• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    2021-12-14 09:58:08MuhammadAdilJehadAliMuhammadSajjadKhanJunsuKimRyanAlturkiMohammadZakaryaMukhtajKhanRahimKhanandSuMinKim
    Computers Materials&Continua 2021年7期

    Muhammad Adil,Jehad Ali,Muhammad Sajjad Khan,Junsu Kim,Ryan Alturki,Mohammad Zakarya,Mukhtaj Khan,Rahim Khan and Su Min Kim,*

    1Department of Computer Science,Virtual University of Pakistan,Lahore,54000,Pakistan

    2Department of Computer Engineering,Department of AI Convergence Network,Ajou University,Suwon,16499,South Korea

    3Department of Electronics Engineering,Korea Polytechnic University,Slheung,South Korea

    4Department of Computer Science,Abdul Wali Khan University Mardan,23200,Pakistan

    Abstract:Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamiccommunication behavior.In literature various mechanisms addressed the security issue of Industrial IoT networks,but proper maintenance of the performance reliability is among the common challenges.In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks.The AAN and BS uses the communication parameter such as a route request(RREQ),node-ID,received signal strength(RSS),and round-trip time(RTT)information to identify malicious devices and routes in the deployed network.The feasibility of the proposed model is validated in the simulation environment,where OMNeT++was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection, communication cost, latency, computational cost, and throughput.The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7%.

    Keywords: Security; industrial Internet of Things; routing attacks; routing protocols; base station; authentication aware nodes

    1 Introduction

    The utilization of Internet of Things (IoT) in industry is a revolutionary technology for data acquisition and processing, which bring many benefits to the lives of human beings utilizing different applications.Sensor devices collect data from human inaccessible areas by interconnecting hundreds and thousands of wireless nodes to form a heterogeneous network over the Internet [1].Internet of Things had a wide range of applications, which includes industrial automation,forest monitoring, flood monitoring, military, agriculture, healthcare, smart homes, smart cities,automobile, and smart grids, etc.[2,3].

    Wireless sensors have limited resources in terms of On-board battery power, memory, transmission, and computation, etc.Therefore, they need efficient utilization in the deployment phase to maximize network output by accurate results [4,5].Generally, Industrial IoT collects data with the help of deployed sensor nodes, which consists of sensitive and confidential information to be exchanged in the network.In addition, this information is transmitted over a transmission medium to a central location, i.e., gateway, cluster head or Edge node, through either direct or multi-hop communication infrastructure in the network [6].Industrial IoT are deployed in an open area, due to its distributed nature with information collection and monitoring capabilities.Therefore, they are susceptible to various internal and external security threats, due to their open communication behavior [7].Authentication of sensor nodes in an operational network is a primitive process,which is used to authenticate the participating nodes i.e., both sender and receiver modules in the network [8].

    In addition, routing protocols have an important role in Industrial IoT to disseminate information in an efficient way.Due to the limited resources of sensor devices, lightweight routing protocols have been given preference to achieve better results with minimal resources [9].Routing protocol low power (RPL) was specially designed for low power hardware devices, lossless links,low bandwidth, and limited resources networks.The RPL protocol is worked on the basis of the shortest path selection in the network to transmit data from source to destination.RPL is also helpful to create a loop-free wireless network topology just like spanning tree protocol(STP) in wired networks [10].The vulnerability threats to Industrial IoT in terms of routing attacks include the Sinkhole attack, Sybil attack, Black hole attacks, Selective forwarding attack,Wormhole attack, Denial of service attacks (DoS), Eavesdropping attack and Jamming attacks,etc.[11–13].Selective forwarding is another type of routing attack, where the intruder traps the legitimate traffic of the network by forwarding fake route request messages [14].

    The literature of Industrial IoT routing attacks is comprehensively over-viewed in this paper to evaluate the pros and cons to address the associated issues.Although, some of the existing literature plays remarkably well to combat the routing attacks in Industrial IoT, but at some stage,they are complex in their implementation or specific to the system or operation.Therefore, a lightweight authentication scheme is needed for Industrial IoT to counter routing attacks with efficient resource utilization.

    In this paper, we propose an intelligent mutual authentication scheme for Industrial IoT networks to identify and prevent routing attacks.The proposed model is very effective against routing attacks i.e., sinkhole attack and wormhole attack.Besides, the proposed mutual authentication scheme uses two functions such as Authentication Aware Node (AAN) and BS, which back-up each other to identify malicious activities in the network.The AAN and BS use the communication parameters such as route request (RREQ), received signal strength (RSS), round trip time (RRT), and node-ID to verify the legitimacy of participating nodes and network traffic.To elaborate, we individually define both functions as below:

    a.Authentication Aware Nodes (AAN)

    b.Base Station/Gateway Authentication Phase

    The AAN and BS support each other in the backup to ensure the security of deployed Industrial IoT networks.Besides that, different communication parameters are considered to verify the performance reliability of the metrics of the network.The AAN node deployed in the network at different locations uses the information of incoming packets such as RREQ, RTT, RSS, and nodes-ID to verify the legitimacy of network traffic in their proximity.Let assume that the legitimate nodes (Li) node-ID, distance (RSS), and time (RTT) parameters are set in AAN to verify the legitimacy of incoming RREQ/RREP by matching its values with defined values.In the initial phase, AAN node broadcasts a RREQ packet in the network and all nodes in their vicinity respond with a route reply (RREP).

    Once, the AAN node receives the RREP the of vicinity node, then, AAN nodes match the information responding node such as node-ID, distance (RSS), and time (RTT) with defined configuration.If it satisfies the defined parameters, then the AAN allows the responding node for communication in the network.Otherwise, an alarm message is generated by AAN to acknowledge the existence of malicious activity in the network.Moreover, those ordinary nodes, they are close to the BS and send their data directly to the BS.In this case, the BS in the back-up scenario checks the defined parameters such as considered for AAN to verify the legitimacy of requesting nodes.The backup scenario assessment process of the proposed model is very efficient, because if function 1 fails to detect malicious activity.Then, function 2 also carried out the security check against defined security parameters for incoming packet

    The rest of the paper is organized as Section 2 of the paper contains the related work followed by Section 3, which contain the contribution of this research work.Section 4 of the paper comprehensively overviews the proposed methodology, followed by Section 5, which represents the formal security analysis of proposed model with rival schemes.The implementation and result statistics in terms of comparative analysis are further discussed in Section 6.Section 7 summarizes and concludes the paper with future work.

    2 Related Works

    Industrial Internet of Things (IoT) is an effective tool to gather information from inaccessible areas, where human access is not possible.Security of these networks is a challenging issue for the research community to devise new methodologies and techniques, which should be prone to security threats.The literature given below contains some latest techniques adopted to counter routing attacks in Industrial IoT.

    Parmar et al.[15] proposed theAd hocon-demand Multipath Distance Vector (AOMDV)routing protocol with the incorporation of RTT time to combat routing attacks in IoT networks.Del et al.[16] proposed the Connected and Extended Mechanism-based technique to counter link attacks in IoT networks.The proposed model uses performance reliability parameters of communication in the designated network infrastructure to identify transmission attacks.The intrusion detection system (IDS) framework was proposed by Granjal et al.[17].This model was specifically against one system, which minimizes its use in the real deployment.

    Khan et al.[18] suggest the signature-based security technique to identify malicious nodes in the deployed network.In this technique, the authors used special nodes to detect assailant nodes in the deployed WSNs based on signature matching.However, the signature-based security identification mechanism in the Industrial IoT network increases the communication costs and network overhead in the heterogeneous environment.The Markle tree-based hash algorithm scheme was proposed by Idris et al.[19].They used the hash function to verify the legitimacy of participating sensor nodes.The limitation of the proposed model was complex implementation,high cost, end to end delay (E-2-E) and network overhead.The multi-level authentication scheme was proposed by Vo et al.[20].In this model, the authors used a three-phase hop authentication technique, where the adjacent node uses the control information to authenticate legitimate packets and segregate abnormal packets from legitimate traffic in the network.The limitation of the proposed scheme was its complex implementation and extra energy consumption during the authentication process.

    Yifeng et al.[21] proposed the received signal strength (RSS) based technique for the detection of wormhole attacks in WSNs.In the proposed model, the authors used RSS information for paired nodes to verify the legitimacy of participating nodes.However, the implementation and authentication mechanism of the proposed model was very simple, which allow the attacker to adjust intruder nodes in the network with the same RSS.Therefore, this model was not reliable as far as security concerns of WSNs.Rezaei et al.[22] proposed the different route discovery scheme to identify wormhole and sinkhole attacks in IoT.The author’s used hop count information of adjacent nodes to verify the authenticity of participating nodes in the proposed model.To address,the authentication problem in IoT networks, a time interval-based technique was proposed by Kaur et al.[23].In the proposed technique, the author’s used E-2-E delay information between paired nodes to identify malicious routes in the network.However, the proposed model was effective for the closed and small WSNs, where the external interferences such as fidelity and attenuation do not affect the transmission medium.Mukherjee et al.[24] used the round-trip time(RTT) information in their model to verify the authenticity of the participating nodes and network traffic.Besides that, they used the RTT comparison for the paired nodes authentication.

    Adil et al.[25] proposed the MAC-AODV mutual authentication scheme for constraintoriented networks.The proposed model was very effective for small WSNs, due to its high throughput, low latency and least packet lost ratio.The limitation of the proposed model was deployment in a specific area such as a homogeneous environment.Obaidat et al.[26] proposed the Software-defined networking (SDN) infrastructure for wireless networks to avoid man-in-themiddle attacks.They used a central program hub named ‘SDN Controller which controls the communication and authentication process in the network.Shigeyasu et al.[27] was proposed the novel distributed algorithm, which is derived from the Collusive Interest Flooding Attack(CIFA) to address the security problem in IoT networks.The Theil index-based security scheme was suggested for vampire attacks countermeasure by Cong et al.[28].A comprehensive review of security issues associated with IoT networks was presented by Georgios et al.[29].Ali et al.[30]proposed the decentralized approach for a peer-to-peer authentication scheme for WSNs.Adil et al.[31] proposed an anonymous channel categorization scheme for constraint-oriented networks to resolve the security issue.

    3 Contribution of the Proposed Approach

    The contribution of the proposed model is the development of a lightweight hybrid mutual authentication scheme to identify routing attacks in deployed Industrial IoT networks.Moreover, the proposed scheme uses the communication parameters to identify routing attacks in the deployed Industrial IoT networks, which not only minimizes network overhead, but also improve the overall lifetime of wireless nodes.Therefore, the proposed scheme is very effective for resources limited network, because it not only focuses on the security aspect of Industrial IoT networks, but it also considers the communication aspects of deployed Industrial IoT networks to achieve better results for end-to-end delay, throughput, packet lost ratio with minimum energy consumption and network overhead.Steps to be followed in the proposed model:

    a.To interconnect all legitimate nodes in the network topological order

    b.To develop a secure routing infrastructure, where legitimate nodes share information with

    c.Development of two functions authentication scheme to verify the confidentiality and integrity of data

    d.To identify routing attacks and malicious nodes in an operational network

    e.Authentication of legitimate nodes in an operational network in terms of back-up scenario

    f.The feasibility of the proposed model is checked in the simulation environment to verify the performance reliability in terms of comparative results with rival schemes.

    4 Proposed Methodology:Mutual Authentication Scheme

    In this paper a hybrid mutual authentication scheme for Industrial IoT networks is proposed combat routing attacks.The proposed model uses two functions, which back up each other during assessment of network traffic to identify malicious activities in the network.The function 1 of the proposed scheme is known as AAN, which initiates a RREQ message in the network, the ordinary nodes in the vicinity responds with a RREP message.The AAN node uses communication parameters such as node-ID, RSS and RTT to verify the legitimacy of incoming RREP packet.Likewise,if any node in the network is missed by an AAN node during the assessment process and this node make direct communication request with the BS.Then in the backup BS will assess its traffic as function 2 by comparing the aforementioned communication parameters to verify the legitimacy of incoming RREQ/RREP.If the incoming RREQ/RREP satisfies the defined communication parameters, then the BS allows it for communication in the network.If the defined communication parameters of requesting or responding node do not match in the BS, then the BS denied it’s RREQ/RREP for further processing in the network.Once the incoming RREQ/RREO packet is denied by BS or AAN node, then an alarm message is generated to acknowledge the existence of malicious activity in the network.Moreover, in the proposed model, both the functions worked independently of each other, but they ensure the security of the network in composition.This is the advantage of our proposed model, where both the functions are working in backup order to minimize the chance of an attacker node to participate in the operational Industrial IoT network.

    Herein, we explain the concept of our proposed model with an example to clarify the working steps.Let assume, an AAN (Ai) generates an RREQ packet in the network, a sensor node(Si)∈(Sn?1)in the vicinity respond with an RREP message.TheAinode checks the incoming RREP ofSi∈(Sn?1)for its defined security parameters, ifSiRREP verifies the defined security parameters, thenAiwill allow it for communication in the network.In case, ifSiRREP does not verify the defined security parameters ofAi, thenAibroadcast an alarm message in the network to acknowledge the existence of a malicious node in the network.Moreover, ifAinode fails to detect the fake RREP/RREQ in their proximity, and the same attacker node directly approaches to the BS for communication.In this case, the BS in the backup scenario checks the RREQ with the defined security parameters as mentioned for theAinode to verify the legitimacy of the requesting node.After security assessment, the incoming packet is allowed or denied for communication in the network.

    The basic diagram of our proposed scheme is shown in Fig.1.The legitimate nodes in the network are shown with green color, AAN nodes with blue color and directly connected nodes with BS are shown with pink color.AAN verifies the legitimacy of participating nodes by generating an RREQ message in the network, which is shown with yellow color in the diagram.Similarly, the AAN nodes receive RREPs against generated RREQ in the close vicinity as shown with yellow arrows in Fig.1.Moreover, the Pink nodes shown in the diagram are directly connected with BS, where the BS checks their legitimacy by comparing its RREQ or RREP information with defined security parameters.The legitimacy verification process of BS and directly connected nodes are shown with the Blue line in the diagram.Similarly, the network topological connectivity of the proposed model is shown with dark green lines in Fig.1, where the legitimate nodes send their collected data from source to destination node via hop count selection in the network.Fig.1 of the paper verifies that AAN and BS work independently to identify malicious activity in the network.The back-up support of the two functions maintains a high standard of security in deployed WSNs.

    Figure 1:The detail overview of proposed scheme, where AAN and base station independently monitor network traffic

    The stepwise authentication mechanism of the proposed model is elaborated as follows:The AAN nodes are used with ordinary nodes during the deployment of network architecture.The AAN are special nodes, which have high storage, computation, and transmission capabilities.Moreover, these nodes use their built-in configuration to verify the legitimacy of network traffic and participating nodes.The behaviors of these special nodes are different from other legitimate nodes in the network because the functionality and tasked assigned to these nodes are completely different.The AAN assesses the network traffic in their nearest proximity in terms of communication parameters, such as node-ID, RTT and RSS to identify malicious activity in the deployed WSN.The parameters used by AAN node in the following manner to verify the legitimacy of network traffic and participating nodes.

    4.1 Authentication of Legitimate Nodes through Device-ID,RTT and RSS:AAN Nodes

    The AAN nodes assessment phases:The AAN nodes use communication parameters such as nod-ID, RTT and RSS to verify the security of the deployed network.In the first phase, an AAN node matches the responding node-ID with its routing table to verify the legitimacy of the network traffic.The AAN nodeAigenerates an RREQ message, all theSi∈Sn-1in proximity respond with a RREP packet.After reception ofSi∈Sn-1nodes RREPs messages, the AAN node compares the responding nodes node-ID(s) with its routing table.If theSinode ?ID ∈Airouting table, thenSifulfills the defined criteria, and the packet is forwarded for the next assessment parameter to ensure the legitimacy.Likewise, the process is continuous to verify the legitimacy of the participating nodes and network traffic throughout the life of deployed WSN.

    4.2 Round Trip Time(RTT)Model:AAN Nodes

    The RTT of a message is very sensitive, because its value is affected by communication metrics such as medium, congestion and contention in the network.Therefore, in the proposed model sufficient attention has be given to this issue to utilize the RRR of a message in an operational environment effectively.Moreover, in simulation environment links parameters was kept constant for ordinary communication.However, the value of RTT was considered infinity or higher than its estimated value if there is a fault communication in the communication medium.Likewise,these nodes are identified by comparing their RTT values with their estimated values to identify them accurately.

    The RTT time mostly depends upon the numbers of wireless nodes they are present in the source and destination node.The efficiency of RTT can be improved by minimizing the distance between communicating nodes.Therefore, in this work, we used the AAN nodes to verify 96% to 98 % RTT of participating nodes with one-hop communication, because RTT calculation was the responsibility of AAN.

    In the proposed model, let assume that the minimum RTT isλRTTwith one sensor node is given by:

    In Eq.(2),λ1 andλ2 represents the delay time for AAN node and responding legitimate node.The network topology for proposed consideration is shown in Fig.1, where the paired node is at a distance of one hop orλfrom AAN.Therefore, the defined threshold value for all participating nodes should be the same in terms of RTT time.

    Hence,λbe the uniform delay time or RTT for allpaired nodes, thenλ=λ1=λ2=λ3...=λn?1 for N number of nodes.Then,

    This is the minimum RTT time a node takes to send a message from source to destination with the help of hop count.So we can define their RTT through Eq.(4):

    4.3 Received Signal Strength(RSS)Assessment Model:AAN Nodes

    The RSS of signal/received packet plays a vital role in the authentication process of our proposed scheme because the RSS confirms the distance range parameters defined for legitimate nodes by AAN.AAN nodes in the network continuously measure the values of RSS parameters for all incoming RREP to identify routing attacks, such as wormhole and sinkhole attack.The calculation of RSS is made based on the following formula:

    The value of transmission power and antenna gain is kept constant for fixed transmitter(Tx) and receiver (Rx).The AANAibroadcast an RREQ message packet in the network, the ordinary nodesSi∈Sn?1 in the proximity respond with a RREP message, which contains node-ID, RTT and RSS information.After the reception ofSiRREP, the assessment of the incoming packet is started for node-ID, RTT and RSS.In the case of RSS, the packet threshold value for RSS is set about 80 m.Likewise, all incoming RREPs go-through this process to verify the legitimacy of network traffic, before initialization of the communication process in the network.If any packet, who’s RSS, is (>) 80 m, then the requesting node traffic is denied for communication in the network and an alarm is generated to acknowledge the existence of malicious packet in the network.Moreover, during the operational network, the verification process is continuous throughout the entire lifetime of the network.The AAN nodesAibroadcasts RREQ packets in the network after a defined interval of time and receive RREP from close vicinitySinodes ∈Sn?1 to verify the legitimacy of network traffic and maintain high-quality security in the network.

    In Fig.2, the legitimate node is denoted bySi, whereTxis used for transmission andRxfor reception of a packet.Fig.2 of the paper briefly overviews the authentication process of an AAN node to verify the legitimacy of network traffic.AAN node (Ai) initiates RREQ message and broadcast it in the network.All participating nodeSi∈Sn?1 in close vicinity receivesAiRREQ and responds with RREP packet, which contains information ofSinode such as source node-ID, RTT, RSS and Destination node-ID.TheAinode checks the received RREP packet of responding node to measure the value of RSS.If the RSS value of responding nodes is ≤80 m,then AAN verifies its legitimacy in the network.Hence, the authentication and verification process of an AAN complete successfully.

    Theorem-1:An authentication aware nodeAigenerates a RREQ withSi∈Sn?1, ifSi–RSS ≤80 m →Accept.

    Proof of Theorem 1:Let us suppose that, the AAN (Ai) generates RREQ withSi∈Sn?1.TheAiRREQ message is received by proximitySi∈Sn?1 nodes.TheSinode responds with a RREP messages toAiRREQ, which contain node-ID, RTT and RSS.By, following the authentication process,Aichecks node-ID, RTT and RSS of responding RREP, the RSS ofSi∈Sn?1>80 m.Hence,Aidenied the RREP ofSibecause it did not satisfy the define security parameters.

    Figure 2:Detail overview diagram of authentication aware nodes (AAN) to verify legitimate route in the network

    Conversely, if an authentication aware node (Ai) of the network generates a RREQ request withSi∈Sn?1.Likewise, theSi∈Sn?1 responds with an RREP packet.Aiverifies the security parameters ofSiby comparing node-ID, RTT and RSS of RREP.The RSS of responding nodeSi∈Sn?1 node RREP is<80 m as check by AAN.Hence, the RREP information ofSiwill be authenticated successfully by AAN.Hence, the aforesaid theorem verifies that only legitimate nodeSi∈Sn?1 having RSS ≤to 80 m can be authenticated in the network.

    However, the role ofSi∈Sn?1 is to collect information according to their deployment requirement and process them for further analysis in the network, after the security check of AAN.The communication of legitimate nodes in the proposed scheme is based on point to point and point to multi-point with respect to AAN and BS.

    4.4 Base Station(BS):Authentication Mechanism

    Base Station (BS) plays the role of a junction for all traffic in the network because all traffic passes through the BS in the homogeneous and heterogeneous network infrastructure.Fig.1 of the paper shows the importance of BS that how the legitimate nodes send their collected data to destination location via BS.Moreover, in our proposed model the connectivity of BS is point-topoint and point to multi-points in the deployed network.Similarly, the legitimacy of incoming packets is confirmed by matching its nodes ID, RTT and RSS in the AAN nodes and BS.

    ?

    4.5 BS Authentication Process:Round Trip Time(RTT)Verification Mechanism

    Base station authenticates the directly connected nodes through incoming traffic such as RREQ/RREP packets.The legitimate nodes of the networkSi∈Sn?1, which are not in the vicinity of AAN, they directly communicate with BS.Likewise, the directly connected nodes share their collected information through concerned BS.However, once the legitimate nodesSi–∈Si?1 generate a RREQ with BS.The BS verifies its security in terms of comparing or measuring its node-ID, RTT and RSS of the incoming packet.The BS match node-ID RSS and RTT of requesting node, if all security parameters are satisfied, then the BS allows the requesting node for communication in the network.Else BS denied the incoming RREQ/RREP packet for communication in the network.According to Eq.(1) RTT is the time that a message needs to reach from source to destination.Similarly, the minimum RTT set for BS is equal toλRTTin our case and the distance parameters are set for BS according to Eq.(2), where

    In Eq.(6) λ1 and λ2 is the delay time between BS and requesting node for one-hop distance in the proposed model to maintain accurate RTT between paired nodes.The parameters of Eq.(3) are considered for one-hop distance communication between BS and requesting node.Likewise, the BS checks the value of RTT time to verify the legitimacy of the requesting node in the network.

    4.6 Base Station(BS):Received Signal Strength(RSS)Model

    Let assume that a legitimate node of the networkSi∈Sn?1 generates a RREQ message with concerned BS.TheSiRREQ packet contains information such as (src-ID ⊕des-ID ⊕RTT ⊕RSS).After the reception ofSinode RREQ, the BS checks the security parameters such as node-ID, RTT and RSS.The RSS value of incoming RREQ is compared with the defined threshold value of RSS in BS, which is<80 m.Moreover, the BS uses Eq.(5) to calculate the RSS value of incoming RREQ message, where the values of transmission power and antenna gain are kept constant for fixed transmitter (Tx) and receiver (Rx).After the calculation of RSS value, the verification process is started, where the value of RSS is matched in the BS.If the value of RSS is<80 m, then the incoming RREQ message RSS is matched in BS.Similarly, the BS after this verification check allows the requesting node for communication in the network.In case, if the value of RSS does not match in the BS, then the BS denied the RREQ message and broadcast an alarm message in the network to acknowledge the existence of malicious activity in the network.

    The paper illustrates the authentication process of legitimate nodesSi∈Sn?1 RREQ with concerned BS in Fig.3.The legitimate nodeSi– generates a RREQ with concerned BS, which contains information such as (src-ID ⊕RTT ⊕RSS ⊕des-ID).After reception ofSiRREQ, the BS checks the node-ID, RTT and RSS.Likewise, in the verification process, the BS calculates the values of the incoming RREQ packet for RSS.After that the BS matches the values of RSS with the defined threshold value, which is ≤80 Meters, if the RSS belongs to this defined category,then the BS station allows the same node or route for communication in the network.If the value of incoming RREQ does not satisfy the security parameters condition of BS, then the BS denied the incoming RREQ packet for communication and generates an alarm message in the network to acknowledge the existence of malicious activity in the network.The steps adopted during the authentication phase for a legitimate nodeSi–∈Si?1 with BS are shown in Algorithm 2.

    Figure 3:Detail overview of BS authentication phase to verify legitimate route in industrial IoT networks

    ?

    Theorem-2:A Legitimate nodeSi–generates a RREQ withBSifSiID, RRT and RSS ∈(BS).

    Proof of Theorem 2:Let’s suppose that an assailant nodeBigenerate a RREQ with concerned BS.The BS receivesBiRREQ.After the reception ofBiRREQ, the BS verifies the security parameters ofBi.Likewise, the BS starts the authentication process and matches theBiRREQ node-ID, RTT and RSS with defined parameters, whereBisecurity parameters /∈BS list.

    Hence,BiRREQ will be denied by concerned BS.

    Conversely, if a legitimate nodeSigenerates a RREQ request with concerning base station(BS).The BS checksSiRREQ request with define security parameters.TheSinode packet satisfies the security parameter of BS.Thus, the RREQ request information ofSiwill be matched successfully, becauseSi∈membersBS.Therefore, the aforesaid theorem verifies that only legitimate nodeSi∈member (BS) generates RREQ in the network to process data.

    4.7 Authentication of Fake Route RREQ:Routing Attacks

    The functions of the proposed model back up each other to identify routing attacks and malicious nodes in the network.However, both the function works independently, which minimizes the chance of attacks in designated WSNs.Once, one function fails to identify fake RREQ,then function two in the backup carried out the same security check to verify the legitimacy of the network traffic by applying security parameters.The AAN node and BS use the node-ID, RTT and RSS information to verify the authenticity and integrity of data in the network.The AAN node continuously generates RREQ messages in the network to verify the legitimacy of participating nodes and network traffic in their vicinity.However, in the case, when an ordinary node, which is not in the vicinity of AAN node and it launches a direct communication request with the concerned base station.Then the BS checks the security parameters of incoming RREQ with its defined security parameters to verify the legitimacy of requesting node.

    Likewise, an attacker nodeBigenerates an authentication request withAior BS.TheBiRREQ contains (src-ID ⊕RTT ⊕RSS ⊕des-ID) information.TheAior BS matchesBiRREQ information with their defined security parameters.TheBinode-ID, RTT and RSS ∈Aior BS security defined parameters.Therefore,Aior BS deniesBiRREQ and broadcasts an alarm message in the network to acknowledge the existence of an attacker node.The detailed overview of attacker node detection is shown in Fig.4.

    Figure 4:Detailed step by step authentication process of routing attacks in deployed Industrial IoT networks

    The malicious RREQ authentication mechanism is shown in Fig.4, of the paper.The malicious nodeBigenerates RREQ with BS orAinodes by advertising fake RREQ in the network.After reception ofBiRREQ BS orAiapplies the security check parameters such as node-ID,RTT and RSS.The BS orAimatches the above-mentioned parameters of the requestingBinode.TheBinode-ID /∈BS orAiregistered list.Likewise, the RTT and RSS ofBi(>) the defined values of security parameters in BS orAi.Therefore, the BS orAinode deniesBiRREQ and broadcast an alarm message in the network.

    The attacker nodeBiis identified in the above-mentioned scenario of Fig.4 successfully by comparing conditional security parameters.Our proposed scheme plays exceptionally well to combat routing attacks in industrial IoT networks.Moreover, the effectiveness of our scheme was seen for different types of attacks, such as Eavesdropping, Man-in-Middle attack, Server-side attack, Client-Side attacks, Insider, and Anonymity based attacks on deployed IoT networks.

    5 Formal Security Analysis of Our Mutual Authentication Scheme

    In this section, the proposed model was evaluated for well-known security threats to WSNs,which can be launched on an operational network.The comprehensive overview and adopted measures are discussed as follows.

    5.1 Client Impersonate Attacks

    Let us assume that an attacker node (Bi) generates RREQ with neighbor’s nodes.For this,Bibroadcast its RREQ packet in the network, which should be received by concerned BS or AAN node.After, the reception of attacker node BiRREQ packet, the BS and AAN nodes checks the security parameter such as node-ID, RTT and RSS.The BS and AAN (Ai) node calculate and verifies the defined security parameters for the incoming packet ofBi.TheBiRREQ packet does not verify the BS andAisecurity parameters.Therefore, the BS or AAN node broadcast an alarm message in the network to acknowledge the presence of a malicious node in the network.

    5.2 Eavesdropping Attacks

    In this type of attacks, the attacker hijacks the transmission channel and attracts the network traffic in term of an insecure communication channel.In our proposed model, an attacker nodeBigenerates a fake route RREQ in the network, which aims to advertise the shortest path to the destination node.The broadcasted RREQ message ofBiis received by AAN and BS.The BS and AAN nodes apply the security check parameters to verify the legitimacy of the incoming RREQ packet.Once, the security check is carried out, then, theBiRREQ does not fulfill the security parameters of our proposed model.Therefore, malicious RREQ is easily identified by our parametric hybrid scheme and acknowledges the existence of malicious activity in the network by broadcasting an acknowledgment message.Hence, our proposed model is very effective against eavesdropping attacks in WSNs environment.

    5.3 Server-Side Attacks

    Let suppose that an adversary nodeBigenerates an authentication RREQ with BS.Once the BS receivesBiRREQ, it checks the security parameters like node-ID, RTT and RSS.In the parameter matching process,BiRREQ does not verify the defined parameters of BS.Therefore,Bifake authentication RREQ is successfully identified and denied by concerned BS in our proposed model.

    5.4 Off-Line Phase Guessing Password Attacks

    Let assume that an adversaryBiguesses the authentication scheme and authenticate in polynomial time to communicate as a legitimate nodeSiin the network.In this case, the adversaryBineeds to fulfill all the security parameters like node-ID, RTT and RSS.Once the calculation has been carried out the RTT and RSS of requestingBinode does not match in AAN or BS.Therefore, the off-line guessing password attack fails against our scheme, due to RTT and RSS value calculation.

    5.5 Sensing Node Capture Attacks

    Let assume that an adversaryBihijack one legitimate node of the network and attract it is all security parameters and traffic information.In this case, the adversary node did not know about the AAN and BS, where the communication parameters of broadcasted RREQ/RREP messages are continuously checking.Let assume that node-ID of adversaryBimatches in BS orAi, but their RTT and RSS information does not match.Hence, our scheme is also effective against sensing node capture attacks, because of communication parameters checking.The formal security analyses are shown in Tab.1 of the paper.

    Table 1:Formal security analysis of our proposed model with competitor schemes

    6 Experiment Results Analysis

    The Proposed hybrid mutual authentication scheme was implemented in the simulation environment, where OMNeT++ was used as a simulation tool.OMNeT++ simulation tool has the capability to develop real-time IoT, WSNs andad hocnetworks in the simulation environment.The proposed model was implemented by specifying network area with distribution of AAN nodes,ordinary nodes and BS(s) in the network topological order.The authentication parameters were set in the AAN and BS with communication connectivity with ordinary nodes.Moreover, the role assigned to BS and AAN node to identify malicious activity in the network such as victim nodes and routing attacks by the assessment of communication parameters such as RSS, RTT and node-ID.The parameters set-up used in the proposed model are briefly shown in Tab.2.

    Table 2:Data set of parameters taken for the proposed scheme implementation

    The parameters shown in Tab.2 were used in the topology and infrastructure development of our proposed scheme.Moreover, the simulation environment was developed through the composition of theses parameters to capture results for our scheme.In addition, the extracted results of our proposed scheme were compared with its rival schemes based on routing attack detection rate, average throughput, latency and communication cost.Moreover, energy consumption and performance reliability were also seen to evaluate the overall structure of the proposed scheme.

    6.1 Communication Cost

    The communication cost of our proposed scheme was compared with existing schemes to address the issue of routing attacks in WSNs such as wormhole and sinkhole attack.Furthermore,the communication cost was observed for the proposed scheme during a simulation environment,which has better results statistics than its rival schemes, except Vo et al.[20] scheme.The communications session was established between legitimate nodes of the network with proper monitoring to verify the legitimacy of network traffic.The results extracted during simulation are shown in Tab.3 with a comparison ratio to its competitor schemes.

    Table 3:Communication cost comparison table of our scheme with competitor schemes

    6.2 Results Analysis of AAN Based on RTT Assessment

    The results of our proposed model were seen for routing attacks during the simulation environment.The simulation statistics for both functions AAN and BS were individually observed to verify the performance reliability of the proposed model in terms of routing attacks detection.The results statistic seen for routing attack detection and adversary node identification through BS and AAN node was found quite consistent and remarkable.In the phase, the AAN was considered for evaluation, where an adversary node advertises fake RREQ in the network.The adversary node advertised fake shortest path information to the destination node by a broadcast packet in the network.Similarly, this RREQ was also received by AAN node.The AAN node carried out the necessary security verification process to match the RREQ RRT time with its defined values.The adversary node was observed that it does not verify the security condition of RRT by matching its value.Similarly, after the assessment, the AAN node generates an alarm message to acknowledge the existence of an adversary node in the network.

    The simulation result verifies that AAN node successfully identified an adversary node in the network.This verifies that the AAN node detection rate of routing attacks based on RTT assessment was quite accurate in the operational network against fake RREQ packet.Subsequently, the number of adversary nodes was increased in the deployed WSN infrastructure to verify performance reliability with a high number of fake RREQ, which was also found quite exceptional for AAN node.The AAN aware node detects the maximum number of fake RREQ in their vicinity, whose statistics are shown in Fig.5.

    Figure 5:AAN results analysis to detect fake RREQ in deployed Industrial IoT networks

    6.3 Results Analysis of AAN Based on RSS Assessment

    The results of our proposed model have also seen for RSS based assessment of AAN, where adversary nodes were used in the operational network to advertise fake RREQ and hijack network security.The node-ID and RTT time in fake RREQ was kept similar to legitimate nodes RTT and node-ID, where the RSS was different for all introduced adversary nodes.During the simulation,the AAN nodes were closely observed for assessment of RSS of fake RREQ of an adversary node, which was found quite remarkable by assessing maximum RREQ in the close vicinity.Moreover, the statistical analysis observed during the simulation for an AAN node based on RSS is shown in Fig.6, where the adversary node RREP(s) assessment and detection % are shown in graphical form as captured during the simulation.

    Figure 6:AAN results analysis to detect fake RREQ in Industrial IoT based on incoming packet RSS assessment

    6.4 Results Analysis of AAN Based on RSS and RTT Assessment

    AAN node’s results were also seen for fake RREQ(s), where both the values of RTT and RSS were different from other legitimate nodes of the network.The legitimate nodes and adversary node in the operational were closely seen in term of authentication of RTT and RSS for incoming RREQ/RREP to ANN.The ANN nodes were found quite consistent in identifying adversary nodes; they have fake RREQ(s) in the network.Moreover, the performance reliability of the network was also seen during the existence of adversary nodes with legitimate nodes in the network.The statistical analysis observed during the simulation assessment of AAN node to detect fake RREQ with the help of RSS and RTT are shown in Fig.7.

    Figure 7:AAN results analysis to detect fake RREQ in Industrial IoT-based on both RTT and RSS assessment

    6.5 BS Fake RREQ Results Analysis Based on RTT and RSS

    The BS results were also seen for the detection of fake RREQ(s) during the operational network, where the legitimate nodes were communicating with BS.The statistical analysis extracted from the simulation tool is shown in Fig.8, where both adversary and legitimate nodes broadcast RREQ/RREP packets in the network.However, those fake RREQ, which were received by BS directly from adversary nodes are assessed for security check.The statistical results analysis for fake RREQ/RREP of adversary nodes, which were captured during simulation, is shown in Fig.8.

    Figure 8:BS fake RREQ detection statistical analysis, based on both RTT and RSS assessment

    6.6 BS and ANN Node Combined Statistical Analysis for Fake RREQ/RREP(s)

    The simulation of the proposed model was continued to see the overall detection rate of our hybrid scheme for AAN node and BS.Moreover, the fake RREQ/RREP(s) was sent to AAN node and BS.Similarly, the malicious nodes they were not in the vicinity of AAN node was successfully detected by concerned BS.The combine results observed for BS and AAN node in terms of fake RREQ and RREP(s) packet was about 97.7%, which is far better than its rival schemes.Although, the detection rate of our proposed scheme was 97.7%, but it is better than the existing by means of energy consumption, communication cost, computation costs and communication metrics, because all the authentication process is performed by AAN and BS, which improves the overall network communication infrastructure.The results statistic captured during the simulation for our hybrid mutual authentication scheme is shown in Fig.9, where 95.7% fake RREQ was identified successfully.

    Figure 9:Statistical analysis of our scheme to detect fake RREQ/RREP(s) in operational network

    6.7 Routing Attacks Results Analysis of Our Proposed Model with Rival Schemes

    The proposed model was evaluated for each function, where different parameters of adversary nodes were disturbed to identify routing attacks or fake RREQ/RREP(s) packets in the network based on parameter assessments.The detection rate of fake RREQ/RREP(s) of the proposed model was quite excellent individually.Similarly, the fake RREQ/RREP(s) assessment of adversary nodes was also carried out in a combination of BS and AAN, which shows a high detection ratio,and the statistics are shown in Fig.9.Moreover, after individual and combine results statistic the proposed scheme was compared with its competitor’s scheme based on accurate routing attacks detection, which was found promising in the presence of field-proven schemes.The malicious activities in the network were successfully identified with the help proposed model.Moreover, the proposed model is not only effective against routing, but also helpful to identify some network attacks, which is shown in the formal security analysis.The results statistics for proposed model with its rival schemes are shown in Fig.10.

    Figure 10:Routing attacks statistical analysis of our proposed model with its rival schemes

    6.8 Statistical Analysis of Our Proposed Scheme with Rival Scheme for Latency

    The proposed model was also observed for latency during the communication process to verify the performance reliability of packet exchange based on the delay time.During the experiment analysis, the latency observed for the proposed model was exceptional, due to several BS(s) in the deployed area of Industrial IoT networks.The latency of the proposed model was compared with the field-proven scheme, which was found remarkable well in their presence.The statistical analysis of the latency for our proposed model and its competitor’s schemes are shown in Fig.11.

    Figure 11:Latency statistical analysis of our proposed model with its competitor schemes

    6.9 Throughput Statistical Analysis of Our Proposed Scheme with Competitor’s Scheme

    The results statistic of our parametric hybrid mutual authentication scheme was also checked for network throughput, which was found convincing during the simulation.The network traffic was observed in terms of throughput to check the reliability of proposed scheme.The accurate detection of routing attacks in an operational network minimizes congestion, contention and network overhead, which improves the overall communication environment of the network.Therefore,the result observed for throughput in our scheme during simulation environment was significant,which shows the reliability of our hybrid scheme.Moreover, the utilization of several BS(s) in the deployed Industrial IoT minimizes the network overhead up-to a great extent, which maximizes network throughput.The results statistic captured for our scheme during simulation is shown in Fig.12 in comparison with its competitor’s schemes.

    Figure 12:Throughput statistical analysis of our proposed model with rival schemes

    7 Conclusions

    In this paper, we proposed a hybrid mutual authentication scheme for Industrial IoT networks to combat routing attacks.The proposed model uses two functions in the back-up scenario to ensure the legitimacy of network traffic in Industrial IoT networks.In addition, both the functions work independently, but the authentication mechanism back-up each other to identify routing attacks with significant results.In the initial phase, the AAN node initiates RREQ with the nearest proximity nodes in the network.The nodes nearby AAN respond with a RREP packet.Once, the AAN node receives RREP from nearby nodes, they match security parameters such as node-ID,RTT, and RSS to ensure the legitimacy of the incoming packet.Likewise, if the incoming RREP fulfills the defined security parameters, then the authentication mechanism completes successfully.Likewise, the BS works as function 2 in the proposed model, if any RREQ/RREP misses by an AAN, and the same RREQ/RREP approach directly to the BS.Then, the BS carries out the same security check mechanism of AAN to verify the legitimacy of requesting packet.The performance reliability of the proposed model was checked based on attack detection, communication cost,computational cost, latency, and throughput in the presence of its competitor’s schemes, which showed an overall improvement.Besides that, the attacks detection percentage observed for the proposed model was 97.7%, which surpasses the existing schemes by an average 13% improvement.

    Funding Statement:This research was supported by the MSIT (Ministry of Science and ICT),Korea under the ITRC (Information Technology Research Center) support program (IITP-2020-2018-0-01426) supervised by IITP (Institute for Information and Communication Technology Planning & Evaluation) and in part by the National Research Foundation (NRF) funded by the Korea government (MSIT) (No.2019R1F1A1059125).

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久精品国产亚洲av天美| 国产综合精华液| a级毛片免费高清观看在线播放| 啦啦啦在线观看免费高清www| 一级片'在线观看视频| 久久精品国产自在天天线| 亚洲国产精品专区欧美| 亚洲国产欧美人成| 美女内射精品一级片tv| 亚洲欧美中文字幕日韩二区| 人妻少妇偷人精品九色| 国产精品蜜桃在线观看| 国产高清三级在线| 成年女人在线观看亚洲视频| 伦精品一区二区三区| 波野结衣二区三区在线| 欧美日韩在线观看h| 精品午夜福利在线看| 成人18禁高潮啪啪吃奶动态图 | 日本色播在线视频| 五月玫瑰六月丁香| 视频中文字幕在线观看| 丝袜脚勾引网站| 国产爽快片一区二区三区| 18+在线观看网站| 精品熟女少妇av免费看| av免费在线看不卡| 欧美成人a在线观看| 国产亚洲一区二区精品| 久久99蜜桃精品久久| 日本黄大片高清| 2022亚洲国产成人精品| 亚洲国产欧美人成| 狂野欧美白嫩少妇大欣赏| 99热这里只有精品一区| 97超碰精品成人国产| 亚洲经典国产精华液单| 国产一区二区在线观看日韩| 一级二级三级毛片免费看| 99久久精品国产国产毛片| 性色av一级| 老女人水多毛片| av专区在线播放| 亚洲精品国产av成人精品| 天堂8中文在线网| 我要看日韩黄色一级片| 欧美另类一区| 欧美精品国产亚洲| 26uuu在线亚洲综合色| 看非洲黑人一级黄片| 亚洲av.av天堂| 汤姆久久久久久久影院中文字幕| 免费av不卡在线播放| 国产精品一区二区三区四区免费观看| 新久久久久国产一级毛片| 亚洲av成人精品一区久久| 免费看光身美女| 22中文网久久字幕| 国产男人的电影天堂91| 97热精品久久久久久| 久热久热在线精品观看| 99re6热这里在线精品视频| 精品人妻偷拍中文字幕| 成人特级av手机在线观看| 99久国产av精品国产电影| 国产日韩欧美亚洲二区| 夫妻性生交免费视频一级片| 久久久久久伊人网av| 女人十人毛片免费观看3o分钟| 人妻少妇偷人精品九色| 成年女人在线观看亚洲视频| 亚洲av中文av极速乱| 国产国拍精品亚洲av在线观看| 一级毛片我不卡| 亚洲人成网站在线播| 欧美人与善性xxx| 边亲边吃奶的免费视频| 国产亚洲午夜精品一区二区久久| 国产精品99久久99久久久不卡 | 中文乱码字字幕精品一区二区三区| 蜜桃亚洲精品一区二区三区| 国产欧美亚洲国产| 汤姆久久久久久久影院中文字幕| 一级毛片久久久久久久久女| 日韩一区二区三区影片| 欧美+日韩+精品| 欧美精品人与动牲交sv欧美| 97在线视频观看| 亚洲欧美清纯卡通| 精品亚洲乱码少妇综合久久| 精品酒店卫生间| 黄片无遮挡物在线观看| 日韩大片免费观看网站| 插逼视频在线观看| 日韩伦理黄色片| 99热国产这里只有精品6| av播播在线观看一区| 国产精品一及| 欧美国产精品一级二级三级 | 亚洲国产精品专区欧美| 免费不卡的大黄色大毛片视频在线观看| 久久久久精品久久久久真实原创| 男的添女的下面高潮视频| av在线蜜桃| 在线看a的网站| 22中文网久久字幕| freevideosex欧美| 亚洲av中文av极速乱| 久久精品国产自在天天线| 日韩中字成人| 丰满人妻一区二区三区视频av| 国产精品免费大片| 青春草亚洲视频在线观看| 久久国产亚洲av麻豆专区| 国产成人a∨麻豆精品| 美女视频免费永久观看网站| 亚洲经典国产精华液单| 在线观看三级黄色| 亚洲欧美日韩另类电影网站 | 久久99热这里只有精品18| 国产免费视频播放在线视频| 中文在线观看免费www的网站| av福利片在线观看| 五月玫瑰六月丁香| 青春草国产在线视频| 97超碰精品成人国产| 自拍偷自拍亚洲精品老妇| 在线观看国产h片| 免费在线观看成人毛片| 免费看光身美女| 99热国产这里只有精品6| 美女福利国产在线 | 精华霜和精华液先用哪个| 日本爱情动作片www.在线观看| 超碰97精品在线观看| 欧美高清成人免费视频www| 男女啪啪激烈高潮av片| 免费大片18禁| 18禁动态无遮挡网站| 亚洲经典国产精华液单| 九色成人免费人妻av| 亚洲第一av免费看| 国产淫语在线视频| 成人毛片a级毛片在线播放| 大片电影免费在线观看免费| 人妻少妇偷人精品九色| 亚洲久久久国产精品| 少妇人妻一区二区三区视频| 91久久精品国产一区二区成人| 国产v大片淫在线免费观看| 不卡视频在线观看欧美| 色婷婷av一区二区三区视频| 国产淫片久久久久久久久| 成人一区二区视频在线观看| 久久99蜜桃精品久久| 综合色丁香网| 国产大屁股一区二区在线视频| 寂寞人妻少妇视频99o| 欧美精品国产亚洲| 免费黄色在线免费观看| 国产一区二区三区综合在线观看 | 国产 一区 欧美 日韩| av.在线天堂| 亚洲欧洲日产国产| 丝袜脚勾引网站| 熟女av电影| 亚洲av欧美aⅴ国产| 丰满乱子伦码专区| 久久精品国产亚洲网站| 亚洲色图av天堂| 久久久成人免费电影| 日韩亚洲欧美综合| 久久这里有精品视频免费| 亚洲av中文av极速乱| 日韩成人av中文字幕在线观看| 热re99久久精品国产66热6| 一个人看视频在线观看www免费| 亚洲欧洲国产日韩| 日本一二三区视频观看| 国产伦精品一区二区三区四那| 亚洲激情五月婷婷啪啪| 欧美性感艳星| 国产 一区 欧美 日韩| 男的添女的下面高潮视频| 青春草亚洲视频在线观看| 久久久久久久大尺度免费视频| 女人久久www免费人成看片| 亚洲一级一片aⅴ在线观看| 男人爽女人下面视频在线观看| 亚洲av中文字字幕乱码综合| 少妇人妻 视频| 日韩免费高清中文字幕av| 精品一区二区三卡| 欧美日韩视频精品一区| 久久国内精品自在自线图片| 久久av网站| 美女主播在线视频| 在现免费观看毛片| 黄色配什么色好看| 国产亚洲欧美精品永久| 极品教师在线视频| 99视频精品全部免费 在线| 777米奇影视久久| 久久久久国产精品人妻一区二区| 性高湖久久久久久久久免费观看| av又黄又爽大尺度在线免费看| 少妇人妻精品综合一区二区| 国产黄片美女视频| 免费不卡的大黄色大毛片视频在线观看| 亚洲人与动物交配视频| 久久久久久久久久人人人人人人| 亚洲精品国产色婷婷电影| 亚洲精品456在线播放app| 人人妻人人澡人人爽人人夜夜| 各种免费的搞黄视频| 亚洲欧美一区二区三区国产| 女人久久www免费人成看片| 亚洲国产欧美在线一区| 嘟嘟电影网在线观看| 高清午夜精品一区二区三区| 日韩av免费高清视频| 国产视频内射| 成人亚洲欧美一区二区av| 男女边吃奶边做爰视频| 中文字幕免费在线视频6| 肉色欧美久久久久久久蜜桃| 国产综合精华液| 乱码一卡2卡4卡精品| 日韩一本色道免费dvd| 亚洲色图综合在线观看| a级一级毛片免费在线观看| 精华霜和精华液先用哪个| 日本一二三区视频观看| 亚洲最大成人中文| xxx大片免费视频| 美女高潮的动态| 人人妻人人澡人人爽人人夜夜| 2018国产大陆天天弄谢| 直男gayav资源| 高清黄色对白视频在线免费看 | 男人狂女人下面高潮的视频| 亚洲av日韩在线播放| 成人18禁高潮啪啪吃奶动态图 | 最近中文字幕高清免费大全6| 国产精品久久久久久精品古装| 你懂的网址亚洲精品在线观看| 97在线视频观看| 内地一区二区视频在线| 肉色欧美久久久久久久蜜桃| 视频中文字幕在线观看| 精品一品国产午夜福利视频| 亚洲伊人久久精品综合| 熟女人妻精品中文字幕| 尾随美女入室| xxx大片免费视频| 国产精品久久久久久精品古装| 亚洲国产高清在线一区二区三| 伦理电影免费视频| 国产亚洲av片在线观看秒播厂| 免费高清在线观看视频在线观看| 亚洲欧美清纯卡通| 国产毛片在线视频| 亚洲av福利一区| 超碰97精品在线观看| 欧美xxⅹ黑人| 久久6这里有精品| 欧美一级a爱片免费观看看| av播播在线观看一区| 夜夜骑夜夜射夜夜干| 在线播放无遮挡| 搡女人真爽免费视频火全软件| 亚洲欧美中文字幕日韩二区| av福利片在线观看| 丰满乱子伦码专区| 在线观看一区二区三区激情| 欧美bdsm另类| 一级黄片播放器| 亚洲最大成人中文| 亚洲国产欧美在线一区| 欧美 日韩 精品 国产| 亚洲第一区二区三区不卡| 欧美一区二区亚洲| 国产成人精品一,二区| 一区二区三区精品91| 99久久精品国产国产毛片| 久久精品国产亚洲av涩爱| 爱豆传媒免费全集在线观看| 99热这里只有精品一区| 18禁在线播放成人免费| 久久精品国产鲁丝片午夜精品| 久久久午夜欧美精品| 美女内射精品一级片tv| 亚洲国产日韩一区二区| 亚洲精品国产成人久久av| 国产日韩欧美亚洲二区| 久久精品国产自在天天线| 日韩 亚洲 欧美在线| 国产高清不卡午夜福利| 亚洲欧美日韩卡通动漫| 久久毛片免费看一区二区三区| 亚洲av.av天堂| 超碰97精品在线观看| 午夜福利网站1000一区二区三区| 国产黄片视频在线免费观看| 中文资源天堂在线| 国产国拍精品亚洲av在线观看| 中文字幕制服av| 在线观看av片永久免费下载| 欧美zozozo另类| 日韩一区二区视频免费看| 少妇人妻 视频| 国产精品一二三区在线看| 夜夜看夜夜爽夜夜摸| 视频中文字幕在线观看| 18+在线观看网站| 国产精品人妻久久久影院| 久久久久久久国产电影| 国产真实伦视频高清在线观看| 2021少妇久久久久久久久久久| 少妇高潮的动态图| 男女边吃奶边做爰视频| 国产色婷婷99| 亚洲欧洲国产日韩| 欧美日韩亚洲高清精品| 国产精品无大码| 水蜜桃什么品种好| 寂寞人妻少妇视频99o| 91久久精品国产一区二区成人| 亚洲精品一二三| 各种免费的搞黄视频| 亚洲人成网站在线播| 只有这里有精品99| 国产精品久久久久久精品电影小说 | 少妇人妻一区二区三区视频| 三级国产精品片| 国产女主播在线喷水免费视频网站| 国产免费视频播放在线视频| 亚洲精华国产精华液的使用体验| 国产亚洲欧美精品永久| 成人美女网站在线观看视频| 日本vs欧美在线观看视频 | 国产在线免费精品| 亚洲精品国产成人久久av| 亚洲国产毛片av蜜桃av| 菩萨蛮人人尽说江南好唐韦庄| 久久精品久久久久久久性| 三级国产精品欧美在线观看| 国产精品久久久久成人av| 日韩,欧美,国产一区二区三区| 成人影院久久| 成人综合一区亚洲| 亚洲伊人久久精品综合| 国产久久久一区二区三区| 免费人妻精品一区二区三区视频| 久久精品夜色国产| 国产乱人视频| 男人爽女人下面视频在线观看| 色网站视频免费| 一区二区三区四区激情视频| 免费看光身美女| 成人漫画全彩无遮挡| 日韩欧美一区视频在线观看 | 大香蕉97超碰在线| 美女脱内裤让男人舔精品视频| 亚洲aⅴ乱码一区二区在线播放| 97超碰精品成人国产| 一边亲一边摸免费视频| 少妇精品久久久久久久| 久久久久久伊人网av| 狠狠精品人妻久久久久久综合| 国产精品国产三级专区第一集| 老司机影院成人| av天堂中文字幕网| av国产久精品久网站免费入址| 一个人看视频在线观看www免费| 舔av片在线| 成人午夜精彩视频在线观看| 啦啦啦在线观看免费高清www| 涩涩av久久男人的天堂| 国产伦精品一区二区三区视频9| 欧美成人精品欧美一级黄| freevideosex欧美| 99热全是精品| 午夜日本视频在线| 欧美xxxx性猛交bbbb| 日本黄大片高清| 高清欧美精品videossex| 人人妻人人澡人人爽人人夜夜| 久久97久久精品| 国产毛片在线视频| 国产综合精华液| 熟女av电影| 国产视频首页在线观看| 少妇的逼水好多| 午夜激情久久久久久久| 国产成人a区在线观看| 一级毛片 在线播放| 精品亚洲乱码少妇综合久久| 亚洲综合色惰| 尤物成人国产欧美一区二区三区| www.色视频.com| 在线亚洲精品国产二区图片欧美 | 亚洲精品亚洲一区二区| 99热6这里只有精品| 久久久亚洲精品成人影院| 国产精品久久久久久精品电影小说 | 久久精品久久精品一区二区三区| 成人高潮视频无遮挡免费网站| 午夜免费鲁丝| 不卡视频在线观看欧美| 免费观看性生交大片5| 亚洲国产精品999| 91久久精品国产一区二区三区| 成人一区二区视频在线观看| 97在线视频观看| 人妻 亚洲 视频| 高清av免费在线| 青春草视频在线免费观看| 国产亚洲91精品色在线| 成人综合一区亚洲| 夫妻午夜视频| 国产在线男女| 国产亚洲最大av| 成人午夜精彩视频在线观看| 精品一区在线观看国产| 国产精品人妻久久久久久| 国产亚洲最大av| 蜜桃在线观看..| 成人18禁高潮啪啪吃奶动态图 | 国产亚洲一区二区精品| 亚洲精品日韩av片在线观看| 狠狠精品人妻久久久久久综合| 久久精品久久久久久噜噜老黄| 精品99又大又爽又粗少妇毛片| 日本色播在线视频| 九九爱精品视频在线观看| 欧美bdsm另类| 伊人久久国产一区二区| 日韩三级伦理在线观看| 成年女人在线观看亚洲视频| 精品一区在线观看国产| 国产成人一区二区在线| 高清不卡的av网站| 网址你懂的国产日韩在线| 99久久综合免费| 成人亚洲精品一区在线观看 | 国产伦在线观看视频一区| 中国国产av一级| 高清视频免费观看一区二区| 久久99热这里只频精品6学生| 内射极品少妇av片p| 一区二区三区四区激情视频| 波野结衣二区三区在线| 午夜福利高清视频| 免费观看的影片在线观看| 欧美三级亚洲精品| 国产精品一区www在线观看| 久久久亚洲精品成人影院| 国产中年淑女户外野战色| 免费人妻精品一区二区三区视频| 嘟嘟电影网在线观看| 精品国产乱码久久久久久小说| 女的被弄到高潮叫床怎么办| 免费播放大片免费观看视频在线观看| 亚洲图色成人| 成人国产av品久久久| 少妇熟女欧美另类| 国产精品成人在线| 精品99又大又爽又粗少妇毛片| 亚洲国产av新网站| 国产亚洲av片在线观看秒播厂| 久久久久久久久大av| 国产成人a区在线观看| 精品久久久久久久久av| 久久亚洲国产成人精品v| 天美传媒精品一区二区| 波野结衣二区三区在线| 热99国产精品久久久久久7| 人妻夜夜爽99麻豆av| 51国产日韩欧美| 久久99蜜桃精品久久| 亚洲av不卡在线观看| 精品一区二区免费观看| 免费少妇av软件| 国产精品欧美亚洲77777| 国产又色又爽无遮挡免| 欧美日韩视频高清一区二区三区二| 欧美人与善性xxx| 91精品国产国语对白视频| 国产av精品麻豆| av不卡在线播放| 久久久亚洲精品成人影院| 欧美3d第一页| 少妇丰满av| 亚洲国产精品国产精品| 日韩三级伦理在线观看| 久久毛片免费看一区二区三区| 久久人人爽av亚洲精品天堂 | 女性被躁到高潮视频| 久久久久久九九精品二区国产| 少妇 在线观看| 欧美日韩视频精品一区| 伊人久久国产一区二区| 国产亚洲欧美精品永久| 亚洲无线观看免费| 免费观看无遮挡的男女| 免费观看在线日韩| 亚洲精品第二区| 亚洲欧美日韩无卡精品| 99热这里只有精品一区| 国产一区亚洲一区在线观看| 另类亚洲欧美激情| 精品少妇久久久久久888优播| 亚洲中文av在线| 一本久久精品| 边亲边吃奶的免费视频| 干丝袜人妻中文字幕| 26uuu在线亚洲综合色| av在线app专区| 少妇的逼好多水| 国产毛片在线视频| 王馨瑶露胸无遮挡在线观看| 亚洲欧美精品自产自拍| 最近的中文字幕免费完整| 黄片无遮挡物在线观看| 97在线人人人人妻| 午夜激情久久久久久久| 高清视频免费观看一区二区| 一区二区三区免费毛片| 高清黄色对白视频在线免费看 | 亚洲久久久国产精品| 久久午夜福利片| 交换朋友夫妻互换小说| 男人狂女人下面高潮的视频| 国产精品一及| 人人妻人人看人人澡| 日日摸夜夜添夜夜爱| 永久网站在线| 欧美丝袜亚洲另类| 少妇人妻久久综合中文| 午夜免费观看性视频| 青青草视频在线视频观看| 老司机影院毛片| 精品一区二区三区视频在线| 国产精品无大码| 中文字幕人妻熟人妻熟丝袜美| 日韩av免费高清视频| 内射极品少妇av片p| 亚洲va在线va天堂va国产| 成人毛片a级毛片在线播放| 亚洲精品456在线播放app| 日韩大片免费观看网站| 91精品一卡2卡3卡4卡| 久久 成人 亚洲| 亚洲第一区二区三区不卡| 人妻系列 视频| 久久精品久久久久久噜噜老黄| 久久国产精品男人的天堂亚洲 | 大陆偷拍与自拍| 狂野欧美白嫩少妇大欣赏| 少妇丰满av| 男人添女人高潮全过程视频| 校园人妻丝袜中文字幕| 免费观看av网站的网址| 久久人人爽人人片av| 搡女人真爽免费视频火全软件| 成年女人在线观看亚洲视频| 久久97久久精品| 国产精品一区二区性色av| 欧美3d第一页| 18禁裸乳无遮挡动漫免费视频| 91精品一卡2卡3卡4卡| 精品久久久久久久末码| 日韩一本色道免费dvd| 久久久久久人妻| 亚洲欧洲日产国产| 性高湖久久久久久久久免费观看| av女优亚洲男人天堂| 黄片wwwwww| 国产淫语在线视频| 久久6这里有精品| 国产女主播在线喷水免费视频网站| 嘟嘟电影网在线观看| 在线观看三级黄色| 国产成人freesex在线| 一本一本综合久久| 久久国产乱子免费精品| 免费黄频网站在线观看国产| 国产高清国产精品国产三级 | 免费黄色在线免费观看| 日本wwww免费看| 日韩一区二区视频免费看| 在线观看免费高清a一片| 国产免费一级a男人的天堂| 欧美成人精品欧美一级黄| 午夜激情久久久久久久| 九草在线视频观看| 国产老妇伦熟女老妇高清| 久久精品国产自在天天线| 成年女人在线观看亚洲视频| 啦啦啦视频在线资源免费观看| 男的添女的下面高潮视频| 国产91av在线免费观看| 男女边吃奶边做爰视频| 亚洲av二区三区四区| 国产精品99久久99久久久不卡 | 国产 一区精品| 国产免费又黄又爽又色| 色视频在线一区二区三区| 亚洲av日韩在线播放| 在线亚洲精品国产二区图片欧美 | 国产成人免费观看mmmm| 国产又色又爽无遮挡免| 精品久久久精品久久久| 国产亚洲5aaaaa淫片|