• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems

    2022-08-24 06:59:40FadwaAlrowaisAhmedAlmasoudRadwaMarzoukFahdAlWesabiAnwerMustafaHilalMohammedRizwanullahAbdelwahedMotwakelandIshfaqYaseen
    Computers Materials&Continua 2022年8期

    Fadwa Alrowais,Ahmed S.Almasoud,Radwa Marzouk,Fahd N.Al-Wesabi,Anwer Mustafa Hilal,Mohammed Rizwanullah,Abdelwahed Motwakel and Ishfaq Yaseen

    1Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,11671,Saudi Arabia

    2Department of Information Systems,College of Computer and Information Sciences,Prince Sultan University,Rafha Street,Riyadh,11586,Saudi Arabia

    3Department of Information Systems,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,11671,Saudi Arabia

    4Department of Computer Science,College of Science&Arts at Mahayil,King Khalid University,Muhayel Aseer,62529,Saudi Arabia

    5Department of Information Systems,Faculty of Computer and Information Technology,Sana’a University,61101,Yemen

    6Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Al-Kharj,16278,Saudi Arabia

    Abstract: Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction of deep learning(DL)and hardware technologies paves a method in detecting the current traffic status,data offloading,and cyberattacks in MEC.This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy (ASCE) technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm (MSSA) with extreme gradient boosting (XGBoost)technique was implemented to identification and classification of cyberattack that exist in the MEC systems.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks(CTT)of 0.680.

    Keywords: Data offloading;mobile edge computing;security;machine learning;artificial intelligence;XGBoost;salp swarm algorithm

    1 Introduction

    Internet of Things (IoT) has heterogeneous resource-based environment which is applied for providing continuous service for fulfilling the end-user requirement.The idea of IoT varies from small sensor which comprises processing,and communication features with storage space.The intelligence of this human communicative behaviour and machines are used for assisting user requirements [1].With the wide-ranging application of communication tools and several models,the IoT has been employed in the military services,medical sector,mobile communications,industrial fields,etc.The number of information responsible to IoT could not be determined particularly due to the density of a device,the random memory space,and request rate [2].Mobile Edge Computing (MEC) is an alternative transmission method which provides service to devoted users in the transmitting network.The derived resource is extended to user for offering complex services.The facilities such as mobility,support transformation,elasticity,reliability,and adaptability features support different user device densities.Fig.1 depicts the framework of MEC[3].

    Figure 1:MEC structure

    MEC has technologically advanced as a considerable solution for providing nearby distance to the mobile end-users and computing resource at the network edge [4].The main advantage of MEC technology comprises:reduce the energy consumption of mobile gadgets by mitigating the problem of execution its computing task,giving location awareness,offering exact computing results in an appropriate way,improving the efficacy of the mobile applications,and it is possible to reduce the latency.However,the adoption of MEC method from the whole network architecture was developed for network congestion,MEC server computation capacity,and end-user QoS condition[5].The challenges of data offloading in the end-users to MEC for further computing are extensively studied from present research while examining the computational and transmission limitations[6].

    Various methods and techniques to computational off-loading in MEC were developed from the study with the purpose of assigning radio resources effectively,energy utilization,and decreasing the computational latency.Achieving the best possible offloading result in complex and dynamic multiuser wireless MEC systems are complex process.Additionally,the security threats confronted during data forwarding have not been addressed in each offloading method[7].Moreover,insufficient data security checks might quickly exceed the advantage of MEC method.In order to counter the cyber threats in MCC,it is crucial to detect early cyber threats,therefore performing fast countermeasures to prevent the risks[8].

    Currently,it has various techniques presented for preventing and detecting cyber risks in cloud platforms.The usual limitation of this technique is relatively minimal accuracy from detect cyber threat,and they could not work effectively in cloud system[9].In this case,they presented a framework utilizing an advanced detecting methodology developed from the DL method that permits detection of various threats with high precision.The DL technique is a subdivision of ML method which emphasizes the approach inspired by the structure and function of NN.In recent times,DL method was performed efficiently in various domains.

    Hilal et al.[10]develop a powerful DL based data offloading and cyberattack detection (DLDOCAD) technology for MEC.The aim of the presented method is to improve the QoE in MEC system.The presented model contains attack detection,traffic prediction,data offloading and.This method employs a GRU based prediction methodology to traffic detection.Additionally,the BSAFFNN technique is employed as a detector for cyber threats in MEC.Elgendy et al.[11],presented a DL methodology for detecting the best possible solution.

    In Mitsis et al.[12],the combined problems of MEC server selection by end-user and the optimum price setting,and data offloading by the MEC are examined in several end-user environments and MEC servers.The programmability and flexibility provided by the SDN technique allow the real time execution of the presented architecture.At first,an SDN controller performs an RL architecture based stochastic learning automata to enable the end-users for selecting MEC servers for data offloading.

    Alkatheiri[13]presents privacy-controlled offloading system to improve the data sharing security among the edge-IoT gadgets.In this system,harmonized trust validation with recursive decision making is implemented,afterward the data offloading method.Xu et al.[14],proposed a time-effective offloading technique (TEO) with privacy preservation to smart sensors in edge computing.In fact,the offloading and time utilization of secured information is examined in a formal manner.Next,an enhanced Strength Pareto Evolutionary Algorithm (SPEA2) is leveraged for jointly optimizing the average privacy entropy and time utilization.Eventually,various experiment assessments were performed for verifying the reliability and efficiency of this approach.

    This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy (ASCE) technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm (MSSA) with extreme gradient boosting(XGBoost)technique is applied for the identification and classification of cyberattacks that exist in the MEC systems.For examining the enhanced outcomes of the AIMDOSMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDO-SMEC technique interms of different measures.

    The rest of the paper is organized as follows.Section 2 introduces the proposed AIMDO-SMEC technique.Then,Section 3 validates the proposed model and Section 4 concludes the study.

    2 The Proposed Model

    In this study,a novel AIMDO-SMEC technique has been developed to accomplish effective data offloading and security in MEC.The projected AIMDO-SMEC approach encompasses three major stages namely SNN based traffic flow prediction,ASCE based data offloading,and MSSA with XGBoost based cyberattack classification.

    2.1 Design of SNN Based Traffic Prediction Model

    Initially,the SNN model receives the input data and then effectively determines the traffic status in the MEC systems.SNN contains identical networks that accept dissimilar inputs however,they are combined with an energy function at the top.This process calculates few metrics among the highlevel feature depiction on all the sides.The variables among the identical networks are tied.Weight tying guarantees that 2 absolutely equal images couldn’t be mapped by their corresponding network to distinct positions in feature space since all the networks compute the same functionalities.As well,the network is symmetric,therefore we proposed 2 different images to the identical networks,and the topmost conjoining layers would evaluate the similar metrics since we propose the similar 2 images to the opposite twins.The conventional method is a Siamese convolution neural network withLlayer withNlunit,in whichh1,ldenotes the hidden layer inlfor the initial twin,andh2,lrepresent the second twin.They utilize exclusive rectified linear(ReLU)units in the initialL-2 layer and sigmoidal units in the residual layer.

    The algorithm contains a series of convolution layers,all of which utilize an individual with a filter of differing size and a fixed stride of 1.The amount of convolution filters is stated as a multiple of 16 to enhance the performances.Therefore,the kth filter map in all the layers take the succeeding form:

    whereasWl-1,lrepresent the 3D tensor represent the feature maps forllayer and take★as valid convolution function corresponds to returning only those output units that are results of comprehensive overlaps among the input feature maps and every convolution filter.The unit in the last convolution layer is flattened into an individual vector.This convolution layer afterward an FC layer,additional layer computing the induced distance metrics among all the Siamese twins,i.e.,provided to an individual sigmoidal output unit [15].Accurately,the prediction vector is provided aswhereasσrepresent the sigmoidal activation function.This last layer induces metrics on the learned feature space of the(L-1)thhidden neuron and scores the similarities among the 2 feature vectors.Theαjare further variables which are learned using the model at the time of training,weighing the significance of the element-wise distance.This determines a last Lth FC layer for the network that links 2 Siamese twins.

    2.2 Design of ASCE Based Data Offloading Process

    During data offloading process,the ASCE manner was utilized to offload the data in the MEC systems.The CE is termed as probability concept as Kullback Leibler (KL) deviation,also it is simplified as measure of distance between 2 probability distributions.In the event of 2 distributions,q(x)&p(x),CE can be determined as follows

    During the representation of CE,is used to cost function in ML,and solves the problem using probability learning.It is learn inp(x)that is generally a trained sample is generated for attaining an optimal policy of X basedp(x)is equivalent for empirical solutions,q(x).During the case of probabilities learning,probability distribution functionp(x)is used by the descriptoru,p(x,u)represents a Gaussian distribution,alsouis made up of variance and mean.The CE in Eq.(3)used as lost function.It denotes that lesserH(q,p)is,lesser the distance inq(x)&p(x).

    Whereasq(x)is,the probability of autonomous outcome in the group of samples 1/Sin whichSrepresents the cardinality of group [16].According to the problems in Eq.(4),it is exploited to recognize the optimum indicatoruto minimizeH(q,p).Intth iteration,Sseries of arbitrary samplesx,is allotted as a candidate i.e.,recovered according to the probabilityp(x,u).The probable instance is made by adoptive sampling has been determined.It is estimated that the {Ψ(xs)}objectives are estimated and organizing asΨ(x[1])≤Ψ(x[2])≤ ··· ≤Ψ(x[S]).NextSelitesamples,like,x[1],x[2],...,x[elite],offer lower objective,is elective as elites.Next,uoptimum indicator forxapproach is evaluated as:

    Using(3)&(5)and encouragethe saddle pointc

    In the projected algorithm,the CE interrelated measures are employed for extending the probability.In supposing the arbitrariness of sampling,count of instances is lesser,theu(t+1)function is updated in(t+1)thiteration according tou*which is handled by(5)&(6),andu(t)is learned from the previous iteration.

    Whereasα∈ [0,1]signifies the learning values.In general,for CE assisted component the round converges a better solution to the issue.

    2.3 Design of MSSA with XGBoost Based Cyberattack Detection Model

    At the final stage,the XGBoost model is utilized to identify the occurrence of cyberattacks.XGBoost is an ensemble-based classification method and was developed by Chen et al.[17].XGBoost employs boosted tree and is employed for regression and classification.XGBoost was extensively utilized for several predictive tasks and produce considerable results because of effective learning speed and capability.XGBoost is an improved form of the gradient boosting tree.The key objective is to decrease the computation resource consumption,loss,and model complexity.The difficulty can be decreased by regularization.Furthermore,the method normalization is employed for alleviating the over-fitting concept.The purpose of utilizing XGBoost for medical data is because of its innate ability to manage the data imbalance.This process operates by including the trees repeatedly by partitioning the feature.In each iteration,the loss decreases,and novel rules are further.The process repeats till the algorithm attained effective performance.Consider D represent the dataset consisting of n number of features:

    Y signifies the class attribute;Yidenotes the actual value,whereas Ytcharacterizes the predictable value[18].

    In which Tree_Ens implies a tree ensemble method.*e loss indicates loss function that is variance among the actual and predicted.N signifies the amount of trees.F characterizes the set of trees utilized from the training model.Ωindicates the regularization term.

    The parameters involved in the XGBoost model are optimally chosen by the use of MSSA.SSA is newly developed population-based meta-heuristic approach [19].The main concept was invented from scavenging and propulsion events of salp inside ocean.Salps belong to the salpaide family with transparent and barrel shaped bodies.Inside Deep Ocean individual salps related to one another and make a chain as structure named salp swarm/salp chain at the time of food search.The entire population in the salp swarm could be assumed as,supporters and front-runners.Supporter salp alters their corresponding locations according to each other.The front-runner led the sequence from the anterior to the target by changing its own position as per the nourishment parameter when examining searching space.Mathematical position of front-runner salps are changed as

    WhereasA1ksignifies location of leader inkthparameter,Fkmeans location of food source inkthparameter,UBksignifies upper limit inkthvariables,LBksymbolizes lower limit inkthparameter,andE1indicates the exploration and exploitation factor(controlling variable)

    In which l indicates existing iteration andLrepresents maximal amount of iteration.E2andE3,denotes 2 arbitrary measures in among zero and one.Supporter salps position can be changed as follows

    Let,p≥2

    From the optimization perspective,SSA is considered as follows:the chain or swarm of salps is the searching agent and the deep salty ocean is the searching space.The leader salps discover and exploit the whole searching area by changing corresponding position as per the nourishment and save outcomes of all the iterations.Afterward accomplishment of each iteration global optimal solution has last optimal saved solution[20].The SSA displays some benefits over other meta-heuristic approaches like(i)the method employs only one variable as controlling factor El i.e.,linearly reduced(ii)it saves the optimum outcome observed in all iterations by utilizing the food source parameter for later work,once the population breaks down(i)the leader explores the searching area by changing the corresponding position by nourishment resource and the follower alters their corresponding position according to each other and move to the leader salps,that results in barring the model to fall in local optimal stagnation.Fig.2 demonstrates the flowchart of SSA.

    Figure 2:Flowchart of SSA

    Every nature simulated meta-heuristic technique selects the primary parameter arbitrarily as the candidate solution.Usually,the arbitrary population elective procedure follows uniform distribution method.As the learning techniques follows black box manner and could not need some background data it begins enhancing the candidate solution for getting optimal result still existing conditions are not attained.The efficiency of such techniques has restricted the count of time utilized by validating all candidate solutions inside the explore space for reaching neighboring optimum solutions as global optimal.In order to obtain global optimal,all adjacent optimum solutions have that scrutinized.Therefore,detection of neighboring optimum solution as only continued with primary guess of parameter could not sufficient in the explore space.Besides,for increasing the exploration ability from the explore space,when it can be assumed that opposite case concurrently with primary guess,afterward the possibility of obtaining neighboring optimum solutions near global optimal improves.For enhancing the exploration ability as well as avoiding early convergence from local minimal,novel evolutionary approach appeared,planned as space transformation search(STS).Based on STS process the ongoing search area was reallocated to fresher area for evaluating candidate solutions for both spaces concurrently.An STS approach includes 4 methods amongst that OBL is among them.The OBL method is written asX∈[P,Q],where X refers to the real number andP,Qsignifies the boundary values of exploring area.Afterward,due to OBL method opposite is represented as:

    where,X*∈[P+Q].

    The fitness has computed then getting a novel place by utilizing OBL approach in the transmitted space.Afterward,the fitness has been related to the preceding observed fitness created in the primary population of SSA.Afterward,comparative further neighboring optimum solutions are assumed that next generation and continue the round still determined conditions not obtained.

    3 Performance Validation

    In this section,the experimental results analysis of the AIMDO-SMEC technique takes place and the results are reviewed under several aspects.

    Tab.1 and Fig.3 showcases theNMSEanalysis of the SNN technique to examine the traffic prediction outcomes.The results ensured that the SNN technique has gained improved prediction outcomes with minimal values of N_MSE.For instance,with area of 5 sq.km,the SNN technique has obtained lower N_MSE values of 0.00962 but the LSTM,BiLSTM,and GRU models have provided higher N_MSE of 0.01348,0.01105,and 0.00981.At the same time,with area of 15 sq.km,the SNN system has attained decreased N_MSE of 0.00201 but the LSTM,BiLSTM,and GRU manners have provided increased N_MSE values of 0.00416,0.00275,and 0.00218 correspondingly.Likewise,with area of 25 sq.km,the SNN system has reached reduced N_MSE of 0.00036 while the LSTM,BiLSTM,and GRU manners have reached higher N_MSE of 0.00199,0.00086,and 0.00062 correspondingly.Similarly,with area of 40 sq.km,the SNN method has achieved minimal N_MSE of 0.00007 although the LSTM,BiLSTM,and GRU manners have reached increased N_MSE values of 0.00073,0.00027,and 0.00010 correspondingly.

    Table 1:Predictive results analysis of SNN model

    Tab.2 and Fig.4 depict the CTT analysis of the ASCE manner to study the traffic prediction outcomes.The results ensured that the ASCE method has reached increased prediction outcomes with lower values of CTT.For instance,with task count of 1,the ASCE system has obtained lower CTT of 0.424 but the Adaptive and fixed approaches have attained higher CTT of 0.675 and 0.651 correspondingly.Also,with task count of 5,the ASCE algorithm has obtained lower CTT of 0.513 while the Adaptive and fixed systems have obtained maximal CTT of 1.154 and 1.251 respectively.Similarly,with task count of 15,the ASCE approach has obtained lower CTT of 0.837 while the Adaptive and fixed systems have attained higher CTT of 2.176 and 2.436 correspondingly.At last,with task count of 20,the ASCE methodology has obtained minimal CTT of 0.983 but the Adaptive and fixed methodologies have achieved higher CTT of 2.971 and 3.198 respectively.

    Figure 3:N_MSE analysis of SNN model

    Table 2:Completion time of tasks(CTT)analysis of ASCE model

    Figure 4:CTT analysis of ASCE technique with different count of tasks

    A comprehensive results analysis of the MSSA-XBoost technique takes place under TS of 60%in Fig.5.The results show that the RF technique has accomplished least performance with theseny,spey,accy,Fscore,andkappaof 0.924,0.938,0.930,0.936,and 0.860 respectively.At the same time,the DBN model has gained certainly increased outcome with theseny,spey,accy,Fscore,andkappaof 0.915,0.958,0.962,0.916,and 0.913 respectively.Moreover,the optimal DBN model has attained moderate performance with theseny,spey,accy,Fscore,andkappaof 0.990,0.962,0.977,0.978,and 0.953 respectively.Furthermore,the optimal FFNN model has resulted in competitive outcome with theseny,spey,accy,Fscore,andkappaof 0.994,0.975,0.981,0.986,and 0.969 respectively.However,the MSSA-XGBoost technique has portrayed the other methods with the maximalseny,spey,accy,Fscore,andkappaof 0.998,0.985,0.9940,0.996,and 0.981 respectively.

    Figure 5:Comparative analysis of MSSA-XBoost technique under TS=60%

    A brief results analysis of the MSSA-XBoost approach take place under TS of 70%in Fig.6.The outcomes demonstrated that the RF manner has accomplished worse performance with theseny,spey,accy,Fscore,andkappaof 0.938,0.945,0.938,0.944,and 0.892 correspondingly.Simultaneously,the DBN approach has reached certainly improved outcome with theseny,spey,accy,Fscore,andkappaof 0.925,0.963,0.968,0.926,and 0.927 correspondingly.In addition,the optimal DBN manner has obtained moderate performance with theseny,spey,accy,Fscore,andkappaof 0.993,0.966,0.982,0.980,and 0.961 correspondingly.Besides,the optimal FFNN technique has resulted in competitive outcome with theseny,spey,accy,Fscore,andkappaof 0.996,0.979,0.989,0.991,and 0.974 correspondingly.Finally,the MSSA-XGBoost technique has outperformed the other methods with the maximalseny,spey,accy,Fscore,andkappaof 0.998,0.985,0.994,0.996,and 0.981 correspondingly.

    Figure 6:Comparative analysis of MSSA-XBoost technique under TS=70%

    A detailed results analysis of the MSSA-XBoost manner takes place under TS of 80%in Fig.7.The outcomes exhibited that the RF system has accomplished worse performance with theseny,spey,accy,Fscore,andkappaof 0.945,0.953,0.945,0.953,and 0.912 correspondingly.Concurrently,the DBN manner has gained certainly higher outcome with theseny,spey,accy,Fscore,andkappaof 0.933,0.978,0.974,0.929,and 0.931 respectively.Followed by,the BMO-DBN methodology has attained moderate performance with theseny,spey,accy,Fscore,andkappaof 0.996,0.972,0.988,0.984,and 0.966 respectively.Additionally,the BSA-FFNN system has resulted in competitive outcome with theseny,spey,accy,Fscore,andkappaof 0.998,0.988,0.992,0.996,and 0.978 respectively.However,the MSSA-XGBoost technique has demonstrated the other manners with the superiorseny,spey,accy,Fscore,andkappaof 0.999,0.992,0.996,0.997,and 0.989 correspondingly.

    Figure 7:Comparative analysis of MSSA-XBoost technique under TS=80%

    The above mentioned results analysis demonstrated that the proposed manner is found to be an effective tool for data offloading and cyberattacks identification in MEC systems.

    4 Conclusion

    In this article,an effective AIMDO-SMEC technique has been developed to accomplish effective data offloading and security in MEC.The presented AIMDO-SMEC manner encompasses three major stages namely SNN based traffic flow prediction,ASCE based data offloading,and MSSA with XGBoost based cyberattack classification.The use of MSSA technique helps to properly adjust the parameters involved in the XGBoost technique and it results in improved detection outcomes.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDO-SMEC technique interms of different measures.The experimental results confirmed the supremacy of the AIMDO-SMEC technique over the recent approaches.In future,energy aware task scheduling and resource allocation models can be introduced for MEC systems.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/209/42).Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R77),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产中年淑女户外野战色| 91午夜精品亚洲一区二区三区| 国产亚洲5aaaaa淫片| 国产精品一区二区三区四区久久| 春色校园在线视频观看| 国产亚洲精品第一综合不卡 | 亚洲成色77777| 亚洲av国产av综合av卡| 国产精品一区二区在线不卡| 欧美丝袜亚洲另类| 岛国毛片在线播放| 搡女人真爽免费视频火全软件| 天美传媒精品一区二区| 亚洲精品中文字幕在线视频| 免费大片黄手机在线观看| 永久免费av网站大全| 亚洲一级一片aⅴ在线观看| 亚洲高清免费不卡视频| 如何舔出高潮| 久久女婷五月综合色啪小说| 色吧在线观看| 亚洲综合精品二区| 又黄又爽又刺激的免费视频.| 成人免费观看视频高清| 亚洲美女视频黄频| 男男h啪啪无遮挡| 中文字幕亚洲精品专区| 久久av网站| 亚洲精品乱码久久久久久按摩| 一边亲一边摸免费视频| a级毛片黄视频| 亚洲欧美色中文字幕在线| 黑丝袜美女国产一区| 成人国产麻豆网| 久久97久久精品| 丝袜在线中文字幕| 国产成人freesex在线| av播播在线观看一区| 激情五月婷婷亚洲| 啦啦啦啦在线视频资源| 成人免费观看视频高清| 一本色道久久久久久精品综合| av国产久精品久网站免费入址| 18禁观看日本| 欧美日韩综合久久久久久| 日韩不卡一区二区三区视频在线| 国语对白做爰xxxⅹ性视频网站| 丝瓜视频免费看黄片| 国产在线免费精品| 亚洲av.av天堂| videossex国产| 乱人伦中国视频| 国产成人精品在线电影| 亚洲国产av新网站| 大香蕉97超碰在线| 国产精品人妻久久久久久| 91午夜精品亚洲一区二区三区| 一级毛片电影观看| 婷婷成人精品国产| 人人妻人人澡人人爽人人夜夜| 最新中文字幕久久久久| 亚洲精品国产av成人精品| av在线app专区| 精品国产露脸久久av麻豆| 一级毛片 在线播放| 一级毛片我不卡| 乱码一卡2卡4卡精品| 亚洲成色77777| 少妇人妻久久综合中文| 国产片特级美女逼逼视频| 国产免费又黄又爽又色| 这个男人来自地球电影免费观看 | 日韩熟女老妇一区二区性免费视频| 精品国产乱码久久久久久小说| 亚洲欧美日韩卡通动漫| 日本91视频免费播放| 精品国产一区二区三区久久久樱花| 精品久久久久久电影网| 一本大道久久a久久精品| 丝袜喷水一区| 91久久精品电影网| 最近中文字幕高清免费大全6| 国产日韩欧美视频二区| 精品亚洲成国产av| 成人二区视频| 久久综合国产亚洲精品| av在线播放精品| 大片免费播放器 马上看| 97精品久久久久久久久久精品| 少妇被粗大的猛进出69影院 | 母亲3免费完整高清在线观看 | 超色免费av| 色视频在线一区二区三区| 国产黄色视频一区二区在线观看| 纯流量卡能插随身wifi吗| 午夜精品国产一区二区电影| 亚洲精品国产av蜜桃| 久久久久久久亚洲中文字幕| 国产精品不卡视频一区二区| 欧美日韩综合久久久久久| 伊人亚洲综合成人网| 日韩不卡一区二区三区视频在线| 国产精品免费大片| 啦啦啦中文免费视频观看日本| 男人爽女人下面视频在线观看| 狠狠精品人妻久久久久久综合| 少妇的逼水好多| 插逼视频在线观看| 一区在线观看完整版| 国产亚洲欧美精品永久| 97超视频在线观看视频| av一本久久久久| 激情五月婷婷亚洲| 91精品国产国语对白视频| 久久精品久久久久久久性| 十八禁网站网址无遮挡| 97超视频在线观看视频| 99热这里只有是精品在线观看| 欧美人与善性xxx| 欧美bdsm另类| 亚洲综合精品二区| 尾随美女入室| 亚洲av.av天堂| a 毛片基地| 久久毛片免费看一区二区三区| av播播在线观看一区| 日日摸夜夜添夜夜爱| 亚洲精品一区蜜桃| 日韩一本色道免费dvd| 亚洲av电影在线观看一区二区三区| 超碰97精品在线观看| 国产精品一区二区三区四区免费观看| 国产一区二区在线观看av| 美女cb高潮喷水在线观看| 久久精品熟女亚洲av麻豆精品| 久久久亚洲精品成人影院| 国产成人av激情在线播放 | 日韩av不卡免费在线播放| 亚洲情色 制服丝袜| 中文字幕免费在线视频6| 插逼视频在线观看| 久久综合国产亚洲精品| 亚洲av成人精品一区久久| 亚洲av欧美aⅴ国产| 亚洲av电影在线观看一区二区三区| 国产精品蜜桃在线观看| 男女免费视频国产| 亚洲精品久久午夜乱码| 黄色欧美视频在线观看| 少妇被粗大猛烈的视频| 欧美日韩av久久| 一个人看视频在线观看www免费| 日韩精品有码人妻一区| 欧美xxxx性猛交bbbb| 99国产精品免费福利视频| 国产伦精品一区二区三区视频9| 女性被躁到高潮视频| 18+在线观看网站| 观看av在线不卡| 一区二区三区乱码不卡18| 成年女人在线观看亚洲视频| 看非洲黑人一级黄片| 最近手机中文字幕大全| 日韩在线高清观看一区二区三区| 亚洲av.av天堂| 51国产日韩欧美| 亚洲在久久综合| 亚洲伊人久久精品综合| 建设人人有责人人尽责人人享有的| 伦理电影大哥的女人| 久久久久视频综合| 丝袜在线中文字幕| 一级,二级,三级黄色视频| 日本爱情动作片www.在线观看| 精品亚洲成国产av| 免费观看a级毛片全部| 春色校园在线视频观看| 看免费成人av毛片| 国产男人的电影天堂91| 999精品在线视频| 久久国产精品大桥未久av| 免费久久久久久久精品成人欧美视频 | 一区二区三区精品91| 久久国产亚洲av麻豆专区| 国产一区有黄有色的免费视频| 只有这里有精品99| 国产精品久久久久成人av| 少妇的逼水好多| 人人妻人人澡人人看| 欧美日韩av久久| 精品酒店卫生间| 自拍欧美九色日韩亚洲蝌蚪91| 青春草国产在线视频| 国产白丝娇喘喷水9色精品| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲成人一二三区av| 肉色欧美久久久久久久蜜桃| 免费观看性生交大片5| 国产高清三级在线| 男人操女人黄网站| 在线 av 中文字幕| 人妻制服诱惑在线中文字幕| 777米奇影视久久| 久久久久国产精品人妻一区二区| 国产熟女欧美一区二区| 91久久精品国产一区二区成人| 黄色欧美视频在线观看| 亚洲伊人久久精品综合| 欧美成人精品欧美一级黄| 肉色欧美久久久久久久蜜桃| 黄片播放在线免费| av视频免费观看在线观看| 亚洲怡红院男人天堂| 亚洲五月色婷婷综合| 国产白丝娇喘喷水9色精品| 九色成人免费人妻av| 欧美 日韩 精品 国产| 两个人的视频大全免费| 黄色怎么调成土黄色| 蜜桃久久精品国产亚洲av| 亚洲av欧美aⅴ国产| 国产成人a∨麻豆精品| 少妇的逼水好多| 精品久久久久久电影网| 国产成人aa在线观看| 欧美变态另类bdsm刘玥| 夜夜爽夜夜爽视频| 国产亚洲av片在线观看秒播厂| 十八禁网站网址无遮挡| 欧美亚洲 丝袜 人妻 在线| 日韩三级伦理在线观看| 男男h啪啪无遮挡| 狠狠精品人妻久久久久久综合| 黑丝袜美女国产一区| 各种免费的搞黄视频| 99九九在线精品视频| 日本91视频免费播放| 男女免费视频国产| 十分钟在线观看高清视频www| 最近最新中文字幕免费大全7| 少妇的逼水好多| 国产免费一区二区三区四区乱码| 国产免费一区二区三区四区乱码| a级毛色黄片| 黑人巨大精品欧美一区二区蜜桃 | 人体艺术视频欧美日本| 中文字幕人妻丝袜制服| 2022亚洲国产成人精品| 国产精品无大码| 国产欧美另类精品又又久久亚洲欧美| a级毛片免费高清观看在线播放| xxxhd国产人妻xxx| 国产免费一区二区三区四区乱码| 九色亚洲精品在线播放| 久久人人爽人人片av| 自线自在国产av| 老女人水多毛片| 考比视频在线观看| 久久女婷五月综合色啪小说| 国产黄色免费在线视频| 亚洲av福利一区| 久久影院123| 久久97久久精品| 在现免费观看毛片| 久久久久久久大尺度免费视频| 成年女人在线观看亚洲视频| 九草在线视频观看| 亚洲精品亚洲一区二区| 国产成人免费观看mmmm| 日本爱情动作片www.在线观看| 最近2019中文字幕mv第一页| 亚洲精品国产av蜜桃| 欧美激情 高清一区二区三区| a级毛片在线看网站| xxx大片免费视频| 18禁在线无遮挡免费观看视频| 99热这里只有是精品在线观看| videos熟女内射| 欧美激情极品国产一区二区三区 | 亚洲无线观看免费| 三级国产精品欧美在线观看| 久久精品久久久久久噜噜老黄| 高清av免费在线| 2021少妇久久久久久久久久久| 欧美成人精品欧美一级黄| 青春草视频在线免费观看| 99精国产麻豆久久婷婷| 国产欧美日韩综合在线一区二区| 亚洲国产精品一区三区| 少妇 在线观看| 国产精品国产av在线观看| 午夜福利在线观看免费完整高清在| 日韩精品有码人妻一区| 综合色丁香网| 亚洲av综合色区一区| 国产又色又爽无遮挡免| 中文字幕人妻丝袜制服| 99九九在线精品视频| 国产毛片在线视频| 亚洲精品国产色婷婷电影| 亚洲国产毛片av蜜桃av| 大话2 男鬼变身卡| 亚洲一级一片aⅴ在线观看| 在线观看免费高清a一片| 99热6这里只有精品| videos熟女内射| 欧美激情国产日韩精品一区| 大话2 男鬼变身卡| 人人妻人人澡人人看| 搡老乐熟女国产| 伊人久久国产一区二区| 亚洲美女黄色视频免费看| 亚洲av免费高清在线观看| 久久精品人人爽人人爽视色| 国精品久久久久久国模美| 久久久欧美国产精品| 菩萨蛮人人尽说江南好唐韦庄| 亚洲色图综合在线观看| 青春草国产在线视频| 国产不卡av网站在线观看| 九九在线视频观看精品| 青青草视频在线视频观看| 大又大粗又爽又黄少妇毛片口| 精品久久久久久电影网| 内地一区二区视频在线| 久久精品国产自在天天线| 国产无遮挡羞羞视频在线观看| 久久热精品热| 欧美精品亚洲一区二区| 91久久精品电影网| 亚洲国产色片| 欧美最新免费一区二区三区| 少妇人妻 视频| 91精品国产国语对白视频| 日日啪夜夜爽| 亚洲美女视频黄频| 熟妇人妻不卡中文字幕| 国产极品粉嫩免费观看在线 | 插逼视频在线观看| 久久人人爽av亚洲精品天堂| a级毛色黄片| 国产毛片在线视频| 欧美亚洲 丝袜 人妻 在线| 精品久久久久久久久av| 特大巨黑吊av在线直播| 国产免费现黄频在线看| 日本色播在线视频| av国产精品久久久久影院| 自线自在国产av| 日本午夜av视频| 建设人人有责人人尽责人人享有的| 日韩av在线免费看完整版不卡| 国产老妇伦熟女老妇高清| 免费观看av网站的网址| 春色校园在线视频观看| 肉色欧美久久久久久久蜜桃| 中文字幕精品免费在线观看视频 | 国产成人91sexporn| 中文字幕制服av| 欧美三级亚洲精品| 精品午夜福利在线看| av不卡在线播放| av黄色大香蕉| 日韩大片免费观看网站| tube8黄色片| 十分钟在线观看高清视频www| 久久久久久久久久久丰满| 视频区图区小说| 亚洲国产成人一精品久久久| 亚洲国产av新网站| 亚洲精品乱码久久久v下载方式| 欧美bdsm另类| 黑人巨大精品欧美一区二区蜜桃 | 亚洲综合色网址| 麻豆乱淫一区二区| 91国产中文字幕| 99热这里只有是精品在线观看| 欧美xxⅹ黑人| 熟女人妻精品中文字幕| 亚洲精品日韩在线中文字幕| 麻豆精品久久久久久蜜桃| 天天躁夜夜躁狠狠久久av| 精品国产国语对白av| 久久久精品免费免费高清| 黑人高潮一二区| 精品亚洲乱码少妇综合久久| av在线观看视频网站免费| 国产片特级美女逼逼视频| 国产成人freesex在线| 少妇的逼好多水| 亚洲不卡免费看| 国产极品粉嫩免费观看在线 | av播播在线观看一区| 啦啦啦啦在线视频资源| 人妻夜夜爽99麻豆av| 亚洲色图综合在线观看| 少妇的逼水好多| 成人国产av品久久久| 男女啪啪激烈高潮av片| 99热这里只有是精品在线观看| av播播在线观看一区| 国产精品久久久久久久久免| 26uuu在线亚洲综合色| 亚洲人成网站在线播| 国产欧美日韩综合在线一区二区| 涩涩av久久男人的天堂| 亚洲国产欧美在线一区| 人妻 亚洲 视频| 男女国产视频网站| 免费看光身美女| 亚洲精品av麻豆狂野| 精品少妇黑人巨大在线播放| 一级毛片电影观看| 久久久久久久亚洲中文字幕| 亚洲美女黄色视频免费看| 99热6这里只有精品| 成人毛片60女人毛片免费| 在线观看免费高清a一片| 亚洲av成人精品一区久久| 欧美精品人与动牲交sv欧美| 亚洲欧美日韩卡通动漫| 成人午夜精彩视频在线观看| 亚洲欧美成人综合另类久久久| 成年人午夜在线观看视频| 国产高清不卡午夜福利| 91在线精品国自产拍蜜月| 亚洲欧美成人精品一区二区| 2018国产大陆天天弄谢| 久久久a久久爽久久v久久| 婷婷色综合大香蕉| 欧美精品亚洲一区二区| 免费观看在线日韩| 丝袜美足系列| 国产伦理片在线播放av一区| 大码成人一级视频| 超碰97精品在线观看| 永久网站在线| 亚洲,一卡二卡三卡| 午夜免费观看性视频| 草草在线视频免费看| 亚洲成人一二三区av| 大香蕉久久成人网| 久久久久久久国产电影| 国产欧美另类精品又又久久亚洲欧美| 亚洲人成网站在线观看播放| 最近中文字幕高清免费大全6| 国产精品一区二区在线观看99| 插阴视频在线观看视频| 91午夜精品亚洲一区二区三区| 国产乱来视频区| 日本午夜av视频| 精品亚洲乱码少妇综合久久| 精品久久久久久久久av| 在线精品无人区一区二区三| 免费大片18禁| 成年人免费黄色播放视频| 18禁在线无遮挡免费观看视频| 久久人妻熟女aⅴ| a 毛片基地| 国产精品成人在线| 亚洲不卡免费看| xxx大片免费视频| 国产精品人妻久久久久久| 啦啦啦中文免费视频观看日本| 国产白丝娇喘喷水9色精品| 免费观看的影片在线观看| 美女大奶头黄色视频| 亚洲精品中文字幕在线视频| 精品一区二区免费观看| 99久久精品一区二区三区| 观看美女的网站| videosex国产| 亚洲精品日本国产第一区| 一区二区三区精品91| 在线亚洲精品国产二区图片欧美 | 天天影视国产精品| 中国国产av一级| 五月开心婷婷网| 亚洲精品国产av成人精品| 一级,二级,三级黄色视频| 特大巨黑吊av在线直播| 亚洲国产欧美在线一区| 亚洲,欧美,日韩| 国产成人a∨麻豆精品| 三级国产精品欧美在线观看| 超碰97精品在线观看| 日本vs欧美在线观看视频| 秋霞伦理黄片| 久久精品久久精品一区二区三区| 全区人妻精品视频| 午夜激情福利司机影院| 成人国产麻豆网| 亚洲欧美色中文字幕在线| 男女国产视频网站| 亚洲av二区三区四区| 女性被躁到高潮视频| 欧美日韩成人在线一区二区| 黑人巨大精品欧美一区二区蜜桃 | 九色亚洲精品在线播放| 久久精品久久久久久噜噜老黄| 免费少妇av软件| 国产综合精华液| 国产在线视频一区二区| 免费观看无遮挡的男女| 黄色配什么色好看| 毛片一级片免费看久久久久| 五月开心婷婷网| 国产成人a∨麻豆精品| 久久久久久久久久人人人人人人| 热re99久久国产66热| 人人妻人人澡人人爽人人夜夜| 国精品久久久久久国模美| 大香蕉久久网| 人人妻人人添人人爽欧美一区卜| 亚洲国产精品999| 制服人妻中文乱码| 欧美日韩综合久久久久久| 久久精品夜色国产| 菩萨蛮人人尽说江南好唐韦庄| 成人午夜精彩视频在线观看| 亚洲欧洲日产国产| 免费看不卡的av| 国产精品女同一区二区软件| 80岁老熟妇乱子伦牲交| 国产亚洲午夜精品一区二区久久| 亚洲精品久久成人aⅴ小说 | 下体分泌物呈黄色| 亚洲精品乱码久久久久久按摩| 亚洲五月色婷婷综合| 18在线观看网站| 国产69精品久久久久777片| 国产一区二区三区av在线| 欧美3d第一页| 3wmmmm亚洲av在线观看| 欧美成人午夜免费资源| 九九久久精品国产亚洲av麻豆| 99热这里只有精品一区| 大片电影免费在线观看免费| 日本黄色日本黄色录像| 国产精品久久久久久精品电影小说| 国产 一区精品| 国产成人精品一,二区| 黄色怎么调成土黄色| 精品熟女少妇av免费看| 妹子高潮喷水视频| 日韩中文字幕视频在线看片| 国产成人freesex在线| 中文乱码字字幕精品一区二区三区| 亚洲一区二区三区欧美精品| 丰满饥渴人妻一区二区三| 欧美日韩成人在线一区二区| 妹子高潮喷水视频| 99热国产这里只有精品6| 在线精品无人区一区二区三| 人妻人人澡人人爽人人| 欧美日韩成人在线一区二区| 又黄又爽又刺激的免费视频.| 久久综合国产亚洲精品| 制服丝袜香蕉在线| 纯流量卡能插随身wifi吗| 高清av免费在线| 日韩熟女老妇一区二区性免费视频| 最近的中文字幕免费完整| 搡女人真爽免费视频火全软件| 另类亚洲欧美激情| 最后的刺客免费高清国语| 在线观看免费日韩欧美大片 | 少妇的逼好多水| 欧美激情 高清一区二区三区| 久久 成人 亚洲| 精品国产露脸久久av麻豆| 午夜激情av网站| 日产精品乱码卡一卡2卡三| 少妇熟女欧美另类| 极品人妻少妇av视频| 熟女av电影| 国内精品宾馆在线| av免费观看日本| 人妻 亚洲 视频| 日韩欧美精品免费久久| 成人手机av| 日本欧美视频一区| 欧美少妇被猛烈插入视频| 一个人看视频在线观看www免费| 亚洲成人手机| 男女免费视频国产| 久久精品国产亚洲网站| 草草在线视频免费看| 日日摸夜夜添夜夜添av毛片| 中文字幕精品免费在线观看视频 | 91aial.com中文字幕在线观看| 亚洲国产成人一精品久久久| 99热网站在线观看| 男女无遮挡免费网站观看| 免费大片18禁| 欧美最新免费一区二区三区| 简卡轻食公司| 国产一区二区三区av在线| videos熟女内射| 久久青草综合色| 午夜日本视频在线| 午夜福利视频在线观看免费| 久久久久久久精品精品| a级毛片在线看网站| 日本91视频免费播放| 久久青草综合色| 亚洲精品日韩在线中文字幕| 在线观看一区二区三区激情| 中文字幕av电影在线播放| 交换朋友夫妻互换小说| 性色av一级| 亚洲综合色惰| 成人午夜精彩视频在线观看| 久久99热这里只频精品6学生| 色94色欧美一区二区|