• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Enhanced Privacy Preserving,Secure and Efficient Authentication Protocol for VANET

    2022-08-24 03:30:50SafiullahKhanAliRazaandSeongOunHwang
    Computers Materials&Continua 2022年5期

    Safiullah Khan,Ali Raza and Seong Oun Hwang

    1Department of IT Convergence Engineering,Gachon University,Seongnam,13320,Korea

    2ENSAIT,GEMTEX-Laboratoire de Genie et Materiaux Textiles,University of Lille,Lille,F(xiàn)59000,F(xiàn)rance

    3School of Computing&Institute of Cyber Security(ICSS),University of Kent,United Kingdom

    4Department of Computer Engineering,Gachon University,Seongnam,13320,Korea

    Abstract:Vehicular ad hoc networks(VANETs)have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads.However,wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs.Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack.The Sybil attack can be used by malicious actors to create fake identities that impair existing protocols,which allows them to imitate traffic congestion or at worse cause an accident that may result in the loss of human life.This vulnerability exists because those protocols store vehicle identities in an encrypted form, and it is not possible to search over the encrypted identities to find fake vehicles.This attack is serious in nature and very prevalent for privacy-preserving protocols.To cope with this kind of attack,we propose a novel and practical protocol that uses Public key encryption with an equality test(PKEET)to search over the encrypted identities without leaking any information, and eventually eliminate the Sybil attack.The proposed approach improves security and at the same time maintains privacy in VANET.Our performance analysis indicates that the proposed protocol outperforms state-of-the-art protocols:The proposed beacon generation time is constant compared to a linear increase in existing protocols, with beacon verification shown to be faster by 7.908%.Our communicational analysis shows that the proposed protocol with a beacon size of 322 bytes has the least communicational overhead compared to other state-of-the-art protocols.

    Keywords: VANET; authentication protocol; cryptanalysis; privacy preserving;intelligent systems

    1 Introduction

    Vehicular ad hoc networks(VANETs)are a subset of Mobile ad hoc networks(MANETs)in which smart vehicles act as mobile nodes with their movement governed by road topologies.The vehicles communicate with each other using Vehicle-to-vehicle(V2V)communication and with Road-side unit(RSU), known as Vehicle-to-infrastructure (V2I) communication.Each vehicle is equipped with an On board unit (OBU) that can perform computations and establish communication.A vehicle in a VANET periodically broadcasts messages containing information related to its speed,location,traffic and accidents,known as beacons[1].

    Despite these advantages,authentication,security and privacy are critical challenges for VANETs[2].VANETs have an additional number of challenges,particularly in the domain of authentication,privacy and security[3].Unauthenticated information in the network may lead to malicious attacks and service abuses that pose a threat to users [4].In contrast to classical wired networks that have protections in terms of firewalls and gateways,security attacks on such wireless networks could come from various sources to target all nodes [5,6].Additionally, VANETs are an instance of mobile ad hoc networks.Consequently,they inherit all known and unknown security flaws,such as Sybil attacks that are associated with MANETs [7].VANETs are more challenging to secure due to their distinct characteristics and features,such as the high mobility of the end users and wide area of the network[8].Therefore, a new mechanism to provide the desired security, including authentication, integrity,and nonrepudiation,needs to be proposed prior to the practical deployment of VANETs[9].

    With regards to issues such as authentication privacy and security, researchers have proposed a number of protocols [10,11].In [10], the authors proposed a hierarchical privacy preserving pseudonymous authentication protocol for the VANET.Their protocol makes use of two different types of pseudonyms, one is referred to as the primary pseudonym and the second is the secondary pseudonym.A primary pseudonym is provided to a vehicle upon successful verification by the Certification authority(CA).Using this primary pseudonym,the vehicle can request the RSU for a secondary pseudonym that is then broadcast along with the beacons in the VANET.Each pseudonym is associated with an expiration time after which the vehicle has to request new primary and secondary pseudonyms.Primary pseudonyms are associated with a relatively longer expiration time than the secondary pseudonyms.

    Furthermore, in [10], the authors provided a brief security analysis to claim the security of the proposed protocol.Usually, in VANETs (e.g., in [10,11]), authorities (such as a CA and Social network(SN),respectively)store the real identities of the vehicles in an encrypted form.Consequently,searching on encrypted data becomes complicated because these authorities are required to first decrypt the encrypted identity prior to searching [12–15] work based on a fully trusted authority.If the trusted authority is compromised, these protocols do not provide security and privacy.We need protocols which can provide privacy even if partially/fully trusted authorities are compromised.Sometimes in an Internet of things(IoT)era(e.g.,Internet of vehicles(IoV),smart grids,healthcare,etc.)we need a balance between user privacy and access to information by authorities(CA and SN).Searchable encryption is a cryptographic scheme that provides this kind of balance[16–22].Public key encryption with equality test(PKEET)is a special type of searchable encryption scheme[23],with a kind of Public key encryption(PKE)that allows to check whether two ciphertexts are encrypted under(possibly)different public keys contain the same message.In other words,searchable encryption is a positive way to protect users’sensitive data,while preserving search ability on the server side.It allows the server to search encrypted data without leaking any information in plaintext data.For more indepth information about searchable encryption,readers are encouraged to read[24].

    We have surveyed many VANET related protocols and classify them into two categories.The protocols in the first category do not encrypt the real identities of vehicles,including[25,26],which can reveal information about the vehicle’s daily route.Therefore,they do not provide privacy preservation.The protocols in the second category encrypt the real identities in order to preserve the privacy of the vehicles,which is more desirable for state-of-the-art methods.However,we found that a number of existing protocols including [10,11] in the second category are vulnerable to the Sybil attack since the identities are encrypted and cannot be verified.Thus, a malicious vehicle can create many fake identities, exploiting this vulnerability which may result in fake congestion in the network and subsequently cause serious accidents.To address this problem,we present a novel privacy-preserving protocol secure against the Sybil attack with practical performance.Therefore, this paper not only shows that the protocols are vulnerable against the Sybil attack, but also provides a novel protocol with stronger security along with efficient authentication,beacon generation and beacon verification.In addition,other parameters for the proposed algorithm like the transmit power and scheduling are based on adaptive-transmit power control algorithm[27],while radio resource allocation is performed using a supervised deep learning technique[28].

    The contributions of this paper can be summarized as follows:

    1.In this paper, we cryptanalyze existing protocols that protect privacy by encrypting vehicles’real identities and are claimed to be secure and efficient protocols for VANETs.We show for the first time that they are vulnerable to the Sybil attack because they cannot verify the vehicle identity during primary pseudonym generation, which is encrypted.This attack may result in fake congestion in the network and subsequently cause catastrophic consequences, which should be resolved.However, protecting such protocols from the Sybil attack is complicated in nature because the vehicle identities in the existing protocols such as[10,11]are encrypted to protect user privacy.It is difficult to protect both user privacy and security against the Sybil attack at the same time.Hence,we present a new research direction when designing a secure and privacy-preserving protocol for VANET.

    2.We propose a novel privacy-preserving protocol secure against the Sybil attack by introducing searchable encryption that allows for verification of encrypted vehicle identities.This proposed method is generic in the sense that it can be applied to all protocols vulnerable to the Sybil attack due to encrypted vehicle identities.We examine various attack scenarios and prove that the proposed protocol is secure against the Sybil attack along with satisfying the general security requirements for VANET protocols.

    3.We also perform an in-depth analysis of the proposed protocol in terms of the performance over time.The proposed beacon generation has constant time with an increasing number of beacons, in contrast to the linearly increasing time for existing protocols.Regarding beacon verification time,it outperforms existing protocols by 7.908%.We also show that the proposed protocol with a beacon size of 322 bytes has the least communicational over-head compared to other state-of-the-art protocols.The proposed protocol shows its practical applicability in VANET as the beacons are generated and verified on a massive scale.

    The rest of the paper is organized as follows:The background and relevant studies are introduced in Section 2.A cryptanalysis of the existing protocols is provided in Section 3.Section 4 defines the proposed protocol.Section 5 presents the analysis of the proposed protocol.Section 6 concludes the paper.

    2 Background

    In this section,we present background knowledge on a conventional VANET architecture as well as the assumptions and cryptographic tools used in this work.

    2.1 Conventional VANET Architecture

    Fig.1 depicts a conventional VANET architecture,where a vehicle first needs to be registered with the Registration authority(RA)in order to receive and send the beacons in the VANET.According to [29], each vehicle has a unique identifier associated with it.In this paper, we refer to it asVIDi.VIDi,is an electronic license plate,and can be issued and installed in the vehicle’s OBU by the vehicle registration authorities.VIDiserves as a real identity of a vehicle and uniquely identifies it.A vehicle in our model is required to provideVIDito RA for registration.Our system model consists of the following participants.

    1.Registration authority(RA):During the registration,RA generates a public/private key pair using PKEET[30]and encrypts theVIDiwith a public key and sends the encryptedVIDito the initial vehicle(Vi)and a trapdoor T to CA through a secure channel.Upon the request of legal authorities,RA provides the decryption key to reveal theVIDi.

    2.Certification authority (CA):CA issues the primary pseudonyms and keeps associations between the encryptedVIDiand the primary pseudonym.Each primary pseudonym has an expiration time(TCA), after which a vehicle needs to get a new primary pseudonym.This can be done by two means:first by requesting through the RSU located in the area where the vehicle is currently traveling and the other by directly requesting it to CA through 3G/4G communication.

    3.Roadside units (RSUs):Secondary pseudonyms are issued by RSU upon request from a vehicle.RSU maintains the association between the primary pseudonyms and secondary pseudonyms.Upon the request of secondary pseudonyms, RSU checks the validation of primary pseudonyms and issues the secondary pseudonyms if they are valid.Each secondary pseudonym has an expiration time(TRSU)relatively smaller thanTCA.OnceTRSUexpires,the vehicle needs to acquire a new secondary pseudonym from RSU.

    4.Sender/Initial vehicle:The sender vehicle,denoted byViin the rest of the paper,generates the beacons and broadcasts them.

    5.Receiver vehicle:The receiver vehicle,denoted byVrin the rest of the paper,verifies the received beacon.In case the message is forged,it reports this message to RSU.IfTRSUexpires,the beacon is discarded.

    2.2 Assumptions

    We have made a number of assumptions that underpin the cryptanalysis and the proposed protocol,and these are outlined next.

    1.An honest but curious behavior is expected from CA,RA,and RSU.

    2.We assume that CA,RA,and RSU do not collude.

    3.Cryptographic credentials are kept safe by all parties.

    4.All parties have synchronized clocks.

    5.CA,RA,and RSU use a secure channel to communicate.

    Figure 1:Conventional VANET architecture

    2.3 Cryptographic Tools

    Elliptic curve cryptography (ECC) is one of the most used cryptographic schemes in security because it provides a high level of security and efficiency.However, it doesn’t provide search over encrypted data,which is sometimes required.To provide search over encrypted data,researchers have proposed schemes like PKEET.Therefore,we use two different cryptographic schemes.We use PKEET if there is need to search over encrypted data, and we use ECC if there is no need to search over encrypted data,because it is computationally efficient compared to PKEET.Each of the cryptographic schemes is given as follows:

    1.Elliptic curve cryptography (ECC):ECC [31,32] is widely used to implement encryption algorithms and digital signatures.Assume thatFpis a finite field wherepis a large prime number.Edenotes an elliptic curve overFpand it is defined by the following equation.

    Here,(4a3+27b2)mod p≠ 0 andx,y,a,b ε Fp.Let us suppose thatObe an infinite point,Gbe an additive group with orderqand generatorp.LetPandQbe two points onE;then point addition operation inGis defined asP+Q=R.The Elliptic curve discrete logarithmic problem(ECDLP)[33]is computationally infeasible.Scalar multiplication inGis given by the following equation.

    Given the pointsPandQfromG,ECDLP is to finds ε Fpsuch thats.P=Q.ECC consists of the following algorithms:

    a)Setup(π):It takes security parameterπas input and outputs the public parameter

    b)KeyGen(pp):It takes the public parameterppas input,and outputs a public/secret key pair(Pk,Sk).

    c)Encrypt(m,Pk):It takes a messagemand the receiver’s public keyPkas input and outputs a ciphertextC.

    d)Decrypt(C,Sk):It takes a ciphertextCand the receiver’s secret keySkas input and outputs a plaintextm.

    e)Signature Generation(C,Sk):It takes a ciphertextCand the sender’s secret keySkas input and outputs a signatures.

    f)Signature Verification(s,Sk):It takes a signaturesand the sender’s public keyPkas input and outputs 1 if the signaturesis true otherwise 0.

    Although the complete description of these modules is out of the scope of this paper,interested readers are encouraged to read[34]for more information about these modules.

    2.Public key encryption with equality test (PKEET):This is a special type of searchable encryption scheme that allows checking whether two ciphertexts encrypted under (possibly)different public keys contain the same message or not.The scheme in[23]does not provide a trapdoor for authorization to perform an equality test.Later,Ma et al.[30]proposed a variant of PKEET with different authorization methods that provide more control to the user over authorization.It consists of the following algorithms:

    a)Setup(λ):It takes security parameterλas input and outputs the public parameterpp.

    b)KeyGen(pp):It takes the public parameterppas input and outputs a public/secret key pair(Pk,Sk).

    c)Encrypt (M, Pk):It takes a messageMand the receiver’s public keyPkas input and outputs a ciphertextC.

    d)Decrypt (C, Sk):It takes a ciphertextCand the receiver’s secret keySkas input and outputs a plaintextM.

    e)Aut1(SKi):It takes the secret keySKias input and outputs a trapdoorT1,ifor userUi.

    f)Test1(Ci,T1,i,Cj,T1,j):It takesUi’s ciphertextCi,the trapdoorT1,i,Uj’s ciphertextCjand the trapdoorT1,jas inputs, and outputs 1 ifCiandCjcontain the same message and 0 otherwise.

    Note that[30]is only used by RA and CA in our scheme.

    2.4 Security and Privacy Requirements

    Both security and privacy are important for secure communications in VANETs.According to the latest research efforts[35–38],a scheme for VANET should meet the following requirements:

    1.Message authentication:RSUs are able to check the validity of the messages sent by vehicles.In addition,RSUs are able to detect any modification of the received message.

    2.Privacy preservation:RSUs and other vehicles are not able to extract the vehicle’s real identity.Any third party is not able to get the vehicle’s real identity by analyzing intercepted messages.

    3.Traceability/Vehicle revocation:The protocol is able to extract the vehicle’s real identity by analyzing its messages when it is necessary.e.g.,when a malicious vehicle sends a false or forged message to mislead others.

    4.Un-linkability:RSUs and malicious vehicles are not able to link two messages sent by the same vehicle,i.e.,they cannot trace the vehicle’s action through its messages.

    5.Resistance to attacks:The scheme is able to withstand various common attacks such as the Sybil attack that exist in VANETs.

    3 Cryptanalysis

    In this section,we cryptanalyze and demonstrate with an example how to mount the Sybil attack in one of the state-of-the-art protocols [10], because in a VANET, Sybil attacks are very important to address.In the Sybil attack,the attacker subverts the reputation of a network service by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence.For an easy explanation,we assume the following scenario from[10](The complete description of[10]is out of the scope of this research article.However,we encourage interested readers to read[10,11]to completely understand the attack).Let us suppose that in the step of primary pseudonym generation in[10],a malicious(internal)initial vehicleViwants to authenticate a fake vehicleVf.Vigenerates two random numbersn, n’, public/private ECC key pairsPKi/SKiandPKi’/SKi’.Visends the information along withVIDitoCAin the following two steps.

    Step 1:Vi→CA:n||PKi||VIDi.

    RA generates a number of public/private ECC key pairs and provides CA the public keys that are later used by CA forVIDiencryption.CA validates theVIDi.Upon verification,it encryptsVIDiwith one of the public keys of RA.CA encryptsnwith its paillier homomorphic encryption public key PKCAP,generates an expiration time TCA and creates the following database entries as shown in Tab.1.

    Table 1:Examples of the CA database with attack scenario in[10]

    CA signs(TCA||PKi||(n)PKCAP)and assigns it toVias its primary pseudonym.Note that CA hasVIDiin encrypted form using RA’s public key.Hence,CA cannot seeVIDionce encrypted(until RA provides the corresponding private key).NowViagain sendsn’,PKi’,andVIDitoCAin order to get another valid primary pseudonym.

    Step 2:Vi→CA:n`||PKi`||VIDi.

    CA validatesVIDi.CA can not check whetherVIDiis already in its database or not becauseVIDiis in encrypted form in its database.Upon verification, it encryptsVIDiwith one of the public keys generated by RA,encryptsn’with its Paillier public keyPKCAP,generates an expiration timeT’CAand creates the following database entries as shown in Tab.2.

    Table 2:Examples of the CA database with attack scenario in[10]

    CA signs(T’CA||PK’i||(n)’PKCAP) and assigns it toVias its primary pseudonym.Hence,Vihas successfully obtained two valid primary pseudonyms at a time.Vican give one of its primary pseudonyms toVf.Using this primary pseudonym,Vfcan obtain a secondary pseudonym and can communicate in the network.Vican create many numbers of such fake authenticated vehicles in the network and can cause fake congestion.The Sybil attack is shown in Fig.2.

    Figure 2:Demonstration of sybil attack in[10]

    4 Proposed Protocol

    In this section, we propose a new protocol that uses PKEET to eliminate the Sybil attack.The proposed protocol provides improved efficiency,security and maintains privacy in the VANET.The dynamic network architecture of the proposed protocol is shown in Fig.3 and the protocol is given as follows:

    4.1 Off-line Registration and Initialization

    At the time of offline registration, CA broadcasts security parameters.Each entity creates its public/private key pairs using ECC.In the case of RA, it also creates public/private key pairs using PKEET.Vicontacts RA with itsVIDiand public keyPKithrough a secure channel(e.g.,by physically visiting).RA uses (PKEET) [30] to encrypt and sign theVIDiand gives it toVi.Furthermore, RA gives the trapdoorTof its private keyPKRAto CA through a secure channel(Note that,in[10,11],RA gives just its public keys to CA and SN,respectively).We use PKEET in[30],which allows to stop the Sybil attack by using the equality test.

    Step 1:Vi→RA:VIDi||PKi.

    Step 2:RA→Vi:(PKEET(VIDi)PKRA)SKRA.

    Step 3:RA→CA:T.

    Figure 3:Working of proposed protocol

    4.2 Primary Pseudonym Generation

    Visigns(PKEET(VIDi)PKRA)SKRA||PKiusing its private keySKiand encrypts it using CA’s public keyPKCAand sends it to CA to get a primary pseudonym for the first time(i.e.,initially but only once).

    Step 4:Vi→(((PKEET(VIDi)PKRA)SKRA||PKi)SKi)PKCK.

    CA verifies the signature of RA and checks using the equality test function whetherPKEET(VIDi)PKRAexists in its database or not.If it does not exist,then CA issues the primary pseudonym(TCA||PKi)SKCKand stores it in its database as shown in Tab.3.

    CA encrypts(TCA||PKi)SKCKusingPKiand sends it toVi.

    Step 5:CA→Vi:((TCA||PKi)SKCK)PKi.

    Table 3:Example of the CA database in the proposed protocol

    4.3 Secondary Pseudonym Generation

    Videcrypts the primary pseudonym,generates a random numberrand a new public/private key pairPk’i,Sk’i,and then concatenatesrandPk’iwith the primary pseudonym.Thereafter,Visigns it usingSKi,encrypts it using the public keyPKRSUof RSU and sends it to RSU.

    Step 6:Vi→RSU:(((TCA||PKi)SKCK||r||Pk’i)SKi)PKRSU.

    RSU decrypts(((TCA||PKi)SKCK||r||Pk’i)SKi)PKRSUand verifies the signaturesSKCAandSKi.IfTCAis valid,RSU generates a secondary pseudonymSs=(TRSU||PK’i)and signs it using its private keySKRSU.RSU also computesZ=Ss+rand signs it usingSKRSU.RSU sends((Ss)SKRSU),((Z)SKRSU)by encrypting it usingPK’itoVi.RSU maintains its database as shown in Tab.4.

    Step 7:RSU→Vi:((Ss)SKRSU,((Z)SKRSU)PK’i.

    Table 4:Example of the RSU database in the proposed protocol

    4.4 Beacon Generation

    Vicomputesh1=H(Ss+r+m+TRSU),wheremis a beacon message andHis a hash function.Vithen sends(h1,m,(Z)SKRSU,TRSU)toVr.

    Step 8:Vi←Vr:(h1,m,(Z)SKRSU,TRSU).

    4.5 Beacon Verification

    Vrchecks ifTRSUis valid.If it is valid,Vrverifies the signatureSKRSUand computeshx=H(Z+m+TRSU).Ifh1=hx,Vr accepts the beacon.Otherwise it rejects the beacon.

    4.6 Renewal of Primary Pseudonym

    Once theTCAexpires,Virequests CA via 3G/4G communication or RSU for a new primary pseudonym.Vigenerates a new public/private key pairPK’’i/SK’’i,concatenatesPK’’iwith its current primary pseudonym, signs it using currentPKi, encrypts it usingPKCAand sends it toCA.CAgenerates a new primary pseudonym usingPK’’iand new expiration timeT’CAand signs it usingSKCA.CAencrypts it usingPK’’iand sends the new primary pseudonym toVi.CAthen updates the corresponding primary pseudonym with a new primary pseudonym in its database.

    Vi→CA:(((TCA||PKi)SKCK||PK’’i)SKi)PKCA.

    CA→Vi:(((T’CA)||PK’’i)SKCK)PK’’i.

    4.7 Renewal of Secondary Pseudonym

    To renew a secondary pseudonym,once theTRSUexpires,Vigenerates a new public/private key pairPK’’’i/SK’’’iand a random numberr’.Vithen concatenatesPK’’’iandr’with its current secondary pseudonym and signs it using the currentPK’i.Vithen encrypts them usingPKRSUand sends them to RSU.RSU checks the signaturesSKRSUandSK’i.RSU creates a new secondary pseudonym with new expiration timeTRSU’.RSU generatesZ’=Ss’+r’,whereSs’=(TRSU’||PKi’’’).RSU signsZ’andSs’usingSKRSU.RSU then sends the signedZ’andSs’toViby encrypting them usingPKi’’’.RSU updates the corresponding secondary pseudonym in its database with the new one.The optimal time to refresh the secondary pseudonym is 1.4 s,which means that eachVirequests for secondary pseudonym after approximately 7 beacons.In caseVitries to use expired secondary pseudonym,it will not be accepted by RSU as all the entities are synchronized.Thus,the vehicle using the expired secondary pseudonym will not be able to communicate.

    5 Analysis of Proposed Protocol

    This section provides an analysis of our protocol with two perspectives.First is the security analysis,where we provide various attack scenarios and explain the resilience of our protocol against those attacks to show the effectiveness of the protocol in accordance with the design goals.Next,we provide the computational and communicational efficiency in form of the computational time and communicational bytes required for beacon generation and verification.

    5.1 Security Analysis

    1.Message Integrity:The receiving vehicles ensure the integrity of the received message by verifying the signature of the RSU and comparingh1andhx.

    2.Vehicle Authentication:VrauthenticatesViby verifying the signature of RSU in secondary pseudonym and validity ofTRSU.

    3.Non-repudiation:Vibroadcasts the beacons by computingh1usingr(which is only known toVi)with its secondary pseudonym,mandTRSU.Hence it provides non repudiation.TRSUis valid for very short time.Therefore,each beacon is unique itself and it also prevents the replay attack and keeps the vehicle anonymous.

    4.Privacy Preserving:The primary pseudonym and secondary pseudonym are changing very often,which makes it very difficult to track a particular device.Even if RA,CA,or RSU are compromised,the privacy of the vehicles remains secure.

    5.Vehicle Revocation:IfViis involved in a malicious activity,Vrreports it to the RSU with its secondary pseudonym.RSU blocks the malicious vehicle and sends it primary pseudonym to CA which also blocks it and reports it to RA.Then RA can reveal its real identity by sharing the respective private key of PKEET with CA.Thus,the offender’s vehicle is revoked.

    6.Conditional Anonymity:The real identity of the offender vehicle in our scheme is traced and revoked from the VANET when malicious activities are detected,as described above.

    5.2 Attack Scenarios

    We show how the proposed protocol defends against the following attack scenarios.

    Theorem 1:Sybil attack is not feasible in the proposed protocol.

    Proof:IfVitries to get another primary pseudonym by the Sybil attack, CA will check ifPKEET(VIDi)PKRAexists in its database or not by using the equality test.If it exists, CA will not issue the primary pseudonym.Hence,the Sybil attack is not feasible.

    Theorem 2:Communication between all the participants is secure.

    Proof:All the communication in our protocol is encrypted using ECC cryptography.According to the Diffie-Hellman Problem,given an elementhand the valuehx,it is computationally infeasible for an attacker to compute secret x.Therefore,all the communication is secure.

    Theorem 3:Vr cannot correlate the secondary pseudonyms of Vi.

    Proof:Vichanges the secondary pseudonyms after a few beacon broadcasts.Thereafter,Vrreceives the beacons containing different secondary pseudonyms.Therefore,it is very hard for aVrto establish any correlation between rapidly changing secondary pseudonyms.

    Theorem 4:If an attacker succeeds in compromising RSU,no valuable information is leaked.

    Proof:RSU only stores the mapping between the current primary pseudonym and secondary pseudonym.The primary pseudonyms are changed after a short period of time.Therefore,it is very hard for an attacker to get any useful information by compromising any of the RSUs.

    Theorem 5:If an attacker succeeds in compromising the CA database, no valuable information is leaked.

    Proof:Since the database of CA contains encrypted VIDs of vehicles,no valuable information is leaked even though CA is compromised.

    Theorem 6:Even if an RSU tries to correlate the pseudonyms of an initiator.it hardly establishes the linkability between them.

    Proof:RSUs only issue secondary pseudonyms on the basis of a primary pseudonym.An initiator only uses a primary pseudonym for a short period of time,after which it securely gets another primary pseudonym from CA without the knowledge of RSU.It is,therefore,very hard for the RSU to establish any link between two primary pseudonyms.

    If any vehicle is involved in malicious activity,the malicious participant can be reported to RSU with its secondary pseudonym.RSU can then report it to the CA which will further cooperate with RA to get the associated encryption key for primary pseudonym.Thereafter, they can revoke/track the malicious participant using its ID in primary pseudonym.

    Tab.5 shows the comparison of the proposed solution with[10,11].We observed that the protocols in[10,11]are vulnerable to the Sybil attack.However,the proposed solution in this study is resistant to against the possible Sybil attack.If CA and SN are compromised in[10,11],respectively,they do not provide privacy preservation becauseVisends itsVIDiin plaintext.In the proposed solution,since CA is given an encrypted form ofVIDi, a compromised CA cannot leak any valuable information regardingVIDi.

    Table 5:Comparison with[10,11]

    5.3 Performance Evaluation

    We evaluate the performance of our proposed scheme using our testbed.Our testbed includes an Intel i5 processor with 8 GB of RAM and the computation is carried in a C++,as C++supports a rich set of cryptographic libraries[39].Execution time for the cryptographic operations is given in Tab.6.We compare the computational overhead for generation and verification of broadcasted beacons in[10,11]with our proposed protocol.

    Table 6:Execution time and descriptions of cryptographic operations

    Beacon generation:In Fig.4a, it is evident that the proposed protocol outperforms others in terms of beacon generation.For beacon generation, [10] computes one signature, so the total time required for beacon generation is 1.88 ms,whereas[11]computes one signature,one AES encryption,and one ECC key generation.Hence,the total time required for beacon generation is 1.88+0.357+2≈4.237 ms.For beacon generation,the proposed protocol only computes one hash(H),so the total time required is 0.0001 ms.Hence,the proposed protocol is the most efficient in beacon generation,taking almost constant time, which means that, unlike [10,11], the time for beacon generation does not increase linearly with an increase in the number of beacons generated because the proposed method uses only one hash for beacon generation whereas others use signature verification along with encryption,which are computationally inefficient.

    Beacon verification:For beacon verification, as shown in Fig.4b, [10] computes two signature verifications,so the total time required for beacon verification is 2.946+2.946 ≈5.892 ms,whereas[11] computes one signature verification and one AES decryption for beacon verification, hence the time required for beacon verification is 2.946+0.253 ≈3.199 ms.For beacon verification, the proposed protocol computes one hash and one signature verification, so the total time required for message verification is 2.946+0.0001 ≈2.9461 ms.The proposed protocol provides 7.908% faster time for beacon verification compared to [11], because the proposed protocol uses hash which is computationally efficient compared to AES decryption in[11].

    5.4 Communication Overhead

    In this section,we evaluate and compare the size of beacons and show that the proposed protocol has the most efficient communicational overhead.Description of size for each element in a beacon is given in Tab.7.The the size of beacon in the proposed protocol is 322 bytes,whereas the size of beacon in [10,11] is 362 and 364 respectively, as shown in Tab.8.Hence the proposed protocoloutperforms others in terms of communicational overhead.

    Figure 4:Computational overhead for:(a)beacon generation,(b)beacon verification

    Table 7:Size of elements

    The corresponding hardware implementations for this protocol consist of hash function for the beacon generation, and hash function and signature verification for beacon verification.The associated hardware requirements can be accomplished using one hash;the light weight hash function as implemented in [40] can serve as the best option for this case in FPGA platform.Similarly for the signature verification case,the ECC can be employed,where the efficient implementations can be found in[32].Later,we intend to design the whole protocol in hardware that can utilize the resource sharing techniques for the efficient implementation of the protocol.

    Table 8:Communicational overhead comparison

    6 Conclusions and Future Work

    In this paper, our cryptanalysis results found that the VANET authentication protocols are vulnerable to Sybil attacks.To remove this flaw, we proposed a novel protocol using searchable encryption by enabling search over encrypted identities.As a result of that,the security is improved while maintaining the privacy.The proposed solution is generic and can be applied to existing protocols that are vulnerable to Sybil attack.Simulation results show that the beacon generation time is constant while the beacon verification time is 7.908% faster compared to the state-of-the-art protocols.In addition,the beacon size is also reduced to 322 bytes,indicating that the protocol is efficient enough to be used for practical applications.In the future,we intend to adopt lightweight authentication[41]to improve the speed of the beacon verification in the proposed protocol.Efficient implementation techniques can also be developed for specialized hardware (GPU and FPGA) to enhance the speed performance and allow for large scale adoption.Furthermore,we will extend our proposed protocol to other applications such as bluetooth low energy[42]to make them secure from such attacks.

    Acknowledgement:We thank our families and colleagues who provided us with moral support.

    Funding Statement:This work was supported by Institute of Information&Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No.2021-0-00540, Development of Fast Design and Implementation of Cryptographic Algorithms based on GPU/ASIC).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日韩国内少妇激情av| 激情五月婷婷亚洲| 国产午夜精品久久久久久一区二区三区| 99精国产麻豆久久婷婷| 精品一区二区三卡| 精品99又大又爽又粗少妇毛片| videossex国产| 亚洲自偷自拍三级| 免费看a级黄色片| 美女脱内裤让男人舔精品视频| 尾随美女入室| av在线app专区| 国产精品伦人一区二区| 亚洲婷婷狠狠爱综合网| 欧美少妇被猛烈插入视频| 免费播放大片免费观看视频在线观看| 熟女电影av网| www.av在线官网国产| 日韩视频在线欧美| 国产精品一二三区在线看| 高清欧美精品videossex| 少妇裸体淫交视频免费看高清| 久久久国产一区二区| 久久久久精品久久久久真实原创| 亚洲精品日韩在线中文字幕| 色网站视频免费| 欧美日本视频| 亚洲人成网站高清观看| 成人二区视频| 久久精品国产亚洲网站| 一区二区三区乱码不卡18| 观看美女的网站| 精品久久久久久久久av| 七月丁香在线播放| av国产免费在线观看| 国产永久视频网站| 免费观看在线日韩| 国产成人freesex在线| 两个人的视频大全免费| 色5月婷婷丁香| 联通29元200g的流量卡| 日韩成人伦理影院| 熟女av电影| 人人妻人人爽人人添夜夜欢视频 | 亚洲人成网站在线播| 亚洲图色成人| 九九爱精品视频在线观看| 亚洲精品乱码久久久v下载方式| 97精品久久久久久久久久精品| 下体分泌物呈黄色| 最近手机中文字幕大全| 丰满少妇做爰视频| 性插视频无遮挡在线免费观看| 在线观看美女被高潮喷水网站| av又黄又爽大尺度在线免费看| 亚洲av.av天堂| av免费在线看不卡| 爱豆传媒免费全集在线观看| 国产国拍精品亚洲av在线观看| 最新中文字幕久久久久| 黄片wwwwww| 最新中文字幕久久久久| 日韩伦理黄色片| 97人妻精品一区二区三区麻豆| 久久99蜜桃精品久久| 男人舔奶头视频| 亚洲精品视频女| 国产真实伦视频高清在线观看| 中文字幕av成人在线电影| 99视频精品全部免费 在线| 看十八女毛片水多多多| 成年版毛片免费区| 成人亚洲欧美一区二区av| 国产精品一区二区在线观看99| 久久精品国产亚洲av涩爱| 午夜视频国产福利| 99久久精品一区二区三区| 国产淫语在线视频| 男女无遮挡免费网站观看| 日韩欧美一区视频在线观看 | 精品国产乱码久久久久久小说| 少妇人妻 视频| 国产成人91sexporn| www.色视频.com| 一级片'在线观看视频| 亚洲欧洲日产国产| 免费大片18禁| 青青草视频在线视频观看| 69人妻影院| 午夜老司机福利剧场| 高清欧美精品videossex| 国产精品久久久久久精品电影小说 | 国产精品不卡视频一区二区| 伦理电影大哥的女人| 精品熟女少妇av免费看| 高清午夜精品一区二区三区| 大话2 男鬼变身卡| 成人免费观看视频高清| 亚洲欧美成人精品一区二区| av在线亚洲专区| 久久鲁丝午夜福利片| 亚洲性久久影院| 欧美人与善性xxx| 色综合色国产| 国产精品一区二区三区四区免费观看| 插逼视频在线观看| 人妻夜夜爽99麻豆av| 黄色配什么色好看| 人人妻人人爽人人添夜夜欢视频 | 亚洲第一区二区三区不卡| 亚洲av欧美aⅴ国产| 亚洲av欧美aⅴ国产| 午夜福利在线在线| 黄片无遮挡物在线观看| 久久久久久久久大av| 免费观看a级毛片全部| 亚洲欧美精品专区久久| 国产极品天堂在线| 男人舔奶头视频| 国产一区二区三区av在线| 日本色播在线视频| 成人黄色视频免费在线看| 2021天堂中文幕一二区在线观| 亚洲精品,欧美精品| 国产精品成人在线| 一区二区三区精品91| 亚洲欧美精品专区久久| 少妇人妻一区二区三区视频| 精品人妻偷拍中文字幕| 亚洲精品乱码久久久久久按摩| 亚洲内射少妇av| 我的老师免费观看完整版| 日产精品乱码卡一卡2卡三| 欧美日韩在线观看h| 亚洲成人精品中文字幕电影| 国产一区二区在线观看日韩| 国产午夜精品久久久久久一区二区三区| 草草在线视频免费看| 97超视频在线观看视频| 国产精品三级大全| 国产亚洲最大av| 69av精品久久久久久| 免费大片18禁| 精品久久久久久久末码| 国内精品宾馆在线| 日本黄色片子视频| 狠狠精品人妻久久久久久综合| 麻豆精品久久久久久蜜桃| 亚洲最大成人手机在线| 久久精品久久久久久久性| 丝瓜视频免费看黄片| 成人综合一区亚洲| 一个人看视频在线观看www免费| 肉色欧美久久久久久久蜜桃 | 国产视频首页在线观看| 久久97久久精品| 毛片女人毛片| 一级黄片播放器| 久久久久久久久久久丰满| 国产免费又黄又爽又色| 亚洲精品一二三| 日本熟妇午夜| 岛国毛片在线播放| 国内精品美女久久久久久| 少妇被粗大猛烈的视频| 嫩草影院精品99| 在线观看免费高清a一片| 日韩亚洲欧美综合| 熟女人妻精品中文字幕| 嘟嘟电影网在线观看| 男女那种视频在线观看| kizo精华| 看免费成人av毛片| 亚洲成人av在线免费| 亚洲av日韩在线播放| 欧美日韩在线观看h| 少妇人妻久久综合中文| 免费不卡的大黄色大毛片视频在线观看| 一边亲一边摸免费视频| 久久久久久久精品精品| 国产精品久久久久久精品电影小说 | 日韩伦理黄色片| 国产成人福利小说| 色播亚洲综合网| 99久国产av精品国产电影| 久久99热6这里只有精品| 国产色婷婷99| 白带黄色成豆腐渣| 夫妻性生交免费视频一级片| 天堂中文最新版在线下载 | 日韩大片免费观看网站| 欧美国产精品一级二级三级 | 国产精品99久久久久久久久| 久久久久久久久久久免费av| 中文天堂在线官网| 美女主播在线视频| 自拍欧美九色日韩亚洲蝌蚪91 | 日本熟妇午夜| 日韩人妻高清精品专区| 久久久成人免费电影| 免费av毛片视频| 国产亚洲午夜精品一区二区久久 | 免费少妇av软件| 中国美白少妇内射xxxbb| 熟女电影av网| 亚洲欧美精品自产自拍| 色网站视频免费| 国产一区二区三区av在线| 色哟哟·www| 六月丁香七月| 欧美丝袜亚洲另类| 国产91av在线免费观看| 国产一区有黄有色的免费视频| 日韩成人伦理影院| 国内精品美女久久久久久| 久久久成人免费电影| 69人妻影院| 国产亚洲精品久久久com| 男人狂女人下面高潮的视频| 尤物成人国产欧美一区二区三区| 老女人水多毛片| 亚洲精华国产精华液的使用体验| 一个人看的www免费观看视频| av网站免费在线观看视频| 美女主播在线视频| 我的女老师完整版在线观看| 夫妻午夜视频| 亚洲婷婷狠狠爱综合网| 国产中年淑女户外野战色| 久久久久久久久久久丰满| 国产又色又爽无遮挡免| 插阴视频在线观看视频| 啦啦啦中文免费视频观看日本| 欧美激情在线99| 黄色视频在线播放观看不卡| 男人狂女人下面高潮的视频| 黄色欧美视频在线观看| 色综合色国产| 亚洲精品自拍成人| 日日撸夜夜添| 久久人人爽av亚洲精品天堂 | 亚洲,一卡二卡三卡| 最近2019中文字幕mv第一页| 久久精品国产亚洲av天美| kizo精华| 大话2 男鬼变身卡| 精品久久久久久电影网| 搡老乐熟女国产| 亚洲精品日本国产第一区| 熟妇人妻不卡中文字幕| 欧美高清成人免费视频www| av.在线天堂| 精华霜和精华液先用哪个| 色哟哟·www| 99久久精品国产国产毛片| av线在线观看网站| 人人妻人人爽人人添夜夜欢视频 | www.色视频.com| 18禁在线播放成人免费| 国产精品一区www在线观看| 欧美成人午夜免费资源| 国产毛片在线视频| 国内少妇人妻偷人精品xxx网站| 久久99热这里只有精品18| 欧美性感艳星| 啦啦啦啦在线视频资源| 日韩在线高清观看一区二区三区| av在线蜜桃| 亚洲精品成人久久久久久| 国产高清有码在线观看视频| 又爽又黄无遮挡网站| 不卡视频在线观看欧美| 国产真实伦视频高清在线观看| 成人特级av手机在线观看| 乱系列少妇在线播放| 国产伦精品一区二区三区四那| 91久久精品电影网| 九色成人免费人妻av| 国产片特级美女逼逼视频| 日日啪夜夜爽| 日韩,欧美,国产一区二区三区| 一区二区三区精品91| 深爱激情五月婷婷| 韩国高清视频一区二区三区| 赤兔流量卡办理| 欧美xxⅹ黑人| 在线观看三级黄色| 国产亚洲av嫩草精品影院| 成人亚洲精品av一区二区| 特级一级黄色大片| 亚洲精品日韩av片在线观看| 在线观看美女被高潮喷水网站| 精品久久久精品久久久| 晚上一个人看的免费电影| 在线播放无遮挡| 国产精品福利在线免费观看| 国产亚洲最大av| av女优亚洲男人天堂| 成人欧美大片| 天天躁夜夜躁狠狠久久av| 国产成人精品婷婷| 中文乱码字字幕精品一区二区三区| 中文字幕免费在线视频6| 女人久久www免费人成看片| 国内揄拍国产精品人妻在线| 欧美性感艳星| 亚洲国产成人一精品久久久| www.av在线官网国产| 精品人妻视频免费看| 日本爱情动作片www.在线观看| 女的被弄到高潮叫床怎么办| 色5月婷婷丁香| 久久久久精品久久久久真实原创| 校园人妻丝袜中文字幕| 高清在线视频一区二区三区| 国产有黄有色有爽视频| 中文精品一卡2卡3卡4更新| av卡一久久| 18禁动态无遮挡网站| 在线播放无遮挡| av免费观看日本| 一区二区av电影网| 欧美成人a在线观看| 成年av动漫网址| 在线a可以看的网站| 亚洲怡红院男人天堂| 亚洲精品久久午夜乱码| 国产91av在线免费观看| 久久久久久久久久成人| 亚洲欧美精品专区久久| 午夜免费鲁丝| 高清毛片免费看| 少妇高潮的动态图| av国产免费在线观看| 久久97久久精品| 亚洲精品中文字幕在线视频 | 国产精品国产三级专区第一集| 久久综合国产亚洲精品| 国产v大片淫在线免费观看| 国产精品一区二区三区四区免费观看| 亚洲精品日韩在线中文字幕| 听说在线观看完整版免费高清| 干丝袜人妻中文字幕| 九草在线视频观看| 欧美精品国产亚洲| 国产黄色视频一区二区在线观看| 80岁老熟妇乱子伦牲交| 日产精品乱码卡一卡2卡三| 国产综合精华液| 欧美xxxx性猛交bbbb| 精品久久久噜噜| 国产男女超爽视频在线观看| 欧美bdsm另类| www.av在线官网国产| 国产精品成人在线| 最近手机中文字幕大全| 亚洲国产精品999| 国内揄拍国产精品人妻在线| 丰满少妇做爰视频| 欧美潮喷喷水| eeuss影院久久| 成人无遮挡网站| 亚洲精品中文字幕在线视频 | 日韩伦理黄色片| 性插视频无遮挡在线免费观看| 亚洲人成网站在线播| 五月开心婷婷网| 日日撸夜夜添| 欧美xxxx性猛交bbbb| 亚洲国产精品999| 久久99热这里只有精品18| 精品一区二区三区视频在线| 亚洲在线观看片| 午夜福利在线在线| 观看美女的网站| 国产久久久一区二区三区| 在线天堂最新版资源| 亚洲av男天堂| 免费观看无遮挡的男女| 亚洲精品中文字幕在线视频 | 制服丝袜香蕉在线| 国产一区亚洲一区在线观看| 少妇 在线观看| 夜夜爽夜夜爽视频| 亚洲精品久久久久久婷婷小说| 97热精品久久久久久| 尤物成人国产欧美一区二区三区| 在线观看av片永久免费下载| 久久久久九九精品影院| 亚洲性久久影院| 七月丁香在线播放| 99久久精品国产国产毛片| av专区在线播放| 日本黄大片高清| 国产成年人精品一区二区| 一本久久精品| 男人添女人高潮全过程视频| 欧美xxⅹ黑人| 麻豆国产97在线/欧美| 免费看日本二区| 人人妻人人澡人人爽人人夜夜| 国产精品福利在线免费观看| 美女内射精品一级片tv| 免费少妇av软件| 中文欧美无线码| 春色校园在线视频观看| 伦精品一区二区三区| 日韩av免费高清视频| 美女高潮的动态| 老司机影院毛片| 99九九线精品视频在线观看视频| 免费黄频网站在线观看国产| 在线天堂最新版资源| 男女边吃奶边做爰视频| 成人鲁丝片一二三区免费| 欧美日韩一区二区视频在线观看视频在线 | 欧美激情在线99| 国产成人精品一,二区| 亚洲熟女精品中文字幕| 大片免费播放器 马上看| 中文资源天堂在线| 亚洲美女视频黄频| 亚洲成人久久爱视频| 波野结衣二区三区在线| 成人特级av手机在线观看| 精品人妻一区二区三区麻豆| 欧美日韩在线观看h| 国产人妻一区二区三区在| 亚洲国产日韩一区二区| 麻豆国产97在线/欧美| 久久久久久久久久久丰满| 国产黄频视频在线观看| 好男人在线观看高清免费视频| 大香蕉久久网| 久久ye,这里只有精品| 久久久久性生活片| 白带黄色成豆腐渣| 啦啦啦在线观看免费高清www| 99热全是精品| 免费av不卡在线播放| 日本猛色少妇xxxxx猛交久久| 欧美高清性xxxxhd video| 亚洲国产高清在线一区二区三| 国产精品精品国产色婷婷| 国产日韩欧美亚洲二区| 亚洲精品自拍成人| 免费观看性生交大片5| 成人美女网站在线观看视频| 亚洲自拍偷在线| 国产淫片久久久久久久久| 日韩国内少妇激情av| 啦啦啦在线观看免费高清www| 五月天丁香电影| 国产欧美日韩精品一区二区| 国产午夜精品久久久久久一区二区三区| 精品久久久精品久久久| 色5月婷婷丁香| 国产男人的电影天堂91| 中文字幕免费在线视频6| 欧美精品一区二区大全| 亚洲,一卡二卡三卡| 免费少妇av软件| 在线观看一区二区三区| 国产美女午夜福利| 黄色配什么色好看| 亚洲内射少妇av| 熟妇人妻不卡中文字幕| 免费高清在线观看视频在线观看| av国产久精品久网站免费入址| 国产又色又爽无遮挡免| 亚洲av男天堂| 久久精品久久久久久久性| 国产精品久久久久久久电影| 在线观看美女被高潮喷水网站| 欧美丝袜亚洲另类| 高清在线视频一区二区三区| av在线播放精品| 国产淫语在线视频| 久久精品久久久久久噜噜老黄| 欧美xxxx性猛交bbbb| 欧美日韩一区二区视频在线观看视频在线 | 国产黄频视频在线观看| 国产在视频线精品| 欧美+日韩+精品| 亚洲精品乱久久久久久| 国产亚洲一区二区精品| 免费观看av网站的网址| 六月丁香七月| 亚洲av二区三区四区| 亚洲精品影视一区二区三区av| 天天一区二区日本电影三级| 国产高清国产精品国产三级 | 国产综合懂色| eeuss影院久久| 国产精品99久久99久久久不卡 | 啦啦啦啦在线视频资源| 三级国产精品欧美在线观看| 国产高清有码在线观看视频| 97超碰精品成人国产| 大片电影免费在线观看免费| 蜜桃久久精品国产亚洲av| 国产精品偷伦视频观看了| 国产淫片久久久久久久久| 亚洲av二区三区四区| av在线天堂中文字幕| 午夜精品一区二区三区免费看| eeuss影院久久| 欧美xxxx性猛交bbbb| 久久久久久久久久人人人人人人| 欧美一区二区亚洲| 成人午夜精彩视频在线观看| 一边亲一边摸免费视频| 一级爰片在线观看| 国产成人91sexporn| 九九爱精品视频在线观看| 看非洲黑人一级黄片| 国产精品国产三级国产专区5o| 边亲边吃奶的免费视频| 成人无遮挡网站| 一个人看的www免费观看视频| 美女xxoo啪啪120秒动态图| 青春草视频在线免费观看| 99久久中文字幕三级久久日本| 日本三级黄在线观看| 黄片无遮挡物在线观看| 成年人午夜在线观看视频| 美女脱内裤让男人舔精品视频| 国精品久久久久久国模美| 人妻一区二区av| 国产视频首页在线观看| 亚洲丝袜综合中文字幕| 九色成人免费人妻av| 精品视频人人做人人爽| 五月玫瑰六月丁香| 国产大屁股一区二区在线视频| 久久久久久久久大av| 亚洲精品一区蜜桃| 精品一区二区免费观看| 亚洲美女搞黄在线观看| 国产午夜精品久久久久久一区二区三区| 亚洲精品第二区| 日韩欧美 国产精品| 国产亚洲精品久久久com| 免费av不卡在线播放| 一区二区三区四区激情视频| 亚洲欧美成人精品一区二区| 精品久久久久久久久av| 乱码一卡2卡4卡精品| 亚洲av成人精品一二三区| 蜜桃亚洲精品一区二区三区| 午夜福利在线在线| 美女高潮的动态| 街头女战士在线观看网站| 国产精品一二三区在线看| 国产极品天堂在线| 99热6这里只有精品| 国产乱人视频| 亚洲成人久久爱视频| 欧美亚洲 丝袜 人妻 在线| 韩国高清视频一区二区三区| 欧美日韩视频精品一区| 国产亚洲一区二区精品| 日产精品乱码卡一卡2卡三| 亚洲人与动物交配视频| 91午夜精品亚洲一区二区三区| 熟女人妻精品中文字幕| 欧美精品人与动牲交sv欧美| 少妇 在线观看| 亚洲精品亚洲一区二区| 最近的中文字幕免费完整| 欧美精品人与动牲交sv欧美| 亚洲国产精品成人久久小说| 国内少妇人妻偷人精品xxx网站| 在线免费十八禁| 1000部很黄的大片| 男人爽女人下面视频在线观看| 亚洲av日韩在线播放| 国产老妇伦熟女老妇高清| 国内精品美女久久久久久| 国产亚洲精品久久久com| 免费观看av网站的网址| 免费观看的影片在线观看| 精品国产一区二区三区久久久樱花 | 日韩在线高清观看一区二区三区| 99九九线精品视频在线观看视频| 五月开心婷婷网| 亚洲欧美清纯卡通| 国产免费福利视频在线观看| 51国产日韩欧美| 国产午夜精品久久久久久一区二区三区| 中文字幕亚洲精品专区| 国产精品久久久久久精品电影| 国产色婷婷99| 免费大片18禁| 久久久久久久久久久免费av| 一区二区三区乱码不卡18| 人妻夜夜爽99麻豆av| 一级黄片播放器| 3wmmmm亚洲av在线观看| av在线app专区| 国产男女内射视频| 国产毛片在线视频| 毛片一级片免费看久久久久| 国产熟女欧美一区二区| 熟女人妻精品中文字幕| 2021天堂中文幕一二区在线观| 狠狠精品人妻久久久久久综合| 我的女老师完整版在线观看| 美女被艹到高潮喷水动态| 超碰av人人做人人爽久久| 少妇高潮的动态图| 亚洲四区av| av在线观看视频网站免费| 亚洲久久久久久中文字幕| xxx大片免费视频|