• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Resistance to Malicious Packet Droppers Through Enhanced AODV in a MANET

    2022-08-24 07:03:26ShirinaSamreen
    Computers Materials&Continua 2022年8期

    Shirina Samreen

    Department of Computer Science,College of Computer and Information Sciences,Majmaah University,Al Majmaah,11952,Saudi Arabia

    Abstract: Packet dropping in a mobile ad hoc network can manifest itself as the data plane attacks as well as control plane attacks.The former deal with malicious nodes performing packet drop on the data packets following the route formation and the latter deal with those malicious nodes which either drop or manipulate the control packets to degrade the network performance.The idea of the proposed approach is that during the route establishment,each of the on-path nodes is provided with pre-computed hash values which have to be used to provide a unique acknowledgement value to the upstream neighbor which acts as a proof of the forwarding activity.The analysis phase results in the detection of nodes which exhibited malicious behavior in the current communication session so as to avoid them in the future communication sessions resulting in an improved packet delivery fraction even in the presence of one or more malicious nodes in the network.The communication overhead incurred is minimum since the acknowledgement reports are sent to the destination for a transmission of N packets rather than an individual acknowledgement for each transmitted packet.In contrast to some of the existing techniques,the proposed mechanism is not dependent on the deployment of additional infrastructure like special Intrusion Detection System(IDS)nodes.The only overhead incurred is in the form of control packets exchanged for the reports request and the reports submission.

    Keywords: Mobile ad hoc networks(MANETs);routing protocols;attacks on MANET;secure routing;packet droppers

    1 Introduction

    Numerous security compromise issues are associated with a MANET in the route formation as well as the data transmission phase.Most of these can be attributed to the inherent features like open communication medium,on-the-fly route formation,frequent route changes due to mobility-based link breaks.Malicious packet dropping launched after the route formation is quite challenging to detect and can have deterring effects on the overall throughput.The biggest challenge is to distinguish between malicious and non-malicious packet dropping.Non-malicious packet dropping can happen because of a number of reasons listed as follows:attempt to preserve the battery power by a relay node,congestion in the network and noise within the communication channel.Malicious packet dropping is associated with the scenario when an attacker captures a node and has full control on it causing it to drop packets deteriorating the overall performance of the network.

    Theaimof the research is as follows:a security mechanism is proposed that can act as an addon to any reactive routing protocol such that packet delivery fraction is maintained at a modest level even in the presence of multiple adversarial nodes dropping the data packets.The researchcontributioninvolves a security enhancement to AODV routing protocol as follows:Each on-path node has an acknowledgement report comprising a proof of all the packets it received as well as the ones it forwarded which is always verifiable by the source node.The security mechanism assumes that the on-path nodes participating in a communication session are always trusted and responsible for detecting the adversarial nodes.The overhead incurred is in the form of control packets exchanged for the request and collection of reports from each of the intermediate nodes for each session to perform the report analysis so as to identify the misbehaving nodes dropping the data packets in order to eliminate them from participating in the next successive session.Themotivationof the proposed research is as follows:Unlike other techniques to counter the selective black hole attacks like[1],the proposed mechanism does not need the deployment of any special IDS(intrusion detection system)nodes and the control overhead is minimized.It is done by appropriately choosing the number of packets to be transmitted for each session and is justifiable with the maintenance of modest packet delivery fraction even in the presence of multiple adversaries.

    The manuscript content is organized as follows:Section 1 describes the introduction.Following is Section 2 which describes related work describing various defense approaches to protect against blackhole nodes.Section 3 explains the modifications/enhancements to the baseline routing protocol Ad-hoc On-demand Distance Vector (AODV).Section 4 explains the proposed security scheme followed by Section 5 enlisting the optimizations to proposed approach.Section 6 presents the performance analysis followed by section describing the conclusion and future work.

    2 Related Work

    In [2],an approach has been proposed which is based upon probing wherein the source node randomly selects an intermediate node on the source to destination path which has to send a report to the destination appending it to the data packet which it forwards to the next hop neighbour.The destination over a period of time receives the reports from all the intermediate nodes and analyses them from traffic deviations.These are secured from manipulation by other malicious nodes.It is achieved through the use of a chain of Hash-based Message Authentication Code (HMAC)s on link layer acknowledgements.Symmetric cryptographic construction is used to ensure the secrecy of random node selected for sending the reports.The protocol is associated with a small communication overhead due to the increase in packet size caused by appending the reports with data packets.

    Detection of malicious packet dropper nodes based upon the ideas from opportunistic networking was proposed in[3].The mechanism is based upon the usage of two types of nodes known as Cop node and a regular node.The Cop node is solely responsible for the nodes which perform packet dropping either with malicious intent or selfish nature whereas the regular nodes only perform normal data transmission without worrying about the detection of packet droppers.The idea is to reduce the burden of detection of misbehavior upon regular nodes at the cost of deploying additional nodes which are dedicated solely for misbehavior detection.A threshold-based approach with Dynamic source routing protocol is used wherein the cop node operates in the promiscuous mode and keeps moving within the wireless channel in an attempt to overhear the ongoing communication.It keeps monitoring the forwarding behavior of its neighboring regular nodes and when the number of packets dropped exceeds a threshold,it sends an alarm message to the source which results in excluding the packet droppers from source to destination path by generating an alternate route.

    A security model was proposed employing a reputation management [4]having certain nodes as mangers and the rest as common nodes.The former nodes are responsible for the collection of information followed by the trust computation reflecting the packet forwarding behavior of the latter nodes.The latter nodes monitor their peers and send the information managers.The honesty of manager nodes decides the efficiency of the proposed research.

    A novel security model employing a metric termed as blacklist threshold representing the quantity of amount of node usage within the network involving the node’s contribution towards packet forwarding was proposed[5].It was named as Trust Model focusing on node Usage against MANETs On-Off Attack(TMUMO).

    A security approach measuring the positive packet forwarding behavior based upon historical data was proposed[6].The method is having comprehensive computation method for calculating the metric through direct as well as indirect observations but it is not resilient to attackers attempting to corrupt the computation process.

    Yet another latest research[7]creates a trust model for a MANET in the context of Internet of Things (IoT).Subsequently,it involves the design of a routing protocol to guard against the packet droppers.Apart from the design of security schemes,other related topics including authentication,secure routing and minimization of overhead have been reviewed in detail[8].

    In a MANET,the malicious packet droppers tend to modify their behavior periodically so as to evade detection and continue with the malicious activity.A totally decentralized mechanism was proposed [9]to monitor the node’s behavior and detect the malicious activity despite the change in their behavior.It is based upon two models for the classification and tracking of the evolving behavior namely Bernoulli Bayesian model and Markov Chain model respectively.

    The detection of the most vulnerable form of packet dropping known as black hole attack in the form of an intrusion detection system was proposed[10]termed as‘Accurate and Cognitive Intrusion Detection System’(ACIDS).It works by considering the deviation of the parameters like Sequence number of the destination node and route reply.

    A novel security mechanism to protect against selective packet dropping attack was proposed[11]named as Resistive to Selective Drop Attack(RSDA)scheme.It can be unified with the existing routing protocols like AODV and Dynamic Source Routing(DSR)to provide security.The working mechanism is based upon deactivating the highest weight link and providing the authentication through the elliptic curve digital signature algorithm.

    A secure routing protocol to detect packet drop attacks has been proposed[12]which discovers the best route from source to destination based upon priority assigned to a number of parameters like the hop-count,the battery life,and security.The most important feature of the protocol is the application of energy-saving scheme to conserve the energy.The protocol is named as Ad Hoc On-Demand and Distance Vector-Packet Drop Battling Mechanism(AODV-PDBM).

    An approach to distinguish between malicious and non-malicious packet dropping was proposed[13]wherein the concept of node trust is employed.It reflects the behavioral traits of a node while participating in the packet forwarding after the route establishment.Another recent research to deal with packet droppers using trust and reputation management[14]has the nodes in a wireless network rate each other and use the aggregate ratings to compute the trust.A data mining approach known as fuzzy based secure architecture was proposed[15]to classify the nodes using packet delivery ratio,forwarding and residual energy as input parameters.

    The problem of blackhole attacks is addressed to have a secure transmission of data through a new method termed as modified Ad-hoc On-demand Multipath Distance Vector(AOMDV)protocol[16].The data transmission is done by computing multiple routes to reach the destination employing the homomorphic encryption method.

    In a MANET environment,the source of packet dropping is either malicious nodes or link error.To detect malicious packet droppers,a novel mechanism is proposed known as the improved failure aware third party Auditor(IFTPA)[17]based homomorphism linear authenticator(HLA)mechanism(IFHM)with the Secured Ad-hoc On-demand Distance Vector(SAODV).It involves a mechanism to revoke a server as well as reassign a server making the security scheme robust to the compromise of the server node.Hence the detection of malicious packet dropper can be done along with an appropriate authentication service.

    A novel approach employing a trust metric comprising three dimensions (trust,distrust and uncertainty) to handle the dynamic MANET topology is termed as Enhanced Average Encounter Rate-AODV(EAER-AODV)protocol[18].The trust model facilitates the secure route discovery by having the source node choose the next hop based upon the mobility of the nodes and the malicious nature to avoid any packet dropping either with non-malicious intent through link break or malicious intent through compromised nodes.

    An optimization based trust-aware secure routing protocol was proposed termed as Atom Whale Optimization Algorithm(AWOA)[19].Various factors reflecting the trust including the average rate of encounter,and frequency of cooperation,integrity factor,and the rate of packet forwarding are used to select the optimal route.The modelling of fitness function is performed by involving factors like mobility and trust to provide improved network performance despite the presence of malicious packet droppers.

    Secure routing protocol employing the Ad-hoc On-Demand Multipath Distance Vector(AOMDV)as a baseline termed as Trusted Security Ad-hoc On-Demand Multipath Distance Vector(TS-AOMDV) was proposed [20]to detect and eliminate malicious nodes launching flooding,blackhole,and gray hole attacks in the network.The phases of route discovery and data transmission are involved in the attacks detection through an intrusion detection system (IDS).The IDS is incorporated in each node which measures a parameter within the Route Request (RREQ) packet during route discovery and estimates the rate of packet forwarding by the neighbors during the forwarding phase.The attack detection is done through a comparison against a threshold value followed by the computation of trust rates of a node to form a reliable route.

    The proposed security mechanism in this paper,compared to the above mentioned mechanisms is neither dependent upon any special IDS nodes nor does it employ promiscuous neighbourhood monitoring.It employs a report based mechanism wherein each intermediate node maintains a track of its own forwarding activity.The reports are sent to the source node in the form of cumulative acknowledgement reports for each session (comprising of a fixed no.of data packets) rather than having an individual acknowledgement for each data packet,thereby maintaining a good packet delivery fraction even in the presence of adversarial nodes with a reduced overhead.

    3 Modifications to AODV Routing Protocol

    When the proposed security mechanism has to be used with AODV routing protocol [21],then the feature of having an intermediate node respond to an RREQ packet with a corresponding Route Rely (RREP) packet has to eliminated since the security mechanism has the source node create an RREQ packet embedded with an encrypted random value which has to be decrypted by the destination node for subsequent security related operations before sending the RREP packet.Hence the packet header format of the RREQ packet is modified to incorporate the encrypted random value and also accommodate the path information about the addresses of the intermediate nodes through which the RREQ packet has traversed.

    When the RREQ packet reaches the destination,it utilizes this information from the encrypted random value to generate a set of n (where n is the total no.of intermediate nodes on the source to destination path) pre-computed hash values obtained by applying a secure hash function to the random value embedded within the RREQ packet.These n values are encrypted with the symmetric key shared by the destination with each of the on-path nodes and disseminated along the path.The n encrypted values are embedded within the RREP packet which needs the modification of the RREP packet header format.The RREP packet header also incorporates the final path information so as to update the source node about each of the intermediate nodes upon the so formed path.

    During the data transmission,if a link break is detected then the Route Error(RERR)packet is sent to the nodes in precursor list of the routing table as in the basic AODV protocol.Additionally,in the proposed security mechanism the data packet on transmission at which the link break was detected is inspected to look into the address of the source node at which the packet originated and also the sequence number of the packet so as to fill two additional fields within the RERR packet header namely:the srcpkt and the pktsno respectively.The above information embedded within the RERR packet is used by the source node to determine the sequence number x of the packet from where the current session’s packets were lost so as to retransmit all the packets of the current communication session from the sequence number x to N in the next successive session.

    At the beginning of each communication session,the source node backs up a copy of all the packets transmitted so as to use them for retransmission in the next successive session in case of the reception of an RERR packet due to a link break being detected during the transmission and packets being lost during the transmission.Apart from the modified RREQ,RREP and RERR packets,the proposed mechanism makes use of certain additional packets namely:the acknowledgement(ACK)packet,the Reports Request (RPTRQ) packet,the CLEAR packet,the REPORT packet and the MALI packet.

    In each communication session,each intermediate node upon the reception of a data packet has to send an acknowledgement value computed using the sequence number of the received packet and the pre-computed hash value obtained from the destination at the time of route establishment through the RREP packet.The computed value acts as a proof for the upstream node’s forwarding activity and it is sent in the form of ACK packets.

    The end of a communication session happens upon the expiry of a timer set at the beginning of the session for a time period required for the transmission of N packets.During this wait period,an RERR packet may be received which updates the brksno field (from its default value of-1) of the source node to a value greater than zero which is the sequence number of the packet at which the link break occurred.If no RERR packet is received,then it is implied that no link break has occurred during the data transmission session and the route is intact.Hence the same route may be used,for sending the reports request and receiving the reports from each of the on-path nodes.A CLEAR packet is used to inform all the on-path nodes that the data transmission has completed and the reports may be sent to the source along the same route.If an RERR packet is received during the wait time,then it indicates that a link break has been detected and the route is not intact.Hence the source node has to establish a fresh path to each of the on-path nodes so as to send the reports request and receive the reports back along the corresponding reverse paths.The RPTRQ packet is used by the source node to broadcast and form separate paths with each of the on-path nodes for the reception of REPORT packets which have an embedded acknowledgement report within them.

    As an optimization measure for the proposed security mechanism,the destination node upon the reception of the RPTRQ packet,rather than sending a REPORT packet to the source node,sends out an RREP packet with an embedded report within it in order to utilize the broadcast of RPTRQ packet for the dual purpose of reports reception as well as an additional fresh route formation.The freshly formed route may be utilized for the next successive data transmission session.For this purpose,the packet header of the RREP packet is modified to incorporate two fields namely:rpt and rpts.The field rpt represents a boolean flag which indicates whether the RREP packet has an embedded report within it and the rpts field is the embedded acknowledgement report from the destination.

    After the reception of reports from all the on-path nodes,the source node performs the reports analysis which provides the forwarding behavior characteristics of each of the intermediate nodes during the data transmission session to determine those nodes which can be categorized as either suspicious nodes or malicious nodes.The malicious nodes also called as the black hole nodes are the adversarial nodes which have to be avoided during the route establishment.This information is incorporated in the MALI packets which contain the addresses of all the black holes.The MALI packets are broadcast throughout the network so as to inform all the nodes about the black hole nodes.

    4 Proposed Security Mechanism

    4.1 Reports Request

    The transmission of N packets by the source node is followed by setting a timer for a time period needed for sending the N packets.During the wait period,the reception of an RERR packet causes the source node to update its break sno from its default value of-1.

    The expiry of the timer is followed by the source node entering into the Reports Request phase which is performed as follows:

    Case 1:The source node has the default value of-1 in break sno field since no RERR packet has been received during the wait period.Under these circumstances,as the link is intact the same route can be employed to receive the acknowledgement reports from each of the on-path nodes including the destination node.A CLEAR packet used to request reports along the existing path is sent along the same route by the source.Each of the on-path nodes,upon receiving the CLEAR packet send back the REPORT packet on the reverse path of the CLEAR packet.The on-path nodes also forward the CLEAR packet to the next downstream neighbor on the source to destination path.Finally,when the CLEAR packet arrives at the destination,it sends back the REPORT packet and discards the CLEAR packet.

    Case 2:The source node has the break sno value greater than zero since an RERR packet has been received because of a link break.Under these circumstances,it implies a link break which indicates that the existing route cannot be used.Consequently,a RPTRQ packet(Reports Request)is generated by the source node which contains three significant fields namely nodeList,listLength and recvLength which are described as follows:

    nodeList →contains the names and status flag for each of the on-path nodes.The status flag indicates whether acknowledgement report has been received from the node or not.

    listLength →the number of on-path nodes.

    recvLength →the number of on-path nodes from whom the acknowledgement reports have been received.

    The broadcast of RPTRQ packet across the network is done similar to that of RREQ packet.The source node sets a timer to an approximate time interval required for the reports to be received from all of the intermediate nodes.When the timer expires,the source node checks whether the acknowledgment reports have not been received from any of the on-path nodes.If yes,the source node resends the RPTRQ packet with the modified nodeList fields by updating the status flags in the nodeList field of those intermediate nodes from where the reports have been received and resets the timer to an interval required for the reports to arrive from the remaining nodes which have not yet sent the reports.This process is repeated until the reports are not received from all of the intermediate nodes.

    The processing of the RPTRQ packet is done in two parts:In the first part,it is processed in a similar way as the RREQ packet wherein the reception of the RPTRQ packet causes each of the nodes through which it traverses to update the routing table entries of reverse route.In the second part of processing the RPTRQ packet,each node which receives the RPTRQ packet checks whether its name is included in the nodeList.If yes,it checks whether its status flag is set to 0 or not and if the status flag is set 0,then the node first decrements the value of recvLength and sends it’s acknowledgement report for the ongoing session in the form of REPORT packet along the reverse route through which it received the RPTRQ packet.If the recvLength value is greater than zero,it further broadcasts the RPTRQ packet.Otherwise it discards the RPTRQ packet.

    The intermediate nodes maintain two lists known as alert list and suspicious list(initially empty)which are updated while sending the REPORT packet.The acknowledgement report is analyzed to check for the number of packets which have been forwarded to the downstream neighbor but the ACK packet has not been received for that packet.If the number of such packets are greater than 20%of the total number packets forwarded,then the downstream node is checked for existence in the suspicious list.If the downstream node already exists in the suspicious list,then it is included into the alert list.Otherwise,it is included into the suspicious list to check for its behavior in the future communication sessions.

    The significance of the alert list is that,all the nodes included into it are those nodes which have repeatedly exhibited malicious intent to its upstream neighbor node by not sending the ACK packets.Hence,the upstream node avoids its participation in the routes with such a node as it’s downstream neighbor since it may result in,the source node wrongly including the non-malicious node into the malicious list because of the repeated malicious behavior of its downstream neighbor.

    The alert list is used in the Secure Route Establishment phase since each intermediate node uses its alert list to see if the RREP packet is received from a node included in its alert list.If yes,then the RREP packet is dropped,otherwise it is forwarded.

    The source node at the end of a data transmission session performs the reports request to the onpath nodes and the on-path nodes submit the reports to the source node as follows:There are two cases to be considered:when no link break occurs and when a link break occurs in the data transmission path.In the former case,the CLEAR packet unicasted by the source node using the same path results in the sending of REPORT packets by all the on-path nodes along the route in reverse direction.In the latter case,the link between nodes C and E is shown as broken which causes the source node to broadcast the RPTRQ packets followed by sending of REPORT packets by all the on-path nodes and the destination node along the reverse path.

    4.2 Processing of Reports

    The reception of REPORT packets by the source node results in theReports Processingphase which composes two lists:suspicious listandmalicious list(or blacklist).The former list comprises the identities of the nodes exhibiting misbehavior along with the frequency of their misbehavior known as occurrence counts whereas the latter list comprises the nodes declared as malicious on the basis of the occurrence counts in thesuspicious list.The analysis of REPORT packets obtained from the on-path nodes can result in one of the following conditions:

    The N-bit flags in the REPORT packets of all the nodes have all zeros which indicates that first node in the list of on-path is part of thesuspicious list.If the N-bit flags does not contain all zeros,then the REPORT packets of each of the on-path nodes are analyzed sequentially.For each REPORT packet,a count is made of the number of packets for which the N-bit flag has a 1 but acknowledgement value from the downstream node is missing and the corresponding bit position is zero in the destination node’s REPORT packet.If the number of such packets are greater than 20%of the total number of packets sent by the source node,then thesuspicious listis checked to see if the node already exists in it.If yes,then the occurrence count of the node is incremented,otherwise the node is included in thesuspicious listand its occurrence count is set to 1.After the composition of thesuspicious list,themalicious listis formed by looking out for those nodes in thesuspicious listwhose occurrence count has exceeded the threshold called as MAL_THRESH(set to 2)and including them into malicious list followed by their removal from thesuspicious list.

    Another important functionality ofReports Processingphase is that,each pair of successive nodes(x,y)on the source to destination path such that y does not provide ACK packets for more than 20%of packets forwarded by x for more than one communication session has to be included in a list called asalert list pairsto inform the destination through the RREQ packet for the upcoming communication session.

    This information ofalert list pairsis needed by the destination so that,it can drop any RREQ packet if the route it followed has the pair(x,y)as successive nodes on the source to destination path.The justification for this dropping is that,during the process of sending the REPORT packet,each intermediate node x creates its ownalert listso as to avoid any node y in thealert listas it’s downstream neighbor by dropping any RREP received from such a node.Hence,to avoid the overhead with respect to time incurred in the route establishment because of the dropping of RREP packet followed by retransmission of RREQ packets,the destination node itself can take care not to establish any route involving thealert list pair(x,y)as the RREP will be dropped midway at node x if the route has y as it’s downstream neighbor.

    The reports analysis followed by the composition ofsuspicious list,malicious listandalert list pairs,is followed by the next successive communication session.This is done at the end ofReports Processingphase by having the source node check if it has already buffered N number of packets for transmission.Otherwise,it sets a timer which expires at a fixed time interval and then checks whether the input buffer has sufficient(N)number of packets for transmission failing which it resets the timer.After sufficient numbers of packets have accumulated in the input buffer,the source node can initiate the next communication session.The next successive communication session may use the existing secure route or it may require a fresh secure route from the source to destination based upon the following conditions:

    Condition 1:If the source node has thebreak snofield with its default value of-1 at theReports Requestphase and no nodes are included in themalicious listat the end ofReports Processingphase of the current communication session.

    Condition 2:If the source node has thebreak snofield with its default value of-1 at theReports Requestphase and one or more nodes are included in themalicious listat the end ofReports Processingphase of the current communication session.

    Condition 3:If the source node has thebreak snofield with a value greater than zero at theReports Requestphase indicating a link break during theData Transmissionphase.

    Under Condition 1,the existing secure route from source to destination can be used for the next communication session.The allocation of memory by the intermediate nodes and the destination node for the next session is done through the CLEAR packets as they traverse the source to destination path during theReports Requestphase of the current communication session.

    Under Condition 2 and Condition 3,the establishment of a new route is needed such that no nodes from themalicious listare included on the path.Also,the route should avoid any on-path successive nodes from thealert list pairs.The information about themalicious listis disseminated through theBlacklist Propagationphase andalert list pairsinformation is embedded within the RREQ packet by the source node during theSecure Route Establishmentphase.Figs.1-5 show the pseudo code which depicts the procedures through which a node handles the reception of each of the different types of control packet based upon the proposed security mechanism.

    Figure 1:(Continued)

    Figure 1:Reception of RREQ packet

    Figure 2:(Continued)

    Figure 2:Reception of a RREP packet

    Figure 3:(Continued)

    Figure 3:Reception of a RERR,REPORT,CLEAR packets from some other node and reception of a data packet from the upper layer by the source node

    Figure 4:(Continued)

    Figure 5:(Continued)

    Figure 5:Reception of a RPTRQ packet

    4.3 Blacklist Propagation

    The dissemination of information about the blacklisted nodes within the malicious list is done using a MALI packet comprising the identities of those nodes included into the malicious list.Whenever a node receives a MALI packet,it checks to see if it has not already received a MALI packet with the same broadcast id.If yes,the packet is discarded as a duplicate,otherwise it updates its blacklist to include all the nodes in the malicious list and further broadcasts it.

    The significance of the blacklist is that,whenever a node receives an RREQ packet it first checks to see whether it has arrived from a blacklisted node.If yes,it is discarded,otherwise it is further propagated.

    5 Optimizations to the Proposed Approach

    After the analysis of the acknowledgement reports in the Reports Analysis phase,the next successive communication session requires a secure route from the source node to the destination node by avoiding the nodes in the malicious list and alert list pairs.The proposed approach initiates the route discovery phase afresh after the reception of reports from all the on-path nodes followed by the Reports Analysis phase.This may result in an increased control packet overhead especially if a link break occurs in the Data Transmission phase and the RPTRQ packet has to be broadcast throughout the network.In other words,the broadcast operation has to be performed in the form of RPTRQ packets for the reception of acknowledgement reports followed by two more broadcast operations.One broadcast operation is in the form of MALI packets for the Blacklist Propagation phase and yet another broadcast operation in the form of RREQ packets for the Secure Route Establishment phase for the next successive communication session resulting in a three-fold increase of the control packet overhead.A possible optimization for reducing the control packet overhead would be for the destination,to have the RREP packet with the acknowledgement report embedded within it sent to the source node as a response to RPTRQ packet so that it serves the two purposes of report reception and a fresh route establishment.

    At the end of the Reports Analysis phase,the source node can check the fresh route for the presence of any nodes in the malicious list or any two successive nodes on the path from the alert list pairs.If the fresh route is free from all the nodes in the malicious list and the alert list pairs,then the source node can readily use that route without any broadcast of RREQ packets for the next communication session.Otherwise,it has to initiate the route discovery through the Secure Route Establishment phase.

    Another possible optimization would be to include the malicious list of the current communication session in the RREQ packets of the Secure Route Establishment phase for the next successive communication session so as to eliminate the additional overhead incurred in the broadcast of MALI packets in the Blacklist Propagation phase.

    6 Performance Analysis

    The network simulator ns-2 [22]is used to analyze the performance of the proposed security scheme using a varying number of black hole nodes.The experimental parameters are enlisted in Tab.1.

    Table 1:Experimental parameters

    Two different forms of analysis were done wherein the first form had the normal nodes as well as malicious nodes move in a Random-way point mobility model,with 6 different types of speed,0,10,20,30,40,and 50 m/s with a pause time of 1 s.The second form of analysis was done by considering the malicious nodes as stationary and the Random-way point mobility model was applied to all the remaining innocent nodes with 6 different types of speed,0,10,20,30,40,and 50 m/s with a pause time of 1 s.Each data value in the figures refers to average value obtained through 15 experimental runs.In each form of analysis,we consider two cases,one with 3 malicious nodes and another with 6 malicious nodes.The packet delivery fraction with 3 and 6 black hole nodes respectively is depicted in the Figs.6a and 6b respectively when the black hole nodes are moving as other normal nodes.In Fig.6a,it can be observed that the mean packet delivery fraction for all speeds is 99.3%when there is no black hole node but it sharply falls down to 61.47%in the presence of 3 black hole nodes.The usage of the proposed security mechanism results in an improved mean packet delivery fraction of 81.13%.

    Figure 6:(a)Packet delivery fraction for 3 moving black hole nodes(b)Packet delivery fraction for 6 moving black hole nodes

    Fig.6b,shows that the mean packet delivery fraction for all speeds is 99.3% when there is no black hole node but in the presence of 6 black hole nodes,it sharply falls down to 38.09%.The Packet Delivery Fraction for the second form of analysis involving stationary black hole nodes is depicted in Figs.7a and 7b.In Fig.7a,it can be observed that the mean packet delivery fraction for all speeds is 99.3% when there is no black hole node but it sharply falls down to 59.36% in the presence of 3 stationary black hole nodes.The proposed security mechanism generates an improved mean packet delivery fraction of 81.76%.Fig.7b,shows that the mean packet delivery fraction for all speeds is 99.3% when there is no black hole node but in the presence of 6 black hole nodes,it sharply falls down to 35.54%.An improved mean packet delivery fraction of 72.59%can be achieved through the proposed security mechanism.

    Figure 7:(a)Packet delivery fraction for 3 stationary black hole nodes(b)Packet delivery fraction for 6 stationary black hole nodes

    The true positive rate and the false positive rate as an outcome of experiments conducted considering moving black hole nodes and stationary black hole nodes is depicted in Figs.8 and 9 respectively.As can be seen in Figs.8a and 8b,the mean True Positive rates are 66.6%and 76.7%and the mean false positive rates are 3.2%and 6.3%respectively for 3 moving black holes and 6 moving blackholes.

    Figure 8:(a)True/False positive rate for 3 moving black hole nodes(b)True/False positive rate for 6 moving black hole nodes

    Figure 9:(a)True/False positive rate for 3 stationary black hole nodes(b)True/False positive rate for 6 stationary black hole nodes

    As can be seen in Figs.9a and 9b,the mean True Positive rates are 66.8%and 79%.The mean false positive rates are 3.2%and 5.2%respectively for 3 stationary black holes and 6 stationary black holes.

    7 Conclusion and Future Work

    In the presence of multiple number of black hole nodes,a node which is not yet detected as a black hole can reduce the packet delivery fraction of the sessions until it is detected.

    The approach given in[10]works during the route discovery and route establishment phases by considering the destination sequence number(DSN)and the IP address of the node sending the RREP packet.It also takes care of reducing the false positives by having an additional field in the routing table.A comparison of the proposed approach with the one in[10],the following observations can be drawn:

    The former approach focuses upon the malicious node detection during the route establishment phase whereas the current research involves an approach based upon historical behavioral analytics of packet forwarding behavior during data transmission phase after the route establishment.This approach has significance in a situation involving intelligent malicious nodes adopting various strategies to evade detection during the route establishment and exhibit the malicious behavior after forming the route.

    The future work aims to design a mechanism which can be incorporated in the proposed security mechanism to determine a reputation rating for each intermediate node on the path by each source node which can be used assign different relative weights to a pair of successive nodes (a,b) on the source to destination path exhibiting the suspicious behavior in a session so as to ensure the innocent node is not falsely detected as malicious and the malicious node is truly detected as a black hole node.

    Acknowledgement:The author would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project Number 1439-59.

    Funding Statement:The author received funding for this research from Deanship of Scientific Research at Majmaah University for supporting this work under Project Number 1439-59.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    黄色一级大片看看| 一级毛片黄色毛片免费观看视频| 亚洲一码二码三码区别大吗| 久久精品亚洲av国产电影网| 国产熟女午夜一区二区三区| 亚洲欧洲精品一区二区精品久久久 | 久久婷婷青草| 波野结衣二区三区在线| 一级,二级,三级黄色视频| 两性夫妻黄色片| 免费在线观看黄色视频的| 性少妇av在线| 久久ye,这里只有精品| 91精品伊人久久大香线蕉| 青青草视频在线视频观看| 我要看黄色一级片免费的| 最近2019中文字幕mv第一页| 精品人妻一区二区三区麻豆| 大香蕉久久网| 亚洲中文av在线| 色94色欧美一区二区| 亚洲成色77777| 天天躁夜夜躁狠狠久久av| 中文欧美无线码| 亚洲欧美成人综合另类久久久| 高清av免费在线| 一区二区三区四区激情视频| 老司机在亚洲福利影院| 婷婷成人精品国产| 国产不卡av网站在线观看| 免费高清在线观看日韩| 亚洲av日韩在线播放| 一区在线观看完整版| 精品午夜福利在线看| 自拍欧美九色日韩亚洲蝌蚪91| 成年女人毛片免费观看观看9 | 中国国产av一级| 丝袜美足系列| 狂野欧美激情性bbbbbb| 欧美 日韩 精品 国产| 国产乱来视频区| 97精品久久久久久久久久精品| 亚洲少妇的诱惑av| 国产精品.久久久| 在线看a的网站| 美女主播在线视频| 久久久久久久久免费视频了| 一二三四在线观看免费中文在| 熟妇人妻不卡中文字幕| 久久久久精品人妻al黑| 一区二区三区精品91| 啦啦啦在线观看免费高清www| 日本爱情动作片www.在线观看| 亚洲精品日本国产第一区| 久久久久久人人人人人| 亚洲欧美成人精品一区二区| 国产av码专区亚洲av| av网站免费在线观看视频| 如日韩欧美国产精品一区二区三区| 十分钟在线观看高清视频www| 亚洲国产精品一区三区| 一二三四在线观看免费中文在| 免费黄网站久久成人精品| 日韩一区二区视频免费看| 在线精品无人区一区二区三| 人人妻人人爽人人添夜夜欢视频| 香蕉丝袜av| 夫妻性生交免费视频一级片| 精品国产乱码久久久久久小说| 国产精品欧美亚洲77777| 王馨瑶露胸无遮挡在线观看| 国产亚洲一区二区精品| 十八禁网站网址无遮挡| 免费高清在线观看视频在线观看| 亚洲精品乱久久久久久| 大片免费播放器 马上看| 最近的中文字幕免费完整| 在线观看人妻少妇| 亚洲成人av在线免费| 两性夫妻黄色片| 狂野欧美激情性xxxx| 啦啦啦在线免费观看视频4| 狂野欧美激情性bbbbbb| 日韩 欧美 亚洲 中文字幕| 久久精品人人爽人人爽视色| 一区在线观看完整版| 中文字幕色久视频| 亚洲四区av| 亚洲专区中文字幕在线 | 一本—道久久a久久精品蜜桃钙片| 中文字幕最新亚洲高清| 久久久久网色| 精品人妻一区二区三区麻豆| 男女床上黄色一级片免费看| 汤姆久久久久久久影院中文字幕| 男女边吃奶边做爰视频| av卡一久久| 青春草国产在线视频| 国产xxxxx性猛交| 亚洲成色77777| av免费观看日本| av网站在线播放免费| 王馨瑶露胸无遮挡在线观看| 亚洲av在线观看美女高潮| 日韩大码丰满熟妇| 国产精品一国产av| 爱豆传媒免费全集在线观看| 久久精品国产综合久久久| 国产一级毛片在线| 19禁男女啪啪无遮挡网站| 免费观看a级毛片全部| www.熟女人妻精品国产| 久久久久国产精品人妻一区二区| 高清视频免费观看一区二区| 91国产中文字幕| 国产亚洲午夜精品一区二区久久| 777久久人妻少妇嫩草av网站| 日本91视频免费播放| 女性生殖器流出的白浆| 亚洲一卡2卡3卡4卡5卡精品中文| 黄色怎么调成土黄色| 久久久久精品性色| 国产色婷婷99| 大话2 男鬼变身卡| 亚洲av福利一区| 好男人视频免费观看在线| 亚洲成人一二三区av| 日韩一区二区视频免费看| 国产精品香港三级国产av潘金莲 | 伦理电影免费视频| xxx大片免费视频| 9色porny在线观看| 91国产中文字幕| 国产精品国产三级专区第一集| 电影成人av| 亚洲精品视频女| 婷婷色麻豆天堂久久| 欧美精品一区二区免费开放| 日韩不卡一区二区三区视频在线| 99热网站在线观看| 大片电影免费在线观看免费| 精品一区在线观看国产| 亚洲,一卡二卡三卡| 亚洲欧美一区二区三区久久| a级毛片黄视频| 悠悠久久av| 亚洲,欧美,日韩| 亚洲av国产av综合av卡| 青春草亚洲视频在线观看| 青春草亚洲视频在线观看| 日本欧美国产在线视频| 中文字幕制服av| 欧美日韩综合久久久久久| 别揉我奶头~嗯~啊~动态视频 | 在线天堂最新版资源| 日日撸夜夜添| 亚洲精品日本国产第一区| 精品亚洲乱码少妇综合久久| videosex国产| 99香蕉大伊视频| 久久久久久久精品精品| 亚洲精品第二区| 精品人妻在线不人妻| 亚洲国产精品一区二区三区在线| √禁漫天堂资源中文www| 国产片特级美女逼逼视频| 国产精品麻豆人妻色哟哟久久| 99精国产麻豆久久婷婷| 在线观看三级黄色| 九色亚洲精品在线播放| 午夜福利一区二区在线看| 永久免费av网站大全| 色婷婷av一区二区三区视频| 一本大道久久a久久精品| 亚洲国产精品国产精品| 精品酒店卫生间| 少妇人妻 视频| 大片电影免费在线观看免费| 一边摸一边做爽爽视频免费| 亚洲成人国产一区在线观看 | 少妇精品久久久久久久| 亚洲欧美一区二区三区黑人| 大香蕉久久成人网| 观看美女的网站| 国产乱来视频区| 宅男免费午夜| 亚洲熟女精品中文字幕| 99久久综合免费| 老司机在亚洲福利影院| 久热这里只有精品99| 永久免费av网站大全| 国产亚洲午夜精品一区二区久久| 国产精品一区二区精品视频观看| 亚洲精华国产精华液的使用体验| 麻豆av在线久日| 精品一区在线观看国产| 18禁动态无遮挡网站| 国产欧美亚洲国产| 99香蕉大伊视频| 卡戴珊不雅视频在线播放| 纯流量卡能插随身wifi吗| 伦理电影大哥的女人| 免费在线观看黄色视频的| 国产成人免费无遮挡视频| 成年av动漫网址| 亚洲成av片中文字幕在线观看| 欧美日韩视频精品一区| 高清不卡的av网站| 国产乱人偷精品视频| 国产有黄有色有爽视频| 亚洲精品国产色婷婷电影| 亚洲五月色婷婷综合| 宅男免费午夜| 国产国语露脸激情在线看| 久久国产亚洲av麻豆专区| 999久久久国产精品视频| 欧美日本中文国产一区发布| 婷婷色综合大香蕉| 99久久综合免费| 伊人久久国产一区二区| 亚洲国产精品一区二区三区在线| 午夜久久久在线观看| 色婷婷久久久亚洲欧美| 亚洲视频免费观看视频| 欧美精品人与动牲交sv欧美| 国产免费一区二区三区四区乱码| 巨乳人妻的诱惑在线观看| 电影成人av| 亚洲国产精品一区三区| 亚洲少妇的诱惑av| 亚洲精品日韩在线中文字幕| 在线观看免费高清a一片| 国产成人系列免费观看| 青草久久国产| 天天躁日日躁夜夜躁夜夜| 午夜影院在线不卡| av有码第一页| 国产精品 欧美亚洲| 亚洲三区欧美一区| 久久女婷五月综合色啪小说| 亚洲欧洲日产国产| 亚洲美女搞黄在线观看| 精品国产乱码久久久久久男人| 日本猛色少妇xxxxx猛交久久| 黄网站色视频无遮挡免费观看| 91精品三级在线观看| 亚洲美女视频黄频| 国产精品熟女久久久久浪| 久久亚洲国产成人精品v| 日韩伦理黄色片| 最近手机中文字幕大全| 考比视频在线观看| 久久国产精品大桥未久av| 制服诱惑二区| 9191精品国产免费久久| 国产av一区二区精品久久| 欧美日韩综合久久久久久| 欧美国产精品一级二级三级| 日韩制服丝袜自拍偷拍| 肉色欧美久久久久久久蜜桃| 国产在线视频一区二区| 国产一区亚洲一区在线观看| 亚洲精品第二区| 黄色视频不卡| 各种免费的搞黄视频| 99久国产av精品国产电影| tube8黄色片| 亚洲一区二区三区欧美精品| 成人18禁高潮啪啪吃奶动态图| 亚洲av成人不卡在线观看播放网 | 狂野欧美激情性bbbbbb| 国产在线视频一区二区| 熟女少妇亚洲综合色aaa.| 欧美乱码精品一区二区三区| 国产一区二区三区综合在线观看| 一级片'在线观看视频| 国产亚洲av高清不卡| 亚洲七黄色美女视频| 精品一区在线观看国产| 精品亚洲乱码少妇综合久久| 日本av免费视频播放| 精品卡一卡二卡四卡免费| 成年动漫av网址| 国产精品偷伦视频观看了| 久久热在线av| 欧美黑人精品巨大| 又大又黄又爽视频免费| 97人妻天天添夜夜摸| 在线精品无人区一区二区三| 一本—道久久a久久精品蜜桃钙片| 免费看av在线观看网站| 叶爱在线成人免费视频播放| 黑人猛操日本美女一级片| 亚洲精品中文字幕在线视频| 欧美日韩亚洲综合一区二区三区_| 亚洲国产中文字幕在线视频| 亚洲精品成人av观看孕妇| 成人亚洲欧美一区二区av| 激情五月婷婷亚洲| 伊人久久国产一区二区| 国产黄色免费在线视频| 久久国产亚洲av麻豆专区| 日韩 欧美 亚洲 中文字幕| 你懂的网址亚洲精品在线观看| 欧美另类一区| 婷婷色av中文字幕| 国产av码专区亚洲av| 丝袜人妻中文字幕| 亚洲国产最新在线播放| 成年人免费黄色播放视频| 最新在线观看一区二区三区 | 国产男人的电影天堂91| 建设人人有责人人尽责人人享有的| 久久国产精品大桥未久av| 国产精品三级大全| 日韩一区二区三区影片| 精品国产露脸久久av麻豆| 黑人猛操日本美女一级片| 晚上一个人看的免费电影| 黄频高清免费视频| 久久影院123| 国产深夜福利视频在线观看| 欧美日韩一级在线毛片| 最近2019中文字幕mv第一页| 叶爱在线成人免费视频播放| 精品少妇内射三级| 成人午夜精彩视频在线观看| 亚洲免费av在线视频| 在线免费观看不下载黄p国产| 纵有疾风起免费观看全集完整版| 卡戴珊不雅视频在线播放| 久久精品aⅴ一区二区三区四区| 青草久久国产| 亚洲欧美一区二区三区国产| 99精国产麻豆久久婷婷| 国产精品女同一区二区软件| avwww免费| 一本色道久久久久久精品综合| 青春草国产在线视频| 中文字幕人妻丝袜制服| 大片免费播放器 马上看| 1024香蕉在线观看| av福利片在线| 久久精品久久精品一区二区三区| 午夜影院在线不卡| 国产精品国产三级专区第一集| 亚洲,一卡二卡三卡| 国产精品麻豆人妻色哟哟久久| 桃花免费在线播放| 亚洲av综合色区一区| 亚洲第一区二区三区不卡| 我的亚洲天堂| 国产xxxxx性猛交| 日韩中文字幕视频在线看片| 亚洲专区中文字幕在线 | 王馨瑶露胸无遮挡在线观看| 考比视频在线观看| 亚洲免费av在线视频| 女人被躁到高潮嗷嗷叫费观| 亚洲人成电影观看| 亚洲精品日本国产第一区| 18禁国产床啪视频网站| 高清av免费在线| 亚洲图色成人| 免费在线观看黄色视频的| 亚洲精品第二区| 国产精品.久久久| 亚洲色图综合在线观看| 考比视频在线观看| 爱豆传媒免费全集在线观看| 亚洲av成人不卡在线观看播放网 | 欧美精品一区二区免费开放| 亚洲综合精品二区| 国产一区二区激情短视频 | 亚洲男人天堂网一区| 少妇的丰满在线观看| 婷婷色综合www| 亚洲人成网站在线观看播放| 狂野欧美激情性xxxx| 久久久久久久大尺度免费视频| 久久天躁狠狠躁夜夜2o2o | 9热在线视频观看99| 黄色一级大片看看| 性少妇av在线| 免费黄频网站在线观看国产| 一区二区av电影网| 婷婷成人精品国产| 最新的欧美精品一区二区| 国产免费一区二区三区四区乱码| 国产午夜精品一二区理论片| 国产成人欧美在线观看 | 制服人妻中文乱码| 午夜影院在线不卡| 一级毛片 在线播放| 亚洲成人一二三区av| 日韩人妻精品一区2区三区| 亚洲国产最新在线播放| 十八禁网站网址无遮挡| 国产高清国产精品国产三级| 巨乳人妻的诱惑在线观看| 美女大奶头黄色视频| 亚洲欧美一区二区三区久久| 亚洲精品美女久久久久99蜜臀 | 自拍欧美九色日韩亚洲蝌蚪91| 亚洲国产欧美日韩在线播放| 日本vs欧美在线观看视频| 日本91视频免费播放| 成人国语在线视频| av在线app专区| 成人国产麻豆网| 丝瓜视频免费看黄片| 亚洲伊人久久精品综合| 日韩视频在线欧美| 国产亚洲午夜精品一区二区久久| 亚洲国产精品999| 人人澡人人妻人| 精品人妻熟女毛片av久久网站| 我的亚洲天堂| 国产精品一区二区在线观看99| 午夜91福利影院| 精品酒店卫生间| 国产成人a∨麻豆精品| 人人妻人人澡人人爽人人夜夜| netflix在线观看网站| 美女脱内裤让男人舔精品视频| 午夜免费鲁丝| 精品视频人人做人人爽| 久久久久视频综合| 日日啪夜夜爽| 成人国产麻豆网| 亚洲欧美精品综合一区二区三区| 永久免费av网站大全| 高清欧美精品videossex| 国产精品一区二区在线观看99| 久久热在线av| 亚洲国产看品久久| 中文精品一卡2卡3卡4更新| 在线观看www视频免费| 亚洲七黄色美女视频| 精品卡一卡二卡四卡免费| 国产色婷婷99| 色综合欧美亚洲国产小说| 久久久国产欧美日韩av| 久久这里只有精品19| 悠悠久久av| 欧美日韩成人在线一区二区| 日韩 亚洲 欧美在线| 在线看a的网站| 亚洲国产欧美网| 亚洲,欧美,日韩| 在线观看国产h片| 国产免费又黄又爽又色| 少妇人妻久久综合中文| 国产深夜福利视频在线观看| 又大又黄又爽视频免费| 久久人人97超碰香蕉20202| 国产精品成人在线| 黄色毛片三级朝国网站| 伦理电影大哥的女人| 国产av国产精品国产| 免费在线观看完整版高清| 日韩av免费高清视频| 在线观看人妻少妇| 最新在线观看一区二区三区 | 伦理电影免费视频| 男女无遮挡免费网站观看| 大码成人一级视频| 日韩 欧美 亚洲 中文字幕| 18禁裸乳无遮挡动漫免费视频| 乱人伦中国视频| 69精品国产乱码久久久| 性色av一级| 天天添夜夜摸| 精品久久久精品久久久| 免费观看人在逋| 亚洲欧美一区二区三区久久| 国产免费现黄频在线看| 国产成人a∨麻豆精品| 啦啦啦 在线观看视频| 国产一区二区 视频在线| 三上悠亚av全集在线观看| 只有这里有精品99| 国产无遮挡羞羞视频在线观看| 汤姆久久久久久久影院中文字幕| 亚洲欧美一区二区三区国产| 老鸭窝网址在线观看| 中文乱码字字幕精品一区二区三区| av.在线天堂| 在线观看三级黄色| 久久久国产欧美日韩av| 亚洲成国产人片在线观看| 国产亚洲av片在线观看秒播厂| 性少妇av在线| 高清在线视频一区二区三区| 中文字幕人妻熟女乱码| 久久精品久久久久久久性| 欧美精品一区二区免费开放| 热re99久久精品国产66热6| 视频在线观看一区二区三区| 亚洲五月色婷婷综合| 亚洲av欧美aⅴ国产| 校园人妻丝袜中文字幕| 国产在线视频一区二区| 一区二区三区四区激情视频| 亚洲久久久国产精品| 欧美日韩视频高清一区二区三区二| 99re6热这里在线精品视频| 99热网站在线观看| 国产野战对白在线观看| 中文字幕人妻熟女乱码| av线在线观看网站| 一区在线观看完整版| 在线免费观看不下载黄p国产| 精品酒店卫生间| av网站在线播放免费| 侵犯人妻中文字幕一二三四区| 午夜福利免费观看在线| 午夜老司机福利片| 欧美日韩av久久| videosex国产| 777米奇影视久久| 18禁动态无遮挡网站| 国产成人精品久久久久久| 99久久精品国产亚洲精品| 国产黄色视频一区二区在线观看| 岛国毛片在线播放| xxx大片免费视频| 欧美 日韩 精品 国产| 精品国产露脸久久av麻豆| 制服人妻中文乱码| 午夜福利视频在线观看免费| 男女边摸边吃奶| 欧美亚洲日本最大视频资源| 无遮挡黄片免费观看| 亚洲美女视频黄频| 久久人人97超碰香蕉20202| av免费观看日本| 欧美亚洲日本最大视频资源| 老鸭窝网址在线观看| 欧美成人午夜精品| av在线观看视频网站免费| 如何舔出高潮| 只有这里有精品99| 亚洲五月色婷婷综合| 亚洲精品久久久久久婷婷小说| 国产精品一二三区在线看| 久久99精品国语久久久| 亚洲熟女毛片儿| 免费在线观看黄色视频的| 妹子高潮喷水视频| 久久性视频一级片| 亚洲熟女毛片儿| 又大又爽又粗| 亚洲精品国产区一区二| 免费人妻精品一区二区三区视频| 国产精品国产三级国产专区5o| 久久天躁狠狠躁夜夜2o2o | 色视频在线一区二区三区| 欧美变态另类bdsm刘玥| 一级片'在线观看视频| av在线app专区| 久久久久国产精品人妻一区二区| 黄频高清免费视频| 国产av国产精品国产| 亚洲精品美女久久久久99蜜臀 | 国产成人免费无遮挡视频| 亚洲av日韩精品久久久久久密 | 久久鲁丝午夜福利片| 国产成人欧美在线观看 | 国产高清国产精品国产三级| 另类亚洲欧美激情| 成人18禁高潮啪啪吃奶动态图| 亚洲,欧美,日韩| 久久久久久久精品精品| 亚洲中文av在线| 国产av国产精品国产| 性高湖久久久久久久久免费观看| av卡一久久| 香蕉丝袜av| 99久国产av精品国产电影| 久久精品国产亚洲av高清一级| 亚洲欧美日韩另类电影网站| 青草久久国产| 悠悠久久av| 免费不卡黄色视频| 美女午夜性视频免费| 一级片'在线观看视频| 国产亚洲av片在线观看秒播厂| 国产国语露脸激情在线看| tube8黄色片| 欧美中文综合在线视频| 亚洲国产精品999| 久久久久久久久免费视频了| 90打野战视频偷拍视频| 婷婷色综合www| 免费观看av网站的网址| 韩国av在线不卡| 汤姆久久久久久久影院中文字幕| 一级a爱视频在线免费观看| 亚洲av欧美aⅴ国产| 精品国产超薄肉色丝袜足j| 操出白浆在线播放| 精品亚洲成a人片在线观看| 国产成人欧美在线观看 | 国产老妇伦熟女老妇高清| 国产女主播在线喷水免费视频网站| 少妇 在线观看| 亚洲熟女精品中文字幕| 天天躁夜夜躁狠狠躁躁| 亚洲av福利一区| 国产成人午夜福利电影在线观看| 久久综合国产亚洲精品| 久久久久精品人妻al黑| 亚洲综合精品二区| 永久免费av网站大全|