• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    2021-12-11 13:31:06JuanGuoYanzhuLiuShanLiZhiLiandSoniaKherbachi
    Computers Materials&Continua 2021年8期

    Juan Guo,Yanzhu Liu,Shan Li,Zhi Li and Sonia Kherbachi

    1Guilin University of Electronic Technology,Beihai,536000,Guangxi,China

    2Great Wall Computer Software and Systems Inc.,Beijing,100083,China

    3Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing,100070,China

    4State Grid Information&Telecommunication Group Co.,Ltd.,Beijing,100031,China

    5Department of Management,University of Bejaia,Bejaia,06000,Algeria

    Abstract:With the rapid development of mobile communication technology,the application of internet of vehicles(IoV)services,such as for information services, driving safety,and traffic efficiency,is growing constantly.For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing,encryption and decision-making can be completed at the local end,thus providing real-time and highly reliable communication capability.The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication channel for vehicles and server providers.Additional computing resources can be configured to accommodate the computing requirements of users.In this study, a virtual traffic defense strategy based on a differential game is proposed to solve the security problem of user-sensitive information leakage when an RSU is attacked.An incentive mechanism encourages service vehicles within the hot range to send virtual traffic to another RSU.By attracting the attention of attackers,it covers the target RSU and protects the system from attack.Simulation results show that the scheme provides the optimal strategy for intelligent vehicles to transmit virtual data,and ensures the maximization of users’interests.

    Keywords: Edge computing; internet of vehicles; differential games; security defense

    1 Introduction

    With the rapid development of internet technology such as network communication and intelligent vehicles, the internet of vehicles (IoV), including the cloud platform, car connection,car-road interconnection, and car service platform, has entered daily life.As an important part of intelligent transportation, the IoV has achieved real-time perception of roads and traffic conditions by combining the GPS, car/road camera, and other technologies such as sensors, computing,and intelligent processing [1].Vehicles are increasingly connected to the internet of things (IoT),which enables access to information for drivers and passengers on the move [2].Through rapid transmission and interaction with multiple traffic signals, the network of cars has implemented real-time analysis and realized control of the vehicle and the road, which improves traffic efficiency and traffic safety, and better serves the user.

    By converting a vast amount of data to meaningful, actionable knowledge, the IoV can help to meet challenges to safe, efficient transportation [3].Owing to the lack of physical resources for data processing, most vehicles must be based on roadside units (RSUs) connected to a cloud data center [4].Although the cloud computing platform has almost unlimited resources, its centralized architecture has the disadvantages of transmission delay and lack of network stability [5].Data volume, real-time demand, IoV computing capacity, and demand for communication stability limit the ability of the cloud computing architecture to meet user needs [6].Edge computing (EC) has become the object of intense research to solve these problems, in the form of the edge computingbased internet of vehicles (ECIoVs) [7].

    EC responds to user requests in a timely and efficient manner by distributing processing and memory functions at the network’s edge, thereby reducing the time consumed by network operations and service delivery [8].Compared to cloud computing, EC can provide fast, efficient computing and communication, and can realize the real-time interaction of all kinds of data,which is the new direction of the IoV.To deploy storage and computing at the wireless network edge, including radio access points, the edge information system (EIS), edge caching, EC, and edge AI will play a key role in the IoV [9].AI-related modules of EC are redesigned to distribute AI functions to the edge [10].However, the deployment position is closer to the user, which weakens its protection, increasing the likelihood of attack, which will affect user service [11], giving rise to security issues.

    The RSU is an important edge node, and an important component in the interaction of the user with edge calculation, network communication, and terminal equipment.This study designs a virtual traffic defense mechanism to avoid the interruption of vehicle communication and the compromise of user privacy from hotspot attacks on an RSU.Game theory is introduced to describe the costs and benefits of sending data to different RSUs.By maximizing the welfare of the system, the optimal strategy for each vehicle to send data to each RSU is obtained, so as to protect RSUs from hotspot attacks while minimizing the impact on network performance caused by virtual traffic.

    2 Related Work

    A large number of RSUs and vehicles equipped with embedded devices constitute the IoV with data communication, transmission, computing, and other capabilities [12].Data collected from vehicles include parameters such as a vehicle’s speed, location, and direction of movement,while data collected from RSUs can include overall traffic information [13].EC conducts computing tasks and data caching near end-users [14].At present, the network of cars utilizes marginal computing to give more computing, data storage, and communication ability to RSUs, so that they can simultaneously store, forward, and process packets [15].However, this increased functionality compromises user safety, and even the security of the network, due to attack.An attack on an RSU will first interrupt intelligent vehicle services in an area, which affects the user experience.An attacked RSU will not be able to return data to the cloud, which will hamper its resource scheduling.Even more serious is the disclosure of sensitive user information.

    Many solutions have been proposed to the privacy and security issues of RSUs.Chen et al.proposed a batch identification game model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures in a reasonable time in the cases of both complete and incomplete information [16].Liu et al.[17] designed a method to implement security policies and showed that traffic forwarding rules can illustrate security strategies.Arif et al.[18] suggested that packets sent to service providers from smart vehicles can ensure the safety of interactive data by anonymous processing techniques.Ying et al.[19] suggested that intelligent vehicles in a mixed area will be distributed to the symmetric key used to encrypt communication data between intelligent vehicles and RSUs.Basudan et al.[20] designed a communication protocol for the free adjustment of the fog node RSU, which can realize two-way authentication and protection of data integrity in communication.Wang et al.[21] proposed a scheme of computing, storage and communication with an RSU, so as to realize real-time collection, analysis and uploading of communication information of intelligent vehicles.Hui et al.[22] proposed a method of chaotic secure data transmission, encrypting and decrypting the main data signal by the principle of n-shift encryption.

    This article studies a potential attack and the corresponding defense scheme of an RSU in the edge calculation of a car network based on a decision framework.We analyze the dynamic decision-making process of the user in the hot attack of an RSU, and help an intelligent vehicle on the IoV to achieve its maximum income to ensure its privacy and security.

    3 Edge Computing Game Security Model

    The network game security model based on EC has a cloud layer, edge node layer, and intelligent terminal layer, as shown in Fig.1.The cloud layer is the data storage and resource scheduling center of the three-layer network model.The cloud data center (CDC) is located in the cloud layer and mainly coordinates the demand for resources of the boundary node layer.The edge nodes of dynamic virtual computing resource (VCR) dynamically provide the allocation and management of virtualization services for the server and RSU edge node layer on demand.The edge node layer in the middle is deployed on the edge server and RSU, and is dispersed in hotspots such as gas stations, parking spaces, and supermarkets.It coordinates between users and service providers, and a vehicle is connected to its recent RSU when it receives the service.As the bottom of the three-tier structure, the intelligent terminal layer is composed of a large number of intelligent vehicles and their generated data.Based on short-distance communication such as Wi-Fi, Bluetooth, and ZigBee, the intelligent vehicle is connected to the edge node, and service is provided by the RSU in the EC node.

    Roles fulfill different functions and form an IoV communication environment through cooperation or resistance.The main roles are the security center, RSU, intelligent vehicle, and RSU attacker.

    3.1 Safety Center

    Deployed in the cloud layer, the security center is the highest security manager in the network,is responsible for the safety of all entities including the vehicle, RSU, and service providers, and is certified as an organization that provides trusted services.

    3.2 RSU

    RSUs are deployed in dispersed locations such as gas stations, parking lots, and supermarkets, and have computational hardware, such as multifocal cuts, memory, and physical resources,to process user requests.The RSU creates virtual machines, and dynamically creates, migrates,uninstalls, and destroys resources between them to realize intelligent, efficient, real-time services.

    Figure 1:Network model based on edge computing

    3.3 Intelligent Vehicle

    An intelligent vehicle interacts with an adjacent RSU through the short-distance communication of Wi-Fi, Bluetooth, and ZigBee.It sends a service request to an RSU, which processes it to an edge server.Owing to the close geographical location of the communication parties, the communication effect and user experience will be better.

    3.4 RSU Attacker

    RSU attacks are monitored at all times.When an RSU interacts frequently with many vehicles and there is a surge in communication data, a hot service phenomenon occurs.The RSU attacker installs a traffic eavesdropping device near each RSU, selects the target RUS with the largest current data traffic through real-time traffic statistics, and attacks it.By attacking the target RSU,it can disrupt or even interrupt the current service.

    To ensure the normal operation of the RSU network and provide safe and reliable data interaction, we use virtual traffic to identify the monitoring results of global attackers [23,24].That is, the intelligent vehicles in the area send the virtual traffic to the non-hot RSU, which can mislead the attacker, thereby successfully resisting the attack.

    An incentive mechanism encourages intelligent vehicles to send virtual packets to a specified RSU, which generates virtual traffic.An RSU will develop incentives based on virtual traffic requirements.At the same time, the utility function of the intelligent vehicle will be obtained by combining the actual cost with the reward scheme to evaluate the degree of participation of the defense scheme.The parameters are shown in Tab.1.We establish the security model based on the differential game edge.

    Table 1:Model parameter

    Considering the following scenario, in the IoVs, the set of vehicles that are covered in theith RSU is denoted asGi, and thejth vehicle served in the set is given as vij, vij∈Gi.φij(t)is the virtual data quantity transmitted by vehicle vijat timet, whose value will directly affect the revenue of vehicles.The excitation obtained by vehicle vijtransmitting virtual dataφij(t)at timetis represented bylijφij(t), wherelijis the excitation value of unit virtual flow.The transmission cost of vehicle vijtransmitting virtual data at timetiscijφij(t), wherecijis the transmission cost of unit virtual data packets by vehicle vij.During service, the vehicle must bind and transmit the virtual data package with the business packet, and additional virtual data packages will inconvenience the vehicle.To facilitate discussion, we assumeandρis a parameter greater than zero to evaluate the number of users.Finally, with the transmission of virtual data, the communication link may produce a certain network transport overhead, such as network latency.We describe this asEi=κix(t), whereκiis a weight parameter to control the extra cost of the network, and a larger value ofκiindicates a more serious network impact.x(t)is the state variable of the network, which satisfies

    whereαandβare positive parameters,αis the total cost parameter generated by applying network resources, andβis the ratio of unexpected load overhead to system load.

    According to the above model, the incomeUijof vehicle vijcan be expressed as

    Therefore, based on differential game theory [25], when the game theory time is(0,T), the total cost function of vehicle vijcan be expressed as

    4 Feedback Nash Equilibrium Model Solution

    Based on research on the feedback Nash equilibrium solution of the differential game [26]and the above model, for any vehicle vij, there exists a continuously differentiable functionVti(t,x):[0,T]×R→Rsatisfying the Isaacs-Bellman equation,

    Then the strategy setis the feedback Nash equilibrium solution of the differential game described by Eqs.(1) and (3).For the optimal policy setwe give the following theorem.

    Theorem 1:For the differential game of Eqs.(1) and (3) , the feedback Nash equilibrium solution is

    Proof:The partial derivative of Eq.(4) with respect toxcan be obtained as

    To facilitate the solution, define

    Take the partial derivative of Eq.(6) to obtain

    Then

    Substitute Eqs.(6) in (5) to obtain

    Substitute Eqs.(7) and (8) in formula Eq.(4) and simplify to obtain

    Comparing Eqs.(8) and (10), it can be seen that

    Therefore, the optimal strategy can be calculated as

    where

    Theorem 1has been proved.

    5 Experimental Simulation

    We used MATLAB simulation tools to evaluate the performance of the proposed virtual traffic defense strategy based on a differential game.Consider a network of vehicles including five RSUs, each with an effective circular coverage area of radius 300 meters.After entering an RSUcovered area, a vehicle will participate in virtual traffic defense activities according to its initial state, and will protect the system from hotspot attacks.There are five vehicles in the observation range that send data to the RSU.Assume that the system observation time is 5 min, the RSU needs a total of 5 KB of traffic, and the system virtual traffic incentive value is 100 per byte.The values of other system parameters are shown in Tab.2.

    Table 2:Model simulation parameter settings

    Fig.2 depicts the relationship between the optimal amount of transmitted dataφij(t)and timet, from which it can be seen thatt∈[0,5], andφij(t)will be affected by many variables.Because an RSU provides a reasonable incentive strategy, the optimal transmission strategyφij(t)of the intelligent vehicle is an increasing function of timet.This means that the vehicle can make more money by continuously increasing the amount of virtual data it transmits.At the same time,because of the different network states, the speed of the vehicle transmission of virtual data can differ, i.e., a relatively poor network environment must transmit more virtual data to maximize the return.At the game’s conclusion, the vehicle will stop transmitting virtual data.Vehicle 1, due to its better network environment and less business data, has a relatively stable transmission speed over the whole game, and it continues transferring for 4.8 min.Vehicle 5 suffers from a poor network environment and more business data, which requires more data transmission at greater speeds, and the time required for transmission is shorter.

    Figure 2:Change of optimal transmission data volume φij(t) with time t

    The state of the vehicle network channel when the intelligent vehicle transmits virtual data is shown in Fig.3.It is clear that additional virtual data transmission increases network load,which harms RSUs and vehicle networks.The more virtual data transmitted, the worse the state of the network channel.When the intelligent vehicle stops transmitting virtual data, the network channel resumes its initial state.

    Figure 3:Change of channel state x(t) with time t

    Figure 4:Changes in security risk values over time

    The security risks of a vehicle when transmitting virtual data are shown in Fig.4, from which it can be seen that the transmission of virtual data will bring security risks to the vehicle.With the increase of transmission volume, the security risks suffered by the vehicle increase.The greater the amount of virtual data transmitted, the higher the risk.As the transmission is completed, its security risk will be reduced to the initial state.

    Figure 5:Comparison of dynamic optimal and static optimal game utility functions

    Figure 6:Comparison of probability of a successful hotspot attack

    Fig.5 compares vehicle revenue under the dynamic optimal transmission of the proposed virtual data volume strategy and the static optimal transmission of virtual data volume strategy,from which it can be seen that the benefits of the former are much greater than those of the latter.

    Fig.6 shows the probability of an attacker correctly locking a target RSU with or without a defense plan.Because an RSU misleads attackers by incentivizing vehicles to obtain virtual data,attackers cannot find hotspots, which avoids security threats from hotspot attacks on the RSU.The simulation results in Fig.6 show that the proposed virtual traffic transmission strategy based on differential games can effectively hide hotspot phenomena, thus protecting the network from RSU hotspot attacks.

    From simulation experiments, the quantitative relationship between the amount of data sent by vehicles and the channel state and safety risk can be obtained under the proposed safety model.According to the optimal strategy formed by the game among vehicles, the maximum welfare of the system can be obtained.While protecting the secure communication of the target RSU, the negative influence on the channel state is minimized.

    6 Conclusion

    Addressing the vulnerability to attack of an RSU in a network of vehicles relying on edge computing, we proposed a security defense scheme using differential game theory.An incentive mechanism was adopted to encourage serviced vehicles within a hotspot to send virtual traffic to another RSU.By attracting the attacker’s attention, the target RSU is protected from attack.Additional virtual traffic will increase the network load.Therefore, the system model was established through a differential game, and the optimal virtual data strategy was obtained, so as to balance communication security and network performance.Simulation results showed that the proposed scheme can effectively defend an RSU from hotspot attacks, provide the optimal strategy for the transmission of virtual data volume for intelligent vehicles, and avoid significant degradation of network performance.

    In future work, the opportunity interval of vehicle communication will be further considered.By analyzing its statistical model, the virtual data can be made closer to the distribution of real network traffic, so as to hide and protect key RSUs.

    Acknowledgement:We gratefully acknowledge the anonymous reviewers who read drafts and made many helpful suggestions.

    Funding Statement:This work is supported by Guangxi Vocational Education Teaching Reform Research Project (GXGZJG2020B149), J.G.(Juan Guo).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    中出人妻视频一区二区| 国产亚洲精品av在线| 久久鲁丝午夜福利片| 国产午夜福利久久久久久| 12—13女人毛片做爰片一| 国产乱人视频| 草草在线视频免费看| av在线天堂中文字幕| 18禁在线无遮挡免费观看视频| 乱系列少妇在线播放| 免费黄网站久久成人精品| 麻豆av噜噜一区二区三区| 又粗又爽又猛毛片免费看| 亚洲四区av| 久久午夜亚洲精品久久| 久久久久久久久大av| 亚洲最大成人中文| 国产精品乱码一区二三区的特点| 欧美激情久久久久久爽电影| 国产探花在线观看一区二区| 男人狂女人下面高潮的视频| 日韩av在线大香蕉| 成人特级av手机在线观看| 边亲边吃奶的免费视频| 亚洲国产精品久久男人天堂| 性欧美人与动物交配| 激情 狠狠 欧美| 精品久久久久久久久av| 久久久久久伊人网av| 亚洲美女视频黄频| 欧美日本亚洲视频在线播放| 亚洲成人av在线免费| 亚洲国产精品合色在线| 国产白丝娇喘喷水9色精品| 欧美日本视频| 一级毛片aaaaaa免费看小| 午夜精品国产一区二区电影 | 少妇的逼好多水| 亚洲av熟女| 一本一本综合久久| 热99re8久久精品国产| 亚洲最大成人手机在线| 99久久精品国产国产毛片| 亚洲国产精品成人久久小说 | 女的被弄到高潮叫床怎么办| 国产高清三级在线| 久久久久久久久中文| 九草在线视频观看| 两个人的视频大全免费| 黄片wwwwww| av天堂在线播放| 中文亚洲av片在线观看爽| 一区二区三区高清视频在线| 亚洲精品自拍成人| 国产精品久久久久久精品电影| 亚洲最大成人av| 男插女下体视频免费在线播放| 蜜桃亚洲精品一区二区三区| 国内精品久久久久精免费| 看片在线看免费视频| 亚洲精品456在线播放app| 久久精品久久久久久久性| 九色成人免费人妻av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久精品国产鲁丝片午夜精品| 18+在线观看网站| 亚洲一区二区三区色噜噜| 看非洲黑人一级黄片| 国产一区二区激情短视频| 亚洲av熟女| 国产片特级美女逼逼视频| 精品久久久久久成人av| 少妇的逼水好多| 校园春色视频在线观看| 日韩一区二区三区影片| 国产人妻一区二区三区在| 久久韩国三级中文字幕| 国产精品一区二区三区四区久久| 欧美bdsm另类| 国产午夜精品久久久久久一区二区三区| 欧美3d第一页| 观看美女的网站| 日本色播在线视频| 美女大奶头视频| 97在线视频观看| 国产精品女同一区二区软件| 美女内射精品一级片tv| 能在线免费观看的黄片| 又爽又黄无遮挡网站| 小蜜桃在线观看免费完整版高清| 免费观看在线日韩| 一区福利在线观看| 国产精品日韩av在线免费观看| 99热只有精品国产| 少妇的逼好多水| eeuss影院久久| 两个人的视频大全免费| ponron亚洲| 3wmmmm亚洲av在线观看| 久久久精品欧美日韩精品| 男插女下体视频免费在线播放| 国产69精品久久久久777片| 日本一本二区三区精品| 亚洲av熟女| 午夜爱爱视频在线播放| 国产91av在线免费观看| 日韩欧美在线乱码| 亚洲,欧美,日韩| av在线蜜桃| av在线观看视频网站免费| 亚洲欧洲国产日韩| 一级二级三级毛片免费看| 精品人妻熟女av久视频| 好男人视频免费观看在线| av女优亚洲男人天堂| 国内久久婷婷六月综合欲色啪| 免费看日本二区| 国产伦理片在线播放av一区 | 国产精品野战在线观看| a级一级毛片免费在线观看| 亚洲人成网站在线播放欧美日韩| 日韩一区二区视频免费看| 91精品一卡2卡3卡4卡| 搞女人的毛片| 99久久九九国产精品国产免费| 中文亚洲av片在线观看爽| 老熟妇乱子伦视频在线观看| av在线亚洲专区| 99久久九九国产精品国产免费| 久久精品91蜜桃| 久久精品国产自在天天线| 国产精品三级大全| 99久久无色码亚洲精品果冻| 久久亚洲精品不卡| 内射极品少妇av片p| 日韩在线高清观看一区二区三区| 日韩在线高清观看一区二区三区| 久久久久久久久久久免费av| 国产 一区精品| 欧美一区二区亚洲| 欧美3d第一页| 天天一区二区日本电影三级| 亚洲欧美精品专区久久| 97在线视频观看| 午夜激情欧美在线| 久久久欧美国产精品| av在线蜜桃| 丰满人妻一区二区三区视频av| 青青草视频在线视频观看| 在线免费十八禁| 久久精品久久久久久久性| 午夜福利成人在线免费观看| 精品久久久久久久久久免费视频| 天天一区二区日本电影三级| 国产亚洲5aaaaa淫片| 国产私拍福利视频在线观看| 日韩制服骚丝袜av| 成人特级黄色片久久久久久久| 国产真实伦视频高清在线观看| 色噜噜av男人的天堂激情| 久久久久久国产a免费观看| 一级黄片播放器| 在线播放无遮挡| 国产午夜精品久久久久久一区二区三区| 狂野欧美激情性xxxx在线观看| 精品一区二区三区视频在线| 久久精品久久久久久久性| 小蜜桃在线观看免费完整版高清| 成人毛片a级毛片在线播放| 免费不卡的大黄色大毛片视频在线观看 | 国产精品一及| 国产伦精品一区二区三区视频9| 欧美一区二区亚洲| 国产精品一区www在线观看| 麻豆av噜噜一区二区三区| 国产伦精品一区二区三区四那| 美女脱内裤让男人舔精品视频 | 午夜亚洲福利在线播放| 啦啦啦啦在线视频资源| 免费看光身美女| 少妇被粗大猛烈的视频| 一个人免费在线观看电影| 欧美丝袜亚洲另类| 亚洲三级黄色毛片| 少妇高潮的动态图| 国内少妇人妻偷人精品xxx网站| 国产精品,欧美在线| 91在线精品国自产拍蜜月| 91精品国产九色| 国产精品一区二区三区四区免费观看| www日本黄色视频网| av视频在线观看入口| 日本三级黄在线观看| 三级男女做爰猛烈吃奶摸视频| 亚洲自偷自拍三级| 亚洲av免费高清在线观看| 又黄又爽又刺激的免费视频.| 三级国产精品欧美在线观看| 国产蜜桃级精品一区二区三区| 一级二级三级毛片免费看| 一本一本综合久久| 中文字幕av在线有码专区| 国产一区二区三区av在线 | 欧美激情久久久久久爽电影| 久久精品久久久久久噜噜老黄 | 最近手机中文字幕大全| 中文字幕久久专区| 亚洲,欧美,日韩| 国产极品精品免费视频能看的| 国产精品国产三级国产av玫瑰| 亚洲av一区综合| 亚洲精品国产av成人精品| 国产精品电影一区二区三区| 亚洲电影在线观看av| 国产成人精品婷婷| 国产中年淑女户外野战色| 国产亚洲精品av在线| 最好的美女福利视频网| 高清日韩中文字幕在线| 91在线精品国自产拍蜜月| 欧美成人精品欧美一级黄| 成人永久免费在线观看视频| 国产高潮美女av| 国产高潮美女av| 国产精品一二三区在线看| 啦啦啦啦在线视频资源| or卡值多少钱| 麻豆精品久久久久久蜜桃| 成人午夜精彩视频在线观看| 国内精品美女久久久久久| 亚洲成人精品中文字幕电影| 美女xxoo啪啪120秒动态图| 97热精品久久久久久| 三级毛片av免费| 18+在线观看网站| 午夜福利在线在线| 天堂√8在线中文| 久久国内精品自在自线图片| 成人二区视频| 欧美日本视频| 日本与韩国留学比较| 丰满乱子伦码专区| 禁无遮挡网站| 直男gayav资源| 成人特级av手机在线观看| 精品国产三级普通话版| 成年女人永久免费观看视频| 日本爱情动作片www.在线观看| 真实男女啪啪啪动态图| 又粗又爽又猛毛片免费看| 成人午夜高清在线视频| 最近最新中文字幕大全电影3| 日韩av不卡免费在线播放| 欧美一区二区亚洲| 老女人水多毛片| 中文字幕av成人在线电影| 午夜亚洲福利在线播放| 在线播放国产精品三级| 国产乱人视频| 一个人观看的视频www高清免费观看| 老女人水多毛片| 亚洲av二区三区四区| 日产精品乱码卡一卡2卡三| 中文精品一卡2卡3卡4更新| 国产精品女同一区二区软件| 成人综合一区亚洲| 尾随美女入室| 久久精品91蜜桃| 国产精品一区二区三区四区久久| 麻豆国产av国片精品| 中文在线观看免费www的网站| 国产免费一级a男人的天堂| av国产免费在线观看| 婷婷六月久久综合丁香| 日韩在线高清观看一区二区三区| 国产白丝娇喘喷水9色精品| 久久这里只有精品中国| 美女内射精品一级片tv| 老司机福利观看| 亚洲在久久综合| 22中文网久久字幕| 国产高清激情床上av| 国产精品一区二区三区四区久久| 国产亚洲av片在线观看秒播厂 | 黄色配什么色好看| av在线观看视频网站免费| 青青草视频在线视频观看| 国产综合懂色| 欧美精品一区二区大全| 国产黄片视频在线免费观看| 亚洲成a人片在线一区二区| 看片在线看免费视频| 成人三级黄色视频| 两个人视频免费观看高清| 久久精品国产99精品国产亚洲性色| 伊人久久精品亚洲午夜| 97超视频在线观看视频| 久久99热6这里只有精品| 夫妻性生交免费视频一级片| 国产不卡一卡二| 我要搜黄色片| 午夜爱爱视频在线播放| 亚洲av成人精品一区久久| 亚洲性久久影院| 欧美一区二区精品小视频在线| 热99在线观看视频| 春色校园在线视频观看| 国产精品电影一区二区三区| 国产一区二区三区av在线 | 岛国毛片在线播放| 国产精品免费一区二区三区在线| 亚洲欧美中文字幕日韩二区| 国产av麻豆久久久久久久| 亚洲国产精品sss在线观看| 欧美成人一区二区免费高清观看| 久久久久久久久久久丰满| 美女高潮的动态| 特级一级黄色大片| 国产精品一及| 欧美精品一区二区大全| 国产一区二区在线av高清观看| 一级黄片播放器| 白带黄色成豆腐渣| 18禁黄网站禁片免费观看直播| 在线观看午夜福利视频| 特级一级黄色大片| 精品一区二区免费观看| 一级毛片我不卡| 内射极品少妇av片p| 亚洲av.av天堂| 最近的中文字幕免费完整| 日韩成人伦理影院| 男女下面进入的视频免费午夜| 天美传媒精品一区二区| 午夜精品国产一区二区电影 | 在线观看免费视频日本深夜| 久久久久久国产a免费观看| 免费黄网站久久成人精品| 日韩人妻高清精品专区| 最后的刺客免费高清国语| 看黄色毛片网站| 久久精品国产亚洲av香蕉五月| 性色avwww在线观看| 国产精品乱码一区二三区的特点| 国产精品一及| av黄色大香蕉| 边亲边吃奶的免费视频| 91在线精品国自产拍蜜月| 嘟嘟电影网在线观看| h日本视频在线播放| 国产精品日韩av在线免费观看| 国产综合懂色| 亚洲精品成人久久久久久| 成人无遮挡网站| 精品久久久久久久久久久久久| 村上凉子中文字幕在线| 美女内射精品一级片tv| 老女人水多毛片| 自拍偷自拍亚洲精品老妇| 国模一区二区三区四区视频| 亚洲婷婷狠狠爱综合网| 嫩草影院入口| 黄色欧美视频在线观看| 18禁黄网站禁片免费观看直播| 天美传媒精品一区二区| 成年免费大片在线观看| 波野结衣二区三区在线| 九九热线精品视视频播放| 黄色欧美视频在线观看| 少妇被粗大猛烈的视频| 日本黄色片子视频| 又粗又爽又猛毛片免费看| 亚洲婷婷狠狠爱综合网| 国产成人午夜福利电影在线观看| 97人妻精品一区二区三区麻豆| av视频在线观看入口| 国产成人午夜福利电影在线观看| 午夜a级毛片| 久久国内精品自在自线图片| 成年版毛片免费区| 综合色丁香网| 国产成人a区在线观看| 3wmmmm亚洲av在线观看| 青春草国产在线视频 | 三级男女做爰猛烈吃奶摸视频| 成人国产麻豆网| 插逼视频在线观看| 男人舔女人下体高潮全视频| 中国美女看黄片| 又黄又爽又刺激的免费视频.| 亚洲一区二区三区色噜噜| 一夜夜www| 亚洲人成网站在线播| ponron亚洲| 久久午夜福利片| av专区在线播放| 亚洲欧美成人综合另类久久久 | 免费大片18禁| 欧美高清性xxxxhd video| 91aial.com中文字幕在线观看| 一边摸一边抽搐一进一小说| 大又大粗又爽又黄少妇毛片口| 少妇丰满av| 国产69精品久久久久777片| 亚洲国产高清在线一区二区三| 亚洲五月天丁香| 日本熟妇午夜| 成年女人永久免费观看视频| 久久人妻av系列| 美女国产视频在线观看| 内地一区二区视频在线| ponron亚洲| 亚洲aⅴ乱码一区二区在线播放| 天堂网av新在线| av在线观看视频网站免费| 亚洲七黄色美女视频| 国产精品久久久久久精品电影小说 | 亚洲最大成人手机在线| 亚洲久久久久久中文字幕| 亚洲中文字幕日韩| 午夜亚洲福利在线播放| 久久久a久久爽久久v久久| 国产av在哪里看| 噜噜噜噜噜久久久久久91| 99精品在免费线老司机午夜| 国产成人91sexporn| 麻豆乱淫一区二区| 国产精品国产高清国产av| or卡值多少钱| 免费观看精品视频网站| 五月伊人婷婷丁香| 婷婷精品国产亚洲av| 人人妻人人澡欧美一区二区| 亚洲欧美清纯卡通| 亚洲欧美日韩东京热| 丰满人妻一区二区三区视频av| 一进一出抽搐动态| 国产精品99久久久久久久久| 我的女老师完整版在线观看| 91精品国产九色| 国产毛片a区久久久久| 麻豆国产97在线/欧美| 少妇人妻精品综合一区二区 | 亚洲精华国产精华液的使用体验 | 日韩一区二区三区影片| 亚洲色图av天堂| 一本一本综合久久| 亚洲欧洲日产国产| 极品教师在线视频| 一区二区三区高清视频在线| 青春草亚洲视频在线观看| 久久精品国产亚洲av天美| 日韩一本色道免费dvd| 国产精品福利在线免费观看| 97超视频在线观看视频| 人妻系列 视频| 国产免费一级a男人的天堂| 日韩欧美精品免费久久| 欧美日本视频| 97超视频在线观看视频| 成人二区视频| 男人舔奶头视频| 69av精品久久久久久| 丝袜喷水一区| 久久国产乱子免费精品| 国产精品美女特级片免费视频播放器| 国产精品国产高清国产av| 嫩草影院精品99| 亚洲无线观看免费| 男女那种视频在线观看| 午夜福利在线在线| 一本一本综合久久| 亚洲色图av天堂| 长腿黑丝高跟| 99久国产av精品| 亚洲av中文av极速乱| 国产精品久久久久久精品电影小说 | 亚洲欧美成人综合另类久久久 | 91狼人影院| 免费不卡的大黄色大毛片视频在线观看 | 欧美激情久久久久久爽电影| 91久久精品国产一区二区三区| 成人综合一区亚洲| 久久99热这里只有精品18| 日本黄色片子视频| 久久久午夜欧美精品| 人妻系列 视频| 只有这里有精品99| 韩国av在线不卡| 国内少妇人妻偷人精品xxx网站| 毛片女人毛片| 免费av不卡在线播放| 国产精品爽爽va在线观看网站| av在线老鸭窝| avwww免费| 午夜精品在线福利| 大香蕉久久网| 黄色视频,在线免费观看| 国内精品久久久久精免费| 最新中文字幕久久久久| a级毛色黄片| 久久99蜜桃精品久久| 国产中年淑女户外野战色| 22中文网久久字幕| 亚洲欧美日韩高清专用| 国内精品美女久久久久久| 国内精品宾馆在线| 99视频精品全部免费 在线| 久久韩国三级中文字幕| 舔av片在线| 亚洲欧美清纯卡通| 成人永久免费在线观看视频| 国产亚洲91精品色在线| 亚洲av不卡在线观看| 成人三级黄色视频| 日本在线视频免费播放| 色综合亚洲欧美另类图片| 久久人妻av系列| 少妇的逼好多水| 亚洲成av人片在线播放无| 在线观看美女被高潮喷水网站| 国产成人一区二区在线| 99九九线精品视频在线观看视频| 免费一级毛片在线播放高清视频| 国产成人精品婷婷| 国产欧美日韩精品一区二区| 我要看日韩黄色一级片| 国产亚洲精品av在线| 综合色av麻豆| 国产日韩欧美在线精品| 深夜精品福利| 午夜精品一区二区三区免费看| 热99在线观看视频| 黄片无遮挡物在线观看| 成年女人永久免费观看视频| 成人美女网站在线观看视频| 色吧在线观看| 午夜精品一区二区三区免费看| 丰满的人妻完整版| 免费观看精品视频网站| 狂野欧美激情性xxxx在线观看| 免费看光身美女| 91久久精品国产一区二区成人| 在线观看免费视频日本深夜| 国产片特级美女逼逼视频| 我的老师免费观看完整版| 日韩亚洲欧美综合| 在线天堂最新版资源| 亚洲av免费高清在线观看| 欧美精品一区二区大全| 人妻少妇偷人精品九色| 只有这里有精品99| 国产单亲对白刺激| 国产爱豆传媒在线观看| 国内精品宾馆在线| 91久久精品电影网| 国产成人aa在线观看| 夫妻性生交免费视频一级片| 女同久久另类99精品国产91| 精品免费久久久久久久清纯| 人妻制服诱惑在线中文字幕| 一级毛片久久久久久久久女| 亚洲国产精品合色在线| 两个人视频免费观看高清| 国产成人一区二区在线| 国产精品女同一区二区软件| 日日摸夜夜添夜夜添av毛片| 精品免费久久久久久久清纯| 亚洲色图av天堂| 日韩高清综合在线| 日本免费一区二区三区高清不卡| 亚洲一区高清亚洲精品| 丰满的人妻完整版| 亚洲丝袜综合中文字幕| 免费观看人在逋| 小说图片视频综合网站| 1024手机看黄色片| 日本免费一区二区三区高清不卡| 免费看av在线观看网站| 成人国产麻豆网| 亚洲第一电影网av| 亚洲精品色激情综合| 可以在线观看毛片的网站| 青春草亚洲视频在线观看| 不卡视频在线观看欧美| 欧美xxxx黑人xx丫x性爽| 免费av不卡在线播放| 国产老妇伦熟女老妇高清| 黄片无遮挡物在线观看| 国产在视频线在精品| a级毛片a级免费在线| 亚洲在久久综合| 少妇猛男粗大的猛烈进出视频 | 精品人妻熟女av久视频| 99久久精品一区二区三区| 欧美一区二区亚洲| 看十八女毛片水多多多| 毛片女人毛片| 神马国产精品三级电影在线观看| 国产一级毛片在线| 99久久精品热视频| 精品久久久噜噜| 听说在线观看完整版免费高清| 亚洲无线观看免费| 91久久精品国产一区二区成人| 夜夜看夜夜爽夜夜摸| 亚洲成人久久爱视频| 亚洲欧美精品专区久久| 亚洲国产精品久久男人天堂| 爱豆传媒免费全集在线观看| 久久久久久久久中文| а√天堂www在线а√下载| 国产高清不卡午夜福利| 1024手机看黄色片| 此物有八面人人有两片|