• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    2022-08-24 07:03:00AkramAlmohammediVladimirShepelevSamDarshiMohammedBalfaqihandFayadGhawbar
    Computers Materials&Continua 2022年8期

    Akram A.Almohammedi,Vladimir Shepelev,Sam Darshi,Mohammed Balfaqih and Fayad Ghawbar

    1Automobile Transportation Department,South Ural State University,Chelyabinsk,454080,Russia

    2Electrical and Electronics Engineering Department Karabük University,Karabük,78050,Turkey

    3Department of Electrical Engineering,Indian Institute of Technology Ropar,Punjab,140001,India

    4Department of Computer and Network Engineering,University of Jeddah,Jeddah,23218,Saudi Arabia

    5Faculty of Engineering Technology,University Tun Hussein Onn Malaysia,Pagoh Campus,86400,Malaysia

    Abstract: The widespread use of the Internet of Things(IoT)applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel.As a result,the security of the IoT has become a serious challenge in the field of information security.Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication.The primary purpose of steganography is to conceal sensitive information in any form of media such as audio,video,text,or photos,and securely transfer it through wireless networks.In this paper,we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks(HCCNETs)for hiding sensitive data.This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks(WLANs),specifically in the IEEE 802.11ah IoT protocol.The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel.Additionally,the model considers packet arrival rate,back-off timer freezing,back-off stages,and short retry limit to ensure compliance with IEEE 802.11ah requirements.It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system.These parameters often result in a high precise channel access estimation,a more accurate and efficient accuracy measurements system,efficient channel utilisation,avoidance of throughput saturation overestimation,and ensuring that no packet is served endlessly.Evaluated results demonstrate that HCCNETs is an effective approach at low cost.

    Keywords: IoT;HCCNETs;steganography;markov chain model

    1 Introduction

    Nowadays,Internet of Things (IoT) technologies are widely used in a variety of applications such as healthcare,industrial control,identification technology,ubiquitous computing and military investigation,etc[1,2].The IoT architecture broadly contains three elements:cloud,device terminal,and mobile terminal.By establishing a link between a mobile terminal and the cloud,an instruction is given to a device terminal via the cloud,resulting in the realisation of the connectivity between entities and the network[3].Thereby,high-performance servers are often expected continue providing public-service computing[3],which is a costly proposition.Meanwhile,to properly manage network congestion in the IoT,emergency packets are employed and upgraded [4-6].Due to the presence of many cloud platforms and terminal devices,there will be a large amount of service quality data,which may lead to sensitive information leakage [7].Furthermore,because IoT devices,such as video surveillance,car localisation,smart bracelets,and other similar devices,are so near to users’lives,the majority of the data is related to user privacy.Sensitive data is likely more prone to exposure and monitoring than non-sensitive data.So,data protection is a big issue for many people[8-10],and the privacy-preserving challenges posed by IoT systems are serious problems that must be addressed.Information concealing methods can be used to protect communication between a machine and the server or application programmes,in addition to encrypting the transmitted message.Secret communication is desperately required in order to ensure the privacy or crucial data protection while also resisting the possibility of being disclosure.The term “steganography scheme” refers to a secret communication manner in which confidential data is invisibly integrated into a carrier and then broadcast publicly.It is possible to generate the secret carrier known as stego by concealing confidential information in the common communication medium such as images,text,video,and audio,etc.It is difficult to detect anomalies by the monitoring device in the stego transmission process,so that confidential information can be delivered secretly.As a result,researchers are using steganography techniques to the IoT in an effort to protect communications.In [11],the authors developed a novel approach for securing data in fog cloud IoT.Within the architecture,a user embeds important data in one area using the suggested quantum steganography protocol and uploads the covered data to the fog cloud.The intended receiver,located at a different location,retrieves the data in the fog cloud and extracts the desired content using the suggested extraction technique.Additionally,the authors provide a unique quantum steganography technique based on the hash function and quantum entangled states.The authors in[1]proposed a unique steganography method based on image-to-image translation by incorporating a steganography and steganalysis module into CycleGAN,which is suited for the secret communication and privacy preservation requirements of the Internet of Things.The purpose of the steganalysis network is to enhance the stego image’s antidetection capability.Additionally,CycleGAN’s cycle consistency ensures the resulting image’s quality.

    The authors in[12]proposed a steganography approach for IEEE 802.11 via using intentionally corrupted checksums frames to set up hidden communications.However,the authors in[12]assumed saturated condition and such assumption leads to unstable network.The steganography in IEEE 802.11 OFDM symbols was analysed in [13,14].The authors in [13,14]proposed a model based on 2-D Markov chain to analyse the network throughput of steganographic method of IEEE 802.11 a/g standards within a non-ideal channel.Nevertheless,the authors in [13,14]considered saturated situations and analysed it within basic access method.In [15],the authors presented and described the elliptic Galois cryptography scheme.A cryptography approach was employed in this study to secure private data obtained from a variety of medical sources.Following that the encrypted data was embedded into a low complexity picture using a Matrix XOR encoding steganography approach.Additionally,the suggested work in [15]used an optimization approach called Adaptive Firefly to improve the image’s cover block selection.In[16],the authors described a method for concealing secret messages by mapping numerous steganographic methods to complicated texture objects.To begin,complicated texture patches are chosen using an object recognition technique.Second,three distinct steganographic techniques were utilised to conceal a hidden message inside the block area chosen.The authors in [17]developed a novel approach for detecting steganography in network protocols.The technique was developed using machine learning algorithms and was based on a multilayer approach for the selective examination of derived and aggregated metrics.The primary purpose was to enable steganalysis on networks with a high density of devices and connections.The authors in[18]introduced a large-capacity secure authenticated quantum video steganography scheme.This approach allows for the embedding of secret quantum information into carrier quantum video,significantly increasing the embedding capacity.Additionally,it accomplishes quantum information steganography via the use of video’s unique properties,as well as an authentication system for increased security.In [19],the authors presented CloudSteg,a steganographic technique that establishes a covert channel between two cloud instances that share a physical computer through hard disc contention.In[20],the authors offered a coverless information concealing approach in which original pictures with traits capable of expressing hidden information are employed directly as stegoimages.Additionally,the authors developed a revolutionary coverless information concealment technique for images utilising Faster Region-based Convolutional Neural Networks (Faster-RCNN).The authors used Faster-RCNN to recognise and locate objects in pictures and to convey hidden information through the labels of these things.The authors of [21]also employed deep neural network to conceal numerous speech signals under a single cover using multiple decoders or a single conditional decoder.Three distinct networks were used in[21].The encoder network takes as inputs a carrier and a message and creates a combined latent network for both signals.This is subsequently passed via a carrier decoder network,which outputs the carrier embedded with the message.Finally,the message decoder network reconstructs the concealed message signal from the embedded signal.They discovered that the decoded signals are indistinguishable,however this approach has the disadvantage of not operating in other audio domains outside speech.

    The work presented in this paper focuses on one of steganography techniques,called the Hidden Communication System for Corrupted Networks (HCCNETs) for hidden sensitive data.The significance of HCCNETs lies on the use of a protected communications network equipped with cryptographic techniques to offer a steganography system and suggestion of new protocol with bandwidth allocation on the basis of corrupted frames.The system’s primary innovation is the use of frames with intentionally erroneous checksums to create concealed communication.This study is an extension of the existing study in[12],by adding an idle state to the model to reflect the empty queue at the MAC layer when no packet is available for transmission.The important contributions of this work are as follows:1)An analytical model based on a two-dimensional Markov chain under unsaturated situations is developed.The primary advantages of using unsaturated circumstances in this model are that(i)real networks are predominantly non-saturated,(ii)saturated circumstances often result in an unstable network,and(iii)it allows for the consideration of inter-arriving time and burstiness in the network[22,23].2)An error-prone channel is modelled in this work in order to avoid overestimating saturated throughputs.The model also considers packet arrival rate,back-off counter freezing,backoff stages,and short retry limit to ensure compliance with IEEE 802.11ah IoT protocol requirements.It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system.These parameters often result in a high precise channel access estimation,a more accurate and efficient accuracy measurements system,efficient channel utilisation,and ensuring that no packet is served endlessly.3)Derivation of transmission probability,successful transmission probability,and collision probability is performed to express and compute the performance characteristics of the HICCUPS,such as the system’s throughput,efficiency and cost of WLAN usage in the network.The system usage cost (κ) is defined as the reduction of WLAN throughput caused by HICCUPS functioning in corrupted frame mode.The efficiency of a system(ε)is described as the throughput of the system in corrupt frame state.

    The rest of the paper is arranged as follows:Section 2 presents the model analysis including the frame transmission probability in the corrupted frame mode as well as the data transmission time analysis.Section 3 describes the cost analysisκ.Section 4 discusses efficiency analysisε.Section 5 concludes the paper.

    2 The Model

    In this section,the medium access procedure for nodes is formulated using two-dimension Markov Chain,then the system’s throughput,efficiency and cost of IEEE 802.11ah communication are derived.In Fig.1,the Markov Chain model of the 802.11ah backoff mechanism within a Restricted Access Window(RAW)slot is shown in corrupted frame mode.This Markov Chain is adopted from[23-25]for unsaturated circumstances in the presence of error-prone channel.From the HCCNET’s WLAN viewpoint,communication is always unsuccessful due to a lack of valid checksums.Thus,steganogram transmission occurs at each stage of the backoff operation which allows us to predict the HCCNETs behaviour using the Markov chain-based model with probability of failurepf=1,which means it always fails.An idle state is added to the model to reflect the empty queue at the MAC layer when no packet is available for transmission.The primary advantages of using unsaturated circumstances in this model are that(i)real networks are predominantly non-saturated,(ii)saturated circumstances often result in an unstable network,and(iii)it allows for the consideration of inter-arriving time and burstiness in the network [22,23].Contention-based medium access control is used by the nodes to compete for channel access.An imperfect transmission channel is assumed in the model to avoid an overestimation of saturated throughput.The worst-case frame error rate-FER scenario is investigated,in which errors are randomly distributed in the transmission channel.Therefore,a Gaussian wireless error channel is considered,where a Bit Error Rate (BER) of the channel is given and each bit has the same probability of encountering a bit error.Additionally,the freezing of the back-off timer and packet arrival rate are considered in order to offer an accurate channel access estimation and efficiently use the channel.The model also considers back-off stages and short retry limit for packet transmission to comply with the IEEE 802.11ah standard and to guarantee that no packet remains served forever.Nodes communicate in ad hoc mode.The transmission range is shared with all nodes,and there are no hidden terminals on the network.Tab.1 displays the important notations and variables utilised in the study for simplicity.

    Figure 1:The packets transmission process using Markov chain model

    Table 1:Symbols used in the mathematical model

    Table 1:Continued

    2.1 Frame Transmission Probability in the Corrupted Frame Mode τcf

    As seen in Fig.1,the 2-D Markov chain model is used to determine the probability of frame transmission in the corrupted frame modeτcf.Lets(t)andb(t)be random variables denoting the back-off stages (0,1,2,...,m) and the value of the back-off counter (0,1,2,...,W i-1) for every provided station at time slot t,respectively.The highest value of the back-off counter typically depends on the back-off stages.As a result,these random variables are not self-contained.

    W0specifies the starting size of the contention window,W0=(CWmin+1),whereasm′specifies the maximum number of times the contention window may rise based on the followings,Wm′=2m′W0=(CWmax+1).In this model,them’value is set to 5.Letmbe the highest number of possible back-off stages.The two-dimensionals(t),b(t)processes,on the other hand,are assessed using a discrete-time Markov chain in which the channel state changes.Assume that the state process is denoted by(i,k).The state transition diagram of a two-dimensional Markov chain is shown in Fig.1,and the non-zero transition probabilities are represented by Eq.(2).

    The first case in Eq.(2)indicates that the back-off counter reduces when the channel is detected idle.The second case in Eq.(2)indicates that when the channel is noticed busy,the back-off counter is frozen.If a packet is not successfully transmitted,the back-off phase moves fromi-1 toiand also doubles the CW value,as shown in the third case of Eq.(2).Maximum CWs size and back-off phase values are reset to the minimum levels when the repeat limit is reached,as shown in case 4 of Eq.(2).If there is still a packet in the queue for transmission,the node commences the back-off process from the first phase.

    The non-null transition probabilities in this case represent the absence of packet transmission in the buffer that is forwarded to the idle state(I)after successful transmission.

    Whenever the repeat limit is reached,the maximum back-off phase m and CW size value are reset to the minimum levels as shown in the first case of Eq.(3).Then,the node goes into idle mode if there are no more packets in the transmission queue.The second case in Eq.(3)denotes that the node stays in the idle mode if no new packets are received at the queue for transmission.The third case in Eq.(3)represents that the node goes from the idle mode to the back-off statekby uniformly selecting a back-off counter value in the range[0,W0-1].

    Assume thatbi,k=limt→∞P{s(t)=i,b(t)=k} denotes the stationary distribution of Markov Chain,wheni∈(0,m)andk∈(1,Wi-1).We observe that Fig.1 representing Markov Chain Model is different from the model in[23-25]for 802.11p Carrier-Sense Multiple Access with Collision Avoidance(CSMA/CA)in terms of back to states(0,k)for 0 ≤k ≤W0-1 and(i,0)for 0 ≤i ≤m.Value one is a graphical representation of“permanently failure”from the WLAN perspective.

    Due to the chain regularities,for eachk∈(1,Wi-1),the stationary distribution’s idle and backoff phases of data transmission are denoted bybIandbi,kand are expressed by Eqs.(5) and (6),respectively.

    From Eq.(6),we get Eq.(7):

    Since

    Therefore,by applying the condition of stationary distribution normalisation,

    We obtain Eq.(10)from Eq.(9),which is dependent on the values ofmandm′

    where:

    And:

    Since we haveb0,0,we are now able to determine the probability of a node transmitting a frame in the corrupted frame modeτcf,where a node can send a packet in a randomly chosen time slot.The node can only send a packet whenever the back-off time counter is zero(bi,0),regardless of the back-off stage,as in Eq.(13).

    Eq.(13)demonstrates that theτcfvalue is dependent on the conditional collision probabilitypcolland the probability of at least one packet being available in bufferq.There is a chance of a collision occurring,when at least two nodes send packets in the same time slot.

    During transmission,the error frame probabilityperris given by:

    wherepdata_erris the Frame Error Rate(FERs) for DATA frame that has been corrupted.This error probability is determined by computing the bit error probability(i.e.,BER)pBERby Eq.(15):

    where the bit error rate(pBER)could be calculated by dividing the bit energy by the noise.In this study we use QPSK modulation,then thepBERfor QPSK modulation could be calculated as follows by Eq.(16)

    The probability of transmitting packets colliding is defined as follows:

    We can calculate the packet transmission from Eqs.(13) and (18) by numerically solving the unknown variableτcf.

    2.2 Data Transmission Time Analysis

    In this subsection,the system throughput of HCCNETs in the corrupted frame mode(Scf)is analysed.Fig.2 depicts the four channel states that may happen during the corrupted frame manner.In this mode,all 802.11ah packets contain an intentionally erroneous CRC-32 code value entered into the Frame Checksum Control(FCS)field.As a result,there are no ACKnowledgement(ACK)frames used to provide positive feedback,and thereby the ACK error status is neglected.Successful transmission in the HCCNETs,which is not defined in the same manner as in the 802.11ah network,indicates that there are no collisions or data errors during transmission.The HICCUPS frame integrity mechanism is separated from the 802.11ah FCS.Throughout the contention-based MAC method,the channel state will be one of the following during each time slot:idle,successful transmission,collision transmission,or failure transmission due to frame error.As a consequence,the channel state probability is expressed as Eq.(19).

    Figure 2:Time slots length for the packet process of transmission

    Fig.2 illustrates the time slot lengths for the packet process of transmission using the contentionbased MAC for DATA frames.Thus,as in Eq.(20),the transmission time is calculated using the unicast mode.

    whereTdata=Lpld/R,Lpldindicates the payload of the data frame with FCS field and R is the data transmission rate.Tdatais PHY-layer dependent and the transmission of a frame in terms of Orthogonal Frequency-Division Multiplexing(OFDM)symbols is represented as Eq.(21):

    Thus,the duration of the logical time slotsTslot802.11ah per state on the channel is computed by Eq.(22)in order to calculate the network throughput,which is defined as follows:

    Eventually,the system throughput of HCCNETs in the corrupted frame mode(Scf)is expressed by Eq.(23)

    3 Cost Analysis κ

    The costκ,as defined in the first section of this study,is the difference between S,in the presence of frame error rate without HCCNETs,and S,with frame error rate resulting from HCCNETs in the corrupted frame manner.Simply,it is a drop of WLAN throughput caused by HCCNETs hidden channels.

    Assume that frame error rate increases with the fixed value △FERwhen applying HCCNETs as shown in Fig.3.The frame error rate for networks without HCCNETs is equal to FER’.It can be seen that △FER≤1-FER′.Thus,we may represent the cost as follows:

    Then,it is normalised toR as:

    Since the cost curves are derived onS(FER)and appear to be nearly linear,so,we may apply the following approximation formula for small values of △FER,as shown in Fig.4:

    Figure 3:Interpretation of ΔFER[12]

    Figure 4:Illustration of the cost κ [12]

    The cost values for IEEE 802.11ah(ERP-OFDM)are shown in Tabs.2 and 3,whenn=10,20,and R=6.5 Mbps.These values,whenL=1000 bytes,are obtained from Eq.(26),and are computed forFER′∈{0;0.0769;0.5507}.TheseFER′values correspond to the following threeBER=0,10-5,10-4.Five typical values of △FERare considered under these scenarios(0.01;0.02;0.03;0.04;0.05).

    Table 2:The cost κ normalized values,(in parentheses,Measured in Mbps),when N=10 and L=1000 bytes

    Table 3:The cost κ normalized values,(in parentheses,Measured in Mbps),when N=20 and L=1000 bytes

    4 Efficiency Analysis ε

    The efficiency is defined as theScfin situations caused by the physical channel (particularly BER) and the number of frames consumed by the HCCNETs in the corrupted frame manner.These situations provide a different view of FER from the perspective of the HCCNETs such as the appropriate frames in the HCCNETs are bad for a WLAN,and certainly the ideal frames for a WLAN in the presence of the HCCNETs are considered incorrect.As a result,we will useFERcfto emphasise this distinction and expressεas follows:

    Scf,analysed in the previous section of the work,is used to compute the upper limit of the system throughput for HCCNETs.Corrupted frame mode happens seldom during typical operation of the HCCNETs.Two scenarios are used to validate the efficiency.In the first scenario,all stations operate exclusively in damaged frame manner(the HCCNETs is on at all times).

    SinceS(1)equals 0,thenS=0in the FER function;andScf=Scf (FER′)in the FER function.Since 0 ≤△FER≤1-FER′,△FER=1-FER′.The HCCNETs is off at all times in the second scenario(△FER=0,just typical transmission is executed,

    ThereforeScf=0 (sinceScf (1)equals 0),Sis equal toS(FER′).Based on the two scenarios discussed previously,we can evaluate the hypothetic point of operation of HCCNETs for (FER′+△FER)as a mix of reflection and translation,as shown in Fig.5.TheScfcurve is reflected and then translated into the FER domain in order to maintain the relationship betweenS(1)=0 andScf (FER′),as well as betweenS(FER′)andScf (1)=0.Following these procedures,we can see thatFERcf=1-△FER.

    Eventuallyεis given by Eq.(28)as follows:

    And then normalize it toRas follows:

    Figure 5:The efficiency ε illustration[12]

    As cost analysis,we analyse an IEEE 802.11ah(ERP-OFDM)when R=6.5 Mbps,L=1000 bytes frames,n=10,20,and the same values of △FER(0.01;0.02;0.03;0.04;0.05).Tab.4 shows the findings of the experiment.

    Table 4:The efficiency ε normalized values(in parentheses,Measured in Mbps),when n=10,20 and L=1000 bytes

    The cost relies on the frame error rate,while the efficiency relies only on the △FER.For instance,in IEEE 802.11ah (ERP-OFDM),when n=10 stations,and △FER=0.05 with R=6.5 Mbps,the efficiencyε=0.289 Mbps and the costε=0.294 Mbps.Moreover,when n=20 stations and △FER=0.05 with R=6.5 Mbps,the efficiencyε=0.296 Mbps and the costκ=0.299 Mbps.The work shows that HICCUPS is a significant method as it results in a reasonable cost and highly efficient steganographic technology.

    5 Conclusion and Future Work

    This paper introduces one of the steganographic techniques called HCCNETs to evaluate the performance efficiency and the cost of system usage of the steganographic channel over IEEE 802.11ah IoT protocol.We begin by analysing the IEEE 802.11ah protocol using a two-dimensional Markov chain model under unsaturated situations with an imperfect transmission channel.The analysis of the 802.11ah IoT protocol is used to determine the transmission probability,successful transmission probability,and collision probability.Then,using these derivatives formulas,performance metrics for throughput,efficiency,and cost of system usage in the network are expressed and calculated.The influence of the channel conditions and node number is examined in order to evaluate and understand the efficiency and the cost of system usage in HICCUPS over 802.11ah IoT protocol.The analytical findings indicate that HICCUPS steganographic technique is significantly efficient with reasonable cost.

    Future study will concentrate on simulation analysis of HCCNETs over IoT scheme in order to analyse HCCNETs characteristics in a variety of situations and to provide a comprehensive evaluation of the security of HCCNETs.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日韩伦理黄色片| 国产免费视频播放在线视频| 国产成人aa在线观看| 啦啦啦啦在线视频资源| 青春草视频在线免费观看| 亚洲成人av在线免费| 97人妻精品一区二区三区麻豆| 亚洲国产欧美在线一区| 亚洲综合精品二区| 中文字幕人妻熟人妻熟丝袜美| kizo精华| 亚洲真实伦在线观看| 一级毛片 在线播放| 欧美一区二区亚洲| 国产黄色视频一区二区在线观看| 午夜精品一区二区三区免费看| 国产毛片a区久久久久| 国产伦在线观看视频一区| 麻豆成人av视频| 人妻一区二区av| 91狼人影院| 国产成人一区二区在线| 成人免费观看视频高清| 精品熟女少妇av免费看| 精品人妻偷拍中文字幕| 久久久久网色| 九九久久精品国产亚洲av麻豆| 熟女电影av网| 赤兔流量卡办理| videos熟女内射| 如何舔出高潮| 建设人人有责人人尽责人人享有的 | 又大又黄又爽视频免费| 国产伦精品一区二区三区视频9| 国产黄a三级三级三级人| 午夜福利视频精品| 免费观看性生交大片5| 精品少妇久久久久久888优播| 在现免费观看毛片| 干丝袜人妻中文字幕| 夜夜爽夜夜爽视频| 女人久久www免费人成看片| 九草在线视频观看| 欧美精品人与动牲交sv欧美| 少妇丰满av| 搡女人真爽免费视频火全软件| 久久久国产一区二区| 亚洲国产av新网站| 91久久精品电影网| 免费观看在线日韩| 国产精品一区二区性色av| 纵有疾风起免费观看全集完整版| 在线观看av片永久免费下载| 免费看a级黄色片| 亚洲伊人久久精品综合| 2022亚洲国产成人精品| 久久精品久久久久久久性| 国产片特级美女逼逼视频| 能在线免费看毛片的网站| 午夜福利视频精品| 日本一二三区视频观看| 国产精品久久久久久精品电影小说 | 精品一区二区三卡| 一级毛片aaaaaa免费看小| 亚洲,欧美,日韩| 看免费成人av毛片| 国产成人精品久久久久久| 亚洲精品日韩在线中文字幕| 男女边吃奶边做爰视频| 色视频www国产| 熟女av电影| 午夜福利在线在线| 亚洲欧美日韩卡通动漫| 中文字幕制服av| 黄色一级大片看看| 国产精品av视频在线免费观看| 一级毛片久久久久久久久女| 美女视频免费永久观看网站| 免费av不卡在线播放| 亚洲怡红院男人天堂| 一个人观看的视频www高清免费观看| 一级av片app| 人妻一区二区av| 91aial.com中文字幕在线观看| 国产综合精华液| 国产精品久久久久久精品古装| 久久久久久久久久成人| 视频区图区小说| 王馨瑶露胸无遮挡在线观看| 日韩视频在线欧美| 日产精品乱码卡一卡2卡三| 成人特级av手机在线观看| 最近的中文字幕免费完整| 精品久久久久久久人妻蜜臀av| 久久精品人妻少妇| 久久久久久久精品精品| 内地一区二区视频在线| 欧美xxⅹ黑人| 亚洲欧洲日产国产| 超碰97精品在线观看| 久久精品国产亚洲av涩爱| 国产 一区精品| 久久久久久久精品精品| 18禁动态无遮挡网站| 国产黄片美女视频| 色哟哟·www| 国产美女午夜福利| 国产精品99久久久久久久久| 亚洲综合色惰| 国产成人aa在线观看| 免费av观看视频| 国产精品偷伦视频观看了| 久久影院123| 国产69精品久久久久777片| 欧美人与善性xxx| 97人妻精品一区二区三区麻豆| 国产成人免费无遮挡视频| 亚洲不卡免费看| 精品国产露脸久久av麻豆| 最近最新中文字幕免费大全7| 男插女下体视频免费在线播放| 男人添女人高潮全过程视频| 中文欧美无线码| 免费观看无遮挡的男女| 中文在线观看免费www的网站| 免费观看av网站的网址| av一本久久久久| 性色av一级| 黄色一级大片看看| 一边亲一边摸免费视频| 亚洲成人一二三区av| 女人久久www免费人成看片| 日韩制服骚丝袜av| 51国产日韩欧美| 熟女av电影| 少妇被粗大猛烈的视频| 高清欧美精品videossex| 久久精品熟女亚洲av麻豆精品| 日韩av在线免费看完整版不卡| 搡老乐熟女国产| 欧美丝袜亚洲另类| 久久久久久久久久成人| 最近最新中文字幕免费大全7| 亚洲国产精品成人久久小说| 日韩国内少妇激情av| 99热这里只有精品一区| 99久久精品热视频| 国产人妻一区二区三区在| 国产精品人妻久久久久久| 美女主播在线视频| 久久久久网色| 亚洲国产日韩一区二区| 国产成人免费观看mmmm| 日韩一区二区三区影片| 国产男女超爽视频在线观看| 久久久国产一区二区| a级毛色黄片| 久久精品国产亚洲av涩爱| 99久久精品热视频| 麻豆乱淫一区二区| 在线天堂最新版资源| 各种免费的搞黄视频| 国产高清有码在线观看视频| 如何舔出高潮| 国产欧美亚洲国产| 黄片wwwwww| 夫妻午夜视频| 国产人妻一区二区三区在| 久久久久久久久久久丰满| 熟女av电影| 老司机影院毛片| 亚洲色图av天堂| 少妇的逼水好多| 在线亚洲精品国产二区图片欧美 | 亚洲经典国产精华液单| 大码成人一级视频| 亚洲av二区三区四区| 极品教师在线视频| 成人鲁丝片一二三区免费| 午夜精品国产一区二区电影 | 久久鲁丝午夜福利片| 国产黄色免费在线视频| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 性色avwww在线观看| 日本三级黄在线观看| 岛国毛片在线播放| 亚洲自拍偷在线| 亚洲精品国产成人久久av| 亚洲欧美一区二区三区国产| 日韩视频在线欧美| 身体一侧抽搐| 久久久久久伊人网av| 国产老妇伦熟女老妇高清| 国产成人一区二区在线| 国产一区亚洲一区在线观看| 成人亚洲精品av一区二区| 制服丝袜香蕉在线| 色播亚洲综合网| 成年女人在线观看亚洲视频 | 日本一本二区三区精品| 亚洲天堂av无毛| 久久国内精品自在自线图片| 亚洲国产日韩一区二区| 男女国产视频网站| tube8黄色片| 久久久午夜欧美精品| 毛片一级片免费看久久久久| 91狼人影院| 一本色道久久久久久精品综合| 久久精品国产亚洲网站| 成人毛片60女人毛片免费| 久久99热这里只频精品6学生| 日本一本二区三区精品| 国产精品av视频在线免费观看| 亚洲国产精品成人久久小说| 99久久九九国产精品国产免费| 高清av免费在线| 在线亚洲精品国产二区图片欧美 | 91精品国产九色| 日本-黄色视频高清免费观看| 欧美性猛交╳xxx乱大交人| 日日啪夜夜爽| av播播在线观看一区| 亚洲最大成人手机在线| 国产精品99久久久久久久久| 丰满乱子伦码专区| 久久久久久久亚洲中文字幕| 少妇人妻 视频| 久久久久国产精品人妻一区二区| 三级男女做爰猛烈吃奶摸视频| 亚洲国产欧美在线一区| 免费黄色在线免费观看| 夫妻性生交免费视频一级片| 日韩成人av中文字幕在线观看| 老师上课跳d突然被开到最大视频| 午夜福利高清视频| 舔av片在线| 欧美 日韩 精品 国产| 精品国产一区二区三区久久久樱花 | 日本免费在线观看一区| 日日摸夜夜添夜夜爱| 80岁老熟妇乱子伦牲交| 亚洲国产欧美在线一区| 在线亚洲精品国产二区图片欧美 | 蜜桃久久精品国产亚洲av| 男女啪啪激烈高潮av片| 日本一二三区视频观看| 黄色日韩在线| 亚洲av电影在线观看一区二区三区 | 午夜日本视频在线| 一本一本综合久久| 国产精品一区二区三区四区免费观看| 夫妻午夜视频| 99热这里只有是精品50| 精品一区二区免费观看| 狠狠精品人妻久久久久久综合| av在线蜜桃| 91精品伊人久久大香线蕉| 国产又色又爽无遮挡免| 少妇的逼好多水| 直男gayav资源| 亚洲真实伦在线观看| 在现免费观看毛片| 国产白丝娇喘喷水9色精品| 国产亚洲最大av| 日本一本二区三区精品| 免费av毛片视频| 啦啦啦啦在线视频资源| 日产精品乱码卡一卡2卡三| 毛片女人毛片| 大香蕉久久网| 色视频在线一区二区三区| 成人欧美大片| 国产av不卡久久| 久久精品国产亚洲av天美| 免费高清在线观看视频在线观看| 国产淫片久久久久久久久| 亚洲av二区三区四区| 久久综合国产亚洲精品| 赤兔流量卡办理| 亚洲怡红院男人天堂| 日本黄色片子视频| 亚洲av欧美aⅴ国产| 国模一区二区三区四区视频| 女人久久www免费人成看片| 卡戴珊不雅视频在线播放| 成人一区二区视频在线观看| av又黄又爽大尺度在线免费看| 久久久久久久大尺度免费视频| 在线观看av片永久免费下载| 国产亚洲av嫩草精品影院| 亚洲欧美日韩东京热| 日韩强制内射视频| 一级毛片aaaaaa免费看小| 我的女老师完整版在线观看| 尤物成人国产欧美一区二区三区| 精华霜和精华液先用哪个| 麻豆乱淫一区二区| 国产极品天堂在线| 黄色视频在线播放观看不卡| 国产免费一级a男人的天堂| av国产久精品久网站免费入址| 内射极品少妇av片p| 欧美另类一区| 波多野结衣巨乳人妻| 亚洲自偷自拍三级| 国产一区有黄有色的免费视频| 亚洲美女视频黄频| 国产爽快片一区二区三区| 国产精品成人在线| 国产亚洲精品久久久com| 国产伦在线观看视频一区| 精品国产乱码久久久久久小说| 可以在线观看毛片的网站| 亚洲人成网站高清观看| h日本视频在线播放| 亚洲精品色激情综合| 国产 精品1| 在线精品无人区一区二区三 | 自拍偷自拍亚洲精品老妇| 国产免费视频播放在线视频| 亚洲av成人精品一区久久| 久久久午夜欧美精品| 2018国产大陆天天弄谢| 性色av一级| 亚洲av二区三区四区| xxx大片免费视频| 中文在线观看免费www的网站| 日韩精品有码人妻一区| 中文字幕免费在线视频6| 国产 一区精品| 久久精品久久久久久久性| 午夜日本视频在线| 麻豆精品久久久久久蜜桃| 中文字幕av成人在线电影| 国产片特级美女逼逼视频| 免费观看av网站的网址| 国产亚洲精品久久久com| 美女脱内裤让男人舔精品视频| 在线观看免费高清a一片| 天天一区二区日本电影三级| 亚洲精品久久午夜乱码| 中国美白少妇内射xxxbb| 夫妻午夜视频| 国产精品人妻久久久久久| 97在线视频观看| 男人添女人高潮全过程视频| 国产亚洲91精品色在线| 在线观看一区二区三区激情| 高清日韩中文字幕在线| 中文字幕人妻熟人妻熟丝袜美| 亚洲欧洲国产日韩| 国产欧美日韩一区二区三区在线 | 国产成人a区在线观看| av免费在线看不卡| 国产精品麻豆人妻色哟哟久久| 日韩制服骚丝袜av| 99久久人妻综合| 国产 一区精品| 超碰97精品在线观看| 亚洲欧美精品专区久久| 嘟嘟电影网在线观看| 黄片无遮挡物在线观看| 又爽又黄无遮挡网站| 自拍偷自拍亚洲精品老妇| 人妻系列 视频| 欧美亚洲 丝袜 人妻 在线| 麻豆乱淫一区二区| 亚洲欧美日韩无卡精品| 亚洲精品国产av蜜桃| 哪个播放器可以免费观看大片| 韩国高清视频一区二区三区| 中文欧美无线码| 女人被狂操c到高潮| 国产午夜精品久久久久久一区二区三区| 国产视频内射| 国产黄频视频在线观看| 成人二区视频| 视频区图区小说| 丝瓜视频免费看黄片| 99热国产这里只有精品6| 极品教师在线视频| 99久久精品热视频| 久久久久久久大尺度免费视频| 国产有黄有色有爽视频| 久久99热这里只有精品18| 欧美最新免费一区二区三区| 国产亚洲最大av| 中文字幕亚洲精品专区| 亚洲精品aⅴ在线观看| 美女内射精品一级片tv| 亚洲,欧美,日韩| av又黄又爽大尺度在线免费看| 婷婷色综合www| 黄色配什么色好看| 少妇裸体淫交视频免费看高清| 精品一区二区三卡| 亚洲一级一片aⅴ在线观看| 亚洲欧美日韩另类电影网站 | 欧美成人a在线观看| 亚洲av成人精品一区久久| 国产女主播在线喷水免费视频网站| 激情 狠狠 欧美| 国产精品蜜桃在线观看| 99久久九九国产精品国产免费| 综合色av麻豆| 一级黄片播放器| 一个人看的www免费观看视频| 欧美国产精品一级二级三级 | 舔av片在线| 特大巨黑吊av在线直播| 欧美日韩一区二区视频在线观看视频在线 | 中国国产av一级| 一级爰片在线观看| 亚洲欧洲国产日韩| 亚洲精品456在线播放app| 男女啪啪激烈高潮av片| 国产亚洲精品久久久com| 亚洲成色77777| 91在线精品国自产拍蜜月| 97超碰精品成人国产| 精品午夜福利在线看| 直男gayav资源| 3wmmmm亚洲av在线观看| 麻豆乱淫一区二区| 午夜福利高清视频| 亚洲四区av| 国产精品久久久久久久电影| 欧美成人一区二区免费高清观看| 欧美高清性xxxxhd video| 三级国产精品欧美在线观看| 久久综合国产亚洲精品| 男女无遮挡免费网站观看| 国产精品秋霞免费鲁丝片| 韩国av在线不卡| 午夜福利网站1000一区二区三区| 欧美激情在线99| 国产毛片在线视频| 夫妻午夜视频| 国产精品麻豆人妻色哟哟久久| 在线观看一区二区三区| 在线免费观看不下载黄p国产| 在线天堂最新版资源| 色播亚洲综合网| 国产精品99久久久久久久久| 欧美国产精品一级二级三级 | 久久综合国产亚洲精品| 欧美潮喷喷水| 97超视频在线观看视频| 亚洲精品国产av蜜桃| 日本与韩国留学比较| 女的被弄到高潮叫床怎么办| 99热网站在线观看| 亚洲av中文字字幕乱码综合| 久久精品久久精品一区二区三区| 国产熟女欧美一区二区| 免费人成在线观看视频色| 99热这里只有是精品在线观看| 日本免费在线观看一区| 国产成人免费无遮挡视频| 欧美高清成人免费视频www| 一级片'在线观看视频| 男女那种视频在线观看| 久久99热这里只有精品18| 香蕉精品网在线| 亚洲欧美精品专区久久| 免费黄色在线免费观看| 91久久精品电影网| 在现免费观看毛片| 成年女人看的毛片在线观看| 国产人妻一区二区三区在| 看十八女毛片水多多多| 免费观看性生交大片5| 亚洲性久久影院| 亚洲最大成人av| 18+在线观看网站| 国产高清有码在线观看视频| 欧美三级亚洲精品| 国产亚洲一区二区精品| 亚洲综合色惰| 国产又色又爽无遮挡免| 性插视频无遮挡在线免费观看| 国产精品一区二区性色av| 国产亚洲一区二区精品| 日日撸夜夜添| kizo精华| 欧美xxxx黑人xx丫x性爽| 日韩欧美 国产精品| 男人狂女人下面高潮的视频| 97超视频在线观看视频| 中国美白少妇内射xxxbb| 天天躁日日操中文字幕| 永久免费av网站大全| 成人二区视频| 黑人高潮一二区| 尾随美女入室| 亚洲va在线va天堂va国产| 亚洲一区二区三区欧美精品 | 亚洲成人中文字幕在线播放| 老师上课跳d突然被开到最大视频| 欧美少妇被猛烈插入视频| 黄色一级大片看看| 麻豆成人午夜福利视频| 亚洲精品成人久久久久久| tube8黄色片| 成人漫画全彩无遮挡| 大香蕉久久网| 国产 精品1| 久久精品久久久久久噜噜老黄| 黄色欧美视频在线观看| 久久精品久久精品一区二区三区| 寂寞人妻少妇视频99o| 成人鲁丝片一二三区免费| 少妇人妻久久综合中文| 欧美变态另类bdsm刘玥| 欧美激情在线99| 亚洲精品aⅴ在线观看| 欧美 日韩 精品 国产| 国产男人的电影天堂91| 久久鲁丝午夜福利片| 好男人在线观看高清免费视频| 亚洲成人精品中文字幕电影| 国产 一区 欧美 日韩| 国产精品爽爽va在线观看网站| 五月开心婷婷网| 国产 精品1| 日韩精品有码人妻一区| 午夜视频国产福利| 嫩草影院入口| 汤姆久久久久久久影院中文字幕| 伊人久久国产一区二区| 欧美性猛交╳xxx乱大交人| 国产av码专区亚洲av| 亚洲精品成人av观看孕妇| 日韩精品有码人妻一区| 亚洲人成网站在线观看播放| 97热精品久久久久久| 久久久午夜欧美精品| 高清在线视频一区二区三区| 亚洲av电影在线观看一区二区三区 | 久久ye,这里只有精品| 国产高清不卡午夜福利| 国产视频内射| 亚洲精品色激情综合| 日韩国内少妇激情av| 国产亚洲精品久久久com| 欧美日韩视频精品一区| 男人添女人高潮全过程视频| 一二三四中文在线观看免费高清| 日韩av不卡免费在线播放| 亚洲av在线观看美女高潮| 国产高清国产精品国产三级 | 国产午夜精品久久久久久一区二区三区| 国产精品国产三级国产专区5o| 亚洲av日韩在线播放| 日韩成人av中文字幕在线观看| 亚洲国产欧美在线一区| 国产 精品1| 国产精品一区二区在线观看99| 国产亚洲午夜精品一区二区久久 | 国产av码专区亚洲av| 男女边吃奶边做爰视频| 久久久久久久国产电影| 交换朋友夫妻互换小说| 最近中文字幕高清免费大全6| 国产午夜精品一二区理论片| 最近最新中文字幕免费大全7| 国产精品伦人一区二区| 久久热精品热| 国产精品嫩草影院av在线观看| 国产毛片在线视频| 我要看日韩黄色一级片| 秋霞伦理黄片| 久久久久久久久大av| 亚洲不卡免费看| 久久99蜜桃精品久久| 狂野欧美白嫩少妇大欣赏| 国产高清不卡午夜福利| 一级毛片久久久久久久久女| 国产午夜精品一二区理论片| 一本色道久久久久久精品综合| 国产精品久久久久久久久免| 2021天堂中文幕一二区在线观| 毛片女人毛片| 国产高清不卡午夜福利| 久久精品久久精品一区二区三区| 国产在线男女| 麻豆国产97在线/欧美| 99久久人妻综合| 日韩伦理黄色片| 蜜桃亚洲精品一区二区三区| freevideosex欧美| 精品人妻熟女av久视频| 亚洲欧美一区二区三区黑人 | 成人欧美大片| 国产高清国产精品国产三级 | 成年女人看的毛片在线观看| 国产美女午夜福利| 自拍偷自拍亚洲精品老妇| 高清毛片免费看| 国产成人精品婷婷| 欧美+日韩+精品| 亚洲婷婷狠狠爱综合网| 亚洲av日韩在线播放| 欧美丝袜亚洲另类| 看非洲黑人一级黄片| 丝袜喷水一区| 男女边吃奶边做爰视频| 内射极品少妇av片p| 午夜福利视频1000在线观看| 免费看a级黄色片| 免费黄网站久久成人精品| 又大又黄又爽视频免费| 亚洲天堂国产精品一区在线| 久久久国产一区二区|