• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks

    2021-12-15 12:48:58AhmadSubahiYouseefAlotaibiOsamahIbrahimKhalafandAjesh
    Computers Materials&Continua 2021年2期

    Ahmad F.Subahi,Youseef Alotaibi,Osamah Ibrahim Khalaf and F.Ajesh

    1Department of Computer Science,University College of Al Jamoum, Umm Al Qura University, Makkah,21421, Saudi Arabia

    2Department of Computer Science, College of Computer and Information Systems, Umm Al Qura University, Makkah, 21421,Saudi Arabia

    3Al-Nahrain University,Al-Nahrain Nanorenewable Energy Research Centre,Baghdad, 70030, Iraq

    4Department of Computer Science and Engineering, Musalair College of Engineering, Kerala, India

    Abstract:Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks (WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication, resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector, prioritizing the number of jumps, the battery life, and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route, as well as ensuring energy conversions and defense against threats and attacks.In this regard, the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs, which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence, a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector-Packet Drop Battling Mechanism (AODV-PDBM).

    Keywords:Wireless and mobile ad hoc networks(WMANet);packet drop attack(PDA); ad hoc on-demand distance vector (AODV); dynamic source routing(DSR);packet drop battling mechanism(PDBM)

    1 Introduction

    Wireless and mobilead hocnetworks(WMANets)are both considered free wireless frameworks.Using the communications between the WMANet and the mobile network in a system,one can frame a distinctive system configuration or topology by using the system’s ability to self-correct without hub dependency[1].In the case ofad hocnetworks,providing secure communication in various environments is extremely crucial.Thus,a key security concern in WMANets is routing attacks.These attacks disconnect a WMANet from its focal base station.WMANet routing protocols are uncomplicated, which makes them more vulnerable to such attacks compared with the routing protocols of framework-based networks.A type of common routing attacks on WMANets is the packet drop attack (PDA) [2].A PDA functions as the base for launching different attacks, such as a distributed denial of service attack and a sinkhole attack, which result in numerous hubs attempting to route their traffic to the malicious hub.These attacks enable the attacker to gain control over a significant portion of the system and its related activity.Hence, steering conventions are the most researched topic in WMANet literature.

    Network and security specialists have outlined various routing protocols for WMANet,such as thead hocon-demand vector, optimized link state routing, dynamic source routing (DSR), and the destination sequenced distance vector.The major concerns in relation to WMANets are saving energy and ensuring security, which affect the networks’ fundamental functionality [3-5].WMANet hubs are battery controlled,which calls for battery life extension.This is an identified issue,as is finding the shortest route to targeted hubs without massive consumption of battery power.Owing to the different quality measurements of their system, such as open access medium, the inadequacy of admins, and the insufficiency of the straightforward resistance mechanism of WMANets, the system is not frequently used by attackers, thereby preventing security attacks [6,7].The system administration availability as well as the information integrity and confidentiality can be enhanced by addressing the identified security issues in the system.In addition, the use of wireless connection makes WMANets more vulnerable to attacks by giving the attacker access to ongoing communications.A variety of attacks on WMANets have been discovered and described[8].

    The several types of attacks identified to date include worm-gap attacks,PDAs,hurrying attacks,asset consumption attacks, sybil attacks, flooding attacks, denial of service attacks, and mocking attacks.The minimum total transmission power routing calculates the power generally required for moving the packets of data via various routes, the route that requires the least energy consumption is selected.However, the power remaining with hubs is not ascertained, this can be a cause of the destruction of a few hubs and thus damage transmitted packets during transmission.Thus, a method for selecting the most energyconserving hub among these base controlled hubs is required [9].Max-min battery capacity routing expands the system by using the remaining energy of a hub, but it disregards the aggregated energy of transmission and the cause of power consumption.The conditional max-min battery capability directly joins the components that are added to the transmission energy and the remaining vitality of hubs under consideration.The least drain rate uses a metric depletion proportion, registered for a hub as a ratio of its remaining energy and the proportion of its power consumption rerarding the current activity conditions.The route with the lowest deplete ratio and least battery control is selected [10].

    This paper also considers the problem of energy efficient routing to increase WMANets life.The efficient use of battery energy has become particularly important because the mobile hosts in use currently are powered by battery.The energy resources of actively participating nodes are depleted faster than those of other nodes, which in some cases, may lead to the partitioning of the network and consequently decrease its life.For this reason, reducing energy consumption inad hocwireless networks is a critical issue.

    The remainder of this paper is organized as follows.Section 2 outlines the research background and related literature.Section 3 explains the PDA.Section 4 presents the proposedAd HocOn-Demand Distance Vector (AODV) Packet Drop Battling Mechanism (PDBM); that is, the AODV-PDBM.Section 5 presents the results.Section 6 provides a summary of this study and recommendations for future research.

    2 Related Works

    PDA is considered a calculated attack on security during routing.Significant attention is required to manage this issue.Security experts have proposed different solutions to manage such attacks.The review presented in this study discusses some of the available solutions and highlights the research conducted in the current decade.Recently, a solution has been proposed to prevent packet dropping through the theorem of anodes by using the Bayesian and the prior likelihood techniques.At the point when a hub is found to drop packets, it is disposed of from the system.Utilizing this heuristic scientific model, secure routing is feasible through an autonomous environment [11].A mechanism has been advanced to detect agreeable PDA based on crosschecking with a clock-based mechanism termed True Link in the AODV routing protocol.Similarly, the network designers have conducted a simulation to demonstrate the base steering overhead, the deferral, and the most extreme throughput with an increment in the number of attacker hubs and in the interruption time.They have recommended a strategy to detect and prevent PDAs based on reliable data estimations.The researchers monitored the information conveyed to the recipient and examined the causes for packet drops in the middle of the packet transmission from the source hub to the target, based on which a hub functioning as a packet drop hub may be considered malicious.A trust-based mechanism has been introduced for recognizing such packet drop hubs.A boycott table is retained at each hub, and a trust estimation of its neighboring hubs is specified.The trust estimation of neighboring hubs or nodes is based on detecting whether the node is a sinkhole in the network.When the trust score of a particular node falls below the normal score of 0.5, this node is regarded as a sinkhole attack node[12,13].

    A detection technique has been recommended for PDA in which the next bounce and the past jump hub of a route reply packet is checked to identify hubs during transmission.The sensor hub identifies a problem hub by investigating the data routing data packetstable it maintains.Further,analysts have proposed a trap detection approach for defending against synergistic attacks made by pernicious hubs in mobilead hocnetworks (MANETs) [14].PDAs are recognized and anticipated by planning a cooperative bait detection scheme, which has the advantages of proactive safeguard structures and additionally receptive guard models that use an invert following system.A strategy has been demonstrated to recognize malicious hubs by utilizing the notion of Self-Protocol Trustiness (SPT) and another technique for opposing the PDAs as a black-gap resistance mechanism, that is implanted with all kinds of the receptive routing protocols [15-17].The discussed techniques use neighborhood clocks and settled edge esteems for characterizing any hub as malicious [18].

    Scientists have proposed a guard dog approach that uses a specification-based detection plot for distinguishing the packet drop and, in particular, launching attacks in wireless sensor networks.This plan practices a distributed approach in which every hub does not have a universal view.A study has recently been conducted on PDA on WMANets and on the current solutions [19].The proposition is introduced in a chronological request and partitioned into single and cooperative PDA.A peculiarity detection searches for PDA inad hocnetworks and has been examined and demonstrated.They used a dynamic preparing strategy instead of a static preparing technique since WMANets are mobile and use dynamic topology.In this plan, preparing information is provisionally updated at a fixed time [9].

    3 Packet Drop Attack

    In a PDA,the attacker hubs misuse vulnerabilities during the route disclosure procedure of responsive steering conventions and introduce a wrong route to the target hub.On receiving a route error message,the transitional attacker hub answers with a route reply that has an over-the-top destination arrangement number that the route request message receives,which confirms the destination.If an attacker chooses to launch an attack using rapid,high power transmission,it is difficult to discover a compromised route that bypasses the attacker hub[20-22].Once the attacker chooses the hub as the control hub or disables some of the routes in the system,the attacker uses the hub to begin manipulating or decreasing the traffic it coordinates by creating a packet drop.This situation becomes critical when the attacker begins attacking an increasing number of routes.Fig.1 shows the categories of attacks.

    Figure 1:Categories of attacks

    Fig.2 shows the classification of PDAs.Attacks,such as internal and external PDAs,are made based on the nearness of attacker hubs.PDAs can also be classified based on the method of collaboration between attacker hubs into single or collaborative PDAs.The attacker hubs; for example, single PDA and collaborative PDA.

    Figure 2:Packet drop attack classification

    An increasingly common attack is one in which an attacker hub is transformed into a piece of the route in the network,which can be described as an unusual type of PDA since,in this type,the data packets routed through the hub are not dropped [23].At first, the attacker hub can act as a genuine hub using trusted protocols, but later drops packets directly from some particular hubs or in some other specific instance.The identification of attacker hubs in this form of attack is particularly troublesome because these hubs drop packets routed through them for quite a while, although they may normally serve as actual hubs otherwise [18].

    4 Proposed Ad Hoc On-Demand Distance Vector Packet Drop Battling Mechanism

    Initially, during the arrangement setup of every mobile hub, data registers itself with the system, and creates a private key.In addition, it shares an open key match, which is used by the individual mobile hubs to generate computerized marks.Every hub makes a neighbor disclosure through “welcome”messages.Route discovery is the underlying procedure performed.When two hubs need to communicate and interact with each other,and the sender hub does not have the required routing protocol,after that,the sender hub creates or instantiates a Forward Agent (FA) and connects its own particular computerized mark to it.Next, the FA broadcasts to its neighbors, and each neighbor receiving the FA confirms its advanced mark after checking that it is correct.Then, the FA is acknowledged by its neighbors.Each transitional hub that has an FA connects its own advanced mark to it and retransmits to its neighbors prior to reaching the destination hub.During its transmission toward the destination, the FA accumulates route information that is shared with neighbor hubs.On reaching the target hub, the FA is executed and a Backward Agent (BA) is created, which goes from the destination towards the source hub by using the information collected by the FA.

    The following stage is the data flow in the system.Once the path detection is completed and productive routes are established between the sender hub and the recipient one, information begins to flow between them.During information exchange,advanced marks are likewise used with each information packet sent,to ensure secure communication.

    Source hubs are able to confirm the route by sending FAs and BAs at continuous time intervals.In case of any disconnection—such as because of the removal of a malicious packet drop hub—the need to begin the discovery of another route might be addressed locally from the hub where no further routing information is accessible.

    Finally, the detection of the malicious hub is achieved.When an outer attacker hub needs to take an interest in the dynamic route,it is found during the computerized signature verification stage,signalled by the lack of a mystery key, because such key is only present in the inner enlisted mobile hubs.Each mobile hub within the network has been installed with guards and a route rate mechanism to track the neighboring hubs via information exchange for recipient hubs.Each hub monitors its neighbors to identity issues such as data packet loss, slow information exchange rate, and false flooding.If any of the components of a hub fall below the corresponding base point, its neighbor hub places this hub on the malicious hub list and sends a message to inform all the legitimate hubs in the network about the hub’s malicious actions.

    5 Results and Discussion

    WMANets can be implemented in various environments as indicated by the need of the application.We considered the issue of recognizing PDAs in WMANets by using the AODV route disclosure stage.Once the compromised hub receives a route request packet, it easily sends a route response to the originator hub by using a randomly generated high destination arrangement number and pretending that it is a destination preferably far away.The source hub waits for the route reply since it should receive such reply from either the malicious hub or the genuine destination to begin information transmission.The malicious hub sends a route reply packet with a high destination sequence number and the least number of jumps.The source expects that this route is fresh and begins transmitting information through it.An exact approach is required to recognize and eliminate an attacked hub from the system and the remaining personal hubs.A malicious hub launches different attacks,such as choosing sending and sinkhole attack in WMANets.

    All the on-demand algorithms are considered.Associativity-based routing,AODV,DSR,and flow state in dynamic source routing are some of the routing protocols included in the simulation and are compared with the proposed AODV-PDBM.No routing protocol in a WMANet considers security an objective.From this AODV routing protocol, a route response is created by a destination or a transition hub that has a short route to the destination.This results in a significant flaw in the AODV route disclosure stage,which is used by the malicious hub.At the point when a route is required, the source hub broadcasts the route request to each hub within wireless range.At the point when a malicious hub receives a route request packet, it sends a route reply immediately with a randomly produced high destination succession number with least number of jumps.The source stays in inactive for the route reply.When it receives the first route reply, it begins information transmission through the malicious hub.One conceivable solution to the examined issue is to disable the capacity of any intermediate hub to produce a route reply even if it maintains a route to the destination.Only the destination hub can produce a route reply by this technique,and thus,we can secure AODV to some degree.However,large networks will face increased routing delay

    With the final goal of simulation adjustment, the current AODV steering convention is enforced in compliance with our proposed guidance and contrasting strategy and the fundamental AODV steering convention.The simulation was completed using Network Simulator (NS-2.35), which is used to run system tests.The perspective of the finished simulation environment is shown in Tab.1.We used certain simulation parameters, such as packet conveyance proportion and number of packets lost against the number of attackers, similar to [24-26].Parameters such as the steering overhead, arrange energy consumption, and system throughputs compared with the simulation time to evaluate the execution of our proposed algorithm compared with that of the fundamental AODV routing protocol.

    Table 1:Parameters used and the corresponding statistical value

    Fig.3 presents a graphical representation of the packet delivery ratio.This ratio is calculated as the aggregate numerous packets collected at the target hub to the many packets sent by the Constant Bit Rate source.

    Figure 3:Graphical representation of packet delivery ratio

    Fig.4 presents a graphical representation of packet loss within a network.Packet loss can be interpreted as the fraction of the accumulated number of packets lost because of congestion or other reasons relative to the total number of packets sent during transmission.Thus, system implementation is difficult if accurate estimates of packet loss are unavailable.

    Figure 4:Graphical representation of packet loss in a network

    Fig.5 provides a graphical representation of the overhead routing within a network.Overhead routing can be interpreted as the proportion of the number of routing packets transmitted relative to the number of information packets effectively transmitted, where steering packets contain control packets used for route exploration, route repair, and for the optimization updating rule (pheromone).Implementation of the program improves with a reduction in overhead packets.

    Figure 5:Graphical representation of routing overhead in a network

    Fig.6 illustrates energy use within a network.Energy consumption refers to the energy that the hubs consume in accepting packets from, and transmitting packets to, neighboring hubs.System implementation efficiency increases with decrease in energy consumption.

    Fig.7 presents a graphic representation of network performance within a network.Network throughput measures how many packets arrive at their destinations successfully during a specific period and is measured in bits per second.

    Figure 6:Graphical representation of energy consumption in a network

    Figure 7:Graphical representation of network throughput in a network

    6 Conclusions

    This paper considered common security issues in a WMANet,including one of the commonly known rehashing attacks.It presented and discussed some of the solutions proposed by different network and security specialists.A multipath routing protocol was proposed to find the optimal route from sender to recipient as well as to expand system and ensure system security against attacks.We broke down the impact of these attacks by running a simulation using system parameters that organize the routing load, arrange throughput, packet conveyance proportion, packet loss and system energy consumption through the presented energy monitoring, the basic AODV and secure routing protocol.The discussed implementations demonstrate that the presented system identifies prevention measures from the attacks by comparing these with the fundamental AODV and builds a new organized execution.The AODV-PDBM was shown to be effective in the simulation environment, as it recognized malicious hubs with precision and latency.It is intended for use in WMANets, and will be a benchmark for implementation in comparative asset-constrained wireless communication gadgets/networks.The AODV-PDBM convention can be improved to add portability of the sensor hubs.Future research may include a further simulation of the proposed scheme for sparse mediums and in real-life scenarios as well as examine other metrics,such as the link layer overhead,pause time and path optimality.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日韩av免费高清视频| 另类精品久久| 日本91视频免费播放| 99国产精品免费福利视频| 国产福利在线免费观看视频| 亚洲美女视频黄频| av卡一久久| 黄色 视频免费看| 一区二区日韩欧美中文字幕| 久久久亚洲精品成人影院| 亚洲伊人久久精品综合| 日韩欧美精品免费久久| 国产亚洲av片在线观看秒播厂| www.av在线官网国产| 免费女性裸体啪啪无遮挡网站| 人妻一区二区av| 两个人看的免费小视频| xxx大片免费视频| 99久久人妻综合| 亚洲综合精品二区| 丰满少妇做爰视频| 最近的中文字幕免费完整| 蜜桃国产av成人99| 亚洲成人一二三区av| 下体分泌物呈黄色| 最近的中文字幕免费完整| 免费日韩欧美在线观看| 日韩免费高清中文字幕av| 99热全是精品| 国产无遮挡羞羞视频在线观看| 一级黄片播放器| 婷婷色av中文字幕| 纯流量卡能插随身wifi吗| 超碰97精品在线观看| 精品亚洲乱码少妇综合久久| 成年女人在线观看亚洲视频| 少妇精品久久久久久久| 青春草视频在线免费观看| 18禁国产床啪视频网站| 在线精品无人区一区二区三| 国产男女超爽视频在线观看| 国产成人精品久久二区二区91 | 国产免费一区二区三区四区乱码| 亚洲婷婷狠狠爱综合网| 777久久人妻少妇嫩草av网站| 免费黄网站久久成人精品| 两个人免费观看高清视频| 国产精品av久久久久免费| 国产黄色免费在线视频| 亚洲国产av影院在线观看| 亚洲精品国产一区二区精华液| 免费播放大片免费观看视频在线观看| av网站在线播放免费| 男男h啪啪无遮挡| 亚洲精品成人av观看孕妇| av在线app专区| 国产精品国产三级专区第一集| 婷婷色综合大香蕉| 国产 一区精品| 日韩精品有码人妻一区| 极品人妻少妇av视频| 黑人猛操日本美女一级片| 日日爽夜夜爽网站| 又黄又粗又硬又大视频| 亚洲精品日本国产第一区| 下体分泌物呈黄色| 亚洲精品成人av观看孕妇| 青春草国产在线视频| 999久久久国产精品视频| 亚洲男人天堂网一区| freevideosex欧美| 国产精品一区二区在线不卡| 香蕉精品网在线| 捣出白浆h1v1| 成人黄色视频免费在线看| 人人妻人人添人人爽欧美一区卜| 久久人人97超碰香蕉20202| 大香蕉久久网| 日韩大片免费观看网站| 99久国产av精品国产电影| 欧美亚洲日本最大视频资源| 亚洲人成77777在线视频| 国产精品秋霞免费鲁丝片| 色播在线永久视频| 国产色婷婷99| 欧美亚洲 丝袜 人妻 在线| 欧美中文综合在线视频| 一区二区三区激情视频| 国产精品.久久久| 搡女人真爽免费视频火全软件| 亚洲成人手机| 欧美精品高潮呻吟av久久| 成年美女黄网站色视频大全免费| 久久午夜综合久久蜜桃| 午夜精品国产一区二区电影| 久久精品人人爽人人爽视色| 最近最新中文字幕免费大全7| 夜夜骑夜夜射夜夜干| 亚洲国产毛片av蜜桃av| av在线观看视频网站免费| 美女xxoo啪啪120秒动态图| 免费看av在线观看网站| 大陆偷拍与自拍| 国产97色在线日韩免费| 亚洲五月色婷婷综合| 国产精品二区激情视频| 欧美日韩一级在线毛片| 老司机亚洲免费影院| 久久婷婷青草| 看非洲黑人一级黄片| av卡一久久| 午夜福利视频在线观看免费| 亚洲精品自拍成人| 国精品久久久久久国模美| 乱人伦中国视频| 免费观看在线日韩| 久久影院123| 999精品在线视频| 国产一区二区激情短视频 | 少妇 在线观看| 黄片小视频在线播放| 五月伊人婷婷丁香| 亚洲四区av| 国产淫语在线视频| 免费观看a级毛片全部| 一二三四中文在线观看免费高清| 亚洲少妇的诱惑av| 亚洲精品一二三| 成人亚洲精品一区在线观看| 黑丝袜美女国产一区| 1024视频免费在线观看| 国产男人的电影天堂91| 一边亲一边摸免费视频| 国产一区二区 视频在线| 黄色毛片三级朝国网站| 狂野欧美激情性bbbbbb| 激情视频va一区二区三区| 欧美av亚洲av综合av国产av | 黄色视频在线播放观看不卡| 老司机亚洲免费影院| 纯流量卡能插随身wifi吗| 亚洲视频免费观看视频| 欧美xxⅹ黑人| 国产精品秋霞免费鲁丝片| 久久青草综合色| 侵犯人妻中文字幕一二三四区| 巨乳人妻的诱惑在线观看| 老司机影院毛片| 久久精品久久久久久噜噜老黄| 久久久久人妻精品一区果冻| 老司机影院成人| 久久久久久人妻| 亚洲精品一二三| 亚洲av国产av综合av卡| 欧美国产精品一级二级三级| 欧美 亚洲 国产 日韩一| 午夜免费观看性视频| 街头女战士在线观看网站| 午夜日韩欧美国产| 亚洲精华国产精华液的使用体验| 99热国产这里只有精品6| 中文字幕精品免费在线观看视频| 午夜福利,免费看| 久久精品国产自在天天线| 一区二区三区乱码不卡18| 成年动漫av网址| 亚洲精品,欧美精品| 卡戴珊不雅视频在线播放| 97在线人人人人妻| 久久鲁丝午夜福利片| 欧美日韩一级在线毛片| 91精品伊人久久大香线蕉| 久久久久久久大尺度免费视频| 午夜福利一区二区在线看| 日本-黄色视频高清免费观看| 国产精品秋霞免费鲁丝片| 亚洲精品av麻豆狂野| 久久久精品区二区三区| 亚洲三级黄色毛片| 日韩av不卡免费在线播放| av片东京热男人的天堂| 国精品久久久久久国模美| 999精品在线视频| 久久久久精品人妻al黑| 一区在线观看完整版| 黑人欧美特级aaaaaa片| 久久精品久久久久久久性| 精品一品国产午夜福利视频| 美女国产高潮福利片在线看| 国产精品熟女久久久久浪| 91成人精品电影| 精品国产乱码久久久久久男人| 亚洲av成人精品一二三区| 国产精品久久久久久av不卡| 国产精品蜜桃在线观看| 人妻一区二区av| 大香蕉久久成人网| 国产精品免费大片| 一本大道久久a久久精品| 欧美日韩亚洲高清精品| 午夜福利一区二区在线看| av.在线天堂| 免费观看a级毛片全部| 免费在线观看视频国产中文字幕亚洲 | 国产xxxxx性猛交| 成人免费观看视频高清| av网站在线播放免费| 夜夜骑夜夜射夜夜干| 在线观看一区二区三区激情| 两性夫妻黄色片| 人妻人人澡人人爽人人| 在线精品无人区一区二区三| 欧美少妇被猛烈插入视频| 自线自在国产av| 一级片免费观看大全| 亚洲,一卡二卡三卡| 日本欧美视频一区| 中文字幕人妻熟女乱码| 亚洲三区欧美一区| 成人毛片60女人毛片免费| 日本av手机在线免费观看| 欧美av亚洲av综合av国产av | 国产成人av激情在线播放| 99久久人妻综合| 国产黄色免费在线视频| 人妻人人澡人人爽人人| 看免费成人av毛片| 中文字幕最新亚洲高清| 巨乳人妻的诱惑在线观看| 免费观看a级毛片全部| 亚洲一区中文字幕在线| 大香蕉久久网| 综合色丁香网| kizo精华| 国产激情久久老熟女| 伊人久久大香线蕉亚洲五| 亚洲精品aⅴ在线观看| 国产免费视频播放在线视频| 免费在线观看完整版高清| 国产97色在线日韩免费| 蜜桃国产av成人99| 国产极品天堂在线| 777久久人妻少妇嫩草av网站| 90打野战视频偷拍视频| 综合色丁香网| 亚洲精华国产精华液的使用体验| 国产激情久久老熟女| 黑人巨大精品欧美一区二区蜜桃| 香蕉国产在线看| 老司机影院成人| 伦理电影大哥的女人| 国产精品欧美亚洲77777| 丝瓜视频免费看黄片| 亚洲精品自拍成人| 国产精品久久久久久精品电影小说| 久久精品人人爽人人爽视色| 亚洲av电影在线观看一区二区三区| 国产精品麻豆人妻色哟哟久久| 日本色播在线视频| 一区二区三区激情视频| 亚洲精品视频女| 欧美人与性动交α欧美软件| 90打野战视频偷拍视频| 国产精品一区二区在线不卡| 亚洲精品成人av观看孕妇| 麻豆精品久久久久久蜜桃| 老司机影院成人| 少妇精品久久久久久久| 人人妻人人澡人人爽人人夜夜| 婷婷色综合大香蕉| 午夜免费鲁丝| 18禁动态无遮挡网站| 亚洲,欧美,日韩| 亚洲精品视频女| 有码 亚洲区| 99久久精品国产国产毛片| 伊人久久国产一区二区| 黄片小视频在线播放| 久久免费观看电影| 国产亚洲最大av| 18禁观看日本| 亚洲精品自拍成人| 水蜜桃什么品种好| 亚洲精品aⅴ在线观看| 99九九在线精品视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 看免费av毛片| 免费在线观看完整版高清| 亚洲精品国产一区二区精华液| 日日啪夜夜爽| 亚洲欧洲国产日韩| 久久久精品区二区三区| 免费高清在线观看视频在线观看| 亚洲精品日本国产第一区| 欧美最新免费一区二区三区| 亚洲,一卡二卡三卡| 1024香蕉在线观看| 免费av中文字幕在线| 国产日韩欧美在线精品| 中文字幕色久视频| 国产一区有黄有色的免费视频| 日韩不卡一区二区三区视频在线| 亚洲精品国产av蜜桃| 成人手机av| 一级a爱视频在线免费观看| 午夜福利在线观看免费完整高清在| 国产免费视频播放在线视频| 大香蕉久久网| 国产1区2区3区精品| 亚洲国产精品999| 国产激情久久老熟女| 久久久a久久爽久久v久久| 免费在线观看黄色视频的| 婷婷色av中文字幕| 男人操女人黄网站| 天堂俺去俺来也www色官网| av网站免费在线观看视频| 人妻人人澡人人爽人人| 国产有黄有色有爽视频| 热re99久久国产66热| 日本黄色日本黄色录像| 人人妻人人添人人爽欧美一区卜| 亚洲,欧美,日韩| 成人影院久久| 熟女av电影| 激情五月婷婷亚洲| 久久毛片免费看一区二区三区| 午夜激情久久久久久久| 美女中出高潮动态图| 中文字幕色久视频| 国产xxxxx性猛交| 成人国语在线视频| 伊人亚洲综合成人网| 卡戴珊不雅视频在线播放| 18禁国产床啪视频网站| av天堂久久9| 少妇的逼水好多| 免费久久久久久久精品成人欧美视频| 美女午夜性视频免费| 十分钟在线观看高清视频www| 成年av动漫网址| 欧美日韩一级在线毛片| 成年av动漫网址| 两性夫妻黄色片| 精品少妇一区二区三区视频日本电影 | 91精品三级在线观看| 青春草亚洲视频在线观看| av视频免费观看在线观看| 亚洲精品国产一区二区精华液| 国产日韩欧美在线精品| 久久久国产一区二区| 国产又爽黄色视频| 国产精品免费大片| 亚洲人成网站在线观看播放| 中国国产av一级| 日韩在线高清观看一区二区三区| 亚洲欧洲日产国产| 成人午夜精彩视频在线观看| 成人影院久久| 国产精品二区激情视频| 美女xxoo啪啪120秒动态图| 亚洲精品一二三| 国产视频首页在线观看| 18禁国产床啪视频网站| av天堂久久9| 蜜桃在线观看..| 国产高清国产精品国产三级| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 女人高潮潮喷娇喘18禁视频| 成人国产av品久久久| 高清在线视频一区二区三区| 精品久久久久久电影网| 在线观看人妻少妇| 啦啦啦在线观看免费高清www| 亚洲第一av免费看| 国产精品三级大全| 久久毛片免费看一区二区三区| www.熟女人妻精品国产| 国产精品不卡视频一区二区| 成人漫画全彩无遮挡| 久久久欧美国产精品| 欧美国产精品一级二级三级| 黄片小视频在线播放| 美女xxoo啪啪120秒动态图| 亚洲国产精品999| 久久人人爽av亚洲精品天堂| 看免费成人av毛片| 王馨瑶露胸无遮挡在线观看| 国产av精品麻豆| 国语对白做爰xxxⅹ性视频网站| 国产熟女欧美一区二区| 老司机亚洲免费影院| 在线看a的网站| 五月天丁香电影| av网站免费在线观看视频| 水蜜桃什么品种好| 久久精品亚洲av国产电影网| 黄色 视频免费看| 少妇被粗大猛烈的视频| 十八禁高潮呻吟视频| 成人国产av品久久久| 久久亚洲国产成人精品v| 国产一区二区 视频在线| 高清视频免费观看一区二区| 亚洲色图综合在线观看| 国产成人精品在线电影| 不卡av一区二区三区| 国产女主播在线喷水免费视频网站| a 毛片基地| 国产黄色免费在线视频| 黄色 视频免费看| 99热国产这里只有精品6| 老熟女久久久| 久久久久国产一级毛片高清牌| 男人添女人高潮全过程视频| 国产片内射在线| 亚洲国产精品999| 日本爱情动作片www.在线观看| 精品酒店卫生间| 精品少妇内射三级| 免费女性裸体啪啪无遮挡网站| 在线 av 中文字幕| 视频在线观看一区二区三区| 黄色 视频免费看| 亚洲av成人精品一二三区| 国产亚洲精品第一综合不卡| 国产精品免费大片| 国产毛片在线视频| 日日爽夜夜爽网站| 欧美日韩一区二区视频在线观看视频在线| 国产 精品1| 最新的欧美精品一区二区| 久久精品久久久久久久性| 中文字幕人妻熟女乱码| 日本91视频免费播放| 高清av免费在线| 亚洲视频免费观看视频| 免费观看无遮挡的男女| 叶爱在线成人免费视频播放| 国产精品99久久99久久久不卡 | 国产视频首页在线观看| 国产在线视频一区二区| 人妻人人澡人人爽人人| 国产精品 国内视频| 天堂俺去俺来也www色官网| 欧美最新免费一区二区三区| 免费av中文字幕在线| 久久av网站| 啦啦啦视频在线资源免费观看| 国产av精品麻豆| a级毛片黄视频| 最新的欧美精品一区二区| 国产精品久久久久久久久免| av免费在线看不卡| 午夜免费观看性视频| 亚洲情色 制服丝袜| 九草在线视频观看| 99久国产av精品国产电影| 1024视频免费在线观看| 中文字幕亚洲精品专区| 日韩三级伦理在线观看| 18禁国产床啪视频网站| 国产精品久久久久久av不卡| 午夜福利网站1000一区二区三区| 热re99久久精品国产66热6| 亚洲欧美成人综合另类久久久| 极品少妇高潮喷水抽搐| 高清av免费在线| 亚洲男人天堂网一区| 日日摸夜夜添夜夜爱| 国产有黄有色有爽视频| 亚洲欧美日韩另类电影网站| 欧美bdsm另类| 国产免费又黄又爽又色| 两个人看的免费小视频| 久久久久久久久久人人人人人人| 亚洲欧美中文字幕日韩二区| 青草久久国产| 国产乱人偷精品视频| 啦啦啦在线观看免费高清www| 欧美老熟妇乱子伦牲交| 午夜日韩欧美国产| 伊人亚洲综合成人网| 欧美亚洲日本最大视频资源| 日韩大片免费观看网站| 热99久久久久精品小说推荐| 亚洲色图综合在线观看| 寂寞人妻少妇视频99o| 99热全是精品| 国产一区二区在线观看av| 精品视频人人做人人爽| 色视频在线一区二区三区| 99国产综合亚洲精品| 狂野欧美激情性bbbbbb| 日韩精品有码人妻一区| 久久婷婷青草| 日日爽夜夜爽网站| 午夜福利网站1000一区二区三区| 婷婷成人精品国产| 最近最新中文字幕免费大全7| av视频免费观看在线观看| 国精品久久久久久国模美| 成年美女黄网站色视频大全免费| 天堂俺去俺来也www色官网| 亚洲国产av影院在线观看| 一区福利在线观看| 中文字幕av电影在线播放| 男女免费视频国产| 啦啦啦啦在线视频资源| 亚洲一级一片aⅴ在线观看| 1024香蕉在线观看| 午夜91福利影院| 母亲3免费完整高清在线观看 | 欧美日韩综合久久久久久| 777久久人妻少妇嫩草av网站| 美女主播在线视频| 亚洲国产看品久久| 午夜免费鲁丝| 亚洲欧美一区二区三区黑人 | 国产成人免费观看mmmm| 亚洲精品一二三| av国产久精品久网站免费入址| 一级,二级,三级黄色视频| 精品99又大又爽又粗少妇毛片| 大片电影免费在线观看免费| 久久鲁丝午夜福利片| 日韩中字成人| 精品一区二区三卡| 最近中文字幕高清免费大全6| 免费观看在线日韩| 超碰97精品在线观看| 免费不卡的大黄色大毛片视频在线观看| 国产精品不卡视频一区二区| 人妻人人澡人人爽人人| 国产精品偷伦视频观看了| videos熟女内射| 国产视频首页在线观看| 色网站视频免费| 99热全是精品| 色吧在线观看| 欧美激情 高清一区二区三区| 午夜老司机福利剧场| 汤姆久久久久久久影院中文字幕| av在线app专区| 亚洲av电影在线观看一区二区三区| 人体艺术视频欧美日本| 亚洲精品第二区| 日韩一卡2卡3卡4卡2021年| 久久久欧美国产精品| 午夜91福利影院| 日韩一本色道免费dvd| 狠狠精品人妻久久久久久综合| 色哟哟·www| 大香蕉久久网| 一级a爱视频在线免费观看| 精品久久久久久电影网| 亚洲欧美成人精品一区二区| 美国免费a级毛片| 91国产中文字幕| 国产成人精品一,二区| 综合色丁香网| 国产女主播在线喷水免费视频网站| 中文字幕制服av| 国产精品三级大全| 久久国产精品大桥未久av| 建设人人有责人人尽责人人享有的| 99热网站在线观看| 亚洲成av片中文字幕在线观看 | 女性生殖器流出的白浆| 久久精品夜色国产| 菩萨蛮人人尽说江南好唐韦庄| 少妇被粗大的猛进出69影院| 日韩欧美精品免费久久| 国产精品无大码| 国产日韩欧美在线精品| 高清不卡的av网站| 亚洲av中文av极速乱| 高清在线视频一区二区三区| 久久综合国产亚洲精品| 久久99一区二区三区| 晚上一个人看的免费电影| 2018国产大陆天天弄谢| 国产免费现黄频在线看| 日韩中文字幕欧美一区二区 | 欧美bdsm另类| 少妇被粗大的猛进出69影院| 一区二区三区乱码不卡18| 亚洲色图 男人天堂 中文字幕| 成年动漫av网址| 久久精品国产综合久久久| 黄片无遮挡物在线观看| 久久精品熟女亚洲av麻豆精品| 国产免费视频播放在线视频| 亚洲精品久久久久久婷婷小说| 亚洲国产毛片av蜜桃av| 日日摸夜夜添夜夜爱| 午夜日本视频在线| 少妇精品久久久久久久| 久久 成人 亚洲| 汤姆久久久久久久影院中文字幕| 午夜影院在线不卡| 卡戴珊不雅视频在线播放| 免费高清在线观看视频在线观看| 国产又爽黄色视频| 嫩草影院入口| 国产精品无大码| 午夜免费观看性视频| 亚洲综合精品二区| av福利片在线| 宅男免费午夜| 成年人午夜在线观看视频| 亚洲欧美成人综合另类久久久| 亚洲国产精品999| 丝袜脚勾引网站| av免费在线看不卡|