• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

    2022-03-14 09:25:44MamoonSaeedMohammadKamrulHasanRosilahHassanRaniaMokhtarRashidSaeedElsadigSaeidandManojGupta
    Computers Materials&Continua 2022年3期

    Mamoon M.Saeed,Mohammad Kamrul Hasan,Rosilah Hassan,Rania Mokhtar,Rashid A.Saeed,4,Elsadig Saeid and Manoj Gupta

    1Electrical Engineering Department,Faculty of Engineering,Alzaiem Alazahri University,Khartoum,Sudan

    2Center for Cyber Security,Faculty of Information Science and Technology,Universiti Kebangsaan,Malaysia(UKM),43600,Bangi,Malaysia

    3Department of Computer Engineering,College of Computers and Information Technology,Taif University,PO Box 11099,Taif,21944,Saudi Arabia

    4Department of Electronics Engineering,College of Engineering,Sudan University of Science and Technology,Khartoum,Sudan

    5Department of Electronics and Communication Engineering,JECRC University,Jaipur,India

    Abstract: The fifth generation (5G) system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate, more capacity, and low latency.However,these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover, it improves the synchronization between mobile users and home networks.Additionally, its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.

    Keywords: 5G; privacy and security; user identity; IMSI; authentication and key agreement (AKA)

    1 Introduction

    Mobile communication is important to the lives of people to accomplish daily routines; therefore, this field has been given much attention by researchers.The use of mobile communication has become widespread in business, medicine, and Internet of Things (IoT) as well as in all aspects of life [1].IoT has potential applications in device-to-device (D2D) communications, industries,medicines, machines, and vehicles, which need extensively high data rates and data interchange.It is well known that big data and cloud computing are crucial aspects of the forthcoming fifth generation (5G) network, under which an enormous number of services run.At the same time,security and privacy become more critical for most applications [2].The threat vector for 5G can across/accelerate with the wide spectrum of 5G services and applications and its vital role to serve society for social and economic growth as well as public safety.5G will become a higher connected service network (SN) than the previous network generations, leading to an increased exposure to threats and attacks [3].For criminals driven by various motives, such as cyber warfare,state-sponsored political motives, adversaries, organized crime cartels, and espionage, there is a greater chance that 5G will be a crucial target.Mastering and learning the current challenges and threats to fourth generation (4G) networks are among the best approaches to prepare for security challenges in 5G.It will inherit most of the security threats in 4G (Long-Term Evolution(LTE) and LTE Advanced) networks, as previously mentioned, due to the core IP-based nature of 5G.3GPP ensures the user’s security and privacy to allow the companies and customers to exchange information securely.Compared with previous generations, the authentication will change to mutual authentication between user equipment (UE), home network (HN), and SN rather than between UE and HN only without the SN involvement as in the second generation [4].

    The Authentication and Key Agreement (AKA) protocol uses the international mobile subscriber identity (IMSI) to identify the UE in the network and accomplish the authentication process; simultaneously, the permanent identity, namely, IMSI, sends through clear text [5].However, 3GPP uses Globally Unique Temporary Identifier (GUTI) and Cell Radio Network Temporary Identifier (C-RNTI) as well as Temporary Mobile Subscriber Identity (TMSI) for a particular mobile subscriber at diverse stages for various facilities in the 4G system architecture [6].

    In this paper, authentication in the 5G system is analyzed.The paper assumes the basic architecture of the 5G system in the same way as the 4G system.In Section 2, the security and privacy of the 5G system are discussed.In Sections 3, 4, and 5, the related works, user identity privacy issues, and AKA procedure are presented, respectively.In Sections 6 and 7, the proposed solution and Enhanced Authentication and Key Agreement (EAKA) are presented and verified.In Section 8, the user identity’s proposed preservation privacy based on the pseudonym variable in 5G is analyzed.Finally, Section 9 concludes the paper with remarks and recommendations.

    1.1 Mobile Security and Privacy

    Security and privacy in mobile communication are vital issues in which many updates and developments are centralized on the authentication and enhancement of the AKA protocol [7].The authentication process in 4G is implemented between three parties: Home Subscriber Server(HSS), Mobility Management Entity (MME), and UE with Universal Subscriber Identity Module(USIM) and Mobile Equipment (ME), as presented in Fig.1.The UE sends a message to the SN consisting of the IMSI (in plain text).The MME sends a message consisting of the IMSI to the HSS in the authentication vector (AV).

    As presented in Fig.1, the HSS responds to the AV request by generating Random Changeable Challenge (RAND) with 128 Ciphering Key (CK), Integrity Key (IK), and Anonymity Key (AK), and the Expected Responses (XRES) are computed over RAND challenges.AK and Authentication Management Field (AMF) keys are slightly longer than the calculated Sequence Number (SQN).Then, by using the SQN, RAND, and AMF, the Message Authentication Code(MAC) is computed by using the Network Authentication Function (f1).Subsequently, f2, f3, f4,and f5 were produced by XORing the Authentication Token (AUTN), which contains the SQN with the MAC.Finally, the AV, which consists of CK, IK, XRES, AUTN, and RAND, is created by the HSS.The AV is sent to the MME, which then forwards the AUTN and RAND upon an authentication request to the UE and saves the XRES [8].

    Figure 1: Authentication and key agreement (AKA) in 4G

    For 5G applications, i.e., healthcare, financial, and other IoT network, the authentication would ensure a high degree of security and privacy.Numerous researchers are interested in and focused on 5G security and privacy to enhance identity privacy and hide permanent IMSI.There are many proposals and researches for user identity privacy.Some studies assumed the new architecture with Network Functions Virtualization (NFV) and Software-Defined Networking(SDN) for 5G networks, as presented in Tab.1.

    Conversely, some researchers have assumed the same architecture of 4G for 5G networks with new proposals for enhanced user identity privacy.Two groups are working on security architecture and AKA proposal in 5G using the standard guideline [9].Low computation complexity and communication overhead have been achieved due to the consideration of similar security architecture for the previous generations; the proposal can also fit easily in the preceding generations and the current architecture.Furthermore, it imposes minimal modifications to the network parties.However, a new security architecture and the AKA mechanism are also being considered for 5G with the NFV and SDN, as presented in Tab.1.However, a significant drawback of this proposal is that devices using NFV are required to adjust the most network entities that require costly hardware to be replaced, which may be more expensive and require high computation complexity and communication overhead [10].

    2 Related Works

    Extensive research has studied the uses of the SN shared group keys, private key, or public-key SN while hiding the permanent identity.In [11], a procedure was developed based on identitybased encryption to challenge this type of encryption.However, the method is called privacy enhanced fast mutual authentication (PEFMA) used to encrypt the IMSI.In this procedure, the SN has public keys, and the UE does not need to join the HN.The permanent identity of UE is hidden once it is encrypted using the public key of the SN.The PEFMA can run without communicating with the HN, as the SN and UE have the public keys.

    Table 1: Potential security solutions for targeted threats

    In [12], the Mobility Support System (MSS) is offered as a primary key to keep the permanent identity of the user in a 5G system secured with a slight effect on the communication standards.Contrarily, two crypto libraries, namely, Nettle and Open SSL, are used to implement the 5G communication standard in four Android-based schemes.The developed method for Android execution is evaluated; such an execution involves the unequal method of Elliptic Curve Integrated Encryption Scheme (ECIES).Furthermore, the effect of the applied estimation of encrypting the IMSI in 5G networks is induced by using ECIES without the MAC [13].

    In [14], the structures of 3GPP AKA are presented to offer faultless onward privacy for the session key.The USIM card and mobile device interfaces do not influence the new design and, consequently, permit re-use of the present prepared USIM.However, motionless extortions continue to the sitting K’ASME key.The paper proposes to bind the belongings of a secret key K by considering a sensibly slight effect on the legacy of 3GPP constructions.

    Another study investigated the IMSI encryption in which the IMSI-NC and CC data have defined and publicized the hidden identifier [15].However, the routing requests for validation data between HN and visited network as well as the request for other IMSI data to be publicized within the HN are discussed here.

    A proposal on Quantum Key GRID based the Authentication and Key Agreement in 5G(QKG-AKA) for dynamic security association, which has also been deployed in 4G [16,17].Another study proposed the efficient and lightweight secure SEL-AKA algorithm for the 5G scheme.The suggested mechanism is designed regardless of the use of the global public-key infrastructure.These encryption solutions offer user anonymity by employing numerous methods for encrypting the identity via private-key or public-key cryptography.However, the additional calculation and complication may result in increased bandwidth and calculation period and may need new parameters.

    Researchers have used pseudonyms to hide the permanent identity in 5G; for instance, [18]proposed a novel scheme for defending the permanent identity by regenerating a pseudonym in the intermediate of the HN and the UE.The pseudonym is locally initiated at the HN and UE,leading to a poor performance by the available USIMs.Two main stages are suggested in this work.First is fast attachment by the UE when the SN or HN does not join any pseudonym.In this situation, the UE allocates a TMSI by the SN and a pseudonym P by the HN.At the second stage, the UE is enforced to detect itself using P, whereas the UE TMSI is no longer at risk within the SN, and a new pseudonym will be used to support the unlinkability.

    In [19,20], a new version of the 5G AKA protocol is suggested, in which random numbers replace the sequence numbers since the existing 5G (USMs) can accomplish randomized asymmetric encryption processes; thus, the utilization of random numbers for AKA protocol is conceivable.Furthermore, the suggested solution offers two extra security topographies, i.e., forward security and post-compromise security, which do not exist in the present 5G AKA procedure.Then, the performance is evaluated (both the communication efficiency and computation) by the suggested AKA protocol, and its results are compared with those of the presented 5G AKA procedure.

    These methods attempt to develop pseudonym in 5G systems.However, the techniques have various drawbacks: the administration of pseudonyms requires superfluous handling exertion and memory cost.The distribution of pseudonyms to all UE from the system requires an extra bandwidth.Finally, numerous studies suggested new architectures and formats in 5G networks.For example, in [20], a general idea was provided for the security contests in SDN, NFV, and clouds as well as customer solitude contests.Moreover, the authors recommended that shared activities and trust imitations must occur among numerous parts in the procedure, such as network operator, service provider, application designer, user, and manufacturer, on information using and storing to preserve the user privacy in 5G networks.

    In [21], the user privacy issues in LTE and WiMAX have been addressed at the MAC and physical layers.The privacy improvement in 5G was indicated by the production of a flexible 5G system architecture that authorizes the generation of trust replicas.Reference [22] proposed two key agreement protocols and the Privacy-Preserving Authentication (PPAKA-IBS and PPAKAHAMC) to ensure protected and unknown communications in the D2D group.

    In [23], in a new structure designed for 5G network security, the scrutiny of independence management and flexible validation of AKA are addressed.The AKA in the 4G network is proven by the symmetric-key, whereas the 5G network needs validation between the UE and SN and other third parties, such as service suppliers.The hybrid and flexible validation of UE could be performed practically using three diverse methods: validation by the service supplier and SN, validation by the service supplier only, and validation by the SN only.Conversely, in [24],5G is declared to be accepting novel-based multiparty ecologies, in which many performers can cooperate in the overhaul source.According to the authors 5G intensively relies on software replicas, such as slicing and SDN.It is also suggested that the precursors of the 5G system need to go through the regularity of the systems while confirming the users’privacy.The authors in [25]conducted a similar study as [26]; however, they conducted correlational research and presented SDN into the 5G network to support operative validation handover (HO) and fortification of privacy.In [27], an approach based on a trusted third party worked like a disseminated network between the service supplier and the customer.In [28], the complete official archetypal of a procedure from the AKA group is provided.Moreover, missing security objects are identified, and exact requests are removed from the 3GPP principles describing 5G.

    In [29], 4G-RAM is proposed to discourse the current subjects of the 4G network and consider it as an excellent communication and information technology network that suits the increasing 5G demands and acute PS schemes.However, the verification and re-authentication processes of 4G-RAM indicated that integrity and confidentiality are sheltered with the dynamic LTE K.Therefore, it overwhelmed the critical privacy susceptibilities of the LTE network, such as the user tracking based on redirection, IMSI, AV de-synchronization, denial-of-service attacks,and man-in-the-middle attack prevention.4G-RAM is used to minimize access dormancy by suggesting PEPS-AKA and 4G + FRP that contain slight verification signaling related to other new solutions.

    Most of the methods aimed to provide mutual entity authentication in 5G networks and suggested a novel verification procedure, with complete communal verification between the SN and UE.Moreover, these methods modified the AKA protocol, message elements, SN, and UE,as well as new extra components, such as NVF and SDN.This is a significant drawback because using those methods is essential to the adjustment of the bodily level network, which could lead the hardware to be replaced; however, this may be more expensive than the conventional AKA protocol.

    As discussed above, research on the critical topic of privacy in 5G networks has been conducted.Thus, their comparison is presented in Tab.2.A snapshot of the related works is also shown.

    Table 2: Protocol comparison

    Table 3: Results of the automatic verification of the fixed procedures

    3 User Identity Privacy Issues

    User identity privacy is the main issue in mobile communication security, whereas the IMSI exposure is the main issue in user identity privacy.The IMSI is used in the network to identify the UE; therefore, assailants may capture it.Such a vulnerability is usually noted as IMSI catching [30].For that, the 3GPP allocates several diverse short-term identities, such as CRNTI, GUTI, and M-TMSI, to a mobile user for different networking services within the mobile network.To improve the confidentiality of the UE identity, the mobile user, instead of using the permanent one (IMSI), can use these temporary identities to identify itself to start a new service request from the network [31,32].Although this procedure is employed to enhance user identity privacy, the user’s permanent identity stays exposed to IMSI catchers.There are some circumstances where the UE uses the IMSI (in clear text) to identify itself; following are some cases for such scenarios:

    (a) The SN might not get well the GUTI of the UE.

    (b) UE starts the first attachment.

    (c) UE performs the HO between MMEs, and the new MME could not get the GUTI of the UE from the previous MME.

    (d) MME could not recover the permanent identity of the UE.

    In the 5G system, user identity privacy must be improved to keep an extra privacy level and to achieve safe interchanging of information with mutual authentication.In the 5G system, a robust identity administration mechanism is requested to defend the user’s identity from unauthorized access of users.The 5G network will be dealing with the environment by different bearings and comprise several investors.

    4 AKA Protocol

    To provide both the established and shared IK and cipher key CK and to achieve mutual authentication between the HN and UE, the AKA process is applied for the physical channel of E-UTRAN.The details of the AKA protocol are discussed in a previous report [14].

    The Evolved Packet System-Authentication and Key Agreement (EPS-AKA) process involves two sub-processes.The first sub-process is directed toward the AKA whereas the second to the distribution of validation data from the HN to the MME.The first sub-algorithm is executed by the MME while receiving the authentication data response from the HSS.Contrarily, the second sub-process is executed by the MME while receiving the attached request from the UE.The HSS and UE share a permanent top-secret key K.Two SQNs, i.e., SQNUEand SQNHE,are also preserved by the UE HSS to enhance the network’s authentication.SQNUEis the uppermost sequence number acknowledged by the USIM, whereas SQNHEis a counter for each UE equipment that is utilized to generate the AVs in the HSS.The EPS-AKA provides a set of MAC functions {f1, f2} and key generation functions {f3, f4, f5}.K, as presented in Fig.2,organizes the functions.

    Figure 2: AKA protocol by using the IMSI to identify the UE in the network and accomplish the authentication process authentication and key agreement (AKA)

    5 Privacy-Preserving Scheme for the 5G System

    To preserve user identity privacy, the permanent identity of the IMSI must be hidden completely by replacing it with the Variable Mobile Subscriber Identity (VMSI); the HSS node can only plan its IMSI for a specific UE.The UE uses the VMSI when it is required to represent its IMSI.In this way, the UE identity privacy is well maintained because the UE and HSS only know the IMSI of the UE, as presented in Fig.3.

    The HSS sends a fresh, unpredictable VMSI called (VFRESH) that is confidential to the UE in the authentication process.To implement this idea, we suggest essential variations in the features and usages of some basic validation boundaries, which are SQN and RAND.In addition,we recommend encryption of the RAND using SQN token as a key, generated randomly at every run for the EAKA protocol, and using the challenge RAND to provide the UE with the sequence number SQNHEand the new VMSI.The RAND challenge is secured, including the token SQNHE, to get the UE sequence number (SQNUE).The UE uses the RAND challenge to get the new SQNHEand the new VMSI (VNEW) through a regular authentication procedure.The UE replaces its VMSI with a new VMSI (VNEW), which would be used the next time the authentication process is carried out.In implementing the proposed solution, the EAKA protocol is introduced.Tab.3 presents all the acronyms and their descriptions, which are used in the ProVerif code, obtained figures, and algorithms.

    Figure 3: Privacy-preserving scheme for the5G system using EAKA

    6 Enhaned AKA(EAKA)Protocol

    In the beginning, the UE transmits a message containing its VMSI; the message also includes the VMSIFIRSTto the SN (MME).Whenever the UE wants to join the network, the MME sends an endorsement data request to the HN (HSS) for the incoming VMSI.The HSS generates a new VMSI and sends it to the MME, and the MME then forwards the VMSI to the UE.The details of the EAKA protocol are discussed in Sections A and B.

    A.Enhanced HSS Algorithm

    Upon enhancing the HSS algorithm, there are two VMSI values for each UE stored in HSS,namely, V and VNEW.V is employed to support the VMSI currently used by the UE.However,VNEWsends the newly produced VMSI assigned to the UE to be used in the following stages to replace its permanent identity.The HN (HSS) saves the extra values V and VNEWin its database with the secret key K and the IMSI for each UE, as presented in Fig.4.

    This procedure ensures that the HSS can continuously communicate with the current VMSI saved in the UE with the original IMSI saved in the HSS to identify each UE.Likewise, the SN that hosts the MME preserves V and VNEWin its database for every UE within its area of service to be able to identify each user’s equipment.There is a permanent memory storage that contains b=234unique VMSI entrances named as VMSI-Index and saved in the HSS (see Fig.3).Every VMSI entrance in the VMSI-Index has a value called VMSI status.A VMSI is previously assigned to several UEs that have a NEGATIVE indicator in its VMSI status, suggesting that other UEs use this VMSI.

    Figure 4: The VMSI-Index and the HSS’s database

    A VMSI status with a POSITIVE indicator for a specific VMSI in the VMSI-Index indicates that the VMSI is available and is not used by any UE.Finally, a function ENCODE is specified by an operator and used to encrypt VNEWand SQNHEwith the key SQN in the HSS to create the encrypted RAND.To implement the EAKA protocol, there are some changes in the HSS protocol presented in Algorithm 1.

    Firstly, the HSS should confirm that an incoming VMSI is legal and currently not used by several UEs by discovering the received VMSI in the database of the HSS before it decides whether to receive a VMSI-based validation request or not.The request is barred when no attachment is found.The HSS locates the secret key K and the corresponding UE’s IMSI when a match is found.

    The HSS issues a not-in-use (fresh) VMSI named VFRESHto the assigned UE, and information linked to the UE is updated at the HSS like the sequence number SQNHEand the VMSIs,after the HSS validates that the received VMSI is the latest VMSI transmitted to the UE by checking VMSI = VNEW.

    The SQNHEis handled at the HSS, which confirms that the previous validation process was successful.Once it receives the VNEWfrom the UE, the HSS immediately updates the SQNHE(see Algorithm 1).

    ?

    (Continued)

    ?

    The HSS generates AV when it receives the request message as follows:

    1.Validate whether the incoming VMSI is now used by any UE or not.If the VMSI is not in use, the HSS rejects the request.

    2.If the UE transmits the VMSI (VNEW), the HSS updates the VMSI and other UE’s related information at the HSS.

    2.1 From the VMSI-Index HSS selects a fresh VMSI, i.e., VFRESHupdate VMSI-Index→VFRESH

    2.2 Store VMSI in V.update V→VMSI-Index

    2.3 The V and VNEWare kept within the UE’s IMSI at the HSS-database update.update VFRESH →VNEWupdate VNEW→V

    2.4 The sequence number SQNHEis updated.SQNHE+ 1→SQNHE

    3.A new random key SQN is generated.

    SQN = (0, 1)48

    4.A challenge RAND is computed by encrypting VNEWand SQNHEusing ENCODE with

    SQN as the input key.

    RAND = ENCODE (SQN, (s = (SQNHE, VNEW)))

    5.MAC is computed by function (f1) over RAND, AMF, and SQN.

    MAC = f1(K, (RAND, AMF, SQN)

    6.The residual authentication parameters are computed: AK, IK, AUTN, XRES, and CK,as presented in Fig.4.

    7.The AV is transmitted to the MME, which must forward RAND and AUTN to the UE.

    First, the HSS confirms that an incoming VMSI is valid and now in use by other UE locating the incoming VMSI in the HSS’s database (step 1), before it decides whether to accept the VMSI-based authentication demand or not.The request is rejected when no matches are found.Moreover, the HSS locates the secret key K and the corresponding UE’s IMSI when a match is found.In step 2, the HSS allocates a fresh (not-in-use) VMSI called VFRESHto the concerned UE and updates information related to the UE in the HSS like the sequence number SQNHEand the VMSIs, after the HSS confirms that the VMSI that arrived is the latest one transmitted to the UE by checking VMSI = VNEW(sub-steps 2.1 through 2.4).

    B.The Enhanced UE Algorithm

    The algorithm can be enhanced using a unique VMSI value that must be preserved in the UE smart card (USIM).The service provider embeds an individual VMSI value named VMSIFIRSTinto the USIM before the first connection.The HSS database also stores the VMSIFIRSTvalue in the VNEWfor each USIM’s IMSI and is set to the NEGATIVE status of the VMSIFIRSTentrance in the VMSI-Index.Throughout the first run of the EAKA protocol, the VMSIFIRSTis used only once.In other times, the specific function DECODE is used by the service provider to decrypt a RAND at the UE and use the unsystematic key SQN comprised in AUTN to extract the VNEWand SQNHE.When UE receives AUTN and RAND, it validates the AUTN and calculates the validation reaction message, as presented in Algorithm 2.

    ?

    (1) The AK is computed by using the function (f5).

    (2) The random key XSQN is extracted.

    (3) XMAC is computed over AMF, XSQN, and RAND.

    (4) The MAC included in the AUTN is computed using XMAC.

    (5) If XMAC equals MAC, RAND is decrypted using DECODE with the input key XSQN to recover s.SQNHEand s.VNEW.

    (6) The received sequence number is verified as SQNUE+ 1=s.SQNHE

    (7) The AUTN is verified successfully if SQNHEis in the right range.

    (8) The sequence number SQNUEis updated, and the IK, CK, and response RES are computed.

    (9) The VMSI updates to s.VNEW.

    (10) The keys IK and CK are stored in the UE, and the RES is sent back to the MME.The MME compares the XRES, which was received from the HSS with the response (SRES)of the UE.The authentication is successful if XRES = SRES.

    The MME sends an authentication to reject the message to the UE if XRESSRES, as presented in Algorithm 2.

    C.Formal Verification

    For the performance measurement and implementation of the cryptographic protocols, the ProVerif tool is used.This tool is not limited to cryptographic primitives; it also supports hash functions, asymmetric and symmetric encryption, digital signature evidence, etc.ProVerif is compatible with the Linux, Mac, and Windows operating systems.It is used to verify the capability properties, declarations, and observational and communication correspondence.

    These competencies are essential and valuable to the security and privacy domain.ProVerif studies, examines, and validates privacy possessions.Furthermore, developing possessions such as verifiability, privacy, and traceability could also be deliberated.The proposed protocol is analyzed in terms of the infinite number of sittings and infinite space of messages.Also, ProVerif is proficient in the modernization of attack: wherever the possessions could not be verified, ProVerif attempts to rebuild an operation suggestion that fabricates the wanted controls.Some authors suggested a new architecture, and others proposed a novel verification procedure, with complete communal verification between the SN and UE.Contrarily, others modified the AKA protocol,message elements, SN, and UE, as well as new extra components such as NVF and SDN.

    In this paper, the suggested EAKA enforces protected validation and identification and preserves the privacy of the UEs, i.e., unlinkability and user anonymity threats, as presented in Tab.3, which are applied in the fixed procedure by ProVerif, as shown in the Appendix.The ProVerif code is also given in the Appendix.The proposal’s fundamental idea is that an outside observer (enemy) cannot see any differences in the procedure sequence because any two implementations vary only in user identities where the evidence is produced by utilizing the database of messages [32-34].

    7 EAKA Solution Benchmarking

    In this section, the current solution is compared with some very related works in the literature.The benchmarking starts with methods of the first classification, i.e., methods that adopt public-key cryptography to enhance privacy.This classification comprises the works of [35-37].Utilization of public-key cryptography to encrypt the IMSI was the core characteristic of the operations of this class.

    The core dissimilarity between the EAKA solution and the existing solutions with regard to user identity privacy is a metaphysical one.The existing methods for the UE require the accomplishment of the operation of encryption before the transfer of the IMSI.Then, the HSS decrypts the IMSI, which is encrypted before processing the demand, as presented in Fig.5.Fig.6 shows the computation delay, in which the proposed solution achieved lower computation delays compared with the existing ones.Although the UE’s privacy can be conserved throughout the attachment process, the public-key cryptography can enhance it.The high processing, data traffic overhead, and complexity as a product of communicating encrypted IMSIs from one MME to another in the authentication procedures and HO are still substantial.The various method proposals must study the UE’s processing power to preserve the processing exertions tolerable at the UE.It presents the issue of improving user identity confidentiality for 5G and new concepts using the 3GPP standard that locally manages a randomized address for the UE’s WLAN MAC address as a replacement for a generally managed MAC address to alleviate the recognized risk.

    In addition, a different version of the 5G AKA procedure is proposed.In this new procedure,the SQNs are swapped with random numbers.The current USIMs are now capable of performing randomized asymmetric encryption operations.The use of random numbers for the 5G AKA protocol is conceivable.

    The EAKA solution is better than the existing ones; the existing methods are complicated and have numerous cryptography functions.The UE’s WLAN MAC management and a different version of the 5G AKA would require memory cost and extra processing effort.Thus, the amount of processing effort for user elements is enormous as they are re-processed with every authentication process.

    Figure 5: Identification delay comparison among AKA, EAKA, PMSI, and PEFMA

    Figure 6: Authentication load at HSS

    Additional variance with [19] lies in the management of the SQN.In fact, by reiterating and transmitting PMSI that included multiple false attachment requests to the HN, an adversary can carry out the server HSS to be out of sync.This is because the method proposed in [19]continuously increases the sequence number at the HSS, which would allow an attacker to conduct a denial-of-service (DoS) attack toward the HSS.Conversely, the EAKA solution eliminates this probability as the sequence number is increased at both the HN and UE only on a successful run of the EAKA protocol.Figs.6 and 7 show the computation overhead on the HSS and UE,comparing the PMSI, AKA, and EAKA.These figures show that the time elapsed in the EAKA is closer to that in the AKA than that in the PMSI, and the time elapsed in the UE is more diminutive than that in the HSS because the overhead in the UE is negligible.Eqs.(1) and (2)are used to calculate the time elapsed:

    When the EAKA is applied in ProVerif, an outside attacker cannot see any differences in the procedure consequence because many implementations vary only in user identities.Moreover,when the number of authentication increases, the IMSI security also increases.Every time the VMSI is randomly changing, the choices become difficult for the attacker, the same as AKA,because the IMSI is kept without any modification.Fig.8 presents the level of IMSI security in AKA remains constant regardless of the number of authentications.In comparison, the IMSI security level in EAKA is increased because the values of the VMSI randomly change.

    Figure 7: Authentication load at UE

    Figure 8: IMSI security comparison between AKA and EAKA

    The proposed scheme sets the mainstream of computation overhead in the HN, which requires memory to save the extra values V and VNEW in its database with the secret key K and the IMSI for each UE, as presented in Fig.4.In comparison to the conventional method using AKA, a negligible computation overhead is placed in the UE.The computation overhead is negligible as the HN’s computational power is unlimited (see Fig.6).As shown in the process of the algorithm in the UE, we also suggest that the overhead of computation in the UE is negligible, as presented in Fig.7.

    8 Conclusion

    This paper presented a solution to preserve user identity privacy in the 5G system by enhancing the AKA protocol (EAKA), which proposed a variable pseudonym to identify the user in the 5G network rather than using permanent identity in the previous generations.The EAKA hides the identity of the user completely by using a temporary identity, i.e., VMSI.The temporary identity changes in every attachment, and the permanent IMSI is never used, even in the first attachment.The proposed solution does not add any computation overhead to the UE or the network, except light processing in the HSS.The proposed solution is compared with the AKA and the existing works.It is demonstrated that the EAKA can be used to enhance user privacy in the 5G network without any change in the AKA procedure or architecture.Moreover, it can be implemented in the previous generations to enhance user privacy, as verified by the ProVerif tool.

    Funding Statement:The Universiti Kebangsaan Malaysia (UKM) Research Grant Scheme GGPM-2020-028 funded this research.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    Appendix

    in(s2 s, (=ID_RESPONSE, vmsi: bitstring));

    out(s2 h, vmsi);

    in(s2 h, (rand: bitstring, (sqn_ak: bitstring, amf: bitstring, mac: bitstring), xres: bitstring, ck:key, ik: key));

    let autn = (sqn_ak, AMF, mac) in

    out(s2 s, (AUTH_REQUEST, rand, autn));

    in(s2 s, (=AUTH_RESPONSE, =xres)).

    let home(id1: bitstring, vmsi1_old: bitstring, vmsi1_new: bitstring, sqn1: bitstring, id2: bitstring, vmsi2_old: bitstring, vmsi2_new: bitstring, sqn2: bitstring) = new ksqn:bitstring;

    in(s2 h, vmsi_in: bitstring);

    let vmsi_new = switch(vmsi_in, vmsi1_old, vmsi1_new, vmsi2_old, vmsi2_new) in

    let k = getKey(switch(vmsi_in, vmsi1_old, id1, vmsi2_old, id2)) in

    let sqn = switch(vmsi_in, vmsi1_old, sqn1, vmsi2_old, sqn2) in

    let rand = enc((vmsi_new, sqn), tc(ksqn)) in

    let mac = f1(k, sqn, AMF, rand) in

    let xres = f2(k, rand) in

    let ck = f3(k, rand) in

    let ik = f4(k, rand) in

    let ak = f5(k, rand) in

    let autn = (xor_enc(ksqn, ak), AMF, mac) in out(s2 h, (rand, autn, xres, ck, ik)).

    18禁裸乳无遮挡免费网站照片| 啦啦啦韩国在线观看视频| 啦啦啦韩国在线观看视频| 欧美日韩综合久久久久久| 神马国产精品三级电影在线观看| 午夜激情久久久久久久| 久久午夜福利片| 干丝袜人妻中文字幕| 亚洲av中文字字幕乱码综合| 中文字幕av成人在线电影| 最近最新中文字幕免费大全7| 日韩av在线大香蕉| 久久热精品热| 亚洲一级一片aⅴ在线观看| 一个人观看的视频www高清免费观看| 一级黄片播放器| 免费观看精品视频网站| av.在线天堂| 日韩伦理黄色片| 床上黄色一级片| 亚洲欧洲日产国产| 久99久视频精品免费| 亚洲在线观看片| 久久久久久久久久人人人人人人| 免费av毛片视频| 国产免费视频播放在线视频 | 亚洲经典国产精华液单| 婷婷六月久久综合丁香| 日日摸夜夜添夜夜爱| 久久精品国产亚洲网站| 91狼人影院| 亚洲精品视频女| 国产男人的电影天堂91| 亚洲欧美中文字幕日韩二区| 国产又色又爽无遮挡免| freevideosex欧美| 日本免费a在线| 亚洲精品成人av观看孕妇| 欧美97在线视频| 日本-黄色视频高清免费观看| 国产精品久久久久久精品电影| 一二三四中文在线观看免费高清| 中文字幕亚洲精品专区| 色综合色国产| 亚洲怡红院男人天堂| 欧美激情在线99| 天堂俺去俺来也www色官网 | 九色成人免费人妻av| 毛片女人毛片| 黄色欧美视频在线观看| 男女啪啪激烈高潮av片| 深爱激情五月婷婷| 中文字幕亚洲精品专区| 国产av码专区亚洲av| 在线观看一区二区三区| 能在线免费看毛片的网站| 直男gayav资源| 黄色日韩在线| 色综合亚洲欧美另类图片| 天天躁日日操中文字幕| 十八禁国产超污无遮挡网站| 日韩欧美 国产精品| 五月玫瑰六月丁香| 国产黄色视频一区二区在线观看| 国产亚洲精品av在线| 久久久午夜欧美精品| 日韩强制内射视频| 91精品国产九色| 特级一级黄色大片| 美女大奶头视频| 校园人妻丝袜中文字幕| 18禁动态无遮挡网站| 不卡视频在线观看欧美| 精品久久久久久电影网| 国产精品嫩草影院av在线观看| 男女那种视频在线观看| av在线蜜桃| 亚洲综合色惰| 插阴视频在线观看视频| 亚洲av成人精品一区久久| 亚洲电影在线观看av| 久久久久久久久久黄片| 免费观看的影片在线观看| videos熟女内射| 亚洲丝袜综合中文字幕| 精品人妻偷拍中文字幕| 搡老乐熟女国产| 国产中年淑女户外野战色| 成人亚洲精品av一区二区| a级一级毛片免费在线观看| 久久久久久久久久久免费av| 亚洲精品乱码久久久久久按摩| 亚洲国产欧美人成| 99热6这里只有精品| av在线亚洲专区| 日韩欧美精品v在线| 国产黄色小视频在线观看| 99久国产av精品| 国产成人freesex在线| 亚洲精品成人久久久久久| av在线播放精品| 国产91av在线免费观看| 色综合色国产| 日韩欧美三级三区| 久久精品国产亚洲网站| 国产一区二区三区综合在线观看 | 久久久久久九九精品二区国产| 欧美另类一区| 成年免费大片在线观看| 大香蕉久久网| 久久久国产一区二区| 简卡轻食公司| 人妻制服诱惑在线中文字幕| 亚洲av福利一区| 能在线免费观看的黄片| 国产成人精品福利久久| 亚洲伊人久久精品综合| 国产人妻一区二区三区在| 国产成人午夜福利电影在线观看| 国产午夜精品久久久久久一区二区三区| 少妇裸体淫交视频免费看高清| 91精品国产九色| 夫妻性生交免费视频一级片| av又黄又爽大尺度在线免费看| 在线 av 中文字幕| 久久久久久久久久成人| 亚洲av免费在线观看| 精品一区二区三区视频在线| 国产综合懂色| videos熟女内射| 国产黄a三级三级三级人| 国产欧美另类精品又又久久亚洲欧美| 2018国产大陆天天弄谢| 久久97久久精品| 久久久久九九精品影院| 最近2019中文字幕mv第一页| 如何舔出高潮| 国产成人精品一,二区| 欧美+日韩+精品| 99久国产av精品| 看免费成人av毛片| 日韩三级伦理在线观看| 一级av片app| av福利片在线观看| av一本久久久久| 日本黄色片子视频| 久久久久免费精品人妻一区二区| 最近最新中文字幕免费大全7| 成人av在线播放网站| 欧美高清成人免费视频www| 久久99蜜桃精品久久| 久久97久久精品| 国产久久久一区二区三区| 肉色欧美久久久久久久蜜桃 | 最近中文字幕高清免费大全6| 色尼玛亚洲综合影院| 1000部很黄的大片| 校园人妻丝袜中文字幕| 中文字幕久久专区| av国产免费在线观看| 国模一区二区三区四区视频| 午夜免费男女啪啪视频观看| 日本色播在线视频| 在现免费观看毛片| 内射极品少妇av片p| 久久久久久伊人网av| 99久久精品国产国产毛片| 非洲黑人性xxxx精品又粗又长| 国产精品1区2区在线观看.| 高清视频免费观看一区二区 | 国产成人福利小说| 午夜老司机福利剧场| 亚洲一区高清亚洲精品| 又黄又爽又刺激的免费视频.| 国产毛片a区久久久久| 久久精品人妻少妇| 亚洲怡红院男人天堂| 精品久久久久久久久av| 2021少妇久久久久久久久久久| 赤兔流量卡办理| 婷婷色麻豆天堂久久| 性插视频无遮挡在线免费观看| 久久久a久久爽久久v久久| 亚洲精品自拍成人| 美女内射精品一级片tv| 尾随美女入室| 草草在线视频免费看| 精品欧美国产一区二区三| 亚洲国产日韩欧美精品在线观看| 亚州av有码| 在线免费观看不下载黄p国产| 免费看光身美女| 一级毛片 在线播放| 亚洲精品第二区| 欧美激情久久久久久爽电影| 国产精品日韩av在线免费观看| 女的被弄到高潮叫床怎么办| 中文字幕av成人在线电影| 91久久精品国产一区二区成人| 国产探花在线观看一区二区| 九九久久精品国产亚洲av麻豆| 成人av在线播放网站| 日韩,欧美,国产一区二区三区| 国产一区亚洲一区在线观看| 亚洲精品国产av蜜桃| av在线蜜桃| 日日干狠狠操夜夜爽| 欧美一级a爱片免费观看看| 亚洲国产精品sss在线观看| 99久国产av精品国产电影| 搞女人的毛片| 一级a做视频免费观看| 欧美 日韩 精品 国产| 免费观看在线日韩| 欧美成人a在线观看| 亚洲av成人精品一区久久| 少妇人妻一区二区三区视频| 熟女人妻精品中文字幕| 夜夜看夜夜爽夜夜摸| 青青草视频在线视频观看| 国产 一区 欧美 日韩| 日产精品乱码卡一卡2卡三| 日韩欧美精品免费久久| 国产成人精品福利久久| 男女国产视频网站| 精品久久久噜噜| 国产一区二区在线观看日韩| 国产视频内射| 肉色欧美久久久久久久蜜桃 | 国产中年淑女户外野战色| av天堂中文字幕网| 18禁在线播放成人免费| 天堂av国产一区二区熟女人妻| 男人舔女人下体高潮全视频| 亚洲欧美一区二区三区国产| 永久网站在线| 成人无遮挡网站| 91狼人影院| 亚洲熟妇中文字幕五十中出| 国产在视频线在精品| 2022亚洲国产成人精品| 中文乱码字字幕精品一区二区三区 | 日韩av在线免费看完整版不卡| 男女视频在线观看网站免费| 久久久久久久久久成人| 欧美另类一区| 精品国内亚洲2022精品成人| 我的女老师完整版在线观看| 国产久久久一区二区三区| 免费高清在线观看视频在线观看| 高清欧美精品videossex| 搞女人的毛片| 偷拍熟女少妇极品色| 欧美97在线视频| 热99在线观看视频| 男人狂女人下面高潮的视频| 91午夜精品亚洲一区二区三区| 18禁在线无遮挡免费观看视频| 色5月婷婷丁香| 免费av毛片视频| 在线 av 中文字幕| 精品不卡国产一区二区三区| 国产精品久久久久久av不卡| 岛国毛片在线播放| 久久99热这里只频精品6学生| 中文字幕久久专区| 国产成年人精品一区二区| 国产91av在线免费观看| 亚洲成人中文字幕在线播放| 99热全是精品| 国产免费一级a男人的天堂| 一二三四中文在线观看免费高清| 亚洲,欧美,日韩| 久久人人爽人人爽人人片va| 亚洲在线自拍视频| 亚洲av男天堂| 精品亚洲乱码少妇综合久久| 精品国产三级普通话版| 国产视频内射| 亚洲精品亚洲一区二区| 成人性生交大片免费视频hd| 国产免费福利视频在线观看| 高清欧美精品videossex| 欧美不卡视频在线免费观看| 少妇裸体淫交视频免费看高清| 久久这里有精品视频免费| 在线免费观看的www视频| 成人亚洲精品av一区二区| av在线观看视频网站免费| 成人性生交大片免费视频hd| 纵有疾风起免费观看全集完整版 | 中文资源天堂在线| 国产视频首页在线观看| 久久久久久久久中文| 精品午夜福利在线看| 亚洲国产精品国产精品| 精品久久久久久电影网| 久久久久久久久久久丰满| 亚洲成人中文字幕在线播放| 国产精品伦人一区二区| 少妇人妻一区二区三区视频| 国产乱来视频区| 永久免费av网站大全| 一区二区三区免费毛片| 成人亚洲精品一区在线观看 | 亚洲精品成人久久久久久| 免费在线观看成人毛片| 91久久精品电影网| 禁无遮挡网站| 高清午夜精品一区二区三区| 国语对白做爰xxxⅹ性视频网站| 伦理电影大哥的女人| 一级毛片电影观看| 国产精品一二三区在线看| 人妻一区二区av| 欧美三级亚洲精品| 亚洲精品乱码久久久久久按摩| 一级毛片久久久久久久久女| 99久久人妻综合| 中文字幕av成人在线电影| 69av精品久久久久久| 亚洲精品成人av观看孕妇| 麻豆成人午夜福利视频| 精品99又大又爽又粗少妇毛片| 天堂中文最新版在线下载 | 亚洲国产日韩欧美精品在线观看| 欧美bdsm另类| 国产精品美女特级片免费视频播放器| 久久久久久久久久久免费av| 国产视频首页在线观看| av线在线观看网站| 免费观看av网站的网址| 国产伦精品一区二区三区视频9| 成人午夜高清在线视频| 免费看光身美女| 美女xxoo啪啪120秒动态图| 日韩一区二区视频免费看| 亚洲精品乱久久久久久| 一级爰片在线观看| 国产精品一区二区三区四区久久| 国产综合懂色| 丰满人妻一区二区三区视频av| 熟妇人妻不卡中文字幕| 色综合亚洲欧美另类图片| 日本三级黄在线观看| 少妇丰满av| 国产精品蜜桃在线观看| 精华霜和精华液先用哪个| 成人二区视频| 婷婷色综合大香蕉| 亚洲精品国产av蜜桃| 看非洲黑人一级黄片| 嘟嘟电影网在线观看| 亚洲精品,欧美精品| 国产精品一区www在线观看| 国产免费福利视频在线观看| 简卡轻食公司| 婷婷色麻豆天堂久久| 亚洲精品第二区| 亚洲激情五月婷婷啪啪| 最近2019中文字幕mv第一页| 日产精品乱码卡一卡2卡三| 国产精品美女特级片免费视频播放器| 久久久亚洲精品成人影院| av女优亚洲男人天堂| 精品一区二区三区人妻视频| 国产淫片久久久久久久久| 永久免费av网站大全| 麻豆成人午夜福利视频| 午夜日本视频在线| 非洲黑人性xxxx精品又粗又长| 91午夜精品亚洲一区二区三区| 国产精品嫩草影院av在线观看| 欧美日韩一区二区视频在线观看视频在线 | 又粗又硬又长又爽又黄的视频| 蜜桃久久精品国产亚洲av| 国产精品av视频在线免费观看| 国产精品蜜桃在线观看| 九九久久精品国产亚洲av麻豆| 国产在线一区二区三区精| 国产伦精品一区二区三区视频9| 久久久久久久国产电影| 男女下面进入的视频免费午夜| 婷婷色av中文字幕| 中文欧美无线码| 国产一级毛片在线| 久久这里只有精品中国| 中文字幕人妻熟人妻熟丝袜美| 精品久久久久久电影网| 国产成人a区在线观看| 色吧在线观看| 免费观看精品视频网站| 国产精品人妻久久久影院| 国产精品麻豆人妻色哟哟久久 | 成人欧美大片| 精品一区在线观看国产| 91狼人影院| 嫩草影院新地址| 免费大片黄手机在线观看| 日韩av在线大香蕉| 高清午夜精品一区二区三区| 国产精品嫩草影院av在线观看| 国产高潮美女av| 三级毛片av免费| 久久99精品国语久久久| 亚洲一区高清亚洲精品| 美女主播在线视频| 亚洲国产精品国产精品| 又粗又硬又长又爽又黄的视频| 99久久精品一区二区三区| 久久人人爽人人爽人人片va| 97超碰精品成人国产| 99九九线精品视频在线观看视频| 国产亚洲精品av在线| 日韩成人av中文字幕在线观看| 不卡视频在线观看欧美| 欧美成人一区二区免费高清观看| 国产免费福利视频在线观看| 亚洲精品成人av观看孕妇| 2021天堂中文幕一二区在线观| 韩国av在线不卡| av播播在线观看一区| 18禁动态无遮挡网站| 在线观看一区二区三区| 亚洲不卡免费看| 国产精品久久久久久精品电影| 老师上课跳d突然被开到最大视频| 99热网站在线观看| 大又大粗又爽又黄少妇毛片口| 精品久久国产蜜桃| 国产伦理片在线播放av一区| 少妇猛男粗大的猛烈进出视频 | 久久久久久久久大av| 国产在线一区二区三区精| 99久久中文字幕三级久久日本| 亚洲久久久久久中文字幕| 最新中文字幕久久久久| 一级爰片在线观看| 床上黄色一级片| 欧美日本视频| 日韩av在线大香蕉| 欧美xxⅹ黑人| 麻豆精品久久久久久蜜桃| 亚洲熟女精品中文字幕| 极品教师在线视频| 亚洲精品久久久久久婷婷小说| 99久国产av精品国产电影| 在线观看美女被高潮喷水网站| 最近2019中文字幕mv第一页| 少妇熟女aⅴ在线视频| 国产精品爽爽va在线观看网站| 99久国产av精品| 内射极品少妇av片p| 成人特级av手机在线观看| 国产 一区 欧美 日韩| 日本色播在线视频| 麻豆乱淫一区二区| 天天躁夜夜躁狠狠久久av| 亚洲精品日本国产第一区| 大陆偷拍与自拍| 天天躁日日操中文字幕| 人妻制服诱惑在线中文字幕| 免费大片18禁| 人人妻人人看人人澡| 日本猛色少妇xxxxx猛交久久| 观看免费一级毛片| av一本久久久久| 久久鲁丝午夜福利片| 国语对白做爰xxxⅹ性视频网站| av网站免费在线观看视频 | 内射极品少妇av片p| 精品久久久久久久末码| 国产爱豆传媒在线观看| 欧美xxxx性猛交bbbb| 国产永久视频网站| 国产片特级美女逼逼视频| 人妻一区二区av| 国产精品.久久久| 91久久精品国产一区二区三区| 国产大屁股一区二区在线视频| 蜜臀久久99精品久久宅男| 一区二区三区乱码不卡18| 黄色日韩在线| 一个人观看的视频www高清免费观看| 内射极品少妇av片p| 深爱激情五月婷婷| 国产亚洲精品av在线| 国产高清国产精品国产三级 | 亚洲av一区综合| 国产午夜精品论理片| 亚洲精品国产成人久久av| 精品久久久久久久人妻蜜臀av| 少妇的逼好多水| 久久精品熟女亚洲av麻豆精品 | 久久人人爽人人片av| 亚洲激情五月婷婷啪啪| 水蜜桃什么品种好| 人妻夜夜爽99麻豆av| 亚洲av一区综合| 免费观看的影片在线观看| 天天一区二区日本电影三级| 国产一区二区亚洲精品在线观看| 午夜精品一区二区三区免费看| 爱豆传媒免费全集在线观看| 免费黄频网站在线观看国产| 2021天堂中文幕一二区在线观| 大片免费播放器 马上看| 伦理电影大哥的女人| 免费看美女性在线毛片视频| 国产大屁股一区二区在线视频| 男人舔女人下体高潮全视频| 国产91av在线免费观看| 日韩不卡一区二区三区视频在线| 狠狠精品人妻久久久久久综合| 久久精品久久久久久噜噜老黄| 精品99又大又爽又粗少妇毛片| 少妇丰满av| 日本三级黄在线观看| www.色视频.com| 中文在线观看免费www的网站| 日韩制服骚丝袜av| 亚洲av在线观看美女高潮| 免费播放大片免费观看视频在线观看| 男人狂女人下面高潮的视频| 亚洲欧美成人综合另类久久久| 国产精品蜜桃在线观看| 黄片wwwwww| 亚洲av在线观看美女高潮| 深夜a级毛片| 99热这里只有精品一区| 国产伦精品一区二区三区视频9| 男女那种视频在线观看| 日本猛色少妇xxxxx猛交久久| 人人妻人人看人人澡| 亚洲国产欧美人成| 伦精品一区二区三区| 卡戴珊不雅视频在线播放| 久久久久国产网址| 亚洲国产最新在线播放| 国产成人精品福利久久| 国产亚洲午夜精品一区二区久久 | 成年免费大片在线观看| 久久精品国产自在天天线| 狠狠精品人妻久久久久久综合| 日日撸夜夜添| 日韩视频在线欧美| 91久久精品国产一区二区三区| 麻豆成人av视频| av卡一久久| 国产成人精品久久久久久| 国产美女午夜福利| 国产精品无大码| 九九爱精品视频在线观看| 亚州av有码| 18+在线观看网站| 天美传媒精品一区二区| 成年版毛片免费区| 国内精品宾馆在线| 国产精品国产三级专区第一集| 18禁动态无遮挡网站| 久久久久久伊人网av| 日韩电影二区| 国产精品精品国产色婷婷| 成人高潮视频无遮挡免费网站| 午夜福利在线观看吧| 麻豆久久精品国产亚洲av| a级毛色黄片| 搡女人真爽免费视频火全软件| 老师上课跳d突然被开到最大视频| 日韩av免费高清视频| 亚洲,欧美,日韩| av国产久精品久网站免费入址| 国产女主播在线喷水免费视频网站 | 亚洲精华国产精华液的使用体验| 搡老妇女老女人老熟妇| 成人亚洲欧美一区二区av| 在线 av 中文字幕| 国产三级在线视频| 亚洲久久久久久中文字幕| 五月玫瑰六月丁香| 中国美白少妇内射xxxbb| 天天躁日日操中文字幕| 我的老师免费观看完整版| 免费在线观看成人毛片| 亚洲欧洲国产日韩| 国产日韩欧美在线精品| 亚洲精品国产成人久久av| 国产毛片a区久久久久| 国产精品熟女久久久久浪| 男人舔奶头视频| 内地一区二区视频在线| 一边亲一边摸免费视频| 搞女人的毛片| 插阴视频在线观看视频| 日韩精品青青久久久久久| 亚洲精品国产av蜜桃| 亚洲av成人av| 91狼人影院| 国语对白做爰xxxⅹ性视频网站| 亚洲精品亚洲一区二区| 蜜桃久久精品国产亚洲av| 少妇的逼好多水| 亚洲最大成人中文| 国内精品宾馆在线| 国产午夜精品久久久久久一区二区三区| 伊人久久国产一区二区| 久久久久久久午夜电影| 欧美不卡视频在线免费观看| 中文乱码字字幕精品一区二区三区 | 日本av手机在线免费观看| 国产精品久久久久久久电影| 少妇熟女欧美另类| 黄色日韩在线| 毛片女人毛片| 黄片无遮挡物在线观看|