• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure Communication Protocol for Unmanned Aerial Vehicles

    2022-11-09 08:14:30NavidAliKhanJhanjhiSarfrazNawazBrohiAbdulwahabAliAlmazroiandAbdulaleemAliAlmazroi
    Computers Materials&Continua 2022年1期

    Navid Ali Khan,N.Z.Jhanjhi,*,Sarfraz Nawaz Brohi,Abdulwahab Ali Almazroi and Abdulaleem Ali Almazroi

    1School of Computer Science and Engineering(SCE),Taylor’s University Lake-side Campus,Subang Jaya,47500,Malaysia

    2School of Information and Technology,Monash University,Malaysia

    3University of Jeddah,College of Computing and Information Technology at Khulais,Department of Information Technology,Jeddah,Saudi Arabia

    4Department of Computer Science,Rafha Community College,Northern Border University,Arar,91431,Saudi Arabia

    Abstract: Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control Station.The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS.In order to increase the transfer speed and efficiency,the Mavlink does not encrypt the messages.As a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and DDoS.In this study,we tackle the problem and secure the Mavlink communication protocol.By leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat model.The results show that the protocol is insecure and the attacks carried out are successful.To overcome Mavlink security,an additional security layer is added to encrypt and secure the protocol.An encryption technique is proposed that makes the communication between the UAV and GCS secure.The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency.The results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol.Our achieved results have significant improvement over the literature and Mavlink in terms of security.

    Keywords: Unmanned aerial vehicles;mavlink protocol;drones security;UAVs communication

    1 Introduction

    Unmanned Aerial Vehicles (UAVs) have become increasingly common in recent years.By expanding their military reach to commercial use,these unmanned aerial systems are being used worldwide [1].An Unmanned Aerial Vehicle is a pilotless aircraft without any crew on board [2,3].They can operate completely autonomously [4,5] through autopilot,which means they can complete tasks without human interaction or can be non-autonomous with the help of remote control or a human pilot operating in runtime from a ground control station [6].The most common use is either by the military [7-9] for battlefields or reconnaissance or by civilians for leisure and entertainment [10,11].Following this,there are many other emerging applications of the UAVs such as agriculture [12,13],environmental protection [14],search and rescue [15],traffic monitoring [16],delivery [17],aerial mapping [18],aerial photography [19] and videography [20,21],fire detection [22].

    Moreover,the tech giants like Facebook [23] and tesla are using UAVs to bring the internet to places around the world where there is no internet access [24].The UAVs are best suited for “dull,dirty and dangerous” [25] missions,which means the situation where it is too difficult for a human to reach and operate.When a public communicating network gets crippled,UAVs will provide prompt disaster alerts and help speed up rescue or recovery operations.They can transport medical supplies to inaccessible areas.UAVs may be used to rapidly cover a wide area without endangering the workers’protection in the circumstances like toxic gas incursions,wildfires,or wild animal monitoring.The widest and important use of UAVs can be seen in military applications.Countries with advanced Unmanned Aerial Systems overpower their rivals prominently because of their greater stealth,reduced scale,and real-time capability in harsh environments and frontier surveillance [26].Therefore,UAVs can be effectively used in various situations to combat terrorism without loss of life.The real-time monitoring activity would,in this sense,require multiple details gathered during UAV flight,such as a telemetric subsystem,payload subsystem,and commands to be transmitted from the ground station for UAV management and mission performance [27].

    The Unmanned Aerial Vehicles are the components of an Unmanned Aerial System (UAS).The three main components of a UAS are a UAV,a Base Station/Ground Control Station,and the communication system that links them [28].Various communication protocols are typically used to communicate between the UAV and the GCS,such as Mavlink [29],UAVCan [30],UranusLink [31].Among these protocols,the Micro Aerial Vehicle Link (Mavlink) protocol is the most common and widely used communication protocol supported by a large number of UAVs and the Ground Control Station [32].Lorenz Meier first developed this protocol in 2009 under GPL license [33].Mavlink allows the UAV and GCS to communicate in both directions.The Ground Control Station sends instructions and controls messages to the UAV,and the UAV sends telemetry and other status information to the GCS [34].UAVs are also linked over the internet using the Mavlink protocol [35].

    The Mavlink protocol is supported by many UAVs and several autopilot systems such as Ardupilot [36] and PX4 [37].These two open-source systems are the leading autopilots that can control any unmanned vehicles ranging from unmanned aerial vehicles to even unmanned submarines [36,38].

    Mavlink is a lightweight networking protocol that is open-source and cross-platform.Mavlink 1.0 [33],Mavlink 2.0 [39],and a prototype version sMavlink are the three versions available.Mavlink 2.0 uses timestamped hash-based message authentication codes for integrity and authentication (HMAC).

    Mavlink is structured as a Marshalling library,which means that the system states’messages and the commands it requires to run in a particular binary format are serialized (streams of bytes) independent of the platform.Mavlink’s binary serialization approach is lightweight and low overhead as compared to other serialization methods like XML and JSON.

    The sMavlink draft version is a stable version that ensures confidentiality and integrity by using symmetric key authenticated encryption of relevant details [40].To the best of our knowledge,the sMavlink is not implemented yet.

    Furthermore,Mavlink messages are usually small and can be transmitted over a range of wireless networks,including Wi-Fi or even serial telemetric systems with low data rates,due to its Binary Serialization features.A double checksum verification guarantees message durability and accuracy in the packet header.The Mavlink protocol is the most widely used by its peers for communication between unmanned systems and ground control stations (GCS) due to these characteristics.

    Despite being robust and most widely used,the Mavlink communication protocol lacks a subtle security mechanism,making it vulnerable to several attacks,such as Denial of services attacks (DDoS),Eavesdropping,and Man-in-the-middle attack [41,42].These vulnerabilities are apparent because the Mavlink protocol does not encrypt the messages in communication.That means that the binary communication between the GCS and the UAV is happening over an unencrypted channel,making it an easy target for different security attacks.Thus,compromising the security of Unmanned Aerial Vehicles.

    This work’s main contribution is an additional security layer added to the Mavlink communication protocol to secure the binary directional communication between the UAV and GCS.Our research produced three algorithms.The other contributions and three algorithms are described below

    I.Developed an algorithm to relaunch the captured Mavlink packets for attacks.

    II.Developed an algorithm to retrieve meaningful information from captured Mavlink packets.

    III.Developed an algorithm to encrypt the Mavlink packet to secure the communication.

    (1) We performed and tested the experiment in a simulating environment using Ardupilot and Mission planner,which use the same Autopilot software as used in real UAVs.

    (2) We secured the Mavlink protocol for communication between UAV and GCS without affecting performance and efficiency.

    The rest of the paper is organized as follows.Section 1 presented the Introduction.Section 2 presents the literature review and related work.A detailed overview of the Mavlink protocol is given in Section 3.Section 4 describes the Security issue of the Mavlink protocol.In Section 5,the Mavlink protocol has been exploited in terms of security attacks and vulnerabilities.Two algorithms have been proposed in this section to exploit the Mavlink protocol vulnerabilities.Section 6 presents the proposed solution to secure the Mavlink protocol.The encryption algorithm and our security technique are illustrated in this section.Section 7 demonstrates the experimental results and our solution’s benchmarking with the original Mavlink protocol in terms of performance and efficiency.Finally,the conclusion of the paper is presented.

    2 Literature Review and Related Work

    The threat against UAVs is often targeted at the Unmanned Aerial System.It can be any components from the three,the UAV,the Ground Control Station,or the communication link between the two [43].In this study,the focus is on communication link attacks,as shown in Tab.1.

    Table 1:Communication link attacks on UAVs

    As Unmanned Systems has seen tremendous growth in recent years,therefore their security has become very crucial.Many researchers have contributed to this field,and much work has been done.The contributions can be mainly divided into two approaches 1) Hardware and 2) Software.

    In order to protect the Mavlink protocol,many embedded and hardware security technologies have been implemented.In the work proposed in [44],the researchers used additional encrypted communication channels with Raspberry Pi’s help to the UAV security issue.In this solution,the hardware has to communicate with GCS to regain control if an attack occurs.The downside of this approach is the time difference between the GCS and the Raspberry and the higher CPU consumption.Another drawback of the analysis is that it is just a theory that has yet to be tested on real UAVs.Our study implements the solution on a case study,and the results are given in Section 7.

    In another study [45],the authors secure the communication between the GCS and UAV through a proposed AES protocol with hardware implementation.The main focus of this study is confidentiality and authentication.However,the given hardware solution harms the system’s efficiency,CPU,and energy consumption because of the additional hardware weight.

    On the other hand,contributing to the software solutions of the Mavlink protocol,the authors consider using Caesar cipher cryptography for data encryption and authentication of Mavlink messages between the ground station and the UAV [46].One limitation of this study is that they didn’t give the results in the study.Another drawback of their work is that they are sending the secret Key in plain text.In [47],with efficient symmetrical key encryption algorithms,four effective cryptographic solutions were applied to reduce the confidentiality vulnerabilities in the Mavlink Protocol.Rabbit stream cipher,Salsa20 stream cipher,and XXTEA stream cipher are the four algorithms that have been proposed.All of them can conveniently encrypt Mavlink messages while keeping GCS and UAV communications private.The research articles [46,48] use the Caesar cryptography algorithm to encrypt Mavlink messages between GCS and UAV for cryptographic data purposes.However,in this solution,the hidden Key is sent to the UAV in plain text during the establishment process.It is effortless to find the Key at the time of capturing the packet.Thus,it is very easy to break its security.Moreover,there is no empirical evaluation of the study.Our research work implements the solution on a case study,and the results are presented below.In another study,another encryption RC5 is used to ensure that the communication is secure,but there are no details or validation of the experiment [49].Our study secured the communication between UAV and GCS and analyzed and validated the performance with clear results.The research [50] suggests using the UAV’s Private Key to add a digital signature to the data packing.In [51],another author proposed cryptographic encryption for authentication to ensure the integrity of data.However,both these studies are just proposed work.The author [47]conducted a vulnerability analysis and suggested a cryptographic algorithm to protect the Mavlink protocol without defining which algorithm to use.In [37],the authors proposed a solution called MAVSec to secure Mavlink communication.They compared four encryption algorithms,including AES-CBC,AES-CTR,RC4,and ChaCha20.Based on their result,ChaCha20 seems to be giving good results compared to others in terms of performance.However,in their proposed method,the encryption is only applied to the payload messages.The rest of the packet is the same.In our solution,we provided an extra layer of security that secures the whole packet.Several other studies have been carried out to secure the Mavlink communication protocol.Still,most of the studies are just proposed solutions or are in their early development.

    3 Overview of the Mavlink Protocol(Mavlink System Architecture)

    The Mavlink protocol specifies the framework for message composition and how to serialize messages on an application layer.The serialization process involves converting into a later stored or distributed format of a data structure or object state.After serialization,these messages are transferred to the lower layers,i.e.,the transport layer and physical layer,to be sent over the network.The lightweight construction allows it to accommodate a number of transport layers and media.The Mavlink protocol can be transmitted over sub-GHz frequencies like 433,868,and 915 MHz using Wi-Fi,TCP/IP,or low-bandwidth serial telemetry networks [52].

    The second option is to use normally a Wi-Fi or Ethernet network interface to stream Mavlink messages through IP networks.In the transport layer,the Mavlink autopilot accepts both UDP and TCP links between the ground control station and the UAV,depending on the application’s configuration.A connection between the client and the server is not needed for the datagram protocol UDP [53].Therefore,it is unreliable in terms of message delivery.The advantage is that it provides a fast,light alternative weight for streaming real-time,loss-tolerant communication.In contrast to UDP,TCP is a connection-oriented protocol,which ensures it has a mechanism for acknowledging that the request has been sent [54].This means that TCP is reliable in terms of communication.Depending on the requirements,the user has to choose whether to use UPD or TCP protocol.

    The communication between the UAV and Ground Station occurs through binary serialized messages.Since the communication is bidirectional,the message’s serialization and deserialization take place at both the sender and recipient ends.In comparison to other serialization approaches,Mavlink serialization uses fewer transmission messages and is significantly lighter.The Mavlink protocol has two available versions Mavlink 1.0 and Mavlink 2.0 [52].There’s another version of Mavlink called sMavlink.To the best of our knowledge,the sMavlink is not implemented yet.

    4 Security Issues of Mavlink Protocol

    The research and development in Unmanned Systems is relatively a new area,and still,a lot of research and development work is in progress.In parallel,the hackers and attackers find it an opportunity to explore new vulnerabilities and compromise these systems’security with various intentions.To address security issues and challenges,many researchers have contributed to Unmanned Systems security at different levels.One of the issues with those solutions is that they are only in the early stages of implementation and either or only proposed work.Before providing the solution to exploit the Mavlink protocol’s vulnerabilities,we need to understand the security challenges.In what follows,the security challenges of the Mavlink protocol can be divided into 1) Security Requirements,2) Security Threats/Attacks.This will help the practitioners and researchers in the future to develop security frameworks and threat models for Unmanned Aerial Vehicles.

    4.1 Security Requirements

    Overall,there has been much research done in terms of unmanned aerial systems security,but less work has been done on communication level security,particularly on the Mavlink protocol.A medical term is best suited for the security requirements as it says,“prevention is better than cure.” To avoid security threats and attacks,it is most important to understand the security requirements and avoid these unwanted situations.The Mavlink’s security requirements are summarized as confidentiality,integrity,availability,authentication,non-repudiation,authorization,and privacy [3] to secure the communication between the UAV and GCS and avoid threats.Fig.1 below presents the Mavlink security requirements.

    Figure 1:Mavlink security requirements

    4.2 Security Threats

    The connectivity between the UAV and GCS occurs through a wireless channel with the communication protocol’s help.In the case of the Mavlink protocol,this communication is vulnerable because the Mavlink protocol does not have standard security procedures.The only security check is that it checks if the packet is authentic and comes from an authentic source.The rest of the security requirements,such as confidentiality,is not natively available.The Mavlink does not have a subtle security mechanism and does not encrypt the messages.That means that the UAV and Ground Control Station communication is not secure and can be compromised very easily.Any hacker or attacker with an appropriate transmitter device can intercept the communication and communicate with the UAV.The intruder can use this vulnerability for their intended purpose,such as inject false commands into an existing mission or hijack the UAV completely.Further,these attacks are classified in terms of their outcome as follows.The classification is given in Tab.2.

    Based on the above security threats,we present our threat model and exploit the vulnerabilities of the Mavlink communication protocol.The threat model consists of two steps 1) to exploit the Mavlink packet and use it for active attacks 2) exploit the Mavlink packets and later use it for passive attacks.For this purpose,two algorithms are developed and presented in the next section.The threat model is illustrated below in Fig.2.As shown in Tab.1,our focus here is to target the UAV against the communication link attacks and hijack the UAV.Based on our proposed algorithm to exploit the Mavlink vulnerabilities in our experiment.First,we carried out a Man-in-the-middle attack to capture the packets.When the packets are captured,Algorithm 1 relaunches the captured Mavlink packets for a replay attack.This can be used for two purposes:1) relaunch the packets for a replay attack or an eavesdropping attack if it is an ongoing mission.If the intention here is to inject false data,a false injection attack can be carried out too by inserting false data into the captured packets.Our experiment,based on Algorithm 1,hijacked the UAV and took full control of it.Similarly,Algorithm 2 is basically developed to understand the captured packets communication between the UAV and GCS.It can be launched for passive attacks.

    Table 2:Security threats/attacks against mavlink protocol [3,55]

    5 Exploiting the Mavlink Protocol

    The experiment is carried out in a simulated environment using ArduPilot Software in the loop (SITL) and a simulating UAV.The Adrupilot SITL uses the same autopilot which is used in a real UAV.It replicates the real UAV in a simulated environment,and it also can operate a plan or a land rover without using any hardware.For the Ground Control Station,Mission Planner is selected,so at this moment,when we open Mission Planner,it automatically connects to the UAV via Mavlink protocol.If it does not connect automatically,it can be connected manually by clicking the connect button on the top right corner of the Mission Planner application.After Successful execution,the Unmanned Aerial Vehicle can be seen on the Mission Planner map as well.Here we can define a new mission,load an old mission and perform some other required tasks required for the mission.

    Figure 2:Threat model to exploit the Mavlink vulnerabilities

    5.1 Capturing the Mavlink Packets

    The Mavlink packets are captured by intruders using specific transmitters.Since we are simulating,the packets are captured on the local Wi-Fi network using the packet capturing tool Wireshark.We filtered the port numbers in Wireshark to get only our desired port number for Mavlink.It is effortless for a knowledgeable person to recognize the Mavlink packet structure.Once the packet structure is identified,it is easy to find the port from where the packets are coming and then filter only that port to get information of Mavlink packets.

    The detailed structure of the Mavlink packet is shown in Fig.3 above captured through Wireshark.The information displayed here is in binary and hex form.The packet is saved in a text file with proper formatting.In the next step,Algorithm 1 is developed to retrieve the useful information from this packet and relaunch it for an attack to get unauthorized access to the UAV.

    Figure 3:Captured mavlink protocol packet structure

    Algorithm 1: Launching the captured packet for attacks Input: Captured_Packet Output: Hijack_Drone Procedure(Exploiting_Mavlink)1 D0 ←Read(Caputred_Packets)2 D1 ←Read_Bytes(D0)3 Socket ←Define(Portnum)4 While(i ←Read(D1))5 Packet ←Get(Length,add,port)6 Send(Packet)→Port(Socket)7 GCS(Mission_Planner)←Received(Packets)8 End procedure

    Algorithm 1 is implemented using Java code.When the code is run,it gets the data from the Mavlink packet that we captured via Wireshark,stored in a text file.It reads the buffers and the start sending the data on a defined port number (14450 in our case).As long as it is reading the data from the packet,it keeps sending the data.Since we are using a mission planner on our side,the Mission Planner received the data via the specified port number.All the UAV information from which the packet was captured is now visible,such as mission data and GPS location.If it’s an ongoing mission,the UAV can completely hijack from Mission Planner as now it has control of the UAV.Moreover,any other intended attack can be launched,such as eavesdropping,GPS Spoofing,False mission data injection.

    5.2 Converting the Packet into a Human-Readable Form

    The next step is to exploit the Mavlink protocol’s vulnerability that it is not secure and the data transmitted is not encrypted.For this purpose,we developed Algorithm 2,which converts the information captured by the Wireshark to a human-readable format in plain text and retrieves the meaningful information from that.This algorithm is also implemented using Java Coding.

    Algorithm 2: Getting secret information in plain text Input: Captured_Packets Output: Plain_Text Procedure(Exploiting_Mavlink)1 CreateDroneObject 2 DefineMavlinkMessageHandler 3 D0 ←read(Datablock_Packets)4 While(Connection!=0)5 Packet ←Get(length,addr,port)6 Response(Mavlink_Library)←read(Mavlink_Messages)7 For(i ←Read(Packet))8 D0 ←Parse(Packet)+0x00ff 9 D1 ←Parse(Hex_Char)10 DroneObject ←Ready(D0,D1)(Continued)

    11 if (Packet!=Null)12 Unpack(Packet)13 Received_Data(Binary,Hex)14 Plain_Text ←Convert(Binary,Hex)15 Sec_Inf ←Get(GPS,payload,alt,etc.,)16 End procedure?

    In this algorithm,first,a connection is established,and then a Mavlink message handler is defined,which checks the Mavlink messages and understands what type of Mavlink message it is handling.Then the connection is checked if it is connected to the drone object.As long as the connection is built,first,it will read the data block and save it.Then we have our library,which understands the Mavlink message.After this,the data is parsed,and the hex value 0x00ff is added,which checks which type of Mavlink packet it is,the actual hex value is received.Then we parse the data from the derived hex characters.An object is made for the Mavlink packet and checks if the packet is not null (real packet).If the packet is real,it unpacks the Mavlink packet and fetches the data into human-readable form.All attributes can be fetched from here,such as sensors data,roll,pitch,radio frequency,GPS,etc.

    6 Proposed Solution

    In this section,we propose our solution for the runtime security of the Mavlink protocol for an ongoing mission between UAV and GCS.Our approach is based on a cryptographic mechanism and our mapping technique.A security layer is added to the original Mavlink protocol,and the overall proposed model is given in Fig.4.We encrypt the information in the Mavlink packet and make sure that when the packet is captured through Wireshark or any transmitter device,1) it can’t be relaunched to take control of the UAV,i.e.,the captured packet is useless for the intruder.2) to encrypt the packets so that even if an intruder captures the packet,he/she still would not be able to get the meaningful information from this packet.We take a case study for our solution.As stated earlier,the experiment is carried out in a simulated environment.We assume that the ongoing mission is a minimum of ten minutes and a maximum of 3 h,mostly the case in terms of the UAV’s civilian applications.The UAV and GCS are connected through Wi-Fi.

    First,we apply custom mapping to the Mavlink packet,which replaces the character’s ASCII.The data is basically bytes that are in binary and hex form.It will give us an ASCII string that is composed of random characters.This can be reverted only with the same mapping technique.Our approach introduces the concept of lists on both UAV and GCS sides,as shown in Fig.5.The list has two columns,a serial number,and a key.A serial number is a representation number from the list to match the Key,while the key column contains the actual Key for the Caesar cipher through which the message will be encrypted.For instance,if the Key against serial number 2 is selected from the UAV side,it means that the GCS should decrypt the same serial number 2 to decrypt the message.In communication,instead of sharing the Key,the serial number is sent.So that even if the packet is captured,the intruder won’t get the Key but the serial number,which is meaningless to decrypt the cipher.The serial number is added to the start of the packet,which takes four bytes.Once the serial number is added,the Caesar cipher encryption is applied to the packet based on the Key against the selected serial number in the list.It is thenconverted into bytes and sent to the GCS.

    Figure 4:Proposed solution to enhance and secure the mavlink communication protocol

    As the UAV receives the data,the first four bytes of the packets are taken as they contain the serial number.The serial number is matched with the list on the UAV side.Based on the serial number,the Key is identified,and a reverse Caesar cipher is applied to decrypt the message.When the data is decrypted,we get a character string that is still encrypted with our custom mapping and can be reverted only with our mapping reverting technique.We have also integrated the encryption technique in the Mission Planner to ensure safe communication between the autopilot of the SITL UAV and the Ground Control Station to decipher the obtained packet and to retrieve the original Mavlink message.An algorithm is developed to carry out this encryption process.The coding is implemented in Java.The pseudo-code of algorithm number 3 is given below in two steps—Algorithm 3 for Encrypting and sending the packets and Algorithm 4 for receiving and decrypting the packets.

    Figure 5:Lists of serial number and secret key for encryption

    Algorithm 3: Encrypting the mavlink packet Input: Mavlink_Packets Output: Encrypted_Mavlink_Packets Procedure(Encryption_Mavlink)1 CreateDroneObject 2 D0 ←Packet_Data 3 inveral ←IV 4 if (Packet_Count=Interval)5 Reset(counter)6 Swap(Key_List)7 PickRandomIndex 8 Fetch_Key ←Rand(Index)9 Hex_String ←Convert(Fetch_Key)10 For(n ←Each_Char)11 if (Char==Alphabet)12 Caesarcipher_Encrypt(Char,Key)13 Else if (char==Num)14 Caesarcipher_Encrypt(char,key+2)15 Switch 16 Custom_Mapping(Char)→Encrypted_String 17 Send Encrypted Packets 18 End procedure

    Algorithm 4: Receiving and decrypting packet Input: EncryptedMavlink_Packets Output: Decrypted_Mavlink_Packets Procedure(Decryption_mavlink)1 Create Drone Object 2 D0 ←Packet_Data 3 inveral ←IV 4 if (Packet_Count=Interval)5 Reset(Counter)6 Swap(Key_List)7 S_number ←Fetch(Packet)//Fetch the serial number form first 4 bytes 8 Fetch_Key ←List(S_Number)9 Remove first 4 Bytes 10 For(n ←Each_Char)11 Switch 12 Custom_Reverse_Mapping(Char)→Decrypted_String 13 if (char==Alphabet)14 Caesarcipher_Decrypt(Char,Key)15 Else if (Char==Num)16 Caesarcipher_Decrypt(Char,Key-2)17 Original Mavlink Packet 18 End procedure

    While exchanging the UAV and GCS data,the serial numbers are selected randomly from the table for every single request.It allows to change Key for every single request and encrypt every packet with a different key.This means that the next Mavlink packet will not send the same serial number but instead a new serial number with a new key against it to encrypt the message.When a hundred requests are completed,the serial numbers and the Key in the list are shuffled randomly in parallel on both sides so that the lists are similar on both sides.In case there at one end,the list is not updated after the iteration and sent to the other side,then the communication cannot happen,and the UAV/GCS will be considered unauthorized.

    7 Performance Evaluation and Benchmarking

    This section provides an exhaustive analysis of the Mavlink protocol’s efficiency integrated with our encryption technique concerning the protocol’s security.In addition,the output is evaluated in terms of resource use,such as CPU processing and memory consumption rate.We benchmark our proposed technique with the original insecure Mavlink protocol.In contrast,our technique makes sure the communication between the UAV and GCS is secured and the information shared is not vulnerable.Thus,our technique secures the Mavlink packet without affecting its performance and efficiency.

    The experiment is to run a computer with an Intel 2.6 GHz Core i7 CPU;the memory or RAM is 8 GB.The operating system is Microsoft Windows 10 (64-bit) with Mission Planner 1.3.74,Ardupilot version 3.2.1,and UAV copter in SITL.The UAV is connected using UDP port number 14550.

    7.1 Security

    The experiment results show that the packet is encrypted with our encryption technique.The information shared cannot be retrieved when the packet is captured.To test this,we analyzed the communication between the UAV and GCS through our Mavlink encryption technique.First,the secured Mavlink packets are captured through Wireshark.Then the captured packets are sent based on Algorithm 1 to launch for attacks.The results show that when the packets are sent,the mission planner does not recognize the packets as they cannot retrieve the packet’s data.Furthermore,based on Algorithm 2,it is tested whether the packets can be converted into a human-readable format or no;the results are negative.This means that the packets are useless to replicate for launching attacks as they are encrypted to secure the communication between UAV and GCS.

    7.2 Transfer Speed(Packets Count)

    The experimental results show that our approach sends almost the same number of packets as the original Mavlink does per second time.There’s just a slight difference of one or two packets up and down which is negligible.The number of packets sent per second time by the original Mavlink protocol and our approach are given in Fig.6.

    Figure 6:Number of packets transmission (in seconds)

    7.3 Memory Consumption

    Another important parameter for performance evaluation is memory consumptions.The results show that our technique’s memory consumption is almost the same as the original Mavlink packet,as presented in in Fig.7.

    7.4 CPU Usage

    Another important parameter for performance evaluation is memory consumptions.The results show that our technique’s memory consumption is almost the same as the original Mavlink packet,as presented in in Fig.8.

    8 Conclusion

    Figure 7:Memory consumptions (in MBs)

    Figure 8:CPU processing (in percentage)

    In this research work,a new approach is proposed and applied to secure the Mavlink communication protocol.The technique is based on a cryptographic encryption algorithm and custom mapping.An additional security layer is added to the Mavlink communication protocol to secure the whole packet.A new concept of lists is introduced,which sends a serial number instead of sending the secret Key for encryption.The Key against the serial number of both sides is matched,and the messages are encrypted and decrypted.The results are carried out in simulating the environment using virtual UAV via Ardupilot SITL,which uses the same autopilot as the real Planes and UAVs.The result shows that our technique makes the communication secure without affecting the original protocol’s performance and efficiency.The proposed solution is compared with the existing literature,such as MAVsec and benchmarked with the original insecure Mavlink protocol to validate the results in terms of transfer speed,performance,and efficiency.The current scope and limitation of the work are that it is best suited for missions that’s duration is min 10mins to a maximum of 3 h.In the future,we are working on making the protocol adaptive and self-deciding to apply different levels of encryption based on the mission requirements.

    Acknowledgement: The authors acknowledge the Center for Smart Society 5.0 [CSS5],School of Computing and Engineering,Taylor’s University,for their support to complete this research.

    Funding Statement: The authors received no specific funding for this study.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品久久久久久久久免| 韩国av在线不卡| 免费搜索国产男女视频| 最近的中文字幕免费完整| 日本在线视频免费播放| 不卡视频在线观看欧美| 久久人人精品亚洲av| 日本色播在线视频| 男女那种视频在线观看| 22中文网久久字幕| 精品一区二区三区视频在线观看免费| 又黄又爽又免费观看的视频| 又爽又黄a免费视频| 淫妇啪啪啪对白视频| 欧美中文日本在线观看视频| 国产亚洲精品久久久com| 久久午夜福利片| 国内精品宾馆在线| 1024手机看黄色片| 日日摸夜夜添夜夜添小说| av在线天堂中文字幕| 1000部很黄的大片| 午夜视频国产福利| 欧美极品一区二区三区四区| 国产黄色小视频在线观看| 国产成人91sexporn| 天堂av国产一区二区熟女人妻| 午夜激情欧美在线| 精品久久久久久久末码| 91麻豆精品激情在线观看国产| 日韩av不卡免费在线播放| av.在线天堂| 12—13女人毛片做爰片一| 亚洲国产精品sss在线观看| 国产精品,欧美在线| 亚洲无线在线观看| 午夜亚洲福利在线播放| 国产真实乱freesex| 99热这里只有精品一区| 看片在线看免费视频| 看黄色毛片网站| 国产精品99久久久久久久久| 中文资源天堂在线| 伦精品一区二区三区| 国产av麻豆久久久久久久| 天堂av国产一区二区熟女人妻| 日韩在线高清观看一区二区三区| 国产精品99久久久久久久久| 国产白丝娇喘喷水9色精品| 国产成人freesex在线 | 久久人人精品亚洲av| 男女啪啪激烈高潮av片| 亚洲激情五月婷婷啪啪| 亚洲美女黄片视频| 五月伊人婷婷丁香| 久久久久久久久久黄片| 国产成人福利小说| 大香蕉久久网| 丝袜喷水一区| 亚洲在线观看片| 午夜精品一区二区三区免费看| 99热精品在线国产| av黄色大香蕉| 啦啦啦观看免费观看视频高清| 欧美色视频一区免费| 精品99又大又爽又粗少妇毛片| 中文字幕av在线有码专区| 中文字幕免费在线视频6| 最近最新中文字幕大全电影3| 欧美高清性xxxxhd video| 麻豆av噜噜一区二区三区| 在线看三级毛片| 老师上课跳d突然被开到最大视频| 久久久欧美国产精品| 国产精品1区2区在线观看.| 亚洲欧美日韩东京热| 婷婷亚洲欧美| 精品少妇黑人巨大在线播放 | 国产精品免费一区二区三区在线| 听说在线观看完整版免费高清| 校园人妻丝袜中文字幕| a级毛片免费高清观看在线播放| 一个人观看的视频www高清免费观看| 欧美色视频一区免费| 如何舔出高潮| 中出人妻视频一区二区| 久久久久久久久久久丰满| 亚洲图色成人| 亚洲久久久久久中文字幕| 国产综合懂色| 搡老熟女国产l中国老女人| 成年版毛片免费区| 身体一侧抽搐| 亚洲乱码一区二区免费版| 深夜精品福利| 我的女老师完整版在线观看| 亚洲欧美清纯卡通| 人妻丰满熟妇av一区二区三区| 日本黄大片高清| 久久久久久久久久黄片| 一级黄片播放器| 久久久欧美国产精品| 日日啪夜夜撸| 一区二区三区四区激情视频 | 午夜视频国产福利| 91av网一区二区| 两个人视频免费观看高清| 久久精品国产亚洲网站| 久久久久免费精品人妻一区二区| 无遮挡黄片免费观看| 我要搜黄色片| 久久精品国产亚洲av天美| 一个人看的www免费观看视频| 男女下面进入的视频免费午夜| 91久久精品国产一区二区三区| 成人av在线播放网站| 一级毛片aaaaaa免费看小| 两个人的视频大全免费| 亚洲av一区综合| 亚洲精品456在线播放app| 熟妇人妻久久中文字幕3abv| 美女大奶头视频| а√天堂www在线а√下载| 一级av片app| 欧美日韩国产亚洲二区| 国产 一区精品| 免费大片18禁| 欧美3d第一页| 毛片女人毛片| 国产精品福利在线免费观看| 日韩精品有码人妻一区| 亚洲无线在线观看| 亚洲精品久久国产高清桃花| 免费看av在线观看网站| 精品日产1卡2卡| 在线播放国产精品三级| 少妇的逼水好多| 免费无遮挡裸体视频| 在线观看av片永久免费下载| 久久99热这里只有精品18| 我要看日韩黄色一级片| 最近2019中文字幕mv第一页| 亚洲最大成人中文| 菩萨蛮人人尽说江南好唐韦庄 | 在线观看av片永久免费下载| 欧美zozozo另类| 久久精品国产鲁丝片午夜精品| 欧美日韩一区二区视频在线观看视频在线 | 一卡2卡三卡四卡精品乱码亚洲| 少妇熟女aⅴ在线视频| 久久精品久久久久久噜噜老黄 | 九九热线精品视视频播放| 午夜爱爱视频在线播放| 国产精品不卡视频一区二区| www.色视频.com| 亚洲va在线va天堂va国产| 免费大片18禁| 毛片一级片免费看久久久久| 国产欧美日韩精品一区二区| 一a级毛片在线观看| 99久久无色码亚洲精品果冻| 午夜久久久久精精品| 亚洲中文字幕一区二区三区有码在线看| 国产精品三级大全| 午夜福利成人在线免费观看| 伊人久久精品亚洲午夜| 久久99热这里只有精品18| 男女视频在线观看网站免费| 欧美丝袜亚洲另类| 淫妇啪啪啪对白视频| 又爽又黄a免费视频| 国产美女午夜福利| 亚洲无线在线观看| 日韩成人伦理影院| 少妇人妻精品综合一区二区 | 欧美潮喷喷水| 日日摸夜夜添夜夜爱| 美女黄网站色视频| 欧美又色又爽又黄视频| 久久精品国产亚洲av涩爱 | 丝袜美腿在线中文| 最近最新中文字幕大全电影3| 身体一侧抽搐| 少妇猛男粗大的猛烈进出视频 | 亚洲国产精品国产精品| 少妇猛男粗大的猛烈进出视频 | 国产亚洲精品av在线| 中文字幕av在线有码专区| 国产精品亚洲一级av第二区| 美女免费视频网站| 亚洲精品国产成人久久av| 日韩亚洲欧美综合| 观看免费一级毛片| 在线观看免费视频日本深夜| 最新中文字幕久久久久| 国国产精品蜜臀av免费| 国内精品一区二区在线观看| 亚洲经典国产精华液单| 亚洲av中文av极速乱| 激情 狠狠 欧美| 在现免费观看毛片| 亚洲av电影不卡..在线观看| 波多野结衣巨乳人妻| 人人妻人人澡欧美一区二区| 搡老岳熟女国产| 波多野结衣高清作品| 中文字幕熟女人妻在线| 毛片一级片免费看久久久久| 国产麻豆成人av免费视频| 国产v大片淫在线免费观看| 99热这里只有是精品50| 欧美最黄视频在线播放免费| 日日摸夜夜添夜夜添av毛片| 亚洲人成网站在线播放欧美日韩| 精品熟女少妇av免费看| 男女啪啪激烈高潮av片| 国内少妇人妻偷人精品xxx网站| 3wmmmm亚洲av在线观看| 久久这里只有精品中国| 97碰自拍视频| 身体一侧抽搐| 一个人看的www免费观看视频| 国产精品久久久久久久久免| 亚洲中文日韩欧美视频| videossex国产| 一个人看视频在线观看www免费| 亚洲成人av在线免费| 午夜福利18| 欧美日韩国产亚洲二区| 国内精品一区二区在线观看| 久久久久国内视频| 男女视频在线观看网站免费| 久久久国产成人免费| 欧美3d第一页| 中文字幕人妻熟人妻熟丝袜美| 赤兔流量卡办理| 国产免费一级a男人的天堂| 久久中文看片网| 性插视频无遮挡在线免费观看| 精品午夜福利视频在线观看一区| 久久亚洲国产成人精品v| 日韩av不卡免费在线播放| 日韩精品有码人妻一区| 九九热线精品视视频播放| 噜噜噜噜噜久久久久久91| 欧美xxxx性猛交bbbb| 亚洲欧美日韩高清在线视频| 国产毛片a区久久久久| 色哟哟哟哟哟哟| 精品人妻视频免费看| 久久久久久大精品| 欧美成人一区二区免费高清观看| 人妻久久中文字幕网| 精品久久久久久成人av| 国产高清视频在线观看网站| 俄罗斯特黄特色一大片| 精品人妻熟女av久视频| 成人精品一区二区免费| 嫩草影视91久久| 男女边吃奶边做爰视频| 一进一出抽搐动态| 中文字幕av在线有码专区| 九九久久精品国产亚洲av麻豆| 韩国av在线不卡| 在线天堂最新版资源| 少妇裸体淫交视频免费看高清| 久久久久久久亚洲中文字幕| 成人国产麻豆网| 在线免费观看不下载黄p国产| 变态另类成人亚洲欧美熟女| 69人妻影院| 国内精品久久久久精免费| 一级a爱片免费观看的视频| 最近在线观看免费完整版| 伦理电影大哥的女人| 在现免费观看毛片| 国产三级中文精品| 少妇被粗大猛烈的视频| 一夜夜www| 成熟少妇高潮喷水视频| 久久草成人影院| 一个人免费在线观看电影| 精品人妻熟女av久视频| 看黄色毛片网站| 国产三级中文精品| 亚洲av免费在线观看| 亚洲最大成人手机在线| 亚洲人成网站高清观看| 欧美最新免费一区二区三区| 97超视频在线观看视频| 最近在线观看免费完整版| 久久久久久久久中文| 亚洲电影在线观看av| 成人特级黄色片久久久久久久| 淫妇啪啪啪对白视频| 成人综合一区亚洲| 99热精品在线国产| 精品一区二区三区人妻视频| 国产精品国产三级国产av玫瑰| 毛片一级片免费看久久久久| 成年免费大片在线观看| 美女被艹到高潮喷水动态| 国产老妇女一区| 九九在线视频观看精品| 免费无遮挡裸体视频| 日韩一本色道免费dvd| 精华霜和精华液先用哪个| 九色成人免费人妻av| 日韩av在线大香蕉| 国产成年人精品一区二区| 亚洲人成网站高清观看| 国产亚洲精品av在线| 两个人的视频大全免费| 九九热线精品视视频播放| 一级黄片播放器| 网址你懂的国产日韩在线| 国产精品三级大全| 国产黄色小视频在线观看| 内地一区二区视频在线| 99久久九九国产精品国产免费| 亚洲美女视频黄频| 国产成人aa在线观看| 国产探花在线观看一区二区| 熟女电影av网| or卡值多少钱| 内地一区二区视频在线| 特级一级黄色大片| 97人妻精品一区二区三区麻豆| 成人无遮挡网站| 成人一区二区视频在线观看| www日本黄色视频网| 男插女下体视频免费在线播放| 亚洲美女搞黄在线观看 | 久久精品国产亚洲av涩爱 | 国产一区二区在线av高清观看| 性插视频无遮挡在线免费观看| 国产视频内射| 亚洲av二区三区四区| 国产精品日韩av在线免费观看| 蜜桃亚洲精品一区二区三区| 日本成人三级电影网站| 少妇被粗大猛烈的视频| 丰满乱子伦码专区| 欧美色欧美亚洲另类二区| 天天一区二区日本电影三级| 91麻豆精品激情在线观看国产| 乱系列少妇在线播放| 色综合色国产| 少妇的逼好多水| 亚洲国产精品成人久久小说 | 国产亚洲精品av在线| 久久人人爽人人爽人人片va| 免费观看精品视频网站| 五月玫瑰六月丁香| 99热精品在线国产| 国产精品日韩av在线免费观看| 成人一区二区视频在线观看| 九色成人免费人妻av| 成人综合一区亚洲| 男女边吃奶边做爰视频| 在线国产一区二区在线| 噜噜噜噜噜久久久久久91| 少妇的逼水好多| 国产精品日韩av在线免费观看| 亚洲丝袜综合中文字幕| 色综合站精品国产| 真人做人爱边吃奶动态| 激情 狠狠 欧美| 亚洲精华国产精华液的使用体验 | 在线免费观看不下载黄p国产| 22中文网久久字幕| 国产成人aa在线观看| 在线观看av片永久免费下载| 国产中年淑女户外野战色| 成人毛片a级毛片在线播放| 久久九九热精品免费| 亚洲国产高清在线一区二区三| 最近手机中文字幕大全| 在线a可以看的网站| 精品国产三级普通话版| 精品一区二区免费观看| 亚洲精品日韩在线中文字幕 | 久久久久久久久大av| 日韩欧美精品免费久久| 午夜免费男女啪啪视频观看 | 一卡2卡三卡四卡精品乱码亚洲| 精品一区二区三区人妻视频| 69人妻影院| 亚洲在线自拍视频| 一级a爱片免费观看的视频| 国产成人影院久久av| 欧美不卡视频在线免费观看| 天天躁日日操中文字幕| 国产熟女欧美一区二区| 给我免费播放毛片高清在线观看| 国产成人精品久久久久久| 给我免费播放毛片高清在线观看| 成人毛片a级毛片在线播放| 可以在线观看的亚洲视频| 日韩欧美 国产精品| 男插女下体视频免费在线播放| 欧美三级亚洲精品| 人妻少妇偷人精品九色| 男人舔奶头视频| 99热全是精品| 18禁黄网站禁片免费观看直播| 精品日产1卡2卡| 一区福利在线观看| 乱码一卡2卡4卡精品| 国产黄色视频一区二区在线观看 | 国产精品1区2区在线观看.| 搡女人真爽免费视频火全软件 | 在线播放无遮挡| 日日撸夜夜添| 亚洲精品影视一区二区三区av| 色5月婷婷丁香| 国产一区二区在线av高清观看| 国产69精品久久久久777片| 悠悠久久av| 嫩草影院新地址| 日韩大尺度精品在线看网址| 3wmmmm亚洲av在线观看| 最近的中文字幕免费完整| 欧美日韩一区二区视频在线观看视频在线 | 热99re8久久精品国产| 国产黄片美女视频| 亚洲精品久久国产高清桃花| 精品不卡国产一区二区三区| 国内精品宾馆在线| 男人舔奶头视频| 麻豆av噜噜一区二区三区| 18禁黄网站禁片免费观看直播| 亚洲欧美精品综合久久99| 亚洲美女视频黄频| 成人美女网站在线观看视频| 综合色av麻豆| 淫妇啪啪啪对白视频| 精品久久国产蜜桃| 成人永久免费在线观看视频| av卡一久久| 国产精品1区2区在线观看.| 男插女下体视频免费在线播放| 麻豆久久精品国产亚洲av| 久久精品夜色国产| 少妇人妻一区二区三区视频| 成人亚洲精品av一区二区| 免费av毛片视频| 淫妇啪啪啪对白视频| 亚洲国产欧美人成| 一个人看视频在线观看www免费| 欧美在线一区亚洲| 又黄又爽又免费观看的视频| 免费观看人在逋| 色5月婷婷丁香| 日日摸夜夜添夜夜爱| 国语自产精品视频在线第100页| 亚洲av电影不卡..在线观看| 在线看三级毛片| 变态另类成人亚洲欧美熟女| 丰满乱子伦码专区| 十八禁国产超污无遮挡网站| 美女大奶头视频| 国产人妻一区二区三区在| 插逼视频在线观看| 91在线精品国自产拍蜜月| 亚洲人成网站在线观看播放| 国产精品国产三级国产av玫瑰| 亚洲久久久久久中文字幕| 日本色播在线视频| 国产精品一二三区在线看| www日本黄色视频网| av黄色大香蕉| 女生性感内裤真人,穿戴方法视频| 搡老熟女国产l中国老女人| 日日摸夜夜添夜夜爱| 亚洲中文字幕日韩| 国产麻豆成人av免费视频| 精品人妻视频免费看| 中文字幕免费在线视频6| 色综合亚洲欧美另类图片| 国产探花在线观看一区二区| 一级毛片久久久久久久久女| 三级男女做爰猛烈吃奶摸视频| 亚洲欧美日韩高清专用| 免费看a级黄色片| 一卡2卡三卡四卡精品乱码亚洲| 色吧在线观看| 国产精品人妻久久久久久| 日日干狠狠操夜夜爽| 国产熟女欧美一区二区| 亚洲五月天丁香| 又黄又爽又免费观看的视频| 天堂√8在线中文| 免费在线观看影片大全网站| 成人无遮挡网站| 黄色日韩在线| 我要看日韩黄色一级片| 日韩欧美在线乱码| 久久久久久久午夜电影| 久久久精品大字幕| 国产一区二区激情短视频| 日本在线视频免费播放| 男女做爰动态图高潮gif福利片| 国产精品久久久久久久久免| 在线观看一区二区三区| 欧美国产日韩亚洲一区| 日韩欧美精品v在线| 男人狂女人下面高潮的视频| 精品人妻视频免费看| 国产v大片淫在线免费观看| 人人妻人人澡欧美一区二区| 免费看av在线观看网站| 村上凉子中文字幕在线| 亚洲国产精品成人久久小说 | 日韩,欧美,国产一区二区三区 | 99视频精品全部免费 在线| 日韩欧美精品免费久久| 99久久九九国产精品国产免费| 欧美性猛交黑人性爽| 黄色欧美视频在线观看| 亚洲av成人av| 久久久久久久亚洲中文字幕| 长腿黑丝高跟| 久久久精品大字幕| 成人毛片a级毛片在线播放| 欧美色视频一区免费| 日韩精品中文字幕看吧| 婷婷色综合大香蕉| 亚洲精品粉嫩美女一区| 国产大屁股一区二区在线视频| 亚洲精品成人久久久久久| 麻豆乱淫一区二区| 日本黄大片高清| 久久午夜亚洲精品久久| 高清午夜精品一区二区三区 | 亚洲最大成人av| 久久久久久久久中文| 听说在线观看完整版免费高清| 天堂网av新在线| 国产一区二区亚洲精品在线观看| 伦理电影大哥的女人| 国产人妻一区二区三区在| eeuss影院久久| 中文字幕久久专区| 亚洲av熟女| 人妻夜夜爽99麻豆av| 亚洲欧美精品综合久久99| 亚洲熟妇中文字幕五十中出| 看免费成人av毛片| 国内精品一区二区在线观看| 最近在线观看免费完整版| av国产免费在线观看| 国产成人a区在线观看| 一个人免费在线观看电影| 亚洲中文字幕一区二区三区有码在线看| 干丝袜人妻中文字幕| 亚洲自偷自拍三级| 亚洲最大成人中文| 国产人妻一区二区三区在| avwww免费| 老师上课跳d突然被开到最大视频| 乱人视频在线观看| av.在线天堂| 久久精品国产99精品国产亚洲性色| 久久精品国产清高在天天线| 国产午夜精品论理片| 久久九九热精品免费| av国产免费在线观看| 美女被艹到高潮喷水动态| 国产成人a∨麻豆精品| 97碰自拍视频| 老师上课跳d突然被开到最大视频| 18禁在线播放成人免费| 永久网站在线| 亚洲av电影不卡..在线观看| 国产精品日韩av在线免费观看| 免费av不卡在线播放| 免费在线观看成人毛片| 丰满人妻一区二区三区视频av| 91狼人影院| 日韩亚洲欧美综合| 最新中文字幕久久久久| 久久久欧美国产精品| 亚洲va在线va天堂va国产| 国产一区二区三区av在线 | 精品一区二区三区人妻视频| 成人亚洲精品av一区二区| 久久精品综合一区二区三区| 小说图片视频综合网站| 免费看av在线观看网站| 国产av不卡久久| 少妇熟女aⅴ在线视频| 午夜免费男女啪啪视频观看 | 久久韩国三级中文字幕| 老熟妇乱子伦视频在线观看| 成人漫画全彩无遮挡| 99热精品在线国产| 国产精品国产三级国产av玫瑰| 久久久国产成人精品二区| 一区二区三区高清视频在线| 禁无遮挡网站| 成人特级黄色片久久久久久久| 国内精品宾馆在线| 村上凉子中文字幕在线| 中文字幕人妻熟人妻熟丝袜美| 久久久久久国产a免费观看| 国产激情偷乱视频一区二区| 国产一区二区在线观看日韩| 亚洲第一电影网av| 欧美精品国产亚洲| 国产单亲对白刺激| 无遮挡黄片免费观看| 性色avwww在线观看| 亚洲av中文av极速乱| 亚洲第一电影网av|