• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

    2022-08-24 07:02:46TarigMohamedAhmed
    Computers Materials&Continua 2022年8期

    Tarig Mohamed Ahmed

    Department of Information Technology,FCIT,King Abdulaziz University,Jeddah,Saudi Arabia

    Abstract: Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.

    Keywords: Mobile agent;security capturing;integrity attacks

    1 Introduction

    Mobile Agent systems are a promising area for computers to communicate through networks.Mobile Agent(MA) allows users to perform their tasks efficiently by using an asynchronous mode[1].MA is an object that has the ability to move autonomously among a network node to perform tasks on behalf of users[2].It has many benefits over traditional ways such as reducing the network bandwidth,low network latency and reducing the communication cost [3].Through a journey,MA visits hosts that provide services based on user requirements[4].

    Mobility is a key feature for MA systems that allows MAs to move in heterogeneous networks to perform tasks on behalf of the user [5].The mobility could be one of two mechanisms such as a predefined itinerary(Static)and a free-roaming(Dynamic)[6].The predefined itinerary mechanism is used when all visited hosts are known before MA starts its journey[7].The free-roaming mechanism is used when MAs visit hosts are unknown and MA will move among hosts based on execution environment conditions[8].This paper deals with the second one the free-roaming[9-11].

    MA deals with many entities during its execution so,security is highly required.The MA security is classified into two main categories:platform security and MA security (As Object) [12].The platform security aims to protect hosts (service providers) against malicious MAs such as accessing unauthorized information or acting like viruses,[13,14].On the other hand,MA security aims to protect MA against malicious hosts that may attack the MA integrity.In addition,malicious hosts may prevent MAs to continue their journeys(Capturing)[15].Two main approaches to deal with MA security issues:detection or prevention approaches.The detection approach is to find if there is a problem that occurred and try to solve it by using different mechanisms such as tracing MA results or using cryptography mechanisms [16,17].Most of the proposed mechanisms are used to protect MA systems partially but not completely.This paper addresses unsolved security issues completely by current security mechanisms in case of using a free-roaming mobility mechanism,such as[18-20]:

    1.MA capturing Attacks by malicious hosts.

    2.MA integrity Attacks by malicious hosts.

    This paper proposes a mechanism to protect MAs against two types of attacks Capturing and Integrity.In addition,it provides a fault tolerance mechanism in case of normal failure that disallows MAs to continue their journeys.The proposed mechanism is called Check-Point Mechanism(CPM).CPM is based on two concepts:Checkpoints to protect MA from capturing by malicious hosts and MA Multi-Version to protect the MA integrity during a journey.the mechanism details will present in the below sections.

    The paper rest is organized as follows:Section 2 presents some proposed mechanisms related to MAs protection.Section 3 explains a method of CPM to protect MA.The method presents the mechanism framework,components,and algorithm.Section 4 shows the result of the MA system with CPM and without CPM implementation as a prototype.Section 5 discusses the results in terms of CPM feasibility and performance.The paper is concluded in Section 6 with some recommendation points as future works.

    2 Related Work

    This paper focuses on MA protection against malicious hosts.When it uses free-roaming as a mobility mechanism.This section presents some proposed mechanisms in the same area of security to specify the research gap as follows:

    Roth [21]proposed a schema that allows mutual recording of MA itinerary with cooperating Mobile Agent Systems.While MA roaming among different platforms,it provides information about current,previous,and next platforms to follower MA to check the consistency by making authentication.In case of any violation,fitting action is done.Yee [22]developed a mechanism to ensure MA integrity during its journey.The mechanism was based on an encryption mechanism.In each place visited by MA,the result is encrypted.When MA returns home,all results are verified to make sure no integrity attack occurred.But,encryption has a bad impact on overall performance.To check MA integrity,Vigna[23]proposed to make tracing the execution history of MA.If there is any type of conflict in the execution,the host of that execution will be considered as a malicious host.Esparza [24]suggested watermarking approach to detect attacks against MA.This approach uses a digital watermark to be added in MA during its journey.When MA finished its duty,the result is verified to find the mark.If the MA code is changed,the watermark becomes defective and scrambled[25].Tajer et al.proposed a framework to support MA agents during their journeys.The framework aims to protect MAs against Eavesdropping and Alternation attacks.The idea is based on evaluating how different types of MAs react with attacks.In this way,the system can build trust in hosts [26].Address Forward and Data Backward(AFBD)is a mechanism to protect MA’s integrity.MA sends a result of each visited host before moving to another.In this case,MA only carries the hosts’addresses.In this way,the obtained results from hosts will be completely protected.But sometimes,the results may be needed in computation processes during a journey[27].Secure Image Mechanism(SIM)was proposed by Ahmed [28].A copy of MA is sent to a Controller (Trust Host) before sending to an anonymous host for execution.MA back to the controller after finishing the execution to be verified.If any modifications occur,the mechanism declares the host as malicious[29].Mu?oz et al.proposed a trusted platform model to protect MAs based on hardware components.The model is implemented as a chip that is integrated into hardware.It has two activates first one,configuration justification of hosts.The second one,a host data protection.This model works as a protocol that is enforced to migrate MA[30].Trusted security mechanism proposed by Dadhich et al.It is based on Trust decisions which are combined with security decision making.The security decision is taken based on security management [12].Trust Management involves organizing the information necessary to pass a trust relationship.Trust specifies a relationship between two objects on a specific statement.In addition,it is described using belief levels,disbelief,and uncertainty[31].

    As mentioned above,these security mechanisms were not given a solution regarding capturing and integrity as a security prevention method.In addition,the Fault-Tolerance feature is missing.

    3 Method and Material

    The main idea behind this paper is to propose a novel mechanism that has the ability to protect MAs against malicious hosts in two situations:first,Capturing MAs by preventing them to continue their journeys.The second,MAs Integrity by detecting and preventing at the same time.The mechanism is called Check Point Mechanism(CPM).The following sections describe CPM in terms of a framework,components,and algorithm.

    CPM Description

    CPM aims to protect MAs against Malicious hosts.The CPM assumes there are two types of hosts:Trusted Hosts(TH)and Untrusted Hosts(UT).MA can Visit multiple hosts either TH or UT such as th1,th2,...thnN is a number of trusted hosts and,ut1,ut2,...utmM is the number of untrusted hosts.When a MA visits any type of host,a new version of the MA such as ma1,ma2,...,makK is the number of total hosts that are visited by MA.The main entities of CPM are described as follows:

    Mobile Agent(MA)

    MA is an object that can travel autonomously among hosts to perform some duties on behalf of users.It consists of two main parts:first,data state represents information about MA,required data for processing in different hosts,and results that are obtained during the journey.The second part represents the behavior of MA that changes the MA state.The behavior is constituted based on services that are requested by the users.MA moves from one host to another by using mobility property.The proposed mechanism assumes that MA uses a free-roaming method as a mobility mechanism.Freeroaming means MAs are not equipped with itinerary tables.When MA reaches the first station,will get information about the next station based on required services.During a journey,multi versions of MAs are generated such as ma1,ma2,...,makK is a number of total hosts that are visited.Fig.1 presents MA components.

    Figure 1:MA components

    3.1 Mobile Agent Base(MAB)

    Mobile Agent Base(MAB)represents MAs home.From this place,MAs start their journeys and after finishing their duties return to MAB.It receives requests from users and provides MAs with these requests.After completing its journey,MA returns to MAB with results.MAB extracts the results.In addition,it monitors MAs during their journey.CPM allows MAB to verify the results by using information from Recover Host (RH).RH is one of the key players in CPM.It saves image copies of MA versions during it is journey to protect it against malicious hosts.MAB consists of several components such as:MA Creator:This component aims to create MA according to the user’s request.In addition,it provides MA by needs during its journey for example the first station of its journey and some stations as backup hosts that may need it.The backup hosts will be used in case the visited hosts fail to provide MA with an appropriate host as a next station according to its mission.MA Dispatcher aims to transfer MA to its first station.In case of any problem transferring MA to the next host,the Dispatcher will select one of the backup hosts that is stored inside MA.MA Receiver:This component receives MAs after completing their journeys and extracting the obtained results.MA Verifier:By using MA versions from RH,this component verifies MA integrity by making tracing.MA reporter:This component aims to prepare the result and submit it to the users.Fig.2 is USE CASE diagram presents MAB components.

    3.2 HOSTS

    Hosts provide MAs with services based on their mission.There are two types of hosts:first,a trusted host(TH)that is completely secure to MAs.The second,an untrusted host(UT).The untrusted host may capture MAs or attack their integrities.All hosts in CPM are considered to belong to one of the two types.To protect MAs against UTs.Before,MA visits UT,a copy of the current version will be kept in RH.So,RH may keep multiple different versions of MA.The host composes of components to achieve its role such as Services:Services are requested by visited MAs.Hosts Database:this component provides MAs with the next hosts in their journeys according to their missions.Because in our proposed mechanism,MAs use the Free-Roaming mechanism for mobility.Recovery Unit:this unit is only available in trusted hosts.It aims to send a MA copy to RH in case the next station is an untrusted host.

    Figure 2:MAB use case

    3.3 Recovery Host

    Recovery Host(RH)plays a key role in CPM.It keeps multi versions of a MA to grantee protection against MAs capturing integrity attacks.The latest version could work instead of MA in case UT prevents an original MA to continue or being lost for any technical reason (fault-tolerance).The multi versions of the MA are used to verify the MA’s integrity by MAB.MAs are kept in RH when a checkpoint is performed.The checkpoint is performed in two cases.First,before MA visits UT.The second,if a user sets multiple checkpoints when MA is created.For example,the user may set a number of checkpoints during a journey.By this,the user can monitor his/her MA’s progress.To accomplish its duties,RH stores MAs multi-version in a stack and it uses PUSH and POP operation to store and retrieve MA versions.Fig.3 presents the USE CASE of RH.

    3.4 CPM Algorithm

    This section describes the logic steps of CPM by using the entities that are described above.Before MA starting it is journey,MAB send a message to RH to create a stack for the MA versions.These versions are generated when a MA visits TH or UT.The MA version will be sent to RH in two cases:first,before MA visiting UT.Second,checkpoints are settled by MAB.Periodically,RH sends signal to MAB about a status of MAs based on receiving MA versions.Tab.1 presents CPM algorithm that are followed by MAs during journeys:

    Figure 3:Recovery host use case

    Table 1:CPM algorithm

    Table 1:Continued

    Fig.4 presents CPM in the content of a mobile agent system.A user submits tasks to MAB.MAB creates a MA based on the tasks.The MA starts its journey by visiting multiple hosts.Before the MA visits UH,a version copy will be kept in RH.MA copies that are stored in RH will be used to protect the MA against capturing and integrity attacks.

    Figure 4:CPM framework

    4 CPM Implementation

    To measure the validity of CPM,a complete prototype of a mobile agent system has been implemented by using.Net Framework and C# language.The prototype was implemented first without CPM and after that with CPM to compare the impact of the performance.It consists of four main components:

    1.MA class is used to generate MA objects.MA is serialized object that can move among hosts to perform users’tasks.

    2.MBA Class is used to create MAs and provide them with the necessary information to accomplish their journeys.It has two interfaces:first to dispatch MAs and the second to receive MAs after finishing their duties.In addition,it communicates with RH to monitor MAs.

    3.Host Class is used to define hosts (TH or UH).It uses to serve MAs according to MAs requirements.Hosts have two types trusted (TH) or untrusted(UH).TH sends a MA object copy to RH.

    4.Recovery Host Class is used to keep MAs versions during their journeys.It coordinates with MAB

    The prototype of the proposed mechanism has been implemented to prove the validity of the model.Different scenarios had been conducted by using the prototype.The scenarios were based on CPM and without CPM to measure the impact of CPM on performance.

    4.1 Scenario Implementation

    In this scenario,a user wants to obtain a book price from five hosts in order to buy the cheapest one.The required book maybe not be available in some hosts,so,a MA will visit an unknown number of hosts(freer-roaming mobility was used)to achieve this task.The hosts may be trusted or untrusted.The scenarios were implemented without CPM and with CPM as follows

    4.1.1 First Scenario Without CPM

    A MA was visited 11 hosts to get a book price.The MA target was to obtain 5 prices from different hosts.Tab.2 presents the costs time by each host.

    Table 2:Without CPM scenario

    4.1.2 Second Scenario with CPM

    A MA was visited 13 hosts to get a book price.The MA target was to obtain 5 prices from different hosts.Tab.3 presents the costs time by each host.In addition,different MA versions were kept in RH to be used as recovery copies and for verification against untrusted hosts.

    Table 3:With CPM scenario

    4.1.3 Prototype Servicing Multiple MAs with CPM

    Sample screenshots are presented from the prototype implementation.Fig.5 shows a screenshot of Host 1 that was visited by 10 MAs.Host 1 provides the MAs with the same services simultaneously.

    Fig.6 shows MAB receives multiple MAs after they finished their journeys.Each MA visited different hosts.

    5 Result Discussion

    Based on several scenarios that were conducted to measure the feasibility and the performance of CPM,valuable results had been obtained.The scenarios were based on using CPM and without using CPM.First,the MA system was developed without CPM.In this scenario,the MA visited 11 hosts to ask about a book price.During the journey,the MA visited 3 untrusted hosts.So,there was a big chance that the MA may attack by those hosts either by attacking its integrity or preventing it to continue its journey.Tab.1 presented the cost times of the journey.

    The second scenario was used CPM with the same task of the first scenario.In this scenario,the MA had visited 13 hosts and 4 of them were untrusted.CPM created different versions of the MA and kept them in RH.These versions were used as recovery copies in case the MA faced attacks from the 4 untrusted hosts.In addition,some versions were created based on checkpoints assigned by the MAB.Tab.2 explains the recovery matrix during its journey for the second scenario.

    Figure 5:10 MAs visit host No.1

    Figure 6:Mobile agents return home after visiting multiple hosts

    Tab.4 presents the recovery matrix against untrusted hosts in case of two security attacks that may face MA based on the second scenario.Based on CPM,the items in the matrix will protect the MA against capturing and integrity attacks.The second column contains recovery copies for each untrusted host in case of capturing attacks.For example,if host No.6 prevents the MA to continue its journey,the recovery copy MA1 in RH will be used instated of the original MA.The third column contains the recovery copies of MA versions for each untrusted host in case of integrity attacks.For example,if host No.9 attacked the MA integrity,the MA versions:M0,MA1,MA2,MA3 will be used to detect the attack and make the correction in MAB.In Addition,there are more versions were generated based on checkpoints assigned before the MA starts its journey.MA2,MA4 have represented checkpoint versions.

    Table 4:Recovery matrix against untrusted hosts in CPM

    In the third scenario,the CPM prototype can deal with multiple MAs simultaneously.Fig.5 presents host no.1 while it services 10 MAs.In addition,Fig.6 presents multiple MAs who arrived home after completing their journeys.

    According to the time costs that were appeared in Tab.1 without CPM in the first scenario and Tab.2 with CPM in the second scenario,the impact of CPM could be analyzed.Fig.7 presents the cost times in the first and second scenarios.

    Figure 7:Cost time for CPM and without CPM

    According to the cost time analysis in two scenarios,there this no significant impact on performance when using CPM.The average cost time in the case of using CPM is 6247.3 MS and without CPM the average cost time is 6000.6.The impact of CPM performance will appear in the case of untrusted hosted capturing the MA.In this situation,the MA will continue the journey by using the recovery version in RH.The cost time(P)of the complete journey could be determined by using the following equation:

    n:No.of hosts that are visited by MA including MAB(From and To).

    T_(i-1,i):cost of time that allows MA to move from host i-1 to i

    Rj:Time that is required by MA to complete its task inside the host j.

    m:number of hosts(trusted or untrusted)visited by the MA.

    According to this discussion,the feasibility of CPM is approved and it is able to protect MAs against malicious hosts in two aspects:Capturing and Integrity attacks.In Addition,in terms of performance,CPM does not affect the overall performance negatively.

    6 Conclusion and Future Work

    Mobile Agent Technology is a promising area that allows computers to communicate with many benefits.This technology is not fully utilized because there are many security concerns.This paper has proposed CPM as a mechanism to protect MAs during their journey when they use a freeroaming mobility approach.The main idea behind CPM is to generate multiple versions of MAs to be considered as checkpoints of executions.These versions will be used to protect MAs from capturing and integrity attacks by untrusted hosts.CPM was implemented using.Net framework and C# as part of the full mobile agent system which was developed for this purpose.According to the results discussed above,CPM proved its feasibility to protect MAs against capturing and integrity attacks.In addition,there is no negatively significant difference when using CPM.Moreover,CPM can be used as a fault-tolerance mechanism in case of any normal failure which may happen to MAs.By using multiple versions that are kept in RH,MAs could be recovered.

    As future plan,CPM could work with any mobile agent system which is using a free-roaming mechanism.To make this possible,CPM needs some interfaces to interact with several mobile agent systems

    Acknowledgement:This project funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.D-152-611-1441.The author,therefore,gratefully DSR technical and financial support.

    Funding Statement:This project funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.D-152-611-1441.https://dsr.kau.edu.sa/Default-305-AR.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲五月天丁香| 一本大道久久a久久精品| 精品国产超薄肉色丝袜足j| 中文字幕人成人乱码亚洲影| 成在线人永久免费视频| 久9热在线精品视频| 日本在线视频免费播放| 黑人巨大精品欧美一区二区mp4| 最好的美女福利视频网| av在线天堂中文字幕| 别揉我奶头~嗯~啊~动态视频| 久久国产精品人妻蜜桃| 中文亚洲av片在线观看爽| 欧美黑人精品巨大| av视频在线观看入口| 成年免费大片在线观看| 亚洲专区字幕在线| 日韩成人在线观看一区二区三区| 亚洲欧美一区二区三区黑人| 国产精品亚洲av一区麻豆| 男男h啪啪无遮挡| 熟女电影av网| 国产成年人精品一区二区| 视频在线观看一区二区三区| 久久人妻av系列| 国产精品免费视频内射| 午夜福利一区二区在线看| 欧美在线一区亚洲| 亚洲第一电影网av| 在线观看免费视频日本深夜| 岛国视频午夜一区免费看| 99国产精品一区二区蜜桃av| 欧洲精品卡2卡3卡4卡5卡区| 国产精品一区二区精品视频观看| 18禁国产床啪视频网站| 两性夫妻黄色片| 正在播放国产对白刺激| 日本黄色视频三级网站网址| tocl精华| 国产激情欧美一区二区| 日韩精品青青久久久久久| 久久香蕉国产精品| 亚洲五月婷婷丁香| 亚洲欧美日韩高清在线视频| 每晚都被弄得嗷嗷叫到高潮| videosex国产| 亚洲一区高清亚洲精品| 亚洲自偷自拍图片 自拍| 国产三级在线视频| av在线天堂中文字幕| av片东京热男人的天堂| 欧美激情久久久久久爽电影| 99re在线观看精品视频| 欧美性猛交黑人性爽| 日韩有码中文字幕| 黄色毛片三级朝国网站| 久久人人精品亚洲av| 久久久精品欧美日韩精品| 非洲黑人性xxxx精品又粗又长| 成人欧美大片| 男女午夜视频在线观看| 99国产精品一区二区蜜桃av| 亚洲欧洲精品一区二区精品久久久| 亚洲精品一卡2卡三卡4卡5卡| 18禁黄网站禁片免费观看直播| 国产av不卡久久| 波多野结衣av一区二区av| 男男h啪啪无遮挡| 精品少妇一区二区三区视频日本电影| 18禁观看日本| 久久婷婷人人爽人人干人人爱| 成人亚洲精品一区在线观看| 嫁个100分男人电影在线观看| 首页视频小说图片口味搜索| 校园春色视频在线观看| 女人爽到高潮嗷嗷叫在线视频| 每晚都被弄得嗷嗷叫到高潮| 久久中文看片网| 少妇裸体淫交视频免费看高清 | 69av精品久久久久久| a级毛片a级免费在线| 国产主播在线观看一区二区| av欧美777| 1024香蕉在线观看| 久久久久久大精品| 亚洲精品久久国产高清桃花| 国产av又大| 非洲黑人性xxxx精品又粗又长| 少妇的丰满在线观看| 日本在线视频免费播放| 欧美最黄视频在线播放免费| 少妇熟女aⅴ在线视频| 悠悠久久av| 日本 av在线| 色综合站精品国产| 久久精品91无色码中文字幕| 免费在线观看亚洲国产| 日本在线视频免费播放| 色播在线永久视频| 国产精品亚洲一级av第二区| 91成人精品电影| 岛国视频午夜一区免费看| 国产高清有码在线观看视频 | 91麻豆av在线| 午夜两性在线视频| 老汉色av国产亚洲站长工具| 老司机午夜十八禁免费视频| 亚洲午夜精品一区,二区,三区| 国产蜜桃级精品一区二区三区| 午夜福利视频1000在线观看| 国产激情偷乱视频一区二区| 精华霜和精华液先用哪个| 亚洲黑人精品在线| 我的亚洲天堂| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久久久精品吃奶| 欧美久久黑人一区二区| 国产精品影院久久| 母亲3免费完整高清在线观看| 亚洲欧洲精品一区二区精品久久久| 精品国产超薄肉色丝袜足j| 国产午夜精品久久久久久| 非洲黑人性xxxx精品又粗又长| 中文字幕高清在线视频| 亚洲欧美精品综合一区二区三区| 美女大奶头视频| 中文字幕另类日韩欧美亚洲嫩草| 国产真实乱freesex| 黑人欧美特级aaaaaa片| 国产黄片美女视频| 久久精品夜夜夜夜夜久久蜜豆 | 国产男靠女视频免费网站| 无遮挡黄片免费观看| 国产精品 欧美亚洲| 麻豆一二三区av精品| 亚洲国产精品合色在线| 国产黄片美女视频| 久久国产乱子伦精品免费另类| 国产成人精品无人区| 精品久久久久久久久久久久久 | 国产一区二区在线av高清观看| 很黄的视频免费| 天天一区二区日本电影三级| 国产精品一区二区三区四区久久 | 欧美日韩黄片免| 色综合站精品国产| 午夜成年电影在线免费观看| 天天躁夜夜躁狠狠躁躁| cao死你这个sao货| 可以在线观看毛片的网站| 色在线成人网| 日韩视频一区二区在线观看| 欧美在线一区亚洲| 哪里可以看免费的av片| 制服丝袜大香蕉在线| 桃色一区二区三区在线观看| 麻豆一二三区av精品| 丝袜在线中文字幕| 一区福利在线观看| 淫秽高清视频在线观看| 两性夫妻黄色片| 国产又黄又爽又无遮挡在线| 欧美日韩瑟瑟在线播放| 人人妻人人澡欧美一区二区| 久久久国产欧美日韩av| 免费在线观看完整版高清| 香蕉丝袜av| 欧美乱妇无乱码| 老司机午夜福利在线观看视频| 91老司机精品| 超碰成人久久| 色哟哟哟哟哟哟| 国产不卡一卡二| 免费看美女性在线毛片视频| 操出白浆在线播放| 欧美最黄视频在线播放免费| 久久精品91蜜桃| 久久天堂一区二区三区四区| 18美女黄网站色大片免费观看| 国产在线精品亚洲第一网站| 色在线成人网| 国产熟女午夜一区二区三区| 免费无遮挡裸体视频| 波多野结衣高清作品| 久久久国产成人精品二区| 国产亚洲精品久久久久久毛片| 国产精品九九99| 亚洲欧美精品综合久久99| 亚洲 欧美 日韩 在线 免费| 亚洲七黄色美女视频| 男女那种视频在线观看| 美女午夜性视频免费| 久久性视频一级片| 成人国产综合亚洲| videosex国产| 欧美国产日韩亚洲一区| av中文乱码字幕在线| 久久精品91无色码中文字幕| 看黄色毛片网站| 在线观看一区二区三区| 99久久精品国产亚洲精品| 一级黄色大片毛片| а√天堂www在线а√下载| 午夜免费鲁丝| 久久精品夜夜夜夜夜久久蜜豆 | 日韩高清综合在线| 又黄又粗又硬又大视频| 国产黄a三级三级三级人| 欧美一级毛片孕妇| 18禁观看日本| 久久性视频一级片| 一本大道久久a久久精品| 88av欧美| 99热这里只有精品一区 | 人人妻人人看人人澡| 日本 av在线| 99久久国产精品久久久| 久久精品91蜜桃| 男女之事视频高清在线观看| 99精品在免费线老司机午夜| 色综合亚洲欧美另类图片| 热99re8久久精品国产| 黄色成人免费大全| 一夜夜www| 50天的宝宝边吃奶边哭怎么回事| 午夜福利一区二区在线看| 在线观看日韩欧美| 国产精品99久久99久久久不卡| 午夜福利免费观看在线| 怎么达到女性高潮| 18禁国产床啪视频网站| 午夜福利成人在线免费观看| 国产精品影院久久| 国产熟女午夜一区二区三区| 国产亚洲精品久久久久久毛片| 久久人妻福利社区极品人妻图片| 国产精品野战在线观看| 亚洲精品色激情综合| 老司机午夜福利在线观看视频| 老司机靠b影院| 日本a在线网址| 啦啦啦韩国在线观看视频| 久热这里只有精品99| 老司机午夜十八禁免费视频| 老熟妇仑乱视频hdxx| 国产精品久久视频播放| 超碰成人久久| 亚洲无线在线观看| 精品国内亚洲2022精品成人| 久久中文看片网| 非洲黑人性xxxx精品又粗又长| 国产伦在线观看视频一区| 一区福利在线观看| 日韩高清综合在线| 欧美最黄视频在线播放免费| 久久人人精品亚洲av| 亚洲欧美一区二区三区黑人| 成熟少妇高潮喷水视频| 亚洲国产高清在线一区二区三 | 精品欧美一区二区三区在线| 又紧又爽又黄一区二区| 国产亚洲精品久久久久5区| 国产激情欧美一区二区| 免费电影在线观看免费观看| 法律面前人人平等表现在哪些方面| 日本免费一区二区三区高清不卡| 好男人在线观看高清免费视频 | 国产精品美女特级片免费视频播放器 | 国产精品久久视频播放| 久久久久国产精品人妻aⅴ院| 91成年电影在线观看| 久久热在线av| 91麻豆精品激情在线观看国产| 狂野欧美激情性xxxx| 欧美一区二区精品小视频在线| 视频在线观看一区二区三区| 欧美 亚洲 国产 日韩一| 国产精品一区二区三区四区久久 | 色在线成人网| 国产视频内射| 老熟妇仑乱视频hdxx| a在线观看视频网站| 757午夜福利合集在线观看| 91成年电影在线观看| 夜夜躁狠狠躁天天躁| 日韩欧美一区视频在线观看| 欧美日韩亚洲国产一区二区在线观看| 美女免费视频网站| 狂野欧美激情性xxxx| 韩国精品一区二区三区| 99久久国产精品久久久| 日本免费一区二区三区高清不卡| 欧美人与性动交α欧美精品济南到| 在线观看66精品国产| 久久精品国产亚洲av高清一级| 波多野结衣巨乳人妻| 岛国视频午夜一区免费看| 午夜久久久在线观看| 在线视频色国产色| 成人国语在线视频| 女人高潮潮喷娇喘18禁视频| 日本撒尿小便嘘嘘汇集6| 免费在线观看影片大全网站| 国产欧美日韩一区二区精品| 麻豆久久精品国产亚洲av| 在线观看午夜福利视频| 一二三四在线观看免费中文在| 亚洲av第一区精品v没综合| 欧美日本视频| svipshipincom国产片| 国产精品久久视频播放| 日韩欧美在线二视频| 老司机在亚洲福利影院| 国产av一区二区精品久久| 给我免费播放毛片高清在线观看| 脱女人内裤的视频| 国产男靠女视频免费网站| 国产精品久久久久久人妻精品电影| 日本三级黄在线观看| 麻豆久久精品国产亚洲av| 国产精品精品国产色婷婷| svipshipincom国产片| 亚洲成人久久性| 免费看美女性在线毛片视频| 欧美另类亚洲清纯唯美| 亚洲精品在线美女| 成人亚洲精品一区在线观看| 色综合欧美亚洲国产小说| 亚洲 欧美 日韩 在线 免费| 成人免费观看视频高清| 99热这里只有精品一区 | 在线免费观看的www视频| 欧美国产日韩亚洲一区| 国产精品久久久久久精品电影 | 19禁男女啪啪无遮挡网站| 黑人欧美特级aaaaaa片| 国产精品一区二区三区四区久久 | 欧美黑人精品巨大| 亚洲第一电影网av| 国产精品免费一区二区三区在线| 日本一本二区三区精品| 男女床上黄色一级片免费看| 脱女人内裤的视频| 成人免费观看视频高清| 精品国产国语对白av| 视频区欧美日本亚洲| 国产精品野战在线观看| 露出奶头的视频| 看黄色毛片网站| 久久久国产精品麻豆| 国产激情偷乱视频一区二区| 亚洲av电影在线进入| 成人精品一区二区免费| 日韩视频一区二区在线观看| 久久精品亚洲精品国产色婷小说| 51午夜福利影视在线观看| av电影中文网址| 俄罗斯特黄特色一大片| 99国产精品一区二区三区| 国产黄色小视频在线观看| 熟妇人妻久久中文字幕3abv| 亚洲一码二码三码区别大吗| 国产精品1区2区在线观看.| 亚洲精华国产精华精| 老司机在亚洲福利影院| 日韩大码丰满熟妇| 身体一侧抽搐| 18禁黄网站禁片午夜丰满| 999久久久国产精品视频| 久久香蕉激情| 韩国精品一区二区三区| 桃色一区二区三区在线观看| 一级a爱片免费观看的视频| 可以免费在线观看a视频的电影网站| 在线视频色国产色| 91麻豆av在线| 少妇被粗大的猛进出69影院| 午夜久久久久精精品| 欧美午夜高清在线| 精品一区二区三区av网在线观看| 欧美激情极品国产一区二区三区| 99久久99久久久精品蜜桃| 天天添夜夜摸| 亚洲va日本ⅴa欧美va伊人久久| 日本a在线网址| 美女国产高潮福利片在线看| 1024视频免费在线观看| 欧美日韩黄片免| 麻豆成人午夜福利视频| 婷婷精品国产亚洲av在线| 国产日本99.免费观看| 亚洲美女黄片视频| 1024视频免费在线观看| 亚洲精品中文字幕在线视频| 午夜老司机福利片| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲国产中文字幕在线视频| 久久中文看片网| 两个人看的免费小视频| 哪里可以看免费的av片| 久久精品国产综合久久久| 中文字幕另类日韩欧美亚洲嫩草| 成年版毛片免费区| 精品久久久久久久末码| 久久久久久免费高清国产稀缺| 国产色视频综合| 国产高清视频在线播放一区| 日本撒尿小便嘘嘘汇集6| 无遮挡黄片免费观看| 精品午夜福利视频在线观看一区| 久久人人精品亚洲av| 精品日产1卡2卡| 国产精品久久久av美女十八| 欧洲精品卡2卡3卡4卡5卡区| 深夜精品福利| 色综合婷婷激情| 亚洲九九香蕉| 国语自产精品视频在线第100页| 18禁裸乳无遮挡免费网站照片 | 18美女黄网站色大片免费观看| 亚洲熟女毛片儿| 精品欧美国产一区二区三| av免费在线观看网站| 国产黄色小视频在线观看| 久久 成人 亚洲| 88av欧美| 国产久久久一区二区三区| 婷婷精品国产亚洲av在线| 久久久久九九精品影院| 日韩欧美在线二视频| 91成人精品电影| 在线观看免费午夜福利视频| 亚洲人成网站在线播放欧美日韩| 国产高清有码在线观看视频 | 日本在线视频免费播放| 国产精品久久久av美女十八| 免费在线观看亚洲国产| 欧美一区二区精品小视频在线| 禁无遮挡网站| 国产精品亚洲一级av第二区| 国产精品久久久久久人妻精品电影| 女人爽到高潮嗷嗷叫在线视频| 久久中文字幕人妻熟女| 精品高清国产在线一区| www.999成人在线观看| 中文字幕久久专区| 91成年电影在线观看| 日韩国内少妇激情av| 麻豆av在线久日| 身体一侧抽搐| 午夜福利视频1000在线观看| 一二三四在线观看免费中文在| 婷婷精品国产亚洲av| 国产精品自产拍在线观看55亚洲| 亚洲天堂国产精品一区在线| 成人三级黄色视频| bbb黄色大片| 日韩欧美 国产精品| 欧美在线一区亚洲| 精品久久久久久久人妻蜜臀av| 久久婷婷人人爽人人干人人爱| 日韩一卡2卡3卡4卡2021年| 中文亚洲av片在线观看爽| 最近最新中文字幕大全免费视频| 成人欧美大片| 香蕉av资源在线| 欧美成人免费av一区二区三区| 亚洲三区欧美一区| 18禁美女被吸乳视频| 日日摸夜夜添夜夜添小说| 精品国产美女av久久久久小说| 久久精品国产综合久久久| 在线永久观看黄色视频| 亚洲欧美激情综合另类| 国产高清视频在线播放一区| 国产成人影院久久av| 欧美性长视频在线观看| 亚洲av日韩精品久久久久久密| 国内精品久久久久精免费| av欧美777| 少妇的丰满在线观看| 嫩草影视91久久| 国产精品 国内视频| 91九色精品人成在线观看| 日本精品一区二区三区蜜桃| 国产成人啪精品午夜网站| 国产三级在线视频| 欧美日韩福利视频一区二区| 国产精品免费视频内射| 国产亚洲精品久久久久5区| 日日摸夜夜添夜夜添小说| 亚洲,欧美精品.| 欧美成人免费av一区二区三区| 97碰自拍视频| 麻豆成人午夜福利视频| 亚洲五月色婷婷综合| av超薄肉色丝袜交足视频| 亚洲自偷自拍图片 自拍| 叶爱在线成人免费视频播放| 国产成人精品久久二区二区免费| 亚洲熟妇熟女久久| 久久久久久久久免费视频了| 亚洲第一青青草原| 国产又黄又爽又无遮挡在线| 国产私拍福利视频在线观看| 久久久久精品国产欧美久久久| 在线永久观看黄色视频| 久久久久精品国产欧美久久久| 国产蜜桃级精品一区二区三区| 色尼玛亚洲综合影院| 午夜福利一区二区在线看| 精品久久久久久久久久久久久 | АⅤ资源中文在线天堂| 精品国产乱子伦一区二区三区| 国产精品二区激情视频| 我的亚洲天堂| 在线天堂中文资源库| 黄色毛片三级朝国网站| 成人免费观看视频高清| 精品高清国产在线一区| 亚洲人成77777在线视频| 国产亚洲精品一区二区www| 免费观看人在逋| 亚洲va日本ⅴa欧美va伊人久久| 老鸭窝网址在线观看| 熟女电影av网| 两性夫妻黄色片| 成人国产一区最新在线观看| 欧洲精品卡2卡3卡4卡5卡区| 视频区欧美日本亚洲| 亚洲欧美精品综合一区二区三区| 非洲黑人性xxxx精品又粗又长| 国产av一区二区精品久久| 亚洲中文日韩欧美视频| 在线观看午夜福利视频| 国产三级在线视频| 久久久久久久久免费视频了| 精品免费久久久久久久清纯| 久久婷婷成人综合色麻豆| 色综合欧美亚洲国产小说| 亚洲精品美女久久av网站| 亚洲一区中文字幕在线| 一进一出抽搐动态| 午夜福利一区二区在线看| 精品卡一卡二卡四卡免费| 亚洲精品久久国产高清桃花| 午夜免费成人在线视频| 欧美久久黑人一区二区| 18禁美女被吸乳视频| 悠悠久久av| 国产激情久久老熟女| 视频区欧美日本亚洲| 日本成人三级电影网站| 国产97色在线日韩免费| 亚洲男人天堂网一区| 欧美性长视频在线观看| av福利片在线| 少妇被粗大的猛进出69影院| 久久久久免费精品人妻一区二区 | 午夜激情av网站| 非洲黑人性xxxx精品又粗又长| 久久天堂一区二区三区四区| 亚洲专区字幕在线| 国产熟女午夜一区二区三区| 欧美黑人精品巨大| 亚洲国产日韩欧美精品在线观看 | 人人妻人人澡欧美一区二区| 久久久久久久久免费视频了| 日日干狠狠操夜夜爽| 亚洲专区中文字幕在线| 国产人伦9x9x在线观看| 午夜亚洲福利在线播放| 老熟妇仑乱视频hdxx| 色尼玛亚洲综合影院| av在线天堂中文字幕| 不卡一级毛片| 欧美中文综合在线视频| 精品久久久久久久毛片微露脸| 亚洲成人免费电影在线观看| 91麻豆av在线| 亚洲无线在线观看| 亚洲 欧美 日韩 在线 免费| 精品日产1卡2卡| 淫秽高清视频在线观看| 精品国产超薄肉色丝袜足j| 亚洲av电影不卡..在线观看| a级毛片a级免费在线| 日本黄色视频三级网站网址| 老司机福利观看| 淫秽高清视频在线观看| 亚洲精品在线美女| 亚洲欧美精品综合久久99| videosex国产| 动漫黄色视频在线观看| 美女扒开内裤让男人捅视频| 亚洲性夜色夜夜综合| 黄色 视频免费看| 日本在线视频免费播放| 欧美日韩乱码在线| 日本免费一区二区三区高清不卡| 一本精品99久久精品77| 51午夜福利影视在线观看| 欧美一区二区精品小视频在线| 国产人伦9x9x在线观看| 亚洲七黄色美女视频| 韩国精品一区二区三区| 男女那种视频在线观看| 99久久无色码亚洲精品果冻| 国产野战对白在线观看| 国产99久久九九免费精品| 在线观看午夜福利视频| www日本黄色视频网| 9191精品国产免费久久| 后天国语完整版免费观看| 日本 av在线|