• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network

    2021-12-16 06:40:30MajdiQabalinZaidAridaOmarSaraerehFalinWuImranKhanPeerapongUthansakulandMoathAlsafasfeh
    Computers Materials&Continua 2021年3期

    Majdi K.Qabalin,Zaid A.Arida,Omar A.Saraereh,Falin Wu,Imran Khan,Peerapong Uthansakul and Moath Alsafasfeh

    1Department of Computer Science,Princess Sumaya University for Technology,Amman,13133,Jordan

    2School of Computing and Informatics,Al Hussein Technical University,Amman,11831,Jordan

    3Department of Electrical Engineering,Hashemite University,Zarqa,13133,Jordan

    4School of Instrumentation and Optoelectronic Engineering,Beihang University,Beijing,100191,China

    5Department of Electrical Engineering,University of Engineering and Technology,Peshawar,Pakistan

    6School of Telecommunication Engineering,Suranaree University of Technology,Nakhon Ratchasima,30000,Thailand

    7Department of Computer Engineering,Al-Hussein Bin Talal University,Ma’an,Jordan

    Abstract: The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major concern for citizens and governments.The Internet functions and software applications play a vital role in cybersecurity research and practice.Most of the cyber-attacks are based on exploits in system or application software.It is of utmost urgency to investigate software security problems.The demand for Wi-Fi applications is proliferating but the security problem is growing,requiring an optimal solution from researchers.To overcome the shortcomings of the wired equivalent privacy (WEP) algorithm,the existing literature proposed security schemes for Wi-Fi protected access(WPA)/WPA2.However, in practical applications, the WPA/WPA2 scheme still has some weaknesses that attackers exploit.To destroy a WPA/WPA2 security, it is necessary to get a PSK pre-shared key in pre-shared key mode, or an MSK master session key in the authentication mode.Brute-force cracking attacks can get a phase-shift keying (PSK) or a minimum shift keying (MSK).In real-world applications, many wireless local area networks (LANs) use the pre-shared key mode.Therefore,brute-force cracking of WPA/WPA2-PSK is important in that context.This article proposes a new mechanism to crack the Wi-Fi password using a graphical processing unit(GPU)and enhances the efficiency through parallel computing of multiple GPU chips.Experimental results show that the proposed algorithm is effective and provides a procedure to enhance the security of Wi-Fi networks.

    Keywords: Networks; password; cybersecurity; password cracking mechanism

    1 Introduction

    Wireless Fidelity (Wi-Fi) is a technology that connects electronic devices to a Wireless Local Area Network (WLAN), usually using 2.4 GHz or 5 GHz radio frequency bands [1,2].Wi-Fi signals are typically password-protected, but it can also be turned on so that all devices in the range are connected.This technology improves the interoperability of wireless network devices based on the IEEE 802.11 standard [3-6].In 2014, the number of public Wi-Fi hotspots exceeded 50 million which is an 80% increase over 2013 [7-10].Among them, China ranks fourth with more than 4.91 million public hotspots [11-13].With numerous wireless hotspots applications, it’s inevitable to study the dangers of security to ensure the safety of the subscriber.

    Some of the hidden threats for Wi-Fi are as follows.Service Set Identifier (SSID) broadcasts,which are very easy to discover.Wireless routers have a simple WPS link function in addition to the account login password which can be easily changed by wireless router administrators and regular users.For more intuitive Wi-Fi password security issues, there are also many corresponding tools.One is software and hardware cracking under windows or Linux environments.These are not only deployed for WEP cracking, but also for routing PIN code-cracking [14].At present,the principle of using multiple terminal applications such as the master key is to share the Wi-Fi account password that the user has in the background to the server and then retrieve the corresponding entry from the server database.In addition, there are different types of the terminal for cracking and the effect is very limited.

    This article proposed a new method that uses the efficient parallel computing power of GPU and the common user characteristics to produce a various combination of dictionaries to crack the passwords under the existing security mechanisms in Wi-Fi networks.The experimental analysis is performed for different important network parameters.

    The rest of the article is organized as follows.In Section 2, the principles of a security protocol are described.In Section 3, the difficulties faced by the current cracking method is discussed.In Section 4, the dictionary-based cracking model is described.Section 5 provides the analysis of the proposed scheme while Section 6 gives the conclusion.

    2 Principles of WEP/WPA/WPA2 Security Protocol

    The Wi-Fi password security mechanism consists of three categories which are WEP, WPA,and WPA2 [15].Among them, the WEP security has proven to be unreliable and the major flaw lies in the insecure initialization of vector and the CRC algorithm [16].Therefore, the Wi-Fi came in.WPA/WPA2 standards and protocols protect the security of wireless networks.They are divided into enterprise-level, WAP-enterprise and personal-level WPA-PSK.The enterpriselevel uses RADIUS authentication which is a network protocol for remote user authentication,authorization and accounting [17].It is safe and will not be mentioned in this article.Personallevel WPA-PSK using Pre-Shared Key technology and does not require a dedicated authentication server.This technology only requires each WLAN node to enter a key in advance.The WPA/WPA2 is composed of three parts which are encryption, authentication and message integrity verification to form a complete security solution.The WPA protocol uses the Temporary Key Integration Protocol (TKIP) algorithm, Message Integrity Coding (MIC) and Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP).The working principle of the WPA/WPA2-PSK mode-based handshake mechanism is a verification and authentication process for MIC [18].The process includes the following parts which are Master Session Key(MSK), Pairwise Master Key (PMK), Pairwise Transient Key (PTK), Group Master Key (GMK)and Group Transient Key (GTK).Among them, the PTK protocol contains the following three parts which are Key Confirmation Key (KCK), Key Encryption Key (KEK) and Temporal Key(TK).The KCK calculates the integrity of the key generation message, KEK encrypts the key generation message and TK which encrypts the data.The PMK comes from MSK.The five necessary elements for MSK to generate PTK are PMK, ANonce (AN), SNonce (SN), Authenticate MAC (AA) and Supplicant MAC (SA).The two send random numbers for the wireless access point (AP) and the client STA.The process is shown in Fig.1.

    Figure 1: Generation of PTK from PMK

    The output of Fig.1 consists of four parts, where Data Encr, Data MIC combine, TK,EAPOL Encr/MIC, KEK, and KCK, respectively.The process is as follows.It uses the AP’s SSID and passphrases, adopts the Pdkdf2 algorithm to generate PMK where passphrase and SSID are deployed.A prioricondition of authenticator and supplicant before authentication in WPA-PSK is PSK=PMK=pdkdf2_SHA1 (passphrase, SSID, SSID length, 4096).Then the SHA1_PRF algorithm is used to generate PTK from PMK, SA, AA, SN and AN.That is, PTK=SHA1_PRF(PMK, Len (PMK), “Pairwise key expansion,”MIN (AA, SA) ‖MAX (AA, SA) ‖MIN (AN, SN)‖MAX (AN, SN)).Then, GMK gets GTK=PRF-X (GMK, AA‖GN) through expansion, where GN is the nonce generated by the authenticator and AA is the MAC address of the authenticator.

    In the entire process, a 4-way handshake is required before updating the paired key.The paired key is used to encrypt the unicast frames, the communication frame between the AP and the workstation.The 4-way handshake is to complete the exchange of only one paired key so that both parties can learn about it.

    The 4-way handshake messages are all based on EAPOL-Key and its structure is shown in Tab.1.

    The focus of this article is to initially compute the PMK with a password.Therefore, we can know whether the password is correct by the second handshake.The specific process is shown in Fig.2.

    Figure 2: Flowchart of the cracking process

    The cracking process is summarized in the following steps:

    a) Passively check the communication between AP and STA to receive 4 packets, handshake and AP SSID.

    b) Perform exhaustive keying offline and use SSID to calculate PMK.

    c) Analyze handshake packets 1 and 2 to get AN, SN, AA, SA, and use the obtained PMK to calculate the PTK.

    d) Use the obtained KCK of the first 128 bits of PTK to calculate the MIC value of handshake packet 2 and compare it with the MIC value of the captured handshake packet 2.If they are the same, the key is correct; otherwise, try the next key.

    Table 1: EAPOL-Key descriptor structure

    3 Current Cracking Difficulties and Cracking Method Design

    Compared to the WEP protocol, the WPA/WPA2 protocol improves security from encryption algorithms to data integrity verification algorithms.To decipher a Wi-Fi password from a protocol point of view, no serious flaws can be exploited but we can still decrypt it from the perspective of guessing the user’s password.One way to decipher a guessed password is to first use a packet capture tool to capture a handshake data packet in the above WPA/WPA2 handshake process.In these handshake steps, a mathematical operation is included, namely the Hash algorithm.It is an irreversible operation and the result cannot infer the original number.The results obtained by the Hash algorithm for two different values are usually different.In the Wi-Fi handshake process, the existing PSK dictionary library plus SSID are used to get 64 bytes of PMK through calculations and compare it with the MIC value obtained by capturing the packet to know the Wi-Fi password, which is commonly known as dictionary cracking.

    However, the disadvantage of this method is that the PMK has a relatively large computational overhead, which usually takes a long time to crack using the CPU [19].With the continuous development of computer hardware and the improvement of the single computing power of GPU,we consider the combination of CPU and GPU parallel display chip to improve the efficiency of PMK Wi-Fi dictionary computation and perform comparison [20].

    The GPUs have advantages over CPUs in processing power and memory capacity.Because of the high parallelism of graphics, the GPU can increase processing power and memory capacity by increasing the was the effect, memory control unit integer calculations, fragmented logic judgments, and CPU decimal operations are performed by different arithmetic units with floating-point accelerators.Therefore, the CPU will have different performance when faced with different computing tasks.In contrast, the GPU performs integer and floating-point calculations using the same arithmetic unit, so the GPU’s integer computing capability is the same as the floating-point capability.

    At present, mainstream GPUs have adopted unified architecture units.With a powerful lineup of programmable stream processors, GPUs surpass the capability of CPUs in single-precision floating-point operations.For example, the Intel Core i7 965 processor has only one-tenth of the floating-point computing power in the default configuration of the NVIDIA GeForce GTX 280.In addition, the advantage of GPU computing over CPU lies in video memory.The measured capacity of the desktop product DDR3-1333 is mostly around 20 GB/s, while the GTX280 using high-frequency GDDR3 memory has a memory controller that can support 512 bits wide and the memory capacity can reach about 140 GB/s.Such ultra-high capacity ensures stable operation of huge floating-point computing capabilities and enables efficient computation of intensive data.

    A related architecture platform that can call GPU resources is Compute Unified Devices Architecture (CUDA).The CUDA architecture was launched by NVIDIA in 2006 [21].As the current display chip has high programmability, so the memory capacity and the number of execution units of the display chip have also been greatly increased.To enable the display chip to compute data, the General Purpose GPU (GPGPU) was developed and CUDA is the model of NVIDIA’s GPGPU.As far as GPU products are concerned, the products from ATI and NVIDIA are mainly popular on the market.In view of the deployment characteristics and the existing hardware resources, this article uses NVIDIA’s display chip products and the corresponding CUDA architecture.The ATI display chip was developed by OpenCL technology as its product stream architecture.The company’s GPUs can be used for general-purpose computing.The previously parallel processing used only CPUs which can be effectively expanded from large clusters to the graphics card, reducing the cost of computing applications and offering outstanding performance.

    Therefore, this article proposes an improved dictionary cracking scheme that uses multiple CPUs and GPUs to combine parallel operations and improve the efficiency of dictionary comparison cracking [22].In the specific calculation process, this article uses the Pyrit tool for calculation [23] which allows creating massive databases to pre-calculate the realization of WPA/WPA2-PSK in the authentication phase of space exchange time, which can utilize the computing power of multi-core CPUs and other platforms such as NVIDIA’s CUDA.It provides multiple functions such as analysis, attack batch, attack cow patty, attack db, attack pass through,benchmark, and import password.

    If we only rely on CPUGPU hybrid parallel computing capability to speed up computing efficiency, the running efficiency of a random dictionary remains astronomical numbers,which are practically insignificant.Therefore, while using hardware acceleration, this article also imposes certain prior conditions on the combination of dictionary packages.Researchers commonly used dictionary combinations and generate the corresponding dictionary package files to reduce the amount of hardware traversal, comparison operations, and improve the efficiency of guess passwords.

    4 Dictionary Combination in Cracking Model

    According to calculations, the number of records in the dictionary package file with 1 to 6 digits plus uppercase and lowercase English letters is about 57 billion, which occupies about 430 GB of hard disk memory.The number of random combination dictionary packets of 1 to 6 pure numbers is about 1.1 million, which occupies about 8.4 MB of memory.The number of rows in the dictionary with a random combination of 1 to 6 uppercase and lowercase English letters is about 20 billion, accounting for about 149 GB of memory.If we add a special symbol that is commonly used for random sorting, there will be more than 500 billion combinations,which is about 4 TB memory.We can see that one more optional combination for each digit of the password will produce much more output results.The results are shown in Figs.3 and 4.

    Figure 3: Variation of the number of combined rows with a combination

    Figure 4: Variation in file size changes with a combination

    Similarly, with the same choice for each digit, one more digit in the password will increase the number of dictionary combinations by at least an order of magnitude.For example, there are 1 to 6 digits of a) pure numbers; b) uppercase and lowercase letters; c) numbers plus uppercase and lowercase letters; d) numbers plus uppercase and lowercase letters plus common special symbols.When the number of password digits increases from 1 to 7 digits, the number of lines in the dictionary combination is 1-100, over 10,000 items, over 1 trillion items, over 35,000 billion items,and over 48 trillion items, respectively.When the number of password digits increases from 1 to 8 digits, the number of dictionary combinations is over 100 million, 54 trillion, 220 trillion and 4,350 trillion, respectively.We can see that when the password combination contains alphanumeric characters and commonly used special symbols, it will consume an enormous amount of time and resources to traverse only a random password combination of 1 to 8 digits.

    This article believes that in practical use, the vast majority of users share a meaningful password.Therefore, to reduce the working volume of dictionary files, some common dictionary sets are offered to reduce the low hit rate dictionary comparison list.

    The generated dictionary combination files with certain rules are: 1 to 6 digits can be repeated in a random combination of uppercase letters, a random combination of multiple lowercase letters, and 1 to 8 repeatable numbers.Also, there are common 3000 English words, 1111 English names, 2371 English place names and 1,808 weak passwords that are commonly used.

    Also, there is multi-format dates such as 19000101-20200101.Taking June 1, 1994, as an example, the formats include: a) the year, month, day (19940601); b) Year, month, day (940601);c) Year, month, day (9461); d) Year, month, day (1994.06.01); e) Year Month Day (1994-06-01);f) Year Month Day (1994/06/01); g) Year Month (199406), h) Year Day (199401), i) Month Day(0601); j) Month Day Year (06011994); k) Month Day Year (060194); l) month day year (06-01-1994); m) month day year (06/01/1994); n) day month year (01061994); o) Sun Moon Year(010694), etc.There are also several combinations not listed here due to limited space.

    The pinyin of Chinese name is mainly based on the hundred family surnames, commonly known as Bai Jia Xing (including 472 characters with 3000+common Chinese characters), the list of Bai Jia Xing is Zhao Qian Sun Li, Zhou Wu Zheng Wang, Feng Chen Chu Wei, Jiang Shen Han Yang, Zhu Qin You Xu, He Lu Shi Zhang, Kong Cao Yan Hua, Jin Wei Tao Jiang,etc.In addition, some combinations of Chinese names are given by Chinese single-character surname (lowercase and uppercase), Chinese three-character name (initial uppercase), Chinese double-character name (initial uppercase), and Chinese 1-3-character name (all lowercase, all uppercase and initial uppercase).

    Regarding phone number, the example of the Shanghai area code is 021+8 random fixedline number.In addition, according to the existing mobile number range, a mobile number dictionary library for all parts of the mainland includes China Mobile, China Unicom, Telecom and virtual operator numbers is generated which covers Shanghai, Beijing, Guangdong, Yunnan,Inner Mongolia, Sichuan, Tianjin, Ningxia, Shandong, Shanxi, Guangxi, Xinjiang, Jiangxi, Hebei,Henan, Zhejiang, Hainan and other parts of the country.

    It also includes matching Chinese names and dates, common English words and dates, common mailbox suffixes and Chinese names, common English words and common dates combined,and about 160 GB of dictionary files.But these combinations are not enough to represent all the commonly used password combinations and it is necessary to constantly add common combinations.For example, the Chinese name and the date are combined with the mailbox suffix, Chinese name and English word combination.It also contains more than 600 MB of known aggregation files obtained from the Internet, with more than 670,000 combinations.We can summarize more common combination methods from this entry and generate the corresponding dictionary combination file, which improves the efficiency of comparing dictionary files with multiple parallel CPUGPUs.

    With previous knowledge, the dictionary comparison range should be minimized as much as possible to improve the performance of dictionary packages in password cracking.The performance comparison of several groups of constrained dictionary running and complete exhaustion running is shown in Figs.5-9.As shown in Fig.5, the 8-digit date combinations from 1970 to 1990 is compared with the number of 8-digit random number combinations.Fig.6 shows the comparison of shanghai fixed-line+Chinese first letter combination and 9-11 random number combination (lowercase only).Fig.7 shows the comparison of Chinese name pinyin combinations and 6-12 random letter combinations (lowercase only).Fig.8 shows the comparison of Chinese initials+Shanghai mobile number combination and 12 to 14 digits random number and letter combination (only lower case).Fig.9 shows the combination of English name+date combinations and 10-17 random numbers and letters combinations (lower case only).

    Figure 5: Comparison of 8-digit dates and 8-digit random numbers from 1970 to 1990

    Figure 6: Comparison of shanghai fixed-line+Chinese first letter combinations and 9-11 random number combinations

    Figure 7: Comparison of Chinese name pinyin combinations and 6-12 random letter combinations

    Figure 8: Comparison of Chinese initials+Shanghai mobile number combinations and 12 to 14 digits random number and letter combinations

    Figure 9: Comparison of English name + date combinations and 10-17 random numbers and letters combinations

    We can see from the sample data that the number of dictionary entries under the constraint is much less than the number of random numbers and letters, usually several orders of magnitude.Every time the password length increases by one digit, there is one more choice for the optional combination of each digit in the password which will further expand the number of constrained dictionary combination entries and the number of random combination dictionary entries.There is an enormous difference in the amount of computational time between the constrained dictionary and the random combination dictionary.In the actual operation process,avoiding meaningless or low hit probability calculations is an important way to improve efficiency.

    5 Analysis of Hardware Acceleration Performance in the Crack Model

    Based on the above analysis, characteristics of the algorithm, architecture, and related tools,the experimental process and the steps involved in this article are packet capture, handshake via wireless network card and then run web service to send handshake packets to Servers using hybrid parallel processing capability of Multi-CPU-GPU for calculations and returns results.

    The server hardware configuration is installed with two 16-core Intel Xeon E5-2630 v3@2.40 GHz CPU chips, 16 GB×12 memory, 192 GB, and four GeForce GTX 1080 graphics chips, each with 8G GDDR5X video memory.We use the CentOS system.

    After configuring the base server environment, we can set the specific CPU and GPU resources triggered by Pyrit.The settings interface is shown in Fig.10.The limit_ncpus is the number of CPU cores to call and use_CUDA is the setting whether to call GPU resources or not.

    Figure 10: The Pyrit parameter settings

    After setup, the first experiment is to use single-core CPU processing power.The running dictionary packet rate of a single-core pure CPU is about 400+PMKs/s.After the long run of the package gets stable, the speed increases approximately 20% to 500+PMKs/s.The results are shown in Figs.11 and 12 where the abscissa is the serial number of each CPU core and the ordinate is the packet running rate of each CPU core in PMKs/s.

    Figure 11: Single-core CPU packet rate

    Figure 12: Long-term running single-core CPU package rate

    If cow patty is used for computation (only computational methods that run the CPU), the speed will not differ much from Pyrit’s single-core CPU.If we set it to a pure GPU for running,the CPU packet computation will be disabled and the GPU rate is generally maintained at around 80000 PMKs/s by typing the command pyrite-r test.pcap-i dics.txt attack_passthrough.The performance comparison is shown in Fig.13 where the abscissa is the single-core CPU and the serial number of each GPU core, and the ordinate is the running speed of each core in PMKs/s.

    Figure 13: Single-core performance comparison

    Fig.14 shows the variation of calculation speed over time.The experimental results showed that the dual-core CPU combined with the 4-core GPU gradually accelerated to compute larger dictionary packages and eventually remained stable at very high values after a long time (usually after 1 to 2 min).The abscissa is the cumulative time of the model running in seconds and the ordinate is the running speed of the model in PMKs/s.

    Figure 14: Variation of calculation speed over time

    After generating many common dictionary files, the combination of CUDA+Pyrit is used to test various dictionary packages of different sizes.The results are shown in Fig.15.The abscissa is the dictionary package of files of different sizes and the ordinate is the package running rate of each mode in PMKs/s.

    Figure 15: Variation of calculation speed with a file size

    It can be seen from the experimental results that it is too late to call the GPU resources when the dictionary package is small due to the powerful computer hardware nowadays.The limited dictionary package data has been digested by powerful CPU computing performance.Therefore,the CPU responds to small data packages and the speed is better than GPU resource usage.When the amount of data exceeds approximately 2 MB, the CPU speed increases as processing time expands but it eventually stabilizes at 14,000+PMKs/s.On the other hand, the overall performance of hybrid GPU and CPU-GPU computation is basically the same except for small data packets.The pure GPU performance is slightly higher than that of hybrid models, which is probably because of response time which is time the CPU-GPU coordination is eliminated in pure GPU mode.However, as the retrieval time of large dictionary data packets increases,the computation performance of GPU resource calls is greatly improved, and eventually stabilize around 120000+PMKs/s which is about 10 times of pure CPU mode.The rates fluctuate slightly because of environmental influences.

    The number of PSK entries corresponding to the several dictionary packages used in the experiment are 15 kB (1808 entries), 310 kB (36984 entries), 1.29 MB (163199 entries), 2.49 MB(271684 entries), 5.76 MB (569790 entries), 167 MB (14867568 entries), 270 MB (21780000 entries)and 1.2 GB (100000 entries).

    It can be seen that the dictionary running package that calls GPU resources has a considerable degree of practical significance.Under the same circumstances, performance of a single-core GPU to a single-core CPU can be increased by about 80 times.However, under the hardware conditions of a server with a single dual CPU and four GPUs configuration, it will take about 200 years to achieve an exhaustive combination of 8-digit numbers with uppercase and lowercase letters, which is not time-sensitive and impractical.To achieve minute-level exhaustion, tens of thousands of servers with the same configuration are required, which are expensive and undesired.

    It was found that the core occupancy rate of four GPUs is always between 40% and 42%,which is effectively less than 100%.The reason for this may be that Pyrit only implements the use of GPU resources for the parallel part of the Hash algorithm in the handshake packet calculation process.In addition, the calculation method has not allocated the resources of the GPU based on the CUDA architecture to the extent of the best use, which may also be one reason for the low GPU occupancy rate.

    6 Conclusions

    This article proposed an improved scheme for cracking password in Wi-Fi networks.There are two ways to improve the operating efficiency.One is to use prior knowledge to restrict the combination range of dictionary files.We have verified that it reduces the number of dictionaries set after constraints compared to before constraints.Although it may reduce the hit rate, it can improve the efficiency of cracking within an acceptable range.The other is to use GPU and CPU to perform simultaneous parallel division of task to run dictionary package calculation comparisons to decrypt Wi-Fi’s WPA/WPA2 protocol passwords.The speed of dictionary cracking is much faster than the traditional method of relying on CPU computing power.For commonly used weak and short passwords, Wi-Fi passwords can be cracked much faster than a pure CPU.However, this method is obviously helpless for long passwords.Therefore, although the current WPA/WPA2 protocol is more secure, we do not recommend it for users to use short and weak passwords.This article still recommends that users set the password to a high-strength with a long number of digits.In addition, the next work will study the parallel computing resource allocation of multiple servers and discuss the implementation of the PMK computation method for known SSIDs, and then run the dictionary package.Performance improvements and appropriate dictionary combinations will give ideas for how to improve the dictionary, hit rate, etc.

    Acknowledgement:The authors would like to thank the editors and reviewers for their valuable suggestions and recommendations.

    Funding Statement:This work is supported by SUT research and development fund.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    黑人巨大精品欧美一区二区mp4| 日本欧美视频一区| 国产精品久久久久久人妻精品电影| 在线观看一区二区三区激情| 精品国产超薄肉色丝袜足j| 女性被躁到高潮视频| 精品少妇一区二区三区视频日本电影| 亚洲精品一卡2卡三卡4卡5卡| 看片在线看免费视频| xxx96com| 色尼玛亚洲综合影院| 老司机福利观看| 精品久久久久久成人av| 色尼玛亚洲综合影院| 制服人妻中文乱码| 久久青草综合色| 午夜免费鲁丝| 久久伊人香网站| 亚洲情色 制服丝袜| xxxhd国产人妻xxx| 女人爽到高潮嗷嗷叫在线视频| 人人妻人人添人人爽欧美一区卜| 久久久久久久久免费视频了| 麻豆av在线久日| 亚洲第一av免费看| 国产欧美日韩一区二区三区在线| 乱人伦中国视频| 亚洲成人精品中文字幕电影 | 日本免费一区二区三区高清不卡 | 亚洲第一av免费看| 天堂动漫精品| 免费少妇av软件| 在线永久观看黄色视频| 久久久水蜜桃国产精品网| 欧美日韩乱码在线| 真人一进一出gif抽搐免费| 久久久精品国产亚洲av高清涩受| 黄色片一级片一级黄色片| 无人区码免费观看不卡| 精品欧美一区二区三区在线| 91大片在线观看| 一区二区三区国产精品乱码| 国产成+人综合+亚洲专区| 国产亚洲精品久久久久久毛片| 伊人久久大香线蕉亚洲五| 婷婷精品国产亚洲av在线| 无遮挡黄片免费观看| 日韩欧美一区二区三区在线观看| 精品国产美女av久久久久小说| 国产欧美日韩精品亚洲av| 欧美午夜高清在线| 国产精品国产av在线观看| 男女床上黄色一级片免费看| 啦啦啦 在线观看视频| 久久久久久久午夜电影 | 国产精品久久电影中文字幕| 精品高清国产在线一区| 大型黄色视频在线免费观看| 五月开心婷婷网| 久9热在线精品视频| 一区二区三区激情视频| 亚洲精品美女久久av网站| 成人手机av| 9色porny在线观看| 成人av一区二区三区在线看| 久久久精品欧美日韩精品| 国产精品偷伦视频观看了| 黄色丝袜av网址大全| 国产精品乱码一区二三区的特点 | 国产精品爽爽va在线观看网站 | a级毛片黄视频| 亚洲国产欧美日韩在线播放| 亚洲专区国产一区二区| 一级a爱视频在线免费观看| 色在线成人网| 国产精品日韩av在线免费观看 | 十八禁网站免费在线| 国产有黄有色有爽视频| 国产成人一区二区三区免费视频网站| 成人18禁在线播放| xxxhd国产人妻xxx| 午夜日韩欧美国产| 老熟妇乱子伦视频在线观看| 黄网站色视频无遮挡免费观看| 一级黄色大片毛片| 久久香蕉精品热| 丁香欧美五月| 老鸭窝网址在线观看| 在线播放国产精品三级| 亚洲 欧美 日韩 在线 免费| 久久久水蜜桃国产精品网| 在线观看日韩欧美| 一本综合久久免费| 黄色女人牲交| 亚洲五月婷婷丁香| netflix在线观看网站| 99久久人妻综合| 国内毛片毛片毛片毛片毛片| 美女扒开内裤让男人捅视频| 侵犯人妻中文字幕一二三四区| 久久天堂一区二区三区四区| 国产精品偷伦视频观看了| 50天的宝宝边吃奶边哭怎么回事| 亚洲自拍偷在线| 黄频高清免费视频| 欧美大码av| 天堂俺去俺来也www色官网| 欧美黑人欧美精品刺激| 精品久久久久久电影网| 亚洲色图av天堂| 婷婷六月久久综合丁香| 如日韩欧美国产精品一区二区三区| 高潮久久久久久久久久久不卡| 悠悠久久av| av有码第一页| 欧美一级毛片孕妇| 中文亚洲av片在线观看爽| 十八禁网站免费在线| 人人妻人人澡人人看| 中文字幕高清在线视频| 国产xxxxx性猛交| 亚洲国产欧美一区二区综合| 国产精品电影一区二区三区| 村上凉子中文字幕在线| 中亚洲国语对白在线视频| 成人影院久久| 悠悠久久av| 国产精品爽爽va在线观看网站 | 亚洲一区二区三区不卡视频| 动漫黄色视频在线观看| 亚洲精品国产精品久久久不卡| 美女 人体艺术 gogo| 午夜福利影视在线免费观看| 久久亚洲精品不卡| 欧美日韩视频精品一区| av国产精品久久久久影院| 国产精品一区二区精品视频观看| 女人精品久久久久毛片| 别揉我奶头~嗯~啊~动态视频| 亚洲精品国产一区二区精华液| 人人澡人人妻人| 成年版毛片免费区| 日韩三级视频一区二区三区| 亚洲avbb在线观看| 午夜精品国产一区二区电影| 最近最新中文字幕大全免费视频| 久久影院123| 每晚都被弄得嗷嗷叫到高潮| 一夜夜www| 色尼玛亚洲综合影院| 国产一区二区三区视频了| 国产三级黄色录像| 操美女的视频在线观看| 黄网站色视频无遮挡免费观看| 在线免费观看的www视频| 国产精品久久久久久人妻精品电影| 制服诱惑二区| 国产欧美日韩精品亚洲av| 99精国产麻豆久久婷婷| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲熟女毛片儿| 自线自在国产av| 亚洲熟妇中文字幕五十中出 | 亚洲va日本ⅴa欧美va伊人久久| 女人高潮潮喷娇喘18禁视频| 欧美老熟妇乱子伦牲交| а√天堂www在线а√下载| 啪啪无遮挡十八禁网站| 18禁黄网站禁片午夜丰满| 91老司机精品| 757午夜福利合集在线观看| 三上悠亚av全集在线观看| 午夜福利一区二区在线看| 免费高清在线观看日韩| 免费看十八禁软件| 自拍欧美九色日韩亚洲蝌蚪91| 日日夜夜操网爽| av片东京热男人的天堂| 午夜久久久在线观看| 久久久久久久久免费视频了| 亚洲av五月六月丁香网| 97碰自拍视频| 中亚洲国语对白在线视频| 精品国内亚洲2022精品成人| av在线播放免费不卡| 久久九九热精品免费| 欧美日韩国产mv在线观看视频| 久久狼人影院| 久99久视频精品免费| 国产成+人综合+亚洲专区| 18禁国产床啪视频网站| 日本撒尿小便嘘嘘汇集6| 9热在线视频观看99| 岛国视频午夜一区免费看| x7x7x7水蜜桃| 亚洲五月色婷婷综合| 久久久国产精品麻豆| 校园春色视频在线观看| www.自偷自拍.com| 黄色视频,在线免费观看| 成人国语在线视频| 国产激情欧美一区二区| 久久午夜亚洲精品久久| 久久久久久久久免费视频了| 丰满饥渴人妻一区二区三| 精品一区二区三卡| 国产精品久久视频播放| 久久久久国产一级毛片高清牌| 国产伦一二天堂av在线观看| 日本免费一区二区三区高清不卡 | 亚洲一区中文字幕在线| 在线观看免费视频网站a站| 超色免费av| 黄色a级毛片大全视频| 亚洲少妇的诱惑av| 91av网站免费观看| tocl精华| 熟女少妇亚洲综合色aaa.| 岛国在线观看网站| 亚洲少妇的诱惑av| 精品国产乱码久久久久久男人| 性少妇av在线| 午夜日韩欧美国产| 少妇粗大呻吟视频| 90打野战视频偷拍视频| 久久这里只有精品19| 亚洲欧美一区二区三区久久| 亚洲成人久久性| 在线免费观看的www视频| av超薄肉色丝袜交足视频| 一级片'在线观看视频| 精品少妇一区二区三区视频日本电影| 在线视频色国产色| 午夜福利免费观看在线| 桃红色精品国产亚洲av| 91麻豆av在线| av网站在线播放免费| 亚洲色图 男人天堂 中文字幕| 久久精品成人免费网站| 国产高清激情床上av| 黑丝袜美女国产一区| 一进一出抽搐动态| 午夜成年电影在线免费观看| 国产日韩一区二区三区精品不卡| 一夜夜www| 很黄的视频免费| 级片在线观看| 欧美日韩瑟瑟在线播放| 亚洲五月色婷婷综合| 啦啦啦免费观看视频1| а√天堂www在线а√下载| 女人被狂操c到高潮| 日日摸夜夜添夜夜添小说| 97碰自拍视频| 精品久久久久久久毛片微露脸| 久99久视频精品免费| 一本综合久久免费| 亚洲第一av免费看| 大香蕉久久成人网| 久久青草综合色| 精品国产亚洲在线| 黄片小视频在线播放| 国产精品 国内视频| 熟女少妇亚洲综合色aaa.| 超碰成人久久| 欧美日本亚洲视频在线播放| 嫩草影院精品99| 亚洲欧美激情综合另类| 在线国产一区二区在线| 久久人人97超碰香蕉20202| 久久久久久久午夜电影 | 一级毛片女人18水好多| 久热爱精品视频在线9| 大陆偷拍与自拍| 精品一区二区三区av网在线观看| 日韩欧美一区二区三区在线观看| 成熟少妇高潮喷水视频| 亚洲国产毛片av蜜桃av| 国产麻豆69| 999久久久精品免费观看国产| 亚洲欧美一区二区三区黑人| 丁香六月欧美| 十八禁网站免费在线| 亚洲男人的天堂狠狠| av中文乱码字幕在线| 波多野结衣一区麻豆| 一边摸一边抽搐一进一出视频| 午夜福利在线免费观看网站| 日日爽夜夜爽网站| 国产一区二区三区综合在线观看| 黄色a级毛片大全视频| 日韩欧美一区视频在线观看| 欧美一级毛片孕妇| 99久久人妻综合| 久久久国产成人免费| 一级黄色大片毛片| 色精品久久人妻99蜜桃| 两性午夜刺激爽爽歪歪视频在线观看 | 成人三级做爰电影| 一级a爱片免费观看的视频| 黄色片一级片一级黄色片| 亚洲 欧美 日韩 在线 免费| 亚洲人成电影观看| 一边摸一边做爽爽视频免费| 夜夜爽天天搞| 日韩精品中文字幕看吧| 国产av精品麻豆| 国产1区2区3区精品| 亚洲激情在线av| 婷婷丁香在线五月| 亚洲第一av免费看| 中出人妻视频一区二区| 久久国产乱子伦精品免费另类| 国产精品永久免费网站| 精品国产一区二区三区四区第35| 99久久综合精品五月天人人| 免费少妇av软件| 亚洲免费av在线视频| 午夜视频精品福利| 99精品久久久久人妻精品| 国产99白浆流出| 在线观看午夜福利视频| 精品福利观看| av网站免费在线观看视频| 不卡av一区二区三区| 大陆偷拍与自拍| 国产1区2区3区精品| 中文字幕人妻丝袜一区二区| 人人澡人人妻人| 午夜免费观看网址| 91大片在线观看| 婷婷精品国产亚洲av在线| 嫩草影院精品99| 最近最新中文字幕大全电影3 | 成人永久免费在线观看视频| 国产亚洲欧美在线一区二区| 欧美最黄视频在线播放免费 | 午夜成年电影在线免费观看| 久久精品国产亚洲av香蕉五月| 校园春色视频在线观看| 欧美在线黄色| 国产激情久久老熟女| 美女大奶头视频| 精品一区二区三区四区五区乱码| 亚洲精品在线观看二区| 最新在线观看一区二区三区| 亚洲国产毛片av蜜桃av| 人妻久久中文字幕网| 国产三级在线视频| e午夜精品久久久久久久| 亚洲全国av大片| 成人黄色视频免费在线看| 激情视频va一区二区三区| 午夜免费激情av| 国产精品98久久久久久宅男小说| 视频在线观看一区二区三区| 午夜福利影视在线免费观看| 亚洲国产看品久久| 自线自在国产av| 亚洲男人天堂网一区| 国产一区二区在线av高清观看| 99久久国产精品久久久| 日韩国内少妇激情av| 国产精品国产av在线观看| 欧美色视频一区免费| 国产成人免费无遮挡视频| 天天躁狠狠躁夜夜躁狠狠躁| 这个男人来自地球电影免费观看| 丝袜美足系列| 一a级毛片在线观看| 午夜免费激情av| 午夜日韩欧美国产| 免费少妇av软件| 成年人黄色毛片网站| 欧美日韩国产mv在线观看视频| 国产精品久久久人人做人人爽| 国产欧美日韩一区二区精品| 一本大道久久a久久精品| 亚洲av日韩精品久久久久久密| 国产精品电影一区二区三区| 国产免费现黄频在线看| 亚洲午夜理论影院| 香蕉丝袜av| 女人爽到高潮嗷嗷叫在线视频| 精品国产乱码久久久久久男人| 国产伦一二天堂av在线观看| 在线看a的网站| 免费日韩欧美在线观看| 午夜亚洲福利在线播放| 在线十欧美十亚洲十日本专区| 国产成人精品久久二区二区91| a级毛片黄视频| 夜夜爽天天搞| 日本黄色视频三级网站网址| 久久久国产成人免费| 午夜视频精品福利| av片东京热男人的天堂| 美女午夜性视频免费| 欧美日韩亚洲国产一区二区在线观看| 在线永久观看黄色视频| 成人18禁高潮啪啪吃奶动态图| 午夜福利,免费看| xxx96com| 19禁男女啪啪无遮挡网站| 美女福利国产在线| 精品久久久久久久毛片微露脸| 在线观看舔阴道视频| 久久中文字幕人妻熟女| 亚洲va日本ⅴa欧美va伊人久久| 最近最新中文字幕大全免费视频| 亚洲精品成人av观看孕妇| 在线观看免费日韩欧美大片| 三上悠亚av全集在线观看| 亚洲人成伊人成综合网2020| 亚洲国产毛片av蜜桃av| 校园春色视频在线观看| 午夜福利一区二区在线看| 久久午夜综合久久蜜桃| 日本黄色日本黄色录像| 啦啦啦在线免费观看视频4| 亚洲精品国产精品久久久不卡| 亚洲精品久久午夜乱码| 18禁国产床啪视频网站| 男女高潮啪啪啪动态图| 天堂动漫精品| xxxhd国产人妻xxx| 国产精品免费一区二区三区在线| 亚洲精品国产色婷婷电影| 中文字幕人妻丝袜一区二区| 国产成人精品久久二区二区免费| а√天堂www在线а√下载| 欧美日韩精品网址| 中文欧美无线码| 亚洲全国av大片| 女人精品久久久久毛片| 久热这里只有精品99| 最近最新中文字幕大全电影3 | 日日爽夜夜爽网站| 免费av毛片视频| 色综合欧美亚洲国产小说| 精品人妻1区二区| 国产精品美女特级片免费视频播放器 | 国产欧美日韩一区二区精品| 午夜两性在线视频| 久久亚洲真实| 水蜜桃什么品种好| 欧美在线一区亚洲| 欧美日韩瑟瑟在线播放| 一边摸一边抽搐一进一小说| 99久久99久久久精品蜜桃| 亚洲,欧美精品.| 中文字幕色久视频| 黑人巨大精品欧美一区二区蜜桃| 91国产中文字幕| 国产精品乱码一区二三区的特点 | 亚洲国产欧美一区二区综合| 国产无遮挡羞羞视频在线观看| 一级作爱视频免费观看| 精品久久久久久,| 成人亚洲精品av一区二区 | 色播在线永久视频| 大型av网站在线播放| 夜夜看夜夜爽夜夜摸 | 午夜两性在线视频| 国产国语露脸激情在线看| 免费看a级黄色片| 国产精品久久电影中文字幕| 天堂动漫精品| 国产熟女xx| а√天堂www在线а√下载| 一级黄色大片毛片| bbb黄色大片| 国产成人系列免费观看| 久久99一区二区三区| 亚洲av五月六月丁香网| 欧美精品一区二区免费开放| 久久欧美精品欧美久久欧美| 美女扒开内裤让男人捅视频| 男女床上黄色一级片免费看| 亚洲一区二区三区不卡视频| 又大又爽又粗| 韩国精品一区二区三区| 法律面前人人平等表现在哪些方面| 精品乱码久久久久久99久播| 国产亚洲精品综合一区在线观看 | 国产高清视频在线播放一区| 久久精品国产99精品国产亚洲性色 | 乱人伦中国视频| 成人亚洲精品av一区二区 | 亚洲一区二区三区不卡视频| 亚洲一区二区三区欧美精品| ponron亚洲| 老司机午夜福利在线观看视频| 丰满的人妻完整版| 国产精品野战在线观看 | 日本黄色视频三级网站网址| 亚洲欧美激情综合另类| 国产精品久久久人人做人人爽| 亚洲 欧美一区二区三区| 欧美日韩乱码在线| 日韩中文字幕欧美一区二区| 日本撒尿小便嘘嘘汇集6| 精品人妻在线不人妻| 黑人欧美特级aaaaaa片| 天天添夜夜摸| 侵犯人妻中文字幕一二三四区| 99香蕉大伊视频| 亚洲成人免费av在线播放| 国产av一区在线观看免费| 欧美日本中文国产一区发布| 久久精品亚洲精品国产色婷小说| 一边摸一边抽搐一进一小说| 亚洲av成人不卡在线观看播放网| √禁漫天堂资源中文www| 99在线人妻在线中文字幕| 亚洲自偷自拍图片 自拍| 这个男人来自地球电影免费观看| 久久欧美精品欧美久久欧美| 久久久久精品国产欧美久久久| 在线天堂中文资源库| 一本大道久久a久久精品| 久久久久九九精品影院| 波多野结衣高清无吗| 免费久久久久久久精品成人欧美视频| 中文字幕人妻丝袜一区二区| 久久精品亚洲熟妇少妇任你| 一区二区三区精品91| 在线观看www视频免费| 超色免费av| 一区二区三区激情视频| 久久精品亚洲av国产电影网| 欧美日韩av久久| 免费人成视频x8x8入口观看| 日韩国内少妇激情av| 免费女性裸体啪啪无遮挡网站| 无限看片的www在线观看| 国产亚洲精品久久久久5区| 欧美人与性动交α欧美软件| 亚洲av第一区精品v没综合| 久久久久久久久中文| 黑丝袜美女国产一区| 成人永久免费在线观看视频| 少妇裸体淫交视频免费看高清 | 久久久久国产精品人妻aⅴ院| 精品福利永久在线观看| 色老头精品视频在线观看| 国产精品 国内视频| 黑人巨大精品欧美一区二区mp4| 99精品久久久久人妻精品| 男人舔女人下体高潮全视频| 国产99久久九九免费精品| 一夜夜www| 欧美亚洲日本最大视频资源| av网站在线播放免费| 亚洲精品美女久久av网站| 岛国在线观看网站| bbb黄色大片| 80岁老熟妇乱子伦牲交| 黑人操中国人逼视频| 超色免费av| 成人三级黄色视频| 精品国内亚洲2022精品成人| 国产精品久久久久久人妻精品电影| 999久久久国产精品视频| 国产精品永久免费网站| 久久久久久大精品| 久久国产精品影院| x7x7x7水蜜桃| 在线免费观看的www视频| 一本综合久久免费| 制服诱惑二区| 在线观看免费视频网站a站| 一区二区三区国产精品乱码| 日韩高清综合在线| 男女午夜视频在线观看| 欧美久久黑人一区二区| 亚洲精品中文字幕一二三四区| 一进一出抽搐gif免费好疼 | 国产一区二区三区综合在线观看| 亚洲av五月六月丁香网| 老司机午夜十八禁免费视频| 在线免费观看的www视频| 老司机亚洲免费影院| 欧美人与性动交α欧美精品济南到| 在线观看免费视频网站a站| 国产成人精品久久二区二区免费| 国产成人影院久久av| 免费看a级黄色片| 国产成人av激情在线播放| cao死你这个sao货| 男人舔女人的私密视频| 高清在线国产一区| 成在线人永久免费视频| 日本黄色视频三级网站网址| 婷婷丁香在线五月| 午夜福利免费观看在线| 一区二区三区激情视频| 一级片'在线观看视频| 淫秽高清视频在线观看| 在线观看www视频免费| 一级片'在线观看视频| 亚洲狠狠婷婷综合久久图片| 国产亚洲精品久久久久久毛片| 99久久综合精品五月天人人| 国产亚洲欧美在线一区二区| 午夜两性在线视频| 99久久综合精品五月天人人| 90打野战视频偷拍视频| 精品国产亚洲在线| 亚洲欧美激情综合另类| 在线观看免费视频网站a站| 50天的宝宝边吃奶边哭怎么回事| 国产三级黄色录像| 精品卡一卡二卡四卡免费| 1024香蕉在线观看|