• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    2021-12-14 09:57:20SuaibAkhterShahenShahMohiuddinAhmedNourMoustafaUnalavusogluandAhmetZengin
    Computers Materials&Continua 2021年7期

    A.F.M.Suaib Akhter,A.F.M.Shahen Shah,Mohiuddin Ahmed,Nour Moustafa,Unal ?avu?so?glu and Ahmet Zengin

    1Department of Computer Engineering,Sakarya University,Sakarya,54050,Turkey

    2Department of Electrical and Electronics Engineering,Istanbul Gelisim University,Istanbul,Turkey

    3School of Science,Edith Cowan University,Perth,WA6027,Australia

    4School of Engineering and Information Technology,UNSW,Canberra BC,2610,Australia

    Abstract:Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System (ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources.To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol.The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages.The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM).Cluster Members (CMs) sign SMs with their private keys while sending them to the blockchain to confirm authentication,integrity,and confidentiality of the message.A Certificate Authority(CA)is responsible for physical verification,key generation,and privacy preservation of the vehicles.We implemented a test scenario as proof of concept and tested the safety message transmission (SMT) protocol in a real-world platform.Computational and storage overhead analysis shows that the proposed protocol for SMT implements security, authentication, integrity, robustness, non-repudiation,etc.while maintaining the SDR.Messages that are less important compared to the SMs are called non-safety messages(NSM)and vehicles use RTS/CTS mechanism for NSM transmission.Numerical studies show that the proposed NSM transmission method maintains 6 times more throughput, 2 times less delay and 125% less Packet Dropping Rate (PDR) than traditional MAC protocols.These results prove that the proposed protocol outperforms the traditional MAC protocols.

    Keywords: Ad hoc networks; data security; digital signatures; distributed storage; intelligent vehicles; vehicular ad hoc networks; wireless communication

    1 Introduction

    Vehicular Ad hoc Networks is an especial type of dynamic wireless network, designed to provide a communication infrastructure between vehicles.Inside a VANETs system each device needed to be well equipped to exchange information (send and receive) with other vehicle’s drivers or vehicles within their reach.The IEEE 802.11-2016 standard [1] provides MAC and physical layer protocols for VANETs.

    VANETs are targeted to provide safety, efficiency and Infotainment.Collision warning, safe-distance information, congested road notification, risky vehicle warning, road barrier/obstacles/block notification, signal/rule violation warning etc.are emergency notifications which are transmitted between vehicles to alert each other by using different VANET protocols.These are called safety messages.Moreover, infotainment can be delivered by incorporating commercial service information, gas station/parking/restaurants/hotel information, media content download, multiplayer games, etc.Those are categorized as the non-safety message.Safety messages always get priority for transmission as fail or delay distribution of those messages may result in severe accidents, traffic jam, etc.Processing all types of messages together will increase the traffic and harm the throughput and overall performance.Because during transmitting, it is required to follow Strict Delay Requirements (SDR) of 100 ms for safety message [2].Contrastingly, NSM is comparatively less important than safety message and does not require SDR to follow.

    To maximize the throughput and minimize transmission delay & PDR Cluster-based (CB)protocols could be a better solution for VANET [2].The nearby vehicles heading towards the same direction could form a cluster to transfer information among themselves.Although CB systems are easier to manage and simultaneously appropriate for resource utilization and performance enhancement, traditional CB systems are suffering from some shortcomings like hidden node problems, traffic overloading, packet dropping, etc.CB-MAC protocol [2] has overcome the shortcomings of CB systems and proposed a complete solution for VANET.By using their Non-Safety Message Transmissions (NSMT) protocols, it improved the communication quality by increasing the throughput and decreasing transmission delay & Packet Dropping Rate (PDR).Adding the security attributes like confidentiality, authenticity, reliability, transparency, integrity etc.to the CB-MAC system could assure security with good performance.

    However, safety messages are very crucial for VANET systems and should be protected from any kind of attacks.Attackers could modify message contents and generate false messages or can provide false replies by using a man-in-the-middle attack [3].Those security leaks may result in fatal accidents.

    Meanwhile, the popularity of blockchain is increasing because of its distributed features and the secured storage service for P2P communication.Blockchain is considered as immutable ledgers and ensures important security services [4,5].All data and transactions are stored as chained blocks and it is not possible to edit or delete any information after being stored, which ensures the integrity, immutability and trustworthiness.These features motivate us to employ blockchain in the proposed system to store safety messages.A Public Key Infrastructure (PKI)based digital signature algorithm is used to ensure the authentication of the cluster members and also to provide communication security.Additionally, we propose a Certificate Authority (CA)for physical verification of the vehicles and to generate a public-private key pair for each of the vehicles.In this paper, to increase throughput by ensuring security services, we propose a Secure Cluster-based MAC (SCB-MAC) protocol for vehicular ad-hoc network.The target is to introduce the security features to the SMT of VANET systems.Handling safety and non-safety messages separately, providing signature-based security during cluster joining and communication,blockchain-based decentralized and distributed storage of the messages and vehicles registration and physical verification are the novelty introduced in this paper.As a Proof of Concept (PoC),we implement an Ethereum blockchain in virtual machines with Cluster Members (CMs) and CH to simulate the SMT.The scenario is tested in a real-world Ethereum test network namedRinkebytest network [6].

    The contributions of the paper are the followings:

    ? We propose a blockchain-based Secured Cluster-based MAC protocol (SCB-MAC) for VANETs.SCB-MAC defines the formation of the cluster, handshake methods, safety and non-safety message transmission in details.We have modified some of the control packets formats of IEEE 802.11 to allow blockchain and to support those methods.

    ? We propose blockchain to store and distributes the safety messages of clusters to provide a decentralized environment while ensuring robustness, temper resistance, immutability, fairness and transparency of the safety messages.The blockchain is hosted in the cloud and the corresponding CH and CMs will communicate with it by using high-speed internet.All the CMs including CH are considered as the full node and anyone can initiate a transaction on the blockchain to inform a safety message.Blockchain will generate block from each of the safety messages and broadcast it to all the CMs including CH.

    ? We have employed a PKI based digital signature method to ensure the authenticity of cluster members as well as to provide communication security.During cluster joining communicating with the blockchain server, digital signature is used to ensure user authentication and integrity, confidentiality, nonrepudiation of the message.

    ? We introduce CA to register and verify vehicles.Additionally, it is responsible to generate public-private key pair for each of the vehicles and to ensure the safety, security and preservation of their privacy.

    We have discussed some cluster based VANET systems with their performance and security in the related work section (Section 2).Research paper where blockchain is employed for VANETs is also added in that section.The system structure is demonstrated in Section 3.The tools used for implementation and experimental setup details are discussed in Section 4.The performance analysis of the proposed SCB-MAC protocol is demonstrated in Section 5.Security analysis of the proposed method is presented in Section 6.In Section 7 we present the conclusion of the paper with some possible future works.

    2 Related Works

    Cluster-based systems are proved very useful for VANETs.The quality and performance improvement by using a cluster-based architecture in VANETs can be found in [7].Yang et al.[8] proposed a cooperative Clustering-based Medium Access Control (CCB-MAC) protocol to enhance the trustworthiness of emergency message broadcasting by improving their reception rate.In [9], the researchers presented a multi-channel CCB-MAC which also improves the reliability with QoS support with the help of cooperation between the members.The authors in [10] also proposed a cluster-based multichannel MAC protocol where they developed an analytical model to find out suitable window size for the MAC protocol to balance between the delay and the successful delivery rate.A hybrid cluster-based protocol is proposed for safety message transmission by [11] which improves the network stability and increase channel utilization by selecting the cluster head according to the mobility factor of the vehicles.Due to lack of neighboring node,TDMA protocols are not able to utilize all the time slots of a frame.The [8–11] do not have efficient resource utilization capability.

    In [12], researchers proposed DMMAC, which is also a cluster-based MAC protocol by utilizing Fuzzy logic Inference System (FIS).But their method is applicable only for emergency/safety messages.A multihop-cluster based hybrid architecture is presented for the safety message transmission to minimize the connection overhead and PDR [13].In [14], the researchers combine the clustering protocol and carry-and-forward schemes for highway VANETs.Reference [14] shows improvement in data download volume and throughput but information about network delay and packet dropping rate is not mentioned.

    The strict delay constraint for the safety message transmission is 100ms, but the presented methods do not satisfy this credential.Additionally, [8,11–13] provide solution only for safety messages and does not concern about the general messages or non-safety messages.Thus, in this paper, we propose a cluster-based method where safety and non-safety messages are handled separately according to their importance.Rather than following the traditional MAC protocols, a blockchain-based method is proposed to ensure the SDR for safety message transmission.

    Zhang et al.[15] presented a Data Security sharing and Storage system based on the Consortium Blockchain (DSSCB).They utilize the temper-proof and security features of blockchain to store authentication information like identity and keys with location, direction, current position and rule violation information of the vehicles.Similarly, Javaid et al.[16] use blockchain to store registration and status information of vehicles in their DrivMan system.To ensure the trust of vehicles, a video storage system was proposed by Xie et al.[17] where vehicles use their onboard camera to capture video of the surroundings and send it to a blockchain to store.The stored information is used to analyze the behavior of vehicles to find any unwanted or malicious behavior.Wagner et al.[18] proposed a method to ensure the integrity of the event messages.Blockchain is used to store the reputation score of the vehicles which is updated after each transaction.Zhang et al.[19] utilized blockchain to store important traffic event information like traffic violation and accidents.They use Mobile Edge Computing (MEC) for computational support, but because of MEC, the system is not fully decentralized.Another blockchain-based message dissemination service was proposed in [20,21].Blockchain is used to store the verified event information to ensure the security and trust of the system.Another event validation mechanism is proposed by Yang et al.[22] where RSUs broadcast event messages to the vehicles and vehicles use PoW to verify the trustworthiness of that event.To implement a scalable system, they use local blockchain to provide quick response to the local vehicles and then all the local RSUs synchronized the data into the global blockchain.But the infrastructure cost for RSU and resources are high, thus in most of the cases vehicles have to pay a good amount of money for that [23].To handle the huge workload of event data, Singh et al.[24] presented branch–based technology with blockchain in where blockchains are divided into branches and each branch is responsible to provide services in different geographical areas.To increase the scalability, some researchers use multiple blockchain to store different information separately [25–27].

    In the above-mentioned research, different types of blockchain are used for different purposes.However, none of them differentiates between message or event types.If all the transmitted messages or event information are stored together in the blockchain with proper security encryption services, the time and storage overhead of the system must be high.It results to decrement of throughput and increment of delay.To minimize the difficulties of consensus and mining [18]minimize the difficulty to 4 leading zeros while [24] set it to 3.Blockchain could be the best solution to provide security, integrity, availability, transparency, robustness etc.But without proper management, the performance could be very low.Thus, we propose a blockchain to store the safety messages.Non-safety messages are not stored in the blockchain as they are less important and consume too much storage.

    3 System Structure

    The nearby vehicles heading towards the same direction will form a cluster.All the vehicles are well equipped with necessary hardware and software resources to send and receive messages including OBU, Sensors, Global Positioning System (GPS) and high-speed internet connection.The vehicles are physically verified by a Certified Authority (CA).CA also generates and assigns a public-private key pair to each vehicle and all the vehicles will be known as their public key.CA is considered as secured enough to preserve the privacy of the vehicles.A graphical representation of clusters is presented in Fig.1a.Among the vehicles, one will be elected as Cluster Head (CH)and others become Cluster Member (CM).By this way, a centralized system is formed where all the NSMTs between CMs will be handled by the CH as an access point.Every cluster owns a blockchain to store the safety messages.All the CMs including CH are considered as a full node and anyone can initiate a transaction in the allocated blockchain to inform about an emergency.Vehicles will sign the message with their private keys to confirm their identity and to ensure nonrepudiation.The blockchain server will check the authentication and then generates block from the message and broadcasts it to all the members.Details of the system model are discussed in the following subsections.

    Figure 1:(a) Application scenario, (b) modified control packet format for SCB-MAC

    3.1 Formation of SCB-MAC Cluster

    SCB-MAC is a cluster-based system with some modification from the traditional IEEE802.11 standard (see Fig.1b).In this section, we will discuss the details of cluster formation and related details.

    3.1.1 Cluster Membership

    To join a cluster, an isolated vehicle has to broadcast a control message called Request to Cluster Formation (RTCF) in the network.Cluster Information (ClI) and the vehicle’s public key i.e., the Member’s Public Key (MPK) are included in the RTCF.Then, CH of the nearby cluster sends back a (Registration to Cluster) ReTCl packet to the isolated vehicle by informing about the cluster, Public key of CH and the Address of the Blockchain (BCA) assigned to that cluster.The new member id of the vehicle is also included in the ReTCl.To ensure authenticity, CH signs the BCA with its private key.The newly joined member has to decrypt it by using the public key of CH and then registered to the assigned blockchain.A vehicle can receive multiple ReTCl, in that case, the vehicle will calculate the time interval between sending and receiving of the control messages and join the cluster where the delay is minimum.If no cluster is present nearby and the vehicle considers itself as CH and starts a new cluster.Then it can apply to the server to allocate a blockchain for the newly formed cluster.The new CH will broadcast the ClI in the network and wait for some CMs to join.Unified Modelling Language (UML) is used to sketch the FSM of the proposed SCB-MAC protocol (see Fig.2).

    Figure 2:Finite state machine of the proposed SCB-MAC protocol

    3.1.2 CH Election and Cluster Merging

    An active but isolated vehicle will broadcast RTCF and wait for ReTCl to join an existing cluster as a CM.But if it does not receive any ReTCl and SIFS timeout occurs, the vehicle becomes CH to form a new cluster.If multiple CHs come very closer and start using the same channels, CHs will receive control messages from each other.Then all the CHs those who realize the existence of cluster(s) will broadcast a control message called Request to Cluster Merging(RCIM).Inside RCIM, CH includes Cluster’s Member Information (CMI) to inform the number of CMs active under its cluster.After receiving the RCIM, Cluster(s) with a lower number of CMs will join to the cluster with the largest number of CMs.All the CMs including the CH(s) will join as new CM.Newly joined CMs will exchange RTCF and ReTCl with the CH to complete the merging process.CH of the previous cluster will initiate a transaction in the current blockchain to synchronize the valid safety messages from the previous blockchain.

    3.1.3 Leaving a Cluster

    For different circumstance, anyone can leave a cluster and then the CMs list is updated dynamically.Cluster leaving may be required in four situations and those are demonstrated in Fig.3.While the CH sends RTS to a CM and does not receive any CTS even after retransmission,CM will be considered as out-of-reach (see Fig.3a).Similarly, while the CH sends RTS on behalf of a sender CM to receiver CM and does not receive any CTS even after retransmission,destination CM will be considered as out-of-reach (see Fig.3d).If there is no ACK received from a CM after broadcasting and resending a message, that CM will be considered as out-of-reach(see Fig.3b).If the CH is out of reach and a CM does not receive any CTS even after the retransmission the CM will initiate a cluster leaving process (see Fig.3c).

    Figure 3:Cluster leaving processes while (a) no CTS is received from a CM, (b) no ACK is received from a CM, (c) no CTS is received from the CH and (d) no CTS is received from the CM(D)

    3.2 Safety Message Transmission(SMT)

    Collision warning, safe-distance information, congested road notification, risky vehicle warning, road barrier/obstacles/block notification, signal/rule violation warning etc.are considered as emergency or safety messages.These types of messages have strict delay requirement which is 100 ms [2].The safety messages should come from a valid source and stored in such a way that, if one or multiple cluster members (including the CH) leave the cluster, the safety messages should not be lost.Traditional cluster-based systems are managed by a central node and thus the possibility of single point-of-failure is high.Blockchain is a perfect solution for these obligations as it provides data storage and management system in a distributed environment.

    When any isolated vehicle become a CH, it will communicate with the server to get the network address of an available blockchain.The server will provide an address where the smart contract for the SMT was previously deployed.If the CH was a member of any previous SMT blockchain, it will copy the related and valid safety messages to the newly created blockchain as transactions.Whenever a CM wants to join the cluster and shares its public key, CH will send the sever credentials of the blockchain by signing it using the CH’s private key.The CM will connect with the blockchain server and then it will synchronize to receive all the existing safety messages of the blockchain.All the CMs including CH are independent nodes in the blockchain and everyone can perform transactions in the blockchain to inform others about a safety message.

    Each safety message is generated by a smart contract as a transaction and stored chronologically as a block in the blockchain.After any block is generated, all the CMs will get notification about the newly created safety message in block form.If any CM has validity expired information for a particular safety message, it will request for another transaction in the blockchain to mark the message as invalid.For example, whenever a vehicle changes a lane it will generate a transaction but when the vehicle will move to another lane the previous information become invalid.Thus, it will generate an invalid transaction and the block will be marked as invalid.As the messages consume very small storage, the block will not be removed from the blockchain.However, the information stored in the block could be used by the law enforcement authority to investigate different occurrence like an accident, traffic jam etc.

    3.3 Non-Safety Message Transmission(NSMT)

    The non-safety message transmission will be unicast to and fro a CM or a CH.There are three categories of unicast and corresponding transmission is briefly discussed here.From CH to CM, there is a direct unicast from CH to CM.CH verifies transmission using ACK.The data is routed via CH as a CM cannot send non-safety messages directly to another CM, rather they send it to the CH and CH will be responsible to broadcast messages to the destination CM.On the other hand, CH can transmit non-safety messages to neighbour clusters’CH by using the RTS/CTS mechanism.Fig.4a–4c shows the handshaking between the members of the proposed NSMT protocol.

    Like traditional MAC protocols, if all the CMs are transmitting messages to each other there will be duplicate message exchanges and hidden node problem is possible to occur.Moreover, with the increment of the number of vehicles a huge flow of messages will be generated which increase the chance of collisions and transmission delay [2].Thus, in the proposed method, CM has the responsibility to handle the non-safety message communication and rather than broadcasting immediately CH sends to one CM at a time and waits until receiving an ACK from that CM.After the ACK is received it will send the message to another CM.It is possible to set the maximum number of retransmission limit for NSMT, and if an ACK does not receive by the CH within that time, it will retransmit the message until the limit.Fig.4d shows the flowchart.

    Figure 4:(a) Handshake between CH and CM during NSMT, (b) flowchart of the NSMT method

    4 Implementation

    For the proposed SMT of the SCB-MAC protocol, we present a Proof of Concept (PoC)implementation by using the Ethereum blockchain.Generally, the transactions are performed by miners who are also members of the blockchain.But in the proposed system, as the vehicles are the members of the blockchain and many of the vehicles do not have the capability to mine blocks, we have introduced a server which will perform the mining tasks on behalf of the vehicles.Moreover, online computing service providers also maintain a distributed service.Thus,our proposed system is decentralized and distributed as the data are not stored in the server or a specific location rather stored in all the vehicles storage.A Virtual Machine (VM) was configured with Ubuntu-18.04.4-desktop-amd64 to host the Ethereum blockchain and also act as a miner.Two other VM is considered as CH and CM.Registration to the blockchain and message transmission is tested with this setup.We are going to describe the details of the implementation in this section.

    4.1 Tools

    We implemented the SMT module of the SCB-MAC protocol by using the Truffle framework.It’s a well-known testing framework for Ethereum blockchain which provides all the facilities to manage smart contracts, automated testing of the codes, deploy smart contracts in Ethereum blockchain [28].To emulate and test the smart contracts into a blockchain, the truffle suite offersGanache[29], a virtual private Ethereum blockchain.Ganacheoffers special features to examine the blocks and transactions, blockchain log to analyse the responses and debugging information in the popular platforms like Windows, Mac OS and Linux.The vehicles usemetamask wallet[30] to connect with virtual private blockchains.It provides all the wallet facilities to access, control and pay to the blockchain-based applications.Metamaskcomes in the form of a browser extension and also available for iOS and Android as apps.Not only the main Ethereum network butmetamaskalso provide the facility to connect with different test networks including custom RPC (Remote Procedure Call).A Node Packet Manager (NPM) is used to executes JavaScript in the proposed method [31].To interact with the smart contract, we developed the client-side in HTML by using Lightweight NPM Server [32].

    4.2 Experiment

    In a typical VANET system, all the vehicles may not have the mining capabilities.Thus,in the proposed system, one or more servers are used to perform mining on behalf of the vehicles.It could be an external EDGE server (like [17,20,21]) or an existing blockchain server(like [6,33]) which is available online.To test our proposed system in both environment we present two different experimental setups.In the first setup, we are considering a dedicated EDGE server as miner (configured in a virtual machine).Moreover, In the second experiment, a real-world platform (Rinkebytest network) is considered as blockchain server to perform mining.

    4.2.1 Ganache Test Server

    To implement the SMT module we prepared a VM as blockchain server with Ubuntu-18.04.4-desktop-amd64 installed.First, we installganacheand consider it as a blockchain of a particular cluster.Then, we install NPM as it is a prerequisite to rum truffle framework and then install the other dependencies.In the SMT blockchain, there are two types of operations.First one is to store a safety message and the second one is to mark it as invalid when the impact/validity of the message is no longer valid.Thus, we write a smart contract which consists of three functions.One to view the existing blocks, the second one to add a safety message in the blockchain and the third one to mark a safety message as invalid.The SC is written in solidity and deployed into the blockchain by using truffle.

    Next, in the CH and CM virtual machines, we installmetamaskEthereum wallet extension in the Firefox web browser.In themetamask, we use the custom RPC option to connect theganacheblockchain server which is running in the server VM with a customisable port number.The CM and CH used their public keys to register with the blockchain.We considered that the CM and CH are verified by CA.Thus, the CM and CH have the permission to perform operations in the blockchain.Ganacheprovides 100 ethers to CM and CH to pay the fees i.e., the gas during a transaction.After testing it in the local VM, we found that all the functions are running fine and ready to deploy in a real-world platform.

    4.2.2 Rinkeby Ethereum Testnet

    To deploy smart contracts and execute transactions in a real-world platform, we have usedRinkeby[6], which is an Ethereum test network.It is one of the popular test networks used by blockchain developers.By sharing the account information in the social network, we have earned some virtual currency i.e., ether which is usable only forRinkeby.Although the earned ETHERs forRinkebyare valueless in the real world, to perform any transaction and smart contract deployment we need those ETHERs to pay the gas price.

    We have tested our smart contract in the Remix IDE (integrated Development Environment)which is a platform independent environment [34].It’s a web-based service which provides different compiler versions to run smart contracts and execute blockchain transaction.After deploying the smart contract and performing some operations in theRinkebytestnet by using Remix IDE,details report about the blocks and transactions can be found in theetherscanweb site [35].The reports include the timestamp, transaction fee, gas limit, gas fee, block number, hash values of transactions etc.

    5 Performance Analysis

    The performance analysis of the proposed SCB-MAC protocol is divided into two parts.Firstly, we will demonstrate the performance of the SMT protocol which includes the computational overhead analysis of the digital signature and key generation algorithm.Storage overhead due to Ethereum blockchain is also presented in that section.Then we will discuss the performance of the NSMT protocol by comparing the throughput, PDR and delay with the traditional MAC protocol.

    5.1 Performance Analysis of the SMT Protocol

    To ensure security, integrity and authenticity of the transferred message whenever any CM or CH wants to initiate a transaction in the blockchain, it signed the message with its private keys as a proof of authenticity.Similarly, during the first communication with a CM, CH sends BCA inside ReTCl by signing it with CH’s private key.In both situations, the system uses RSA-1024 algorithm.The security strength i.e., the difficulty of breaking the key is measured in bits and according to NIST [36], the security strength of RSA-1024 is 80 bits.That means to break the key attacker have to perform at least 280 operations.According to some reports 80-bit security is considered as below standard, but for the system with lower computational power like VANET,IoT, etc.that would be considered secured enough.However, Singh et al.[37] presented RSA-1024 with the security level equal to the symmetric key size of 112-bit.In SCB-MAC, vehicles use high-speed internet connection to communicate with the blockchain and the propagation delay considered ignorable.

    5.1.1 Computational Overhead

    For a computer with more than 1.5 GHz clock speed, RSA-1024 with 80 bits security would take 1.48 ms for signing and 0.07 ms for verification [38].So, it is possible to sign and verify a message within 1.55 ms.However, to calculate the signature and verification time for RSA-1024 with 112-bit security three intelligent vehicles are considered with different computational resources.Processing speed and RAM of the vehicles are presented with their time required to sign and verify a safety message of 24-bytes are presented in Fig.5.For IV1, IV2 and IV3 it requires 32.34, 28.27 and 19.32 milliseconds respectively to complete sign and verification process.

    As the strict delay constraint for the SMT is 100 ms, it is possible to sign and verify at least 64 messages by using RSA-1024 signature method (with 80-bit security).However, while the security strength is considered 112-bit, it is possible to complete 3 to 5 transaction.From the previous works we have found that the average delay for safety messages of [10] is 151 ms and in [39] it is also more than 100 ms.So, the SMT time is good enough to maintain the SDR.However,it is possible to hire multiple EDGE servers to improve the scalability of the system.During cluster joining i.e., the registration processes the time required for signature and verification is 32.34 ms for a low configured vehicle (see Fig.5).That means it is possible to register more than 30 low-configured vehicles per second.This is a minimum cost to ensure security, integrity and authenticity.The CA use a key generator to provide public and private key pairs for vehicles.The key generation time for RSA-1024 is 97 ms for a computer with a 3.1 GHz processor and 4.0 GB of RAM [37].So, it can generate at least 10 keys per second.

    Figure 5:Signature and verification time required for various intelligent vehicles

    5.1.2 Storage Overhead

    Block header of the Ethereum blockchain is approximately 508 Bytes [40].In Ethereum, every block consists of a single message.In the worst case, if a safety message block is generated in every 5 s (12 in a minute), the storage overhead is 508×12×60×24=8.37 MB/Day.Therefore,the proposed method requires a small amount of storage and possible to store them for a long period.However, when there remains no member in a cluster, the server reset the blockchain by archiving all the blocks in a cloud.Thus, too much storage support is not required for the proposed SMT protocol.

    5.2 Performance of the NSMT Protocol

    In SCB-MAC safety messages will be transmitted by using high-speed internet which will remove workloads from the internal network which results in an increment of throughput and decrease of PDR and delay during NSMT.In this section, we will present the performance analysis of the NSMT and compare it with the traditional MAC system.A numerical analysis is presented with arbitrarily distributed

    A numerical analysis is presented with arbitrarily distributed n number of vehicles which are moving through a multi-lane road.Speed of the vehicles are considered as 100 km/h and the width of the road is 5 m.Vehicles are moving in almost the same speed and their transmission area is 500 m.If these parameters are changed, performance will be changed too.Details about their impacts are discussed in [41,42].Tradition MAC protocols for VANETs are studied in [2,41,43].We used these studies and data to compare our method with the traditional MAC protocols.However, in the context of this paper sensitivity test is not going to add any new value as the comparison will not be fair.More importantly, sensitivity test would have been apt if there were similar blockchain-based MAC protocol for VANET.The analysis is performed in MATLAB and the considered value of parameters are presented in [2].

    5.2.1 Throughput Analysis of the NSMT Protocol

    The normalised system throughput S for kth cluster is can be calculated as:

    Here, Ps = Probability of successful transmission,Pbusy= At least one transmission is in progress,L=Transmitted packet length,Pi=Probability that the channel is idle,Tslot= Slot time,Te= Expected time to spend in a state,Tspan=Time span of slot, Ts=Time span for successful transmission andTc=Time span if there is collision.

    The throughput of the system would be:

    Fig.6a shows that the throughput for SCB-MAC (NSMT) is comparatively higher than traditional MAC-based methods.In traditional MAC, CH broadcasts all the messages immediately which increase collisions and throughput decrease quickly.When the number of vehicles is small,cluster size will be small.A small cluster could not be able to utilise the available radio resources due to an inadequate number of vehicles in the cluster and low traffic demand generated in the cluster [2].Therefore, throughput is lower than traditional MAC protocol.

    Figure 6:(a) Throughput, (b) PDR and (c) delay comparison between SCB-MAC and traditional MAC

    Firstly, as the safety messages are not using the internal network, the load of messages are less.Secondly, rather than broadcasting immediately SCB-MAC uses RTS/CTS to check the existence of the CMs first and then transmits to remove the hidden node problem.Thus, the increment of throughput is significant but with the increment of vehicles, collisions are also increasing which decrease the throughputs gradually for all types of systems.For example, while the number of vehicles reaches to 40, traditional MAC protocol is overloaded and too much collision decreases the throughput to almost 0 while proposed SCB-MAC can maintain a throughput rate near to 6 Mbps.Moreover, the maximum throughput of the SCBMAC protocol is about 12 Mbps for NSMT, where previously proposed methods like [7,11,14] have achieved 1.1, 1.3 and 11 Mbps respectively.

    5.2.2 Packet Dropping Rate of the NSMT Protocol

    To calculate PDR of the network the following equations are derived in [2]:

    whereMrnsdare the maximum retransmission limit for NSMT.To ensure the availability of safety messages there is no limit for retransmission, which increase overhead and increment of PDR.In the proposed method, safety messages are not using the internal network which decreases the PDR rate of the network.Thus, PDR is less than traditional MAC in the proposed method although the retransmit limit is the same.Fig.6b shows that the PDR for the proposed SCB-MAC is near to 0 until the number of vehicles reaches to 30 and after that, it increases but always less than traditional MAC protocols.

    5.2.3 Delay Analysis

    In [2], Shah et al.presented the transmission delay of a cluster-based system could be calculated as:

    So delay for non-safety messages will be:

    Fig.6c shows the average packet transmission delay against the number of vehicles.As the proposed method uses RTS/CTS handshake before sending any non-safety messages, initially the transmission delay is a little higher than the traditional MAC protocol.But with the increment of the number of vehicles, the traditional MAC system faces rapid increment of transmission delay because of collisions, while SCB-MAC keeps it manageable.

    5.2.4 Results and Discussions

    The cluster-based protocol is based on IEEE802.11 Distributed Coordination Function [DCF].Performance of the IEEE802.11 can be found in [43–49].NSMT achieved maximum throughput of 12 Mbps, while some previously proposed method achieved [7,11,14] have achieved 1.1, 1.3 and 11 Mbps respectively.Increasing number of messages increases collisions which result to decrement of throughput and increment of PDR and delay.For SCB-MAC the internal network will be available only for non-safety messages because the safety messages will be transmitted by the internet.Therefore, the full network is available only for non-safety messages and that results in throughput increment.Maintain a throughput of 6 Mbps for NSMT, while the number of vehicles reaches to 40.In the same state throughput of traditional MAC protocol is close to zero.SCB-MAC is free from hidden node problem as only live nodes could receive non-safety messages which are achieved by RTS/CTS handshaking.By removing hidden node problem SCB-MAC can minimize PDR and transmission delays.When the total number of vehicles is 50, the transmission delay of the MAC protocol reaches to double (800 ms) than the proposed protocol.

    6 Security Analysis

    In this section, we will discuss the security features of the SCB-MAC protocol.Blockchain with CA and public key infrastructure provide strong security to the transferred safety messages.The security features are the followings:

    6.1 Source Authentication and Non-Repudiation

    We propose a PKI based digital signature method which is considered as secure until the attacker succeeds to get the private key.Each of the vehicles is physically verified by CA during registration.CA is responsible to ensure the safety and security of identities.To perform a transaction in the blockchain a vehicle has to encrypt the safety messages by using its private key to confirms its identity and nonrepudiation.The blockchain server will verify the vehicle’s identity before creating a block.

    6.2 Privacy Preservation

    The real identity of the vehicles is securely stored by CA by mapping it with their public key.The vehicles use to communicate with others by using their public keys to disclose their original identity to the public.Therefore, even if an adversary could get the public-private key pairs it is not possible to guess the real identity of the vehicles.The proposed SCB-MAC ensures the privacy of the vehicles with the help of CA.

    6.3 Security,Integrity and Confidentiality of Messages

    All the SMTs are encrypted by RSA-1024 cryptographic algorithm which ensures security,integrity and confidentiality of the messages.RSA-1024 considered strong enough as the key attacker have to perform at least 280 according to [36] or 2112 according to [37] operations to break the keys.The blockchain server checks for the integrity of the message by matching the hash value by decrypting the message.Any modification affects the hash value and that message will be rejected.

    6.4 Attack Prevention

    PKI based digital signature algorithms are considered as secure until an attacker creaks the private key [50].So, the communication channel used in SCB-MAC is theoretically secured.It also prevents the messages from being modified and fabricates by comparing the hashing value.Even if the adversary got the public-private key pair, it is not possible to get the hash of the former block in the blockchain.So, a fabricated message with wrong hash value will be rejected.So, reply attack from an unknown source similarly rejected.Moreover, the digital signature-based system prevents impersonate attack because it is not possible to generate a valid signature on behalf of a vehicle.However, CA confirms the physical identity of the vehicles and the blockchain server checks the authentication information before block generation.No unauthorized entity, as well as no vehicles with multiple fake identities, could perform any operation in the system.Thus, we can say that the system is free from Sybil attack or unknown source attack.

    Additionally, SCB-MAC can prevent DDoS attack as the blockchain never accepts any unauthorized entity to perform any operation and they will be blocked by the server from sending further messages to the blockchain.DDoS, man-in-the-middle attack, Sybil attack, replay attack,etc.are the attacks that can harm a VANET system [51].By using public-key cryptography based digital signature, SCB-MAC is safe from these attacks.Additionally, proposed signature method does not depend on verifier table, thus the system is safe from stolen verifier table attack.

    6.5 Decentralization,Flexibility,Temper-Resistance,Immutability,Fairness,Transparency,Robustness

    SCB-MAC utilizes the features of blockchain.It provides a decentralized and distributed environment to store data in a platform-independent and flexible way.Ethereum platform can be accessed by usingmetamaskwallet [30], which could perform operations from any kind of computers and mobile devices using any operating system like Windows, MAC, Linux and any cell phone that uses iOS or Android.All the members have a copy of all the blocks in the blockchain, which prevent the system from single-point-of-failure and provides robustness.The storage structure of blockchain is chronological which is ensured by hashing.It does not allow anyone to change the content even the sequence of blocks which ensures immutability and tamperfree storing of the safety message.All the members in the cluster are equally treated while operating on the blockchain to ensure the fairness of the system.By using smart contracts, a vehicle could disable the safety message which is no more valid.In that case, the message is still stored in the blockchain and every member can see it as an invalid message.Even if any blockchain is reset, data blocks of it are archived in the cloud under the supervision of the CA.It could be used in future for accident investigation, traffic violation, etc.This storing method could help law enforcement authority during the investigation of accidents.

    7 Conclusion

    For VANETs, cluster based VANET systems are performing very well to reduce PDR, increase throughput and maintain hard time constraint for SMT.To keep the performance of the clusterbased system and introduce security features in it, SCB-MAC is proposed.Firstly, an Ethereum blockchain is used to store and distribute the safety messages in a decentralized environment with flexibility, temper-resistance, immutability, transparency and robustness features.Secondly,a PKI based digital signature algorithm (RSA-1024) is used to ensure the authentication, nonrepudiation, integrity and confidentiality of the safety messages.Thirdly, a CA is responsible to generate asymmetric keys for the vehicles and to preserve the privacy of the vehicle’s real identity.The blockchain is implemented and tested in a realistic platform.The results show that it is possible to complete 65 message transmission within SDR of 100 ms.Therefore, the introduction of blockchain with digital signature method does not harm the SDR for SMT.Moreover, by using secure vehicles registration process it is possible to register 30 vehicles in every second.SCB-MAC provides source authentication, privacy preservation of the vehicles, attack prevention with the typical facilities of blockchain, digital signature methods.Numerical analysis is presented to check the performance of non-safety message transmission protocol and found that it performs better than the traditional MAC protocol in terms of throughput, delay and PDR.When the transmission rate of the traditional MAC protocols fall down to zero, the proposed NSMT maintain a rate of 7 Mbps and when the number of vehicles reaches to 50, transmission delay increases to 800 ms for MAC protocols while proposed method faces a delay of 400 ms only.Moreover, the PDR of NSMT is zero while the traditional MAC protocols’PDR reached to almost 60%.In future, we will try to implement a light-weight consensus method for blockchain to ensure the trustworthiness of vehicles.Additionally, we are planning to find a suitable communication protocol to exchange messages between the blockchains from neighbour clusters and also the feasibility of a secured protocol for the non-safety message will be tested in future.

    Funding Statement:The authors received no specific funding for this study.

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品嫩草影院av在线观看| 欧美3d第一页| 午夜亚洲福利在线播放| av免费在线看不卡| 精华霜和精华液先用哪个| 99久久久亚洲精品蜜臀av| 亚洲色图av天堂| 又黄又爽又免费观看的视频| 免费看光身美女| 黄色欧美视频在线观看| 久久久精品大字幕| 精品人妻一区二区三区麻豆 | 久久久色成人| 欧美色视频一区免费| 亚洲五月天丁香| 男女之事视频高清在线观看| 天美传媒精品一区二区| 成人午夜高清在线视频| 亚洲精品色激情综合| 精品福利观看| 日日干狠狠操夜夜爽| 欧美最新免费一区二区三区| 精品欧美国产一区二区三| 久久久久久九九精品二区国产| 久久精品夜色国产| 亚洲成人中文字幕在线播放| 内地一区二区视频在线| 国产国拍精品亚洲av在线观看| 一级毛片aaaaaa免费看小| 一级毛片久久久久久久久女| 久久久久国产精品人妻aⅴ院| 毛片一级片免费看久久久久| 久久热精品热| 中文字幕精品亚洲无线码一区| 午夜福利高清视频| 国产精品久久电影中文字幕| 日韩三级伦理在线观看| a级一级毛片免费在线观看| 亚洲欧美日韩卡通动漫| 色哟哟哟哟哟哟| 精品日产1卡2卡| 国产精品国产三级国产av玫瑰| 青春草视频在线免费观看| 国产精品精品国产色婷婷| 一个人看视频在线观看www免费| 亚洲高清免费不卡视频| 2021天堂中文幕一二区在线观| 老师上课跳d突然被开到最大视频| 精品久久久久久久久av| 91狼人影院| 国产精华一区二区三区| 91av网一区二区| 又黄又爽又刺激的免费视频.| 日本a在线网址| 精品一区二区三区人妻视频| 老司机午夜福利在线观看视频| 波多野结衣高清作品| 伦精品一区二区三区| 欧美xxxx黑人xx丫x性爽| 国产亚洲精品久久久久久毛片| 最近2019中文字幕mv第一页| 成人三级黄色视频| 99精品在免费线老司机午夜| 色播亚洲综合网| 日日啪夜夜撸| 国产乱人偷精品视频| 综合色av麻豆| 国产免费男女视频| 亚洲va在线va天堂va国产| av.在线天堂| 中文字幕精品亚洲无线码一区| 天堂动漫精品| 欧美人与善性xxx| 欧美丝袜亚洲另类| 日韩欧美一区二区三区在线观看| 日韩,欧美,国产一区二区三区 | 国产高潮美女av| 欧美中文日本在线观看视频| 成人国产麻豆网| 国产伦精品一区二区三区四那| 丝袜美腿在线中文| 日本五十路高清| 中文字幕免费在线视频6| 麻豆国产97在线/欧美| 国产免费男女视频| 精品一区二区三区视频在线| 搡女人真爽免费视频火全软件 | 99久国产av精品| 午夜激情欧美在线| 男女下面进入的视频免费午夜| 亚洲成av人片在线播放无| 亚洲va在线va天堂va国产| 国产三级在线视频| 亚洲人成网站在线观看播放| 亚洲va在线va天堂va国产| 国产 一区精品| 亚洲人成网站在线观看播放| 国产美女午夜福利| 99热只有精品国产| 女同久久另类99精品国产91| 韩国av在线不卡| 亚洲无线在线观看| 91久久精品电影网| 国产欧美日韩精品一区二区| 一进一出抽搐动态| 久久久成人免费电影| 欧美+日韩+精品| 51国产日韩欧美| 日本精品一区二区三区蜜桃| 看免费成人av毛片| 少妇熟女欧美另类| 色吧在线观看| 精品少妇黑人巨大在线播放 | 禁无遮挡网站| 精品国产三级普通话版| 久久久久国产网址| 非洲黑人性xxxx精品又粗又长| 国产一区二区激情短视频| 亚洲国产高清在线一区二区三| 麻豆精品久久久久久蜜桃| 日本a在线网址| 亚洲成人中文字幕在线播放| 成人亚洲欧美一区二区av| 国产精品永久免费网站| 免费人成视频x8x8入口观看| 日本 av在线| 国产精品亚洲一级av第二区| 国产av一区在线观看免费| 男女视频在线观看网站免费| 看非洲黑人一级黄片| 99久久九九国产精品国产免费| 午夜福利成人在线免费观看| 卡戴珊不雅视频在线播放| 男女下面进入的视频免费午夜| av天堂中文字幕网| 亚洲丝袜综合中文字幕| 少妇人妻精品综合一区二区 | 亚洲精品日韩av片在线观看| 成人美女网站在线观看视频| 久久精品夜色国产| 超碰av人人做人人爽久久| 赤兔流量卡办理| 日韩亚洲欧美综合| 精品国产三级普通话版| 久久人妻av系列| 一进一出抽搐gif免费好疼| 亚洲精品456在线播放app| 成年女人永久免费观看视频| 日本成人三级电影网站| 18禁在线播放成人免费| 大型黄色视频在线免费观看| 淫妇啪啪啪对白视频| 男人的好看免费观看在线视频| 国产av在哪里看| 久久久久久久久中文| 亚洲婷婷狠狠爱综合网| 男女下面进入的视频免费午夜| 国产精品不卡视频一区二区| 内射极品少妇av片p| 久久精品国产亚洲av天美| 免费大片18禁| 免费看a级黄色片| 亚洲欧美成人精品一区二区| av女优亚洲男人天堂| 久久这里只有精品中国| 91在线观看av| 最近2019中文字幕mv第一页| av免费在线看不卡| 精品少妇黑人巨大在线播放 | 日韩成人伦理影院| 亚洲精品国产av成人精品 | 亚洲av第一区精品v没综合| 一个人看的www免费观看视频| 老司机福利观看| 久久久精品94久久精品| 成人毛片a级毛片在线播放| 观看免费一级毛片| 国产美女午夜福利| 有码 亚洲区| 欧美三级亚洲精品| 国产在视频线在精品| 99在线视频只有这里精品首页| 国产精品久久久久久精品电影| 免费无遮挡裸体视频| 韩国av在线不卡| 国产一区二区亚洲精品在线观看| 亚洲中文字幕一区二区三区有码在线看| 一级毛片aaaaaa免费看小| 久久九九热精品免费| 亚洲av.av天堂| 欧美日韩一区二区视频在线观看视频在线 | 国产三级在线视频| 国产伦在线观看视频一区| 最近2019中文字幕mv第一页| 精品久久国产蜜桃| 天天躁夜夜躁狠狠久久av| 国产精品人妻久久久久久| 99热这里只有精品一区| 69人妻影院| 亚洲精品日韩av片在线观看| 亚洲人成网站在线播放欧美日韩| 久久久久久久久久久丰满| 久99久视频精品免费| 免费观看人在逋| 国产蜜桃级精品一区二区三区| 国产亚洲精品久久久久久毛片| 亚洲精华国产精华液的使用体验 | 天堂动漫精品| 久久热精品热| 人人妻人人看人人澡| 中文字幕免费在线视频6| av卡一久久| 99久久精品热视频| 夜夜看夜夜爽夜夜摸| 亚洲欧美日韩高清在线视频| 色在线成人网| 国产成人freesex在线 | 免费av不卡在线播放| 亚洲国产精品久久男人天堂| 国产亚洲av嫩草精品影院| 男女做爰动态图高潮gif福利片| 九九在线视频观看精品| 国产激情偷乱视频一区二区| 日韩 亚洲 欧美在线| 天美传媒精品一区二区| 久久精品国产亚洲av香蕉五月| 国语自产精品视频在线第100页| 蜜桃久久精品国产亚洲av| 国产真实乱freesex| 久久久精品94久久精品| 国产精品av视频在线免费观看| 精品午夜福利在线看| 2021天堂中文幕一二区在线观| 又黄又爽又免费观看的视频| 最近最新中文字幕大全电影3| 免费观看的影片在线观看| 精品久久久久久久久亚洲| 99视频精品全部免费 在线| 可以在线观看毛片的网站| 亚洲av免费高清在线观看| 国产欧美日韩精品亚洲av| 亚洲精品日韩av片在线观看| 欧美日韩一区二区视频在线观看视频在线 | 看免费成人av毛片| 日韩欧美国产在线观看| 最近在线观看免费完整版| 国产精品久久久久久av不卡| 欧美性猛交黑人性爽| 国产三级中文精品| 国产av麻豆久久久久久久| 三级毛片av免费| 欧美激情在线99| 免费看a级黄色片| 少妇熟女aⅴ在线视频| 中文字幕免费在线视频6| 欧美一区二区亚洲| 自拍偷自拍亚洲精品老妇| 天天一区二区日本电影三级| 十八禁国产超污无遮挡网站| 好男人在线观看高清免费视频| 久久久精品94久久精品| 精品国产三级普通话版| 亚洲精品一区av在线观看| 日本熟妇午夜| 国产精品一区二区免费欧美| 亚洲人成网站在线播| 最近的中文字幕免费完整| 欧美性感艳星| 搡老岳熟女国产| av福利片在线观看| 看黄色毛片网站| 在线看三级毛片| 亚洲精品影视一区二区三区av| 亚洲av成人av| 亚洲欧美日韩无卡精品| 欧美不卡视频在线免费观看| 日日摸夜夜添夜夜添小说| 99热6这里只有精品| 69av精品久久久久久| 国产精品三级大全| 菩萨蛮人人尽说江南好唐韦庄 | 又黄又爽又刺激的免费视频.| 女人被狂操c到高潮| 日韩欧美精品免费久久| 日本免费a在线| 久久精品影院6| 久久国产乱子免费精品| 在线观看av片永久免费下载| 大香蕉久久网| 观看免费一级毛片| 99久国产av精品| 插阴视频在线观看视频| 久久精品综合一区二区三区| 一区福利在线观看| 婷婷精品国产亚洲av在线| 国产精品乱码一区二三区的特点| 淫妇啪啪啪对白视频| 成人亚洲精品av一区二区| 亚洲av免费高清在线观看| 校园人妻丝袜中文字幕| 天堂√8在线中文| av天堂在线播放| 在线天堂最新版资源| 大香蕉久久网| .国产精品久久| 婷婷六月久久综合丁香| 69av精品久久久久久| 亚洲av电影不卡..在线观看| 免费人成在线观看视频色| av福利片在线观看| 12—13女人毛片做爰片一| 内射极品少妇av片p| 免费一级毛片在线播放高清视频| 国产乱人偷精品视频| 日韩欧美在线乱码| 国产色爽女视频免费观看| 亚洲精品456在线播放app| 亚洲av免费高清在线观看| 丝袜美腿在线中文| 日本精品一区二区三区蜜桃| 国内揄拍国产精品人妻在线| 国产精品久久久久久亚洲av鲁大| 欧美+日韩+精品| 国内久久婷婷六月综合欲色啪| 国产日本99.免费观看| 两个人视频免费观看高清| 欧美日韩精品成人综合77777| 精品人妻偷拍中文字幕| 99久久久亚洲精品蜜臀av| 成人特级黄色片久久久久久久| 三级男女做爰猛烈吃奶摸视频| 人妻丰满熟妇av一区二区三区| 淫妇啪啪啪对白视频| 国产又黄又爽又无遮挡在线| 日本黄色片子视频| 在线看三级毛片| 日韩亚洲欧美综合| 俺也久久电影网| 俺也久久电影网| 男女视频在线观看网站免费| 综合色丁香网| 我要看日韩黄色一级片| 国产精品精品国产色婷婷| 国产高清视频在线观看网站| 亚洲精品色激情综合| 亚州av有码| 菩萨蛮人人尽说江南好唐韦庄 | 嫩草影院入口| 国国产精品蜜臀av免费| 精品一区二区三区人妻视频| 久久久久国产精品人妻aⅴ院| 麻豆一二三区av精品| 尤物成人国产欧美一区二区三区| 国产美女午夜福利| 亚洲七黄色美女视频| 有码 亚洲区| 看非洲黑人一级黄片| 国产视频一区二区在线看| 国产高清三级在线| 亚洲一区高清亚洲精品| 简卡轻食公司| 亚洲精品久久国产高清桃花| 偷拍熟女少妇极品色| 免费观看人在逋| 日本爱情动作片www.在线观看 | 99在线视频只有这里精品首页| 最近手机中文字幕大全| 午夜老司机福利剧场| 欧美激情在线99| 嫩草影院精品99| 免费av毛片视频| 国内揄拍国产精品人妻在线| 3wmmmm亚洲av在线观看| 搡老岳熟女国产| 亚洲欧美日韩无卡精品| 亚洲美女视频黄频| 日韩欧美精品v在线| 日本五十路高清| 国产三级中文精品| 亚洲精品日韩在线中文字幕 | 日本欧美国产在线视频| 久久久久国内视频| 99久久精品国产国产毛片| 成人无遮挡网站| 日日摸夜夜添夜夜爱| 卡戴珊不雅视频在线播放| 久久天躁狠狠躁夜夜2o2o| 天天躁日日操中文字幕| 精品免费久久久久久久清纯| 日本爱情动作片www.在线观看 | 久久综合国产亚洲精品| 深爱激情五月婷婷| 黄色视频,在线免费观看| 日本免费a在线| 欧美xxxx黑人xx丫x性爽| 国模一区二区三区四区视频| 国产人妻一区二区三区在| 三级毛片av免费| 久久人人爽人人片av| 特大巨黑吊av在线直播| 两性午夜刺激爽爽歪歪视频在线观看| 免费看光身美女| 精品福利观看| 欧美日韩一区二区视频在线观看视频在线 | 国产精品一及| 五月伊人婷婷丁香| 美女免费视频网站| 少妇丰满av| 国产私拍福利视频在线观看| 九色成人免费人妻av| 成人特级av手机在线观看| 国产黄a三级三级三级人| 少妇的逼好多水| 国产黄a三级三级三级人| 激情 狠狠 欧美| 亚洲无线在线观看| 国产精品日韩av在线免费观看| 天堂√8在线中文| 国产精品三级大全| 乱人视频在线观看| 欧美日韩乱码在线| 97热精品久久久久久| 日韩欧美精品免费久久| 久久久国产成人免费| 国产69精品久久久久777片| 成年av动漫网址| 十八禁国产超污无遮挡网站| 国产激情偷乱视频一区二区| 网址你懂的国产日韩在线| 18禁黄网站禁片免费观看直播| 国产男人的电影天堂91| 99国产精品一区二区蜜桃av| 热99re8久久精品国产| 免费在线观看成人毛片| 久久午夜亚洲精品久久| 男人的好看免费观看在线视频| 麻豆国产av国片精品| 国产日本99.免费观看| 在线国产一区二区在线| 精品人妻偷拍中文字幕| av在线天堂中文字幕| 亚洲欧美清纯卡通| 久久久久性生活片| 淫妇啪啪啪对白视频| 蜜臀久久99精品久久宅男| 欧美日韩乱码在线| 国产亚洲精品久久久com| av黄色大香蕉| av专区在线播放| 91狼人影院| 亚洲第一区二区三区不卡| 午夜福利在线在线| 黄片wwwwww| 丰满人妻一区二区三区视频av| 色哟哟·www| 欧美性猛交黑人性爽| 91久久精品国产一区二区成人| 午夜精品国产一区二区电影 | 桃色一区二区三区在线观看| 亚洲色图av天堂| 亚洲中文字幕一区二区三区有码在线看| 婷婷精品国产亚洲av在线| 亚洲精品成人久久久久久| 亚洲美女视频黄频| 少妇裸体淫交视频免费看高清| 欧美另类亚洲清纯唯美| 在线观看免费视频日本深夜| 日韩精品青青久久久久久| 国产真实伦视频高清在线观看| 色综合亚洲欧美另类图片| 久久这里只有精品中国| 国产一区二区亚洲精品在线观看| 欧美zozozo另类| 久99久视频精品免费| 国产精品久久久久久久久免| 日韩在线高清观看一区二区三区| 九九在线视频观看精品| 午夜影院日韩av| 日韩欧美精品v在线| 国产一区二区在线av高清观看| 亚洲精品影视一区二区三区av| 国产高清三级在线| 国产三级中文精品| 国模一区二区三区四区视频| 国产伦在线观看视频一区| 国产一区二区在线观看日韩| 色播亚洲综合网| 亚洲欧美日韩高清在线视频| 日韩欧美 国产精品| 狠狠狠狠99中文字幕| 亚洲天堂国产精品一区在线| ponron亚洲| 深爱激情五月婷婷| 成人二区视频| 身体一侧抽搐| 狠狠狠狠99中文字幕| 国内精品久久久久精免费| 五月伊人婷婷丁香| 久99久视频精品免费| 成年版毛片免费区| 国产一区二区三区在线臀色熟女| 日韩欧美国产在线观看| 99国产极品粉嫩在线观看| 国产精华一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看| 久久久a久久爽久久v久久| 亚洲成人精品中文字幕电影| 性欧美人与动物交配| 日产精品乱码卡一卡2卡三| 少妇熟女欧美另类| 日韩精品青青久久久久久| 一级黄片播放器| 此物有八面人人有两片| 韩国av在线不卡| 国产男靠女视频免费网站| 成年免费大片在线观看| 午夜福利18| 一级av片app| 精华霜和精华液先用哪个| 99久国产av精品| 在线观看一区二区三区| 亚洲精品乱码久久久v下载方式| 少妇丰满av| 直男gayav资源| 亚洲综合色惰| 久久久a久久爽久久v久久| 五月玫瑰六月丁香| 人妻丰满熟妇av一区二区三区| 日韩三级伦理在线观看| 黄色欧美视频在线观看| 精品久久久久久久久av| 亚洲在线自拍视频| 五月玫瑰六月丁香| 中文字幕久久专区| 亚洲内射少妇av| 99热精品在线国产| 成年女人永久免费观看视频| 又爽又黄a免费视频| 亚洲精品成人久久久久久| 日本欧美国产在线视频| av福利片在线观看| 日本爱情动作片www.在线观看 | 国产精品1区2区在线观看.| 成年女人永久免费观看视频| 国产色婷婷99| 久久久成人免费电影| 精品日产1卡2卡| 国产午夜精品久久久久久一区二区三区 | 黄片wwwwww| 国产麻豆成人av免费视频| 97碰自拍视频| 99在线视频只有这里精品首页| ponron亚洲| 久久九九热精品免费| 国产一级毛片七仙女欲春2| 亚洲欧美日韩卡通动漫| 欧美日韩国产亚洲二区| 久久久久久大精品| av黄色大香蕉| 国产精品久久久久久精品电影| 在线播放国产精品三级| 亚洲精品成人久久久久久| 国产91av在线免费观看| 欧美日本亚洲视频在线播放| 少妇人妻精品综合一区二区 | 国产成人aa在线观看| 熟女电影av网| 别揉我奶头~嗯~啊~动态视频| 欧美区成人在线视频| 色播亚洲综合网| 人人妻人人澡人人爽人人夜夜 | 少妇熟女aⅴ在线视频| 色哟哟·www| 免费av观看视频| 国产精品三级大全| 国产亚洲精品综合一区在线观看| 日本精品一区二区三区蜜桃| 最近最新中文字幕大全电影3| 精品午夜福利在线看| 国产乱人偷精品视频| 日韩欧美三级三区| 日本在线视频免费播放| 男女下面进入的视频免费午夜| 99热这里只有精品一区| 少妇人妻一区二区三区视频| 啦啦啦啦在线视频资源| 无遮挡黄片免费观看| 麻豆精品久久久久久蜜桃| 男人舔奶头视频| 又爽又黄无遮挡网站| 午夜福利在线在线| 中文字幕免费在线视频6| 色噜噜av男人的天堂激情| 蜜桃亚洲精品一区二区三区| 国产精品久久久久久亚洲av鲁大| 成人av在线播放网站| 婷婷精品国产亚洲av在线| 少妇人妻精品综合一区二区 | 国产综合懂色| 成人国产麻豆网| 淫妇啪啪啪对白视频| 免费电影在线观看免费观看| 欧洲精品卡2卡3卡4卡5卡区| 五月伊人婷婷丁香| 久久精品国产99精品国产亚洲性色| 亚洲精品成人久久久久久| 老司机午夜福利在线观看视频| 国产午夜精品久久久久久一区二区三区 | 国产精品一区二区三区四区久久| 一级毛片aaaaaa免费看小| 国产精品一区二区三区四区久久| 一本精品99久久精品77| 少妇的逼好多水| 国产色婷婷99| 久久综合国产亚洲精品|