• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Optimal Confidential Mechanisms in Smart City Healthcare

    2022-03-14 09:24:22GopiMuthusamySureshGabrielSanthoshKumarIrinaPustokhina
    Computers Materials&Continua 2022年3期

    R.Gopi,P.Muthusamy,P.Suresh,C.G.Gabriel Santhosh Kumar,Irina V.Pustokhina,

    Denis A.Pustokhin6 and K.Shankar7

    1Department of Computing Science and Engineering,Dhanalakshmi Srinivasan Engineering College,Perambalur,621212,India

    2School of Computing Science and Engineering,Galgotias University,NCR,Delhi,203201,India

    3Department of Computer Science and Engineering,KPR Institute of Engineering and Technology,Coimbatore,641407,India

    4Department of Electrical and Electronics Engineering,K.Ramakrishnan College of Engineering,Tiruchirappalli,621112,India

    5Department of Entrepreneurship and Logistics,Plekhanov Russian University of Economics,Moscow,117997,Russia

    6Department of Logistics,State University of Management,Moscow,109542,Russia

    7Department of Computer Applications,Alagappa University,Karaikudi,630001,India

    Abstract: Smart City Healthcare (SHC2) system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner.The system also concedes the freedom of a patient.IoT is a part of this system and it helps in providing care to the patients.IoTbased healthcare devices are trustworthy since it almost certainly recognizes the potential intensifications at very early stage and alerts the patients and medical experts to such an extent that they are provided with immediate care.Existing methodologies exhibit few shortcomings in terms of computational complexity,cost and data security.Hence, the current research article examines SHC2 security through Light Weight Cipher(LWC)with Optimal S-Box model in PRESENT cipher.This procedure aims at changing the sub bytes in which a single function is connected with several bytes’information to upgrade the security level through Swam optimization.The key contribution of this research article is the development of a secure healthcare model for smart city using SHC2 security via LWC and Optimal S-Box models.The study used a nonlinear layer and single 4-bit S box for round configuration after verifying SHC2 information,constrained by Mutual Authentication (MA).The security challenges, in healthcare information systems, emphasize the need for a methodology that immovably concretes the establishments.The methodology should act practically,be an effective healthcare framework that depends on solidarity and adapts to the developing threats.Healthcare service providers integrated the IoT applications and medical services to offer individuals, a seamless technology-supported healthcare service.The proposed SHC2 was implemented to demonstrate its security levels in terms of time and access policies.The model was tested under different parameters such as encryption time,decryption time,access time and response time in minimum range.Then,the level of the model and throughput were analyzed by maximum value i.e.,50 Mbps/sec and 95.56%for PRESENT-Authorizationcipher to achieve smart city security.The proposed model achieved better results than the existing methodologies.

    Keywords: Smart city; healthcare; security; block cipher; LWC

    1 Introduction

    Smart urban areas are important for a number of players in the society.The advantages and challenges, associated with the incorporation of smart cities, have drawn critical consideration from different players in multiple aspects.A number of analysts poses an important question about the components involved in smart city development such as Internet of Things (IoT),Information Systems (IS), standard software engineering and designing controls [1].At this point,various urban communities have started embracing the idea of smart urban areas.There are four zones dictated by Amsterdam, around the idea of manageability, such as the incorporation of mobility, working, open space, and living [2].Healthcare (HC) IoT supports the patient commitment and service fulfillment by enabling the healthcare providers to invest more energy on doctors associated with them [3-5].In healthcare domain, a combination of detection devices and consumer hardware innovation remains a valuable application since it helps in monitoring a patient’s health [6].These applications encompass assistive conditions that do not require any communication devices or wearables for the consumer.But, they can still overcome the potential difficulties of monitoring different remotely-located individuals [7].The most significant challenge,faced by developing as well as developed nations, is the utilization of remote healthcare facilities.This may decrease a large portion of the administration of chronic diseases and likely to improve the satisfaction of old age people [8,9].Incorporation of remote sensor networks, in healthcare systems, is a developing field for logical examination.Present day healthcare systems require realtime monitoring of patients in terms of vital status with less communication between specialists and the patients [10].Powerful as well as strong cryptographic techniques are crucial to develop a safety-driven application.Because, the remote sensor systems for Smart Cities Health care (SCHC) are prone to cyberattacks that target highly confidential information of the patients such as their personal and physiological details [11].Various stakeholders should be involved in upgrading the infrastructure security required for a remote healthcare service.Healthcare information is reliable, whereas the exchange of information over local network and wireless networks/cloud through internet to server should be secured [12,13].

    The key contribution of this research article is the development of a novel light weight cryptographic technique i.e., PRESENT cipher with S-Box optimization model.Smart city healthcare information is encrypted and decrypted for security purposes.S-box utilizes a similar S-box during every round.This is primarily required or else the dynamic S-Box gets changed in the round of S-box itself, as it relies on key and number of rounds.Dynamic as well as ward key calculation are performed to build the cryptographic quality of security level.To optimize the number of slaps,maximum throughput is achieved in data security and minimum execution time.These reasons made swarm optimization, a preferable method for the current study.Strict Avalanche Criteria is a cryptographic capacity that fulfills the above condition.The major contributions of this work are summarized herewith.

    ? A secure healthcare model is proposed for smart city with the help of SHC2security via LWC and optimal S-Box model

    ? Salp Swarm Optimization (SWO) algorithm is used for effective optimization of S-Box

    ? Entire system is privacy-protected with secure data storage for every patient

    Rest of the paper is organized as follows.Section 2 analyzes the works related to current topic.Section 3 explains the proposed methodology whereas section analyzes the model and the results are discussed in detail.Finally, the paper is concluded in Section 5.

    2 Review of Recent Articles

    People inhabiting the smart urban areas utilize information technology innovations to improve their living conditions.Smart urban areas bring personal satisfaction for its natives, native economy, easy and affordable green transportation, living conditions, and cooperation with government.Ismagilova et al.[14] mentioned that the smart urban communities are becoming a reality in today’s life, thanks to ever-changing information communication technologies that transform the traditional urban communities into smart urban areas.IoT makes these smart urban areas, effective and responsive.Ghani et al.[15] mentioned that the medical technologists can go ahead to develop a new healthcare industry in such smart urban areas since it is easy for them due to the prevalence of conventional types of mechanical developments in previous times.

    Smart healthcare, within smart urban areas, introduces a concept of optoelectronic controller chip.This concept intends to control the micro Light-Emitting Diode (LED) framework utilized in retinal prosthesis.It also includes a separately-addressable low power, small and micro LED cluster, while its outcomes are exemplary.A wireless sensor system is utilized in collecting the medical information, for example, vital signs and a patient’s individual information, which are then transmitted to the cloud server.Hence, Alami et al.[16] mentioned that such crucial and personal information of the individuals, especially medical data, should be handled with utmost privacy.Information security enables restricted access to data, while it has provisions for permitted individuals to have free and simple access to information beyond the security measures.Since the medical information of individuals is sensitive in nature, it becomes inevitable for healthcare service providers to maintain a strong and dependable data security administration in place.The methodologies should be well ahead of, in terms of responding to queries raised by medical fraternity, securing the social insurance information, predicting the requirements and preventing any form of cyberattacks by hackers.

    In spite of the developments achieved so far, the penetration of IoT is low in healthcare applications.There are potential applications that can incorporate IoT such as patient monitoring,resource detectability, and medication organization systems, as opined by Sanchez et al.[17].Rani et al.[18] devised a Lightweight SIMON block cipher to protect the healthcare information with the help of IoT sensor system.The clients in IoHT are selected through metaheuristic algorithm called Hybrid Teaching and Learning Based Optimization (HTLBO).In this case, the current set of healthcare service providers provide full access to medical services to IoT-integrated individuals.

    Secure Healthcare Model (SHM) was proposed by Parah et al.[6] for smart cities.The communication of medical data and safety & privacy concerns regarding the patient’s data are crucial parameters in smart healthcare models.It is pertinent to contain a secure, effective and accessible healthcare system for a smart city.In smart city ecosystem, secure and privacy-preserved smart medical system is important with different elements of technology-enabled healthcare services.A privacy-preserved, secure and mutually-authenticated key agreement protocol was proposed by Khatoon et al.[19] to provide healthcare in smart city environment.Telecare and telemedicine are the two factors that drive the adoption of smart homes.For the past two decades,Telecare Medicine Information System (TMIS) has drawn global attention.Multidisciplinary application and research with TMIS include smart technologies, artificial intelligence, bio-sensing,telecommunications and information processing.

    After reviewing the literature, few research gaps were found which are discussed herewith.The studies conducted earlier proposed the methods that primarily lag behind in performance due to poor data security, worst privacy preservation, high computational complexity, high time consumption, high costs, etc.In order to overcome these drawbacks, the current article proposes SHC2security via LWC with optimal S-Box model.

    Purpose of Healthcare for Smart Cities(SHC2)

    The primary aim of this application i.e., Healthcare for smart cities, is to monitor the vital signs of patients remotely using sensors, devices, and equipment that can capture the required information.Smart gadgets are utilized in healthcare domain to store and predict the fluctuations in vital parameters and to deal with disease data.For most of the cases in all actuality, smart gadgets possess in-built fixed sensors [20].Nowadays, due to the increased awareness about healthcare and wellness, various activities have been included to provide an extensive perspective on wellbeing and prosperity.The penetration of wearable IoT devices has increased among health-conscious individuals in terms of wellness tracker, wellness groups and healthcare evaluation applications in cell phones.These gadgets are simple yet highly useful in screening the vital signs that can lead to necessary medical advice and other arrangements at the right time based on requirement.An example of SHC2is graphically represented in Fig.1 and this procedure share some significant terms as given herewith.

    Figure 1: The healthcare system

    ? Mobile sensors: Dynamic sensors are increasingly applied these days, thanks to its suitability in monitoring a person’s wellbeing or health without interfering his or her day-to-day activities.The sensors can measure few physiological signs/parameters through his or her actions, while a person’s growth can be tracked by fixing sensors in different parts of the body [21].

    ? Engaging patients in health monitoring: In this scenario, old age patients with or without chronic disease can benefit in terms of treatment and medical monitoring without any need to physically meet the emergency clinic, once in a while.The specialists can focus and monitor a patient’s wellbeing remotely and help her/him in case of a crisis.Further, they can constantly keep in touch with the patient for recuperation and long term care [13,22,23].

    ? External and internal health information: The external data is alluded to and investigated by the data collection device.By and large, the IoT framework has detection layer, vehicle layer, and the application layer.The sensors execute a significant job in identification layer.This information gets transmitted through IoT and is accessed by the customer through web application.

    3 The Proposed SHC2 Methodology

    The current research work proficiently addresses the information security and client protection issues in SHC2by presenting Light Weight Cipher (LWC) model in cloud security.The proposed SHC2model is illustrated in Fig.2.The recommended model builds both integrity and confidentiality of the HC so that a patient’s information is secure and protected from unapproved client access.Majority of the components, present in this security model, depend on private and public key generation.So, the information should be encrypted and decrypted to protect and store it in cloud servers installed in smart urban areas.At first, the information is gathered from sensor system of the individuals through sensor components and the data is stored after processing.

    Figure 2: The proposed SHC2 model

    This information contains constant and patient-centered records and is made available to the main approved client by PRESENT cipher optimal S-Box.After the healthcare information is secured in a framework, it is then stored in cloud for authentication and approval.The proposed secure model performs cost-effective tasks and expands the viability of SHC2, a security solution that minimizes the asset utilization and maximizes the security in healthcare information of smart urban communities.

    3.1 Security Threats in the Suggested Model

    Healthcare, offered in smart urban areas, is expected to face security threats through its sensors, wireless channel correspondence, and cloud condition.Healthcare systems cannot protect itself from malicious attacks and deliberate hacking attempts for monetary benefits [24].So, securing the healthcare information is a significant task to accomplish.Various disturbing influences are exerted in security model as discussed herewith.

    ? Unauthorized access: There is a drastic increase in the number of threats from malware and ransomware in the recent years.These threats can duplicate the information in remote servers prior to genuine encryption execution and anticipation of the unapproved dissemination of information.A patient’s information and his or her medical data is accessed without any substantial authentication.This scenario causes issues, for example, harming significant information [25,26].

    ? Attack on SH: Health supplier or the patients themselves control the access of records who holds all the rights to access/deny.There exists a simple way to create a patient’s health records.The attackers tamper the encrypted messages between sensor nodes by duplicating it with the help of fake sequence number and captures the information from one of the two endpoints in functioning association of wireless sensors.

    ? Network security problem: Most of the patients’information are uploaded in the web.When health data is transferred over web, it is prone to cyberattacks.In today’s world,internet has become a hub for cyber attackers regardless of the security level and how much ever secure, the health or medical information is maintained at.Specialists and healthcare professionals encourage the online access of framework with all fundamental information.However, a vast majority of the health information is prepared and affirmed by specialists or health experts.

    3.2 LWC for Healthcare Security

    Lightweight cryptographic technique ensures the reduction in usage cost and increases the speed, security, execution, and low energy consumption on asset-constrained gadgets.This work verifies the healthcare information in smart urban areas using PRESENT block cipher with ideal S-Box.The proposed lightweight block cipher demonstrated optimal results in SHC process.Two ciphers offer a scope of key size and width; however, at any rate, the encryption should be done for 22 rounds to achieve adequate performance.Medical health records are profoundly sensitive and must be encrypted at both capacity and during transmission.So, the clients cannot access the information without the correct keys [27].

    3.3 S-Box Optimization by Swarm Approach

    At most of the times, simple models are preferred rather than complicated ones.Being a simple one, the proposed model is also preferred for security and proficient usage.A block cipher algorithm with less size and execution is utilized in this study since it makes use of substitution and stage squares that has just 4 bits.Likewise, the key size is mildly contrasted with different algorithms of a similar kind.This feature, along with its diminished number of rounds, makes it a preferred algorithm.In S-box optimization process, the number of salps is fixed and the direction of that cipher round key is significant for SCHC model.So, the current model has been proved to enhance the outcome.

    3.3.1 Swarm Optimization

    Salps are grouped under the family, Salpidae [28] in animal kingdom.They possess a transparent barrel-molded body, while its tissues exceedingly look like jellyfishes.They move fundamentally alike the jellyfish, wherein the water is siphoned off through the body as an impetus to push ahead.The condition of all salps is verified in two-dimensional system calledS-Box(H).Normally,when there is a prey available nearby, it is engulfed by the Salps which forms the inquiry space for swarm’s objective.To update the situation of a leader, the following condition is proposed:

    3.3.2 Initialization

    At first, the number of salps (number of S-box) should be introduced.Here, the weights of the system structure are deemed to be the initial solution.The quantity of assignments depends on the number of excess common sub term events in S-box portrayal and the function is represented in condition (1).

    From condition (1), the S-box term, in XYZ directions of the cipher, improves the security of healthcare information in smart urban communities.From this stage, both encryption and decryption of PRESENT are roughly equivalent to that of the physical prerequisites.

    3.3.3 Condition Evaluation

    This progression is significant for information security, in any place, which implies that a condition achieves the maximum throughput to secure the information.Its fitness is shown in condition (2).

    It is given as some successful packets (maximum) received per unit time during the transmission and is straightforwardly related to each other.

    3.3.4 New s-Box Solution Updating Procedure

    Non-direct layer utilizes a single 4-bit S-box which is connected multiple times in parallel during every round.Normally, a food source Fsis procured as swarm’s objective for the hunt space [5].To update the situation of the leader, the conditions (3-5) are proposed:

    In the above Eqs.(3)-(5),ignifies the position of first part (leader) injthcell, the position of machines injthcell is symbolized byTi; the upper bound and lower bound are indicated by Hjand Lj; Q1,Q2,andQ3indicate the random numbers generated in the interval of [0, 1].Similarly, for the next level i.e., finding the weight, the coefficient Q1is the most critical parameter in SSO since it adjusts both exploration and exploitation as shown in Eq.(4).It should be noticed that the food source gets refreshed during optimization, since the salp chain is incredibly liable to find a superior solution by investigating and abusing the space around it [21].

    3.4 Optimal S-Box in PRESENT Cipher

    The real objective behind the structuring of PRESENT is simplicity in addition to security and proficient execution.A completely pipelined usage of PRESENT, with encryption stages,accomplishes a throughput of 64 bit during every clock cycle.This can be converted to encryption throughputs more than 50 G bit/s.The optimal S-box procedure is shown in Tab.1.This substitution table is created via a table with 4 bit covers.Majority of the table contents depend on the information of a microcontroller with heavy-sized healthcare information [29].

    Table 1: Optimal S-Box in PRESENT cipher

    In the upgraded security model for smart urban areas, the combinational structure can be additionally improved to arrive at a performance.An effective PRESENT cipher scientific articulation is shown in condition (6).

    In block ciphers, the round activity occurs such as securing the information by algorithm based on unpredictability of these tasks.Meanwhile, the number of rounds that are expected to cipher, tend to increase.The structure of this cipher, with round activity, is shown in Fig.3.It abuses the high likelihood of specific events of input differences and output differences in order to find the non-arbitrary behavior and utilize its properties to recoup the secret key [6].

    3.5 Security Terms of the Proposed Model

    During the generation of round keys, both encryption and decryption processes are started.However, a moderate security requirement reflects the limited gain of the attacker, in place.This security model has some terms which are clarified herewith.

    3.5.1 Key Generation

    It is one of the most significant blocks, since it generates new keys for each round.For this particular usage, an execution of 80-bit key is given herewith.

    Thus, the key register is rotated by 61-bit positions to the left, while four left-most bits are passed through present S-box.The round counter value is present with more bits.The main inputs of key generation are health data key “HK”, database and secret key “SK”.

    Figure 3: The structure of PRESENT cipher

    3.5.2 Add Round Key

    Round key activity must be performed in every essential round to cipher the information; else,it becomes critical at the top of priority list.At the time of deciphering, all key rounds must be made, until the last Ki is attained by making an opposite procedure back to the first key.The numerical expression of this model is given herewith.

    3.5.3 Encrypt&Decrypt

    Fundamentally, the encryption algorithm is taken as optimal S-box capacity, while the public key is denoted by PK.Both characteristic information and output are health information in cipher position.Decryption denotes the process of separating the ciphered data using a private or secret key [28].

    3.5.4 Server Storage

    With the help of above procedure, the healthcare information is stored in a server for authentication purpose.Optimal S-BOX PRESENT is constantly kept equivalent at zero, while the worth must be equivalent to two for S-box protection from differential cryptanalysis in case of weight being equivalent to one [17].

    3.6 Authentication of Secured SC-HC

    Strong security measures ought to be ensured against any physical or distant access.The information proprietor provides the instructions to the receiver to create a private key.At that point, the service requests access the private cloud for successful authentication.Here MA (Mutual Authentication) is considered for smart urban communities’information security model [5,30].

    3.6.1 Mutual Authentication

    This model mediates the communication between medical clinic workers and the patients based on the information shared.The information shared among the tag, reader, and server are traded ahead of time.It produces a similar worth and look while it also checks the same to authenticate the process.The above discussed cipher-based security model confirms the server information with unapproved client [31].

    3.6.2 Authorization Control

    The security system must be able to appropriately authorize distinctive access rights for various clients.The access control component must be flexible enough to assaults from plotting enemies and from cloned devices.The framework should have the option to check the client and offer authorization to access.For every entrance, the system must check the validity of the client.With regards to information security, when an attacker tries to encrypt the SHRs transmitted on open channels and access SC-HC, it should be restricted.

    4 Results and Analysis

    The proposed SHC2approach was implemented in JAVA programming language JDK 1.7.0 using a PC with windows configuration and Intel (R) Core i5 processor, 1.6 GHz and 4 GB RAM.To evaluate the model, some of the metrics such as encryption, decryption, response, and access time in terms of (ms) were compared against existing cipher methods, for instance, SIMON [18].

    Tab.2 depicts the confusion and diffusion levels (in %) in the form “mean±variance”.The proposed model was validated in terms of protecting the healthcare information.The gathered information was changed to packets so that it can be transmitted to sensors.The proposed ideal S-Box with PRESENT cipher achieved the least encryption and decryption times in smart urban areas as indicated in Fig.4.This examination is dependent on access arrangementvs.healthcare information time.For instance, in case of access policy being 60, the time taken for encryption and decryption were 300 ms and 1874 ms by the proposed model against the existing model i.e.,SIMON with TLBO model.The proposed security model also took less encryption time for information encryption than alarm-net, thanks to the usage of external keys.SHC2required high number of cycles to produce arbitrary keys than the proposed methodology.Fig.5 shows the access time.

    Table 2: Confusion and diffusion levels (in %), written in the form “mean±variance”

    Figure 4: Encryption and decryption time evaluation

    Figure 5: Response and access time evaluation

    Fig.6 shows the objective analysis of optimization in which the number of cycles got shifted and the most extreme throughput was 50 Mbps/sec for 120 age of swarm optimization process.This figure was plotted against time period.As shown in the graph, the throughput got expanded bit-by-bit after some time and achieved a stature of 30 Mbps/sec.The area throughput was higher, when the density of sensor nodes was heavier.When using a contention-based protocol, the thickness of the nods influenced the capacity of the protocol fundamentally to evade the packet collisions.The communication channel might be wired or wireless based on the application.In wireless sensor systems, the throughput initially increases to a specific value.Towards the end,the level of the proposed framework was assessed with the help of reference chart.Here, three kinds of security models were referred such as SIMON, PRESENT and the PRESENT with ideal authentication process.The maximum security level was accomplished in the proposed model than the existing techniques.Information size got expanded in case of diminishing degree of system.This implies that in case of high information size, some disturbances may be present.From the experimentation procedure, it is established that the proposed strategy is effective in securing the healthcare information of smart urban communities with 98.22% accuracy.Fig.7 shows the level of security.The former differs with the quantity of SHC2ciphertexts.The reaction time was 1345 ms for ideal PRESENT cipher and 2348 ms was the access time taken by 40 cipher information in ideal S-Box.

    Figure 6: Throughput vs. epoch

    Figure 7: Level of security in SHC2

    5 Conclusion

    In this research article, the authors discussed about the security of SHC2model with the help of optimal S-Box ciphers.In healthcare domain, data protection and privacy of the information are crucial.Access to data, authentication, approval, availability, and responsibility for information are important, because of the application of data and security of an individual’s information.The proposed model proved to have improved the security level of healthcare information in sensor networks through system measurements.It reduced the security and resource consumption requirements progressively, during emergency situations.Further, the proposed model also mitigated the costs incurred upon healthcare solutions.Additionally, it also ensured the protected transmission of medical information between patients and the doctors.The PRESENT Cipher performed key scheduling for which two distinctive estimated keys such as 80 and 128 bit keys were chosen and designed.At that point, the proposed model was compared with other cryptographic algorithms to improve the security of hybrid algorithm for more information.The proposed system reduced the heavy computational cost.In future, the researchers recommend to use effective deep learning models to achieve better results.Besides, the block ciphers can also be used in enhancing the security level of healthcare information.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费看a级黄色片| 嫩草影院精品99| 99国产极品粉嫩在线观看| 欧美激情久久久久久爽电影| 国产在线精品亚洲第一网站| 国产人妻一区二区三区在| 美女黄网站色视频| 夜夜看夜夜爽夜夜摸| 波多野结衣巨乳人妻| 亚洲国产精品成人综合色| 国产视频一区二区在线看| 亚洲精品乱码久久久v下载方式| 中文字幕熟女人妻在线| 亚洲欧美精品自产自拍| 国产探花在线观看一区二区| 国产精品久久久久久av不卡| 国产精品福利在线免费观看| 秋霞在线观看毛片| 精华霜和精华液先用哪个| 成人精品一区二区免费| 99热这里只有精品一区| 天天躁日日操中文字幕| 色在线成人网| 看免费成人av毛片| 99热这里只有精品一区| 日本欧美国产在线视频| 男女边吃奶边做爰视频| 亚洲精品日韩av片在线观看| 国内精品一区二区在线观看| 国产精品一区二区免费欧美| 麻豆乱淫一区二区| 欧美在线一区亚洲| 久久久久久久久久黄片| 熟女电影av网| 亚洲人成网站高清观看| 精品午夜福利在线看| 午夜免费男女啪啪视频观看 | 成人亚洲欧美一区二区av| 午夜精品国产一区二区电影 | av女优亚洲男人天堂| 日日撸夜夜添| 熟女电影av网| 变态另类成人亚洲欧美熟女| 亚洲av中文字字幕乱码综合| 麻豆乱淫一区二区| 深爱激情五月婷婷| 国产伦精品一区二区三区四那| 精品一区二区免费观看| 久久天躁狠狠躁夜夜2o2o| avwww免费| 一进一出抽搐gif免费好疼| 久久久久国产精品人妻aⅴ院| 欧美高清成人免费视频www| 中文字幕久久专区| 欧美极品一区二区三区四区| 在线看三级毛片| 国产人妻一区二区三区在| 国产精品电影一区二区三区| 最近的中文字幕免费完整| 国产高清有码在线观看视频| 久久久精品欧美日韩精品| 五月玫瑰六月丁香| 婷婷色综合大香蕉| 给我免费播放毛片高清在线观看| 日产精品乱码卡一卡2卡三| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲在线观看片| 中出人妻视频一区二区| 在现免费观看毛片| 校园人妻丝袜中文字幕| a级毛片免费高清观看在线播放| 一进一出好大好爽视频| 3wmmmm亚洲av在线观看| 亚洲中文字幕日韩| 久久久久免费精品人妻一区二区| 成年女人毛片免费观看观看9| 99在线视频只有这里精品首页| 国模一区二区三区四区视频| 黄色视频,在线免费观看| 色综合亚洲欧美另类图片| 国产男靠女视频免费网站| 日本-黄色视频高清免费观看| 伦理电影大哥的女人| 波多野结衣巨乳人妻| 中文字幕人妻熟人妻熟丝袜美| 欧美3d第一页| 少妇猛男粗大的猛烈进出视频 | 精品无人区乱码1区二区| 亚洲五月天丁香| 观看美女的网站| 亚洲精品色激情综合| 日本 av在线| 99国产极品粉嫩在线观看| 高清午夜精品一区二区三区 | 中文字幕免费在线视频6| 精品欧美国产一区二区三| 91久久精品国产一区二区成人| 99热只有精品国产| 少妇被粗大猛烈的视频| 国产高清视频在线播放一区| 小说图片视频综合网站| 熟妇人妻久久中文字幕3abv| 别揉我奶头 嗯啊视频| 国产片特级美女逼逼视频| 成人午夜高清在线视频| 国产一区亚洲一区在线观看| 午夜a级毛片| 日韩欧美精品v在线| 国产乱人视频| 夜夜看夜夜爽夜夜摸| 国产毛片a区久久久久| 精品久久久久久久人妻蜜臀av| 国产精品久久久久久久久免| 直男gayav资源| 一区二区三区免费毛片| 免费观看人在逋| 最近视频中文字幕2019在线8| 色哟哟·www| 中国国产av一级| 国内精品宾馆在线| 别揉我奶头~嗯~啊~动态视频| 日韩成人av中文字幕在线观看 | 观看免费一级毛片| 日韩欧美国产在线观看| 亚洲天堂国产精品一区在线| 亚洲在线观看片| 亚洲在线观看片| 黄色欧美视频在线观看| 国产av一区在线观看免费| 国产又黄又爽又无遮挡在线| 国产大屁股一区二区在线视频| 国产av一区在线观看免费| 观看免费一级毛片| 精品一区二区三区av网在线观看| 国产色婷婷99| av专区在线播放| 日韩大尺度精品在线看网址| 国产综合懂色| 国产成人a区在线观看| 丝袜喷水一区| 欧美国产日韩亚洲一区| 国产aⅴ精品一区二区三区波| 午夜精品一区二区三区免费看| 天堂av国产一区二区熟女人妻| 天堂av国产一区二区熟女人妻| 亚洲丝袜综合中文字幕| 欧美激情国产日韩精品一区| 99久久九九国产精品国产免费| 亚洲经典国产精华液单| 亚洲人成网站在线播放欧美日韩| 国产午夜福利久久久久久| 国内精品美女久久久久久| 亚洲成人久久性| 老熟妇仑乱视频hdxx| 国产高潮美女av| 日韩一本色道免费dvd| 一区二区三区高清视频在线| 国产乱人视频| 日韩欧美精品v在线| 久久精品久久久久久噜噜老黄 | 99热全是精品| 97超级碰碰碰精品色视频在线观看| 不卡一级毛片| 亚洲最大成人中文| 国产伦在线观看视频一区| 久久久久国产精品人妻aⅴ院| 亚洲成人av在线免费| 精品不卡国产一区二区三区| 你懂的网址亚洲精品在线观看 | 亚洲婷婷狠狠爱综合网| 69人妻影院| 欧美xxxx黑人xx丫x性爽| 一边摸一边抽搐一进一小说| 18禁在线无遮挡免费观看视频 | 欧美日本视频| 欧美日本视频| 又黄又爽又免费观看的视频| 波野结衣二区三区在线| 午夜福利在线观看免费完整高清在 | 校园人妻丝袜中文字幕| 欧美日韩乱码在线| 性插视频无遮挡在线免费观看| 一区二区三区免费毛片| 久久国内精品自在自线图片| 亚洲国产色片| 久久久久性生活片| 亚洲国产精品久久男人天堂| 欧美国产日韩亚洲一区| 亚洲国产精品国产精品| 99热这里只有是精品50| 99久久精品一区二区三区| 国产精品99久久久久久久久| 成人综合一区亚洲| 日韩一区二区视频免费看| 少妇熟女aⅴ在线视频| 免费av不卡在线播放| 国产精品一区二区性色av| 午夜福利在线在线| 一区福利在线观看| 搡女人真爽免费视频火全软件 | 男女边吃奶边做爰视频| 男女下面进入的视频免费午夜| 嫩草影视91久久| 日本黄大片高清| 日日啪夜夜撸| 九九久久精品国产亚洲av麻豆| 日韩三级伦理在线观看| 激情 狠狠 欧美| 久久久久国内视频| 韩国av在线不卡| 一个人免费在线观看电影| 午夜精品在线福利| a级毛色黄片| 蜜桃久久精品国产亚洲av| 亚洲欧美日韩高清在线视频| 国产精品人妻久久久久久| 欧美激情久久久久久爽电影| 精品一区二区三区视频在线观看免费| 精品人妻偷拍中文字幕| 国产男靠女视频免费网站| 久久精品国产自在天天线| 丰满的人妻完整版| 一级毛片电影观看 | 国产中年淑女户外野战色| 国产精品久久电影中文字幕| 亚洲av成人精品一区久久| 国产伦在线观看视频一区| 在线a可以看的网站| 午夜福利高清视频| 97人妻精品一区二区三区麻豆| 美女黄网站色视频| 国产黄色小视频在线观看| 午夜福利视频1000在线观看| 亚洲成a人片在线一区二区| 亚洲在线自拍视频| 精品国内亚洲2022精品成人| 久久久久久久亚洲中文字幕| 亚洲在线自拍视频| 亚洲精华国产精华液的使用体验 | 成年女人毛片免费观看观看9| 别揉我奶头 嗯啊视频| 天堂av国产一区二区熟女人妻| 欧美日本视频| 日韩在线高清观看一区二区三区| 国产高清不卡午夜福利| ponron亚洲| 一区福利在线观看| 久久久久久国产a免费观看| 卡戴珊不雅视频在线播放| av女优亚洲男人天堂| 又爽又黄无遮挡网站| 观看免费一级毛片| 一个人看视频在线观看www免费| 久久精品91蜜桃| 成人国产麻豆网| 欧美精品国产亚洲| 午夜亚洲福利在线播放| 欧美色视频一区免费| 欧美成人精品欧美一级黄| 高清毛片免费看| 91狼人影院| 亚洲成人久久性| www.色视频.com| a级毛片a级免费在线| 久久韩国三级中文字幕| 狂野欧美白嫩少妇大欣赏| 热99re8久久精品国产| 乱系列少妇在线播放| 91精品国产九色| 免费观看精品视频网站| 国产精品一区二区三区四区免费观看 | 不卡一级毛片| 日本免费一区二区三区高清不卡| 国产伦精品一区二区三区视频9| 国产黄a三级三级三级人| 国产淫片久久久久久久久| 成人美女网站在线观看视频| ponron亚洲| 丰满的人妻完整版| 露出奶头的视频| 亚洲四区av| 蜜桃久久精品国产亚洲av| 91在线观看av| 12—13女人毛片做爰片一| 亚洲综合色惰| 狠狠狠狠99中文字幕| 99热全是精品| 国产精品电影一区二区三区| 国产亚洲精品久久久久久毛片| 国产不卡一卡二| 欧美一区二区亚洲| 三级毛片av免费| 啦啦啦观看免费观看视频高清| 欧美区成人在线视频| 国产 一区精品| 色哟哟·www| 男人和女人高潮做爰伦理| 级片在线观看| 国产免费男女视频| 久久精品人妻少妇| 国产成年人精品一区二区| 日韩成人伦理影院| ponron亚洲| 十八禁网站免费在线| 18禁裸乳无遮挡免费网站照片| 极品教师在线视频| 人人妻人人看人人澡| 国产精品一区二区性色av| 日日撸夜夜添| 亚洲五月天丁香| 久久久国产成人精品二区| 在线国产一区二区在线| 日韩人妻高清精品专区| 久久久久久久久大av| 免费搜索国产男女视频| 成人特级黄色片久久久久久久| 草草在线视频免费看| 最近中文字幕高清免费大全6| 99热6这里只有精品| 国内精品久久久久精免费| 国产一区二区激情短视频| 日韩亚洲欧美综合| 欧洲精品卡2卡3卡4卡5卡区| 大香蕉久久网| 色在线成人网| 黄色视频,在线免费观看| 最近的中文字幕免费完整| 午夜老司机福利剧场| 蜜桃久久精品国产亚洲av| 亚洲性久久影院| 欧美一区二区精品小视频在线| 亚州av有码| 超碰av人人做人人爽久久| 深夜精品福利| 亚洲内射少妇av| 亚洲高清免费不卡视频| 精品日产1卡2卡| 国产精品久久久久久亚洲av鲁大| 亚洲精品日韩av片在线观看| 亚洲av一区综合| 干丝袜人妻中文字幕| 免费av不卡在线播放| 亚洲av成人av| 少妇的逼水好多| 男女啪啪激烈高潮av片| 最新中文字幕久久久久| 久久综合国产亚洲精品| 乱系列少妇在线播放| 99热这里只有是精品50| 精品不卡国产一区二区三区| 一区福利在线观看| av视频在线观看入口| 国产v大片淫在线免费观看| 国产精品乱码一区二三区的特点| 日韩欧美精品v在线| 久久久国产成人精品二区| 久久久久久久久中文| 亚洲精品日韩在线中文字幕 | 此物有八面人人有两片| 国产精品三级大全| 在现免费观看毛片| 午夜久久久久精精品| 精品不卡国产一区二区三区| 国产精品免费一区二区三区在线| 天美传媒精品一区二区| 成年女人毛片免费观看观看9| 亚洲国产精品合色在线| 少妇被粗大猛烈的视频| 一个人观看的视频www高清免费观看| 色av中文字幕| 亚洲色图av天堂| 色噜噜av男人的天堂激情| 欧美一区二区亚洲| 晚上一个人看的免费电影| 看十八女毛片水多多多| 日日撸夜夜添| 亚洲欧美日韩高清专用| 亚洲在线自拍视频| 老熟妇仑乱视频hdxx| 听说在线观看完整版免费高清| 性欧美人与动物交配| 伦理电影大哥的女人| 97超视频在线观看视频| 午夜爱爱视频在线播放| 久久久欧美国产精品| 99久久中文字幕三级久久日本| 国产欧美日韩一区二区精品| 天堂av国产一区二区熟女人妻| 大型黄色视频在线免费观看| 久久久精品欧美日韩精品| 性欧美人与动物交配| 伦理电影大哥的女人| 国产私拍福利视频在线观看| 亚洲va在线va天堂va国产| 国产精品一区二区免费欧美| 日本黄大片高清| 露出奶头的视频| 晚上一个人看的免费电影| 欧美性猛交黑人性爽| 亚洲国产精品成人久久小说 | 99热精品在线国产| 久久久午夜欧美精品| 综合色丁香网| 国产精品久久电影中文字幕| 国产老妇女一区| 有码 亚洲区| 非洲黑人性xxxx精品又粗又长| 一个人看视频在线观看www免费| 国产精品av视频在线免费观看| 一级毛片我不卡| 亚洲精华国产精华液的使用体验 | 免费在线观看影片大全网站| 丰满乱子伦码专区| 极品教师在线视频| 你懂的网址亚洲精品在线观看 | 最近最新中文字幕大全电影3| 国产视频一区二区在线看| 国产精品一及| 男人和女人高潮做爰伦理| 亚洲中文日韩欧美视频| 五月伊人婷婷丁香| 99riav亚洲国产免费| 成人综合一区亚洲| 国产精品久久久久久久电影| 97在线视频观看| 亚洲欧美精品综合久久99| 亚洲经典国产精华液单| 深夜精品福利| 亚洲成a人片在线一区二区| 免费看光身美女| 亚洲av美国av| 有码 亚洲区| 一区二区三区免费毛片| 99久久精品一区二区三区| 亚洲真实伦在线观看| 毛片一级片免费看久久久久| 午夜精品一区二区三区免费看| 国产av在哪里看| 免费搜索国产男女视频| 亚洲三级黄色毛片| 91狼人影院| 亚洲精品成人久久久久久| 成人综合一区亚洲| 亚洲成人精品中文字幕电影| 俺也久久电影网| 国产亚洲精品av在线| 91麻豆精品激情在线观看国产| 可以在线观看的亚洲视频| 黄色一级大片看看| 亚洲内射少妇av| 99热这里只有精品一区| ponron亚洲| 日韩av在线大香蕉| 国产色婷婷99| 亚洲精品成人久久久久久| 亚洲av免费高清在线观看| 欧美人与善性xxx| 99热网站在线观看| 可以在线观看的亚洲视频| 久久久久国产精品人妻aⅴ院| 波多野结衣高清作品| 91精品国产九色| 精品一区二区三区人妻视频| 国国产精品蜜臀av免费| 联通29元200g的流量卡| 日韩精品青青久久久久久| 少妇的逼好多水| 欧美成人精品欧美一级黄| 国产亚洲精品久久久久久毛片| 九九久久精品国产亚洲av麻豆| 欧美激情在线99| 天天躁日日操中文字幕| 51国产日韩欧美| 亚洲久久久久久中文字幕| 如何舔出高潮| 国产久久久一区二区三区| 老司机福利观看| 亚洲国产高清在线一区二区三| 狂野欧美激情性xxxx在线观看| 精品午夜福利视频在线观看一区| 一进一出抽搐gif免费好疼| 一个人免费在线观看电影| 丝袜喷水一区| 亚洲精品日韩av片在线观看| av女优亚洲男人天堂| 国产黄片美女视频| 亚洲精品国产成人久久av| 亚洲精品456在线播放app| 国产精品亚洲美女久久久| 深夜精品福利| 最近2019中文字幕mv第一页| 人妻丰满熟妇av一区二区三区| 亚洲国产精品sss在线观看| 久久久国产成人免费| 波野结衣二区三区在线| 九色成人免费人妻av| 日本三级黄在线观看| 自拍偷自拍亚洲精品老妇| 1024手机看黄色片| av天堂中文字幕网| 亚洲av第一区精品v没综合| 国产av麻豆久久久久久久| 国产精品一及| 99久国产av精品| 91av网一区二区| 日本一二三区视频观看| 亚洲国产色片| 亚洲精品在线观看二区| 日韩高清综合在线| 99久久九九国产精品国产免费| 欧美性猛交黑人性爽| 国产色婷婷99| 成人国产麻豆网| 欧美中文日本在线观看视频| 国产高清视频在线播放一区| 人人妻人人看人人澡| 天堂动漫精品| 精品久久久久久久久久久久久| 精华霜和精华液先用哪个| 午夜爱爱视频在线播放| 欧美日韩一区二区视频在线观看视频在线 | 日本与韩国留学比较| 国产成人影院久久av| 久久鲁丝午夜福利片| 听说在线观看完整版免费高清| 欧美国产日韩亚洲一区| 欧美日本亚洲视频在线播放| 亚洲欧美日韩高清专用| 亚洲精品一卡2卡三卡4卡5卡| 黄色视频,在线免费观看| 成人一区二区视频在线观看| 丰满的人妻完整版| 麻豆av噜噜一区二区三区| 国产高清视频在线播放一区| 午夜福利在线观看吧| 国产精品一区二区三区四区免费观看 | 六月丁香七月| 日本熟妇午夜| 俄罗斯特黄特色一大片| 国产激情偷乱视频一区二区| 免费不卡的大黄色大毛片视频在线观看 | 日日撸夜夜添| 亚洲av电影不卡..在线观看| 欧美日本亚洲视频在线播放| 午夜爱爱视频在线播放| 成年女人看的毛片在线观看| 成人午夜高清在线视频| 欧美日韩国产亚洲二区| 淫秽高清视频在线观看| 国产色婷婷99| 久久久久久久久久黄片| 亚洲不卡免费看| 国产淫片久久久久久久久| 三级男女做爰猛烈吃奶摸视频| 亚洲aⅴ乱码一区二区在线播放| 中文资源天堂在线| 国产一区二区三区在线臀色熟女| 成人欧美大片| 99在线人妻在线中文字幕| 中文在线观看免费www的网站| 国内揄拍国产精品人妻在线| 老司机福利观看| 久久人人精品亚洲av| 欧美性猛交黑人性爽| 99久久成人亚洲精品观看| 草草在线视频免费看| 成人亚洲精品av一区二区| 国产 一区精品| 97超级碰碰碰精品色视频在线观看| 国产乱人视频| 热99re8久久精品国产| 亚洲精品亚洲一区二区| 久久精品夜色国产| 国产乱人视频| 亚洲人与动物交配视频| 日本免费一区二区三区高清不卡| 精品一区二区三区视频在线| 午夜福利在线观看免费完整高清在 | 男人和女人高潮做爰伦理| 全区人妻精品视频| 亚洲精品国产av成人精品 | 日本爱情动作片www.在线观看 | 露出奶头的视频| 在线国产一区二区在线| 中文字幕熟女人妻在线| 国产精品电影一区二区三区| 色哟哟·www| 成人精品一区二区免费| 男女边吃奶边做爰视频| 真人做人爱边吃奶动态| 国产黄a三级三级三级人| 可以在线观看毛片的网站| 国产精品三级大全| 看片在线看免费视频| 九九热线精品视视频播放| 尾随美女入室| 精品免费久久久久久久清纯| 国产探花极品一区二区| av视频在线观看入口| 国产高清不卡午夜福利| 性色avwww在线观看| 亚洲中文字幕日韩| 国产亚洲精品久久久com| 亚洲成人久久性| 可以在线观看的亚洲视频| 日韩av不卡免费在线播放| 国产精品美女特级片免费视频播放器| 国产高潮美女av| 精品无人区乱码1区二区| 午夜影院日韩av| 91精品国产九色| 亚洲欧美成人综合另类久久久 | 精品国产三级普通话版| 九九爱精品视频在线观看| 九九久久精品国产亚洲av麻豆|