• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Formal Testing Model for Operating Room Control System Using Internet of Things

    2021-12-16 06:40:42MoezKrichenSeifeddineMechtiRoobaeaAlroobaeaElyesSaidParminderSinghOsamahIbrahimKhalafandMehediMasud
    Computers Materials&Continua 2021年3期

    Moez Krichen,Seifeddine Mechti,Roobaea Alroobaea,Elyes Said,Parminder Singh,Osamah Ibrahim Khalaf and Mehedi Masud,*

    1Faculty of CSIT,AlBaha University,AlBaha,Saudi Arabia&ReDCAD Laboratory,Sfax University,Sfax,Tunisia

    2MIRACL Laboratory,Sfax University,Sfax,Tunisia

    3Department of Computer Science,College of Computers and Information Technology,Taif University,Taif,21944,Saudi Arabia

    4International Institute of Technology of Sfax,Sfax,Tunisia

    5School of Computer Science and Engineering,Lovely Professional University,Phagwara City,India

    6Al-Nahrain Nanorenewable Energy Research Center,Al-Nahrain University,Baghdad,Iraq

    Abstract: Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system, a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also, in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platform is tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.

    Keywords: Communication; Internet of Things; control rooms; sensors;cloud; robot

    1 Introduction

    New information and communication technologies (NICTs) have experienced rapid development for several decades and they have been applied in the health sector in numerous ways.Telemedicine (telediagnosis, telesurveillance, telesupervision, telesurgery, etc.) profoundly changes medical practices and the relationships between a practitioner and his patient.E-health (information and services on the net, the online management of medical files, etc.) provides practitioners and patients with various sources of information and new services.Chip cards (vital cards, health professional cards) allow the computerized transmission of healthcare information, and they support other services and procedures.Technological advances in recent years have greatly changed the way an operating room works.The multiple possibilities offered to healthcare establishments by the miniaturization of technologies and new equipment have obliged healthcare professionals to rethink the operating theater and their intervention practices.The progress made in sectors such as imaging, robotics and materials, together with the importance of computerization and the use of networks in the management of hospital data, means that surgeons have undergone a major evolution in their way of working.

    Today, radiology equipment with digital angiography, for example, is starting to be installed in operating theaters; this requires hybrid rooms to be designed that are capable of accommodating both surgery and radiology activity.The miniaturization of certain elements will lead to the installation of a greater number of technologies in blocks.Imaging improves the physician’s vision, provides more information during an intervention, makes diagnosis faster and allows better treatment of the patient at a reduced cost.Certain technologies accessible to the general public are also present in operating theaters, such as large LED screens or 3D imaging.Virtual technologies also allow better communication and better traceability.Patient files arrive directly in the blocks via the network of the establishment.Any changes in data systems that affect the organization of the hospital also have an impact on operating theaters.This network logic encourages collaborative practices across major universities and hospitals.

    In addition to maintaining comfort parameters, the purpose of air treatment facilities in operating theaters is to maintain acceptable values of temperature and humidity and to reduce the content of microorganisms, dust, and toxic gases in the air.This is achieved through air renewal at a suitable rate, with air whose purity characteristics have been obtained by various means.Airborne contamination (aero-bio-contamination) plays a significant pathogenic role in so-called clean surgery (Class I), and more particularly in surgery where implants are being placed.The architecture of the premises must comply with the requirements of ventilation techniques in order to prevent the introduction and stagnation of particles that could colonize the operating site.Inside the premises, humans are the main source of microorganisms and particles.The activity and number of people increase the risk of aero-bio-contamination.Therefore, the fight against nosocomial infections in the operating room is mainly based on rigor, with the rules of hygiene being applied by the entire team than the architecture of the premises.

    In this work, we provide a solution for measuring, analyzing and controlling temperature and humidity inside operating rooms.For this purpose, we define a network of sensors connected to the Cloud and develop web and Android applications that collect and visualize the desired variables.More precisely, our main contributions in this work are:

    ? A network of sensors and electronic components for measuring temperature and humidity inside operating rooms (“Dht11” sensors [1], 6LowPan protocol [2] and a processing center“Raspberry card” [3]).

    ? A cloud layer based on Ubidots [4], which is used for storing and analyzing the data sent by the sensors through the Raspberry card.

    ? A web application developed using rest APIs, which is used by the hospital managers to detect variations in temperature and humidity in the operating rooms.

    ? An Android application developed with Android Studio that allows to monitor variations in temperature and humidity in operating rooms.

    ? A robot equipped with humidity and temperature sensors, controlled by a mobile device via Bluetooth, which sends the collected values to the Cloud using the node Mcu.

    ? A learning module that generates decision rules for controlling the heating and cooling engines of the operating rooms.

    ? A set of security measures that protect the developed system from possible external attacks.

    ? A possible extension that explores model-based testing techniques for validating the security properties.

    The rest of this paper is organized as follows.Section 2 discusses related works.Section 3 presents the proposed solutions.Section 4 discusses the security aspects and the proposed mechanisms for protecting the system from attacks.Section 5 is dedicated to security aspects.Section 6 describes the proposed formal framework.Finally, Section 7 concludes the article and suggests directions for new contributions.

    2 Related Work

    2.1 IoT for Healthcare

    The authors in [5] surveyed advances in IoT-based healthcare technologies and they reviewed the state of the art with regard to network applications, platforms, architectures and industrial trends in IoT-based healthcare solutions.Authors in [6] described the various IoT-enabled medical devices and their practices in the following areas: healthcare monitoring of critical patients,chronic care, medicine dispensers and operating rooms.Similarly, the authors in [7] provided an overview of the major medical sensors in IoT and they proposed a review of the existent stateof-the-art IoT projects and technologies required in healthcare.In addition, the authors in [8]described the “Wireless Body Area Network” (WBAN)-based IoT healthcare system and they reviewed the state of the art of the applications and network architecture topologies utilized in IoT healthcare systems.Moreover, the IoT for “Personalized Healthcare Systems” (PHS) was considered in [9].The authors in [10] reviewed the use of RFID for application to centric body systems and they proposed a mechanism for the collection of information on the living environments of patients.Furthermore, the authors in [11] concentrated on the weaknesses and strengths of a wearable IoT medical system.

    2.2 The IoT and Modern Technologies for Operating Rooms

    The authors in [12] presented a so-called “Network function virtualization” (NFV)-enabled IoT architecture that enables the web-based automated management, control and orchestration of available resources for operating rooms.The authors in [13] proposed a new methodology for“Noncontact Imaging Photoplethysmography” using low-rank and chrominance features in “IoT Operating Rooms.” Reference [14] proposed an IoT-based framework that promotes safety inside surgery rooms, the proper utilization of electrocautery, the standardization of surgical techniques and optimized use of surgical devices.Moreover, the authors in [15] proposed a solution for monitoring surgical operation theaters, keeping track of consumables and tracking surgical towels that are used in surgery.Similarly, the authors in [16] proposed an IoT-based technology for monitoring the sterilization process of surgical devices and instruments.

    3 System Architecture

    As illustrated in Fig.1, our system is made up of four layers.

    Figure 1: System architecture

    3.1 Layer of Sensors and Electronic Components

    This layer consists of a set of temperature and humidity sensors, “Dht11,” connected through a sensor network based on the 6LowPan protocol and a processing center known as“Raspberry card.”

    3.1.1 6LowPan Protocol and Adaptation Layer

    The sensor network is based on the 6LowPan, which is a cheap and simple communication protocol that allows wireless connectivity using an adaptation of the IPv6 protocol [17].It is formed by a piece of equipment that is generally compatible with the IEEE802.15.4 standard [18]and is characterized by its short range, low speed, little memory, and low cost.The 6LoWPAN adaptation layer offers three main services:

    ? Fragmentation and reassembly of packages.

    ? Header compression.

    ? Forwarding when multi-hop is used by the link layer.

    Fig.2 shows an adaptation layer that is placed between the MAC layer and the network layer.

    Figure 2: 6LowPan adaptation layer

    3.1.2 Routing

    In the case of a sensor network, the network nodes consume a great deal of energy and they have memory constraints.For this reason, a new routing protocol called RPL (“IPv6Routing Protocol for Low-power and lossy networks”) [19] has been developed for this type of network.RPL is a distance-vector IPv6 routing protocol that builds a DAG (Directed Acyclic Graph).Also, the LLN Border Router (LBR) [20] is a network border router.This LBR and all higherranking equipment form a DODAG (directed acyclic graph where the nodes want to reach a single destination) [21].The LBR sends a DIO (DODAG information object) information message using multicast.

    When a device receives a new version of DIO, it calculates its rank (compared to the one it has just received) and propagates its DIO.When viewed from a device, all devices with a lower rank can claim to be parents.The optimal “parent” routes within the DAG are obtained from metrics and constraints.The LBR periodically issues DIOs to update the DAG.When a device joins the network or loses the link to its “parent,” it can wait for the next DIO or request the sending of a DIO using a DIS (DODAG Informational Solicitation) request message.At the end of this communication, the nodes send a DAO (Destination Advertisement Object) message to confirm their LBR roles.An example of a DODAG is shown in Fig.3.We employed simulation to study the operating results of the sensor networks before implementation in a real environment.We used a Contiki system called Cooja [22] simulator to run the test.The latter makes it possible to simulate network connections and to interact with the sensors.

    Figure 3: An example of a DODAG

    3.2 Cloud Layer

    This layer describes the cloud Ubidots used in our system, their services and the transfer of data between the Cloud and the Raspberry card.Ubidots is a private SaaS Cloud dedicated to IoTs.In our framework, its main role is to store the data sent by the sensors through the Raspberry card.These data are stored in variables identified by a name and an id.They represent the values sent by the sensors.

    3.2.1 Ubidots Cloud Services

    Ubidots is equipped with data analysis and cloud function tools, dashboard visualizations,device management tools, business intelligence (BI) events [23], alarm engines, and authentication/access for end users and operators.With Ubidots, users collect, improve, and deliver data from sensors, actuators, and tags (that matter to businesses and users) to make data-driven decisions that improve efficiency and effectiveness.

    3.2.2 Data Transfer between Ubidots and Raspberry Card

    Data transfer between the Cloud and the Raspberry card must go through 3 steps:

    ? Step 1: Installation of Ubidots cloud libraries on the Raspberry card so that a secure data transfer tunnel between the Raspberry card and the Cloud can be created.

    ? Step 2: Creation of a Python file in which the sensor’s ipv6 address and the cloud variable id are defined.A script file filters the data sent by the sensor and extracts only the temperature and humidity values.

    ? Step 3: Running the python file in a closed loop to obtain the data sent by the sensor instantly without breaking, and to automatically create tunnels containing the temperature and humidity values of the sensors.

    3.3 User Layer

    The user layer forms an interface between the user, the Cloud and the sensors installed in the operating rooms.This layer is made up of 3 important parts.

    3.3.1 Web Application

    We developed a web application with Java JEE language (framework spring boot).The application helps hospital managers to manage work efficiently in the operating theaters.It also provides the facility to instantly detect any variations in temperature and humidity in the operating rooms in the form of statistics and through informative dashboards based on variables generated by the Ubidots Cloud using rest APIs.For the administrator to access our system, he must enter the login and password of the web application.After providing this information (Login and Password), the administrator is redirected to the dashboard interface.The latter displays the general statistics of the system in which one can find the total number of operating theaters, the number of doctors, the number of technicians, the number of operating heaters, and the number of managers.Fig.4 shows the web dashboard interface.

    Figure 4: Web dashboard interface

    3.3.2 Android Application

    This application is developed with Android Studio.The objective of the application is to support consultation about variations in temperature and humidity in the operating rooms via a mobile device.This application also uses APIs and variables generated by the Ubidots Cloud.To access the application, a user must be authenticated.Each user with an account on the web application can have an account on the mobile application.Hence, the mobile application uses the same authentication parameters as the web application.After entering the authentication parameters, a home page is displayed.

    3.3.3 Robot

    In the event of a sensor failure within the operating theaters, the robot can be moved using a mobile application.This application sends codes to the Arduino board, which is responsible for translating this code into an order or action for the robot motors.The robot used in the experiments is show in Fig.5 and the manipulation interface of the robot is shown in Fig.6.Orders and actions are sent via Bluetooth to activate the robot’s own sensors.The collected values are sent to the Cloud using the node Mcu, which includes a micro-controller connected to Wifi.The objective of the robot is to ensure business continuity and minimize the damage caused by breakdowns.

    Figure 5: Robot connected to the Cloud via nodeMcu

    Figure 6: Robot manipulation interface

    3.4 Data Processing Layer and Knowledge Generation

    In each hospital, it is necessary to have an immense regulator that is given the role of managing the temperature within the operating rooms.Regulators are very expensive electromechanical components and it takes a long time to identify their faults.Therefore, we exploit data processing and the recognition generation by referring to a precise and detailed data analysis of the temperature and humidity values sent by the sensors installed in the prototypes.Then we rely on the rules provided by the experts.The experts are electro-mechanical engineers who help to identify the type of regulator failure in a quick and automatic manner.This saves time, money and ensures a stable and problem-free environment.

    3.4.1 Rules Provided by Experts

    The architecture of a regulator is based on two motors and electronic circuits.The first engine is responsible for cooling the operating rooms and the second one for heating.The rules are implemented based on temperature variation for a period of time relative to the value chosen in order to identify the source of the fault (in the cooling engine or the heating engine).The most important action in data analysis is defining the knowledge base.For this, we use knowledge tables.

    3.4.2 Adopted Methods

    The decision tree is a tool widely used in data mining.The construction of a decision tree is performed recursively.In the algorithm, the objective is to build a tree in which the leaves are associated with the classification of the labels.

    3.4.3 The Result of Learning

    The result of the REP-Tree algorithm’s learning is that 87.4% of the given instances are correctly classified.In general, the result obtained can be improved by changing the chosen classification algorithm or by minimizing the classification attributes—this can be done by considering anomalies and learning problems such as over-learning.

    4 Security of Operating Room Management System

    4.1 Web Application Security

    Web applications are the preferred target of hackers.Therefore, a poorly designed application allows access to confidential information or even entry to the company’s IT system.

    4.1.1 Spring Security

    This framework [24] forms an infrastructure that provides both authentication and authorization to Java applications.The real strength of this framework lies in the ease with which it can be extended to meet custom requirements.The security implemented by Spring Security is based on two major steps:

    ? Authentication: The goal for Spring Security, at the end of this step, is to identify a main user—this can be a physical person, a device or any other system capable of performing one or more actions on our server.

    ? Authorization: Authorization is the process that determines whether or not our primary user has sufficient rights to perform an action within the application.This step is obviously only possible if the authentication has been successful.

    4.1.2 Protection Against OWASP Top Ten Attacks

    The OWASP Top 10 [25] is a valuable web application security awareness document.It reflects a broad agreement for web applications on the most important security risks.Spring Security solves at least the following OWASP TOP 10 problems:

    ? Sql injection: By providing mechanisms for secure authentication.

    ? Broken authentication and session management: By providing mechanisms for efficient and secure authentication and session management.

    ? Insecure direct object references: By providing authorization mechanisms in the application.

    ? Sensitive data exposure: The Spring Security cryptography module provides the necessary cryptography functionality.

    ? Access control at the missing function level: By providing authorization means in the user interface and on the server side.

    ? Cross-site request forgery (CSRF): Providing support for the generation and validation of tokens mitigating CSRF attacks.

    4.1.3 Used Tools

    In our case, we performed a vulnerability scan on our web application using the following tools:

    ? OWASP ZAP (Zed Attack Proxy): An open-source web application security scanner [26-28]that may be adopted by professional penetration testers.

    ? ACUNETIX: An end-to-end web security scanner [29,30] that offers a global view of an organization’s security (web applications, web services, and APIs).

    4.2 Mobile Application Security

    At this level we adopted biometric authentication.The latter makes it possible to identify and authenticate a person based on a set of recognizable and verifiable, unique and specific data.The goal is to capture a piece of biometric data from that user.This can be a picture of their fingerprint, a recording of their voice, or a photograph of their face.This piece of data is then compared to the biometric data of other authorized users recorded in a database.In our mobile application, we have added a biometric authentication and identification extension for secure access.

    5 A Formal Testing Framework Based on Timed Automata and Attack Trees

    In this section, we present a model-based system for evaluating security properties [31,32].A model-based methodology consists of automatically extracting test scenarios from a formal specification of either the system being tested, or the context of the system being evaluated.Our architecture is designed primarily on the use of two formalisms: “Attack Trees” (AT) and“Price Timed Automata” (PTA).An attack tree helps the malicious party to define the plan adopted to breach the protection of the considered system.An attack tree is converted into a PTA network.Using the UPPAALL platform, the product of the built PTA is then calculated.The timed automata product obtained acts as input for the algorithm employed for the generation of tests.

    5.1 Attack Trees

    Attack trees [33] employ a useful graphical formalism to analyze critical systems’defense.More specifically, an attack tree could be perceived as a graphical representation of the attacker’s plan in a tree-shaped form.The root of the AT matches the objective that the attacker aims to achieve.The children of a node in the AT correspond to refinements into sub-goals of the target of the parent node.The refinement of an attack tree’s internal node could be either conjunctive or disjunctive:

    ? A conjunctive refinement is adopted when the accomplishment of all the children’s goals is required to accomplish the parent’s goal.In this situation, an AND gate is associated with the parent node (Fig.7a).

    ? A disjunctive refinement is adopted when the accomplishment of one of the children’s goals is enough to accomplish the parent’s goal.In this second situation, we associate an OR gate with the parent node (Fig.7b).

    Figure 7: Different possible gates of an attack tree (a) AND gate (b) OR gate

    An example of an AT is given in Fig.8.The attacker’s purpose here is to crack a secure file password.As seen in Fig.8, the attacker’s global target can be accomplished by:

    Figure 8: An example of an attacker tree inspired by the work of [29]

    ? Either crack the password: one of three possible options (Dictionary, Guessing or Brute Force attacks) could accomplish this sub-goal.

    ? Or perform a password attack: a Social Engineering or a Key Logger attack will accomplish this sub-goal.In turn, the attack on social engineering is subdivided into two basic actions:Generic Reconnaissance and Trap Execution.Likewise, within these two basic actions the main logger assault is accomplished: Key Logger Installation and Password Intercept.

    5.2 Transforming a Collection of ATs into a Network of PTA

    The model of “Priced timed automata” (PTA) [33] is an extension of timed automata,obtained by associating costs with locations and actions.Here we explain how we transform a collection of ATs into a network of PTA.The suggested transformation will be borrowed from [33].First in Fig.9, we draw the PTA encoding a basic attack action.

    Figure 9: A PTA for a basic attack action

    Fig.10 demonstrates a timed automaton associated with a parent node connected to two children through an AND gate.

    Figure 10: A PTA corresponding to an AND gate and a parent node possessing two children

    Fig.11 illustrates the timed automaton associated with a parent node connected to two children through an OR gate.

    Figure 11: A priced timed automaton for an OR gate and a parent node having two children

    Finally, the PTA presented in Fig.12 is associated with the execution of the attacker’s global goal.The generation of tests consists of extracting abstract tests from the PTA network constructed in the previous steps.To this end, we can adopt UPPAAL CORA [34], which is an extended version of the UPPAAL platform.This extension is supplemented with additional variables that are used for the optimal analysis of reachability.

    Figure 12: Priced timed automaton corresponding to the global goal of the attacker

    6 Conclusion

    In this paper, we developed two applications: an Android mobile application and an administrative web application.These two applications allow the management of operating rooms and sensors, and the monitoring of humidity and temperature values in the form of curves.All proposed functionalities have been developed and validated.Moreover, the proposed framework was extended with a model-based testing technique that is adopted to validate the security aspects.This work can be extended and improved by adding several other features, such as the detection of microbes in the operating room.Moreover, the proposed solution may be extended by considering sophisticated testing techniques for healthcare systems [35,36] based on standards like TTCN-3 [37], on formal and mathematical methods as in [38], and on cloud facilities as in [39].

    Funding Statement:Taif University Researchers Supporting Project (TURSP-2020/36), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人欧美在线观看 | 两个人看的免费小视频| 久久九九热精品免费| 日韩中文字幕欧美一区二区| 亚洲精品中文字幕一二三四区| 可以免费在线观看a视频的电影网站| 亚洲精品国产色婷婷电影| 婷婷成人精品国产| av网站免费在线观看视频| 久久久久国产一级毛片高清牌| 在线观看免费高清a一片| 婷婷成人精品国产| 精品久久久久久电影网| 精品人妻在线不人妻| 美国免费a级毛片| 国产成人精品无人区| 国产精品亚洲一级av第二区| 亚洲免费av在线视频| 在线永久观看黄色视频| 免费一级毛片在线播放高清视频 | 国产成人影院久久av| 亚洲熟女毛片儿| 久久精品成人免费网站| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲在线自拍视频| 99香蕉大伊视频| 看黄色毛片网站| 国产野战对白在线观看| 人人妻人人添人人爽欧美一区卜| 高清黄色对白视频在线免费看| 精品一区二区三区av网在线观看| 天天躁夜夜躁狠狠躁躁| 欧美在线一区亚洲| 亚洲中文日韩欧美视频| 12—13女人毛片做爰片一| 91国产中文字幕| 欧美激情久久久久久爽电影 | 免费高清在线观看日韩| 一边摸一边抽搐一进一小说 | 露出奶头的视频| 国产免费男女视频| 在线观看日韩欧美| avwww免费| 又紧又爽又黄一区二区| 欧美另类亚洲清纯唯美| 90打野战视频偷拍视频| 婷婷精品国产亚洲av在线 | 国产99久久九九免费精品| 欧美精品人与动牲交sv欧美| 免费黄频网站在线观看国产| 757午夜福利合集在线观看| 中文字幕色久视频| 最近最新中文字幕大全免费视频| 男女午夜视频在线观看| 久久精品国产亚洲av高清一级| 国产激情欧美一区二区| 亚洲国产中文字幕在线视频| 可以免费在线观看a视频的电影网站| 高清毛片免费观看视频网站 | 国产精品久久电影中文字幕 | 最近最新中文字幕大全电影3 | xxxhd国产人妻xxx| 99riav亚洲国产免费| 天堂√8在线中文| 亚洲三区欧美一区| 高清av免费在线| 久久 成人 亚洲| 国产精品成人在线| 曰老女人黄片| 老司机影院毛片| 国产精品98久久久久久宅男小说| 免费av中文字幕在线| 99riav亚洲国产免费| 亚洲人成77777在线视频| 韩国精品一区二区三区| 校园春色视频在线观看| 他把我摸到了高潮在线观看| 久久精品亚洲熟妇少妇任你| x7x7x7水蜜桃| 交换朋友夫妻互换小说| 少妇被粗大的猛进出69影院| 黑人操中国人逼视频| 法律面前人人平等表现在哪些方面| 久久精品成人免费网站| 人妻一区二区av| 变态另类成人亚洲欧美熟女 | 在线播放国产精品三级| 欧美精品一区二区免费开放| 欧美日韩亚洲综合一区二区三区_| 日韩精品免费视频一区二区三区| 精品福利观看| 18禁黄网站禁片午夜丰满| 人人妻人人澡人人爽人人夜夜| 国产亚洲精品第一综合不卡| 亚洲自偷自拍图片 自拍| 成人亚洲精品一区在线观看| 超碰成人久久| 久久久久国产一级毛片高清牌| 高清黄色对白视频在线免费看| 男女床上黄色一级片免费看| 丝瓜视频免费看黄片| 老司机亚洲免费影院| 国产高清videossex| 操出白浆在线播放| 狠狠狠狠99中文字幕| www.999成人在线观看| 国产野战对白在线观看| 久久久久久亚洲精品国产蜜桃av| 女人高潮潮喷娇喘18禁视频| 9热在线视频观看99| 啦啦啦视频在线资源免费观看| 亚洲成国产人片在线观看| 中亚洲国语对白在线视频| 91麻豆精品激情在线观看国产 | 亚洲国产看品久久| 亚洲专区国产一区二区| 欧美丝袜亚洲另类 | 国产成人精品久久二区二区免费| 岛国毛片在线播放| 男人舔女人的私密视频| 在线观看免费高清a一片| 男女下面插进去视频免费观看| 中文字幕制服av| 久久午夜综合久久蜜桃| 久久午夜亚洲精品久久| 亚洲精品粉嫩美女一区| 国产精品乱码一区二三区的特点 | 又紧又爽又黄一区二区| 老司机福利观看| 国产精品久久视频播放| a级片在线免费高清观看视频| 在线观看免费视频日本深夜| 高清在线国产一区| 1024香蕉在线观看| 国产视频一区二区在线看| 国产在线精品亚洲第一网站| 久久久国产成人免费| 五月开心婷婷网| 悠悠久久av| √禁漫天堂资源中文www| 美女高潮喷水抽搐中文字幕| 下体分泌物呈黄色| 亚洲av第一区精品v没综合| 黑人巨大精品欧美一区二区蜜桃| 欧美国产精品一级二级三级| 黄色片一级片一级黄色片| 男人的好看免费观看在线视频 | 大型黄色视频在线免费观看| 久久久久视频综合| 亚洲成人国产一区在线观看| 国产精品久久久av美女十八| www.精华液| 最新在线观看一区二区三区| 午夜亚洲福利在线播放| 午夜福利,免费看| 国产一区在线观看成人免费| 黄网站色视频无遮挡免费观看| 一本大道久久a久久精品| 人妻丰满熟妇av一区二区三区 | 亚洲精品国产区一区二| 亚洲专区字幕在线| 欧美日韩视频精品一区| 天堂中文最新版在线下载| 18禁观看日本| av国产精品久久久久影院| 中出人妻视频一区二区| 国产色视频综合| www.999成人在线观看| 午夜免费观看网址| 777久久人妻少妇嫩草av网站| 久久午夜综合久久蜜桃| 久久草成人影院| 69精品国产乱码久久久| 99国产极品粉嫩在线观看| 丰满饥渴人妻一区二区三| 亚洲av成人一区二区三| 国产熟女午夜一区二区三区| 久久亚洲真实| 日韩欧美三级三区| 9热在线视频观看99| 成人18禁在线播放| 岛国毛片在线播放| 久久久久久人人人人人| 岛国在线观看网站| 美女福利国产在线| 首页视频小说图片口味搜索| 午夜福利欧美成人| 精品午夜福利视频在线观看一区| 国产又爽黄色视频| 中文字幕精品免费在线观看视频| 国产成人免费观看mmmm| 欧美激情极品国产一区二区三区| 亚洲精品久久成人aⅴ小说| 日日爽夜夜爽网站| 一级片'在线观看视频| 日本撒尿小便嘘嘘汇集6| cao死你这个sao货| 99国产综合亚洲精品| 国产三级黄色录像| 国产精品久久久人人做人人爽| 乱人伦中国视频| 精品无人区乱码1区二区| 日本黄色日本黄色录像| 亚洲av成人不卡在线观看播放网| 在线播放国产精品三级| av片东京热男人的天堂| 香蕉国产在线看| 天天影视国产精品| 国产精品电影一区二区三区 | 黄色a级毛片大全视频| 亚洲成国产人片在线观看| 日本wwww免费看| 色94色欧美一区二区| 男女午夜视频在线观看| 老司机靠b影院| 最近最新中文字幕大全电影3 | 人妻丰满熟妇av一区二区三区 | 色播在线永久视频| 男女之事视频高清在线观看| 亚洲,欧美精品.| av视频免费观看在线观看| 成年动漫av网址| 国产成人系列免费观看| 悠悠久久av| 超碰97精品在线观看| 亚洲欧美激情在线| 亚洲欧美日韩另类电影网站| 国产高清videossex| 校园春色视频在线观看| 法律面前人人平等表现在哪些方面| 成年女人毛片免费观看观看9 | 久久人妻熟女aⅴ| 亚洲精品粉嫩美女一区| 国产91精品成人一区二区三区| 91麻豆精品激情在线观看国产 | 成人影院久久| 免费高清在线观看日韩| 成年人黄色毛片网站| 三级毛片av免费| 久久国产精品人妻蜜桃| 露出奶头的视频| 一二三四社区在线视频社区8| 久久久水蜜桃国产精品网| 老汉色av国产亚洲站长工具| 视频区欧美日本亚洲| 大陆偷拍与自拍| 久久中文字幕人妻熟女| 国产一区有黄有色的免费视频| 久久国产乱子伦精品免费另类| 精品国产一区二区三区四区第35| 啦啦啦免费观看视频1| 大型黄色视频在线免费观看| 亚洲精品在线观看二区| 国产在线一区二区三区精| 亚洲国产毛片av蜜桃av| 久久精品aⅴ一区二区三区四区| 亚洲美女黄片视频| 精品久久久久久,| 亚洲片人在线观看| 亚洲视频免费观看视频| 十八禁网站免费在线| 人妻一区二区av| 亚洲少妇的诱惑av| 乱人伦中国视频| 老熟女久久久| 纯流量卡能插随身wifi吗| 亚洲精品在线观看二区| 日韩成人在线观看一区二区三区| 在线观看一区二区三区激情| 精品人妻1区二区| 久久久国产欧美日韩av| 久久久精品区二区三区| 久久婷婷成人综合色麻豆| 精品一区二区三区视频在线观看免费 | 成人免费观看视频高清| 欧美日本中文国产一区发布| 十八禁网站免费在线| 日本黄色视频三级网站网址 | 久久人妻熟女aⅴ| 制服诱惑二区| 成人三级做爰电影| 99国产精品99久久久久| 午夜激情av网站| 18禁观看日本| 欧美黄色片欧美黄色片| 99国产精品一区二区蜜桃av | 天堂俺去俺来也www色官网| 国产一区在线观看成人免费| 19禁男女啪啪无遮挡网站| a级毛片在线看网站| 欧美丝袜亚洲另类 | 成年动漫av网址| 国产蜜桃级精品一区二区三区 | 精品高清国产在线一区| 老司机靠b影院| 一进一出好大好爽视频| 久久99一区二区三区| 性少妇av在线| 日韩欧美在线二视频 | 精品国产亚洲在线| 久久久精品区二区三区| avwww免费| 久久精品国产亚洲av高清一级| 日本vs欧美在线观看视频| 我的亚洲天堂| 国产视频一区二区在线看| 一区福利在线观看| 精品国产乱码久久久久久男人| aaaaa片日本免费| 亚洲中文日韩欧美视频| 久久久久久久国产电影| 精品人妻熟女毛片av久久网站| 99精国产麻豆久久婷婷| 久久香蕉激情| 怎么达到女性高潮| 亚洲三区欧美一区| 欧美激情 高清一区二区三区| 亚洲精华国产精华精| 国产亚洲欧美精品永久| 一本综合久久免费| 韩国精品一区二区三区| 欧美激情极品国产一区二区三区| 后天国语完整版免费观看| 久久久久精品国产欧美久久久| 一本大道久久a久久精品| 日韩欧美国产一区二区入口| 国产欧美亚洲国产| 超色免费av| 国产片内射在线| 婷婷成人精品国产| 欧美黑人精品巨大| 色94色欧美一区二区| 久久精品成人免费网站| 十八禁人妻一区二区| a级毛片在线看网站| 香蕉国产在线看| 高清毛片免费观看视频网站 | 亚洲在线自拍视频| 777久久人妻少妇嫩草av网站| 少妇粗大呻吟视频| 自线自在国产av| 日韩成人在线观看一区二区三区| 亚洲精品美女久久久久99蜜臀| 男女之事视频高清在线观看| 免费在线观看黄色视频的| 午夜免费鲁丝| 久久久久国产精品人妻aⅴ院 | 黄色视频,在线免费观看| 国产成人精品久久二区二区91| 如日韩欧美国产精品一区二区三区| 制服诱惑二区| 法律面前人人平等表现在哪些方面| 中文字幕av电影在线播放| 欧美日韩黄片免| 欧美黑人精品巨大| 亚洲精品国产精品久久久不卡| 天天添夜夜摸| 青草久久国产| 少妇的丰满在线观看| 中文字幕最新亚洲高清| 亚洲专区国产一区二区| 美女午夜性视频免费| 亚洲成人国产一区在线观看| 母亲3免费完整高清在线观看| 黄色片一级片一级黄色片| 9色porny在线观看| 亚洲欧美激情在线| 久久精品aⅴ一区二区三区四区| 人成视频在线观看免费观看| 69精品国产乱码久久久| 国产成人啪精品午夜网站| 欧美日韩av久久| 涩涩av久久男人的天堂| 日本精品一区二区三区蜜桃| 国产精品偷伦视频观看了| 99久久综合精品五月天人人| 国产成人精品久久二区二区免费| 999久久久精品免费观看国产| 久久精品熟女亚洲av麻豆精品| 91成年电影在线观看| 久久久久久久精品吃奶| 最新在线观看一区二区三区| 人妻丰满熟妇av一区二区三区 | 午夜精品久久久久久毛片777| 欧美人与性动交α欧美软件| 午夜视频精品福利| 啦啦啦免费观看视频1| 国产有黄有色有爽视频| 精品一区二区三区四区五区乱码| 成人三级做爰电影| 亚洲国产欧美网| 国产在线一区二区三区精| 欧美日本中文国产一区发布| 国产色视频综合| 免费观看精品视频网站| 美女国产高潮福利片在线看| 久久精品熟女亚洲av麻豆精品| 亚洲av成人av| 十八禁人妻一区二区| 丁香六月欧美| 国产精品久久久久久精品古装| 99热网站在线观看| 最近最新中文字幕大全电影3 | 天堂俺去俺来也www色官网| 欧美精品高潮呻吟av久久| 91成年电影在线观看| 亚洲第一欧美日韩一区二区三区| 少妇猛男粗大的猛烈进出视频| 亚洲精品成人av观看孕妇| av中文乱码字幕在线| 久久精品国产亚洲av高清一级| 免费不卡黄色视频| 黑人操中国人逼视频| 搡老岳熟女国产| 少妇裸体淫交视频免费看高清 | 香蕉国产在线看| 中文字幕色久视频| 日日摸夜夜添夜夜添小说| 午夜福利视频在线观看免费| 中文字幕人妻丝袜制服| 国产av精品麻豆| 精品一区二区三区四区五区乱码| 老司机福利观看| 啦啦啦视频在线资源免费观看| av线在线观看网站| 欧美日本中文国产一区发布| 欧美激情高清一区二区三区| 精品午夜福利视频在线观看一区| 女人爽到高潮嗷嗷叫在线视频| 热re99久久精品国产66热6| 欧美午夜高清在线| 亚洲一区二区三区欧美精品| 看免费av毛片| 欧美 日韩 精品 国产| 欧美激情 高清一区二区三区| 男人的好看免费观看在线视频 | 日韩熟女老妇一区二区性免费视频| 国产在线观看jvid| 亚洲av日韩精品久久久久久密| 男人操女人黄网站| 亚洲人成伊人成综合网2020| 亚洲国产欧美网| 亚洲第一av免费看| 亚洲av日韩在线播放| 黑人猛操日本美女一级片| 久久久久国产精品人妻aⅴ院 | 欧美亚洲 丝袜 人妻 在线| 精品午夜福利视频在线观看一区| 制服人妻中文乱码| 悠悠久久av| 国产精品九九99| 国产精品偷伦视频观看了| 国产精品永久免费网站| 亚洲专区国产一区二区| 国产一区二区三区综合在线观看| a级毛片在线看网站| 黄色丝袜av网址大全| 国产欧美日韩一区二区三区在线| 啦啦啦 在线观看视频| 欧美人与性动交α欧美精品济南到| 最新美女视频免费是黄的| 一级黄色大片毛片| 国产欧美日韩一区二区三| 十八禁人妻一区二区| 亚洲精品国产一区二区精华液| 国产无遮挡羞羞视频在线观看| 1024香蕉在线观看| 丝袜人妻中文字幕| 午夜日韩欧美国产| 亚洲美女黄片视频| 黄片大片在线免费观看| 国产精品一区二区在线不卡| 国产亚洲av高清不卡| av有码第一页| aaaaa片日本免费| 亚洲午夜理论影院| 久久精品熟女亚洲av麻豆精品| 电影成人av| 99国产精品99久久久久| 黑人巨大精品欧美一区二区蜜桃| 亚洲人成77777在线视频| 国产精品 欧美亚洲| 亚洲专区国产一区二区| a级片在线免费高清观看视频| 美女 人体艺术 gogo| 久久精品亚洲精品国产色婷小说| 国产日韩欧美亚洲二区| 69av精品久久久久久| 麻豆国产av国片精品| 国产精品久久久久久人妻精品电影| 精品视频人人做人人爽| 麻豆成人av在线观看| 制服人妻中文乱码| 熟女少妇亚洲综合色aaa.| 亚洲熟女毛片儿| 精品人妻熟女毛片av久久网站| 国产免费现黄频在线看| 在线播放国产精品三级| 精品电影一区二区在线| 天堂中文最新版在线下载| 亚洲人成电影观看| 高清av免费在线| 飞空精品影院首页| 国产欧美亚洲国产| 99久久国产精品久久久| 国产乱人伦免费视频| 国产一区二区三区视频了| 亚洲全国av大片| 欧美激情极品国产一区二区三区| 亚洲一卡2卡3卡4卡5卡精品中文| 啦啦啦视频在线资源免费观看| 国产不卡一卡二| 亚洲五月天丁香| 成人影院久久| 国产成人系列免费观看| 中亚洲国语对白在线视频| netflix在线观看网站| 巨乳人妻的诱惑在线观看| 免费高清在线观看日韩| 黄色丝袜av网址大全| 三上悠亚av全集在线观看| 中国美女看黄片| 黄色丝袜av网址大全| 超碰97精品在线观看| 精品乱码久久久久久99久播| 最近最新中文字幕大全免费视频| 国产精品久久电影中文字幕 | 波多野结衣一区麻豆| 黄色怎么调成土黄色| 免费少妇av软件| 性色av乱码一区二区三区2| 自拍欧美九色日韩亚洲蝌蚪91| 国产欧美日韩一区二区三区在线| 亚洲七黄色美女视频| 亚洲精品乱久久久久久| 国产亚洲一区二区精品| 久久精品国产清高在天天线| 熟女少妇亚洲综合色aaa.| 在线观看免费视频日本深夜| 国产蜜桃级精品一区二区三区 | 搡老乐熟女国产| 精品一区二区三卡| 亚洲人成电影观看| 看片在线看免费视频| 久热这里只有精品99| 国产极品粉嫩免费观看在线| 国产99白浆流出| 男女之事视频高清在线观看| 亚洲av成人一区二区三| 人妻 亚洲 视频| 一边摸一边抽搐一进一小说 | 久热爱精品视频在线9| 亚洲av熟女| 欧洲精品卡2卡3卡4卡5卡区| 欧美人与性动交α欧美软件| 久久久久久久午夜电影 | 国产一区在线观看成人免费| 欧美在线一区亚洲| 美国免费a级毛片| 男女床上黄色一级片免费看| av天堂久久9| 国产日韩欧美亚洲二区| 国产精品美女特级片免费视频播放器 | 精品国产一区二区久久| 水蜜桃什么品种好| 天堂中文最新版在线下载| 亚洲精品久久午夜乱码| 国产一区在线观看成人免费| 成人手机av| 亚洲国产欧美网| 视频区欧美日本亚洲| 最新美女视频免费是黄的| 欧美午夜高清在线| 99热国产这里只有精品6| 欧美不卡视频在线免费观看 | 少妇被粗大的猛进出69影院| 精品无人区乱码1区二区| 12—13女人毛片做爰片一| 亚洲一码二码三码区别大吗| 在线观看舔阴道视频| 1024香蕉在线观看| e午夜精品久久久久久久| 欧美+亚洲+日韩+国产| 桃红色精品国产亚洲av| 精品福利观看| 91成年电影在线观看| 精品高清国产在线一区| 亚洲第一青青草原| 最近最新中文字幕大全电影3 | 国产熟女午夜一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲精品一二三| 精品国产一区二区久久| 搡老熟女国产l中国老女人| 亚洲精品美女久久久久99蜜臀| 欧洲精品卡2卡3卡4卡5卡区| 国产又色又爽无遮挡免费看| 免费观看a级毛片全部| 久久精品亚洲精品国产色婷小说| 久久香蕉国产精品| 欧美中文综合在线视频| 久久精品aⅴ一区二区三区四区| 两性夫妻黄色片| 老司机亚洲免费影院| 成年人免费黄色播放视频| 亚洲欧洲精品一区二区精品久久久| 国产主播在线观看一区二区| 精品久久久久久电影网| av天堂在线播放| 国产精品 国内视频| 美女福利国产在线| 女性生殖器流出的白浆| 欧美精品av麻豆av| 美女高潮喷水抽搐中文字幕| 欧美黄色淫秽网站|