• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    2021-12-15 07:08:42SeyedAminHosseiniSenoMahdiNikooghadamandRahmatBudiarto
    Computers Materials&Continua 2021年12期

    Seyed Amin Hosseini Seno,Mahdi Nikooghadam and Rahmat Budiarto

    1Department of Computer Engineering,Ferdowsi University of Mashhad,Mashhad,9177948974,Iran

    2Department of Informatics,Faculty of Science and Technology,Universitas Alazhar Indonesia,Jakarta,12110,Indonesia

    Abstract: Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system, service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis, whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore, it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th, i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol.

    Keywords: Authentication; key agreement protocol; tele-medical; Scyther;perfect forward secrecy

    1 Introduction

    With the rapid development and advancement of information technology, new Internet-based services have emerged, such as online banking, online medicine, and online training.Since all of these services utilize the potentially insecure environment of the Internet, the disclosure of important and sensitive information is a major concern for users.

    Medical online service is one of the most sensitive Internet-based services, in which patient medical records are stored in databases and transmitted over the Internet.These records contain confidential information on patient illness and treatment.To take advantage of telemedicine,patients must register with a medical provider.After the initial registration process, whenever telemedicine services are accessed, the user and the server must authenticate to each other.If each party confirms the other party’s identity, the two can reach a key agreement and exchange their messages through the shared key.

    When Internet-based communications are not secure, it is very possible that an unauthorized party disclosures patient information and resulting violation of patient’s privacy.To address this issue, many research works have focused on the security and authentication of telecommunications protocols [1–6].Nevertheless, the proposed protocols are still lack of perfect forward secrecy feature.This research work attempts to address the issue and come up with a robust and efficient lightweight authentication and key agreement protocol for patient privacy in network communications by considering perfect forward secrecy.A robust protocol should be developed based on comprehensive analysis and evaluation on the security requirements.Thus, this work begins with investigating the existing relevant protocols to reveal the flaws and strengths then design the protocol in such a way to avoid the flaws.

    The article is organized as follows.Section 2 reviews previous studies and Section 3 analyzes the Mehmood et al.[7] protocol.Section 4 proposes a secure and efficient protocol for authentication and key exchange which is resistant to various attacks.Section 5 deals with the security analysis of the introduced protocol, while Section 6 presents formal analysis using Scyther tool [8].Then, Section 7 compares the proposed protocol with similar ones in terms of time complexity.Finally, Section 8 provides conclusion and discusses future work.

    2 Related Works

    In 2012, Wu et al.[9] introduced a “password and smart card” authentication protocol.However, in the same year, Debiao et al.[10] revealed that the Wu et al.protocol was not resistant to “insider and impersonation”attacks and so they introduced an improved protocol.Tan et al.[11] proposed a biometric-based authentication protocol for Telecare medical information system (TMIS), claiming it was resistant to all attacks and could meet various security needs.Finding that the Tan et al.[11] protocol was not immune to DoS and replay attacks, Arshad and Arshad et al.[12] introduced a new three-factor biometric-based protocol.In 2015, Giri et al.[13]demonstrated that the Khan et al.[14] protocol was not resistant to the Stolen-verifier attack and off-line password guessing attack and then developed an RSA encryption-based validation protocol to ward off this attack.When studying the Giri et al.[13] protocol in 2015, Amin et al.[15]discovered that it was vulnerable to insider and password guessing attacks and, thus, could not meet the security requirement of anonymity.In the same year, Arshad et al.[16] demonstrated that the Muhaya protocol [17] was not resistant to the Stolen-verifier attack and off-line password guessing attack and unable to meet the “perfect forward secrecy” security requirement, so Arshad et al.proposed an Elliptic-curve cryptography (ECC)-based authentication scheme for TMIS, in which the user is anonymous.

    Chaudhry et al.[18] evaluated Amin and Biswas protocol [19] and reported its lack of resistance to stolen smart card attacks and an ineffective password change phase.They further improved the protocol.

    Jiang et al.[19] examined the three-factor authentication protocol proposed by Lu et al.[20]and declared it to be vulnerable to password guessing and user and server impersonation attacks.After making enhancements to the three-factor protocol, they provided a more viable solution to the security issues proposed by Lu et al.[20].Zhang et al.[21] presented a three-factor plan for medical service authentication, by then, Aghili et al.[22], showed to be at risk of DoS and insider attacks.

    At the same time, Ostadsharif et al.[23] reviewed the protocols presented in [13,15] and found they were not resistant to key compromise impersonation attacks.In addressing this, they introduced a new protocol for authentication and key agreement between patients and medical practitioners.Later, Kumari et al.[24] reported that the protocol of Ostadsharif et al.[25] still failed to resist key compromise impersonation attacks.Furthermore, Khatoon et al.[26] presented a physician and medical practitioner authentication protocol, which Amintoosi et al.[4] reviewed the same year, concluding that its security did not provide perfect forward secrecy and was open to known-session-specific temporary information attacks.

    Ravanbakhsh et al.[2] then came up with an interesting scheme for authentication and key agreement in telemedicine, which, although their design had several advantages, but their design could not meet the “perfect forward secrecy” and is not resistant to “known session-specific temporary information attack”.Sowjanya et al.[27] examined the plan proposed by Li et al.[28]and concluded that the plan [28] has shortcomings such as not meeting the security requirements of Perfect Forward Secrecy.Also, He et al.[29] states that the plan in their other article [30]unable to meet the “perfect forward secrecy” security requirement Lastly, He et al.introduced a protocol for remote patient and physician authentication and claimed that it was resistant to all attacks and met various security requirements.The present study, nevertheless, proves that this protocol does not satisfy the security demands of perfect forward secrecy.Tab.1 summarizes existing protocols and their issues in chronological time.

    Table 1:Existing protocols and issues in chronological time

    Table 1:Existing Protocols and issues in chronological time

    3 Analyzing the Weaknesses of the Mehmood et al.’s Protocol

    This section briefly reviews the protocol by Mehmood et al.[7] and analyzes the weaknesses of its security.Authentication and key authentication protocols usually include three phases:registration, authentication, and password change.According to Fig.1, in the registration phase,the communication channel between the two channel entities is assumed to be secure.Furthermore, the parties communicate through a secure channel or in person.During the login and authentication process (Fig.2), the channel is considered unsafe and the attacker can listen to the channel.Tab.2 provides the symbols employed in Mehmood et al.’s protocol.

    Figure 1:Registration phase of Mehmood et al.[7] protocol

    Figure 2:Authentication phase of Mehmood et al.[7] protocol

    Table 2:Symbols used in Mehmood et al.[7] protocol

    Mehmood et al.[7] presented a protocol for two-way authentication of patients and medical servers, declaring that it was resistant to most attacks and fulfilled various security needs.This section, however, proves that this protocol does not provide perfect forward secrecy and is vulnerable to DoS attacks.

    3.1 Perfect Forward Secrecy

    The security system of Perfect Forward Secrecy assumes that an attacker should not be able to access the session key even if long term parameters, such as the server’s secret key, are compromised.However, if such a breach occurs in Mehmood et al.’s protocol, the attacker can,in fact, obtain the session key.To explain the matter, one can suppose that the attacker has the secret key of the server.Because parameterNIDiis exchanged on the public channel (an insecure channel), the attacker can decode this parameter and obtainiduiandrs.As assumed that the attacker already have had the server’s secret key and now also to possess parameteridui, the attacker can then calculateXibased onXi=h(idui||xs).However, because there is aGiparameter on the public channel inru1=Gi⊕h(idui||Xi)and the attacker had acquiredXiandiduiin the previous steps, the attacker can now obtainru1.

    Furthermore, due to the relationshiprs1=m2⊕h(idui||Xi)has parameterm2on the public channel and the attacker had obtainediduiandXiin the previous steps, the attacker is able to acquirers1.As a result, the attacker can procure the session key from relationshipSK= h(Xi||idui||rs1||ru1).

    3.2 DOS Attack

    When the user sends the first message to the server, the initial action taken before authentication is decryption, which is a demanding operation.During this strain on the server, the attacker can repeatedly send the message, thuskeepingthe server extremely busy and unable to respond to requests.

    4 A Secure and Efficient Protocol for Authentication and Key Exchange

    In order to address the drawbacks of Mehmood et al.[7] protocol, this work introduces a secure and efficient ECC-based protocol for authentication and key exchange.This scheme features registration, authentication, key agreement, and password update stages, for which a detailed description will be provided.Tab.3 presents the symbols utilized in the proposed protocol.

    Table 3:Symbols used in the proposed protocol

    4.1 Registration Phase

    As seen in Fig.3, during the registration process, the patient selects his/her own ID (IDi) and a password (pwi).Then, after selecting a random number,ai, the proposed protocol computesAiasAi=h(IDi||pwi||ai)and finally sendsAiandIDito the server via a secure channel.Upon receiving a message from the patient, the server obtains parametersBi,HIDi,Di,Qi, andGifrom relationships described in the following.In the registration process for each patient, theQianddiparameters are ultimately saved in the server’s memory.Additionally, theDi,Bi,Gi,bianddiparameters are stored in the patient’s smart card, which is sent to the patient.The patient then adds theaiandWi=Gi⊕Aiparameter to the smart card and the registration process finishes.

    ComputeHIDi=h(bi||IDi)

    ComputeBi=h(Ai||HIDi)

    Selects random numberdi

    ComputeDi=h(Bi||IDi||Ai)

    ComputeQi=h(HIDi||s)

    ComputeGi=Bi⊕Qi

    Figure 3:Registration phase of the proposed protocol

    4.2 Login and Authentication Phase

    In this phase, the patient and server authenticate each other, after which the patient can log into the server.As presented in Fig.4, during the login and authentication stage of the proposed protocol, the patient inserts his/her smart card into the card reader and enters the correctIDand password.Initially, through the following relationships, the smart card is verified as belonging to the patient in question and, therefore, not stolen.

    Figure 4:Login and authentication phase of the proposed protocol

    At this point, parameterMiis obtained from relationMi=h(Qi||Gi||HIDi||Bi||Tu)and the timestamp (Tu)is selected.Finally, parametersMi,Tu,BiandHIDiare sent to the server.

    As soon as it receives the patient’s message, the server checks for its freshness.Possessing its own secret key, the server obtains parameterQifrom the relationQi=h(HIDi||s).Then, from the following relationships, the server determines whether the message received is fake or not; in other words, the authenticity of the patient message is verified.

    ComputeQi=h(HIDi||s)

    ComputeGi=Bi⊕Qi

    Compute=h(Qi||Gi||HIDi||Bi||Tu)

    CheckMi=

    Now, the server selects the timestamp (Ts) and obtains the session key from the relationshipSKi= h(Qi||di||Gi).Also acquired is parameterAuthsfrom the following relation.Finally, the server sendsAuthsandTsto the patient.

    Auths=h(SKi||Gi||Qi||Ts)

    As soon as it receives the server’s message, the patient checks for its freshness.After creating the session key from the following relationship, the patient authenticates the received message to verify its authenticity and identity.In this manner, the login and authentication phase of the proposed protocol finishes.

    ComputeSKi= h(Qi||di||Gi)

    ComputeAuths=h(SKi||Gi||Qi||Ts)

    CheckAuths=?Authu

    4.3 Change Password Phase

    In this phase, the patient can securely change his/her password.To do so, the patient first enters the password () as well as ID (.Then, the following relationships are computed to determine if the smart card belongs to the patient in question.

    At this point, the patient enters the new password (The following relationships are computed and then parameterreplaces parameterDiin the smart card.

    5 Security Analysis of the Proposed Protocol

    The security parameters of the proposed protocol are discussed in the following sections.

    5.1 Perfect Forward Secrecy

    According to Nikooghadam et al.[31], the security measure of Perfect Forward Secrecy assumes that an attacker cannot obtain the session key even if the secret key of one of the parties is disclosed or if long term parameters are exposed.In the proposed protocol, the session key is equal toSKi= h(Qi||di||Gi), such that the attacker cannot access parameterdi, even when it is able to acquire the secret key of the server.Sincediis a random parameter, the attacker cannot obtain it.

    5.2 Anonymity

    In anonymity, it is presumed that the attacker cannot access the identity of the parties if it intercepts all messages transmitted on the public channel.In the proposed protocol, even if the attacker hears all messages transmitted on the public channel, it will not be able to obtain the parties’IDs.

    5.3 Replay Attack

    In the replay attack, the attacker is assumed to intercept an old message from the public channel and send it to the parties after a period of time.In the proposed protocol, such attack does not occur due to the use of time stamps and random parameters.

    5.4 DoS Attack

    A DoS attack occurs when a substantial operation, such as scalar multiplication, is performed by one of the two entities.The proposed protocol would not experience such an attack as no considerable jobs are undertaken, such as decoding or scalar multiplication.

    5.5 User Impersonation Attack

    Due to the two-way authentication between the patient and server, impersonation is not possible.One can consider the scenario in which the attacker sends fake parameters, i.e.,:Mi,Tu,Bi, andHIDi, instead of the main parameters.Since the attacker does not have the server’s secret key, it is not able to obtain theQiparameter nor is feasible to continue.

    5.6 Server Impersonation Attack

    Since there is a session key within theAuthsparameter andAuthsis used for authentication,the attacker cannot obtain the session key and, therefore, cannot impersonate.Furthermore, with the output of the Scyther tool, there is also no possibility of impersonation attacks occurring.

    5.7 Insider Attack

    In the insider attack, it is assumed that the attacker is on the server side and intends to acquire the user password.Consequently, in the registration stage, the proposed protocol does not send the patient’s password directly to the server.Therefore, the password is sent to the service provider in the form ofAi=h(IDi||pwi||ai).As a result, such an attack is not possible.

    5.8 Password Guessing Attack

    The assumption of the password guessing attack is that the user password cannot be guessed even if the attacker intercepts all the messages transmitted on the public channel.Because the user password is in the format ofAi=h(IDi||pwi||ai), it has been exchanged and, therefore, cannot be guessed.

    5.9 Known-Session-Specific Temporary Information Attack

    In this attack, it is presumed that the attacker cannot obtain nor construct the session key,even if it acquires random parameters.Furthermore, in the session key, there are long term parameters, such asQi.Therefore, if the attacker acquires random parameters, the long term parameters shall prevent this attack.

    5.10 Stolen-Verifier Attack

    The stolen-verifier attack assumes that it is not possible for the attacker to access the session key if it has acquired the parameters within the server memory or the smart card.In the proposed protocol, since the server’s memory is tamper-proof, such parameters cannot be stolen.In addition, since there are no important parameters inside the smart card, the attacker cannot obtain the session key by stealing it.

    6 Formal Security Analysis with Scyther

    Scyther [8] is a powerful and effective tool for analyzing and identifying potential attacks and security protocol vulnerabilities.This official tool automatically analyzes protocol and scrutinizes its behavior when faced with most possible attacks.Implementation code Scyther tool is shown in Fig.5.

    Figure 5:Implementation code of Scyther

    Fig.6 provides the output of the proposed protocol review by Scyther, i.e.,:

    Figure 6:Evaluation of proposed protocol by Scyther tool [8]

    — The Niagree feature ensures the parties in communication are confident that messages are securely transmitted and in correct order between them.

    — The Nisynch feature makes sure that messages exchanged between parties cannot be decrypted and resent.

    — The Alive feature guarantees that the protocol steps are approved by the parties in communication.

    — The Weakagree feature sees to it that the protocol does not impersonate.

    — The secret property also ensures that the relevant parameter remains safe.

    As shown in Fig.6, the proposed authentication protocol provides all of the above features.

    According to the material presented and evaluated by the usage of the Scyther tool, Tab.4 compares the security of the proposed protocol with that of other similar protocols.Based on the information in this table, the proposed protocol is resistant to various attacks and meets various security requirements.

    Table 4:Security comparison

    7 Analysis and Validation Using BAN Logic

    In this section, we analyze and validate our proposed design using BAN logic.The logical assumptions and rules of the Burrows–Abadi–Needham (BAN) logic, as well as the security objectives and ideal forms, are defined in (1) to (6).The symbols used are shown in Tab.5.

    Some assumptions are shown in Tab.6.

    Table 5:Symbols of BAN logic

    Table 6:Assumptions

    Goals are as follows:

    Idealized forms are as follows:

    Message 1:Ui→S:((Gi,HIDi,Bi,Tu)Qi, (Gi)Qi, Tu,(IDi)bi)).

    Message 2:S→

    Based on the assumptions and logical rules of BAN logic, we analyze the ideal form of the proposed protocol as follows:According to the Message 1, we can obtain the following:

    R1:S?((Gi,HIDi,Bi,Tu)Qi,<Gi>Qi,Tu,(IDi)bi).

    Based on the assumption A2, and after applying the H rule to R1, R2 can be deduced as:

    R2:S| ≡Ui| ~(Gi,HIDi,Bi,Tu).

    Based on the assumption A7, and after applying the nonce verification rule H to R2, R3 can be deduced as:

    R3:S| ≡Ui| ~(Gi,HIDi,Bi).

    Based on the Message 2, R4 can be deduced as:

    R4:Ui?(Ts,(Ui,Gi,Ts)Qi).

    Based on the assumption A4, and after applying the H rule to R4, R5 can be deduced as:

    R5:Ui| ≡S| ~(Ui,Gi,Ts).

    Based on the applying the nonce verification rule to R5, R6 can be deduced as:

    R6:Ui| ≡S| ≡(Gi).

    Based on the assumptions A1, A3, A6, and the session key sk = h (Qi||di||Gi), R7 can be deduced as:

    R7:Ui| ≡S| ≡(UiS).

    Based on the assumption A5, and after applying the jurisdiction rule to R7, R8 can be deduced (which is Goal1) as:

    R8:Ui| ≡(UiS).

    Based on the R3, assumptions A2, A4 and the session key sk = h (Qi||di||Gi), R9 can be deduced as:

    R9:S|≡Ui| ≡(UiS).

    Based on the assumption A6, and after applying the jurisdiction rule to R9, R10 can be deduced (which is Goal2) as:

    R10:S| ≡(UiS).

    8 Analysis and Comparison of the Proposed Protocol’s Time Complexity with Other Similar Protocols

    Based on research work by He et al.[30] the computation time of a fuzzy extraction operation, the time of performing a hash function, the time of performing symmetric encryption/decryption, the time of performing ECC point multiplication, the time of performing ECC point addition operation, and the time of modular exponentiation operation is 0.063075, 0.0005,0.0087, 0.063075, 0.000262, and 0.522 s, respectively and the symbol for each are listed in the Tab.7.Furthermore, for the communication cost, we have considered the size of an identifier or timestamp to be 32 bits, a nonce to be 64 bits, an EC point to be 320 bits, and a hash output to be 256 bits.

    Table 7:Symbols used to calculate time complexity and approximate time

    As exhibited in Tabs.8 and 9, the proposed protocol performs better than or closer to similar protocols in the past.The importance of this issue is apparent when the proposed protocol is able to meet security requirements with less complexity than of most similar protocols.

    Table 8:Time complexity of the proposed protocol and other similar protocols

    Table 9:The number of messages exchanged on the channel at the authentication stage

    9 Conclusion

    Having done revealing flaws in perfect forward secrecy and preventing DoS attacks of authentication and key agreement scheme proposed by Mehmood et al, this work has proposed a secure and ultra-lightweight protocol for medical services communication.The proposed protocol was analyzed in term of secureness and performance during the authentication stage was measured.Formal analysis using Scyther tool proves its robustness against various attacks, and demonstrates its ability to provide various security features.During the authentication stage, measurement results showed that the proposed protocol outperforms other existing protocol and achieves a satisfactory computational time and less number of bits in the exchanged messages.Telemedicine provides easy and secure access to patient information by physicians and access to the large number of specialist physicians needed by patients, even patients in remote and underprivileged areas, while saving time and money.

    As future work, the proposed protocol can be implemented hardware-wise using the ARM and FPGA programming languages and the Cortex-M3 Microcontroller board, and the results can be reviewed.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av在线播放精品| 蜜桃国产av成人99| 一区二区三区精品91| 久久久亚洲精品成人影院| 在线看a的网站| 国产日韩欧美在线精品| 五月天丁香电影| 天美传媒精品一区二区| www.精华液| 性少妇av在线| 菩萨蛮人人尽说江南好唐韦庄| 丰满乱子伦码专区| 久久精品久久精品一区二区三区| 国产av国产精品国产| av片东京热男人的天堂| 国产免费现黄频在线看| 亚洲三级黄色毛片| 黄色 视频免费看| 美女国产高潮福利片在线看| 亚洲欧美日韩另类电影网站| 赤兔流量卡办理| av网站免费在线观看视频| av免费在线看不卡| 嫩草影院入口| 在线 av 中文字幕| 大片免费播放器 马上看| 黑人猛操日本美女一级片| 午夜91福利影院| 免费不卡的大黄色大毛片视频在线观看| 不卡视频在线观看欧美| 国产精品久久久av美女十八| 午夜精品国产一区二区电影| 激情视频va一区二区三区| 妹子高潮喷水视频| 熟女av电影| 男女啪啪激烈高潮av片| 久久影院123| 国产精品免费视频内射| 欧美激情 高清一区二区三区| 日韩一本色道免费dvd| av网站在线播放免费| 国精品久久久久久国模美| 大片免费播放器 马上看| 黄色怎么调成土黄色| 性少妇av在线| 电影成人av| 在线天堂最新版资源| 亚洲,欧美精品.| h视频一区二区三区| 叶爱在线成人免费视频播放| freevideosex欧美| 一区二区三区精品91| 女性生殖器流出的白浆| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品国产av蜜桃| 在线免费观看不下载黄p国产| 亚洲精品国产av成人精品| 亚洲精品成人av观看孕妇| 日本91视频免费播放| 久久久久久人妻| 亚洲国产最新在线播放| av免费在线看不卡| 亚洲欧洲国产日韩| 一级毛片 在线播放| 91午夜精品亚洲一区二区三区| 免费大片黄手机在线观看| 国产精品一区二区在线观看99| videosex国产| av视频免费观看在线观看| 韩国高清视频一区二区三区| 精品国产国语对白av| 天堂8中文在线网| 丰满迷人的少妇在线观看| 亚洲一级一片aⅴ在线观看| 国产男女内射视频| 18禁裸乳无遮挡动漫免费视频| 国产福利在线免费观看视频| 夫妻性生交免费视频一级片| h视频一区二区三区| 亚洲精品久久成人aⅴ小说| 精品国产一区二区三区四区第35| 高清黄色对白视频在线免费看| 欧美日韩亚洲国产一区二区在线观看 | 在线观看美女被高潮喷水网站| 中文字幕人妻熟女乱码| 国产欧美日韩综合在线一区二区| 日韩不卡一区二区三区视频在线| 男女国产视频网站| 亚洲欧美一区二区三区久久| 亚洲综合精品二区| 天美传媒精品一区二区| 色视频在线一区二区三区| 日本av手机在线免费观看| 国产精品女同一区二区软件| 有码 亚洲区| 国产综合精华液| 免费看av在线观看网站| 少妇的逼水好多| 寂寞人妻少妇视频99o| 丝袜人妻中文字幕| 日韩在线高清观看一区二区三区| 伊人久久国产一区二区| 免费黄频网站在线观看国产| 午夜影院在线不卡| 日本91视频免费播放| 成年人免费黄色播放视频| 看非洲黑人一级黄片| 久久韩国三级中文字幕| 亚洲三级黄色毛片| 永久免费av网站大全| 少妇人妻 视频| 精品午夜福利在线看| 亚洲av国产av综合av卡| 亚洲欧美一区二区三区黑人 | 成人国产av品久久久| 又黄又粗又硬又大视频| 中文精品一卡2卡3卡4更新| 男的添女的下面高潮视频| 中文天堂在线官网| 日韩av不卡免费在线播放| 汤姆久久久久久久影院中文字幕| 街头女战士在线观看网站| 黑人猛操日本美女一级片| 性色av一级| 久久精品熟女亚洲av麻豆精品| 国产高清不卡午夜福利| 免费观看av网站的网址| 精品国产露脸久久av麻豆| 国产一区二区激情短视频 | 欧美亚洲日本最大视频资源| 9热在线视频观看99| 巨乳人妻的诱惑在线观看| 欧美黄色片欧美黄色片| 你懂的网址亚洲精品在线观看| 国产乱人偷精品视频| 97人妻天天添夜夜摸| 欧美日韩国产mv在线观看视频| 王馨瑶露胸无遮挡在线观看| 一级a爱视频在线免费观看| 蜜桃在线观看..| 欧美日韩成人在线一区二区| 国产精品人妻久久久影院| 国产亚洲欧美精品永久| 日韩av不卡免费在线播放| av.在线天堂| 黄色配什么色好看| 不卡视频在线观看欧美| 天天操日日干夜夜撸| 一本—道久久a久久精品蜜桃钙片| 五月天丁香电影| 日韩一区二区视频免费看| 免费高清在线观看日韩| 满18在线观看网站| 午夜福利在线免费观看网站| 免费高清在线观看日韩| 免费观看在线日韩| 欧美日韩一级在线毛片| 精品午夜福利在线看| 国产成人a∨麻豆精品| 少妇 在线观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久久久视频综合| 制服人妻中文乱码| 国产精品三级大全| 成人国产av品久久久| 一级毛片我不卡| 国产乱来视频区| 亚洲精品美女久久av网站| 国产97色在线日韩免费| 国产一级毛片在线| 狠狠婷婷综合久久久久久88av| 亚洲国产av新网站| av在线播放精品| 一本久久精品| 午夜日韩欧美国产| 人妻人人澡人人爽人人| 777久久人妻少妇嫩草av网站| 国产 精品1| 欧美成人午夜免费资源| 国产成人一区二区在线| 91午夜精品亚洲一区二区三区| 亚洲精品久久久久久婷婷小说| 国产女主播在线喷水免费视频网站| 久久久亚洲精品成人影院| 日日撸夜夜添| www.精华液| 午夜老司机福利剧场| 欧美成人午夜免费资源| 国产福利在线免费观看视频| 国产精品久久久久久av不卡| 亚洲视频免费观看视频| 18禁裸乳无遮挡动漫免费视频| 国产乱来视频区| 国产精品国产av在线观看| 老鸭窝网址在线观看| 久久99蜜桃精品久久| 99精国产麻豆久久婷婷| 午夜福利在线观看免费完整高清在| 亚洲精品久久久久久婷婷小说| 亚洲国产av影院在线观看| 两个人看的免费小视频| 免费黄网站久久成人精品| 美女大奶头黄色视频| 中文字幕最新亚洲高清| 一边摸一边做爽爽视频免费| 乱人伦中国视频| tube8黄色片| 国产精品不卡视频一区二区| 久久精品人人爽人人爽视色| 午夜日本视频在线| 日本wwww免费看| 丰满迷人的少妇在线观看| 国产一级毛片在线| 亚洲av欧美aⅴ国产| 久久国产亚洲av麻豆专区| 欧美97在线视频| 欧美日韩精品成人综合77777| 一二三四中文在线观看免费高清| 国产亚洲一区二区精品| 国产精品久久久av美女十八| 老女人水多毛片| 国产成人午夜福利电影在线观看| 在线天堂最新版资源| 这个男人来自地球电影免费观看 | 最新中文字幕久久久久| 在线观看www视频免费| 波野结衣二区三区在线| 久久久久久伊人网av| 亚洲 欧美一区二区三区| 国产精品国产三级国产专区5o| 大片免费播放器 马上看| 成人影院久久| 国产亚洲午夜精品一区二区久久| 久久99热这里只频精品6学生| 午夜老司机福利剧场| 国产精品蜜桃在线观看| 99re6热这里在线精品视频| 男女啪啪激烈高潮av片| 制服人妻中文乱码| 久久婷婷青草| 国产一区亚洲一区在线观看| 高清在线视频一区二区三区| 国产欧美日韩综合在线一区二区| 激情视频va一区二区三区| 成年美女黄网站色视频大全免费| 人人妻人人添人人爽欧美一区卜| 国产精品香港三级国产av潘金莲 | 国产成人精品久久二区二区91 | 曰老女人黄片| 国产成人午夜福利电影在线观看| 超色免费av| 免费av中文字幕在线| 2021少妇久久久久久久久久久| www日本在线高清视频| 三级国产精品片| 在线观看一区二区三区激情| 国产熟女欧美一区二区| 午夜av观看不卡| 国产精品一区二区在线不卡| 国产精品一二三区在线看| 亚洲第一区二区三区不卡| 久久综合国产亚洲精品| kizo精华| 中文字幕色久视频| 亚洲精品成人av观看孕妇| 久久av网站| 天天操日日干夜夜撸| 日韩人妻精品一区2区三区| 波多野结衣一区麻豆| 一边亲一边摸免费视频| 男男h啪啪无遮挡| 成年av动漫网址| 国产免费现黄频在线看| 欧美日韩视频高清一区二区三区二| 免费少妇av软件| 国产精品一国产av| 好男人视频免费观看在线| av在线app专区| 国产伦理片在线播放av一区| 美女高潮到喷水免费观看| 高清黄色对白视频在线免费看| av福利片在线| 久久久久久久精品精品| 欧美 日韩 精品 国产| 亚洲av电影在线进入| 男女高潮啪啪啪动态图| 三上悠亚av全集在线观看| 亚洲中文av在线| 18在线观看网站| xxx大片免费视频| 午夜福利影视在线免费观看| 人妻系列 视频| 亚洲视频免费观看视频| 成人毛片a级毛片在线播放| 亚洲av电影在线观看一区二区三区| 亚洲精品中文字幕在线视频| 天天躁夜夜躁狠狠久久av| 中文字幕最新亚洲高清| 久久久久久久大尺度免费视频| 国产探花极品一区二区| 大香蕉久久网| 这个男人来自地球电影免费观看 | 狠狠婷婷综合久久久久久88av| 最黄视频免费看| 高清欧美精品videossex| 欧美激情极品国产一区二区三区| 最近最新中文字幕免费大全7| 欧美 亚洲 国产 日韩一| 在线观看免费视频网站a站| 久久免费观看电影| 七月丁香在线播放| 精品卡一卡二卡四卡免费| 丝袜脚勾引网站| 亚洲欧美日韩另类电影网站| 国产色婷婷99| 国产福利在线免费观看视频| 丰满迷人的少妇在线观看| av线在线观看网站| 一级片免费观看大全| 欧美精品国产亚洲| 欧美 亚洲 国产 日韩一| av线在线观看网站| 亚洲精华国产精华液的使用体验| 国产成人午夜福利电影在线观看| 国产精品av久久久久免费| 久久久精品国产亚洲av高清涩受| 午夜老司机福利剧场| 亚洲欧美成人精品一区二区| 亚洲一级一片aⅴ在线观看| 日韩中文字幕欧美一区二区 | 欧美老熟妇乱子伦牲交| 高清视频免费观看一区二区| 亚洲人成电影观看| 9191精品国产免费久久| 国产精品麻豆人妻色哟哟久久| 99国产精品免费福利视频| 亚洲天堂av无毛| 九色亚洲精品在线播放| 久久久国产精品麻豆| 国产亚洲欧美精品永久| 国产日韩欧美视频二区| 久久亚洲国产成人精品v| 精品国产乱码久久久久久男人| 日本vs欧美在线观看视频| 丝袜美足系列| 成年动漫av网址| 一级,二级,三级黄色视频| 欧美中文综合在线视频| 国产精品久久久久久久久免| 亚洲av电影在线进入| 国精品久久久久久国模美| 99国产精品免费福利视频| 久久久久久久久免费视频了| 老汉色av国产亚洲站长工具| 一二三四中文在线观看免费高清| 日韩,欧美,国产一区二区三区| av片东京热男人的天堂| 亚洲国产欧美日韩在线播放| 性高湖久久久久久久久免费观看| 国产男女内射视频| 亚洲综合精品二区| av线在线观看网站| 精品少妇黑人巨大在线播放| 日韩伦理黄色片| 久久午夜福利片| 国产精品蜜桃在线观看| 女性生殖器流出的白浆| 久久久久精品久久久久真实原创| av在线播放精品| 国产亚洲精品第一综合不卡| 精品国产露脸久久av麻豆| 夫妻午夜视频| 伊人久久国产一区二区| 女人精品久久久久毛片| 巨乳人妻的诱惑在线观看| 欧美精品国产亚洲| 丁香六月天网| 观看av在线不卡| 热99国产精品久久久久久7| 少妇的逼水好多| 2022亚洲国产成人精品| 久久综合国产亚洲精品| 纯流量卡能插随身wifi吗| 国产成人一区二区在线| 人人妻人人澡人人看| 亚洲av免费高清在线观看| 免费看不卡的av| 亚洲一级一片aⅴ在线观看| 久久久国产欧美日韩av| 久久久精品国产亚洲av高清涩受| 啦啦啦啦在线视频资源| 美女脱内裤让男人舔精品视频| 国产精品 欧美亚洲| 建设人人有责人人尽责人人享有的| 亚洲视频免费观看视频| 大香蕉久久成人网| 午夜福利视频精品| 巨乳人妻的诱惑在线观看| 日韩av在线免费看完整版不卡| 午夜福利视频精品| 伦理电影大哥的女人| 丝袜美足系列| 免费大片黄手机在线观看| 欧美精品av麻豆av| 999久久久国产精品视频| 午夜福利网站1000一区二区三区| 极品人妻少妇av视频| 午夜福利影视在线免费观看| 国产xxxxx性猛交| 哪个播放器可以免费观看大片| 色播在线永久视频| 国产精品国产av在线观看| 日本vs欧美在线观看视频| 天天躁夜夜躁狠狠躁躁| 成人国语在线视频| 美女午夜性视频免费| 国产成人免费观看mmmm| 黄网站色视频无遮挡免费观看| 黄色一级大片看看| 哪个播放器可以免费观看大片| 激情五月婷婷亚洲| 亚洲精品日本国产第一区| 女人被躁到高潮嗷嗷叫费观| 国产一级毛片在线| 久久毛片免费看一区二区三区| 日韩一卡2卡3卡4卡2021年| 日日啪夜夜爽| 国产亚洲欧美精品永久| 国产午夜精品一二区理论片| 最近中文字幕高清免费大全6| 九草在线视频观看| 婷婷色综合www| 精品福利永久在线观看| 精品国产超薄肉色丝袜足j| 看非洲黑人一级黄片| 亚洲少妇的诱惑av| 亚洲内射少妇av| 欧美老熟妇乱子伦牲交| 国产免费视频播放在线视频| 永久网站在线| 久久久久国产精品人妻一区二区| 一级片免费观看大全| 人妻少妇偷人精品九色| 人体艺术视频欧美日本| 亚洲内射少妇av| 午夜精品国产一区二区电影| 女性生殖器流出的白浆| 777久久人妻少妇嫩草av网站| 黄色视频在线播放观看不卡| 午夜日本视频在线| 久久久久久久大尺度免费视频| 日本vs欧美在线观看视频| 丁香六月天网| 精品一区在线观看国产| 大香蕉久久网| 热99国产精品久久久久久7| 1024视频免费在线观看| 纯流量卡能插随身wifi吗| 国产97色在线日韩免费| 在线观看人妻少妇| av片东京热男人的天堂| 丝瓜视频免费看黄片| 哪个播放器可以免费观看大片| 九色亚洲精品在线播放| 熟女电影av网| av一本久久久久| 涩涩av久久男人的天堂| 中文天堂在线官网| 一本久久精品| 亚洲成色77777| 制服人妻中文乱码| 男女午夜视频在线观看| 婷婷色综合大香蕉| 狂野欧美激情性bbbbbb| 超色免费av| 熟妇人妻不卡中文字幕| 久久久国产一区二区| 欧美黄色片欧美黄色片| 亚洲欧美一区二区三区久久| 午夜福利网站1000一区二区三区| 国产精品久久久久久精品古装| 欧美日韩一级在线毛片| 午夜精品国产一区二区电影| 日本午夜av视频| 国产亚洲一区二区精品| 精品国产露脸久久av麻豆| 人人澡人人妻人| 欧美精品高潮呻吟av久久| 国产免费现黄频在线看| 亚洲国产欧美在线一区| 蜜桃国产av成人99| 中文欧美无线码| 最近中文字幕高清免费大全6| 秋霞伦理黄片| xxx大片免费视频| 精品一品国产午夜福利视频| 91在线精品国自产拍蜜月| 欧美日韩综合久久久久久| 狂野欧美激情性bbbbbb| 日韩不卡一区二区三区视频在线| 男人舔女人的私密视频| 日韩不卡一区二区三区视频在线| 欧美 日韩 精品 国产| 日韩人妻精品一区2区三区| 午夜日韩欧美国产| 久久精品aⅴ一区二区三区四区 | 婷婷色麻豆天堂久久| 一区二区三区乱码不卡18| 国产精品二区激情视频| 国产精品人妻久久久影院| 狠狠精品人妻久久久久久综合| 久久久久久久久久久久大奶| 久久久久网色| 一区二区三区精品91| 热99国产精品久久久久久7| 日本-黄色视频高清免费观看| 久久精品国产综合久久久| 亚洲成色77777| 欧美日韩国产mv在线观看视频| 久久久久久久久久人人人人人人| 国产在视频线精品| 在线看a的网站| 国产 精品1| 亚洲一区二区三区欧美精品| 欧美精品亚洲一区二区| 亚洲激情五月婷婷啪啪| 黄网站色视频无遮挡免费观看| 国产精品无大码| 热re99久久精品国产66热6| 欧美日韩成人在线一区二区| 麻豆精品久久久久久蜜桃| 亚洲色图 男人天堂 中文字幕| 18禁动态无遮挡网站| 极品人妻少妇av视频| 女人高潮潮喷娇喘18禁视频| 美女国产视频在线观看| 日本欧美视频一区| 亚洲国产欧美在线一区| 欧美变态另类bdsm刘玥| 午夜久久久在线观看| 亚洲欧美成人精品一区二区| 亚洲精品久久午夜乱码| 亚洲av电影在线进入| 久久国内精品自在自线图片| 最近最新中文字幕大全免费视频 | 大香蕉久久成人网| a级毛片黄视频| 亚洲激情五月婷婷啪啪| a 毛片基地| 精品酒店卫生间| 亚洲情色 制服丝袜| 欧美老熟妇乱子伦牲交| 国产亚洲最大av| 久久精品国产鲁丝片午夜精品| 少妇人妻久久综合中文| 久久精品国产a三级三级三级| 国产精品成人在线| 麻豆乱淫一区二区| 91国产中文字幕| 男女午夜视频在线观看| 欧美日韩视频高清一区二区三区二| 欧美xxⅹ黑人| 纯流量卡能插随身wifi吗| 午夜久久久在线观看| 国产成人精品在线电影| 日韩中文字幕欧美一区二区 | 亚洲熟女精品中文字幕| 国产淫语在线视频| 91精品伊人久久大香线蕉| 亚洲精品日韩在线中文字幕| 老女人水多毛片| 日本爱情动作片www.在线观看| 久久精品国产亚洲av高清一级| 国产欧美日韩一区二区三区在线| 黑人猛操日本美女一级片| 欧美日韩综合久久久久久| 久久久久久免费高清国产稀缺| 亚洲综合色网址| 国产白丝娇喘喷水9色精品| 国产精品99久久99久久久不卡 | 亚洲精品国产av成人精品| 国产一区二区三区av在线| 久久精品熟女亚洲av麻豆精品| 嫩草影院入口| 青草久久国产| 日韩精品免费视频一区二区三区| 好男人视频免费观看在线| 国产精品成人在线| 国产淫语在线视频| 亚洲国产欧美网| 两性夫妻黄色片| 精品一品国产午夜福利视频| 精品国产国语对白av| 欧美精品一区二区免费开放| 日本欧美视频一区| 毛片一级片免费看久久久久| 日韩av在线免费看完整版不卡| 在线观看人妻少妇| 亚洲色图综合在线观看| 亚洲一区二区三区欧美精品| 欧美av亚洲av综合av国产av | 国产在线一区二区三区精| 久久午夜综合久久蜜桃| 男女免费视频国产| 国产深夜福利视频在线观看| 在线观看美女被高潮喷水网站| 亚洲av欧美aⅴ国产| 国产日韩欧美亚洲二区| 91在线精品国自产拍蜜月| 午夜日本视频在线| 日本欧美视频一区| 亚洲国产欧美网| 一区在线观看完整版| 赤兔流量卡办理| 热99国产精品久久久久久7|