• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    2022-08-23 02:19:38SalaheddineKablyMounirAriouaandNabihAlaoui
    Computers Materials&Continua 2022年6期

    Salaheddine Kably,Mounir Arioua and Nabih Alaoui

    1Laboratory of Information and Communication Technologies,National School of Applied Abdelmalek Saadi University,Tanger,Morocco

    2Ecole Suprieure d’informatique et du Numrique,TICLab UniversitInternationale de Rabat Sala,El Jadida,Morocco

    Abstract:Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT).In concept,blockchain has a linear structure that grows with the number of transactions entered.This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments.Moreover,conventional consensus algorithms such as PoW,PoS are very computationally heavy.This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm.The Multi-Zone Direct Acyclic Graph(DAG)Blockchain(Multizone-DAG-Blockchain)framework is proposed for the fog-based IoT environment.In this context, fog computing technology is integrated with the IoT to offload IoT tasks to the fog nodes, thus preserving the energy consumption of the IoT devices.Both IoT and fog nodes are initially authenticated using a non-cloneable physical function-based validation mechanism(DPUF-VM)in which multiple authentication certificates are verified in the blockchain.Each transaction is stored in a hash function in the blockchain using the lightweight CubeHash algorithm and signed by the Four-Q- Curve algorithm.In the cloud, sensitive data is stored as ciphertext.Fog nodes provide data security to avoid the energy consumption and complexity of IoT nodes.The fog node first performs a redundancy analysis using the Jaccard Similarity(JS)measure and sensitivity analysis using the Neutrosophic Neural Intelligent Network (N2IN) algorithm.A lightweight proof-of-authentication (PoAh) algorithm is presented and executed by the optimal consensus node selected by the bi- objective spiral optimization(BoSo)algorithm for transaction validation.The proposed work is modeled in Network Simulator 3.26 (ns-3.26), and the performance is evaluated in terms of energy consumption,storage cost,response time,and throughput.

    Keywords: Multi zone DAG blockchain; dynamic PUF; lightweight PoAh consensus;BoSo node selection;four-q-curve encryption;IoT environment

    1 Introduction

    The Internet of Things (IoT) is an emerging technology with wide-ranging applications [1],including the Smart City[2],Smart healthcare[3],and more.However,security is a significant issue in the IoT environment.In IoT,a large amount of heterogeneous data is generated every second and stored in a remote server for other purposes [4,5].As the data is accessed remotely, security is the critical challenge.Security is by cryptographic functions,multi-factor authentication,key distribution,and moreover[6,7].Recently,blockchain technology is the optimal solution to IoT security challenges[8].The blockchain is the distributed ledger that validates every transaction performed by IoT nodes in a decentralized and secure manner.The validation uses a consensus algorithm.This decentralized nature of the blockchain plays a vital role in ensuring high-level security [9].Although blockchain proves its effectiveness in security,it still has some computational complexity challenges[10].The main challenges in using blockchain for IoT are the complexity of the traditional consensus algorithms.Firstly,the nodes running the consensus algorithm have higher resource consumption.Secondly,the involvement of redundant data in the IoT network increases the size of the blockchain exponentially.Finally,the conventional linear structure of the blockchain is not suitable for the IoT environment is not scalable[11].

    In order to address these challenges,lightweight blockchain structures are being studied in recent times [8].Although the blockchain infrastructure reduces complexity, the consensus algorithm used in the blockchain is also crucial in deciding the complexity of the blockchain technology [12].The conventional proof-of-work(PoW)consensus algorithm consumes more complexity than others[13].Moreover,the consensus algorithm running by the consensus node,which is also an IoT node.Since IoT nodes are resource-constrained, they do not have enough resources to execute the complex consensus algorithms.Therefore, the consensus algorithm and the selection of the consensus node also play a critical role.

    On the other hand,fog computing is an emerging technology that brings network services closer to the edge[14].It provides better resources to resource-constrained IoT nodes and also minimizes the response time for requested services.IoT-Fog integration brings efficiency to the IoT environment in scalability,energy efficiency,and response time[15].Besides,authentication of IoT nodes[16]ensures that data is not accessible to any unauthorized nodes[17].In general,identification,password,MAC address,and IP address are mainly used to validate IoT nodes[18].However,these credentials can be easily hacked by attackers.On the other hand, the physically tilting function PUF is the hardwarebased security credential embedded in every IoT device [19].Therefore, PUF-based authentication becomes a promising research direction.Although authentication prevents unwanted access, data still needs to be protected from attackers [20].For data security, cryptographic techniques play a central role.In general,encryption algorithms are widely used to ensure data security in the IoT[5].Due to this complexity, these algorithms are not suitable for the IoT environment because devices have limited resources.Due to this nature, highly complex algorithms are not suitable for the IoT environment.Therefore,lightweight encryption algorithms become an essential solution for securing the IoT [21].However, the following research questions are still unsolved in IoT and need to be addressed:How to authenticate IoT nodes with lightweight and dynamic credentials?How to secure transactions performed by IoT nodes with cryptographic functions? How to make the blockchain as lightweight as possible for the IoT environment to be efficient? In this paper, we answer these research questions through optimal blockchain integration.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.1 Research Aim and Motivation

    This research aims to reduce the heavy computational needs and constraints of the IoT-blockchain technology.This research topic focuses on lightweight blockchain infrastructure,lightweight consensus,and lightweight security protocols for these purposes—the developed secure IoT environment in terms of initial authentication and sensitive data security.

    This research topic mainly focuses on the existing problems in IoT ecosystems.The current blockchain technology is not suitable for the resource-constrained IoT environment.Although some applied lightweight blockchain-based methods on IoT, there is still high complexity.Indeed, most lightweight blockchain solutions focus on lightweight consensus algorithms.However, the structure of blockchain also increases complexity because the IoT environment is broad-spectrum.Besides,the involvement of redundant data from IoT nodes rapidly increases the bulk of the blockchain.Even in lightweight consensus algorithms, the consensus nodes are selected randomly or in the round,inefficient.Furthermore,the algorithms used with the lightweight blockchain are also the main culprits of heavy computation in the blockchain environment.

    1.2 Major Contributions

    The principal contribution of this topic is the design of new Multi-DAG technology for the IoT environment.The essential contributions of this work are as follows;Firstly,a lightweight authentication performed by the dynamic validation mechanism of PUF with the support of blockchain.In this process,a random identifier is dynamically generated and approved at any moment to guarantee its validity.Secondly, the encrypted data stored is validated in the blockchain by consensus.We propose a lightweight proof of authentication(PoAh)consensus.Moreover,we minimize the consensus complexity by selecting the optimal node through the Bi-Objective Spiral Optimization (BoSo)algorithm.Thirdly,we propose a secure IoT environment based on the multi-zone DAG blockchain(Multizone-DAG-Blockchain) that reduces complexity and energy consumption.Three significant aspects are enhanced.Firstly,lightweight authentication,secondly,lightweight data encryption,and thirdly lightweight consensus algorithm design.Fourthly,all transactions are handled in a new Multi-Zone DAG Blockchain infrastructure(Multizone-DAG-Blockchain)that is lightweight and scalable.Bulk is further decreased by using the CubeHash hash algorithm and the Four-Q Curve-based signature algorithm in the blockchain.Finally, For the incoming IoT data, the fog node performs a Jaccard similarity-based redundancy analysis,including a neutral neural intelligent network(N2IN)sensitivity analysis.Then,for all sensitive data,the fog node applies lightweight encryption based on the four-quarter curve.

    2 Related Works

    Multi-level blockchain system (MBS) [22] for the IoT environment, the main advantages were the blockchain’s speed and flexibility.For this purpose,the blockchain implementation is in multiple levels,the micro-level(IoT level),the gateway level blockchain(cluster heads of the IoT network),and the macro-level blockchain(platform level).The data generated by the IoT devices were collected and stored in the massively distributed ledger to improve the security level.The deployment is complex and is not suitable for the resource-constrained IoT environment.

    Lightweight consensus algorithm, known as proof of block and transaction (PoBT) [23], The proposed consensus algorithm minimizes IoT nodes’time waste and memory.The PoBT consensus algorithm is integrated into the Hyperledger fabric framework.However,the consensus algorithm is still executed by a random IoT node,which increases the complexity[11].

    Distributed blockchain is employed to authenticate IoT devices [24].For this purpose, a crossdomain authentication scheme (xDBAuth) [25], aims to contribute as a trusted third-party signer.For validation, proof of authenticity and integrity (PoAI) enable access to IoT nodes.However,authentication by considering only the IoT identity is insecure and unreliable.Although PoAI is a lightweight consensus executed by resource-constrained devices, which increases the complexity.Though, A blockchain-based distributed security mechanism has been proposed [17].The security architecture was composed based on software-defined networking (SDN), blockchain, and fog computing.SDN is used to monitor network streams,while blockchain aims to strengthen network security.Besides,fog computing reduces the latency of the IoT network.The consensus algorithm is executed by the IoT nodes,which consume enormous resources.

    Multiple wireless sensor networks composes an IoT environment.To avoid the single point of failure, this work [26] proposes a Blockchain-based identity authentication mechanism.The blockchain network provides different identities for these nodes and validates the authentication.This work uses PoW for validation,which is not practical for resource constrained IoT nodes.

    This paper [16] proposes a blockchain-based security scheme for secure data transmission [27].This work mainly focuses on the blockchain’s overhead reduction to make it suitable for the resourceconstrained IoT environment.for this purpose, it uses a symmetric key encryption algorithm to validate and grant permission to IoT nodes; and a numeric signature in the ring structure.The conventional blockchain is computationally heavy and involves a large number of calculations[8].

    In Tab.1, the main research limitations as identified.Firstly, the blockchain’s linear growth decreases its scalability; Secondly, computationally intensive consensus algorithms are not suitable for the resource-constrained IoT environment,and last but not least,the level of security is low due to the involvement of inefficient credentials.

    Table 1: Related works summary

    3 Problem Definition

    A proposed distributed authentication device in a Fog- IoT environment based on distributed blockchain technology[26].The significant issues with the above approach are many;firstly,the access of non-authorized users is minimized,the proposed approach is furthermore complex due to ECDSA and SHA-1,as these two algorithms are very high computational complexity.Secondly,authentication is based on unprotected parameters such as system ID and public address,which are easily falsifiable.Moreover,the public address is published to all nodes through a public network,which increases the public address’s vulnerability.Thirdly,The PoW(proof of work)consensus algorithm is used in this work, which is more complex and increases resource consumption.In PoW, all participating nodes must validate transactions and broadcast the evidence.If one node has a higher load or lower resources,then that node will have a higher resource consumption.A lightweight blockchain uses a lightweight consensus algorithm, the so-called synergistic multiple proofs [12].Here, the proposed blockchain structure is not scalable,even though it uses a blockchain filter.Since the IoT network is always largescale and generates millions of data, using the conventional blockchain structure is not suitable.In the IoT environment,data redundancy is the principal problem that leads to blockchain’s unlimited growth.This work also stores the redundant data in the blockchain,which increases its size.Here,the consensus algorithm is executed by the IoT nodes,which are limited in resources.The IoT nodes do not have enough resources to validate every transaction in the network.Thus,the IoT nodes’surcharging is at a high level.An Efficient Lightweight Integrated Blockchain(ELIB)design has been proposed[29]; the lightweight consensus algorithm works by limiting the number of blocks generated in the blockchain.However, defining the arbitrary nature of blocks is a heavy process that increases time consumption.This waiting time is applied to all transactions in the network.In principle, the IoT network involves millions of transactions which increases the overall time consumption.In the IoT network, data redundancy is the main problem; with a massive amount of redundant data, the blockchain’s size increases.Furthermore, all the IoT nodes also increase the space complexity as the blockchain copy has to be kept in each node.A fog-based blockchain and network Architecture(BFAN)has been proposed[14].Although,PoW consensus provides security to validate transactions through complex and heavy computation.Although the deployment of fog nodes are deployed, the IoT nodes execute the consensus algorithm,which is inefficient.IoT nodes are resource-constrained and do not have enough resources to run PoW in the network.The use of SHA-2 and ECDSA further increases the complexity,with even a lower level of security.Data encryption is enabled for all data.This increases the size of the data,and the complexity of the network is also high.These mentioned research problems are still not solved in the IoT environment.Our work focuses on these problems.

    4 Proposed Framework

    The proposed IoT network as shown in Fig.1 is built in three tiers: the IoT perception tier,the blockchain and fog tier, and the cloud tier.The first tier includesna number of IoT sensors(S1,S2,S3...Sn).These sensors are supposed to perform specific tasks and do not contribute to blockchain validations,so-called passive block nodes(PBNs).

    The first layer includes a blockchain gateway (BGW) as well.The PBNs or IoT devices are responsible for creating data and initiating transactions.The second tier consists of amnumber(F1,F2,F3...Fm).of fog nodes (FNs) known as active block nodes (ABNs).The ABNs or FNs are responsible for validating transactions in the blockchain.This system’s main objective is to decrease the energy consumption and complexity of PBNs by transferring the validation process to ABNs as shown in Fig.1.

    Figure 1:Proposed tri-level multizone-DAG-blockchain architecture

    The proposal provides efficiency through the following processes:

    · Lightweight DPU-VM based authentication

    · Lightweight data encryption

    · Lightweight consensus algorithm

    4.1 Light Weight DPU-VM Based Authentication

    IoT nodes and fog nodes are authenticated using a Dynamic Physically Unclonable Functions based Validation Mechanism (DPUF-VM) with the blockchain’s assist.We proposed a dynamic approach in which a random identifier (RID) is dynamically generated for each IoT node.All IoT devices and fog nodes initially register their identity with the blockchain network,in which the identity is stored as a hash function.A novel idea of DPUF-VM is to change theRIDdynamically based on the device ID and the previously detected value by the concerned sensor.The process of DPUF-VM is explained in the following steps:

    The first step is device registration.In this step,the devices register the identification information to the blockchain through BGW.For the sensor indexi,the identification pieces of information are sensor ID SID(i), MAC address SMAC(i), PUF(SC-R(i)), and the sensor’s last detected valueρi.The random ID’s generated as follow:

    This random ID’s(RID)changed at each time based on the current sensed value.

    The second step is device registration.The credentials are stored in the blockchain as hash values at this step.Furthermore,the CubeHash algorithm is proposed for hash generation.The operation of CubeHash involves five major parameters listed in Tab.2.

    Table 2: CubeHash algorithm parameters

    The output is given for an hs-bit string as follow:

    Our hashed properties can beRID,SID,SMACorSC-R

    CubeHash generation algorithm Init Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by seven bits or 0 ≤RIni ≤15 Swap xi and xi⊕8 for RIni?[1,2,3,4,5,6,7]XOR xi⊕16 and xi for 0 ≤RIni ≤15 Swap xi and xi⊕2 for i?[16,7,20,21,24,25,28,29]Add xi into xi⊕16 for 0 ≤RIni ≤15 Rotate xi on left by eleven bits Swap xi and xi⊕8 for RIni?[0,1,2,3,8,9,10,11]XOR xi⊕16 and xi Swap xi and xi⊕1 for i?[16,18,20,22,24,26,28,30]End

    The third step is device authentication.The Sitriggers authentication with the sending of an authentication request to the BGW.Then the BGW requests a random certificate with a digital signature.The RCERis generated based on the RIDand SMACas follows,

    Likewise,The digital signature generation for PUF is given as follows,

    For PUF Signing purpose,we based on FourQ-Curve signing algorithm,designated as follow,

    where p is a prime number,and is a non-square inFp2.This curve,dubbed“FourQ”.p is defined to generate digital signature.First,the hash is generated for PUF by using CubeHash algorithm.In the order ofl,the random selectediis from[1,l-1],the curve point computed as follow,

    where G is the generator known in advance,to calculate the r from the curve point,the computation is as follow,

    The pair(r,s)is the digital signature,while SK is the private key of the concerned device responsible for submitting the authentication credentials as(RCER,Sign(RC-R))

    The fourth step is device validation.Upon reception of the authentication information, BGW validates it through a signature verification procedure.

    If the credentials are identical to those in the blockchain,the device is authenticated.Otherwise,the request is denied.The DPUF-VM process is described in Fig.2.

    Figure 2:Proposed DPUF-VM authentication

    In the same way as IoT nodes,fog nodes are likewise authenticated by BGW in order to guarantee a high level of security.

    4.2 Lightweight Data Encryption

    After successfully authenticating the IoT, the data is transmitted from the IoT nodes to the fog nodes.The fog nodes apply a lightweight encryption mechanism depending on the sensitivity level of the received data.The fog nodes perform two primary operations, initially eliminating redundancy and then encrypting the data.The fog node performs redundancy elimination by JS calculation for the received data(SD1,SD2,...,SDu).The calculation is performed as follows,

    If the output of the algorithmJSbetween two data is small,then the input is redundant,and one of the inputs is removed from the data set.The leading factor in the growing size of the blockchain is the storage of redundant values in the blockchain.For this purpose,the fog node starts by eliminating all redundant data from the collected data.Also,the data encryption increases the input size,which leads to an increase in the size of the blockchain.To deal with this issue,we would only apply encryption to sensitive data.For sensitivity analysis,the fog node uses the N2IN algorithm.The N2IN algorithm is associated with an artificial neural network(ANN)and a Neutrosophic Intelligence algorithm.The sensitivity is determined based on the detected readingρ,the sensor type(ST),and the sensor location(SL)for the received data.The neutrosophic set is like a fuzzy set,however it performs better than fuzzy sets[15]—the collected data initialized in the input layer of N2IN.In the hidden layers,the weight value of each data is calculated by the neutrosophic intelligence.

    In the hidden layer,the membership function is initialized as truth setTi,indeterminate setIi,and false setFi.The objective function of N2IN is the following representation:

    Here,σ1,σ2,σ3are the weight vectors,andφjis estimated based on the indexes ofTij.All three membership functions are given as follows:

    The algorithm logic of N2IN If ρ is abnormal&&ST is sensitive&&SL is sensitive.Then SDi is sensitive Apply Encryption Send SDi-encrypted to the cloud level Else,SDi is non-sensitive Send SDi To the cloud level End If

    This weight value calculation is performed on the hidden layers,and the weight value of each data is adjusted.Based on the above approach,the N2IN performs a sensitivity analysis.All sensitive data is encrypted using the four-Q-curve.For all sensitivesSDi,the fog node applies encryption.Then,the encrypted data(Encrypted[SDi])is stored as a new transaction in the blockchain.

    4.3 Lightweight Consensus Algorithm

    The consensus algorithm is the primary mechanism for the validation of all transactions processed through the blockchain.The existing consensus algorithm has high complexity and computational overhead that needs an adjustment.In the same way, the existing traditional linear structure of the blockchain presents many problems in terms of scalability and complexity.Therefore, we propose a new Multizone-DAG-Blockchain structure.In the proposed structure, the IoT perception layer is segmented into multiple zones,and the transactions in each zone are managed in the corresponding zone.The model of Multizone-DAG-Blockchain is shown in Fig.3.

    Figure 3:Multizone DAG blockchain design

    In a fundamental sense, the DAG blockchain promotes scalability and minimizes complexity compared to the regular blockchain [4].As each transaction is added in the form of new blocks in the regular blockchain, the blockchain grows exponentially.This sum mentioned phenomenon is addressed in the DAG-based blockchain,in which the graphGis composed over transactions.In the proposed Multizone-DAG-Blockchain model, a numbervof direct acyclic graphs are constructed asG1,G2,...,GvforGvnumber of zones.That is, we obtain multiple DAGs with corresponding transactions for multiple zones.The graphithis defined asG= {Sj,E,W}withSj∈Zi.

    Sjis the set of IoT sensors located in zonei(Zi),Eis the set of edges betweenSj,and W is the weight function presented asE?(Sj×Sj)andW?(Sj×Sj )→R.TheGis entirely undirected so that there are no cycles in the graph.In the Multizone-DAG-Blockchain,the transactions are the vertexes(V),and the blocks have all transactions.The root block of the Multizone-DAG-Blockchain is the genesis block, and theGjis a finite graph of {V,E}.The arrival of each transaction at each timetfollows Poisson operation at the arrival rate ofλ.This property is applicable for each DAG in the Multizone-DAG-Blockchain.With the increase int, theGgrows exponentially still lower than the linear blockchain.The main differences between conventional blockchain and the proposed Multizone-DAG-Blockchain are given in Tab.3.

    Table 3: Linear&multizone-DAG-blockchain comparison

    In our proposed design,a proposed PoAh consensus algorithm is applied to validate the transactions.The IoT nodes create the data in the form of transactions asT1,T2,T3...Tnin a period.These transactions are bundled into a block, and respectively block is updated with each new transaction.Before this happens,the consensus node validates the transaction to update the block.Here,the trusted nodes are considered the consensus nodes.As explained earlier,we apply the Four-Q-Curve algorithm to perform the cryptographic functions.First, the IoT generates data and signs it before spreading it on the network.Then, a node is selected from the trusted network to be part of the PoAh.If the node’s trust value is greater than the threshold value,the block is assigned as part of the chain after authenticating the block.

    Algorithm PoAH based validation with DPUF-VM Auth Init Block(T1...Tn)→Blocks Sign(Block)→Broadcast Auth[DPUF-VM]If Auth==True&&Verify Sign(Block)==True Block‖PoAh →Broadcast Hash(Block)→add to Blocks End If End

    PoAh is performed entirely by the consortium node selected from the ABNs.This PoAh implementation is energy-consuming due to a large number of calculations.Thus,the IoT nodes are unable to perform PoAh.We perform a process of selecting the optimal consensus node(OCN)For this purpose,we propose the BoSo algorithm[30].In the BoSo algorithm,two objective functions are designed to select theOCNamong the ABNs.The spiral optimization algorithm is a heuristic algorithm that solves complex problems[30].The spiral optimization algorithm determines the optimal solution by searching for the solution over multiple spiral models,which overcomes the optimum local problem.In BoSo,the search points are defined on the spiral path as follows,

    y(t),is the initial position of search points n at t iteration,andy*is the best position learned,andR(θ)is the composite random matrix.The rotation angleθand the random number r.The BoSo process performs according to the steps described further below:

    · BoSo initializes the number of search points which isn≥2,r,θ,scaling factor(SF),objective functionF(g),and maximum iteration

    · The initial position of the search point is defined randomly.Furthermore, For every search point, the relevance is calculated for each ABNs, for Thejth ABN, TheF(gj)is calculated based on two objectives:trust valueTj,and load statusLj.The trust value defines the number of transactions adequately validated by the ABN, and the load status defines the number of tasks running by the ABN.TheF(gj)is formulated as following,

    · Based on the output of relevance function valueF(gj), the search point is selected properly.Based on the most suitable solution,the search position is updated as follows,

    ·y*1andy*2Zare respectively the first and second center points,?is the probability index which lies between[0,1].

    · All the search points are evaluated based on the relevance function, and the new position is updated as follows,

    In the end, all the other search points update the position to the optimal position.Thus, the optimal ABN is selected asOCN,which ensures the consensus algorithm.Since the ABNs execute the consensus algorithm,the load and complexity on the IoT nodes are significantly reduced.

    The generic processing flow of the proposed approach as illustrated in Fig.4.The proposed work achieves scalability and efficiency through lightweight authentication, lightweight encryption, and lightweight consensus algorithm in its design.

    Figure 4:Multizone-DAG-blockchain flow design

    5 Performance Evaluation

    This section aims to evaluate the performance of the proposed Multizone DAG Blockchain through a comparative analysis.We are examining the results in an environment as close to reality as possible.We will highlight the significant areas of benchmarking in the IoT environment,such as energy consumption,response time,and moreover.

    5.1 Simulation Environment

    Our proposed Multizone DAG Blockchain simulated in Network Simulator NS-3.In particular,it provides proper support for IoT protocols and operations.Therefore,we chose ns-3 as the simulation tool as shown in Tab.4.

    Table 4: Parameters list used for the simulation purpose

    Table 4:Continued

    The field of application of our proposed system is enormous according to our need for IoT in daily life;as shown in Tab.5,we distinguish among applications industrial,smart cities,smart home,transport,and many others.In all these applications,the IoTs are mainly environmental sensors.we will continue our simulation analysis by considering as an example of sensors that we use in the daily life.

    Table 5: Sensor deployed for simulation purpose

    Thus, we can notice that all sensors detect sensitive data related to a different private area.The motion detector is considered a sensitive device since it is usually used as a virtual guardian that monitors the entire environment.All other sensors are classified according to the geographical context.Therefore,a temperature sensor set up next to the kitchen is more sensitive than the other devices.All of these IoT nodes are validated with each data transmission.In this way,data encryption is applied for all sensitive data detected by the IoT nodes.Since the blockchain validates the transactions, the environment is more secure and confidential.

    5.2 Comparative Analysis

    The proposed work is evaluated in terms of key performance metrics such as energy consumption,storage cost,response time,and throughput.The main differences between the proposed work and the existing works are shown in Tab.6.

    Table 6: Comparative analysis summary

    The analysis shows that there are many research problems with the ELIB model theoretically,which can also be confirmed experimentally.

    5.2.1 Power Consumption Analysis

    Energy consumption is the quantity of energy consumed by the IoT nodes during data transmission.The energy consumed by the IoT nodes for sensing,transmitting,and receiving data.We analyzed the energy consumption as a function of the number of nodes and the number of transactions.In Fig.5,the comparison of energy consumption is analyzed to increase the value ofn.We notice that thenvalue has no impact on the proposed job since it has a reasonable energy consumption from 100 to 120 watts.At the same time,the ELIB mode increases the energy consumption with the increase ofnvalue.Indeed,the proposed work is scalable since even increasing the number of nodes does not affect energy consumption.In contrast,existing work is unable to perform well when the number of nodes is high.In our proposal,energy consumption is minimized since the computations are offloaded to the fog nodes while the ELIB model performs all calculations on the IoT nodes.Although fog nodes are used in BFAN,the computations are performed in the IoT nodes.

    Figure 5:Power consumption analysis based on number of nodes

    In Fig.6, the energy consumption is analyzed as a function of the number of transactions.The increase in the number of transactions raises the complexity of the consensus validation process, as each transaction involves the creation and validation of a block.

    Figure 6:Power consumption analysis based on number of nodes

    Thus, energy consumption is measured by the transaction cost.Therefore, the ELIB model has a power consumption of 650 to 1200 watts.The BFAN model has a power consumption of 1300 watts for 100 transactions.For the exact same number of transactions,the proposed job has a power consumption of 140 watts.The primary reason for this enormous improvement is the fact that the consensus algorithm is executed by an optimal ABN (fog node) selected by the BoSo algorithm in the proposed work.In addition,a lightweight PoAh is used which performs better than PoW.Thus,the power consumption is minimized up to 1000 watts in the proposed work.

    5.2.2 Storage Efficiency Analysis

    Storage cost is determined by the storage required for the IoT data generated by the IoT nodes.This metric is compared in terms of the number of nodes and the number of transactions.

    In Fig.7, the storage cost is analysed as a function of the number of IoT nodes.When nodes number increased, then the storage cost raises.This analysis shows that increasing the number of nodes increases the block size and storage cost.The proposed work increases the storage efficiency,and It’s four times higher than the existing BFAN & ELIB works.The main drawback is that these works increase the blockchain’s size, which results in a higher storage cost.As a result, the linear blockchain model also increases the storage cost, which is not suitable for the resource-constrained IoT environment.

    Figure 7:Storage cost analysis per number of IoT nodes

    In Fig.8, the storage cost is analysed based on the number of transactions.Even for 100 transactions, the storage cost is only 30 MB.However, for 100 transactions, the ELIB model has a storage cost of 124 MB, and the BFAN model has a storage cost of 135 MB.As the number of transactions increases,the size and length of the blockchain increase linearly.

    Figure 8:Storage cost analysis per number of IoT nodes

    This increase results in a higher storage cost.In ELIB and BFAN mode, data from IoT nodes is collected and stored in cloud servers without any redundancy control.They are keeping repeated data results in a higher storage cost.However, the proposed work analyses the redundancy by JS among the data collected from IoT nodes and eliminates the redundant data.Furthermore,we apply data encryption only for sensitive data identified by the N2IN algorithm.Overall, the proposed work minimizes the storage cost with the Multizone-DAG-Blockchain framework and fog computing involvement.

    5.2.3 Response Time Analysis

    Response time is the time it takes the system to respond to requests.In this case,it is determined according to the time needed for the blockchain to validate the transaction and create the block for new input data.In Fig.9,the response time is examined as a function of the number of transactions.

    The analysis proves that the proposed Multizone-DAG-Blockchain has a slower response time than the ELIB model and the BFAN method.It is shown that the increase in the number of transactions exponentially increases the response time in both existing works since,with a high number of transactions, the blockchain becomes massive and fails to respond to new transactions.Even for some 100 transactions, the response time of Multizone-DAG-Blockchain is 12 ms, while the ELIB models are 45 ms and BFAN is 75 ms.Due to this long response time, new transactions fail to be validated and added as new blocks.In this context,the IoT environment provides a massive amount of data every millisecond,which cannot be validated with both existing works.

    Figure 9:Response time analysis per number of IoT nodes

    5.2.4 Throughput Analysis

    The throughput of the system is the number of transactions processed and stored in the blockchain during the specified period.

    In Fig.10,the throughput is evaluated by analyzing the number of transactions.With an increase in the number of transactions,the throughput increases in parallel.In particular,the proposed Multi-Zones-DAG-Blockchain has a throughput of 135 kbps with 100 transactions.This is relatively higher than the ELIB model and the BFAN method.The ELIB model has a throughput of 95 kbps and BFAN has 85 kbps for 100 transactions.In both existing works,the blockchain structure is increased linearly for new transactions.On the other hand, the proposed work distributes the blockchain structure.Consequently,the proposed work achieves better throughput than the existing ELIB model and BFAN method.

    Figure 10:Response time analysis per number of IoT nodes

    5.2.5 Results Analysis

    Tab.7 summarizes the average numerical results obtained for the proposed work and the existing works.The analysis shows that the proposed work achieves better performance in each performance metric.

    This study shows that the proposed work is well adapted to the IoT network.This is mainly by minimizing energy consumption even with many nodes and transactions, which is vital for the IoT network.The main aspects of the research work are summed up as follows,

    · The complexity and overhead are reduced in all aspects,including lightweight authentication,encryption,hash generation,and consensus algorithm.

    · For the authentication, a random identifier is dynamically generated every time, and the unique MAC address is taken into account with physically tilted functions(PUF)to make the authentication as strong.

    Table 7: Results summary

    · Resource-constrained IoT nodes are considered passive nodes, and fog nodes are used to validate transactions.

    · A lightweight consensus algorithm is presented with an optimal consensus node selection procedure.

    Altogether,the proposed work minimizes the energy consumption of IoT nodes.As the proposed work is improved in the above aspects,this work achieves better efficiency.

    6 Conclusion

    In this work,we propose a new framework,Multizone DAG blockchain,adapted to the resource constraints of the IoT environment.The proposed scheme ensures high-level security through lightweight computation.For starters, a lightweight authentication mechanism (DPUF-VM) is proposed to authenticate the legitimacy of every IoT node and fog node.The collected information from fog nodes is further analyzed for redundancy and sensitivity.For redundant data removal,the JS measure is presented, and the N2IN algorithm for sensitivity analysis is also proposed.Each transaction is validated in the Multizone-DAG-Blockchain using the PoAh lightweight consensus algorithm.In Multizone-DAG-Blockchain,the CubeHash lightweight hash algorithm is used,and the Four-Q-Curve algorithm performs the digital signature.The optimal fog node is selected by the BoSo algorithm and respected as the consensus node.The extensive evaluation in ns-3.26 shows promising results in energy consumption,storage cost,response time,and throughput.In the future,we plan to extend Multizone-DAG-Blockchain for real-world use with a lightweight intrusion detection system(IDS)to analyze security threats in detail.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美色视频一区免费| 女性被躁到高潮视频| 欧美亚洲日本最大视频资源| 午夜视频精品福利| 黄网站色视频无遮挡免费观看| 午夜影院日韩av| 亚洲熟妇熟女久久| 国产色视频综合| 亚洲国产中文字幕在线视频| 久久精品亚洲精品国产色婷小说| av中文乱码字幕在线| 精品人妻熟女毛片av久久网站| 母亲3免费完整高清在线观看| 国产亚洲欧美98| 看免费av毛片| 身体一侧抽搐| 久久久久精品人妻al黑| 亚洲五月天丁香| 欧美一级毛片孕妇| 国产精品国产高清国产av | 最新在线观看一区二区三区| 亚洲国产欧美网| 身体一侧抽搐| 19禁男女啪啪无遮挡网站| 18禁裸乳无遮挡免费网站照片 | 老司机靠b影院| 亚洲精品一二三| 天天操日日干夜夜撸| 免费在线观看亚洲国产| 一级毛片精品| www.自偷自拍.com| 天天添夜夜摸| 最新在线观看一区二区三区| 99国产精品一区二区三区| 18禁观看日本| 91成年电影在线观看| 一边摸一边抽搐一进一小说 | 丁香六月欧美| 久久久久久久久久久久大奶| 1024视频免费在线观看| 精品欧美一区二区三区在线| 亚洲午夜精品一区,二区,三区| 日韩成人在线观看一区二区三区| 亚洲精品中文字幕一二三四区| 免费不卡黄色视频| 高清欧美精品videossex| 久久精品国产a三级三级三级| 欧美激情极品国产一区二区三区| 国产成人av教育| 久久青草综合色| 精品国产超薄肉色丝袜足j| 热99久久久久精品小说推荐| 国产精品偷伦视频观看了| 伦理电影免费视频| 悠悠久久av| 99re6热这里在线精品视频| 18在线观看网站| 免费av中文字幕在线| 欧美日韩精品网址| 91麻豆精品激情在线观看国产 | 制服诱惑二区| 黑人欧美特级aaaaaa片| 三上悠亚av全集在线观看| 亚洲精品美女久久av网站| 青草久久国产| 脱女人内裤的视频| 久久婷婷成人综合色麻豆| 99精品欧美一区二区三区四区| 高清毛片免费观看视频网站 | 看免费av毛片| 国产在线一区二区三区精| 亚洲中文av在线| 一级作爱视频免费观看| 99国产精品99久久久久| 日本五十路高清| 亚洲av电影在线进入| 美女 人体艺术 gogo| 丁香六月欧美| 在线视频色国产色| 国产精品 国内视频| 黑人猛操日本美女一级片| 国产精品99久久99久久久不卡| 久久精品熟女亚洲av麻豆精品| 欧美日韩乱码在线| 欧洲精品卡2卡3卡4卡5卡区| 丰满饥渴人妻一区二区三| 精品乱码久久久久久99久播| 亚洲一卡2卡3卡4卡5卡精品中文| 免费观看精品视频网站| 国产精品影院久久| 性色av乱码一区二区三区2| 大码成人一级视频| 欧美成人午夜精品| 女人久久www免费人成看片| 人人妻人人澡人人看| 在线观看免费高清a一片| 91字幕亚洲| 成人亚洲精品一区在线观看| 精品久久蜜臀av无| 亚洲成人免费电影在线观看| 国产亚洲欧美在线一区二区| 亚洲第一欧美日韩一区二区三区| 在线观看免费视频日本深夜| 精品人妻熟女毛片av久久网站| 一区在线观看完整版| 99精品在免费线老司机午夜| 亚洲精品在线观看二区| 大型av网站在线播放| 午夜成年电影在线免费观看| 黄色 视频免费看| 亚洲精品国产精品久久久不卡| 免费在线观看黄色视频的| 中文字幕av电影在线播放| 好男人电影高清在线观看| 精品久久久久久久毛片微露脸| av片东京热男人的天堂| 久久精品亚洲精品国产色婷小说| 亚洲视频免费观看视频| 日本一区二区免费在线视频| 热99国产精品久久久久久7| 日韩 欧美 亚洲 中文字幕| 国产精品久久久久久人妻精品电影| 高清av免费在线| 国产精品免费视频内射| 国产三级黄色录像| 一级片'在线观看视频| 亚洲专区字幕在线| 在线免费观看的www视频| 成年人黄色毛片网站| 一级毛片女人18水好多| 乱人伦中国视频| 欧美日韩乱码在线| xxx96com| tube8黄色片| 亚洲黑人精品在线| 国产99久久九九免费精品| 国产精品综合久久久久久久免费 | 天天躁夜夜躁狠狠躁躁| 日韩视频一区二区在线观看| 久久久久国产一级毛片高清牌| 老熟妇乱子伦视频在线观看| 99国产精品免费福利视频| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美精品啪啪一区二区三区| 午夜免费观看网址| 亚洲精华国产精华精| √禁漫天堂资源中文www| 日本黄色视频三级网站网址 | 岛国在线观看网站| 久久久水蜜桃国产精品网| 操出白浆在线播放| 精品福利观看| 亚洲精品美女久久久久99蜜臀| 国产精品美女特级片免费视频播放器 | 亚洲国产精品一区二区三区在线| 免费观看精品视频网站| 国产不卡一卡二| 99riav亚洲国产免费| xxx96com| tube8黄色片| 色精品久久人妻99蜜桃| 午夜91福利影院| 精品视频人人做人人爽| 日韩有码中文字幕| 亚洲国产精品合色在线| 精品人妻在线不人妻| 久久中文字幕人妻熟女| 18禁裸乳无遮挡免费网站照片 | 精品少妇一区二区三区视频日本电影| 久久久国产精品麻豆| 久久久久视频综合| 动漫黄色视频在线观看| 日本a在线网址| 成人18禁高潮啪啪吃奶动态图| 欧美日韩亚洲高清精品| 黑丝袜美女国产一区| 婷婷丁香在线五月| 精品电影一区二区在线| 国产精品久久视频播放| av国产精品久久久久影院| 亚洲成人免费av在线播放| 啪啪无遮挡十八禁网站| 男男h啪啪无遮挡| 久久国产精品男人的天堂亚洲| 在线观看午夜福利视频| 国产在视频线精品| 91精品三级在线观看| 欧美丝袜亚洲另类 | 王馨瑶露胸无遮挡在线观看| 99re在线观看精品视频| 欧美色视频一区免费| 无限看片的www在线观看| 91麻豆精品激情在线观看国产 | 亚洲国产欧美网| 在线观看免费视频网站a站| 啪啪无遮挡十八禁网站| 日日爽夜夜爽网站| 少妇被粗大的猛进出69影院| 99热国产这里只有精品6| 欧美人与性动交α欧美软件| 深夜精品福利| 久久久久久亚洲精品国产蜜桃av| 97人妻天天添夜夜摸| 亚洲精品国产精品久久久不卡| 老司机午夜福利在线观看视频| 黄网站色视频无遮挡免费观看| 国产一区二区三区在线臀色熟女 | 激情在线观看视频在线高清 | 好看av亚洲va欧美ⅴa在| 久久久精品免费免费高清| 久久香蕉激情| 黄色成人免费大全| 91成年电影在线观看| 国产精品欧美亚洲77777| 国产欧美日韩一区二区三区在线| 日韩人妻精品一区2区三区| 亚洲精品av麻豆狂野| 久久狼人影院| 女人精品久久久久毛片| 日韩中文字幕欧美一区二区| 精品免费久久久久久久清纯 | 国产精品av久久久久免费| 男女高潮啪啪啪动态图| 村上凉子中文字幕在线| 中文字幕人妻熟女乱码| 亚洲欧美日韩另类电影网站| 欧美日韩乱码在线| 在线观看免费高清a一片| 国产高清激情床上av| 国产极品粉嫩免费观看在线| 亚洲三区欧美一区| 久久久久久久精品吃奶| 国产成人精品久久二区二区免费| 久久中文看片网| av片东京热男人的天堂| ponron亚洲| 欧美在线一区亚洲| 亚洲一区二区三区不卡视频| 黄色视频不卡| 国产片内射在线| 黑人巨大精品欧美一区二区蜜桃| 香蕉国产在线看| 免费在线观看视频国产中文字幕亚洲| 亚洲精品粉嫩美女一区| 国产人伦9x9x在线观看| 国产一区在线观看成人免费| 老司机午夜十八禁免费视频| 久久婷婷成人综合色麻豆| 99国产精品一区二区蜜桃av | 国产成人精品无人区| 黄色毛片三级朝国网站| 欧美黄色片欧美黄色片| 日韩欧美在线二视频 | 一级,二级,三级黄色视频| 国产亚洲精品第一综合不卡| 亚洲精品在线观看二区| av有码第一页| 夫妻午夜视频| 国产成人av激情在线播放| 免费日韩欧美在线观看| 涩涩av久久男人的天堂| 精品久久久久久久毛片微露脸| 午夜精品久久久久久毛片777| 人人妻人人添人人爽欧美一区卜| 国产精品影院久久| a级毛片在线看网站| 免费久久久久久久精品成人欧美视频| 淫妇啪啪啪对白视频| 波多野结衣一区麻豆| 成人精品一区二区免费| 日韩欧美国产一区二区入口| 久久人妻福利社区极品人妻图片| 国产男女内射视频| 亚洲国产欧美日韩在线播放| 18禁美女被吸乳视频| 50天的宝宝边吃奶边哭怎么回事| 极品少妇高潮喷水抽搐| 最新的欧美精品一区二区| 亚洲成人手机| 国产av一区二区精品久久| 人人妻人人澡人人看| 变态另类成人亚洲欧美熟女 | 又黄又粗又硬又大视频| 天堂动漫精品| 人妻久久中文字幕网| 久久久精品区二区三区| 日韩视频一区二区在线观看| 国产精品欧美亚洲77777| av网站免费在线观看视频| 校园春色视频在线观看| 午夜视频精品福利| 天天操日日干夜夜撸| 美女福利国产在线| 精品一区二区三卡| 久久精品91无色码中文字幕| 国产精品一区二区免费欧美| 老熟女久久久| 人人妻人人添人人爽欧美一区卜| 久久婷婷成人综合色麻豆| 女性生殖器流出的白浆| 欧美日韩成人在线一区二区| 女人被狂操c到高潮| 国内久久婷婷六月综合欲色啪| 午夜91福利影院| 国产亚洲精品久久久久久毛片 | 国产成人精品无人区| 久久久国产成人免费| 首页视频小说图片口味搜索| 国产精品永久免费网站| 国产精品一区二区免费欧美| 男男h啪啪无遮挡| 下体分泌物呈黄色| 欧美激情 高清一区二区三区| 国产亚洲欧美在线一区二区| 中文字幕人妻熟女乱码| 亚洲一区二区三区不卡视频| 午夜福利乱码中文字幕| 在线观看免费午夜福利视频| 国产aⅴ精品一区二区三区波| 搡老熟女国产l中国老女人| 国产又色又爽无遮挡免费看| 国产男女超爽视频在线观看| 99香蕉大伊视频| 丰满迷人的少妇在线观看| 国产精品久久久久成人av| 身体一侧抽搐| 国产免费av片在线观看野外av| 黄频高清免费视频| 三级毛片av免费| 国产99久久九九免费精品| 建设人人有责人人尽责人人享有的| 午夜福利欧美成人| 99精国产麻豆久久婷婷| 在线观看日韩欧美| 久久久久久久久免费视频了| 欧美日韩av久久| 免费少妇av软件| 91成年电影在线观看| 精品熟女少妇八av免费久了| 久久人人爽av亚洲精品天堂| 亚洲欧美精品综合一区二区三区| 一区福利在线观看| 99国产精品一区二区蜜桃av | 大型黄色视频在线免费观看| 欧美黄色片欧美黄色片| 最近最新免费中文字幕在线| 亚洲第一欧美日韩一区二区三区| 9191精品国产免费久久| 成人国产一区最新在线观看| 捣出白浆h1v1| 黄色片一级片一级黄色片| av免费在线观看网站| 国产精品一区二区在线观看99| 首页视频小说图片口味搜索| 少妇 在线观看| 99精国产麻豆久久婷婷| 免费观看精品视频网站| 国产xxxxx性猛交| 亚洲一卡2卡3卡4卡5卡精品中文| 手机成人av网站| 成人亚洲精品一区在线观看| 99久久综合精品五月天人人| 又紧又爽又黄一区二区| 国产成人精品在线电影| 国产高清国产精品国产三级| 日韩成人在线观看一区二区三区| 久久午夜亚洲精品久久| netflix在线观看网站| 啦啦啦免费观看视频1| 99riav亚洲国产免费| 亚洲欧洲精品一区二区精品久久久| 免费日韩欧美在线观看| 精品人妻在线不人妻| 极品教师在线免费播放| av超薄肉色丝袜交足视频| 可以免费在线观看a视频的电影网站| 精品高清国产在线一区| 纯流量卡能插随身wifi吗| 亚洲成人国产一区在线观看| 一级作爱视频免费观看| 亚洲中文日韩欧美视频| 久久久久久免费高清国产稀缺| tube8黄色片| 99热国产这里只有精品6| svipshipincom国产片| 女人爽到高潮嗷嗷叫在线视频| 一区二区日韩欧美中文字幕| 两性夫妻黄色片| 真人做人爱边吃奶动态| 国产精品国产av在线观看| 视频区图区小说| 自线自在国产av| x7x7x7水蜜桃| 91成人精品电影| 最新在线观看一区二区三区| 国产真人三级小视频在线观看| 99久久国产精品久久久| 在线观看免费视频日本深夜| 色综合婷婷激情| videos熟女内射| 亚洲精品自拍成人| 欧美最黄视频在线播放免费 | 成人永久免费在线观看视频| 亚洲成av片中文字幕在线观看| 亚洲第一欧美日韩一区二区三区| 少妇粗大呻吟视频| 亚洲一码二码三码区别大吗| 看片在线看免费视频| 久久精品国产亚洲av香蕉五月 | 亚洲精品在线观看二区| 亚洲五月婷婷丁香| 久久精品亚洲熟妇少妇任你| 天堂√8在线中文| 成人影院久久| 涩涩av久久男人的天堂| 女人精品久久久久毛片| 国产精品香港三级国产av潘金莲| 国产精品久久电影中文字幕 | 色综合欧美亚洲国产小说| 亚洲片人在线观看| 黄片播放在线免费| 美女高潮到喷水免费观看| 亚洲av成人一区二区三| 亚洲av熟女| 黄色成人免费大全| 欧美色视频一区免费| 亚洲 国产 在线| 99久久精品国产亚洲精品| 免费黄频网站在线观看国产| 亚洲avbb在线观看| 日韩欧美三级三区| 日日摸夜夜添夜夜添小说| 国产精品一区二区在线观看99| 国产在视频线精品| 最近最新免费中文字幕在线| 午夜福利影视在线免费观看| 久久人妻福利社区极品人妻图片| 欧美不卡视频在线免费观看 | 中文字幕最新亚洲高清| 精品人妻熟女毛片av久久网站| 91精品国产国语对白视频| 午夜福利在线免费观看网站| 757午夜福利合集在线观看| 欧美精品人与动牲交sv欧美| 超碰97精品在线观看| 亚洲人成电影免费在线| 午夜影院日韩av| 国产激情久久老熟女| 黄片小视频在线播放| 丁香六月欧美| 天堂中文最新版在线下载| av免费在线观看网站| 中文欧美无线码| 中文字幕制服av| 夜夜夜夜夜久久久久| 国产又色又爽无遮挡免费看| 久久人人爽av亚洲精品天堂| 老司机影院毛片| 搡老熟女国产l中国老女人| 亚洲aⅴ乱码一区二区在线播放 | 亚洲成av片中文字幕在线观看| 黄色毛片三级朝国网站| а√天堂www在线а√下载 | 国产精品秋霞免费鲁丝片| 国产亚洲精品第一综合不卡| 国产精品永久免费网站| 岛国毛片在线播放| 中文字幕精品免费在线观看视频| 久久精品成人免费网站| 国产欧美日韩一区二区三区在线| 久久草成人影院| 国产精品国产av在线观看| av国产精品久久久久影院| 亚洲九九香蕉| 变态另类成人亚洲欧美熟女 | 18在线观看网站| 一进一出抽搐gif免费好疼 | 国产精品乱码一区二三区的特点 | 精品免费久久久久久久清纯 | 精品一区二区三区四区五区乱码| 国产淫语在线视频| 人妻丰满熟妇av一区二区三区 | 久久青草综合色| 国内毛片毛片毛片毛片毛片| 变态另类成人亚洲欧美熟女 | 国产成人影院久久av| 悠悠久久av| 18禁裸乳无遮挡动漫免费视频| 国产蜜桃级精品一区二区三区 | 男女之事视频高清在线观看| 建设人人有责人人尽责人人享有的| 黄色片一级片一级黄色片| 精品一区二区三卡| 亚洲精品久久午夜乱码| 久久人妻熟女aⅴ| 一边摸一边做爽爽视频免费| 精品无人区乱码1区二区| 天天影视国产精品| 人人妻人人添人人爽欧美一区卜| 欧美激情高清一区二区三区| 亚洲五月色婷婷综合| 一进一出抽搐动态| av欧美777| 久久青草综合色| 国产伦人伦偷精品视频| 精品国产超薄肉色丝袜足j| 亚洲成a人片在线一区二区| 黄色女人牲交| 亚洲成人手机| 麻豆av在线久日| 久久人人97超碰香蕉20202| 大片电影免费在线观看免费| 日本黄色日本黄色录像| 欧美人与性动交α欧美软件| 国产精品偷伦视频观看了| 新久久久久国产一级毛片| 国产精品永久免费网站| 午夜福利免费观看在线| 变态另类成人亚洲欧美熟女 | 欧美精品一区二区免费开放| 国产日韩欧美亚洲二区| 成人18禁高潮啪啪吃奶动态图| 老司机影院毛片| 少妇 在线观看| 久久久精品国产亚洲av高清涩受| 国产av一区二区精品久久| 在线观看免费高清a一片| 亚洲aⅴ乱码一区二区在线播放 | 成人亚洲精品一区在线观看| av免费在线观看网站| 视频区图区小说| 国产主播在线观看一区二区| 在线观看免费高清a一片| 老鸭窝网址在线观看| 中文字幕制服av| 亚洲第一欧美日韩一区二区三区| 99re6热这里在线精品视频| 亚洲自偷自拍图片 自拍| 国产成人影院久久av| 在线观看www视频免费| 别揉我奶头~嗯~啊~动态视频| 乱人伦中国视频| 中文字幕最新亚洲高清| 国产有黄有色有爽视频| 热re99久久精品国产66热6| 亚洲成国产人片在线观看| 亚洲成av片中文字幕在线观看| av不卡在线播放| 免费观看a级毛片全部| 亚洲国产看品久久| 一级毛片精品| 一级,二级,三级黄色视频| 亚洲精品在线观看二区| 久久国产精品人妻蜜桃| 久久人妻福利社区极品人妻图片| 超碰97精品在线观看| 老司机福利观看| 捣出白浆h1v1| 777久久人妻少妇嫩草av网站| 美女 人体艺术 gogo| 午夜免费观看网址| 高清欧美精品videossex| 亚洲熟女精品中文字幕| 日韩精品免费视频一区二区三区| 成人精品一区二区免费| 最新的欧美精品一区二区| 久久国产乱子伦精品免费另类| 国产成人av激情在线播放| 亚洲av熟女| 自线自在国产av| 中文字幕最新亚洲高清| 狠狠婷婷综合久久久久久88av| 妹子高潮喷水视频| 大片电影免费在线观看免费| 成人免费观看视频高清| 久久香蕉精品热| 亚洲成国产人片在线观看| 99在线人妻在线中文字幕 | 日韩有码中文字幕| 另类亚洲欧美激情| 美女福利国产在线| 嫁个100分男人电影在线观看| 国产精品久久久av美女十八| 黄色丝袜av网址大全| 99国产精品免费福利视频| 国产成人精品久久二区二区免费| 久久人妻福利社区极品人妻图片| 国产亚洲精品一区二区www | 激情在线观看视频在线高清 | 欧美黑人精品巨大| 在线观看舔阴道视频| 欧美乱妇无乱码| 欧美在线黄色| 看黄色毛片网站| 一区二区三区精品91| 美女午夜性视频免费| 在线国产一区二区在线| 国产色视频综合| 一区福利在线观看| 搡老熟女国产l中国老女人| 一区在线观看完整版| 国产蜜桃级精品一区二区三区 | 久久精品亚洲av国产电影网| 亚洲国产看品久久| netflix在线观看网站| 国产av又大| 久热这里只有精品99| 黑人操中国人逼视频| tocl精华| 久久久精品免费免费高清| 亚洲专区字幕在线| 国产欧美日韩综合在线一区二区| 精品一品国产午夜福利视频| 91九色精品人成在线观看| 午夜精品久久久久久毛片777|