• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    CNR:A Cluster-Based Solution for Connectivity Restoration for Mobile WSNs

    2021-12-15 07:08:20MahmoodulHassanAminAlAwadyKhalidMahmoodShahzadAliIbrahimAlgamdiMuhammadKashifSaeedandSafdarZaman
    Computers Materials&Continua 2021年12期

    Mahmood ul Hassan,Amin Al-Awady,Khalid Mahmood,Shahzad Ali,Ibrahim Algamdi,Muhammad Kashif Saeed and Safdar Zaman

    1Department of Computer Skills,Najran University,Najran,66241,Saudi Arabia

    2Department of Information Systems,College of Science and Arts,King Khalid University,Mahayil Asir,63317,Saudi Arabia

    3Department of Computer Science,Jouf University,Tabarjal,76769,Saudi Arabia

    4Department of Computer Science,Community College Mahayil Asir,King Khalid University,Mahayil,63317,Saudi Arabia

    5Federal Directorate of Education,Department of Computer Science,Islamabad,44000,Pakistan

    Abstract: Wireless Sensor Networks (WSNs) are an integral part of the Internet of Things (IoT) and are widely used in a plethora of applications.Typically,sensor networks operate in harsh environments where human intervention is often restricted,which makes battery replacement for sensor nodes impractical.Node failure due to battery drainage or harsh environmental conditions poses serious challenges to the connectivity of the network.Without a connectivity restoration mechanism, node failures ultimately lead to a network partition, which affects the basic function of the sensor network.Therefore, the research community actively concentrates on addressing and solving the challenges associated with connectivity restoration in sensor networks.Since energy is a scarce resource in sensor networks, it becomes the focus of research, and researchers strive to propose new solutions that are energy efficient.The common issue that is well studied and considered is how to increase the network’s life span by solving the node failure problem and achieving efficient energy utilization.This paper introduces a Clusterbased Node Recovery (CNR) connectivity restoration mechanism based on the concept of clustering.Clustering is a well-known mechanism in sensor networks,and it is known for its energy-efficient operation and scalability.The proposed technique utilizes a distributed cluster-based approach to identify the failed nodes, while Cluster Heads (CHs) play a significant role in the restoration of connectivity.Extensive simulations were conducted to evaluate the performance of the proposed technique and compare it with the existing techniques.The simulation results show that the proposed technique efficiently addresses node failure and restores connectivity by moving fewer nodes than other existing connectivity restoration mechanisms.The proposed mechanism also yields an improved field coverage as well as a lesser number of packets exchanged as compared to existing state-of-the-art mechanisms.

    Keywords: WSNs; CHs; CNR; transmission range; connectivity restoration;node failure; cluster; communication range

    1 Introduction

    Wireless sensor networks are widely incorporated into many application areas to perform specific tasks.The progress in wireless and sensor technologies has open many application areas in Wireless Sensor Networks (WSNs), such as battlefield surveillance, environment monitoring,healthcare, agriculture, and home automation [1].Wireless sensor networks have gained tremendous attention from the industrial and research community.The rapid growth of WSNs is happening because it is composed of inexpensive tiny devices, and the processing, sensing, and communication capabilities are integrated on a single chip that can work on a low-powered supply of energy.As a result, many wireless sensor nodes are deployed to handle sensing and computation tasks in WSNs.The area of interest for WSN is usually hostile, so the deployment of the wireless sensor nodes is without any pre-configured infrastructure.Thus, the connectivity and coverage restoration in WSN is a primary goal to be achieved in this paper.

    The failure of sensor nodes partitions the coverage area into disjoint segments, making multiple functional segments of sensor nodes inaccessible.The failed nodes in a WSN break the network’s connectivity and cause the loss of important sensed information.The large-scale node damage in WSN causes numerous disjoint segments in the network, and information from the source sensor node to the base station cannot be routed.Thus, the network’s rapid connectivity restoration is essential for maintaining the network, observing and routing the critical data to the remote centers.The deployment of additional sensor nodes is often impossible in harsh environments.Therefore, the process of connectivity restoration should be self-healing and self-organized with efficient use of the existing sensor nodes.

    Connectivity restoration plays a vital role in the operations of WSN.The tasks in WSN are distributed among all sensor nodes.Due to the resource-constrained characteristic of WSN,it is essential to efficiently use the power, energy, and transmission ranges of the sensor nodes.Clustering is important for achieving energy efficiency and scalability in WSNs.Nodes in a WSN can be combined in such a way that they form a hierarchical topology.This is achieved by making cluster heads, which are powerful nodes that manage many sensor nodes.Sensor nodes send their data readings to the respective cluster heads, which perform data aggregation and eliminate the redundant data before the data is forwarded to a sink node.The cluster head may fail, which requires re-selection of the cluster head.Several approaches have been proposed in the literature to select the primary and backup cluster heads for each sensor node.

    A connectivity restoration mechanism based on the concept of clustering is introduced in this paper.The proposed technique is called Cluster-based Node Recovery (CNR).As connectivity restoration is based on clustering, it inherits all the advantages associated with clustering.To achieve connectivity restoration, CNR moves a fewer number of nodes than existing techniques.Our approach utilizes a recovery mechanism called Wireless Broadcast Advantage (WBA) to deal with one of the well-known drawbacks of clustering, known as disruption in inter-cluster communication.CNR uses a distributed cluster-based approach to identify the failed nodes.For the restoration of connectivity, the cluster heads play a significant role.By conducting the extensive simulation, it is proved that CNR outperforms most of the existing state-of-the-art approaches in multiple performance metrics.

    The rest of the paper is organized as follows.Section 2 reviews the literature by explaining the work associated with the considered problem.Section 3 presents the research method, while Section 4 illustrates the results and analysis.The paper is concluded in Section 5.

    2 Literature Review

    The research in the sensor field started in the 1950s, and Sound Surveillance System (SOSUS)was the first introduced sensor network.The research community has contributed to the connectivity restoration, and a large amount of research work has been done that considers the constraints affecting the connectivity restoration process in WSN.Especially, all the techniques designed for connectivity restoration so far focus on node failure detection and recovery.The node failure is detected by failure detection, and it falls into single or collaborative diagnoses depending on the number of nodes that take part in the failure detection process.

    The algorithm proposed in [2] uses a Markov chain controller to detect the faulty nodes through changes in the received aggregated path readings at the sink node.Sink nodes broadcast join messages in the network, and upon receiving this message, each node selects a suitable sink node by running an instance of the optimal path routing algorithms.During this process, there is a greater chance that the distribution of sensor nodes for each sink is not even.Therefore, all sink nodes collaborate to make the distribution even.In this case, each sensor node sets its associated sink as the destination node and sends a message containing its ID, list of its neighboring nodes,and IDs of nodes on the route to the sink.After receiving all this information, each sink node constructs an aggregated path.The sink nodes then set a time period for their associated nodes to transmit the data.Each sensor node sends data readings frequently within the permissible time.After receiving data readings, the sink constructs a data table for each sensor node.

    The technique presented in [3] deals with failure detection in cluster-based WSNs with the help of neighbor’s coordination and a cluster head detector.The selection of a cluster head depends on the node’s residual energy.If the residual energy is greater than the given threshold,the node becomes a cluster head.The process executes until all cluster heads are selected.After the cluster head selection is finished, each of the remaining nodes has to join at least one cluster head.The cluster heads then start receiving information from their member nodes.If information is received within a specific time period, nodes are considered normal; otherwise, they are counted as dead.The cluster head then calculates the packet delivery ratio for the nodes from which information is received, and it sets an average value for the data packets delivery ratio.If the calculated packet delivery ratio is greater than the average value, the node is considered healthy;otherwise, it is declared a faulty node.

    The fuzzy rule-based Faulty Node Classification and Management (FNCM) scheme proposed in [4] resolves the fault detection issue by classifying the sensor nodes according to their hardware status.The cluster head detects the transmitter circuit fault, whereas the node itself detects the receiver circuit, sensor circuit, and battery fault.The fuzzy logic linguistic variables are used to diagnose and declare the hardware status of sensor nodes.The system, based on the fuzzy logic rule, declares the nodes as normal, dead, busy, and idle based on the hardware status.The research work done in PADRA [5] demonstrates failure detection by one of the neighbors.The approach like MPADRA [6] involves two neighbors, whereas the RIM [7] engages all the neighbors for failure detection.

    The failure recovery process enables the network to perform its services at the pre-failure level or continues its services with graceful degradation.In terms of the participant nodes that take part in the recovery process, the recovery schemes proposed so far can be classified into single schemes or cooperative schemes.For example, the PADRA uses a single elected neighbor to trigger and execute the recovery process, whereas the RIM and C3R [8] make all the neighbors participate in the recovery process.Similarly, the work in DARA [9] and PADRA offer two-hop information and cascaded relocation for recovery, which incurs much overhead.By contrast, the RIM and the C3R only maintain 1-hop neighbor information.The model presented in [10] adopts various approaches like the centralized approach and distributed approach by introducing mobile robots.A different approach involves three routing protocols (PEGASIS, LEACH, and VGA) proposed in [11] is based on the fact that different transmission ranges are possible to prolong the network lifetime.

    The F2CRA and P3CRA algorithms presented in [12] restore the connectivity by providing two vertex-disjoint and three vertex-disjoint paths between every pair of network nodes.The Connectivity Restoration with Assured Fault Tolerance (CRAFT) algorithm proposed in [13] is designed in such a way that it forms the Backbone Polygon (BP) around the center of the partitioned network area.Relay Nodes (RNs) play a vital role in enhancing the connectivity and coverage in an area of interest at a low cost.RNs use two non-overlapping paths that connect each outer partition to the BP and ensure the connectivity restoration of the network.

    In [14], the authors propose a novel connectivity restoration technique called Intelligent On-Demand Connectivity Restoration for Wireless Sensor Networks (IDCRWSN).IDCRWSN efficiently utilizes the residual energy and partial transmission range of the sensor nodes in an integrated manner to restore the network connectivity.The simulation results and analysis of IDCRWSN prove that the proposed technique is energy efficient and can better handle node failure.Moreover, the baseline approaches in [14] require large numbers of nodes to participate in the connectivity restoration process, which results in more moved nodes.This major drawback of the baseline approaches can be solved by the IDCRWSN technique.

    Efficient Solution for Connectivity Restoration (ESCR) [15] is an energy-efficient technique,which aims to restore the network with an efficient consumption of residual energy and least node movement.Meanwhile, only the node that is near the faulty node and has more energy can participate in the network restoration.In [16], the authors have proposed an energy-efficient connectivity restoration technique called Distributed Energy Efficient Node Relocation (DEENR).This technique consumes less energy during the mobility of sensor nodes, and no communication or mobility model is considered for performance evaluation of this technique.

    Considering all the schemes mentioned above for node failure and connectivity restoration in WSNs, it is observed that excessive processing is required to restore wireless sensor network connectivity.To the best of our knowledge, CNR is an efficient technique that adopts a distributed cluster-based approach and imposes less overhead on the sensor nodes while detecting node failure and restoring the connectivity.

    3 Research Method

    3.1 Problem Formulation

    This research proposes a new technique for connectivity restoration that can overcome the drawbacks of the existing techniques.The following assumptions are made for the development of the proposed technique.

    ? A set of N sensor nodes are randomly deployed in a geographic region.

    ? There are two types of sensor nodes:Cluster Heads (CHs) and ordinary sensor nodes.

    ? Cluster heads are assumed to be powerful sensor nodes in terms of processing and battery.

    ? Ordinary sensor nodes are sensor nodes that are less powerful than the CHs and have motion capabilities.

    ? Cluster heads are responsible for identifying failed nodes.As the ordinary nodes send information periodically to CHs, there is no need for any additional control messages.

    3.2 Energy Model

    Each node in WSNs tries to find its neighboring nodes by sending heartbeat messages.It is assumed that every node saves the 1-hops information of the nodes.Every node first sends several beacon messages with different signal strengths to check the forwarding capabilities.Then,other neighboring nodes in the range listen to these messages and return corresponding values.The distance between the nodes is calculated through the Received Signal Strength Indicator(RSSI) [17].The RSSI scheme uses much less energy and does not require time synchronization.Also, it shows the relationship between the received signal energy, transmitted energy, and distance between the nodes.Eqs.(1)–(5) are applied by RSSI in WSNs to find the quality of the link in WSN.

    The reason for selecting the RSSI scheme are low power consumption, no time synchronization, and low complexity.There is a relationship between the energy transmitted and the wireless signal energy received that is needed for calculating the distance among nodes [18].This mechanism is used just for the recovery of failure nodes.This relationship is clearly shown in Eq.(1), whereEris the transmitted energy between two actor nodes,ris the distance, andβis the transmission factor for the path loss that depends on the environment.

    The logarithm is calculated through the following equation:

    In this equation,10logEis the energy represented in dBm.Therefore, Eq.(2) can be written as:

    Hereγandβrepresent the link between the signal transmission distance and the received signal.It is supposed that there are no obstacles between the forwarding and receiving sensor nodes.Based on this concept, the energy transmission of wireless signals at a distanceris calculated as:

    For two nodes having a distancer, the signals are received with the energy:

    λ= 1/ frequency of a node

    Agt & Agr = an antenna gain

    w = failure element of actor node

    r = node distance

    The residual energy of a node can be calculated as:

    The residual energy notations and their description are listed in Tab.1.

    Table 1:Residual energy notation and their description

    3.3 System Model

    It is considered that nodes are randomly deployed in an area of interest.All nodes have the same transmission range denoted asRc.It is assumed that all the nodes are divided into multiple clusters with a controlling cluster head for each cluster.The first step during the network operation is the selection of the cluster head.The cluster heads are selected based on the residual energy of the sensor nodes.For the details of the cluster head selection, the user can refer to one of our previous works [19].Once the cluster heads are selected, then the ordinary nodes start to send information to the cluster head.The cluster head is responsible for collecting sensed information from the ordinary nodes and the identification of the failed nodes.All nodes associated with a single cluster head are referred to as its neighbors.Each ordinary node periodically sends the sensed information to the cluster head.After collecting information from all neighboring nodes, the cluster head sends the accumulated information to the sink in a multi-hop fashion.The formation of clusters and inter-cluster communication is illustrated in Fig.1.Clustering is an efficient approach in terms of energy consumption because it requires fewer messages to be exchanged among nodes, leading to a substantial increase in the network lifetime.

    Figure 1:Formation of clusters and inter-cluster communication

    Clustering can be regarded as an effective approach that can further be utilized to detect node failures in the network.Each cluster head contains all the neighbors’information, such as their locations, their IDs, their energy levels, etc.This information is exchanged by using the Hello messages.Each cluster head keeps track of the energy levels for the neighboring nodes.Meanwhile,a threshold calledEtis defined.If a cluster head does not receive a message from a neighboring nodeNi, it checks whether theEt(Ni)of that node during the previous exchange of the message is below the threshold.If both of these conditions are met, then it assumes that the nodeNihas failed.In the next step, the cluster head decides whether the neighbors of the failed node need to be moved toward the failed node.

    3.4 Clustering-Based Node Relocation(CNR)

    This section explains the working principle of our proposed protocol called Clustering-based Node Relocation (CNR).As introduced in the previous section, CNR makes effective use of clustering for the identification of failed nodes.Once the cluster head detects a failed node, it has to make an important decision regarding the neighboring nodes’movement toward the failed node.The cluster head knows the location of each neighboring node, communication range (Rc),and sensing Range (Rs).The cluster head calculates the sensing area (Ae) that is affected by the failed node.Aecan be seen as the intersection of the three sensing ranges of nodesC,D, andF,as shown in Fig.2.We define a threshold calledAt, which serves as a guideline for neighboring nodes’movement toward the failed node.Atis highly dependent on the particular application or the situation.We assumeAtto be 20 percent of the area of the cluster.IfAeexceeds the threshold value, then the cluster head calculates the distanced1andd2for each neighboring node of the failed node, as shown in Fig.2.The excessive movement of each neighboring node toward the failed node may also reduce the overall sensing area.Therefore, it may not be beneficial for a specific neighbor to move toward the failed node.The cluster head calculates the effective distanceDeffecto move each neighbor.

    One challenge that may occur for the restoration of connectivity is inter-cluster communication.As all nodes in the network are mobile, there is always a possibility of disruption of connectivity among the cluster heads.To handle such disruption, we use a simple technique called WBA [20].The phenomenon is that when a wireless message is broadcasted, it is received not only by the receiver but also by the intermediate nodes that are located between the source and destination.Those nodes are called guard nodes.The Fig.1.below shows that nodesC,F, andK(illustrated in blue color) are guard nodes.These nodes play an important role if the two cluster heads go beyond each other’s communication range.The idea is simple.When a cluster head sends an inter-cluster communication message to the other cluster head, these guard nodes receive the message.They wait for an acknowledgment from the other cluster head.The absence of an acknowledgment message indicates connectivity disruption between the two cluster heads.These guard nodes set a timer based on the residual energy such that the timer of a node with a higher energy level expires first and retransmits the inter-cluster message toward the destination cluster head.This technique can mitigate the connectivity disruption among the cluster heads.

    Figure 2:Detection of failed node and node relocation within a cluster

    ?

    4 Results and Analysis

    To compare the propos ed protocol with the existing baseline protocols, we utilized the INET framework [21] of the OMNeT++ simulator.The performance of the proposed protocol was compared with three existing techniques, including C3R [8], VCR [22], and IDCRWSN [14].The performance metrics used for comparison were the average number of nodes moved, the total distance moved to restore connectivity, the percentage of coverage reduction, and the total number of exchanged packets.The simulation parameters are listed in Tabs.2 and 3 explains the objectives of the baseline algorithms.

    Table 2:Simulation parameters and their description

    Table 3:Compared baseline techniques

    To analyze Algorithm 1, we need to count how many times one instruction is executing in the algorithm.For this purpose, we used the frequency count method shown in Tab.4, which is also called the step cunt method.

    Cost=n*c1+n*c2+n*c3+n*c4+n*n*c5+n*n*c6+n*n*c7+n*n*c8+n*n*c9

    Cost=n*(c1+c2+c3+c4)+n*n*(c5+c6+c7+c8+c9)

    Cost=(c5+c6+c7+c8+c9)*n*n+(c1+c2+c3+c4)*n+0

    Cost=(c5+c6+c7+c8+c9)*n2+(c1+c2+c3+c4)*n+0

    The cost is of the formf(n)=an2 + bn+c.It means that the function it produces is a quadratic equation, so the complexity of this algorithm isO(n2).

    Table 4:Frequency count method for algorithm analysis

    4.1 Number of Nodes Moved

    Fig.3 shows the performance of all considered protocols in terms of the average number of nodes moved during connectivity restoration.It can be seen from the figure that among all the considered protocols, C3R results in the highest number of nodes moved.The major reason for this phenomenon is cascaded relocation, where a large number of nodes need to move toward the failed node for the connectivity restoration process.Similarly, VCR also results in a higher average number of nodes to be moved for the connectivity restoration process.Due to the excessive movement of neighboring nodes for the connectivity restoration process, both VCR and C3R result in a higher percentage reduction of field.IDCRWSN performs better than C3R and VCR because a special node, called care-taker, moves on-demand to restore the connectivity.Our proposed protocol CNR performs better than the considered protocols.The benefit of using clustering for node relocation is exhibited in the figure.The increase of the number of nodes increases the average number of nodes moved for all considered protocols.However, for CNR, a decline can be observed in the average number of nodes moved as the network’s total number of nodes is increased.The major reason behind this phenomenon is that as we increase the number of nodes in the network, the number of nodes in each cluster also increases.As the movement of nodes toward the failed node is controlled by the cluster head, the decision is based on the reduction in the sensing area.Therefore, more nodes in a cluster indicate moving fewer nodes.

    Figure 3:Average number of nodes moved in VCR, C3R, and IDCRWSN

    4.2 Coverage Reduction

    Fig.4 illustrates the percentage of reduction in field coverage for different communication ranges of the nodes.As the communication range increases, the field coverage reduction decreases for all considered protocols.C3R and VCR perform worse than the other considered protocols.The major reason is the cascaded relocation of excessive nodes, which causes holes in the coverage and results in a drastic reduction in the field coverage.IDCRWSN is based on a centralized approach, where the care-taker nodes are responsible for the connectivity restoration.The centralized control limits the coverage reduction more in IDCRWSN than those in VCR and C3R.Our proposed technique CNR outperforms all the baseline techniques in terms of reduction in field coverage.The percentage of reduction in field coverage is less for higher transmission ranges.

    Figure 4:Percentage reduction in field coverage

    4.3 Total Distance Moved During Relocation

    The total distance moved by all nodes in the network during connectivity restoration is illustrated in Fig.5.The number of nodes in the network varies between 20 to 200.It can be observed in Fig.5 that as the number of nodes increases, the total distance moved during relocation increases for all the baseline protocols (VCR, C3R, and IDCRWSN).However, for our proposed protocol CNR, as the number of nodes in the network increases, the total distance moved during relocation decreases.This is due to the inherent characteristics of clustering.Clustering performs very well in scalability.Therefore, as the number of nodes in the network increases, the probability of finding a suitable neighbor close to the failed node also increases.Therefore, a fewer number of nodes need to be relocated to achieve connectivity restoration.Moreover, CNR also moves the least number of nodes for relocation and does not rely on cascaded relocation, which substantially reduces the total distance moved during relocation.Fig.5 shows two different variations of the CNR withAtequals to 10 percent and 20 percent, respectively.It can be observed from the figure thatAtaffects the performance.ReducingAtresults in a slight increase in the total distance moved during relocation because reducing the thresholdAtresults in moving more relocation nodes.

    Figure 5:Nodes vs.moved distance

    4.4 Number of Exchanged Packets

    The proposed CNR exchanges the least number of packets among all other baseline techniques.Clustering reduces the number of transmitted packets and thus achieves better energy efficiency.Moreover, Fig.6 confirms the scalability of the proposed technique.As the number of nodes increases, the total number of transmitted packets increases for all baseline techniques.Our proposed technique CNR results in the least number of packets transmitted.One major reason for this is the use of clustering to reduce the number of control packets.Moreover, avoiding the excessive movement of the neighboring nodes of a failed node also results in the transmission of fewer packets.

    Figure 6:Total number of exchanged packets

    5 Conclusion

    In this paper, we proposed a novel connectivity restoration technique based on clustering.It moved the least number of nodes when compared to existing techniques for connectivity restoration.Moreover, it also utilized a recovery mechanism called “wireless broadcast advantage”to dealing with connectivity disruption during inter-cluster communication.Besides, our approach utilized a distributed cluster-based approach to identify the failed nodes, and cluster heads played an important role in the restoration of connectivity.In this work, we compared our technique CNR with a variety of baseline techniques.The proposed technique took full advantage of clustering and outperformed all the other considered techniques in terms of multiple performance metrics.

    The future work will be conducted in two possible dimensions.The first dimension will involve developing an analytical model for the proposed solution under different mobility models.Further,the second dimension will consider implementing the proposed solution on real sensor nodes and doing extensive performance evaluation.

    Acknowledgement:The authors extend their appreciation to the Deanship of Scientific Research at Najran University for funding this work through Research Groups under Grant Number (NU/ESCI/17/093).We appreciate the linguistic assistance provided by TopEdit(www.topeditsci.com) during the preparation of this manuscript.

    Funding Statement:This research is funded by Najran University Saudi Arabia, under the research Project Number (NU/ESCI/17/093).URL:www.nu.edu.sa

    Conflicts of interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久午夜综合久久蜜桃| 欧美日韩国产mv在线观看视频| 欧美精品亚洲一区二区| 久久久久久久久久久丰满| 少妇被粗大的猛进出69影院 | 卡戴珊不雅视频在线播放| 亚洲欧美清纯卡通| 亚洲美女搞黄在线观看| 欧美人与善性xxx| 人体艺术视频欧美日本| 日韩伦理黄色片| 国产精品偷伦视频观看了| 啦啦啦在线观看免费高清www| 高清不卡的av网站| 啦啦啦啦在线视频资源| 尾随美女入室| 街头女战士在线观看网站| 97超视频在线观看视频| 日韩av免费高清视频| 爱豆传媒免费全集在线观看| 亚洲欧洲精品一区二区精品久久久 | 少妇 在线观看| 97在线人人人人妻| 伦理电影大哥的女人| 伊人久久精品亚洲午夜| 亚洲精品久久久久久婷婷小说| 高清av免费在线| av国产久精品久网站免费入址| 91精品国产九色| 国产精品人妻久久久久久| 永久网站在线| 久久久国产一区二区| 性色avwww在线观看| 嘟嘟电影网在线观看| 少妇被粗大的猛进出69影院 | 中文字幕久久专区| 色网站视频免费| 最新中文字幕久久久久| 国产免费视频播放在线视频| 内地一区二区视频在线| 黑丝袜美女国产一区| 精品国产乱码久久久久久小说| 久久人人爽av亚洲精品天堂| 99热全是精品| 伊人久久精品亚洲午夜| 搡女人真爽免费视频火全软件| 亚洲精品久久午夜乱码| 蜜桃久久精品国产亚洲av| 九草在线视频观看| 亚洲美女视频黄频| 国产精品久久久久久av不卡| 久久精品国产鲁丝片午夜精品| 欧美激情国产日韩精品一区| 日韩中字成人| 国产成人a∨麻豆精品| 在线亚洲精品国产二区图片欧美 | 如日韩欧美国产精品一区二区三区 | 国产成人免费观看mmmm| 国产精品熟女久久久久浪| 国产色爽女视频免费观看| 久久国产精品大桥未久av | 久久这里有精品视频免费| 日本黄大片高清| 一级毛片 在线播放| 精品卡一卡二卡四卡免费| 中文字幕免费在线视频6| 国产成人freesex在线| 少妇人妻一区二区三区视频| 啦啦啦视频在线资源免费观看| 国产一级毛片在线| 成人免费观看视频高清| 十分钟在线观看高清视频www | 国产一区二区三区综合在线观看 | 91午夜精品亚洲一区二区三区| 国产精品免费大片| 国产精品国产三级国产专区5o| 国产又色又爽无遮挡免| 如日韩欧美国产精品一区二区三区 | 亚州av有码| 久久国内精品自在自线图片| 精品亚洲成国产av| 天天操日日干夜夜撸| 欧美精品国产亚洲| 久久精品夜色国产| 国产成人freesex在线| 国产熟女午夜一区二区三区 | 亚洲av不卡在线观看| 国产一区二区三区综合在线观看 | 男人舔奶头视频| 欧美国产精品一级二级三级 | 日韩中字成人| 在线观看免费高清a一片| 免费黄网站久久成人精品| 国产黄片美女视频| 亚洲自偷自拍三级| 五月天丁香电影| 免费黄频网站在线观看国产| 日韩一本色道免费dvd| 国国产精品蜜臀av免费| av卡一久久| 晚上一个人看的免费电影| 一个人看视频在线观看www免费| 亚洲熟女精品中文字幕| 国产成人a∨麻豆精品| 又爽又黄a免费视频| 插逼视频在线观看| a级毛片免费高清观看在线播放| 97精品久久久久久久久久精品| 免费看不卡的av| av在线观看视频网站免费| 久久综合国产亚洲精品| 久久精品国产亚洲av天美| 亚洲中文av在线| 99久久精品热视频| 一本大道久久a久久精品| 夜夜爽夜夜爽视频| av播播在线观看一区| 日日摸夜夜添夜夜爱| 高清毛片免费看| 色网站视频免费| 亚州av有码| 欧美精品亚洲一区二区| 少妇高潮的动态图| 亚洲av福利一区| 欧美xxxx性猛交bbbb| 在线播放无遮挡| 精华霜和精华液先用哪个| 国产免费视频播放在线视频| 日韩精品免费视频一区二区三区 | 天堂俺去俺来也www色官网| 十八禁网站网址无遮挡 | 成人综合一区亚洲| 国产精品偷伦视频观看了| 日日摸夜夜添夜夜爱| 精品亚洲成国产av| 一区二区三区精品91| 免费观看性生交大片5| 九九爱精品视频在线观看| 高清午夜精品一区二区三区| 国产男女内射视频| 久久久久久久大尺度免费视频| 欧美日韩综合久久久久久| 亚洲自偷自拍三级| 亚洲精品成人av观看孕妇| 久久精品国产亚洲av涩爱| 午夜av观看不卡| 国产精品久久久久久av不卡| 亚洲第一av免费看| 久久国产乱子免费精品| 性色avwww在线观看| 久久这里有精品视频免费| 欧美精品一区二区免费开放| 欧美日韩国产mv在线观看视频| 国产免费又黄又爽又色| 在线观看免费日韩欧美大片 | 国产爽快片一区二区三区| 欧美区成人在线视频| 大片电影免费在线观看免费| 久久久久久久大尺度免费视频| 全区人妻精品视频| 美女xxoo啪啪120秒动态图| 特大巨黑吊av在线直播| 亚洲精品aⅴ在线观看| 久久影院123| 纯流量卡能插随身wifi吗| 97超碰精品成人国产| 精品人妻偷拍中文字幕| av国产精品久久久久影院| 欧美日韩av久久| 午夜福利,免费看| 免费播放大片免费观看视频在线观看| 欧美日韩av久久| 精品人妻熟女毛片av久久网站| 国产伦精品一区二区三区视频9| 亚洲精品日本国产第一区| kizo精华| av又黄又爽大尺度在线免费看| 97精品久久久久久久久久精品| 人妻制服诱惑在线中文字幕| 一边亲一边摸免费视频| 久久久久久人妻| 永久网站在线| 少妇猛男粗大的猛烈进出视频| 成人综合一区亚洲| 久久国产乱子免费精品| 黄色视频在线播放观看不卡| 黄色日韩在线| 99九九线精品视频在线观看视频| 91成人精品电影| 91午夜精品亚洲一区二区三区| 日日爽夜夜爽网站| 国产伦精品一区二区三区四那| 观看av在线不卡| 高清欧美精品videossex| 少妇被粗大的猛进出69影院 | 国产精品一区二区在线观看99| 欧美精品国产亚洲| 老熟女久久久| 日日啪夜夜撸| 国产精品久久久久成人av| 欧美高清成人免费视频www| 最新中文字幕久久久久| a级毛色黄片| 欧美日韩综合久久久久久| 亚洲欧洲精品一区二区精品久久久 | 51国产日韩欧美| 日韩,欧美,国产一区二区三区| 亚洲一级一片aⅴ在线观看| 少妇 在线观看| 久久女婷五月综合色啪小说| 久久影院123| 涩涩av久久男人的天堂| 国产精品福利在线免费观看| 中文乱码字字幕精品一区二区三区| 欧美激情国产日韩精品一区| 免费av中文字幕在线| 纯流量卡能插随身wifi吗| 亚洲av欧美aⅴ国产| 亚洲,一卡二卡三卡| 欧美一级a爱片免费观看看| 国产一区二区三区av在线| 久久国内精品自在自线图片| 女性生殖器流出的白浆| 狂野欧美激情性xxxx在线观看| 免费黄网站久久成人精品| 欧美精品人与动牲交sv欧美| 插阴视频在线观看视频| 大香蕉久久网| 18禁在线播放成人免费| 日韩精品免费视频一区二区三区 | 三级经典国产精品| 欧美日韩视频高清一区二区三区二| 久久久a久久爽久久v久久| 日本与韩国留学比较| 最近手机中文字幕大全| 国产精品99久久久久久久久| 亚洲欧洲日产国产| 国产一区有黄有色的免费视频| 国产 一区精品| 国产精品熟女久久久久浪| 国产成人freesex在线| 久久久国产一区二区| 国产爽快片一区二区三区| 一级,二级,三级黄色视频| 国模一区二区三区四区视频| www.av在线官网国产| 免费av中文字幕在线| 十八禁高潮呻吟视频 | 乱人伦中国视频| 91午夜精品亚洲一区二区三区| 国模一区二区三区四区视频| 精品酒店卫生间| 欧美国产精品一级二级三级 | 亚洲精品国产成人久久av| 日日啪夜夜爽| 26uuu在线亚洲综合色| 国产 精品1| 亚洲经典国产精华液单| 国产高清有码在线观看视频| 尾随美女入室| √禁漫天堂资源中文www| 亚洲精品乱码久久久v下载方式| 日产精品乱码卡一卡2卡三| 99久国产av精品国产电影| 黄色配什么色好看| 久久人人爽av亚洲精品天堂| 蜜桃在线观看..| 亚洲精品乱久久久久久| 丝瓜视频免费看黄片| 2022亚洲国产成人精品| 乱系列少妇在线播放| 人体艺术视频欧美日本| 亚洲高清免费不卡视频| 国产伦理片在线播放av一区| √禁漫天堂资源中文www| videos熟女内射| 国产熟女午夜一区二区三区 | 青春草亚洲视频在线观看| 乱码一卡2卡4卡精品| 欧美日韩视频精品一区| 亚洲人与动物交配视频| 国产成人精品无人区| 91精品伊人久久大香线蕉| 午夜福利,免费看| 免费久久久久久久精品成人欧美视频 | 亚洲av.av天堂| 免费看日本二区| 22中文网久久字幕| 简卡轻食公司| 亚洲av日韩在线播放| 毛片一级片免费看久久久久| 亚洲欧美日韩东京热| 丰满乱子伦码专区| 午夜视频国产福利| 色哟哟·www| 久久久国产欧美日韩av| 又大又黄又爽视频免费| 女的被弄到高潮叫床怎么办| 国产黄频视频在线观看| 99久久精品国产国产毛片| 午夜影院在线不卡| 人人妻人人澡人人看| 青春草国产在线视频| 成人毛片60女人毛片免费| 亚洲va在线va天堂va国产| 少妇高潮的动态图| 久久国产亚洲av麻豆专区| 久久亚洲国产成人精品v| 国产亚洲91精品色在线| 久久精品国产鲁丝片午夜精品| 五月伊人婷婷丁香| 91精品国产九色| 蜜臀久久99精品久久宅男| 精品一区二区三区视频在线| 国产女主播在线喷水免费视频网站| 国语对白做爰xxxⅹ性视频网站| 国产在线免费精品| 国产成人免费无遮挡视频| 精品少妇黑人巨大在线播放| 久久人人爽av亚洲精品天堂| 色5月婷婷丁香| 国产亚洲午夜精品一区二区久久| 美女中出高潮动态图| 爱豆传媒免费全集在线观看| 在线观看一区二区三区激情| 各种免费的搞黄视频| 老熟女久久久| 亚洲国产精品专区欧美| 新久久久久国产一级毛片| 一区二区av电影网| 国产深夜福利视频在线观看| 日韩精品有码人妻一区| 久久久久久久国产电影| 99热国产这里只有精品6| 一级av片app| 国产亚洲5aaaaa淫片| 国产成人aa在线观看| 三级国产精品欧美在线观看| 国产老妇伦熟女老妇高清| 国产av码专区亚洲av| 热re99久久国产66热| 国产在线视频一区二区| 日日爽夜夜爽网站| h日本视频在线播放| 亚洲精品久久午夜乱码| 黄色一级大片看看| 91精品伊人久久大香线蕉| 少妇高潮的动态图| 好男人视频免费观看在线| 国产白丝娇喘喷水9色精品| 亚洲欧美日韩卡通动漫| 欧美激情极品国产一区二区三区 | 黑人猛操日本美女一级片| 国产色婷婷99| 多毛熟女@视频| h视频一区二区三区| 亚洲av福利一区| 在线观看一区二区三区激情| 日韩av免费高清视频| 久久狼人影院| 激情五月婷婷亚洲| 国产伦精品一区二区三区四那| 高清av免费在线| 青春草视频在线免费观看| 黑人高潮一二区| tube8黄色片| 亚州av有码| 99热这里只有是精品50| 国产男人的电影天堂91| 男女无遮挡免费网站观看| av又黄又爽大尺度在线免费看| 久久久久久久亚洲中文字幕| 日韩av免费高清视频| 久久精品熟女亚洲av麻豆精品| 亚洲国产欧美在线一区| 久久狼人影院| 亚洲精品国产色婷婷电影| 国产又色又爽无遮挡免| 中国国产av一级| 蜜桃在线观看..| 中国国产av一级| 亚洲无线观看免费| 亚洲欧美日韩卡通动漫| 国产男女超爽视频在线观看| 亚洲综合精品二区| 亚洲av日韩在线播放| 精品一区二区三区视频在线| 亚洲精品乱码久久久久久按摩| 狂野欧美激情性bbbbbb| 日日啪夜夜撸| 如何舔出高潮| www.色视频.com| 精品亚洲乱码少妇综合久久| 一本—道久久a久久精品蜜桃钙片| videos熟女内射| 黑人高潮一二区| 中文字幕久久专区| 亚洲欧洲精品一区二区精品久久久 | 欧美精品高潮呻吟av久久| 777米奇影视久久| 欧美97在线视频| 国产国拍精品亚洲av在线观看| 青春草视频在线免费观看| 午夜久久久在线观看| 亚洲人成网站在线观看播放| 色视频在线一区二区三区| 久久精品国产亚洲av涩爱| 日日爽夜夜爽网站| 插逼视频在线观看| 国产精品久久久久久精品电影小说| 边亲边吃奶的免费视频| 国产乱来视频区| 亚洲欧美精品专区久久| 久久久久久久大尺度免费视频| 少妇人妻 视频| 乱码一卡2卡4卡精品| 精品午夜福利在线看| 美女中出高潮动态图| 一级毛片电影观看| 精品人妻熟女毛片av久久网站| 黄色毛片三级朝国网站 | 国产 精品1| 日日啪夜夜撸| 18禁动态无遮挡网站| 日本wwww免费看| 精品人妻一区二区三区麻豆| 高清av免费在线| 18+在线观看网站| 日韩成人av中文字幕在线观看| 亚洲中文av在线| 性色avwww在线观看| 人妻夜夜爽99麻豆av| 黄色视频在线播放观看不卡| 国产精品无大码| 午夜精品国产一区二区电影| 日韩大片免费观看网站| 久久久精品免费免费高清| 国产日韩一区二区三区精品不卡 | av.在线天堂| 人妻少妇偷人精品九色| 亚洲精品,欧美精品| 亚洲国产成人一精品久久久| 日韩大片免费观看网站| 80岁老熟妇乱子伦牲交| 久久久久久久精品精品| 欧美区成人在线视频| 麻豆成人午夜福利视频| 国产极品天堂在线| 久久久久久人妻| 最近最新中文字幕免费大全7| 免费人成在线观看视频色| 男女无遮挡免费网站观看| av黄色大香蕉| 一级a做视频免费观看| 日韩成人伦理影院| 啦啦啦视频在线资源免费观看| 九九在线视频观看精品| a 毛片基地| 男的添女的下面高潮视频| 日韩一区二区三区影片| 亚洲欧美成人综合另类久久久| 国产色爽女视频免费观看| 国产成人精品婷婷| 丁香六月天网| www.色视频.com| 亚洲国产精品国产精品| 中文字幕人妻丝袜制服| 一区在线观看完整版| 男人狂女人下面高潮的视频| 在线观看免费日韩欧美大片 | 99九九在线精品视频 | 美女内射精品一级片tv| 免费av不卡在线播放| 嫩草影院入口| 日韩,欧美,国产一区二区三区| 一边亲一边摸免费视频| 少妇精品久久久久久久| 美女国产视频在线观看| 国产无遮挡羞羞视频在线观看| 亚洲精品自拍成人| 曰老女人黄片| 国产免费一级a男人的天堂| 色婷婷久久久亚洲欧美| 国产免费福利视频在线观看| 国产在视频线精品| 老司机影院毛片| 亚洲高清免费不卡视频| 女人久久www免费人成看片| av国产精品久久久久影院| 精品少妇黑人巨大在线播放| 人人澡人人妻人| 久久av网站| 亚洲情色 制服丝袜| 尾随美女入室| 美女xxoo啪啪120秒动态图| 亚洲欧美成人精品一区二区| 夫妻午夜视频| 国产av一区二区精品久久| 一级a做视频免费观看| 成年女人在线观看亚洲视频| 午夜激情久久久久久久| 免费少妇av软件| 日韩三级伦理在线观看| 一个人免费看片子| 国产亚洲欧美精品永久| 国产伦在线观看视频一区| 能在线免费看毛片的网站| 午夜福利网站1000一区二区三区| 在线观看www视频免费| 日韩制服骚丝袜av| h视频一区二区三区| 亚洲色图综合在线观看| 国产精品一区二区性色av| 国产精品一二三区在线看| 少妇人妻一区二区三区视频| av在线老鸭窝| 视频中文字幕在线观看| 99视频精品全部免费 在线| 欧美xxxx性猛交bbbb| 国内揄拍国产精品人妻在线| 日本欧美视频一区| 91在线精品国自产拍蜜月| 欧美日韩一区二区视频在线观看视频在线| 麻豆乱淫一区二区| 我的女老师完整版在线观看| 日韩在线高清观看一区二区三区| 91精品伊人久久大香线蕉| 久久热精品热| 99久久人妻综合| 夫妻午夜视频| 亚洲经典国产精华液单| 亚洲精品第二区| 搡女人真爽免费视频火全软件| 日韩一区二区视频免费看| 色视频在线一区二区三区| 你懂的网址亚洲精品在线观看| 国产亚洲一区二区精品| 久久久久视频综合| 一个人看视频在线观看www免费| 国内精品宾馆在线| 午夜av观看不卡| 欧美一级a爱片免费观看看| 天堂8中文在线网| 制服丝袜香蕉在线| 久久久久久久大尺度免费视频| 一边亲一边摸免费视频| 国产精品.久久久| 亚洲欧美一区二区三区国产| 日韩制服骚丝袜av| 熟女av电影| 我要看黄色一级片免费的| 国产午夜精品久久久久久一区二区三区| 精品人妻一区二区三区麻豆| av天堂久久9| 一级毛片黄色毛片免费观看视频| 韩国高清视频一区二区三区| 国产精品国产三级国产av玫瑰| 日日摸夜夜添夜夜添av毛片| 日韩免费高清中文字幕av| 在线观看免费日韩欧美大片 | 国产熟女欧美一区二区| 青春草国产在线视频| 极品人妻少妇av视频| 亚洲欧美成人精品一区二区| 高清欧美精品videossex| 国产午夜精品久久久久久一区二区三区| 国产一区有黄有色的免费视频| 欧美日韩视频高清一区二区三区二| 男女免费视频国产| 久久久久久人妻| 免费av中文字幕在线| 最近中文字幕2019免费版| 久久精品久久久久久久性| 中文精品一卡2卡3卡4更新| 免费人成在线观看视频色| 黄色毛片三级朝国网站 | 丝袜在线中文字幕| 久久久国产一区二区| av有码第一页| 日韩一区二区三区影片| 日韩三级伦理在线观看| 亚洲,欧美,日韩| 国产精品久久久久久精品电影小说| 99热国产这里只有精品6| 两个人免费观看高清视频 | 婷婷色麻豆天堂久久| 观看免费一级毛片| 亚洲色图综合在线观看| 男人舔奶头视频| 国产一区有黄有色的免费视频| 日日爽夜夜爽网站| 2022亚洲国产成人精品| 免费少妇av软件| 男男h啪啪无遮挡| 汤姆久久久久久久影院中文字幕| 在线观看一区二区三区激情| 久久国产亚洲av麻豆专区| 免费高清在线观看视频在线观看| 国产色爽女视频免费观看| 日日爽夜夜爽网站| 最新的欧美精品一区二区| 亚洲第一av免费看| 91精品伊人久久大香线蕉| 自拍偷自拍亚洲精品老妇| 男人添女人高潮全过程视频| 美女内射精品一级片tv| 如日韩欧美国产精品一区二区三区 | 熟妇人妻不卡中文字幕| 国产日韩一区二区三区精品不卡 | 精华霜和精华液先用哪个| 亚洲人成网站在线观看播放| 我要看黄色一级片免费的| 99热国产这里只有精品6| 日日摸夜夜添夜夜添av毛片| 亚洲国产色片|