• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Effcient Impersonation Attack Detection Method in Fog Computing

    2021-12-14 09:57:24JialinWanMuhammadWaqasShanshanTuSyedMudassirHussainAhsanShahSadaqatUrRehmanandMuhammadHanif
    Computers Materials&Continua 2021年7期

    Jialin Wan,Muhammad Waqas,,Shanshan Tu,*,Syed Mudassir Hussain,Ahsan Shah,Sadaqat Ur Rehman and Muhammad Hanif

    1Engineering Research Center of Intelligent Perception and Autonomous Control,Faculty of Information Technology,Beijing University of Technology,Beijing,100124,China

    2Faculty of Computer Science and Engineering,Ghulam Ishaq Khan Institute of Engineering Sciences and Technology,Topi,23460,Pakistan

    3Department of Electronics Engineering,FICT,Balochistan University of Information Technology,Engineering and Management Sciences,Quetta,87300,Pakistan

    4Department of Computer Science,Namal Institute,Mianwali,42200,Pakistan

    Abstract:Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore, in this work, we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators, we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate (FAR), miss detection rate (MDR), and average error rate(AER).

    Keywords: Fog computing; double Sarsa; attack detection; physical layer key security

    1 Introduction

    Due to the growth of the Internet of Things (IoT) and mobile devices, many applications are sensitive to bandwidth and perceived latency [1,2].Besides, the processing of these applications requires higher computation and communication costs [3].In IoT, interconnected things generate a large amount of data.The data is usually processed in the cloud, prone to severe network congestion and load [4,5].This is highly problematic, especially for the overall performance of time-sensitive applications and services.In particular, the recently developed 5G wireless networks have a higher demand for bandwidth, computing resource, security, and delay [6–9].To address the problems mentioned above, fog computing was introduced to facilitate the computing, networking,and storage operations between end-users and cloud data centers.The added fog layer is located between the cloud and end-users.The primary function of fog computing is to process IoT data locally, thereby bringing the convenience of data storage, calculation, and transmission.It has the characteristics of low latency, location awareness, and large-scale IoT applications support [4].However, due to its additional and unique features, it is faced with communication and data security issues.

    In FC, most of the devices are connected wirelessly [10].As a result, due to the wireless transmission medium’s broadcast characteristics, there is a security risk in communication between fog nodes and end-users [11].For example, the attackers may pretend to be legitimate fog nodes or end-users, thereby sending signals to other nodes so that the receivers may receive wrong signals.To prevent the attack from disguised attackers and ensure the wireless network’s security in FC,both parties need to use a common key for encrypted transmission.Therefore, we propose the fusion of physical layer security (PLS) technologies based on the key generation and reinforcement learning algorithm to detect impersonation attacks.

    On the one hand, PLS protects the information by exploiting the communications medium’s intrinsic characteristics or principles and is a promising wireless security technique [12].Thus,we employ physical layer key generation technology based on PLS.Unlike traditional cryptography methods with computational complexity, it can provide real-time, non-distribution key generation means for both communicating parties with channel coding, pre-coding, signal processing, etc.On the other hand, reinforcement learning is the training of machine learning algorithms to help make a sequence of decisions.In this scheme, a user learns to achieve a goal in an uncertain and potentially complex environment via trial and error [13].The learning is based on a game-like situation where the users obtain rewards through continuous interaction with the environment and attain the optimal strategies [14].Thus, we propose a detection method with a Double Sarsa algorithm to defend against impersonation attacks.The proposed detection method based on Double Sarsa [14] utilizes the channel state information (CSI).It can obtain the optimal test threshold value to detect impersonation attacks in the dynamic environment.The main contributions of this work are summarized below.

    ? We investigate to tackle the impersonation attacks between fog nodes and legitimate endusers in fog computing (FC).For this purpose, we apply a reinforcement learning algorithm to detect the impersonation attacks.

    ? We formulate a zero-sum game between the illegitimate node (fog node or end user)and receiver.We obtain the optimal threshold value to detect impersonation attacks by establishing a hypothesis test based on channel state information (CSI) at the receiving end.

    ? We validate the performance of the proposed method by comparing with Sarsa and Q-learning in false alarm rate (FAR), miss detection rate (MDR), and average error rate(AER) based on a test threshold value.We find out that the FAR, MDR, and AER are decreased significantly as the experiments progress based on the appropriate threshold value with the proposed method.This shows that our proposed technique has a better detection capability.

    The rest of the paper is organized as follows.In Section 2, we discuss the related work.Sections 3 and 4 describe our proposed system and proposed method, respectively.Section 5 presents the performance evaluation of our proposed method.Finally, the paper is concluded in Section 6.

    2 Related Works

    Key generation technology exploits the randomness and reciprocity of wireless channels.In recent years, this approach is widely studied by many researchers.Zhang et al.[15] presented a survey of the key generation technologies related to the wireless channels.An information theory secret key generation (SKG) method is proposed in [16] for time-division duplexing (TDD)based orthogonal frequency-division multiplexing (OFDM) systems over multipath fading channels.In [17], the authors proposed a novel key generation scheme for wireless sensor networks,achieving a high key reconciliation rate.The authors in [18] developed an algorithm to protect the keys secret from eavesdropper and non-trusted selected relays, which improves the secret key generation rate (SKGR).FC cannot be considered fully secure, and it is faced with security vulnerabilities.To deal with this problem, different approaches have been proposed in the literature.Huang et al.[19] proposed an access tree structure and attribute-based signature technology in FC to implement ciphertext updating and computing outsourcing.To ensure the end-to-end security of IoT devices at the fog layer, Abbas et al.[20] proposed a novel fog security service based on two cryptographic schemes, i.e., identity-based encryption and identity-based signature.Tian et al.[21]proposed a three-layer storage framework to prevent an attack from the inside of the cloud server and protect data privacy.However, the traditional security methods are not suitable in a dynamic environment.These conventional methods have no self-learning ability and cannot make timely adjustments according to the changing environment, which causes difficulty in optimization.

    Besides, reinforcement learning algorithms have been used by researchers to improve wireless network security.For instance, Xiao et al.[22] proposed a spoofing detection scheme based on Q-learning to detect spoofing attacks in wireless networks, and the efficiency of the proposed strategy is improved.In [23], the authors applied a Q-learning algorithm with reinforcement learning to detect the impersonation attacks, enhancing detection accuracy.However, these methods mentioned above only used one Q-table, which may make large changes in the threshold and slow convergence.Our proposed can solve the problem with two Q-tables, and the optimum test threshold value is obtained for each other’s estimation errors.It has better performance in detecting impersonation attacks in FC security.

    3 Proposed System

    This section illustrates the impersonation attack model and the security model based on the key generation.First, we discuss the system architecture to consider legitimate and illegitimate users.Then, a key generation model is presented to discuss the process of secret keys.

    3.1 System Architecture

    As depicted in Fig.1, we consider a three-layer system architecture model of the FC network, including the cloud layer, fog layer, and end-user layer.The fog layer is composed of fog nodes, which can be computers, smartphones, etc.The end-user layer includes end-user devices and IoT devices.In this regard, let consider there areE= {1,2,...,e},?e∈Etransmitters.F={1,2,...,f},?∈Fare receivers in the network.For legitimate and non-legitimate users, we consider a set ofH={1,2,...,h},?h∈HandI={1,2,...,i},?∈I, respectively.

    Figure 1:Impersonation attack network model

    The fog nodes are used to provide computing, storage, and communication.They provide temporary storage and real-time analysis for terminal devices’data and send their data summary to the cloud.Illegal users pretend to be legitimate users to enjoy the fog node’s services or pretend to be legal fog nodes to offer false services to end-users.These non-legitimate users (fog nodes or end-user nodes) claim to be legitimate and launch attacks on other network nodes.Consequently,it causes the wireless communication link between fog nodes and end-users’insecure.

    3.2 Key Generation Model

    As mentioned in the previous section, the purpose is to generate a random and secure key for secure communication between fog nodes and end-users [24].Therefore, we exploit the physical layer channel parameter, i.e., CSI, to generate the secret keys.The proposed key generation model is depicted in Fig.2.In this model, we assume that the fog nodes and the end-users communicate in a time division duplex (TDD) mode.First, both parties send training signals to each other in a time slot.Based on the received signals, they will estimate the channel and measure the channel parameter.As the attacker may launch an attack at any time, the signal transmitted by the channel may be non-legitimate.The detection step is introduced to identify the legitimacy of the received signals.If the signal is non-legitimate, the two sides continue to transmit training signals to extract CSI.

    Figure 2:Security model based on key generation

    Alternatively, the quantization step is performed to get the initial key bit sequence.The information reconciliation is then employed to correct mismatch bits and privacy amplification consistency checking to ensure the agreed key sequence security.After these steps, both parties’common and secure secret key sequence is generated for secure communications.In this way, the communication between the fog node and the end-user node is coarse-grained detected, which reduces the communication and calculation overhead.

    4 Proposed Method

    According to the models presented in the previous section, we establish the hypothesis test at the receiver.We then exploit the zero-sum game and the Double Sarsa algorithm [14] to present the proposed method.

    4.1 Hypothesis Test

    For the hypothesis test, the fog node and the end-user send training signals to each other in the channel sampling stage.The receiving end estimates its related CSI and extracts the signal’s channel vector after receiving each signal.The channel vector of the signal accepted by the receiving end is called the channel record.The channel vector and the channel record are used to determine the sender’s legitimacy.The hypothesis test is built at the receiving end to detect the attack.The channel gain of each received training signal is sampled and estimated at the receiving end.Letdenote the channel vector that theβisignal transmitted by theαisending end.The received channel vector is called the channel record and is represented byThe channel gain of the channel vector is denoted by.Suppose null hypothesisH0indicates that the legitimate node sends the training signal.Alternative hypothesisH1indicates that the training signal is sent by an illegitimate node, given by the following equations.

    Where

    ? M,N represent the fog node and end-user, respectively;

    ?ΥM,Nis the estimated channel gain of the legitimate end user.

    Due to wireless channels’spatial decorrelation, the CSIs of each legitimate node, attacker,and malicious nodes are different [25] but can be determined uniquely.As a result, ifthe training signal is sent by legitimate sender; otherwise, the training signal is non-legitimate.To judge whether the signal’s sender is legal, we set the test statistics of the hypothesis test.

    The symbol ‖·‖ denotes the Euclidean norm, and Lis the normalized Euclidean distance betweenandWe compare Lwith the test thresholdλ.If it is less thanλ, we consider it is sent by a legitimate user and the receiver acceptsH0.Otherwise, if it is greater thanλ, we consider it is sent by an attacker and the receiver acceptsH1.The hypothesis test is given by

    The value of the test threshold has a certain relationship with the detection accuracy.The false alarm rate (FAR) is high for a small threshold value, while a large threshold value results in a high miss detection rate (MDR).The FAR represents the probability that a legal signal sent by a legitimate node is detected as an illegitimate signal.The MDR represents the probability that an illegitimate signal is detected as a legal signal.Based on the hypothesis test, the FAR and MDR are calculated as below [23].

    The AER is the probability of error in detecting impersonation attacks, which is given by

    Where

    ?ωis the signal to interference plus noise ratio of the legal training signals (SINR);

    ?nis the relative change rate of channel gain;

    ?ξ2is the average power gain of the signal received by the receiver from the transmitter;

    ? m is the ratio of the channel gain of the impersonator to that of the transmitter, and the symbolstands for cumulative distribution function with a degree of freedom 2M.

    4.2 Methodology of Impersonation Detection

    Based on the impersonation attack model presented in Section 3.1, the interactions between an illegitimate node and a receiver can be considered a zero-sum game [26].The probability that an illegitimate node sends an illegal signal ispk.The set of illegitimate signals sent by illegitimate nodes isΦ=[pk].It is assumed that only one illegitimate node performs an impersonation attack in a time slot, so the receiver’s probability of illegitimate signal isWe also considered the Bayes risk of impersonation detection is given as [27].

    Where

    ?l1is the gain of receiving legal signals,l2is the gain of refusing illegal signals;

    ?r1is the cost of receiving illegal signals,r2is the cost of refusing legal signals;

    ?P1(λ)represents FAR, andP2(λ)represents MDR.

    Therefore, according to the zero-sum game, the utility at the receiving end is as follows.

    In (10), the illegitimate nodes and the receivers play games in the static environment.However,the practical fog computing environment is dynamic.Specifically, the mobility of fog nodes and terminals can cause changes in the wireless channel, and the change rate has a particular impact on the key generation rate (KGR).In the dynamic scenario, it is difficult for the receiver to recognize the training signal’s legitimacy.Double Sarsa algorithm in reinforcement learning can be used to find out the optimal strategy with insufficient information in a dynamic environment [14,28].

    In reinforcement learning, there are several important constants.First, the discount rate is used to control the proportion of current and future rewards.For the large value, the agent pays much attention to future rewards.However, for a small value, the agent focuses on the current rewards.Next is learning efficiency.For high efficiency, a large proportion of results are obtained with new attempts and vice versa.In Double Sarsa algorithm [14], two Q-tables are used to compensate for each other’s estimation errors.A small change in the Q-value can determine a steady policy and increase the reward.The receiver evaluate the T training signals sent by transmitter in each time slot via the hypothesis test.Meanwhile, the receiver employs theε-greedy strategy to choose the test threshold until it reaches the optimum, which is determined whether the sender of the signal is a legitimate node or illegitimate node.In each state, the receiving end randomly chooses theλwith a probabilityεand chooses the largestλvalue in Q-table with a probability 1 ?ε, that is, theλsatisfying Π(St).According to (10), we can use it as the reward function in the Double Sarsa algorithm, so the current utility of the receiver in each state is

    In the Double Sarsa algorithm, aiming at reducing the impact of estimation errors and converging to the optimal Q value, the update rule of two Q-tables is given by

    Where

    ? μ is the learning efficiency, μ ∈[0,1];? γ is the discount rate, γ ∈[0,1];

    ? Stis the state of the receivers at time t, i.e., the FAR and MDR value at time t ?1;

    ?andare the test thresholds for maximizing Q value ofQAandQBin state St+1,respectively.Their calculation formulas are as following.

    Π(St)denotes the maximum mean value ofQA+QBin current state.The optimal test thresholdλ?is given by

    Aiming to get an optimal action and maximize the utility, the proposed method to resist impersonation attack is described in Algorithm 1.We initialize some parameters, then judge the legitimacy of training signals according to the test threshold.Finally, we find the optimum test threshold value based on the Double Sarsa algorithm to detect impersonation attacks.

    Algorithm 1:Detection method based on Double Sarsa algorithm Step 1:Initialization μ, γ, ε, QA(St,λ)=QB(St,λ)=0, Π(St)=0;Step 2:Processing:For t=1,2,3,...,N do Select λ in current state St according to ε-greedy strategy;for T=1,2,...,20 do Extract CSI of the training signals,ΥM,N, ΥM|N,I, Vβi αi and Rβi αi;Calculate L■Vβi αi,Rβi αi■via (3);If LVβi■αi,Rβiαi■<λ, accept the training signals;Else Reject the training signals;end for Step 3:Updating:Enter next state St+1;Update QA(St,λ) via (12) and (14) with probability 0.5;Otherwise, Update QB(St,λ) via (13) and (15);Update Π(St) via (16);End For

    5 Performance Evaluation

    In this section, to assess the proposed method’s performance, we set four indicators, such as the utility at the receiver, FAR, MDR, and AER.And three different methods are compared for preventing impersonation attacks in 500 experiment trails.

    5.1 Performance Metrics and Initial Parameters

    In this study, we set the experimental environment as a space of 50×50 m2, in which several fog nodes, attackers, and legitimate end-users are scattered.All channel gains follow the normal distribution (0, 1), as used in [23].We use a computer with MATLAB software for simulation under the Windows operating system.Assuming the receiver receives T=20 training signals in the same time slot, the center frequency is 2.4 GHz.The names, symbols, and initial values of the correlative parameters are shown in Tab.1.

    Table 1:List of symbols and names for parameters

    5.2 Simulation Results

    To improve the detection accuracy at the receiving end, we analyze the performance of the proposed method under the four indicators by changing the value of ω.Figs.3a–3c show that the change of detection error rate with the number of experimental rounds under differentω,and the Q table is updated 10 times in each round.As shown in Fig.3a, under the condition that the ratio of the channel gain of the impersonator to that of the legitimate transmitter m is constant, the FAR decreases withω.This is because SINR has a direct relationship with the channel estimation error.The low SINR indicates that the channel estimation error is low.Furthermore, the channel estimation error has a particular influence on the degree of training signal quantization, affecting FAR and MDR.Furthermore, for differentω, the FAR decreases first, and then stabilize a certain value.This is because Double Sarsa algorithm optimizes the threshold in the process of searching for the optimal threshold.The threshold changes greatly at the beginning, the FAR changes rapidly accordingly.As the threshold reaches the optimum,the FAR changes smaller.If ω=10, it fluctuates within a small range of 0.20.After 50 rounds of experiments, the false alarm rate is 0.2021, which is 9.21% lower than ω=20.Similarly, in Fig.3b, the MDR changes quickly at the start, and then keeps stable in a range.Its value is 0.2755 with ω=10, which is 2.49% higher than ω=20.Fig.3c shows that the AER decreases withω.For example, after 50 rounds of trails, if n=3dB, the average error rate for ω=10dB decreases to 0.4776 from 0.4914 for ω=20dB.

    In addition, as the detection error rate decreases correspondingly, the average utility of the receiver decreases withω, as shown in Fig.3d.For example, after 500 experiment times, the average utility of the receiver is 2.4112 with ω=10, which is 9.9% higher than ω=20.FAR,MDR, AER and the average utility of the receiver with different ω is shown in Tab.2.Therefore,the performance is better with ω=10, based on the above four indicators.To further illustrate the performance gain of the proposed method, we compare the proposed method with Sarsa algorithm and Q-learning algorithm [29].

    Figure 3:Average impersonation detection performance in the experiments.(a) False alarm rate(FAR).(b) Miss detection rate (MDR).(c) Average error rate (AER).(d) Utility of the receiver

    Table 2:FAR, MDR, AER and the average utility with ω

    Fig.4 depicts the comparison of FAR of three algorithms for 500 iterations.It can be seen that the FAR of these three algorithms reduces at the start.The proposed method gradually stabilizes after 100 iterations.As the iterations continue, the three methods are roughly kept within a constant range.The proposed method is stable at 20.0%–20.2%.Because the receiving end knows nothing about the channel and gradually gets understanding as the experiment goes on.The optimalλwill be chosen according to previous experience when detecting attacks.The FAR does not change when reaching a certain number of experiments.But because of the wireless channel’s fading characteristics, it can cause a slight change in the value and eventually steady.In most experiments, FAR is lower and stable with the proposed method than Sarsa-based and Q-learning-based.This is because it uses two Q tables to update each other, which helps slow down the threshold’s change rate and converge faster.It is easier to get the optimal threshold for detecting impersonation attacks.

    Figure 4:Comparison of double Sarsa, Sarsa, Q-learning for false alarm rate (FAR)

    Fig.5 describes the MDR of the three algorithms.Because the receiving end has no idea of the system details.The initial Q-table value is all zero, and the threshold at the beginning of the experiment is small.During continuous training, the threshold gradually increases.According to Eq.(7), the MDR value of three methods increases first.As the threshold reaches the optimum gradually, the change range of MDR value is getting smaller.Besides, the channel fading also affects the value, so it fluctuates slightly.The MDR of the proposed method is steady at about 27.6%, with the experiment is iterated 500 times.Compared with the Sarsa-based method, the MDR of the Double Sarsa-based method is decreased by 5.5% and by an average of 5.8%compared with the Q-learning-based method.Furthermore, Double Sarsa uses two Q-value tables to compensate for errors each other and prevent large changes in the threshold value, so it is more stable than the other two methods.The proposed method increases the probability of illegitimate signals being ignored so that the communication quality between fog nodes and end-users is improved.

    Figure 5:Comparison of double Sarsa, Sarsa, Q-learning for miss detection rate (MDR)

    As shown in Fig.6, we compare the average error rate of detection attacks under three algorithms.All three methods have a downward trend in the early period of the experiment and then stabilizes.This is because the receiver has a better understanding of the channel after receiving a large number of training signals and can use accumulated experience to choose the optimal threshold for detection.At the same time, the AER value eventually stabilizes at a constant within range for the channel’s characteristics.AER based on the Double Sarsa algorithm is lower than the other two algorithms.When the experiment is carried out 500 times, the AER of the proposed method is stable at about 47.72%, which is less than the Q-learning-based method by 3.0% and by 3.1% Sarsa-based method.In addition, our proposed method converges more slowly because two Q tables are used to update alternately.Therefore, considering the overall performance, the proposed method has lower FAR, MDR and AER, and it can detect attack behavior more accurately in balanced exploration and utilization, which can improve the security of FC.

    Figure 6:Comparison of double Sarsa, Sarsa, Q-learning for average error rate (AER)

    6 Conclusion

    In this paper, we proposed an impersonation attack detection method based on the Double Sarsa algorithm in FC.First, the impersonation attack model and the key generation model based on PLS are built.Then, the hypothesis test is established at the receiver.Next, the zero-sum game between illegitimate nodes and receivers is designed to calculate utility.Double Sarsa algorithm with reinforcement learning is used to choose the optimal test threshold to detect malicious users’impersonation attacks.The experimental results illustrate that the proposed method can reduce the FAR, MDR, and AER.Comparing with the Sarsa algorithm and Q-learning algorithm,the performance gain of the proposed method is proved.The proposed method in this study can protect the FC environment more effectively.In the future, reinforcement learning and deep learning will be combined to study and solve the fog computing environment’s security problem.

    Funding Statement:This work was supported by Natural Science Foundation of China (61801008),The China National Key R&D Program (No.2018YFB0803600), Scientific Research Common Program of Beijing Municipal Commission of Education (No.KM201910005025) and Chinese Postdoctoral Science Foundation (No.2020M670074).

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美精品啪啪一区二区三区| 欧美日韩国产亚洲二区| 色视频www国产| 精品欧美国产一区二区三| 51国产日韩欧美| 1024手机看黄色片| 高潮久久久久久久久久久不卡| 99精品久久久久人妻精品| 国产精品爽爽va在线观看网站| 国产精品一及| av欧美777| 最好的美女福利视频网| 免费在线观看影片大全网站| 国产精品99久久99久久久不卡| 久久精品亚洲精品国产色婷小说| 午夜免费男女啪啪视频观看 | a级一级毛片免费在线观看| 中文在线观看免费www的网站| 91在线观看av| 日本黄大片高清| 国产男靠女视频免费网站| 国产高清视频在线播放一区| 十八禁网站免费在线| 国产伦人伦偷精品视频| 特大巨黑吊av在线直播| 免费av观看视频| 一个人看视频在线观看www免费 | 成年人黄色毛片网站| 欧美成人免费av一区二区三区| 淫妇啪啪啪对白视频| 亚洲无线观看免费| 亚洲成人久久性| 国产精品一及| 嫩草影院入口| 国产 一区 欧美 日韩| 无限看片的www在线观看| 亚洲国产高清在线一区二区三| 久久久久亚洲av毛片大全| 国产黄a三级三级三级人| 久久久久久久精品吃奶| 亚洲av不卡在线观看| 国产探花在线观看一区二区| 久久精品人妻少妇| 精品国产美女av久久久久小说| 91久久精品国产一区二区成人 | 欧美成人性av电影在线观看| 欧美极品一区二区三区四区| 国产亚洲精品一区二区www| 嫩草影视91久久| 国产91精品成人一区二区三区| 天天添夜夜摸| 99热6这里只有精品| 国产 一区 欧美 日韩| 老司机深夜福利视频在线观看| 免费看a级黄色片| 国产成年人精品一区二区| а√天堂www在线а√下载| 亚洲欧美日韩高清专用| av片东京热男人的天堂| 91九色精品人成在线观看| 欧美区成人在线视频| 99久久精品热视频| 欧美激情在线99| 午夜精品久久久久久毛片777| 精品久久久久久久久久免费视频| 又黄又爽又免费观看的视频| 人妻夜夜爽99麻豆av| avwww免费| 嫩草影院精品99| 日韩亚洲欧美综合| 国产在线精品亚洲第一网站| 亚洲国产高清在线一区二区三| 丰满人妻一区二区三区视频av | 欧美中文综合在线视频| 一本综合久久免费| 日韩精品青青久久久久久| 久久亚洲精品不卡| 男插女下体视频免费在线播放| 免费看日本二区| 成人欧美大片| 99国产极品粉嫩在线观看| 美女高潮喷水抽搐中文字幕| 一边摸一边抽搐一进一小说| 特大巨黑吊av在线直播| 成人特级黄色片久久久久久久| 国产成人系列免费观看| 99久久无色码亚洲精品果冻| 少妇的丰满在线观看| 久久国产精品人妻蜜桃| 久久久久久人人人人人| 国产精品,欧美在线| 亚洲国产精品成人综合色| 午夜福利成人在线免费观看| 国产精品久久久久久久电影 | 九色国产91popny在线| 熟女电影av网| 少妇的逼好多水| 熟女人妻精品中文字幕| 99久久精品一区二区三区| 亚洲专区中文字幕在线| 日日干狠狠操夜夜爽| 欧美极品一区二区三区四区| 动漫黄色视频在线观看| 亚洲熟妇熟女久久| 日本黄色片子视频| 手机成人av网站| 日本 av在线| 99riav亚洲国产免费| 真实男女啪啪啪动态图| 一进一出抽搐gif免费好疼| 欧美一区二区国产精品久久精品| 很黄的视频免费| 啦啦啦韩国在线观看视频| 中文字幕av成人在线电影| 舔av片在线| 露出奶头的视频| 三级毛片av免费| 国产欧美日韩精品一区二区| 给我免费播放毛片高清在线观看| 日本一本二区三区精品| 精品人妻偷拍中文字幕| 18禁美女被吸乳视频| 免费搜索国产男女视频| 欧美国产日韩亚洲一区| 日韩中文字幕欧美一区二区| 日韩欧美三级三区| 女警被强在线播放| 国内精品久久久久精免费| 三级男女做爰猛烈吃奶摸视频| 久久精品国产自在天天线| 18禁美女被吸乳视频| 99久国产av精品| 老司机深夜福利视频在线观看| 18禁黄网站禁片免费观看直播| 亚洲av一区综合| 日本黄色片子视频| 欧美日韩瑟瑟在线播放| 男人舔女人下体高潮全视频| 禁无遮挡网站| 免费人成在线观看视频色| 亚洲 欧美 日韩 在线 免费| 国产精品免费一区二区三区在线| 精品欧美国产一区二区三| 99热精品在线国产| av中文乱码字幕在线| 天天添夜夜摸| 亚洲人成网站在线播| 欧美绝顶高潮抽搐喷水| 亚洲成人中文字幕在线播放| 天天躁日日操中文字幕| 午夜福利成人在线免费观看| 日本成人三级电影网站| 国产精品免费一区二区三区在线| 国产69精品久久久久777片| 韩国av一区二区三区四区| 又粗又爽又猛毛片免费看| 久久精品综合一区二区三区| 国产精华一区二区三区| 狂野欧美白嫩少妇大欣赏| 级片在线观看| 免费av观看视频| 女人高潮潮喷娇喘18禁视频| 欧美一区二区亚洲| 久久久久久久亚洲中文字幕 | 1000部很黄的大片| 琪琪午夜伦伦电影理论片6080| 午夜福利在线观看吧| 内地一区二区视频在线| 国产极品精品免费视频能看的| 国产精品一及| 成人鲁丝片一二三区免费| 手机成人av网站| 久久这里只有精品中国| 国产精品久久视频播放| 国产高清videossex| 女同久久另类99精品国产91| 国产一区二区在线av高清观看| av女优亚洲男人天堂| 免费观看精品视频网站| 日韩欧美国产一区二区入口| 51午夜福利影视在线观看| 久久精品国产99精品国产亚洲性色| 又黄又粗又硬又大视频| 啦啦啦免费观看视频1| 午夜福利在线观看吧| 国产 一区 欧美 日韩| 99久久久亚洲精品蜜臀av| 有码 亚洲区| aaaaa片日本免费| 在线观看舔阴道视频| 男女午夜视频在线观看| 啪啪无遮挡十八禁网站| 淫妇啪啪啪对白视频| 好男人电影高清在线观看| 欧美性感艳星| 狂野欧美白嫩少妇大欣赏| 免费人成在线观看视频色| 男人舔奶头视频| 日日干狠狠操夜夜爽| 日韩欧美国产在线观看| 一进一出抽搐gif免费好疼| 90打野战视频偷拍视频| 亚洲男人的天堂狠狠| 小说图片视频综合网站| 五月玫瑰六月丁香| 最近最新中文字幕大全免费视频| av黄色大香蕉| 国产高潮美女av| 精品久久久久久久毛片微露脸| 国产成人欧美在线观看| 精品一区二区三区人妻视频| 超碰av人人做人人爽久久 | 精品国产亚洲在线| 日韩av在线大香蕉| 成人一区二区视频在线观看| 一区二区三区高清视频在线| 欧美性猛交╳xxx乱大交人| 亚洲一区高清亚洲精品| 九九在线视频观看精品| 免费高清视频大片| 一级黄片播放器| 欧美+日韩+精品| 日韩 欧美 亚洲 中文字幕| 99国产精品一区二区蜜桃av| 欧美国产日韩亚洲一区| 欧美+亚洲+日韩+国产| 一个人免费在线观看电影| 色av中文字幕| 1000部很黄的大片| 两个人视频免费观看高清| av黄色大香蕉| 12—13女人毛片做爰片一| 亚洲无线在线观看| 久久精品国产99精品国产亚洲性色| h日本视频在线播放| 深夜精品福利| 美女高潮的动态| 色老头精品视频在线观看| 国产伦精品一区二区三区视频9 | 国产伦一二天堂av在线观看| 91av网一区二区| 免费看十八禁软件| 精品久久久久久久人妻蜜臀av| 91av网一区二区| 高清毛片免费观看视频网站| 国产亚洲精品一区二区www| 国产一区二区在线观看日韩 | 免费人成在线观看视频色| 伊人久久精品亚洲午夜| 亚洲国产精品合色在线| 亚洲av免费高清在线观看| 成年免费大片在线观看| 国产激情欧美一区二区| 国产亚洲精品一区二区www| 欧美日本视频| 欧美最新免费一区二区三区 | 少妇的逼好多水| 美女cb高潮喷水在线观看| 国产97色在线日韩免费| 国产精品亚洲av一区麻豆| 日日夜夜操网爽| 欧美日本亚洲视频在线播放| 久久天躁狠狠躁夜夜2o2o| 美女被艹到高潮喷水动态| 亚洲乱码一区二区免费版| 欧美黑人巨大hd| 天堂网av新在线| 久久精品人妻少妇| 中国美女看黄片| 一级毛片女人18水好多| 国产成人系列免费观看| tocl精华| 高清在线国产一区| 国产高潮美女av| 69人妻影院| 国产成人a区在线观看| 婷婷精品国产亚洲av在线| 中亚洲国语对白在线视频| 午夜精品一区二区三区免费看| 午夜影院日韩av| 久久天躁狠狠躁夜夜2o2o| 国产伦精品一区二区三区四那| 精品久久久久久,| 男人的好看免费观看在线视频| 久久久久免费精品人妻一区二区| 亚洲熟妇熟女久久| 精品99又大又爽又粗少妇毛片 | 欧美成人免费av一区二区三区| 欧美三级亚洲精品| av视频在线观看入口| 久久久精品大字幕| 精品久久久久久,| 美女cb高潮喷水在线观看| 韩国av一区二区三区四区| 国产91精品成人一区二区三区| 狂野欧美白嫩少妇大欣赏| 99久久成人亚洲精品观看| 两个人的视频大全免费| 久久天躁狠狠躁夜夜2o2o| 在线播放无遮挡| 美女黄网站色视频| 女人被狂操c到高潮| 一区二区三区激情视频| 香蕉丝袜av| 九色国产91popny在线| 男女午夜视频在线观看| 99在线视频只有这里精品首页| 亚洲va日本ⅴa欧美va伊人久久| 在线免费观看的www视频| 国内精品久久久久久久电影| 黄色日韩在线| 90打野战视频偷拍视频| 久久久精品大字幕| 国产精品av视频在线免费观看| 久久午夜亚洲精品久久| 精品福利观看| 听说在线观看完整版免费高清| 制服人妻中文乱码| 日韩 欧美 亚洲 中文字幕| 国产成人aa在线观看| 一个人看的www免费观看视频| 露出奶头的视频| 51国产日韩欧美| 欧美日韩综合久久久久久 | 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国产精品一区二区三区四区免费观看 | 国产精品一区二区三区四区免费观看 | 十八禁人妻一区二区| 中文字幕久久专区| 在线a可以看的网站| 国产一区二区三区在线臀色熟女| www.熟女人妻精品国产| 亚洲精品日韩av片在线观看 | 搡老熟女国产l中国老女人| 丰满的人妻完整版| 国产69精品久久久久777片| 我的老师免费观看完整版| 听说在线观看完整版免费高清| 亚洲av中文字字幕乱码综合| 岛国视频午夜一区免费看| 日韩欧美国产在线观看| 亚洲片人在线观看| 亚洲国产精品久久男人天堂| 久久精品国产自在天天线| 亚洲第一欧美日韩一区二区三区| 日韩欧美国产一区二区入口| 99精品久久久久人妻精品| 日本黄色视频三级网站网址| 母亲3免费完整高清在线观看| 亚洲中文日韩欧美视频| 国产免费av片在线观看野外av| 日本黄色片子视频| 人人妻人人澡欧美一区二区| 极品教师在线免费播放| 搡老熟女国产l中国老女人| 久久久精品欧美日韩精品| 乱人视频在线观看| 国产精品电影一区二区三区| 九九久久精品国产亚洲av麻豆| av片东京热男人的天堂| 在线观看av片永久免费下载| 亚洲五月婷婷丁香| 亚洲色图av天堂| 丰满乱子伦码专区| 免费观看精品视频网站| 丰满的人妻完整版| 亚洲精品456在线播放app | 精品人妻一区二区三区麻豆 | 全区人妻精品视频| 亚洲精品影视一区二区三区av| 国产伦在线观看视频一区| 亚洲内射少妇av| 精品人妻一区二区三区麻豆 | 床上黄色一级片| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国产精品综合久久久久久久免费| 性色avwww在线观看| 少妇熟女aⅴ在线视频| 久久精品综合一区二区三区| 国产成人av激情在线播放| 久久精品国产自在天天线| 成年免费大片在线观看| 老熟妇仑乱视频hdxx| 国产精品久久视频播放| 亚洲av五月六月丁香网| 91久久精品国产一区二区成人 | 国产精品影院久久| 国产淫片久久久久久久久 | 搞女人的毛片| 听说在线观看完整版免费高清| 日日摸夜夜添夜夜添小说| 国产伦精品一区二区三区视频9 | 一个人看的www免费观看视频| 在线观看美女被高潮喷水网站 | 蜜桃亚洲精品一区二区三区| 午夜福利18| 一进一出抽搐动态| 好男人电影高清在线观看| 久久久国产成人免费| 午夜两性在线视频| 中亚洲国语对白在线视频| 国产精品乱码一区二三区的特点| 国产黄色小视频在线观看| 亚洲午夜理论影院| 有码 亚洲区| 久久久久精品国产欧美久久久| 国内揄拍国产精品人妻在线| 久久精品国产99精品国产亚洲性色| 成人国产一区最新在线观看| 亚洲av免费高清在线观看| 又紧又爽又黄一区二区| 欧美在线一区亚洲| 岛国在线观看网站| 亚洲av第一区精品v没综合| 91在线观看av| 女生性感内裤真人,穿戴方法视频| 日本一本二区三区精品| 丰满的人妻完整版| 久久久久精品国产欧美久久久| 日本 av在线| 欧美一级毛片孕妇| 男人舔女人下体高潮全视频| 欧美乱妇无乱码| 欧美三级亚洲精品| 三级毛片av免费| 亚洲自拍偷在线| 99久国产av精品| 久久精品国产亚洲av香蕉五月| 亚洲天堂国产精品一区在线| 亚洲精品美女久久久久99蜜臀| 真人做人爱边吃奶动态| 99在线视频只有这里精品首页| 天天一区二区日本电影三级| 男女之事视频高清在线观看| 亚洲一区二区三区不卡视频| 听说在线观看完整版免费高清| 中文字幕高清在线视频| 免费高清视频大片| 精品国内亚洲2022精品成人| 国产成年人精品一区二区| 久久伊人香网站| 午夜a级毛片| 成年女人毛片免费观看观看9| 国产午夜精品久久久久久一区二区三区 | 日本五十路高清| 国产麻豆成人av免费视频| 久久久久久九九精品二区国产| 最近在线观看免费完整版| 12—13女人毛片做爰片一| 别揉我奶头~嗯~啊~动态视频| 国产99白浆流出| 欧美zozozo另类| 国产国拍精品亚洲av在线观看 | 精品久久久久久久人妻蜜臀av| 神马国产精品三级电影在线观看| 毛片女人毛片| 大型黄色视频在线免费观看| 狂野欧美白嫩少妇大欣赏| 日韩欧美国产一区二区入口| 免费在线观看成人毛片| 久久精品国产自在天天线| 亚洲avbb在线观看| 搡老岳熟女国产| 精品日产1卡2卡| 丁香欧美五月| 内地一区二区视频在线| 国产精品久久久久久精品电影| 熟女少妇亚洲综合色aaa.| av欧美777| 国产高清videossex| 少妇人妻一区二区三区视频| 午夜福利成人在线免费观看| 日韩欧美三级三区| 亚洲在线观看片| www.999成人在线观看| 成人一区二区视频在线观看| 国产精品爽爽va在线观看网站| 中文资源天堂在线| 日日干狠狠操夜夜爽| 少妇高潮的动态图| 在线观看午夜福利视频| 国内精品美女久久久久久| 欧美日韩福利视频一区二区| 成人国产一区最新在线观看| 亚洲一区高清亚洲精品| 波多野结衣高清无吗| 国产日本99.免费观看| 最好的美女福利视频网| 女人被狂操c到高潮| 日韩成人在线观看一区二区三区| 亚洲avbb在线观看| 他把我摸到了高潮在线观看| 国产aⅴ精品一区二区三区波| 午夜免费成人在线视频| 一卡2卡三卡四卡精品乱码亚洲| 一级a爱片免费观看的视频| 欧美极品一区二区三区四区| 99久久精品热视频| 中文字幕人妻熟人妻熟丝袜美 | 欧美性猛交╳xxx乱大交人| 成人永久免费在线观看视频| 搡老妇女老女人老熟妇| 亚洲va日本ⅴa欧美va伊人久久| 女人十人毛片免费观看3o分钟| 老司机在亚洲福利影院| 男女视频在线观看网站免费| 一本精品99久久精品77| 亚洲av成人不卡在线观看播放网| 久久久久国内视频| 好看av亚洲va欧美ⅴa在| 亚洲国产欧洲综合997久久,| 国产精品亚洲av一区麻豆| 动漫黄色视频在线观看| 亚洲国产欧洲综合997久久,| 成年女人毛片免费观看观看9| 1000部很黄的大片| 亚洲aⅴ乱码一区二区在线播放| 一区二区三区国产精品乱码| 国产精品免费一区二区三区在线| 99久国产av精品| 亚洲 国产 在线| 俺也久久电影网| 亚洲国产精品合色在线| 叶爱在线成人免费视频播放| 丰满人妻熟妇乱又伦精品不卡| 国产三级在线视频| 久久久国产成人免费| 变态另类成人亚洲欧美熟女| 亚洲成人中文字幕在线播放| 亚洲成人久久爱视频| 在线天堂最新版资源| 精品久久久久久久末码| 国产视频一区二区在线看| 久久久国产成人免费| 亚洲av成人不卡在线观看播放网| 欧美中文日本在线观看视频| 一区福利在线观看| 精品人妻一区二区三区麻豆 | 精品国产美女av久久久久小说| 一本精品99久久精品77| 成年女人永久免费观看视频| 亚洲国产日韩欧美精品在线观看 | 国产熟女xx| 亚洲av熟女| 波野结衣二区三区在线 | 男女视频在线观看网站免费| 国内精品美女久久久久久| 一级黄片播放器| www日本黄色视频网| 日韩欧美在线二视频| 久久久久久久久大av| 免费观看精品视频网站| 97超视频在线观看视频| 欧美中文综合在线视频| 精品乱码久久久久久99久播| 色综合婷婷激情| 亚洲aⅴ乱码一区二区在线播放| 动漫黄色视频在线观看| 免费在线观看成人毛片| 久久这里只有精品中国| 国产探花在线观看一区二区| 国产一区二区三区在线臀色熟女| 少妇熟女aⅴ在线视频| 日韩欧美精品免费久久 | 少妇高潮的动态图| 男人和女人高潮做爰伦理| 波多野结衣高清无吗| 欧美成人免费av一区二区三区| 精品国产美女av久久久久小说| 中文字幕久久专区| 日韩av在线大香蕉| 欧美又色又爽又黄视频| 国产在视频线在精品| 亚洲av一区综合| 免费高清视频大片| 99riav亚洲国产免费| 日本免费一区二区三区高清不卡| 最新在线观看一区二区三区| 亚洲国产欧洲综合997久久,| 少妇高潮的动态图| 免费在线观看亚洲国产| 欧美黑人欧美精品刺激| 免费看光身美女| 日韩有码中文字幕| 搡女人真爽免费视频火全软件 | 日韩欧美精品v在线| 国产色婷婷99| 亚洲欧美日韩卡通动漫| 此物有八面人人有两片| 天堂影院成人在线观看| 男女之事视频高清在线观看| 国产爱豆传媒在线观看| 国内久久婷婷六月综合欲色啪| 一个人免费在线观看的高清视频| 又紧又爽又黄一区二区| 狂野欧美激情性xxxx| 国产一区二区激情短视频| 欧美区成人在线视频| 国产v大片淫在线免费观看| 国产精品日韩av在线免费观看| 国产视频一区二区在线看| 国产v大片淫在线免费观看| 久久久久久久午夜电影| 成人特级黄色片久久久久久久| 欧美成人免费av一区二区三区| 久久久久久大精品| 午夜福利在线观看免费完整高清在 | 亚洲久久久久久中文字幕| 淫秽高清视频在线观看| 在线天堂最新版资源| 成熟少妇高潮喷水视频| 国产一区二区三区在线臀色熟女| 亚洲一区二区三区色噜噜| 亚洲avbb在线观看| 18禁在线播放成人免费|