• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

    2022-03-14 09:24:50NehaMalhotraandManjuBala
    Computers Materials&Continua 2022年3期

    Neha Malhotra and Manju Bala

    1

    I.K.Gujral Punjab Technical University,Kapurthala,144603,India

    2Lovely Professional University,Phagwara,144411,India

    3Khalsa College of Engineering and Technology,Amritsar,143001,India

    Abstract:Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station, which introduces several difficulties into the system due to the network’s reliance on a single point, while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second, the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment, and then, whenever a node wants to interact, it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach.

    Keywords: Node authentication; clone node; mobile computing; double hashing; fault tolerance

    1 Introduction

    Mobile computing is extensively used in many industries where a fast and efficient response is essential.Smart schools and workplaces, the health care industry, weather forecasting, the military,and a variety of monitoring environments are all examples of such applications.The use of mobile computing in the system has numerous constraints that must be addressed, such as the nodes in such systems having resource issues such as low cost, battery, bandwidth, memory, and so on, which must be handled in such a way that it does not directly affect network health.Nodes in such a network communicate with one another and with a base station, emphasising the importance of all nodes’legitimacy [1].Because nodes are deployed in an unmanaged, hostile,and open environment, adversaries of many types can target them by initiating various attacks,such as denial of service, flooding, replication attacks, and so on [2].The network’s nodes are likely to be compromised [3], as adversaries often acquire the target node’s private information and credentials in order to impact a large number of other nodes in the network [4], as well as utilise this information to build a variety of clone nodes under their control.The adversary’s clones have the identical node id and other acquired information to do malicious activities in the system.

    These clone nodes may act like regular nodes, making them difficult to identify in the network.However, many security problems arise as a result of attacks on vulnerable nodes and inadequate resources [5].As a result, much research has been conducted in the literature to improve clone node detection methods in order to protect the system against clone attacks.These techniques have been classified as centralised and distributed, witness-based or not, locationdependent or not.The main contribution of the work is that, when the network has been deployed using the double hashing method, if a collision occurs, which means that the generated index is occupied by another node in the network, it can be easily resolved by calculating the index using the second hash function.A clone node can be easily located in the network with this hashing searching technique.This solution is not dependent completely on central base station, which resolves numerous issues into the system owing to the network’s reliance on a single point, while improving additional overhead by not compromising network lifespan.

    Due to the increase in memory and space complexity in the existing methods of node authentication, the majority of techniques raise the overhead while compromising the network lifespan.The suggested node authentication method seeks to reduce communication and memory costs.These predicted changes resulted in the usage of the suggested protocol DHFNA, which shows that as mobility support improves, the number of mobile devices grows over time in the form of mobile nodes linked in a network.Also, each mobile node uses a double hashing technique to prove its sustainability, which is the most important need of any mobile network, that all nodes in the network be verified to avoid malicious actions.

    The remaining work is organised as follows: Section 2 represents related work in this field of clone node detection.Section 3 represents the proposed work’s system model and network model.Section 4 represents the algorithm used for network deployment and clone node detection.Section 5 represents the proposed work’s simulation, and section 6 represents the proposed work’s comparison.

    2 Related Work

    Several clone node detection techniques and fault detection techniques have been proposed in the literature, with the majority of them focusing on the node’s location, because each node in the network has a unique node id and spatial coordinates, and if two different nodes in the network claim the same node id but with different spatial coordinates, it clearly indicates the presence of a clone node and its attack.In [6] replication attacks were detected using nearby social signatures.Witness nodes [7] need more battery power, memory, energy, and other resources than normal nodes.Furthermore, the witness node is the most vulnerable in the network and may be readily captured by the attacker [8].The majority of suggested methods in the literature use witness finding methodology, such as RM and LSM [9,10], RED, Random walk-based protocols, and so on.This approach is based on nodes signing in and transferring geographical coordinates [11]introduces a centralised detection technique based on a random key.The technique focuses on the intended pattern in the pre-distribution of a random key to all accessible nodes, and if the pre-set key count exceeds a certain threshold, that node is identified as a clone node.The suggested approach includes a bloom filter for collecting important use data.The authors of [12] use a method based on intersection and union on a network subset that gathers adjacent information in a distributed manner and executes a SET operation on base station nodes.This method may identify internal assaults resulting from evidential analysis.This may be done by combining several pieces of evidence gathered from suffering nodes, i.e., nodes that were attacked.The authors of [13] provide two methods for detecting replica nodes.Whereas in the first phase, a node-tonetwork broadcast occurs and transmits the position of the node in the network.The authors utilised the localization method in [14], where clone node identification occurs in clusters utilising RFID and the localization technique.The authors propose two approaches for detecting cloned nodes: one based on RFID to authenticate the node and another based on geolocation techniques to identify the cloned node.When compared to previous methods, the suggested approach has shorter transmission latency and improved detection [15] employs a key distribution mechanism in which a node must authenticate itself in order to start any communication or create a connection using a key.The base station monitors the use of the keys [16] in use on a regular and random basis.Various methods for combating clone node attacks have also been proposed, including network-based detection, centralised detection, and distributed detection approaches.Key applications, base stations, social neighbourhood signatures, cluster head, zone, and neighbouring methods were among the sub approaches.The authors provide a concise overview of network security problems such as key management, node authentication, and safe routing [17].Tab.1 provides a comprehensive comparison.

    Table 1: Comparison of the existing clone detection schemes

    Where, n- number of nodes, d-degree of neighboring nodes, w- number of witness nodes and c- communication radius.The proposed technique is completely distributed in nature where all the nodes in the network participate so that the workload cannot be on one central node.This scheme will work in two phases network expansion phase and a clone detection phase.

    3 System Model and Assumptions

    The base station is considered to be at the network’s core in the provided architecture.The network nodes have been deployed at random around the base station.Each node in the network has a unique id and a list of its one-hop neighbours [18].Moreover, all nodes in the network are aware of their geographical locations.Also, once the deployment phase is completed, nodes with new ids are not allowed to join the network [19,20].Communication between a base station and other network nodes takes place through intermediary nodes.All nodes transmit their observation data to the base station on a regular basis [21,22].The network model is shown in Fig.1.For the adversary paradigm, the primary goal is to destroy or control the network area.This technique is less expensive than inserting duplicate nodes into the network for testing.The attacker compromises a few nodes before replicating its data in mass.Adversaries in the suggested system tend to control the network partly by attacking its few accessible nodes.In the example, the attacker has built a duplicate node and put it in the desired position.An attacker may launch a variety of attacks on the network using these newly generated clone nodes [23].The clone nodes that have been deployed in various places seem to be normal, with legitimate node ids.

    Figure 1: Network model

    Assumptions for the network and adversary model have been given below:

    ? Processes/nodes in the mobile computing environment are uniformly distributed.

    ? Each process/node has been identified by its unique id which is static.

    ? An adversary cannot create an ID for the clone nodes

    ? The adversary could capture a limited amount of normal nodes.

    4 Proposed Work

    In the proposed method, the node-id is utilised as a key index to build the hash table of a network node.A unique hash function was used to associate a node id with a specific key in order to access the nodes in the network as quickly as possible.The efficiency of node access is completely dependent on the type of hash function employed, which does not return zero.The suggested approach accomplishes the following tasks:

    a.Creates a hash table, which is an array that stores references to nodes.If no such node id exists for the evaluated hash function value, this hash table returns a null entry.

    b.A hash function is a function that converts arbitrary-sized data to fixed-size values.In a hash table, these values serve as network node indexes.

    c.If the hash function computes a value that is already held by another node in the network,this is referred to as a collision, and it will be addressed by computing the second hash function to create a new address for the collided node.

    4.1 Network Deployment Phase

    Nodes available in the network have their unique node id which is used for indexing in the hash table.With the given list of nodes in the network, its index in hash table has been computed using (1) and methodology has been explained in Fig.2:

    where ‘m’is the size of the hash table, ‘key’is the node and ‘H1’is the hash function.In case if the value computed in Eq.(1) is already occupied by another node then it results in the collision which can be further dealt with using (2):

    where H2is the second hash function computed to resolve collisions, in case the generated index position in Eq.(1) is already occupied by any other value.Whenever there is a collision, the node will be inserted at the index calculated using the below mentioned for (3):

    ?

    (Continued)

    ?

    Figure 2: Step by step process for network deployment

    Once all the nodes in the network have been deployed, then each node exchanges its node id and spatial coordinates with each other to store the value of its neighboring nodes.

    4.2 Clone Node Detection Phase

    The suggested work’s second step focuses on identifying the clone in the network.This second phase identifies the existence of duplicate/clone nodes in the network as soon as the network is installed in the first phase.If the cloned node is discovered, this step removes it from the network as soon as it is discovered.Nodes in the mobile computing environment interact with one another in a distributed fashion [24-26].If a node wishes to interact with the base station by transmitting the required data, the base station verifies the node’s authenticity by calculating its index using the hash function.If the calculated value of the node is the same as the original index value, the node is authenticated [27,28].If the value does not match, the node is not genuine and may be a clone node.In such a scenario, the receiver generates a warning message indicating that the sender node may be a clone node, followed by the termination of the cloned node [29,30]from the network, as shown in Fig.3:

    ?

    5 Simulation Parameters

    The proposed distributed technique DHFNA has been simulated on MATLAB using the parameters depicted in Tab.2 under different scenarios like, scenario 1, when the network has been attacked by the network with no detection technique implemented, scenario 2, when the proposed DHFNA has been implemented but there are no attacks in the network, scenario 3,when the proposed DHFNA has been implemented in the presence of attacks in the network.Following parameters have been considered in Tab.2 to carry out the same:

    Figure 3: Steps for clone detection phase

    6 Performance Evaluation

    The performance of the DHFNA has been evaluated using the following parameters:

    a.End to end delay: It refers to the transmission time from sender to receiver and is defined in below (4):

    Table 2: Simulation parameters

    Fig.4 depicts how the transmission rate changes in the three scenarios described above.It clearly shows that when the network has been attacked in the absence of any detection protocol,the average end-to-end delay is 0.8391, which is less than the end-to-end delay when the network has been attacked in the presence of DHFNA, which is equivalent to 3.92, and when the network has not been attacked but the protocol has been implemented, end-to-end delay comes out to be 3.75.When clone nodes are introduced into the network, they delay the real time of message delivery from sender to recipient while also causing additional packet losses.As a result, end-toend delays are unavoidable.

    Figure 4: End to end delay

    b.Packet loss:

    It signifies the number of packets lost before reaching out to the target is the packet loss ratio depicted in Fig.5.The said result signifies that there are on an average 1949 packets lost in the case of a protocol implemented without attacks, on an average 331 packets are lost when the network has been attacked in the presence of DHFNA, and in the third scenario, where the network has been attacked in the absence of the proposed protocol, the average number of packets lost is 440.When clone nodes are available in the network, these nodes tend to behave as legitimate nodes and restrict sending data to the desired receiver, which eventually results in packet loss.

    Figure 5: Packet loss in three scenarios

    c.Packet Delivery Ratio:

    It is the ratio of the number of packets sent by the source node to the number of packets received by the target node [31] as depicted in Fig.6.It has been calculated using (5):

    The packet delivery ratio in scenario 1 when the network has been implemented with a protocol but attacks are not present, is 63% on an average, and this ratio is 83% in the case when the network has not been deployed with protocol but has been attacked, which is increased to 88% in case of implemented protocol along with attacks.The results signify that the delivery ratio improves with time when the DHFNA protocol has been implemented.

    d.Energy consumption:

    It refers to the amount of energy consumed during the entire process and is represented in Fig.7.The consumption of energy of a node in a mobile network is defined as the sum of the processor energy (EP), mobility energy (EMob), and transceiver energy (ETr) [16] which is represented in (6), where ECis defined as the total energy consumed and the energy of the processor is defined by (7) and where EPzstateis the processor state energy consumption and EPchangeis the energy consumed in state transition.Transceiver energy consumption is defined by (8):

    Figure 6: : Packet delivery ratio

    Figure 7: Residual energy in three scenarios

    where ETsis the energy of transition state and ETcis the transition change energy consumed [32].Energy consumed while the nodes are in move i.e., in mobility is represented by (9) and where ec(Dsi,Tmi) is defined as the amount of energy consumed while the movement for a distance (Dsi)and in time (Tmi).Nodes in the mobile network tend to consume energy to perform all their operations like data transmission and computation, eventually which results in a decrease in the residual energy with time.

    Values of Eqs.(6)-(8) have been merged and residual energy values have been obtained which depicts the residual energy in millijoules (mJ) left with each node after the end of simulation time.

    The proposed work has been compared with the existing techniques in terms of memory and communication expenditure.To carry out the comparison, there is a need to calculate the consumption in the case of DHFNA.The comparison of all the available techniques has been tabulated in Tab.3.The cost required to carry out the node finding and saving operation using the double hashing technique gives an O(1) complexity in its best cases and average cases and an O(n) complexity in its worst case scenario.The best case is the scenario in which all the operations like searching for a node, removing and inserting a new node takes place with no collisions at all.The average case is the scenario in which all such operations are done with few collisions or probes.The worst case is the scenario in which all such operations are done with collisions in each step, mean probing is required for all the nodes.

    Table 3: Comparison of DHFNA with other methods

    Communication expenditure: it can be calculated using the summation of communication from source to reporter and from reporter to witness [33].This communication cost from source to reporting node can be calculated using the below mentioned (10) and communication cost from reporting node to witness node (WN)can be calculated using (11).Using (8) and (9), the total communication cost of one node can be calculated in (12).The total communication cost of the network will be calculated using (13) which is generated by multiplying the number of nodes (n)to (10) which gets reduced and the same has been depicted in Fig.8:

    Figure 8: Communication cost

    Figure 9: Memory cost comparison

    Cost of memory consumed: Using the double hashing method, the memory cost per node is given and represented in Fig.9.The values in the table signify that the proposed DHFNA method gives on an average 17.56 memory cost which is far less than the existing methods.Detection rate of attacker nodes and detected nodes has been given as per the values depicted in Tab.4 and the details of the values used for the simulation of memory cost checking in all the existing methods have been tabulated in Tab.5.

    Table 4: Detection rate of nodes

    Table 5: Energy comparison

    7 Conclusion

    Mobile computing systems are susceptible to a wide range of attacks from attackers.The deployment of the network in an authentic manner is the most essential requirement for making the system fault-tolerant.Each node in this study’s network has been installed using the DHFNA method, which is responsible for authentication of the nodes in the network.Using double hashing, the first phase of this protocol is used to deploy nodes in the network, and the second phase is used to detect the existence of clone nodes in the network.If the cloned node is discovered,it is not permitted to stay on the network, and the base station and other nodes are alerted to its existence via the network’s security system.The clone node search is also carried out by the suggested work in the next phase.Evaluation results proves the performance of this approach is better in terms of communication and memory cost.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no interest in reporting regarding the present study.

    国产成人午夜福利电影在线观看| 亚洲av中文字字幕乱码综合| 国产一区亚洲一区在线观看| 精品国产一区二区三区久久久樱花 | 日韩视频在线欧美| 26uuu在线亚洲综合色| 2021少妇久久久久久久久久久| 免费播放大片免费观看视频在线观看 | 亚洲精品影视一区二区三区av| 午夜福利在线观看免费完整高清在| 日本三级黄在线观看| 欧美激情在线99| 亚洲精品日韩av片在线观看| 国产精品1区2区在线观看.| 欧美+日韩+精品| 看片在线看免费视频| 免费av观看视频| 国产亚洲一区二区精品| 校园人妻丝袜中文字幕| 亚洲成人精品中文字幕电影| 亚洲无线观看免费| 久久草成人影院| 亚洲国产最新在线播放| 精品人妻视频免费看| a级毛色黄片| 久久久久久九九精品二区国产| 中文字幕免费在线视频6| 久久99蜜桃精品久久| 中文字幕人妻熟人妻熟丝袜美| 国语对白做爰xxxⅹ性视频网站| 亚洲国产精品专区欧美| 国产老妇女一区| 国产淫语在线视频| 欧美丝袜亚洲另类| 国产亚洲91精品色在线| av在线蜜桃| 免费av观看视频| 又爽又黄无遮挡网站| 观看美女的网站| 少妇人妻一区二区三区视频| 搞女人的毛片| 天堂影院成人在线观看| 午夜激情欧美在线| 天美传媒精品一区二区| 亚洲国产精品sss在线观看| 欧美+日韩+精品| 中文在线观看免费www的网站| 中文乱码字字幕精品一区二区三区 | 国产亚洲一区二区精品| 色哟哟·www| 午夜福利高清视频| 国内精品一区二区在线观看| 三级国产精品片| 变态另类丝袜制服| 欧美精品一区二区大全| 91精品一卡2卡3卡4卡| 欧美成人精品欧美一级黄| 久久99热这里只频精品6学生 | 我的老师免费观看完整版| 成人一区二区视频在线观看| 热99re8久久精品国产| 午夜亚洲福利在线播放| 深爱激情五月婷婷| 亚洲最大成人av| 三级国产精品欧美在线观看| 99久久成人亚洲精品观看| 99国产精品一区二区蜜桃av| 国产亚洲5aaaaa淫片| 久久久久免费精品人妻一区二区| 成人二区视频| 午夜福利在线观看吧| 国产私拍福利视频在线观看| 国产成人精品久久久久久| 亚洲人成网站在线观看播放| 中文字幕精品亚洲无线码一区| 国产高清有码在线观看视频| 精品久久久久久电影网 | 嫩草影院精品99| 久久精品国产自在天天线| 欧美三级亚洲精品| 校园人妻丝袜中文字幕| ponron亚洲| 国产在线男女| 成人亚洲精品av一区二区| 卡戴珊不雅视频在线播放| 少妇人妻一区二区三区视频| 国产精品1区2区在线观看.| 大又大粗又爽又黄少妇毛片口| 久久精品国产亚洲网站| 毛片一级片免费看久久久久| 国产欧美另类精品又又久久亚洲欧美| 天天躁夜夜躁狠狠久久av| 国产精品不卡视频一区二区| 亚洲美女搞黄在线观看| 国内精品宾馆在线| 18禁在线播放成人免费| 日韩欧美精品v在线| 黄色配什么色好看| 老师上课跳d突然被开到最大视频| 亚洲图色成人| 99久久精品一区二区三区| 成人高潮视频无遮挡免费网站| 欧美三级亚洲精品| 自拍偷自拍亚洲精品老妇| 国内精品美女久久久久久| 99久久成人亚洲精品观看| 最近2019中文字幕mv第一页| 亚洲av电影在线观看一区二区三区 | 国产精品不卡视频一区二区| 国产乱来视频区| 亚洲av熟女| 欧美精品国产亚洲| 日日啪夜夜撸| 人体艺术视频欧美日本| 特级一级黄色大片| 尤物成人国产欧美一区二区三区| 中文字幕精品亚洲无线码一区| 毛片一级片免费看久久久久| or卡值多少钱| 精品一区二区免费观看| 精品久久久久久久久亚洲| 国产极品精品免费视频能看的| 国产又色又爽无遮挡免| 最近最新中文字幕大全电影3| 午夜激情欧美在线| 欧美xxxx黑人xx丫x性爽| 青春草亚洲视频在线观看| 精品人妻视频免费看| 别揉我奶头 嗯啊视频| 日本一二三区视频观看| 欧美一区二区国产精品久久精品| 黄片无遮挡物在线观看| 一级黄色大片毛片| 天堂网av新在线| 亚洲一区高清亚洲精品| 久久久国产成人免费| 午夜福利在线观看吧| 我要看日韩黄色一级片| 99久久精品热视频| 亚洲精品aⅴ在线观看| 99久久九九国产精品国产免费| 久久久久久久亚洲中文字幕| 精品人妻熟女av久视频| 久久6这里有精品| 深爱激情五月婷婷| 国产高清有码在线观看视频| 色哟哟·www| 午夜福利高清视频| 99久久九九国产精品国产免费| av黄色大香蕉| 91精品国产九色| 日本欧美国产在线视频| 亚洲va在线va天堂va国产| 久久精品久久精品一区二区三区| 久久人人爽人人爽人人片va| 七月丁香在线播放| 最新中文字幕久久久久| 国产精品福利在线免费观看| 男女啪啪激烈高潮av片| 午夜福利网站1000一区二区三区| 国产老妇女一区| 99久久九九国产精品国产免费| 熟妇人妻久久中文字幕3abv| 国产探花在线观看一区二区| 又爽又黄无遮挡网站| 亚洲国产日韩欧美精品在线观看| 最近2019中文字幕mv第一页| 国模一区二区三区四区视频| 午夜亚洲福利在线播放| 欧美性猛交黑人性爽| 久久久久久久久久黄片| 午夜日本视频在线| 九九在线视频观看精品| 夫妻性生交免费视频一级片| 欧美日韩国产亚洲二区| 亚洲av中文字字幕乱码综合| 国产精品乱码一区二三区的特点| 亚洲在久久综合| 18+在线观看网站| 观看免费一级毛片| 九九爱精品视频在线观看| 国产v大片淫在线免费观看| 成人av在线播放网站| 99在线视频只有这里精品首页| 国产亚洲精品久久久com| 日本爱情动作片www.在线观看| 精品久久国产蜜桃| 亚洲精品色激情综合| 97人妻精品一区二区三区麻豆| 永久免费av网站大全| 黄色一级大片看看| 亚洲无线观看免费| 亚洲无线观看免费| 国产探花在线观看一区二区| 中文字幕久久专区| 国产高清三级在线| 又爽又黄a免费视频| 久久久久久久久久久丰满| 国产亚洲一区二区精品| 久久99热6这里只有精品| 久久精品国产亚洲av天美| 亚洲不卡免费看| 乱码一卡2卡4卡精品| 欧美97在线视频| 成人午夜精彩视频在线观看| 国产精品人妻久久久久久| 亚洲无线观看免费| 亚洲成av人片在线播放无| av在线亚洲专区| 搞女人的毛片| 亚洲最大成人中文| h日本视频在线播放| 国语自产精品视频在线第100页| 国产高清不卡午夜福利| 国产午夜福利久久久久久| 午夜福利高清视频| 深夜a级毛片| 久久精品国产自在天天线| 99久久精品热视频| 精品久久久久久电影网 | 国产在视频线精品| 插阴视频在线观看视频| 国内精品宾馆在线| a级毛色黄片| 欧美高清性xxxxhd video| 丝袜喷水一区| 黄色欧美视频在线观看| 国产午夜精品一二区理论片| 免费观看在线日韩| 色吧在线观看| 丰满少妇做爰视频| 欧美高清性xxxxhd video| 特级一级黄色大片| 久久久久久久久久久免费av| 小蜜桃在线观看免费完整版高清| 超碰97精品在线观看| 2021天堂中文幕一二区在线观| 国产亚洲精品久久久com| 国产乱人视频| 国产片特级美女逼逼视频| 一本久久精品| 中文乱码字字幕精品一区二区三区 | 中文字幕久久专区| 精品国内亚洲2022精品成人| 国产精品野战在线观看| 高清视频免费观看一区二区 | 久久久久久久国产电影| 99热这里只有精品一区| 又黄又爽又刺激的免费视频.| 成人一区二区视频在线观看| 国产大屁股一区二区在线视频| 级片在线观看| 日韩一区二区视频免费看| 天天一区二区日本电影三级| 九草在线视频观看| 全区人妻精品视频| 国产高潮美女av| 蜜臀久久99精品久久宅男| 黄片wwwwww| 亚洲自偷自拍三级| 精品免费久久久久久久清纯| 国产成人福利小说| 综合色av麻豆| 久久6这里有精品| 亚洲av免费高清在线观看| 三级毛片av免费| 特大巨黑吊av在线直播| 国产日韩欧美在线精品| 午夜视频国产福利| 网址你懂的国产日韩在线| 纵有疾风起免费观看全集完整版 | 久久精品夜色国产| 51国产日韩欧美| 中文字幕制服av| 大又大粗又爽又黄少妇毛片口| 亚洲无线观看免费| 在线观看66精品国产| 国产午夜福利久久久久久| 免费观看a级毛片全部| 亚洲精品色激情综合| 男女国产视频网站| 性插视频无遮挡在线免费观看| 春色校园在线视频观看| 在线免费观看不下载黄p国产| 男人狂女人下面高潮的视频| 亚洲天堂国产精品一区在线| 亚洲无线观看免费| 美女脱内裤让男人舔精品视频| 日本免费一区二区三区高清不卡| 亚洲成人中文字幕在线播放| 欧美精品国产亚洲| 69人妻影院| 国产精品久久久久久精品电影小说 | 人人妻人人澡欧美一区二区| 亚洲伊人久久精品综合 | av在线播放精品| 午夜精品在线福利| 亚洲国产精品久久男人天堂| 国产午夜精品一二区理论片| 全区人妻精品视频| 欧美日韩在线观看h| 亚洲熟妇中文字幕五十中出| 91在线精品国自产拍蜜月| 精品欧美国产一区二区三| 中文字幕制服av| 中文字幕av在线有码专区| 美女脱内裤让男人舔精品视频| 日本色播在线视频| 狂野欧美激情性xxxx在线观看| 国模一区二区三区四区视频| 桃色一区二区三区在线观看| 亚洲国产成人一精品久久久| 日韩视频在线欧美| 人人妻人人澡人人爽人人夜夜 | 日本黄色片子视频| 欧美成人午夜免费资源| 天堂av国产一区二区熟女人妻| 国产老妇女一区| 国产一区二区在线观看日韩| 国产精品三级大全| 六月丁香七月| 免费看av在线观看网站| 国产日韩欧美在线精品| 亚洲色图av天堂| 日本五十路高清| 一边亲一边摸免费视频| 一边摸一边抽搐一进一小说| 欧美丝袜亚洲另类| 精品久久久久久久久久久久久| 久久久久久久久中文| 国产一级毛片七仙女欲春2| 91aial.com中文字幕在线观看| 变态另类丝袜制服| 性插视频无遮挡在线免费观看| 最近的中文字幕免费完整| 亚洲av不卡在线观看| 成人一区二区视频在线观看| 亚洲最大成人中文| 国产精品综合久久久久久久免费| 国产精品久久久久久精品电影| 听说在线观看完整版免费高清| 91精品国产九色| 91精品一卡2卡3卡4卡| 国产极品精品免费视频能看的| 婷婷色综合大香蕉| 亚洲国产欧美人成| 午夜福利在线观看吧| 成人二区视频| 99热精品在线国产| 成人亚洲欧美一区二区av| 日本与韩国留学比较| 国产精品人妻久久久影院| 91精品伊人久久大香线蕉| 青春草国产在线视频| 中文字幕久久专区| 小说图片视频综合网站| 男的添女的下面高潮视频| 色综合亚洲欧美另类图片| 校园人妻丝袜中文字幕| 韩国av在线不卡| 观看免费一级毛片| 99久久九九国产精品国产免费| 村上凉子中文字幕在线| 成年女人永久免费观看视频| 国产在视频线精品| 十八禁国产超污无遮挡网站| www.av在线官网国产| 中文欧美无线码| 久久久久免费精品人妻一区二区| 欧美日韩综合久久久久久| 午夜福利在线在线| 色哟哟·www| 午夜精品在线福利| 国产乱人偷精品视频| 日韩欧美 国产精品| 在线观看美女被高潮喷水网站| 日本一本二区三区精品| 国产av在哪里看| 97热精品久久久久久| 久久这里有精品视频免费| 亚洲成人中文字幕在线播放| 成年女人永久免费观看视频| 亚洲四区av| 蜜桃久久精品国产亚洲av| 久久久欧美国产精品| 身体一侧抽搐| 亚洲av男天堂| av卡一久久| 久久久久久久国产电影| 国产成人freesex在线| 国产三级在线视频| 狂野欧美激情性xxxx在线观看| 午夜爱爱视频在线播放| 亚洲在线自拍视频| 你懂的网址亚洲精品在线观看 | 国产老妇伦熟女老妇高清| 国产一区有黄有色的免费视频 | 国产精品国产三级国产专区5o | 精品国产三级普通话版| 综合色丁香网| 在现免费观看毛片| 超碰97精品在线观看| 国产精品.久久久| 久久婷婷人人爽人人干人人爱| 69av精品久久久久久| 亚洲精品乱码久久久v下载方式| 小说图片视频综合网站| 日韩欧美三级三区| 一本一本综合久久| 久久精品熟女亚洲av麻豆精品 | 国产单亲对白刺激| 天天一区二区日本电影三级| www日本黄色视频网| 美女内射精品一级片tv| 尤物成人国产欧美一区二区三区| 亚洲电影在线观看av| 亚州av有码| 最近2019中文字幕mv第一页| 97超碰精品成人国产| 亚洲欧美精品专区久久| 69人妻影院| 高清毛片免费看| 精品熟女少妇av免费看| 九色成人免费人妻av| 最近的中文字幕免费完整| 麻豆成人av视频| 26uuu在线亚洲综合色| 日韩欧美精品免费久久| 国产精品麻豆人妻色哟哟久久 | 亚洲欧美日韩东京热| 日韩制服骚丝袜av| 18禁裸乳无遮挡免费网站照片| 国产色爽女视频免费观看| 亚洲欧美精品自产自拍| 97在线视频观看| 久热久热在线精品观看| av福利片在线观看| 色吧在线观看| 日韩 亚洲 欧美在线| 精品少妇黑人巨大在线播放 | 亚洲欧美一区二区三区国产| 国产精品99久久久久久久久| 久久这里只有精品中国| 丰满少妇做爰视频| 99热精品在线国产| 日韩人妻高清精品专区| 免费观看人在逋| 高清毛片免费看| 日本黄大片高清| 亚洲av电影在线观看一区二区三区 | 免费看av在线观看网站| 伦理电影大哥的女人| 亚州av有码| 少妇熟女欧美另类| 99久久九九国产精品国产免费| 国产色爽女视频免费观看| 99热这里只有是精品50| 精品人妻偷拍中文字幕| 一级二级三级毛片免费看| 女的被弄到高潮叫床怎么办| 熟女电影av网| 久久人人爽人人爽人人片va| 建设人人有责人人尽责人人享有的 | 久久精品国产自在天天线| 视频中文字幕在线观看| 国产久久久一区二区三区| 永久免费av网站大全| 搡老妇女老女人老熟妇| 又爽又黄a免费视频| 日韩欧美 国产精品| 69人妻影院| 天堂网av新在线| 91aial.com中文字幕在线观看| 国语对白做爰xxxⅹ性视频网站| 日韩一区二区视频免费看| 国产 一区精品| 亚洲四区av| 两性午夜刺激爽爽歪歪视频在线观看| 美女高潮的动态| 伊人久久精品亚洲午夜| 免费不卡的大黄色大毛片视频在线观看 | 亚洲乱码一区二区免费版| 久久午夜福利片| 久久亚洲国产成人精品v| 久久这里只有精品中国| 国产成人aa在线观看| 日韩,欧美,国产一区二区三区 | 嘟嘟电影网在线观看| 亚洲中文字幕日韩| 偷拍熟女少妇极品色| 真实男女啪啪啪动态图| 亚洲成人精品中文字幕电影| 日本一二三区视频观看| 91狼人影院| 精品午夜福利在线看| 久久草成人影院| 国内精品美女久久久久久| 午夜亚洲福利在线播放| 黄色欧美视频在线观看| 3wmmmm亚洲av在线观看| 久久久国产成人免费| 亚洲国产精品合色在线| 天堂√8在线中文| 特大巨黑吊av在线直播| 中文天堂在线官网| 亚洲精品影视一区二区三区av| 欧美变态另类bdsm刘玥| 色综合亚洲欧美另类图片| 狂野欧美白嫩少妇大欣赏| 黄色日韩在线| 狂野欧美激情性xxxx在线观看| 欧美高清性xxxxhd video| 全区人妻精品视频| 男人舔女人下体高潮全视频| 九色成人免费人妻av| 禁无遮挡网站| 高清在线视频一区二区三区 | 啦啦啦观看免费观看视频高清| 日韩,欧美,国产一区二区三区 | 午夜福利视频1000在线观看| av在线亚洲专区| 国产一区亚洲一区在线观看| 一卡2卡三卡四卡精品乱码亚洲| 午夜日本视频在线| 99久国产av精品国产电影| 久久久久久久久久久免费av| 听说在线观看完整版免费高清| 国产日韩欧美在线精品| 最新中文字幕久久久久| 99热全是精品| 成人毛片a级毛片在线播放| videossex国产| 欧美激情国产日韩精品一区| 国产亚洲91精品色在线| 国产久久久一区二区三区| 亚洲真实伦在线观看| 久久久国产成人免费| 国产精品1区2区在线观看.| 午夜亚洲福利在线播放| 99热这里只有是精品50| 久久精品久久久久久噜噜老黄 | 中文亚洲av片在线观看爽| 午夜亚洲福利在线播放| 大又大粗又爽又黄少妇毛片口| 午夜a级毛片| 国产视频内射| 永久免费av网站大全| 99国产精品一区二区蜜桃av| 国产精品不卡视频一区二区| 亚洲av福利一区| 十八禁国产超污无遮挡网站| 爱豆传媒免费全集在线观看| 久久久精品大字幕| 国产国拍精品亚洲av在线观看| 精品国内亚洲2022精品成人| 国产国拍精品亚洲av在线观看| 美女被艹到高潮喷水动态| 国产国拍精品亚洲av在线观看| 啦啦啦韩国在线观看视频| av又黄又爽大尺度在线免费看 | 青春草视频在线免费观看| 亚洲怡红院男人天堂| 国产精品伦人一区二区| 国产三级中文精品| 国产亚洲av嫩草精品影院| 国语自产精品视频在线第100页| 少妇裸体淫交视频免费看高清| kizo精华| 亚洲欧洲日产国产| 夜夜爽夜夜爽视频| 亚洲精品乱久久久久久| 国产av一区在线观看免费| 久久精品久久久久久噜噜老黄 | 永久免费av网站大全| 男人的好看免费观看在线视频| 国语自产精品视频在线第100页| 午夜亚洲福利在线播放| 尾随美女入室| 中国国产av一级| 小蜜桃在线观看免费完整版高清| 国产精品日韩av在线免费观看| 乱码一卡2卡4卡精品| 亚洲伊人久久精品综合 | 亚洲精华国产精华液的使用体验| 变态另类丝袜制服| 青春草视频在线免费观看| 亚洲精品色激情综合| 又黄又爽又刺激的免费视频.| 久久这里只有精品中国| 中文字幕免费在线视频6| 亚洲国产精品sss在线观看| 青春草国产在线视频| 亚洲av中文av极速乱| 免费黄色在线免费观看| 日韩人妻高清精品专区| 熟女人妻精品中文字幕| 国产高潮美女av| 国产淫片久久久久久久久| 永久免费av网站大全| 国产精品熟女久久久久浪| 欧美日韩一区二区视频在线观看视频在线 | 亚洲av免费在线观看| 级片在线观看| 日日撸夜夜添| 色尼玛亚洲综合影院| 国产一区二区在线观看日韩| 国产精品久久久久久久久免| 日韩欧美精品v在线| 蜜桃亚洲精品一区二区三区| 亚洲精品日韩av片在线观看| 亚洲欧美精品综合久久99| 久久国产乱子免费精品| 91精品国产九色| 3wmmmm亚洲av在线观看| 免费黄网站久久成人精品|