of the light, ultraviolet light, average speed of the wind, maximum speed of the wind, accumulated rainfall per hour, temperature and humidity of the soil, and power curves of the sensor battery.The microcontroller and sensor hardware are presented in Fig.20.A total of 20 sensor nodes were placed around the rice fields.The sensor data obtained from the remote sensors are displayed in Fig.21.The proposed system used the MySQL database system.

    Figure 20:Actual microcontroller and sensor device

    The results showed that changes in the daily temperature and humidity were relatively small,while the temperature and humidity changes in the soil were affected by water irrigation.The ultraviolet light changed with the sunrise time.The focus of the experiment was on the correct delivery of remote sensing data.These sensing data are packaged and processed from the farmland using the proposed blockchain technology.All the sensing data are correct and cannot be tampered with.

    Figure 21:The sensor data obtained from remote sensors

    In the experiment, various environmental parameters of the experimental farm were measured.The experimental farm was the farm environment for rice cultivation.The crop measurement time was about half a year, from February to August.The measurement parameters included air temperature and humidity, soil temperature, soil moisture content, sunshine, ultraviolet light, wind speed, and other parameters.

    9 Conclusion

    When integrating blockchain technology into WSNs, the following problems need to be further discussed:The problem of blockchain data transmission delay and problems related to the increase in the measurement data amount.

    Blockchain requires cryptography processing and public key deciphering to achieve linking.Also, creating a new blockchain requires confirmation of the link’s previous and latter sequences beforehand to transmit data.Therefore, to achieve instantaneous data update and storage, some issues need to be addressed.When using blockchain technology, the hash function and encryption key calculation cannot be avoided.However, as data quantity increases, the calculation time also increases, thus reducing the data transfer efficiency.Therefore, large-scale calculations will increase data processing time.The above-mentioned shortcomings can be overcome using methods such as the resetting mechanism of blockchains, which will constantly update data transfer to the most current status.Another way to overcome the mentioned shortcomings is to use a system control mechanism and a simplified hash function calculation process.Additionally, encryption can be switched from asymmetric to symmetric for the purpose of simplification of blockchain security.

    In summary, blockchain technology has several advantages.Namely, it utilizes decentralization and the common consensus mechanism to maintain a whole, distributed, and tamper-resistant ledger database with integrity.This ledger database can be considered as a measurement database for WSNs.A block is a public record database with multi-sensors data, and a chain comprises a timestamp that cannot be counterfeited.Inherently, blockchain technology prioritizes security and reliability over efficiency.Bitcoin was released eight years ago, and since then, countless unsuccessful attempts have been made to hack the system, and there has never been a transaction error to this day.Hence, it can be concluded that the bitcoin blockchain has proven to be a reliable and robust system.

    Acknowledgement:This research was supported by the Department of Electrical Engineering,National Chin-Yi University of Technology.The authors would like to thank the National Chin-Yi University of Technology, Takming University of Science and Technology, Taiwan, for supporting this research.We thank LetPub (www.letpub.com) for its linguistic assistance during the preparation of this manuscript.

    Availability of Data and Materials:Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    变态另类成人亚洲欧美熟女 | 国产欧美日韩综合在线一区二区| 国产成人欧美在线观看 | 亚洲视频免费观看视频| 久久久久精品人妻al黑| 免费人成视频x8x8入口观看| 后天国语完整版免费观看| 国产精品亚洲av一区麻豆| 久久午夜综合久久蜜桃| 热99国产精品久久久久久7| 久久久久久久国产电影| 亚洲精品美女久久av网站| 日韩人妻精品一区2区三区| 一进一出抽搐动态| 一级毛片女人18水好多| 老司机亚洲免费影院| 国产高清视频在线播放一区| 亚洲精品美女久久久久99蜜臀| 亚洲精品自拍成人| 色综合欧美亚洲国产小说| 欧美乱色亚洲激情| 精品国产亚洲在线| 国产精品国产av在线观看| 老司机影院毛片| 欧美色视频一区免费| 国产精品免费大片| 欧美不卡视频在线免费观看 | 另类亚洲欧美激情| 久久亚洲真实| 亚洲成国产人片在线观看| 亚洲成人手机| 女人高潮潮喷娇喘18禁视频| 中文字幕另类日韩欧美亚洲嫩草| 99热国产这里只有精品6| 亚洲欧洲精品一区二区精品久久久| 国产有黄有色有爽视频| 久久影院123| 国产精品偷伦视频观看了| 亚洲av熟女| a级毛片在线看网站| 国产成人一区二区三区免费视频网站| 老司机午夜十八禁免费视频| 国产精品亚洲av一区麻豆| 国产日韩一区二区三区精品不卡| 夜夜躁狠狠躁天天躁| 亚洲国产欧美网| 欧美激情久久久久久爽电影 | 国产激情久久老熟女| 热99国产精品久久久久久7| 亚洲欧美色中文字幕在线| 俄罗斯特黄特色一大片| 欧美成人午夜精品| 新久久久久国产一级毛片| 美女高潮到喷水免费观看| 久久久国产成人免费| av天堂久久9| 久久国产精品影院| 99精品欧美一区二区三区四区| 久久久久国内视频| 国产高清videossex| 九色亚洲精品在线播放| 国产精品国产av在线观看| 一边摸一边抽搐一进一小说 | 一本一本久久a久久精品综合妖精| 1024视频免费在线观看| 久久影院123| 天堂俺去俺来也www色官网| 国产91精品成人一区二区三区| 人成视频在线观看免费观看| 精品午夜福利视频在线观看一区| 国产精品99久久99久久久不卡| avwww免费| cao死你这个sao货| 制服人妻中文乱码| 999精品在线视频| 亚洲久久久国产精品| 欧美成狂野欧美在线观看| 91老司机精品| 在线观看免费视频日本深夜| 国产1区2区3区精品| 亚洲熟妇中文字幕五十中出 | 国产精品久久久av美女十八| 中文字幕另类日韩欧美亚洲嫩草| 色综合欧美亚洲国产小说| 欧美日韩瑟瑟在线播放| av视频免费观看在线观看| 午夜福利在线观看吧| 黄色丝袜av网址大全| 久久国产精品影院| 成人免费观看视频高清| 亚洲第一欧美日韩一区二区三区| 国产乱人伦免费视频| 午夜福利乱码中文字幕| av超薄肉色丝袜交足视频| 亚洲国产中文字幕在线视频| 亚洲国产欧美日韩在线播放| 啦啦啦 在线观看视频| 99久久国产精品久久久| 激情在线观看视频在线高清 | 99精品在免费线老司机午夜| 女人被躁到高潮嗷嗷叫费观| 欧美激情高清一区二区三区| 色尼玛亚洲综合影院| 又紧又爽又黄一区二区| 岛国毛片在线播放| 免费在线观看亚洲国产| 欧美乱色亚洲激情| 黄片小视频在线播放| 欧美成狂野欧美在线观看| 啦啦啦视频在线资源免费观看| 好男人电影高清在线观看| 99国产综合亚洲精品| 成年女人毛片免费观看观看9 | 久久中文字幕人妻熟女| 国产精品 欧美亚洲| 一边摸一边做爽爽视频免费| 深夜精品福利| 亚洲精品乱久久久久久| 久久香蕉精品热| 亚洲男人天堂网一区| 制服诱惑二区| 日韩免费高清中文字幕av| 国产淫语在线视频| 男人操女人黄网站| 亚洲专区字幕在线| 久久亚洲精品不卡| 国产黄色免费在线视频| 真人做人爱边吃奶动态| 国产男靠女视频免费网站| 久久99一区二区三区| 国产精品 欧美亚洲| 妹子高潮喷水视频| 久久人妻福利社区极品人妻图片| 欧美精品av麻豆av| 丝瓜视频免费看黄片| 91av网站免费观看| 精品第一国产精品| 亚洲伊人色综图| 中文字幕另类日韩欧美亚洲嫩草| 黄片播放在线免费| 午夜精品国产一区二区电影| 欧美日韩亚洲综合一区二区三区_| 成年女人毛片免费观看观看9 | а√天堂www在线а√下载 | 国产亚洲精品久久久久5区| 自拍欧美九色日韩亚洲蝌蚪91| 一边摸一边做爽爽视频免费| 国内毛片毛片毛片毛片毛片| 国产精品欧美亚洲77777| 成人特级黄色片久久久久久久| 18禁国产床啪视频网站| 麻豆av在线久日| 最新的欧美精品一区二区| 久久香蕉精品热| 三上悠亚av全集在线观看| 久久国产精品男人的天堂亚洲| 人人妻人人爽人人添夜夜欢视频| 久久狼人影院| 51午夜福利影视在线观看| 亚洲成国产人片在线观看| 精品卡一卡二卡四卡免费| 在线观看免费视频日本深夜| 欧美乱码精品一区二区三区| 999久久久国产精品视频| 天堂√8在线中文| 视频在线观看一区二区三区| 国产精品欧美亚洲77777| 精品少妇一区二区三区视频日本电影| 国产一区在线观看成人免费| 一夜夜www| 欧美黄色淫秽网站| 亚洲欧美一区二区三区久久| 日韩制服丝袜自拍偷拍| 国产免费现黄频在线看| 久久性视频一级片| 国产人伦9x9x在线观看| 美国免费a级毛片| 纯流量卡能插随身wifi吗| 另类亚洲欧美激情| 天天操日日干夜夜撸| 午夜老司机福利片| 丝袜人妻中文字幕| av福利片在线| 在线观看免费高清a一片| 少妇粗大呻吟视频| 亚洲精品粉嫩美女一区| 国产精品成人在线| 夫妻午夜视频| 国产精品亚洲一级av第二区| 亚洲熟妇中文字幕五十中出 | 午夜91福利影院| 日韩免费av在线播放| 久久久久精品人妻al黑| 亚洲熟女精品中文字幕| 欧美大码av| 国产精品98久久久久久宅男小说| 动漫黄色视频在线观看| 亚洲av美国av| 久久久久国内视频| 国产aⅴ精品一区二区三区波| 欧美精品亚洲一区二区| 在线视频色国产色| 黄色视频,在线免费观看| 热99re8久久精品国产| 看片在线看免费视频| 午夜激情av网站| 两个人免费观看高清视频| 男女下面插进去视频免费观看| 大片电影免费在线观看免费| 成年人午夜在线观看视频| 波多野结衣av一区二区av| 一夜夜www| 欧美日韩亚洲国产一区二区在线观看 | 亚洲av欧美aⅴ国产| 国产精品永久免费网站| 国产精品国产高清国产av | 国产高清videossex| 日本黄色视频三级网站网址 | 怎么达到女性高潮| 悠悠久久av| 大香蕉久久网| 视频区图区小说| 看片在线看免费视频| 国产精品影院久久| 狠狠婷婷综合久久久久久88av| 首页视频小说图片口味搜索| www日本在线高清视频| 日韩精品免费视频一区二区三区| 久久久久久久精品吃奶| 亚洲精品国产一区二区精华液| 成年版毛片免费区| 亚洲国产看品久久| 日韩人妻精品一区2区三区| 久久ye,这里只有精品| 又紧又爽又黄一区二区| 19禁男女啪啪无遮挡网站| 精品无人区乱码1区二区| 一本大道久久a久久精品| 国产蜜桃级精品一区二区三区 | 精品少妇一区二区三区视频日本电影| 美女高潮喷水抽搐中文字幕| 国产成人影院久久av| 亚洲精品久久午夜乱码| 国产精品影院久久| 国产av精品麻豆| 亚洲精品中文字幕一二三四区| 欧美日韩亚洲国产一区二区在线观看 | 少妇猛男粗大的猛烈进出视频| 天堂俺去俺来也www色官网| 大型黄色视频在线免费观看| 男女免费视频国产| 自拍欧美九色日韩亚洲蝌蚪91| 国产精品乱码一区二三区的特点 | 久久国产精品人妻蜜桃| 一边摸一边做爽爽视频免费| 久久天堂一区二区三区四区| 男女免费视频国产| www.精华液| 美女国产高潮福利片在线看| 亚洲伊人色综图| 亚洲性夜色夜夜综合| 三级毛片av免费| 我的亚洲天堂| av中文乱码字幕在线| 一夜夜www| 校园春色视频在线观看| 国产精品一区二区精品视频观看| 久久国产精品男人的天堂亚洲| 男女之事视频高清在线观看| 国产精品亚洲av一区麻豆| 精品国产国语对白av| 国产在线观看jvid| av网站免费在线观看视频| 窝窝影院91人妻| 成人国产一区最新在线观看| 露出奶头的视频| 国产成人啪精品午夜网站| 少妇 在线观看| 女人久久www免费人成看片| 国产亚洲欧美98| 99国产精品一区二区三区| 亚洲片人在线观看| 亚洲国产欧美一区二区综合| 亚洲avbb在线观看| 又黄又爽又免费观看的视频| 一进一出好大好爽视频| 亚洲一码二码三码区别大吗| 久久ye,这里只有精品| 天天躁夜夜躁狠狠躁躁| 麻豆av在线久日| 亚洲 欧美一区二区三区| 99久久人妻综合| 精品国产乱码久久久久久男人| 亚洲av日韩精品久久久久久密| 午夜老司机福利片| 亚洲色图av天堂| 少妇被粗大的猛进出69影院| 国产精品偷伦视频观看了| 99久久99久久久精品蜜桃| 人人妻,人人澡人人爽秒播| 久久人妻福利社区极品人妻图片| 美女扒开内裤让男人捅视频| 精品国产超薄肉色丝袜足j| 老司机影院毛片| 搡老乐熟女国产| 男女午夜视频在线观看| 人人妻人人澡人人爽人人夜夜| 正在播放国产对白刺激| 在线观看www视频免费| 一夜夜www| 精品一区二区三区av网在线观看| 老司机靠b影院| 久久国产精品大桥未久av| 男女高潮啪啪啪动态图| 欧美 日韩 精品 国产| 少妇裸体淫交视频免费看高清 | 国产在线一区二区三区精| 视频在线观看一区二区三区| 99国产精品99久久久久| 国产亚洲精品第一综合不卡| av网站免费在线观看视频| 亚洲情色 制服丝袜| 亚洲欧美日韩另类电影网站| 成人亚洲精品一区在线观看| 欧洲精品卡2卡3卡4卡5卡区| 手机成人av网站| tube8黄色片| 母亲3免费完整高清在线观看| 成人影院久久| 侵犯人妻中文字幕一二三四区| 日韩熟女老妇一区二区性免费视频| 熟女少妇亚洲综合色aaa.| 成人av一区二区三区在线看| 日韩视频一区二区在线观看| 婷婷丁香在线五月| 国产无遮挡羞羞视频在线观看| 欧美激情极品国产一区二区三区| 国产亚洲欧美精品永久| 丝袜在线中文字幕| a级毛片在线看网站| 欧美乱码精品一区二区三区| 日本精品一区二区三区蜜桃| 很黄的视频免费| 曰老女人黄片| 国产一区二区激情短视频| 亚洲一区高清亚洲精品| 亚洲五月色婷婷综合| 午夜福利,免费看| 99香蕉大伊视频| 色老头精品视频在线观看| 国产av一区二区精品久久| 一边摸一边抽搐一进一小说 | 亚洲精品粉嫩美女一区| 欧美成人免费av一区二区三区 | 久久亚洲精品不卡| 制服诱惑二区| 精品福利观看| 高清视频免费观看一区二区| 99久久精品国产亚洲精品| 国产视频一区二区在线看| 午夜福利免费观看在线| 久久这里只有精品19| 精品福利观看| 国产精品二区激情视频| 美女 人体艺术 gogo| 午夜91福利影院| 国产91精品成人一区二区三区| 久久香蕉激情| 女人爽到高潮嗷嗷叫在线视频| 亚洲熟妇熟女久久| 一级作爱视频免费观看| 亚洲欧美一区二区三区久久| 亚洲男人天堂网一区| 欧美精品一区二区免费开放| 亚洲欧洲精品一区二区精品久久久| 十八禁高潮呻吟视频| 99精国产麻豆久久婷婷| 三级毛片av免费| 亚洲午夜精品一区,二区,三区| 亚洲熟妇中文字幕五十中出 | 精品午夜福利视频在线观看一区| 国产精品亚洲一级av第二区| 亚洲黑人精品在线| 国产亚洲精品一区二区www | 91麻豆av在线| 亚洲精品在线美女| 久久精品91无色码中文字幕| 亚洲午夜理论影院| 亚洲视频免费观看视频| 日本一区二区免费在线视频| 岛国在线观看网站| 日韩欧美三级三区| 午夜老司机福利片| netflix在线观看网站| 人人妻人人爽人人添夜夜欢视频| 在线播放国产精品三级| 国产在线一区二区三区精| 男人的好看免费观看在线视频 | av福利片在线| 美国免费a级毛片| 18禁国产床啪视频网站| 欧美另类亚洲清纯唯美| 国产野战对白在线观看| 亚洲av欧美aⅴ国产| 国产成人精品久久二区二区免费| 精品国产美女av久久久久小说| 三级毛片av免费| 中文亚洲av片在线观看爽 | 韩国av一区二区三区四区| 国产三级黄色录像| 日本撒尿小便嘘嘘汇集6| 欧美日韩精品网址| 日韩视频一区二区在线观看| 国产激情欧美一区二区| 一级a爱片免费观看的视频| 香蕉国产在线看| 精品卡一卡二卡四卡免费| 亚洲成人国产一区在线观看| 熟女少妇亚洲综合色aaa.| 亚洲全国av大片| av超薄肉色丝袜交足视频| 亚洲av成人一区二区三| 国产不卡一卡二| 最新在线观看一区二区三区| 天堂俺去俺来也www色官网| 操出白浆在线播放| 建设人人有责人人尽责人人享有的| 亚洲av日韩精品久久久久久密| 国产成人啪精品午夜网站| 国产成人系列免费观看| 很黄的视频免费| 国产精品久久久久久精品古装| 久久久久久久久久久久大奶| a级毛片黄视频| 免费观看人在逋| 我的亚洲天堂| 欧美午夜高清在线| 操美女的视频在线观看| 亚洲欧美激情在线| 一夜夜www| 亚洲avbb在线观看| 女人高潮潮喷娇喘18禁视频| 精品熟女少妇八av免费久了| 麻豆乱淫一区二区| 丝袜人妻中文字幕| 麻豆成人av在线观看| 国产av精品麻豆| 91九色精品人成在线观看| 亚洲中文av在线| 欧美最黄视频在线播放免费 | 黄色女人牲交| 国产精品欧美亚洲77777| av视频免费观看在线观看| 国产人伦9x9x在线观看| 亚洲第一青青草原| 亚洲欧美日韩高清在线视频| 男女床上黄色一级片免费看| 一级毛片女人18水好多| 黄色视频不卡| 免费观看精品视频网站| 亚洲av成人av| 日日摸夜夜添夜夜添小说| 一区二区日韩欧美中文字幕| 国产成人欧美在线观看 | 国产欧美日韩综合在线一区二区| 亚洲精品一卡2卡三卡4卡5卡| 亚洲七黄色美女视频| 欧美 亚洲 国产 日韩一| 国产男女超爽视频在线观看| 91老司机精品| 人妻一区二区av| 黄片播放在线免费| 日本欧美视频一区| 日本一区二区免费在线视频| 纯流量卡能插随身wifi吗| 国产欧美日韩一区二区精品| 国产成人欧美| 欧美日韩成人在线一区二区| 亚洲一区中文字幕在线| 国产精品av久久久久免费| 美女福利国产在线| 国产午夜精品久久久久久| 久久人人爽av亚洲精品天堂| 午夜福利一区二区在线看| 亚洲国产中文字幕在线视频| 国产欧美日韩一区二区三| 丰满人妻熟妇乱又伦精品不卡| 在线观看免费视频网站a站| 国产国语露脸激情在线看| 欧美日韩亚洲高清精品| 国产欧美日韩一区二区精品| 亚洲色图av天堂| 中亚洲国语对白在线视频| 国产成+人综合+亚洲专区| 亚洲性夜色夜夜综合| 午夜91福利影院| 亚洲九九香蕉| 欧美日韩国产mv在线观看视频| 成人亚洲精品一区在线观看| 国产99久久九九免费精品| 99re6热这里在线精品视频| svipshipincom国产片| 亚洲国产看品久久| 自拍欧美九色日韩亚洲蝌蚪91| 国产又爽黄色视频| 女人被狂操c到高潮| 丁香欧美五月| 亚洲精品国产一区二区精华液| 精品亚洲成国产av| 久久久久久亚洲精品国产蜜桃av| 国产精品久久久av美女十八| 91麻豆av在线| 亚洲国产看品久久| 国产片内射在线| 日本黄色日本黄色录像| 日日摸夜夜添夜夜添小说| 国产三级黄色录像| av电影中文网址| 黄频高清免费视频| 欧美性长视频在线观看| 中文字幕人妻丝袜制服| 99国产精品99久久久久| videosex国产| av电影中文网址| 亚洲aⅴ乱码一区二区在线播放 | 国产精品欧美亚洲77777| 国产一区在线观看成人免费| 熟女少妇亚洲综合色aaa.| 久久精品国产亚洲av香蕉五月 | av欧美777| 精品第一国产精品| 一二三四社区在线视频社区8| 欧洲精品卡2卡3卡4卡5卡区| 国产91精品成人一区二区三区| 淫妇啪啪啪对白视频| 黄色视频不卡| 99国产精品99久久久久| 久久中文字幕人妻熟女| 久久久久国产精品人妻aⅴ院 | 在线观看免费视频日本深夜| 香蕉国产在线看| 丝袜在线中文字幕| 一进一出抽搐动态| 久久久久久免费高清国产稀缺| 久久午夜亚洲精品久久| 久久久久久久国产电影| 国产单亲对白刺激| 午夜福利欧美成人| www.熟女人妻精品国产| av视频免费观看在线观看| 午夜免费鲁丝| 国产免费现黄频在线看| 天天躁日日躁夜夜躁夜夜| 日本a在线网址| 麻豆乱淫一区二区| 国产精品成人在线| 黄色 视频免费看| 在线观看免费午夜福利视频| 欧美+亚洲+日韩+国产| 91麻豆av在线| 亚洲成人国产一区在线观看| av天堂久久9| 亚洲av美国av| 午夜免费鲁丝| 90打野战视频偷拍视频| 欧美乱码精品一区二区三区| 国产伦人伦偷精品视频| 下体分泌物呈黄色| 亚洲人成电影观看| 精品国产亚洲在线| 一进一出抽搐动态| 乱人伦中国视频| 自拍欧美九色日韩亚洲蝌蚪91| 18禁国产床啪视频网站| av国产精品久久久久影院| 女性生殖器流出的白浆| 精品久久久精品久久久| 高清黄色对白视频在线免费看| 变态另类成人亚洲欧美熟女 | 波多野结衣av一区二区av| 国产精品免费大片| 欧美激情 高清一区二区三区| 久久国产精品人妻蜜桃| 亚洲 国产 在线| 国产精品国产av在线观看| 亚洲免费av在线视频| 久久精品aⅴ一区二区三区四区| 亚洲avbb在线观看| 欧美老熟妇乱子伦牲交| 啦啦啦视频在线资源免费观看| 极品教师在线免费播放| 成年版毛片免费区| 国产av又大| av中文乱码字幕在线| 欧美一级毛片孕妇| 午夜福利,免费看| 王馨瑶露胸无遮挡在线观看| 亚洲av日韩在线播放| 成人特级黄色片久久久久久久| 热99re8久久精品国产| 一区福利在线观看| 国产99久久九九免费精品| 日本a在线网址| 久久国产精品影院| 日本撒尿小便嘘嘘汇集6| 丰满的人妻完整版| xxxhd国产人妻xxx| 欧美激情高清一区二区三区| 麻豆乱淫一区二区| 日本撒尿小便嘘嘘汇集6| 亚洲视频免费观看视频| 我的亚洲天堂| 亚洲七黄色美女视频| 久热爱精品视频在线9| 精品国产一区二区久久|