• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy-Efficient and Blockchain-Enabled Model for Internet of Things(IoT)in Smart Cities

    2021-12-16 06:38:46NorahSalehAlghamdiandMohammadAyoubKhan
    Computers Materials&Continua 2021年3期

    Norah Saleh Alghamdi and Mohammad Ayoub Khan

    1College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh,11671,Saudi Arabia

    2College of Computing and Information Technologies, University of Bisha, Bisha,67714,Saudi Arabia

    Abstract: Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities.The data generated from these sensors are used by smart cities to strengthen their infrastructure,utilities,and public services.WSNs are suitable for long periods of data acquisition in smart cities.To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed.The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources;leading to extending the network lifetime of sensors.In this paper,a linear network coding(LNC)for WSNs with blockchain-enabled IoT devices has been proposed.The consumption of energy is reduced for each node by applying LNC.The efficiency and the reliability of the proposed model are evaluated and compared to those of the existing models.Results from the simulation demonstrate that the proposed model increases the efficiency in terms of the number of live nodes,packet delivery ratio,throughput,and the optimized residual energy compared to other current techniques.

    Keywords: IoT;blockchain;WSN;smart cities;LNC

    1 Introduction

    Smart cities use the latest information and communication technology (ICT) to strengthen public infrastructure, utilities and public services.Smart cities can be viewed as an application of increasing population and urban development growth that has strengthened innovative ways of managing urbanization with minimal environmental impacts, civil lifestyles and governance [1].Sensors are used in a large area across the city to track and control the smart city application.Typical examples include traffic systems, healthcare systems, toll collection systems, automatically identifying road data and automatically identifying vehicle number plates.Data centres and analytical engines are the backbone in smart cities for decision making process.In smart cities, the network of wireless devices, cameras, and sensors allows managing agencies to efficiently provide mandatory services and actions.Furthermore, smart cities use recycled materials for building facility centres and reducing energy usage; in order to make them more friendly environment.Fig.1 shows the life cycle of smart cities consisting of four phases.The cycle starts with the data collection from different sensors and connected devices.This first phase identifies and analyzes the data sources.The second phase of the life cycle is to clean, format and analyze the collected data.The third phase is about communications.This phase organizes the insights from analysis and communicates with decisions makers through use of strong networks.The fourth phase is for performing actions.It creates solutions from insights and optimizes solutions to improve the quality of life.

    Figure 1: Life cycle of smart cities

    Smart cities provide an effective and intelligent service delivery network for citizens and municipal corporation employees, through the installation of sensors to collect the information and to take appropriate actions [1,2].WSNs bring IoT applications for better capabilities for both actuation and sensing.The WSN solutions cover a wide variety of applications, research, and advances in the technologies that have been continually expanding the field of applications.This trend in research leads to an upsurge in their uses of the applications of IoT networks for the low-cost versatile data actuation and sensing [3-7].In IoT, all nodes transmit the sensor data straightforward to the internet.For example,a sensor can be deployed to record and to directly send the environmental parameters to a server either instantly or regularly using the internet.The server upon the received data will be processed and interpreted for further actions.The sensors are connected to a special kind of the sensor node, called cluster head (CH), to communicate with the servers [8,9].WSNs are considered a system connected with IoT system using some cloud technologies.Every wireless sensor node comprises of computing, sensing devices, power components and radio transceivers.Typically, WSNs hold thousands of sensor nodes.Due to the demand for the low consumption of energy and the low complexity of devices, a consistent balance between the data processing abilities and the communications must be established [10,11].Thus; the resource constraints and its heterogeneity in WSNs present new problems for the network management,particularly in smart cities, like the smart grids, the intelligent transportation systems and the smart buildings.The challenges in WSNs include the network life, the battery life, the ad hoc topologies, the sensor’s maintenance and the resource allocation.To reduce the complexity in WSNs, an efficient clustering algorithm is required.The clustering is termed as the grouping of same type of objects [12].A cluster of a group is defined as a segment of elements selected to reduce some dissimilarity [13].Recent research has shown that the hierarchical routing algorithms have greater adaptability and low energy consumption compared to the flat routing algorithms for WSNs on a large scale [14,15].

    In WSNs,the routing is a crucial part,where the sensors sense the data,and forwarding them to a sink node for processing.Nowadays,the sensors are available in cheap prices and in smaller sizes;however,there are still energy constraints.Generally, in all the routing algorithms, the data is traversed through multiple intermediate nodes before reaching to the sink node that consumes much of the energy.Therefore, there is a need to develop new algorithms which provide energy efficient routing.

    This research study proposes K-means clustering algorithm for cluster head selection followed by a linear network coding for WSNs consisting of a blockchain enabled IoT devices.The contribution of this research study is to propose a WSN model with the blockchain based IoT devices; thereafter, forming Kmeans clustering of devices [12] to minimize the energy consumption in the intermediate nodes.Another contribution of this work is to implement LNC mechanism and to develop the blockchain to improve the security,and the reliability.

    The remaining sections of this paper are arranged as follows: The related work and discussion are presented in Section 2; while the proposed methodology is presented in Section 3; The results and discussion are presented in Section 4;and Section 5 presents the conclusion and future work of the research.

    2 Literature Review

    Taheri et al.[16] suggested a clustering protocol coined with fuzzy logic that is primally based on a multi-hop.The proposed method of the clustering has three stages.The knowledge about the neighbor’s is modified in the initial stage and the fuzzy output is measured.Every node sensor is remotely located at some points in the later phase until the delay time to listen to the CH message.If it fails, it announces itself to be a temporary CH and places the message simultaneously inside the boundary of the cluster.In the next iteration, it becomes the last CH and transmits a message if it has the least cost between the temporary cluster heads in the vicinity.

    Gnanambigai et al.[17]surveyed the low energy adaptive clustering hierarchy(LEACH)and the variant protocols.They concluded that WSNs are in a need of more scalable and energy efficient algorithms.The drawback of the LEACH cluster head selection is that the CH selection occurs randomly [18-20].Because of this particular criterion,there are chances that a low-energy sensor node may be selected as CH.

    Suresh et al.[21]devised an energy-efficient dual CH selection method for WSNs.In this method,two cluster heads-specifically, the primary and secondary cluster heads - are picked with respect to parameters like the node degree, the residual energy, the least standard distance from the member nodes’ timer using the particle swarm optimization procedure.When a supply node desires to broadcast information to the destination node, an energy-efficient direction-finding protocol is utilized, based on factors such as the anticipated number of the retransmissions and the possibility of a breakdown in a connection.In this method, every cluster node transmits the information to the primary CH node, then after, the collected information is broadcasted to base station (BS) via the secondary CH node.

    Researchers have intensively modified the LEACH protocol to improve the efficiency of the network.The research community has been energetically contributing to improve the existing schemes and methodologies in order to improve the performance of the IoT networks [22].For example, the energyefficient method of trust derivation for WSN-based IoT networks has been explored in Duan et al.[23].

    Sharma et al.[24]proposed a methodology to enhance the lifespan of the LEACH protocol using neural networks.They implemented an intelligent energy preservation model for the LEACH protocol called as LEACH-C algorithm which has increased lifespan.The nodes having the maximum energy of all are the best choice for CH.

    Jamadar et al.[25] proposed an innovative energy-efficient WSNs using the K-means clustering algorithm.This method works on the basis of discovering the CH node with minimum distance from the centroid in terms of the Euclidean distance.The sensor is labelled as the CH node if the distance is lesser than the defined threshold value.K-means clustering protocol is employed in order to perform clustering of nodes which separates the sensor nodes to form K-clusters.Because of the successful CH nodes, the overall effectiveness of WSNs is improved with the respect to the parameters like the lively nodes and the spent energy for the transmissions.

    Hwang and Huang[26]provided a secure channel of the communication in WSNs that are designated as a collector by a smart card owner to securely gather the data from the nodes which validates the collector and sending the data via a secure channel to the collector.By using the lightweight computing, the collector verifies the identification of the card’s owner.This approach reduced the cost of communication.

    Qin et al.[27]suggested the importance of the trust sensing algorithm for the routing that improves the security in WSNs.The aim of this mechanism used to control the attacks of the common networks affected by the inadequate energy and the defective deployment of the nodes on the networks for the data transactions in WSNs.Authors presented a trustworthy and secure routing scheme using attributes of a lightweight algorithm.The scheme provided resistance against several communication attacks at the same time.

    Behera et al.[28]focused on the cluster head selection that interchanges the positions of the CH node among the cluster members having a maximum level of the energy.The algorithm takes into consideration,the residual energy,the initial energy,and the optimally selected CHs for selecting the succeeding set of CHs for WSNs.

    Sun et al.[29]examined the effectiveness of the blockchain based network of IoT devices.In this work,authors proposed the spatio-temporal domain Poisson distribution.In this approach,the spatially distributed nodes and the rate data arrival were modelled as the Poisson point process(PPP).The successful blockchain transaction rate,throughput and the signal to interference noise ratio were derived.

    3 Proposed Methodology

    In the literature survey,we have observed that all the existing work to save the energy in the WSN-IoT systems are based on the parameters like the load balancing, the selection of cluster head, the minimum distance from centroid, the modified LEACH and the dual cluster head [16,17,21-29].None of these works have addressed the energy saving using the coding technique.The proposed model is accompanied by the linear network coding to minimize the frequency of the direct transmissions with the BS.The security of the proposed energy-efficient model is coined using a blockchain.The blockchain provides decentralized availability of the information that is distributed through a network which is based on its participant’s trust [30].The architecture of the proposed WSN-IoT model is illustrated in Fig.2 which shows the selection of an appropriate CH using K-means, the encoding using LNC and the security through the blockchain network.The architecture has four components: (i) The WSN-IoT network; (ii)Gateway; (iii) The Blockchain network and (iv) The IoT applications.The first component is the WSNIoT network which is the collection of the WSN nodes and the IoT devices.The WSN nodes sense the information from the environment and performing the routing function.The WSN nodes are also responsible for the clustering whereas the IoT devices are responsible for the data encoding using LNC.The second component is Gateways, which is responsible for the data reception and forwarding to the blockchain network as illustrated in Fig.2.The WSN network and Gateway are connected through the base station.The sensor’s data are inserted into the blockchain network using the consensus mechanism.The application layer retrieves the data from the blockchain network and performing the data analytics to initiate the appropriate actions in the applications of the smart cities.

    Figure 2: Architecture of the proposed WSNs model for smart cities

    3.1 Network Model

    Consider the situation where there are N uniformly distributed nodes in the N x N square area.The assumptions about the participating nodes, BS, the location, the communication model of the underlying network model are presented as follows:

    1.In the typical sensor network application,the nodes and the base station are all immovable once the deployment is finished.

    2.The transmission is secured using the blockchain network.

    3.The sensors nodes are assumed to be heterogeneous with varying the initial energy.

    4.The geographical information of the sensors is known in advance.

    5.All the clusters are connected to a single BS that is reasonably away from the sensing field.

    6.This simulation model considers the one-hop communication to reduce delay.In the proposed model,the CHs communicate directly with the sensor nodes or BSs.

    The energy consumption is measured by the Eqs.(1)and(2)using the first order radio model[31].The transmission and the reception costs for the L-bit message in the network is computed using the below Eqs.(1)and (2)[31].

    where : dth- threshold distance

    Energy,Eedenotes the electronic energy,which is dependent on the factors like the scattering and the coding of signals,the modulation and the filtering techniques,while εmpd4or εfsd2,relies on the distance to the receiving node as well as the tolerable rate of the bit-error.The distance threshold is denoted by dth.Energy dissipation can be expressed as Eq.(3)[31].

    3.2 K-means Clustering

    K-means clustering is based on the Euclidean distances and CHs rely on the nodes’ residual energies[32].In this algorithm, the central node, which is responsible for collecting information about the node such as the identification number(ID),the residual energy,and the positions of all the sensor nodes,saves these data in the form of a list.Once all the information is obtained from all nodes and then,the clustering algorithm (K-means)is executed [33].

    3.3 Linear Network Coding

    In linear coding,the data are split in many blocks by the source node.Every block contains m packets which are called as native packets[34,35].This is represented byThus;the LNC coded packetis transmitted by the source node to the next CH.This packet x′i can be mathematically represented by the Eq.(5)[34].

    where:

    cji-matrix of coefficients

    The operations like the multiplication and the addition are computed over a Galois Field,GF(2q)[34].A code vector,and the ID of the block are embedded into theheader of the data packet.A counter that holds initial value of m′,where the value of m′is greater than m.This counter is maintained at the source node.The counter is decreased by one unit each time a coded packet is transferred to another node.The random transmission of the coded data packets continues till the value of the counter reaches to Zero[34].The forwarding and recruiting functionalities are executed at each and every hop.The receiving CH starts the creation of the subsequent cluster once the packets of the same block are received.Now, this receiving cluster becomes a new transmitting cluster with the same nodes.The transmitting CH initially schedules the appropriate time of when the node is scheduled to send the encoded data to the receiver cluster which is applied to every nodes of the transmitting cluster [34].The receiving CH then takes a control of the nearby nodes to form the receiver cluster, and to choose the nodes having the higher cost ci.This variable ciis defined for a node i, which can be possibly utilized for the receiver cluster, as expressed in the Eq.(6)[34,35].

    where: Pji- Probability of loss and

    Iji- Function of indication to indicate the availability of the sensor for receiving the packets.

    The senor i might not be accessible because it is reserved to receive or to transmit data packets for another cluster from another path.The probability Pjiis intermittently tested by ping samples of every neighbors.Ijirelies on the way transmitting CH which assigns the sensor nodes to forward the data [34].Consequently, the sensors which are expected to get more data are chosen as a recipient cluster from the transmitting cluster.

    Let us consider that a node has obtained the encoded data x’s.Then,the newly encoded data packet can be obtained from the Eqs.(7)and(8) [34,35].

    where:

    ci- Randomly generated numbers selected from GF(2q)

    x′′- Native data packets

    Similarly to the transmitting node, a sensor will embed a new code vector represented aswithin the x′′header of the packet, when transmitting the encoded data packet [34].When the sink node gets an encoded data, it will initially check if the data is new.A data is considered to be new and fresh only if it is linearly independent from the data received previously from the same block that the sink node has received.If the encoded data is not new, the data will automatically be disposed.Therefore, as long as m new packets are gathered, the receiver node is capable of recovering the native data packets.The process of decoding at the sink node implicates solving the group of the linear equations using the Gaussian algorithm.The linear equation determines a unique solution if m is the rank of the matrix [34].

    where:

    x′i -is an encoded packet

    xj- represents native packets.

    The sensors in the transmitting cluster might has obtained two or more packets from the preceding cluster,such that,they can form their own combination as shown in Fig.3.The sensor nodes merge all obtained packets from the same block using randomly chosen coefficients to create a random linear combination.

    Figure 3: Data transaction in clusters

    3.4 Blockchain Formation

    The blockchain is a decentralized,distributed and immutable shared database record which contains the archive of the transactions and the assets[36-38].The validated and timestamped data are transformed into blocks that are chained together.This blockchain employs Rivest-Shamir-Adleman(RSA)as well as SHA-256 algorithm for providing resilient cryptographic proof for the integrity and the authentication of data or information [39].Generally, the data block comprises the list of communications and a hash-key to the preceding block.The centralized authorities and the trusted third parties (TTP) have high chance of getting interrupted, hacked, or compromised.In addition, they might as well disobey and turn into being corrupt in the near future, although they are trustable presently.Every transaction in the blockchain is a shared public record which is checked by a widely held consensus of the minority nodes that are energetically playing a role in the transaction’s verifications and validations.The header field of the block comprises of several fields, out of which, one is a version for tracking the protocol upgradations.In addition, the header consists of a timestamp, the total count of communications, and the size of the block.Private blockchains are built, which include the sensors for saving the data and then sharing them.These nodes are then classified into the given two classes: non-mining nodes and mining nodes.

    1)Non-mining Nodes-The purpose of the non-mining nodes is to only receive and broadcast the requests of data sharing transactions,therefore,it does not require the same quantity of resources when compared to a mining node.It is notable that all the nodes keep a complete and validated replica of the blockchain and the sensors with a respect to the smart contracts.It is assumed that all the CHs have a legit connection with the blockchain network and forever round of transactions,the sensors upload the data collected from the point of interconnects(PoIs)to the blockchain network.Thus,the total number of requests for data storage S sent by the nodes N,at the end of round r,is given as S =N ×r.

    2)Mining Nodes-These nodes are utilized for verifying the transactions happening for the data sharing and for compiling them into the data blocks.These nodes are subjected to utilize the resources of machine computing consistently for the purpose of solving computational difficulties and for submitting the blocks to the blockchain network.Since each cluster head has a legit connection with the blockchain,the cluster head can perform encryption on the data collected with a private key and then forwarding it with a signature to the blockchain like a request for the storage.Additionally,the cluster heads can transmit the request for a query to the blockchain and can collect the reverted data.

    3)Transaction and Consensus Mechanism-The acquisition of a data packet from IoT devices or sensors triggers the creation of a blockchain transaction.The gateway performs a number of transactions including data,control,and outcome transactions that generate a large amount of data.Therefore,a reference pointer is stored to locate the data in the transaction on the blockchain.The typical format for a transaction includes the transaction identifier,the type of transaction,the reference to data,the address of the senders and receivers,the block number, the signature, the public and private keys.The selection of the healthy or the efficient blockchain nodes is an important aspect for a faster and reliable consensus algorithm.The healthy nodes which acts as a miner are selected based on multi-criteria which may include the parameters like the computing capability, the storage capacity, the reputation, the mining cost, the throughput and the bandwidth etc.In this work, to rank the reputation of the blockchain mining node, we have selected the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) [40,41].Nowadays,proof-of-work (PoW) has become an important consensus mechanism to verify the transactions using the mathematical challenges.The mining node collects all the transactions pending to generate a block in the PoW and iteratively hashes the collected data with its hashes using the Merkle tree.The process of hashing terminates when the hash of transactions becomes equal to or less than a pre-determined target value (th) known as a threshold and shown in the Eq.(10) [40,41].In this equation, H is SHA-256 hash function and bcis the current block.

    The probability to discover nonce of proof H can be expressed as the Eq.(11) [40,41].

    Upon successful computation of the target hash, the miner sends the proof to every node in the blockchain network, data transaction and other data to re-compute H by other miners to add the new block in the network.In this work, we have applied the consensus mechanism based on Rivest, Shamir and Wagner’s time-lock puzzle as shown in below [42].In the simulation, initially, 15 nodes have been generated as the blockchain nodes.As soon the number of new nodes is added in the sensor network,another configured blockchain is selected.The first configuration consists of 10 non-mining nodes and 5 mining nodes, while the second configuration consists of 50 non-mining nodes and 25 mining nodes.The last configuration consists of 100 non-mining nodes, while the number of mining nodes is 50.These mining nodes act for consensus mechanism.

    4 Results and Discussions

    The suggested methodology was simulated in MATLAB R2018a an NS2 platform.This section of the research article provides all the results achieved from the simulation of the network transactions.The overall throughput, the alive nodes and the dead nodes for each round of transmission of the wireless communication are provided.The parameters considered for the simulation of the proposed network model are presented in Tab.1.

    Table 1: Simulation setup parameters

    The proposed scheme uses LNC for the data transmission that enhances the energy efficiency of WSNs.The security of data[43]is established using the blockchain.

    4.1 Performance Metrics

    Average throughput analysis-The amount of data successfully obtained at the receiver end per unit time in the network.This can be expressed as a given in the Eq.(12).

    Network Lifetime-This can be defined as a relation between the consumed energy and the available energy in the network [44].In other words, this refers to the time when the very first node exhausts its energy in the WSN.

    Residual Energy-This refers to energy remnants in a node.The residual energy can be expressed in the Eq.(13).

    Reliability analysis-The reliability is the measurement of system life time that is inversely proportional to the loss of packets.

    Packet delivery ratio(PDR)analysis-This can define as the percentage of the total packets obtained by the receiving end to the sum of the packets of the data sent.

    4.2 Performance Evaluation

    Fig.4 displays the overall throughput obtained for increasing rounds of the data transmission.The total number of rounds of the transmissions is 12,000.The throughput reaches up to 700000 bits/second(bps).A comparison of throughput with the existing work has been presented in Tab.2, which demonstrates the higher throughput achieved by the presented network model compared to the existing work.

    Figure 4: Throughput for increasing number of rounds

    Table 2: Throughput analysis

    In general,the data transmitting process of the wireless networks use CHs to receive the information and to send to BS.In this proposed network,CHs wait until the information is gathered and encoded via a linear network coding.A block is created before uploading onto the internet.In order to access the information,the block connections of the blockchain have to be decoded with the help of the previous hash key used in the linear network coding.This ensures a reliable data transmission of IoT devices.A related comparative analysis with the existing work[46] has been shown in Tab.3.

    Table 3: Reliability analysis

    Fig.5 displays the alive and dead nodes for varying number of transmission rounds.It can be seen in Fig.5, that at the round 12,000, there are still 4 nodes staying alive.This infers that the energy spent for the transmission is drastically reduced in the proposed WSNs.Similarly, in Fig.6, it can be seen that 96 nodes are dead at the 12,000 transmission rounds.Tab.4 presents the lifetime comparison of the work proposed in this paper with the work proposed in the existing literature.From Tab.4, clearly demonstrates that the lifetime of the proposed network is improved comparing to the existing works.

    Figure 5: Alive nodes for the proposed network

    Fig.7a displays the average residual energy of the WSN.In the methodology presented, the initial energy is not completely exhausted even after 12000 rounds of the data transmission.Fig.7a illustrates the low energy consumption which may prevents the network failures; thus, the increases of the network lifetime is guaranteed.

    In WSNs,if the PDR is high,all the information is obtained by the receiving node without any loss of the packets.In Fig.7b, PDR is high for differing intervals of time (increasing number of rounds of data transmission).The graph clearly shows that the proposed model has 99.98% PDR even after 12,000 rounds,which is better than the existing work[49].

    Figure 6: Dead nodes for the proposed network

    Table 4: Lifetime comparison

    Figure 7: Average residual energy and Packet delivery ratio.(a) Average residual energy and (b) Packet delivery ratio

    5 Conclusion

    This paper has proposed a K-means clustering combined with the linear network coding for WSN with the blockchain enabled IoT devices.The cluster heads are selected using K-means clustering algorithm based on the spent energy and the distance from the base station.The data from the cluster heads undergoes a linear network coding before the communicating with the sink node.In this way, all the nodes have a direct communication with BS; therefore, the energy is conserved to a greater extent.Conservation of the energy subsequently extends the lifespan of the sensor network.The presented model is evaluated with the respect to the number of the live nodes, the packet delivery ratio, the throughput, the consumption of the energy and the reliability.It is found that the efficiency of the proposed network model is superior in the comparison with the other existing techniques.The comparative results prove that the suggested scheme performs more efficiently compared to the existing models.In the future, this work can be applied for MANETs and VANETs where the nodes are mobile.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fasttrack Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    99热网站在线观看| a级毛片在线看网站| 色婷婷av一区二区三区视频| 亚洲欧美清纯卡通| 在线观看一区二区三区激情| 夫妻性生交免费视频一级片| 高清午夜精品一区二区三区| 十八禁网站网址无遮挡| 又粗又硬又长又爽又黄的视频| 一级a做视频免费观看| 国产精品欧美亚洲77777| 成人漫画全彩无遮挡| 91精品国产国语对白视频| 老司机影院成人| 欧美3d第一页| 亚洲精品一区蜜桃| 久久这里有精品视频免费| 精品少妇黑人巨大在线播放| 久热这里只有精品99| 亚洲久久久国产精品| 美女中出高潮动态图| 一级毛片aaaaaa免费看小| 亚洲中文av在线| 亚洲激情五月婷婷啪啪| 国产精品久久久久久久电影| 国产在线免费精品| 成人国产麻豆网| 黄色毛片三级朝国网站| 久久久久久久国产电影| 亚洲人成77777在线视频| 亚洲欧洲国产日韩| 久久午夜福利片| 九九爱精品视频在线观看| 少妇高潮的动态图| 少妇人妻久久综合中文| 我要看黄色一级片免费的| 涩涩av久久男人的天堂| 亚洲第一区二区三区不卡| 一本—道久久a久久精品蜜桃钙片| 好男人视频免费观看在线| 国产精品久久久久久久久免| 亚洲久久久国产精品| av在线观看视频网站免费| av一本久久久久| 免费黄色在线免费观看| 国产探花极品一区二区| 亚洲国产av新网站| 人妻人人澡人人爽人人| 久久婷婷青草| 国产精品一国产av| 精品国产国语对白av| 亚洲精品一区蜜桃| 插逼视频在线观看| 午夜激情久久久久久久| 狂野欧美白嫩少妇大欣赏| 另类亚洲欧美激情| 成人国语在线视频| 成人国产麻豆网| 久久久精品94久久精品| 国产免费一区二区三区四区乱码| 妹子高潮喷水视频| 亚洲三级黄色毛片| 大香蕉久久网| 亚洲精品自拍成人| 99久久中文字幕三级久久日本| 激情五月婷婷亚洲| 久久午夜福利片| 国产乱来视频区| 亚洲欧美色中文字幕在线| 日本黄色日本黄色录像| 全区人妻精品视频| 欧美日韩视频精品一区| 欧美另类一区| 毛片一级片免费看久久久久| 性色avwww在线观看| 免费不卡的大黄色大毛片视频在线观看| 欧美精品一区二区大全| 欧美日韩在线观看h| 一级a做视频免费观看| 黑人欧美特级aaaaaa片| xxxhd国产人妻xxx| av电影中文网址| 久久久久国产精品人妻一区二区| 久久久久久久大尺度免费视频| 亚洲不卡免费看| 啦啦啦啦在线视频资源| 极品少妇高潮喷水抽搐| 人妻一区二区av| 亚洲欧美精品自产自拍| 亚洲中文av在线| 亚洲国产毛片av蜜桃av| 久久久久久久亚洲中文字幕| 欧美日本中文国产一区发布| av网站免费在线观看视频| 草草在线视频免费看| 免费久久久久久久精品成人欧美视频 | 亚洲精品第二区| 丝袜喷水一区| 伦理电影大哥的女人| freevideosex欧美| 国产精品人妻久久久影院| 91久久精品国产一区二区成人| 青春草国产在线视频| 在线精品无人区一区二区三| 少妇人妻 视频| 亚洲综合精品二区| 亚洲人成网站在线观看播放| 观看av在线不卡| 美女内射精品一级片tv| 国产av一区二区精品久久| 在线观看免费日韩欧美大片 | 国产精品一区二区在线观看99| av免费在线看不卡| 99热这里只有是精品在线观看| 国产一区二区三区综合在线观看 | 国产精品久久久久久av不卡| 男女无遮挡免费网站观看| 亚洲av国产av综合av卡| 王馨瑶露胸无遮挡在线观看| 久久国产精品男人的天堂亚洲 | 久久影院123| 欧美 日韩 精品 国产| 国产男女超爽视频在线观看| 亚洲欧洲精品一区二区精品久久久 | 97超碰精品成人国产| 国产 一区精品| 美女内射精品一级片tv| 国产精品国产av在线观看| 91aial.com中文字幕在线观看| 少妇猛男粗大的猛烈进出视频| 免费黄频网站在线观看国产| 免费人妻精品一区二区三区视频| 国产在视频线精品| 欧美变态另类bdsm刘玥| 免费观看a级毛片全部| 亚洲精品av麻豆狂野| 99久久人妻综合| 国产免费福利视频在线观看| 亚洲精品久久午夜乱码| 国产一区有黄有色的免费视频| 在线看a的网站| 国产精品一区二区三区四区免费观看| 久久青草综合色| 97在线视频观看| 欧美性感艳星| 一本大道久久a久久精品| 高清在线视频一区二区三区| 成人免费观看视频高清| 日韩欧美一区视频在线观看| 十八禁网站网址无遮挡| 99国产综合亚洲精品| av福利片在线| 久久综合国产亚洲精品| 最近2019中文字幕mv第一页| 国产免费又黄又爽又色| 国产一区二区三区综合在线观看 | 在线精品无人区一区二区三| 男女啪啪激烈高潮av片| 自拍欧美九色日韩亚洲蝌蚪91| 日本av手机在线免费观看| 伊人久久国产一区二区| 成人手机av| 亚洲婷婷狠狠爱综合网| 久久婷婷青草| 亚洲国产av影院在线观看| 老司机亚洲免费影院| 午夜福利,免费看| 国产一区二区在线观看av| 丝袜脚勾引网站| 国产探花极品一区二区| 亚洲内射少妇av| 欧美亚洲日本最大视频资源| 最新中文字幕久久久久| 色哟哟·www| 国产精品熟女久久久久浪| 国产伦理片在线播放av一区| 18禁裸乳无遮挡动漫免费视频| 亚洲精品成人av观看孕妇| 精品人妻熟女毛片av久久网站| 最近最新中文字幕免费大全7| 亚洲欧美日韩另类电影网站| 国产有黄有色有爽视频| 日本爱情动作片www.在线观看| 久久久国产欧美日韩av| 婷婷色综合大香蕉| 午夜激情av网站| 欧美激情极品国产一区二区三区 | 老司机影院成人| 人人妻人人爽人人添夜夜欢视频| 自拍欧美九色日韩亚洲蝌蚪91| 欧美3d第一页| 久久久久久久久久久久大奶| 午夜91福利影院| 秋霞伦理黄片| 一级毛片 在线播放| 99热全是精品| 亚洲国产精品一区二区三区在线| 久久久久久久精品精品| 两个人免费观看高清视频| 最新中文字幕久久久久| 午夜激情av网站| 伦理电影大哥的女人| 日本猛色少妇xxxxx猛交久久| 婷婷成人精品国产| 欧美精品人与动牲交sv欧美| 国产成人a∨麻豆精品| 一区二区日韩欧美中文字幕 | 亚洲av福利一区| 亚洲国产欧美日韩在线播放| 亚洲av中文av极速乱| 视频中文字幕在线观看| 久久久精品免费免费高清| 视频区图区小说| 亚洲人与动物交配视频| 亚洲欧美精品自产自拍| 免费观看无遮挡的男女| 亚洲国产精品999| 一级毛片 在线播放| 韩国高清视频一区二区三区| 亚洲国产精品一区二区三区在线| 国产免费视频播放在线视频| 人人妻人人爽人人添夜夜欢视频| 十分钟在线观看高清视频www| 一边摸一边做爽爽视频免费| 交换朋友夫妻互换小说| 婷婷色综合www| 国产精品99久久久久久久久| 国产亚洲午夜精品一区二区久久| 少妇精品久久久久久久| 亚洲美女视频黄频| 国产精品久久久久久久久免| 蜜臀久久99精品久久宅男| 日韩免费高清中文字幕av| 久久精品国产亚洲av涩爱| 又粗又硬又长又爽又黄的视频| 纯流量卡能插随身wifi吗| 伊人亚洲综合成人网| 美女内射精品一级片tv| 伦精品一区二区三区| 777米奇影视久久| 中文字幕制服av| 日韩人妻高清精品专区| 一本一本综合久久| 99精国产麻豆久久婷婷| 久久久久久久精品精品| 国产精品不卡视频一区二区| 亚洲国产欧美在线一区| 亚洲精品乱码久久久v下载方式| 国产黄色免费在线视频| 日本欧美国产在线视频| 性高湖久久久久久久久免费观看| 亚洲情色 制服丝袜| 精品久久久噜噜| 又大又黄又爽视频免费| 91精品国产九色| 日韩人妻高清精品专区| 女性被躁到高潮视频| 久久久久久久久久久免费av| 丰满迷人的少妇在线观看| 亚洲国产毛片av蜜桃av| 色婷婷av一区二区三区视频| 免费黄网站久久成人精品| freevideosex欧美| 日韩 亚洲 欧美在线| 国产av码专区亚洲av| 国产高清有码在线观看视频| 久久久精品免费免费高清| 我的女老师完整版在线观看| 亚洲国产精品国产精品| 搡女人真爽免费视频火全软件| 午夜激情av网站| 国产熟女欧美一区二区| 午夜91福利影院| 精品人妻熟女毛片av久久网站| 欧美国产精品一级二级三级| 亚洲丝袜综合中文字幕| 午夜激情久久久久久久| 午夜影院在线不卡| 成人国语在线视频| videos熟女内射| 欧美bdsm另类| 亚洲国产欧美日韩在线播放| 这个男人来自地球电影免费观看 | 成人黄色视频免费在线看| 国产成人aa在线观看| 夜夜看夜夜爽夜夜摸| 亚洲,一卡二卡三卡| a级片在线免费高清观看视频| 精品久久蜜臀av无| 久久精品国产a三级三级三级| 国产一区二区三区av在线| 狂野欧美激情性bbbbbb| 久久热精品热| 久久久久网色| 国产免费一级a男人的天堂| av国产久精品久网站免费入址| 国产探花极品一区二区| 黑人欧美特级aaaaaa片| 蜜桃在线观看..| 免费久久久久久久精品成人欧美视频 | 韩国av在线不卡| 天天操日日干夜夜撸| 春色校园在线视频观看| 在线天堂最新版资源| 午夜福利视频精品| 一个人看视频在线观看www免费| 国产片内射在线| 久久精品国产亚洲av天美| 大香蕉久久网| 91午夜精品亚洲一区二区三区| 又大又黄又爽视频免费| 免费观看无遮挡的男女| 国产乱人偷精品视频| 国产女主播在线喷水免费视频网站| 丰满迷人的少妇在线观看| 一级爰片在线观看| 日韩精品有码人妻一区| 国产精品国产三级国产专区5o| 制服丝袜香蕉在线| 国产成人免费无遮挡视频| 在线播放无遮挡| 久久人人爽人人爽人人片va| 久久精品国产鲁丝片午夜精品| 欧美日韩在线观看h| 欧美精品亚洲一区二区| .国产精品久久| 一级二级三级毛片免费看| 丁香六月天网| 亚洲天堂av无毛| 99热6这里只有精品| 欧美xxⅹ黑人| 国产免费视频播放在线视频| 另类亚洲欧美激情| 亚洲精品久久成人aⅴ小说 | 九九久久精品国产亚洲av麻豆| a 毛片基地| www.av在线官网国产| 国产精品国产三级国产av玫瑰| 久久久久国产精品人妻一区二区| 国产成人精品福利久久| 中国三级夫妇交换| 建设人人有责人人尽责人人享有的| 五月开心婷婷网| 色婷婷av一区二区三区视频| 午夜激情福利司机影院| 国产成人精品福利久久| 九色成人免费人妻av| 99热这里只有精品一区| 久久免费观看电影| 下体分泌物呈黄色| 亚洲精品视频女| 国产黄色视频一区二区在线观看| 亚洲av国产av综合av卡| 丰满饥渴人妻一区二区三| 亚洲精品日韩在线中文字幕| 国产日韩欧美视频二区| 成人手机av| 日本黄色片子视频| 免费观看a级毛片全部| 999精品在线视频| 如日韩欧美国产精品一区二区三区 | 日韩一区二区视频免费看| 精品午夜福利在线看| 国产日韩欧美在线精品| 一级a做视频免费观看| 久久婷婷青草| 国产亚洲最大av| 秋霞伦理黄片| 久久久久人妻精品一区果冻| 国产精品不卡视频一区二区| 天美传媒精品一区二区| 五月开心婷婷网| 国产成人免费无遮挡视频| 精品酒店卫生间| 卡戴珊不雅视频在线播放| 黄色配什么色好看| 一区二区三区免费毛片| 永久网站在线| 水蜜桃什么品种好| 大香蕉久久成人网| 欧美日韩亚洲高清精品| 极品人妻少妇av视频| 97在线人人人人妻| 女人精品久久久久毛片| 精品一区二区三卡| 亚洲精品国产色婷婷电影| 18+在线观看网站| 国产片内射在线| 熟女av电影| 黄片播放在线免费| 免费看光身美女| 日日爽夜夜爽网站| 99国产综合亚洲精品| 一本大道久久a久久精品| 亚洲欧美精品自产自拍| 狂野欧美激情性bbbbbb| av在线观看视频网站免费| 性色av一级| 日本色播在线视频| 久久久久久久大尺度免费视频| 少妇丰满av| 99久久人妻综合| av免费在线看不卡| 青春草视频在线免费观看| 有码 亚洲区| 国产成人午夜福利电影在线观看| 校园人妻丝袜中文字幕| 国产成人精品在线电影| 热99国产精品久久久久久7| 交换朋友夫妻互换小说| 天堂俺去俺来也www色官网| 国产精品成人在线| 熟妇人妻不卡中文字幕| 亚洲精品乱久久久久久| 两个人免费观看高清视频| 国产高清国产精品国产三级| 国产一区二区三区综合在线观看 | 老熟女久久久| 亚洲av福利一区| 在线观看人妻少妇| 国产永久视频网站| 9色porny在线观看| 久久婷婷青草| 一级毛片 在线播放| 成人二区视频| 欧美日韩成人在线一区二区| 精品久久久精品久久久| 18+在线观看网站| 国产精品人妻久久久久久| 美女国产视频在线观看| 在线 av 中文字幕| 国产精品久久久久久久电影| 精品少妇久久久久久888优播| 99久久人妻综合| 日本午夜av视频| 在线精品无人区一区二区三| av播播在线观看一区| 亚洲美女黄色视频免费看| 亚洲精品日本国产第一区| 伦理电影大哥的女人| 亚洲av电影在线观看一区二区三区| 亚洲国产毛片av蜜桃av| xxx大片免费视频| h视频一区二区三区| 国产亚洲最大av| 高清视频免费观看一区二区| 亚洲,一卡二卡三卡| 欧美最新免费一区二区三区| 99久国产av精品国产电影| 国产永久视频网站| 国产精品久久久久久久久免| 我的女老师完整版在线观看| 久热这里只有精品99| 天堂8中文在线网| 五月开心婷婷网| 午夜老司机福利剧场| 日本免费在线观看一区| 国产成人aa在线观看| 国产精品成人在线| 免费看av在线观看网站| 日本午夜av视频| 国产在线一区二区三区精| 美女国产视频在线观看| 成年女人在线观看亚洲视频| 日本av手机在线免费观看| 黑丝袜美女国产一区| 下体分泌物呈黄色| 日本午夜av视频| 国产亚洲av片在线观看秒播厂| 国产亚洲午夜精品一区二区久久| 精品人妻熟女毛片av久久网站| 婷婷色av中文字幕| 久久久久精品久久久久真实原创| 国产免费又黄又爽又色| 美女xxoo啪啪120秒动态图| av有码第一页| 2021少妇久久久久久久久久久| 亚洲激情五月婷婷啪啪| 精品99又大又爽又粗少妇毛片| 国产欧美另类精品又又久久亚洲欧美| 大又大粗又爽又黄少妇毛片口| 中国国产av一级| 亚洲中文av在线| 日韩免费高清中文字幕av| 国产永久视频网站| 在线亚洲精品国产二区图片欧美 | 日本黄色片子视频| 菩萨蛮人人尽说江南好唐韦庄| 大又大粗又爽又黄少妇毛片口| 成人漫画全彩无遮挡| 国产在视频线精品| 亚洲一区二区三区欧美精品| 午夜精品国产一区二区电影| 日韩中文字幕视频在线看片| 热99久久久久精品小说推荐| 丝袜美足系列| 男女边摸边吃奶| 国产精品蜜桃在线观看| 黑人高潮一二区| av专区在线播放| 黄色怎么调成土黄色| 人人妻人人澡人人爽人人夜夜| av女优亚洲男人天堂| 国产午夜精品久久久久久一区二区三区| 伊人久久国产一区二区| 黑人猛操日本美女一级片| 免费大片黄手机在线观看| 我要看黄色一级片免费的| 亚洲一区二区三区欧美精品| 免费黄网站久久成人精品| 爱豆传媒免费全集在线观看| 18+在线观看网站| 91精品伊人久久大香线蕉| 三级国产精品欧美在线观看| 婷婷色av中文字幕| 大码成人一级视频| 伦精品一区二区三区| 亚洲欧美清纯卡通| 91国产中文字幕| 伊人久久国产一区二区| 中文字幕最新亚洲高清| 大陆偷拍与自拍| 韩国av在线不卡| 日本vs欧美在线观看视频| 国产精品国产av在线观看| 嫩草影院入口| 18在线观看网站| 国产在线一区二区三区精| 男女高潮啪啪啪动态图| 国产男女超爽视频在线观看| 久久人人爽人人片av| 精品国产一区二区久久| 久久毛片免费看一区二区三区| 丝袜美足系列| 婷婷色麻豆天堂久久| 伊人久久国产一区二区| 国产视频首页在线观看| 美女脱内裤让男人舔精品视频| 午夜激情福利司机影院| 美女国产视频在线观看| 国产伦理片在线播放av一区| 一本久久精品| 91国产中文字幕| 国产精品麻豆人妻色哟哟久久| 国产日韩一区二区三区精品不卡 | 色视频在线一区二区三区| 全区人妻精品视频| 欧美丝袜亚洲另类| 免费不卡的大黄色大毛片视频在线观看| 国产成人一区二区在线| 春色校园在线视频观看| 欧美精品一区二区免费开放| 亚洲国产毛片av蜜桃av| 天美传媒精品一区二区| 天天操日日干夜夜撸| 国产欧美日韩一区二区三区在线 | www.av在线官网国产| a 毛片基地| 日韩制服骚丝袜av| 尾随美女入室| av不卡在线播放| 精品久久久久久久久亚洲| 夜夜爽夜夜爽视频| av在线播放精品| a级毛片在线看网站| 久久精品国产鲁丝片午夜精品| 夫妻午夜视频| 色网站视频免费| 另类精品久久| 九色成人免费人妻av| 亚洲精品美女久久av网站| 丝袜脚勾引网站| 国产伦精品一区二区三区视频9| 蜜桃在线观看..| 精品卡一卡二卡四卡免费| 久久99精品国语久久久| 午夜福利视频在线观看免费| 欧美日韩视频高清一区二区三区二| 午夜福利在线观看免费完整高清在| 欧美 日韩 精品 国产| 日韩av免费高清视频| .国产精品久久| 国产视频内射| 中国三级夫妇交换| 99国产精品免费福利视频| 在线 av 中文字幕| 少妇人妻 视频| 日日摸夜夜添夜夜添av毛片| 日韩亚洲欧美综合| 搡女人真爽免费视频火全软件| 久久亚洲国产成人精品v| 热99国产精品久久久久久7| 最新中文字幕久久久久| 亚洲欧美成人精品一区二区| 日本欧美国产在线视频| 日韩不卡一区二区三区视频在线| 中国美白少妇内射xxxbb| 女性被躁到高潮视频| 亚洲怡红院男人天堂| 高清视频免费观看一区二区| 在线 av 中文字幕| 国产一区二区在线观看av| 亚洲国产精品999| 国产片特级美女逼逼视频| 亚洲欧美成人综合另类久久久| 久久久欧美国产精品| 2021少妇久久久久久久久久久| 又大又黄又爽视频免费| 中国美白少妇内射xxxbb| a级毛片黄视频| 99热网站在线观看| 国产一区二区三区综合在线观看 | 色5月婷婷丁香| 亚洲国产精品成人久久小说| 国产成人免费观看mmmm|