• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    2022-08-23 02:19:38SalaheddineKablyMounirAriouaandNabihAlaoui
    Computers Materials&Continua 2022年6期

    Salaheddine Kably,Mounir Arioua and Nabih Alaoui

    1Laboratory of Information and Communication Technologies,National School of Applied Abdelmalek Saadi University,Tanger,Morocco

    2Ecole Suprieure d’informatique et du Numrique,TICLab UniversitInternationale de Rabat Sala,El Jadida,Morocco

    Abstract:Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT).In concept,blockchain has a linear structure that grows with the number of transactions entered.This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments.Moreover,conventional consensus algorithms such as PoW,PoS are very computationally heavy.This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm.The Multi-Zone Direct Acyclic Graph(DAG)Blockchain(Multizone-DAG-Blockchain)framework is proposed for the fog-based IoT environment.In this context, fog computing technology is integrated with the IoT to offload IoT tasks to the fog nodes, thus preserving the energy consumption of the IoT devices.Both IoT and fog nodes are initially authenticated using a non-cloneable physical function-based validation mechanism(DPUF-VM)in which multiple authentication certificates are verified in the blockchain.Each transaction is stored in a hash function in the blockchain using the lightweight CubeHash algorithm and signed by the Four-Q- Curve algorithm.In the cloud, sensitive data is stored as ciphertext.Fog nodes provide data security to avoid the energy consumption and complexity of IoT nodes.The fog node first performs a redundancy analysis using the Jaccard Similarity(JS)measure and sensitivity analysis using the Neutrosophic Neural Intelligent Network (N2IN) algorithm.A lightweight proof-of-authentication (PoAh) algorithm is presented and executed by the optimal consensus node selected by the bi- objective spiral optimization(BoSo)algorithm for transaction validation.The proposed work is modeled in Network Simulator 3.26 (ns-3.26), and the performance is evaluated in terms of energy consumption,storage cost,response time,and throughput.

    Keywords: Multi zone DAG blockchain; dynamic PUF; lightweight PoAh consensus;BoSo node selection;four-q-curve encryption;IoT environment

    1 Introduction

    The Internet of Things (IoT) is an emerging technology with wide-ranging applications [1],including the Smart City[2],Smart healthcare[3],and more.However,security is a significant issue in the IoT environment.In IoT,a large amount of heterogeneous data is generated every second and stored in a remote server for other purposes [4,5].As the data is accessed remotely, security is the critical challenge.Security is by cryptographic functions,multi-factor authentication,key distribution,and moreover[6,7].Recently,blockchain technology is the optimal solution to IoT security challenges[8].The blockchain is the distributed ledger that validates every transaction performed by IoT nodes in a decentralized and secure manner.The validation uses a consensus algorithm.This decentralized nature of the blockchain plays a vital role in ensuring high-level security [9].Although blockchain proves its effectiveness in security,it still has some computational complexity challenges[10].The main challenges in using blockchain for IoT are the complexity of the traditional consensus algorithms.Firstly,the nodes running the consensus algorithm have higher resource consumption.Secondly,the involvement of redundant data in the IoT network increases the size of the blockchain exponentially.Finally,the conventional linear structure of the blockchain is not suitable for the IoT environment is not scalable[11].

    In order to address these challenges,lightweight blockchain structures are being studied in recent times [8].Although the blockchain infrastructure reduces complexity, the consensus algorithm used in the blockchain is also crucial in deciding the complexity of the blockchain technology [12].The conventional proof-of-work(PoW)consensus algorithm consumes more complexity than others[13].Moreover,the consensus algorithm running by the consensus node,which is also an IoT node.Since IoT nodes are resource-constrained, they do not have enough resources to execute the complex consensus algorithms.Therefore, the consensus algorithm and the selection of the consensus node also play a critical role.

    On the other hand,fog computing is an emerging technology that brings network services closer to the edge[14].It provides better resources to resource-constrained IoT nodes and also minimizes the response time for requested services.IoT-Fog integration brings efficiency to the IoT environment in scalability,energy efficiency,and response time[15].Besides,authentication of IoT nodes[16]ensures that data is not accessible to any unauthorized nodes[17].In general,identification,password,MAC address,and IP address are mainly used to validate IoT nodes[18].However,these credentials can be easily hacked by attackers.On the other hand, the physically tilting function PUF is the hardwarebased security credential embedded in every IoT device [19].Therefore, PUF-based authentication becomes a promising research direction.Although authentication prevents unwanted access, data still needs to be protected from attackers [20].For data security, cryptographic techniques play a central role.In general,encryption algorithms are widely used to ensure data security in the IoT[5].Due to this complexity, these algorithms are not suitable for the IoT environment because devices have limited resources.Due to this nature, highly complex algorithms are not suitable for the IoT environment.Therefore,lightweight encryption algorithms become an essential solution for securing the IoT [21].However, the following research questions are still unsolved in IoT and need to be addressed:How to authenticate IoT nodes with lightweight and dynamic credentials?How to secure transactions performed by IoT nodes with cryptographic functions? How to make the blockchain as lightweight as possible for the IoT environment to be efficient? In this paper, we answer these research questions through optimal blockchain integration.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.1 Research Aim and Motivation

    This research aims to reduce the heavy computational needs and constraints of the IoT-blockchain technology.This research topic focuses on lightweight blockchain infrastructure,lightweight consensus,and lightweight security protocols for these purposes—the developed secure IoT environment in terms of initial authentication and sensitive data security.

    This research topic mainly focuses on the existing problems in IoT ecosystems.The current blockchain technology is not suitable for the resource-constrained IoT environment.Although some applied lightweight blockchain-based methods on IoT, there is still high complexity.Indeed, most lightweight blockchain solutions focus on lightweight consensus algorithms.However, the structure of blockchain also increases complexity because the IoT environment is broad-spectrum.Besides,the involvement of redundant data from IoT nodes rapidly increases the bulk of the blockchain.Even in lightweight consensus algorithms, the consensus nodes are selected randomly or in the round,inefficient.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.2 Major Contributions

    The principal contribution of this topic is the design of new Multi-DAG technology for the IoT environment.The essential contributions of this work are as follows;Firstly,a lightweight authentication performed by the dynamic validation mechanism of PUF with the support of blockchain.In this process,a random identifier is dynamically generated and approved at any moment to guarantee its validity.Secondly, the encrypted data stored is validated in the blockchain by consensus.We propose a lightweight proof of authentication(PoAh)consensus.Moreover,we minimize the consensus complexity by selecting the optimal node through the Bi-Objective Spiral Optimization (BoSo)algorithm.Thirdly,we propose a secure IoT environment based on the multi-zone DAG blockchain(Multizone-DAG-Blockchain) that reduces complexity and energy consumption.Three significant aspects are enhanced.Firstly,lightweight authentication,secondly,lightweight data encryption,and thirdly lightweight consensus algorithm design.Fourthly,all transactions are handled in a new Multi-Zone DAG Blockchain infrastructure(Multizone-DAG-Blockchain)that is lightweight and scalable.Bulk is further decreased by using the CubeHash hash algorithm and the Four-Q Curve-based signature algorithm in the blockchain.Finally, For the incoming IoT data, the fog node performs a Jaccard similarity-based redundancy analysis,including a neutral neural intelligent network(N2IN)sensitivity analysis.Then,for all sensitive data,the fog node applies lightweight encryption based on the four-quarter curve.

    2 Related Works

    Multi-level blockchain system (MBS) [22] for the IoT environment, the main advantages were the blockchain’s speed and flexibility.For this purpose,the blockchain implementation is in multiple levels,the micro-level(IoT level),the gateway level blockchain(cluster heads of the IoT network),and the macro-level blockchain(platform level).The data generated by the IoT devices were collected and stored in the massively distributed ledger to improve the security level.The deployment is complex and is not suitable for the resource-constrained IoT environment.

    Lightweight consensus algorithm, known as proof of block and transaction (PoBT) [23], The proposed consensus algorithm minimizes IoT nodes’time waste and memory.The PoBT consensus algorithm is integrated into the Hyperledger fabric framework.However,the consensus algorithm is still executed by a random IoT node,which increases the complexity[11].

    Distributed blockchain is employed to authenticate IoT devices [24].For this purpose, a crossdomain authentication scheme (xDBAuth) [25], aims to contribute as a trusted third-party signer.For validation, proof of authenticity and integrity (PoAI) enable access to IoT nodes.However,authentication by considering only the IoT identity is insecure and unreliable.Although PoAI is a lightweight consensus executed by resource-constrained devices, which increases the complexity.Though, A blockchain-based distributed security mechanism has been proposed [17].The security architecture was composed based on software-defined networking (SDN), blockchain, and fog computing.SDN is used to monitor network streams,while blockchain aims to strengthen network security.Besides,fog computing reduces the latency of the IoT network.The consensus algorithm is executed by the IoT nodes,which consume enormous resources.

    Multiple wireless sensor networks composes an IoT environment.To avoid the single point of failure, this work [26] proposes a Blockchain-based identity authentication mechanism.The blockchain network provides different identities for these nodes and validates the authentication.This work uses PoW for validation,which is not practical for resource constrained IoT nodes.

    This paper [16] proposes a blockchain-based security scheme for secure data transmission [27].This work mainly focuses on the blockchain’s overhead reduction to make it suitable for the resourceconstrained IoT environment.for this purpose, it uses a symmetric key encryption algorithm to validate and grant permission to IoT nodes; and a numeric signature in the ring structure.The conventional blockchain is computationally heavy and involves a large number of calculations[8].

    In Tab.1, the main research limitations as identified.Firstly, the blockchain’s linear growth decreases its scalability; Secondly, computationally intensive consensus algorithms are not suitable for the resource-constrained IoT environment,and last but not least,the level of security is low due to the involvement of inefficient credentials.

    Table 1: Related works summary

    3 Problem Definition

    A proposed distributed authentication device in a Fog- IoT environment based on distributed blockchain technology[26].The significant issues with the above approach are many;firstly,the access of non-authorized users is minimized,the proposed approach is furthermore complex due to ECDSA and SHA-1,as these two algorithms are very high computational complexity.Secondly,authentication is based on unprotected parameters such as system ID and public address,which are easily falsifiable.Moreover,the public address is published to all nodes through a public network,which increases the public address’s vulnerability.Thirdly,The PoW(proof of work)consensus algorithm is used in this work, which is more complex and increases resource consumption.In PoW, all participating nodes must validate transactions and broadcast the evidence.If one node has a higher load or lower resources,then that node will have a higher resource consumption.A lightweight blockchain uses a lightweight consensus algorithm, the so-called synergistic multiple proofs [12].Here, the proposed blockchain structure is not scalable,even though it uses a blockchain filter.Since the IoT network is always largescale and generates millions of data, using the conventional blockchain structure is not suitable.In the IoT environment,data redundancy is the principal problem that leads to blockchain’s unlimited growth.This work also stores the redundant data in the blockchain,which increases its size.Here,the consensus algorithm is executed by the IoT nodes,which are limited in resources.The IoT nodes do not have enough resources to validate every transaction in the network.Thus,the IoT nodes’surcharging is at a high level.An Efficient Lightweight Integrated Blockchain(ELIB)design has been proposed[29]; the lightweight consensus algorithm works by limiting the number of blocks generated in the blockchain.However, defining the arbitrary nature of blocks is a heavy process that increases time consumption.This waiting time is applied to all transactions in the network.In principle, the IoT network involves millions of transactions which increases the overall time consumption.In the IoT network, data redundancy is the main problem; with a massive amount of redundant data, the blockchain’s size increases.Furthermore, all the IoT nodes also increase the space complexity as the blockchain copy has to be kept in each node.A fog-based blockchain and network Architecture(BFAN)has been proposed[14].Although,PoW consensus provides security to validate transactions through complex and heavy computation.Although the deployment of fog nodes are deployed, the IoT nodes execute the consensus algorithm,which is inefficient.IoT nodes are resource-constrained and do not have enough resources to run PoW in the network.The use of SHA-2 and ECDSA further increases the complexity,with even a lower level of security.Data encryption is enabled for all data.This increases the size of the data,and the complexity of the network is also high.These mentioned research problems are still not solved in the IoT environment.Our work focuses on these problems.

    4 Proposed Framework

    The proposed IoT network as shown in Fig.1 is built in three tiers: the IoT perception tier,the blockchain and fog tier, and the cloud tier.The first tier includesna number of IoT sensors(S1,S2,S3...Sn).These sensors are supposed to perform specific tasks and do not contribute to blockchain validations,so-called passive block nodes(PBNs).

    The first layer includes a blockchain gateway (BGW) as well.The PBNs or IoT devices are responsible for creating data and initiating transactions.The second tier consists of amnumber(F1,F2,F3...Fm).of fog nodes (FNs) known as active block nodes (ABNs).The ABNs or FNs are responsible for validating transactions in the blockchain.This system’s main objective is to decrease the energy consumption and complexity of PBNs by transferring the validation process to ABNs as shown in Fig.1.

    Figure 1:Proposed tri-level multizone-DAG-blockchain architecture

    The proposal provides efficiency through the following processes:

    · Lightweight DPU-VM based authentication

    · Lightweight data encryption

    · Lightweight consensus algorithm

    4.1 Light Weight DPU-VM Based Authentication

    IoT nodes and fog nodes are authenticated using a Dynamic Physically Unclonable Functions based Validation Mechanism (DPUF-VM) with the blockchain’s assist.We proposed a dynamic approach in which a random identifier (RID) is dynamically generated for each IoT node.All IoT devices and fog nodes initially register their identity with the blockchain network,in which the identity is stored as a hash function.A novel idea of DPUF-VM is to change theRIDdynamically based on the device ID and the previously detected value by the concerned sensor.The process of DPUF-VM is explained in the following steps:

    The first step is device registration.In this step,the devices register the identification information to the blockchain through BGW.For the sensor indexi,the identification pieces of information are sensor ID SID(i), MAC address SMAC(i), PUF(SC-R(i)), and the sensor’s last detected valueρi.The random ID’s generated as follow:

    This random ID’s(RID)changed at each time based on the current sensed value.

    The second step is device registration.The credentials are stored in the blockchain as hash values at this step.Furthermore,the CubeHash algorithm is proposed for hash generation.The operation of CubeHash involves five major parameters listed in Tab.2.

    Table 2: CubeHash algorithm parameters

    The output is given for an hs-bit string as follow:

    Our hashed properties can beRID,SID,SMACorSC-R

    CubeHash generation algorithm Init Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by seven bits or 0 ≤RIni ≤15 Swap xi and xi⊕8 for RIni?[1,2,3,4,5,6,7]XOR xi⊕16 and xi for 0 ≤RIni ≤15 Swap xi and xi⊕2 for i?[16,7,20,21,24,25,28,29]Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by eleven bits Swap xi and xi⊕8 for RIni?[0,1,2,3,8,9,10,11]XOR xi⊕16 and xi Swap xi and xi⊕1 for i?[16,18,20,22,24,26,28,30]End

    The third step is device authentication.The Sitriggers authentication with the sending of an authentication request to the BGW.Then the BGW requests a random certificate with a digital signature.The RCERis generated based on the RIDand SMACas follows,

    Likewise,The digital signature generation for PUF is given as follows,

    For PUF Signing purpose,we based on FourQ-Curve signing algorithm,designated as follow,

    where p is a prime number,and is a non-square inFp2.This curve,dubbed“FourQ”.p is defined to generate digital signature.First,the hash is generated for PUF by using CubeHash algorithm.In the order ofl,the random selectediis from[1,l-1],the curve point computed as follow,

    where G is the generator known in advance,to calculate the r from the curve point,the computation is as follow,

    The pair(r,s)is the digital signature,while SK is the private key of the concerned device responsible for submitting the authentication credentials as(RCER,Sign(RC-R))

    The fourth step is device validation.Upon reception of the authentication information, BGW validates it through a signature verification procedure.

    If the credentials are identical to those in the blockchain,the device is authenticated.Otherwise,the request is denied.The DPUF-VM process is described in Fig.2.

    Figure 2:Proposed DPUF-VM authentication

    In the same way as IoT nodes,fog nodes are likewise authenticated by BGW in order to guarantee a high level of security.

    4.2 Lightweight Data Encryption

    After successfully authenticating the IoT, the data is transmitted from the IoT nodes to the fog nodes.The fog nodes apply a lightweight encryption mechanism depending on the sensitivity level of the received data.The fog nodes perform two primary operations, initially eliminating redundancy and then encrypting the data.The fog node performs redundancy elimination by JS calculation for the received data(SD1,SD2,...,SDu).The calculation is performed as follows,

    If the output of the algorithmJSbetween two data is small,then the input is redundant,and one of the inputs is removed from the data set.The leading factor in the growing size of the blockchain is the storage of redundant values in the blockchain.For this purpose,the fog node starts by eliminating all redundant data from the collected data.Also,the data encryption increases the input size,which leads to an increase in the size of the blockchain.To deal with this issue,we would only apply encryption to sensitive data.For sensitivity analysis,the fog node uses the N2IN algorithm.The N2IN algorithm is associated with an artificial neural network(ANN)and a Neutrosophic Intelligence algorithm.The sensitivity is determined based on the detected readingρ,the sensor type(ST),and the sensor location(SL)for the received data.The neutrosophic set is like a fuzzy set,however it performs better than fuzzy sets[15]—the collected data initialized in the input layer of N2IN.In the hidden layers,the weight value of each data is calculated by the neutrosophic intelligence.

    In the hidden layer,the membership function is initialized as truth setTi,indeterminate setIi,and false setFi.The objective function of N2IN is the following representation:

    Here,σ1,σ2,σ3are the weight vectors,andφjis estimated based on the indexes ofTij.All three membership functions are given as follows:

    The algorithm logic of N2IN If ρ is abnormal&&ST is sensitive&&SL is sensitive.Then SDi is sensitive Apply Encryption Send SDi-encrypted to the cloud level Else,SDi is non-sensitive Send SDi To the cloud level End If

    This weight value calculation is performed on the hidden layers,and the weight value of each data is adjusted.Based on the above approach,the N2IN performs a sensitivity analysis.All sensitive data is encrypted using the four-Q-curve.For all sensitivesSDi,the fog node applies encryption.Then,the encrypted data(Encrypted[SDi])is stored as a new transaction in the blockchain.

    4.3 Lightweight Consensus Algorithm

    The consensus algorithm is the primary mechanism for the validation of all transactions processed through the blockchain.The existing consensus algorithm has high complexity and computational overhead that needs an adjustment.In the same way, the existing traditional linear structure of the blockchain presents many problems in terms of scalability and complexity.Therefore, we propose a new Multizone-DAG-Blockchain structure.In the proposed structure, the IoT perception layer is segmented into multiple zones,and the transactions in each zone are managed in the corresponding zone.The model of Multizone-DAG-Blockchain is shown in Fig.3.

    Figure 3:Multizone DAG blockchain design

    In a fundamental sense, the DAG blockchain promotes scalability and minimizes complexity compared to the regular blockchain [4].As each transaction is added in the form of new blocks in the regular blockchain, the blockchain grows exponentially.This sum mentioned phenomenon is addressed in the DAG-based blockchain,in which the graphGis composed over transactions.In the proposed Multizone-DAG-Blockchain model, a numbervof direct acyclic graphs are constructed asG1,G2,...,GvforGvnumber of zones.That is, we obtain multiple DAGs with corresponding transactions for multiple zones.The graphithis defined asG= {Sj,E,W}withSj∈Zi.

    Sjis the set of IoT sensors located in zonei(Zi),Eis the set of edges betweenSj,and W is the weight function presented asE?(Sj×Sj)andW?(Sj×Sj )→R.TheGis entirely undirected so that there are no cycles in the graph.In the Multizone-DAG-Blockchain,the transactions are the vertexes(V),and the blocks have all transactions.The root block of the Multizone-DAG-Blockchain is the genesis block, and theGjis a finite graph of {V,E}.The arrival of each transaction at each timetfollows Poisson operation at the arrival rate ofλ.This property is applicable for each DAG in the Multizone-DAG-Blockchain.With the increase int, theGgrows exponentially still lower than the linear blockchain.The main differences between conventional blockchain and the proposed Multizone-DAG-Blockchain are given in Tab.3.

    Table 3: Linear&multizone-DAG-blockchain comparison

    In our proposed design,a proposed PoAh consensus algorithm is applied to validate the transactions.The IoT nodes create the data in the form of transactions asT1,T2,T3...Tnin a period.These transactions are bundled into a block, and respectively block is updated with each new transaction.Before this happens,the consensus node validates the transaction to update the block.Here,the trusted nodes are considered the consensus nodes.As explained earlier,we apply the Four-Q-Curve algorithm to perform the cryptographic functions.First, the IoT generates data and signs it before spreading it on the network.Then, a node is selected from the trusted network to be part of the PoAh.If the node’s trust value is greater than the threshold value,the block is assigned as part of the chain after authenticating the block.

    Algorithm PoAH based validation with DPUF-VM Auth Init Block(T1...Tn)→Blocks Sign(Block)→Broadcast Auth[DPUF-VM]If Auth==True&&Verify Sign(Block)==True Block‖PoAh →Broadcast Hash(Block)→add to Blocks End If End

    PoAh is performed entirely by the consortium node selected from the ABNs.This PoAh implementation is energy-consuming due to a large number of calculations.Thus,the IoT nodes are unable to perform PoAh.We perform a process of selecting the optimal consensus node(OCN)For this purpose,we propose the BoSo algorithm[30].In the BoSo algorithm,two objective functions are designed to select theOCNamong the ABNs.The spiral optimization algorithm is a heuristic algorithm that solves complex problems[30].The spiral optimization algorithm determines the optimal solution by searching for the solution over multiple spiral models,which overcomes the optimum local problem.In BoSo,the search points are defined on the spiral path as follows,

    y(t),is the initial position of search points n at t iteration,andy*is the best position learned,andR(θ)is the composite random matrix.The rotation angleθand the random number r.The BoSo process performs according to the steps described further below:

    · BoSo initializes the number of search points which isn≥2,r,θ,scaling factor(SF),objective functionF(g),and maximum iteration

    · The initial position of the search point is defined randomly.Furthermore, For every search point, the relevance is calculated for each ABNs, for Thejth ABN, TheF(gj)is calculated based on two objectives:trust valueTj,and load statusLj.The trust value defines the number of transactions adequately validated by the ABN, and the load status defines the number of tasks running by the ABN.TheF(gj)is formulated as following,

    · Based on the output of relevance function valueF(gj), the search point is selected properly.Based on the most suitable solution,the search position is updated as follows,

    ·y*1andy*2Zare respectively the first and second center points,?is the probability index which lies between[0,1].

    · All the search points are evaluated based on the relevance function, and the new position is updated as follows,

    In the end, all the other search points update the position to the optimal position.Thus, the optimal ABN is selected asOCN,which ensures the consensus algorithm.Since the ABNs execute the consensus algorithm,the load and complexity on the IoT nodes are significantly reduced.

    The generic processing flow of the proposed approach as illustrated in Fig.4.The proposed work achieves scalability and efficiency through lightweight authentication, lightweight encryption, and lightweight consensus algorithm in its design.

    Figure 4:Multizone-DAG-blockchain flow design

    5 Performance Evaluation

    This section aims to evaluate the performance of the proposed Multizone DAG Blockchain through a comparative analysis.We are examining the results in an environment as close to reality as possible.We will highlight the significant areas of benchmarking in the IoT environment,such as energy consumption,response time,and moreover.

    5.1 Simulation Environment

    Our proposed Multizone DAG Blockchain simulated in Network Simulator NS-3.In particular,it provides proper support for IoT protocols and operations.Therefore,we chose ns-3 as the simulation tool as shown in Tab.4.

    Table 4: Parameters list used for the simulation purpose

    Table 4:Continued

    The field of application of our proposed system is enormous according to our need for IoT in daily life;as shown in Tab.5,we distinguish among applications industrial,smart cities,smart home,transport,and many others.In all these applications,the IoTs are mainly environmental sensors.we will continue our simulation analysis by considering as an example of sensors that we use in the daily life.

    Table 5: Sensor deployed for simulation purpose

    Thus, we can notice that all sensors detect sensitive data related to a different private area.The motion detector is considered a sensitive device since it is usually used as a virtual guardian that monitors the entire environment.All other sensors are classified according to the geographical context.Therefore,a temperature sensor set up next to the kitchen is more sensitive than the other devices.All of these IoT nodes are validated with each data transmission.In this way,data encryption is applied for all sensitive data detected by the IoT nodes.Since the blockchain validates the transactions, the environment is more secure and confidential.

    5.2 Comparative Analysis

    The proposed work is evaluated in terms of key performance metrics such as energy consumption,storage cost,response time,and throughput.The main differences between the proposed work and the existing works are shown in Tab.6.

    Table 6: Comparative analysis summary

    The analysis shows that there are many research problems with the ELIB model theoretically,which can also be confirmed experimentally.

    5.2.1 Power Consumption Analysis

    Energy consumption is the quantity of energy consumed by the IoT nodes during data transmission.The energy consumed by the IoT nodes for sensing,transmitting,and receiving data.We analyzed the energy consumption as a function of the number of nodes and the number of transactions.In Fig.5,the comparison of energy consumption is analyzed to increase the value ofn.We notice that thenvalue has no impact on the proposed job since it has a reasonable energy consumption from 100 to 120 watts.At the same time,the ELIB mode increases the energy consumption with the increase ofnvalue.Indeed,the proposed work is scalable since even increasing the number of nodes does not affect energy consumption.In contrast,existing work is unable to perform well when the number of nodes is high.In our proposal,energy consumption is minimized since the computations are offloaded to the fog nodes while the ELIB model performs all calculations on the IoT nodes.Although fog nodes are used in BFAN,the computations are performed in the IoT nodes.

    Figure 5:Power consumption analysis based on number of nodes

    In Fig.6, the energy consumption is analyzed as a function of the number of transactions.The increase in the number of transactions raises the complexity of the consensus validation process, as each transaction involves the creation and validation of a block.

    Figure 6:Power consumption analysis based on number of nodes

    Thus, energy consumption is measured by the transaction cost.Therefore, the ELIB model has a power consumption of 650 to 1200 watts.The BFAN model has a power consumption of 1300 watts for 100 transactions.For the exact same number of transactions,the proposed job has a power consumption of 140 watts.The primary reason for this enormous improvement is the fact that the consensus algorithm is executed by an optimal ABN (fog node) selected by the BoSo algorithm in the proposed work.In addition,a lightweight PoAh is used which performs better than PoW.Thus,the power consumption is minimized up to 1000 watts in the proposed work.

    5.2.2 Storage Efficiency Analysis

    Storage cost is determined by the storage required for the IoT data generated by the IoT nodes.This metric is compared in terms of the number of nodes and the number of transactions.

    In Fig.7, the storage cost is analysed as a function of the number of IoT nodes.When nodes number increased, then the storage cost raises.This analysis shows that increasing the number of nodes increases the block size and storage cost.The proposed work increases the storage efficiency,and It’s four times higher than the existing BFAN & ELIB works.The main drawback is that these works increase the blockchain’s size, which results in a higher storage cost.As a result, the linear blockchain model also increases the storage cost, which is not suitable for the resource-constrained IoT environment.

    Figure 7:Storage cost analysis per number of IoT nodes

    In Fig.8, the storage cost is analysed based on the number of transactions.Even for 100 transactions, the storage cost is only 30 MB.However, for 100 transactions, the ELIB model has a storage cost of 124 MB, and the BFAN model has a storage cost of 135 MB.As the number of transactions increases,the size and length of the blockchain increase linearly.

    Figure 8:Storage cost analysis per number of IoT nodes

    This increase results in a higher storage cost.In ELIB and BFAN mode, data from IoT nodes is collected and stored in cloud servers without any redundancy control.They are keeping repeated data results in a higher storage cost.However, the proposed work analyses the redundancy by JS among the data collected from IoT nodes and eliminates the redundant data.Furthermore,we apply data encryption only for sensitive data identified by the N2IN algorithm.Overall, the proposed work minimizes the storage cost with the Multizone-DAG-Blockchain framework and fog computing involvement.

    5.2.3 Response Time Analysis

    Response time is the time it takes the system to respond to requests.In this case,it is determined according to the time needed for the blockchain to validate the transaction and create the block for new input data.In Fig.9,the response time is examined as a function of the number of transactions.

    The analysis proves that the proposed Multizone-DAG-Blockchain has a slower response time than the ELIB model and the BFAN method.It is shown that the increase in the number of transactions exponentially increases the response time in both existing works since,with a high number of transactions, the blockchain becomes massive and fails to respond to new transactions.Even for some 100 transactions, the response time of Multizone-DAG-Blockchain is 12 ms, while the ELIB models are 45 ms and BFAN is 75 ms.Due to this long response time, new transactions fail to be validated and added as new blocks.In this context,the IoT environment provides a massive amount of data every millisecond,which cannot be validated with both existing works.

    Figure 9:Response time analysis per number of IoT nodes

    5.2.4 Throughput Analysis

    The throughput of the system is the number of transactions processed and stored in the blockchain during the specified period.

    In Fig.10,the throughput is evaluated by analyzing the number of transactions.With an increase in the number of transactions,the throughput increases in parallel.In particular,the proposed Multi-Zones-DAG-Blockchain has a throughput of 135 kbps with 100 transactions.This is relatively higher than the ELIB model and the BFAN method.The ELIB model has a throughput of 95 kbps and BFAN has 85 kbps for 100 transactions.In both existing works,the blockchain structure is increased linearly for new transactions.On the other hand, the proposed work distributes the blockchain structure.Consequently,the proposed work achieves better throughput than the existing ELIB model and BFAN method.

    Figure 10:Response time analysis per number of IoT nodes

    5.2.5 Results Analysis

    Tab.7 summarizes the average numerical results obtained for the proposed work and the existing works.The analysis shows that the proposed work achieves better performance in each performance metric.

    This study shows that the proposed work is well adapted to the IoT network.This is mainly by minimizing energy consumption even with many nodes and transactions, which is vital for the IoT network.The main aspects of the research work are summed up as follows,

    · The complexity and overhead are reduced in all aspects,including lightweight authentication,encryption,hash generation,and consensus algorithm.

    · For the authentication, a random identifier is dynamically generated every time, and the unique MAC address is taken into account with physically tilted functions(PUF)to make the authentication as strong.

    Table 7: Results summary

    · Resource-constrained IoT nodes are considered passive nodes, and fog nodes are used to validate transactions.

    · A lightweight consensus algorithm is presented with an optimal consensus node selection procedure.

    Altogether,the proposed work minimizes the energy consumption of IoT nodes.As the proposed work is improved in the above aspects,this work achieves better efficiency.

    6 Conclusion

    In this work,we propose a new framework,Multizone DAG blockchain,adapted to the resource constraints of the IoT environment.The proposed scheme ensures high-level security through lightweight computation.For starters, a lightweight authentication mechanism (DPUF-VM) is proposed to authenticate the legitimacy of every IoT node and fog node.The collected information from fog nodes is further analyzed for redundancy and sensitivity.For redundant data removal,the JS measure is presented, and the N2IN algorithm for sensitivity analysis is also proposed.Each transaction is validated in the Multizone-DAG-Blockchain using the PoAh lightweight consensus algorithm.In Multizone-DAG-Blockchain,the CubeHash lightweight hash algorithm is used,and the Four-Q-Curve algorithm performs the digital signature.The optimal fog node is selected by the BoSo algorithm and respected as the consensus node.The extensive evaluation in ns-3.26 shows promising results in energy consumption,storage cost,response time,and throughput.In the future,we plan to extend Multizone-DAG-Blockchain for real-world use with a lightweight intrusion detection system(IDS)to analyze security threats in detail.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男女啪啪激烈高潮av片| 男的添女的下面高潮视频| 日本欧美国产在线视频| 日韩三级伦理在线观看| 国产成人精品久久久久久| 可以在线观看毛片的网站| 国产精品一区www在线观看| 91久久精品国产一区二区三区| 91午夜精品亚洲一区二区三区| 亚洲精华国产精华液的使用体验| 国产精品伦人一区二区| 亚洲综合精品二区| 中国国产av一级| 国产精品福利在线免费观看| 久久精品国产亚洲av涩爱| 十八禁国产超污无遮挡网站| 麻豆乱淫一区二区| 天美传媒精品一区二区| 精华霜和精华液先用哪个| 黄色日韩在线| 中文字幕久久专区| 午夜精品在线福利| 91久久精品国产一区二区三区| 久久亚洲精品不卡| 一区二区三区高清视频在线| 麻豆成人av视频| 18禁动态无遮挡网站| 麻豆乱淫一区二区| 亚洲精品影视一区二区三区av| 亚洲国产欧美在线一区| 日本免费一区二区三区高清不卡| 欧美+日韩+精品| 亚洲精品乱码久久久v下载方式| 午夜福利视频1000在线观看| 成年女人永久免费观看视频| 亚洲精品日韩av片在线观看| 欧美日韩一区二区视频在线观看视频在线 | 精品无人区乱码1区二区| 欧美激情在线99| 日韩制服骚丝袜av| 黄片无遮挡物在线观看| 三级男女做爰猛烈吃奶摸视频| 欧美一级a爱片免费观看看| 国产精品久久久久久精品电影小说 | 九草在线视频观看| 国产成人a区在线观看| 国产精品伦人一区二区| 日韩亚洲欧美综合| 一个人免费在线观看电影| 日日撸夜夜添| 免费看a级黄色片| 伦理电影大哥的女人| 看片在线看免费视频| 欧美高清性xxxxhd video| 非洲黑人性xxxx精品又粗又长| 一本久久精品| 久久99热这里只频精品6学生 | 97热精品久久久久久| 网址你懂的国产日韩在线| 国产伦精品一区二区三区四那| 观看免费一级毛片| 女的被弄到高潮叫床怎么办| 国产黄色视频一区二区在线观看 | 天天一区二区日本电影三级| 免费观看精品视频网站| 亚洲美女搞黄在线观看| 麻豆乱淫一区二区| 午夜福利在线观看吧| 淫秽高清视频在线观看| 黑人高潮一二区| 亚洲国产精品sss在线观看| 久久久久久九九精品二区国产| 国产老妇女一区| 一个人看视频在线观看www免费| 联通29元200g的流量卡| 国产又黄又爽又无遮挡在线| 婷婷色av中文字幕| 国产 一区 欧美 日韩| 欧美成人午夜免费资源| 99久国产av精品国产电影| 久久99热这里只频精品6学生 | 男插女下体视频免费在线播放| 色哟哟·www| 日韩三级伦理在线观看| 国产成人91sexporn| 精华霜和精华液先用哪个| 日韩欧美 国产精品| 国产午夜福利久久久久久| 欧美不卡视频在线免费观看| 日韩一区二区视频免费看| 久久精品国产亚洲av天美| 国产麻豆成人av免费视频| 国产精品熟女久久久久浪| 能在线免费看毛片的网站| 午夜亚洲福利在线播放| 一边亲一边摸免费视频| 国内揄拍国产精品人妻在线| 免费看a级黄色片| 久久99精品国语久久久| 午夜福利在线在线| 三级国产精品欧美在线观看| 最近中文字幕2019免费版| 欧美日韩国产亚洲二区| 波多野结衣巨乳人妻| 国产高清三级在线| 国产av一区在线观看免费| 一级av片app| 99热这里只有是精品在线观看| 简卡轻食公司| 大香蕉97超碰在线| 亚洲五月天丁香| 偷拍熟女少妇极品色| 久久人人爽人人爽人人片va| 日日撸夜夜添| 日韩制服骚丝袜av| 男女下面进入的视频免费午夜| 亚洲欧美精品专区久久| 日本免费一区二区三区高清不卡| 天堂中文最新版在线下载 | 天堂中文最新版在线下载 | 国产一区二区在线观看日韩| 只有这里有精品99| 天天躁夜夜躁狠狠久久av| 人体艺术视频欧美日本| 嘟嘟电影网在线观看| 小说图片视频综合网站| 精品少妇黑人巨大在线播放 | 国产精品久久久久久精品电影| 欧美精品国产亚洲| 内射极品少妇av片p| 国产成人a区在线观看| 在线播放国产精品三级| 亚洲精品乱码久久久v下载方式| 99热这里只有是精品在线观看| 老司机影院成人| 日本一二三区视频观看| 春色校园在线视频观看| 国产亚洲av嫩草精品影院| 性插视频无遮挡在线免费观看| 丰满少妇做爰视频| 村上凉子中文字幕在线| 国产一级毛片七仙女欲春2| 国产免费福利视频在线观看| 国产精品一区二区性色av| 人体艺术视频欧美日本| 人体艺术视频欧美日本| 精品熟女少妇av免费看| 免费av不卡在线播放| 欧美日韩综合久久久久久| 少妇高潮的动态图| 亚洲欧美成人精品一区二区| 免费人成在线观看视频色| 亚洲人成网站高清观看| 日韩视频在线欧美| 中文字幕久久专区| kizo精华| 日韩欧美在线乱码| 日日摸夜夜添夜夜添av毛片| 久久这里有精品视频免费| 免费观看精品视频网站| 青春草视频在线免费观看| 国产伦一二天堂av在线观看| 国产精品国产高清国产av| 97超碰精品成人国产| 麻豆一二三区av精品| 成人美女网站在线观看视频| 看免费成人av毛片| 亚洲三级黄色毛片| 啦啦啦观看免费观看视频高清| 久久久a久久爽久久v久久| 免费黄网站久久成人精品| 国产精品蜜桃在线观看| 蜜桃亚洲精品一区二区三区| 国产在视频线在精品| 日韩欧美国产在线观看| 国产大屁股一区二区在线视频| 精品人妻一区二区三区麻豆| 老师上课跳d突然被开到最大视频| 天堂影院成人在线观看| 国产av一区在线观看免费| 国产日韩欧美在线精品| 99热精品在线国产| 久久久欧美国产精品| 天堂网av新在线| 中文字幕人妻熟人妻熟丝袜美| 亚洲av成人精品一区久久| 美女被艹到高潮喷水动态| 国产伦一二天堂av在线观看| 亚洲欧美日韩东京热| 网址你懂的国产日韩在线| 插逼视频在线观看| 亚洲第一区二区三区不卡| 午夜福利在线观看免费完整高清在| 国产免费福利视频在线观看| 寂寞人妻少妇视频99o| 久久久久久九九精品二区国产| 国产亚洲5aaaaa淫片| 黄片无遮挡物在线观看| 热99在线观看视频| 亚洲伊人久久精品综合 | 高清av免费在线| 亚洲精品国产成人久久av| 国产精品女同一区二区软件| 日韩av在线大香蕉| 亚洲国产精品成人久久小说| 91精品国产九色| 国产又黄又爽又无遮挡在线| 中文字幕久久专区| 特级一级黄色大片| 亚洲成人av在线免费| 日韩av在线免费看完整版不卡| 免费观看a级毛片全部| 亚洲av成人精品一二三区| 国产精品一区二区三区四区久久| 国产高清国产精品国产三级 | or卡值多少钱| 一个人观看的视频www高清免费观看| 男人和女人高潮做爰伦理| 亚洲一区高清亚洲精品| 久久久久久久久久久丰满| 中文字幕av在线有码专区| 亚洲欧美日韩东京热| 欧美日韩一区二区视频在线观看视频在线 | av黄色大香蕉| 九草在线视频观看| 亚洲国产精品专区欧美| videossex国产| 国产单亲对白刺激| 中国国产av一级| 美女高潮的动态| 插逼视频在线观看| 亚洲国产欧美人成| 午夜精品国产一区二区电影 | 91在线精品国自产拍蜜月| 欧美极品一区二区三区四区| 九九在线视频观看精品| АⅤ资源中文在线天堂| 国产亚洲一区二区精品| 黄色一级大片看看| 哪个播放器可以免费观看大片| 校园人妻丝袜中文字幕| 亚洲精品一区蜜桃| 永久免费av网站大全| 精品久久国产蜜桃| 久久99热6这里只有精品| 国产伦在线观看视频一区| 久久精品91蜜桃| 尤物成人国产欧美一区二区三区| 国产又黄又爽又无遮挡在线| 国产伦理片在线播放av一区| 国产女主播在线喷水免费视频网站 | 51国产日韩欧美| 欧美高清性xxxxhd video| 18+在线观看网站| 你懂的网址亚洲精品在线观看 | 精品无人区乱码1区二区| 又黄又爽又刺激的免费视频.| 亚洲欧美日韩东京热| 久久久亚洲精品成人影院| 国产成人精品婷婷| 老司机影院成人| 久久久久久久久中文| 国产老妇女一区| 亚洲欧美日韩无卡精品| 欧美一区二区国产精品久久精品| 久久6这里有精品| 麻豆精品久久久久久蜜桃| 亚洲av成人精品一区久久| 久久久久久久久久久免费av| 中文字幕av成人在线电影| 免费不卡的大黄色大毛片视频在线观看 | 99视频精品全部免费 在线| av免费观看日本| 成人特级av手机在线观看| 午夜精品在线福利| 高清毛片免费看| 国产午夜精品论理片| 永久免费av网站大全| 七月丁香在线播放| 亚洲av熟女| 亚洲国产色片| 蜜桃久久精品国产亚洲av| 国产亚洲精品av在线| 男的添女的下面高潮视频| 最近最新中文字幕免费大全7| 一夜夜www| 成人性生交大片免费视频hd| 99热这里只有精品一区| 午夜免费男女啪啪视频观看| 在线观看66精品国产| 久久99精品国语久久久| 99在线人妻在线中文字幕| 一个人观看的视频www高清免费观看| 久久99热6这里只有精品| 成人一区二区视频在线观看| av福利片在线观看| ponron亚洲| 爱豆传媒免费全集在线观看| 精品久久久久久久末码| 久久精品久久久久久久性| 国产精品野战在线观看| 日本黄大片高清| 美女国产视频在线观看| 日韩成人av中文字幕在线观看| 成人av在线播放网站| 久久久久久久亚洲中文字幕| 亚洲成色77777| 亚洲欧美精品专区久久| 日本猛色少妇xxxxx猛交久久| 国产免费视频播放在线视频 | 亚洲欧美清纯卡通| 亚洲人成网站在线播| 国产精品蜜桃在线观看| 国产精品永久免费网站| 欧美日韩国产亚洲二区| 九九在线视频观看精品| 亚洲成人av在线免费| 国产av在哪里看| 亚洲真实伦在线观看| 亚洲av免费在线观看| 岛国在线免费视频观看| 非洲黑人性xxxx精品又粗又长| 国产日韩欧美在线精品| 亚洲av二区三区四区| 欧美又色又爽又黄视频| 亚洲国产欧美人成| 2021少妇久久久久久久久久久| 亚洲图色成人| 国产伦在线观看视频一区| 日韩av在线免费看完整版不卡| 中文精品一卡2卡3卡4更新| 亚洲婷婷狠狠爱综合网| 久热久热在线精品观看| kizo精华| 亚洲av中文av极速乱| 亚洲18禁久久av| 少妇猛男粗大的猛烈进出视频 | 在线观看av片永久免费下载| 亚洲一级一片aⅴ在线观看| 女人十人毛片免费观看3o分钟| 熟女人妻精品中文字幕| 日韩视频在线欧美| 天堂中文最新版在线下载 | 欧美xxxx黑人xx丫x性爽| 久久精品国产99精品国产亚洲性色| 国产精品野战在线观看| 又粗又爽又猛毛片免费看| 1024手机看黄色片| 在线免费观看不下载黄p国产| 国产精品电影一区二区三区| 亚洲电影在线观看av| 精品一区二区免费观看| 午夜老司机福利剧场| 国产亚洲av片在线观看秒播厂 | 91精品国产九色| 国产精品乱码一区二三区的特点| 午夜福利高清视频| 一边亲一边摸免费视频| 国产精品久久久久久精品电影小说 | 亚洲最大成人av| 久久精品夜色国产| 日韩在线高清观看一区二区三区| 天天躁夜夜躁狠狠久久av| 亚洲精品国产成人久久av| 少妇熟女欧美另类| 天堂av国产一区二区熟女人妻| 午夜日本视频在线| or卡值多少钱| 久久久国产成人精品二区| 成人高潮视频无遮挡免费网站| 美女黄网站色视频| 99热全是精品| 亚洲av中文字字幕乱码综合| 国产亚洲5aaaaa淫片| 免费大片18禁| 麻豆乱淫一区二区| 国产成人午夜福利电影在线观看| 国产av在哪里看| 观看美女的网站| 成人鲁丝片一二三区免费| 国产精品99久久久久久久久| 亚洲国产高清在线一区二区三| 人体艺术视频欧美日本| 欧美潮喷喷水| 国产成人aa在线观看| 一二三四中文在线观看免费高清| 亚洲av男天堂| 色综合站精品国产| 免费观看的影片在线观看| 99久久人妻综合| av福利片在线观看| 亚洲自偷自拍三级| 能在线免费观看的黄片| 亚洲国产日韩欧美精品在线观看| 亚洲真实伦在线观看| 丝袜美腿在线中文| 免费黄网站久久成人精品| 欧美区成人在线视频| 精品午夜福利在线看| 亚洲人与动物交配视频| 免费av观看视频| 国产午夜精品久久久久久一区二区三区| 国产精品精品国产色婷婷| 中文字幕精品亚洲无线码一区| 91狼人影院| 久久精品夜夜夜夜夜久久蜜豆| 美女cb高潮喷水在线观看| 国产成人精品一,二区| 久久久亚洲精品成人影院| 亚洲av成人av| 国产乱来视频区| 久久久久久久久久成人| 亚洲精品成人久久久久久| 欧美成人一区二区免费高清观看| 又黄又爽又刺激的免费视频.| 久久久亚洲精品成人影院| 乱人视频在线观看| 晚上一个人看的免费电影| 成人高潮视频无遮挡免费网站| 亚洲怡红院男人天堂| 99在线视频只有这里精品首页| 少妇的逼水好多| 亚洲精品成人久久久久久| 久久久久九九精品影院| 精品久久久噜噜| 三级国产精品欧美在线观看| 综合色丁香网| 蜜桃久久精品国产亚洲av| 午夜福利在线观看免费完整高清在| 狂野欧美激情性xxxx在线观看| 老司机福利观看| 免费观看在线日韩| 99九九线精品视频在线观看视频| 成人亚洲精品av一区二区| 日本免费在线观看一区| 欧美性猛交黑人性爽| 18禁动态无遮挡网站| 欧美三级亚洲精品| 天堂√8在线中文| 久久精品久久久久久久性| 欧美区成人在线视频| 国产视频首页在线观看| 天堂影院成人在线观看| 国产av码专区亚洲av| 亚洲熟妇中文字幕五十中出| 中文字幕精品亚洲无线码一区| 女人久久www免费人成看片 | 精品99又大又爽又粗少妇毛片| 亚洲欧美精品自产自拍| 免费大片18禁| 十八禁国产超污无遮挡网站| 亚洲乱码一区二区免费版| 97热精品久久久久久| 中文字幕av在线有码专区| 午夜a级毛片| 亚洲欧美中文字幕日韩二区| 亚洲国产精品合色在线| 国产精品国产三级国产av玫瑰| 少妇熟女欧美另类| 国产精品一区二区三区四区免费观看| 久久久久九九精品影院| 日韩一区二区视频免费看| 成人国产麻豆网| 午夜激情福利司机影院| 亚洲av二区三区四区| 中文字幕熟女人妻在线| 午夜久久久久精精品| 亚洲精品久久久久久婷婷小说 | 日韩一区二区三区影片| 成人亚洲欧美一区二区av| 成人漫画全彩无遮挡| 亚洲av成人精品一区久久| 美女大奶头视频| 大香蕉97超碰在线| 日韩,欧美,国产一区二区三区 | 九九爱精品视频在线观看| 两个人的视频大全免费| 欧美zozozo另类| 免费一级毛片在线播放高清视频| 久久精品夜夜夜夜夜久久蜜豆| 最近2019中文字幕mv第一页| 成人亚洲欧美一区二区av| 欧美一区二区亚洲| 99热这里只有是精品50| 国产一区二区在线观看日韩| 最近2019中文字幕mv第一页| 人体艺术视频欧美日本| 国产精品女同一区二区软件| 夜夜爽夜夜爽视频| 久久精品夜夜夜夜夜久久蜜豆| 熟女人妻精品中文字幕| 九九在线视频观看精品| 精品免费久久久久久久清纯| 国产探花在线观看一区二区| 日本wwww免费看| 日本黄色片子视频| 日韩欧美 国产精品| 69人妻影院| 尤物成人国产欧美一区二区三区| 全区人妻精品视频| av视频在线观看入口| 亚洲精华国产精华液的使用体验| 国产精品国产三级国产av玫瑰| 免费黄网站久久成人精品| 国产极品天堂在线| 国产亚洲精品久久久com| 女人久久www免费人成看片 | 日韩视频在线欧美| 色噜噜av男人的天堂激情| 久久久久性生活片| 国产精品综合久久久久久久免费| 性插视频无遮挡在线免费观看| av在线亚洲专区| 久久久久久国产a免费观看| 国产成人a区在线观看| 亚洲怡红院男人天堂| 久久人人爽人人片av| 两个人的视频大全免费| 一区二区三区乱码不卡18| www.av在线官网国产| 久久久久久大精品| 国产 一区 欧美 日韩| 日韩精品有码人妻一区| 免费看av在线观看网站| 亚洲精品乱码久久久久久按摩| 精品欧美国产一区二区三| 国产高清不卡午夜福利| 日日干狠狠操夜夜爽| 小蜜桃在线观看免费完整版高清| 亚洲国产欧美在线一区| 99久久成人亚洲精品观看| 少妇被粗大猛烈的视频| 一级黄片播放器| 日本免费一区二区三区高清不卡| 久久久色成人| 日本免费在线观看一区| 18禁在线无遮挡免费观看视频| 国产精品一区二区三区四区免费观看| 免费观看人在逋| a级一级毛片免费在线观看| 美女黄网站色视频| 成人亚洲精品av一区二区| av播播在线观看一区| 51国产日韩欧美| 国产免费福利视频在线观看| 天天躁日日操中文字幕| 色5月婷婷丁香| 日韩强制内射视频| 日韩视频在线欧美| 日韩三级伦理在线观看| 国产在线一区二区三区精 | 国产亚洲最大av| 国产免费又黄又爽又色| 高清日韩中文字幕在线| av线在线观看网站| 村上凉子中文字幕在线| 日韩 亚洲 欧美在线| 永久网站在线| 亚洲精品国产av成人精品| h日本视频在线播放| 午夜亚洲福利在线播放| 中文资源天堂在线| 成人漫画全彩无遮挡| 午夜免费男女啪啪视频观看| 久久99热这里只有精品18| 午夜精品国产一区二区电影 | 噜噜噜噜噜久久久久久91| 日韩欧美国产在线观看| 最新中文字幕久久久久| 午夜精品在线福利| 97超碰精品成人国产| 国产伦精品一区二区三区视频9| 国产淫片久久久久久久久| 亚洲成av人片在线播放无| 日本wwww免费看| 国产美女午夜福利| 国产毛片a区久久久久| 亚洲av福利一区| 女人被狂操c到高潮| 在线a可以看的网站| 亚州av有码| 国产视频内射| 99视频精品全部免费 在线| 久久久精品欧美日韩精品| videos熟女内射| 22中文网久久字幕| 美女内射精品一级片tv| kizo精华| 色综合亚洲欧美另类图片| 国产美女午夜福利| 黄色日韩在线| 欧美性猛交╳xxx乱大交人| 国产大屁股一区二区在线视频| 神马国产精品三级电影在线观看| 日本av手机在线免费观看| 真实男女啪啪啪动态图| 午夜福利在线在线| 国产在视频线精品| 久久精品国产亚洲av涩爱| 天堂√8在线中文| 色尼玛亚洲综合影院| 亚洲真实伦在线观看| 毛片女人毛片| 大香蕉久久网| 欧美性猛交╳xxx乱大交人| 国产日韩欧美在线精品| 少妇丰满av| 三级国产精品片| 成人毛片60女人毛片免费| 国产美女午夜福利| 蜜臀久久99精品久久宅男| 啦啦啦啦在线视频资源| 日本午夜av视频| 亚洲不卡免费看| 免费av毛片视频|