• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    2021-12-14 06:04:36MohammedMujibAlshahrani
    Computers Materials&Continua 2021年9期

    Mohammed Mujib Alshahrani

    College of Computing and Information Technology,The University of Bisha,Saudi Arabia

    Abstract:The term IoT refers to the interconnection and exchange of data among devices/sensors.IoT devices are often small,low cost,and have limited resources.The IoT issues and challenges are growing increasingly.Security and privacy issues are among the most important concerns in IoT applications,such as smart buildings.Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks,where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel.Thus,remote cybersecurity attacks are a significant threat.Emerging applications in smart environments such as smart buildings require remote access for both users and resources.Since the user/building communication channel is insecure,a lightweight and secure authentication protocol is required.In this paper,we propose a new secure remote user mutual authentication protocol based on transitory identities and multi-factor authentication for IoT smart building environment.The protocol ensures that only legitimate users can authenticate with smart building controllers in an anonymous,unlinkable,and untraceable manner.The protocol also avoids clock synchronization problem and can resist quantum computing attacks.The security of the protocol is evaluated using two different methods:(1)informal analysis;(2) model check using the automated validation of internet security protocols and applications (AVISPA) toolkit.The communication overhead and computational cost of the proposed are analyzed.The security and performance analysis show that our protocol is secure and efficient.

    Keywords:Internet of things;threats;smart building;attacks;remote access;authentication;smart buildings

    1 Introduction

    In the last few years,the world has witnessed a huge revolution in information and computing technologies of the 21st century.Internet of Things (IoT) is one of the most emerging releases of this revolution [1].

    The core concept of IoT is adding sense to non-living objects to perform the information processing and take decisions automatically without any presence of human or living bodies’functionality in the system,and bring all physical entities in one affordable integrated digital fold sharing defined communication system among it [2].

    IoT network composes various physical entities together in the same networks,and most of these entities are not well manufactured for IoT systems.Hence,these embedded devices do not include and support high-security mechanisms.Thus,it will be exposed to various malicious attacks in both privacy and security dimensions.While the cybersecurity issues are gradually increasing with the increase of the IoT capacities of adapting entities,the heterogeneous entities introduce new security and privacy issues.Recently,many IoT devices were brought down by a distributed denial of service (DDoS) attack carried out using the Mirai IoT botnet [3].Mirai propagates by brute-forcing IoT devices using a list of common,default passwords to attempt to log into the IoT devices.Thus,depending only on password-based authentication is a weak method as passwords are often easy to guess by attackers launching brute-force attacks.

    1.1 Related Work

    Several proposals have been published on user authentication [4-8].Recent progress in user authentication has focused on incorporating context information.Many contributions incorporated various types of context information,namely physical contexts,device contexts,and historical information,among others.

    Among these contributions,Jeong et al.[4]introduced a one-time password-based user authentication scheme using a smart card for a smart home.This scheme is lightweight because it depends on one-way hash function operations.However,the scheme failed to achieve some important security properties:mutual authentication between GWN and smart devices,traceability,unlinkability,and user anonymity.

    Han et al.[9]proposed a secure key agreement scheme for smart home systems.The proposed scheme is suitable for consumer electronics devices in a smart home.

    Li [10]proposed a lightweight key establishment protocol,and an initial session key was established between the nodes and control.The mutual authentication between the user and control was not provided in their scheme.

    Santoso et al.[11]introduced a remote user authentication scheme for a smart home using elliptic curve cryptography (ECC).The authors did not achieve two key security properties,named anonymity and traceability.Furthermore,the scheme is susceptible to privileged-insider and stolen smart card attacks.

    Kumar et al.[6]introduced a lightweight and secure session key establishment scheme for IoT smart homes.They capitalized on a short authentication token to establish a session key between and smart device.

    Recently,Shuai et al.[12]proposed a remote authentication scheme for smart homes using ECC.The authors eliminate the need to store the verification table for authentication purposes.However,the authors failed to provide satisfactory performance.

    1.2 Motivations and Contributions

    Although researchers have proposed some remote user authentication schemes for smart buildings,they are not lightweight or secure enough to be suitable for the smart building nodes due to resources-constraints nature of such sensors.Besides,few mutual authentication and key agreement schemes have been proposed.Moreover,almost none of these contributions considered using physical context awareness (i.e.,location awareness) and transaction history for authentication.Motivated by the importance of authentication based on location awareness and transaction history for remote access in IoT smart building,this paper devoted to design a secure scheme not only provides mutual authentication but also achieves some important security properties such as anonymity,untraceability and unlinkability of transmitted information as well as authentication based on location awareness and transaction history.The contributions of this paper are as follows:

    · We propose a new anonymous remote user mutual authentication protocol designed for the IoT smart building network.Our protocol guarantees key security properties:confidentiality,integrity,anonymity,unlinkability,and untraceability [13].

    · Our protocol avoids the clock synchronization problem by not relying on timestamps to ensure safe protection against message reuse attacks,and it also can stop quantum computing attacks.

    · We propose location awareness and transaction history to improve the authentication process of the user remote access of IoT smart buildings.

    · The security of our protocol is proved by using the widely accepted Burrows-Abadi-Needham (BAN) logic,and assessed by using the AVISPA simulator tool.Besides,an informal security analysis of the proposed scheme is discussed.

    · We compare our proposed protocol with other related protocols.Comparison results show that our protocol is more secure and efficient than the previously proposed related protocols.

    1.3 Organization of the Paper

    The remaining parts of this paper are structured as follows.In Section 2,we describe the proposed system model.In Section 3,we describe in depth our secure protocol.In Section 4,we evaluate the security of our protocol.In Section 5,we evaluate the performance of our protocol.Finally,Section 6 concludes the paper.

    2 System Model

    This section introduces the used network model and adversary model of the proposed scheme.

    2.1 Network Model

    The network model consists of four entities,namely registration authority (RA),the end-user,the smart building controller node (CRN),and the smart device (SD) in the building (see Fig.1).

    Every time the end-user wishes to access the IoT smart building devices remotely,they have to provide the building controller with their current location.Moreover,we employ transaction history in our system in a lightweight way.We cryptographically hash the transactions between the building controller and the user in a secure way.Then,we capitalize on these hashed transactions to improve the authentication process in our system.Thus,we combine location awareness and hashed transaction history to enhance user remote access to IoT smart buildings.

    We introduced two different techniques that were derived from the transaction histories:first,a robust cumulative cryptographically-hashed historical transactions (CCHH) technique based on a one-way cryptographic hash function is used to validate and ensure the integrity of the data transmitted between the end-user and the building controller,and to maintain the anonymity of the communication parties;second,a robust cumulative location tracker (CLT) technique is used to ensure the genuineness of the user and the freshness of the temporary session keys.These CCHH and CLT techniques are briefly explained,as follows:

    · Cumulative cryptographically-hashed historical transactions (CCHH)

    Figure 1:High-level architecture of smart building environment

    At the core of the proposed protocol is a lightweight challenge-response mechanism that relies on a chain of cryptographically-hashed historical transactions (CCHH) of all communication sessions between the user and the controller.The user and the controller maintain a synchronized database,called CCHH database,containing hashes generated during previous authentication sessions singed with the temporal session secret keys that change in every session.The synchronized CCHH database’s values are utilized in generating the transitory identities of both the user and the controller,where transitory identities TID is constructed by hashing the real identity and thexCCHH.Note that x denotes the corresponding cumulative cryptographically-hashed historical transactions value that is stored in CCHH database.The use of the transitory identities improves the smart building’s privacy by achieving key security properties,namely,anonymity,unlinkability and untraceability.

    · Cumulative location tracker (CLT)

    A physical context awareness,namely location,is employed in our system to check if a mobile device’s current location is approximate to the previously recorded location within a given time.The location of the mobile device is checked using the linear motion equation (ΔLMAX=V* ΔT) to calculate the time it would take a given user to move from a previous location to a current location,where ΔT denotes the time required for a user to move from the previous location Lp to the current location Lc.In contrast,V denotes the maximum velocity that the user could have.These locations from all sessions (previous locations+current locations) between the mobile device and the controller are cumulatively hashed and stored securely in a synchronized database,called CLT database,maintained by both the mobile device and the controller.These synchronized databases of cumulative hashes are capitalized on to achieve a challenge-response authentication between the mobile device and the controller to stop remote attacks such as Mirai attack.Meaning that,in case of suspicion of remote access attack,the controller challenges the knowledge of the mobile device about the previous locations stored in the database,the mobile device then has to send back the correct corresponding location;Otherwise,the session is terminated,and the mobile device is flagged as a malicious.Moreover,the synchronized CLT database’s values can generate the temporal session secret keys between the mobile device and the controller.The session secret SK is constructed by hashing the secret key and thexCLT.Note that x denotes the corresponding cumulative cryptographically-hashed location tracker value that is stored in CLT database.

    In our system,data security between the end-user and the IoT smart device is ensured by encrypting the payload using the AES 128 CCM algorithm (16 Bytes).According to a report on lightweight cryptography done by Kerry McKay from The National Institute of Standards and Technology [14],AES 128 CCM (Counter with CBC-MAC) mode is by far the most widely used-symmetric key algorithm.It can also be chosen which would provide additional benefit of data integrity.

    2.2 Adversary Model

    To evaluate the security properties of the proposed scheme,we define the adversarial model as follows.

    · The CRN is assumed trustworthy.However,an attacker may be able to infiltrate HN’s database.He may steal or manipulate database information.

    · The attacker can eavesdrop on all communication links in the network.He can also damage or replace transmitted messages or replay previously sent messages.

    · An attacker can capture any IoT node N.

    · We consider the well-known Dolev-Yao threat model [15].It assumes that two communicating parties communicate over an insecure channel.We rely on this model to provide the security analysis and simulation of our scheme.

    3 Proposed Scheme

    In this section,a secure remote user access authentication protocol based on transitory identities and multi-factor authentication is presented for IoT smart building systems,which resists all known attacks and supports the desirable security features.The abstract notations used to describe our authentication protocol are listed in Tab.1.The proposed protocol consists of four phases:(1) initialization phase;(2) registration phase;(3) login and authentication phase;and(4) password change phase.These phases are explained as follows:

    3.1 Initialization Phase

    The manufacturer does the initialization phase before the devices are handed to the owner of the smart building.The mobile device will be loaded with a unique symmetric keyKurshared between the registration authority RA and the mobile device.Lastly,the controller will be loaded with a unique symmetric keyKgrshared between the registration authority and controller.

    3.2 Registration Phase

    When the user first turns on the mobile device,the user picks up an identityIDUiand a password PWi.Next,the user sends his/her identity and password to RA in a secure way,using the shared symmetric key Kur.

    When RA receives the message,it will store the mobile device information,and generate a temporary identity for the userIDUiand temporary secret key TSK,and computes the following parameters:

    where SN,DMN,ESN are context information of the mobile device namely serial number,device manufacturer name,and unique equipment serial number,respectively.

    RA also generates INV1 and INV2 to be used as initial values by both mobile device and controller for CKH and CLT technique,respectively.Then,RA sends {IDUi,TSK,S1,S2,INV1,INV2} and {IDUi,TSK,SN,DMN,ESN,S1,INV1,INV2} to Ui and controller using the shared secret keys Kur and Kgr,respectively (see Fig.2).

    Figure 2:Registration phase of the proposed protocol

    Table 1:Notations used in our protocol

    3.3 Login Phase

    The user enters his/her identityIDUiand password PWi into mobile device,the mobile device computes *S1=h(IDUi,TSK,SN,DMN,ESN) and checks if *S1=S1.If they match,the user is considered legitimate and can access the application on his/her mobile device.Otherwise,the mobile device drops the login request,increments the value of the counter by 1,and check if it reaches the predetermined value,for instance,3.If the number of attempts exceeds the predetermined value,the mobile device terminates the login request immediately until the user re-register.

    3.4 Authentication Phase

    When Ui wishes to control any IoT device in the smart building,it will have to authenticate themselves with the controller first.Hence,they will follow the below steps:

    A:At User Mobile Device:

    (1) Ui accesses the mobile device and enter the correct usernameIDUiand passwordPWi.

    (2) Mobile device computes *S1=h(IDUi,PWi,SN,DMN,ESN).

    (3) Mobile device checks if *S1=S1.

    (4) Mobile device computesTIDUi1=h(IDUi,ISV1)

    (5) Mobile device computesDIDCRN1=h(IDCRN,ISV1)

    (6) Mobile device computes SK1=h(TSK,ISV1)

    (7) Mobile device extracts current location Lc

    (8) Mobile device creates the message UC=Lc ||IDSD⊕S1

    (9) Mobile device Prepare M={DIDCRN1,TIDUi1,UC}

    (10) Mobile device computes HF=h(M,SK1,ISV1)

    (11) Mobile device sends {DIDCRN1,TIDUi1,UC,HF} to the controller

    (12) Mobile device updatesxCCHH=h(HF,SK1)

    (13) Mobile device updatesxCLT=h(Lc,INV2)

    B:At Smart Building Controller Device:

    (1) Controller receives the message {DIDCRN1,TIDUi1,UC,HF}

    (2) Controller checksDIDCRN1andTIDUi1

    (3) Controller computes SK1=h(TSK,ISV1)

    (4) Controller computes M={DIDCRN1,TIDUi1,UC}

    (5) Controller checks *HF=h(M,SK1,ISV1)

    (6) Controller updatesxCCHH=h(HF,SK1)

    (7) Controller computes Lc ||IDSD=UC ⊕S1

    (8) Controller checks the genuineness of Lc using the formula (ΔLMAX=V * ΔT).If it is legitimate,the controller will update the cumulative location trackerxCLT=h(Lc,INV2).Otherwise,controller challenges mobile devices knowledge of one of the previous CLT values.

    (9) Controller generates a nonce N (session secret key between Ui and SD).

    (10) Controller sends the {TIDUi1,N} to SD in a secure way.

    (11) Controller computes SK2=h(SK1,xCCHH)

    (12) Controller computes CU=DIDSD|| N ⊕S1

    (13) Controller prepares M={TIDUi1,DIDCRN1,CU}

    (14) Controller computes HF=h(M,SK2,xCCHH)

    (15) Controller sends {TIDUi1,DIDCRN1,CU,HF} to Ui

    (16) Controller updatesx+1CCHH=h(HF,SK2)

    (17) Controller computesTIDUi2=h(IDUi,x+1CCHH) for upcoming session with Ui

    (18) Controller computesDIDCRN2=h(IDCRN,x+1CCHH) for upcoming session with Ui

    C:At User Mobile Device:

    (1) Mobile device computes SK2=h(SK1,xCCHH)

    (2) Mobile device checks *HF=h(M,SK2,xCCHH)

    (3) Mobile device computes CU ⊕S1=DIDSD||N

    (4) Mobile device updatesx+1CCHH=h(HF,SK2)

    (5) Mobile device usesDIDSDand N to establish a secure communication session with SD.

    (6) Mobile device computesTIDUi2=h(IDUi,x+1CCHH) for upcoming session with CRN

    (7) Mobile device computesDIDCRN2=h(IDCRN,x+1CCHH) for upcoming session with CRN

    The above steps are summarized in Fig.3.By the end of processing each message,CCHH database is updated (see Fig.4),and by the end of each session,CLT table is updated (see Fig.5).

    Figure 3:Authentication phase of the proposed scheme

    Figure 4:Cumulative cryptographically-hashed historical transactions (CCHH) table

    Figure 5:Cumulative location tracker (CLT) table

    3.5 Password Update Phase

    In this section,the user Ui can change his/her password without any interaction with CRN by performing the following operations.

    (1) Ui enters the identityIDUiand the password PWi into GUI of mobile device.

    (2) Mobile device computes *S1 and checks if *S1=S1.If it is not hold,the mobile device rejects the password change request.Otherwise,the mobile allows Ui to enter a newIDUiand Pwi.

    (3) The mobile device then transmits the newIDUiand PWi to RA.

    (4) The RA updates S1 and sends it to CRN.

    3.6 Challenge-Response Mechanism Based on Transaction History

    As aforementioned in the previous section,Ui and CRN securely maintain two synchronized databases,namely CCHH and CLT,of cumulative hashed values.These values can be capitalized on to introduce a historical factor for authenticating Ui,as illustrated in Fig.6.Authentication using a historical factor helps us achieve mutual authentication through a challenge-response process,where mutual authentication is so important in securing communication between devices.This two-way challenge/response allows the controller to verify the authenticity of Ui,so that it can stop malicious attacks such as the Mirai attack.Cumulative hash history-based authentication challenges Ui to show a proof of knowledge of past cumulative hash values.The approach involves securely storing the cumulative hash values related to the interaction over time between the Ui and CRN in CCHH and CLT databases.Thus,when CRN receives an authentication request message from Ui,it triggers a challenge/response process.It generates a challenge c (information about random cumulative hash valuexCCHHstored previously),hashes the challenge c with the secret key andxCLTh(SK,c,xCLT),and sends it to Ui.

    Figure 6:Historical authentication process

    Ui sends the response back using h(SK,r,xCLT),where r is the response (cumulative hash valuexCCHH).Once CRN receives the response,it checks if the receivedxCCHHvalue is correct.If yes,CRN will accept Ui and resume the authentication process.Otherwise,Ui will be rejected and flagged as malicious.

    It is worth mentioning that the challenge-response mechanism is triggered by CRN when the Lc,that is provided by Ui,is not approximated.

    4 Security Analysis

    In this section,we discuss different known attacks,and we explain how our protocol successfully resists such attacks.

    4.1 Informal Security Analysis

    In the following,we analyze different important adversarial attacks/security properties and how our scheme stops these attacks and achieves these properties.

    4.1.1 Replay Attack

    The replay attack is defeated using CCHH and CLT’s cumulative values that security change in every message.Furthermore,the mobile device and the controller use secure unique identities in every session.Besides,the keyed-hash message authentication cod (HF) value,which is attached in each message,changes in every single message.Hence,replay attack is detected.

    4.1.2 Eavesdropping Attack

    In the authentication phase of our scheme,an adversary A can record all transmitted parameters between Ui and CRN.He collects the tuple 〈DIDCRN1,TIDUi1,UC,HF〉 from Ui to CRN,and the tuple 〈TIDUi2,DIDCRN2,CU,HF〉 from CRN to Ui.Notice that the session key SK1=h(TSK,ISV1).From the intercepted parameters,A cannot reach TSK and ISV1 because they are protected by the one-wayness of h (.).Moreover,A cannot computexCCHH=h(HF,SK1)orxCLT=h(Lc,INV2) because he does know SK1 or Lc or INV2.The same is applied to the parameters sent from CRN to Ui.Therefore,the privacy of the SK1,SK2,xCCHH,xCLT,and Lc are preserved,and hence,the scheme protects against an eavesdropping attack.

    4.1.3 Impersonation Attack

    This attack is stopped using theTIDUiand HF,which are protected using the one-way hash function.Besides,TIDUiis constructed from different secure parameters TIDUi=h(IDUi,ISV1),and change in every message as ISV1 is updated in every message.Hence,the attacker is unable to create a valid temporary identity without the correspondingIDUi,ISV1.

    4.1.4 Man-in-the-Middle Attack

    Our protocol is protected against this attack usingTIDUi,N,and HF.So,this attack can be defeated.

    4.1.5 Attack Against the Temporary Secret Key

    This attack is defeated using the temporary secret key SK and N,which change in every session.Moreover,SK is constructed using secure parameters and protected using a one-way hash function.

    4.1.6 Forward/Backward Security

    The forward/backward security is an important security property,which means that any past or future sessions keys will not be affected when any temporary session key is exposed.Forward/backward security is achieved using theSKand N,which dynamically change in every session.

    4.1.7 Session Key Guessing Attack

    This attack is defeated using theSKand N,which dynamically change in every session.

    4.1.8 Quantum Attacks

    Recent advances in quantum computing put the security of the current IoT at risk using these cryptographic schemes.Grover’s algorithm speeds up this process of brute force search dramatically using quantum computers.Thus,we rely on hash functions and symmetric schemes that are relatively easy to prevent quantum attacks by enlarging key and output sizes.

    4.1.9 User Credentials Attack

    In our proposed protocol,the user UI never stores its identity IDUi and password PWi credentials in its mobile device’s memory because it stores the hash value S1,contributing to verifying IDUi and PWi entered by the user.When the attacker tries to obtain user credentials from S1 physically,they will fail as the one-way hash function protects S1.Hence,our proposed protocol can successfully stop the user credentials attack.

    4.1.10 User Anonymity,Unlinkability and Untraceability

    User anonymity unlinkability and untraceability are crucial security properties in the authentication.Anonymity ensures the mobile device’s real identity is kept secure and the mobile device remains unidentifiable among the other set of devices.Thus,the attacker cannot identify the devices’real identities as the real identity of the mobile device is kept secure and we use transitory identities that change in every session.We also ensured that an attacker cannot link the different sessions initiated by a particular mobile device to the same UI.Also,the adversary cannot relate two or more sessions to the same Ui.Hence,our protocol achieves anonymity,unlinkability,and untraceability of the conducted sessions.

    4.1.11 Authentication Based on Cumulative Hashed Transaction History and Location

    GPS location is utilized in our protocol to check whether mobile device’s previous location is proximate to the current location.Tracking the GPS location of Ui will contribute to stopping remote cybersecurity attacks such as the as discussed in this Section Mirai attack.Additionally,both CRN and Ui maintain a synchronized database of cumulative hashes generated from the previous sessions,as discussed in this Section.These synchronized databases improve the overall security by applying the challenge/response mechanism and ensuring the uniqueness and freshness of the identities and established sessions;thus,securing the smart building system from known attacks.

    4.2 Formal Proof Based on BAN Logic

    The BAN logic was introduced by Burrows et al.[16]in 1989.It is a widely accepted model to describe and analyze authentication protocols.It has been widely employed to verify the protocols’security and provide proof of correctness of the authentication protocols [17].Hence,we capitalize on it to formally prove that our authentication scheme achieves mutual authentication between an IoT device N and controller C.

    We start by presenting a summarized introduction about the important symbols and the rules of BAN logic.Then,we will proceed with our formal proof.

    4.2.1 BAN Logic Overview

    Let N (client) and C (server) be participators,and let X and Y denote a parameter,formula or expression.We define the following notations:

    · N | ≡X:N believes the statement X.

    · # (X):X is fresh.

    · N |=?X:N has jurisdiction over the statement X.

    · N ?X:N sees the statement X.

    · N |~X:N once said the statement X.

    · (X,Y):X or Y is one part of the formula (X,Y).

    · 〈X〉Y:X combined with Y.

    · NK?C:K is a secret parameter shared (or to be shared) between N and C.

    · N ?C:X is a secret known only to N and C,and possibly to parties trusted by them.

    Furthermore,the following commonly used BAN logic rules are utilized to prove that our authentication scheme ensures secure mutual authentication and key agreement,as follows:

    · Message meaning rule:If N sees X encrypted with Y and if N believes Y is a secret key

    shared with C,then N believes C once said X.

    · Nonce verification rule:If N believes X is fresh and N believes C once said X,then N believes C believes X.

    · Jurisdiction rule:If N believes C has jurisdiction over X and N believes C believes X,then N believes X.

    · Freshness conjuncatenation rule:If one part of a formula is fresh,then the entire formula must also be fresh;so,if N believes X is fresh,then N believes X and Y are fresh.

    · Belief rule:If N believes X and Y,then N believes X.

    · Observation rule:If N sees X and Y,then N sees X.

    4.2.2 Goals of the Analysis of our Authentication Scheme

    In this section,we define the main goals of the analysis of our authentication scheme as follows:

    · Goal 1:CRN believes Ui believesSK1 is a secure,shared parameter between Ui and CRN.

    · Goal 2:CRN believesSK1 is a secure,shared parameter between Ui and CRN.

    · Goal 3:Ui believes CRN believesSK2 is a secure,shared parameter between Ui and CRN.

    · Goal 4:Ui believesSK2 is a secure,shared parameter between Ui and CRN.

    4.2.3 Messages Transferred in the Authentication

    The idealized messages that are exchanged in the authentication phase between a user Ui and the controller CRN are listed below:

    · M1:Ui→CRN:〈DIDCRN1,DIDUi1,UC,HF〉Ui

    SK1?CRN

    · M2:CRN→Ui:〈DIDUi2,DIDCRN2,CU,HF〉Ui

    SK1?CRN

    4.2.4 Introductory Assumptions

    The fundamental assumptions of our authentication scheme are as follows:

    · A1:CRN believes ISV1is fresh:CRN|≡#(ISV1)

    · A2:CRN believesHFis fresh:CRN|≡#(HF)

    · A3:Ui believes CCHH is a secure,shared parameter between Ui and CRN:Ui |≡

    · A4:CRN believesISV1 is a secure,shared parameter between Ui and CRN:CRN |≡

    · A5:Ui believes CRN has jurisdiction over CCHH,SK2,and HF:Ui|≡CRN|?{CCHH,SK2,HF}

    · A6:CRN believes Ui has jurisdiction over ISV1,SK1 and HF:CRN|≡Ui|?{ISV1,SK1,HF}

    4.2.5 Analysis of our Authentication Scheme

    We now start analyzing our authentication scheme to prove that our scheme achieves mutual authentication between Ui and CRN.S1:According to the M1,we get:

    S2:From assumption A4 and S1,and by applying the message meaning rule,we derive:

    S3:From assumption A1 and by applying the freshness rule,we derive:

    S4:From derivations S3 and S2,and by applying the nonce verification rule,we derive:

    S5:According to the M2,we get:

    S6:From assumption A3 and derivation S5 and by applying the message meaning rule,we derive:

    S7:From assumptions A1 and A2,and applying freshness-conjuncatenation rule,we get:

    S8:From derivations S6,S7 and applying nonce-verification rule,we get:

    S9:From A6 and derivations S4 and applying jurisdiction rule,we get:

    S10:From derivations S3,S4 and applying session keys rule,we get:

    S11:From derivation S10 and assumption A6 and applying jurisdiction rule,we get:

    S12:From derivations S7and S8 and applying session keys rule,we get:

    S13:From assumption A5,and derivation S12,and by applying jurisdiction rule,we get:

    Hence,our authentication scheme achieves mutual authentication and key agreement between Ui and CRN.

    4.3 Simulation Based on AVISPA Tool

    Our protocol is evaluated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit,which is widely used as a toolkit in the research community for security protocol validation [18].Fig.7 depicts the HLPSL code for role UI.

    Figure 7:HLPSL code for the role played by the user UI

    The simulation via AVISPA is done using two widely-accepted back-end model checkers:The On-the-Fly Model-Checker (OFMC) and the Constraint Logic-based Attack Searcher (CL-AtSe).

    Fig.8 shows the CL-AtSe back-end checker report that assures that our protocol is SAFE and free from attack.Fig.9 shows the OFMC back-end checker report,which proves that our protocol is SAFE and satisfies the specified security goals.

    Figure 8:CL-AtSe validation results

    Figure 9:OFMC validation results

    However,we were not able to use the TA4SP back-end model checker due to its limitation in supporting XOR operation,while The SATMC model checker has reported NOT SUPPORTED.

    5 Performance Evaluation

    In this section,we evaluate our protocol’s performance in terms of communication overhead and computation costs.

    5.1 Communication Overhead

    The length of the parameters of the transmitted messageDIDCRN1,TIDUi1,UC,HF,CU are 128 bits,128 bits,256 bits,160,and 256 bits,respectively.

    In our proposed protocol,the transmitted messages Ui→CRN and CRN→Ui require(128+128+256+160)=681 bits,(128+128+256+160)=681 bits,respectively.The communication overheads of our scheme are shown in Tab.2.Also,it can be noticed that our protocol requires only two messages for a successful mutual authentication between Ui and CRN.

    Table 2:Communication cost of our protocol

    5.2 Computation Cost

    Our protocol is computationally lightweight designed for IoT smart building.Our protocol ensures high security using only a simple hash function and XOR computations;Hence consuming little computation overheads.However,this protocol’s novelty is adding multiple security layers (e.g.,GPS location tracker,CCHH and CLT technique,challenge/response mechanism,and ensuring transitory identities,it also provides relatively low computation cost.

    Our protocol uses two operations as aforementioned,namely XOR operation and oneway hash function.LetThandTxorbe the computation times of one hash and one XOR operations,respectively.Considering the authentication steps involved in our protocol and outlined in Fig.3,the Ui performs 7 hash and 1 XOR operations,which yields a total computation cost of 12 ×Th+2 ×Txor.The computation time of XOR operation is very trivial and can be ignored,so we can assumeTxor≈0.On the other hand,the controller node CRN performs 10 hash and 2 XOR operations,which yield a total computation cost of 10 ×Th+2 ×Txor.Therefore,the total computation cost of N is 10 ×Th+2 ×Txor≈10Th,while the computation cost of CRN corresponds to 10 ×Th+2 ×Txor≈10 ×Th.The computation cost is summarized in Tab.3.

    Table 3:Computation cost of our protocol

    5.3 Comparisons with Recent Schemes

    We present a comparison between our proposed scheme and other most related schemes in terms of communication cost based on transmissions in both directions between IoT node and gateway.We use the number of exchanged messages for a successful authentication as the key to the communication cost comparison.As presented in Tab.4,our scheme requires 4 messages and 2304 bits total number of bits for successful mutual authentication.In general,the comparison shows that our scheme is comparatively more cost-efficient than the other related works in terms of the number of exchanged messages and the total number of bits,and just a little less cost efficient than that of Kumar et al.[6]because our scheme adds additional functionality and security features are not provided by Kumar et al.;such as mutual authentication between the user and smart device,mutual authentication between user and gateway,password guessing attack,password change attack,stolen smartphone/smart card attack,and password change phase,physical context awareness (i.e.,location awareness),and historical authentication.

    Table 4:Comparison of communication cost between the proposed scheme and other most related schemes

    It can be observed that our protocol is comparatively more cost-efficient.

    6 Conclusion

    We proposed,in the current paper,a secure remote mobile device authentication protocol.The proposed protocol allows only legitimate users to authenticate with the IoT devices via the smart building getaway and exchange a symmetric session key for future secure communications.The security evaluation of the protocol,both through informal analysis and formal model checking (using AVISPA toolkit),shows that our scheme is secure against known attack techniques.

    Despite the encouraging results,more work remains to be done.In our future work,we will implement the proposed protocol using OMNET++and conduct live security tests using penetration testing tools such as Kali Linux.We will also explore how to strengthen our framework’s securit to thwart impersonation by adapting continuous authentication schemes,such as the approach proposed by Tsai et al.[19].In their work [19],Tsai et al.introduced a passive continuous authentication system based on physiological and soft biometrics technologies,where face recognition is mainly used to control the authentication process In contrast,soft biometric is used to prevent and deal with any potential security breach,such as account hijacking.

    Acknowledgement:The authors would like to thank University of Bisha for support him doing this research.

    Funding Statement:The author received no specific funding for this study.

    Conflicts of Interest:The author declares that he has no conflicts of interest to report regarding the present study.

    日本三级黄在线观看| 两个人的视频大全免费| 欧美97在线视频| 在现免费观看毛片| 亚洲av一区综合| 一区二区三区精品91| 亚洲国产日韩一区二区| 久久精品国产鲁丝片午夜精品| 女人十人毛片免费观看3o分钟| 美女主播在线视频| 波野结衣二区三区在线| 亚洲天堂国产精品一区在线| 色婷婷久久久亚洲欧美| 我要看日韩黄色一级片| av播播在线观看一区| 伊人久久精品亚洲午夜| 精品人妻一区二区三区麻豆| 毛片女人毛片| 欧美另类一区| 精品国产乱码久久久久久小说| 高清午夜精品一区二区三区| 亚洲av成人精品一区久久| 国产 精品1| 久久6这里有精品| 日韩三级伦理在线观看| 午夜福利高清视频| 亚洲国产精品999| 国产v大片淫在线免费观看| 好男人视频免费观看在线| 色哟哟·www| 3wmmmm亚洲av在线观看| av福利片在线观看| 亚洲av中文字字幕乱码综合| 中文字幕亚洲精品专区| 插阴视频在线观看视频| 日本猛色少妇xxxxx猛交久久| 成人黄色视频免费在线看| 少妇高潮的动态图| 国产成人a区在线观看| 一区二区三区乱码不卡18| 精品久久久久久久久亚洲| 国产 一区 欧美 日韩| 少妇熟女欧美另类| 69人妻影院| 一本一本综合久久| 一区二区三区精品91| 大香蕉久久网| 精品视频人人做人人爽| 免费看日本二区| 日本免费在线观看一区| 午夜视频国产福利| 在线亚洲精品国产二区图片欧美 | 亚洲欧洲国产日韩| 久久热精品热| 国产黄色免费在线视频| 亚洲精品自拍成人| 亚洲av成人精品一二三区| 日韩精品有码人妻一区| 亚洲精品国产av蜜桃| 欧美性感艳星| 王馨瑶露胸无遮挡在线观看| 精品一区二区三区视频在线| 内地一区二区视频在线| 亚洲在久久综合| 久久99精品国语久久久| 啦啦啦在线观看免费高清www| 久久久久久国产a免费观看| 亚洲精品国产成人久久av| 色哟哟·www| 王馨瑶露胸无遮挡在线观看| 熟女人妻精品中文字幕| 在线免费观看不下载黄p国产| 直男gayav资源| 国产毛片在线视频| 成年女人看的毛片在线观看| 成人黄色视频免费在线看| 97人妻精品一区二区三区麻豆| 久久久久久久大尺度免费视频| 国产av国产精品国产| 又大又黄又爽视频免费| 亚洲av欧美aⅴ国产| 黄色一级大片看看| 国产伦精品一区二区三区四那| 亚洲美女搞黄在线观看| 51国产日韩欧美| 午夜福利视频1000在线观看| 舔av片在线| 视频区图区小说| 在线观看av片永久免费下载| 人体艺术视频欧美日本| 国产有黄有色有爽视频| 亚洲精品自拍成人| 精品国产一区二区三区久久久樱花 | 精品一区二区三卡| 婷婷色av中文字幕| 亚洲人与动物交配视频| 亚洲熟女精品中文字幕| av天堂中文字幕网| 国产成人freesex在线| 小蜜桃在线观看免费完整版高清| 免费黄网站久久成人精品| 青春草国产在线视频| 亚洲综合精品二区| 毛片一级片免费看久久久久| 观看美女的网站| 国产黄a三级三级三级人| 国产精品一及| 欧美日韩精品成人综合77777| 一区二区三区精品91| 在线观看av片永久免费下载| 亚洲第一区二区三区不卡| 免费看光身美女| 熟女av电影| 秋霞伦理黄片| 涩涩av久久男人的天堂| 久久精品国产亚洲av天美| 国产精品国产三级国产专区5o| 国模一区二区三区四区视频| 91在线精品国自产拍蜜月| 男女边吃奶边做爰视频| 国产国拍精品亚洲av在线观看| 国产成人免费观看mmmm| 五月伊人婷婷丁香| 亚洲精品日韩av片在线观看| 在线观看av片永久免费下载| 亚洲国产高清在线一区二区三| 亚洲成色77777| 国产探花极品一区二区| 国产伦理片在线播放av一区| 亚洲av中文字字幕乱码综合| 国产一区有黄有色的免费视频| 精品人妻一区二区三区麻豆| 欧美日韩亚洲高清精品| 91精品国产九色| 干丝袜人妻中文字幕| 亚洲人与动物交配视频| 熟女人妻精品中文字幕| 日韩欧美精品免费久久| 18禁在线无遮挡免费观看视频| 久久99热这里只频精品6学生| 一级毛片久久久久久久久女| 欧美一区二区亚洲| 综合色丁香网| av在线天堂中文字幕| av一本久久久久| 狂野欧美激情性xxxx在线观看| 午夜激情久久久久久久| xxx大片免费视频| 少妇丰满av| 亚洲怡红院男人天堂| 日韩中字成人| 精品人妻视频免费看| 国产黄频视频在线观看| 亚洲av中文av极速乱| 国产乱人视频| 午夜福利高清视频| 久久精品人妻少妇| 国产免费一级a男人的天堂| 午夜福利在线观看免费完整高清在| 欧美xxⅹ黑人| 精品国产一区二区三区久久久樱花 | 亚洲精品乱码久久久久久按摩| 夜夜看夜夜爽夜夜摸| 99视频精品全部免费 在线| 亚洲欧美精品自产自拍| 国产乱人视频| 成人毛片a级毛片在线播放| 在线观看av片永久免费下载| 日韩av不卡免费在线播放| 国产精品国产三级专区第一集| av播播在线观看一区| 97人妻精品一区二区三区麻豆| 亚洲成人中文字幕在线播放| 最新中文字幕久久久久| 少妇被粗大猛烈的视频| 日韩制服骚丝袜av| 99久久精品热视频| 视频区图区小说| 美女国产视频在线观看| 免费电影在线观看免费观看| 国产精品人妻久久久影院| 在线观看三级黄色| 国产av不卡久久| 精品久久久久久久久av| 亚洲av电影在线观看一区二区三区 | 18禁在线播放成人免费| 欧美日韩视频高清一区二区三区二| 久久人人爽av亚洲精品天堂 | 一区二区av电影网| 国产成人免费观看mmmm| 亚洲国产欧美在线一区| 精品久久国产蜜桃| 欧美性感艳星| av在线播放精品| 日韩欧美精品免费久久| 亚洲av免费高清在线观看| 午夜爱爱视频在线播放| 亚洲精品成人av观看孕妇| 又爽又黄无遮挡网站| 欧美日韩亚洲高清精品| 新久久久久国产一级毛片| av在线老鸭窝| 午夜免费男女啪啪视频观看| 国产伦在线观看视频一区| 成年版毛片免费区| 精品国产露脸久久av麻豆| 午夜福利网站1000一区二区三区| 亚洲精品视频女| 精品人妻视频免费看| 久久精品久久久久久噜噜老黄| 亚洲av.av天堂| 黑人高潮一二区| 亚洲精品国产成人久久av| 听说在线观看完整版免费高清| 精品少妇久久久久久888优播| av卡一久久| 男插女下体视频免费在线播放| 精品人妻熟女av久视频| 性色av一级| 亚洲精品乱码久久久v下载方式| 真实男女啪啪啪动态图| 99久久精品一区二区三区| 国产探花极品一区二区| 肉色欧美久久久久久久蜜桃 | 在线观看免费高清a一片| 日本欧美国产在线视频| 亚洲精品第二区| 欧美成人午夜免费资源| 夜夜爽夜夜爽视频| 欧美+日韩+精品| 插逼视频在线观看| 蜜臀久久99精品久久宅男| 免费播放大片免费观看视频在线观看| 各种免费的搞黄视频| 久久久精品欧美日韩精品| 在线观看免费高清a一片| 老司机影院成人| 韩国高清视频一区二区三区| 99热这里只有精品一区| 免费少妇av软件| 高清视频免费观看一区二区| 欧美最新免费一区二区三区| 天天躁夜夜躁狠狠久久av| 日韩中字成人| 熟女电影av网| 欧美日韩视频精品一区| 高清av免费在线| 观看美女的网站| 国产亚洲av嫩草精品影院| 国产乱来视频区| 国产乱人偷精品视频| 久久久精品免费免费高清| 黄色一级大片看看| 在线看a的网站| 久久精品国产自在天天线| 国产亚洲91精品色在线| 久久久久久久精品精品| 春色校园在线视频观看| 麻豆精品久久久久久蜜桃| 直男gayav资源| 亚洲精华国产精华液的使用体验| 色网站视频免费| 免费高清在线观看视频在线观看| 91在线精品国自产拍蜜月| 亚洲aⅴ乱码一区二区在线播放| 在线 av 中文字幕| 欧美丝袜亚洲另类| av线在线观看网站| 欧美高清成人免费视频www| 岛国毛片在线播放| 国产高潮美女av| 亚洲美女视频黄频| 久久ye,这里只有精品| 亚洲精品影视一区二区三区av| 熟女人妻精品中文字幕| 高清毛片免费看| 国产又色又爽无遮挡免| 99精国产麻豆久久婷婷| 国产黄频视频在线观看| 18禁裸乳无遮挡动漫免费视频 | 欧美 日韩 精品 国产| 日韩电影二区| 波野结衣二区三区在线| 免费高清在线观看视频在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 99热6这里只有精品| 美女高潮的动态| 亚洲三级黄色毛片| 老司机影院毛片| 欧美日韩在线观看h| 777米奇影视久久| 亚洲四区av| 免费黄网站久久成人精品| 成人欧美大片| 亚洲av二区三区四区| 汤姆久久久久久久影院中文字幕| 国产精品一及| 久久精品久久精品一区二区三区| 久久久久精品性色| 亚洲精品一区蜜桃| 特级一级黄色大片| 欧美精品一区二区大全| 精品久久久久久电影网| 国产精品女同一区二区软件| 老司机影院成人| 亚洲图色成人| 91狼人影院| 欧美精品一区二区大全| 精品一区二区免费观看| 少妇裸体淫交视频免费看高清| 亚洲国产精品成人久久小说| 别揉我奶头 嗯啊视频| 国产伦在线观看视频一区| 午夜福利网站1000一区二区三区| 亚洲欧美成人综合另类久久久| 亚洲av电影在线观看一区二区三区 | 国产精品久久久久久精品古装| 成年女人在线观看亚洲视频 | av在线播放精品| 亚洲欧美日韩另类电影网站 | 最后的刺客免费高清国语| 男人狂女人下面高潮的视频| a级一级毛片免费在线观看| 人体艺术视频欧美日本| 3wmmmm亚洲av在线观看| 舔av片在线| 国产精品一区www在线观看| 老师上课跳d突然被开到最大视频| 国产一区二区三区综合在线观看 | 亚洲av成人精品一区久久| av在线亚洲专区| 午夜福利高清视频| 亚洲av免费在线观看| 18禁在线无遮挡免费观看视频| 免费看日本二区| 亚洲欧美成人精品一区二区| 制服丝袜香蕉在线| 一区二区av电影网| 日本爱情动作片www.在线观看| 国产中年淑女户外野战色| 精品视频人人做人人爽| 欧美日韩一区二区视频在线观看视频在线 | 午夜福利高清视频| 亚洲av免费在线观看| 97热精品久久久久久| 亚洲av不卡在线观看| 麻豆成人av视频| 国产精品国产三级专区第一集| 国产黄a三级三级三级人| 亚洲最大成人手机在线| av在线app专区| 一个人看的www免费观看视频| 亚洲精品日韩av片在线观看| 激情 狠狠 欧美| 久久久久国产精品人妻一区二区| 黄色欧美视频在线观看| 天堂中文最新版在线下载 | 国精品久久久久久国模美| 热re99久久精品国产66热6| 97超碰精品成人国产| 男人舔奶头视频| 欧美国产精品一级二级三级 | 寂寞人妻少妇视频99o| 日韩大片免费观看网站| 丰满少妇做爰视频| 亚洲精品一区蜜桃| h日本视频在线播放| 男女下面进入的视频免费午夜| 91在线精品国自产拍蜜月| 免费看日本二区| 中文欧美无线码| 在线观看国产h片| 亚洲国产精品成人久久小说| 男人添女人高潮全过程视频| 身体一侧抽搐| 久久人人爽人人爽人人片va| 99久国产av精品国产电影| 国产 一区 欧美 日韩| 熟女电影av网| 最近最新中文字幕免费大全7| 亚洲欧美清纯卡通| 18+在线观看网站| 欧美日韩视频精品一区| 亚洲欧美中文字幕日韩二区| av福利片在线观看| 国产高清有码在线观看视频| 中文字幕久久专区| 亚洲精品视频女| 日韩成人av中文字幕在线观看| 成人一区二区视频在线观看| 国产成人91sexporn| 麻豆精品久久久久久蜜桃| 日韩国内少妇激情av| 视频区图区小说| 性色avwww在线观看| 亚洲三级黄色毛片| freevideosex欧美| 69人妻影院| 又爽又黄a免费视频| 国内精品美女久久久久久| 国产一区二区亚洲精品在线观看| 久久久久性生活片| 久久鲁丝午夜福利片| 美女国产视频在线观看| 五月天丁香电影| 日韩在线高清观看一区二区三区| 日本色播在线视频| 久久久久九九精品影院| 18+在线观看网站| 免费av毛片视频| 少妇人妻精品综合一区二区| 日韩国内少妇激情av| 99热网站在线观看| 丝袜脚勾引网站| 特级一级黄色大片| www.色视频.com| 国产人妻一区二区三区在| 欧美人与善性xxx| 精品久久久久久电影网| av女优亚洲男人天堂| 一个人看视频在线观看www免费| 久久久成人免费电影| 国产 精品1| 亚洲欧美日韩东京热| 亚洲精品乱久久久久久| 韩国av在线不卡| 三级经典国产精品| 久久久国产一区二区| 美女高潮的动态| 精品国产一区二区三区久久久樱花 | 联通29元200g的流量卡| 街头女战士在线观看网站| 精品久久久久久久末码| 国产色婷婷99| 哪个播放器可以免费观看大片| 春色校园在线视频观看| 亚洲欧美成人精品一区二区| 日韩不卡一区二区三区视频在线| 99久国产av精品国产电影| av在线亚洲专区| 免费电影在线观看免费观看| 亚洲精品成人av观看孕妇| 国产黄片美女视频| 麻豆国产97在线/欧美| 欧美 日韩 精品 国产| 国产一区二区三区av在线| 韩国av在线不卡| 国产乱人视频| 亚洲va在线va天堂va国产| 五月开心婷婷网| 99九九线精品视频在线观看视频| 日韩电影二区| 久久久久久久久大av| 国产美女午夜福利| 亚洲欧美日韩东京热| 国产一区亚洲一区在线观看| 国产精品一二三区在线看| 老司机影院毛片| 中国国产av一级| 在线观看人妻少妇| 插逼视频在线观看| 一边亲一边摸免费视频| 国产精品久久久久久久久免| 亚洲第一区二区三区不卡| 美女xxoo啪啪120秒动态图| 国产久久久一区二区三区| 亚洲av国产av综合av卡| 国产免费一区二区三区四区乱码| 赤兔流量卡办理| www.色视频.com| 久久99热6这里只有精品| 1000部很黄的大片| 国产精品精品国产色婷婷| 伊人久久国产一区二区| freevideosex欧美| 久久6这里有精品| 赤兔流量卡办理| www.色视频.com| 国产v大片淫在线免费观看| 亚洲激情五月婷婷啪啪| 欧美成人一区二区免费高清观看| 不卡视频在线观看欧美| 欧美日韩视频高清一区二区三区二| 黄色欧美视频在线观看| 深夜a级毛片| 在线 av 中文字幕| 欧美激情久久久久久爽电影| 一边亲一边摸免费视频| 亚洲国产成人一精品久久久| 国产女主播在线喷水免费视频网站| 黄色怎么调成土黄色| 午夜精品一区二区三区免费看| 亚洲熟女精品中文字幕| 久久久久网色| 成年版毛片免费区| 激情五月婷婷亚洲| 久久精品国产鲁丝片午夜精品| 亚洲精品日韩在线中文字幕| 好男人视频免费观看在线| 亚洲精华国产精华液的使用体验| 美女国产视频在线观看| 欧美丝袜亚洲另类| 亚洲国产高清在线一区二区三| 观看美女的网站| 精品视频人人做人人爽| 亚洲美女视频黄频| 人妻系列 视频| 日本-黄色视频高清免费观看| 校园人妻丝袜中文字幕| 成人欧美大片| 菩萨蛮人人尽说江南好唐韦庄| 人妻系列 视频| 免费观看在线日韩| 一区二区三区四区激情视频| 亚洲av中文字字幕乱码综合| 久久久久久久久大av| 热re99久久精品国产66热6| 三级国产精品欧美在线观看| 一级爰片在线观看| 欧美日韩视频精品一区| 国产精品嫩草影院av在线观看| 色综合色国产| 欧美性猛交╳xxx乱大交人| 国产成人精品一,二区| 欧美bdsm另类| 午夜激情福利司机影院| 午夜福利在线观看免费完整高清在| 亚洲欧美日韩卡通动漫| 国产又色又爽无遮挡免| 国产精品人妻久久久影院| 亚洲久久久久久中文字幕| 国产亚洲5aaaaa淫片| 老司机影院成人| 久久久久久久久久人人人人人人| 观看美女的网站| 80岁老熟妇乱子伦牲交| 丰满人妻一区二区三区视频av| 亚洲av不卡在线观看| 汤姆久久久久久久影院中文字幕| 好男人在线观看高清免费视频| 久久女婷五月综合色啪小说 | 亚洲最大成人手机在线| h日本视频在线播放| 日本av手机在线免费观看| 国产午夜精品一二区理论片| 国产精品人妻久久久影院| 日本三级黄在线观看| av免费观看日本| 青春草国产在线视频| 22中文网久久字幕| 老司机影院成人| 国产精品久久久久久久电影| 亚洲国产精品成人综合色| 欧美激情国产日韩精品一区| 激情五月婷婷亚洲| 国产淫语在线视频| 各种免费的搞黄视频| 国产乱人偷精品视频| 免费播放大片免费观看视频在线观看| 女人被狂操c到高潮| 国产精品国产三级专区第一集| 国产 精品1| 永久免费av网站大全| 大香蕉97超碰在线| 国产av码专区亚洲av| 亚洲婷婷狠狠爱综合网| 欧美激情久久久久久爽电影| 综合色丁香网| 国产伦在线观看视频一区| 91久久精品国产一区二区三区| 联通29元200g的流量卡| 国产一区亚洲一区在线观看| 中文字幕人妻熟人妻熟丝袜美| 少妇人妻 视频| 国产爽快片一区二区三区| 婷婷色综合大香蕉| 91精品国产九色| 亚洲熟女精品中文字幕| 超碰97精品在线观看| 街头女战士在线观看网站| 99热这里只有是精品在线观看| 亚洲精品视频女| 免费黄色在线免费观看| 久久鲁丝午夜福利片| 综合色丁香网| 99re6热这里在线精品视频| 美女xxoo啪啪120秒动态图| 91精品一卡2卡3卡4卡| 舔av片在线| 国产伦理片在线播放av一区| 听说在线观看完整版免费高清| 欧美高清成人免费视频www| 国产精品爽爽va在线观看网站| 小蜜桃在线观看免费完整版高清| 国产亚洲午夜精品一区二区久久 | 亚洲av.av天堂| 别揉我奶头 嗯啊视频| 精品一区二区免费观看| 尤物成人国产欧美一区二区三区| 久久久午夜欧美精品| 精品久久久精品久久久| av天堂中文字幕网| 91在线精品国自产拍蜜月| 精品视频人人做人人爽| 色吧在线观看| 成人美女网站在线观看视频| 国产男人的电影天堂91| 成年女人在线观看亚洲视频 | 亚洲人成网站高清观看| 777米奇影视久久| 秋霞伦理黄片| 日韩强制内射视频| 人妻一区二区av| 久久精品久久精品一区二区三区| 国产毛片a区久久久久|