• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    TBDDoSA-MD:Trust-Based DDoS Misbehave Detection Approach in Software-defined Vehicular Network(SDVN)

    2021-12-15 07:08:46RajendraPrasadNayakSrinivasSethiSouravKumarBhoiKshiraSagarSahooNzJhanjhiThamerTabbakhandZahrahAlmusaylim
    Computers Materials&Continua 2021年12期

    Rajendra Prasad Nayak,Srinivas Sethi,Sourav Kumar Bhoi,Kshira Sagar Sahoo,Nz Jhanjhi,Thamer A.Tabbakh and Zahrah A.Almusaylim

    1Department of CSE,Government College of Engineering(BPUT University,Rourkela),Kalahandi,766002,India

    2Department of CSE Indira Gandhi Institute of Technology(BPUT University Rourkela),Sarang,759146,India

    3Department of CSE,Parala Maharaja Engineering College(BPUT University Rourkela),Berhampur,761003,India

    4Department of CSE,SRM University,Amaravati,522502,AP,India

    5School of Computer Science and Engineering,Taylor’s University,Subang Jaya,47500,Malaysia

    6Material Research Science Institute,King Addulaziz City for Science and Technology(KACST),Riyad,6086,Kingdom of Saudi Arabia

    7King Addulaziz City for Science and Technology(KACST),Riyad,6086,Kingdom of Saudi Arabia

    Abstract: Reliable vehicles are essential in vehicular networks for effective communication.Since vehicles in the network are dynamic,even a short span of misbehavior by a vehicle can disrupt the whole network which may lead to catastrophic consequences.In this paper, a Trust-Based Distributed DoS Misbehave Detection Approach (TBDDoSA-MD)is proposed to secure the Software-Defined Vehicular Network (SDVN).A malicious vehicle in this network performs DDoS misbehavior by attacking other vehicles in its neighborhood.It uses the jamming technique by sending unnecessary signals in the network,as a result,the network performance degrades.Attacked vehicles in that network will no longer meet the service requests from other vehicles.Therefore, in this paper, we proposed an approach to detect the DDoS misbehavior by using the trust values of the vehicles.Trust values are calculated based on direct trust and recommendations(indirect trust).These trust values help to decide whether a vehicle is legitimate or malicious.We simply discard the messages from malicious vehicles whereas the authenticity of the messages from legitimate vehicles is checked further before taking any action based on those messages.The performance of TBDDoSA-MD is evaluated in the Veins hybrid simulator,which uses OMNeT++and Simulation of Urban Mobility(SUMO).We compared the performance of TBDDoSA-MD with the recently proposed Trust-Based Framework(TBF)scheme using the following performance parameters such as detection accuracy,packet delivery ratio,detection time, and energy consumption.Simulation results show that the proposed work has a high detection accuracy of more than 90% while keeping the detection time as low as 30 s.

    Keywords: Software-defined vehicular network; trust; evaluator node; denial of service; misbehavior

    1 Introduction

    Vehicular Network (VN) is a kind of networking infrastructure where Vehicle-to-Vehicle(V2V) and Vehicle-to-Infrastructure (V2I) communication takes place using wireless network [1].Each vehicle in the network is treated as a network node and is equipped with sensing, processing,forwarding, and wireless communication capabilities.Since each vehicle in the network system performs the sensing, processing, and forwarding operation, the system is called an Intelligent Transportation System (ITS) [2].The main objective of the ITS is to provide safety and services to people.Service requests in a network cannot be provided or fulfilled if the number of requests exceeds the capability of the network.The malicious vehicles can jam the network by performing Distributed Denial of Service (DDoS) attacks to their neighbor vehicles and Road Side Units(RSUs).In a vehicular network V2V and V2I communication takes place using Dedicated Short Range Communication (DSRC) [3].

    Due to the dynamic nature of vehicles in the network, communication links between vehicles establish for a very short span of time.Hence, a short span of misbehavior can disrupt the entire network, and tracing the misbehavior causing vehicle is a challenging task.So, misbehavior causing vehicles need to be detected as early as possible.There is also a high chance of uncertainty in the network due to different road layouts, lane structure, vehicle driver behaviors, and density of traffic.Vehicle density also varies in different geographical locations and timing.Locations like market places, traffic and highway jams, the density of vehicles are more as compared to other remote areas and also timing like an office hour and evening time, the density of vehicles is normally more.During these periods and locations, vehicles are going to receive multiple pieces of the same information from different nodes present in that area and also from different RSUs directly or through multihop communication.This makes the network more vulnerable to one of the catastrophic attacks, i.e., Distributed Denial of Service (DDoS) attack.Hence, this type of attack needs to be detected to save the network from catastrophic consequences.

    The contributions of the paper are stated as follows:

    ? In a vehicular network, DDoS attackers overwhelm packets in a particular network with redundant packets or information; as a result, legitimate nodes become deprived of different network services due to the network congestion [4].Further, dynamic topology and decentralization of the VN make it difficult to detect malicious attackers.To overcome these challenges, a Trust-Based Distributed DoS Misbehave Detection Approach(TBDDoSA-MD) is proposed to secure the SDVN.

    ? The trust value is calculated for a vehicle based on the direct trust and recommendations received from other surrounding vehicles.Before taking any action based on the information received from any other vehicle, the trust value of that vehicle is calculated by an Evaluator Node (EN).Based on the trust value, the EN decides a vehicle is malicious or genuine.If the vehicle is malicious, the EN simply discards the packets received from that vehicle, else the authenticity of packets is further checked by using the data trust model.SDN-based vehicular network is used to carry out the simulation using Veins hybrid simulator.

    The rest of the paper is organized as follows.Related works based on misbehavior detection are extensively studied in Section 2.Section 3 explains the network model, misbehavior model,and the proposed misbehavior detection method.In Section 4, the detailed simulation is described and its results are analyzed.The conclusion and future work are presented in Section 5.

    2 Related Works

    Many research works relating to DDoS detection in VN have been carried out by researchers.Some of those works are discussed as follows.Kolandaisamy et al.[5] presented a Multivariant Stream Analysis (MVSA) approach to detect DDoS attacks in VANET.The MVSA approach has three stages for DDoS attack detection.Preprocessing stage is the first stage of detection where packets received from different vehicles are used for classification.The multivariant stream weight stage is the next stage where traffic types and multivariant stream factors are computed.The DoS attack is detected using the computed stream weight.The last step is the DDoS mitigation stage where vehicles use network traces and process the Payload, Hop Count, Time to Live (TTL),and Packet Frequency at different time windows (for each stream class).These four features are measured and computed to generate rule sets.By using computed stream weight, the method classifies the packet into either genuine or malicious.The main drawback of the proposed work is its computation overhead, which needs to be reduced to increase the efficiency of the system.Poongodi et al.[6] have designed a system based on the reCAPTCHA controller to prevent the DDoS attack in VANET.The reCAPTCHA controller helps to check automated DDoS attacks.To analyze the deviation, an information theory-based metric is used in terms of entropy.Results show that the reCAPTCHA based method has higher PDR and DR but lower EC and AL than the AODV and Firecol techniques.The proposed work shows good results in terms of the detection of DDoS attacks but does not mention prevention and post scenario of DDoS attack detection.In [7], the authors have proposed a distributed and robust approach against DoS attack.IP addresses are used by authors to check the identities of malicious vehicles.So, if a node observes some similar ip addresses in the database, then those similar IP addresses are treated as DoS attackers.The proposed method works well for detection in small-scale networks, but detection in large-scale networks is a challenging one.Lahrouni et al.[8] presented a solution to the DoS attack using different mathematical models.To check the effects of the DoS attack,each parameter for the simulation was analyzed by the authors using the logistic regression method.To avoid DoS attacks, authors in [9] have added a pre-authentication process before the signature verification process.The pre-authentication process uses a one-way hash chain and a group revoking scheme.By adding the pre-authentication process, the authors have successfully reduced the network load, however, the proposed scheme can be applied to vehicles within the network; not to the outside attackers.Vermal et.al [10] presented a defense method against User Datagram Protocol (UDP) based flooding attacks.This UDP-based flooding is a DoS attack where it creates fake identities.Adding IP spoofing in the DoS attack makes it more difficult to detect in the network.Authors have further extended their work in [11], where they have used Bloom-Filter based detection method, which helps to provide services to legitimate vehicles and also used to detect and defend against IP address spoofing in DoS attacks.The proposed method works well from the detection point of view, but values used during the simulation are not practically feasible in a real-life scenario.In [12], authors have shown the impact of DDoS attacks on the control plane of the Software-Defined Internet of Vehicles (SD-IoV) network.Due to the flooding by packets in the network, drastic reduction of overall throughput and increase of controller load is studied in this paper.This work focuses only on the control plane and left the other important plane, i.e., the data plane of the SDN network completely.Gao et al.[13] developed a distributed network intrusion detection system for DDoS attack detection in VANET.The two main components of the proposed detection system are the realtime network traffic collection module and network traffic detection module.Detection is carried out using two publicly available NSL-KDD and UNSW-NB15 data sets and results are compared with other machine learning-based classifiers.The authors simulated their work on the publicly available data sets and they have not designed any network model to prove the authenticity of the work.

    From the literature discussed above, it is observed that DDoS attack spreads very fast in a network.Hence, vehicles that try to perform DDoS attacks need to be detected as early as possible.To the best of our knowledge, very little work has been done to prevent a vehicle to perform a DDoS attack on a network.In most of the research work, vehicles performing a DDoS attack are detected.Hence, to prevent a vehicle to perform a DDoS attack, we have used node trust and data trust modules and make a relationship between them.By using these modules, we can easily detect as well as prevent DDoS attacks in a network.

    3 Proposed Trust Based Misbehavior Detection Method

    In this section, network and misbehavior models are described in detail.After discussing the models, a trust-based distributed DoS misbehavior attack detection method is proposed to save the network from the DDoS attack.

    3.1 Network Model

    In this work, we have used an SDVN network to detect DDoS attacks.The communication in the designed SDVN based network is shown in Fig.1.Based on functionality and operation,the network is divided into three planes [14].Those are application plane, control plane, and data plane [15].The northbound interface connects the application plane to the control plane and the southbound interface connects the control plane with the data plane [16].The network load is reduced by decoupling the network plane into the control plane and the data plane, which also brings the network intelligence into logically centralized [17].This will overcome the ancient decentralized behavior of vehicular network architecture.This centralization of the network makes the network flexible, scalable, programmable, and adaptive to different environments [18].The southbound interface works based on the OpenFlow protocol.Due to the open flow structure, the network traffic is centrally controlled by the control plane and the data plane is responsible for forwarding data [19].

    Figure 1:Communication in SDVN network

    3.2 Misbehavior Model

    Any behavior which is a deviation from the normal behavior of a vehicle in a network is called misbehavior [20].In our network model, a vehicle is allowed to generate 10 packets per second (event information).So, if a vehicle generates more than 10 packets, we treat that as a malicious node responsible for DoS attack in the network.By overloading the network resources like network bandwidth, computational power, etc., different types of services could not be offered to intended drivers or passengers.This is a severe problem in the network as unreachable lifecritical information to drivers at the right time may lead to major accidents.These accidents may lead to the death of many people.There is also a probability that, a malicious node may target RSU.The attacker may flood the RSU, so that it may not be available for communication with legitimate nodes.A malicious vehicle can perform the DoS attack on its surrounding vehicles or RSUs by attacking the network using network jamming operation by self or with the help of surrounding vehicles.A malicious vehicle intentionally sends a number of packets in the network and consumes the network resources.This will lead to the non-availability of network resources to the intended vehicles that may lead to a DoS attack.To overcome such situations, we proposed a trust-based scheme to detect DDoS based misbehavior on the SDVN network.

    3.3 Proposed Misbehavior Detection Method

    The objective of the proposed misbehavior detection scheme is to identify the DDoS attackers,determine the genuineness of events, and identifying false recommendations to avoid DDoS attacks in the network.To carry out the work, we have used an SDN-based vehicular network.Initially, a trust-based framework is designed which is shown in Fig.2.In our framework, we have taken certain parameters while calculating the node trust and data trust.In the used SDNbased network, the trust is calculated by the EN.We have assumed that an EN has the power to calculate the trustworthiness of surrounding nodes as well as TN.Based on those trusts, EN decides whether to accept or reject any information from surrounding nodes or TN.So the trust calculation and actions based on those trusts are done in the control Plane of the SDVN network.In the data plane of the SDVN network, EN performs the SDN-based broadcasting based on the updated trust.Hence, the data plane helps in the data forwarding in the network.

    Figure 2:Designed SDN based trust framework

    In the proposed trust framework, we have used the Node Trust and Data Trust modules and established a relationship between them.To calculate the trust of the target agent, i.e.,another vehicle, the evaluator node uses its own experience as well as needs to depend upon the experience of neighbors of that agent.Hence, we have used sub modules like current direct trust, previous direct trust, the similarity with neighbors, and their recommendation credibility to calculate effective node trust (ENT).The data trust of an event is calculated based on the observation of the event by the EN directly or through the intermediate nodes.For the above two scenarios, updated data trust is calculated independently by the EN.The updated data trust is used to determine the authenticity of the reported events.We established a relationship between these two modules, i.e., updated effective node trust with that of the updated data trust.Before accepting any event information from any node, the node trust of the TN is evaluated first by the EN.If the calculated node trust is less than a set threshold limit, then we discard the event information received from the TN.In this paper, we have created some nodes having less node trust and assumed that these nodes will try to disrupt the network by sending unnecessary packets.Then, we try to detect such nodes; as a result, DoS attacks in the network can be avoided.Another situation, where the event information sent by a node may be faulty.To reduce the spreading of the wrong event information, we have calculated the updated data trust and compared it with a threshold value.If the calculated value is less than the threshold, we simply discard that event information.By doing so, we reduce overwhelming the network because of this false event information.The detailed evaluation of trust parameters is discussed in the following sections.

    1) Node Trust:

    This is the trust established by the EN on the sender using direct and indirect trust.Direct trust is calculated by the EN using its own experience on the TN.Indirect trust is derived from recommendations received from the surrounding vehicles of the TN about the TN.Hence, while calculating the updated effective node trust of a TN, both direct and indirect trusts play vital roles.

    i) Direct Trust:

    This is calculated based on the direct current trust on the TN as well as using the previous direct trust on the TN by the EN.We have taken the previous direct trust as a parameter while calculating the updated direct trust to avoid the sudden behavioral changes of the TN.LetDTn(EN, TN)represent the direct trust of the EN on the TN in thenthtime instant.So, the direct trust updating function is defined as follows:

    Here,DTcurrentrepresents the most recent direct trust value andDTn-1is the past trust value.EN assigns the trust value to the TN based on the following function:

    In Eq.(1), unsatisfied means, a TN sends unnecessary signals greater than a threshold value according to the misbehavior model.The weight factor, i.e.,αmakes a balance between the current direct trust and the past history.In our model, we have assignedαto 0.5.Hence, we give equal importance to the current direct trust and the past history.Initially, we set the value of direct trust, i.e.,DT0(EN,TN)andαto 1.After a certain interval of time as a vehicle performs well in the network, the trust rating of that vehicle increases gradually.

    ii) Indirect Trust:

    It is not always feasible that an EN will directly communicate with the TN.In that case, it is necessary for the evaluator node to rely on the data received from intermediate vehicles about the TN.Hence intermediate nodes are those nodes that are either at the intersection of the radio range of both EN and TN or just left the radio range of TN recently and entered the radio range of the EN as shown in Fig.3.Fig.3a shows the indirect communication between the EN and the TN where the EN is a vehicle with less radio range.V2I communication is shown in Fig.3b where the EN is an RSU having a higher radio range than the vehicle.

    Figure 3:Vehicular communications using intermediate nodes (a) V2V Indirect communication (b)V2I Indirect communication

    If an EN has never interacted with any TN, then trust recommendations that it receives from intermediate nodes become the only data that it has to rely on to evaluate the trustworthiness of TN.In our trust model, we have calculated the indirect trust between EN and TN using similarity and recommendation parameters.The similarity parameter shows to what extent the EN and intermediate nodes are alike.After calculating the similarity, this similarity metric is used to calculate the Recommendation Credibility (RC) of the information provided by intermediate nodes to the evaluator.The similarity shows the degree of trust between the EN and intermediate nodes.In this paper, we have used the cosine-based similarity [21].LetN=[N1,N2,..., Nm]be the set of intermediate nodes between the EN and TN as shown in Fig.3.Letandrepresents the trust vectors of EN to intermediate nodes and intermediate nodes to the EN respectively.Here, the trust vector represents the set of previous direct trust values after any communication, according to Eq.(1).So, the similarity of EN with the intermediate nodeNiin thenthtime instant is denoted asSimn(EN,Ni)is defined as follows:

    After calculating the similarity between the EN and intermediate nodes, we use this similarity metric to find the recommendation credibility of the information provided by the intermediate nodes to the evaluator.Hence, the recommendation credibility is used to measure the level of accuracy of recommendations that intermediate nodes provide to the evaluator.During trust evaluation, it is assumed that nodes with higher feedback credibility are more trustworthy than the lower credibility nodes and are given more weight than the low credibility nodes.Using this credibility score, we have reduced the extra load in the network by accepting and forwarding the data from high credibility nodes and discarding the data from low credibility nodes.LetRCn(EN,Ni)represents the recommendation credibility of intermediate nodeNifrom EN’s point of view.

    whereθrepresents the lowest allowed similarity value and set to 0.01.It is observed from Eq.(3) that, the recommendation credibility is directly proportional to the logarithmic function of similarity.Hence, intermediate nodes with higher similarity value with respect to the EN,have higher recommendation credibility.After knowing the similarity and the recommendation credibility value of intermediate nodes, the EN calculates the indirect trust of TN with the help of intermediate nodes.LetITn(EN,TN)represent the indirect trust of the evaluating node on the target node in the nthtime interval.

    From Eq.(4), it is observed that indirect trust depends upon the direct trust between intermediate nodes and the TN, as well as the recommendation credibility between the evaluating node and intermediate nodes.Hence, we can say that indirect trust is the weighted average of recommendations from intermediate nodes.After calculating the direct and indirect trust, these trusts are used by the EN to obtain the updated effective node trust on the TN.Hence, the effective node trust is calculated as follows:

    Then the updated effective node trust atnthtime instant is calculated as follows:

    whereβandγare weight parameters between 0-1.For example, the sum of the weight parametersβand(1-β)is 1.ENTn-1is the pastENTvalue.This calculatedENTplays a vital role in identifying attackers in the network.This updated ENT value of a node is compared with that of the previously set Threshold Node Trust (TNT) value.We set the threshold value based on the trust values of the majority of nodes.Let for a particular time, the majority of nodes have trust values approximately 0.3, then the threshold is set to 0.3.But, this threshold can be selected dynamically based on the current trusts of nodes.If the updatedENTis less than the set threshold value, then the EN treats that node as a malicious otherwise legitimate one.If the EN finds the node as malicious then it will take the decision to discard all messages from that node as a result, congestion in the network can be reduced.The whole process is shown in Algorithm 1.

    2) Data Trust:

    Before accepting any data from surrounding vehicles, we check the authenticity of the data using the data trust.In this paper, we simply discard data received from a malicious node.However, sometimes to show as a genuine node, a malicious node may send legitimate information which we have not discussed in this paper and left for our future study.In a network, a trusted node normally sends legitimate data, however, to take advantage of a particular situation, it may send false data.So to check whether the reported data is true or false, we calculate a trust metric known as Data Trust (DT).An EN is going to calculate the DT by using the following two methods.In the first method, an event occurred in the radio range of an EN, hence the EN observed the event directly.In this situation, the Direct Event Trust (DET) is set to 1 as a result the DT is set to 1 for that event.In the second method, the EN receives event information from intermediate nodes.In this situation, the value of DET is 0.Hence, DT is equal to the Indirect Event Trust (IET).The whole process is shown in Algorithm 2.

    We calculate the IET based on the average trust values of surrounding nodes reporting or not reporting events.LetN=[N1,N2,...,Nm]be the number of intermediate nodes reporting at a particular time instantn.Out ofNnodes, letpandqbe the number of nodes whose messages contain and have no information regarding the occurrence of events in thenthtime instant respectively.Hence,Nis the summation ofpandq.LetTn(E)andbe the average trust of nodes reporting and not reporting events respectively, and are calculated as follows:

    To reduce the impact of a sudden change in the behavior of a node in the network, we use the weighted mean trust of nodes reporting or not reporting events instead of node trusts directly.So the individual weight of nodes reporting and not reporting event with respect to the average trust of nodes in the nthtime interval areWn(E,Ni)andrespectively, wherei∈pandj∈q.

    An EN after calculating theENTand DT uses SDN based broadcasting algorithm to broadcast this message in the network (Algorithm 3).Before accepting any data from the surrounding vehicle, theENTof the sender vehicle is compared with that of the Threshold Node Trust(TNT).If the calculated node trust is greater than the TNT, we receive the message from that vehicle.After getting the message from that vehicle, the EN checks the genuineness of the event information present in the message.If the calculated data trust is greater than the minimum event trust value, then the message containing the event information is received by the EN.By checking the node trust as well as event trust, we can easily restrict nodes to send unnecessary packets in the network.After getting confirmation about the event, the EN broadcasts this message in the network so that other nodes also get this event information and becomes alert for this.If either of these conditions will not satisfy, then the EN simply discards this message as a result, the network congestion gets reduced.

    In this way, a DDoS attack can be prevented.To test the effectiveness of the proposed work,we have simulated it using the Veins hybrid simulator, which is discussed in the next section.

    Algorithm 1:Updated Effective Node Trust Algorithm Input:Evaluator Node (EN), Target Node (TN), Intermediate Node (N), Threshold Node Trust (TNT)Output:Status of TN either as Honest or Malicious 1:if TN is in the communication range of EN then 2:Calculate DTn(EN,TN);3:else 4:Calculate Simn(EN,Ni);

    ?

    ?

    ?

    ?

    4 Simulation and Results

    In this section, simulation setup and results are presented and compared with the recently proposed TBF [22] scheme.As the TBF scheme also uses trust as a parameter for misbehavior detection, we compare our scheme with the TBF scheme.We evaluate the performance of our proposed work using the following parameters:Detection Accuracy (DA), Detection Time (DT),Packet Delivery Ratio (PDR), and Energy Consumption (EC).DA reflects the percentage of malicious nodes detected.DT is the time required to detect the DDoS attack in the network.PDR gives information regarding the number of packets received by the receiver to the number of packets sent by the sender and EC shows the energy consumption during data transmission in a network.

    4.1 Simulation Setup

    To carry out the simulation, we have used the Veins hybrid simulator framework.This simulator uses IEEE 802.11p standard for communication [23].Since the framework is a hybrid type, it uses OMNeT++ and Simulation of Urban Mobility (SUMO) as network and road traffic simulators respectively.These simulators are integrated using a Traffic Control Interface (TraCI).This interface provides the TCP connection between the network and road traffic simulator and maintains real-time interaction between them [24].We simulate our work in both Grid Map and OpenStreetMap scenarios and compared the results with the TBF scheme.We simulate our work in our network where bitrate is 6 Mbps, the packet generation rate is 10 packets/s, update interval is 0.1 s, communication range of vehicle 300 m, communication range of RSU is 500 m, and IEEE 802.11p sensitivity is -80 dBm.

    We compare our work with that of TBF scheme under two cases.In the first case, we keep increasing the percentage of the anomaly of vehicles in the network, but keeping the number of vehicles constant.In the second case, we change the network size, keeping the percentage of anomaly fixed, and compared the efficiency of both cases.

    4.2 Results and Comparison

    We perform the simulation and each simulation is an average of 20 runs with different random seeds.Hence, each run is carried out with a unique initial node placement.Initially, we performed the simulation by changing the percentage anomaly in the network while keeping the network size fixed.Later, we kept the percentage of anomaly fixed and changed the network size.Simulation results for both cases are shown in Figs.4 and 5.

    Case 1:Impact of Percentage of Anomaly on Performance Parameters:

    We study the impact of the percentage anomaly on four performance parameters as mentioned earlier.Simulation is performed by creating 100 nodes in the network, out of which, we make 80 percentage nodes malicious i.e., 80 nodes.Again, out of these 80 nodes, we vary the percentage of anomaly between 20% to 100%.Based on this calculation, 20% and 100% anomaly scenarios have 16 and 80 malicious nodes respectively.The impact of percentage anomaly on DA is shown in Fig.4a for both grid map and OpenStreetMap by using (G) and (O) notations.It is observed from the figure that when the percentage of anomaly is 20%, DA of TBDDoSA-MD scheme in grid and OpenStreetMap scenarios are 95% and 90% respectively.DA of TBF scheme in grid and OpenStreetMap scenarios at 20% anomaly are 90% and 85% respectively.It is also observed from the figure that as the percentage of anomaly increases, the DA decreases in all cases.However, it is observed that up to 70% of the anomaly, the grid map outperforms the OpenStreetMap.But, as the percentage of anomaly increases further, the OpenStreetMap gives better results than the grid scenario in TBDDoSA-MD due to the diversified network structure.The same trend is also observed in Fig.4b.As the percentage of anomaly increases, the number of malicious nodes increases in the network as a result false event messages increase.This increase in the false event messages in the network is the prime cause of the decrease in the DA and PDR percentage.But, in TBDDoSA-MD, we take special care of the false event message propagation by checking the node trust and the event trust in our SDVN network.The impact of percentage anomaly on DT is shown in Fig.4c for both grid map and OpenStreetMap scenarios.The figure shows that when the percentage of anomaly is 20%, DT of TBDDoSA-MD and TBF schemes in the grid and OpenStreetMap scenarios are 32, 38 s, and 30, 35 s respectively.It is also observed that the detection time increases as the percentage of anomaly increases in all cases.At the initial period, i.e., when the percentage of anomaly varies from 20% to 40%, TBF shows better results than the TBDDoSA-MD under both scenarios.However, as the percentage of anomaly moves from 60% to 100%, the detection time in TBF increases rapidly as compared to the TBDDoSAMD scheme.By comparing the grid scenario with the OpenStreetMap it is also observed that,the DT in OpenStreetMap is always more than the grid due to the large network size and the presence of physical objects.The impact of percentage anomaly on EC is shown in Fig.4d for both grid map and OpenStreetMap scenarios.It is observed from the figure that up to 40% of the anomaly, both schemes under different scenarios consume nearly equal energy.However, as the percentage of anomaly increases further, the EC varies in different cases.Hence, at 100% anomaly the EC of TBDDoSA-MD and TBF in the grid and OpenStreetMap scenarios are 29.6, 33.34 j and 32, 36.54 j respectively.During packet transmission in the network, some amount of energy is consumed.So, more is the packet transmission, more is the energy consumption.Because of the node trust and event information verification, TBDDoSA-MD consumed more energy in the initial period, but as the percentage of anomaly increases, false messages reduce in our scheme.As a result, energy consumption becomes lesser as compared to TBF scheme in our grid scenario.

    Figure 4:Impact of percentage of anomaly on four performance parameters in Grid and Open-StreetMap (a) Anomaly vs.detection accuracy (b) Anomaly vs.packet delivery ratio (c) Anomaly vs.detection time (d) Anomaly vs.energy consumption

    Case 2:Impact of Network Size on Performance Parameters:

    The impact of network size on performance parameters is examined.To carry out the experiment, we keep the malicious node percentage to 80% and they are always malicious (i.e.,percentage of anomaly is 100%).Based on this calculation, network size having 20 nodes has 16 nodes malicious and 4 are honest.We vary the network size from 20 nodes up to 200 nodes and perform the simulation in both grid and OpenStreetMap scenarios.Simulation results are shown in Fig.5.Figs.5a and 5b illustrate the impact of network size on DA and PDR.It is observed from both figures that, the DA and PDR increase with the increase in network size in both grid and OpenStreetMap scenarios.The impact of network size on DT is shown in Fig.5c for both grid map and OpenStreetMap scenarios.The figure shows that when the network size is small i.e.,20, DT of TBDDoSA-MD and TBF schemes in the grid and

    OpenStreetMap scenarios are 45, 48 s and 42, 47 s respectively.But, as the size of the network increases to 200, the DT of TBDDoSA-MD and TBF schemes in the grid and OpenStreetMap scenarios are 114, 126, and 122, 140 respectively.The presence of node trust and data trust helps in the early detection of our network.It is also observed that the detection time increases as the percentage of anomaly increases in all cases.The impact of network size on EC is shown in

    Fig.5d for both grid map and OpenStreetMap scenarios.When the network size is small, both the TBDDoSA-MD and TBF consume nearly equal energy in all scenarios.But, as the size of the network increases, TBF consumes more energy than the TBDDoSA-MD scheme.Hence, it is observed from results that, due to the centralized structure and the open flow nature of the used SDVN network, TBDDoSA-MD performs better than the TBF scheme with the growth of the network.

    Figure 5:Impact of network size on four performance parameters in Grid and OpenStreetMap(a) Network size vs.detection accuracy (b) Network size vs.packet delivery ratio (c) Network size vs.detection time (d) Network size vs.energy consumption

    5 Conclusion and Future Work

    In this work, a TBDDoSA-MD method is proposed to secure the SDVN from malicious attackers performing DDoS attacks.In this approach, the trust values of vehicles are calculated based on direct trust and recommendations (indirect trust).These trust values are used to check a vehicle as malicious or legitimate.If a vehicle is found to be malicious, then the messages from that vehicle are discarded in the network.For any action based on the messages from the legitimate vehicle, the authenticity of the messages is checked by using the data trust.In addition to this, the SDN concept is mainly used to reduce the network load by dividing the network plane into the control plane and the data plane.The performance of TBDDoSA-MD is evaluated in the Veins hybrid simulator, which uses OMNeT++ and Simulation of Urban Mobility (SUMO).We compared our results with the TBF scheme using the following performance parameters such as detection accuracy, packet delivery ratio, detection time, and energy consumption.Simulation results show that the proposed TBDDoSA-MD performs better as compared to the TBF scheme.From the above results, it is inferred that the proposed method would be a better misbehavior detection approach against the DDoS attack.Our work uses node trust and data trust to detect the DDoS attack; however, we can also integrate machine learning algorithms for trust calculation.In this work, we are discarding data from malicious vehicles irrespective of the validity of those data.In future work, we are also going to use machine learning methods to check the genuineness of data before discarding it.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产高潮美女av| 一夜夜www| 人妻少妇偷人精品九色| 一级毛片aaaaaa免费看小| 人人妻人人澡人人爽人人夜夜 | 国产精品爽爽va在线观看网站| 日本一二三区视频观看| 老司机福利观看| 伦精品一区二区三区| 久久欧美精品欧美久久欧美| 黄色视频,在线免费观看| 能在线免费观看的黄片| 国产精品电影一区二区三区| 亚洲电影在线观看av| 日韩精品有码人妻一区| 天天躁日日操中文字幕| 国产精品永久免费网站| 欧美三级亚洲精品| 久久久成人免费电影| 搡老妇女老女人老熟妇| 欧美成人精品欧美一级黄| 欧美日韩国产亚洲二区| 国产精品无大码| 亚洲国产欧美人成| 国产人妻一区二区三区在| 亚洲欧美日韩高清在线视频| 亚洲专区国产一区二区| 99热只有精品国产| 欧美成人a在线观看| 色av中文字幕| 在线观看66精品国产| 久久精品夜夜夜夜夜久久蜜豆| 最近中文字幕高清免费大全6| 桃色一区二区三区在线观看| 日韩在线高清观看一区二区三区| 亚洲美女黄片视频| 欧美zozozo另类| 国产精品久久久久久久久免| 亚洲性久久影院| 成人毛片a级毛片在线播放| av免费在线看不卡| 午夜福利视频1000在线观看| 久久久久久久亚洲中文字幕| 1000部很黄的大片| 国产国拍精品亚洲av在线观看| 亚洲av免费高清在线观看| 最近最新中文字幕大全电影3| 在线观看免费视频日本深夜| 色综合亚洲欧美另类图片| 一个人观看的视频www高清免费观看| 亚洲精品456在线播放app| 中国美白少妇内射xxxbb| 午夜福利在线在线| 亚洲七黄色美女视频| 一级av片app| 欧美+日韩+精品| 国产男靠女视频免费网站| 我要看日韩黄色一级片| 亚洲欧美精品综合久久99| 不卡视频在线观看欧美| 草草在线视频免费看| 国产精品久久久久久av不卡| 一本精品99久久精品77| 91久久精品电影网| 麻豆国产97在线/欧美| 久久午夜福利片| 久久精品夜色国产| 啦啦啦啦在线视频资源| 最新在线观看一区二区三区| 亚洲久久久久久中文字幕| 亚洲第一电影网av| 在线播放国产精品三级| av女优亚洲男人天堂| 俺也久久电影网| 一边摸一边抽搐一进一小说| 亚洲国产精品成人综合色| 久久久久九九精品影院| 俺也久久电影网| 久久精品国产鲁丝片午夜精品| 国产一区亚洲一区在线观看| 我要搜黄色片| 一级毛片电影观看 | 中文字幕免费在线视频6| 男女那种视频在线观看| 黄色配什么色好看| 日韩av不卡免费在线播放| 国内揄拍国产精品人妻在线| 一本久久中文字幕| 久久久久久久亚洲中文字幕| 国产精品久久久久久亚洲av鲁大| 国产一区二区激情短视频| 国产黄色视频一区二区在线观看 | 亚洲精品乱码久久久v下载方式| 黄色日韩在线| 亚州av有码| 久久久色成人| a级一级毛片免费在线观看| 亚洲av中文av极速乱| 我要看日韩黄色一级片| 亚洲图色成人| 国内少妇人妻偷人精品xxx网站| 淫秽高清视频在线观看| 内地一区二区视频在线| 午夜福利在线观看免费完整高清在 | 天天躁夜夜躁狠狠久久av| 亚洲精品国产成人久久av| 麻豆乱淫一区二区| 小说图片视频综合网站| 久久精品综合一区二区三区| 成熟少妇高潮喷水视频| 成年女人看的毛片在线观看| 国产精品精品国产色婷婷| 免费看av在线观看网站| 黄色配什么色好看| 丰满的人妻完整版| 最近的中文字幕免费完整| 搡老熟女国产l中国老女人| 亚洲精品日韩av片在线观看| 丝袜美腿在线中文| 天堂影院成人在线观看| 波多野结衣高清无吗| 日本免费a在线| 午夜精品国产一区二区电影 | 又粗又爽又猛毛片免费看| 我要看日韩黄色一级片| 国产综合懂色| 免费看a级黄色片| av在线播放精品| 九九爱精品视频在线观看| 欧美日韩一区二区视频在线观看视频在线 | 欧美日韩在线观看h| 亚洲欧美日韩卡通动漫| 国产成人a区在线观看| 日韩人妻高清精品专区| 日本成人三级电影网站| 最近在线观看免费完整版| 欧美极品一区二区三区四区| 欧美+日韩+精品| 亚洲精品成人久久久久久| 在线观看美女被高潮喷水网站| 免费搜索国产男女视频| 狂野欧美白嫩少妇大欣赏| 亚洲不卡免费看| 日本-黄色视频高清免费观看| 亚洲国产欧美人成| 欧美国产日韩亚洲一区| 亚洲精品在线观看二区| 色播亚洲综合网| 亚洲人成网站高清观看| 美女免费视频网站| 精品欧美国产一区二区三| 国产亚洲精品综合一区在线观看| 日韩欧美一区二区三区在线观看| 99热6这里只有精品| 国产毛片a区久久久久| 我的女老师完整版在线观看| av女优亚洲男人天堂| 欧美+日韩+精品| 国产成人91sexporn| 国产人妻一区二区三区在| 搡老熟女国产l中国老女人| 日本 av在线| 男人和女人高潮做爰伦理| 日韩在线高清观看一区二区三区| 国产精品国产三级国产av玫瑰| 最近2019中文字幕mv第一页| 小说图片视频综合网站| 日本免费a在线| 中文字幕人妻熟人妻熟丝袜美| 成人毛片a级毛片在线播放| 在线观看美女被高潮喷水网站| 在线播放国产精品三级| 嫩草影视91久久| 91久久精品国产一区二区成人| 男女那种视频在线观看| eeuss影院久久| 国产亚洲精品久久久com| 亚洲国产日韩欧美精品在线观看| 精品午夜福利在线看| 久久99热6这里只有精品| 一级黄色大片毛片| 综合色丁香网| 成人一区二区视频在线观看| 亚洲欧美成人综合另类久久久 | 国产精品国产三级国产av玫瑰| 三级毛片av免费| 成年版毛片免费区| 我要看日韩黄色一级片| 国产精品久久久久久精品电影| 精品一区二区免费观看| 日本爱情动作片www.在线观看 | 国产视频一区二区在线看| 黄片wwwwww| 天美传媒精品一区二区| 国产亚洲欧美98| 大又大粗又爽又黄少妇毛片口| av天堂中文字幕网| 五月伊人婷婷丁香| 日本免费a在线| 性欧美人与动物交配| 久久精品国产鲁丝片午夜精品| 此物有八面人人有两片| 成人av一区二区三区在线看| 久久精品久久久久久噜噜老黄 | 赤兔流量卡办理| 国产成人精品久久久久久| 午夜a级毛片| 日本爱情动作片www.在线观看 | 自拍偷自拍亚洲精品老妇| 国产精品爽爽va在线观看网站| 亚洲国产精品成人久久小说 | 免费观看精品视频网站| 成人永久免费在线观看视频| 国产一级毛片七仙女欲春2| 热99在线观看视频| 听说在线观看完整版免费高清| 好男人在线观看高清免费视频| 欧美国产日韩亚洲一区| 国产成人freesex在线 | 国产69精品久久久久777片| 成人美女网站在线观看视频| 亚洲人成网站在线播放欧美日韩| 日韩中字成人| 免费观看人在逋| 日韩欧美精品免费久久| 亚洲欧美精品综合久久99| 搞女人的毛片| 亚洲成人久久性| 亚洲精品色激情综合| 亚洲精品国产av成人精品 | 精华霜和精华液先用哪个| 日韩欧美免费精品| 成年免费大片在线观看| 真人做人爱边吃奶动态| 欧美日韩综合久久久久久| 成人国产麻豆网| 欧美性感艳星| 欧美色视频一区免费| av黄色大香蕉| 女同久久另类99精品国产91| 日本五十路高清| 哪里可以看免费的av片| 日韩高清综合在线| 欧美丝袜亚洲另类| 老师上课跳d突然被开到最大视频| 国产精品99久久久久久久久| 中文亚洲av片在线观看爽| 日本免费一区二区三区高清不卡| 国产av在哪里看| 男人舔女人下体高潮全视频| 中国国产av一级| 午夜爱爱视频在线播放| 美女被艹到高潮喷水动态| 三级男女做爰猛烈吃奶摸视频| www.色视频.com| 久久久久国内视频| 国产久久久一区二区三区| 精品福利观看| 日韩精品青青久久久久久| 舔av片在线| 最近在线观看免费完整版| 日韩大尺度精品在线看网址| 人妻夜夜爽99麻豆av| 天堂√8在线中文| 久久6这里有精品| 成人二区视频| 国产免费男女视频| 亚洲乱码一区二区免费版| 免费观看人在逋| 亚洲成a人片在线一区二区| 大又大粗又爽又黄少妇毛片口| 精品一区二区三区人妻视频| 久久这里只有精品中国| 一区二区三区四区激情视频 | 成人美女网站在线观看视频| 午夜福利在线观看免费完整高清在 | 亚洲av中文av极速乱| 国产精品一及| 日韩欧美精品免费久久| 午夜精品一区二区三区免费看| 成人亚洲欧美一区二区av| 国产私拍福利视频在线观看| 性色avwww在线观看| 国产精品一区二区免费欧美| 免费无遮挡裸体视频| 高清日韩中文字幕在线| 亚洲av免费高清在线观看| 一本精品99久久精品77| 亚洲电影在线观看av| 哪里可以看免费的av片| 成人av在线播放网站| 国产在线男女| 亚洲第一区二区三区不卡| 国产男人的电影天堂91| 亚洲欧美中文字幕日韩二区| 欧美潮喷喷水| ponron亚洲| 黄色视频,在线免费观看| 亚洲欧美精品综合久久99| 欧美最新免费一区二区三区| 免费电影在线观看免费观看| 男人和女人高潮做爰伦理| 亚洲美女搞黄在线观看 | 婷婷色综合大香蕉| 99国产精品一区二区蜜桃av| 99久久精品一区二区三区| 亚洲精品日韩在线中文字幕 | 亚洲真实伦在线观看| 综合色丁香网| av在线亚洲专区| 天堂√8在线中文| 久久精品国产鲁丝片午夜精品| av国产免费在线观看| 97超级碰碰碰精品色视频在线观看| 国产高清视频在线播放一区| 亚洲国产精品成人久久小说 | 国产高清视频在线观看网站| 国产在线精品亚洲第一网站| 精品乱码久久久久久99久播| 日本一本二区三区精品| 久久精品国产清高在天天线| 乱码一卡2卡4卡精品| 国产精品女同一区二区软件| 欧美日本视频| 亚洲性夜色夜夜综合| 欧美最黄视频在线播放免费| 五月玫瑰六月丁香| 啦啦啦观看免费观看视频高清| 美女黄网站色视频| 色尼玛亚洲综合影院| 婷婷色综合大香蕉| 成人亚洲精品av一区二区| 久久人人精品亚洲av| 久久人人爽人人片av| 天天躁夜夜躁狠狠久久av| 麻豆国产av国片精品| 国产亚洲精品久久久久久毛片| 性插视频无遮挡在线免费观看| 国产精品乱码一区二三区的特点| 精品免费久久久久久久清纯| 黄色配什么色好看| 免费观看人在逋| 搡老熟女国产l中国老女人| 亚洲无线在线观看| 97超碰精品成人国产| 亚洲精品粉嫩美女一区| a级一级毛片免费在线观看| 床上黄色一级片| 亚洲欧美日韩高清在线视频| 亚洲内射少妇av| 免费观看精品视频网站| 女生性感内裤真人,穿戴方法视频| 国产色婷婷99| 国产精品三级大全| 久久久欧美国产精品| 国国产精品蜜臀av免费| 午夜日韩欧美国产| av在线天堂中文字幕| 人人妻人人看人人澡| 91久久精品国产一区二区三区| 日日摸夜夜添夜夜添小说| 国产成人福利小说| 在线国产一区二区在线| 欧美性感艳星| 日韩,欧美,国产一区二区三区 | 亚洲无线在线观看| 日韩成人伦理影院| 日本爱情动作片www.在线观看 | 久久国内精品自在自线图片| 身体一侧抽搐| 国产麻豆成人av免费视频| 国内少妇人妻偷人精品xxx网站| 人妻少妇偷人精品九色| 日日啪夜夜撸| 女人被狂操c到高潮| 国产真实伦视频高清在线观看| 国产亚洲欧美98| 色在线成人网| 久久久国产成人精品二区| 深夜a级毛片| 国产精品久久久久久久久免| 国产精品av视频在线免费观看| 蜜桃久久精品国产亚洲av| 久久这里只有精品中国| 真实男女啪啪啪动态图| 免费高清视频大片| 午夜日韩欧美国产| av在线天堂中文字幕| 伦精品一区二区三区| 欧美日韩乱码在线| 白带黄色成豆腐渣| 男人的好看免费观看在线视频| av.在线天堂| 给我免费播放毛片高清在线观看| 12—13女人毛片做爰片一| 亚洲成人久久爱视频| 日韩人妻高清精品专区| 欧美丝袜亚洲另类| eeuss影院久久| 国产久久久一区二区三区| 99热网站在线观看| 国产色婷婷99| 激情 狠狠 欧美| 亚洲成av人片在线播放无| 99久久中文字幕三级久久日本| 国产精品久久久久久久久免| 99久久精品热视频| 一卡2卡三卡四卡精品乱码亚洲| 国产乱人视频| av女优亚洲男人天堂| 亚洲激情五月婷婷啪啪| 男人狂女人下面高潮的视频| 最新中文字幕久久久久| 天堂影院成人在线观看| 天堂√8在线中文| 国产在线男女| 校园人妻丝袜中文字幕| av福利片在线观看| 好男人在线观看高清免费视频| 22中文网久久字幕| 成人鲁丝片一二三区免费| 18禁黄网站禁片免费观看直播| 免费黄网站久久成人精品| 久久99热这里只有精品18| 日韩欧美国产在线观看| 少妇的逼好多水| 欧美高清成人免费视频www| 我要看日韩黄色一级片| 国产精品国产高清国产av| 成人无遮挡网站| 日本黄大片高清| 乱系列少妇在线播放| 神马国产精品三级电影在线观看| 晚上一个人看的免费电影| 日韩欧美一区二区三区在线观看| 久久久久久久亚洲中文字幕| a级毛片a级免费在线| 一个人看视频在线观看www免费| 91在线精品国自产拍蜜月| 亚洲av二区三区四区| 插阴视频在线观看视频| 亚洲成人久久性| 国产日本99.免费观看| 搡老岳熟女国产| 亚洲国产精品国产精品| 国产av不卡久久| 欧美日本视频| 亚洲精品影视一区二区三区av| 精品熟女少妇av免费看| 麻豆乱淫一区二区| 久久精品国产亚洲av香蕉五月| 免费黄网站久久成人精品| 精品乱码久久久久久99久播| 赤兔流量卡办理| 搡老妇女老女人老熟妇| 在线观看免费视频日本深夜| 国产美女午夜福利| 91av网一区二区| 尤物成人国产欧美一区二区三区| 十八禁网站免费在线| 在线国产一区二区在线| 丝袜美腿在线中文| 国内精品美女久久久久久| 国产黄色视频一区二区在线观看 | 日韩av不卡免费在线播放| 男人狂女人下面高潮的视频| 高清日韩中文字幕在线| 天堂影院成人在线观看| 国产伦精品一区二区三区视频9| 人妻少妇偷人精品九色| 亚洲最大成人av| 欧美日本视频| 校园人妻丝袜中文字幕| 黄色一级大片看看| 亚洲av第一区精品v没综合| 欧美高清成人免费视频www| 亚洲精品国产成人久久av| 欧美日本视频| 深爱激情五月婷婷| 少妇熟女aⅴ在线视频| 日韩欧美免费精品| 91狼人影院| or卡值多少钱| 国产伦精品一区二区三区四那| 国产精品人妻久久久影院| 中文字幕人妻熟人妻熟丝袜美| 免费av毛片视频| 国产精品野战在线观看| 91在线精品国自产拍蜜月| 夜夜看夜夜爽夜夜摸| 一级黄片播放器| 看非洲黑人一级黄片| 国产成人a区在线观看| 久久久精品欧美日韩精品| 亚洲色图av天堂| 久久久色成人| 日本色播在线视频| 久久久久久久亚洲中文字幕| 欧美性感艳星| 全区人妻精品视频| 亚洲人与动物交配视频| 成人国产麻豆网| 一级毛片aaaaaa免费看小| 亚洲av第一区精品v没综合| 欧美日韩一区二区视频在线观看视频在线 | 中文字幕熟女人妻在线| 国产高清不卡午夜福利| 国产中年淑女户外野战色| 日本色播在线视频| 观看免费一级毛片| 99九九线精品视频在线观看视频| 国产毛片a区久久久久| 欧美色视频一区免费| 国产 一区精品| 国产高清三级在线| 观看美女的网站| 亚洲电影在线观看av| 热99re8久久精品国产| 久久亚洲精品不卡| 午夜视频国产福利| 少妇猛男粗大的猛烈进出视频 | 欧美一区二区国产精品久久精品| 白带黄色成豆腐渣| 狂野欧美白嫩少妇大欣赏| 亚洲欧美成人综合另类久久久 | 国产色婷婷99| 成人午夜高清在线视频| 成人毛片a级毛片在线播放| 亚洲av不卡在线观看| 在线免费观看的www视频| 欧美高清成人免费视频www| 精品久久久久久久末码| 亚洲精品亚洲一区二区| 久久精品国产鲁丝片午夜精品| 成人特级av手机在线观看| 国产精品1区2区在线观看.| 欧美xxxx性猛交bbbb| 男女做爰动态图高潮gif福利片| 免费观看精品视频网站| 亚洲aⅴ乱码一区二区在线播放| 一区二区三区高清视频在线| 蜜桃久久精品国产亚洲av| 国产精品日韩av在线免费观看| 亚洲经典国产精华液单| 最近的中文字幕免费完整| 久久久成人免费电影| 日韩在线高清观看一区二区三区| 俺也久久电影网| 亚洲自拍偷在线| 淫妇啪啪啪对白视频| 一个人免费在线观看电影| 国内精品美女久久久久久| 精品午夜福利视频在线观看一区| 亚洲精品粉嫩美女一区| 黄色日韩在线| 亚洲成a人片在线一区二区| 99热只有精品国产| 久久鲁丝午夜福利片| 能在线免费观看的黄片| 国产蜜桃级精品一区二区三区| 少妇的逼水好多| 一边摸一边抽搐一进一小说| 色在线成人网| 99热精品在线国产| 亚洲五月天丁香| 亚洲精品一区av在线观看| 久久久久久久久久久丰满| 最近视频中文字幕2019在线8| 高清午夜精品一区二区三区 | 看免费成人av毛片| 国产麻豆成人av免费视频| 久久久久久久久大av| 国产成人一区二区在线| 日本欧美国产在线视频| 午夜a级毛片| 97超碰精品成人国产| 毛片女人毛片| 黄片wwwwww| 久久久久久久久中文| 一本久久中文字幕| 18禁黄网站禁片免费观看直播| 99久久精品一区二区三区| 一边摸一边抽搐一进一小说| 国产真实伦视频高清在线观看| 精品国内亚洲2022精品成人| 亚洲国产精品成人综合色| 日日啪夜夜撸| 精品久久久噜噜| 一个人观看的视频www高清免费观看| 日韩精品青青久久久久久| 真实男女啪啪啪动态图| 亚洲av熟女| 神马国产精品三级电影在线观看| 日本一本二区三区精品| 91久久精品国产一区二区成人| 人人妻,人人澡人人爽秒播| av在线老鸭窝| 少妇猛男粗大的猛烈进出视频 | av在线播放精品| 91午夜精品亚洲一区二区三区| 国产aⅴ精品一区二区三区波| 国产高清有码在线观看视频| 国产三级中文精品| 国产成人a区在线观看| 国产成人a∨麻豆精品| 国产精品福利在线免费观看| 99精品在免费线老司机午夜| 18禁在线无遮挡免费观看视频 | 又黄又爽又刺激的免费视频.| 天美传媒精品一区二区| 大型黄色视频在线免费观看| 久久久a久久爽久久v久久| av在线播放精品| 日本五十路高清| 免费人成在线观看视频色|