• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    2022-08-24 12:58:20ChandrashekharMeshramAgbotinameLuckyImoizeSajjadShaukatJamalParkashTambareAdelAlharbiandIqtadarHussain
    Computers Materials&Continua 2022年7期

    Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal,Parkash Tambare, Adel R.Alharbiand Iqtadar Hussain

    1Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, 460001, M.P., India

    2Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos,100213, Nigeria

    3Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University,44801, Bochum, Germany

    4Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia

    5Water Resources & Applied Mathematics Research Lab, Nagpur, 440027, India

    6College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia

    7Mathematics Program, Department of Mathematics, Statistics and Physics, College of Arts and Sciences,Qatar University, 2713, Doha, Qatar

    Abstract: The Human-Centered Internetof Things(HC-IoT)isfastbecoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement.Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive.In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps.The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table.The projected security scheme utilized a hash function,which works well for the resource-limited HC-IoT architectures.Test results show that our new technique is resistant to password guessing attacks since it does not use a password.Furthermore, our approach provides users with comprehensive privacy protection, ensuring that a user forgery attack causes no harm.Finally, our new technique offers better security features than the techniques currently available in the literature.

    Keywords: Three-party authenticated key agreement; anonymity; fractional chaotic maps; Chebyshev polynomial; password table; human-centered internet of things (HC-IoT)

    1 Introduction

    Security and privacy issues are fast proliferating the Human-Centered Internet of Things (HCIoT) space [1].As billions of user data are being collected and transmitted by IoT devices via open channels, the vulnerability of user data to adversarial attacks needs to be considered and addressed appropriately.Unauthorized users can gain real-time access to the HC-IoT devices unlawfully.Consequently, sensitive user data is compromised, leading to a catastrophic disruption of safetycritical processes under HC-IoT architectures.Therefore, the need for secure authenticated key agreement protocols to mitigate the vast security and privacy issues in HC-IoT systems cannot be overemphasized.

    Several user authentications and key agreement techniques have been reported for HC-IoT systems [2].Generally, the HC-IoT devices are resource-limited [3].Therefore, applying complex cryptographic primitives to these devices is quite challenging due to their resource constraints.Some authors have proposed Elliptic Curve Cryptography (ECC) to guarantee secure session keys between legitimate users in IoT environments [4-6].However, HC-IoT devices cannot support ECC operations due to limited storage and computational resources.In order to address this problem, lightweight authentication and key agreement schemes have been proposed [5,7,8].It is worth mentioning that most of these schemes are specially designed to reduce the computational and communication costs inherent in the ECC schemes.

    Authentication schemes can support fast computational processing of user information and low communication costs.However, most of these security schemes are susceptible to various attacks and cannot provide critical security requirements [8,9].Thus, the problem of improving the authentication efficiency and simultaneously guaranteeing the security and privacy of the scheme remains.In order to solve this problem, our work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architectures without a password table.

    1.1 Motivation

    In recent years, several studies have reported the prevalent security and privacy issues in HC-IoT architectures.Generally, these architectures communicate over public channels, which are vulnerable to several attacks inside and outside the networks.In particular, sensitive user information can be compromised when a malicious user unlawfully intercepts or accesses the HC-IoT devices [9].Thus,it is imperative to adequately secure user authentication schemes to mitigate unscrupulous access to critical user data.In this case, the identities of all network users would require validation in real-time and access is denied to unauthorized users.In related works, a one-way cryptographic algorithm, a hash function, has been used to map input of any size to an individual output of a fixed length of bits.This helps to provide data integrity and guarantee security against unauthorized access.

    In the preliminary schemes, only one HC-IoT device can be accessed by a particular user at a time.Thus, repeated user identity validation is required to access multiple sensing HC-IoT devices.However, this approach is time-consuming and cost-prohibitive to implement in practice.Therefore,the need for a three-factor authenticated key agreement technique using fractional chaotic maps to access several sensing devices in real-time without a password table and establish the shared session key among the network users is not out of place.

    1.2 Contribution

    This work presents an efficient three-factor authenticated key agreement technique using fractional chaotic maps under HC-IoT architectures.The following is a list of the paper’s contributions.

    ■We present a secret sharing technique for constructing a secure three-factor authenticated key agreement without a password table.The presented technique utilized a hash function, which works well for the resource-limited HC-IoT devices.

    ■We establish the formal security proof of the presented technique using Burrows-Abadi-Needham (BAN) logic under random oracle.Specifically, our scheme differentiates a real adversary from a simulation.

    ■The three-factor authenticated key agreement technique designed using fractional chaotic maps supports the architecture’s dynamic sensing of HC-IoT devices without a password table.

    ■Finally, we present a security investigation and performance comparison of the presented technique and demonstrate that it reduces the communication and computational overhead drastically compared to existing related techniques.

    1.3 Paper Organization

    The rest of this paper is laid out as follows.In Section 2, we present the related works.Section 3 gives the preliminaries covering fractional chaotic maps and their cryptographic properties.Section 4 focuses on the proposed technique under HC-IoT architectures.Section 5 deals with the formal authentication proof of the scheme using BAN logic.Section 6 presents the security investigation of the technique and valuable discussions.Section 7 covers the performance comparison of the presented technique to demonstrate its superiority over the existing schemes.Section 8 wraps up the paper with a concise conclusion.

    2 Related Work

    Distributed private cloud servers store critical user information harvested from HC-IoT devices to allow access to legitimate users.Several authentication protocols with a key agreement for use under HC-IoT architectures have been proposed [10-12].In particular, a lightweight authentication scheme for application in Wireless Sensors Networks (WSNs) was proposed by Das [10].The scheme allows users to validate their identities by entering their secret passwords and smart cards.However,the scheme uses only the hash function, limiting its security.

    Additionally, some flaws have been identified in Das’scheme.These include the inability to resist denial-of-service attacks and node compromised attacks [11].In order to address these limitations in Das’scheme, an authentication scheme utilizing biohacking has been proposed by [11].The scheme gives a lower error rate compared to existing traditional techniques.However, Wang et al.[12]estimated several two-factor authentication techniques.They observed that the technique by Srinivas et al.[11] is susceptible to offline guessing attacks and cannot guarantee user anonymity in real-time.

    In related work, Esfahani et al.[13] anticipated an efficient authentication technique using the hash function and exclusive OR (XOR) operation.The technique was tailored for application in the Industrial Internet of Things (IIoT).The technique achieves low communication and computational costs and satisfies several security requirements.In another related work, Wazid et al.[14] presented a user authentication and key management technique that uses passwords, biometrics and a smart card for identity validation.Hossain et al.[15] proposed a cloud-assisted scheme that gives real-time patient data for healthcare applications.In work due to Li et al.[4], elliptic curve cryptography (ECC)-empowered authentication protocol was proposed.The scheme seeks to tackle the security flaws in existing schemes and enhance IIoT wireless networks’privacy.

    In another study, Li et al.[16] put forward a three-factor authentication technique for IIoT systems.The work aims at enhancing the security of the scheme to withstand sophisticated attacks and provide user anonymity.On integrating IoT with cloud computing to support IoT services, Yu et al.[17] demonstrated the possibility of achieving improved user services, leveraging IoT.However, several attacks that limit the security of cloud-based servers have been identified [18, 19].Furthermore, the work [19] proposes a better authentication scheme, which applies to Internet of Things (IoT)-assisted cloud computing architectures to resist DoS and privileged insider attacks.

    [20], chaoticmaps enabled authentication scheme was proposed for ID-based digital signatures.The security of the scheme was tested on the suppositions of complex Diffie-Hellman problems and discrete logarithm.Also, Gao et al.[21] put forward an authentication technique leveraging chaotic maps for the wireless body area networks.The technique facilitated the securely monitoring and recording of patients’health data.Performance analysis of the technique guarantees user confidentiality, and it reduces the cost of multiplication and exponentiation during computation at a low communication cost.

    In a similar vein, an anonymity preserving authentication technique was proposed in [22].Security verification of the technique was done using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.Test results showed enhanced performances compared to other related techniques in the literature.In several works due to Meshram et al.[3,9,23], efficient and provably secure authentication techniques using extended chaotic maps were proposed.The schemes show robust security features covering low computational and communication costs.

    In comparison with preceding techniques, the three-factor authenticated key agreement technique projected in this paper is unique in several aspects.The launched security scheme utilized a hash function, which works well for the resource-limited HC-IoT architectures.Finally, the technique uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the architecture without a password table.

    3 Background and Material

    Before going into the current inquiry on the presented three-factor authenticated key agreement technique, this part discusses the many fundamental principles pertaining to the work.First, a Chebyshev chaotic map implementation with a short existence is described.Following that, a Chebyshev polynomial, fractional chaotic maps utilizing the minimum approach, and a list of other techniques employed in this development are represented.The notations used in our method are briefly defined in Tab.1.

    Table 1: Notations used in our proposed scheme

    3.1 Chebyshev Chaotic Maps

    Two fundamental prerequisites in the evolution of cryptographic systems are ambiguity and dispersion.Chaotic frameworks are suitable for achieving diffusion and uncertainty assets in cryptography because of their sensitivity to primary conditions, ergodicity, and pseudo-randomness.As a result, chaotic maps have been used to create several symmetric and asymmetric key cryptosystems[24-26]:

    Definition 1.(Chaotic map).In the variationv, the Chebyshev polynomial (CP)() is anndegree polynomial.Assume that∈[-1, 1] is the edition and thatnis a big integer.The following is what CP said in general [24,27-29]:

    The Chebyshev polynomial’s recurrence relation is defined as

    In this scenario, the functionalarccos() andcos() are written asarccos: [-1, 1]→[0, ] andcos:R→[-1, 1].

    3.1.1 Properties of Chaotic Maps

    Chebyshev polynomials have the following two essential properties:

    Chaotic properties:The CP transform: [-1, 1]→ [-1, 1] with the degreen>1 is known as the chaotic maps transform.It is related to the functional (invariant density)for some positive Lyapunov exponent λ= Inn>0.

    Semi-group properties:The semigroup property of() is defined as follows:(()) =cos(τcos-1(cos(l cos-1()))) =cos(τl cos-1()) =() =(()), where τ andlare positive integers and∈[-1, 1].

    Public-key cryptography based on the Chebyshev polynomialmap semigroup property is unstable,according to Bergamo et al.[25].Zhang [26] proved, however, that the semigroup property retains an interval (-∞,+∞), which can improve the property as measured:

    whereq1is a big prime and∈(-∞,+∞).As a result, the property is:())(modq1) =()(modq1) =(())(modq1), and the semigroup property is kept as well.It is worth noting that extended Chebyshev polynomials commute under confirmation as well.

    3.1.2 Computational Problems

    By using the propositions [27-31], various computational challenges based on Chebyshev polynomials are explained in this segment.

    Definition2.(Chaotic Map-based Discrete Logarithm Problem(CMDLP)).Any polynomial time bounded technique that discovers the number τ wherey=() (mod q1) is infeasible given a random tuple〈y,〉.

    Definition 3.(Chaotic Map-based Diffie-Hellman problem (CMDHP)).Any polynomial timebounded procedure that attempts to find the estimate() (mod q1) for a given random tuple<,(),Tl()>fails.

    3.2 Fractal Chaotic Maps (FCM)

    Historically, the Fractal Calculus (FC) was called a local fractional calculus [32,33].However,fractional calculus accepts possessions (derivatives of non-integer power).FC takes precedence over the related preparation:

    Assume that the formal expression for a random fractional-order μ?[0, 1] defines the fractional difference operator ξμ.Then,

    and the fractal integral operator is the same as this.

    It can be approximated using the formula in (1)

    We get the following formulation (2) by generalising the polynomial, with the FC concept:

    The FCP stands for the fractal Chebyshev polynomial (see Fig.1).

    Figure 1: 3D-FCP when μ= 0, 1/2 and 3/4 respectively

    3.2.1 Properties of Fractal Chaotic Maps

    Two of the FCP’s soothing properties are as follows:

    Definition 4(Chaotic possessions of FCM).The fractal Chaotic maps [33,34] satisfy the recurrent relations under the chaotic possessions,i.e.,(mod q1).When μ→0 is utilized, the usual prominent effect, as observed in Yang et al.[32], is well understood.

    Definition 5(Semi-group possessions of FCM).The semi-group possessions hold, i.e., for FCMs on the interval (-∞,∞) [33].

    4 The Proposed Technique Under the HC-IoT Architecture

    This section will show you the steps of our newthree-party authenticated key agreement technique.Fig.2 depicts the layout of our strategy.Please note that the term U→V:()isusedinallfivephases to indicate that U deliver a message to V.Our plan consists of five steps, which are outlined in Tab.2 as follows.

    Table 2: The steps of our new three-party authenticated key agreement technique

    Figure 2: Our proposed framework

    5 The Formal Authentication Proof Using BAN Logic

    The BANlogic is a well-known method of ensuring that information exchange protocols are valid.In this section, we will examine the accuracy of the session key among U and V using BAN logic[35,36].To begin, the following are the notations, goals, and assumptions:

    5.1 Notations

    The notations and syntax of the BAN logic are defined here.The specific participants are defined as U and V, the trusted server is S, and the formula is X (statement).The following are some guidelines [1,17]:

    1.U|≡X means U trusts the formulation X is true.

    2.U|≡V means U trusts V’s act.

    3.U?X means U holds or sees the formulation X.

    4.U|~X means U has said the formulation X.

    5.U|?X means U has comprehensive control over the formulation X.

    8.UV meansxis a secret key, or secret info shared among U and V.

    9.{X}κmeans X is encrypted by the key κ.

    5.2 Goals

    In our system, there are three roles: U and V are the users who must use the trusted server (S) to generate a common session key between them.

    In the language of BAN logic, our strategy aims to achieve four objectives:

    Because U and V must generate a shared session key to communicate, U must believe that the server believes V and that V possesses the session key Sκ, and vice versa.

    5.3 Suppositions

    The assumptions must be presented once the goals have been established:

    S1·U?idU

    S2·U?idV

    S3·V?idV

    S4·U|?r

    S5·V|?w

    S6·S|?((idU),(idV))

    U and V each have their own identities in assumptions S1 through S3.Because U desires to create a common session key with V, U must first possess the identity of V, so that the server S can verify the identities of both parties in this connection.In suppositions S4 through S6, U, V and S must each choose their private keys, which they control entirely.

    5.4 Verification

    We will use the BAN logic to check the accuracy of our suggested framework in this part.The main steps in the evidence are as follows:

    V and U believe the server has saidSVandSUin formulation V9 and formula V13.Because the server must check the certificate before givingSVandSU, both U and V assume the other is an authorized user.Because U hasr,(idV), in formula V15, U may compute the session key Sκ.When U can decodeand has Sκ, U can believeVU, which leads U to believe that V has the secret value Sκ.Similarly,Vbelievesthat Upossessesthesecretvalue Sκ informulation V17.U and Vcan generate a common session key using this secret value.We may deduce that our approach accomplishes the goals using formulas V9, V13, V15, and V17.

    6 Security Analysis and Discussions

    v perfect forward secrecy, and user anonymity.Additionally, we put the suggested technique to the test against several attacks, including the man-in-the-middle attack, privileged insider attack, knownkey secrecy, perfect forward secrecy, password guessing attacks, Clock synchronization problem, and the user identity forgery.

    Hypothesis 1:The proposed technique can successfully resist the man-in-the-middle attack.

    Justification:The attacker cannot manufacture a valid message using the suggested technique since the attacker does not have access to the secret values(idU) and(idV), which are used to generate the hash valuesandFurthermore, by checking hash values, both users (U and V)and the server might determine whether the received messages were edited or substituted.The server examinesandin step 3.The user V checksandin steps (4) and (6), while the user U checksandin step (5).As a result, the proposed technique can successfully defend against a man-in-the-middle attack.

    Hypothesis 2:The proposed technique can offer mutual authentication among the users U, V and the server S.

    Justification:Mutual authentication is a critical aspect of user authentication techniques since it allows any scheme member to authenticate the others.By computing secret keys κSUand κSV, the server S can extract idUand idVfrom1and idVfrom2using the proposed technique.The hash valuesandcan then be computed.The server S can authenticate both users by checking whether=and=are equal.The user U can computeand authenticate the server S by checking if=in step (5).She/he can also verify the identity of user V by looking at the received valueVU.The user V can calculateSVand verify if=to authenticate the server.V authenticates the user U in step (6) by checking the received value.As a result, all parties can establish mutual authentication using the proposed technique.

    Hypothesis 3:The proposed technique protects the user’s anonymity.

    Justification:When the two users create their shared session key, they must inform each other and the server S of their identities.In other words, the sender’s identity is included in the message transmitted from one user to another.In our technique, the identity in the message sent during communication is encrypted using fractional chaotic maps rather than plaintext.If a malicious attacker intercepts the communication, the attacker will be unable to deduce the user’s true identity by examining the message.

    Hypothesis 4:The proposed technique protects against user identity forgery.

    Justification:The identities of the two users are included in the message sent to server S.(one encrypted by using the fractional chaotic maps and the other not).When the server S receives the communication, it can quickly decrypt it and verify the identities of both users.

    Hypothesis 5:The proposed technique need not require a password table.

    Justification:A password table must exist on the server-side for a password authentication technique to effectively save and update the legal participants’passwords.An insider attack could occur if the server has malicious intentions, and passwords could be exploited or manipulated.There is no password table on the server-side of our technique because we do not maintain the participants’passwords.Hence there is no possibility of an insider attack.

    Hypothesis 6: The proposed technique is secured against password guessing attacks.

    Justification:A password authentication mechanism will always be vulnerable to a password guessing attack.After intercepting a transmission, the attacker will guess the proper password.If the password is accurately guessed, the attacker can use it to commit fraud.Unlike password authentication techniques, our technique does not rely on passwords, it is immune to password guessing attacks.

    Hypothesis 7: The proposed technique is secured against the Clock synchronization problem.

    Justification:Unlike many previous key agreement techniques, the proposed key agreement technique could continue to work even if the clock is out of sync, ensuring secure communication between sender and receiver.Because the timestamp is merely relative to the receiver’s clock, synchronized clocks are unnecessary.The timestamp generated by the receiver is the only one he verifies.

    Hypothesis 8: The proposed technique can offer known-key secrecy.

    Justification:Mutual authentication is a critical aspect of user authentication techniques since itallows any scheme member to authenticate the others.known-key secrecy because the next session keys cannot be exposed.If a sender intercepts a session key Sκ=and knows the random parameters w andr, she will be unable to obtain the preceding and subsequent session keys due to the unknown random parameters.

    Hypothesis 9:The proposed technique can offer perfect forward secrecy.

    Justification:Creating a session key among communication entities is independent of previously generated session keys.Our presented technique can ensure perfect forward secrecy.Even though the sender can intercept the parameters(idV) and(idV), which are typically transmitted overa channel, they are unable to compute the following session key Sκ=(idV) due to the intractability of the fractional chaotic maps-based Diffie-Hellman (FCMDH) and fractional chaotic maps-based Discrete Logarithm (FCMDL) problems, and Alice hasn’t been able to get the following session key before.

    7 Performance Comparisons

    We demonstrate the efficiency of the presented technique in this portion of the article.Tab.3 compares the security features of our suggested technique to those of Lee et al.[37], Zhao et al.[38],Farash et al.[39], Xie et al.[40], and Jabbari et al.[41] techniques.Under key considerations, our proposed technique provides higher security than the other techniques.In addition, we compared the computational primitives employed in our proposed technique’s positioning of the users and server to those used in other relevant techniques.

    Table 3: Security characteristics comparisons between the provided and other similar techniques

    In this contrast study, we employed the four-time complexity notations listed below.:,,,anddescribed performance time for a one-way hash function, a Chebyshev chaotic map operation,a symmetric encryption/decryption operation, and one modular multiplication, respectively.The relations between:,,, andwith respect to(= 0.32ms) have been known in several works [3,9,33], and γ= 1/2 since γ∈[0,1] [33]).The relationship and order of computational complexity between the metrics are as follows:≈,≈,≈2.5, and≈≈<.Tab.4 shows the performance evaluation of the proposed technique and the existing techniques’primary consuming techniques.Fig.3 also displays millisecond (ms) comparisons of overall processing costs.

    Table 4: Performance evaluation of the proposed scheme and other relevant techniques

    Figure 3: Total communication cost (ms)

    On the other hand, our proposed technique can provide comprehensive security assurance at a cheap computing cost while displaying very high-efficiency thanks to Chebyshev chaotic maps and hash functions.

    8 Conclusion

    This paper proposed an efficient three-factor authenticated key agreement technique using fractional chaotic maps under the HC-IoT architecture without a password table.Our novel technique is entirely immune to password guessing attacks.Furthermore, our technique ensures that users’privacy is fully protected, ensuring that a user forging attack has no adverse consequences.Our novel strategy outperforms the currently available technique in terms of security.Also, we performed a BAN logic test and confirmed the correctness of our technique.However, the current paper has not deployed the experimental setting for the proposed scheme.In future work, we would focus on a lightweight three-factor authentication and key agreement technique for IoT multi-gateway wireless sensor networks leveraging extended Chebyshev chaotic maps.

    Acknowledgement:The authors extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research group program under grant number R.G.P.1/72/42.The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund (PTDF) and the German Academic Exchange Service (DAAD)through the Nigerian-German Postgraduate Program under grant 57473408.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产亚洲午夜精品一区二区久久| 国产精品 国内视频| 新久久久久国产一级毛片| 国语对白做爰xxxⅹ性视频网站| 日本wwww免费看| 国产精品.久久久| 国产野战对白在线观看| 免费在线观看视频国产中文字幕亚洲 | 99精国产麻豆久久婷婷| 亚洲少妇的诱惑av| 国产日韩欧美视频二区| 韩国高清视频一区二区三区| 国产欧美日韩一区二区三区在线| 天天影视国产精品| 成年av动漫网址| 亚洲,一卡二卡三卡| 亚洲一级一片aⅴ在线观看| 久久99精品国语久久久| 香蕉丝袜av| 不卡视频在线观看欧美| 国产精品人妻久久久影院| 国产一区有黄有色的免费视频| 欧美成人午夜精品| 午夜福利视频精品| 久久久精品94久久精品| 日韩不卡一区二区三区视频在线| 老鸭窝网址在线观看| 亚洲中文av在线| 国产亚洲精品第一综合不卡| 国产无遮挡羞羞视频在线观看| 国产免费一区二区三区四区乱码| 成人18禁高潮啪啪吃奶动态图| 国产欧美日韩综合在线一区二区| 亚洲第一区二区三区不卡| 天天影视国产精品| 18禁动态无遮挡网站| 九色亚洲精品在线播放| 日本爱情动作片www.在线观看| 黄片无遮挡物在线观看| 宅男免费午夜| 97精品久久久久久久久久精品| 亚洲精品av麻豆狂野| 亚洲国产av新网站| 国产精品一区二区在线观看99| 精品亚洲成国产av| 韩国av在线不卡| 亚洲精品久久午夜乱码| 一区二区av电影网| 午夜福利在线观看免费完整高清在| 国产一区有黄有色的免费视频| 秋霞在线观看毛片| 亚洲婷婷狠狠爱综合网| 国产一区亚洲一区在线观看| 亚洲av国产av综合av卡| 亚洲成色77777| 80岁老熟妇乱子伦牲交| 九九爱精品视频在线观看| 免费在线观看视频国产中文字幕亚洲 | 亚洲美女搞黄在线观看| 午夜91福利影院| www.精华液| 最黄视频免费看| 亚洲av欧美aⅴ国产| 国产伦理片在线播放av一区| 国产在线一区二区三区精| 一区二区三区乱码不卡18| 国产精品一区二区在线不卡| 人人妻人人澡人人看| 制服丝袜香蕉在线| 捣出白浆h1v1| 日日啪夜夜爽| 亚洲五月色婷婷综合| 亚洲精品久久午夜乱码| 亚洲综合色惰| 国产黄频视频在线观看| 国产男女超爽视频在线观看| 亚洲,欧美精品.| 香蕉精品网在线| 亚洲国产精品成人久久小说| av在线播放精品| www.精华液| 哪个播放器可以免费观看大片| 黄色怎么调成土黄色| 日本-黄色视频高清免费观看| 国产精品国产av在线观看| 欧美精品国产亚洲| 成人亚洲欧美一区二区av| 看十八女毛片水多多多| 91精品三级在线观看| 国产av一区二区精品久久| 精品亚洲乱码少妇综合久久| 亚洲精品中文字幕在线视频| 亚洲精品中文字幕在线视频| 亚洲国产精品成人久久小说| 亚洲,一卡二卡三卡| 免费av中文字幕在线| 熟女少妇亚洲综合色aaa.| 欧美bdsm另类| 国产精品国产三级专区第一集| freevideosex欧美| 视频在线观看一区二区三区| 美女脱内裤让男人舔精品视频| 国产不卡av网站在线观看| 亚洲美女搞黄在线观看| 极品少妇高潮喷水抽搐| 9热在线视频观看99| 卡戴珊不雅视频在线播放| 欧美中文综合在线视频| 国产97色在线日韩免费| 中文字幕色久视频| 99久久中文字幕三级久久日本| 免费高清在线观看视频在线观看| 男的添女的下面高潮视频| 人人妻人人澡人人爽人人夜夜| 欧美黄色片欧美黄色片| 巨乳人妻的诱惑在线观看| 伊人久久大香线蕉亚洲五| 晚上一个人看的免费电影| 晚上一个人看的免费电影| 亚洲欧美精品综合一区二区三区 | www日本在线高清视频| 天美传媒精品一区二区| 久久久国产一区二区| 日本wwww免费看| 如日韩欧美国产精品一区二区三区| 男的添女的下面高潮视频| 成人毛片60女人毛片免费| 天天操日日干夜夜撸| 亚洲精品aⅴ在线观看| 中文字幕人妻丝袜制服| 日本-黄色视频高清免费观看| 国产av精品麻豆| 寂寞人妻少妇视频99o| 亚洲欧美一区二区三区黑人 | 大片电影免费在线观看免费| 日韩伦理黄色片| 国产一区二区三区av在线| 亚洲熟女精品中文字幕| 亚洲av中文av极速乱| 十八禁网站网址无遮挡| 亚洲精品一二三| 国产免费又黄又爽又色| tube8黄色片| 99久久人妻综合| 免费黄网站久久成人精品| 如何舔出高潮| 日日啪夜夜爽| 精品亚洲成a人片在线观看| videos熟女内射| 精品亚洲成国产av| 丝袜喷水一区| 国产精品久久久av美女十八| 伊人久久大香线蕉亚洲五| 日日啪夜夜爽| 国产又爽黄色视频| 男人添女人高潮全过程视频| 精品一区二区三卡| 国产精品国产av在线观看| av视频免费观看在线观看| 一区福利在线观看| 国产不卡av网站在线观看| 久久精品国产亚洲av涩爱| 伦理电影大哥的女人| 狠狠婷婷综合久久久久久88av| 国产成人精品在线电影| 国产精品.久久久| av有码第一页| 性高湖久久久久久久久免费观看| 久久精品人人爽人人爽视色| 波野结衣二区三区在线| 黑丝袜美女国产一区| 国产精品av久久久久免费| 成人亚洲精品一区在线观看| 亚洲人成77777在线视频| 九草在线视频观看| 岛国毛片在线播放| 99精国产麻豆久久婷婷| 亚洲成色77777| 欧美日韩综合久久久久久| 国产欧美亚洲国产| av有码第一页| 欧美日韩一区二区视频在线观看视频在线| 在线天堂最新版资源| 天堂中文最新版在线下载| 国产成人精品久久二区二区91 | 女的被弄到高潮叫床怎么办| 纯流量卡能插随身wifi吗| 中文字幕制服av| 精品人妻一区二区三区麻豆| 亚洲第一av免费看| 赤兔流量卡办理| 欧美老熟妇乱子伦牲交| 大话2 男鬼变身卡| 婷婷色麻豆天堂久久| 成人国产麻豆网| 国产一区亚洲一区在线观看| 美女xxoo啪啪120秒动态图| 久久精品国产综合久久久| 一级a爱视频在线免费观看| 女的被弄到高潮叫床怎么办| 国产亚洲精品第一综合不卡| 香蕉丝袜av| 亚洲国产精品一区二区三区在线| 免费人妻精品一区二区三区视频| 日韩制服骚丝袜av| 久久久精品94久久精品| 男男h啪啪无遮挡| 亚洲欧美精品综合一区二区三区 | a级片在线免费高清观看视频| 国产探花极品一区二区| 在线看a的网站| 最黄视频免费看| 亚洲内射少妇av| 久久97久久精品| 国产精品熟女久久久久浪| 成人二区视频| 91成人精品电影| 高清视频免费观看一区二区| 免费女性裸体啪啪无遮挡网站| 亚洲激情五月婷婷啪啪| 国产精品欧美亚洲77777| 国产成人免费无遮挡视频| 欧美日韩精品网址| 韩国精品一区二区三区| 久久这里有精品视频免费| 久久精品人人爽人人爽视色| 1024视频免费在线观看| 亚洲av成人精品一二三区| 丰满乱子伦码专区| 亚洲成人手机| 一区二区三区激情视频| 欧美97在线视频| 日韩一本色道免费dvd| 久久久精品94久久精品| 超碰97精品在线观看| 国产又爽黄色视频| 不卡视频在线观看欧美| 天堂中文最新版在线下载| 国产精品一国产av| 少妇的丰满在线观看| 午夜免费鲁丝| 高清欧美精品videossex| 国产精品蜜桃在线观看| 精品一区二区三卡| 看免费成人av毛片| 男女下面插进去视频免费观看| 午夜日本视频在线| 少妇人妻 视频| 久久影院123| 国产精品嫩草影院av在线观看| 亚洲av综合色区一区| 美女中出高潮动态图| 国产精品.久久久| 汤姆久久久久久久影院中文字幕| 女人精品久久久久毛片| 精品少妇久久久久久888优播| 热99国产精品久久久久久7| 妹子高潮喷水视频| 天天影视国产精品| 看十八女毛片水多多多| 亚洲av国产av综合av卡| 各种免费的搞黄视频| 国产综合精华液| 亚洲综合精品二区| 免费看av在线观看网站| 免费少妇av软件| 精品酒店卫生间| 视频在线观看一区二区三区| 一本色道久久久久久精品综合| 国产人伦9x9x在线观看 | 亚洲,欧美精品.| 制服丝袜香蕉在线| av免费观看日本| 亚洲情色 制服丝袜| 天天躁日日躁夜夜躁夜夜| 一区二区三区激情视频| 老女人水多毛片| 高清视频免费观看一区二区| 成人亚洲欧美一区二区av| 超色免费av| 国产97色在线日韩免费| 欧美精品国产亚洲| xxxhd国产人妻xxx| 国产老妇伦熟女老妇高清| 久久久精品区二区三区| 纯流量卡能插随身wifi吗| 一区福利在线观看| 美女高潮到喷水免费观看| 制服丝袜香蕉在线| 久久精品久久久久久噜噜老黄| 久久久国产一区二区| 午夜日韩欧美国产| 亚洲精品成人av观看孕妇| 精品亚洲成国产av| 91精品三级在线观看| 在线天堂最新版资源| 哪个播放器可以免费观看大片| 久久久久国产一级毛片高清牌| 精品一区在线观看国产| 嫩草影院入口| 国产精品一二三区在线看| 亚洲第一av免费看| 久久精品人人爽人人爽视色| av在线观看视频网站免费| 日韩中文字幕视频在线看片| 久久韩国三级中文字幕| 一级黄片播放器| 精品一区二区三卡| 色94色欧美一区二区| 免费人妻精品一区二区三区视频| 成人国语在线视频| 人人妻人人添人人爽欧美一区卜| 久久人人爽人人片av| 晚上一个人看的免费电影| 三上悠亚av全集在线观看| 久久久久久人妻| 看非洲黑人一级黄片| 最近最新中文字幕免费大全7| 高清不卡的av网站| 国产乱来视频区| 久久久a久久爽久久v久久| 91精品三级在线观看| 日韩av在线免费看完整版不卡| 精品久久蜜臀av无| 亚洲国产欧美网| 久久人人爽人人片av| 欧美97在线视频| 欧美日韩一区二区视频在线观看视频在线| 国产欧美日韩综合在线一区二区| 久久ye,这里只有精品| 欧美国产精品va在线观看不卡| 99久久人妻综合| 黄色配什么色好看| 国产精品一国产av| 久久午夜综合久久蜜桃| 下体分泌物呈黄色| 欧美97在线视频| 黄频高清免费视频| 欧美国产精品一级二级三级| 97人妻天天添夜夜摸| 天天躁狠狠躁夜夜躁狠狠躁| www.av在线官网国产| 91午夜精品亚洲一区二区三区| 在线天堂中文资源库| 男男h啪啪无遮挡| 欧美激情高清一区二区三区 | 一本色道久久久久久精品综合| 大片电影免费在线观看免费| 中文字幕精品免费在线观看视频| 在线观看人妻少妇| 香蕉丝袜av| av片东京热男人的天堂| 免费观看无遮挡的男女| 蜜桃国产av成人99| 国产午夜精品一二区理论片| 亚洲av中文av极速乱| 多毛熟女@视频| 人妻少妇偷人精品九色| 成人午夜精彩视频在线观看| 亚洲激情五月婷婷啪啪| 青春草亚洲视频在线观看| 黄网站色视频无遮挡免费观看| 国产伦理片在线播放av一区| 免费高清在线观看视频在线观看| 亚洲精品国产一区二区精华液| 成年人午夜在线观看视频| 日韩欧美一区视频在线观看| 精品人妻偷拍中文字幕| 欧美精品av麻豆av| 热re99久久精品国产66热6| 91精品三级在线观看| 欧美人与性动交α欧美精品济南到 | 交换朋友夫妻互换小说| 爱豆传媒免费全集在线观看| 精品卡一卡二卡四卡免费| 自线自在国产av| 美女高潮到喷水免费观看| 中文欧美无线码| 9色porny在线观看| 晚上一个人看的免费电影| 久久久久国产网址| 成人国产麻豆网| 亚洲综合精品二区| tube8黄色片| 最近最新中文字幕大全免费视频 | 午夜精品国产一区二区电影| 亚洲国产精品999| 18在线观看网站| 在线观看美女被高潮喷水网站| 免费黄色在线免费观看| 国产又色又爽无遮挡免| 肉色欧美久久久久久久蜜桃| 最近最新中文字幕免费大全7| 久久 成人 亚洲| 成人二区视频| 在线精品无人区一区二区三| 亚洲精品久久久久久婷婷小说| 国产亚洲午夜精品一区二区久久| 国产精品嫩草影院av在线观看| 日韩电影二区| 一级片免费观看大全| 日韩中文字幕视频在线看片| 免费日韩欧美在线观看| 亚洲第一av免费看| 日韩人妻精品一区2区三区| 丰满迷人的少妇在线观看| 成人二区视频| 国产男女超爽视频在线观看| 七月丁香在线播放| 亚洲精品国产av成人精品| 在线观看免费视频网站a站| 亚洲精品自拍成人| 精品第一国产精品| 超碰97精品在线观看| 色94色欧美一区二区| 免费不卡的大黄色大毛片视频在线观看| 丝袜脚勾引网站| 欧美黄色片欧美黄色片| 男人操女人黄网站| 99九九在线精品视频| 国产成人午夜福利电影在线观看| 亚洲精品,欧美精品| 亚洲色图综合在线观看| 热re99久久精品国产66热6| 精品酒店卫生间| 日韩中文字幕视频在线看片| 欧美成人午夜精品| 亚洲久久久国产精品| 精品一区二区三区四区五区乱码 | 日韩伦理黄色片| 观看美女的网站| 男女无遮挡免费网站观看| 精品一区二区免费观看| 一级黄片播放器| 99国产精品免费福利视频| 日日撸夜夜添| 一级黄片播放器| 久久久久久久久久久免费av| 亚洲综合色网址| 99re6热这里在线精品视频| 日韩精品有码人妻一区| 99久国产av精品国产电影| 18禁国产床啪视频网站| 亚洲美女黄色视频免费看| 一级毛片我不卡| 午夜福利一区二区在线看| 久久久久精品久久久久真实原创| 欧美 亚洲 国产 日韩一| 久久久欧美国产精品| 亚洲天堂av无毛| 高清欧美精品videossex| 深夜精品福利| 中国三级夫妇交换| 最近2019中文字幕mv第一页| 免费观看av网站的网址| 免费女性裸体啪啪无遮挡网站| 国产片内射在线| 国产爽快片一区二区三区| 中文天堂在线官网| 啦啦啦中文免费视频观看日本| 一级爰片在线观看| 欧美日韩精品成人综合77777| 男人爽女人下面视频在线观看| 看免费成人av毛片| 又粗又硬又长又爽又黄的视频| 久久久久久人人人人人| 亚洲av日韩在线播放| 亚洲,一卡二卡三卡| 在线观看免费视频网站a站| 国产熟女午夜一区二区三区| 不卡av一区二区三区| 伦精品一区二区三区| 性少妇av在线| 99热全是精品| 免费观看在线日韩| 国精品久久久久久国模美| 欧美在线黄色| 26uuu在线亚洲综合色| 一二三四在线观看免费中文在| 欧美激情极品国产一区二区三区| www.精华液| 亚洲图色成人| 91国产中文字幕| 在线 av 中文字幕| 国产成人精品在线电影| 男女国产视频网站| 久久精品国产鲁丝片午夜精品| 男女边摸边吃奶| 最近手机中文字幕大全| 国产一区二区三区综合在线观看| 亚洲精品乱久久久久久| 国产黄色视频一区二区在线观看| 老司机影院毛片| 中文字幕最新亚洲高清| 亚洲国产毛片av蜜桃av| 菩萨蛮人人尽说江南好唐韦庄| 青春草国产在线视频| 中文字幕人妻丝袜制服| 亚洲 欧美一区二区三区| 成年动漫av网址| av片东京热男人的天堂| 999精品在线视频| 国产精品 国内视频| 天天躁日日躁夜夜躁夜夜| 中文字幕人妻丝袜一区二区 | 中文字幕人妻熟女乱码| 少妇 在线观看| 欧美激情高清一区二区三区 | 我的亚洲天堂| 成人午夜精彩视频在线观看| 亚洲综合色惰| 纯流量卡能插随身wifi吗| 国产黄色免费在线视频| 水蜜桃什么品种好| 亚洲一区二区三区欧美精品| 国产 精品1| 欧美日韩成人在线一区二区| 在线免费观看不下载黄p国产| 日本免费在线观看一区| 亚洲婷婷狠狠爱综合网| 欧美+日韩+精品| av一本久久久久| 国产日韩欧美在线精品| 日本wwww免费看| 老汉色∧v一级毛片| 亚洲一区二区三区欧美精品| 亚洲av免费高清在线观看| 波野结衣二区三区在线| 日本爱情动作片www.在线观看| 一区福利在线观看| 日韩大片免费观看网站| 99久久人妻综合| 午夜av观看不卡| a级毛片黄视频| 免费女性裸体啪啪无遮挡网站| 国产1区2区3区精品| 亚洲在久久综合| 国产日韩一区二区三区精品不卡| 久热这里只有精品99| 少妇的丰满在线观看| 99久久人妻综合| 日本色播在线视频| 精品国产超薄肉色丝袜足j| 日韩av在线免费看完整版不卡| 免费日韩欧美在线观看| 精品国产露脸久久av麻豆| 男男h啪啪无遮挡| 黄色一级大片看看| 一区二区三区四区激情视频| 亚洲男人天堂网一区| 两个人看的免费小视频| 18禁国产床啪视频网站| av天堂久久9| 免费看不卡的av| 男女高潮啪啪啪动态图| 在线观看免费视频网站a站| 大片电影免费在线观看免费| 国产免费又黄又爽又色| 国产精品人妻久久久影院| 丝袜喷水一区| 一本色道久久久久久精品综合| 久久精品国产鲁丝片午夜精品| 少妇人妻 视频| www.自偷自拍.com| 亚洲国产av新网站| 亚洲精品一区蜜桃| 精品一区二区三区四区五区乱码 | 国产男女超爽视频在线观看| 久久韩国三级中文字幕| 在线天堂中文资源库| 91在线精品国自产拍蜜月| 精品少妇黑人巨大在线播放| 欧美日韩视频高清一区二区三区二| 亚洲欧美成人精品一区二区| 久久ye,这里只有精品| 国产又色又爽无遮挡免| 丰满乱子伦码专区| 亚洲视频免费观看视频| 搡老乐熟女国产| 黄片小视频在线播放| 亚洲情色 制服丝袜| 高清视频免费观看一区二区| 天堂8中文在线网| 亚洲成av片中文字幕在线观看 | 日韩一区二区三区影片| 免费高清在线观看视频在线观看| 99热全是精品| 中文欧美无线码| 久热久热在线精品观看| av免费观看日本| 18禁观看日本| 国产在视频线精品| 欧美激情高清一区二区三区 | 亚洲婷婷狠狠爱综合网| 久久久久久久久久久免费av| 午夜日韩欧美国产| 人体艺术视频欧美日本| 一本大道久久a久久精品| 亚洲欧美一区二区三区黑人 | 亚洲成人av在线免费| 夜夜骑夜夜射夜夜干| 欧美精品人与动牲交sv欧美| 亚洲欧美一区二区三区国产| 视频在线观看一区二区三区| 久久久久国产精品人妻一区二区| 一区二区三区精品91| 国产精品久久久久久精品古装| 婷婷色综合大香蕉| 韩国精品一区二区三区| 日日撸夜夜添| 巨乳人妻的诱惑在线观看| 精品午夜福利在线看| 亚洲三级黄色毛片| 久久ye,这里只有精品| 亚洲国产精品999|