• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Review on ldentity-Based Batch Verification Schemes for Security and Privacy in VANETs

    2022-04-19 05:49:08EkoFajarCahyadiCahyaDamarjatiMinShiangHwang

    Eko Fajar Cahyadi | Cahya Damarjati | Min-Shiang Hwang

    Abstract—The study of vehicular ad-hoc networks (VANETs) has received significant attention among academia;even so,its security and privacy still become a central issue that is wide-open to discuss.The authentication schemes deployed in VANETs have a substantial impact on its security and privacy.Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs.In recent years,many papers have proposed identity-based batch verification (IBV) schemes in regard to diminishing overhead in the message verification process in VANETs.This survey begins with providing background information about VANETs and clarifying its security and privacy,as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs,a brief review of some IBV schemes published in recent years is conferred.The detailed approach of each scheme,with a comprehensive comparison between them,has been provided afterward.Finally,we summarize those recent studies and possible future improvements.

    Index Terms—Efficiency,identity-based batch verification (IBV),security and privacy,survey,vehicular ad-hoc networks (VANETs).

    1.lntroduction

    Vehicular ad-hoc networks (VANETs) have been attracting many researchers’ attention due to the capability to provide beneficial information among the vehicles and the road environments.This approach aims to improve driving safety.VANETs are loaded with the properties of the intelligent transportation system(ITS),so all of these smart vehicles could communicate with each other via vehicle-to-vehicle (V2V)communications,as well as with the road-side unit (RSU),e.g.,traffic lights or traffic signs,via vehicle-toinfrastructure (V2I) communications[1]-[3].

    As shown inFig.1,VANETs are composed by three major components:Trusted authority (TA),RSU,and the on-board unit (OBU).The two-layer VANETs topology concepts have been introduced in [4],and then used by several publications[5]-[9].The top layer consists of TA,while in the lower layer,it comprises RSU and OBU.TA acts as the trust and security management center of the entire VANETs,including registration and certification (public and private key certificates) for RSUs and OBUs when they join the network,and revoking nodes in the case of vehicles broadcasting fraud messages or performing malicious behavior[10]-[13].RSUs are fixed infrastructures located on the roadside at dedicated locations,such as intersections or parking lots,which are fully controlled by TA[14],[15].They act as a bridge between TA and vehicles (OBUs),which are connected to TA by the wire and OBUs by a wireless channel[12].OBU is equipped in every vehicle as a transceiver to communicate with another vehicle’s OBUs (V2V) and RSUs (V2I).It will broadcast information,like the position,speed,and direction to improve the road environment and traffic safety,and create mutual awareness of the vehicles around the local traffic condition[12],[16].In the context of this paper,a tamper-proof device (TPD) is installed in every vehicle’s OBU and it is assumed to be credible and invulnerable against any compromised attempt from the outside.

    A series of studies have been done to improve the reliability of VANETs before the public real implementation.To avoid a destructive action of the adversaries,several fundamental issues related to security and privacy in VANETs must be properly addressed.

    Fig.1.VANETs topology.

    1.1.Security and Privacy

    In general,some of the security requirements that should be satisfied in identity-based batch verification(IBV) schemes of VANETs are message authentication,non-repudiation,conditional anonymity,traceability,unlinkability,replaying resistance,and forward and backward security revocation[3],[5],[13],[17].On the other hand,because sensitive personal information of vehicles in the networks is also important to be protected from the adversaries,privacy preservation in VANETs has become the next essential factor to discuss.In VANETs,privacy shares several common requirement cases with security[18],e.g.,anonymity and unlinkability.First,anonymity is needed to protect sensitive information of vehicles,such as the current vehicle location and driver’s licenses.The leak of personal details can cause a dangerous situation for the victims[19].However,the anonymity of the vehicles should be conditional,in a way that the legal authority,that is TA,is able to trace once a dispute occurs[13],[20]-[24].Second,unlinkability is the next privacy-related requirement that is supposed to be satisfied.Unlinkability means that two or more pseudonym messages related to the same vehicle cannot be linked to each other[25].

    The following shows the detailed description of security and privacy requirements that must be satisfied in VANETs[5].

    1) Message authentication:The implementation of the message authentication method is intended to allow the vehicle or RSU to differentiate the original message from the bogus message.Furthermore,message authentication is also applied to resist the modification and impersonation attacks.

    2) Identity privacy-preserving:A sender of a message should be anonymous within a set of potential senders.In IBV,the real identity of the user will be converted to an anonymous identity by the assistance of TPD.Therefore,without knowing the private master key of TPD,an adversary cannot reveal the real identity of the legitimate user.However,to reach accountability,only conditional anonymity is possible in VANETs.Conditional anonymity is also related to traceability due to only TA can trace the user’s real identity.

    3) Unlinkability:The adversary vehicles (or RSUs) should not be able to link two or more subsequent pseudonym messages of the same vehicle.

    4) Traceability:TA should be able to reveal the real identity from the anonymous identities of the user in the case of a dispute.Traceability is also called conditional anonymity.

    5) Non-repudiation:This requirement will give the message receiver a guarantee about integrity and authenticity of information it receives since the sender of the message cannot deny the information it has sent.

    6) Replaying attack resistance:The networks could endure passive data capture and its subsequent retransmission of an unauthorized message produced by the adversaries.

    7) Impersonation attack resistance:The networks could resist the attacker which tries to assume or impersonate the identities of the legitimate vehicles in VANETs to generate the signature for any messages.

    1.2.Relevant Surveys

    Several distinctive surveys related to VANETs have been published in the recent years[10],[11],[15],[16],[22],[25]-[35].In general,all of those publications cover the background of VANETs,security and privacy,and the challenges that came after them.Gillaniet al.summarized major security issues,threats,core requirements,and challenges to design a fail-safe security framework in VANETs[28].In 2015,Quet al.provided a review of schemes related to security and privacy in VANETs,which published between 2004 and 2014 extensively,by introducing the basic ideas of most of the security models and classifying them based on their cryptography algorithms[30].In 2015,Petitet al.specifically focused on privacy challenges of V2X communications and reviewed the proposed pseudonym authentication schemes in vehicular networks[16].The most recent survey about VANETs was published in 2019 by Luet al.[10].They offered an excellent overview of security,various authentication schemes for privacy-preserving,and trust management of VANETs.

    1.3.lBV

    Batch verification is a method for verifying large amounts of digital signatures at once.This verification method can reduce the computational cost compared with one-by-one schemes[36].In the context of VANETs,RSU could communicate with hundreds of OBUs,where each of them sends a safety-related message to RSU every 100 ms to 300 ms[37].Without a batch verification process,a sequentially large number of signatures could take a long period to process,undeniably causing a bottleneck at RSUs.According to [4],if roughly 180 vehicles are kept within the communications range of RSU,and each vehicle is sending a message every 300 ms;this means a verifier (such as RSU) has to verify 600 messages per second.In terms of performance,we compared the computation delay,communications delay,and storage overhead of the schemes under reviewed.

    In 2008,Zhanget al.proposed an IBV scheme for vehicular sensor networks[4].This method intends to verify multiple signatures at the same time instead of processing them sequentially.To satisfy the user identity privacy,this scheme generates distinct pseudo identities and the corresponding private keys for signing each message with TPD installed in OBU of each vehicle.Since the IBV scheme adopts identitybased cryptography (IBC)[38],it does not need any signature certificate,such as the public key infrastructure(PKI) and elliptic curve digital signature algorithm (ECDSA) for message authentication;hence,the computation and communications overhead can be low.

    In 2011,Zhanget al.published their subsequent work on the basis of their previous IBV scheme[6].As the main reform,they adopted a group testing approach to find a better solution to improve the efficiency of invalid signature identification in a batch verification scheme.When a forged signature is found in the batch,even with a substantial probability,this scheme is expected to take a lower computation cost compared with its counterpart scheme.In the meanwhile,the computation and communications costs of their scheme in the normal condition remain the same as their previous work.

    In [7],Lee and Lai tried to point out the vulnerability of Zhanget al.’s[6]scheme.Lee and Lai revealed that Zhanget al.’s scheme suffered from a replaying attack and did not achieve the non-repudiation requirements.Succeeding in addressing the security issue,Lee and Lai also improved the message verification process of Zhanget al.’s scheme.Their approach resulted in a more efficient computation cost of the system.

    Several improvement studies towards Lee and Lai’s scheme have been published in the following years[5],[39].In 2015,Bayatet al.revealed that Lee and Lai’s scheme could not hold the impersonation attack[39].The adversaries would generate a valid signature on behalf of the legitimate user.Therefore,they proposed a scheme that tried to improve the security of Lee and Lai’s scheme,despite relatively equal performance was achieved.In 2017,Tzenget al.employed a bilinear pairing IBV scheme[5],trying to improve Lee and Lai’s scheme by revealing its vulnerability towards the identity privacy-preserving attack,the forgery attack,and the anti-traceability attack.It has proven that their scheme is survived against some security and privacy requirements,such as message authentication,identity privacy-preserving,traceability,non-repudiation,unlinkability,and replaying attacks.They also gave a more effective computation and communications delay value compared with any equivalent bilinear IBV schemes.Huet al.made a slight modification of Tzenget al.’s scheme by using a pairing-free IBV scheme to obtain better efficiency in the computational cost[40].However,we will not give further discussion in this paper,since only bilinear pairing-related papers will be considered in the next section.

    1.4.Our Contributions

    Despite a large number of surveys have been published in recent years,discussing security,privacy preservation,routing protocols,authentication schemes of VANETs,etc.,as the best of our knowledge,there is no comprehensive survey that specifically provides a detail representative approach of bilinear pairing IBV schemes in VANETs.In this paper,we summarize four related articles on the IBV schemes,and provide an outlook in terms of security and privacy,and their performance.Each article published in the subsequent year presents an improvement of the previous related method,and we will give the detail explanation gradually in Sections 2 and 3.Indubitably,each survey has its emphasis and deficiency.Therefore,this work is complementary to the previous surveys mentioned earlier.

    For better understanding,the rest of this paper is organized as follows.In Section 2,we cover a detailed review of each representative method in the bilinear pairing IBV scheme.It is followed by a comparison of all surveyed publications in Section 3.Finally,the future outlook is presented in Section 4,while the conclusion is presented in Section 5.

    2.Related Work

    In this section,we provide a relational approach of several representative publications that have common interest in bilinear pairing IBV schemes for message authentication and verification of VANETs.Four different schemes are explained in detail and described in several phases:The system initialization phase,anonymous identity and signature generation phase,and message verification phase.Notations throughout this paper are represented inTable 1.

    Table 1:Notations of this paper

    2.1.Bilinear Mapping

    DenoteGas a cyclic additive group generated byPandGTas a cyclic multiplicative group with the same prime orderq.Let∶G×G→GTbe a bilinear map if it satisfies the following properties.

    AsGis a cyclic additive group generated byP,givenP,aP,bP,cP∈Gwitha,b,c∈Z?qbeing unknown values,CDHP is difficult to solve,because no polynomial time algorithm can discoverabP∈G.

    2.2.Zhang et al.’s Scheme

    As mentioned in subsection 1.3,in 2008,Zhanget al.proposed another approach based on the bilinear pairing batch verification method to deal with a bottleneck verification issue,known as the IBV scheme[4].Later,their work became a reference to several studies related to the IBV scheme in VANETs.The main feature of IBV schemes is the utilization of anonymous identities and corresponding private keys of the user for signing each traffic-related message.These pseudo identities and user’s private keys are generated by TPD installed in each OBU of the vehicles.TPD is composed of three modules:The authentication module,anonymous identity generation module,and private key generation module,as depicted inFig.2.In 2011,Zhanget al.proposed an improved scheme by adopting a group testing technique to find the invalid signature in the signature batch efficiently,while the rest of the IBV method process remained the same[6].

    Fig.2.TPD of Zhang et al.’s scheme.

    The concept of the VANETs topology proposed by Zhanget al.is called the two-layer network model.It is comprised of the top layer,where TA is located,and the lower layer that consists of RSU and OBU.All the functions of TA,RSU,and OBU have been discussed in Section 1 and depicted inFig.1.The proposed scheme of Zhanget al.includes system initialization,anonymous identity and signature generation,and message verification phases,which are described as follows.

    1) System initialization:In this phase,TA generates the system parameters for each RSU and vehicle.

    Step 1:AsPis a generator in the cyclic additive groupGandGTis a cyclic multiplicative group,bothGandGThave the same prime orderq.Afterwards,let∶G×G→GTbe a bilinear map as defined above.

    Step 2:TA picks two Hash functions,H∶{0,1}?→Gandh∶{0,1}?→.

    Step 3:TA chooses two random numbers {s1,s2}∈as its two private master keys,and calculatesPpub1=s1PandPpub2=s2Pas its two public keys.

    Step 4:To activate TPD,TA assigns a unique real identity RID ∈Gand a password PWD for each vehicle.Then each vehicle preloads { RID,PWD,s1,s2} into their TPDs.

    Step 5:TA announces the public parameters {G,GT,q,P,Ppub1,Ppub2} to all RSUs and vehicles.

    2) Anonymous identity and signature generation:To satisfy the user privacy,TPD of each vehicle will generate the anonymous identity and private key of the vehicle.Then the private key will be used for signing the message.

    Step 1:As mentioned before,TPD is comprised of three modules,and the first one is the authentication module.In this module,the vehicleViinputs its real identity R ID and password PWD to TPD.If both R ID and PWD are correct,the authentication module will proceed the request,otherwise refuse.

    Step 2:After verifying RID and PWD,the request would follow up to the anonymous identity generation module.TPD will pick a random numberri,and generate an anonymous identity AIDi,where AIDi={AIDi,1,AIDi,2}.Therichanges each time and guarantees the distinction of AIDi,1and AIDi,2.For each AIDi,we have

    After the encryption,A IDi,1and A IDi,2are delivered to the private key generation module.

    Step 3:Next,in the private key generation module,since an anonymous identity has two parts (A IDi,1and AIDi,2) ,this module is responsible for computing a private key based on AIDi,1and AIDi,2.Thus,the resultant private key S Kialso contains two parts,S Ki={SKi,1,SKi,2},where

    Note the anonymous identity A IDiand the private key S Kican be generated offline,so there is no delay for the signing message process.

    Step 4:Finally,a vehicle can obtain a list of anonymous identities,AIDi={AIDi,1,AIDi,2},and private keys,SKi={SKi,1,SKi,2}.The output of TPD is { AIDi,SKi}.

    Step 5:Each messageMihas to be signed before sent.From the output of TPD,each vehicleViwill calculate the signatureSito signMi.

    Step 6:ThenViwill broadcast the final message { AIDi,Mi,Si} to the nearest RSUs.

    3) Message verification:The message verification process consists of two versions:Single message verification and batch message verification.

    Step 1:When RSU receives a final message {AIDi,Mi,Si} from a vehicle,it will check the message’s signatureSi.

    Step 2:In the single message verification,RSU will check { AIDi,Mi,Si} by verifying whether

    If (6) is held,then the message is legal and unaltered.

    Step 3:In the batch message verification,if RSU receives a number of messages,denoted as{AID1,M1,S1},{AID2,M2,S2},…,{AIDn,Mn,Sn},it can verify the message’s validity simultaneously by the batch message verification.

    Step 4:Then RSU starts the batch message verification shown in (17).If (17) is held,then the message is legal and unaltered.

    2.3.Lee and Lai’s Scheme

    In 2013,Lee and Lai proposed an improved scheme of Zhanget al.’s IBV scheme[7].Lee and Lai described that Zhanget al.’s IBV scheme was vulnerable to the replaying attack and the repudiation attack.First,to overcome the replaying attack,Lee and Lai added a timestampTiin the anonymous identity and signature generation phase.The currentTiis set in the private key generation module in TPD for generating the private key SKi,2,as depicted inFig.3.Subsequently,to achieve non-repudiation,Lee and Lai’s scheme used the random numbervito avoid a malicious user denying the signature by swappingMiandSi.Furthermore,they claimed that their scheme not only could tackle those two flaws,but also achieve traceability and conditional anonymity.In the performance evaluation,Lee and Lai’s scheme also outperformed Zhanget al.’s scheme.And further discussion related to the security and performance of this scheme will be described in Section 3.

    Fig.3.TPD of Lee and Lai’s scheme.

    The proposed scheme of Lee and Lai includes system initialization,anonymous identity and signature generation,and message verification phases described as follows.

    1) System initialization:In this phase,TA generates the system parameters for each RSU and vehicle.Generally,the process in this phase is relatively similar to Zhanget al.’s IBV scheme,except,in Lee and Lai’s scheme,TA picks one more one-way Hash functionh2(?) for private key generation in the next phase.

    Step 1:AsPis a generator in the cyclic additive groupGandGTis a cyclic multiplicative group,bothGandGThave the same prime orderq.Afterwards,let∶G×G→GTbe a bilinear map as defined before.

    Step 2:TA picks three Hash functions,H∶{0,1}?→G,h∶{0,1}?→,andh2∶{0,1}?→.

    Step 3:TA chooses two random numbers {s1,s2}∈as its two private master keys,and calculatesPpub1=s1PandPpub2=s2Pas its two public keys.

    Step 4:TA assigns a real identity RID ∈Gand the password PWD for each vehicle.Then each vehicle preloads { RID,PWD,s1,s2} into their TPD.

    Step 5:TA announces the public parameters {G,GT,,q,P,Ppub1,Ppub2,H(?),h(?),h2(?)} to all RSUs and vehicles.

    2) Anonymous identity and signature generation:As mentioned in the system initialization phase,TA adds one more one-way Hash function,h2(?),andTito be used in the private key S Ki,2generation,instead ofH(?).

    Step 1:The process in the authentication module of this phase is the same as Zhanget al.’s TPD.The vehicleViinputs its real identity RID and password PWD to TPD.If both RID and PWD are correct,the authentication module will proceed the request,otherwise refuse.

    Step 2:After verifying RID and PWD,the request would be followed up to an anonymous identity generation module.TPD will pick a random numberriand generate the anonymous identity AIDi,where AIDi={AIDi,1,AIDi,2}.Therichanges each time and guarantees the distinction of AIDi,1and AIDi,2for each AIDi.We have

    After the encryption,A IDi,1and A IDi,2are delivered to the private key generation module.

    Step 3:Next,in the private key generation module,since an anonymous identity has two parts (A IDi,1and AIDi,2) ,this module is responsible for computing a private key based on AIDi,1and AIDi,2.Thus,the resultant private key S Kialso contains two parts,S Ki={SKi,1,SKi,2},where

    whereTiis the current timestamp picked by TPD to overcome the replaying attack.

    Step 4:Finally,a vehicle can obtain a list of anonymous identities,A IDi={AIDi,1,AIDi,2},and private keys,SKi={SKi,1,SKi,2}.The output of TPD is { AIDi,SKi,Ti}.

    Step 5:Each messageMihas to be signed before sent.From the output of TPD,each vehicleViwill calculate the signatureSito signMi:

    Step 6:ThenViwill broadcast the final message { AIDi,Mi,Si,Ti} to the nearest RSUs.

    3) Message verification:The message verification process consists of two versions:Single message verification and batch message verification.

    Step 1:When RSU receives a final message {AIDi,Mi,Si,Ti} from a vehicle,it will check the message’s timestampTi.IfTRSU-Ti≤ΔT,RSU continues the verification process,otherwise rejects the message.TRSUdenotes the received time of the message at RSU,while ΔTdenotes the predefined endurable transmission delay.

    Step 2:In the single message verification,RSU checks { AIDi,Mi,Si,Ti} by verifying whether

    If (13) is held,then the message is legal and unaltered.

    Step 3: In the batch verification,if RSU receives a number of messages denoted as{AID1,M1,S1,T1},{AID2,M2,S2,T2},…,{AIDn,Mn,Sn,Tn},it can verify the message’s validity simultaneously by the batch message verification.Before the process begins,RSU generates a random numbervito ensure the non-repudiation of signatures.The value ofviranges between 1 andx,wherexis a small value and does not make the overhead of computation.

    Step 4:Then RSU starts the batch message verification as shown in (14).If (14) is held,then the message is legal and unaltered.

    2.4.Bayat et al.’ Scheme

    In 2014,Bayatet al.tried to propose an improved scheme of Lee and Lai’s IBV scheme[39].Bayatet al.described Lee and Lai’s scheme suffered from an impersonation attack,where the adversaries could generate a valid signature on behalf of the legitimate user.They claimed that these flaws were coming from the weakness of the private key S Ki,2,so they made some improvements on it.

    The proposed scheme by Bayatet al.includes system initialization,anonymous identity and signature generation,and message verification phases,which are described as follows.

    1) System initialization:In this phase,TA generates the system parameters for each RSU and vehicle.Bayatet al.implemented a relatively same process in this phase compared with Zhanget al.’s scheme.TA only uses one map-to-point Hash functionH(?) and a one-way Hash functionh(?).

    Step 1:AsPis a generator in the cyclic additive groupGandGTis a cyclic multiplicative group,bothGandGThave the same prime orderq.Afterwards,let∶G×G→GTbe a bilinear map as defined before.

    Step 2:TA picks two Hash functions,H∶{0,1}?→Gandh∶{0,1}?→.

    Step 3:TA chooses two random numbers {s1,s2}∈as its two private master keys,and calculatesPpub1=s1PandPpub2=s2Pas its two public keys.

    Step 4:TA assigns a real identity RID ∈Gand a password PWD for each vehicle.Then each vehicle preloads { RID,PWD,s1,s2}.

    Step 5:TA announces the public parameters {G,GT,,q,P,Ppub1,Ppub2,H(?),h(?)} to all RSUs and vehicles.

    2) Anonymous identity and signature generation:To satisfy the user privacy,TPD of each vehicle will perform the anonymous identity generation and private key generation,as depicted inFig.4.

    Fig.4.TPD of Bayat et al.’s scheme.

    Step 1:The process in the authentication module of this phase is the same as Zhanget al.’s TPD.The vehicleViinputs its real identity RID and password PWD to TPD.If both RID and PWD are correct,the authentication module will proceed the request,otherwise refuse.

    Step 2:After verifying RID and PWD,the request would follow up an anonymous identity generation module.TPD will pick a random numberri,and generate the anonymous identity AIDi,where AIDi={AIDi,1,AIDi,2}.Therichanges each time and guarantees the distinction of AIDi,1and AIDi,2.For each AIDi,we have

    After the encryption,A IDi,1and A IDi,2are delivered to the private key generation module.

    Step 3:Next,in the private key generation module,since an anonymous identity has two parts (A IDi,1and AIDi,2) ,this module is responsible for computing a private key based on AIDi,1and AIDi,2.Thus,the resultant private key S Kialso contains two parts,S Ki={SKi,1,SKi,2},where

    where {A}xis thex-coordinate of the elliptic curve pointA.

    Step 4:Finally,a vehicle can obtain a list of anonymous identities,A IDi={AIDi,1,AIDi,2},and private keys,SKi={SKi,1,SKi,2}.The output of TPD is { AIDi,SKi,Ti}.

    Step 5:Each messageMihas to be signed before sent.From the output of TPD,each vehicleViwill calculate the signatureSito signMi.

    Step 6:ThenViwill broadcast the final message { AIDi,Mi,Si,Ti} to the nearest RSUs.

    3) Message verification:The message verification process consists of two versions:Single message verification and batch message verification.

    Step 1:When RSU receives a final message {AIDi,Mi,Si,Ti} from a vehicle,it will check the message’s timestampTi.IfTRSU-Ti≤ΔT,RSU continues the verification process,otherwise rejects the message.HereTRSUdenotes the received time of the message at RSU and ΔTdenotes the predefined endurable transmission delay.

    Step 2:In the single message verification,RSU checks { AIDi,Mi,Si,Ti} by verifying whether

    If (20) is held,then the message is legal and unaltered.

    Step 3:In the batch message verification,if RSU receives a number of messages,denoted as{AID1,M1,S1,T1},{AID2,M2,S2,T2},…,{AIDn,Mn,Sn,Tn},it can verify the message’s validity simultaneously by the batch message verification as shown in (21).If (21) is held,then the message is legal and unaltered.

    2.5.Tzeng et al.’s Scheme

    Recently,Tzenget al.proposed another improved scheme of Lee and Lai’s IBV scheme[5].They described that at least there were three security issues in Lee and Lai’s scheme,e.g.,identity privacy violation,the forgery attack,and the anti-traceability attack.Therefore,their contribution addressed those three flaws by proposing a better scheme that held towards the security requirements,such as message authentication,conditional anonymity,unlinkability,traceability,non-repudiation,and replaying resistance.In addition,the improvement in the computation and communications overhead area was also taken into account.

    Similar to [4],[6],[7],and [39],Tzenget al.also employed TPD to satisfy the user privacy,as depicted inFig.5.However,there stand out some differences between Tzenget al.’s and the previous schemes,particularly in the signature generation process.TA in Tzenget al.’s scheme employs one private master keys1,as described in the system initialization phase.Therefore,Tzenget al.’s scheme only has one public keyPpub1=s1P.After the real identity RID of the user and its password PWD are verified in the authentication module,an anonymous identity generation module will calculate AIDi,1and AIDi,2for the user subsequently.Different from Lee and Lai’s scheme,in Tzenget al.’s scheme,AIDican be generated offline to diminish delay in TPD.In the message signing module,Viinputs the messageMito TPD.There is no private key(signing key) SKigeneration process in Tzenget al.’s TPD.The signatureSiofMiis generated right in the message signing module,together with the timestampTi.Therefore,the output of TPD is {AIDi,Mi,Si,Ti}.In the performance evaluation,Tzenget al.’s scheme also can outperform Lee and Lai’s scheme.And further discussion related to security and the performance improvement of this scheme will be detailed in Section 3.

    Fig.5.TPD of Tzeng et al.’s scheme.

    The proposed scheme of Tzenget al.includes system initialization,anonymous identity and signature generation,and message verification phases,which are described as follows.

    1) System initialization:In this phase,TA generates the system parameters for each RSU and vehicle.As an improved scheme of Lee and Lai’s,in this phase Tzenget al.used one map-to-point Hash functionH(?)and a one-way Hash functionh(?),just like Bayatet al.’s scheme.Tzenget al.also added one more generator,so they havePandQas the generators inG.

    Step 1:AsPandQare two generators in the cyclic additive groupGandGTis a cyclic multiplicative group,bothGandGThave the same prime orderq.Afterwards,let∶G×G→GTbe a bilinear map as defined before.

    Step 2:TA picks two Hash functions:H∶{0,1}?→Gandh∶{0,1}?→

    Step 3:TA chooses a random numbers1∈as its private master key and calculatesPpub1=s1Pas its public key.

    Step 4:TA assigns a real identity RID ∈Gand a password PWD for each vehicle.Then each vehicle preloads { RID,PWD,s1} into their TPDs.

    Step 5:TA announces the public parameters {G,GT,q,,P,Q,Ppub1,H(?),h(?)} to all RSUs and vehicles.

    2) Anonymous identity and signature generation:To satisfy the user privacy,TPD of each vehicle performs the anonymous identity generation and signature generation as depicted inFig.5.

    Step 1:The process in the authentication module of this phase is the same as Zhanget al.’s TPD.The vehicleViinputs its real identity RID and password PWD to TPD.If both RID and PWD are correct,the authentication module will proceed the request,otherwise refuse.

    Step 2:After verifying RID and PWD,the request would follow up the anonymous identity generation module.TPD will pick a random numberri∈,and generate the anonymous identity AIDi,where AIDi={AIDi,1,AIDi,2}.Therichanges each time and guarantees the distinction of AIDi,1and AIDi,2.For each AIDi,we have

    After the encryption,A IDi,1and A IDi,2are delivered to the message signing module.

    Step 3:Next,Vigenerates and inputs the messageMito the message signing module in TPD.The message signing module generates a current timestampTi,and then computes the signatureSito signMi.

    Step 4:Then,Viwill broadcast the final message { AIDi,Mi,Si,Ti} to the nearest RSUs and vehicles.

    3) Message verification:The message verification process consists of two versions:Single message verification and batch message verification.

    Step 1:When RSU or the vehicle receives a final message {AIDi,Mi,Si,Ti} from a nearby vehicle,it will check the message’s timestampTi.IfTRSU-Ti≤ΔT,RSU continues the verification process,otherwise rejects the message.TRSUdenotes the received time of the message at RSU,while ΔTdenotes the predefined endurable transmission delay.

    Step 2:In the single message verification,RSU checks { AIDi,Mi,Si,Ti} by verifying whether

    If (25) is held,then the message is legal and unaltered.

    Step 3:In the batch message verification,if RSU receives a number of messages,denoted as{AID1,M1,S1,T1},{AID2,M2,S2,T2},…,{AIDn,Mn,Sn,Tn},it can verify the message’s validity simultaneously by the batch message verification.Similar to Lee and Lai’s scheme,before the process begins,RSU generates a random numbervito ensure the non-repudiation of signatures.The value ofviranges between 1 andx,wherexis a small value and does not make the overhead of computation.

    Step 4:Then RSU and the vehicle start the batch message verification as shown in (26).

    3.Comparison

    In this section,we give a detailed evaluation related to the previous four compared schemes.The main attention is focused on the security and performance evaluations of the articles in review.The security requirements have been given in Section 1.Meanwhile,the performance evaluation demonstrates the efficiency of the four proposed schemes based on the simulation results.

    3.1.Security Evaluation

    We have analyzed all four schemes towards seven security requirements they must hold,including message authentication,identity privacy-preserving,traceability,non-repudiation,unlinkability,replaying attack resistance,and impersonation attack resistance.The results shown inTable 2indicate certain attacks can occur in the particular scheme revealed by the other authors.

    Table 2:Security comparison

    1) Message authentication: Message authentication is an essential security requirement in VANETs that must be satisfied by all discussed schemes.The message must be authenticated and sent by legitimate entities.In addition,the integrity of the message itself must be granted.All the schemes satisfy this requirement.

    2) Identity privacy-preserving:All the schemes claimed that they could hold this requirement.However,Tzenget al.found that Lee and Lai’s scheme suffered from identity privacy violation.The adversaries can reveal the real identities of the vehicles in the target without knowing TA’s private master keys {s1,s2}.Just take it into consideration when there is one malicious vehicle trying to reveal the real identity of another vehicle in the same network.First,the malicious vehicle could fetch the published message{AIDi,Mi,Si,Ti}and public parameters of TA {G,GT,,q,P,Ppub1,Ppub2,H(?),h(?),h2(?)} to calculate the private key S Ki,2of the vehicle in target.By using {AIDi,Ti} from the message and {Ppub2,h2(?)} from public parameters,a malicious vehicle can calculate the private key of the vehicle SKi,2=h2(AIDi,1∣∣AIDi,2∣∣Ti)Ppub2.After confirming SKi,2,another private key SKi,1=Si-h(Mi)SKi,2can be calculated;finally,the real identity RIDi=AIDi,2⊕H(SKi,1) is revealed.Therefore,it is only TA as the only entity that is able to reveal the real identities of any vehicles in the case of a dispute.

    4) Non-repudiation:In the non-repudiation requirement,the legitimate vehicle should not be able to deny the message to be sent after TA has revealed it[43].All the schemes claimed that their work can achieve the non-repudiation requirement.However,Lee and Lai proved that Zhanget al.’s cannot hold the task.For instance,one malicious vehicle generates several messages {AID1,M1,S1},{AID2,M2,S2},and{AID3,M3,S3},and swaps the content to {AID1,M1,S3},{AID2,M2,S1},and {AID3,M3,S2}.Despite the fact that the order of the signature is swapped between the messages,their sum through the batch verification process would remain the same as shown in (27).

    For this reason,the attackers can deny their signatures.

    5) Unlinkability:In this requirement,the attacker should not link any two or more messages to the same sender.All the schemes satisfy this requirement.

    6) Replaying attack:Lee and Lai exposed that Zhanget al.’s scheme is vulnerable to the replaying attack,since the message broadcasted by the vehicle only contains {AIDi,Mi,Si} while no timestamp which is commonly used to resist such an attack.By this condition,an adversary can intercept {AIDi,Mi,Si} and resend the message at a future time point to challenge RSU or other vehicles.Therefore,Lee and Lai added a timestampTiin the final message { AIDi,Mi,Si,Ti} to overcome the replaying attack.

    For example,the message causes an accident,and then TA will trace and try to reveal the real identity of the sender by calculatingUnfortunately,after RID is found,both TA and RSU assume that the malicious messages are sent by a legitimate vehicleVi,and the actual malicious party who sents those messages can escape.

    3.2.Performance Evaluation

    In this subsection,we evaluate the computation overhead of one and multiplenmessages from all discussed schemes[5]-[7],[39].The computation cost for signing and verifying one message and multiplenmessages is presented inTable 3.LetTmtpdenote the time of one map-to-point Hash operation,Tmulbe the time of one-point multiplication over an elliptic curve,andTparbe the time to perform one pairing operation,all of the computational costs presented here are directly derived from all of the original publications that are mainly simulated through the 3.0 GHz,Intel Pentium IV engine.

    Table 3:Computation overhead comparison

    In Zhanget al.’s scheme[6],Tmtp=0.6 ms,Tmul=0.6 ms,andTpar=4.5 ms.The time delay resulted from signing one message andnmessages isTmul=0.6 ms andnTmul=0.6nms,respectively.In the meanwhile,the computation delay for verifying one message andnmessages is 3Tpar+Tmtp+Tmul=14.7 ms and 3Tpar+nTmtp+nTmul=13.5+1.2nms,respectively.

    In Lee and Lai’s scheme[7],Tmtp=0.6 ms,Tmul=0.6 ms,andTpar=4.5 ms.The time delay resulted from signing one message andnmessages is 2Tmul=1.2 ms and 2nTmul=1.2nms,respectively.In the meanwhile,the computation delay for verifying one message andnmessages is similar,3Tpar+Tmul=14.1 ms.

    In Bayatet al.’s scheme[40],Tmtp=0.11025 ms,Tmul=0.441 ms,andTpar=8.82 ms.The time delay resulted from signing one message andnmessages is not described.In the meanwhile,the computation delay for verifying one message andnmessages is similar,3Tpar+Tmul+Tmtp=27.01125 ms.

    Finally,in Tzenget al.’s scheme[5],Tmtp=3.9 ms,Tmul=0.6 ms,andTpar=4.5 ms.The time delay resulted from signing one message andnmessages isTmul=0.6 ms andnTmul=0.6nms,respectively.In the meanwhile,the computation delay for verifying one message andnmessages is similar,2Tpar+Tmul=9.6 ms.

    4.Outlook

    Even though the IBV schemes can provide an excellent security guarantee,coupled with efficient computation and communications overhead,the future challenge related to more sophisticated attacks could jam the network and slow down the verification time.Future development could be summarized as follows.

    4.1.lllegal Signature ldentification

    It has been mentioned in subsection 1.3,Zhanget al.[6]employed group testing to improve the ability to find the invalid signature efficiently.In the following years,several other publications[14],[44],[45]also proposed distinctive ideas on this issue.Liet al.[44]proposed a matrix-based mechanism to quickly locate the signatureverification fault without re-verifying each of those signatures.In 2015,Renet al.[45]proposed a cube-based mechanism to locate an illegal signature in the batch messages by employing a 3-dimensional (x-axis,y-axis,andz-axis) plane.The verifier will generate a cube with a facet lengthm,when it receives several pairs of messages (M0,S0),(M1,S1),…,(Mt-1,St-1) from the signer whilem3≥t.In the next step,the verifier will identifytrandom numbersri,whereri∈{i=0,1,…,m3-1},and fill thosetsignatures in them×m×mcube with a coordinate (x,y,z) plane,withri=xm2+ym+zandx,y,z∈{0,1,…,m-1}.Finally,the verifier can batch the three coordinate axes.More detailed explanation refers to [45].

    Recently,Luet al.[14]proposed a blockchain anonymous public key infrastructure (PKI)-based reputation system for a hybrid trust model in VANETs.They employed an enhancement of the Merkle tree (the chronological Merkle tree (CMT) and the lexicographical Merkle tree (LMT)) for illegal message identification.CMT was used to validate every transaction and the certificate,while LMT was used for identifying the revoked public key.

    From above brief description,we would take a consideration to explore the last two schemes proposed in[14] and [45] in our next project.

    4.2.Pairing-Free Operation

    As briefly discussed in subsection 1.3,Huet al.[40]proposed an IBV scheme with pairing-free for VANETs by improving Tzenget al.’s scheme[5].Since it did not use the bilinear pairing operation,the computation cost would be much lower.From subsection 3.2,we can see that the pairing operationTparperforms as the most time-consuming cryptographic operation among the others.Gayathriet al.[46]described the elliptic curve cryptography (ECC) with 224-bits key has an equal level of security as 2048-bits key of the RSA cryptosystem.The much smaller size of the key improves the efficiency of computational and communicational overhead,storage capacity,and bandwidth efficiency.As proven in [46],the pairing-free operation also held several security requirements,such as authentication,integrity,privacy,non-repudiation,traceability,anonymity,and revocation.By such promising features,we also would take consideration of this operation in the subsequent development.

    5.Conclusion

    Security and privacy hold an important role in VANETs infrastructure development.The messages exchange over V2I and V2V communications should be fully granted,otherwise,the users’ information would be in danger.In this paper,we have summarized four IBV scheme-related publications,which are interrelated to each other,and provide an outlook in terms of security and privacy,and performance.Each IBV scheme that has been reviewed in subsections 2.3 to 2.5 has a concern in relation to bilinear pairing utilization.We have shown and compared all the phases including system initialization,anonymous identity and signature generation,and message verification phases,in the same manner.The security and performance evaluation also has been discussed in Section 3.A comprehensive improvement of every article that rectified the previously referenced papers has been provided.

    Disclosures

    The authors declare no conflicts of interest.

    亚洲精品影视一区二区三区av| 一边摸一边抽搐一进一小说| 久久久久久久久久黄片| 亚洲中文字幕一区二区三区有码在线看| 成人欧美大片| 亚洲一区高清亚洲精品| 日本a在线网址| 国产精品一及| 国产免费一级a男人的天堂| 中文资源天堂在线| 色av中文字幕| а√天堂www在线а√下载| 一a级毛片在线观看| 色综合色国产| 国产精品一区二区免费欧美| 国产精品嫩草影院av在线观看| 丰满乱子伦码专区| 亚洲成人精品中文字幕电影| 在线a可以看的网站| 久久久精品大字幕| 夜夜夜夜夜久久久久| 毛片一级片免费看久久久久| 久久精品影院6| 91av网一区二区| 三级男女做爰猛烈吃奶摸视频| av专区在线播放| 精品久久久久久成人av| 最近手机中文字幕大全| 中文字幕熟女人妻在线| 黄片wwwwww| av在线蜜桃| 色综合色国产| 日韩一区二区视频免费看| 国产69精品久久久久777片| 一区二区三区免费毛片| 亚洲18禁久久av| 熟女电影av网| 成人精品一区二区免费| 一卡2卡三卡四卡精品乱码亚洲| 少妇猛男粗大的猛烈进出视频 | 免费人成视频x8x8入口观看| 麻豆国产97在线/欧美| 人人妻人人澡欧美一区二区| 亚洲av二区三区四区| 中文字幕久久专区| 午夜精品国产一区二区电影 | 久久人人爽人人片av| 亚洲欧美日韩高清专用| 亚洲精品日韩av片在线观看| 色噜噜av男人的天堂激情| 搡老熟女国产l中国老女人| 97超级碰碰碰精品色视频在线观看| 国产不卡一卡二| 免费无遮挡裸体视频| 亚洲国产高清在线一区二区三| 欧美性感艳星| 人妻久久中文字幕网| 国产一级毛片七仙女欲春2| 午夜免费激情av| 熟妇人妻久久中文字幕3abv| 美女xxoo啪啪120秒动态图| 99精品在免费线老司机午夜| 久久久成人免费电影| 别揉我奶头 嗯啊视频| 久久婷婷人人爽人人干人人爱| 日本在线视频免费播放| 日韩欧美一区二区三区在线观看| a级毛色黄片| 日韩欧美精品v在线| 老司机福利观看| 18禁黄网站禁片免费观看直播| 国产v大片淫在线免费观看| 一区福利在线观看| 尤物成人国产欧美一区二区三区| 午夜a级毛片| 亚洲国产精品久久男人天堂| 精品国产三级普通话版| 一本精品99久久精品77| 十八禁网站免费在线| 99热这里只有是精品50| 少妇的逼好多水| 国产av麻豆久久久久久久| 在线a可以看的网站| 人妻少妇偷人精品九色| 亚洲精品日韩在线中文字幕 | 国产黄色小视频在线观看| 国产免费男女视频| 免费搜索国产男女视频| 网址你懂的国产日韩在线| 国产真实乱freesex| 3wmmmm亚洲av在线观看| 联通29元200g的流量卡| 在线观看美女被高潮喷水网站| h日本视频在线播放| 乱系列少妇在线播放| 精品国产三级普通话版| 人人妻人人看人人澡| 97热精品久久久久久| 国产三级在线视频| 国产又黄又爽又无遮挡在线| 天堂√8在线中文| 日韩成人伦理影院| 一夜夜www| 黄色日韩在线| 午夜福利视频1000在线观看| av黄色大香蕉| 一级毛片电影观看 | 日本免费a在线| 久久久久国产精品人妻aⅴ院| 美女内射精品一级片tv| 国产精品久久久久久久电影| 一级毛片我不卡| 成人av一区二区三区在线看| aaaaa片日本免费| eeuss影院久久| 免费黄网站久久成人精品| 亚洲av免费在线观看| 国产在线精品亚洲第一网站| 床上黄色一级片| 天天一区二区日本电影三级| 日本欧美国产在线视频| 亚洲乱码一区二区免费版| 直男gayav资源| 色哟哟·www| 成人高潮视频无遮挡免费网站| 非洲黑人性xxxx精品又粗又长| 国产视频内射| 又黄又爽又刺激的免费视频.| 亚洲av成人av| 联通29元200g的流量卡| 九九热线精品视视频播放| 亚洲av五月六月丁香网| 国产黄色视频一区二区在线观看 | 高清毛片免费观看视频网站| 成年av动漫网址| 最后的刺客免费高清国语| 无遮挡黄片免费观看| 99精品在免费线老司机午夜| 亚洲高清免费不卡视频| av中文乱码字幕在线| 久久久久精品国产欧美久久久| 国产黄a三级三级三级人| 久久久久国产网址| 亚洲精品久久国产高清桃花| 最好的美女福利视频网| 99久久精品一区二区三区| 直男gayav资源| 91在线观看av| 色噜噜av男人的天堂激情| 久久人人爽人人爽人人片va| 天美传媒精品一区二区| 亚洲国产色片| 亚洲国产精品久久男人天堂| 亚洲国产精品久久男人天堂| 在线国产一区二区在线| 中文亚洲av片在线观看爽| 国产黄片美女视频| 夜夜看夜夜爽夜夜摸| 1000部很黄的大片| 中文字幕av成人在线电影| 深夜a级毛片| 我的女老师完整版在线观看| 卡戴珊不雅视频在线播放| 国产精品一二三区在线看| 国产精品永久免费网站| 中文字幕久久专区| 国产精品一区二区三区四区免费观看 | 麻豆精品久久久久久蜜桃| 久久久a久久爽久久v久久| 久久精品国产亚洲av涩爱 | 久久久a久久爽久久v久久| 老熟妇乱子伦视频在线观看| 国产精品久久久久久亚洲av鲁大| 国产一区亚洲一区在线观看| 日日干狠狠操夜夜爽| 麻豆成人午夜福利视频| 内地一区二区视频在线| av在线老鸭窝| 少妇熟女aⅴ在线视频| 亚洲精品一区av在线观看| 久久久成人免费电影| 亚洲av熟女| 久久久久性生活片| 干丝袜人妻中文字幕| 成人精品一区二区免费| 国产精品久久久久久久电影| 少妇被粗大猛烈的视频| 日本爱情动作片www.在线观看 | 国产老妇女一区| 国内揄拍国产精品人妻在线| 国产一区二区在线av高清观看| 久久久久久久亚洲中文字幕| 欧美色欧美亚洲另类二区| 日韩成人av中文字幕在线观看 | 嫩草影院入口| 秋霞在线观看毛片| 欧美xxxx性猛交bbbb| 一进一出好大好爽视频| 中文字幕精品亚洲无线码一区| 亚洲欧美精品综合久久99| 白带黄色成豆腐渣| 国产私拍福利视频在线观看| 干丝袜人妻中文字幕| 亚洲人成网站高清观看| 最好的美女福利视频网| 日本欧美国产在线视频| 搞女人的毛片| 国产黄a三级三级三级人| 日韩 亚洲 欧美在线| 九九爱精品视频在线观看| a级一级毛片免费在线观看| 日韩人妻高清精品专区| 18禁在线无遮挡免费观看视频 | 亚洲国产欧美人成| 欧美潮喷喷水| 中文在线观看免费www的网站| 久久久久免费精品人妻一区二区| 伦理电影大哥的女人| 国内精品美女久久久久久| 国产一区二区三区av在线 | 国产精品一及| 狂野欧美激情性xxxx在线观看| 国产淫片久久久久久久久| 在线播放国产精品三级| 日韩国内少妇激情av| 日本免费一区二区三区高清不卡| 九九久久精品国产亚洲av麻豆| а√天堂www在线а√下载| 又爽又黄无遮挡网站| 欧美日韩国产亚洲二区| 日韩av不卡免费在线播放| 少妇的逼好多水| 99久国产av精品国产电影| 亚洲av成人精品一区久久| 成人亚洲欧美一区二区av| 一区福利在线观看| 欧美zozozo另类| 极品教师在线视频| 熟妇人妻久久中文字幕3abv| 久久精品人妻少妇| 日韩欧美精品v在线| 亚洲内射少妇av| 卡戴珊不雅视频在线播放| 男插女下体视频免费在线播放| 国产av一区在线观看免费| 一个人看的www免费观看视频| 亚洲av.av天堂| 国产黄色视频一区二区在线观看 | 免费一级毛片在线播放高清视频| 久久国产乱子免费精品| 美女cb高潮喷水在线观看| 国产伦一二天堂av在线观看| 亚洲一级一片aⅴ在线观看| 欧美丝袜亚洲另类| 日本成人三级电影网站| 18禁在线播放成人免费| 国产精品一区二区免费欧美| 免费看a级黄色片| 插阴视频在线观看视频| 欧美激情久久久久久爽电影| 亚洲国产欧洲综合997久久,| 一本精品99久久精品77| 男女下面进入的视频免费午夜| 简卡轻食公司| 亚洲人成网站在线播放欧美日韩| 日本a在线网址| 天堂影院成人在线观看| 在线观看一区二区三区| 亚洲欧美中文字幕日韩二区| 成人特级黄色片久久久久久久| 亚洲国产欧洲综合997久久,| 精品久久久久久久久久久久久| 老熟妇仑乱视频hdxx| 美女内射精品一级片tv| 啦啦啦韩国在线观看视频| 99久久精品热视频| 亚洲人成网站在线播| 99国产极品粉嫩在线观看| 久久韩国三级中文字幕| 国产成人freesex在线 | 免费av不卡在线播放| 最近视频中文字幕2019在线8| 中文字幕免费在线视频6| 91久久精品电影网| 99久久无色码亚洲精品果冻| 伊人久久精品亚洲午夜| 免费大片18禁| 中国美白少妇内射xxxbb| 久久人人爽人人爽人人片va| 最近最新中文字幕大全电影3| 国产精品久久久久久久电影| 国产精品久久久久久av不卡| 亚洲欧美成人精品一区二区| 99在线人妻在线中文字幕| 国产91av在线免费观看| 深夜a级毛片| 亚洲欧美中文字幕日韩二区| 国产免费一级a男人的天堂| videossex国产| 两性午夜刺激爽爽歪歪视频在线观看| 舔av片在线| 中文字幕久久专区| 黑人高潮一二区| 一卡2卡三卡四卡精品乱码亚洲| 亚洲激情五月婷婷啪啪| 精品欧美国产一区二区三| 三级经典国产精品| 99久久无色码亚洲精品果冻| 伦理电影大哥的女人| 超碰av人人做人人爽久久| 99精品在免费线老司机午夜| 国产精品人妻久久久影院| 直男gayav资源| 97人妻精品一区二区三区麻豆| 男人和女人高潮做爰伦理| 三级经典国产精品| 男女视频在线观看网站免费| 亚洲,欧美,日韩| 97在线视频观看| 国产在线精品亚洲第一网站| 九九久久精品国产亚洲av麻豆| 欧美成人免费av一区二区三区| 神马国产精品三级电影在线观看| 狂野欧美白嫩少妇大欣赏| 精品一区二区三区视频在线观看免费| 亚洲va在线va天堂va国产| 国内精品一区二区在线观看| 久久久精品欧美日韩精品| 可以在线观看毛片的网站| 丰满人妻一区二区三区视频av| 国产精品久久电影中文字幕| 搡女人真爽免费视频火全软件 | 国内少妇人妻偷人精品xxx网站| 一级毛片我不卡| 国产亚洲精品综合一区在线观看| 久久久久久久午夜电影| 免费一级毛片在线播放高清视频| 久久久久久国产a免费观看| 精品久久久久久久久久免费视频| 搡女人真爽免费视频火全软件 | 婷婷精品国产亚洲av在线| 久久久国产成人免费| 国产亚洲精品久久久久久毛片| 欧美激情在线99| 熟妇人妻久久中文字幕3abv| 亚洲av第一区精品v没综合| 亚洲精华国产精华液的使用体验 | 简卡轻食公司| 22中文网久久字幕| 久久精品夜色国产| 男人舔奶头视频| 国产精品一区www在线观看| 日本黄色视频三级网站网址| 亚洲av免费高清在线观看| 九九在线视频观看精品| 性色avwww在线观看| 变态另类成人亚洲欧美熟女| 一边摸一边抽搐一进一小说| 插逼视频在线观看| 99riav亚洲国产免费| 伦精品一区二区三区| 俄罗斯特黄特色一大片| 国产精品亚洲美女久久久| 久久久精品欧美日韩精品| 人人妻人人看人人澡| 九九热线精品视视频播放| 黑人高潮一二区| 亚洲国产精品国产精品| 搡女人真爽免费视频火全软件 | 国产男靠女视频免费网站| 美女 人体艺术 gogo| 国内少妇人妻偷人精品xxx网站| 亚洲国产精品成人久久小说 | 国产av不卡久久| 国产高清三级在线| 亚洲自偷自拍三级| 国产欧美日韩精品一区二区| 久久久精品94久久精品| 欧美国产日韩亚洲一区| 国产精品一及| 日韩大尺度精品在线看网址| 亚洲精品粉嫩美女一区| 亚洲精华国产精华液的使用体验 | 在线看三级毛片| 日本免费一区二区三区高清不卡| 久久人人爽人人片av| 亚洲精品日韩在线中文字幕 | 亚洲欧美成人精品一区二区| 欧美日韩乱码在线| 欧美不卡视频在线免费观看| 久久午夜福利片| 小说图片视频综合网站| 日韩欧美精品免费久久| 日本黄大片高清| 麻豆成人午夜福利视频| 亚洲激情五月婷婷啪啪| 免费看av在线观看网站| www日本黄色视频网| 久久草成人影院| 欧美日韩精品成人综合77777| 99久国产av精品| 欧美日韩精品成人综合77777| 亚洲精品456在线播放app| 午夜影院日韩av| 老司机午夜福利在线观看视频| 日韩中字成人| 级片在线观看| 十八禁网站免费在线| 久久久精品大字幕| 一级毛片电影观看 | 午夜爱爱视频在线播放| 日韩精品青青久久久久久| 精品无人区乱码1区二区| av天堂在线播放| 成人鲁丝片一二三区免费| 18禁黄网站禁片免费观看直播| 国产91av在线免费观看| 久久中文看片网| 亚洲av成人精品一区久久| 久久精品影院6| 成人精品一区二区免费| 亚洲av一区综合| 黄色一级大片看看| 欧美xxxx黑人xx丫x性爽| av天堂中文字幕网| 日本欧美国产在线视频| 97碰自拍视频| 蜜桃亚洲精品一区二区三区| 在线观看一区二区三区| 级片在线观看| 亚洲精品粉嫩美女一区| 国产伦一二天堂av在线观看| 卡戴珊不雅视频在线播放| 日韩成人伦理影院| 少妇裸体淫交视频免费看高清| 久久精品国产亚洲av涩爱 | 国产黄色视频一区二区在线观看 | 麻豆久久精品国产亚洲av| 乱系列少妇在线播放| 亚洲精品亚洲一区二区| 欧美3d第一页| 成人国产麻豆网| 最近最新中文字幕大全电影3| 久久人人爽人人爽人人片va| 中国美白少妇内射xxxbb| av在线播放精品| 精品福利观看| 国产亚洲av嫩草精品影院| 国产精品一区二区性色av| 在线免费观看不下载黄p国产| 蜜臀久久99精品久久宅男| 女人被狂操c到高潮| 看非洲黑人一级黄片| 天堂影院成人在线观看| 男女边吃奶边做爰视频| 一个人看视频在线观看www免费| 亚洲aⅴ乱码一区二区在线播放| 在线a可以看的网站| 国产亚洲精品久久久com| 久久精品人妻少妇| 女的被弄到高潮叫床怎么办| 99热网站在线观看| 国产探花在线观看一区二区| 免费大片18禁| 欧美区成人在线视频| 欧美色视频一区免费| 日韩精品青青久久久久久| 久久草成人影院| 免费av毛片视频| 国产在线精品亚洲第一网站| 国产精品,欧美在线| 国产在视频线在精品| 国产男人的电影天堂91| 国产亚洲精品综合一区在线观看| 99久久无色码亚洲精品果冻| 人妻夜夜爽99麻豆av| 桃色一区二区三区在线观看| 久久精品夜夜夜夜夜久久蜜豆| 最近最新中文字幕大全电影3| 久久久久久国产a免费观看| 搞女人的毛片| 国产精华一区二区三区| 国产av在哪里看| 特大巨黑吊av在线直播| 美女黄网站色视频| 91在线观看av| 六月丁香七月| 日本免费一区二区三区高清不卡| 精品午夜福利视频在线观看一区| 我的女老师完整版在线观看| 小蜜桃在线观看免费完整版高清| 丝袜美腿在线中文| 日本黄大片高清| 国产精品一二三区在线看| 久久精品久久久久久噜噜老黄 | 夜夜夜夜夜久久久久| 国产高清激情床上av| 免费观看精品视频网站| 校园人妻丝袜中文字幕| 国产熟女欧美一区二区| 少妇人妻精品综合一区二区 | 五月玫瑰六月丁香| 尾随美女入室| 久久午夜福利片| 大型黄色视频在线免费观看| 欧美成人免费av一区二区三区| 久久久久久久久久黄片| 亚洲成av人片在线播放无| 欧美成人a在线观看| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品亚洲一区二区| 精品久久久久久成人av| 国产亚洲91精品色在线| 伦精品一区二区三区| 国产成人影院久久av| 国产精品久久久久久亚洲av鲁大| 亚洲美女搞黄在线观看 | 国产午夜精品论理片| 亚洲精品久久国产高清桃花| 国产精品久久久久久亚洲av鲁大| 国内久久婷婷六月综合欲色啪| 男女边吃奶边做爰视频| 伦理电影大哥的女人| 国产真实乱freesex| 欧美日韩精品成人综合77777| 亚洲欧美日韩高清在线视频| 少妇裸体淫交视频免费看高清| 高清午夜精品一区二区三区 | 国产精品人妻久久久久久| 亚洲高清免费不卡视频| 亚洲精品日韩在线中文字幕 | 三级男女做爰猛烈吃奶摸视频| 成人性生交大片免费视频hd| 精品久久久久久久久亚洲| 人妻丰满熟妇av一区二区三区| 综合色丁香网| 亚洲电影在线观看av| 国产日本99.免费观看| 久久婷婷人人爽人人干人人爱| 国产在线男女| 成人无遮挡网站| 波多野结衣高清无吗| 亚洲中文日韩欧美视频| 国产黄a三级三级三级人| 啦啦啦韩国在线观看视频| 一区二区三区四区激情视频 | 五月玫瑰六月丁香| 亚洲最大成人中文| 成人av在线播放网站| eeuss影院久久| 可以在线观看毛片的网站| 日韩av在线大香蕉| 国产高潮美女av| 亚洲人成网站在线播| 久久精品综合一区二区三区| 亚洲av二区三区四区| 国产美女午夜福利| 日本 av在线| 精品久久久久久久人妻蜜臀av| 六月丁香七月| 国产av在哪里看| 真实男女啪啪啪动态图| 男女之事视频高清在线观看| 我的老师免费观看完整版| 亚洲欧美精品综合久久99| 亚洲熟妇熟女久久| 日韩精品中文字幕看吧| 国产黄色视频一区二区在线观看 | 色在线成人网| 啦啦啦观看免费观看视频高清| 日日摸夜夜添夜夜爱| 国产爱豆传媒在线观看| 久久精品国产亚洲av天美| 淫秽高清视频在线观看| 国产精品久久久久久久电影| 91精品国产九色| 女生性感内裤真人,穿戴方法视频| 亚洲经典国产精华液单| 热99re8久久精品国产| 亚洲av.av天堂| 搞女人的毛片| 国产精品一区www在线观看| 国产蜜桃级精品一区二区三区| 日日摸夜夜添夜夜添av毛片| 国产亚洲av嫩草精品影院| 欧美日韩精品成人综合77777| 99久久精品一区二区三区| 在线观看午夜福利视频| 亚洲乱码一区二区免费版| 亚洲av成人精品一区久久| 日日摸夜夜添夜夜爱| 欧美又色又爽又黄视频| 99热这里只有是精品50| 日本a在线网址| 男女啪啪激烈高潮av片| 国产乱人偷精品视频| 99九九线精品视频在线观看视频| 亚洲一区二区三区色噜噜| 精品午夜福利视频在线观看一区| 久久久精品94久久精品| 日本黄色视频三级网站网址| 色av中文字幕| 97在线视频观看| 成人特级黄色片久久久久久久| 精品日产1卡2卡| or卡值多少钱| 三级国产精品欧美在线观看| 国产久久久一区二区三区| 黄色视频,在线免费观看| 麻豆久久精品国产亚洲av| 欧美国产日韩亚洲一区| 欧美日韩乱码在线| 久久热精品热| 天堂影院成人在线观看| 两个人视频免费观看高清|