• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Security Solution for Industrial Internet of Things Applications

    2022-08-24 07:03:04AlaaOmranAlmagrabi
    Computers Materials&Continua 2022年8期

    Alaa Omran Almagrabi

    Department of Information Systems,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,Kingdom of Saudi Arabia

    Abstract: The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions (VNFs) involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%.

    Keywords: Industrial internet of things (IIoT);blockchain;trusted third parties;endpoint verification

    1 Introduction

    The Industrial Internet of Things (IIoT) has gained popularity as it enables contemporary industrial operations and applications to increase efficiency and effectiveness[1].The IIoT combines industry and network connection worlds by connecting,controlling,and monitoring everything in industry [2].New business models such as the proactive maintenance that keeps machinery and equipment down to a minimum require further data interchange between manufacturing systems and other types of equipment [3].Because of this continuous digitization,a higher level of networking is essential in industrial facilities and the manufacturing business [4].Smart sensors are linked to systems that enable Industrial Internet of Things (IIoT) applications,using especially low-cost edge node devices [5].The increasing interconnections and equipment increase the attachment area and lead to new safety challenges[6].Due to its potential for quicker and better decision making,the IIoT is significant.The IIoT can provide an insight into the wider supply chain,allowing enterprises to coordinate and achieve further efficiencies.Endpoint authentication is an authentication method used to validate an external or remote network connector[7].This approach guarantees that the network is mainly linked to legitimate or authorized endpoint devices.

    Smartphones,tablets,and servers are included among such gadgets[8].Endpoint security is the technique of safeguarding terminal devices or access points from hostile players and campuses such as PCs,laptops,and mobile devices[9].Security endpoint systems safeguard these endpoints against cybersecurity attacks on a network or in the cloud[10].Endpoint safety has developed from standard antivirus software to provide complete protection against advanced malware and developing zeroday threats [11].Hacktivists,organized crime,and intentional and unintentional insider threats are endangering organizations of all sizes[12].The IIoT can help firms better understand their business operations by delivering incredibly detailed data in real-time.Analyzing data from sensors can make their processes more efficient and offer up new sources of income.The IIoT can provide an insight into the wider supply chain,allowing enterprises to coordinate and achieve further efficiencies.Safety at endpoints is frequently viewed as the forefront of cybersecurity,and the endpoint is one of the top locations in which companies seek to safeguard corporate networks [13].For several reasons,an endpoint platform for protection is important to business cybersecurity [14].Data collection is sometimes the most relevant asset a company has in today’s economic climate and the loss of data or access to such data may jeopardize the entire organization [15].These include direct sales,subscriptions,premiums,and the franchise.Depending on the business,one of these income-generating strategies is likely to be the most appropriate approach to manage the organization.Companies have never had to face such an increasing number of endpoints [16].Endpoint safety is a practice where endpoints or entry points of end-user products such as desktops,laptops,and mobile devices are secured from malicious actors or campaigns.Today’s endpoint protection solutions are designed swiftly to identify,analyze,block,and contain ongoing assaults.This makes it harder for business safety by distant operational and network rules,progressively making perimeter protection insufficient and creating vulnerabilities[17].Add to the cost of redistributing resources from company objectives to address risks,the cost of a major reputation infringement,and the actual financial impact of compliance violations and it is easy to see why platforms are considered essential for safeguarding contemporary businesses [18,19].Endpoint security management is the policy that is developed to guarantee the safety and security of all the endpoint devices in a network[20].It is part of an extensive cybersecurity program,a modern need for small local companies and big multinationals[21].There is limited guidance and management of IoT devices for the life cycle,and limited best practice is available for IoT developers.In addition,the authentication and permission standards for IoT edge devices are lacking.Endpoint security is a technique of protecting the information and workflows of the devices connected to the network[22].The EPP works by looking at files while entering the networks.Modern EPPs leverage the power of the cloud to maintain a continuously increasing database of information about threats,to unbundle endpoints involved with keeping all this information locally and to maintain them[23].More speed and scalability can sometimes be achieved by accessing this information via the cloud[24].

    The EPP provides a single dashboard that allows cybersecurity professionals to remotely regulate security for each device for system administrators on a network gateway or server.The monitoring of endpoints concerns tracking activity and risk on all the mobile network devices.It represents the process of continual and continuous management of a dynamic range of endpoints in a corporate network.This article introduces the notion that the IIoT based on blockchain technology has been trusted and used in several industries to ensure anonymity.The IIoT is concerned with the IoT branch that specially deals with the production and agriculture industries.It likewise involves linking gadgets and making them considerably more intelligent and available,and on a far larger scale.The end objective in industry is to improve speed and safety to enhance the smooth operation of manufacturing sites at a lower cost.

    1.1 Limitations of the Work

    As a result,blockchain is a guaranteed solution,with a decentralized structure and distributed approach,and is a helpful approach to IIoT situations.The blockchain used is a block chain that tracks and coordinates transactions and stores data for millions of IIoT devices on distributed blocks.However,endpoint security software examines the whole corporate network and may provide visibility for all connected endpoints from a single location.Legacy antivirus solutions depend on the user for manual updating or updating the databases in advance.EPPs offer integrated security,which transfers management duties onto IT companies or cybersecurity staff.An important initial step requires all devices to use an authorized operating system and a virtual private network(VPN).If a device does not comply,access to essential data might be restricted.Users may now remotely manage or even automate security programs to ease the procedure.

    2 Related Works Based on IIoT Secure Authentication

    Xu et al.[25]described the Novel Blockchain Framework (NBF) to edge computing in the IIoT.This report offered a Layered Lightweight Blockchain Framework(LLBF)and implementation method restricted by resources.The framework comprises a resource-restricted blockchain layer and an extended resource layer in the IIoT.A lightweight consensus method and a dynamic trust algorithm are created to enhance blockchain performance and minimize verified transactions in fresh blocks.

    Khan et al.[26]suggested the Blockchain-Based Secure Image Encryption Scheme(BCSIES)for the IIoT.The cryptographic pixel values of a picture are recorded on the blockchain to ensure data privacy and security.Encrypted findings demonstrate that the method presented is very successful in preventing and ensuring data leakage.

    Arachchige et al.[27]explored the PriModChain for industrial IoT systems.This article offered a PriModChain architecture that promotes data confidentiality and confidence via mixing differential privacy,ML,Ethereum blockchain,and intelligent contracts.PriModChain was tested with the help of simulations created in Python using socket programming on a general purpose computer in terms of privacy,security,dependability,security,and resilience.

    FASTEN IIoT for the end-to-end integration of the Industrial Internet of Things was expressed by Costa et al.[28].The aim was to give a flexible,configurable,and open solution to the FASTEN IIoT Platform.The platform works as an interface of 4.0 advanced applications and solutions between the shop floor and the industry.These efforts include administration,provision,optimization,and simulation by harmonizing diverse data source features while fulfilling real-time needs.

    A hinge classification algorithm based on mini-batch gradient descent with an adaptive learning rate and momentum(HCA-MBGDALRM)was described by Yan et al.[29].In contrast to standard neural networks,decision trees,and retrograde logistic measures,the method significantly increases the performance of deep network training.In the shuffle phase,they have solved the data skew problem,and they are implementing a parallel HCA-MBGDALRM framework to increase the processing speed of very large data sets.

    The node degree (N),distance from the cluster (D),residual energy (R),fitness (NDRF),and salp swarm algorithm(SSA)for a secure Industrial Internet of Things was deliberated by Abuhasel et al.[30].The sensor nodes’accuracy is calculated using the SSA.SoftMax’s deep-neuronal network is recommended to minimize latency and overhead communication for IIoT devices.In all cluster head applications,optimal resource planning is dependent on the demand for storage,computation,and bandwidth.

    A cybersecurity framework (CF)-based power system connected for the IIoT was discussed by Jang et al.[31].A suitable cybersecurity directive must thus be developed to allow effective answers to risks posed by cybersecurity due to the misuse of such flaws.Unfortunately,developing an effective cybersecurity guideline for each organization is not straightforward.

    A deep-learning feature extraction based semi-supervised model(DLFE-SSM)for IIoT networks was introduced by Hassan et al.[32].In addition,they presented an adaptive IIoT network for confidential border security utilizing a DLFE-SSM.The technique described requires no manual effort to upgrade the attack databases.The quickly changing nature of unknown attack models may be learned through unmonitored learning and unlabeled wild data.A BlockEdge model is proposed in[33],which combines blockchain and edge computing to address a few of the critical issues faced by the current IIoT networks.The authors validate the possibility of BlockEdge in terms of latency,power consumption,and network usage.In[34],the authors propose a blockchain-based model along with fog computing(FC),which inserts a blockchain with a yet-another-consensus protocol creating a safety structure into FC for storing and transmitting IoT data.

    The main contribution of this paper:

    ?Designing the proposed BCEPP to enhance cybersecurity with secure end-to-end communication.

    ?The proposed method,BCEPP,utilized the virtual network function for optimized network output.

    ?The experiment has been performed based on the proposed BCEPP to achieve a high data transmission rate,packet reception,security,and user satisfaction index.

    The overall paper structure is as follows:Section 1 discusses the importance of endpoint node verification for the IIoT;Section 2 explores the related works based on IIoT secure authentication;Section 3 demonstrates the BCEPP for reducing the network latency;Section 4 presents the results and discussion;and Section 5 concludes the paper.

    3 Blockchain-based Endpoint Protection Platform(BCEPP)

    This paper discusses the Industrial Internet of Things(IIoT)for endpoint authentication.A novel idea,termed the industrial relationship between IIoT devices,will be based in the first part of this paper’s architecture.The model to monitor IIoT nodes in the architecture is suggested in the trust metrics.Compared to the conventional IIoT network design of automotive plants,the simulation results have demonstrated the energy efficiency of our BCEPP architecture.The manufacturing industry concentrates on converting tangible goods,such as raw materials,into final products,while the production process includes non-tangible items.Both procedures aim to develop finished items that are sold for profit by firms.The first part of this paper’s architecture will be built on a unique notion known as the industrial interactions between IIoT devices.In the confidence metrics,the model for monitoring IIoT nodes in the architecture is suggested.The simulation results showed the energy efficiency of our BCEPP architecture compared to the standard IIoT network design of manufacturing plants.The essential distribution and security of IIoT applications in practice involve the intelligent placement of services in physically distinct areas that directly influence latency and an appropriate policy enforcement system that ensures dependability,security,and services security.This article addresses these concerns by presenting a new VNF solution for the IIoT that reduces the overall latency while verifying that network-wide rules such as connection or isolation exist between the endpoints.Networking enables individuals to access opportunities that may not be found alone.The network can give information on what possible employers are searching for and recommendations on developing a network professionally.

    The IIoT infrastructure schemes are shown in Fig.1.Various possible approaches for secured communication and control in the IIoT via a cloud platform or at the leading level around Fig.1 have been suggested.Authors have introduced technology for understanding the IoT,controlling access,downloading,and identifying viruses for data protection.If an assault breaches cloud-based security measures effectively,few documented solutions to assure the safety of a CPS are available.The local safety of a CPS is not responsible operationally for these works.The closest work the author could detect shows that the primary part of the middleware layer is an IoT name resolution service.The technique to detect and minimize safety hazards initially requires specific CPS limits for the IIoT.Workplace safety can be related to both physical and mental security.In both circumstances,it indicates a reasonably safe workplace for all employees and actively avoids insecurity in the workplace.

    Figure 1:IIoT architecture

    Network connection management is then set to these criteria by the CPS.Fig.1 illustrates the position of the heating fan sensor and refrigeration ventilators,as described in the above paragraph,in the IIoT system and external sensor system(the scattered-line box).The microcontroller Raspberry Pi is the feature of every block with a dotted line.The detection of endpoints and reactions,often known as endpoint threat detection and response,is the integrated endpoint security solution,combining continuous monitoring and data gathering in real-time with automated response and analysis capabilities based on rules.The IIoT control system controls cooling and heat supply,as indicated in the above section.The monitoring device identifies all uneven CPS activities.The protocol of the security system provides appropriate web security protocols based on tracking system data.The messaging platform transmits important messages to the users based on the IIoT control system;the IIoT covers industrial applications,including robotics,medical devices,and manufacturing processes with software definition.The IIoT extends beyond regular consumer gadgets and physical IoTassociated internet activities.The last part of the normal surgery is stated in the circumstances that follow.If the target temperature is not stabilized for at least 30 s,the messaging system will produce a message announcing uneven operation on the IIoT gateway.When the temperature within the target environment has not stabilized within 50 s,all network connections with the IIoT gateway are terminated by the protocol frame.

    Figure 2:Mapping network node

    This study provides a method based on edge nodes that examines the network environment from each smart sensor.The example of mapping from a network node device is shown in Fig.2.There are four nodes(M1-M4)in this sample network,and M1 periodically scans the network pseudo-randomly.The first scanning findings of four devices(M1-M4)are shown in the dashed arrows.This first scan will be used as a reference and this network must be kept safe.After then,the network enters a new edge node device(A).The second(dotted)scan finds the expected equipment on the one hand and the new equipment on the other(A).This may suggest an intruder or other activities that cause the network to change maintenance.The following settings can be used for the network scanning and mapping in which the connections of the hosts are analyzed.The following classes include the standard port scan techniques and extra possibilities.These groups are divided into two classes.Activated hosts in the network can be discovered with an internet control message protocol (ICMP) ping sweep.SYN detects and connects scanning of open ports and services.The detection of redirection might utilize time.The approaches provided here incorporate these as a safety component for devices with IIoT edge nodes.No network scanner for low-power MCUs is currently available to the best knowledge of the authors.

    Figure 3:IIoT blockchain-based architecture

    The preceding section presented an IIoT blockchain-based architecture that considers the importance of the IIoT network to provide confidence and privacy.There are several advantages to the IIoT,as shown in Fig.3.Predictive maintenance is one of the primary advantages of the IIoT,using sensors that can anticipate machine faults in real-time from the IIoT.It moreover leads to better on-site servicing by helping to spot possible equipment problems.Asset management,customer satisfaction,and facility management are all of the IIoT’s benefits,and all this is achievable provided the network runs without any problems.There can be confidence and privacy problems via the suggested design of the blockchain.In this section,various key blockchain architecture applications in the IIoT will be highlighted.Industrial automation can be revolutionized by blockchain technology.Blockchain can combine a large number of digital ledgers stored in various locations and process them as blocks.This results in improved governance of transactions.Process automation as well as transparency may be achieved by integrating technology and automating business operations.This might prove fabrication,as any transactions that follow depend on confirmation of the preceding transactions.Many factories are developing intelligent robotics systems.Intelligent robotics is concerned with the correct and efficient use of tools and resources.Smart robotic arms can be used to specify precise requirements.The design of the blockchain can make sure data are safe in intelligent robots.The smart robot can use sensor data directly for decision making without human intervention.The blockchain architecture cannot be responsible for data securement.It is important to protect the industrial process and ensure that AI choices are visible and traceable.The secure exchange of information within and outside the industrial walls is one of the major issues facing businesses.Blockchain technology may play a major role in IIoT manufacturing when it comes to data security and privacy.The technique is useful when there is no trust between parties needing to collect,store,and communicate vital information securely.Innovative business models may be developed using blockchain and production boundaries can be extended beyond standard plants.This would result in improved supply chain efficiency.It can lead to greater order precision,product quality,and tracking.This would ensure that producers can fulfill delivery deadlines,increase the quality of the products,and sell more.The intelligent grids are simply electric networks,which operate and implement energy measures.Smart grids are subject to many security vulnerabilities because of interconnection,data sharing,authorization,and blockchain technology.Their safety is essential because of automation and remote access.Blockchain can help prevent unauthorized access to power systems and harmful assaults.Intelligent cities are based on data and technology,improving the quality factor for living standards and improving sustainability and economic development.Since the intelligent city has many components,blockchain is individually applicable.Blockchain-technology-based remote employee payment solutions can help securely transfer funding to anybody without incurring additional transaction fees for third parties.Blockchain technology with the assistance of intelligent contracts for diverse tasks may define a better governance scenario.In addition,it provides support for digital signatures in place of a conventional password-based method for managing and tracing digital identities.This can help improve the management of the supply chain.Moreover,greater transparency may be introduced between manufacturers and customers.Due to its decentralized ledger,it may store personal user data in different businesses about healthcare and banking.It would exclude any manipulation of data.To allow improved trash management,blockchain may be interfaced with smart and AI sensors.All papers and transactions must be transparent for the logistics sector.This can be addressed by blockchain technology and eventually enhance the supply chain’s productive route.Blockchain technology can help to resolve inefficiencies in logistics by supervising the process of transferring products from start to finish in the supply chain or logistical business.Blockchains are suitable for streamlining complicated and fragmented procedures frequently seen within the supply chain and logistics business.Blockchain technology can monitor transactions,track assets,and establish a system of transparency to manage all sorts of key documents.Blockchain technology can be incorporated with its digital business transactions in vehicles.In various instances,it can be utilized.It can provide improved interconnection using smart sensors to avoid vehicle involvement and drive smoothly away from incoming traffic without breaking.This can lead to quick transactions on the road,such as ewallets,and will simplify these transactions and protect information.Everything that might be handled can be done so securely and effectively via blockchain.Insurance agencies may utilize blockchain.Payments can thus be issued if the sensors of the vehicle identify a contravention.Due to blockchain information stored in the number of accessible servers,it may be hard to achieve illegal access to data on such systems.Electric power networks face safety challenges and blockchain might be one of the most effective methods to respond.Blockchain technology is sufficient to turn the intelligent grid into a peer-to-peer trade network.In addition,grid balancing through dispersed energy resources is sufficiently effective.The wholesale market,in particular,establishes the energy price based on client demand and the necessary quantity.Blockchain technology,in particular for electricity,enables storing and exchanging for sustainability.Transforming migration services from the public chain to business logic would need blockchain technology amalgamation and virtualization.Over the years,several designs and business requirements have emerged in virtualization logic.Enterprise virtual machines deal with performance,scalability,verification,upgradable intelligent contracts,and confidentiality regulations that are mostly achievable with blockchain technology.The future of industry-ready VMs may be blockchain technology coupled with virtual machines.

    3.1 Virtual Network Function

    The proposed method has Boolean input variablesXiandYj,ito formally address the VNE problem that takes the actual value when the substratum nodemtiis used and when VNFmujis hosted at the substratum nodemti.The latter predicate is referred to asmuj↑mti.A service request is mapped to two functions:Nm,which maps the service request to substitute nodes meeting their resource needs,andNf,which maps endpoints.This is the mapping of the services request.The following can be defined explicitly asNm.For all,mu∈Mu.

    Eq.(1)determines the mapping function,subject tomt∈Mt,andmu↑mt,and for everyisuch thatmti∈mt.

    The storage requirement has been calculated in Eq.(2).It assumes that the actual value ofYj,iandXiis the false value of 0.Eq.(2)stipulates that all storage necessary for VNFs allotted to a substrate node must be lower or equal to the available storage in that node.Here it is assumed that VNFs from the same service application may use the same node of substrates used to minimize latency on NFV systems.

    In light of this formalization,the following phrases have been developed to representNm.First of all,this paper incorporates disparities as hard clauses(2).The BCEPP has to explain in addition to these inequalities thatNmis a function and that each VNF is mapped to precisely one node.The restriction stated in the following equation is for any occurrence thatMju∈MU

    The virtual network function is expressed in Eq.(3).To appropriately link variableXiwith variablesYj,i,the proposed method adds the implications for eachithatmtiisMt,

    Eq.(4) calculates and discusses the bind variable.At least one VNF is deployed in this node while thef0usubstratum is in use.The endpoint VNFf murouting table is drawn up as a soft clause with the negative shape of the delay in the connection being weighted.This reduces the total latency of the chosen infrastructure path in the MaxSAT solver to a minimumf0t.As the position off0uis set to 0,the following soft constraint is generated for every potential substratum nodemtl,which may be allocated to(near VNF neighbor in SG).

    The routing tables have been described in Eq.(5),where a soft clausedwith weightzis specified by notationsoft(d,z).In reality,the endpoint VNF routing table sets out to which node,L,of a packet is sent dependent on the next VNF assignment in the SG.

    The remainingVNF muj∈Mvin the SG,withj>0,have identical soft-clause provisions:

    Identical soft-clause provisions have been evaluated in Eq.(6).When VNFjforwards the packets in the neighboringVNFadjchart via linkKi,l,the Boolean variablesYj,iandYadj,lthat indicate where VNFs are located must be true.If the same substrate node has two VNFsi=land alatency0,the set is appended with a soft clause equal to zero weight.

    VNF settings allow us to simulate a fixed processing time for each VNF.This is the latency(mu) function that may be used to calculate the overall latency to incorporate the processing delay in the supplied VNF.If the BCEPP has a general end-to-end latency upper bond with an extra hard constraint,the system must guarantee that.

    As many services as feasible should be mapped to the substratum network,using substrate network resources efficiently from the network infrastructure perspective.In the industrial context,too,the propagation of connections between endpoints is normally minimized.Consequently,our method has two objectives:to decrease the quantity and the latency of substrates in use.

    The soft provisions with route predicates reduce the latency of the solver.Add an extra soft clause for each substratum node ns to decrease the number of substratum nodes usingmti∈mt:

    Eq.(7) estimates a soft clause for each substrate node,whereLis determined based on the prioritization of latency minimization,a smallerL,or several substratum nodes in use depreciation,a biggerL.To reduce the penalty for incorrect provisions in the current model,the MaxSAT solver seeks to assign fake values to the Boolean variableXj,decreasing the number of nodes in use.

    3.2 Probability Occurrence

    The likelihood of a mistake in the door test is a maximum ofTthenNenvironment is perfectly simulated untilNhas made a statickey reveal().TsetstoIf each door test is a correct the public keyat least 1/m(ε),whereis an honest entity andNqueriesg1(*,a1,a2)before a static key disclosure to the public keyThe chance of success ofTis as follows:

    whereQ1(ε)is the probability of occurrence.

    The probability of error occurrence has been estimated in Eq.(8).If M wins,the forgery attackg2must be requested to resolve the elliptic-curve Diffie-Hellman(ECDH)problem,whereasTmay solve the problem.It must evaluate ifNcan differentiate between actual settings and simulations.If it can discriminate between them,users must make aG1query ofPublic key encryption is used to encode and decode data using a pair of keys to guard against unwanted access or use.The certifying authorities will give users public and private key pairs.If additional users desire to encrypt data,a general directory provides the intended receiver with the public key.Since it is a current meeting,Ndoes not query the private short-and long-term keys of(or)concurrently.Nwill not search whenNrequests the short-range private key (or) through static key reveal (.).It is unable to obtain information (or),because (or) is utilized in one session,without a static key reveal (.) query.The chance of success forTis as follows:

    whereQ2(ε)is the probability of occurrence.

    Session two probability occurrence is evaluated in Eq.(9).Because of freshness,Ndoes not perform a static key reveal()query and cannot simultaneously query the private long-term key and short-term private key.At that momentNcan differentiate between the actual atmosphere,i.e.,asearch and aQcheck,and the simulated environment.This occurrence is probable.is the probability for this event.The likelihood of the success of S is the following:

    whereQ3(ε)is the probability of the occurrence.The probability of success in session three has been described in Eq.(10).

    3.3 Trust Model

    To assess their membersSn,the IIoT server provides all required information to everyDKi.DKiis based on the three performance measures known as cooperation,direct honesty,and indirect honesty,essential for updating the confidence meter.With an initial trust metric,each node integrates the network.In the interval [0,1]the valuesSnandS0vary.As seen in the transition diagram in Fig.2,the Tm of a monitored node will rise,drop,remain steady,or descend to zero.The transitions rely on three confidence performance measurements and the present condition of theNMjnode monitored.

    The proposed method utilizes a state transition diagram inF+1 states as illustrated in Fig.4 to officially transitionSn.Each state matches a certain value ofSn.State 0 matches a degree of non-trust and StateFmatches a high level of trust.The interval[0,1]ofSnis divided intoF+1 states.Each is a step (1 modφ=0).The transition matrix that corresponds to our suggested approach’s state transitional diagram is as follows:

    As shown in Eq.(11),the transition matrix has been performed.WhenQj,iis likely to go from Statejto Statei,it is as follows:

    The probability of the transition state has been deliberated in Eq.(12).The altered variableXtis the actual IIoT device’sSnat timet.The chance for being in Statejat timetmay be determined as follows from the transition matrix stated in Eq.(9),provided that the starting node status isX0=1:

    The probability has been described in Eq.(13).DCutilizes information from the IIoT server to create three performance metrics that describe the behavior of the monitoredNMjnodes with time to assess different transitional probabilities,allowing the update ofsW,Zmember nodes.

    The rate of collaboration assesses the behavior of the monitoredNMjin connection with its network cooperation.TheDNMjcooperation rate is the number of successful messages delivered divided by the NF total of messages transmitted by theNMjcooperation rate.TheNMjnode cooperation rate is determined as follows:

    The collaboration rate has been estimated in Eq.(14),whereDnjequals 1 if the message mi is transmitted properly or 0 when the messageMjis not transmitted.The likelihood of theNMjworking on the network is as follows:

    Figure 4:Transition diagram

    The wireless network constraints have been formulated in Eq.(15),whereQMFSreflects the limitations of the nature of wireless networks:congestion,retransmission,barriers,and connection quality between the transmitter and the receiver.Each environment is supposed to have a well-knownQMFSof probability measured by the number of transmissions and by the number of incorrect bits.The aim of introducing this probability is to take the limitations of the monitoring environment into account in the final trust assessment.

    The straightforward honesty assesses the compatibility with and profiling of the actions done in the network by theNMjnode.The node that monitors a production machine to transmit reports to the production system each hour is regarded as a dishonest node;when carrying out this duty every four hours,the source of this behavior needs to be separated from the network.This kind of harmful action and behavioral modification caused by MNI nodes can be detected in direct honesty.

    A set of hashed activities that theNMjnode must execute in the network will be sent toDKj,a node in listIn the IIoT server and theDKjnode,the hashes contained in listare saved.The activities are delivered in a hatched manner toDKjnodes to guarantee that data leakage is not exposed in the case ofDKjpenetration,due to the likely interception of monitoring messages by hostile nodes.To evaluate theCNMjdirect honesty rate of anNMjnode,theDKjcalculates a similarity ratio for the set of hashes included in bothlists:

    As shown in Eq.(16)the similarity ratio has been derived.Qchis likely to be honest with theNMjnode monitored and is computed as follows:

    The monitored probability has been evaluated in Eq.(17).Thelist consists of theNMjnode hashed feeds.To execute comparisons,the hashes are produced via theNMjnode and are transmitted to theDKjnode.After the comparisons,theDKjnode automatically removes the set of hashing included in thelist to minimize the memory space.The indirect rate of honesty reflects the MNi’s reputation in its community.The community nodes that have already experiencedNMjhave to be assigned a score based on their conduct in the network.The nodes that offer excessive scores(either too big or too little)over the other nodes are malicious,which aim to carry out voting assaults or mistreatment.DKjcontacts its nodes to comment on theNMjnode.The list of nodes that create spam will be sent to the IIoT server for punishment.As an average of the scores supplied by community members when removing spam,DKjdetermines the indirect honesty rate of nodeNMj:

    As shown in Eq.(18),the average score has been determined.InONMj,NMjis the reputation of member nodeNMj,forNMj,NMj≠NMj,.NMjdoes not offer a score to prevent assaults on itself.Mis the total number of nodes after the spam nodes have been deleted.The likelihood of a positive reputation for the monitoredNMjnode is determined as follows:

    Positive reputation has been explored in Eq.(19).To achieve the transitional matrixQof Eq.(19),the probability of stayQj,j+1(s),the probability of remain in the trusted stateF,QF,F(s),and the probability of transition into Stateo,Qj,0(s)is calculated byDKjin the same way,as in our earlier work(s).The state transition diagram in Fig.2,which shows that the trust status of anNMjnode will be known in times-1,shows that the state has five options only:State+1,State1 remains the same,reaching a trustedState ForState0.

    Each probability is determined using an equation in StateSn(11).Ats,Snof a monitoredNMjis the trust value corresponding to the condition in which the probability computed by Eq.(11)is at its highest level.Each state is equivalent to a specific value ofSn;Stateois equivalent toSn=0 and StateFtoSn=1.

    Fig.5 explores the proposed BCEPP.The paper analyzes the typical IIoT scenario consisting of a Key Generation Center(KGC)cloud-string,providing the storage of IIoT users,data proprietors,and generally not data proprietors,magenta and IIoT sensors.The following four companies are the enhanced IIoT community leader scheme.The KGC creates public and partial-private key (PPK)system parameters for cloud servers and users’data owners.The server of the cloud is accountable for user owners’data processing.It then connects with users to transmit and calculate data.The data owner generates a certificate-free signature scheme with its own private signing key produced using KGC’s partial-private key.For signature verification,the appropriate public key will be given to the data user.On the cloud server,the CLS data are saved and hence the data user may be checked.The data user obtains their KGC PPK and the public key for verifying a CLS system from the information owner.They can produce their private key and its equivalent public key with their partial-private key.Its communication flows can be signed with the cloud for authentication.As a network administrator,users of KGC are first required to be registered for the proposed IIoT system.

    Figure 5:Proposed BCEPP

    KGC makes public parameters and partial-private key publications and publishes them;users transmit their identity and partial-private keys to the KGC for registration.Data owners and data consumers then establish and utilize their private signing keys to generate community leaders of IIoT data.The users’keys are saved on intelligent IIoT devices.Data from the IIoT sensor are stored on the cloud server and collected,signed,and retained as CLS data by the data owner.Finally,data consumers can obtain stored IIoT cloud data and verify them using the public key of the data proprietor.The internet security of IoT devices and the networks with which they are associated is the securing act.IoT devices in the business environment include industrial machinery,smart energy grids,construction automation,and personal IoT devices that employees use.This then suggests an entirely new CLS that provides comprehensive security safety with the standard security model against all identified threats and complete security proof(without random oracles).Currently,it redefines industries such as energy,manufacturing,transport,and healthcare.This new wave is the Industrial Internet of Things(IIoT):an Internet of things,machines,computers,and people that enables intelligent industrial operations to achieve transformative business results utilizing advanced data analytics.

    As mentioned above,this paper intends to modify the existing IIoT network design in the car industry to simplify confidence administration.The IIoT network will thus be subdivided into clusters known as industrial communities,as shown in Fig.6.It consists ofLcommunity leaders andKnodes of members.Let the groupsDKiandNMibe the nodes of the community.Community leaderDKiadministers the Tm trust in its community with each member nodeNMiin three performance measures:collaboration,honesty,and indirect honesty.DKis a particular node that requires high confidence,sufficient processing capacity,storage,and energy resources to execute surveillance duties.A request must be sent to the IIoT server to any node that wishes to join the network.A single identifier is assigned to the nodes and a profile is created for the IIoT server.The profile is saved to the IIoT node and the IIoT server databases.It sets forth the activities that the IIoT node may carry out and the measurements,operations,and data that each node in the network can exchange.It specifies the sorts of industrial connections between two nodes.Every node may create,update,or end any relationship with a different node based on these defined rules.To be authorized,any node that wishes to be aDKmust interact with the server.According to several criteria described in Phase I below,the server provides the authorization to lead a certain node or not.When a node becomes aDKits community will be established.TheDKwill either give the server the monitoring findings or gather the necessary data to assess theSnof its members.The first step involves the multi-parametric identification ofDK.The second step creates,based on the geographical distances and industrial linkages,industrial communities surrounding the designatedDK.The last step is the monitoring procedure in which theDKinode monitors the confidence metricSnof its communities to detect suspicious behaviors.The proposed BCEPP method has a high computational cost,a low latency ratio,an increased data transmitting rate,and an enhanced security rate,packet reception ratio,user satisfaction index,and probability ratio.

    Figure 6:IIoT data communication

    4 Results and Discussion

    In the industrial situation,these blockchain technologies may be used to build a network functional chain guaranteed by latency,jitter,loss of packets,and redundancy,with tight latency and reliability requirements for important events.In addition,network virtualization real-time monitoring techniques assist in mitigating important occurrences,which may be tested by changing the service diagram and enforcing new network regulations.IIoT applications require an intelligent positioning of services across physically isolated sites,directly affecting latency,and a proper policy enforcement mechanism to ensure dependability,security,and safety.This study takes these factors into account by offering a VNF placement solution for the IIoT to minimize overall latency and,in addition,to verify that policies throughout the network,such as connection or isolation,are maintained across these endpoints.

    4.1 Probability Ratio

    Considering the network topology and security vulnerabilities,the likelihood of choosing distinct security flaws as attack entry points has been analyzed.An analysis has been carried out on the assault and defense strategy,for this is the basis of the security model.By solving the security model,probable attack nodes in the next phase may be anticipated.Finally,by evaluating the importance of various vulnerabilities to security,the safety level of the power network vulnerabilities may be assessed and evaluated.The likelihood is high that hostile attackers will target them.The protocol can be extended to ensure long-term sustainability and the availability of encryption.The suggested protocol is based on the study of probability,which ensures that the system designer has a common key among all IoT devices in predefined likelihood.The execution demonstrates the viability of our proposed IoT network security protocol.Tab.1 shows the probability ratio.

    Table 1:Probability ratio

    4.2 Latency Ratio

    This article offers the common NFV and SDN-enabled IIoT network service model for optimization and verification.This allows us to monitor network service transmission behavior and ensure optimum latency positioning in the network architecture.The encoded model is given to a solver as an input.Network features are optimally positioned in the infrastructure network as an output if the included VNFs meet the network features.The result ensures minimum cost for the end-to-end service,including latency issues and network latency.The findings shown reflect latency reduction issue calculations under different situations,reductions in the number of substratum nodes in use and reductions in network latency.Tab.2 expresses the latency ratio.

    Table 2:Latency ratio

    4.3 Data Transmission Rate

    When the customer receives the request,the node will not execute a transaction but will put it together and pass it on to the check node.The member services administration module issues certificates,transactions,transmissions,and encryption keys in the blockchain.The system uses the participation technique immediately.The data collection and consensus modules are employed to manage power nodes for the sharing method.During the transaction process,these lead to achieving the broken book.In these cases,if the transaction information is altered,the rogue node should occupy numerous computer resources.Compared to unlawful collusion attacks,the proposed technique performs better.Therefore,the suggested system can enhance the packet receipt and transmission rate if significant warning information is found in the blockchain-based network.Fig.7 depicts the data transmission rate.

    Figure 7:Data transmission rate

    4.4 Packet Reception Rate

    Illegal attackers may acquire information from power users using system vulnerabilities in the energy-based blockchain network to transfer data.This impacts the confidentiality of data and the stability of the network throughout the whole network.The experimental findings are displayed in Fig.8.The recommended secure data transmission system based on blockchains provides a mechanism for data exchange.Because of the decentration communication technique,the system will not communicate data to other power nodes.In blockchain networks,data transmission delays check the security and the reliability of the transfer of data.The results reveal that the technique calculates the blockhead hash value by changing the random integer in the blockhead of the power node.In this instance,if the malicious node wants to manipulate transaction data,it should use many calculation resources.

    Figure 8:Packet reception rate

    In comparison to unlawful collusion attacks,the proposed technique performs better.Consequently,the suggested regime may enhance packet reception and transmission speeds when significant warning information is available in the blockchain-based network.Fig.8 demonstrates the packet reception rate.

    4.5 Computational Costs

    The calculation costs of the various data packets are assessed in this section.The outcome is shown in Fig.9.The computational costs of the proposed system are low because of the usage of the decentration-based secure transmission model with the increase of transmitted and received data packages.The overhead communication of data transmission is minimized efficiently.Compared to the suggested method,the overall performance is superior.Enabling dynamic power node add-ons by initiating data transactions across nodes offers a very efficient and trustworthy data consensus process.The safety consensus approach works at the price of additional computation resources.The consensus time in the data transfer can be shortened by adding the additional node dynamically.The proposed approach is appropriate for a network based on a blockchain system.The compatibility of the running system should be increased further.Fig.9 shows the computational costs.

    Figure 9:Computational costs

    4.6 Security Rate

    The experiments indicate that the technique for data consensus decreases system costs significantly.The spread of malicious applications in the industrial blockchain network is regulated.By addressing the security model,the suggested system creates an optimal control strategy.The method provides a mechanism for data consensus that can increase the data transfer success rate.The consensus method can dynamically pick a security approach when the malicious software stores the total power nodes.Fig.10 shows the security rate.

    Figure 10:Security rate

    4.7 User Satisfaction Index

    For the classification of the fog resources,the encryption is carried out and the resource size required is determined.The user requirements can be split into many classes.Provided they are available,relevant resources are identified and adapted to user demands.Because users have various resource needs,the computer,bandwidth,and storage requirements are combined.The system includes all three sorts of conditions with different resources,measures user and resource needs,and awards the user the maximum score.Fig.11 illustrates the user satisfaction index.

    Figure 11:The user satisfaction index

    Eq.(20) and Fig.11 show the user satisfaction index.Vtis calculated to examine the essence of resource planning.In contrast,the satisfaction index of the user is determined byTcom,Ta,andTt,which reflect the demands,storage,and attributes of the bandwidth of the job.In addition,gcom,ga,andgtindicate the computer,bandwidth,and storage characteristics.The coefficients of the characteristics areδ,γ,andσ.The above-proposed BCEPP-based analysis shows the high computational cost,low latency ratio,increased data transmitting rate,enhanced security rate,packet reception ratio,user satisfaction index,and probability ratio when compared to the Blockchain-Based Secure Image Encryption Scheme (BCSIES),node degree (N),distance from the cluster (D),residual energy (R),fitness(NDRF),salp swarm algorithm(SSA),deep-learning feature extraction based semi-supervised model(DLFE-SSM),cybersecurity framework(CF),and other methods.

    5 Conclusion and Future Scope

    These technologies may be employed in the industrial environment to construct the delay,vibration,data loss,and redundancy networks guaranteed to ensure that key events demand strict latency and dependability.Furthermore,real-time network virtualization approaches help minimize significant events,which may be evaluated by altering the service design and applying new network rules.In reality,IIoT applications require a clever positioning of services across physical isolation locations that directly impact latency and an appropriate policy enforcement mechanism to guarantee service safety,reliability,and security.To reduce overall latency and ensure that policies such as the link or isolation throughout the network are maintained across those endpoints,the survey considers these aspects by giving a VNF placement solution for the IIoT.Thus,the experimental results show our proposed BCEPP method to have the following:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research &Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number IFPHI-218-611-2020.”and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.

    Funding Statement:The authors received funding as stated in the acknowledgment.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜a级毛片| av在线天堂中文字幕| 久久6这里有精品| 人妻少妇偷人精品九色| 窝窝影院91人妻| 一区二区三区激情视频| 国产精品,欧美在线| 欧美zozozo另类| 亚洲欧美激情综合另类| 99热精品在线国产| 成人永久免费在线观看视频| 免费观看精品视频网站| 亚洲av第一区精品v没综合| 变态另类丝袜制服| 88av欧美| 18禁在线播放成人免费| 欧美一区二区亚洲| 午夜福利在线观看吧| 亚洲欧美清纯卡通| 久久午夜福利片| 精品欧美国产一区二区三| 免费看av在线观看网站| 亚洲精品乱码久久久v下载方式| 中文字幕精品亚洲无线码一区| 最近在线观看免费完整版| 午夜福利成人在线免费观看| 一个人看的www免费观看视频| 少妇人妻一区二区三区视频| 久久久久久久精品吃奶| 高清在线国产一区| 亚洲国产高清在线一区二区三| 九九久久精品国产亚洲av麻豆| 69人妻影院| 久久久国产成人精品二区| netflix在线观看网站| 成人av一区二区三区在线看| 日韩强制内射视频| 亚洲人与动物交配视频| 欧美日韩国产亚洲二区| 久久精品国产自在天天线| 一夜夜www| 99热这里只有是精品在线观看| 赤兔流量卡办理| 国产一级毛片七仙女欲春2| 国产私拍福利视频在线观看| 日韩亚洲欧美综合| 国产在线男女| 色在线成人网| 免费人成视频x8x8入口观看| 亚洲天堂国产精品一区在线| 免费av不卡在线播放| 老熟妇仑乱视频hdxx| 日韩一本色道免费dvd| 午夜福利高清视频| 91久久精品电影网| 波野结衣二区三区在线| 亚洲美女搞黄在线观看 | 女同久久另类99精品国产91| 免费看光身美女| av天堂中文字幕网| 不卡一级毛片| 男女啪啪激烈高潮av片| 免费av毛片视频| 一级毛片久久久久久久久女| 97热精品久久久久久| 可以在线观看的亚洲视频| 国产v大片淫在线免费观看| 国产精品电影一区二区三区| 国产精品一区二区三区四区免费观看 | 国产一区二区三区在线臀色熟女| 亚洲性夜色夜夜综合| 久久6这里有精品| 久9热在线精品视频| 日本撒尿小便嘘嘘汇集6| 久久精品国产鲁丝片午夜精品 | 精品久久久久久久久av| 国产一级毛片七仙女欲春2| 国产高清三级在线| a级毛片a级免费在线| 亚洲国产精品久久男人天堂| 亚洲av电影不卡..在线观看| 国产精品电影一区二区三区| 少妇高潮的动态图| 亚洲人成网站在线播| 毛片一级片免费看久久久久 | 亚洲精品国产成人久久av| 嫩草影院精品99| 欧美黑人巨大hd| 女人十人毛片免费观看3o分钟| 最近在线观看免费完整版| 成年人黄色毛片网站| 国产视频内射| 91麻豆av在线| 一级av片app| bbb黄色大片| 亚洲va在线va天堂va国产| 久久久国产成人精品二区| 国产av麻豆久久久久久久| 日韩精品中文字幕看吧| 真实男女啪啪啪动态图| 啦啦啦韩国在线观看视频| av专区在线播放| 在线播放国产精品三级| 亚洲三级黄色毛片| 欧美色欧美亚洲另类二区| 美女xxoo啪啪120秒动态图| 此物有八面人人有两片| 真人做人爱边吃奶动态| 麻豆国产av国片精品| 欧美精品国产亚洲| 国产午夜福利久久久久久| 黄色欧美视频在线观看| 久久久色成人| 国产精品三级大全| 亚洲av中文av极速乱 | 3wmmmm亚洲av在线观看| 色综合色国产| 校园春色视频在线观看| 久久6这里有精品| 亚洲美女视频黄频| 国产高清不卡午夜福利| 一本精品99久久精品77| 亚洲va在线va天堂va国产| 欧美精品国产亚洲| 亚洲 国产 在线| 国产精品不卡视频一区二区| 国产69精品久久久久777片| 日韩欧美免费精品| 欧美日韩精品成人综合77777| 国产黄片美女视频| 午夜久久久久精精品| 毛片女人毛片| 久久久久久久午夜电影| 精品人妻1区二区| 老司机深夜福利视频在线观看| 国产v大片淫在线免费观看| 夜夜爽天天搞| 国产精品久久久久久精品电影| 动漫黄色视频在线观看| 99久久精品一区二区三区| 午夜激情欧美在线| 日本爱情动作片www.在线观看 | 婷婷六月久久综合丁香| 99久久久亚洲精品蜜臀av| 伦精品一区二区三区| 午夜福利成人在线免费观看| 97热精品久久久久久| 亚洲精品粉嫩美女一区| 精品人妻1区二区| 伦理电影大哥的女人| 国产大屁股一区二区在线视频| 日韩亚洲欧美综合| 舔av片在线| 亚洲美女视频黄频| 国产免费一级a男人的天堂| 国产亚洲精品av在线| 亚洲人成网站在线播| 久久九九热精品免费| 嫩草影院精品99| 热99在线观看视频| 啦啦啦观看免费观看视频高清| 欧美成人a在线观看| 欧美bdsm另类| 欧美三级亚洲精品| 中文字幕久久专区| 非洲黑人性xxxx精品又粗又长| 中文字幕熟女人妻在线| 国产主播在线观看一区二区| 国内精品美女久久久久久| 色综合婷婷激情| 婷婷丁香在线五月| 久久久色成人| 免费大片18禁| 91麻豆精品激情在线观看国产| 22中文网久久字幕| 久久久久国产精品人妻aⅴ院| 日本一本二区三区精品| 久久精品国产亚洲网站| 天天躁日日操中文字幕| 床上黄色一级片| 18禁黄网站禁片免费观看直播| 亚洲国产高清在线一区二区三| 免费av观看视频| 午夜久久久久精精品| 99热这里只有是精品在线观看| 国产 一区 欧美 日韩| 国产视频内射| 性色avwww在线观看| 日本欧美国产在线视频| 亚洲久久久久久中文字幕| 国产精品电影一区二区三区| 婷婷精品国产亚洲av| 国产真实伦视频高清在线观看 | 蜜桃亚洲精品一区二区三区| 国产色婷婷99| 中文字幕人妻熟人妻熟丝袜美| 久久久久久久久久成人| 身体一侧抽搐| 国产不卡一卡二| 91麻豆精品激情在线观看国产| 九色成人免费人妻av| 嫩草影院新地址| 美女 人体艺术 gogo| 老司机福利观看| 亚洲性久久影院| av中文乱码字幕在线| 久久久久久国产a免费观看| 亚洲熟妇中文字幕五十中出| 国产欧美日韩一区二区精品| 久久国产精品人妻蜜桃| 欧美区成人在线视频| 国产私拍福利视频在线观看| 日韩欧美精品免费久久| 乱码一卡2卡4卡精品| 国产视频一区二区在线看| www.色视频.com| 国产精品久久视频播放| 亚洲精品乱码久久久v下载方式| 精品人妻偷拍中文字幕| 少妇猛男粗大的猛烈进出视频 | 国产成人av教育| 欧美最新免费一区二区三区| 超碰av人人做人人爽久久| 国产综合懂色| 欧美bdsm另类| 欧美3d第一页| 日韩中文字幕欧美一区二区| 69av精品久久久久久| 欧美潮喷喷水| 国产免费av片在线观看野外av| 在线免费观看不下载黄p国产 | 人妻少妇偷人精品九色| 日本黄色视频三级网站网址| 亚洲aⅴ乱码一区二区在线播放| 日韩大尺度精品在线看网址| 国产不卡一卡二| 日韩 亚洲 欧美在线| 看十八女毛片水多多多| 国产精品爽爽va在线观看网站| 久久精品国产亚洲av天美| 人人妻,人人澡人人爽秒播| 桃红色精品国产亚洲av| 欧美激情久久久久久爽电影| 最近视频中文字幕2019在线8| 九色国产91popny在线| 村上凉子中文字幕在线| 非洲黑人性xxxx精品又粗又长| 九九在线视频观看精品| 性插视频无遮挡在线免费观看| 人人妻人人看人人澡| 免费电影在线观看免费观看| 别揉我奶头 嗯啊视频| 亚洲精品一区av在线观看| 久久九九热精品免费| 国产精品国产高清国产av| 久久久久久大精品| 真实男女啪啪啪动态图| 亚洲综合色惰| 99热这里只有精品一区| 亚洲真实伦在线观看| 免费观看的影片在线观看| 人妻制服诱惑在线中文字幕| 国产精品女同一区二区软件 | 少妇裸体淫交视频免费看高清| 免费观看精品视频网站| 美女高潮喷水抽搐中文字幕| 特大巨黑吊av在线直播| 自拍偷自拍亚洲精品老妇| 麻豆国产av国片精品| 国产精品98久久久久久宅男小说| 一夜夜www| 午夜免费男女啪啪视频观看 | 麻豆国产av国片精品| .国产精品久久| 欧美性感艳星| 在线国产一区二区在线| 精品久久久久久久久av| 最近最新中文字幕大全电影3| 无遮挡黄片免费观看| 亚洲成人久久爱视频| 成人特级黄色片久久久久久久| а√天堂www在线а√下载| 波多野结衣巨乳人妻| 深夜精品福利| 国产 一区 欧美 日韩| 色噜噜av男人的天堂激情| 欧美色欧美亚洲另类二区| 悠悠久久av| 一区二区三区免费毛片| 亚洲,欧美,日韩| 欧美日韩中文字幕国产精品一区二区三区| 国内精品久久久久精免费| 成熟少妇高潮喷水视频| 亚洲国产精品sss在线观看| 一进一出抽搐动态| 国产乱人视频| 成人性生交大片免费视频hd| 国产高潮美女av| 久久午夜福利片| 天天一区二区日本电影三级| 极品教师在线免费播放| 中文资源天堂在线| 美女xxoo啪啪120秒动态图| a级一级毛片免费在线观看| 女人十人毛片免费观看3o分钟| 亚洲成av人片在线播放无| 亚洲av成人av| 精品一区二区三区av网在线观看| 我的女老师完整版在线观看| 99热这里只有精品一区| 午夜a级毛片| 国产精品伦人一区二区| 亚洲成人精品中文字幕电影| 两人在一起打扑克的视频| 欧美一区二区精品小视频在线| 性插视频无遮挡在线免费观看| 亚洲最大成人中文| 男女之事视频高清在线观看| 国产免费男女视频| 亚洲av第一区精品v没综合| 日韩在线高清观看一区二区三区 | 直男gayav资源| 五月伊人婷婷丁香| 极品教师在线视频| 精华霜和精华液先用哪个| 在线看三级毛片| 大型黄色视频在线免费观看| 麻豆成人午夜福利视频| 成人毛片a级毛片在线播放| 成年人黄色毛片网站| 久久香蕉精品热| 嫩草影院入口| 麻豆成人av在线观看| 亚洲欧美日韩卡通动漫| 天天一区二区日本电影三级| 亚洲欧美日韩卡通动漫| 国产乱人伦免费视频| а√天堂www在线а√下载| 国产精品亚洲美女久久久| 国产精品自产拍在线观看55亚洲| 欧美高清成人免费视频www| 久久精品综合一区二区三区| 少妇的逼水好多| 色哟哟·www| 国产色婷婷99| 女生性感内裤真人,穿戴方法视频| 天堂影院成人在线观看| 我的女老师完整版在线观看| 久久久久久久亚洲中文字幕| 久久精品影院6| 成人综合一区亚洲| 亚洲精品粉嫩美女一区| 色综合婷婷激情| 久久久久久大精品| 91狼人影院| 综合色av麻豆| 国产亚洲精品av在线| 国产一区二区三区在线臀色熟女| 亚洲无线观看免费| 日本a在线网址| 国产精品99久久久久久久久| 校园人妻丝袜中文字幕| 少妇高潮的动态图| 欧美成人一区二区免费高清观看| 成人特级黄色片久久久久久久| 99riav亚洲国产免费| 国产精品亚洲一级av第二区| 一本久久中文字幕| 国产免费一级a男人的天堂| 在现免费观看毛片| 一进一出抽搐gif免费好疼| 精品欧美国产一区二区三| av在线蜜桃| 麻豆成人午夜福利视频| 此物有八面人人有两片| 成人鲁丝片一二三区免费| 精品久久久久久,| 免费看日本二区| 久久国产乱子免费精品| 国产精品久久电影中文字幕| 亚洲av.av天堂| 国产综合懂色| 国产精品一区二区三区四区久久| 99久久精品一区二区三区| 丰满乱子伦码专区| 欧美人与善性xxx| 免费大片18禁| 亚洲色图av天堂| 男女视频在线观看网站免费| 国产视频一区二区在线看| 午夜免费激情av| 日本-黄色视频高清免费观看| 给我免费播放毛片高清在线观看| 日本黄大片高清| 1024手机看黄色片| 亚洲 国产 在线| 日本撒尿小便嘘嘘汇集6| 村上凉子中文字幕在线| 中文字幕免费在线视频6| 日本 av在线| 亚洲精品乱码久久久v下载方式| 丰满的人妻完整版| 最近最新中文字幕大全电影3| 欧美黑人欧美精品刺激| 啦啦啦观看免费观看视频高清| 精品久久久久久久久av| 中国美白少妇内射xxxbb| 观看美女的网站| 少妇熟女aⅴ在线视频| 91久久精品国产一区二区成人| 婷婷精品国产亚洲av| 免费搜索国产男女视频| 中文亚洲av片在线观看爽| 男人和女人高潮做爰伦理| 日本免费一区二区三区高清不卡| 精品无人区乱码1区二区| 人人妻人人澡欧美一区二区| 全区人妻精品视频| 欧美xxxx黑人xx丫x性爽| 精品不卡国产一区二区三区| 久久午夜亚洲精品久久| 亚洲 国产 在线| 国产亚洲欧美98| 国产 一区精品| 蜜桃久久精品国产亚洲av| 99久久精品热视频| 亚洲在线观看片| 99在线人妻在线中文字幕| 人人妻人人看人人澡| 日本免费a在线| 欧美人与善性xxx| 免费搜索国产男女视频| 永久网站在线| 久久久久性生活片| avwww免费| 最近最新中文字幕大全电影3| 久久精品影院6| 免费av观看视频| 日日干狠狠操夜夜爽| 变态另类成人亚洲欧美熟女| 国产淫片久久久久久久久| 久久精品人妻少妇| 久久精品国产99精品国产亚洲性色| 3wmmmm亚洲av在线观看| 观看免费一级毛片| 国国产精品蜜臀av免费| 日韩,欧美,国产一区二区三区 | 日本免费一区二区三区高清不卡| 亚洲一区高清亚洲精品| 丰满的人妻完整版| 国产精品野战在线观看| 少妇裸体淫交视频免费看高清| 精品福利观看| 国产淫片久久久久久久久| 国产男靠女视频免费网站| 老司机午夜福利在线观看视频| 国产免费av片在线观看野外av| 亚洲欧美日韩高清在线视频| 亚洲最大成人av| 久久久久国产精品人妻aⅴ院| 性色avwww在线观看| ponron亚洲| 色视频www国产| 午夜a级毛片| 成人美女网站在线观看视频| 黄色视频,在线免费观看| 色综合色国产| 日本欧美国产在线视频| 日本与韩国留学比较| 干丝袜人妻中文字幕| 久久婷婷人人爽人人干人人爱| 国产在线精品亚洲第一网站| 亚洲性夜色夜夜综合| 看十八女毛片水多多多| 最近在线观看免费完整版| 我的老师免费观看完整版| 99热这里只有是精品在线观看| 男人舔女人下体高潮全视频| 国产精品一区二区免费欧美| 极品教师在线免费播放| 又紧又爽又黄一区二区| 三级毛片av免费| 精品乱码久久久久久99久播| 国产亚洲精品综合一区在线观看| 亚洲aⅴ乱码一区二区在线播放| 欧美三级亚洲精品| 色视频www国产| 色综合亚洲欧美另类图片| 免费观看精品视频网站| 精品免费久久久久久久清纯| 久久精品91蜜桃| 美女 人体艺术 gogo| 一a级毛片在线观看| 天堂网av新在线| 免费看美女性在线毛片视频| 久久香蕉精品热| 一级黄片播放器| 男女下面进入的视频免费午夜| av在线老鸭窝| 国内毛片毛片毛片毛片毛片| 国产熟女欧美一区二区| 免费在线观看成人毛片| 久久精品国产亚洲av香蕉五月| 国产高清三级在线| 欧美一区二区亚洲| 国产熟女欧美一区二区| 国产精品一区www在线观看 | 国产高清三级在线| 免费看美女性在线毛片视频| 国产熟女欧美一区二区| 桃色一区二区三区在线观看| 国产91精品成人一区二区三区| 在线国产一区二区在线| 午夜福利在线观看吧| 国产精品综合久久久久久久免费| 国产v大片淫在线免费观看| 88av欧美| 国产探花极品一区二区| 亚洲五月天丁香| 亚洲专区中文字幕在线| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品粉嫩美女一区| 国产伦在线观看视频一区| 欧美成人一区二区免费高清观看| 久久久午夜欧美精品| 亚洲美女搞黄在线观看 | 亚洲人成伊人成综合网2020| 婷婷六月久久综合丁香| 午夜日韩欧美国产| 一区二区三区免费毛片| 人人妻,人人澡人人爽秒播| 久久久久精品国产欧美久久久| 琪琪午夜伦伦电影理论片6080| 国产精品一区二区三区四区免费观看 | 给我免费播放毛片高清在线观看| 国产一区二区三区av在线 | 国产高清不卡午夜福利| 免费在线观看成人毛片| 免费电影在线观看免费观看| 国产伦一二天堂av在线观看| 日本一二三区视频观看| 精品人妻视频免费看| 九色国产91popny在线| 少妇裸体淫交视频免费看高清| 动漫黄色视频在线观看| 一级av片app| 国产欧美日韩精品亚洲av| 不卡视频在线观看欧美| 日韩亚洲欧美综合| 在线观看一区二区三区| 少妇的逼水好多| 一边摸一边抽搐一进一小说| av在线观看视频网站免费| 久久人妻av系列| 深爱激情五月婷婷| 日本-黄色视频高清免费观看| 女人被狂操c到高潮| 国产精品一区二区三区四区久久| 国内精品一区二区在线观看| 国产淫片久久久久久久久| 男女下面进入的视频免费午夜| 看片在线看免费视频| 亚洲国产精品成人综合色| 一进一出抽搐gif免费好疼| 亚洲国产精品久久男人天堂| 嫩草影院精品99| 日本黄色视频三级网站网址| 国产v大片淫在线免费观看| 国产国拍精品亚洲av在线观看| 成年版毛片免费区| 久久久久性生活片| 88av欧美| 色综合色国产| 免费在线观看成人毛片| 美女高潮喷水抽搐中文字幕| 国内精品一区二区在线观看| 国产成人av教育| 色吧在线观看| 日韩,欧美,国产一区二区三区 | 少妇被粗大猛烈的视频| a级一级毛片免费在线观看| 一边摸一边抽搐一进一小说| 国产三级在线视频| 精品一区二区三区av网在线观看| 久久久久久久精品吃奶| 国产精品久久久久久亚洲av鲁大| 国产 一区 欧美 日韩| 狠狠狠狠99中文字幕| 久久久久久九九精品二区国产| 国产av一区在线观看免费| 极品教师在线免费播放| 国产免费一级a男人的天堂| 亚洲精品乱码久久久v下载方式| 最近视频中文字幕2019在线8| 精品一区二区三区视频在线观看免费| 国产精品久久久久久久久免| 欧美一区二区国产精品久久精品| 欧美区成人在线视频| 国产v大片淫在线免费观看| 琪琪午夜伦伦电影理论片6080| 国产亚洲精品久久久久久毛片| 亚洲精品456在线播放app | 白带黄色成豆腐渣| 免费在线观看成人毛片| 十八禁网站免费在线| 少妇高潮的动态图| xxxwww97欧美| 亚洲熟妇熟女久久| 在线观看66精品国产| 国产69精品久久久久777片| 国产黄a三级三级三级人| 99视频精品全部免费 在线| 欧美中文日本在线观看视频| 国产精品日韩av在线免费观看| 欧美区成人在线视频|