• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    2022-08-23 02:19:38SalaheddineKablyMounirAriouaandNabihAlaoui
    Computers Materials&Continua 2022年6期

    Salaheddine Kably,Mounir Arioua and Nabih Alaoui

    1Laboratory of Information and Communication Technologies,National School of Applied Abdelmalek Saadi University,Tanger,Morocco

    2Ecole Suprieure d’informatique et du Numrique,TICLab UniversitInternationale de Rabat Sala,El Jadida,Morocco

    Abstract:Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT).In concept,blockchain has a linear structure that grows with the number of transactions entered.This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments.Moreover,conventional consensus algorithms such as PoW,PoS are very computationally heavy.This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm.The Multi-Zone Direct Acyclic Graph(DAG)Blockchain(Multizone-DAG-Blockchain)framework is proposed for the fog-based IoT environment.In this context, fog computing technology is integrated with the IoT to offload IoT tasks to the fog nodes, thus preserving the energy consumption of the IoT devices.Both IoT and fog nodes are initially authenticated using a non-cloneable physical function-based validation mechanism(DPUF-VM)in which multiple authentication certificates are verified in the blockchain.Each transaction is stored in a hash function in the blockchain using the lightweight CubeHash algorithm and signed by the Four-Q- Curve algorithm.In the cloud, sensitive data is stored as ciphertext.Fog nodes provide data security to avoid the energy consumption and complexity of IoT nodes.The fog node first performs a redundancy analysis using the Jaccard Similarity(JS)measure and sensitivity analysis using the Neutrosophic Neural Intelligent Network (N2IN) algorithm.A lightweight proof-of-authentication (PoAh) algorithm is presented and executed by the optimal consensus node selected by the bi- objective spiral optimization(BoSo)algorithm for transaction validation.The proposed work is modeled in Network Simulator 3.26 (ns-3.26), and the performance is evaluated in terms of energy consumption,storage cost,response time,and throughput.

    Keywords: Multi zone DAG blockchain; dynamic PUF; lightweight PoAh consensus;BoSo node selection;four-q-curve encryption;IoT environment

    1 Introduction

    The Internet of Things (IoT) is an emerging technology with wide-ranging applications [1],including the Smart City[2],Smart healthcare[3],and more.However,security is a significant issue in the IoT environment.In IoT,a large amount of heterogeneous data is generated every second and stored in a remote server for other purposes [4,5].As the data is accessed remotely, security is the critical challenge.Security is by cryptographic functions,multi-factor authentication,key distribution,and moreover[6,7].Recently,blockchain technology is the optimal solution to IoT security challenges[8].The blockchain is the distributed ledger that validates every transaction performed by IoT nodes in a decentralized and secure manner.The validation uses a consensus algorithm.This decentralized nature of the blockchain plays a vital role in ensuring high-level security [9].Although blockchain proves its effectiveness in security,it still has some computational complexity challenges[10].The main challenges in using blockchain for IoT are the complexity of the traditional consensus algorithms.Firstly,the nodes running the consensus algorithm have higher resource consumption.Secondly,the involvement of redundant data in the IoT network increases the size of the blockchain exponentially.Finally,the conventional linear structure of the blockchain is not suitable for the IoT environment is not scalable[11].

    In order to address these challenges,lightweight blockchain structures are being studied in recent times [8].Although the blockchain infrastructure reduces complexity, the consensus algorithm used in the blockchain is also crucial in deciding the complexity of the blockchain technology [12].The conventional proof-of-work(PoW)consensus algorithm consumes more complexity than others[13].Moreover,the consensus algorithm running by the consensus node,which is also an IoT node.Since IoT nodes are resource-constrained, they do not have enough resources to execute the complex consensus algorithms.Therefore, the consensus algorithm and the selection of the consensus node also play a critical role.

    On the other hand,fog computing is an emerging technology that brings network services closer to the edge[14].It provides better resources to resource-constrained IoT nodes and also minimizes the response time for requested services.IoT-Fog integration brings efficiency to the IoT environment in scalability,energy efficiency,and response time[15].Besides,authentication of IoT nodes[16]ensures that data is not accessible to any unauthorized nodes[17].In general,identification,password,MAC address,and IP address are mainly used to validate IoT nodes[18].However,these credentials can be easily hacked by attackers.On the other hand, the physically tilting function PUF is the hardwarebased security credential embedded in every IoT device [19].Therefore, PUF-based authentication becomes a promising research direction.Although authentication prevents unwanted access, data still needs to be protected from attackers [20].For data security, cryptographic techniques play a central role.In general,encryption algorithms are widely used to ensure data security in the IoT[5].Due to this complexity, these algorithms are not suitable for the IoT environment because devices have limited resources.Due to this nature, highly complex algorithms are not suitable for the IoT environment.Therefore,lightweight encryption algorithms become an essential solution for securing the IoT [21].However, the following research questions are still unsolved in IoT and need to be addressed:How to authenticate IoT nodes with lightweight and dynamic credentials?How to secure transactions performed by IoT nodes with cryptographic functions? How to make the blockchain as lightweight as possible for the IoT environment to be efficient? In this paper, we answer these research questions through optimal blockchain integration.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.1 Research Aim and Motivation

    This research aims to reduce the heavy computational needs and constraints of the IoT-blockchain technology.This research topic focuses on lightweight blockchain infrastructure,lightweight consensus,and lightweight security protocols for these purposes—the developed secure IoT environment in terms of initial authentication and sensitive data security.

    This research topic mainly focuses on the existing problems in IoT ecosystems.The current blockchain technology is not suitable for the resource-constrained IoT environment.Although some applied lightweight blockchain-based methods on IoT, there is still high complexity.Indeed, most lightweight blockchain solutions focus on lightweight consensus algorithms.However, the structure of blockchain also increases complexity because the IoT environment is broad-spectrum.Besides,the involvement of redundant data from IoT nodes rapidly increases the bulk of the blockchain.Even in lightweight consensus algorithms, the consensus nodes are selected randomly or in the round,inefficient.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.2 Major Contributions

    The principal contribution of this topic is the design of new Multi-DAG technology for the IoT environment.The essential contributions of this work are as follows;Firstly,a lightweight authentication performed by the dynamic validation mechanism of PUF with the support of blockchain.In this process,a random identifier is dynamically generated and approved at any moment to guarantee its validity.Secondly, the encrypted data stored is validated in the blockchain by consensus.We propose a lightweight proof of authentication(PoAh)consensus.Moreover,we minimize the consensus complexity by selecting the optimal node through the Bi-Objective Spiral Optimization (BoSo)algorithm.Thirdly,we propose a secure IoT environment based on the multi-zone DAG blockchain(Multizone-DAG-Blockchain) that reduces complexity and energy consumption.Three significant aspects are enhanced.Firstly,lightweight authentication,secondly,lightweight data encryption,and thirdly lightweight consensus algorithm design.Fourthly,all transactions are handled in a new Multi-Zone DAG Blockchain infrastructure(Multizone-DAG-Blockchain)that is lightweight and scalable.Bulk is further decreased by using the CubeHash hash algorithm and the Four-Q Curve-based signature algorithm in the blockchain.Finally, For the incoming IoT data, the fog node performs a Jaccard similarity-based redundancy analysis,including a neutral neural intelligent network(N2IN)sensitivity analysis.Then,for all sensitive data,the fog node applies lightweight encryption based on the four-quarter curve.

    2 Related Works

    Multi-level blockchain system (MBS) [22] for the IoT environment, the main advantages were the blockchain’s speed and flexibility.For this purpose,the blockchain implementation is in multiple levels,the micro-level(IoT level),the gateway level blockchain(cluster heads of the IoT network),and the macro-level blockchain(platform level).The data generated by the IoT devices were collected and stored in the massively distributed ledger to improve the security level.The deployment is complex and is not suitable for the resource-constrained IoT environment.

    Lightweight consensus algorithm, known as proof of block and transaction (PoBT) [23], The proposed consensus algorithm minimizes IoT nodes’time waste and memory.The PoBT consensus algorithm is integrated into the Hyperledger fabric framework.However,the consensus algorithm is still executed by a random IoT node,which increases the complexity[11].

    Distributed blockchain is employed to authenticate IoT devices [24].For this purpose, a crossdomain authentication scheme (xDBAuth) [25], aims to contribute as a trusted third-party signer.For validation, proof of authenticity and integrity (PoAI) enable access to IoT nodes.However,authentication by considering only the IoT identity is insecure and unreliable.Although PoAI is a lightweight consensus executed by resource-constrained devices, which increases the complexity.Though, A blockchain-based distributed security mechanism has been proposed [17].The security architecture was composed based on software-defined networking (SDN), blockchain, and fog computing.SDN is used to monitor network streams,while blockchain aims to strengthen network security.Besides,fog computing reduces the latency of the IoT network.The consensus algorithm is executed by the IoT nodes,which consume enormous resources.

    Multiple wireless sensor networks composes an IoT environment.To avoid the single point of failure, this work [26] proposes a Blockchain-based identity authentication mechanism.The blockchain network provides different identities for these nodes and validates the authentication.This work uses PoW for validation,which is not practical for resource constrained IoT nodes.

    This paper [16] proposes a blockchain-based security scheme for secure data transmission [27].This work mainly focuses on the blockchain’s overhead reduction to make it suitable for the resourceconstrained IoT environment.for this purpose, it uses a symmetric key encryption algorithm to validate and grant permission to IoT nodes; and a numeric signature in the ring structure.The conventional blockchain is computationally heavy and involves a large number of calculations[8].

    In Tab.1, the main research limitations as identified.Firstly, the blockchain’s linear growth decreases its scalability; Secondly, computationally intensive consensus algorithms are not suitable for the resource-constrained IoT environment,and last but not least,the level of security is low due to the involvement of inefficient credentials.

    Table 1: Related works summary

    3 Problem Definition

    A proposed distributed authentication device in a Fog- IoT environment based on distributed blockchain technology[26].The significant issues with the above approach are many;firstly,the access of non-authorized users is minimized,the proposed approach is furthermore complex due to ECDSA and SHA-1,as these two algorithms are very high computational complexity.Secondly,authentication is based on unprotected parameters such as system ID and public address,which are easily falsifiable.Moreover,the public address is published to all nodes through a public network,which increases the public address’s vulnerability.Thirdly,The PoW(proof of work)consensus algorithm is used in this work, which is more complex and increases resource consumption.In PoW, all participating nodes must validate transactions and broadcast the evidence.If one node has a higher load or lower resources,then that node will have a higher resource consumption.A lightweight blockchain uses a lightweight consensus algorithm, the so-called synergistic multiple proofs [12].Here, the proposed blockchain structure is not scalable,even though it uses a blockchain filter.Since the IoT network is always largescale and generates millions of data, using the conventional blockchain structure is not suitable.In the IoT environment,data redundancy is the principal problem that leads to blockchain’s unlimited growth.This work also stores the redundant data in the blockchain,which increases its size.Here,the consensus algorithm is executed by the IoT nodes,which are limited in resources.The IoT nodes do not have enough resources to validate every transaction in the network.Thus,the IoT nodes’surcharging is at a high level.An Efficient Lightweight Integrated Blockchain(ELIB)design has been proposed[29]; the lightweight consensus algorithm works by limiting the number of blocks generated in the blockchain.However, defining the arbitrary nature of blocks is a heavy process that increases time consumption.This waiting time is applied to all transactions in the network.In principle, the IoT network involves millions of transactions which increases the overall time consumption.In the IoT network, data redundancy is the main problem; with a massive amount of redundant data, the blockchain’s size increases.Furthermore, all the IoT nodes also increase the space complexity as the blockchain copy has to be kept in each node.A fog-based blockchain and network Architecture(BFAN)has been proposed[14].Although,PoW consensus provides security to validate transactions through complex and heavy computation.Although the deployment of fog nodes are deployed, the IoT nodes execute the consensus algorithm,which is inefficient.IoT nodes are resource-constrained and do not have enough resources to run PoW in the network.The use of SHA-2 and ECDSA further increases the complexity,with even a lower level of security.Data encryption is enabled for all data.This increases the size of the data,and the complexity of the network is also high.These mentioned research problems are still not solved in the IoT environment.Our work focuses on these problems.

    4 Proposed Framework

    The proposed IoT network as shown in Fig.1 is built in three tiers: the IoT perception tier,the blockchain and fog tier, and the cloud tier.The first tier includesna number of IoT sensors(S1,S2,S3...Sn).These sensors are supposed to perform specific tasks and do not contribute to blockchain validations,so-called passive block nodes(PBNs).

    The first layer includes a blockchain gateway (BGW) as well.The PBNs or IoT devices are responsible for creating data and initiating transactions.The second tier consists of amnumber(F1,F2,F3...Fm).of fog nodes (FNs) known as active block nodes (ABNs).The ABNs or FNs are responsible for validating transactions in the blockchain.This system’s main objective is to decrease the energy consumption and complexity of PBNs by transferring the validation process to ABNs as shown in Fig.1.

    Figure 1:Proposed tri-level multizone-DAG-blockchain architecture

    The proposal provides efficiency through the following processes:

    · Lightweight DPU-VM based authentication

    · Lightweight data encryption

    · Lightweight consensus algorithm

    4.1 Light Weight DPU-VM Based Authentication

    IoT nodes and fog nodes are authenticated using a Dynamic Physically Unclonable Functions based Validation Mechanism (DPUF-VM) with the blockchain’s assist.We proposed a dynamic approach in which a random identifier (RID) is dynamically generated for each IoT node.All IoT devices and fog nodes initially register their identity with the blockchain network,in which the identity is stored as a hash function.A novel idea of DPUF-VM is to change theRIDdynamically based on the device ID and the previously detected value by the concerned sensor.The process of DPUF-VM is explained in the following steps:

    The first step is device registration.In this step,the devices register the identification information to the blockchain through BGW.For the sensor indexi,the identification pieces of information are sensor ID SID(i), MAC address SMAC(i), PUF(SC-R(i)), and the sensor’s last detected valueρi.The random ID’s generated as follow:

    This random ID’s(RID)changed at each time based on the current sensed value.

    The second step is device registration.The credentials are stored in the blockchain as hash values at this step.Furthermore,the CubeHash algorithm is proposed for hash generation.The operation of CubeHash involves five major parameters listed in Tab.2.

    Table 2: CubeHash algorithm parameters

    The output is given for an hs-bit string as follow:

    Our hashed properties can beRID,SID,SMACorSC-R

    CubeHash generation algorithm Init Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by seven bits or 0 ≤RIni ≤15 Swap xi and xi⊕8 for RIni?[1,2,3,4,5,6,7]XOR xi⊕16 and xi for 0 ≤RIni ≤15 Swap xi and xi⊕2 for i?[16,7,20,21,24,25,28,29]Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by eleven bits Swap xi and xi⊕8 for RIni?[0,1,2,3,8,9,10,11]XOR xi⊕16 and xi Swap xi and xi⊕1 for i?[16,18,20,22,24,26,28,30]End

    The third step is device authentication.The Sitriggers authentication with the sending of an authentication request to the BGW.Then the BGW requests a random certificate with a digital signature.The RCERis generated based on the RIDand SMACas follows,

    Likewise,The digital signature generation for PUF is given as follows,

    For PUF Signing purpose,we based on FourQ-Curve signing algorithm,designated as follow,

    where p is a prime number,and is a non-square inFp2.This curve,dubbed“FourQ”.p is defined to generate digital signature.First,the hash is generated for PUF by using CubeHash algorithm.In the order ofl,the random selectediis from[1,l-1],the curve point computed as follow,

    where G is the generator known in advance,to calculate the r from the curve point,the computation is as follow,

    The pair(r,s)is the digital signature,while SK is the private key of the concerned device responsible for submitting the authentication credentials as(RCER,Sign(RC-R))

    The fourth step is device validation.Upon reception of the authentication information, BGW validates it through a signature verification procedure.

    If the credentials are identical to those in the blockchain,the device is authenticated.Otherwise,the request is denied.The DPUF-VM process is described in Fig.2.

    Figure 2:Proposed DPUF-VM authentication

    In the same way as IoT nodes,fog nodes are likewise authenticated by BGW in order to guarantee a high level of security.

    4.2 Lightweight Data Encryption

    After successfully authenticating the IoT, the data is transmitted from the IoT nodes to the fog nodes.The fog nodes apply a lightweight encryption mechanism depending on the sensitivity level of the received data.The fog nodes perform two primary operations, initially eliminating redundancy and then encrypting the data.The fog node performs redundancy elimination by JS calculation for the received data(SD1,SD2,...,SDu).The calculation is performed as follows,

    If the output of the algorithmJSbetween two data is small,then the input is redundant,and one of the inputs is removed from the data set.The leading factor in the growing size of the blockchain is the storage of redundant values in the blockchain.For this purpose,the fog node starts by eliminating all redundant data from the collected data.Also,the data encryption increases the input size,which leads to an increase in the size of the blockchain.To deal with this issue,we would only apply encryption to sensitive data.For sensitivity analysis,the fog node uses the N2IN algorithm.The N2IN algorithm is associated with an artificial neural network(ANN)and a Neutrosophic Intelligence algorithm.The sensitivity is determined based on the detected readingρ,the sensor type(ST),and the sensor location(SL)for the received data.The neutrosophic set is like a fuzzy set,however it performs better than fuzzy sets[15]—the collected data initialized in the input layer of N2IN.In the hidden layers,the weight value of each data is calculated by the neutrosophic intelligence.

    In the hidden layer,the membership function is initialized as truth setTi,indeterminate setIi,and false setFi.The objective function of N2IN is the following representation:

    Here,σ1,σ2,σ3are the weight vectors,andφjis estimated based on the indexes ofTij.All three membership functions are given as follows:

    The algorithm logic of N2IN If ρ is abnormal&&ST is sensitive&&SL is sensitive.Then SDi is sensitive Apply Encryption Send SDi-encrypted to the cloud level Else,SDi is non-sensitive Send SDi To the cloud level End If

    This weight value calculation is performed on the hidden layers,and the weight value of each data is adjusted.Based on the above approach,the N2IN performs a sensitivity analysis.All sensitive data is encrypted using the four-Q-curve.For all sensitivesSDi,the fog node applies encryption.Then,the encrypted data(Encrypted[SDi])is stored as a new transaction in the blockchain.

    4.3 Lightweight Consensus Algorithm

    The consensus algorithm is the primary mechanism for the validation of all transactions processed through the blockchain.The existing consensus algorithm has high complexity and computational overhead that needs an adjustment.In the same way, the existing traditional linear structure of the blockchain presents many problems in terms of scalability and complexity.Therefore, we propose a new Multizone-DAG-Blockchain structure.In the proposed structure, the IoT perception layer is segmented into multiple zones,and the transactions in each zone are managed in the corresponding zone.The model of Multizone-DAG-Blockchain is shown in Fig.3.

    Figure 3:Multizone DAG blockchain design

    In a fundamental sense, the DAG blockchain promotes scalability and minimizes complexity compared to the regular blockchain [4].As each transaction is added in the form of new blocks in the regular blockchain, the blockchain grows exponentially.This sum mentioned phenomenon is addressed in the DAG-based blockchain,in which the graphGis composed over transactions.In the proposed Multizone-DAG-Blockchain model, a numbervof direct acyclic graphs are constructed asG1,G2,...,GvforGvnumber of zones.That is, we obtain multiple DAGs with corresponding transactions for multiple zones.The graphithis defined asG= {Sj,E,W}withSj∈Zi.

    Sjis the set of IoT sensors located in zonei(Zi),Eis the set of edges betweenSj,and W is the weight function presented asE?(Sj×Sj)andW?(Sj×Sj )→R.TheGis entirely undirected so that there are no cycles in the graph.In the Multizone-DAG-Blockchain,the transactions are the vertexes(V),and the blocks have all transactions.The root block of the Multizone-DAG-Blockchain is the genesis block, and theGjis a finite graph of {V,E}.The arrival of each transaction at each timetfollows Poisson operation at the arrival rate ofλ.This property is applicable for each DAG in the Multizone-DAG-Blockchain.With the increase int, theGgrows exponentially still lower than the linear blockchain.The main differences between conventional blockchain and the proposed Multizone-DAG-Blockchain are given in Tab.3.

    Table 3: Linear&multizone-DAG-blockchain comparison

    In our proposed design,a proposed PoAh consensus algorithm is applied to validate the transactions.The IoT nodes create the data in the form of transactions asT1,T2,T3...Tnin a period.These transactions are bundled into a block, and respectively block is updated with each new transaction.Before this happens,the consensus node validates the transaction to update the block.Here,the trusted nodes are considered the consensus nodes.As explained earlier,we apply the Four-Q-Curve algorithm to perform the cryptographic functions.First, the IoT generates data and signs it before spreading it on the network.Then, a node is selected from the trusted network to be part of the PoAh.If the node’s trust value is greater than the threshold value,the block is assigned as part of the chain after authenticating the block.

    Algorithm PoAH based validation with DPUF-VM Auth Init Block(T1...Tn)→Blocks Sign(Block)→Broadcast Auth[DPUF-VM]If Auth==True&&Verify Sign(Block)==True Block‖PoAh →Broadcast Hash(Block)→add to Blocks End If End

    PoAh is performed entirely by the consortium node selected from the ABNs.This PoAh implementation is energy-consuming due to a large number of calculations.Thus,the IoT nodes are unable to perform PoAh.We perform a process of selecting the optimal consensus node(OCN)For this purpose,we propose the BoSo algorithm[30].In the BoSo algorithm,two objective functions are designed to select theOCNamong the ABNs.The spiral optimization algorithm is a heuristic algorithm that solves complex problems[30].The spiral optimization algorithm determines the optimal solution by searching for the solution over multiple spiral models,which overcomes the optimum local problem.In BoSo,the search points are defined on the spiral path as follows,

    y(t),is the initial position of search points n at t iteration,andy*is the best position learned,andR(θ)is the composite random matrix.The rotation angleθand the random number r.The BoSo process performs according to the steps described further below:

    · BoSo initializes the number of search points which isn≥2,r,θ,scaling factor(SF),objective functionF(g),and maximum iteration

    · The initial position of the search point is defined randomly.Furthermore, For every search point, the relevance is calculated for each ABNs, for Thejth ABN, TheF(gj)is calculated based on two objectives:trust valueTj,and load statusLj.The trust value defines the number of transactions adequately validated by the ABN, and the load status defines the number of tasks running by the ABN.TheF(gj)is formulated as following,

    · Based on the output of relevance function valueF(gj), the search point is selected properly.Based on the most suitable solution,the search position is updated as follows,

    ·y*1andy*2Zare respectively the first and second center points,?is the probability index which lies between[0,1].

    · All the search points are evaluated based on the relevance function, and the new position is updated as follows,

    In the end, all the other search points update the position to the optimal position.Thus, the optimal ABN is selected asOCN,which ensures the consensus algorithm.Since the ABNs execute the consensus algorithm,the load and complexity on the IoT nodes are significantly reduced.

    The generic processing flow of the proposed approach as illustrated in Fig.4.The proposed work achieves scalability and efficiency through lightweight authentication, lightweight encryption, and lightweight consensus algorithm in its design.

    Figure 4:Multizone-DAG-blockchain flow design

    5 Performance Evaluation

    This section aims to evaluate the performance of the proposed Multizone DAG Blockchain through a comparative analysis.We are examining the results in an environment as close to reality as possible.We will highlight the significant areas of benchmarking in the IoT environment,such as energy consumption,response time,and moreover.

    5.1 Simulation Environment

    Our proposed Multizone DAG Blockchain simulated in Network Simulator NS-3.In particular,it provides proper support for IoT protocols and operations.Therefore,we chose ns-3 as the simulation tool as shown in Tab.4.

    Table 4: Parameters list used for the simulation purpose

    Table 4:Continued

    The field of application of our proposed system is enormous according to our need for IoT in daily life;as shown in Tab.5,we distinguish among applications industrial,smart cities,smart home,transport,and many others.In all these applications,the IoTs are mainly environmental sensors.we will continue our simulation analysis by considering as an example of sensors that we use in the daily life.

    Table 5: Sensor deployed for simulation purpose

    Thus, we can notice that all sensors detect sensitive data related to a different private area.The motion detector is considered a sensitive device since it is usually used as a virtual guardian that monitors the entire environment.All other sensors are classified according to the geographical context.Therefore,a temperature sensor set up next to the kitchen is more sensitive than the other devices.All of these IoT nodes are validated with each data transmission.In this way,data encryption is applied for all sensitive data detected by the IoT nodes.Since the blockchain validates the transactions, the environment is more secure and confidential.

    5.2 Comparative Analysis

    The proposed work is evaluated in terms of key performance metrics such as energy consumption,storage cost,response time,and throughput.The main differences between the proposed work and the existing works are shown in Tab.6.

    Table 6: Comparative analysis summary

    The analysis shows that there are many research problems with the ELIB model theoretically,which can also be confirmed experimentally.

    5.2.1 Power Consumption Analysis

    Energy consumption is the quantity of energy consumed by the IoT nodes during data transmission.The energy consumed by the IoT nodes for sensing,transmitting,and receiving data.We analyzed the energy consumption as a function of the number of nodes and the number of transactions.In Fig.5,the comparison of energy consumption is analyzed to increase the value ofn.We notice that thenvalue has no impact on the proposed job since it has a reasonable energy consumption from 100 to 120 watts.At the same time,the ELIB mode increases the energy consumption with the increase ofnvalue.Indeed,the proposed work is scalable since even increasing the number of nodes does not affect energy consumption.In contrast,existing work is unable to perform well when the number of nodes is high.In our proposal,energy consumption is minimized since the computations are offloaded to the fog nodes while the ELIB model performs all calculations on the IoT nodes.Although fog nodes are used in BFAN,the computations are performed in the IoT nodes.

    Figure 5:Power consumption analysis based on number of nodes

    In Fig.6, the energy consumption is analyzed as a function of the number of transactions.The increase in the number of transactions raises the complexity of the consensus validation process, as each transaction involves the creation and validation of a block.

    Figure 6:Power consumption analysis based on number of nodes

    Thus, energy consumption is measured by the transaction cost.Therefore, the ELIB model has a power consumption of 650 to 1200 watts.The BFAN model has a power consumption of 1300 watts for 100 transactions.For the exact same number of transactions,the proposed job has a power consumption of 140 watts.The primary reason for this enormous improvement is the fact that the consensus algorithm is executed by an optimal ABN (fog node) selected by the BoSo algorithm in the proposed work.In addition,a lightweight PoAh is used which performs better than PoW.Thus,the power consumption is minimized up to 1000 watts in the proposed work.

    5.2.2 Storage Efficiency Analysis

    Storage cost is determined by the storage required for the IoT data generated by the IoT nodes.This metric is compared in terms of the number of nodes and the number of transactions.

    In Fig.7, the storage cost is analysed as a function of the number of IoT nodes.When nodes number increased, then the storage cost raises.This analysis shows that increasing the number of nodes increases the block size and storage cost.The proposed work increases the storage efficiency,and It’s four times higher than the existing BFAN & ELIB works.The main drawback is that these works increase the blockchain’s size, which results in a higher storage cost.As a result, the linear blockchain model also increases the storage cost, which is not suitable for the resource-constrained IoT environment.

    Figure 7:Storage cost analysis per number of IoT nodes

    In Fig.8, the storage cost is analysed based on the number of transactions.Even for 100 transactions, the storage cost is only 30 MB.However, for 100 transactions, the ELIB model has a storage cost of 124 MB, and the BFAN model has a storage cost of 135 MB.As the number of transactions increases,the size and length of the blockchain increase linearly.

    Figure 8:Storage cost analysis per number of IoT nodes

    This increase results in a higher storage cost.In ELIB and BFAN mode, data from IoT nodes is collected and stored in cloud servers without any redundancy control.They are keeping repeated data results in a higher storage cost.However, the proposed work analyses the redundancy by JS among the data collected from IoT nodes and eliminates the redundant data.Furthermore,we apply data encryption only for sensitive data identified by the N2IN algorithm.Overall, the proposed work minimizes the storage cost with the Multizone-DAG-Blockchain framework and fog computing involvement.

    5.2.3 Response Time Analysis

    Response time is the time it takes the system to respond to requests.In this case,it is determined according to the time needed for the blockchain to validate the transaction and create the block for new input data.In Fig.9,the response time is examined as a function of the number of transactions.

    The analysis proves that the proposed Multizone-DAG-Blockchain has a slower response time than the ELIB model and the BFAN method.It is shown that the increase in the number of transactions exponentially increases the response time in both existing works since,with a high number of transactions, the blockchain becomes massive and fails to respond to new transactions.Even for some 100 transactions, the response time of Multizone-DAG-Blockchain is 12 ms, while the ELIB models are 45 ms and BFAN is 75 ms.Due to this long response time, new transactions fail to be validated and added as new blocks.In this context,the IoT environment provides a massive amount of data every millisecond,which cannot be validated with both existing works.

    Figure 9:Response time analysis per number of IoT nodes

    5.2.4 Throughput Analysis

    The throughput of the system is the number of transactions processed and stored in the blockchain during the specified period.

    In Fig.10,the throughput is evaluated by analyzing the number of transactions.With an increase in the number of transactions,the throughput increases in parallel.In particular,the proposed Multi-Zones-DAG-Blockchain has a throughput of 135 kbps with 100 transactions.This is relatively higher than the ELIB model and the BFAN method.The ELIB model has a throughput of 95 kbps and BFAN has 85 kbps for 100 transactions.In both existing works,the blockchain structure is increased linearly for new transactions.On the other hand, the proposed work distributes the blockchain structure.Consequently,the proposed work achieves better throughput than the existing ELIB model and BFAN method.

    Figure 10:Response time analysis per number of IoT nodes

    5.2.5 Results Analysis

    Tab.7 summarizes the average numerical results obtained for the proposed work and the existing works.The analysis shows that the proposed work achieves better performance in each performance metric.

    This study shows that the proposed work is well adapted to the IoT network.This is mainly by minimizing energy consumption even with many nodes and transactions, which is vital for the IoT network.The main aspects of the research work are summed up as follows,

    · The complexity and overhead are reduced in all aspects,including lightweight authentication,encryption,hash generation,and consensus algorithm.

    · For the authentication, a random identifier is dynamically generated every time, and the unique MAC address is taken into account with physically tilted functions(PUF)to make the authentication as strong.

    Table 7: Results summary

    · Resource-constrained IoT nodes are considered passive nodes, and fog nodes are used to validate transactions.

    · A lightweight consensus algorithm is presented with an optimal consensus node selection procedure.

    Altogether,the proposed work minimizes the energy consumption of IoT nodes.As the proposed work is improved in the above aspects,this work achieves better efficiency.

    6 Conclusion

    In this work,we propose a new framework,Multizone DAG blockchain,adapted to the resource constraints of the IoT environment.The proposed scheme ensures high-level security through lightweight computation.For starters, a lightweight authentication mechanism (DPUF-VM) is proposed to authenticate the legitimacy of every IoT node and fog node.The collected information from fog nodes is further analyzed for redundancy and sensitivity.For redundant data removal,the JS measure is presented, and the N2IN algorithm for sensitivity analysis is also proposed.Each transaction is validated in the Multizone-DAG-Blockchain using the PoAh lightweight consensus algorithm.In Multizone-DAG-Blockchain,the CubeHash lightweight hash algorithm is used,and the Four-Q-Curve algorithm performs the digital signature.The optimal fog node is selected by the BoSo algorithm and respected as the consensus node.The extensive evaluation in ns-3.26 shows promising results in energy consumption,storage cost,response time,and throughput.In the future,we plan to extend Multizone-DAG-Blockchain for real-world use with a lightweight intrusion detection system(IDS)to analyze security threats in detail.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    少妇被粗大猛烈的视频| 精品午夜福利在线看| 自线自在国产av| 日韩,欧美,国产一区二区三区| 青春草亚洲视频在线观看| 国产精品.久久久| 99热这里只有精品一区| 青青草视频在线视频观看| 永久免费av网站大全| 亚洲国产精品国产精品| 国精品久久久久久国模美| 免费观看在线日韩| 国产欧美日韩一区二区三区在线 | 久久99一区二区三区| 嘟嘟电影网在线观看| 亚洲av电影在线观看一区二区三区| 欧美精品一区二区大全| 晚上一个人看的免费电影| 亚洲欧美日韩卡通动漫| 精品久久久久久电影网| 日本-黄色视频高清免费观看| 在线观看www视频免费| 精品一区在线观看国产| 成人亚洲精品一区在线观看| 成人二区视频| 日本av手机在线免费观看| 日本免费在线观看一区| 老熟女久久久| 高清不卡的av网站| 91aial.com中文字幕在线观看| 免费少妇av软件| 国产一区亚洲一区在线观看| 免费看不卡的av| 国产精品一二三区在线看| 少妇猛男粗大的猛烈进出视频| 久久99精品国语久久久| 一个人看视频在线观看www免费| 18禁动态无遮挡网站| av国产精品久久久久影院| 欧美精品一区二区大全| 国产又色又爽无遮挡免| av女优亚洲男人天堂| 国产一区二区在线观看av| 国产男女超爽视频在线观看| 乱人伦中国视频| 嫩草影院新地址| 久久精品国产自在天天线| 大香蕉久久网| 久久精品国产鲁丝片午夜精品| 亚洲成人手机| av福利片在线| 亚洲性久久影院| 青春草国产在线视频| 免费观看性生交大片5| 欧美日韩综合久久久久久| 一级爰片在线观看| 国产亚洲精品久久久com| 亚州av有码| 亚洲精品乱码久久久久久按摩| 成年女人在线观看亚洲视频| 久久久久久久久久久丰满| 青青草视频在线视频观看| 国产精品福利在线免费观看| 在线观看一区二区三区激情| 一区二区三区免费毛片| av免费在线看不卡| 亚洲欧美一区二区三区黑人 | 久久精品久久久久久噜噜老黄| 精品少妇黑人巨大在线播放| 久久精品久久久久久久性| 国精品久久久久久国模美| 草草在线视频免费看| 少妇 在线观看| 人人妻人人澡人人看| 天天躁夜夜躁狠狠久久av| 亚洲中文av在线| 久久久欧美国产精品| 亚洲人成网站在线播| 日韩亚洲欧美综合| 久久久久久久精品精品| 精品久久国产蜜桃| 26uuu在线亚洲综合色| 日韩精品有码人妻一区| freevideosex欧美| 国产成人精品无人区| 插逼视频在线观看| 亚洲欧美日韩东京热| kizo精华| 精品人妻一区二区三区麻豆| 亚洲图色成人| 久久精品夜色国产| 一本一本综合久久| 嫩草影院入口| 热re99久久国产66热| 中国国产av一级| 欧美少妇被猛烈插入视频| 2018国产大陆天天弄谢| 中国三级夫妇交换| 日韩制服骚丝袜av| 欧美bdsm另类| 国产精品无大码| 日韩一本色道免费dvd| www.av在线官网国产| 亚洲精品一二三| 国产伦精品一区二区三区四那| tube8黄色片| 丝袜喷水一区| 精品亚洲成a人片在线观看| 亚洲不卡免费看| 亚洲不卡免费看| 久久人人爽人人片av| 亚洲精品日韩在线中文字幕| 国产一区二区三区综合在线观看 | 国产一区二区三区av在线| 18+在线观看网站| 国产精品国产av在线观看| 涩涩av久久男人的天堂| 嘟嘟电影网在线观看| 在线免费观看不下载黄p国产| 夜夜骑夜夜射夜夜干| av国产精品久久久久影院| 黑人猛操日本美女一级片| 搡女人真爽免费视频火全软件| 国产真实伦视频高清在线观看| 最新的欧美精品一区二区| 国产熟女欧美一区二区| 亚洲中文av在线| 国产成人精品福利久久| 伦精品一区二区三区| 午夜免费男女啪啪视频观看| 午夜视频国产福利| 国产欧美日韩精品一区二区| 免费人成在线观看视频色| 免费少妇av软件| 久久久久久久亚洲中文字幕| 亚洲av成人精品一区久久| 国产亚洲av片在线观看秒播厂| 久久精品国产鲁丝片午夜精品| 在线亚洲精品国产二区图片欧美 | 亚洲国产精品成人久久小说| 欧美 亚洲 国产 日韩一| 国产淫片久久久久久久久| 精品人妻熟女av久视频| 日日摸夜夜添夜夜爱| 亚洲国产色片| 最近2019中文字幕mv第一页| 麻豆成人午夜福利视频| 丰满少妇做爰视频| 亚洲欧美清纯卡通| 精品国产国语对白av| 亚洲va在线va天堂va国产| 一二三四中文在线观看免费高清| 亚洲欧洲精品一区二区精品久久久 | 国产美女午夜福利| av国产久精品久网站免费入址| 啦啦啦视频在线资源免费观看| 少妇裸体淫交视频免费看高清| 有码 亚洲区| 2018国产大陆天天弄谢| 在线观看免费视频网站a站| 日日啪夜夜爽| 伊人久久国产一区二区| 中文字幕制服av| 自线自在国产av| 久久精品国产a三级三级三级| 免费黄网站久久成人精品| 熟妇人妻不卡中文字幕| 精品99又大又爽又粗少妇毛片| 男人狂女人下面高潮的视频| 男人狂女人下面高潮的视频| 另类精品久久| 亚洲av不卡在线观看| 中文字幕免费在线视频6| 国产爽快片一区二区三区| 丝瓜视频免费看黄片| 蜜桃久久精品国产亚洲av| 晚上一个人看的免费电影| 亚洲av在线观看美女高潮| 丁香六月天网| 日韩视频在线欧美| 中文字幕久久专区| 午夜免费男女啪啪视频观看| 日韩成人伦理影院| 国产一区二区三区综合在线观看 | 极品人妻少妇av视频| 国产一区二区在线观看av| 极品人妻少妇av视频| 日韩制服骚丝袜av| 桃花免费在线播放| 高清av免费在线| 夫妻午夜视频| 亚洲精品国产色婷婷电影| 夫妻午夜视频| 久久ye,这里只有精品| 日韩欧美精品免费久久| 亚洲国产精品成人久久小说| 亚洲精品中文字幕在线视频 | 亚洲人成网站在线观看播放| 蜜桃在线观看..| 不卡视频在线观看欧美| 欧美日韩综合久久久久久| 成人毛片60女人毛片免费| 久久99精品国语久久久| 亚洲国产精品专区欧美| 国产欧美另类精品又又久久亚洲欧美| 亚洲情色 制服丝袜| 成人无遮挡网站| av女优亚洲男人天堂| 男人狂女人下面高潮的视频| 伊人久久国产一区二区| 午夜视频国产福利| 精品酒店卫生间| 成人亚洲欧美一区二区av| 成人毛片a级毛片在线播放| 五月伊人婷婷丁香| 日韩三级伦理在线观看| 久久影院123| videossex国产| 丝袜脚勾引网站| 欧美丝袜亚洲另类| 国产在线一区二区三区精| 久久久欧美国产精品| av天堂中文字幕网| 亚洲第一区二区三区不卡| 成人毛片60女人毛片免费| 亚洲精品自拍成人| 五月伊人婷婷丁香| 日本vs欧美在线观看视频 | 亚洲国产色片| 建设人人有责人人尽责人人享有的| 亚洲av综合色区一区| 精品人妻一区二区三区麻豆| 日韩视频在线欧美| 国产伦在线观看视频一区| 成人免费观看视频高清| 亚洲激情五月婷婷啪啪| 日韩av在线免费看完整版不卡| 亚洲熟女精品中文字幕| 汤姆久久久久久久影院中文字幕| 只有这里有精品99| 少妇被粗大猛烈的视频| 亚洲精品乱久久久久久| 王馨瑶露胸无遮挡在线观看| 亚洲精品456在线播放app| 国产精品久久久久久久久免| 日韩视频在线欧美| 午夜福利,免费看| 成人亚洲欧美一区二区av| 在线观看av片永久免费下载| 国产熟女午夜一区二区三区 | 亚洲电影在线观看av| 免费观看在线日韩| 久久精品久久久久久噜噜老黄| xxx大片免费视频| 丰满迷人的少妇在线观看| 国产免费一区二区三区四区乱码| 亚洲欧美日韩另类电影网站| 极品教师在线视频| 久久精品熟女亚洲av麻豆精品| 不卡视频在线观看欧美| 亚洲av欧美aⅴ国产| 国产欧美日韩综合在线一区二区 | 久久久久久久国产电影| 狠狠精品人妻久久久久久综合| 免费黄频网站在线观看国产| 国产一区二区三区综合在线观看 | 精品国产国语对白av| 51国产日韩欧美| 国产深夜福利视频在线观看| 97超碰精品成人国产| 天堂中文最新版在线下载| 这个男人来自地球电影免费观看 | 日本欧美国产在线视频| 亚洲成人一二三区av| 日本91视频免费播放| 在线精品无人区一区二区三| 午夜福利在线观看免费完整高清在| 国产一区二区三区av在线| 少妇的逼好多水| 国语对白做爰xxxⅹ性视频网站| 在线亚洲精品国产二区图片欧美 | 久久久久久久久久久丰满| 97超碰精品成人国产| 欧美三级亚洲精品| 3wmmmm亚洲av在线观看| av一本久久久久| 日韩欧美精品免费久久| 国产精品蜜桃在线观看| av专区在线播放| 人人妻人人澡人人爽人人夜夜| 亚洲av中文av极速乱| 日韩三级伦理在线观看| 亚洲,一卡二卡三卡| 久久人人爽人人片av| av在线老鸭窝| 亚洲中文av在线| 久久99精品国语久久久| 久久久国产一区二区| 亚洲国产最新在线播放| 99热这里只有是精品在线观看| 精品亚洲乱码少妇综合久久| 伦精品一区二区三区| 亚洲欧美一区二区三区黑人 | 色94色欧美一区二区| freevideosex欧美| 啦啦啦在线观看免费高清www| av卡一久久| 免费黄色在线免费观看| av线在线观看网站| 久久精品国产亚洲av涩爱| 国产成人精品无人区| 国产亚洲91精品色在线| 国产av国产精品国产| 亚洲精品成人av观看孕妇| 久久狼人影院| 黑丝袜美女国产一区| 国产一区二区三区av在线| 国产精品欧美亚洲77777| 国内精品宾馆在线| 亚洲国产精品国产精品| 国产黄片美女视频| 91aial.com中文字幕在线观看| 国国产精品蜜臀av免费| 国产亚洲精品久久久com| 极品少妇高潮喷水抽搐| 岛国毛片在线播放| 欧美日韩视频精品一区| 亚洲av电影在线观看一区二区三区| 热99国产精品久久久久久7| 午夜影院在线不卡| 久久鲁丝午夜福利片| 日韩中字成人| 久久97久久精品| 国产精品伦人一区二区| 亚洲欧美成人精品一区二区| 成人毛片a级毛片在线播放| xxx大片免费视频| 免费观看的影片在线观看| 中文字幕免费在线视频6| 色5月婷婷丁香| 男人舔奶头视频| 免费av中文字幕在线| 男人爽女人下面视频在线观看| 成人美女网站在线观看视频| 三级经典国产精品| 久久99精品国语久久久| 亚洲精品色激情综合| 日本色播在线视频| 日韩av不卡免费在线播放| 最新中文字幕久久久久| 国国产精品蜜臀av免费| 久久6这里有精品| 国产高清国产精品国产三级| 国产精品偷伦视频观看了| 看非洲黑人一级黄片| 多毛熟女@视频| 精品人妻熟女av久视频| 国产av一区二区精品久久| 日韩一本色道免费dvd| 久久ye,这里只有精品| 久久精品久久久久久久性| 国产伦理片在线播放av一区| 日本av免费视频播放| 成人18禁高潮啪啪吃奶动态图 | 一级片'在线观看视频| 国产精品99久久99久久久不卡 | 97在线视频观看| 欧美日韩视频精品一区| 亚洲国产欧美在线一区| 曰老女人黄片| 久久狼人影院| 亚洲精品日韩在线中文字幕| 久久人人爽av亚洲精品天堂| a级毛色黄片| 高清视频免费观看一区二区| 日本色播在线视频| 国产免费视频播放在线视频| 久久精品国产鲁丝片午夜精品| 色网站视频免费| av又黄又爽大尺度在线免费看| 亚洲国产最新在线播放| 国产成人精品一,二区| 成人毛片a级毛片在线播放| av一本久久久久| 一级av片app| 久久女婷五月综合色啪小说| 18禁裸乳无遮挡动漫免费视频| 亚洲四区av| 大又大粗又爽又黄少妇毛片口| 久久久午夜欧美精品| 天美传媒精品一区二区| 中文字幕亚洲精品专区| 精品国产一区二区三区久久久樱花| 日韩三级伦理在线观看| 欧美xxxx性猛交bbbb| 十八禁网站网址无遮挡 | 麻豆精品久久久久久蜜桃| 欧美+日韩+精品| 少妇人妻 视频| 春色校园在线视频观看| 少妇被粗大的猛进出69影院 | 亚洲色图综合在线观看| 亚洲国产精品国产精品| 成人毛片60女人毛片免费| 狂野欧美激情性xxxx在线观看| 国产精品久久久久久久久免| 99精国产麻豆久久婷婷| 一边亲一边摸免费视频| 秋霞在线观看毛片| 黄色配什么色好看| www.色视频.com| av不卡在线播放| 欧美变态另类bdsm刘玥| 观看av在线不卡| 精品久久久精品久久久| 在线观看免费视频网站a站| 欧美亚洲 丝袜 人妻 在线| 卡戴珊不雅视频在线播放| 中文在线观看免费www的网站| 两个人的视频大全免费| 欧美少妇被猛烈插入视频| 亚洲av综合色区一区| 高清午夜精品一区二区三区| 日韩av免费高清视频| 妹子高潮喷水视频| 九九在线视频观看精品| 多毛熟女@视频| 亚洲人成网站在线播| 亚洲av日韩在线播放| 亚洲精品久久午夜乱码| 日本91视频免费播放| 日日啪夜夜撸| 精品少妇内射三级| 午夜免费男女啪啪视频观看| 最黄视频免费看| 最近手机中文字幕大全| 国产伦精品一区二区三区四那| 国产真实伦视频高清在线观看| 亚洲成人手机| 午夜免费观看性视频| 美女主播在线视频| 成人无遮挡网站| 国产色婷婷99| 蜜臀久久99精品久久宅男| 亚洲色图综合在线观看| 少妇裸体淫交视频免费看高清| 欧美 亚洲 国产 日韩一| 欧美成人精品欧美一级黄| 欧美高清成人免费视频www| 少妇人妻 视频| 男人爽女人下面视频在线观看| 久久久久久久久久成人| 日本vs欧美在线观看视频 | 成人免费观看视频高清| 777米奇影视久久| 国产日韩欧美视频二区| 三级经典国产精品| 最近最新中文字幕免费大全7| 国产视频内射| h日本视频在线播放| 欧美国产精品一级二级三级 | freevideosex欧美| 黄色怎么调成土黄色| 少妇精品久久久久久久| 欧美精品一区二区免费开放| 午夜福利影视在线免费观看| 亚洲无线观看免费| 99热国产这里只有精品6| 久久久久精品性色| 成年美女黄网站色视频大全免费 | 欧美少妇被猛烈插入视频| 国产在线一区二区三区精| 国产极品天堂在线| 春色校园在线视频观看| 精品视频人人做人人爽| 成人国产麻豆网| 最近的中文字幕免费完整| 久久女婷五月综合色啪小说| 国产精品一区二区在线不卡| 日本91视频免费播放| 亚洲精品亚洲一区二区| 日日爽夜夜爽网站| 国产在线男女| 女人精品久久久久毛片| 亚洲av综合色区一区| 亚洲av日韩在线播放| 久久97久久精品| 另类亚洲欧美激情| 久久久久视频综合| 成年av动漫网址| 免费高清在线观看视频在线观看| 人妻人人澡人人爽人人| 亚洲国产日韩一区二区| 亚洲精品国产成人久久av| 国产高清三级在线| 草草在线视频免费看| 国产亚洲一区二区精品| 午夜福利网站1000一区二区三区| 亚洲国产精品成人久久小说| 国产又色又爽无遮挡免| 国产一区亚洲一区在线观看| 免费黄网站久久成人精品| 这个男人来自地球电影免费观看 | 黄色日韩在线| 在线观看国产h片| 免费少妇av软件| 国产欧美日韩综合在线一区二区 | 免费黄频网站在线观看国产| av播播在线观看一区| av不卡在线播放| 波野结衣二区三区在线| 久久午夜综合久久蜜桃| 涩涩av久久男人的天堂| 免费观看a级毛片全部| 简卡轻食公司| 色网站视频免费| 色视频在线一区二区三区| 又黄又爽又刺激的免费视频.| 亚洲美女黄色视频免费看| 精品人妻熟女av久视频| 全区人妻精品视频| 久久人人爽av亚洲精品天堂| 国产伦精品一区二区三区四那| 亚洲av成人精品一二三区| 在线观看www视频免费| 交换朋友夫妻互换小说| 午夜老司机福利剧场| 一个人看视频在线观看www免费| 九色成人免费人妻av| 久久久a久久爽久久v久久| 看非洲黑人一级黄片| a级毛色黄片| 91久久精品电影网| 一级毛片我不卡| 岛国毛片在线播放| 成人漫画全彩无遮挡| 精品视频人人做人人爽| 丰满人妻一区二区三区视频av| 蜜桃久久精品国产亚洲av| 国产一区二区三区av在线| 简卡轻食公司| 亚洲欧美精品自产自拍| 婷婷色综合www| 最近中文字幕2019免费版| 毛片一级片免费看久久久久| 久久av网站| 偷拍熟女少妇极品色| a级片在线免费高清观看视频| 午夜久久久在线观看| 精品一区二区三卡| 亚洲国产欧美在线一区| 丝袜喷水一区| 国产成人免费观看mmmm| 国产在线一区二区三区精| 国产欧美日韩综合在线一区二区 | 男女无遮挡免费网站观看| 各种免费的搞黄视频| 乱码一卡2卡4卡精品| 精品久久久久久电影网| 99热这里只有精品一区| 亚洲熟女精品中文字幕| 另类精品久久| 成人黄色视频免费在线看| 久久精品久久久久久久性| 亚洲真实伦在线观看| 国产精品一二三区在线看| 免费人妻精品一区二区三区视频| 少妇 在线观看| 亚洲激情五月婷婷啪啪| 免费黄色在线免费观看| 欧美精品一区二区大全| 国产精品一区www在线观看| 欧美精品人与动牲交sv欧美| 麻豆成人午夜福利视频| 寂寞人妻少妇视频99o| 色婷婷久久久亚洲欧美| 男女免费视频国产| 曰老女人黄片| av网站免费在线观看视频| 亚洲人与动物交配视频| 男女边摸边吃奶| 麻豆精品久久久久久蜜桃| 自拍偷自拍亚洲精品老妇| 丰满饥渴人妻一区二区三| 日本与韩国留学比较| 亚洲精品456在线播放app| 精华霜和精华液先用哪个| 中文字幕亚洲精品专区| 日韩不卡一区二区三区视频在线| 狠狠精品人妻久久久久久综合| 久久精品久久久久久噜噜老黄| 99久久人妻综合| 亚洲av.av天堂| 免费黄频网站在线观看国产| 久久久久久伊人网av| 久久久国产欧美日韩av| 亚洲国产欧美在线一区| 免费少妇av软件| 一边亲一边摸免费视频| 午夜免费观看性视频| 日本猛色少妇xxxxx猛交久久| 国产欧美日韩精品一区二区| 色哟哟·www| 秋霞伦理黄片| 免费av中文字幕在线| 亚洲精华国产精华液的使用体验| 在线观看国产h片| 欧美+日韩+精品| 亚洲色图综合在线观看| av有码第一页| 好男人视频免费观看在线| 国产有黄有色有爽视频| 免费观看的影片在线观看| 大话2 男鬼变身卡| 丝袜脚勾引网站|