• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

    2021-12-11 13:32:54GeetanjaliRatheeRaziIqbalandAdelKhelifi
    Computers Materials&Continua 2021年8期

    Geetanjali Rathee,Razi Iqbaland Adel Khelifi

    1Department of Computer Science and Engineering,Jaypee University of Information Technology,Waknaghat,Solan,173234,Himachal Pradesh,India

    2Department of Computer Information Systems,University of Fraser Valley,Canada

    3Department of Computer Science and IT,Abu Dhabi University,United Arab Emirates,UAE

    Abstract:Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes, IoV has not been completely explored by business organizations.In order to tackle this problem, we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition, the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulationresults show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.

    Keywords: Pervasive computing; vehicular networks; security; trust;decision schemes; trusted internet of vehicles; big data

    1 Introduction

    Pervasive computing plays a significant role in resolving the issues of data processing in distributed heterogeneous environments.The involvement of various machine learning and IoT devices allows automatic communication among the devices in real-time environment.Over the last few decades, a massive effort is being employed around the globe to introduce smart applications, including smart cities, smart homes, smart industries, smart grids, smart healthcare and smart transportation, to name a few [1,2].The Internet and deployment of new technologies allow organizations and business players to communicate among each other.This pertains to the supply strategies, product suppliers, perspective and physical customers etc.In order to ensure an accurate, fast and immediate response, pervasive computing offers an excellent solution to various organizations and business perspectives.The term pervasive computing is defined as the use of automotive devices where number of objects share, access and process accurate and timely communications through various devices.It is a growing trend of computational capability where objects interact efficiently with the minimum or negligible involvement of the users.The devices are network-connected that interacts automatically from anywhere and at any time.Nowadays,industries are spending a lot of time and cost on research and development to explore various applications of pervasive computing.Because pervasive computing is capable of gathering, processing and exchanging information automatically, the technology can be adopted in variety of applications including activity and data context.IoV can be considered as a vital part of pervasive computing where the vehicles exchange or process the generated data through smart/intelligent devices.The pervasive IoV models can be further benefitted in reducing the traffic congestion,road accidents, weather forecasting and shortest route directions etc.From the user’s perspective,pervasive computing is becoming a formidable solution in IoV to ensure an accurate and immediate vehicular communication as depicted in Fig.1.The depicted Fig.1 details the pervasive computing scheme in IoV having different types of processing methods such as integrating,transmission and analyzing over various vehicles.In addition, the subsection logic and decision making schemes are integrated to ensure a trusted and secure communication using several domain parameters over various attribute values.However, the number of security threats while computing or generating the pervasive decisions still reduces the business interest to fully adopt this technology.The IoV is a novel transportation technology or an application of pervasive computing where vehicles embedded with smart/intelligent sensors are connected to each other or with the adjacent infrastructure [3-5].These vehicles collaborate with each other by sharing information such as accident warning etc.Furthermore, IoV is an emerging application of Intelligent Transportation System (ITS) which enables the users to make safer and better informed decisions by providing innovative services related to different modes of traffic management systems [6-9].

    Figure 1:Pervasive computing in internet-of-vehicles

    1.1 Motivation

    The heterogeneity of various devices in pervasive computing makes IoV-enabled systems vulnerable to several security threats such as man-in-middle attack, denial-of-service attack, message alteration etc.In addition, the involvement of compromised devices while making pervasive decisions may involve various network degradation factors.The preservation of IoT objects from various security threats is also measured as a key issue along with the concern of revamping millions of daily life objects with latest technology which might not even get adapted as IoT devices.However, the goal to reduce environmental impact with the increasing number of vehicles on public roads evokes traffic safety concerns, which integrated with technological advancement leads to development and research in the area of cooperative and autonomous driving [10,11].In addition, sovereign vehicles have the ability to improve the comfort for the drivers as well as passengers.Nevertheless, to bring automated vehicles in the market, we encounter substantial security issues that may only be conquered by critical research with insight along with driver support and local awareness by enabling pervasive vehicular systems.The main motive of autonomous driving is to perceive the environment with on board vehicle sensors, but due to high cost of sensors and their proximity limitations, sensors are only capable of detecting cooperative driving and line-ofsight objects.Platooning is considered as one of the popular vehicle to vehicle communication method where a vehicle follows the vehicle in its front by determining its distance and speed with its sensors [12,13].In cooperative systems where sensors read data from other vehicles, it may also require certain methods to include those signals in their existing control systems for dealing with several security and complexity issues.Therefore, the main objective of this paper is to design a secure and trusted model using pervasive techniques for IoV.

    1.2 Research Objective

    By considering a variety of real-time applications of various smart devices, it is of utmost to secure the devices by preventing them from various intruders.Pervasive computing in the ITS environment transmit very sensitive information, such as the real time traffic monitoring, traffic congestion, weather conditions etc.Therefore, it must be a paramount necessity that security by design is provided to the automated network.Besides, the presence of malicious nodes may have severe impact on the automated network as they have the ability to tamper the data generated by the IoT devices [14,15].Therefore, this leads to the question about how to provide a secure networking paradigm for enabling the devices to share data in an attack-free pervasive computing environment.In addition, the involvement of various security schemes may invade various security threats while making a real time decisions in the network.Therefore, we have considered the ITS application of IoV pervasive computing to highlight the need of security/trust during communication.

    1.3 Contribution of the Paper

    The aim of this paper is to introduce a trust system that examines real time traffic situations based on sensory readings and data from surrounding vehicles to guide decision making in automated and cooperative vehicles.The proposed mechanism is inspired by Xia et al.[16] where number of factors and attributes are considered to solve the trust of a sensor using decision making controller to provide safe and reliable decisions.In addition, for securing the communication among vehicles and devices, security schemes are foreseeable for pervasive computing vehicles.The proposed model has a system that supports real time decisions by indicating the trust in perceived situations.The potential contribution of the paper is further detailed as follows:

    ? A graph theory based trust factor mechanism is used to compute the authenticity of communicating vehicles in the network.

    ? Further, a multi-attribute scheme known as SAW method is applied to further improve the decision mechanism of the proposed ITS framework.

    ? The proposed scheme is analyzed over various simulating parameters such as trust nodes,record accuracy, DoS threat and detection rate security metrics.

    The rest of the paper is structured as follows.Section 2 illustrates the related work in automated vehicular systems and the use of subjective logic and trust management system in ITS.Section 3 provides details of our proposed solution using subjective logic and trust methods to secure ITS networks.Next, Section 4 provides the details of the simulation model and the results and lastly, Section 5 concludes and directs the prospect of the paper.

    2 Related Work

    Variety of security schemes have been proposed by scientists and authors to include pervasive computing in ITS.This section describes various security mechanisms through several cryptographic, hypothetical, game theory and experimental methods to ensure security in pervasive computing ITS systems.Ivanov et al.[17] have presented a detailed discussion on vehicular to vehicular communication while exchanging the information among each other.They have illustrated the standardized mechanisms and cyber security threats such as ITU and ISO,ETSI and IEEE for enabling a security communication process in internet based vehicular systems.Tab.1 determines the proposed mechanisms with their performance outcomes of various researchers/scientists.Rawat et al.[18] have proposed a data falsification detection approach in IoV using hash based scheme.The author’s have used hash based encryption mechanism to enhance the vehicular communication mechanism by adopting accurate information about their neighboring environments.The authors have improved throughput and end-to-end delay using clustering scheme for reducing the traffic congestion.

    Walker et al.[19] have determined an intrusion detection system within pervasive and ubiquitous environment to classify the threats both qualitatively and quantitative.The authors have examined the cyber security concerned in pervasive computing environment while processing the information through various smart/intelligent devices.Pei et al.[20] have proposed a secure pervasive edge computing model for IoV by designing a model having minimum system delay by considering the speed of vehicles.The sub-optimal and lower bound expressions are formed for allocating the power coefficients.Further, wold and frank algorithm is proposed to achieve an optimum power.Tithi et al.[21] have proposed a friendly jamming location verification security technique for vehicles in ITS to prevent eavesdropping attacks during communication among parties.In addition, the authors have presented an efficient distance bounding and friendly jamming method to detect any deviation and verify the velocity and location of vehicular infrastructure.The results analysis validated the realistic traffic using friendly jamming method with an improvement of 92% reduction rate against existing works.Passerone et al.[22] have addressed a secure pervasive computing issue among vehicles related to authorization and authentication of intervehicular safety commends.The authors have proposed a contract approach with the integration of arrowhead frameworks to ensure secure communication.The proposed mechanism is validated by representing the results on autonomous vehicles.The researchers are now days working on ITS deployment and development by addressing privacy and security concerns.In order to deploy successful communication among vehicles, it is needed that life-critical-safety concerns are not modified by the intruders.Panagiotopoulos et al.[23] have proposed a Diffie-Hellman vehicular communication mechanism for authenticating the data in pervasive computing.The authors improved the security towards internet of vehicles system.

    Table 1:Secure IoV mechanism proposed by various researchers

    In order to enhance the security among automated vehicles such as channels, sensors and existing methods, various controlling systems are used.To protect the arithmetic operations of these controllers, Cheon et al.[24] have proposed homomorphic cryptographic scheme by proposing a linear homomorphic authentication encryption.The proposed mechanism successfully enhances the security against forgery and eavesdropping attacks against computational tractability.To further improve the road side accidents and safety, high precision maps can be used as additional information.Lai et al.[25] have proposed a privacy and security scheme for real time updates solving two issues i.e., completing quality and payment control systems.The authors have proposed a blockchain mechanism to protect the vehicles’privacy through blind signature techniques.The simulation and theoretical results indicate the optimal benefits in real time map updations to guarantee the reliability and efficiency of the pervasive vehicles.

    The improvements in communication, sensing and computations have led to the development of driver-assisted systems.In order to prevent from crashes and control the driver tasks, an adaptive cruise control mechanism was used to maintain the safety and security of the vehicles.Dasjardins et al.[26] have proposed a novel autonomous vehicle based on modern machine learning approaches.The authors presented the benefit of using reinforcement learning for secure longitudinal measures.The authors have used approximation function using gradient descent algorithm.In order to resolve this issue, Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verified the information using a two-level method i.e., data verification along with the selection of miner nodes.Also, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.

    Though a variety of security schemes in pervasive techniques based upon encryption algorithm, Blockchain mechanism, hypothetical scenarios and probability methods have been proposed by the scientists.However, each algorithm has its own security concerns such as computation delay, verification delay, key management overhead and so on.Further, the existing mechanisms have significant delay for validating the legitimacy of communicating device in real-time scenarios.In order to overcome from these issue, this paper has proposed a decision making scheme to ensure a secure IoV mechanism with reduced delay and overhead.

    3 Proposed Mechanism

    The trust among the communicating entities is defined to a significant factor to ensure a secure process in ITS mechanism.The involvement of trusted intermediate nodes during communication may reduce the efforts of computation process and delay in the network.Very few papers have introduced the concept of trust based security in ITS.This paper has proposed a trusted decision scheme while transmitting the message in ITS mechanism.

    3.1 System Model

    The system model of the proposed mechanism is shown in Fig.2 and is based on graph theory consisting of verticesV, edgesE, and Trust Factor(TF).The vertex V includingv1,v2,...,vn, is the set of vertices that define the number of nodes in the network,Eare the edges or links that establish a connection while sharing or transmitting the information in the network andeijis defined as a relation or a link from nodevitovj.

    Figure 2:Identification of trusted IoT device

    The links among nodes in the network may be direct (neighboring nodes that are directly attached) or indirect (nodes that are attached via more than 1 hop).Additionally,TFis a function asand represents a trust value that is a real number between 0 and 1 and betweenviandvj.According to our proposed phenomenon, the trust model of IoV network is defined as a directed graph as shown in Fig.2 consisting of five devices asv1,v2,...v5, with their edgeseijand trust factorTFij.Now, the working of trusted pervasive mechanism using trust based factor is now detailed in below subsections.

    3.2 Node’s Trust Factor

    TheTFof each node inviandvjis represented between 0 and 1 where 0 signifies an untrustworthy node while 1 implies a completely readable and trusted node.The trust grading criteria is depicted in Tab.2 to determine the behavior of each node in the network.Further, a threshold value is assumed in order to differentiate between malicious and faulty nodes.If theTFof any device is less than 0.75 then it is regarded as a completely disinfected and malevolent node.

    Now, theTFof the nodes in the directed graph are computed by analyzing their in-degree and out-degree whereTFinis defined asTFthat the neighboring node gets aboutviwhileTFoutis theTFthatvihas about its neighbors.

    Table 2:Definition of trust factor

    3.3 Trust Classification

    The trust values can be classified into three different types i.e., path information and historical information.Path trust value is defined as the value of a path from source to destination computed usingTFinandTFoutwhile the historical trust is the summation of multiple trust values such as recommended trust, direct trust, activeness and incentive function of each node.

    Path trust on the other hand, is the one that determines the service levels based on the assessment of pathTV.It can be determined as a constriction in routing decisions asPTFij=min(TFik)as shown in Fig.2.PTF14is defined as path 124 and isi≤k≤j?1min(0.90,0.86)=0.86.

    3.4 Historical TF(HTF)

    It is defined as a node’s topological behavior based on historical information interaction computed by various decision factors such as recommended trust factorRTFij, Direct Trust FactorDTFij, Activation Trust FactorATFijand Incentive Trust FactorITFijthat can be computed by Eq.(1).

    3.5 Recommending TF(RTF)

    In order to fasten up the communication mechanism and reduce computational and communication overhead, theRTFijis used to predict theTFof the nodes that are repeatedly used while sharing or transmitting the information through a particular path in real time scenario.Initially,the threshold credibility of a recommended value is used to compared to theTFof a node.If theRTFijis greater than threshold, then we may use the recommendedTFof that node.RecommendedTFmay use theRTFof that node.RTFmay be for direct or indirect path recommended by only reliable and highly trusted nodes.DTF=minTFijwhileITF=minTik+Tkj.

    3.6 Direct TF(DTF)

    The direct path or link between two nodes is defined as a direct connection where theTFfor direct link is calledDTF.However, interaction among multiple hops and their information is defined asITF.The directTFijof a nodevito nodevjis defined as the summation oftintovjwith total number of interactions as given in Eq.(2).

    wherekis the average of overall interaction computations withinNintervals.

    3.7 Activeness TF(ATF)

    The malicious nodes in the network try to attract maximum number of nodes by specifying shortest path and a highly reliable behavior to trap ideal devices.The activation function is the degree through which the behavior of a number of nodes can be easily computed by analyzing their activeness in the network is defined as Eq.(3).

    whereIdetermines the cumulative entities that are associated with the node under evaluationvjwhereμis termed as threshold value.

    3.8 Incentive Function(IF)

    In order to encourage trustworthy nodes to participate in network communication and to generate an alarm upon identification of malicious neighboring nodes, the proposed framework has used an incentive function.An extra credit is assigned to each trusted node to find or inform any malicious node that is directly or indirectly connected to the network.Further, penalties are imposed on the nodes that act maliciously, the nodes having high penalty rates would be assigned a lowTFand may be blocked permanently from future communication.The nodes having higher credit points are considered as highly trusted and can be used to recommend maximum number of neighboring nodes to fasten up their communication process as defined in Eqs.(4) and (5).

    3.9 Subjective Adjective Weight(SAW)

    Subjective Adjective Weight (SAW) [28] theory is a decision making model that is considered as one of the most significant multi criterion decision making schemes.SAW method integrates the quantitative and qualitative factors via multiple index assessment procedure in four different steps.

    Step 1:Initially, generate an evaluation matrix consisting ofMentities/node known as alternatives andNservices.The first procedure of SAW is to create a decision matrix with the junction of each alternative and criteria.Now, let’s denoteD=as the matrix of decision, wheredijis the ith device rating with respect to the jth criteria.

    Step 2:The generated matrix is normalized torijby constructing a normalized matrix of decisions for beneficial and non beneficial attributes known as:

    Beneficial attribute

    Non-Beneficial attribute

    Step 3:A weight setWifor eachi=1,2...nis fixed for the service measures by creating weighted and normalized matrix of decision as:

    Step 4:The score of the ith alternative is computed by:

    Step 5:At last, the Optimal Alternative (OA) is chosen as:whereSiis the score metrics from alternatives score i.

    We have used SAW to precisely determine the weight of trusted decision factors based upon nodes’historical behaviors as:

    The execution of proposed mechanism is also described through an algorithm as mentioned in Algorithm 1.

    Algorithm 1:Trusted algorithm (subjective logic and SAW)Input:A set of ‘n’devices/vehicles Output:Device is trusted or malicious Step 1:A network is represented through a directed graph having ‘n’number of vertices ‘V’?v1,v2...vn and ‘n’number of edges ‘E’?e1,e...en Step 2:TF is computed by each node depending upon various criterions such as:TF=RTF+DTF+ATF+ITF Step 3:SAW approach is used to further to compute the TF to identify beneficial and non-beneficial attributes where,

    Beneficial attribute rij= dij dmax ij Non-Beneficial attribute rij=dmax ij dij If (deviceTF >threshold) then Device is trusted Else Device is malicious End if

    4 Performance Analysis

    4.1 System State

    The proposed trusted mechanism is analyzed using trust management system through SAW decision model against Kang et al framework.To validate and compare the results, the proposed approach is evaluated against number of networking metrics over existing method such as trusted nodes, data alteration, accuracy, satisfaction rate and etc.200 nodes are initially deployed whose decision factors are updated after every 80 seconds.Further, the proposed approach’s legitimacy is validated by intentionally adding malicious devices in the network.The simulation criteria used to determine the simulated results are represented in Tab.3.Assumptions:Threshold valueμused to distinguish between types of devices is assumed as 0.49.The malicious nodes are increasing at 5% and 10% rate upon increasing the network size.

    Table 3:Simulation parameters

    4.2 Existing(Conventional)Method

    The efficiency and management of the proposed approach is evaluated using numerical simulations through MATLAB.Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verifies the information using two-level method as data verification along with the selection of miner nodes.Furthermore, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.Incentive function, activation record and SAW approaches are used to analyze the trust of each communicating node.The SAW decision method is used to evoke the node’s legitimacy by analyzing number of metrics using subjective logic function.The out performance of the proposed framework is verified against various security measures such as message alteration, node satisfaction, accuracy and detection of legitimate nodes.

    4.3 Results and Discussion

    The impacts of a trusted message system and SAW model while analyzing each and every activity of the IoV system are discussed in this paper.Fig.3 depicts correct node identification based on the proposed approach.As clearly seen in the presented Fig.3, the involvement of reputation model, incentive function and SAW function using multiple decision function ensures a better identification of communicating nodes (either malicious or trusted).However, existing (baseline) scheme performs less and exhibits reduced efficiency after increasing the intercommunication among IoT devices.

    In addition, Fig.4 represents record accuracy graph where upon increasing the number of nodes, it is very difficult to alter the transmitted or recorded data.The record accuracy of proposed phenomenon is better as compare to existing mechanism because of trust computation approach of each device while exchanging the information among each other.

    Figure 3:Identification of trusted IoT device

    The incentive and activation functions adversely affect a node’s reputation upon behaving maliciously and may possibly block or disown from communicating in the network.Subjective logic function efficiently analyzes the accuracy of communicating nodes by computing their trust values.However, the continuous analysis and recording of communicating nodes is very difficult in case of baseline mechanism.In addition, Fig.5 determines the detection rate of malicious nodes using SAW approach.Subjective logic system filters out the overhead communication and networking congestion by computing non-beneficial and beneficial attributes.The filtered record management may speed up the computation process and identification of trust factors with more accuracy.

    Figure 4:Record accuracy

    Figure 5:Detection rate

    Finally, Fig.6 evaluates the proposed scheme’s out-performance against DoS malicious threat.During initial node’s establishment where it is necessary to analyze node’s authenticity, it may involve various malicious threats.The proposed approach outperforms as compare to existing mechanism because of involved pervasive techniques while communicating among various devices.

    However, upon increasing the devices, proposed approach is successfully able to predict the malicious nodes performing various attacks in the network.

    Figure 6:DoS detection threat

    5 Conclusion

    In this paper, we have considered an IoV application in pervasive computing to secure the process of data transfer in real-time environment.To further improve the safety and prevent road accidents and security issues, a variety of intelligent transportation systems have been proposed by various researchers.In this paper, a trusted security mechanism is proposed using various decision making factors and trust classification schemes.The proposed mechanism enhances the network security during pervasive computing where smart devices are generating and processing real time information without any involvement of human power.The proposed mechanism efficiently enhances the trusted node identification, record accuracy and detection rate using SAW approach having accurate and immediate identification of ideal communication nodes in the network.The results are simulated by analyzing the trust value of each device analyzing its communicational behavior.All the simulated results are verified over a conventional (baseline)approach.The number of patterns that can be further analyzed and learned by attackers still needs to be determined.

    Further, how the proposed mechanism can be further improved having intelligent transportation scheme over dynamic attacking patterns with modified security threats may be considered in future work.

    Acknowledgement:This work is supported by the Jaypee University of Information Technology,India, University of Fraser Valley, Canada and Abu Dhabi University, United Arab Emirates.

    Funding Statement:The work was funded by the Abu Dhabi University, Faculty Research Incentive Grant (19300483-Adel Khelifi), United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    人人妻人人爽人人添夜夜欢视频| 国产成人精品久久二区二区免费| 国产午夜精品久久久久久| 一级黄色大片毛片| 久久国产亚洲av麻豆专区| 国产精品久久电影中文字幕 | 欧美黄色淫秽网站| 国产午夜精品久久久久久| 悠悠久久av| 亚洲精品国产色婷婷电影| 久久性视频一级片| 黑丝袜美女国产一区| 国产精品香港三级国产av潘金莲| 999久久久精品免费观看国产| 又黄又爽又免费观看的视频| 久久久久久久久免费视频了| 可以免费在线观看a视频的电影网站| 国产成人一区二区三区免费视频网站| 黄片大片在线免费观看| 亚洲av熟女| 国产精品久久视频播放| 精品久久久久久电影网| 亚洲第一欧美日韩一区二区三区| 日日摸夜夜添夜夜添小说| 99久久99久久久精品蜜桃| 久久 成人 亚洲| 免费日韩欧美在线观看| 麻豆乱淫一区二区| 极品少妇高潮喷水抽搐| 老汉色av国产亚洲站长工具| 久久久久国内视频| 成人三级做爰电影| 在线观看免费高清a一片| 免费日韩欧美在线观看| 日韩制服丝袜自拍偷拍| 免费少妇av软件| 欧美黄色片欧美黄色片| 免费女性裸体啪啪无遮挡网站| 在线观看午夜福利视频| 色婷婷av一区二区三区视频| 最近最新中文字幕大全电影3 | 久久久久久久久免费视频了| 啦啦啦视频在线资源免费观看| 人妻丰满熟妇av一区二区三区 | 午夜福利视频在线观看免费| 国产精品免费一区二区三区在线 | 人人妻人人爽人人添夜夜欢视频| 久久人妻熟女aⅴ| 欧美亚洲 丝袜 人妻 在线| 别揉我奶头~嗯~啊~动态视频| 欧美丝袜亚洲另类 | 色综合婷婷激情| 午夜激情av网站| 亚洲国产欧美日韩在线播放| 午夜福利一区二区在线看| 日本黄色日本黄色录像| a级毛片在线看网站| 免费观看a级毛片全部| 狂野欧美激情性xxxx| 国产aⅴ精品一区二区三区波| 午夜日韩欧美国产| 亚洲三区欧美一区| 一区福利在线观看| 亚洲熟妇中文字幕五十中出 | 亚洲性夜色夜夜综合| 国产亚洲精品久久久久5区| 成年人黄色毛片网站| 亚洲免费av在线视频| 亚洲人成伊人成综合网2020| 国产高清国产精品国产三级| 下体分泌物呈黄色| 国产1区2区3区精品| 亚洲精品av麻豆狂野| 看免费av毛片| 变态另类成人亚洲欧美熟女 | 巨乳人妻的诱惑在线观看| 国产不卡av网站在线观看| 国产精品亚洲一级av第二区| av电影中文网址| 免费在线观看黄色视频的| 久久精品成人免费网站| 国产精品一区二区在线观看99| 日本五十路高清| 欧美日韩瑟瑟在线播放| www.精华液| 亚洲人成电影免费在线| 99riav亚洲国产免费| 中国美女看黄片| 母亲3免费完整高清在线观看| 啪啪无遮挡十八禁网站| 国产成人精品久久二区二区91| 亚洲黑人精品在线| 亚洲一区二区三区欧美精品| 制服诱惑二区| 久久久国产一区二区| 少妇裸体淫交视频免费看高清 | e午夜精品久久久久久久| 精品高清国产在线一区| 精品一品国产午夜福利视频| 欧美乱妇无乱码| 看免费av毛片| 国产又爽黄色视频| 久久精品亚洲av国产电影网| 中出人妻视频一区二区| 如日韩欧美国产精品一区二区三区| www日本在线高清视频| 制服人妻中文乱码| 午夜精品久久久久久毛片777| 国产一区二区三区在线臀色熟女 | 下体分泌物呈黄色| 十八禁网站免费在线| 国产不卡av网站在线观看| 高清视频免费观看一区二区| 女人久久www免费人成看片| 成人亚洲精品一区在线观看| 日韩三级视频一区二区三区| av有码第一页| 视频区欧美日本亚洲| 岛国毛片在线播放| 极品教师在线免费播放| 精品久久久久久久毛片微露脸| 日韩欧美三级三区| 久久久国产欧美日韩av| 在线永久观看黄色视频| 欧美激情极品国产一区二区三区| 欧美黑人欧美精品刺激| 99热只有精品国产| 啦啦啦免费观看视频1| 亚洲av成人不卡在线观看播放网| 国产精品98久久久久久宅男小说| 欧美日韩av久久| 一级毛片精品| 久久这里只有精品19| 欧美丝袜亚洲另类 | 老熟女久久久| 亚洲久久久国产精品| 午夜亚洲福利在线播放| 嫁个100分男人电影在线观看| 成人黄色视频免费在线看| 美女扒开内裤让男人捅视频| 天天躁日日躁夜夜躁夜夜| 丝袜在线中文字幕| 国产99白浆流出| 熟女少妇亚洲综合色aaa.| 天堂√8在线中文| 亚洲国产精品sss在线观看 | 亚洲国产看品久久| 黑人巨大精品欧美一区二区蜜桃| 亚洲国产欧美日韩在线播放| 欧美在线黄色| 日韩 欧美 亚洲 中文字幕| 飞空精品影院首页| 麻豆成人av在线观看| av不卡在线播放| av免费在线观看网站| 精品久久久久久,| 亚洲视频免费观看视频| 亚洲精品自拍成人| 亚洲综合色网址| 咕卡用的链子| 十八禁高潮呻吟视频| 1024香蕉在线观看| 女人久久www免费人成看片| 99riav亚洲国产免费| 熟女少妇亚洲综合色aaa.| 免费一级毛片在线播放高清视频 | 亚洲成av片中文字幕在线观看| 亚洲一区二区三区欧美精品| 两个人看的免费小视频| 国产精品98久久久久久宅男小说| 免费黄频网站在线观看国产| 五月开心婷婷网| 欧美乱妇无乱码| 日本vs欧美在线观看视频| 亚洲精品国产精品久久久不卡| 久久久久久久久免费视频了| 动漫黄色视频在线观看| 在线观看免费视频网站a站| 人成视频在线观看免费观看| 国产高清videossex| 午夜激情av网站| 热99久久久久精品小说推荐| 久久这里只有精品19| 在线十欧美十亚洲十日本专区| 国产av一区二区精品久久| 1024视频免费在线观看| 午夜日韩欧美国产| 啦啦啦免费观看视频1| 日韩大码丰满熟妇| 好看av亚洲va欧美ⅴa在| 日韩精品免费视频一区二区三区| 国产极品粉嫩免费观看在线| 水蜜桃什么品种好| 90打野战视频偷拍视频| 制服人妻中文乱码| tube8黄色片| 一级,二级,三级黄色视频| 50天的宝宝边吃奶边哭怎么回事| 在线视频色国产色| 欧美色视频一区免费| 在线观看舔阴道视频| 无遮挡黄片免费观看| 亚洲国产欧美一区二区综合| 中文字幕高清在线视频| 亚洲视频免费观看视频| 亚洲一区高清亚洲精品| 不卡一级毛片| 99国产精品一区二区蜜桃av | 亚洲欧美日韩另类电影网站| 又紧又爽又黄一区二区| 飞空精品影院首页| 又黄又粗又硬又大视频| 亚洲精品av麻豆狂野| 亚洲在线自拍视频| 欧美乱妇无乱码| 免费高清在线观看日韩| 男女午夜视频在线观看| 麻豆av在线久日| 精品第一国产精品| 日本欧美视频一区| 中文字幕人妻熟女乱码| 一级黄色大片毛片| 中文字幕人妻丝袜制服| 日日摸夜夜添夜夜添小说| 国产xxxxx性猛交| 久久精品亚洲av国产电影网| 国产精品国产高清国产av | 丁香六月欧美| 国产一卡二卡三卡精品| 久久久国产成人精品二区 | 亚洲男人天堂网一区| 国产区一区二久久| 国产高清视频在线播放一区| 十八禁人妻一区二区| 亚洲午夜理论影院| 国产欧美日韩精品亚洲av| 精品欧美一区二区三区在线| 日韩免费av在线播放| 国产精品久久久久久人妻精品电影| 亚洲色图综合在线观看| 久久中文看片网| 欧美丝袜亚洲另类 | 99国产精品一区二区三区| 捣出白浆h1v1| 制服人妻中文乱码| 久热这里只有精品99| 国产成人av教育| 久久香蕉精品热| 久久中文字幕一级| 啦啦啦视频在线资源免费观看| 久久狼人影院| 夜夜夜夜夜久久久久| 天堂俺去俺来也www色官网| 18禁美女被吸乳视频| 丰满迷人的少妇在线观看| 十八禁高潮呻吟视频| a在线观看视频网站| 欧美乱色亚洲激情| 午夜福利,免费看| 久久草成人影院| 12—13女人毛片做爰片一| 交换朋友夫妻互换小说| 咕卡用的链子| 国产精品.久久久| 国产片内射在线| 久久久国产欧美日韩av| 国产国语露脸激情在线看| 国产精品1区2区在线观看. | 啦啦啦视频在线资源免费观看| 国产免费av片在线观看野外av| 国产亚洲欧美98| 久久婷婷成人综合色麻豆| 亚洲aⅴ乱码一区二区在线播放 | 亚洲av成人不卡在线观看播放网| 国产精品成人在线| 水蜜桃什么品种好| а√天堂www在线а√下载 | 最新的欧美精品一区二区| 午夜91福利影院| 欧美激情 高清一区二区三区| 在线av久久热| 国产精品一区二区精品视频观看| 黄色女人牲交| avwww免费| 国产又色又爽无遮挡免费看| 日韩熟女老妇一区二区性免费视频| 一级作爱视频免费观看| 国产成人精品久久二区二区免费| 午夜福利视频在线观看免费| 日本a在线网址| svipshipincom国产片| 老司机亚洲免费影院| 巨乳人妻的诱惑在线观看| 狠狠婷婷综合久久久久久88av| 99久久精品国产亚洲精品| 美国免费a级毛片| 久久久精品免费免费高清| 国产成人精品久久二区二区91| 午夜成年电影在线免费观看| 亚洲五月色婷婷综合| 国产蜜桃级精品一区二区三区 | 久久久国产一区二区| 久久国产精品影院| 宅男免费午夜| 国产精品偷伦视频观看了| 日日夜夜操网爽| 在线观看www视频免费| 一区福利在线观看| 亚洲国产欧美一区二区综合| 国产日韩一区二区三区精品不卡| 伊人久久大香线蕉亚洲五| 国产男女超爽视频在线观看| 亚洲第一欧美日韩一区二区三区| 国产亚洲av高清不卡| 深夜精品福利| 亚洲人成电影免费在线| 国产精品电影一区二区三区 | 美女 人体艺术 gogo| 亚洲欧美一区二区三区久久| 12—13女人毛片做爰片一| 欧美激情 高清一区二区三区| 超色免费av| 亚洲欧美日韩高清在线视频| 老司机靠b影院| 极品教师在线免费播放| 法律面前人人平等表现在哪些方面| 国产亚洲一区二区精品| 免费高清在线观看日韩| 夫妻午夜视频| 欧美亚洲日本最大视频资源| 91av网站免费观看| 国产精品一区二区免费欧美| 久久婷婷成人综合色麻豆| 日韩视频一区二区在线观看| 亚洲精品乱久久久久久| 亚洲成人手机| av中文乱码字幕在线| 日韩人妻精品一区2区三区| 香蕉国产在线看| 亚洲情色 制服丝袜| 国产高清视频在线播放一区| 欧美在线黄色| 村上凉子中文字幕在线| 久久久精品免费免费高清| 男女下面插进去视频免费观看| www.熟女人妻精品国产| 老司机亚洲免费影院| 天天影视国产精品| 精品国产一区二区三区久久久樱花| 日本wwww免费看| 亚洲午夜理论影院| 亚洲av成人不卡在线观看播放网| 国产精品九九99| bbb黄色大片| 黄色a级毛片大全视频| 少妇 在线观看| 精品人妻在线不人妻| 男女下面插进去视频免费观看| av网站在线播放免费| 成年人午夜在线观看视频| 久久精品熟女亚洲av麻豆精品| 交换朋友夫妻互换小说| 久久久久精品国产欧美久久久| 国产视频一区二区在线看| 一本一本久久a久久精品综合妖精| 18禁黄网站禁片午夜丰满| 两性午夜刺激爽爽歪歪视频在线观看 | 在线观看舔阴道视频| 久久天堂一区二区三区四区| 欧美乱妇无乱码| 久久久久国产精品人妻aⅴ院 | 亚洲精品乱久久久久久| 亚洲五月色婷婷综合| 91成年电影在线观看| 多毛熟女@视频| 欧美+亚洲+日韩+国产| 亚洲黑人精品在线| 中文字幕av电影在线播放| 精品一区二区三卡| 制服诱惑二区| 韩国av一区二区三区四区| 热99久久久久精品小说推荐| 亚洲免费av在线视频| 国产亚洲av高清不卡| 中文字幕另类日韩欧美亚洲嫩草| 丰满迷人的少妇在线观看| 国产男靠女视频免费网站| 日韩免费av在线播放| 在线看a的网站| 91麻豆av在线| 精品电影一区二区在线| 国产精品九九99| 成年版毛片免费区| 男女午夜视频在线观看| 欧美激情高清一区二区三区| 亚洲精品国产色婷婷电影| 丝瓜视频免费看黄片| 欧美在线一区亚洲| 国产精品免费大片| 久热爱精品视频在线9| av有码第一页| 亚洲avbb在线观看| 在线观看www视频免费| 国产亚洲欧美在线一区二区| 婷婷丁香在线五月| a级毛片黄视频| 99国产精品免费福利视频| av福利片在线| 99久久99久久久精品蜜桃| 少妇被粗大的猛进出69影院| 欧美成狂野欧美在线观看| 欧美人与性动交α欧美软件| 在线免费观看的www视频| 国产熟女午夜一区二区三区| 国产在视频线精品| 久久中文看片网| 亚洲精品乱久久久久久| 欧美亚洲日本最大视频资源| 国产成人精品无人区| 国产成人免费无遮挡视频| 美女高潮到喷水免费观看| 一区二区三区国产精品乱码| 黄频高清免费视频| 欧美日韩精品网址| 超色免费av| 少妇粗大呻吟视频| 三级毛片av免费| 韩国精品一区二区三区| 操美女的视频在线观看| 国产在线观看jvid| 法律面前人人平等表现在哪些方面| 少妇被粗大的猛进出69影院| 国产成人av激情在线播放| 99国产精品免费福利视频| 亚洲精品av麻豆狂野| 91成年电影在线观看| 成人永久免费在线观看视频| 国产精品久久久久久人妻精品电影| 亚洲专区国产一区二区| 欧美日韩视频精品一区| 国产在线一区二区三区精| e午夜精品久久久久久久| 亚洲美女黄片视频| 一级片'在线观看视频| 在线永久观看黄色视频| 黑人欧美特级aaaaaa片| 啦啦啦 在线观看视频| 日日摸夜夜添夜夜添小说| 日韩视频一区二区在线观看| 岛国在线观看网站| ponron亚洲| tube8黄色片| bbb黄色大片| 动漫黄色视频在线观看| 69av精品久久久久久| 美女福利国产在线| 日本黄色日本黄色录像| 在线播放国产精品三级| tube8黄色片| 人人妻人人澡人人看| 国产精品久久久久久精品古装| 日韩大码丰满熟妇| 亚洲一区中文字幕在线| 亚洲性夜色夜夜综合| 黄色a级毛片大全视频| 亚洲精品一二三| 欧美国产精品一级二级三级| 国产在线一区二区三区精| 国产黄色免费在线视频| 99久久99久久久精品蜜桃| 国产精品久久久人人做人人爽| 99香蕉大伊视频| 国产精品国产高清国产av | 国产极品粉嫩免费观看在线| 成年版毛片免费区| 国产亚洲欧美在线一区二区| www.精华液| 亚洲 国产 在线| 亚洲黑人精品在线| 91精品国产国语对白视频| 国产又色又爽无遮挡免费看| 在线观看日韩欧美| 水蜜桃什么品种好| 老司机影院毛片| 在线av久久热| 妹子高潮喷水视频| 青草久久国产| 亚洲三区欧美一区| 亚洲人成电影观看| 自线自在国产av| 欧美激情久久久久久爽电影 | 少妇裸体淫交视频免费看高清 | 亚洲伊人色综图| 成人三级做爰电影| 亚洲第一青青草原| 天天躁日日躁夜夜躁夜夜| 免费人成视频x8x8入口观看| 女人被躁到高潮嗷嗷叫费观| 精品午夜福利视频在线观看一区| 91精品三级在线观看| 日韩免费高清中文字幕av| 电影成人av| 悠悠久久av| 精品欧美一区二区三区在线| 亚洲久久久国产精品| 午夜福利影视在线免费观看| 欧美亚洲 丝袜 人妻 在线| 久久精品国产a三级三级三级| 色综合欧美亚洲国产小说| 日本精品一区二区三区蜜桃| 国产免费男女视频| 久久精品亚洲av国产电影网| 村上凉子中文字幕在线| 欧美久久黑人一区二区| 黄色视频,在线免费观看| 老司机深夜福利视频在线观看| 国产伦人伦偷精品视频| 天天躁日日躁夜夜躁夜夜| 天天添夜夜摸| 咕卡用的链子| 大陆偷拍与自拍| 99久久99久久久精品蜜桃| 亚洲性夜色夜夜综合| 成人精品一区二区免费| 国产亚洲欧美在线一区二区| 99国产精品一区二区三区| 欧美成狂野欧美在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 黄色a级毛片大全视频| 国产伦人伦偷精品视频| 国产一区二区三区视频了| 中文字幕色久视频| 捣出白浆h1v1| 一边摸一边抽搐一进一出视频| 国产av又大| 日本欧美视频一区| 国产精品电影一区二区三区 | 欧美日韩黄片免| 欧美丝袜亚洲另类 | 国产黄色免费在线视频| av天堂在线播放| 欧美国产精品一级二级三级| 国产一区二区激情短视频| 成年人午夜在线观看视频| 在线观看日韩欧美| 一区二区日韩欧美中文字幕| 国产成人免费无遮挡视频| 日韩人妻精品一区2区三区| www.自偷自拍.com| 成人18禁在线播放| 精品国产一区二区三区久久久樱花| 午夜两性在线视频| 久久久久视频综合| 久久久水蜜桃国产精品网| 下体分泌物呈黄色| 精品国产一区二区久久| 丰满的人妻完整版| 亚洲一区二区三区不卡视频| 如日韩欧美国产精品一区二区三区| 日本欧美视频一区| 国产1区2区3区精品| 久久天躁狠狠躁夜夜2o2o| av天堂在线播放| 9色porny在线观看| 高清黄色对白视频在线免费看| 日韩免费av在线播放| 亚洲综合色网址| 亚洲精品美女久久av网站| 国产乱人伦免费视频| 一进一出抽搐动态| 少妇被粗大的猛进出69影院| 香蕉久久夜色| 成年人黄色毛片网站| 亚洲美女黄片视频| 精品一区二区三区av网在线观看| 99国产精品一区二区蜜桃av | 国产精品免费大片| 精品久久久久久久毛片微露脸| 女同久久另类99精品国产91| 亚洲成国产人片在线观看| 99国产精品免费福利视频| 激情在线观看视频在线高清 | 成年动漫av网址| 精品卡一卡二卡四卡免费| 青草久久国产| avwww免费| 欧美日韩国产mv在线观看视频| 久久精品亚洲av国产电影网| 无遮挡黄片免费观看| 日日爽夜夜爽网站| 久久久久久久久久久久大奶| 99久久人妻综合| 亚洲在线自拍视频| 久久亚洲真实| 国产亚洲精品第一综合不卡| 亚洲在线自拍视频| 中文字幕最新亚洲高清| 国产伦人伦偷精品视频| 亚洲精品国产区一区二| 美女 人体艺术 gogo| 搡老岳熟女国产| av天堂久久9| 成人免费观看视频高清| 午夜91福利影院| 午夜精品在线福利| 国产欧美日韩一区二区三区在线| 很黄的视频免费| 亚洲国产看品久久| 亚洲avbb在线观看| 亚洲男人天堂网一区| 一级毛片高清免费大全| 性色av乱码一区二区三区2| 亚洲精品一卡2卡三卡4卡5卡| 久久午夜亚洲精品久久| 日韩欧美国产一区二区入口|