• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

    2022-03-14 09:21:56InsafUllahHiraZahidFahadAlgarniandMuhammadAsgharKhan
    Computers Materials&Continua 2022年3期

    Insaf Ullah,Hira Zahid,Fahad Algarni and Muhammad Asghar Khan

    1Hamdard Institute of Engineering and Technology,Islamabad,44000,Pakistan

    2Department of Information Technology,Abbottabad University of Science and Technology,Abbottabad,Pakistan

    3College of Computing and Information Technology,The University of Bisha,Bisha,Saudi Arabia

    *Corresponding Author:Insaf Ullah.Email:insafktk@gmail.com

    Received:29 January 2021;Accepted:06 May 2021

    Abstract: When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others.Accessing the big data generated by these applications in Cloud Servers(CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet.Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption.A number of researchers have developed schemes to address issues related to access control in the IoT literature,however,the majority of these schemes are based on homogeneous nature.This will be neither adequate nor practical for heterogeneous IoT environments.In addition, these schemes are based on bilinear pairing and elliptic curve cryptography,which further requires additional processing time and more communication overheads that is inappropriate for real-time communication.Consequently, this paper aims to solve the above-discussed issues,we proposed an access control scheme for IoT environments using heterogeneous signcryption scheme with the efficiency and security hardiness of hyperelliptic curve.Besides the security services such as replay attack prevention, confidentiality, integrity, unforgeability,non-repudiations, and forward secrecy,the proposed scheme has very low computational and communication costs, when it is compared to existing schemes.This is primarily because of hyperelliptic curve lighter nature of key and other parameters.The AVISPA tool is used to simulate the security requirements of our proposed scheme and the results were under two backbends (Constraint Logic-based Attack Searcher (CL-b-AtSER) and On-the-Fly Model Checker (ON-t-FL-MCR))proved to be SAFE when the presented scheme is coded in HLPSL language.This scheme was proven to be capable of preventing a variety of attacks,including confidentiality, integrity, unforgeability, non-repudiation, forward secrecy,and replay attacks.

    Keywords: Internet of Things (IoT); access control; big data; heterogeneous signcryption

    1 Introduction

    The Internet of Things (IoT) represents a system of interconnected objects/things and devices that communicate through the Internet in a continuous manner [1-3].The notion “things” in this context may refer to any virtual or physical object that can be assigned a unique identity,such as an internet protocol (IP) address or an identity number (ID).Most of these services are equipped with sensors to enable a dynamic communication of information and events [4].So, the IoT in basic terms can be expressed as a roadmap of things.The majority of IoT devices are referred to as smart because of its ability to communicate data received from their surroundings without the need for human intervention [5].Besides that, when looking at networks, we find out that people have already witnessed connecting objects or devices through wires, often known as cabled or wired connections, then wireless sensor networks have also been implemented (connected through wireless protocols) [6].The mobile internet has encountered exponential growth multiple times since the establishment of Wireless Sensor Networks (WSN) and has become the backbone of information networks connecting human society [7].As a result, it is apparent that WSN is associated with IoT due to certain unique features and functionalities [8].

    Prior studies within this field have noted the importance of security as a crucial requirement for IoT communications [9], with an increased emphasis on cryptography, which is described as“the practice and analysis of techniques for secure data communication while being transmitted through networks.” There are three main techniques associated with cryptography.These are public key infrastructure (PKI), certificateless cryptosystem (CLC), and identity-based cryptosystem(IBC).The first technique in cryptography types is PKI based method.The most prominent limitation in PKI is its unsuitable traditional implementation in IoT.The projecting factor to this is the certificate management overhead i.e., storage, distribution, and revocation of certificates [10].The second technique in cryptography types is IBC [11], which was introduced to reduce the burden on traditional PKI.IBC recommends using a publicly recognized string as a public key,which reduces the cost of PKI certificate renewal.The IBC, being Identity-Based, appeared to be more vulnerable to third party hacker attacks (key escrow problem).This is classified as a major obstacle that needs to be tackled [12].To solve this issue, the third technique of cryptography,called CLC, was developed with certificate-less based cryptography [13].CLC is a form of IDbased cryptography that addresses the problem of key escrow.The key generation center (KGC)creates a partial private key for users and distributes it over a secure network.The user will then create his/her private and public keys using the partial private key obtained and some randomly generated numbers.All of the above-mentioned debates used homogeneous cryptography, which meant that the sender and receiver shared the same security domain, making the network more vulnerable.The vulnerability necessitates the use of a heterogeneous signcryption scheme, in which the sender and receiver have separate security domains, thus protecting the network from different cyber or intruder attacks [7].Combining both PKI and CLC techniques is required to generate heterogeneous signcryption keys.The advantage of combining CLC and PKI is that it protects the network from intruders by only disclosing the original keys to the sender and receivers.

    In addition, previous studies of access control for IoT environments have developed various schemes that encountered the mutual shortcoming in terms of their roots as mathematical algorithms, their massive costs and huge computations.Bilinear pairing method is the first algorithm that has contributed significantly in this context [14], which experiences huge pairing and RSA(“Rivest-Shamir-Adleman).The Bilinear Pairing method appeared to be worse than RSA since it requires large pairing computations and passes through a map-to-function calculation [14].In order to address the mutual inefficiencies in both RSA and Bilinear, a recent approach called “Elliptic Curve Cryptography,” or “ECC,” was developed [15-17].The most distinguished attributes of ECC seem to be its small size of parameter, private key, identity, public key and certificate.The inflexibility and efficiency of security in ECC is based on small key size of 160 bits [18].For devices that highly require resources, the 160 bit key-size of ECC is insufficient, as it was not suitable and affordable.To address this issue, we propose a new method called “Hyper Elliptic Curve Cryptography,” or “HECC,” which is a generalized form of ECC.It provides the same security level as RSA, Bilinear, and ECC, but with a smaller key, identity and certificate size of just 80 bits [19].For energy-constrained devices, HECC is proved to be the most appropriate,cost-effective, and efficient scheme.As a result, we have incorporated the following new features to this paper:

    ? We designed a heterogeneous signcryption (Users belongs to CLC and the sensor nodes uses the concept of IBC) based on Hyper elliptic curve.

    ? The new scheme assures that the security properties of Replay Attack, confidentiality,integrity, Unforgeability, Non-repudiations, and forward secrecy, respectively.

    ? The AVISPA Tool is used to simulate the security requirements of the proposed scheme and the result under two backbends (Constraint Logic-based Attack Searcher (CL-b-AtSER)and On-the-Fly Model Checker (ON-t-FL-MCR)) are SAFE when the proposed scheme is coded in HLPSL language.

    ? By applying the concept of hyper elliptic curve, this scheme will significantly reduce the computational cost timing and require smaller amount of bits for communication.

    The paper is organized as follows: Section 1 contains a brief introduction, Section 2 encompasses the advantages and disadvantages of related work, Section 3 includes the syntax of heterogeneous signcryption, Section 4 represents the network model, Section 5 comprises the proposed heterogeneous signcryption for IoT, Section 6 covers the security analysis, Section 7 covers the computational cost, and Section 8 involves the communication cost, Section 9 includes scheme simulation, and Section 10 presents the conclusion.

    2 Literature Review

    Recently, access control techniques for IoT environments have attracted a considerable amount of scholars due to its vital roles in achieving higher levels of security.Li et al.[20], have developed a new concept about an access control strategy for IoT environments.The study incorporated the heterogeneous signcryption (e.g., the sender belongs to CLC and the receiver uses the concept of IBC) on the basis of bilinear pairing cryptosystem.However, since bilinear pairing requires additional resources, this scheme must be slower in terms of computational time and communication delay time.Challa et al.[21], proposed an ECC based scheme to provide an access control mechanism to contemporary IoT environments.Then, Chaudhry et al.[22], claimed that the Challa et al.scheme has higher correctness rates and capable of address certain issues.After that, Luo et al.[8], developed a new scheme using signcryption in heterogeneous nature (e.g.,the sender belongs to CLC and the receiver uses the concept of IBC).However, due to more resources demanding nature of bilinear pairing, the presented scheme suffers from the issur of slow computational time and communication delays.Das et al.[4] designed a new approach for device-to-device access control in IoT on the bases of ECC.Nevertheless, Chaudhry et al.[23],proved that Das et al.scheme was vulnerable to impersonation and man-in-middle attacks.The Authors then proposed a new scheme to address such issues.Malani et al.[24], offered an anonymous scheme which provide access control policy for IoT devices.ECC is also used in this scheme.As a result of ECC’s higher resource requirements, the proposed schemes in [4,21,23,24]must be slower in computational time and communication delay time, and are not suitable for heterogeneous IoT environments, because they used the same nature cryptography for sender and receiver, which can be vulnerable at certain times.As a result, providing a heterogeneous access control scheme based on heterogeneous signcryption has become vital (e.g., the sender belongs to CLC and the receiver uses the concept of PKI) using the difficult problem of a hyper elliptic curve, that requires smaller keys and parameters.As a result, such a scheme is expected to achieve higher levels of security for IoT environments.

    3 Syntax of Heterogeneous Signcryption

    Heterogeneous signcryption contains the steps such as Setup, PKI Key Generation, Certificateless (CL) Key Generation (CLKG), CL-Partial Private Key Processing (CL-PPKG), CL-Secret Value Selection (CL-SVS), CL- Private Key Processing (CL-PKG), CL-Public Key Processing (CLPBKG), CL-Signcrypt (CL-SCT), and CL-Un-Signcrypt (CL-Un-SCT), respectively.The definition of each step is explained in the following sections.

    3.1 Setup

    GivenJas a security parameter, the application provider (AP), first chooseζas his secret key and make his public key asδ.Then, it makesβas a public parameter param and keeps secretζthen publishedβ.

    3.2 PKI Key Generation

    A receiver with PKI picks a private keyRprwith a random manner and calculates his/her public key asRpb.

    3.3 Certificateless(CL)Key Generation(CLKG)

    3.3.1 CL-Partial Private Key Processing(CL-PPKG)

    The application provider (AP) picks a random numberΦand generatesX,η, andW.It setsWis a partial private key and send the tuple (X,W) via a secure channel to sender.

    3.3.2 CL-Secret Value Selection(CL-SVS)

    The sender picks a random numberωsand setωsis a secret value.

    3.3.3 CL-Private Key Processing(CL-PKG)

    The sender makes his private key like thatSpr=(W,ωs).

    3.3.4 CL-Public Key Processing(CL-PBKG)

    The sender makes his public key like thatSpb=(X,μs).

    3.3.5 CL-Signcrypt(CL-SCT)

    By using the message(M),Rpb, andSpras an input, the sender can make and sendψto the receiver.

    3.3.6 CL-Un-Signcrypt(CL-Un-SCT)

    By usingψ,Spb, andRpras an input, the receiver can verifyψthat it is either valid or not.

    4 Network Model

    Fig.1 illustrates our new model for access control of wireless sensor network within the IOT environments utilizing heterogeneous signcryption (Certificateless to PKI).Itcontains six participants, named, the internet users, cloud server, network manager, sensor nodes, the Internet, and controller, respectively.When users require data from sensor nodes, they send their identity to the network manager, who then generates a partial private key for them and transfer it back to them through a secure network.After that, using the concept of a certificateless based Cryptosystem,users perform the signcryption process on the data request query and transmit it to the controller through an open network.The controller first verifies the public key of the receiver from the network manager and then verifies the received signcrypted query by performing the unsigncryption process.Note that for the unsigncryption process the controller used the functionality of PKI.After verifying the signcrypted query, the controller collects the data from sensors and encrypt this data by using the “Advanced Encryption Standard (AES)” algorithm and transmits the encrypted data to the users.In this case, the cloud server is responsible for storing the vast amount of data generated by the relevant users.

    Figure 1: Proposed network model

    5 Construction of Proposed Heterogeneous Signcryption for IoT

    The explanation of each step-in construction of the proposed scheme is described in the following subsections.

    5.1 Setup

    GivenJas a security parameter, the application provider (AP), first chooseζ∈{1,2,3,...,n-1} his secret key and make his public key asδ=ζ·D.Then, it selects a triple (hx,hy) as a hash function and setβ=(hx,hy,hy,δ,D,J,HEC) as a public parameter param.Then, AP keeps secretζand publishedβ.

    5.2 PKI Key Generation

    A receiver with PKI pick a private keyRpr∈{1,2,3,...,n-1}with a random manner and calculates his/her public key as.

    5.3 Certificateless(CL)Key Generation(CLKG)

    It contains the following four steps:

    5.3.1 CL-Partial Private Key Processing(CL-PPKG)

    The application provider (AP) picks a random numberΦ∈{1,2,3,...,n-1}and makeX=Φ·D,η=hx(id,X), andW=Φ+ζη.It setsWis a partial private key and send the tuple(X,W) via a secure channel to sender.

    5.3.2 CL-Secret Value Selection(CL-SVS)

    The sender picks a random numberωs∈{1,2,3,...,n-1}and setωsis a secret value.

    5.3.3 CL-Private Key Processing(CL-PKG)

    The sender makes his private key like thatSpr=(W,ωs).

    5.3.4 CL-Public Key Processing(CL-PBKG)

    The sender makes his public key like thatSpb=(X,μs=ωs·D).

    5.4 CL-Signcrypt(CL-SCT)

    By using the message (M),Rpb, andSpras an input, the sender can do the following process:

    a) It picksU∈{1,2,3,...,n-1}uniformly

    b) ComputeS=U·DandQ=r·D, where r=hy(M,S)

    c) CalculateZ=M⊕hz(Q)and

    d) CalculateP=U·Rpb, setψ=(Z,?,P), and sendψto the receiver.

    5.5 CL-Un-Signcrypt(CL-Un-SCT)

    By usingψ,Spb, andRpras an input, the receiver can do the following process:

    a) CalculateS=Rpr·PandQ=S+?(μs+X+η·δ))

    b) CalculateZ=M⊕hz(Q)and r=hy(M,S)

    c) Accept onlyψ, ifS=r·D-?(μs+X+η·δ) otherwise display _‖.

    5.6 Security Analysis

    It contains the correctness and the descriptive analysis about replay attack, confidentiality,integrity, unforgeability, non-repudiations, and forward secrecy.Most of the security services are based on hyper elliptic curve discrete logarithm problem.Suppose aDis the devisor belonging to hyper elliptic curve (HEC) andσis the point from prime field of 80 bits, so, findingσfromF=σ·Dis called hyper elliptic curve discrete logarithm problem.

    5.6.1 Correctness

    The receiver first checks the correctness ofS=Rpr·Pas follows:

    Then it checks the correctness ofQ=S+?(μs+X+η·δ)) as follows:

    Finally it accepts onlyψ, ifS=r·D-?(μs+X+η·δ), the correctness as follows:

    5.6.2 Replay Attack

    A replay attack occurs when someone attempts to capture an old message and replay to it.In our scheme, a replay attack is impossible because we add a NC to the message prior to sending it.In this case, NC is included within the message.The receiver then can check whether a NC is new, thus, a replay attack is unachievable in our scheme.

    5.6.3 Confidentiality

    Confidentiality means no one can see the original contents of message other than sender and receiver.In our scheme, sender at the first step encrypts the message (Z=M⊕hz(Q)) through secret key (Q).The secret key is as follows in Eq.(1):

    The attacker has to solve Eq.(1) in order to access the original contents.After solving this equation they have to solve for r because in this, r is private number and it will be calculated by the following Eq.(2):

    To solve Eq.(2), the attacker has to generate a real value for r, which is not possible due to the one way nature of hash function.So, it is quite impossible for an attacker to solve this Eq.(1)because hyper elliptic curve discrete algorithms are required to be solved and this is infeasible for attacker.Hence it is proved that this scheme provides higher levels of confidentiality.

    5.6.4 Integrity

    Integrity means that the receiver receives the message in the same format which has been sent by the sender.In our scheme, before sending the data, sender calculates the hash function of the message is shown as =hy(M,S).Now, if the attacker wants to make any changes to the cipher text (Z), he has to change the plane text (M) as well but he will not be able to do so because he has to solve r=hy(M,S)for which he requires to computeS=U.Dthat was solvable only if it capturedU, which is not possible according to HECDLP.And overall, hash functions are irreversible and the attacker cannot generate the same equation again because the hash function produces new values each time it appears in a message and values are never repeated.As a result,our scheme demonstrates that it is provides the required integrity.

    5.6.5 Unforgeability

    Unforgeability means that no one else than the sender can generate the digital signature.In our scheme, a sender generates digital signature ?=using his three private numbers i.e., (r,U,ωs).Now if the attacker wants to forge the signature.First of all he has to solve for r which is solved through r=hy(M,S), for which he requires to computeS=U·Dthat was solvable only if it capturedU, which is not possible according to HECDLP.And overall,hash functions are irreversible and the attacker cannot generate the same equation again because the hash function produces new values each time it appears in a message and values are never repeated.Secondly, he has to solve forUwhich is solved throughS=U·Dthat was solvable only if it capturedU, which is not possible according to HECDLP.Thirdly, he has to solve forωswhich is solved throughμs=ωs·Dthat was solvable only if it capturedωs, which is not possible according to HECDLP.Thus, making solution three times for HECDLP is infeasible, so,we claim that our scheme provides unforgeability.

    5.6.6 Forward Secrecy

    It means that in case if even the private key (ωs) of sender gets compromised, still the messages the message (Z=M⊕hz(Q)) of the sender remain confidential because sender uses session key (Q=r·D) for the encryption and decryption.The attacker has to make value forQfor accessing the message contents.After makingQ=r·Dthey have to solve for r because in this, r=hy(M,S)is private number for which attacker requires to computeS=U·Dthat was solvable only if it capturedU, which is not possible according to HECDLP.And overall,hash functions are irreversible and the attacker cannot generate the same equation again because the hash function produces new values each time it appears in a message and values are never repeated.Therefore, our scheme confirmed that it provides forward secrecy.

    5.6.7 Non-repudiation

    Non-repudiation means that no one can deny something they said did or commit.In the context of our research, it means that the sender can not deny the signatures because he/she uses his/her private key (ωs), and this is directly associated with the public key of the sender.If he/she denies this signature the network manager can prove it because it is only known by network manager.Hence, it is proved that our scheme also provides non-repudiation.

    6 Cost Analysis

    Before doing the comparison, one must remember that the computational costs are always the main concern for both the sender and receiver.Now in this case, the existing schemes used elliptic curve point multiplication and bilinear pairing.

    6.1 Computational Cost

    These have always been considered the costly options for measuring the computational costs.In our mechanism we are using hyper-elliptic curve divisor multiplication which is considered to be very cheaper than others in measuring computational costs.Tab.1 shows the comparisons of computational cost of Li et al.[20], Challa et al.[21], Luo et al.[8], Das et al.[4], Chaudhry et al.[23], and Malani et al.[24] with the proposed scheme.

    Table 1: Computational cost comparisons with the help of major operations and milli seconds

    According to the experimental results of [25], the following specifications were used to produce the experiments through a PC.

    ? Intel Core i7-7700 CPU@3.6 GHz2.0 GHz

    ? 8GB Random Access memory

    ? pairing-based cryptography library in VC++ 6.0

    So, the single time Pairing Operation (T-Pair), time for multiplication in bilinear pairing(T-P-M), time for multiplication in ECC (T-E-M), are consumed 11.9845, 1.7090, and 0.0321 milliseconds (ms), respectively.Accordingly, the time for multiplication in HECC (T-D-M) will be the half of multiplication in ECC i.e., 0.01605 ms [26-28].

    The Tab.1 represents the major operations used in proposed and those Li et al.[20], Challa et al.[21], Luo et al.[8], Das et al.[4], Chaudhry et al.[23], and Malani et al.[24] as well as the total consumed time in ms.Then, we make Fig.2 which clearly shows the superiority of our scheme in terms of computational cost.

    Figure 2: Computational cost comparisons with the help of major operations and milli seconds

    6.2 Communication Cost

    Here, we perform some computations in Tab.2 regarding making of communication cost comparisons with existing ones that are Li et al.[20], Challa et al.[21], Luo et al.[8], Das et al.[4], Chaudhry et al.[23], and Malani et al.[24].So, we suppose the following terms:

    ? |M| represents plaintext or cipher text size and equals to 60 bits

    ? |G| the group size of bilinear pairing and equals to 256 bits

    ? |Q| the size of ECC point and equals to 160 bits

    ? |N| the size of HECC devisor and equals to 80 bits

    ? |H| the size of hash value and equals to 512 bits

    ? |NON/T| the size of nonce or time stamp and equals to 80 bits in hyper elliptic curve environment and 80 bits in elliptic curve based environment

    ? |ID| represents the size of identity and equals to 80 bits in hyper elliptic curve environment and 160 bits in elliptic curve based environment

    ? |CERT| represents the size of certificate and equals to 80 bits in hyper elliptic curve environment and 160 bits in elliptic curve-based environment.

    Finally, we created Fig.3, which clearly demonstrates our scheme’s superiority in terms of communication costs.

    Table 2: Communication cost comparisons with the help of bits

    Figure 3: Communication cost comparisons with the help of bits

    Figure 4: HLPSL code for sender

    Figure 5: HLPSL code for receiver

    Figure 6: Simulation results of proposed scheme with Constraint Logic-based Attack Searcher(CL-b-AtSER) and On-the-Fly Model Checker (ON-t-FL-MCR)

    7 Simulation Results and Analysis

    By analyzing the security requirement of our scheme regarding man in the middle attack(confidentiality, integrity, Unforgeability, Non-repudiations, and forward secrecy) and Replay Attack, we used AVISPA tool to simulate.AVISPA working under four backend protocol (SATbased Model Checker (SAT-b-MCR), Constraint Logic-based Attack Searcher (CL-b-AtSER),On-the-Fly Model Checker (ON-t-FL-MCR), and Tree automata based on Automatic Approximations for Analysis of Security Protocol (TA-4-SP)) when the scheme is pseudo code is written in High-Level-Protocol-Specification-Language (H-L-P-S-L) and converted to intermediate format(IF) [19].So, we first convert our scheme algorithm into H-L-P-S-L code which contains two main roles that areSender and Receiverin which we used the public and private keys of sender and receiver.The code for Sender and Receiver roles is represented in Figs.4 and 5.We also used nonce and hash functions for sender and receiver.We also set two goals that are authentication on auth_1 and secrecy of sec_2, which mean that security and authenticity.As we mentioned above the proposed scheme ensures the security services of confidentiality, integrity, Unforgeability,Non-repudiations, forward secrecy, and replay attack.So, in this regard, the goal “authentication on auth_1” ensures integrity, Unforgeability, and Non-repudiations and goal “secrecy of sec_2”ensures confidentiality, forward secrecy, and replay attack.We show the simulation result of our scheme in Fig.6.and it is confirmed that the scheme is secured under the functionality of SAT-b-MCR and CL-b-AtSER.

    8 Conclusion

    Achieving higher levels of security in IoT environments is critical for protecting users’privacy and enhancing the overall functionality of such interconnected systems.In this work, we have proposed “an efficient heterogeneous signcryption scheme for access control within IoT environments to address the computational and communication cost issues of the existing approaches.We demonstrated that the proposed scheme prevented various attacks such as confidentiality, integrity,Unforgeability, Non-repudiations, Forward secrecy, and Replay attacks.AVISPA was utilized to perform formal security simulations, and the results supported our claim.We then compared the proposed scheme to existing schemes in terms of “computational costs” and “communication costs”.As a result, our proposed scheme efficiently reduced both computational and communication costs.Accordingly, the proposed scheme proved to be more practical and appropriate than existing schemes for heterogeneous IoT applications.

    Acknowledgement:Authors would like to thanks their universities for the support provided during this research.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    桃花免费在线播放| 免费久久久久久久精品成人欧美视频| 亚洲精品在线美女| 菩萨蛮人人尽说江南好唐韦庄| h视频一区二区三区| 日日夜夜操网爽| 99国产精品一区二区三区| 国产国语露脸激情在线看| 日韩视频一区二区在线观看| 宅男免费午夜| 男女床上黄色一级片免费看| 岛国毛片在线播放| 美女中出高潮动态图| 菩萨蛮人人尽说江南好唐韦庄| 搡老熟女国产l中国老女人| 最近中文字幕2019免费版| 亚洲精品久久成人aⅴ小说| 美女视频免费永久观看网站| 老司机在亚洲福利影院| 日日爽夜夜爽网站| 久久午夜综合久久蜜桃| 爱豆传媒免费全集在线观看| 亚洲天堂av无毛| a级毛片在线看网站| 美女高潮到喷水免费观看| 80岁老熟妇乱子伦牲交| 国产在线观看jvid| 亚洲国产毛片av蜜桃av| 99热全是精品| 女人爽到高潮嗷嗷叫在线视频| 91老司机精品| 亚洲av电影在线观看一区二区三区| 免费不卡黄色视频| 欧美精品人与动牲交sv欧美| 免费观看人在逋| 极品少妇高潮喷水抽搐| 亚洲三区欧美一区| 五月天丁香电影| 9191精品国产免费久久| 国产高清videossex| 久久精品亚洲av国产电影网| 久久人妻福利社区极品人妻图片| 黄色视频不卡| 日韩精品免费视频一区二区三区| 91字幕亚洲| 黑人操中国人逼视频| 青青草视频在线视频观看| 国产极品粉嫩免费观看在线| 最近最新中文字幕大全免费视频| 免费高清在线观看日韩| 十八禁网站免费在线| 久久狼人影院| 青春草视频在线免费观看| 狠狠精品人妻久久久久久综合| 国产老妇伦熟女老妇高清| 黑人欧美特级aaaaaa片| 777米奇影视久久| 久久久久国内视频| 99国产综合亚洲精品| 国产又色又爽无遮挡免| 欧美xxⅹ黑人| videosex国产| 亚洲国产精品一区二区三区在线| 久久av网站| 在线观看免费视频网站a站| 国产精品影院久久| 免费在线观看影片大全网站| 国产精品99久久99久久久不卡| 国产成人精品久久二区二区免费| 久久午夜综合久久蜜桃| 欧美日韩亚洲国产一区二区在线观看 | 又紧又爽又黄一区二区| 9191精品国产免费久久| 真人做人爱边吃奶动态| 中文字幕最新亚洲高清| 少妇人妻久久综合中文| 在线观看免费日韩欧美大片| 狠狠狠狠99中文字幕| 亚洲精品国产精品久久久不卡| 另类亚洲欧美激情| 在线观看人妻少妇| 精品少妇一区二区三区视频日本电影| 免费在线观看视频国产中文字幕亚洲 | 欧美 亚洲 国产 日韩一| 两性午夜刺激爽爽歪歪视频在线观看 | 三上悠亚av全集在线观看| 9色porny在线观看| 免费在线观看黄色视频的| 99国产精品一区二区蜜桃av | 国产真人三级小视频在线观看| 999精品在线视频| 19禁男女啪啪无遮挡网站| 国产在视频线精品| 欧美大码av| 成人18禁高潮啪啪吃奶动态图| 在线av久久热| 色精品久久人妻99蜜桃| 一二三四社区在线视频社区8| 日韩制服丝袜自拍偷拍| 亚洲自偷自拍图片 自拍| 黄片大片在线免费观看| 午夜福利在线免费观看网站| 一个人免费看片子| 亚洲国产精品成人久久小说| 欧美日韩黄片免| 韩国精品一区二区三区| 欧美激情久久久久久爽电影 | 精品亚洲乱码少妇综合久久| 人妻人人澡人人爽人人| 窝窝影院91人妻| 欧美精品av麻豆av| 黄色怎么调成土黄色| 亚洲色图综合在线观看| 91精品国产国语对白视频| 亚洲专区字幕在线| 欧美人与性动交α欧美软件| 色老头精品视频在线观看| 亚洲精品第二区| 精品少妇一区二区三区视频日本电影| 午夜激情av网站| 中文字幕高清在线视频| 国产精品久久久久成人av| 一级毛片女人18水好多| 多毛熟女@视频| 黄色片一级片一级黄色片| 欧美日韩福利视频一区二区| 汤姆久久久久久久影院中文字幕| 汤姆久久久久久久影院中文字幕| 波多野结衣一区麻豆| 免费在线观看黄色视频的| 亚洲第一欧美日韩一区二区三区 | 岛国毛片在线播放| 99国产综合亚洲精品| 午夜福利免费观看在线| 国产有黄有色有爽视频| 美女脱内裤让男人舔精品视频| 国产有黄有色有爽视频| 精品国产乱码久久久久久男人| 一级片免费观看大全| tube8黄色片| 一个人免费看片子| av视频免费观看在线观看| 国产成人系列免费观看| av线在线观看网站| 久久人人97超碰香蕉20202| 18禁观看日本| 国产欧美日韩一区二区三区在线| 久久久精品区二区三区| 水蜜桃什么品种好| av不卡在线播放| 一级毛片精品| 国产1区2区3区精品| 久久国产亚洲av麻豆专区| 国精品久久久久久国模美| 久久久久久久精品精品| 成人18禁高潮啪啪吃奶动态图| 高清在线国产一区| 多毛熟女@视频| svipshipincom国产片| 美女扒开内裤让男人捅视频| 亚洲国产av新网站| 欧美日韩福利视频一区二区| 69精品国产乱码久久久| 亚洲美女黄色视频免费看| 亚洲精品自拍成人| 久久久久国内视频| 在线av久久热| 欧美另类一区| 午夜福利视频精品| 午夜免费鲁丝| xxxhd国产人妻xxx| 啦啦啦在线免费观看视频4| 啦啦啦视频在线资源免费观看| 天堂8中文在线网| 91老司机精品| 成人影院久久| 9色porny在线观看| 国产成人免费无遮挡视频| 搡老熟女国产l中国老女人| 少妇 在线观看| 天天躁夜夜躁狠狠躁躁| 精品人妻一区二区三区麻豆| 日韩欧美一区二区三区在线观看 | 女人久久www免费人成看片| 最近中文字幕2019免费版| 美女大奶头黄色视频| av超薄肉色丝袜交足视频| 欧美日韩一级在线毛片| 大片电影免费在线观看免费| 欧美大码av| 又黄又粗又硬又大视频| 久久人人爽人人片av| 日本五十路高清| 高清视频免费观看一区二区| 国产av精品麻豆| 人成视频在线观看免费观看| 国产精品偷伦视频观看了| 日本av免费视频播放| 99精品久久久久人妻精品| 日本vs欧美在线观看视频| 亚洲成国产人片在线观看| 久久国产亚洲av麻豆专区| 男男h啪啪无遮挡| 一二三四在线观看免费中文在| 欧美 日韩 精品 国产| 搡老岳熟女国产| 一本一本久久a久久精品综合妖精| 久久人妻熟女aⅴ| 日本一区二区免费在线视频| 亚洲免费av在线视频| 一级毛片电影观看| 91精品国产国语对白视频| 久久久久网色| 狠狠精品人妻久久久久久综合| 午夜影院在线不卡| 中文字幕人妻丝袜一区二区| cao死你这个sao货| 亚洲伊人久久精品综合| 正在播放国产对白刺激| 久久久久久久精品精品| 国产亚洲精品一区二区www | 欧美日韩亚洲综合一区二区三区_| 国产精品 国内视频| 亚洲精品乱久久久久久| 丰满迷人的少妇在线观看| 精品高清国产在线一区| 亚洲欧美日韩另类电影网站| 男女午夜视频在线观看| 午夜免费观看性视频| 日本精品一区二区三区蜜桃| 美女高潮喷水抽搐中文字幕| 国产精品自产拍在线观看55亚洲 | 色婷婷久久久亚洲欧美| 美女视频免费永久观看网站| 99国产极品粉嫩在线观看| 日韩精品免费视频一区二区三区| 国产免费现黄频在线看| 免费人妻精品一区二区三区视频| 老司机午夜福利在线观看视频 | 国产精品 国内视频| 久久性视频一级片| 成人国语在线视频| 中文字幕av电影在线播放| 国产精品久久久久久精品电影小说| 精品亚洲成国产av| 老汉色av国产亚洲站长工具| 大香蕉久久成人网| 亚洲欧美成人综合另类久久久| 欧美国产精品一级二级三级| 精品久久久精品久久久| 一区二区三区激情视频| 免费黄频网站在线观看国产| 亚洲国产日韩一区二区| 久久久久国内视频| 狂野欧美激情性xxxx| 在线观看免费高清a一片| 韩国高清视频一区二区三区| 91字幕亚洲| 精品一区二区三卡| 天天添夜夜摸| 亚洲美女黄色视频免费看| 爱豆传媒免费全集在线观看| 丰满少妇做爰视频| 老熟女久久久| 国产亚洲欧美在线一区二区| 久久天躁狠狠躁夜夜2o2o| 亚洲伊人久久精品综合| 国产av国产精品国产| 亚洲精品在线美女| 久热这里只有精品99| 男女之事视频高清在线观看| 免费在线观看黄色视频的| 亚洲av片天天在线观看| 黑人巨大精品欧美一区二区蜜桃| 国产一区二区三区在线臀色熟女 | 精品久久久精品久久久| 中文字幕制服av| 人人妻人人澡人人爽人人夜夜| 黄片大片在线免费观看| 亚洲欧美日韩高清在线视频 | 久久青草综合色| 美女主播在线视频| 久久午夜综合久久蜜桃| 亚洲国产精品成人久久小说| 亚洲国产毛片av蜜桃av| 日韩欧美免费精品| 日韩有码中文字幕| 久久99热这里只频精品6学生| 亚洲精品第二区| 精品人妻在线不人妻| 日韩欧美免费精品| 国产精品亚洲av一区麻豆| 国产精品久久久久成人av| 国产亚洲精品第一综合不卡| 国产一区二区激情短视频 | 亚洲国产欧美一区二区综合| 一区在线观看完整版| 丰满人妻熟妇乱又伦精品不卡| 中文精品一卡2卡3卡4更新| 天堂8中文在线网| 色视频在线一区二区三区| 亚洲av片天天在线观看| 欧美日韩黄片免| 国产精品久久久人人做人人爽| 精品免费久久久久久久清纯 | 激情视频va一区二区三区| 巨乳人妻的诱惑在线观看| 亚洲人成77777在线视频| 国产精品成人在线| 欧美另类一区| 亚洲va日本ⅴa欧美va伊人久久 | 国产一卡二卡三卡精品| 成年美女黄网站色视频大全免费| 日本一区二区免费在线视频| 欧美久久黑人一区二区| 亚洲欧美精品综合一区二区三区| tube8黄色片| 国产精品av久久久久免费| 免费在线观看黄色视频的| 亚洲情色 制服丝袜| 午夜两性在线视频| 91麻豆精品激情在线观看国产 | 久久人妻福利社区极品人妻图片| 欧美日韩一级在线毛片| 国产高清国产精品国产三级| 五月天丁香电影| 男女午夜视频在线观看| 国产精品.久久久| av福利片在线| av在线播放精品| 久久久精品区二区三区| 久久毛片免费看一区二区三区| 男女之事视频高清在线观看| 菩萨蛮人人尽说江南好唐韦庄| 窝窝影院91人妻| 12—13女人毛片做爰片一| 亚洲国产精品999| 久久99一区二区三区| 欧美国产精品一级二级三级| 国产日韩欧美视频二区| 深夜精品福利| 国产欧美日韩一区二区精品| 免费在线观看日本一区| 999久久久精品免费观看国产| 久久久久精品人妻al黑| 超色免费av| 精品一区二区三区av网在线观看 | 久久中文看片网| 欧美黑人欧美精品刺激| 亚洲天堂av无毛| 啦啦啦视频在线资源免费观看| 999久久久国产精品视频| 亚洲人成77777在线视频| 免费不卡黄色视频| 女人爽到高潮嗷嗷叫在线视频| tube8黄色片| 伊人亚洲综合成人网| www.熟女人妻精品国产| 久久人人爽人人片av| 在线永久观看黄色视频| 嫁个100分男人电影在线观看| 一级毛片电影观看| 性色av一级| 亚洲精品美女久久久久99蜜臀| 国产一区二区三区av在线| 久久久久久久久免费视频了| 老熟妇仑乱视频hdxx| 性高湖久久久久久久久免费观看| 日韩制服骚丝袜av| 免费在线观看视频国产中文字幕亚洲 | 免费在线观看影片大全网站| 叶爱在线成人免费视频播放| 老司机福利观看| 久热爱精品视频在线9| 亚洲成人国产一区在线观看| 在线观看免费午夜福利视频| 国产成人a∨麻豆精品| 欧美av亚洲av综合av国产av| 免费女性裸体啪啪无遮挡网站| 99热网站在线观看| 亚洲国产精品成人久久小说| 在线永久观看黄色视频| 美女主播在线视频| 男男h啪啪无遮挡| 国产av一区二区精品久久| 亚洲五月婷婷丁香| 国产成人av激情在线播放| 又紧又爽又黄一区二区| 欧美激情 高清一区二区三区| 欧美亚洲 丝袜 人妻 在线| 国精品久久久久久国模美| 成年av动漫网址| 欧美激情高清一区二区三区| 日韩中文字幕视频在线看片| 岛国在线观看网站| 午夜福利一区二区在线看| 免费高清在线观看视频在线观看| 国产精品一区二区在线不卡| 黄色视频在线播放观看不卡| 国产在线视频一区二区| 性少妇av在线| 日韩免费高清中文字幕av| 久久久精品免费免费高清| 一级,二级,三级黄色视频| 中文字幕av电影在线播放| 男女午夜视频在线观看| 欧美精品一区二区大全| 色视频在线一区二区三区| 国产精品影院久久| 大香蕉久久网| 免费不卡黄色视频| 亚洲午夜精品一区,二区,三区| 宅男免费午夜| 日韩制服骚丝袜av| 建设人人有责人人尽责人人享有的| 亚洲久久久国产精品| 亚洲一卡2卡3卡4卡5卡精品中文| 久久国产亚洲av麻豆专区| 丝袜脚勾引网站| 亚洲成av片中文字幕在线观看| 热99re8久久精品国产| 热99国产精品久久久久久7| 另类亚洲欧美激情| 99精品久久久久人妻精品| 老司机影院成人| 午夜免费观看性视频| 久久香蕉激情| 中文字幕精品免费在线观看视频| 午夜福利一区二区在线看| 中文字幕人妻熟女乱码| 又黄又粗又硬又大视频| 在线永久观看黄色视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲欧美一区二区三区久久| 久久国产精品男人的天堂亚洲| 一区二区三区精品91| 美女福利国产在线| 免费黄频网站在线观看国产| 国产成人精品无人区| 久久影院123| 自线自在国产av| 大型av网站在线播放| 午夜免费鲁丝| 精品亚洲成a人片在线观看| av超薄肉色丝袜交足视频| 91老司机精品| 国产亚洲av片在线观看秒播厂| 亚洲一码二码三码区别大吗| 欧美人与性动交α欧美软件| a级毛片黄视频| 女人久久www免费人成看片| 国产高清国产精品国产三级| 乱人伦中国视频| 国产黄色免费在线视频| 亚洲 欧美一区二区三区| 建设人人有责人人尽责人人享有的| 日韩电影二区| 国产免费福利视频在线观看| 久久这里只有精品19| 国产1区2区3区精品| 国产在线一区二区三区精| 欧美日韩中文字幕国产精品一区二区三区 | 国产精品久久久人人做人人爽| 香蕉丝袜av| 国产欧美日韩一区二区精品| 亚洲全国av大片| 1024香蕉在线观看| 纵有疾风起免费观看全集完整版| 精品久久久久久电影网| 中文字幕最新亚洲高清| 亚洲精品一卡2卡三卡4卡5卡 | 免费观看人在逋| 青春草亚洲视频在线观看| 女人高潮潮喷娇喘18禁视频| 国产成人影院久久av| 丰满少妇做爰视频| 久久亚洲国产成人精品v| 国产区一区二久久| 日韩中文字幕欧美一区二区| 国产精品av久久久久免费| 制服人妻中文乱码| 无遮挡黄片免费观看| 制服诱惑二区| 久久久久网色| 国产精品.久久久| www.熟女人妻精品国产| av天堂在线播放| 又大又爽又粗| 国产成+人综合+亚洲专区| 久久亚洲国产成人精品v| 18禁裸乳无遮挡动漫免费视频| 另类精品久久| 男女下面插进去视频免费观看| 国产成人免费无遮挡视频| 午夜福利一区二区在线看| 亚洲欧美成人综合另类久久久| av免费在线观看网站| 女人久久www免费人成看片| 国产精品 欧美亚洲| 99国产极品粉嫩在线观看| 久久性视频一级片| 一边摸一边抽搐一进一出视频| 性高湖久久久久久久久免费观看| av一本久久久久| av在线老鸭窝| 两人在一起打扑克的视频| 国产精品久久久久久精品古装| 青草久久国产| 丰满饥渴人妻一区二区三| 亚洲精品中文字幕一二三四区 | 亚洲av电影在线观看一区二区三区| 天天躁狠狠躁夜夜躁狠狠躁| 精品熟女少妇八av免费久了| 国产视频一区二区在线看| 亚洲七黄色美女视频| 91精品国产国语对白视频| 久久天堂一区二区三区四区| 日韩中文字幕视频在线看片| 91字幕亚洲| 中文欧美无线码| 国产精品1区2区在线观看. | av片东京热男人的天堂| 999精品在线视频| 中亚洲国语对白在线视频| 不卡av一区二区三区| 一个人免费在线观看的高清视频 | 亚洲精品第二区| 男女下面插进去视频免费观看| 大片免费播放器 马上看| 亚洲男人天堂网一区| 欧美国产精品一级二级三级| 久久国产精品男人的天堂亚洲| 国产麻豆69| 久久久久久久大尺度免费视频| 免费高清在线观看视频在线观看| 亚洲精品av麻豆狂野| 精品亚洲成a人片在线观看| 男女下面插进去视频免费观看| 亚洲精品国产色婷婷电影| 欧美日韩亚洲高清精品| 久久中文字幕一级| 午夜成年电影在线免费观看| 欧美日韩黄片免| 国产精品av久久久久免费| 法律面前人人平等表现在哪些方面 | 丝袜美足系列| 国产xxxxx性猛交| tocl精华| 午夜日韩欧美国产| 精品视频人人做人人爽| 国产色视频综合| 99久久综合免费| 精品一区二区三卡| 欧美精品一区二区免费开放| 丝袜美足系列| 国产精品香港三级国产av潘金莲| 嫁个100分男人电影在线观看| 国产成人免费无遮挡视频| 国产日韩欧美在线精品| 久久天躁狠狠躁夜夜2o2o| 91老司机精品| videos熟女内射| 这个男人来自地球电影免费观看| 日日爽夜夜爽网站| 欧美精品高潮呻吟av久久| 午夜福利在线观看吧| 我的亚洲天堂| 热99久久久久精品小说推荐| 国产激情久久老熟女| 日韩视频在线欧美| 精品久久蜜臀av无| av在线老鸭窝| 国产97色在线日韩免费| av在线app专区| 两人在一起打扑克的视频| 亚洲av成人不卡在线观看播放网 | 午夜两性在线视频| 免费看十八禁软件| 麻豆乱淫一区二区| 18在线观看网站| 亚洲三区欧美一区| 最新的欧美精品一区二区| 久久人人爽人人片av| 又大又爽又粗| 亚洲三区欧美一区| 久久精品亚洲av国产电影网| 性色av一级| 青草久久国产| 超碰97精品在线观看| 亚洲美女黄色视频免费看| 999精品在线视频| 别揉我奶头~嗯~啊~动态视频 | 亚洲精品久久久久久婷婷小说| 国产精品一区二区精品视频观看| 亚洲七黄色美女视频| 男人爽女人下面视频在线观看| 纵有疾风起免费观看全集完整版| 曰老女人黄片| 日韩人妻精品一区2区三区| 又紧又爽又黄一区二区| 日韩大码丰满熟妇| 在线观看www视频免费| 成人黄色视频免费在线看| 欧美 日韩 精品 国产| 日韩有码中文字幕| 欧美+亚洲+日韩+国产| 日韩有码中文字幕| 乱人伦中国视频| 最新在线观看一区二区三区| 国产精品麻豆人妻色哟哟久久| 爱豆传媒免费全集在线观看| 日本欧美视频一区| 中文精品一卡2卡3卡4更新| avwww免费| 久久ye,这里只有精品|