• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    2022-03-14 09:21:42AbrarAlajlan
    Computers Materials&Continua 2022年3期

    Abrar M.Alajlan

    Self-Development Skills Department,Common First Year Deanship,King Saud University,Riyadh,KSA

    Abstract:Detection of the wormhole attacks is a cumbersome process,particularly simplex and duplex over the wireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs.The distributed passive nature of these attacks makes them enormously challenging to detect.The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment.And further to detect the serious routing-disruption attack“Wormhole Attack”step by step through the different network mechanisms.In this paper,a new multi-step detection(MSD)scheme is introduced that can effectively detect the wormhole attacks for WSN.The MSD consists of three algorithms to detect and prevent the simplex and duplex wormhole attacks.Furthermore,the proposed scheme integrated five detection modules to systematically detect, recover, and isolate wormhole attacks.Simulation results conducted in OMNET++show that the proposed MSD has lower false detection and false toleration rates.Besides,MSD can effectively detect wormhole attacks in a completely distributed network environment,as suggested by the simulation results.

    Keywords: Wireless sensor network; wormhole attack; node validation;multi-step detection

    1 Introduction

    Many applications that use WSNs can be vulnerable to a wide range of security threats [1].The sensors are strategically placed to monitor real-time events that may be utilized for a variety of business and domestic purposes.WSNs, on the other hand, have difficulties dealing with security risks [2].Wormhole attacks, which have significant impacts on the network layer, are one of the biggest dangers.Wormhole attacks, according to research, can disrupt network routing,location-based wireless security, and data aggregation [3-6].A wormhole attack can be launched by a single node or by a pair of cooperating nodes [7].Because it may disrupt the network discretely, this attack is extremely difficult to detect [8].Even if one does not understand the different cryptographic algorithms employed [9], it is usually caused by one or more nodes [10].

    The consequences of a wormhole attack are quite severe [11].For example, a wormholeenabled node may conspire to falsify the routing configuration in order to obtain total control of the network traffic [12].As a result, the nodes may disrupt processes that rely on topological proximity [13].These attacks can also raise node power consumption by allocating various resources and transmitting excessive data [14].Wormholes cannot be prevented using various cryptographic algorithms and cryptic keys since they just replay data packets that already exist in WSNs [15].Because WSNs connected to IoT have various hardware flaws, solutions in range-free localization are more likely to seek cost-effective solutions [16,17].The adoption of the DV-hop algorithm to avoid wormhole attacks is one example of a low-cost approach [18,19].

    This paper presents a new scheme for the multi-detection of wormhole attacks to address these security concerns.The proposed scheme consists of the following three modules: neighbor node validation process (NNVP), fake link reduction process (FLRP), and wormhole isolation.

    The NNVP determines whether or not the node is infected and whether or not it is a neighbor node.The links that originate from a wormhole are referred to as “false links”.These connections can be removed using the FLRP.Finally, the isolation module guarantees that the detection and recovery processes are carried out properly, isolating all traces and instances of the wormhole.This paper contributes as:

    ? The proposed MSD involves five detection methods, which can detect the successfully classified simplex and duplex wormhole attacks.

    ? MSD is supported with a valid locator detection feature, which can adjustably fine-tune a threshold value to make a sensor node easily to detect the valid locator(VL).Once VL is identified, then the detection process is used to determine the wormhole-enabled node for the WSN connected with IoT.

    ? MSD consists of a self-healing procedure that determines the wormhole attack and points to the positions of wormhole-enabled nodes.

    ? Secret key and signature generation processes are used to guarantee the secure communication process among the sensor node and adjacent sensor nodes or sensor node and base station.

    2 Related Work

    This section explores into the key aspects of striking approaches.To detect and recover from wormhole attacks in multi-hop WSNs, the distributed self-healing method was suggested [20].It also determines the locations of malicious nodes and separates them from the network.It is the first approach that carries out both routing organization recovery and wormhole node quarantine in response to wormhole attacks.However, it requires proper localization capabilities as well as time analysis.The proposed method relies solely on network connection in a distributed manner.The simulation results showed that the suggested technique detects all wormholeenabled nodes with 100 percent accuracy and zero percent erroneous detection.In terms of power usage and overhead, the result also shows that the suggested technique outperforms other competing alternatives.

    The cloned and wormhole node detection method is introduced in Maheswari et al.[21].This method examines each node’s behavior to determine if it is a wormhole or not.If the node has not received authorization from the base, it is not permitted to participate in the communication.To solve the problem of wormhole and Grayhole attacks, the lightweight trust-driven approach was proposed [22].The suggested method uses direct trust, which is determined based on the node’s characteristics.It has also been utilized to establish indirect trust based on the perspectives of nearby sensor nodes.According to the authors, the suggested technique is energy efficient and would not add extra overhead to data flow.

    The directional antennas are introduced to prevent wormhole attacks [23].To avoid a wormhole, each node exchanges a secret key with its neighbors and maintains a current list of all neighbors.The direction in which a signal is heard from a neighbor is used to build all lists in a secure way, provided that all nodes antennas are aligned.However, it only mitigates the threat of wormhole attacks to a limited extent.It only protects against wormhole attacks, in which hostile nodes try to trick two nodes into thinking they are neighbors.In wireless sensor networks, the effects of wormhole attacks are widely examined utilizing IoT [24].

    The authors proposed the label-based DV-hop localization method to defend against the possibility of wormhole attacks.Furthermore, the correctness of the approach is also proved using the simulation results.

    DAWN: A Distributed detection algorithm is proposed for controlling the Wormhole in WSN [25].The suggested method made an attempt to establish a lower constraint on efficient detection rate.The authors investigated the battle of DAWN against collusion and wormhole attacks.Furthermore, the suggested technique has no increased cost due to the use of additional testing messages.DAWN is supported by substantial experimental findings, as all existing wormhole detection techniques increase communication overhead and false negatives.The proposed technique, on the other hand, has a low communication overhead and a high accuracy rate.

    3 Proposed Multi Detection Scheme

    This section presents the proposed multi-detection scheme for detecting wormhole attacks.Thus, the data distribution process is of paramount vital before detecting the attacks.The Poisson distribution [26] has been used for the data distribution over the network.The data is available at different locations of a WSN.Each data location has a degree of self-sufficiency, is capable of handling local as well as global applications.Data distribution is shaped either by captivating a prevailing single location or excruciating it over different locations.The data uncertainty of data distribution can be computed as:

    wherepi: probability of the event

    The proposed scheme consists of the three modules, which are discussed in the subsequent sections:

    ? Neighbor node validation process (NNVP),

    ? Fake link reduction process (FLRP),

    ? Wormhole isolation.

    3.1 Neighbor Node Validation Process

    For each type of wormhole attack detected, there are corresponding different identification protocols.They are as follows.

    There are different types of wormhole attacks.They could be classified as either simplex or duplex wormhole attacks [27,28].In this work, different detection processes have been applied to identify the wormhole attacks.

    3.1.1 Duplex Wormhole Link Attack

    To detect whether a network is experiencing the problem due to the duplex wormhole attack,the sensor node attempts to recognize all its Valid Locators (VLs) prior to the self-discovery process.Let us takeX2as a locator depicted in Fig.2; when the sensor node initiates the Location Request Message (LRM), thenX2returns a Location Acknowledgement Message (LAM) to the sensor node because it is within the communication range ofX2.Furthermore, LAM also travels from pointZ2through the wormhole attack link to another pointZ1before it arrives at the sensor node.Thus, the sensor node receives several times LAM from theX2.Nevertheless, there are three diverse scenarios:

    ? The locator is within the range of transmission of the sensor node.Thus, the sensor node received three times message fromX4, as shown in Fig.2.

    ? The locator is not within the range of the sensor nodes’transmission; then the sensor node receives the message twice from the asX7, as shown in Fig.2.

    ? The locator is within the range of transmission of the sensor node, then the sensor node receives the message twice from theX2, as shown in Fig.2.Based on the ranges,X2andX4are considered as the VLs, but notX7.The sensor node can apply five VLs processes to identify the V-locators.

    The attacker node has a capability of changing the location in order to attack the legitimate node.Let us assume that distance between attacker and victim is symbolized as |Ad-vd|.The random change [-1,1] can be characterized as ‘Δβ’.Thus,cos(2πΔβ)denotes the circular path of the attacker around the victim node.Thus, the control is transferred to the victim node when detection movement of the malicious node is determined that is computed by:

    whereAd: Attacker distance;vd: Victim distance

    When an attacker node knows that its position is exposed, then it attempts to update the position.However, the victim node can identify whenever an attacker moves away from there based on a random-change.Hence, if the random change is greater than 1 or less than -1 that provides the clue to the victim node.The moving process of the attacker node ‘Am’and identifying process time predicted by and victim node ‘vpp’are mathematically expressed in Eqs.(3) and (4)respectively.

    vd(rc)Random change in the attacker node’s distance;G: Constant variable for the global change in the position.

    If the response time of victim node is faster then, it can identify the movement of an attacker node efficiently depicted in Fig.1.

    Figure 1: Response time of victim node

    ? Detection Process-1

    In the first scenario, if the sensor node gets victim due to a wormhole attack and receives three times LAM of the Neighbor Locator (NL), then a bit of the LAM should be set to 1.Thus NL is declared as a VL that is shown asX4in Fig.2.The sensor node only nullifies the minimum Medium Access Control (MAC) delay of a locator.On the other hand, message traveling and the response time delays get longer when the message comes through the wormhole link.Therefore,the measured distance based on the LAM comes from VL takes the shortest response time.

    In the second scenario, if the sensor node gets the LAM twice from the NL, then a bit of the LAM should be set to 1, and NL is considered as a Suspicious Locator (SL) such asX7can be determined and as shown in Fig.2.

    Figure 2: Showing Duplex wormhole attack process

    Definition 1:Data reiteration rate ‘Drr’of the given samples reflect the malicious behavior of the sensor node because of repetition of the continuous packets.

    whereSp: Sent samples;t: Time for sending the samples; repeated samples.

    Definition 2:If the observation time for the sample-sendingSs(t)is too large then, it may cause of duplex wormhole link attack.On the other hand, if the sample-sending rate is lower,then it may also cause of duplex wormhole link attack.

    whereSsv: The sample-sending value

    In the third scenario, if the sensor node gets the LAM twice from the NL, then a bit of the LAM should be set to 0, and NL is regarded as the VL.Also, measured distance based on the LAM is considered as correct with the shorter response time asX2shown in Fig.2.

    Let us take a set of locators such thatL= {(a1, b1), (a2, b2),..., (ap, bp)} and corresponding measured distancesS= {l1, l2,..., Sp}, where (ai, bi) is the location ‘L’of the locatorXiandrithat is the distance from a sensor node to Xi, whereJ= (1, 2,3,..., p).Thus estimated location of the sensor node can be determined as (a0, b0).Thus, the mean square error (MSE) rate for the location can be defined as:

    The distance dependability property (DDP) of the legal locators demonstrates that the MSE of the estimated location is based on the exact distance that is smaller than a minimum threshold.On the other hand, the MSE of the estimated location is based on the distance that involves some inappropriate distance measurements that is not smaller than a threshold value.More VLs are detected using the DDP of the VLs.

    ? Detection Process-2

    If the sensor node has detected not less than two VLs using Detection Process 1; thus,it detects other VLs by examining whether an estimated distance is dependable.A predefined threshold ‘β’of the MSE is identified (i.e., an estimated distance with the MSE lesser thanβis regarded to be steady).The sensor node can recognizeX2,X3, andX4as VL despite changing the location, as shown in Fig.1.Furthermore, an accurate estimated distance ‘Dacc’can be obtained.

    whereΨ: distance of valid locator;γ: distance covered by the sensor in case of mobility.

    When a new locator joins the network, then it is of paramount significance to calculate the distance of the new locator ‘Dnl’to avoid and minimize the error rate given by

    The objective function is used to analyze the nature of the link, whether wormhole or not.

    The sensor node initiates the detection process one by one for the uncertain locators (ULs).For example, to examine whetherX1is the VL.Thus, it is also important that the sensor node should be capable of calculating its own location using measured distance toX1,X2,X3, andX4.If the measured distance toX1is inappropriate, then the MSE of the calculated distance dimension can surpass theβ, which implies thatX1should not be considered as VL.If the sensor node identifies the distance stability ofX2,X3,X4, andX6, it also checks that the MSE is lesser thanβ; therefore,X6should be considered as VL and measured distance toX6should be considered as accurate.After examining each uncertain NL, the sensor node can determine all VLs with the exact measured distance.

    Theorem 1:When a sensor node becomes victim due to duplex wormhole link attack, ?Ljsuch contention locationC(Lj)ρ,Lj∈DA.

    Proof:When a sensor node is a victim due to duplex wormhole link attack as depicted in Fig.1.All of the locations inSL(Atk1)USL(Atk2)are NLs for the sensor nodes.According to the given theorem:

    Thus, the message cannot be advanced to wormhole link, and there is no anomaly for the interchange of the message interchange between Liand other locators, consequently

    Tab.1 shows the notations and their description.

    Table 1: Used notations and description

    3.1.2 Simplex Wormhole Link Attack

    When the sensor node discovers the simplex wormhole attack, then it adopts the VLs’detection processes.

    ? Detection Process-3

    If the sensor node gets the victim due to simplex wormhole link attack as depicted in Fig.2.If the sensor node receives the LAM of an NL twice, then that NL is considered as a VL.For example, ifX3replies a LAM to the sensor node as depicted in Fig.1, this message travels through two different routes to the sensor node: one route goes directly fromX3to the sensor node whereas, the other fromX3toZ1via the wormhole link to the sensor node.Hence, the sensor node is capable of determining thatX3is a VL.To further achieve the accurate measured distance toX3, the sensor node matches the response times of the LAM fromX3through different routes.The measured distance with the shortest response time is deliberated as correct and accurate.Likewise,X4is also recognized as a VL, and its accurate measured distance can be determined.Thus, the spatial property is used to identify VLs.Duplex and simplex wormhole attack detection processes are given in Algorithm 1.

    Property 1:The sensor node is unable to get the messages from two NLs concurrently if the measured distance between these two NLs is larger than 2d.

    Algorithm 1: Detection process for the wormhole attack 1.Initialization: {Lrm: Location request message; Nl: Neighbor locator; Lam: Location acknowledgement message; Dγ: Detection methods-1-2; Dδ: Detection methods-3-5; Swh: Simplex wormhole attack; Dwh: Duplex wormhole attack}2.Input:{Lrm; Lam}3..Output:{Swh; Dwh}4.Sensor broadcasts a Lrm 5.Each NL sends Lam to sensor node including message abnormality detection outcome.6.Sensor node waits for Lam to measure the distance to each NL and compute the response time of each NL 7.If the sensor node detection =Dγ then 8.Detected as Dwh 9.if the sensor node detection =Dδ then 10.Detected as Swh 11.Else No 12.A simplex wormhole link attack is discovered.13.Else if No wormhole attack 14.End if 15.End if 16.End else if

    In Algorithm 1, the simplex and duplex detection processes are explained.In step-1, variables are initialized.Steps-2 provides the input.Step-3 gives the output.In step-4, the sensor node broadcasts the location request message.In step-5, each neighbor locator sends location acknowledgment message to the sensor node, including message irregularity detection result.In step-6,each neighbor locator sends the location acknowledgment message to measure the distance to each neighbor locator and computes the response time for each node locator.In step-7, if the sensor node detection methods fall within the category of dections: 1-2 methods, then the duplex wormhole method is observed.In step-8, if the sensor node detection methods fall within the category of detections; 3-5 methods, then the simplex wormhole method is observed.In step-9,if a sensor node is neither falling within the processes ofDγnorDδ, then it is considered that no wormhole link attack is discovered.

    ? Detection Process-4

    When the sensor node becomes victim due to the simplex wormhole link attack as depicted in Fig.2, if two NLs violate the spatial property, it is noticeable that one of them is a valid locator (VL) and explained in the Algorithm-2, and the other is a Suspicious Locator (SL).Let us take an example ofX2andX5in Fig.2, as the distance betweenX2andX5is larger than 2d.After receiving LAM from them, the sensor node can detect that two NLs cannot hold the spatial property.Thus, VL can be differentiated from SL using the response time of both NLs as the LAM fromX5is transmitted to the sensor node through the wormhole link.It also takes a longer response time than that fromX2.The sensor node considers X as a VL andX5as a SL becauseX2has a shorter response time.Therefore, the distance toX2is also deliberated as correct.The distance consistency property is used of VLs to determine more VLs when the sensor node becomes a victim due to the simplex wormhole link attack.

    Algorithm 2: Detection of Valid Locators 1.Initialization: {VL: Valid Locator; Dγ: Detection methods-1-2; Dδ: Detection methods-3-5;Swh: Simplex wormhole attack; Dwh: Duplex wormhole attack; SN: Sensor node}2.Input:{Dγ ;Dδ}3.Output:{VL}4.If SN=Dwh then 5.Set Dγ=1 and detect VLs 6.If SN=Dwh then 7.Set Dγ=2 and detect VLs 8.End if 9.End if 10.If identified VLs ≥2 then 11.Initiate detecting process of other VLs 12.End if 13.Elise if SN=Swh then 14.Set Dδ=3,4 & 5 and detect VLs 15.End else if

    In Algorithm 2, the valid locators are identified.In step-1, variables are initialized.In steps-2-3, give the input and output.In steps-4-7, when the sensor node detects the duplex wormhole attack, then it initiates the ‘Dγ’detection method-1 or detection method-2.In steps-8-9, the process of detecting other valid locators is initiated.In step-13-14, when the sensor node detects the simplex wormhole attack, then it starts to use detection methods-3-5.And based on the detection methods, the valid locators are detected.

    Let us take a ‘bsi’as a malicious parameter done by a simplex wormhole link attack that can be denoted by

    Let us take a ‘Gdk’as a malicious parameter done by a duplex wormhole link attack that can be indicated by

    For the data coming from each sensor node is evaluated for every event.As we geti=1,2,...,50,k=1,2,...,50, andk=1,2,...,10.The setbsiis used to generate the template for detection of simplex wormhole link attack for the sensor node ‘i’.While the setgdkis used for the template generation of duplex wormhole link attack.It can be determined if eachgdk∈Gdkcan be segregated from eachbsi∈Bsi.

    ? Detection Process-5

    When the sensor node becomes the victim of the simplex wormhole attack, similar to Detection Process 2, if the sensor node uses detection processes 3-4 for detecting minimum two VLs,it can detect other VLs based on the Distance Consistency Property (DCP) of VLs.Considering the scenario of Fig.3, the sensor node can detectX2,X3, andX4as VLs and obtain the correct measured distance.The sensor node can further detect other VLs by examining distance consistency.A MSE smaller thanβcan be obtained when the sensor node estimates its location based onX1,X2,X3, andX4because they are all VLs.The sensor node can then determine thatX1is a VL and the measured distance toX1is found as correct.

    The procedure of the basic VLs detection approach is enumerated in Algorithm 2: When the sensor node gets a victim of the duplex wormhole link attack, then it needs to execute the detection Process 1 to determine the VLs.As the distance stability process requires at least three VLs, if the sensor node classifies no less than two VLs, it can use the detection process 2 to detect other VLs.In case if the sensor node becomes the victim due to simplex wormhole link attack,then it adopts the detection processes 3-4 to identify the VLs.After that, if at least two VLs are identified, the sensor node executes the detection process 5 to identify other VLs.

    3.2 Prolonged Node Validation Process

    In the basic VL detection process, if the sensor node detects less than three VLs, it terminates the self-localization.This occurs because the statistical method of maximum likelihood estimation(MLE) used in the self-localization needs at least three distance measurements.However, when using detection processes based on the distance consistency property of V-locators, many VLs cannot be determined due to the threshold of MSE,βis set incorrectly at a trivial value.

    A prolonged valid locators’identification approach is used to handle the above problem.The proposed approach can adaptively adjust the threshold value ofβto make the sensor node easier to detect more VLs.If the sensor node gets a victim of the duplex wormhole link attack, it conducts detection process 1 to detect VLs.If the sensor node detects no less than two VLs, it replicates to detect other VLs using detection process 2 and updates theβwith an augmentation ofΔτ2 until the minimum three VLs are recognized, orβis higher thanβmax.In case, the sensor node notices that it gets a victim due to simplex wormhole link attack, it adopts the detection processes 3-4 to detect the VLs.If at least two VLs are detected, the sensor node repeats to conduct the detection process 5 to identify other VLs and update β with an increment of Δβ until at least three VLs are recognized, or β is larger than β max.The procedure of the prolonged VLs’detection process is explained in Algorithm 3.

    Figure 3: Showing Simplex wormhole attack process

    After the wormhole link attack detection and VLs’identification, the sensor node can detect VLs from its NLs.Furthermore, the sensor node can calculate the accurate distance for the VLs.If the sensor node gets minimum three correct measured distances to its NLs, it performs the Maximum Likelihood Estimation (MLE) localization process based on the locations and distances of the associated NLs.

    ?

    (Continued)

    ?

    In Algorithm 3, the Prolonged node validation process is explained.In step-1, used variables are initialized.Steps-2-3 specify the input and output.Steps-4-5 shows the detection process of the duplex wormhole link attack conducted by the sensor node; then it initiates to conduct the detection process-1 to identify the VLs.In steps-6-7, the value of the identified VLs is compared;if identified VLs are greater than or equal to 2, then this process will be continued until determine for the rest of the detection methods.The steps-8-9 show the process of detecting other VLs;then the threshold value is set by adding the maximum threshold value and incremental of a predefined threshold value.

    In steps-10-13, the predefined threshold value is compared with the maximum incremental predefined threshold value; this process continues until an identified VLs are greater than or equal to 3.In steps-14-20, the sensor node detects the simplex wormhole attack, then the detection process of valid locators is begun.By applying the detection methods 3-5, then other valid locators are determined.Finally, the threshold values are set in order to identify all the valid locators.

    3.3 Secret Key and Signature Generation Process

    The sensor nodes are tiny, and their data sending process is vulnerable.Thus, the proposed approach wants to secure the data communication process.Hence, the secret key is generated for sending the data confidentially.In addition, the signature is created to validate the sent message.

    3.3.1 Secret Key Generation Process

    When the sensor node interacts either with an adjacent sensor node or the base station, then it requires to generate the secret key for interacting and sending the data.

    Let us assume that the sensor node ‘SN’ intends to communicate, then a secret key is calculated as:

    Fori∈{0,1}, then two hash values ‘Hv’should be calculated.Hence,O1.Thus, the output produces a secret key ‘Sk’calculated by

    whereTk: Transaction key.

    3.3.2 Signature Generation Process

    The signature must be calculated, and the sensor node obtains the received file ‘X’.The file X must be split into ‘m’number of the chunks ‘ck’that can be written as

    whereCt: Total number of the chunks

    The sensor node computes the pair of the signature

    {Sk,Tk}for each file of chuck.

    First, Calculating two hash value as:

    Hv=L2(filename)

    xk=L3(qk,SNid,filename),

    qk: chunk’s pointerckin the given fileX, 1 ≤k≤m.

    Once two hash values are calculated, then start a file of secret sharingSS(τ,d)withz(x)=Hv+q1x+...+qr-1xr-1and calculatesr-1points.

    Up: A universal parameter.

    Finally, compute the number of the random variables ‘n’given by

    vk∈Kt,1 ≤k≤n, then calculates

    wherevk: Random variable

    Therefore, the signature generation process is secure that also supports the sensor nodes to avoid impersonation and identity attacks.

    4 Experimental Results

    To validate the effectiveness of the proposed MSD approach, the simulation is conducted using OMNET++ 5.6.2 simulator.Based on the simulation results, the performance of MSD approach has been analyzed and compared with existing state-of-the-art schemes: Hybrid Algorithm to Eliminate Wormhole Attack (HAW) [20], Dynamic Detection and Prevention (DDP) [21],and Wormhole and Gray attack (WGA) [22].The sensor nodes are distributed randomly to serve the data sending process.The deployed sensor nodes are connected using the end-to-end reliable and bi-directional approach.

    The main goal of the simulation is to balance the bandwidth usage and proper data exchange.Several scenarios (Malicious and Non-Malicious) are generated to conclude the realization of the proposed approach.The simulation scenarios resemble the tangible WSN situation.The given outcomes demonstrate alike to a realistic environment.The simulation network consists of 450×450 square meters with 270 sensor nodes.The transmission and sensing ranges are 45 and 30, respectively.Each sensor node has 80 Kb/Sec bandwidth capacity and buffers the 80 frames.The size of the data packet is 512 bytes with 10 seconds’pause time, and the entire simulation takes 15 minutes.The summary of the simulation parameters is given in Tab.2.

    Table 2: Summary of simulation parameters

    Based on simulation outcomes, the following metrics have been achieved.

    ? Accuracy

    ? Detection (false negative, true positive and false positive)

    4.1 Accuracy

    Accuracy requires both precision and authenticity.Fig.4 shows the accuracy of the proposed MSD and other contending schemes (HAW, DDP, and WGA).The accuracy of the proposed approach and contending approaches has been measured using the variable number of valid sensor nodes up to maximum 180 with the 10% malicious sensor nodes.The result demonstrates that the MSD produced a maximum of 99.93% accuracy.Whereas other contending schemes produced 98.74%-99.47%.

    Figure 4: Accuracy of proposed MSD and contending with 180 nodes

    When the number of sensor nodes increase then, accuracy is marginally affected with 10%malicious nodes.The results demonstrate that proposed MSD obtain 99.904% accuracy with 270 sensor nodes.Whereas, the contending approaches obtain the accuracy 97.9%-98.6% with 270 sensor nodes.HAW produced less accuracy with 270 sensor nodes as shown in Fig.5.The testing procedure involves true negative, and true positive.Thus, the accuracy is given by:

    whereTp: True positive,Tn: True negative,Twm: Total wormhole attacks.

    Figure 5: Accuracy of proposed MSD and contending HAW, DDP, and WGA with 270 sensor nodes

    The reason behind better accuracy for the proposed approach is to use five detection methods and secret key and signature generation processes that determine the precise true negative and true positive successfully.

    Figure 6: False positive rate and true positive rate for proposed MSD and competing schemes(HAW, DDP, and WGA)

    4.2 Detection(True Positive,False Negative and False Positive)

    The proposed MSD and contending schemes (HAW, DDP, and WGA) have been measured using False-positive ‘Fpos’and true positive ‘Tpos’rates.True positive and false positive rates are depicted in Fig.6.It has been observed, based on the outcomes of the simulation that the proposed MSD possesses a greater true positive rate.On the other hand, contending schemes have a lesser true positive with the false positive rates.DDP gets lower positive rate.False negative‘Fneg’and true positive rates have been depicted in Fig.7.

    Figure 7: False negative rate and true positive rate for proposed MSD and competing schemes(HAW, DDP, and WGA)

    The trend of the result in the graph demonstrates that the proposed MSD gets a higher true positive rate, and only 0.015 false-negative rates are detected, while contending schemes show the higher false-negative rate that is counted as 0.023-0.072.MSD gains the higher false-negative rage that is measured to be 0.072.Based on the outcomes, it has been confirmed that the proposed scheme attains the true higher positive and gains lower false-negative rates.Thus, true positive,false positive and false negative rates can be calculated using Eqs.(17)-(19).

    whereFpos(r): False positive rate;Tneg: True negative;Fneg(r): False negative rate, andTpos(r): True positive rate.

    5 Conclusion

    A new multi-detection scheme has been executed for detecting the wormhole attacks in WSNs over the distributed environment.In the proposed scheme, different integrated detection modules implemented to systematically detect, recover, and isolate wormhole attacks.In this multi-step detection (MSD) scheme, the neighbor node validation process plays a crucial role in identifying the infected nodes and the false neighbors.In addition, the proposed MSD can be used to eliminate all fake links (i.e., the links which originate from a wormhole).Finally, the performance of isolation module ensured that detection and recovery are highly effective and thereby isolates the wormhole completely from the network.To support the proposed scheme, different algorithms were executed that provide specific details of how exactly each component (e.g., Wormhole attack detection scheme and Extended Node Validation process) of the proposed scheme was effectively detected and successfully recovered the network inside the distributed environment.Current limitations on assessing after the rerouting and rescheduling in real time traffic management for the detection model should be taken into consideration towards further research.In future, attacks in integrated network scenarios around the distributed environment will be evaluated through nontraditional algorithms for optimum desirability to detect and recover the WSN from the wormhole attacks.

    Acknowledgement:This research was supported by the Deanship of Scientific Research, King Saud University, Kingdom of Saudi Arabia.

    Funding Statement:The author received no specific funding for this study.

    Conflicts of Interest:The author declares that she has no conflicts of interest to report regarding the present study.

    国产av在哪里看| 午夜激情福利司机影院| a级毛片免费高清观看在线播放| 特级一级黄色大片| 97超级碰碰碰精品色视频在线观看| 精品免费久久久久久久清纯| 在线观看美女被高潮喷水网站| 久久午夜福利片| 两个人视频免费观看高清| 国产淫片久久久久久久久| 老司机影院成人| 亚洲成人久久爱视频| 中文字幕av成人在线电影| 亚洲第一区二区三区不卡| 国产成人一区二区在线| 精品一区二区三区av网在线观看| 欧美激情国产日韩精品一区| 一个人看的www免费观看视频| 网址你懂的国产日韩在线| 三级国产精品欧美在线观看| 亚洲av中文av极速乱| 熟女电影av网| 亚洲一区二区三区色噜噜| 欧美区成人在线视频| 伦理电影大哥的女人| 91狼人影院| 免费无遮挡裸体视频| 51国产日韩欧美| 国产人妻一区二区三区在| 久久精品夜色国产| 中文字幕精品亚洲无线码一区| 精品99又大又爽又粗少妇毛片| 日本在线视频免费播放| 亚洲精品456在线播放app| 非洲黑人性xxxx精品又粗又长| 嫩草影院新地址| 十八禁网站免费在线| 欧美一区二区精品小视频在线| 欧美激情久久久久久爽电影| av在线亚洲专区| a级一级毛片免费在线观看| 青春草视频在线免费观看| 性欧美人与动物交配| 欧美性感艳星| 亚洲美女黄片视频| 国内少妇人妻偷人精品xxx网站| 免费在线观看影片大全网站| 人人妻人人看人人澡| 精品一区二区三区av网在线观看| 精品久久久久久久久久久久久| 99在线视频只有这里精品首页| 97在线视频观看| 99在线人妻在线中文字幕| 婷婷色综合大香蕉| 欧美又色又爽又黄视频| 欧美激情久久久久久爽电影| 成人精品一区二区免费| 老女人水多毛片| 亚洲av电影不卡..在线观看| 淫秽高清视频在线观看| 精品乱码久久久久久99久播| 日韩精品青青久久久久久| 亚洲av中文av极速乱| 久久久久免费精品人妻一区二区| 国产久久久一区二区三区| 三级毛片av免费| 亚洲精品国产av成人精品 | 成人鲁丝片一二三区免费| 日韩 亚洲 欧美在线| 国内精品宾馆在线| 高清日韩中文字幕在线| 久久人人精品亚洲av| 日本熟妇午夜| 日韩大尺度精品在线看网址| 国产单亲对白刺激| 精品人妻熟女av久视频| 嫩草影院入口| 激情 狠狠 欧美| 深夜精品福利| 一级a爱片免费观看的视频| 12—13女人毛片做爰片一| 少妇熟女aⅴ在线视频| 一级毛片aaaaaa免费看小| 欧美极品一区二区三区四区| 日韩 亚洲 欧美在线| 成人无遮挡网站| 日本爱情动作片www.在线观看 | 啦啦啦啦在线视频资源| 国产人妻一区二区三区在| 卡戴珊不雅视频在线播放| videossex国产| 日韩三级伦理在线观看| 国产乱人视频| 亚洲第一区二区三区不卡| 亚洲中文字幕一区二区三区有码在线看| 欧美区成人在线视频| 老熟妇乱子伦视频在线观看| 亚洲人成网站在线观看播放| 天堂网av新在线| 国产91av在线免费观看| 97在线视频观看| 色吧在线观看| 高清日韩中文字幕在线| 丰满的人妻完整版| 婷婷精品国产亚洲av在线| 亚洲成人av在线免费| 欧美不卡视频在线免费观看| 91在线观看av| 两性午夜刺激爽爽歪歪视频在线观看| 成人欧美大片| 啦啦啦韩国在线观看视频| 欧美最黄视频在线播放免费| 蜜桃久久精品国产亚洲av| 干丝袜人妻中文字幕| 国产美女午夜福利| av女优亚洲男人天堂| 久久国内精品自在自线图片| 国产精华一区二区三区| 俺也久久电影网| 我要看日韩黄色一级片| 有码 亚洲区| 久久人人爽人人爽人人片va| 久久99热这里只有精品18| 最好的美女福利视频网| 免费在线观看影片大全网站| 国产爱豆传媒在线观看| 97碰自拍视频| 人人妻人人澡欧美一区二区| 国内少妇人妻偷人精品xxx网站| 久久热精品热| 久久欧美精品欧美久久欧美| 亚洲欧美日韩无卡精品| 国产女主播在线喷水免费视频网站 | 亚洲成人久久性| .国产精品久久| 欧美激情久久久久久爽电影| 成人永久免费在线观看视频| 欧美高清成人免费视频www| 啦啦啦韩国在线观看视频| 亚洲在线观看片| 精品人妻一区二区三区麻豆 | 亚洲av中文字字幕乱码综合| 久久久精品大字幕| 国产在视频线在精品| 日本三级黄在线观看| 欧美极品一区二区三区四区| 亚洲国产精品国产精品| 欧美高清性xxxxhd video| 久久久久久久久久久丰满| 色5月婷婷丁香| 欧美一区二区精品小视频在线| 欧美日韩综合久久久久久| 成人特级黄色片久久久久久久| 人妻夜夜爽99麻豆av| 亚洲自拍偷在线| 亚洲中文字幕一区二区三区有码在线看| 精品福利观看| 国产精品亚洲美女久久久| 国产欧美日韩精品一区二区| 欧美日韩国产亚洲二区| 中文字幕人妻熟人妻熟丝袜美| 女人被狂操c到高潮| 精品日产1卡2卡| 久久精品国产鲁丝片午夜精品| 久久精品国产亚洲av天美| 久久精品夜色国产| 一进一出抽搐动态| 国产成人aa在线观看| 欧美丝袜亚洲另类| 久久人人爽人人片av| 最近在线观看免费完整版| 精品一区二区三区视频在线| 国产美女午夜福利| 欧美成人免费av一区二区三区| 晚上一个人看的免费电影| 极品教师在线视频| 国产高清三级在线| 亚洲欧美日韩高清在线视频| 精品国内亚洲2022精品成人| 人妻丰满熟妇av一区二区三区| 国产精品一区二区免费欧美| 国产精品一区二区免费欧美| 欧美高清成人免费视频www| 亚洲人成网站在线观看播放| 久久精品国产亚洲av天美| 欧洲精品卡2卡3卡4卡5卡区| 色尼玛亚洲综合影院| 国产精品不卡视频一区二区| 成人美女网站在线观看视频| 啦啦啦观看免费观看视频高清| 看黄色毛片网站| 欧美激情国产日韩精品一区| 三级男女做爰猛烈吃奶摸视频| 日本黄大片高清| www日本黄色视频网| 美女黄网站色视频| 欧美激情在线99| 久久久久国内视频| 成年免费大片在线观看| 精品人妻一区二区三区麻豆 | 大型黄色视频在线免费观看| 亚洲精品粉嫩美女一区| 高清毛片免费观看视频网站| 美女高潮的动态| 欧美一级a爱片免费观看看| 国产高清视频在线播放一区| 日日撸夜夜添| 一区二区三区免费毛片| 国产av一区在线观看免费| 日韩精品中文字幕看吧| 黄片wwwwww| 俄罗斯特黄特色一大片| 给我免费播放毛片高清在线观看| 淫妇啪啪啪对白视频| 国产黄片美女视频| 国产精品福利在线免费观看| 国产黄a三级三级三级人| 久久午夜亚洲精品久久| 久久草成人影院| 国产午夜精品论理片| 亚洲国产精品sss在线观看| 综合色av麻豆| 熟女人妻精品中文字幕| 一本精品99久久精品77| 99视频精品全部免费 在线| 在线观看一区二区三区| 男女之事视频高清在线观看| 国产精华一区二区三区| 日日摸夜夜添夜夜爱| 国产精华一区二区三区| 亚洲欧美精品综合久久99| 国产又黄又爽又无遮挡在线| 18+在线观看网站| 精品人妻偷拍中文字幕| 亚洲内射少妇av| 亚洲欧美清纯卡通| 国产美女午夜福利| 亚洲不卡免费看| 国产av麻豆久久久久久久| 日韩国内少妇激情av| 国产老妇女一区| 国内少妇人妻偷人精品xxx网站| 日本色播在线视频| 99热只有精品国产| 黄色视频,在线免费观看| 一边摸一边抽搐一进一小说| 亚洲欧美日韩高清专用| 夜夜夜夜夜久久久久| 久久精品国产亚洲av天美| 啦啦啦韩国在线观看视频| 伦理电影大哥的女人| 村上凉子中文字幕在线| 久久久久久久久大av| 国产精品精品国产色婷婷| 成人无遮挡网站| 亚洲美女搞黄在线观看 | 日本熟妇午夜| 日本黄大片高清| 亚洲自拍偷在线| 国产一区二区亚洲精品在线观看| 最后的刺客免费高清国语| 99热6这里只有精品| 成人二区视频| 真实男女啪啪啪动态图| 少妇高潮的动态图| 最好的美女福利视频网| 国产国拍精品亚洲av在线观看| 嫩草影院新地址| 老司机影院成人| 性欧美人与动物交配| 国产精品一区二区免费欧美| 色综合色国产| av在线观看视频网站免费| 亚洲自偷自拍三级| 亚洲熟妇熟女久久| 亚洲aⅴ乱码一区二区在线播放| 亚洲成人久久爱视频| 亚洲不卡免费看| 成人精品一区二区免费| 在线天堂最新版资源| 国产不卡一卡二| 欧美性猛交╳xxx乱大交人| 国产成人a∨麻豆精品| 成年免费大片在线观看| 欧美一级a爱片免费观看看| 色综合色国产| 日产精品乱码卡一卡2卡三| 少妇的逼好多水| 国内精品宾馆在线| 人妻久久中文字幕网| 国产精品电影一区二区三区| 国产精品乱码一区二三区的特点| 伦精品一区二区三区| 日韩人妻高清精品专区| 亚洲精品日韩在线中文字幕 | 欧美不卡视频在线免费观看| 久久欧美精品欧美久久欧美| 亚洲av免费在线观看| 亚洲av熟女| 性欧美人与动物交配| 亚洲精华国产精华液的使用体验 | av.在线天堂| eeuss影院久久| 亚洲最大成人av| 国产黄色视频一区二区在线观看 | 国内精品美女久久久久久| 少妇被粗大猛烈的视频| 97在线视频观看| 一本一本综合久久| 亚洲不卡免费看| 大又大粗又爽又黄少妇毛片口| 网址你懂的国产日韩在线| 人人妻人人澡欧美一区二区| 哪里可以看免费的av片| 18禁在线无遮挡免费观看视频 | 亚洲第一区二区三区不卡| 日韩精品有码人妻一区| 深爱激情五月婷婷| av女优亚洲男人天堂| 国产又黄又爽又无遮挡在线| 99久久九九国产精品国产免费| 亚洲真实伦在线观看| 亚洲av成人av| 男插女下体视频免费在线播放| 国产精品久久电影中文字幕| 亚洲国产日韩欧美精品在线观看| 亚洲欧美精品自产自拍| 亚洲美女视频黄频| 综合色丁香网| 欧美色欧美亚洲另类二区| 日韩在线高清观看一区二区三区| 我的老师免费观看完整版| 日本与韩国留学比较| 精品久久久久久久久av| 欧美色视频一区免费| 丝袜喷水一区| 日韩成人伦理影院| 国产成人精品久久久久久| 久久国产乱子免费精品| 露出奶头的视频| aaaaa片日本免费| 国产亚洲精品av在线| 午夜福利在线在线| 亚洲熟妇中文字幕五十中出| 最近手机中文字幕大全| 男女那种视频在线观看| 国内精品美女久久久久久| 色综合站精品国产| 免费在线观看成人毛片| 看十八女毛片水多多多| av国产免费在线观看| 亚洲欧美日韩卡通动漫| 性欧美人与动物交配| 国产在线男女| 91午夜精品亚洲一区二区三区| 日韩精品有码人妻一区| 丝袜美腿在线中文| 中文字幕免费在线视频6| 国产黄片美女视频| 一级a爱片免费观看的视频| 国产精品精品国产色婷婷| 成人鲁丝片一二三区免费| 国产成人freesex在线 | 春色校园在线视频观看| 午夜久久久久精精品| 夜夜看夜夜爽夜夜摸| 波多野结衣高清作品| 最近在线观看免费完整版| 一级毛片aaaaaa免费看小| 日韩人妻高清精品专区| 狂野欧美激情性xxxx在线观看| 午夜激情福利司机影院| 天堂av国产一区二区熟女人妻| 91午夜精品亚洲一区二区三区| 黄色视频,在线免费观看| 日本黄色片子视频| 日韩在线高清观看一区二区三区| 午夜福利高清视频| 亚洲最大成人av| 性欧美人与动物交配| 精品少妇黑人巨大在线播放 | 国产欧美日韩一区二区精品| 精品久久久久久久久久免费视频| 熟女电影av网| 免费高清视频大片| 51国产日韩欧美| 亚洲欧美成人精品一区二区| 欧美日本亚洲视频在线播放| 一夜夜www| 直男gayav资源| 国产一级毛片七仙女欲春2| 天堂√8在线中文| 成人性生交大片免费视频hd| 亚洲中文日韩欧美视频| 久久久午夜欧美精品| 日韩欧美免费精品| 极品教师在线视频| 国产黄片美女视频| 日日撸夜夜添| 久久久色成人| 麻豆一二三区av精品| 99国产极品粉嫩在线观看| 在线观看美女被高潮喷水网站| 精品午夜福利视频在线观看一区| 欧美激情久久久久久爽电影| 国产伦精品一区二区三区视频9| 欧美成人a在线观看| 真实男女啪啪啪动态图| 亚洲成人久久性| 激情 狠狠 欧美| 老司机午夜福利在线观看视频| 婷婷亚洲欧美| 久久99热这里只有精品18| 美女cb高潮喷水在线观看| 成人欧美大片| 亚洲美女黄片视频| 亚洲国产精品成人综合色| 中文在线观看免费www的网站| 精品一区二区三区视频在线观看免费| 精品午夜福利在线看| 热99re8久久精品国产| 内射极品少妇av片p| 国产蜜桃级精品一区二区三区| 美女cb高潮喷水在线观看| 久久久久久久久中文| 自拍偷自拍亚洲精品老妇| 亚洲av第一区精品v没综合| 色尼玛亚洲综合影院| 久久久久久九九精品二区国产| 欧美激情在线99| 精品久久久久久成人av| 国产精品1区2区在线观看.| 国产精品国产三级国产av玫瑰| 在现免费观看毛片| 日韩欧美在线乱码| 草草在线视频免费看| 简卡轻食公司| 国内精品一区二区在线观看| 国内揄拍国产精品人妻在线| 亚洲va在线va天堂va国产| 免费一级毛片在线播放高清视频| 欧美日韩国产亚洲二区| 日韩精品有码人妻一区| 一边摸一边抽搐一进一小说| 日韩欧美国产在线观看| 精品一区二区三区人妻视频| 九九热线精品视视频播放| 亚洲精品456在线播放app| 色播亚洲综合网| 少妇熟女欧美另类| 久久久久国产网址| 国产一区亚洲一区在线观看| 国产中年淑女户外野战色| h日本视频在线播放| 久久久久久久久久黄片| 国产真实乱freesex| 日本熟妇午夜| 床上黄色一级片| 成熟少妇高潮喷水视频| 你懂的网址亚洲精品在线观看 | 国产69精品久久久久777片| 亚洲色图av天堂| 女生性感内裤真人,穿戴方法视频| 亚洲精品456在线播放app| 麻豆久久精品国产亚洲av| 免费大片18禁| 日本一本二区三区精品| 波多野结衣高清无吗| 两个人视频免费观看高清| 精品国内亚洲2022精品成人| 18禁黄网站禁片免费观看直播| 午夜福利视频1000在线观看| 欧美人与善性xxx| a级毛片免费高清观看在线播放| 精品人妻一区二区三区麻豆 | 九九热线精品视视频播放| 直男gayav资源| 亚洲精品一区av在线观看| 狂野欧美白嫩少妇大欣赏| 一级黄色大片毛片| 18禁在线播放成人免费| 淫妇啪啪啪对白视频| 欧美日韩精品成人综合77777| 能在线免费观看的黄片| 老熟妇乱子伦视频在线观看| 久久人人爽人人爽人人片va| 精品99又大又爽又粗少妇毛片| 午夜福利高清视频| 午夜免费激情av| 欧美激情国产日韩精品一区| 精品午夜福利在线看| 老司机福利观看| 两个人的视频大全免费| 女人十人毛片免费观看3o分钟| 亚洲丝袜综合中文字幕| 看非洲黑人一级黄片| 日韩 亚洲 欧美在线| 在线观看66精品国产| 欧美性猛交╳xxx乱大交人| 国产色爽女视频免费观看| 自拍偷自拍亚洲精品老妇| 亚洲最大成人手机在线| 又黄又爽又免费观看的视频| 国产精品三级大全| 久久精品国产鲁丝片午夜精品| 日本五十路高清| 99久国产av精品国产电影| 成人高潮视频无遮挡免费网站| 亚洲av成人av| 日本在线视频免费播放| 村上凉子中文字幕在线| 国产真实乱freesex| 国产黄片美女视频| 我要搜黄色片| 看片在线看免费视频| 亚洲自偷自拍三级| 直男gayav资源| 久久精品国产自在天天线| 日韩 亚洲 欧美在线| 变态另类成人亚洲欧美熟女| 深爱激情五月婷婷| 日韩大尺度精品在线看网址| 菩萨蛮人人尽说江南好唐韦庄 | 欧美最黄视频在线播放免费| 99热网站在线观看| 成人鲁丝片一二三区免费| 中文字幕av成人在线电影| 国产亚洲精品久久久com| 婷婷精品国产亚洲av| 最近中文字幕高清免费大全6| 天堂av国产一区二区熟女人妻| 国产精品一及| 国产色爽女视频免费观看| 久久精品国产清高在天天线| 色尼玛亚洲综合影院| 男女做爰动态图高潮gif福利片| 一卡2卡三卡四卡精品乱码亚洲| 色噜噜av男人的天堂激情| 色av中文字幕| 婷婷色综合大香蕉| 国产视频内射| 12—13女人毛片做爰片一| 最近手机中文字幕大全| 亚洲经典国产精华液单| 淫秽高清视频在线观看| 国产激情偷乱视频一区二区| 国产av不卡久久| 亚洲在线自拍视频| 国产私拍福利视频在线观看| 欧美国产日韩亚洲一区| 成人三级黄色视频| 欧美成人免费av一区二区三区| 国产一区二区三区av在线 | 美女cb高潮喷水在线观看| 三级国产精品欧美在线观看| 免费人成视频x8x8入口观看| 看免费成人av毛片| 一夜夜www| 伊人久久精品亚洲午夜| 观看美女的网站| 中文资源天堂在线| 校园人妻丝袜中文字幕| 成人永久免费在线观看视频| 国产精品精品国产色婷婷| 日韩在线高清观看一区二区三区| 亚洲无线在线观看| 午夜视频国产福利| 亚洲精品粉嫩美女一区| 可以在线观看毛片的网站| 国产国拍精品亚洲av在线观看| 午夜精品一区二区三区免费看| 久久久久久久久久黄片| 中文在线观看免费www的网站| 日韩欧美一区二区三区在线观看| 精品99又大又爽又粗少妇毛片| 黄片wwwwww| 精品无人区乱码1区二区| 国产乱人视频| 美女 人体艺术 gogo| 嫩草影视91久久| 久久精品夜色国产| 波多野结衣高清无吗| 一进一出抽搐动态| 欧美一区二区精品小视频在线| 在线免费十八禁| 国产高清视频在线播放一区| 久久午夜亚洲精品久久| 精品一区二区三区视频在线观看免费| 中国美女看黄片| 国语自产精品视频在线第100页| 免费搜索国产男女视频| 三级男女做爰猛烈吃奶摸视频| 久久午夜福利片| 麻豆久久精品国产亚洲av| 99久久无色码亚洲精品果冻| 免费av不卡在线播放| 俺也久久电影网| av.在线天堂| 亚洲欧美日韩高清专用| 国内少妇人妻偷人精品xxx网站| 亚洲人与动物交配视频| 欧美又色又爽又黄视频| 亚洲一区高清亚洲精品| 婷婷色综合大香蕉| 高清毛片免费看| 99久久中文字幕三级久久日本| 国产成人a区在线观看| 国产精品三级大全| 日韩成人伦理影院| 精品免费久久久久久久清纯| 亚洲国产精品合色在线| 卡戴珊不雅视频在线播放| 亚洲专区国产一区二区| 国模一区二区三区四区视频| 欧美三级亚洲精品|