• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    OTS Scheme Based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure

    2021-12-16 06:40:18SushilKumarSinghYiPanandJongHyukPark
    Computers Materials&Continua 2021年3期

    Sushil Kumar Singh,Yi Pan and Jong Hyuk Park,*

    1Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, 01811,South Korea

    2Department of Computer Science, Georgia State University, Atlanta, GA,30302-5060, USA

    Abstract: For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others.These applications are related to industrial plants, automation, and e-healthcare fields.IoT applications have several issues related to developing, planning, and managing the system.Therefore,IoT is transforming into G-IoT(Green Internet of Things),which realizes energy efficiency.It provides high power efficiency, enhances communication and networking.Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication bandwidth, centralization, security, and privacy.In this paper, we propose the OTS Scheme based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure to resolve these challenges.An OTS-based Blockchain-enabled distributed network is used at the fog layer for security and privacy.We evaluated our proposed architecture’s performance quantitatively as well as security and privacy.We conducted a comparative analysis with existing studies with different measures, including computing cost time and communication cost.As a result of the evaluation, our proposed architecture showed better performance.

    Keywords: Blockchain; energy-efficient IoT; ots scheme; edge infrastructure;security and privacy

    1 Introduction

    In today’s era,the rapid advancement of the Internet of Things(IoT)and Information Communication Technologies(ICT)is translating into intelligent services for daily human life in sustainable computing with smart applications, including advanced manufacturing, smart vehicles, and others [1].Billions of physical devices worldwide connected in different topological ways to the Internet are known as IoT.Technologies include Radio Frequency Identification (RFID), Network Information Card (NIC), Wireless Fidelity (Wi-Fi), and Access Points (APs).It provides a large number of intellectual services for edge infrastructure in smart city applications.These cities are entirely dependent on multiple communication perspective computing (Cloud, Fog, and Edge) wherein data are exchanged in heterogeneous mode, offering a distributing environment [2].It has the various advantages of technological advancements, such as manufacturing and distribution of IoT data according to different smart cities’ criteria.Still, it has multiple challenges, including big data, greenhouse gas emissions, consumption of non-renewable data,and others.The number of IoT devices is forecast to reach 41.6 billion, with 79.4ZB data expected to be generated by 2025,according to International Data Corporation’s(IDC) forecast report[3].

    To address these challenges, energy-efficient IoT is utilized because IoT is transforming into G-IoT(Green Internet of Things) nowadays.It is the combination of IoT, G-Tech (Green Technology), G-Eco(Green Economy), and G-Net (Green Networking).With the adoption of G-Tech, sustainable designing,and manufacturing, smart factories increase productivity day by day [4].A user-friendly environment is developed in smart industries, based on R5factors such as Reduce (fuels, energy), Renew (electricity,wind and water power), Recycle (paper, plastic, battery cells), Responsibility, and Refuse (do not use unwanted things).Green economy means reducing the smart city’s risk through the green development of ecological economies.G-Net has a vital role in deploying IoT applications, minimizing operational costs and power consumption with decreased pollution and maximizing environmental conservation[5].

    G-IoT also uses communication technologies such as Green Radio Frequency Identification(G-RFID),Green Wireless Sensor Network(GWSNs),Green Data Center(GDC),Green Base Stations(GBS),Green Machine-to-Machine(GM2M),and others[6].Routray et al.[7]discussed the five-layer G-IoT architecture:Physical layer,MAC layer,Radio link control layer,Packet data convergence layer,and No-access stratum layer.There are various advantages of G-IoT with regard to edge infrastructure in a smart city such as enhancing energy efficiency, reducing carbon emissions, decreasing resources and pollution, minimizing environmental degradation, and improving productivity.Still, there are many challenges in G-IoT, such as centralization, latency, networking, security, and privacy.IoT sensor devices are increasing continuously;various cyber-attacks such as optimal Green Hybrid attack, DDoS and Hacking attacks are also growing,harming Green IoT applications.Various next-generation industries (financial companies) have to invest 10% of their total ICT budget in addressing and preventing network and security threats for G-IoT [8].The comparison of the proposed layered architecture and the existing research is shown in Fig.1.

    Figure 1: Comparison of proposed layered architecture to existing research

    To resolve G-IoT’s issues, we can deploy the new advanced, high-demand technology, called Blockchain.As a widely used technology for security purposes in the advanced applications of smart cities nowadays [9], it supports essential properties like digital integrity, distributed ledger, and decentralization for secure advanced city infrastructures [10,11].Thus, it offers the opportunity for radically changing and improving data security in many use cases by enabling trusted architecture.Blockchain is the collection of blocks,each of which is linked to the previous block with a hash pointer.Each block has transaction data, timestamp, last hash value, and own hash value.To verify and validate transactions, miner nodes provide security and privacy for data in a smart city edge environment [12].To provide more secure infrastructure in IoT applications, Shu et al.[13] proposed a digital signature scheme-based hash function.They prevent key exchange with the elliptic curve discrete logarithmic algorithm (ECDLA) and subsequently create a hash function, proving reliability in IoT applications.Based on this scheme, it supports authentication, non-repudiation, and integrity.Still, this scheme has a drawback: the key and signature sizes are too large here, so they cannot be used in space-critical applications in a smart city[14-17].

    The OTS scheme has a substantial role in determining the size of keys and signature.Second,the hashbased signature scheme cannot be utilized in blockchain technology.Thus,we introduced four layer-based secure architecture, which uses the OTS scheme-based Blockchain at the fog layer and provides more security in a smart city.OTS means one-time signature, and it is part of cryptography.The main purpose of the OTS is to provide more security and privacy.Nowadays, the latest methodology uses a green environment such as energy-efficient infrastructure in smart city applications [18-21].Thus, energyefficient, secure architecture in edge infrastructure is proposed with the fusion of the OTS scheme and Blockchain technology.

    This paper addresses the issues of security and privacy,centralization,and communication bandwidth by using the proposed OTS scheme-based secure architecture for Energy-Efficient IoT in Edge Infrastructure.

    Research contribution: The following are the main contributions of this paper:

    ●Propose OTS Scheme-based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure.

    ●OTS-based Blockchain provides more security in a distributed manner with key generation,signature generation,and signature verification for Edge Infrastructure in smart city applications.

    ●Evaluate the performance of the proposed architecture in terms of computing and communication costs for advanced applications.

    ●We compare our proposed work with the existing research studies quantitatively and in terms of security and privacy by performing comparative analysis.

    The rest of this paper is organized as follows:Section 2 discusses the seminal contributions for Green IoT in advanced smart city applications; in Section 3, we propose the OTS Scheme-based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure; we assess the computing and communication cost through quantitative analysis in Section 4 to evaluate the performance of the proposed architecture in terms of security and privacy and perform comparative analysis; finally, Section 5 presents the conclusions of our paper.

    2 Related Work

    In this section, we discuss the seminal contribution of the existing research studies with regard to Energy-Efficient, IoT-related sustainable smart cities applications and address centralization,communication bandwidth, security, privacy, and other challenges.The basic and essential purpose of Edge Infrastructure in smart city applications is to provide a reliable, trustworthy environment for the smart city with the help of advanced technologies, services, rules,and regulations.

    2.1 Seminal Contribution

    For the deployment of greenery in IoT infrastructure,Kim et al.[22]proposed an empirical model of the Blockchain of Things(BoT)to overcome the security vulnerability of existing IoT devices such as airplanes,automobiles, and CCTV in the sensor multiplatform by the radix of the blockchain core algorithm and multiple-agreement algorithm.Nonetheless, it has some issues with regard to IoT networks such as authentication of IoT devices collected by the IoT gateway through LAN.Kaur et al.[23] designed Green IoT architecture for reducing the energy utilization of IoT smart city applications.It is based on a cloud system that is used for decreasing hardware consumption, but the security vulnerability issue is not resolved.Yang et al.[24] introduced an AI-enabled cloud data center for a green cloud and studied about timing control and refrigeration engine intelligently.It realized low consumption of energy and high efficiency intelligently for IoT applications, but it has some limitations such as AI-enabled networking like edge computing,caching, and offloading for a greener environment.

    Sukjaimuk et al.[25]proposed a congestion control mechanism to mitigate the congestion rates of the network for Green IoT Sensing devices.It reduced sensor efficiency consumption and increased network performance for Green, Efficient, Information-Centric, Networking-based Green IoT Sensor.Overall network efficiency for various topological structures is a major issue, which is not covered by this research.For the improvement of quality of experience (QoE) in the content-centric computing system for IoT users, He et al.[26] proposed QoE models as well as a sub-optimal dynamic approach to evaluate the qualities of IoT users and networks based on green resource allocation with deep reinforcement learning.They did not address the continuous increase of IoT devices and network, security, and privacy issues, aiming only aims at the enhancement of the quality of experience.

    Patil et al.[27] provided a lightweight blockchain-based secure framework for smart greenhouse farming to provide security and privacy.The private immutable ledger in blockchain optimized energy consumption and secured communication with each other.Singh et al.[28] presented Blockchain and Fog-based secure architecture for the Internet of Everything (IoE) in smart cities.This architecture maintained properties such as sensitive data encryption, authentication, and reduced latency and energy.Shaikh et al.[29] provided various G-IoT approaches with communications services and others.They also addressed various challenges for G-IoT, such as large data, energy efficiency, latency, scalability,security, and privacy.Linde et al.[30] constructed a secure signature scheme to integrate hash-based onetime signature scheme and blockchain technology and compared it with the traditional system.Nonetheless, it has stateful properties and requires storage, and backup for advanced application requirements leaves a lot to be desired.

    2.2 Needs Addressed by the Proposed Architecture

    For effective and secure environments in smart applications,the proposed architecture considered five security threats for Energy-Efficient IoT in a smart city for Edge Infrastructure:

    ●Mismatched security policy:An attacker can access the IoTand control entities easily via a less secure environment because of the various security protocols used in different layers in the system.

    ●DoS attack:An attacker launches a DoS attack on physical services to exhaust the available network resources for other devices in the G-IoT infrastructure.With the DoS attack,an attacker can launch an attack easily on a virtualized platform system.

    ●Impersonation attacks: An attacker can pose as a physical platform to allocate unavailable IoT resources.Moreover,an attacker can masquerade as a G-IoT controller to steal network resources.

    ●Hypervisor attacks: An attacker can achieve attacks with respect to the hypervisor to jeopardize the virtualization of IoT device resources in the Green IoT infrastructure.These attacks cause softwarebased errors in the hypervisor.

    ●Side-channel attacks:An attacker can easily access one IoT device and attack the set of IoT devices sharing the same primary hardware resources.

    Based on the analysis of research studies,this study focused on the five-layer architecture for Green IoT in smart city applications with energy efficiency,latency,and other issues.Note,however,that such existing methodologies have various limitations, such as networking, centralization, communication bandwidth,security, and privacy.Thus, we provided four layers based on secure architecture with OTS-based Blockchain used at the fog layer.

    3 Proposed OTS Scheme Based Secure Architecture for Energy-Efficient IoT

    The previous research proposed a Green environment for the smart city with IoT-oriented infrastructure.Nonetheless, it has various considerations such as communication bandwidth, security, and privacy for advanced applications of a smart city.Therefore, we present the OTS scheme-based secure architecture for energy-efficient IoT in the smart city for edge infrastructure to address issues, including security,privacy, and communication and computing cost.The OTS scheme has three functions: Generate Keys,Generate Signature, and Signature Verification.This scheme is utilized in the Blockchain for creating the Blocks’ hash values.With the integration of the OTS scheme and Blockchain, the proposed architecture offers more security and privacy for Energy-Efficient IoT applications in Edge Infrastructure.

    3.1 Design Overview of the Proposed Architecture

    The design overview of the proposed architecture for Energy-Efficient IoT in Edge Infrastructure is shown in Fig.2.It has four layers: (1) Connection layer; (2) Edge layer; (3) Fog layer; and (4) Cloud layer.The connection layer is used as a physical layer as well as for monitoring of IoT device for smart applications, including smart manufacturing, and many more.It also provides filtered data and connection between IoT.This data is forwarded to the edge layer with 5G connectivity.Access and Core Network provide such connectivity with the help of user plane and control plane functions (UPF, CPF).Many responsibilities, including network functionality, Quality of Services (QoS), controllability, and stability of the applications, are provided by the user plane and control plane.Various base stations and switches are available at the edge layer, which is utilized for providing a multi-interface network with smart applications.It is also used for providing the best route and communicating with the fog layer.We deployed multi-interface smart applications (SA1, SA2, SA3….) and established a communication relationship between IoT devices and advanced applications.

    Figure 2: Design overview of the proposed architecture for energy-efficient IoT in edge infrastructure

    In the Fog layer, we used the OTS scheme-based Blockchain for security and privacy purposes.Blockchain technology is known to be used for secure IoT-oriented infrastructure.By employing the blockchain, an untrusted individual manufacturer can link together with an associate in a peer-to-peer network and transfer data in a verifiable manner without the aid of a trusted intermediary.For enhanced security, however, we are using the OTS scheme-based blockchain at the fog layer, and we have developed distributed networks between various fog nodes.By leveraging the OTS scheme and Blockchain technology, we provide more security and privacy and incur low computing and communication cost for Energy Efficient-IoT in Edge Infrastructure for a smart city.On the cloud layer,data analysis, production analysis, and decision-making functions are provided in a decentralized manner with the help of the data center.Blockchain is responsible for the scalability and analysis of data.The cloud layer consists of large-capacity storage space, and high-performance servers equipped with processing capabilities.It also automatically provides various application services for smart cities,including smart industries such as management, configuration,distribution,and decision support.

    3.2 Methodological Flow of Proposed Architecture with OTS Scheme-Based Distributed Blockchain

    This subsection provides the methodological flow of the proposed architecture with the OTS schemeenabled distributed blockchain network.It is categorized into three parts: data acquisition, data conversion, and OTS scheme-based blockchain-enabled distributed network.The first part, data acquisition is conveyed at the connection layer, and data conversion is realized at the edge layer, with the OTS scheme and blockchain concept employed at the fog layer of the proposed architecture.It has various advantages, including distributed and decentralized secure transactions between manufacturer,transparency, decentralization, trustworthy environment, and others.The OTS scheme offers more security and privacy with blockchain networks.The methodological flow of the proposed architecture with the OTS scheme-based distributed blockchain is shown in Fig.3.

    Figure 3: Methodological flow of proposed architecture with OTS scheme-based distributed blockchain

    Data Acquisition:Data acquisition is the essential and primary task of the proposed architecture.Used at the first layer, called the connection layer of Energy-Efficient IoT, it gathers the raw industrial data from various IoT devices, including flow meter, smartwatch, smart vehicles, and healthcare assets according to advanced applications such as smart manufacturing, smart vehicles, and smart grid.Improved sustainability, economic development, enterprise resource planning, and manufacturing execution are the functions of the smart city realized by IoT devices.In the proposed architecture, a different type of IoT device connects to multiple smart applications (SA1, SA2, SA3,…).These applications collect IoT data such as the speed of vehicles, temperature, disease parameters, manufacturing details, pressure, network data rate, and others.The automatic collection of data from IoT devices is a function provided by IoT technology.These data then communicate with the edge layer where various base station switches and gateways are available, offering receiver/transmitter services for the communication.

    The data conversion function is also used in this layer.It provides useful information from raw data with the help of Data_In,Data_Flow,and Status_Reply functions,which offer the needed information for smart applications.The data conversion is also part of Green-IoT.For 5G connectivity,we are using access and core network controller between layers of the proposed architecture.It is categorized into two parts:(1)UPF(user plane function) and (2) CPF (control plane function).UPF performs various tasks such as traffic reporting and data forwarding in the network in a 5G environment.CPF also has some services like session management, policy control, mobility management, network selection, and authentication server.At present, information is communicated to the upper layer, called the fog layer.In this layer, we utilize an OTS scheme based blockchain-enabled distributed network.A list of abbreviations with all descriptions is provided in Tab.1.

    Table 1: List of abbreviations

    OTS Scheme Based Blockchain-Enabled Distribution Network:In this subsection,we show the OTS scheme-based blockchain-enabled distribution network.As a distributed ledger system that promotes decentralization, transparency, and digital integrity, blockchain technology follows the rules and regulations of the OTS scheme such as key generation, signature generation, and signature verification and provides a distributed network.Thus, it is called the OTS scheme based Blockchain.It is mainly used for security purposes in smart city applications for Edge Infrastructure.In the blockchain,digital assets are distributed rather than copied or transferred.These assets are decentralized,maintaining the property of distributed networks in the Blockchain.Fig.3 shows the blockchain functionality with the OTS scheme,where various blocks,named A to Z are connected to each other as a series of information transactions.If A wants to send the information to B, then A must follow the condition that A will use its own private key to sign the hash of transaction 1 and B’s public key.Similarly, B, C, D, …, Z maintain this property.If it is OK, then add a block in the blockchain network, and the transaction is executed easily; otherwise,identify the malicious data and stop the transaction in the network.

    The OTS scheme has three parts: (1) Generate keys Gk(Private Gprand Public Gpub); (2) Generate Signature Gs; and (3) Signature Verification Sv.Hash-based signature has the drawback of generating large keys and signature, so this cannot be used in the blockchain technology.Therefore, we are proposing an OTS scheme-based blockchain.In this scheme, we utilized a bunch of information instead of large-size information.The proposed scheme uses 4-bit long bunches of information for the Blockchain network.Eqs.(1)and(2)are used for calculating the size of keys and signature,respectively.

    If key Size =256 bits, then Signature Size=512 bits,which is smaller than the Hash-based signature scheme.The signature size is 512 bits long so security parameter M= 512.

    A scheme is defined as a triple algorithm(Gk,Gs,Sv)for Information m(which is often defined as the output range of the hash function),which is offered in the Blockchain network in a smart city.

    Gk=generates a key pair (Gpr,Gpub)given security parameter M;

    M= Parameters: size of private key,public key,signature elements, and others.

    Gs (Gpr,m)=creates signature ?on m using secret key Gpr.

    Sv(Gpub,?,m)= returns 1 if ?is a valid signature on message m for public key Gpub.

    For all (Gpr, Gpub) ←Gkand all information m, every signature ?←Gs (Gpr,m) can be verified with Sv(Gpub, ?, m) = 1.The generation of keys, generate signature, and signature verification are discussed below.

    Algorithm 1: Generate Keys Gk (Private Gpr and Public Gpub)

    (continued).6: end for 7: Gpub =[]; /* Public Key Initialization 8: for x0→15 9: do 10: Z ←Gpr [x ],Zf ←Z [0:127], Zt ←Z 128:255[ ]; /*Divide private keys into four parts.11: Zu ←Z 256:383[ ], Zy ←Z 384:511[ ]12: for y0→128 13: do 14: Zf ←SHA256 (Zf ), Zt ←SHA256 (Zt ), Zu ←SHA256 (Zu ), Zy ←SHA256 (Zy )15: end for Gpub.merge Zf, Zt, Zu and Zb)(16: end for

    Generate Keys Gk (Private Gpr and Public Gpub):Every block has four types of information in the blockchain networks: previous has value, own hash value, timestamp, and data.The hash value is dependent on private and public keys.Private keys are the collection of 16 values (24), each of which is 512 bits long[18].

    We can apply a hash chain to generate a private key value (gprk).During signature verification in Blockchain, private key values are not disclosed, so it is secure.The calculation of public keys (Gpub) is dependent on the value of private key Gpr.For the computation of public keys, we divide private key values gprkinto four parts for Blockchain[18].

    Algorithm 2:Generate signature Gs

    (continued).29: do Zy ←SHA256(Zy);30: endfor 31: ?i.merge(Zf,Zt,Zu, Zy);32: endfor

    Generate Signature Gs:The signer has a huge responsibility; it follows some steps and generates a signature for the Blockchain network.For this purpose, the hash of the information (h) is first computed,and we used the SHA-512 hash function with Eq.(8) (h has a total of 128 hexadecimal symbols).

    hhdis dependent on string_index_list(16 different strings).It is denoted by L with Eq.(9).

    Then, the signer (Miner Node) calculates the summation of the digits (Summation_string_index) in every string_index with Eq.(10)[18]:

    Finally, with the help of Summation_string_index, the signer produces signature ?according to information (m), which is collected by the edge node of the proposed architecture.The signer (Miner Node) then computes the hash of every private key value(Gpr).It is equal to Summation_string_index.

    How they spluttered and flamed, to be sure! Now everyone can see, they thought, that we are the grandest! How we sparkle! What a light- But here they were burnt out

    With Eq.(11),the signer will generate the final hash outputs with individual signature.It is denoted by V and is the combination of two forward private sign FGprand two backward private sign BRpr[18].

    Example:

    We have a hash of information h with hexadecimal symbols according to Eq.(8).

    H = 678abc1234808de3457f490....0................0................0................0................9f123........(128_hd)index 12 23 78 91 98 119 stringindexi 12 23 78 91 98 119

    Signature Verification SV:The next step of the OTS scheme is signature verification (SV) in the Blockchain network for a smart city.Sv(Gpub,?, m) returns the value of 1 if ?is a valid signature on message m for public key Gpub.For this verification, the verifier (Miner Node) computes the Summation_string_index values according to the same step above (Generate signature Gs).The verifier(Miner Node) verifies the signature by more than 50% and generates verification key (Vk) with the help of signature, a combination of two forward signatures (F?), and two backward signatures (B?).Eq.(12)shows the signature verification process.Finally, the verifier compares his/her own verification key with the signer public key.If it is equal to 1, the signature is accepted[18].

    Algorithm 3: Signature verification Sv

    The OTS scheme-based blockchain architecture provided decentralization,security,and privacy.After signature verification, we can say that it offers a secure environment for smart city applications because it utilizes blokchain ledger in the fog layer.The security and privacy of the proposed architecture and experimental evaluation are discussed in the next section.

    4 Experiment and Performance Evaluation

    This section presents the experimental and performance evaluation of the proposed Architecture for Energy-Efficient IoT in Edge Infrastructure.It has three subsections: Quantitative analysis, Security and privacy analysis, and Comparative analysis with existing research.

    4.1 Quantitative Analysis

    In this subsection, we evaluate the effective performance of the proposed architecture and algorithms with simulation such as computing cost, and communication cost.Permissioned blockchain Hyperledger fabric (Version 1.2), docker container (2.0.5), Ubuntu Linux (14.04.6 LTS) with virtual CPU were employed for the simulation setup.For the Hyperledger Fabric blockchain, 4-40 GB internal memory was the minimum requirement.Node.js v8.9.1 (6.8.0 version) was installed for checking the performance of various node tests.The computing and communication costs of the proposed architecture are evaluated in this section.

    Table 2: Comparison of security and privacy analysis with existing research

    Computing Cost:The evaluation of computing cost is dependent on the total bits exchanged with a registered user and on signature verification in Blockchain networks.The average time required for hash code is 0.32 msec, the signature generation time is 21.82 msec, the signature verification time is 38.92 msec, and the asymmetric encryption/decryption time taken is 22.72 msec as shown in [34].It has three phases, including Generate keys Gk, Generates signature Gs,Signature Verification SVfor the calculation of overall computing cost.

    ●Generate signature:One hash code operation,one asymmetric encryption/decryption,and signature generation are utilized for this phase with Algorithm 2.Thus,(0.32+22.72+21.82)=44.86 msec as the total computing time used for this phase.

    ●Signature Verification: One hash code operation, one asymmetric encryption/decryption, and signature certification is employed in this phase.Thus, (0.32 + 22.72 + 38.92) = 61.96 msec as the total computing time cost for this phase.Finally, we calculate the overall computing time for blockchain networks according to all algorithms as (23.04+44.86 +61.96)= 129.86 msec.

    At this point, a performance analysis of the proposed architecture is conducted when the number of transactions increases.Thus, the computing time for signing and verifying the signature linearly varies according to the no.of transactions as a reference as shown in Fig.4a.

    Figure 4: (a): Computing cost time analysis concerning No.of transactions (b): Communication cost analysis concerning no.of transactions

    Communication Cost:Let user identity be 32 bits, SHA hash output be 256 bits, random nonce be 16 bits, timestamp be 16 bits, and encryption/decryption identification be 32 bits long, with checksum values of 256 bits.It is described in [34] as well.The communication cost also follows the Generate keys Gk,Generate signature Gs,Verify Signature SVphases.

    ●Generate keys:The total communication cost for this phase is(32+4+256+16+16+32)=356 bits as required.User identity,registration,SHA hash output,random nonce,timestamp,and encryption/decryption identification functions are used.

    ●Generate signature: For this phase, the total communication cost is (32 + 4 + 256 + 16 + 16 +32) = 356 bits, which is utilized.User identity, registration, SHA hash output, random nonce,timestamp,and encryption/decryption identification functions are provided.

    ●Signature Verification:The total communication cost for this phase is(32+4+256+16+16+32+256)= 612 bits,which is required in signature verification.

    Thus,the overall communication cost of the proposed architecture is(356+356+612)=1324 bits.It is better to compare with existing studies according to the number of transactions,as shown in Fig.4b.

    4.2 Security and Privacy Analysis

    This subsection analyzes security and privacy with various parameters, including confidentiality, data integrity, user anonymity, decentralization, security against malicious attack, and man-in-the-middle attack for Edge Infrastructure.As already discussed in Section 3, the OTS scheme based blockchain is deployed at the fog layer of the proposed architecture for security and privacy purposes.Tab.2 shows the security and privacy analysis vs.existing studies.

    Confidentiality: The proposed architecture satisfies the property of confidentiality because the blockchain is the collection of blocks, each of which connects to the previous blocks by a hash function.Any user wishing to transfer the information from one node to another, first encrypts the data with public and private keys (Algorithm 1), and plain text is converted into the ciphertext; the user then generates a signature (Algorithm 2) and finally verifies the signature (Algorithm 3) and matches the A’s private key and signature.Finally, add the block in the blockchain network.The receiver user decrypts data through signature verification in the advanced applications for a smart city.

    Data Integrity: Actually, we know that the data integrity of the information follows the three steps of creation, transmission, and storage.Note, however, that alteration of data follows the steps of insertion,deletion, and substitution.Digital signature or signature verification deviates from the property of the alteration of data in the network [35].We are using a signature verification algorithm (Algorithm 3) to check for the modification of data in the proposed algorithm.Blockchain networks already support the data integrity of information in the blockchain network, but the OTS scheme provides more security to communicate the information with the Blockchain network.

    User Anonymity: Through the use of the proposed architecture, the property of user anonymity is supported.Efficient, secure communication of user information among various financial applications and is difficult, hiking up the cost of malicious user authentication functionality.Any user of a smart enterprise or a company wishing to communicate the information to another user first completes the registration process in the blockchain network by generating private and public keys (Algorithm 1).When signature verification is done, including the addition of block in the blockchain network, the receiver will get the information with the help of the proposed architecture.

    Decentralization: The proposed architecture supports decentralization because it uses the concept of Blockchain.The Blockchain network already enhances the three properties of data integrity,decentralization, and transparency.Algorithms 1, 2, and 3 provide more security and privacy with a decentralized, secure distributed blockchain network.

    Security against malicious users:We are utilizing the distributed network in Blockchain with an OTS scheme that follows the protocols of key generation,signature generation,and signature verification.It is like the registration and verification steps for use of the Blockchain network by a new user.When any malicious user wants to access this network, it will not follow the aforesaid steps and forgery is computationally impossible[36].Therefore,the proposed architecture can be said to provide security against a malicious user.

    Security against Man-in the Middle attack:The proposed architecture provides security against the manin-the-middle attack because it maintains the secure exchange of the public key and generation of secure public and private keys with Algorithm 1, finally verifying the signature by minor nodes in the Blockchain network.Therefore,the proposed architecture can be said to offer security and privacy against the aforesaid attack for advanced smart applications.

    According to the security and privacy analysis, we are providing a secure environment in smart applications in edge infrastructure with the use of the proposed architecture.This architecture satisfies the properties, including confidentiality, data integrity, user anonymity, decentralization, security against malicious attack,and man-in-the-middle attack for energy-efficient IoT in edge infrastructure for a smart city.

    4.3 Comparative Analysis with Existing Research

    This subsection discusses various existing research and compares them with the proposed architecture using some parameters, such as key technology, security architecture/framework, approach, and key consideration.Tab.3 shows the comparative analysis with existing research.The proposed research provides more security and privacy with energy efficiency for Energy-Efficient IoT in Edge Infrastructure for a smart city through OTS scheme-based blockchain at the fog layer.It uses a distributed network and enhances the three properties,including data integrity,decentralization,and transparency.It also incurs less computing resource cost and realizes scalability and centralization in advanced applications in a smart city.

    Table 3: Comparison with existing research studies

    5 Conclusion

    We proposed OTS scheme-based secure architecture for Energy-Efficient IoT in Edge Infrastructure for smart city applications.Blockchain technology is known to provide security and privacy with a distributed network.Nonetheless, we used the OTS scheme for providing more security and privacy in terms of confidentiality, user anonymity, data integrity, and others.Three algorithms, Generation Keys, Generate Signature, and Signature verification used to provide such security in sustainable smart city advanced applications, including smart manufacturing, smart industries, smart healthcare, and more.The comparison with existing researches also demonstrated security and privacy, key technologies, key considerations, and others.We evaluated the performance of the proposed architecture as the computing and communication costs for the network.Finally, we compared it quantitatively, including security, and privacy, and performed comparative analysis with existing research studies as various traditional parameters.The performance result of the proposed architecture is better than the other approaches providing more security and privacy.

    Funding Statement:This study was supported by the Advanced Research Project funded by SeoulTech(Seoul National University of Science and Technology).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产av麻豆久久久久久久| 国模一区二区三区四区视频| 欧美成人免费av一区二区三区| 中文字幕高清在线视频| 亚洲专区中文字幕在线| 国产av不卡久久| 日本 欧美在线| 老司机午夜福利在线观看视频| 波多野结衣巨乳人妻| 精品一区二区三区视频在线观看免费| 丰满人妻一区二区三区视频av | 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 小说图片视频综合网站| 久久久久久久久大av| 欧美激情在线99| 欧美黄色淫秽网站| 欧美乱码精品一区二区三区| 99久久九九国产精品国产免费| 最近最新中文字幕大全电影3| 99热这里只有精品一区| 成熟少妇高潮喷水视频| 免费看日本二区| 国产单亲对白刺激| 亚洲男人的天堂狠狠| 91麻豆av在线| av黄色大香蕉| 可以在线观看毛片的网站| 免费一级毛片在线播放高清视频| 日日夜夜操网爽| 91九色精品人成在线观看| 欧美激情久久久久久爽电影| 亚洲电影在线观看av| 两个人的视频大全免费| 国产精品三级大全| 美女 人体艺术 gogo| 精品国内亚洲2022精品成人| 91字幕亚洲| 少妇的逼好多水| 男人和女人高潮做爰伦理| 国产综合懂色| 成人特级黄色片久久久久久久| 丰满的人妻完整版| 欧美成狂野欧美在线观看| 精品久久久久久久久久久久久| 亚洲精品一卡2卡三卡4卡5卡| 少妇丰满av| 岛国在线免费视频观看| 在线播放国产精品三级| 999久久久精品免费观看国产| 日韩欧美三级三区| 精品熟女少妇八av免费久了| 小蜜桃在线观看免费完整版高清| 波多野结衣高清无吗| 国产一区二区亚洲精品在线观看| 免费在线观看成人毛片| 欧美日本视频| 一级a爱片免费观看的视频| 一个人免费在线观看电影| 成年免费大片在线观看| 成人国产综合亚洲| 亚洲片人在线观看| 禁无遮挡网站| 日韩欧美在线乱码| 免费看a级黄色片| 极品教师在线免费播放| 美女高潮的动态| 在线观看舔阴道视频| 亚洲精品在线观看二区| av视频在线观看入口| 国产精品久久久久久久久免 | 免费无遮挡裸体视频| 男人舔女人下体高潮全视频| 日韩高清综合在线| 99热精品在线国产| 国产爱豆传媒在线观看| 国产精品精品国产色婷婷| aaaaa片日本免费| 91九色精品人成在线观看| 日本与韩国留学比较| 在线观看美女被高潮喷水网站 | 日韩欧美国产在线观看| 免费在线观看影片大全网站| 国内揄拍国产精品人妻在线| 亚洲精品美女久久久久99蜜臀| 国产视频一区二区在线看| 欧美中文日本在线观看视频| 国产色婷婷99| 在线天堂最新版资源| 国产不卡一卡二| 舔av片在线| 可以在线观看的亚洲视频| 亚洲avbb在线观看| 国产激情偷乱视频一区二区| 神马国产精品三级电影在线观看| av在线天堂中文字幕| 欧美3d第一页| 免费无遮挡裸体视频| 欧美午夜高清在线| 国产成人aa在线观看| 人人妻人人看人人澡| 午夜福利18| av视频在线观看入口| 国产精品永久免费网站| 欧美三级亚洲精品| 有码 亚洲区| 中文字幕精品亚洲无线码一区| 91九色精品人成在线观看| 亚洲成人中文字幕在线播放| 免费看十八禁软件| 波多野结衣巨乳人妻| 村上凉子中文字幕在线| 欧美xxxx黑人xx丫x性爽| 观看免费一级毛片| av中文乱码字幕在线| 搡老妇女老女人老熟妇| 日韩欧美国产在线观看| av天堂在线播放| 天美传媒精品一区二区| 中文在线观看免费www的网站| 日本黄大片高清| 国产一区二区亚洲精品在线观看| 精品久久久久久成人av| 精品国产亚洲在线| 18禁在线播放成人免费| 法律面前人人平等表现在哪些方面| 国产老妇女一区| 99精品欧美一区二区三区四区| 可以在线观看的亚洲视频| 亚洲无线观看免费| 宅男免费午夜| 老司机午夜十八禁免费视频| 久久精品国产亚洲av涩爱 | 国产精品三级大全| 亚洲国产中文字幕在线视频| 老熟妇仑乱视频hdxx| 亚洲av电影在线进入| 免费看日本二区| 亚洲精品一卡2卡三卡4卡5卡| 五月玫瑰六月丁香| 久久精品国产99精品国产亚洲性色| 国产精品一区二区三区四区免费观看 | 狂野欧美白嫩少妇大欣赏| 国产精品99久久久久久久久| 久久久久久久久久黄片| 99热这里只有是精品50| 午夜福利在线观看免费完整高清在 | 国内毛片毛片毛片毛片毛片| 国产又黄又爽又无遮挡在线| 亚洲 国产 在线| 国产精品女同一区二区软件 | 国产成人av教育| 内射极品少妇av片p| 国产蜜桃级精品一区二区三区| 禁无遮挡网站| 亚洲欧美日韩东京热| 免费av毛片视频| 欧美日韩福利视频一区二区| 免费无遮挡裸体视频| 国产精品,欧美在线| 亚洲人与动物交配视频| av福利片在线观看| 极品教师在线免费播放| 最新美女视频免费是黄的| 伊人久久大香线蕉亚洲五| 亚洲av第一区精品v没综合| 午夜久久久久精精品| ponron亚洲| 日韩欧美免费精品| 欧美一级a爱片免费观看看| 国产三级中文精品| www.www免费av| a级一级毛片免费在线观看| 少妇人妻一区二区三区视频| 1024手机看黄色片| 少妇高潮的动态图| 日韩欧美三级三区| 成熟少妇高潮喷水视频| 国产三级中文精品| 久久性视频一级片| 老熟妇乱子伦视频在线观看| 午夜福利免费观看在线| 中文字幕人妻熟人妻熟丝袜美 | 成熟少妇高潮喷水视频| 伊人久久大香线蕉亚洲五| 欧美zozozo另类| 人妻丰满熟妇av一区二区三区| 男女午夜视频在线观看| 精品一区二区三区视频在线 | 午夜免费激情av| 午夜视频国产福利| 国产精品久久久人人做人人爽| 女警被强在线播放| 99久久九九国产精品国产免费| 免费高清视频大片| 免费看日本二区| 日本黄色视频三级网站网址| 最近最新中文字幕大全免费视频| a级一级毛片免费在线观看| 国产不卡一卡二| 最近在线观看免费完整版| 国产精品亚洲美女久久久| 色吧在线观看| 中出人妻视频一区二区| 夜夜看夜夜爽夜夜摸| 俄罗斯特黄特色一大片| 怎么达到女性高潮| 男女做爰动态图高潮gif福利片| 精品熟女少妇八av免费久了| 熟女电影av网| 欧美在线一区亚洲| 亚洲国产日韩欧美精品在线观看 | 日日摸夜夜添夜夜添小说| 国产一区在线观看成人免费| 好男人在线观看高清免费视频| 国产精品亚洲美女久久久| 在线免费观看的www视频| 两人在一起打扑克的视频| 99视频精品全部免费 在线| 听说在线观看完整版免费高清| 欧美中文综合在线视频| 日本与韩国留学比较| 久久性视频一级片| 亚洲精品一卡2卡三卡4卡5卡| 久久久国产精品麻豆| 欧美极品一区二区三区四区| 国产三级在线视频| 可以在线观看的亚洲视频| 黄色日韩在线| 一个人免费在线观看电影| 人妻丰满熟妇av一区二区三区| 成人三级黄色视频| 在线免费观看不下载黄p国产 | 日本熟妇午夜| 色吧在线观看| 免费看日本二区| 不卡一级毛片| 日本 欧美在线| 在线播放无遮挡| 精品国产美女av久久久久小说| 午夜激情福利司机影院| 中文亚洲av片在线观看爽| 国产精品精品国产色婷婷| 黑人欧美特级aaaaaa片| 国产伦精品一区二区三区视频9 | 成人av一区二区三区在线看| a在线观看视频网站| 亚洲无线观看免费| 丰满乱子伦码专区| 天堂网av新在线| 午夜福利欧美成人| 热99re8久久精品国产| 熟女电影av网| 久久亚洲真实| 欧美精品啪啪一区二区三区| 欧美一区二区亚洲| 小蜜桃在线观看免费完整版高清| 天堂√8在线中文| 亚洲avbb在线观看| 色在线成人网| 午夜激情欧美在线| 99久久久亚洲精品蜜臀av| 久久亚洲真实| 久久精品国产亚洲av涩爱 | 18禁黄网站禁片午夜丰满| 三级男女做爰猛烈吃奶摸视频| 亚洲性夜色夜夜综合| 国产又黄又爽又无遮挡在线| 美女大奶头视频| 亚洲国产色片| 国产精品亚洲一级av第二区| 日韩av在线大香蕉| 成人高潮视频无遮挡免费网站| 国产三级黄色录像| 国产高清三级在线| 久久这里只有精品中国| 亚洲av电影不卡..在线观看| 亚洲美女黄片视频| 在线看三级毛片| 免费在线观看影片大全网站| 国产成人影院久久av| 搞女人的毛片| 欧美性猛交╳xxx乱大交人| 亚洲在线自拍视频| 高清日韩中文字幕在线| 国产精品久久电影中文字幕| 搡老岳熟女国产| 午夜激情欧美在线| 伊人久久大香线蕉亚洲五| 久久九九热精品免费| 亚洲av二区三区四区| 叶爱在线成人免费视频播放| 国产亚洲精品av在线| 九色成人免费人妻av| 黄色丝袜av网址大全| 在线视频色国产色| 最新在线观看一区二区三区| 波多野结衣高清无吗| 精品欧美国产一区二区三| 波野结衣二区三区在线 | 中文亚洲av片在线观看爽| 久久6这里有精品| 久久精品国产综合久久久| АⅤ资源中文在线天堂| 久久久久久久亚洲中文字幕 | 久久天躁狠狠躁夜夜2o2o| 又黄又粗又硬又大视频| 欧美一区二区亚洲| 国产伦一二天堂av在线观看| 一个人免费在线观看的高清视频| 一级毛片高清免费大全| 长腿黑丝高跟| 啦啦啦韩国在线观看视频| 国产精品久久久久久精品电影| 蜜桃亚洲精品一区二区三区| 色在线成人网| 久久精品国产99精品国产亚洲性色| 亚洲精品亚洲一区二区| 国产美女午夜福利| 成人国产一区最新在线观看| 亚洲人与动物交配视频| 又粗又爽又猛毛片免费看| 真人一进一出gif抽搐免费| 欧美区成人在线视频| 日韩av在线大香蕉| 岛国在线观看网站| 岛国在线免费视频观看| 激情在线观看视频在线高清| 欧美成人性av电影在线观看| 国产午夜精品论理片| 一个人免费在线观看的高清视频| 99久久99久久久精品蜜桃| 久久香蕉国产精品| 亚洲av中文字字幕乱码综合| 99精品欧美一区二区三区四区| 中文字幕人妻熟人妻熟丝袜美 | 成人欧美大片| 国产精品一区二区三区四区久久| 人妻丰满熟妇av一区二区三区| 丰满人妻一区二区三区视频av | www日本黄色视频网| 亚洲欧美激情综合另类| av中文乱码字幕在线| 午夜激情福利司机影院| 亚洲真实伦在线观看| 在线观看免费午夜福利视频| 日韩免费av在线播放| 久久九九热精品免费| 亚洲中文字幕日韩| 男插女下体视频免费在线播放| 婷婷精品国产亚洲av| 免费搜索国产男女视频| 老司机在亚洲福利影院| 亚洲五月天丁香| 日韩精品中文字幕看吧| 免费搜索国产男女视频| 一级黄色大片毛片| 一本久久中文字幕| 精品一区二区三区人妻视频| 精品一区二区三区视频在线 | 免费看日本二区| 色在线成人网| 国产单亲对白刺激| 男女下面进入的视频免费午夜| 色av中文字幕| 搡老岳熟女国产| 中出人妻视频一区二区| 午夜福利欧美成人| 国内久久婷婷六月综合欲色啪| 国产主播在线观看一区二区| www.熟女人妻精品国产| 国产精品,欧美在线| 最近最新中文字幕大全电影3| 免费电影在线观看免费观看| 亚洲人成网站高清观看| 老汉色av国产亚洲站长工具| 美女被艹到高潮喷水动态| 女生性感内裤真人,穿戴方法视频| 窝窝影院91人妻| 亚洲熟妇熟女久久| 波多野结衣巨乳人妻| 九九热线精品视视频播放| 18+在线观看网站| 黄色视频,在线免费观看| 国产熟女xx| av在线天堂中文字幕| 国产伦在线观看视频一区| 欧美日韩乱码在线| 免费无遮挡裸体视频| 亚洲精华国产精华精| 一个人看的www免费观看视频| 一个人观看的视频www高清免费观看| 国产乱人伦免费视频| 日本 欧美在线| 国产精品亚洲一级av第二区| 麻豆国产av国片精品| 1000部很黄的大片| 非洲黑人性xxxx精品又粗又长| 婷婷精品国产亚洲av在线| 一进一出抽搐动态| 精品人妻1区二区| 欧美色欧美亚洲另类二区| 最好的美女福利视频网| 99久久精品国产亚洲精品| 亚洲av成人不卡在线观看播放网| 国产亚洲欧美98| 97人妻精品一区二区三区麻豆| 午夜福利成人在线免费观看| 高清日韩中文字幕在线| 日日夜夜操网爽| 九九热线精品视视频播放| 人人妻人人看人人澡| 偷拍熟女少妇极品色| 一个人看视频在线观看www免费 | 日韩人妻高清精品专区| 最新在线观看一区二区三区| 一区福利在线观看| 最近最新中文字幕大全电影3| 国产高清视频在线观看网站| 小蜜桃在线观看免费完整版高清| 午夜亚洲福利在线播放| 白带黄色成豆腐渣| 久久久久九九精品影院| ponron亚洲| 亚洲欧美激情综合另类| 日韩 欧美 亚洲 中文字幕| 色尼玛亚洲综合影院| 99热只有精品国产| 看片在线看免费视频| 乱人视频在线观看| 在线十欧美十亚洲十日本专区| 女人十人毛片免费观看3o分钟| 手机成人av网站| 精品久久久久久久末码| 身体一侧抽搐| 99热6这里只有精品| 国产午夜精品久久久久久一区二区三区 | 99久久99久久久精品蜜桃| 制服丝袜大香蕉在线| 欧美日韩瑟瑟在线播放| 中亚洲国语对白在线视频| 精品一区二区三区视频在线观看免费| 少妇人妻精品综合一区二区 | 精品国产三级普通话版| 99热这里只有是精品50| 噜噜噜噜噜久久久久久91| 99国产精品一区二区三区| 制服丝袜大香蕉在线| 国产精品99久久99久久久不卡| 免费观看的影片在线观看| 日本黄大片高清| 久久久国产成人免费| 亚洲av成人不卡在线观看播放网| 亚洲欧美精品综合久久99| 欧美午夜高清在线| a级一级毛片免费在线观看| 国内毛片毛片毛片毛片毛片| 欧美最新免费一区二区三区 | 夜夜夜夜夜久久久久| 国产不卡一卡二| 久久人妻av系列| 国产成人福利小说| 国产探花极品一区二区| 性色avwww在线观看| 老熟妇仑乱视频hdxx| 欧美丝袜亚洲另类 | 精品人妻1区二区| 色av中文字幕| 国产精品一区二区三区四区久久| 久久精品国产综合久久久| 亚洲欧美日韩卡通动漫| 亚洲中文字幕一区二区三区有码在线看| 18禁黄网站禁片午夜丰满| 美女大奶头视频| 国产在视频线在精品| 女生性感内裤真人,穿戴方法视频| 成人永久免费在线观看视频| 午夜福利在线观看吧| 91久久精品电影网| 老司机午夜福利在线观看视频| 香蕉av资源在线| 国产精品野战在线观看| 成人午夜高清在线视频| 国产99白浆流出| 国产中年淑女户外野战色| 午夜免费观看网址| 可以在线观看毛片的网站| 天美传媒精品一区二区| 亚洲国产高清在线一区二区三| 午夜激情福利司机影院| 国产精品av视频在线免费观看| 免费观看精品视频网站| 精品免费久久久久久久清纯| 成年女人看的毛片在线观看| 亚洲欧美激情综合另类| 丰满的人妻完整版| 色综合婷婷激情| 亚洲黑人精品在线| 欧美日韩黄片免| 非洲黑人性xxxx精品又粗又长| 国产精品香港三级国产av潘金莲| 最新美女视频免费是黄的| 国产精品爽爽va在线观看网站| 国产免费男女视频| 免费看十八禁软件| 午夜福利在线在线| 成人亚洲精品av一区二区| 99热只有精品国产| 国产伦在线观看视频一区| 最后的刺客免费高清国语| 日韩欧美国产一区二区入口| 国产久久久一区二区三区| 麻豆国产97在线/欧美| www日本在线高清视频| 99riav亚洲国产免费| 又粗又爽又猛毛片免费看| 婷婷丁香在线五月| 五月玫瑰六月丁香| 天天一区二区日本电影三级| 真人一进一出gif抽搐免费| 在线视频色国产色| 最近最新中文字幕大全电影3| 天天添夜夜摸| 亚洲成人免费电影在线观看| 日本黄色片子视频| 88av欧美| 18+在线观看网站| 午夜福利在线观看吧| 亚洲精品亚洲一区二区| 亚洲第一电影网av| 综合色av麻豆| 精品不卡国产一区二区三区| 国产视频内射| 男女做爰动态图高潮gif福利片| 看片在线看免费视频| 久久亚洲真实| 国内少妇人妻偷人精品xxx网站| 亚洲av不卡在线观看| 久久精品影院6| 亚洲国产精品合色在线| 精品熟女少妇八av免费久了| 国产高清激情床上av| 小蜜桃在线观看免费完整版高清| 午夜福利在线观看吧| 婷婷精品国产亚洲av在线| 欧美国产日韩亚洲一区| 露出奶头的视频| 小说图片视频综合网站| 国产97色在线日韩免费| 丰满人妻一区二区三区视频av | 亚洲内射少妇av| 婷婷亚洲欧美| 热99re8久久精品国产| 国产精品久久久久久精品电影| 久久精品国产综合久久久| 久久久久九九精品影院| 日韩成人在线观看一区二区三区| 国产色婷婷99| 一个人观看的视频www高清免费观看| 国产乱人视频| 国产精品 欧美亚洲| 久久久精品欧美日韩精品| 亚洲成人免费电影在线观看| 又爽又黄无遮挡网站| 长腿黑丝高跟| 网址你懂的国产日韩在线| 少妇人妻精品综合一区二区 | 淫秽高清视频在线观看| 亚洲人成网站在线播放欧美日韩| 成年免费大片在线观看| www.999成人在线观看| 亚洲国产精品合色在线| 黄色片一级片一级黄色片| 久久久成人免费电影| 久久久久免费精品人妻一区二区| 亚洲av免费高清在线观看| 国产一区在线观看成人免费| 午夜视频国产福利| 俺也久久电影网| 91av网一区二区| 观看免费一级毛片| 狠狠狠狠99中文字幕| 国产高潮美女av| 国内久久婷婷六月综合欲色啪| 俄罗斯特黄特色一大片| 人妻夜夜爽99麻豆av| 亚洲不卡免费看| or卡值多少钱| 精品国产亚洲在线| 国产v大片淫在线免费观看| 国产三级黄色录像| 午夜两性在线视频| 亚洲欧美精品综合久久99| 国产成人福利小说| 欧美日韩综合久久久久久 | 亚洲av一区综合| 精品国产亚洲在线| 国产成人欧美在线观看| 国产黄a三级三级三级人| 免费看光身美女| 51国产日韩欧美| 中文字幕人成人乱码亚洲影| 一级毛片高清免费大全| 桃红色精品国产亚洲av| 亚洲精品一区av在线观看| 亚洲第一电影网av| 午夜亚洲福利在线播放| 91久久精品电影网| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 香蕉丝袜av| 国内少妇人妻偷人精品xxx网站| 国产在视频线在精品| 日日干狠狠操夜夜爽| 欧美又色又爽又黄视频| 精品一区二区三区av网在线观看| 男女视频在线观看网站免费|