• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Secured Free Scale Networks against Malicious Attacks

    2021-12-14 03:51:08GaneshanKeerthanaPanneerselvamAnandanandNandhagopalNachimuthu
    Computers Materials&Continua 2021年1期

    Ganeshan Keerthana,Panneerselvam Anandan and Nandhagopal Nachimuthu

    1Anna University,Chennai,600025,India

    2Department of ECE,C.Abdul Hakeem College of Engineering and Technology,Vellore,India

    3Department of ECE,Excel Engineering College,Salem,India

    Abstract:Due to the recent proliferation of cyber-attacks,highly robust wireless sensor networks(WSN)become a critical issue as they survive node failures.Scale-free WSN is essential because they endure random attacks effectively.But they are susceptible to malicious attacks,which mainly targets particular significant nodes.Therefore,the robustness of the network becomes important for ensuring the network security.This paper presents a Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization(RHAFS-SA)Algorithm.It is introduced for improving the robust nature of free scale networks over malicious attacks(MA)with no change in degree distribution.The proposed RHAFS-SA is an enhanced version of the Improved Artificial Fish Swarm algorithm(IAFSA)by the simulated annealing(SA)algorithm.The proposed RHAFS-SA algorithm eliminates the IAFSA from unforeseen vibration and speeds up the convergence rate.For experimentation,free scale networks are produced by the Barabási–Albert(BA)model,and real-world networks are employed for testing the outcome on both synthetic-free scale and real-world networks.The experimental results exhibited that the RHAFS-SA model is superior to other models interms of diverse aspects.

    Keywords:Free scale networks;robustness;malicious attacks;fish swarm algorithm

    1 Introduction

    Wireless Sensor Networks(WSN)has been applied for collecting data regarding the physical parameters in diverse application areas.As a promising technology it brings about a faster development in the area of advanced wireless telecommunication.The Internet of Things(IoT)has gained significant interest and offers advantageous to numerous real-time applications.Sensor interfacing devices are needed to detect different types of sensing data in the IoT environment.WSN plays a vital role in sensing the atmosphere and collecting the data.For sensing the ecological metrics,a massive number of sensors,like a sink and sensor nodes,have been deployed in wider regions.Such nodes tend to develop a multi-hopad hocnetwork and implement desired operations based on the essential applications[1].WSN can be installed in homes,constructions,forests,hills,and so on.The sensor network topology defines the wireless communications that take place among diverse sensors in WSN and it is based on the development of diverse network communication protocols and routing protocols[2]that is considered to be more significant in-network features,like network lifespan,power utilization,stability,and latency.With the rapid growth in cyber-attacks,improvising the efficiency of WSN has become a vital task.In this model,it mainly focuses on enhancing the robustness of the network topologies for WSN.It refers that,the main objective is to deploy a model where the connection of massive nodes is conserved after the occurrence of node failures which results from cyber attacks.The term target selection for attacks,which is of 2 types namely,the random and the MA.In the case of random attacks,an attacker randomly selects the nodes from a network topology as the required targets,while MAs involve in selecting the nodes with maximum node degrees as the targets.At this point,specific network topology and scale-free topology has been examined for WSN.

    The scale-free topology comes under the tedious network hypothesis that is comprised of extensive domains of real-time applications,like the global transportation system[3],cooperation networks,social networks,as well as mobile networks[4].For complex network theory,the small-world topology and the scale-free topology are assumed to be the 2 conventional techniques.In the case of a small-world approach,it is further classified into two types,smaller average path length,and maximum clustering coefficient.It applied to thedeveloping heterogeneous network topologies[5].Unlike,the scale-free model can be employed in designing homogeneous network topologies;thereby it is more applicable for the WSN where the maximum number of nodes is constrained with the same communication range and bandwidth.A node degree in a scale-free topology uses a power-law definition.It is referred that,a greater number of nodes in a scale-free network has minimized degrees.Therefore,in case of random attacks,lower degree nodes are often selected.But,Li et al.[6]stated that a scale-free topology could be delicate for the MA.Therefore,improving the robustness of a scale-free topology enables the WSN to deal with MAs which has been assumed to be a more significant research.

    To produce the power-law distribution of node degrees in scale-free networks,it is projected with a model named BA,under the application of 2 procedures to attain a scale-free topology.Initially,Growth:new nodes consecutively combine with the network.A newly merged node links with a previous node with a possible degree.These procedures tend to provide a maximum node connection where it receives novel connections.Hence,it is named as the “Mathew Effect”.This criterion is effectively applied to produce the power-law distribution of node degrees that is evident from Fornasier et al.[7].Due to the reduced transmission radius of WSN,every node suffers from insufficient neighboring nodes which are unable to deploy a greater number of edge nodes.Therefore,the preferred attachment feature of the BA approach could not be directly induced in WSN.Liu et al.[8]projected a complex network method based on the heterogeneous networks applied in WSN.It is comprised with a small world as well as scale-free systems.The shortest path feature in scale-free networks has developed a comparatively effective transporation system.Zheng et al.[9]modeled 2 robust scale-free network topologies namely,the Linear Growth Evolution Model(LGEM)and the Accelerated GEM(AGEM).These topologies mainly focus on the absence or presence of nodes and the reformation of edges.Jian et al.[10]and Dandekar et al.[11]projected a novel energy-aware scale-free model based on a BA scheme,termed an energy-aware BA(EABA).Li et al.[12]applied with tunable coefficients to manage the node connection as well as the power application of a scale-free network topology.Few developers have consumed the energy management as well as the transmission operation that improves the data overhead at the time of developing an approach.

    In scale-free networks,a lower count of nodes is comprised of higher degrees,where the networks are more vulnerable for MA.The whole network topology has been segmented rapidly.Hence,the major aim of this method is to boost the robustness of scale-free networks in WSN for MAs.Additionally,edge nodes are capable of solving the issues involved in this model.Several models have been presented and available in the literature.Peng et al.[13]and Xiao et al.[14]established a novel robustness feature.It is assumed with a larger connected cluster and defined as robustness by the proportion of remaining nodes from every network node,Herrmann et al.[15]implied with a hill-climbing framework that depends upon the robustness metric R,which results in making network topologies that re ects a reliable onion-like architecture by swapping the edges.But the multimodal criteria might eliminate the technique of shifting the local optimum.

    Louzada et al.[16]applied a smart rewiring technique that computes the edges which have to be compared under the application of 2-fold selections.Zhou et al.[17]developed a memetic approach that belongs to a significant enhancing model to combine the global as well as the local searching to increment the robust value of scale-free networks over MA with no alteration of degree distribution.Therefore,a smart rewiring as well as a memetic technique,Mancilla et al.[18]does not assume the constraints of the transmission radius for the network nodes which is not applicable for WSN.The fragileness of scale-free networks with MA belongs to a heavy-tailed property that results in the loss of a node connectivity if a node hub has failed.Hence,the main goal of this approach is to study the way of improving the robustness of scale-free networks over MA.A solution for this issue is to include the links,however,extra links tend to improve the costs.Hence,the network robustness has to be improved over HDAs with no alteration of degree distribution in primary networks.

    Wang et al.[19]deployed a simple rewiring approach that does not change the nodal degree,and network robustness could be improved slightly with reduced assortativity coefficient.Schneider et al.[20]established a novel value for robustness,that assumes the linked cluster while processing the whole attacks,and applied this value to develop a heuristic approach to reduce the MA.Using the same value,Buesser et al.[21]signified a SA model and Louzada et al.[22]presented a simple rewiring approach to resolve these problems.These techniques manifest an optimized function to enhance the network robustness against the primary networks.Therefore,these models could be incremented by applying the probability of global searches in the optimizing task.Hence,effective models are capable to perform global and local searches that are required for optimizing the network architecture.Evolutionary algorithms(EAs),is a type of stochastic global optimization evolved by biological evolution and heredity that is effectively applied in solving diverse types of complex optimization issues.

    Tnag et al.[23]identified the malicious users and the unstable energy providers,the mechanism of identification and processing(MIP)for the malicious users and unstable energy providers is proposed.Xiong et al.[24]developed a robust dynamic network traffic partitioning scheme to defend against malicious attacks and the experimental results indicate that our proposed scheme outperforms the conventional ones in terms of packet distribution performance,especially the robustness against malicious attacks.Su et al.[25]deployed a simple work that describes a novel HTTP traffic ow mining approach to detect and categorize Android malware and unsafe ad library.In this paper,we exploit spatial and semantic conventional features extracted from the convolutional neural networks in continuous object tracking[26].

    Kuang et al.[27]established a novel value for robustness,a novel support vector machine(SVM)model by combining the kernel principal component analysis(KPCA)with improved chaotic particle swarm optimization(ICPSO)is proposed to deal with intrusion detection.Lipschitz aggregation property and copula characteristics of t-norms and implications are discussed[28].The robustness of rule-based fuzzy reasoning is investigated and the relationships among input perturbation,rule perturbation,and output perturbation are presented.Yu et al.[29]modelled to address the issues encountered by zeroing neural network(ZNN),by suggesting a new nonlinear activation function,a robust and fixed-time zeroing neural dynamics(RaFT-ZND)model is proposed and analyzed for the time-variant nonlinear equation(TVNE).

    To achieve robustness in the network and to improve the network security,this paper introduces a new Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization(RHAFS-SA)Algorithm over malicious attacks(MA)with no change in degree distribution.The proposed RHAFS-SA is an enhanced version of the Improved Artificial Fish Swarm algorithm(IAFSA)and the SA model.The proposed RHAFS-SA algorithm discards the IAFSA from unforeseen vibration and improves the convergence value.For experimentation,free scale networks are produced by the BA and the real-world networks are employed for testing the outcomes on synthetic-free scale and real-world networks.The experimental results exhibited that the RHAFS-SA model is superior to the other models interms of diverse aspects.The remaining sections of the paper has been organized in the following order.Section 2 introduces the proposed RHAFS-SA algorithm and the experimental details are provided in Section 3.At last,the paper is concluded in Section 4.

    2 The Proposed RHAFS-SA Algorithm

    AFSA is said to be the current heuristic searching approach that has been evolved from the food hunting nature of fish.IAFSA is an extended version of improved exploration potential to identify the position with maximum food concentration.But,IAFSA is not assumed to be the ideal process as it provides the outcomes which have a minimum accuracy because of the unknown vibrations,in case of minimum visibility.Besides,SA is named as a global optimization model based on the annealing of solids.It is capable of finding global optimum under the application of stochastic searching methodologies.The main aim is to explore the global optimum,but it is vulnerable due to the sensitivity of the annealing schedule as well as the perturbation method.Therefore,SA is comprised of a better local stability and concatenated with alternate models such as AFSA to supply optimal simulation outcomes.In this approach,it is proposed with an alternative hybrid optimization technique that integrates the IAFSA and the SA to boost the searching efficiency and convergence of global optimum.

    2.1 Problem Formulation

    A network can be expressed as a graph=(V,E),wherey= {1,2,...,N}denotes the collection ofNnodes,andE={eij|i,j∈yandi/=j}implies the group ofMlinks.Here,it is mainly concentrated on the desired attacks of an undirected as well as an unweighted system with a long-tailed degree distribution,such as the undirected and the unweighted scale-free networks.The targeted attacks are attentive as it is assumed to be more fragile with desired damage.Therefore,scale-free networks have been identified between significant networks in public as well as biological systems that refers to these features as more significant.

    In developing the scale-free networks,the popular BA model has been employed.The BA initiates with a minimum clique ofN0nodes.For every iteration,a novel node has been included and theM0is added in a link to theM0of the previous nodes,whereM0represents a smaller value when compared with the number of previous nodes.If a new node has been linked to the traditional node and the possibility of the existing node selection to be proportional to a degree in which the nodes are predefined then the massive links would be selected.It is considered that the MA is HDA,and the network nodes have been sorted in a reduced degree order and a maximum degree node has been eliminated together with each link.Once the links have been removed,vertices degree undergoes revaluation and sorts the list,a few locations are modified with the attacking phase,and follows the first node until the network is isolated.Recently,the percolation theory concentrated on the largest component if there are frequent eliminations of the highest-degree vertices of a network,and projected a novel value,R,to measure the network robustness,that is represented by He et al.[30,31]as,

    wheres(q)signifies the fraction of nodes in a widely connected cluster once the removal ofqNnodes are completed.The normalization factor 1/Nassures the robustness of the networks with a diverse size.The measure ofRcomes under the range of[1/N,0.5].In fact,the higher value ofRis highly robust.Followed by,Rhas been employed as an objective function,such as the FF in EA which is applied for network optimization and it becomes more robust by resisting the MA.

    2.2 Artificial Fish Swarm Algorithm(AFSA)

    AFSA is a current heuristic that has been developed by searching the global optimum.It is considered to be a randomized search as well as an optimizing model assisted by the strategies of the fish swarm.It offers closer optimized solutions of the objective function.AFSA,the metrics of search space undergoes the encoding asAF.An arithmetical function has been related to every AF which calculates the degree of FF of an encoded solution.In general,inspired operators,such as prey,the swarm of iterations is to produce a capableAF.AFSA is used to resolve the optimizing issues in signal processing,NN classification model as well as the tedious function optimization problems.The working function of the AFSA has outperformed with a prospective model in resolving the optimization issues.In recent times,SI and artificial life has led to the higher interests of the researchers.Tab.1 defines the parameters applied by the AFSA technique.The nature of the AF has been defined as follows:

    Table 1:Parameters definition of the AFSA algorithm

    (1)Fprcy:

    AFprcyis defined as a fundamental nature of food hunting.AF has to transfer to a location in water that has maximum food concentration.It is assisted by the corresponding vision.Fig.1 depicts the vision ofAF.

    It is considered that the recent position ofAFiisXi,and the visual area ofAF,it selects the positionXj(Xj∈S),AFiswims toXjin an arbitrary direction whenYj>Yi.TheAFirepeats the searching from the visual area and selects an alternate positionXp,AFiwould move toXpin a random direction whileYp>Yi.WhenAFicannot be effectively placed for maximum food concentration inside a visual area aftertry-numberiterations,AFiagain swims in the minimum distance in a random direction.These features are randomly enabled with AF reducing from the local optimal.These functions are expressed as,

    whereAFrandom-movc(Xi)=Xi+rand()step,0 <rand()<1.

    Figure 1:Vision concept of AFSA

    It is pointed out that,the higher number of inspecting iterations byAF,the maximum data regarding the entire condition of vision AF learns.

    (2)AFswarm:

    (3)AFfollow:

    Generally,the behaviors ofAFfollowandAFswarmwould be accelerated after every iteration.The nature of providing AF an optimal position using food concentration can be decided.AFSA is capable of producing every selected nature of AF at the same time.It adopts a random trend ofAFs,when it does not identify a maximum food concentration location that lowers the feasibility of AFs movement of local optimums.

    (4)AFlcap:

    The AFSA and theAFlcapbehavior is termed as the IAFSA.The leaping behavior of AF is proposed in[31].The preying nature,swarming and following nature are assumed to be the local behaviors.When the optimal fitness measure has not been enhanced after maximum rounds,it manifests the AF population that comes under the local optimum.The FF values are encoded in all the AF to make reliable and possibile reductions in the local optimum.To improve the likelihood in searching the global optimum,the leaping nature has been included to theAFs.TheAFs’leaping behavior can be defined in the follows:When the measures of an objective function among the iterations are similar the variations are minimal when compared with ? which is a small positive constant while the provided iterations are selected randomly from the AFs to process the leaping behavior.β implies the parameter which simulates the AF.

    It is evident that,when the best AF present in a population has been chosen to implement the leaping behavior,immediate vibration occurs in the successive iteration task.Finally,it gradually decreases the converging speed.For increasing the convergence speed,optimized AFs could not be selected for implementing the leaping behavior.

    Step 1:Compute Parameter Encoding

    Step 2:Initialization

    Step 3:Global Search

    Step 4:Local Search

    Figure 2:Flowchart of AFSA

    2.3 Simulated Annealing(SA)Algorithm

    The initial SA model has been presented by Metropolis et al.It has been evolved from the annealing of solids.Annealing is defined as the task of melting the solids to high temperatures by a lower cooling pattern by reducing the environmental temperature of the ecology.Here,the temperature has to be provisioned in a reliable state for a given time interval which is enough to attain the thermal equilibrium.For thermal equilibrium,it is comprised of several configurations linked with the diverse energy levels.The likelihood of a solid is to approve the modification from a recent configuration to the novel function of variations in the energy levels between 2 states.At the initial stage,a trial configuration has been attained by a randomly produced perturbation of a recent configuration.It has been considered that the Ecand the Etimply the corresponding energy levels of the present trial configurations.When Ec>Et,the trial configuration is approved to be a novel configuration.Besides,the Ec|Et,the trial configuration is named only when the positive probability is as expressed in Eq.(7).

    Also,it is referred to the ad Metropolis Law.From the recent temperature T cur,it has been followed‘Markov Length’ number of times as well as minimizes the temperature based on the annealing schedule.On the other hand,Markov Length computes the count of the trial configurations at every particular temperature.Since the temperature T is 0,the possibility of accepting a trial configuration is 0.The thermal equilibrium can be attained only with an enhanced energy level.

    2.4 Hybrid Optimization Approach Based on IAFSA and SA

    SA has been incorporated with the AF prey behavior.The AFs arbitrary selection of position inside the visual region and moving forward towards the direction of maximum food concentration takes place.When there is a forwarding condition that could not be satisfied once the iterations are completed,the AFs move to a distance in a random direction.The random migration behavior enables the model to eliminate the complexity in the local minimum.But,the AF seeks global optimum,without the vibration.Hence,it has to be presented with a novel hybrid model that integrates the IAFSA with the SA.The AF accepts an arbitrary position with a probability exp(-(deltaJ)/T cur),else,the AF remains in its recent position,asAs the acceptance rule has been computed by the current temperature,in the primary iterations.AF accepts the random position and exists from the local optimum.On the other hand,the value of FF is enabled to become poor inside an assertive extent in the primary events.As the temperature reduces in all iterations,the search area seeks for a neighborhood of the global optimum,and accepting the hypothesized optimal AF minimizes the irregular vibration.Finally,the reliability and convergence speed of a model can be enhanced.

    3 Performance Validation

    This section discusses the experimental analysis of the RHAFS-SA algorithm.The proposed RHAFSSA algorithm has been simulated using MatLab 8.1 simulation.The performance of the RHAFS-SA model has been validated under several aspects.The parameters used for simulation is shown in Tab.2.The performance here is evaluated for a varying number of features at different circumstances.The results are compared with the existing methodologies such as the EROSE and the SPRT(L&H)interms of delay,packet delivery ratio(PDR),packet drop ratio(PDPR),residual energy,and communication overhead.

    Tab.3 and Fig.3 show the analysis of the results of the RHAFS-SA algorithm with the existing methods interms of delay under a varying number of nodes.The table values point out that the EROSE algorithm possesses maximum delay over the RHAFS-SA algorithm and the SPRT(L&H)model.At the same time,it is noted that the SPRT(L&H)model acquires slightly better performance over the EROSE algorithm by offering lower delay.But,it does not compete with the proposed RHAFS-SA algorithm which requires a minimum amount of delay over the earlier models on all the varying numbers of nodes.

    Table 2:Implementation setup

    Table 3:Result analysis of delay(Sec)with existing and proposed method

    Figure 3:Delay analysis under varying node count

    Tab.4 and Fig.4 portray the results of the RHAFS-SA algorithm with the existing models interms of the PDR under a varying node count.From Fig.4,it is exhibited that the RHAFS-SA algorithm has demonstrated superior performance over the EROSE and the SPRT(L&H)models by attaining maximum PDR.At the same time,it is observed that the SPRT(L&H)model has provided slightly lower performance by achieving lower PDR over the RHAFS-SA algorithm.In the same way,the ineffective performance of the EROSR model has been ensured from the minimal PDR under a varying node count.The maximum value of the PDR offered by the RHAFS-SA algorithm shows its superiority over the existing methods.

    Table 4:Result analysis of packet delivery ratio(%)with existing and proposed method

    Figure 4:PDR analysis under varying node count

    A detailed PDPR analysis is made between the RHAFS-SA algorithm and the existing methods as shown in Fig.5 and Tab.5.The table values denoted that the RHAFS-SA algorithm performs well and offers a minimum PDPR.Concurrently,it is denoted that the SPRT(L&H)model has shown slightly lower performance over the proposed method and offered a moderate PDPR.Simultaneously,it is demonstrated that the EROSE model has achieved a maximum PDPR indicating the ineffectiveness of transmitting data packets successfully.

    Tab.6 and Fig.6 investigate the residual energy analysis of the RHAFS-SA algorithm with the existing methods under a varying number of nodes.The experimental results indicate that the EROSE model has consumed more amount of energy over the compared methods and leads to a lower residual energy indicating energy dissipation at a faster rate.At the same time,it is noticed that the SPRT(L&H)model has achieved better energy efficiency over the EROSE by offering a moderate residual energy.Furthermore,it is observed that the RHAFS-SA algorithm has resulted in maximum energy efficiency by providing higher residual energy over the compared methods.

    An extensive communication overhead analysis takes place between the RHAFS-SA algorithm and the compared methods under a varying numbers of nodes as given in Tab.7 and Fig.7.The EROSE model has acquired a maximum communication overhead indicating its ineffective performance under the all nodes count.In line with,it is noted that the SPRT(L&H)model has burdened with a moderate amount of communication overhead,which is lower than the EROSE,but not the proposed RHAFS-SA algorithm.

    Figure 5:PDRP analysis of diverse models

    Table 5:Result analysis of PDRP(%)with existing and proposed method

    Table 6:Result analysis of residual energy(Joules)with existing and proposed method

    At last,it is depicted that an effective performance is exhibited by the RHAFS-SA algorithm by attaining a minimal communication overhead under all the applied scenarios.By looking into the above-mentioned tables and figures,it is ensured that the RHAFS-SA algorithm has offered superior performance over the existing methods interms of delay,PDR,PDPR,residual energy and communication overhead.

    Figure 6:Residual energy analysis under a varying number of nodes

    Table 7:Result analysis of communications overhead(bytes)with existing and proposed method

    Figure 7:Communication overhead analysis

    4 Conclusion

    This paper has presented an effective RHAFS-SA Algorithm over the MA for the free scale networks with no change in degree distribution.The proposed RHAFS-SA is a hybridization of the IAFSA and the SA algorithms.The presented RHAFS-SA system discards the IAFSA from the unforeseen vibration and speeds up the convergence rate.For experimentation,free scale networks are produced by the BA model as well as the real-time networks are employed for testing the outcome on synthetic-free scale and realworld networks.The experimental results exhibited that,the RHAFS-SA model is superior to other models interms of diverse aspects such as delay,PDR,PDPR,residual energy,and communication overhead.In the future,the performance of the proposed model can be enhanced by the use of deep learning models.

    Funding Statement:The author(s)received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no con icts of interest to report regarding the present study.

    亚洲av片天天在线观看| 一本—道久久a久久精品蜜桃钙片| 欧美黄色淫秽网站| 欧美日韩视频高清一区二区三区二| 人妻人人澡人人爽人人| 国产野战对白在线观看| 成人免费观看视频高清| 国产精品秋霞免费鲁丝片| 色网站视频免费| 叶爱在线成人免费视频播放| 性色av乱码一区二区三区2| 久久天堂一区二区三区四区| 校园人妻丝袜中文字幕| 夫妻午夜视频| 免费av中文字幕在线| 日本av手机在线免费观看| 午夜日韩欧美国产| 一边亲一边摸免费视频| 亚洲国产欧美一区二区综合| 久久久精品国产亚洲av高清涩受| 波多野结衣一区麻豆| 国产成人欧美在线观看 | 日韩制服丝袜自拍偷拍| 国产日韩欧美在线精品| 国产在线视频一区二区| 久久久国产精品麻豆| 天天躁日日躁夜夜躁夜夜| 欧美日韩国产mv在线观看视频| 黄片播放在线免费| 国产成人精品久久二区二区免费| 50天的宝宝边吃奶边哭怎么回事| 精品久久久精品久久久| 大片免费播放器 马上看| 午夜激情av网站| 啦啦啦啦在线视频资源| 午夜免费成人在线视频| 亚洲成人免费电影在线观看 | 亚洲国产看品久久| 亚洲精品久久成人aⅴ小说| 人妻 亚洲 视频| 韩国高清视频一区二区三区| 纯流量卡能插随身wifi吗| 日韩av免费高清视频| 黄片播放在线免费| 一本综合久久免费| av国产精品久久久久影院| 脱女人内裤的视频| 久久精品国产综合久久久| 成年人午夜在线观看视频| a 毛片基地| 一边摸一边做爽爽视频免费| 亚洲精品中文字幕在线视频| 亚洲av在线观看美女高潮| h视频一区二区三区| 国产一区二区三区综合在线观看| 波野结衣二区三区在线| 久久精品国产亚洲av涩爱| 在线观看免费高清a一片| 国产精品一区二区在线不卡| 一本—道久久a久久精品蜜桃钙片| 首页视频小说图片口味搜索 | 亚洲天堂av无毛| 美女主播在线视频| 久久精品久久久久久噜噜老黄| 后天国语完整版免费观看| √禁漫天堂资源中文www| 久久热在线av| 久久人人爽av亚洲精品天堂| 中文字幕精品免费在线观看视频| 精品福利观看| 另类精品久久| 亚洲中文字幕日韩| 日本欧美国产在线视频| 国产亚洲一区二区精品| 国产亚洲av片在线观看秒播厂| 男女无遮挡免费网站观看| 欧美黑人精品巨大| 女人久久www免费人成看片| 大话2 男鬼变身卡| 国产熟女午夜一区二区三区| 国产欧美日韩综合在线一区二区| 亚洲免费av在线视频| 9色porny在线观看| 精品卡一卡二卡四卡免费| 亚洲精品一卡2卡三卡4卡5卡 | 人妻人人澡人人爽人人| 丰满饥渴人妻一区二区三| 丝袜喷水一区| 男女床上黄色一级片免费看| 成人免费观看视频高清| 巨乳人妻的诱惑在线观看| 黄色怎么调成土黄色| 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区三区| 一边摸一边做爽爽视频免费| 丝瓜视频免费看黄片| 老汉色∧v一级毛片| 老司机靠b影院| 欧美在线黄色| 看十八女毛片水多多多| 伊人亚洲综合成人网| 日本一区二区免费在线视频| 免费av中文字幕在线| 色播在线永久视频| 丝袜美足系列| 欧美精品啪啪一区二区三区 | 亚洲av男天堂| 一级毛片 在线播放| 777米奇影视久久| 欧美另类一区| 国产99久久九九免费精品| 欧美久久黑人一区二区| 真人做人爱边吃奶动态| 丝袜脚勾引网站| 91字幕亚洲| 人妻 亚洲 视频| 国产av精品麻豆| 老鸭窝网址在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 老司机在亚洲福利影院| 日韩,欧美,国产一区二区三区| 操出白浆在线播放| 老司机深夜福利视频在线观看 | 中文字幕人妻丝袜制服| 男女边吃奶边做爰视频| 欧美 日韩 精品 国产| 90打野战视频偷拍视频| 中文精品一卡2卡3卡4更新| 黄色视频在线播放观看不卡| www.999成人在线观看| 欧美人与性动交α欧美精品济南到| 国产成人免费无遮挡视频| 国产在线一区二区三区精| 欧美激情高清一区二区三区| 亚洲精品国产色婷婷电影| 欧美日韩黄片免| 欧美激情极品国产一区二区三区| 菩萨蛮人人尽说江南好唐韦庄| av电影中文网址| 美女中出高潮动态图| 亚洲黑人精品在线| 免费一级毛片在线播放高清视频 | 热re99久久精品国产66热6| 19禁男女啪啪无遮挡网站| 婷婷色综合大香蕉| 免费av中文字幕在线| 国产伦理片在线播放av一区| 成人午夜精彩视频在线观看| 人妻一区二区av| 日本a在线网址| bbb黄色大片| 制服人妻中文乱码| 色婷婷久久久亚洲欧美| 另类精品久久| 日韩欧美一区视频在线观看| 亚洲九九香蕉| 成人黄色视频免费在线看| 欧美少妇被猛烈插入视频| 99久久99久久久精品蜜桃| 超碰97精品在线观看| 无遮挡黄片免费观看| 岛国毛片在线播放| 久9热在线精品视频| 丰满迷人的少妇在线观看| 老司机在亚洲福利影院| 亚洲av成人不卡在线观看播放网 | 色综合欧美亚洲国产小说| 大码成人一级视频| 男男h啪啪无遮挡| 精品国产超薄肉色丝袜足j| 欧美在线黄色| 黑丝袜美女国产一区| 国产精品成人在线| 欧美中文综合在线视频| 一区二区三区乱码不卡18| 欧美日韩黄片免| 午夜福利一区二区在线看| 久久人妻福利社区极品人妻图片 | 国产片特级美女逼逼视频| 黑人巨大精品欧美一区二区蜜桃| 一本一本久久a久久精品综合妖精| 国产免费福利视频在线观看| 操出白浆在线播放| 久久热在线av| 欧美人与性动交α欧美软件| 国产爽快片一区二区三区| 国产精品99久久99久久久不卡| 国产精品一区二区免费欧美 | 欧美日韩av久久| 国产午夜精品一二区理论片| 国产福利在线免费观看视频| 欧美日韩福利视频一区二区| 国产精品一区二区免费欧美 | 亚洲国产精品成人久久小说| 丰满饥渴人妻一区二区三| 丁香六月天网| 亚洲成色77777| 日韩大码丰满熟妇| 精品欧美一区二区三区在线| 老司机影院成人| 男人添女人高潮全过程视频| 肉色欧美久久久久久久蜜桃| 99热国产这里只有精品6| 午夜免费鲁丝| 中文字幕制服av| 男女床上黄色一级片免费看| 人妻 亚洲 视频| 久久人妻熟女aⅴ| 99久久精品国产亚洲精品| 丁香六月欧美| 自线自在国产av| 亚洲成av片中文字幕在线观看| 亚洲精品日韩在线中文字幕| 国产精品欧美亚洲77777| 午夜福利影视在线免费观看| 亚洲熟女毛片儿| 尾随美女入室| 亚洲欧美一区二区三区黑人| 成人手机av| 日本猛色少妇xxxxx猛交久久| 成年人午夜在线观看视频| 丁香六月天网| 欧美激情高清一区二区三区| 一本色道久久久久久精品综合| 最近手机中文字幕大全| 精品亚洲乱码少妇综合久久| 欧美黑人欧美精品刺激| 蜜桃国产av成人99| 涩涩av久久男人的天堂| 大陆偷拍与自拍| 精品国产乱码久久久久久小说| 青青草视频在线视频观看| 老司机亚洲免费影院| 国产爽快片一区二区三区| 国产欧美亚洲国产| 午夜av观看不卡| 久久人人爽av亚洲精品天堂| 日韩中文字幕欧美一区二区 | 人人妻人人澡人人看| 久久精品久久精品一区二区三区| 精品国产超薄肉色丝袜足j| kizo精华| 嫁个100分男人电影在线观看 | 18禁国产床啪视频网站| 亚洲精品自拍成人| 我的亚洲天堂| 人人妻,人人澡人人爽秒播 | 国产精品免费大片| 日韩 亚洲 欧美在线| 久热这里只有精品99| 亚洲精品日韩在线中文字幕| 国产精品一区二区免费欧美 | 国产无遮挡羞羞视频在线观看| 人人妻,人人澡人人爽秒播 | 视频在线观看一区二区三区| 亚洲欧洲日产国产| 精品福利观看| 一区二区日韩欧美中文字幕| 日韩av不卡免费在线播放| www.精华液| 麻豆乱淫一区二区| 亚洲精品一二三| 久久久国产欧美日韩av| 超碰97精品在线观看| 国产真人三级小视频在线观看| 成人免费观看视频高清| 国产成人一区二区三区免费视频网站 | 视频区欧美日本亚洲| 性少妇av在线| 欧美日韩国产mv在线观看视频| 欧美+亚洲+日韩+国产| 午夜福利一区二区在线看| 搡老岳熟女国产| 亚洲精品国产av蜜桃| 国产成人系列免费观看| 老汉色av国产亚洲站长工具| 欧美成狂野欧美在线观看| 高潮久久久久久久久久久不卡| 飞空精品影院首页| 黄色视频不卡| 久久久精品国产亚洲av高清涩受| 高清欧美精品videossex| 免费黄频网站在线观看国产| 国产成人精品久久久久久| 欧美中文综合在线视频| 一边摸一边做爽爽视频免费| videosex国产| www.精华液| 亚洲精品国产区一区二| 视频区欧美日本亚洲| 高清av免费在线| 免费在线观看影片大全网站 | 亚洲一区二区三区欧美精品| 日本av手机在线免费观看| 精品人妻1区二区| 最近最新中文字幕大全免费视频 | 99国产精品免费福利视频| 国产一区二区三区av在线| 日日夜夜操网爽| 午夜福利视频在线观看免费| 欧美精品人与动牲交sv欧美| 国产精品一区二区免费欧美 | 亚洲成人国产一区在线观看 | 午夜福利视频在线观看免费| a级毛片在线看网站| 少妇猛男粗大的猛烈进出视频| 国产又爽黄色视频| 国产精品一国产av| 好男人视频免费观看在线| 青春草视频在线免费观看| 婷婷色综合大香蕉| 亚洲国产精品成人久久小说| 男女床上黄色一级片免费看| 人人妻人人澡人人看| 老司机影院成人| 精品人妻一区二区三区麻豆| 午夜精品国产一区二区电影| 日本a在线网址| 国产精品三级大全| 久久国产精品影院| 国产主播在线观看一区二区 | 中国国产av一级| 日韩制服丝袜自拍偷拍| 国产成人精品久久二区二区91| 久久综合国产亚洲精品| 亚洲图色成人| 视频在线观看一区二区三区| 精品国产国语对白av| av有码第一页| 两个人看的免费小视频| 老熟女久久久| 欧美日韩综合久久久久久| 少妇的丰满在线观看| 亚洲欧美日韩另类电影网站| 19禁男女啪啪无遮挡网站| 久久久久国产一级毛片高清牌| 99热全是精品| 90打野战视频偷拍视频| 国产成人啪精品午夜网站| 999久久久国产精品视频| 亚洲七黄色美女视频| 亚洲,一卡二卡三卡| 老熟女久久久| 少妇人妻久久综合中文| 人妻人人澡人人爽人人| 亚洲av美国av| 欧美日韩视频高清一区二区三区二| 国产精品久久久人人做人人爽| 国产精品人妻久久久影院| av在线app专区| 免费观看a级毛片全部| 欧美性长视频在线观看| 大香蕉久久网| 一边亲一边摸免费视频| 纯流量卡能插随身wifi吗| 男女之事视频高清在线观看 | 亚洲欧美清纯卡通| 国产淫语在线视频| 少妇人妻 视频| 久久国产精品影院| 丝袜美腿诱惑在线| 国产亚洲午夜精品一区二区久久| 老汉色∧v一级毛片| 满18在线观看网站| 国产一区二区 视频在线| av天堂在线播放| 日韩av免费高清视频| a 毛片基地| 亚洲男人天堂网一区| 在线av久久热| 久久精品久久久久久久性| 国产高清不卡午夜福利| 国产精品一区二区在线不卡| 涩涩av久久男人的天堂| 如日韩欧美国产精品一区二区三区| 一级a爱视频在线免费观看| 国产精品久久久久久人妻精品电影 | 亚洲av欧美aⅴ国产| 热re99久久国产66热| 亚洲av美国av| 大片电影免费在线观看免费| 成人国产一区最新在线观看 | 美女国产高潮福利片在线看| 午夜福利免费观看在线| 国产男女内射视频| 亚洲国产成人一精品久久久| 国产成人精品无人区| 免费一级毛片在线播放高清视频 | 午夜福利影视在线免费观看| 韩国精品一区二区三区| 又大又爽又粗| 精品久久久精品久久久| 中文字幕人妻丝袜一区二区| 日本猛色少妇xxxxx猛交久久| 亚洲 国产 在线| 欧美亚洲 丝袜 人妻 在线| 欧美 亚洲 国产 日韩一| 岛国毛片在线播放| 国产一区二区 视频在线| 亚洲精品国产区一区二| 五月开心婷婷网| 青春草亚洲视频在线观看| 国产一区有黄有色的免费视频| 99热国产这里只有精品6| 女人被躁到高潮嗷嗷叫费观| 人人妻人人澡人人看| av线在线观看网站| av又黄又爽大尺度在线免费看| 精品国产一区二区三区四区第35| 欧美另类一区| 欧美人与善性xxx| 日日夜夜操网爽| 久久精品人人爽人人爽视色| 咕卡用的链子| 国产成人精品久久二区二区91| 午夜激情av网站| 国产成人影院久久av| 丰满饥渴人妻一区二区三| 亚洲天堂av无毛| 纯流量卡能插随身wifi吗| 精品久久久久久电影网| 亚洲欧美色中文字幕在线| 国产精品免费大片| 人妻一区二区av| 国产av国产精品国产| 久久精品人人爽人人爽视色| 午夜免费鲁丝| 国产不卡av网站在线观看| 又粗又硬又长又爽又黄的视频| 精品亚洲成国产av| 中文字幕人妻熟女乱码| 日韩一区二区三区影片| 黄频高清免费视频| 精品卡一卡二卡四卡免费| 在线精品无人区一区二区三| av一本久久久久| 免费在线观看影片大全网站 | 亚洲av男天堂| 国产亚洲一区二区精品| 最黄视频免费看| 成人国产一区最新在线观看 | 另类亚洲欧美激情| 一级毛片女人18水好多 | 色婷婷久久久亚洲欧美| 麻豆av在线久日| 国产精品国产三级国产专区5o| 成人黄色视频免费在线看| 欧美+亚洲+日韩+国产| 一本—道久久a久久精品蜜桃钙片| 美女中出高潮动态图| av天堂久久9| 捣出白浆h1v1| 精品国产国语对白av| 亚洲七黄色美女视频| 侵犯人妻中文字幕一二三四区| 天天躁夜夜躁狠狠久久av| 久久久久久免费高清国产稀缺| 国产国语露脸激情在线看| 又大又黄又爽视频免费| 午夜福利视频在线观看免费| www.熟女人妻精品国产| 啦啦啦 在线观看视频| av国产久精品久网站免费入址| 成年美女黄网站色视频大全免费| 少妇 在线观看| 波多野结衣一区麻豆| 十八禁高潮呻吟视频| 久久久国产一区二区| 国产欧美日韩一区二区三 | 一本综合久久免费| 久久免费观看电影| 欧美成人精品欧美一级黄| e午夜精品久久久久久久| avwww免费| 青青草视频在线视频观看| 90打野战视频偷拍视频| 手机成人av网站| 日韩一本色道免费dvd| 欧美日韩av久久| 国产女主播在线喷水免费视频网站| 午夜福利影视在线免费观看| 国产免费现黄频在线看| 高清不卡的av网站| 捣出白浆h1v1| 人人妻人人添人人爽欧美一区卜| 国产欧美日韩一区二区三 | 国产国语露脸激情在线看| 男人舔女人的私密视频| 大片电影免费在线观看免费| 亚洲成av片中文字幕在线观看| 99久久99久久久精品蜜桃| 亚洲黑人精品在线| 美女视频免费永久观看网站| 18禁裸乳无遮挡动漫免费视频| 国产精品久久久人人做人人爽| 国产av国产精品国产| 免费观看av网站的网址| 丰满饥渴人妻一区二区三| 菩萨蛮人人尽说江南好唐韦庄| 精品一品国产午夜福利视频| xxxhd国产人妻xxx| 免费观看av网站的网址| 国产亚洲一区二区精品| 亚洲免费av在线视频| 精品人妻在线不人妻| 国精品久久久久久国模美| 51午夜福利影视在线观看| 天堂俺去俺来也www色官网| 亚洲伊人久久精品综合| 一区二区日韩欧美中文字幕| 啦啦啦视频在线资源免费观看| 日本a在线网址| 另类精品久久| 久久久久视频综合| 在线精品无人区一区二区三| 国产精品久久久久成人av| 久久精品亚洲av国产电影网| 亚洲精品一区蜜桃| 久久ye,这里只有精品| 90打野战视频偷拍视频| 日韩 亚洲 欧美在线| 国产极品粉嫩免费观看在线| 精品一品国产午夜福利视频| 久久 成人 亚洲| 交换朋友夫妻互换小说| 久久久久久久国产电影| 一级片'在线观看视频| 中文字幕人妻丝袜一区二区| 超碰成人久久| 香蕉国产在线看| 国产一区有黄有色的免费视频| 欧美久久黑人一区二区| 肉色欧美久久久久久久蜜桃| 久久久久久免费高清国产稀缺| 在线av久久热| 亚洲久久久国产精品| 婷婷色综合www| 国产黄频视频在线观看| 国产精品麻豆人妻色哟哟久久| 久久综合国产亚洲精品| 天堂中文最新版在线下载| 久久精品久久久久久久性| 一本—道久久a久久精品蜜桃钙片| 国产伦理片在线播放av一区| 一区二区三区乱码不卡18| 亚洲av国产av综合av卡| 新久久久久国产一级毛片| 成人18禁高潮啪啪吃奶动态图| 免费高清在线观看日韩| 欧美成人午夜精品| 免费不卡黄色视频| a级片在线免费高清观看视频| 亚洲国产最新在线播放| 久久99精品国语久久久| 91成人精品电影| 青青草视频在线视频观看| 性色av乱码一区二区三区2| 国产一级毛片在线| 亚洲精品国产一区二区精华液| 五月开心婷婷网| 丰满少妇做爰视频| 肉色欧美久久久久久久蜜桃| 国产精品久久久久成人av| 人成视频在线观看免费观看| 久久久久国产精品人妻一区二区| 国产女主播在线喷水免费视频网站| 丝袜脚勾引网站| a级毛片在线看网站| 日韩一区二区三区影片| 中文欧美无线码| 每晚都被弄得嗷嗷叫到高潮| 国产成人一区二区三区免费视频网站 | 精品人妻1区二区| 国产一区亚洲一区在线观看| 午夜免费观看性视频| 久久热在线av| 1024香蕉在线观看| 真人做人爱边吃奶动态| 高清黄色对白视频在线免费看| 亚洲欧美激情在线| 日韩伦理黄色片| av视频免费观看在线观看| 欧美乱码精品一区二区三区| 欧美精品一区二区免费开放| 男人添女人高潮全过程视频| 热re99久久国产66热| 只有这里有精品99| 日韩视频在线欧美| 国产1区2区3区精品| 日韩大码丰满熟妇| 91成人精品电影| 久久99热这里只频精品6学生| av网站免费在线观看视频| 久久人人97超碰香蕉20202| 亚洲欧洲精品一区二区精品久久久| 中文字幕另类日韩欧美亚洲嫩草| 婷婷成人精品国产| 多毛熟女@视频| 香蕉丝袜av| 亚洲国产成人一精品久久久| 精品一区在线观看国产| 免费女性裸体啪啪无遮挡网站| 纯流量卡能插随身wifi吗| 伦理电影免费视频| 51午夜福利影视在线观看| 男人舔女人的私密视频| 成人18禁高潮啪啪吃奶动态图| 满18在线观看网站| 久久精品国产a三级三级三级| 久久国产精品人妻蜜桃| 永久免费av网站大全| 十八禁高潮呻吟视频| 久久99热这里只频精品6学生| 久久天躁狠狠躁夜夜2o2o | 搡老乐熟女国产|