• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks

    2022-08-23 02:22:52VivekKumarSinhaDivyaAnandFahdAlharithiandAhmedAlmulihi
    Computers Materials&Continua 2022年6期

    Vivek Kumar Sinha,Divya Anand,,Fahd S.Alharithi and Ahmed H.Almulihi

    1Department of Computer Science and Engineering,Lovely Professional University,Phagwara,Punjab,144411,India

    2Department of Computer Science,College of Computers and Information Technology,Taif University,Taif,21944,Saudi Arabia

    Abstract: The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server.There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server.However,existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as manin-the-middle,brute-force attacks,and many others in social networks.In this article, the authors proposed an improved as well as safe 3PAKE protocol based on the hash function and the symmetric encryption for the social networks.The authors utilized a well-acknowledged AVISPA tool to provide security verification of the proposed 3PAKE technique, and findings show that our proposed protocol is safer in opposition to active as well as passive attacks namely the brute-force, man-in-the-middle, parallel attack, and many more.Furthermore, compared to other similar schemes, the proposed protocol is built with a reduced computing cost as our proposed protocol consumes less time in execution and offers high secrecy in the social networks with improved accuracy.As a result,this verified scheme is more efficient as well as feasible for implementation in the social networks in comparison to previous security protocols.Although multifarious authors carried out extensive research on 3PAKE protocols to offer safe communication,still there are vital opportunities to explore and implement novel improved protocols for higher safety in the social networks and mobile commerce environment in the future in opposition to diverse active as well as passive attacks.

    Keywords: AVISPA tool; 3PAKE protocol; hash function; symmetric encryption;social networks

    1 Introduction

    Due to fast advancement in information as well as diverse networking technologies, pragmatic client authentication plays a vital role to safeguard services and multifarious resources from being cracked via unauthorized clients [1–5].The 3PAKE (Three-Party Password-Based Authenticated Key Exchange) protocol permits two diverse clients over unsecured channels to have a talk for safe session codes and set up a safe channel through an authenticated server to secure their consequential communication [6–9].Each of the legal clients stockpiles their scrutinizer calculated from their real key in the database of the isolated trustworthy servers and every client just needs to recall only words of identification i.e.,an authentication key with a trustworthy server[10–12].There have already been identified multifarious benefits of the 3PAKE protocols earlier by numerous researchers in past from security perspectives,however,one of the key benefits of this protocol recognized by some researchers is that it offers an easy method for a huge number of client-to-client communication settings,in addition,every client does not demand to recall numerous keys for diverse clients who converse with each other[13–15].Furthermore,the 3PAKE protocol has a wide scope to implement in diverse electronics applications as well as in the social networks to safeguard the confidential information of the clients as demanded in the modern world [16–18].There are multifarious benefits of the 3PAKE protocols usages in numerous applications,in addition to this,3PAKE protocols provide mutual authentication as well as a safe information exchange e.g., authenticated trusted server helps in communications among buyers as well as sellers in e-commerce,etc.

    In this article, an inexpensive 3PAKE protocol is developed for social networks utilizing hash function and symmetric encryption jointly to increase performance by reducing protocol executing rounds yet maintaining the equivalent protection capabilities as previous methods without relying just on a secret key of the server.Our proposed 3PAKE protocol is inexpensive as well as more robust against diverse attacks such as replay assaults, cryptanalysis assaults as well as man-in-the-middle assaults.To aid in the creation of our enhanced 3PAKE protocol for authenticity as well as privacy validation,the AVISPA verification software was used.Our enhanced 3PAKE protocol is subjected to a quantitative effectiveness study.

    The origins of computing networks as well as the Internet may be found dated in the 1960s as well as early 1990s,correspondingly.Cellular phones began to link to the Internet through wireless channels in the 20thcentury,and WiFi connections,numerous websites including several mobile apps are now available on a variety of gadgets,including smart mobiles,global positioning systems(GPS)gadgets,and many more.Access control has been recognized as the fundamental data protection problem in social network infrastructure that comprises authentication as well as authorization.Cyber-security threats are the most serious obstacles which computing systems, as well as social networks, face,in addition, access control has been identified as a key secrecy threat in the social networks.The authentication process is recognized as a vital element that provides safety to an apparatus, system,or application from illegal access directly or indirectly.Nowadays,security and privacy are becoming a key challenge due to diverse assaults over a network during information exchange particularly in social networks environment around the world.

    However, earlier various researchers have been provided multifarious strategies to prevent various assaults such as man-in-the-middle assault, replay assault, and cryptanalysis assaults over the networks.But, existing protocols and strategies have certain limitations such as high computation complexity and more time-consuming that demands more attention towards novel cost-effective protocols that take minimal communication steps and search time.To commence with, just one element was utilized to validate participants in the network; although, such a method, especially in the scenario of credentials,may be readily hacked.Users often utilize similar credentials across many platforms,namely Gmail,Twitter,and Facebook.An unauthorized client may immediately hack any customer’s profile,as well as a hacker may employ well-known techniques like gusting as well as social engineering to get entry to diverse system’s resources and applications rather than the authorized client.To safeguard the customer’s profile against unwanted assaults, password authentication techniques based on the hash function and symmetric encryption must be utilized jointly to provide additional secrecy as demanded nowadays against diverse assaults.

    2 Related Work

    There has been done extensive research earlier on 3PAKE protocols to provide desired secrecy and confidentiality against diverse assaults.The following discussion would provide an overview of the limitation of existing protocols.

    Chang et al.in[19],described an effective 3PAKE protocol rooted on LHL-3PAKE suggested by the author’s Lee et al.This protocol does not need any public key as well as symmetric cryptosystems.This scheme has numerous limitations like in case of a missing session key,this would never disclose alternative session key as well as lack of mutual authentication among users and authenticated servers.Ruan et al.in[20],described another LR eCK secrecy prototypical for 3PAKE as well as suggested an improved LR 3PAKE scheme,after that presented formal secrecy evidence in the typical model.This approach is suitable and easy to implement in numerous applications and wireless networks,however,this protocol has certain restrictions namely high computation complexity,and offers secrecy only in conventional prototypical wherein no outflow assaults exist.Li et al in[21],analyzed Farash-Attari’s scheme and depicts how their scheme does not provide resistance against secure code disclosure assault if the secure data is kept on the authenticated server side.The authors eliminated existing threats of Farash-Attari’s scheme in this work, however, the suggested method provides secrecy only in the communication overhead scenario and in computation complexity environment.

    Farash et al.in [22], disclosed the drawbacks of the Lee et al.secrecy scheme suggested earlier and analyzed the need for further improved 3PAKE protocols for enhancement in a more pragmatic manner.The authors proposed a modest countermeasure that preserves computation as well as communication efficacy of existing protocol suggested earlier,however,this proposed scheme does not provide enough secrecy against multifarious assaults namely man-in-the-middle and several others in social networks scenario.Zhang et al.in [23], investigated verified-rooted 3PAKE scheme analyzed its design,wherein authenticated server keeps secure code verifier in comparison to plain secure code.However,the suggested approach does not offer required secrecy against directory assaults and manin-the-middle assaults in the model of the social network.Xie et al.in [24], suggested an enhanced 3PAKE scheme that is rooted in chaotic maps.This protocol offers certain advantages over existing secrecy schemes that are based on authenticated server public secrecy keys, however, the proposed protocol is less efficient and has more computation complexity in the social networks.

    Lin et al.in[25],proposed another lightweight as well as lower computational complexity 3PAKE scheme rooted on exclusive OR (XOR) operation to provide secrecy against impersonation assaults and many others.This protocol is suffered from the shared key loss over authenticated servers due to the fast enhancement of numerous services namely cloud as well as ubiquitous computing,gadgets comprising lower computation power,and many more.Amin et al.in[26],suggested another effective 3PAKE scheme utilizing the smart card and rooted on cryptography hash function.The authors explored existing literature to identify the key challenges related to information loss during communication due to various assaults.Although, this investigated protocol is best fit only in the mutual authentication among clients and servers but has huge computation complexity in practical implementations in multifarious applications.Shu et al.in[27],proposed another enhanced 3PAKE that offers gigantic communication efficacy and provides enhances secrecy level in numerous scenarios and applications.However, this protocol comprises certain limitations related to the secrecy of the social network.Chen et al.in[28],suggested another improved 3PAKE scheme that is rooted on the chaotic-map for the enhanced secrecy level.But the suggested scheme is vulnerable in the environment of the social network due to multifarious assaults such as man-in-the-middle assaults and relay assaults.Lone et al.in [29], discussed the OTP (One Time Password) based user authentication approach in their research.The suggested scheme was implemented and validated using the androidrooted mobile phones to attain the desired secrecy.However, the suggested method has certain drawbacks such as user data leakage in case of OTP misuse and not much reliable in case of confidential data exchange over social networks.

    3 Research Contributions

    In this paper,a novel 3PAKE protocol has been developed for the social networks which utilize the hash function as well as symmetric-key encryption technique to enhance the performance parameters such as parseTime,searchTime,depth of plies,and visited nodes by minimizing the protocol executing rounds and offers higher secrecy against diverse attacks such as brute-force, man-in-the-middle,and parallel attack.The major contributions of our research are to design an improved and novel 3PAKE protocol that takes less time in execution, lowest computation complexity, as well as robust against diverse attacks,and is communication efficient in a pragmatic manner.However,multifarious researchers have done pragmatic work to design various secrecy protocols during the last decade to provide offer the desired secrecy to the users during the communication,but the existing protocol has certain disadvantages and does not offer the required secrecy in the modern world against various attacks such as man-in-the-middle,brute-force attacks,and several others.Therefore,considering this issue we designed a novel 3PAKE protocol that is based on the hash function and symmetric key encryption technique to offer the higher secrecy as well as consumes very little time that is required to manage the high-volume traffic over the social networks.

    4 Research Methodology

    When the medium of transmission is public networks, the major goals of networks privacy are verification of interacting users as well as the secrecy of sent information.As a result, numerous 3PAKE algorithms have already been created to accomplish such security standards at the same time.The 3PAKE algorithms permit two diverse users to validate one another by a secure server and further evaluate a confidential session code through a public network.In this work,the authors utilized the under-mentioned parameters to design the proposed 3PAKE protocol based on the hash function and symmetric encryption for higher secrecy and privacy of the social networks.

    4.1 Notions Used

    Sarepresents a trusted server.CAand CBare two diverse users who want safe communication with one another with the assistance of the Sa.In this work,the authors utilized Diffie-Hellman Key Exchange(DHKE)scheme to design the suggested 3PAKE protocol based on the hash function and symmetric encryption.The DHKE is a way of safely interchanging cryptographic codes via a public channel.Our suggested protocol has been constructed utilizing the DHKE scheme,therefore,a definite cyclic cluster(CG,e,f)must be chosen,that is originated via a component e of prime order f.Nuis a number that is arbitrarily chosen through user CBfor assurance of the newness.The Nuis frequently a pseudo-random or an arbitrary number allotted in a verification protocol to confirm that the previous message could not be utilized again under diverse assaults.Tab.1 illustrates the notations used and their definitions.

    Table 1: Illustrates the notations used and their definitions

    4.2 Enhanced 3PAKE Protocol

    Using our enhanced protocol two users CAand CBdesire to exchange a fresh session code Ckwith aid of server Safor the next message.There is no direct authentication between user CAand user CB.They have to recourse to authenticated server Safor the contract of sessions secure codes.

    Fig.1 illustrates the flow diagram of our enhanced 3PAKE protocol for the social networks using a hash function and symmetric encryption.The description of the steps of our suggested 3PAKE protocol are given in detail as follows:

    Step 1:CAselects an arbitrary number an∈Tp,evaluatesdanas well as one instance code Ha(CA,dan,PWax),obtains,REQA=CA,dan,{CA,dan}Ha(CA,dan,PWax)then forwards REQAto CB.

    Step 2:By obtaining a piece of information from CA,CBinitially verify the uniqueness ofdanand after that CBselects an arbitrary number bn∈Tpand number utilized once Nu,evaluatesdbnand one instance code Ha(CB,dbn, PWbx), obtains, REQB= CB,dbn, {CB,dbn}Ha(CB,dbn,PWbx)then forwards REQAand REQBto the authenticated server Sa.

    Step 3:By obtaining REQBand REQA,authenticated server Sainitially verifies the uniqueness of thedananddbn, after that authenticated server Sautilize obtaineddananddbnto evaluate Ha(CA,dan, PWax) and Ha(CB,dbn, PWbx) order by and after that decrypts the REQAand REQBto verify and validatedananddbn.In case of,failed authentication,this session stopped,otherwise authenticated server Saselects an arbitrary number vn∈Tp,evaluatesdanvn=(dan)vn,dbnvn=(dbn)vnand obtains CAKa={dan,CB,dbnvn,Nu}Ha(CA,dan,PWax),CAKb={dbn,CA,danvn,Nu}Ha(CB,dbn,PWbx),and lastly forwards CAKaand CAKbto the CA.

    Step 4:CAdecrypts CAKa,obtainsdanvnand Nu,evaluates CK=(dbnvn)an=danbnvn,then obtains{CA,Nu,dan}CK,and forwards CAKb,{CA,Nu,dan}CKto CB.

    Step 5:By obtaining CAKb,{CA,Nu,dan}K,initially CBdecrypts CAKbto obtaindanvnand after that authenticatedbn,furthermore,CBevaluatesCK=(danvn)bn=danbnvnand after that decrypts{CA,Nu,dan}CKto authenticate Nu.

    Step 6:Finally,the user CAand user CBidentify the fresh session codeCKfor further conversation and eliminate the chances of information losses in social networks during communication.

    Figure 1:Illustrates the flow diagram of our enhanced 3PAKE protocol for the social networks using a hash function and symmetric encryption

    The overall procedure of the proposed 3PAKE protocol is summarized as follows.The client CAcan authenticate the server Saand the client CBcan authenticate the server Sarespectively by individual authentication invitations REQAand REQBand the response CAKa,CAKb.The client CAand client CBvalidate each other name with the help ofdanand Nu.In all the transferred messages,information despatcher individuality is involved for the client CAand client CB.The accurate client authentication is the first priority in the communication over social networks in order to provide the desired secrecy to the clients via authenticated server Sa.In order to provide the required secrecy to each and every client, a unique code word is assigned to all clients during the communication that is embedded in the distributed information which is transferred over the networks in the form of distributed messages via authenticated server.The suggested 3PAKE protocol is more robust against diverse attacks such as brute-force,man-in-the-middle,parallel attack,because our protocol mutually authenticates the client CAand CBas well as authenticated server Sa.

    4.3 The AVISPA Tool

    Our enhanced 3PAKE protocol for social networks is modeled and validated in the most popular AVISPA(Automated Validation of Internet Security Protocols and Applications)tool to authenticate diverse secrecy and privacy properties that our enhanced 3PAKE protocol was modeled to own.AVISPA toolkit is simply working using the push button to verify the internet secrecy and privacysensitive multifarious applications as well as protocols.HLPSL (High-Level Protocol Specification Language)is linguistic in which the diverse secrecy protocols are written in widely popular AVISPA software.Within HLPSL,numerous security protocols parameters are separated among roles.There are basic roles that are used to define the activities of a stand-alone agent during the execution of protocols or numerous sub-protocols.Several termed the composed roles, use such fundamental roles that describe a full protocol cycle, as well as protocols session among several agents, or the protocols models itself.Such a job is frequently referred to as an environmental role.In this article,authors specified their security goals using a collection of roles that describe protocol as well as an environmental role to define particular sessions which performance researchers want to evaluate.

    5 Results and Discussion

    By utilizing the AVISPA toolset to do privacy assessment as well as validation,authors prove that their suggested 3PAKE algorithm is trustworthy and therefore can operate appropriately for the social networks for higher secrecy and privacy as needed.

    5.1 Enhanced 3PAKE Protocol Specifications

    In the suggested 3PAKE protocol design that is defined in the HLPSL language,the basic roles are three namely the pekc_CA,pekc_CB,pekc_Sa,which represent the user CA,CB,and the authenticated server Sa, respectively.Herein we are presenting the one basic role that is Saas illustrated in Fig.2.The authenticated server Sastands by to obtain the REQB,REQAfrom the user CBand then forwards CAKAand CAKBto CA.At the similar instance state Stof the authenticated server,Sawill be altered via 0 to 1.There are certain symbols utilized in the basic role Saare described in Tab.2.

    5.2 Security Analysis of Suggested 3PAKE Protocol

    Initially, the authenticated server Saobtains a message (CB.Gy’.{CB.Gy’.Nb’}_Hash (CB.Gy’.PWbx).CA.Gx’.{CA.Gx’}_Hash(CA.Gx’.PWax)via Rcv()function.After that,authenticated server Sa, selects an own arbitrary number Nz’ as well as evaluates Gxz’.Lastly, authenticated server Saforwards message {Gx’.CB.Gyz’.Nb’}_Hash (CA.Gx’.PWax).{Gy’.CA.Gxz’}_Hash (CB.Gy’.PWbx)via Snd ( ) function.In this article, the authors utilized the DHKE scheme for the designing of the suggested 3PAKE protocol based on the hash function and symmetric encryption for the social network’s privacy and secrecy.After defining basic roles instantly,there is a requirement to describe the composed roles that further define the new sessions for the suggested 3PAKE protocol.Fig.2 illustrates the role of the authenticated server Safor the suggested 3PAKE protocol for the social networks secrecy verification.Fig.3 illustrates the session role for the suggested 3PAKE protocol for the social networks secrecy verification.

    Figure 2:Illustrates the role of the authenticated server Sa for the suggested 3PAKE protocol for the social networks secrecy verification

    Table 2: Illustrates the symbols used in the Sa role

    Figure 3:Illustrates the session role for the suggested 3PAKE protocol for the social networks secrecy verification

    5.3 Informal Security Analysis

    Within all session’s fragments,every basic role namely the pekc_CA,pekc_CB,as well as pekc_Sahave been instanced with solid logic.In the end, a high-level role is an environment at all times described.The environment role comprises universal constants as well as an arrangement of one or further sessions.Fig.4 illustrates the environmental role of our suggested 3PAKE protocol for the social networks secrecy verification.Herein,i is utilized to represent the intruder that takes part in the implementation of the suggested 3PAKE protocol utilizing a solid session.It is utilized for the detection of man-in-the-middle assaults.Herein,statement category channel(dy)symbolizes the intruder prototypical namely the Dolev-Yao model.By utilizing this model,the interloper has overall control of the network in such a manner that every message forwarded by the users would pass via the interloper.This interloper can analyze or enhance coming messages as soon as get to know demanded codes.As a result, users can transmit as well as receive data on any route they wish; the intended relationship among specific channels characteristics is preserved.

    Figure 4:Illustrates the environmental role for the suggested 3PAKE protocol for the social networks secrecy verification

    Fig.5 illustrates the analysis goals for the suggested 3PAKE protocol for the social networks secrecy verification.We have analyzed the under-mentioned properties that are considered within the goal section.Herein symbol auth_CA_SA_gx means user CAvalidates Saover gx.Fig.6 illustrates the simulation outcomes by OFMC back-end for the suggested 3PAKE protocol for the social networks secrecy verification.

    Figure 5:Illustrates the analysis goals for the suggested 3PAKE protocol for the social networks secrecy verification

    Figure 6:Illustrates the simulation outcomes by OFMC back-end for the suggested 3PAKE protocol for the social networks secrecy verification

    Several 3PAKE protocols have been investigated in the past to generate a secure meeting code between users using a trustworthy server.However,existing modified 3PAKE protocols have various flaws and are unable to guarantee necessary anonymity in social networks against a variety of attacks such as man-in-the-middle, brute-force assaults, and others.In this article, the authors developed an enhanced and novel 3PAKE protocol that offers additional secrecy in social networks to offer higher secrecy as well as privacy as demanded in the modern world from various assaults between communications.All the experimental work was carried out on a personal computer installed with window 10 and comprising of a 64-bit operating system, 16 GB RAM (Random Access Memory),and an i7 processor.For the performance validations of the suggested 3PAKE protocol for social networks,we utilized a widely popular AVISPA toolset for the simulation.

    5.4 Performance Evaluation

    Fig.6 illustrates the simulation outcomes by OFMC back-end for the suggested 3PAKE protocol for the social networks secrecy verification.Tab.3 illustrates the outcomes and comparative analysis of the suggested 3PAKE protocol along with other existing protocols for the social networks.Islam et al.[30]protocol takes 0.00 s parseTime,communication steps 5,search time 0.66 s,depth plies 6,and the visited nodes 16.Pak et al.[31]protocol consume parse time 0.00 s,communication steps 5,search time 8.94 s,depth plies 6 and visited nodes number 1690.After simulation,the proposed 3PAKE protocol offers parseTime 0.00 s,searchTime 0.12 s,depth of 4 plies,visited nodes 10,and communication steps 2 that shows all parameters are reduced from the existing protocols,therefore our suggested 3PAKE protocol provides very little computation complexity along with reduced search time for the client’s authentication over the server Sa.The parseTime gives the information regarding the initialization time of protocol execution for the authentication of clients and server.Initially, it is set to be 0.00 s to count the searchTime of clients and authenticated server in an efficient manner.Moreover, our proposed algorithm is more robust against diverse assaults namely the man-in-the-middle,replay,and cryptanalysis assaults, and many more.Our suggested 3PAKE protocol for social networks offers forward security.Any agreed code would not be compromised in case of even agreed codes derived via similar long-term coding substances throughout the succeeding run have been compromised.In our suggested 3PAKE protocol,components an,bn,and vnare arbitrarily chosen as well as self-governing to proposed 3PAKE protocol execution.Hence,compromised secret code PWax,PWbx,as well as CKcould not disclose the earlier session codes.

    6 Conclusion

    In this article,the authors proposed a novel and low-cost 3PAKE protocol based on the hash function and symmetric encryption for social networks that offer additional secrecy for the confidential key as well as a session key, shared verification between users including the uniqueness of conveyed message and lastly faultless forward security for the session key.Our suggested 3PAKE protocol shows that it is highly efficient in comparison to the earlier modified protocols and provides less computation complexity along with reduced computations steps.This proposed 3PAKE protocol is simulated and a formal verification was done by using a widely popular AVISPA toolset.The proposed 3PAKE protocol takes parseTime 0.00 s,searchTime 0.12 s,depth of 4 plies,visited nodes 10,and communication steps 2,indicating that all parameters have been reduced from existing protocols.As a result,our proposed 3PAKE protocol is more robust and offers a very low computation complexity.Our recommended 3PAKE protocol is appropriate in a wide range of applications,particularly in resourceconstrained situations as well as in real-time systems.However, several researchers have modified 3PAKE protocols for diverse applications in past but there are vital possibilities of more investigation on 3PAKE protocol in the future for further modification for mobile commerce environment for optimal outcomes.

    Acknowledgement:This project was supported by the Taif University Researchers Supporting Project Number(TURSP-2020/347),Taif Unversity,Taif,Saudi Arabia.

    Funding Statement:This project was funded by the Taif University Researchers Supporting Project Number(TURSP-2020/347),Taif Unversity,Taif,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    高清欧美精品videossex| 国产不卡av网站在线观看| 亚洲精品国产区一区二| 99国产精品99久久久久| 无人区码免费观看不卡| 久久午夜亚洲精品久久| 日韩有码中文字幕| 日韩一卡2卡3卡4卡2021年| 很黄的视频免费| 免费在线观看亚洲国产| 国产区一区二久久| 免费在线观看亚洲国产| 99香蕉大伊视频| 亚洲人成伊人成综合网2020| 亚洲人成伊人成综合网2020| 欧美另类亚洲清纯唯美| 久久午夜综合久久蜜桃| 欧美 亚洲 国产 日韩一| 黄色 视频免费看| 人妻 亚洲 视频| 免费观看人在逋| 精品国产一区二区久久| 91在线观看av| 久久国产乱子伦精品免费另类| 午夜福利在线免费观看网站| 在线观看日韩欧美| 亚洲欧美日韩高清在线视频| 不卡一级毛片| 国产一卡二卡三卡精品| 久久天躁狠狠躁夜夜2o2o| 亚洲第一欧美日韩一区二区三区| 欧美不卡视频在线免费观看 | 不卡一级毛片| 天堂√8在线中文| 91国产中文字幕| 久久影院123| 亚洲色图av天堂| 啦啦啦免费观看视频1| 国产亚洲精品久久久久5区| 极品人妻少妇av视频| 男男h啪啪无遮挡| 女人被躁到高潮嗷嗷叫费观| 大香蕉久久网| 国产精品秋霞免费鲁丝片| 亚洲色图综合在线观看| 久久婷婷成人综合色麻豆| 男女床上黄色一级片免费看| 日韩欧美免费精品| 香蕉国产在线看| 久久影院123| 国产亚洲精品久久久久久毛片 | 亚洲 欧美一区二区三区| 亚洲精品国产区一区二| 国产精品一区二区在线观看99| 免费在线观看黄色视频的| 亚洲精品久久午夜乱码| 久久人人97超碰香蕉20202| 国产午夜精品久久久久久| 一区在线观看完整版| 淫妇啪啪啪对白视频| 一边摸一边做爽爽视频免费| 亚洲精品国产精品久久久不卡| 久久久国产成人免费| 怎么达到女性高潮| 嫩草影视91久久| 久久久久久久午夜电影 | 看免费av毛片| 日韩制服丝袜自拍偷拍| 天堂中文最新版在线下载| 亚洲精品乱久久久久久| 97人妻天天添夜夜摸| 国产又爽黄色视频| 久久精品91无色码中文字幕| 国产片内射在线| 激情在线观看视频在线高清 | 最近最新中文字幕大全免费视频| 亚洲av熟女| 午夜福利免费观看在线| a级片在线免费高清观看视频| 国产免费av片在线观看野外av| 欧美黑人精品巨大| videos熟女内射| 黑人巨大精品欧美一区二区蜜桃| 久久久精品免费免费高清| 美女高潮喷水抽搐中文字幕| 90打野战视频偷拍视频| 国产成人影院久久av| 很黄的视频免费| 两个人看的免费小视频| 欧美乱色亚洲激情| 国产一区在线观看成人免费| 亚洲精品中文字幕一二三四区| 成年女人毛片免费观看观看9 | 国产亚洲欧美在线一区二区| 久久草成人影院| 又黄又爽又免费观看的视频| 一进一出好大好爽视频| 免费观看a级毛片全部| 国精品久久久久久国模美| 欧美+亚洲+日韩+国产| 成人免费观看视频高清| 久久久久视频综合| 亚洲熟女毛片儿| 一二三四社区在线视频社区8| 后天国语完整版免费观看| av国产精品久久久久影院| 亚洲 国产 在线| 色94色欧美一区二区| 夜夜夜夜夜久久久久| 国产免费男女视频| 91麻豆精品激情在线观看国产 | 亚洲精品久久午夜乱码| 欧美av亚洲av综合av国产av| 久久精品91无色码中文字幕| 啦啦啦视频在线资源免费观看| 国产在线一区二区三区精| 国内毛片毛片毛片毛片毛片| 大码成人一级视频| 精品国产国语对白av| 老熟女久久久| 啦啦啦 在线观看视频| 这个男人来自地球电影免费观看| 国产激情欧美一区二区| 巨乳人妻的诱惑在线观看| 久久人妻熟女aⅴ| 久久久国产一区二区| 久久国产精品影院| 国产成人精品在线电影| 国产精品欧美亚洲77777| 国产亚洲av高清不卡| 捣出白浆h1v1| 人妻久久中文字幕网| 黑人巨大精品欧美一区二区mp4| 深夜精品福利| 国产成人一区二区三区免费视频网站| 亚洲精品一卡2卡三卡4卡5卡| 日本精品一区二区三区蜜桃| 狂野欧美激情性xxxx| 97人妻天天添夜夜摸| 人人妻人人爽人人添夜夜欢视频| av片东京热男人的天堂| 脱女人内裤的视频| 精品福利观看| 人人妻,人人澡人人爽秒播| 午夜福利视频在线观看免费| 午夜91福利影院| 精品高清国产在线一区| 91精品国产国语对白视频| 18禁观看日本| 国产一区二区激情短视频| 欧美日韩一级在线毛片| 91老司机精品| 黄网站色视频无遮挡免费观看| 一区二区日韩欧美中文字幕| 香蕉丝袜av| 久久午夜亚洲精品久久| 9色porny在线观看| 精品国产亚洲在线| 精品国产美女av久久久久小说| 国产成人精品无人区| 久99久视频精品免费| 亚洲色图综合在线观看| 精品电影一区二区在线| 国产精品九九99| 男人操女人黄网站| 中出人妻视频一区二区| 精品高清国产在线一区| 亚洲午夜精品一区,二区,三区| 国产欧美日韩一区二区三区在线| 天天躁狠狠躁夜夜躁狠狠躁| 人妻一区二区av| 久久人妻熟女aⅴ| 无人区码免费观看不卡| 午夜福利乱码中文字幕| 天堂√8在线中文| 欧美亚洲 丝袜 人妻 在线| 精品国内亚洲2022精品成人 | 99国产综合亚洲精品| 国产成人啪精品午夜网站| 热re99久久精品国产66热6| 午夜福利免费观看在线| 制服人妻中文乱码| 国产男靠女视频免费网站| 久久久久久久久久久久大奶| 高潮久久久久久久久久久不卡| 亚洲欧美精品综合一区二区三区| 丝瓜视频免费看黄片| 在线永久观看黄色视频| 亚洲av欧美aⅴ国产| 国产成人av激情在线播放| 亚洲少妇的诱惑av| 欧美日韩视频精品一区| 9热在线视频观看99| 亚洲成av片中文字幕在线观看| 国产亚洲欧美98| 国产精品1区2区在线观看. | 久久青草综合色| 国产精品久久久av美女十八| 在线观看免费午夜福利视频| 久久国产精品影院| 91成年电影在线观看| 国产精品久久电影中文字幕 | 一区二区三区精品91| 欧美日韩国产mv在线观看视频| 国产高清激情床上av| 操出白浆在线播放| 激情视频va一区二区三区| 亚洲精品粉嫩美女一区| 国产高清国产精品国产三级| 巨乳人妻的诱惑在线观看| 久久精品亚洲av国产电影网| 老司机亚洲免费影院| 国产精品二区激情视频| 欧美国产精品一级二级三级| 精品亚洲成国产av| 午夜精品久久久久久毛片777| 欧美日韩瑟瑟在线播放| 黑丝袜美女国产一区| 国产男女内射视频| 久久国产乱子伦精品免费另类| 国产精品成人在线| 下体分泌物呈黄色| 亚洲九九香蕉| 一级毛片高清免费大全| 国产精品二区激情视频| 国产精品久久电影中文字幕 | 亚洲色图 男人天堂 中文字幕| 成人永久免费在线观看视频| 欧美日本中文国产一区发布| 99热网站在线观看| 亚洲国产欧美日韩在线播放| 国产黄色免费在线视频| 女性被躁到高潮视频| 亚洲熟妇熟女久久| 黑人欧美特级aaaaaa片| 在线观看免费视频网站a站| 一级作爱视频免费观看| 国产精品亚洲一级av第二区| 男女之事视频高清在线观看| 看黄色毛片网站| av在线播放免费不卡| 日韩有码中文字幕| 在线观看66精品国产| 国产亚洲欧美在线一区二区| 黄色怎么调成土黄色| 成年动漫av网址| 无人区码免费观看不卡| 欧美成人午夜精品| 亚洲av日韩在线播放| 国产1区2区3区精品| 欧美黑人精品巨大| 成人三级做爰电影| 91成人精品电影| 后天国语完整版免费观看| 亚洲色图av天堂| 极品教师在线免费播放| 一级毛片高清免费大全| 成年人免费黄色播放视频| 国产精品免费大片| 免费少妇av软件| 国产成人av教育| 亚洲欧美激情在线| 亚洲国产欧美一区二区综合| 国产免费男女视频| 久久中文字幕人妻熟女| 亚洲午夜理论影院| 视频区欧美日本亚洲| 久久ye,这里只有精品| 在线观看一区二区三区激情| 99热网站在线观看| 老熟女久久久| 欧美人与性动交α欧美精品济南到| 欧美性长视频在线观看| 免费观看人在逋| 日日摸夜夜添夜夜添小说| 1024香蕉在线观看| 伦理电影免费视频| 久久精品国产亚洲av香蕉五月 | 国产免费av片在线观看野外av| 女人被狂操c到高潮| 成人精品一区二区免费| 高清欧美精品videossex| 不卡一级毛片| 午夜福利免费观看在线| 色婷婷av一区二区三区视频| 真人做人爱边吃奶动态| 亚洲精品中文字幕一二三四区| 91精品国产国语对白视频| 一区二区日韩欧美中文字幕| 90打野战视频偷拍视频| 国产高清videossex| 涩涩av久久男人的天堂| 久久久久国内视频| 黑人操中国人逼视频| 成年动漫av网址| 国产成人一区二区三区免费视频网站| 又黄又爽又免费观看的视频| 99在线人妻在线中文字幕 | 91九色精品人成在线观看| 搡老岳熟女国产| 午夜福利在线观看吧| 国产激情欧美一区二区| 午夜福利乱码中文字幕| 人人妻人人澡人人看| 侵犯人妻中文字幕一二三四区| 亚洲精品粉嫩美女一区| 亚洲成国产人片在线观看| 亚洲精品在线美女| 免费高清在线观看日韩| 中文字幕最新亚洲高清| 涩涩av久久男人的天堂| 久久精品成人免费网站| 午夜成年电影在线免费观看| www.自偷自拍.com| 中文字幕人妻丝袜制服| 狂野欧美激情性xxxx| 黄色 视频免费看| 亚洲av熟女| 中文字幕高清在线视频| 一区二区日韩欧美中文字幕| 欧美日韩一级在线毛片| 下体分泌物呈黄色| 天堂动漫精品| 人人妻人人澡人人看| av免费在线观看网站| 久久中文字幕人妻熟女| 国产片内射在线| 国产精品综合久久久久久久免费 | 久久久国产一区二区| 色综合婷婷激情| 国产主播在线观看一区二区| 欧美亚洲 丝袜 人妻 在线| 国产高清videossex| 每晚都被弄得嗷嗷叫到高潮| 精品国产乱码久久久久久男人| www.熟女人妻精品国产| 国产欧美日韩一区二区三区在线| 少妇裸体淫交视频免费看高清 | 人妻久久中文字幕网| 久久久国产欧美日韩av| 夜夜夜夜夜久久久久| 国产精品影院久久| 亚洲欧美激情综合另类| 三上悠亚av全集在线观看| 一区在线观看完整版| 久久久久久免费高清国产稀缺| 99riav亚洲国产免费| 久久国产精品影院| 欧美日韩成人在线一区二区| 妹子高潮喷水视频| 后天国语完整版免费观看| 精品国产超薄肉色丝袜足j| 十八禁人妻一区二区| 久热爱精品视频在线9| 一级片免费观看大全| 女性被躁到高潮视频| а√天堂www在线а√下载 | 一级作爱视频免费观看| 天天躁夜夜躁狠狠躁躁| 操出白浆在线播放| 亚洲精品在线观看二区| 操美女的视频在线观看| 日韩成人在线观看一区二区三区| 自拍欧美九色日韩亚洲蝌蚪91| 日韩成人在线观看一区二区三区| 777米奇影视久久| 丁香欧美五月| 国产精品免费大片| 丰满的人妻完整版| 精品一区二区三区av网在线观看| 亚洲熟妇熟女久久| 成人精品一区二区免费| 黄色视频,在线免费观看| 免费一级毛片在线播放高清视频 | 亚洲精品一二三| 搡老乐熟女国产| 久久精品国产清高在天天线| 亚洲欧洲精品一区二区精品久久久| 少妇被粗大的猛进出69影院| 9色porny在线观看| 亚洲精品粉嫩美女一区| 一区二区三区国产精品乱码| 叶爱在线成人免费视频播放| 欧美日韩瑟瑟在线播放| 久久精品91无色码中文字幕| 精品国产亚洲在线| 免费在线观看黄色视频的| 好男人电影高清在线观看| 女警被强在线播放| 亚洲美女黄片视频| 人妻久久中文字幕网| 精品一品国产午夜福利视频| 91大片在线观看| 高清视频免费观看一区二区| 日日摸夜夜添夜夜添小说| 视频区欧美日本亚洲| 黑人操中国人逼视频| 精品国产乱码久久久久久男人| 老司机深夜福利视频在线观看| 亚洲七黄色美女视频| 手机成人av网站| 国产精品久久视频播放| 日本黄色视频三级网站网址 | 日韩成人在线观看一区二区三区| 亚洲精品国产一区二区精华液| 丁香欧美五月| 黑人猛操日本美女一级片| 日韩欧美一区二区三区在线观看 | 亚洲精品久久成人aⅴ小说| 男女高潮啪啪啪动态图| 欧美黄色片欧美黄色片| 国产成人av激情在线播放| 亚洲熟妇熟女久久| 搡老熟女国产l中国老女人| 久久中文字幕一级| 色老头精品视频在线观看| 最近最新免费中文字幕在线| 精品国产亚洲在线| 国产精品美女特级片免费视频播放器 | 老鸭窝网址在线观看| 欧美精品亚洲一区二区| 中文欧美无线码| 精品国产亚洲在线| 午夜老司机福利片| 国产精品久久久av美女十八| www.熟女人妻精品国产| 天堂√8在线中文| 成人精品一区二区免费| 亚洲欧美一区二区三区黑人| 国产精品亚洲一级av第二区| 99精品久久久久人妻精品| 日韩制服丝袜自拍偷拍| 婷婷丁香在线五月| 一进一出好大好爽视频| 窝窝影院91人妻| 精品久久久久久久毛片微露脸| 欧美乱色亚洲激情| 久久天躁狠狠躁夜夜2o2o| 久久久久久免费高清国产稀缺| 免费在线观看黄色视频的| 好男人电影高清在线观看| 欧美丝袜亚洲另类 | 纯流量卡能插随身wifi吗| 久久这里只有精品19| 十八禁高潮呻吟视频| 天堂中文最新版在线下载| 最新美女视频免费是黄的| 99在线人妻在线中文字幕 | 老鸭窝网址在线观看| 亚洲三区欧美一区| 久99久视频精品免费| 国产日韩欧美亚洲二区| 亚洲avbb在线观看| 亚洲久久久国产精品| 久久国产亚洲av麻豆专区| 免费观看人在逋| 九色亚洲精品在线播放| 男人操女人黄网站| 精品亚洲成国产av| 国产高清videossex| 亚洲熟妇熟女久久| 欧美人与性动交α欧美软件| 在线观看午夜福利视频| 91字幕亚洲| 首页视频小说图片口味搜索| 久久久精品免费免费高清| 50天的宝宝边吃奶边哭怎么回事| 黑丝袜美女国产一区| a级毛片黄视频| 国产精华一区二区三区| 99国产极品粉嫩在线观看| 精品欧美一区二区三区在线| 亚洲精品一二三| 啦啦啦视频在线资源免费观看| 免费观看人在逋| 亚洲欧美日韩另类电影网站| av福利片在线| 在线视频色国产色| 伦理电影免费视频| 欧美日韩中文字幕国产精品一区二区三区 | 日韩欧美免费精品| 亚洲欧美日韩另类电影网站| bbb黄色大片| 巨乳人妻的诱惑在线观看| 成人18禁高潮啪啪吃奶动态图| 欧美日本中文国产一区发布| 99国产精品一区二区三区| 18在线观看网站| 91字幕亚洲| 成熟少妇高潮喷水视频| 人人妻人人爽人人添夜夜欢视频| 欧美乱码精品一区二区三区| 日韩人妻精品一区2区三区| 欧美亚洲日本最大视频资源| 女人精品久久久久毛片| 午夜免费观看网址| 9191精品国产免费久久| 亚洲精华国产精华精| 飞空精品影院首页| 老司机午夜福利在线观看视频| 久久天堂一区二区三区四区| 亚洲国产欧美网| 国产成人精品久久二区二区91| 热re99久久精品国产66热6| aaaaa片日本免费| 日韩精品免费视频一区二区三区| xxxhd国产人妻xxx| а√天堂www在线а√下载 | 欧美黄色淫秽网站| 亚洲第一青青草原| 女人爽到高潮嗷嗷叫在线视频| 一级片免费观看大全| 老熟妇仑乱视频hdxx| 久久久久视频综合| 天堂动漫精品| 欧美性长视频在线观看| tocl精华| 一级a爱片免费观看的视频| 国产在线精品亚洲第一网站| 欧美日韩亚洲综合一区二区三区_| 欧美精品亚洲一区二区| 国产精品美女特级片免费视频播放器 | 一本大道久久a久久精品| 18禁裸乳无遮挡免费网站照片 | 国产av又大| 欧美av亚洲av综合av国产av| 亚洲在线自拍视频| 亚洲av第一区精品v没综合| 亚洲精品在线美女| 精品久久蜜臀av无| www.999成人在线观看| 丝袜美足系列| 在线观看午夜福利视频| 极品少妇高潮喷水抽搐| 搡老乐熟女国产| 黄色视频,在线免费观看| 女同久久另类99精品国产91| 两人在一起打扑克的视频| 18禁国产床啪视频网站| 一本综合久久免费| 国产精品成人在线| 国产在线观看jvid| 一级毛片女人18水好多| 亚洲精品中文字幕一二三四区| 亚洲精品国产区一区二| 婷婷丁香在线五月| 亚洲精品粉嫩美女一区| 欧美性长视频在线观看| 99香蕉大伊视频| 国产精品香港三级国产av潘金莲| 免费一级毛片在线播放高清视频 | 久久人妻福利社区极品人妻图片| 天堂俺去俺来也www色官网| 欧美黄色淫秽网站| 99国产精品免费福利视频| 老司机亚洲免费影院| 最新的欧美精品一区二区| 国产亚洲一区二区精品| 欧美日韩福利视频一区二区| 美女午夜性视频免费| 亚洲 欧美一区二区三区| 91成年电影在线观看| 一本大道久久a久久精品| 久久精品91无色码中文字幕| 女人高潮潮喷娇喘18禁视频| 国产日韩一区二区三区精品不卡| 久久人妻熟女aⅴ| 成人特级黄色片久久久久久久| 久久久国产成人精品二区 | 成人黄色视频免费在线看| 巨乳人妻的诱惑在线观看| 一级毛片精品| 最近最新免费中文字幕在线| 女人高潮潮喷娇喘18禁视频| 人人澡人人妻人| 亚洲国产精品一区二区三区在线| 日韩免费av在线播放| 国内久久婷婷六月综合欲色啪| 国产精品一区二区在线观看99| 亚洲中文字幕日韩| 成年女人毛片免费观看观看9 | 欧美大码av| 午夜亚洲福利在线播放| 久久久久久人人人人人| 在线播放国产精品三级| 日韩欧美免费精品| 成人av一区二区三区在线看| svipshipincom国产片| 午夜福利在线免费观看网站| 国产亚洲一区二区精品| 老司机午夜十八禁免费视频| 亚洲国产毛片av蜜桃av| 色尼玛亚洲综合影院| 丝瓜视频免费看黄片| 亚洲精品美女久久av网站| 中文字幕av电影在线播放| 国产男女超爽视频在线观看| 欧美乱色亚洲激情| av超薄肉色丝袜交足视频| 国产亚洲一区二区精品| 人人妻人人澡人人看| 色在线成人网| 多毛熟女@视频| 日韩三级视频一区二区三区| 美国免费a级毛片| av网站免费在线观看视频| 天堂俺去俺来也www色官网| 日本wwww免费看| 国产在线观看jvid| 午夜成年电影在线免费观看| 99在线人妻在线中文字幕 | 中文字幕制服av| 精品一区二区三区四区五区乱码| 精品国产一区二区三区四区第35| 欧美大码av|