• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent DoS Attack Detection with Congestion Control Technique for VANETs

    2022-08-24 12:56:42GopiMahanteshMathapatiPrasadSultanAhmadFahdAlWesabiManalAbdullahAlohaliandAnwerMustafaHilal
    Computers Materials&Continua 2022年7期

    R.Gopi, Mahantesh Mathapati, B.Prasad, Sultan Ahmad, Fahd N.Al-Wesabi,Manal Abdullah Alohaliand Anwer Mustafa Hilal

    1Department of Computer Science and Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur,621 212, India

    2Department of Computer Science and Engineering, RajaRajeswari College of Engineering, Bengaluru, 560074, India

    3Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam, 530049, India

    4Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Alkharj, 11942, Saudi Arabia

    5Department of Computer Science, College of Science & Arts at Mahayil, King Khalid University, Muhayel Aseer, 62529,Saudi Arabia & Faculty of Computer and IT, Sana’a University, Sana’a, 15347, Yemen

    6Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, 11564, Saudi Arabia

    7Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University,Al-Kharj, 16278, Saudi Arabia

    Abstract: VehicularAd hoc Network (VANET) has become an integral part of Intelligent Transportation Systems (ITS) in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world.VANET is susceptible to security issues, particularly DoS attacks, owing to maximum unpredictability in location.So, effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET.At the same time, congestion control is also one of the key research problems in VANET which aims at minimizing the time expended on roads and calculating travel time as well as waiting time at intersections, for a traveler.With this motivation, the current research paper presents an intelligent DoS attack detection with Congestion Control (IDoS-CC) technique for VANET.The presented IDoSCC technique involves two-stage processes namely, Teaching and Learning Based Optimization (TLBO)-based Congestion Control (TLBO-CC) and Gated Recurrent Unit (GRU)-based DoS detection (GRU-DoSD).The goal of IDoS-CC technique is to reduce the level of congestion and detect the attacks that exist in the network.TLBO algorithm is also involved in IDoS-CC technique for optimization of the routes taken by vehicles via traffic signals and to minimize the congestion on a particular route instantaneously so as to assure minimal fuel utilization.TLBO is applied to avoid congestion on roadways.Besides,GRU-DoSD model is employed as a classification model to effectively discriminate the compromised and genuine vehicles in the network.The outcomes from a series of simulation analyses highlight the supremacy of the proposed IDoS-CC technique as it reduced the congestion and successfully identified the DoS attacks in network.

    Keywords: VANET; intelligent transportation systems; congestion control;attack detection; dos attack; deep learning

    1 Introduction

    Vehicular Ad hoc Network (VANET) is one of the advanced and established networks and is named so, since the location of the vehicle alters at all instances of time.The normal speed of vehicular nodes differs from 40 to 80 km/h [1].This heavy arbitrariness, in terms of position exposes VANET to each form of cyber threat and attacks, particularly hybrid DoS attack.Uncertainties, like hybrid DoS attack, are the main reason for cyber threats.VANET makes use of vehicles as mobile nodes and is a subclass of Mobile Adhoc Network (MANET) to communicate with and amongst the nearby vehicles closer to equipment/roadside unit (RSU).However, it differs from other networks in terms of its features [2].Mainly, the vehicles (nodes) are insufficient for road topology while stirring.So, the vehicle’s upcoming location could be anticipated since the data of the road is accessible.According to IEEE 1471-2000 and ISO/IEC 42010 architecture standard principles, VANET system could be classified into three types such as generic domain, mobile domain, and infrastructure domain.Fig.1 shows the structure of VANET.Mobile domain transfers the data and communicates with the infrastructure domain.It makes use of IEEE 802.11p signals and beacons that process the information and move on to modulation process [3].Later, the infrastructure domain communicates with generic domain and exchanges the data.The flow of the information between stationary and the mobile resources leads to efficient usage of the road with users who use IEEE 802.11p beacon transmission standards.

    Figure 1: Overview of VANET

    The current work considered the broadcast rate of data for real-time IEEE 802.11p data delivery in VANET to be 30 Mbps.Also in VIA, the vehicle co-operation occurs in the group motion for frequent exchange of the sporadic broadcast of security messages [4].Such transmission carries the data about vehicle’s speed and its location while using IEEE 802.11p beacons-devoted channel [5].Beacon losses tend to occur at the time of standard operations of IEEE 802.11p MAC protocol with arbitrary access requirements.This could be featured as the damage to wireless networks (viz., beacon transmission overlaps the results from various vehicles that could lead to congestion or collision).Collision/Congestion(CC)could be decreased on the basis of suitable selection of MAC protocol realtime broadcast method.This method includes key distribution algorithm and secure authentication methods whereas secure broadcast range model could be placed in VIA network.Depending on this, efficiency parameters are used like real-time end-to-end delay sensitivity to implement the neighbouring node successfully.

    In VANET, the consistency of vehicular nodes is measured based on its cooperation, which considers the amount of participation with transmission packets from their neighbors.This is because of absence of centralized control points for transmission [6].However, the degree of collaborations,provided by the vehicular node, to transmit the packets reduces the existence of malicious activities such as DDoS attacks.Because these attacks unintentionally/intentionally utilize the resources and reduce the efficiency of network so as to stay active in the network with no genuine reason [7].The existence of DDoS attack possibly decreases the rate of throughput and packet delivery, despite the acquisition of total overhead, great level of delay, and control overhead.In previous years, a substantial amount of mitigation approaches presented DDOs attacks and methods to overcome it.

    VANET is a highly scalable network with differing amounts of nodes (vehicles) and RSUs (infrastructure) that keeps changing from time to time.Further, its network topology also gets altered regularly, since the nodemoveswith changeable speed.VANETis incorporated in smart transportation systems [8] to decrease the time consumed on road which includes both waiting time and travel time at the intersection, for a commuter.Travel time could be decreasedwith the help of shortest paths between two nodes.However, when each vehicle elects the shortest path, then it would create congestion on that path.Therefore, the shortest routes are mostly not the optimum routes [9].Commuters might select a slightly longer route.However, their primary focus is to evade congestion in their routes by having less number of traffic signals and less waiting time for smoother mobility.

    Khoza et al.[10] introduced an IHACO approach to decrease congestion in smart cities.The aim is to select and recommend an optimal route during rush hours.Also, the system follows IHACO approach to improve the QoS to ITS.This method (IHACO) is different than other approaches, for instance PSO, due to pheromone upgrade process that makes it highly effective.In Jindal et al.[11],a new MACO-P approach was presented to reduce the total travelling time.MACO approach was utilized to avoid the congested route by sensing the pheromone trail.The inclusion of pre-emption in the presented MACO approach would lead to decrease in normal queue length at intersections,therefore, lesser waiting times ensure smoother mobility.

    Erskine et al.[12] used VFC incorporation with hybrid OA and SI algorithm including CSA,ABC,and GA to provide a real-time recognition of DoS attacks in IEEE 802.11p.In this method, VFC was used for achieving a secured smart vehicular network.The vehicle moves at a particular speed and the data gets transferred at 30 Mbps.FFBPNN approach was utilized in this study as a classifier to distinguish between genuine and the attacked vehicles.Chang et al.[13] proposed a distributed broadcast power adjustment approach to enhance the awareness and transmission congestion control to address the transmission congestion issues that occur in VANET.The aim is to offer maximal awareness of nearby vehicles, when preserving a communication channel load, within the threshold allowed.By altering the broadcast range of the vehicle gradually, on the basis of communication channel load of its neighbouring vehicles, this approach detects the optimum broadcast range that can offer maximum awareness without the congestion of resultant communication.Furthermore,the presented method properly controls the channel load in a reasonable way without sacrificing the awareness of certain vehicles during congested condition.

    Sangaiah et al.[14] presented a LACC approach to enhance the advantages of greedy routing and DDM algorithm.LACC focuses on electing receiver vehicles by measuring its end-to-end service capability and connection stability preference.Kumar et al.[15] presented an effective traffic control scheme using IoV technique.The presented approach was implemented in the work area of Vellore district, Tamil Nadu, India.The street map was divided into smaller sections of different maps.ACO approach was employed in all the maps to find the optimum path.Furthermore, FL algorithm-based traffic intensity evaluation function was also presented for modelling heavy traffic conditions.The presented IoV-based path election approach is related to the present shortest route election methods like Dijikstra, Kruskal, and Prim algorithms.

    Lyu et al.[16] proposed a DBCC system to control the beacon activities by considering the condition of links such as vehicles with additional neighbours and better condition of link with its neighbours, so that the system would be allocated with high beacon rates.First, the authors used two ML algorithms namely, NB and SVM to train the features and a classification method was conducted online with NLoS links to forecast the output.Using link data, the authors created LSBM problems of rate adaption under TDMA transmission MAC which is otherwise known as NPhard.A greedy heuristic approach was presented for L-SBM and the efficiency of the method was calculated.In Selvi et al.[17],an ASPBT algorithm was presented as an efficient and reliable emergency message communication technique.This protocol vigorously changes the amount of partitions and the periodicity of beacons to reduce the amount of re communication.In this method, partition size is defined by network density and the broadcast schedule for all partitions is evaluated by LOA approach.It is a bio-inspired optimization based on the features of lions.

    The current research article presents an Intelligent DoS attack Detection with Congestion Control (IDoS-CC) technique for VANET.The presented IDoS-CC technique has two stages namely, Teaching and Learning-Based Optimization (TLBO)-based Congestion Control (TLBO-CC) and Gated Recurrent Unit (GRU)-based DoS detection (GRU-DoSD).IDoS-CC technique includes TLBO algorithm to optimize the routes taken by vehicles via traffic signals and minimize the congestion instantaneously on a particular route which in turn to assure minimal fuel utilization.Besides, GRU-DoSD model is also employed as a classification model to effectively distinguish the compromised as well as genuine vehicles in network.A series of simulation analyses was conducted and the results attained by IDoSCC technique established its supremacy in terms of reduced congestion and successful identification of DoS attacks in the network.

    2 The Proposed Model

    In this study, a new IDoS-CC technique is designed for VANET.The goal of IDoS-CC technique is to reduce the level of congestion and to detect the attacks that exist in network.It includes a twostage process namely, TLBO-CC based Congestion Control and GRU-DoSD-based attack detection.The following sections detail the working of these sub-processes.

    2.1 Design of TLBO-CC Technique

    This approach is inspired by knowledge transfer that occurs between students and the teachers during education period.Assume that two teachers, T1 & T2, teach a topic using identical data to same merit level learners in two dissimilar classes.The mark distributions among the learners of two classes were validated with the teacher.Curve 1 & 2 illustrate the mark attained by the learners who were taught by the teachers, T1 & T2 correspondingly.The standard distributions are considered for the attained mark.But, in real time, itmight be skewness.The standard distributions are demonstrated as follows.

    where σ2represents the variance,μ denotes the mean and x indicates the value where the standard distribution functions are needed.Curve 2 indicates the optimum efficiency related to curve 1 and so it is supposed that T2 value is higher than T1 in terms of teaching.An essential variant amongst the efficiency is measured by calculating the mean between them (M1for Curve and 1M2for Curve 2).For instance,an excellent teacher achieves optimal means from the result of learner.Also,the learner learns from communication amongst them and it also assists them to improve the outcomes [18].There are two major levels in TLBO approach i.e.,‘Learner Phase’(learns through their communication) and‘Teacher Phase’(learns from teacher).

    2.1.1 Teacher Phase

    The mean of class increases in MAto MBbased upon the decent teacher.Teachers are supposed to be optimum, if his/her learner is up to her/his level, depending upon their knowledge.However, it is not possible essentially and the teachers could shift the mean of class up to a certain level based on the ability of class.Let Miindicates the mean and Tirepresents the teacher during all iterations i.Tishifts the efforts to the mean Minear their individual level.Hence, the novel means would be Tiwhich is called as Mn.The solutions get upgraded based on the variant between the present and novel mean compared as follows.

    In which TFstands for teaching feature, calculated as a mean value that should be changed.Further, ridenotes an arbitrary amount between zero and one.The value of TFis one or two, i.e.,again it is a heuristic phase and is definite in an arbitrary method with similar likelihood as TF=round [1 + rand (0, 1) {2-1}].This difference modifies the present solution based on the equation given below.

    2.1.2 Learner Phase

    The learner enhances their skill utilizing twoways: input by the teachers and their communications with students.The learner endures interface with rest of the learners through group discussion, presentation, and so on.The learners learn novel things, if other learners are highly skilled with regards to the subject.The learner’s alteration is given herewith.

    For i= 1:Pn

    Randomly select two learnersXiand Xj, in which Ij

    Iff(Xi)<f(Xj)

    Xn,i= Xo,i+ ri(Xi- Xj)

    Otherwise

    Xn,i= Xo,i+ ri(Xj- Xi)

    End If

    End For

    Agree Xnonce optimal function values are attained.

    At the time of journey, a commuter spends their main time in waiting, because of traffic signals at the intersection or congestionen routecreated by accident, few researches, and so forth.Therefore,to reduce the total travel time, one should decrease the waiting time in these areas concurrently.The current study presents a TLBO-CC approach in VANET to reduce the travel time in the course of road trips.The presented approach decreases the waiting time at intersection through route optimization i.e.,by evading congestion en route.This results in travel cost reduction due to decrease in the consumption of fuel and mitigated health hazards like skin disease or asthma or lung-related disorders or irritation to eyes that occur as a result of engine emission and so on.In current situation, vehicles should wait for a long period of time to get their turn to cross the connections, because of pre-timed signal or actuated signal with predetermined time estimation method.This method does not take into account the actual vehicle density.In general, each driver tends to select the shortest route to reach the destination which in turn increases the congestion in that specific route, owing to huge number of vehicles, utilizing the specific route.So, in current study, this parameter is optimized concurrently with TLBO-CC approach to reduce the trip time.In the presented method, TLBO-CC approach is enhanced by integrating preemptive traffic signals instead of average traffic signals faced during travel to the destination.Once the TLBO-CC approach is executed, the commuters are capable of reducing their waiting time at the intersection with non-congested optimized path.This results in lesser travel time that additionally decreases the traveling cost to reach the destination, due to low consumption of fuel.

    A fitness function is assumed which is dependent upon various parameters like network throughput, residual energy, and packet loss rate to control congestion in VANET:

    whereiimplies the iteration in the range of [1-N] (entire number of nodes),

    w1,w2,w3, andw4represent the weights supplied to this technique,

    τ refers to the throughput of networks,PLrepresents the normalization packet lost rate from the network

    dj,isignifies the distance between node i as well as j

    Estands for residual energy of all the nodes in the network.

    2.2 Design of GRU-DoSD Technique

    GRU method is generally used in the allocation of appropriate class labels for DoS attacks.RNN signifies Neural Network (NN) with one or more recurrent layers in hidden layers.However, it differs from other networks in its reception of input data.It is commonly employed for series data and is approximately connected with data regarding time order,language, weather, and stock price.RNN is a feedback framework that attains and employs the outcome of completed layers as its input.Therefore,the previous data affects the outcome.RNN is planned well to process the time order data; it employs weight as well as bias frequently by passing the data into cyclic vectors.It gains an input vector X and makes the resultant vector, y.It is considered as output as well as input with unrestricted length and Fully Connected (FC) designs.The network of many styles and shapes is developed by changing its structure.The current RNNs are a long-term dependency problem [19].The weight converges at zero while it deviates at infinity as the time lag increases.Hence, LSTM is projected to resolve the long-term dependence issue of existing RNNs.It can be a modified structure of RNN and is considered as the occurrence of cell state.LSTM contains output, input, and forget gates.All the gates control values using sigmoid layer and pointwise multiplication.LSTM has an outstanding ability to remember long term dependence.So, it gets a long time to train the manner, due to its difficult framework.Thus,GRU is projected to speed up the trained method.It is a type of RNN framework that utilizes gate approach and is enthused by LSTM and east framework.

    GRU is different from LSTM while the latter contains three gate functions that are dependent upon RNN network such as output, input, and forgetting gates to resultant values, control input, and memory correspondingly.However, the two gates are projected in GRU manner i.e., reset and upgrade gates.But σ represents the gating function.Fig.2 illustrates the framework of GRU.

    Figure 2: Structure of GRU

    GRU integrates input as well as forgetting gates of LSTM for single upgrade gate.These procedures effectually reduce the amount of computations and the probabilities of gradient explosion/disappearance.In particular, the functioning approach is provided as follows

    WhileZtandrtimply the reset and upgrade gates correspondingly,Wz,Wr,WandWsignify the weight parameters of input data,ht-1denotes the output of prior layer, andxtrefers to the input of current layer.bz,brandbhdemonstrate the biases,σ stands for sigmoid function whereastanhis employed to change the value flow by networks.The resultant values i.e.,σ andtanhfunctions are organized between (0, 1) and (-1,1) correspondingly

    Then, the final outcome is obtained and the loss value is evaluated with the help of loss function.

    whereEtrefers to the loss of single sample at a certain time,ydsignifies the real label data,demonstrates the resultant value of primary iteration, andEimplies the loss of single instance at always.

    BP technique is employed in this study to learn the networks.So, the partial derivatives of loss function are evaluated to all the parameters.Then, the parameter is upgraded and the loss convergence is iteratively defined.

    In order to optimally alter the hyperparameters present in GRU technique, NADAM optimizer is utilized.NADAM optimizer has tried to integrate Nesterov’s accelerated adaptive moment estimate with Adam.An essential advantage of this combined technique is that the employed adaptive moment estimation assists in the execution of most precise stage in a gradient way.This occurs by upgrading the process variables with momentum phase, before the calculation of gradient [20].The upgrade rule of NADAM is demonstrated herewith.

    But

    3 Performance Validation

    The current section demonstrates the results of the analysis attained by the presented algorithm in terms of reduced travel time and detection of DoS attacks.The proposed model was simulated using MATLAB tool.The results were examined under varying number of vehicles and prediction intervals.Tab.1 and Fig.3 shows the results of Total Distance Covered (TDC) analysis of TLBO-CC method with recent techniques under varying number of vehicles in metres.The results show that the proposed TLBO-CC approach accomplished effectual outcomes with the least TDC value under distinct vehicle counts.For instance, with 300 vehicles, TLBO-CC technique produced a low TDC of 3316 m, whereas ACO, EACO, MACO, and HAPO techniques achieved high TDC values such as 5793, 6831, 7442,and 7042 m respectively.Besides, with 1200 vehicles, the proposed TLBO-CC approach accomplished a less TDC of 7674 m, whereas ACO, EACO, MACO, and HAPO methods got improved TDC values like 9629, 16450, 18920, and 17193 m correspondingly.With 2100 vehicles, the proposed TLBO-CC technique attained a low TDC of 18382 m, whereas other techniques such as ACO, EACO, MACO,and HAPO obtained superior TDC values such as 20841, 28693, 32465, and 28577 m respectively.Furthermore, with 3300 vehicles, TLBO-CC method yielded a low TDC of 32047 m, whereas ACO,EACO,MACO,and HAPO schemes achieved enhanced TDC values namely,34946,44422,49271,and 43659 m correspondingly.Moreover, with 4500 vehicles, the proposed TLBO-CC method produced a reduced TDC of 40657 m, whereas ACO, EACO, MACO, and HAPO algorithms accomplished the maximum TDC values such as 43048, 55976, 61569, and 55319 m correspondingly.

    Figure 3: TDC analysis of TLBO-CC model under different counts of vehicles

    Table 1: Results of TDC analysis accomplished by TLBO-CC technique (m)

    Tab.2 and Fig.4 shows the results from Total Travel Time (TTT) analysis achieved by the proposed TLBO-CC technique against recent methods under varying number of vehicles.The results show that the proposed TLBO-CC algorithm outperformed other methods and produced effective outcomes with the least TTT under varying vehicle counts.For sample, with 300 vehicles, TLBO-CC approach resulted in a reduced TTT of 279 s, whereas ACO, EACO, MACO, and HAPO methods accomplished enhanced TTT values such as 578, 564, 513, and 498 s respectively.Similarly, with 1200 vehicles, TLBO-CC technique produced a low TTT of 773 s, whereas ACO, EACO, MACO, and HAPO methods accomplished superior TTT values such as 1328, 1115, 1303, and 1027 s respectively.Likewise, with 2100 vehicles, TLBO-CC technique achieved a low TTT of 1339 s, whereas ACO,EACO, MACO, and HAPO approaches offered increased TTT values such as 2147, 1892, 2034, and 1634 s respectively.In addition to these, with 3300 vehicles, TLBO-CC method resulted in a decreased TTTvalueof1808s,whereas ACO,EACO,MACO,and HAPO techniques produced high TTT values such as 3109, 2450, 2718, and 2162 s respectively.Finally, with 4500 vehicles, the proposed TLBO-CC method accomplished a low TTT of 2404 s, whereas ACO, EACO, MACO, and HAPO approaches obtained high TTT values namely, 3841, 2935, 3547, and 2743 s correspondingly.

    Figure 4: TTT analysis of TLBO-CC model under different counts of vehicles

    Table 2: Results of TTT analysis accomplished by TLBO-CC technique (sec)

    Tab.3 and Fig.5 shows the results of Prediction Variance (PV) analysis accomplished by IDoSCC technique against state-of-the-art algorithms under varying prediction intervals in 100 nodes.The results demonstrate that the proposed IDoS-CC algorithm accomplished effective outcomes with the worst PV under different vehicle counts.For instance, with 10 intervals, the IDoS-CC method produced a low PV of 154.08 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA methods achieved the highest PV values namely, 170.36, 169.90, 167.42, and 156.34 s correspondingly.

    Table 3: Results of the analysis of IDoS-CC technique in terms of Prediction Variance (PV) under 100 nodes

    Figure 5: Prediction variance analysis results of IDoS-CC model under 100-nodes

    Likewise, with 30 intervals, IDoS-CC technique produced a reduced PV value of 160.64 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques offered increased PV values such as 187.31, 184.82, 183.24, and 164.25 s respectively.Also, with 50 intervals, the proposed IDOS-CC technique resulted in a reduced PV value of 167.42 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA algorithms accomplished enhanced PV values namely, 213.08, 197.26, 171.94, and 167.42 s respectively.In addition to these, with 70 intervals, IDoS-CC technique resulted in a reduced PV value of 173.75 s, whereas other techniques namely, CA-PSO, CA-GA, CA-ACOS, and CA-IACOA achieved high PV values such as 225.52, 210.37, 207.66, and 179.17 s respectively.Eventually, with 100 intervals, IDoS-CC technique produced a less PV value of 181.43 s, whereas CA-PSO, CA-GA, CAACOS, and CA-IACOA methodologies obtained improved PV values namely, 238.17, 224.84, 218.28,and 192.51 s correspondingly.

    Tab.4 and Fig.6 shows the results of PV analysis attained by IDoS-CC method against recent algorithms under varying prediction intervals in 200 nodes.The results showcase that IDoS-CC manner accomplished effectual outcomes with the least PV under varying vehicle counts.For instance, with 10 intervals, IDoS-CC technique produced a less PV of 155.79 s, whereas CA-PSO, CA-GA, CAACOS, and CA-IACOA techniques achieved high PV values namely, 170.66 s, 168.89 s, 189.28 s, and 161.79 s correspondingly.Followed by, with 30 intervals, IDoS-CC technique resulted in a reduced PV value of 160.62 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA algorithms presented superior PV values namely, 187.28, 184.40, 203.91, and 167.56 s correspondingly.Along with these, with 50 intervals, the proposed IDOS-CC technique resulted in a reduced PV value of 165.81 s, whereas CA-PSO,CA-GA,CA-ACOS, and CA-IACOA methods obtained improved PV values such as 212.99, 194.60, 209.89, and 175.76 s correspondingly.Furthermore, with 70 intervals, the proposed IDoSCC algorithm accomplished a low PV value of 175.88 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques offered the maximum PV values namely, 225.85, 210.78, 217.87, and 182.85 s respectively.At the same time, with 100 intervals, IDoS-CC method resulted in a reduced PV value of 189.13 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA approaches accomplished high PV values such as 238.04, 224.52, 244.91, and 197.04 s correspondingly.

    Figure 6: Prediction variance analysis of IDoS-CC model under 200-nodes

    Table 4: Results of the analysis of IDoS-CC technique in terms of Prediction variance (PV) under 200 nodes

    Table 4: Continued

    Fig.7 shows the results of PV analysis accomplished by IDoS-CC method against other stateof-the-art approaches under varying prediction intervals in 100 nodes.The results portray that the proposed IDoS-CC approach accomplished an effectual outcome with the least PV under distinct vehicle counts.For instance,with10intervals,the proposed IDoS-CC technique resulted in a low PV of 5.24s,whereas other techniques such as CA-PSO,CA-GA,CA-ACOS,and CA-IACOA accomplished increased PV values namely, 5.80, 5.71, 5.53, and 5.37 s correspondingly.Moreover, with 30 intervals,IDoS-CC technique achieved a low PV of 5.22 s, whereas CA-PSO, CA-GA, CA-ACOS, and CAIACOA techniques offered the maximum PV values such as 5.62, 5.64, 5.45, and 5.27 s respectively.Similarly, with 50 intervals, the proposed IDOS-CC technique resulted in a reduced PV value of 5.15 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques achieved increased PV values namely, 5.48, 5.54, 5.36, and 5.22 s respectively.Besides, with 70 intervals, IDoS-CC method resulted in a reduced PV value of 5.11 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques accomplished high PV values namely, 5.44, 5.46, 5.29, and 5.16 s correspondingly.Likewise, with 100 intervals, the IDoS-CC technique resulted in a reduced PV value of 4.74 s, whereas CA-PSO, CA-GA,CA-ACOS, and CA-IACOA techniques achieved high PV values such as 5.36, 5.36, 5.21, and 4.98 s correspondingly.

    Figure 7: Prediction variance analysis of IDoS-CC model under 100-nodes

    Tab.5 explores the results accomplished during PV analysis by IDoS-CC technique against recent algorithms under different prediction intervals in 200 nodes.The results show that the proposed IDoSCC method outperformed other methods through its effectual outcomes with the least PV under distinct vehicle counts.

    Table 5: Results of the analysis of IDoS-CC technique in terms of Prediction Variance (PV) under 200nodes

    For instance, with 10 intervals, the proposed IDoS-CC technique resulted in a reduced PV value of 5.15 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques accomplished high PV values namely, 5.60, 5.70, 5.50, and 5.22 s correspondingly.Followed by, with 30 intervals, the IDoSCC method produced a low PV of 5.09 s, whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques achieved improved PV values such as 5.45, 5.61, 5.40, and 5.18 s respectively.Also, with 50 intervals, the proposed IDOS-CC technique resulted in a low PV value of 5.04 s, whereas CA-PSO,CA-GA, CA-ACOS, and CA-IACOA schemes offered increased PV values namely, 5.40, 5.51, 5.31,and 5.13 s respectively.Likewise, with 70 intervals, IDoS-CC technique attained a low PV of 4.97 s,whereas CA-PSO, CA-GA, CA-ACOS, and CA-IACOA techniques obtained high PV values such as 5.34, 5.42, 5.23, and 5.04 s correspondingly.Eventually, with 100 intervals, the proposed IDoSCC technique resulted in a reduced PV of 4.78 s, whereas CA-PSO, CA-GA, CA-ACOS, and CAIACOA techniques offered high PV values namely,5.23,5.31,5.15,and4.85s correspondingly.A series of simulation analyses was conducted and the results are discussed above which highlight the better outcomes of IDoS-CC technique.The proposed technique reduced the congestion and successfully identified DoS attacks in the network.

    4 Conclusion

    In current research work, a new IDoS-CC approach is designed for VANET.The goal of theproposed IDoS-CC technique is to reduce the level of congestion and detect the attacks that exist in the network.It includes two-stage processes namely TLBO-CC based congestion control andGRU-DoSD based attack detection.IDoS-CC technique includes TLBO algorithm to optimize the routes taken by vehicles via traffic signals and to minimize the congestion instantaneously on a particular route so as to assure minimal fuel utilization.TLBO is applied to avoid congestion on roadways.Besides, GRUDoSD model is also employed as a classification model to effectively distinguish the compromised as well as genuine vehicles in the network.A series of simulation analyses was conducted and the outcomes illustrate the supremacy of the proposed IDoS-CC technique.The proposed method reduced the congestion and successfully identified DoS attacks in the network.In future, the hyperparameter tuning of the GRU model can be derived by multi-objective TLBO algorithm in order to improve detection accuracy.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/23/42).This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲中文字幕一区二区三区有码在线看| 亚洲精品,欧美精品| 美女脱内裤让男人舔精品视频| 亚洲av二区三区四区| 亚洲在久久综合| 高清视频免费观看一区二区 | 欧美zozozo另类| 亚洲av免费在线观看| 亚洲乱码一区二区免费版| 成人国产麻豆网| 深夜a级毛片| 国产精品无大码| 久久99蜜桃精品久久| av在线观看视频网站免费| 久久精品夜夜夜夜夜久久蜜豆| 九草在线视频观看| 日韩欧美在线乱码| 搞女人的毛片| 波多野结衣巨乳人妻| 成人午夜精彩视频在线观看| 啦啦啦啦在线视频资源| 欧美成人a在线观看| 舔av片在线| 国产精品女同一区二区软件| 亚洲18禁久久av| 亚洲国产欧美人成| 嫩草影院精品99| 美女黄网站色视频| 国产成人福利小说| 最近视频中文字幕2019在线8| 久久99热这里只频精品6学生 | 亚洲最大成人手机在线| 成人性生交大片免费视频hd| 久久精品国产99精品国产亚洲性色| 级片在线观看| 一卡2卡三卡四卡精品乱码亚洲| 男女那种视频在线观看| 亚洲人成网站在线观看播放| 老师上课跳d突然被开到最大视频| 国产精品永久免费网站| 久久精品国产鲁丝片午夜精品| 久久久国产成人免费| 久久99热这里只有精品18| 丰满人妻一区二区三区视频av| 国产精品国产三级国产av玫瑰| 亚洲精品,欧美精品| 亚洲精品自拍成人| 欧美日韩国产亚洲二区| 日韩高清综合在线| 美女xxoo啪啪120秒动态图| 我要看日韩黄色一级片| 久久久久九九精品影院| 中文字幕精品亚洲无线码一区| 亚洲精品456在线播放app| 成人美女网站在线观看视频| 亚洲无线观看免费| 美女脱内裤让男人舔精品视频| 欧美一区二区精品小视频在线| 神马国产精品三级电影在线观看| 婷婷色综合大香蕉| 九九久久精品国产亚洲av麻豆| 亚洲欧美日韩无卡精品| 色吧在线观看| 欧美+日韩+精品| 国产中年淑女户外野战色| 久久精品国产亚洲网站| 国产中年淑女户外野战色| 国产精品国产三级国产专区5o | 赤兔流量卡办理| 尾随美女入室| 插逼视频在线观看| 久久精品91蜜桃| 亚洲中文字幕一区二区三区有码在线看| av天堂中文字幕网| 亚洲av二区三区四区| 欧美日韩一区二区视频在线观看视频在线 | 99热这里只有是精品50| 成人欧美大片| 亚洲欧美日韩东京热| 熟女电影av网| 亚洲精品,欧美精品| 99热网站在线观看| 九色成人免费人妻av| 一夜夜www| 国产老妇伦熟女老妇高清| 国产一级毛片在线| 久久久精品大字幕| 国产精品一区二区三区四区免费观看| 亚洲欧美精品自产自拍| 免费播放大片免费观看视频在线观看 | 欧美最新免费一区二区三区| 亚洲经典国产精华液单| 免费看a级黄色片| 国产av不卡久久| 久久6这里有精品| 亚洲欧美中文字幕日韩二区| 蜜桃久久精品国产亚洲av| 天堂av国产一区二区熟女人妻| www.av在线官网国产| 天天躁夜夜躁狠狠久久av| 我的女老师完整版在线观看| 亚洲av熟女| 精品无人区乱码1区二区| 国产高清三级在线| 老司机影院毛片| 精华霜和精华液先用哪个| 国产成人免费观看mmmm| 亚洲最大成人av| 欧美色视频一区免费| 九九爱精品视频在线观看| 亚洲国产日韩欧美精品在线观看| 日本免费在线观看一区| av在线观看视频网站免费| 美女黄网站色视频| 免费观看性生交大片5| 午夜爱爱视频在线播放| 九九久久精品国产亚洲av麻豆| 国产精品,欧美在线| 免费电影在线观看免费观看| 久久婷婷人人爽人人干人人爱| 国产精品三级大全| 九色成人免费人妻av| 亚洲av成人av| 18禁在线播放成人免费| 亚洲高清免费不卡视频| 精品久久久久久久末码| 久久精品夜色国产| 免费在线观看成人毛片| 亚洲精品一区蜜桃| 日本三级黄在线观看| 国产成人aa在线观看| 99久久成人亚洲精品观看| 老师上课跳d突然被开到最大视频| 国模一区二区三区四区视频| 国产高清国产精品国产三级 | 不卡视频在线观看欧美| 三级男女做爰猛烈吃奶摸视频| 国产av在哪里看| 亚洲18禁久久av| 激情 狠狠 欧美| 美女内射精品一级片tv| 热99re8久久精品国产| 午夜爱爱视频在线播放| 一区二区三区四区激情视频| 日韩大片免费观看网站 | 日韩精品有码人妻一区| 婷婷色综合大香蕉| 国产精品国产三级国产av玫瑰| 97在线视频观看| 亚洲aⅴ乱码一区二区在线播放| 在现免费观看毛片| 欧美xxxx性猛交bbbb| 99久久人妻综合| 18+在线观看网站| 99久久九九国产精品国产免费| 亚洲欧美成人精品一区二区| 黄色一级大片看看| av.在线天堂| 五月伊人婷婷丁香| 国产欧美另类精品又又久久亚洲欧美| av在线天堂中文字幕| 久久6这里有精品| 国产精品国产三级国产专区5o | 日本wwww免费看| 偷拍熟女少妇极品色| 久久久久网色| 久久久久久久久久久丰满| 女人久久www免费人成看片 | 乱码一卡2卡4卡精品| 国产熟女欧美一区二区| 哪个播放器可以免费观看大片| av在线天堂中文字幕| 一级黄片播放器| 啦啦啦韩国在线观看视频| 人体艺术视频欧美日本| 最新中文字幕久久久久| 亚洲av一区综合| 麻豆精品久久久久久蜜桃| 亚洲av中文字字幕乱码综合| 免费观看在线日韩| 日韩欧美三级三区| 精品一区二区三区视频在线| 不卡视频在线观看欧美| 欧美精品国产亚洲| 国产亚洲av嫩草精品影院| 欧美变态另类bdsm刘玥| 亚洲精品亚洲一区二区| 高清av免费在线| 国产淫片久久久久久久久| 成人综合一区亚洲| 精品久久久久久久久亚洲| 男人的好看免费观看在线视频| 丝袜喷水一区| 九九在线视频观看精品| 久久久久久伊人网av| 国产亚洲精品久久久com| av在线老鸭窝| 高清午夜精品一区二区三区| 亚洲精品色激情综合| 成人性生交大片免费视频hd| 亚洲高清免费不卡视频| 春色校园在线视频观看| av线在线观看网站| 麻豆成人av视频| 我的老师免费观看完整版| 亚洲精品aⅴ在线观看| 少妇人妻一区二区三区视频| 日本wwww免费看| 日本免费a在线| 精品欧美国产一区二区三| 亚洲国产精品国产精品| 国产成人freesex在线| 2022亚洲国产成人精品| 国产精品日韩av在线免费观看| 毛片一级片免费看久久久久| 男人狂女人下面高潮的视频| 国产伦理片在线播放av一区| 精品人妻偷拍中文字幕| av又黄又爽大尺度在线免费看 | 免费黄网站久久成人精品| 伊人久久精品亚洲午夜| 人人妻人人澡欧美一区二区| 观看美女的网站| 久久久国产成人精品二区| 波多野结衣巨乳人妻| 免费观看在线日韩| 免费av毛片视频| 久久国内精品自在自线图片| 国产精品不卡视频一区二区| 九色成人免费人妻av| 国产91av在线免费观看| 国产熟女欧美一区二区| 国产黄a三级三级三级人| 久久精品久久久久久久性| 美女脱内裤让男人舔精品视频| 乱人视频在线观看| 免费黄网站久久成人精品| 亚洲最大成人中文| 欧美性猛交黑人性爽| 欧美成人精品欧美一级黄| 精品久久久噜噜| 国产一级毛片七仙女欲春2| 成人特级av手机在线观看| 国产一级毛片在线| 欧美三级亚洲精品| 国产男人的电影天堂91| 国产精品久久久久久精品电影小说 | av在线观看视频网站免费| 国产成人a∨麻豆精品| 亚洲人成网站高清观看| 午夜福利网站1000一区二区三区| 变态另类丝袜制服| 国产在视频线精品| 亚洲av成人精品一区久久| 国产黄片美女视频| 国产三级在线视频| 青青草视频在线视频观看| 国产视频内射| 国产精品人妻久久久久久| 亚洲真实伦在线观看| av视频在线观看入口| 国产久久久一区二区三区| 国产精品久久久久久久电影| av又黄又爽大尺度在线免费看 | 国产午夜精品论理片| 高清日韩中文字幕在线| 中文字幕熟女人妻在线| 干丝袜人妻中文字幕| 国产伦理片在线播放av一区| eeuss影院久久| 亚洲最大成人av| 国产乱来视频区| 99久久九九国产精品国产免费| 亚洲精品日韩av片在线观看| 深爱激情五月婷婷| 在现免费观看毛片| 亚洲在线自拍视频| 永久免费av网站大全| 在线观看一区二区三区| 色综合站精品国产| 亚洲欧美日韩高清专用| 成人一区二区视频在线观看| 国产高潮美女av| 日本猛色少妇xxxxx猛交久久| 中文乱码字字幕精品一区二区三区 | 国语对白做爰xxxⅹ性视频网站| 级片在线观看| 九九在线视频观看精品| 国产一区亚洲一区在线观看| 亚洲欧美中文字幕日韩二区| 亚洲人成网站在线观看播放| 免费播放大片免费观看视频在线观看 | 日本一二三区视频观看| 在线观看66精品国产| 深爱激情五月婷婷| 亚洲国产日韩欧美精品在线观看| 色哟哟·www| 国产在视频线在精品| 精品久久久久久久久亚洲| 国产中年淑女户外野战色| 国产午夜福利久久久久久| 日日摸夜夜添夜夜爱| 午夜免费男女啪啪视频观看| 少妇的逼好多水| 老女人水多毛片| 精品国产三级普通话版| 男人狂女人下面高潮的视频| 22中文网久久字幕| 免费搜索国产男女视频| 观看免费一级毛片| 2022亚洲国产成人精品| 午夜亚洲福利在线播放| 亚洲久久久久久中文字幕| 国产极品精品免费视频能看的| 九九热线精品视视频播放| 狂野欧美白嫩少妇大欣赏| 中文字幕av在线有码专区| 国产极品天堂在线| 视频中文字幕在线观看| 中文字幕制服av| 国产av码专区亚洲av| 欧美精品国产亚洲| 三级毛片av免费| 亚洲人成网站在线观看播放| 精品人妻视频免费看| 亚洲aⅴ乱码一区二区在线播放| 久久精品国产鲁丝片午夜精品| 99视频精品全部免费 在线| 国产成人免费观看mmmm| 成人性生交大片免费视频hd| 特级一级黄色大片| 菩萨蛮人人尽说江南好唐韦庄 | 成人午夜精彩视频在线观看| 精品人妻视频免费看| 久久久久网色| 两个人的视频大全免费| 在线免费十八禁| 亚洲欧美精品自产自拍| 亚洲欧美日韩高清专用| 纵有疾风起免费观看全集完整版 | 欧美一区二区国产精品久久精品| 亚洲久久久久久中文字幕| 久久国产乱子免费精品| 欧美成人免费av一区二区三区| 国产精品无大码| a级毛色黄片| 在线观看av片永久免费下载| 欧美xxxx性猛交bbbb| 亚洲精品aⅴ在线观看| 亚洲四区av| 亚洲中文字幕日韩| 毛片女人毛片| 午夜福利网站1000一区二区三区| 在线免费十八禁| 国产精品一区二区性色av| 国产精华一区二区三区| 九草在线视频观看| 99在线人妻在线中文字幕| 国产一级毛片在线| 人人妻人人澡欧美一区二区| 干丝袜人妻中文字幕| 欧美日本亚洲视频在线播放| 青春草国产在线视频| 国产极品天堂在线| 成人鲁丝片一二三区免费| 自拍偷自拍亚洲精品老妇| 韩国av在线不卡| 日日啪夜夜撸| 99热这里只有是精品在线观看| 日韩一本色道免费dvd| 国产精品美女特级片免费视频播放器| ponron亚洲| 1024手机看黄色片| 色播亚洲综合网| 国产精品一区二区三区四区免费观看| av卡一久久| 少妇高潮的动态图| 国产精品久久久久久av不卡| 欧美日韩综合久久久久久| 天天躁日日操中文字幕| 精品少妇黑人巨大在线播放 | 十八禁国产超污无遮挡网站| 91av网一区二区| 亚洲精品国产av成人精品| 国产成人午夜福利电影在线观看| 热99在线观看视频| 午夜激情欧美在线| 最近中文字幕2019免费版| 欧美一区二区亚洲| 亚洲欧美日韩东京热| av视频在线观看入口| 国产精品国产高清国产av| 日韩av在线大香蕉| 人体艺术视频欧美日本| 在现免费观看毛片| 久久精品人妻少妇| 简卡轻食公司| 欧美区成人在线视频| 日本免费a在线| 成人一区二区视频在线观看| 亚洲av成人av| 国产av一区在线观看免费| av免费观看日本| 女的被弄到高潮叫床怎么办| 免费播放大片免费观看视频在线观看 | 日韩成人伦理影院| 99在线人妻在线中文字幕| 国产在视频线在精品| 丰满人妻一区二区三区视频av| 中文在线观看免费www的网站| 3wmmmm亚洲av在线观看| 精品无人区乱码1区二区| 欧美又色又爽又黄视频| 久久草成人影院| 26uuu在线亚洲综合色| 国产久久久一区二区三区| 亚洲成人中文字幕在线播放| 久久精品国产亚洲网站| 又粗又爽又猛毛片免费看| 午夜福利在线观看吧| 色综合色国产| videossex国产| 欧美日韩一区二区视频在线观看视频在线 | 麻豆精品久久久久久蜜桃| 午夜福利在线观看免费完整高清在| 免费看美女性在线毛片视频| 成人一区二区视频在线观看| 久久久久久伊人网av| 国产精品蜜桃在线观看| 色综合亚洲欧美另类图片| 国产高清三级在线| 久久久久久久午夜电影| 精品少妇黑人巨大在线播放 | 人妻夜夜爽99麻豆av| 国产成人aa在线观看| 蜜臀久久99精品久久宅男| 男人狂女人下面高潮的视频| 日本wwww免费看| 中文字幕亚洲精品专区| 汤姆久久久久久久影院中文字幕 | 亚洲欧美一区二区三区国产| 国产熟女欧美一区二区| 岛国在线免费视频观看| 成人一区二区视频在线观看| 亚洲伊人久久精品综合 | 国产免费一级a男人的天堂| 国产麻豆成人av免费视频| 婷婷色麻豆天堂久久 | 久久婷婷人人爽人人干人人爱| 高清在线视频一区二区三区 | 午夜福利成人在线免费观看| 真实男女啪啪啪动态图| 久久久成人免费电影| 又爽又黄a免费视频| 亚洲自偷自拍三级| 免费av观看视频| 最近中文字幕高清免费大全6| 亚洲av二区三区四区| 一二三四中文在线观看免费高清| 久久亚洲国产成人精品v| 中国国产av一级| 不卡视频在线观看欧美| 亚洲va在线va天堂va国产| 午夜福利在线观看免费完整高清在| 一边摸一边抽搐一进一小说| 伦理电影大哥的女人| 久久久久久国产a免费观看| 日本三级黄在线观看| 国产精品福利在线免费观看| 老司机影院成人| 天天一区二区日本电影三级| 国产一区二区亚洲精品在线观看| 色尼玛亚洲综合影院| 日本与韩国留学比较| 成人av在线播放网站| 欧美最新免费一区二区三区| 亚洲精品国产成人久久av| 国产高清三级在线| 国产伦精品一区二区三区视频9| 亚洲精品456在线播放app| 亚洲精品自拍成人| 国产精品久久久久久精品电影小说 | 男女啪啪激烈高潮av片| 国模一区二区三区四区视频| www.av在线官网国产| 嫩草影院新地址| 久久久久久久久久成人| 欧美性猛交黑人性爽| 久久这里有精品视频免费| 黑人高潮一二区| 乱码一卡2卡4卡精品| 高清日韩中文字幕在线| 成人亚洲精品av一区二区| 亚洲成人中文字幕在线播放| 国产单亲对白刺激| 自拍偷自拍亚洲精品老妇| 色视频www国产| 汤姆久久久久久久影院中文字幕 | 午夜精品一区二区三区免费看| 我要看日韩黄色一级片| av福利片在线观看| 最近的中文字幕免费完整| 精品人妻视频免费看| 中文在线观看免费www的网站| 一级毛片电影观看 | 男女边吃奶边做爰视频| www.av在线官网国产| 大香蕉97超碰在线| 日本与韩国留学比较| 精品久久久久久久久久久久久| av又黄又爽大尺度在线免费看 | 国产一区二区在线av高清观看| 亚洲在久久综合| 春色校园在线视频观看| 2021天堂中文幕一二区在线观| 亚洲精品一区蜜桃| 淫秽高清视频在线观看| av天堂中文字幕网| 精品无人区乱码1区二区| 日本wwww免费看| 成人午夜精彩视频在线观看| 久久韩国三级中文字幕| 人妻夜夜爽99麻豆av| 久久久国产成人精品二区| 美女黄网站色视频| 国产伦一二天堂av在线观看| 禁无遮挡网站| 亚洲欧美日韩无卡精品| 亚洲av成人精品一区久久| 一级毛片久久久久久久久女| 欧美三级亚洲精品| 婷婷色av中文字幕| 五月玫瑰六月丁香| 日本熟妇午夜| 麻豆成人午夜福利视频| 少妇丰满av| 夜夜爽夜夜爽视频| 成人午夜高清在线视频| 亚洲精品aⅴ在线观看| 欧美成人免费av一区二区三区| 国产男人的电影天堂91| 久久久久国产网址| 国产人妻一区二区三区在| 亚洲成人精品中文字幕电影| 中文在线观看免费www的网站| 青春草亚洲视频在线观看| 99视频精品全部免费 在线| 麻豆精品久久久久久蜜桃| 我的女老师完整版在线观看| 国产伦一二天堂av在线观看| 毛片女人毛片| 亚洲精品成人久久久久久| 国产淫语在线视频| 少妇裸体淫交视频免费看高清| 久久久久国产网址| 能在线免费看毛片的网站| 日本免费一区二区三区高清不卡| 特大巨黑吊av在线直播| 国产成人91sexporn| 久久久精品大字幕| 久久精品综合一区二区三区| 国产在线男女| 五月玫瑰六月丁香| av黄色大香蕉| 高清av免费在线| 亚洲不卡免费看| 村上凉子中文字幕在线| 欧美丝袜亚洲另类| 成人国产麻豆网| 少妇的逼水好多| 能在线免费看毛片的网站| 2021天堂中文幕一二区在线观| 亚洲av电影不卡..在线观看| 久久久久久久久大av| 亚洲精品乱码久久久v下载方式| 91av网一区二区| 18禁动态无遮挡网站| 国产一区二区在线观看日韩| 乱码一卡2卡4卡精品| 99九九线精品视频在线观看视频| 成年女人看的毛片在线观看| 18禁动态无遮挡网站| 国产一区二区亚洲精品在线观看| 老司机影院毛片| 成年免费大片在线观看| 中文精品一卡2卡3卡4更新| 欧美不卡视频在线免费观看| 99热6这里只有精品| 哪个播放器可以免费观看大片| 国产精品永久免费网站| 在线免费观看的www视频| 欧美97在线视频| 国产av不卡久久| 小蜜桃在线观看免费完整版高清| 男女国产视频网站| 国产免费男女视频| videos熟女内射| 精品国产一区二区三区久久久樱花 | 最新中文字幕久久久久| 欧美成人午夜免费资源| 九九久久精品国产亚洲av麻豆| 黄色欧美视频在线观看| 激情 狠狠 欧美| 女人久久www免费人成看片 | 久久久久免费精品人妻一区二区| 国产精品爽爽va在线观看网站| 精品国内亚洲2022精品成人| 长腿黑丝高跟| 中国美白少妇内射xxxbb| 日本av手机在线免费观看| 亚洲av二区三区四区| 欧美色视频一区免费| 中文欧美无线码| 在线播放国产精品三级| 久久精品综合一区二区三区|