• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things(IoTs)

    2022-11-09 08:15:20KanwalImranNasreenAnjumAbdullahAlghamdiAsadullahShaikhMohammedHamdiandSaeedMahfooz
    Computers Materials&Continua 2022年1期

    Kanwal Imran,Nasreen Anjum,Abdullah Alghamdi,Asadullah Shaikh,Mohammed Hamdi and Saeed Mahfooz

    1Department of Computer Science,University of Peshawar,Peshawar,25121,Pakistan

    2Department of Informatics,King’s College London,London,SE5 9RJ,UK

    3College of Computer Science and Information Systems,Najran University,Najran,61441,Saudi Arabia

    Abstract:IPv6 over Low Power Wireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPAN allowsnodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard,thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network.The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard),but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers.The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure.Therefore,from security perspectives,6LoWPAN is vulnerable to many attacks such as replay attack,Man-in-the-Middle attack,Impersonation attack,and Modification attack.This paper proposes a secure and efficient cluster-based authentication scheme (CBAS) for highly constrained sensor nodes in 6LoWPAN.In this approach,sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node.The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes.To ensure the low signaling overhead during the registration,authentication,and handover procedures,we also introduce lightweight and efficient registration,de-registration,initial authentication,and handover procedures,when a sensor node or group of sensor nodes join or leave a cluster.Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.Our simulation experiments show that CBAS has reduced the registration delay by 11%,handoff authentication delay by 32%,and signaling cost by 37%compared to the SGMS(Secure Group Mobility Scheme)and LAMS(Light-Wight Authentication&Mobility Scheme).

    Keywords: IoT;cyber security;security attacks;authentication delay;handover delay;signaling cost;6LoWPAN

    1 Introduction

    The Internet of Things (IoTs) is the new complex network that is connecting billions of smart devices and enabling access to information “anytime”and “anywhere”and using “anything”and “anyone”.The worldwide adoption of wireless technologies such as Wi-Fi,Bluetooth,and Zigbee has improved IoT infrastructure’s scalability and has massively increased the number of connected devices.According to [1],the number of IoT devices worldwide are predicted to reach more than 25.4 billion in 2030.However,this results in limitations for the devices connected via the wireless communication links such as high cost,low battery power,high energy consumption,limited communication distance,limited IP addresses,and weak security [2-4].

    New protocols,standards,and technologies have been adopted in IoTs to support the wireless nodes with limited and heterogeneous resources such as limited computation power,small storage capacity and,low battery power and interconnected via the lossy and error prone radio links [5,6].For instance,based on the IPv6 and IEEE 802.15.4 standard the IETF (Internet Engineering Task Force) has developed a standard called 6LoWPAN (IPv6 over low Power Wireless Personal Area Networks) for highly constrained nodes interconnected via the lossy links.6LoWPAN is the intermediate layer between the standard IPv6 and low power and lossy IEEE 802.15.4 wireless network [7,8].The main objective of 6LoWPAN is to provide fast,efficient,and reliable connectivity to highly constrained nodes using the IPv6 protocol [9].Many research studies claimed that 6LoWPAN is the ideal solution to provide the seamless and reliable connectivity to highly constrained sensor nodes in IoTs [10-13].However,from the security perspective,6LoWPAN requires a considerable attention from the research community.For instance,the data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption standard),but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher levels such as secure and efficient authentication of sensor nodes [14-16].The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure.Therefore,from security perspectives,6LoWPAN is vulnerable to many attacks such as replay attack,Man-in-the-Middle attack,Impersonation attack,and Modification attack.

    1.1 Related Work and Motivation

    To resolve the authentication security issue of IP-based sensor nodes in 6LoWPAN,several authentication schemes have been proposed.For instance,the authors in [17] have proposed an authentication scheme which provides mutual authentication for M2M communication to achieve a secure transmission during the mobility in 6LoWPAN networks.The proposed scheme enables a 6LoWPAN sensor node to authenticate with the remote server by establishing session keys.However,the details of pairwise pre-distribution keys among the sensor nodes are missing in this paper.The authors in [18] proposed a secure admission control scheme for 6LoWPAN.The proposed solution includes node authorization,detection,authentication,and data filtering to discard data from the unauthorized nodes.It uses the cryptographic algorithm based on the AES symmetric key to isolate the nodes which are not authorized and eligible to connect with the legitimate nodes or network.The authors in [19] presented a secret key distribution and detection method to provide resistance against the anti-capture attack.A secure group mobility scheme (SGMS) has been proposed in [20].The SGMS ensures the handovers of multiple nodes simultaneously by using the cryptographic algorithms.However,this scheme involves extra signaling exchange among the nodes in 6LoWPAN,making this scheme less efficient.The authors in [21] proposed a lightweight authentication scheme for resource-constrained industrial devices in 6LoWPAN.Although the proposed solution offers low computation cost,it still has handover and signaling overhead.

    1.2 Proposed Scheme and Contributions

    Interestingly,all the above-mentioned authentication schemes have been proposed to authenticate a single node at a time.When a single sensor node joins a network;it must authenticate when it connects to a new domain which increases the handover latency and makes transmission slow and inefficient.Furthermore,single node authentication schemes require additional registration and authentication signals exchange among the AAA (Authentication,Authorization and Accounting),MAG (Mobile Access Gateway) and LMA (Local Mobility Anchor),which further increases the handoff latency and packet loss during the transmission.

    Our proposed approach is designed to overcome the limitations in single node authentication schemes [17-21].We propose a Secure Cluster-Based Authentication Scheme (CBAS) for 6LoWPAN based on the PMIPv6 (Proxy Mobile IPv6) developed by a working group NETLMM(Network-based localized mobility management) [22-24].In contrast to [17-21],we propose to merge the functions of LMA and AAA into the MAG.Now the handover process is performed between two neighboring MAGs without going through the LMA,therefore reducing the signaling cost during the handover procedure.MAG is also responsible for the authentication and binding of a cluster of sensor nodes through the new entity we called Supervisory-Node.Furthermore,CBAS is based on lightweight cryptographic algorithms such as random numbers and hash function to provide the secure authentication to highly constrained mobile nodes in 6LoWPAN.

    Our contributions in this article are summarized as follows:

    · In this paper,a secure cluster-based authentication scheme for highly constrained sensor nodes in 6LoWPAN is proposed.The main objective of CBAS is to overcome the signaling overhead and ensures secure and efficient communication among the 6LoWPAN nodes during the registration and handover process.In this approach,sensor nodes are organized into a cluster and communicate with the MAG through a cluster leader;we call Supervisory-Node.The Supervisory-Node communicates with the MAG directly on behalf of the sensor nodes in the cluster.

    · We also introduce a lightweight and secure registration,de-registration,and initial authentication and handover procedure when a sensor node joins or leaves a cluster.Our simulation experiments show that CBAS shows better performance in terms of low signaling cost during the registration and handover procedure compared to the state-of-the-art protocols.

    · Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.Our simulation experiments show that,CBAS shows better performance in terms of low signaling cost and low handover and authentication delay.

    1.3 Paper Organization

    The remainder of this article is organized as follows: Section 2 describes the proposed CBAS architecture.Section 2 presents the registration,de-registration,initial authentication,and handover procedures performed in CBAS.Section 3 discusses the performance of the CBAS scheme in terms of the handover authentication delay and signaling cost.Section 4 presents numerical results and security analysis.Section 5 finally concludes our research efforts.

    2 Architecture of Cluster-Based Authentication Scheme(CBAS)in 6LoWPAN

    The architecture of CBAS is shown in Fig.1.The CBAS comprises three elements: (i) Host-Node,(ii) Supervisory-Node,and (iii) MAG.

    2.1 Host-Node

    The Host-Node is an RFD (Reduced functional device) that is responsible for gathering sensory data.This device is a highly constrained node (limited computational and battery power)and communicate with other nodes in the network over unreliable and lossy wireless links.

    2.2 Supervisory-Node

    The Supervisory-Node is a mobile,fully functional sensor device (FFD).In contrast to Host-Node,it possesses strong processing,battery,and storage resources.It is represented as FFD in Fig.1.The FFD is selected based on its larger storage and computational resources.When multiple FFDs exist in a network,the FFD with a short distance from the base station is selected as a Supervisory-Node.The Supervisory-Node,as a vital element of the CBAS scheme,performs many essential functions and responsibilities.For instance,

    It is responsible for creating and managing a cluster of Host-Nodes.It creates,controls,and manages a cluster through the registration and deregistration procedures.For secure registration and authentication to a cluster,it maintains and manages a table in its storage;we called it a Binding-Table.The Binding-Table stores the entry information of each Host-Node including,Host-Node id,cluster-id (the id of a cluster it belongs to),Host-Node’s location,random numbers,and temporary identities (used to keep the node information safe from the malicious activities and attackers).The supervisory-node regularly updates the Binding-Table for various reasons.For example,when a Host-Node changes its location or switches to another cluster.1We assume that Host-Nodes evaluate their locations using the available positioning services such as GPS (General Positioning System) and send their location to Supervisory node whenever they change their location or switch to another cluster.

    · The supervisory-Node acts as a coordinator between the Host-Nodes and MAG.It routes the packets from the Host-Node to MAG.It controls the messages exchange between Host-Node and MAG for low signaling overhead and efficient communication.Additionally,it performs signaling control with the MAG on the behalf of other nodes of its cluster.

    2.3 Mobile Access Gateway

    The main purpose of the CBAS scheme is to provide secure authentication to Host-Nodes with low signaling overhead when they join a cluster.To achieve our objective,in comparison to the SGMS [20],in our proposed architecture,the functions and responsibilities of Local Mobility Anchor and Authentication,Authorization and Accounting server are merged into the MAG2MAG is also known as 6LoWPAN gateway[24,25]..The handover operation is performed between two adjacent MAGs without the assistance of LMA.The MAG now directly exchanges its information with its neighboring MAGs without going through the LMA.Further,MAG does not have to perform the deregistration and binding update operation with the LMA.This enhancement to the existing architecture avoids the extra control message exchange among the MAG nodes.Thus,further leading to low signaling overhead and cost.The main functions and responsibilities of MAG in our proposed architecture are as follows:

    · MAG is responsible for the selection and registration of Supervisory-Nodes based on their storage and computational resources.

    · MAG is also responsible for the registration,secure authentication,and de-registration of Host-Nodes through the Supervisory-Nodes.To do so,MAG maintains and manages a table called MAG-Table.MAG uses its table to store and update the authentication and registration information of registered Host-Nodes and Supervisory-Nodes.

    · MAG is also responsible for a secure handover when a Host-Node travels from one MAG to another MAG.

    Figure 1:Architecture of CBAS in 6LoWPAN

    3 Registration,De-registration,Initialization and Handover Procedures in(CBAS)for 6LoWPAN

    In this section,we describe the registration,de-registration,authentication,and handover procedures.Tab.1 shows the notations used in all the procedures.

    Table 1:Notations used in registration,de-registration,authentication,and handover procedures

    3.1 Registration of a Host-Node with MAG through the Supervisory-Node

    To join a cluster securely,a Host-Node needs to register with MAG through the Supervisory-Node.The registration procedure of a Host-Node with MAG through the Supervisory-Node is depicted in Fig.2.

    Step 1:At the beginning,the Binding-Table is empty.A Host-Node desires to register with a cluster,first initiates a broadcast call (initial-attachment).The initial-attachment message consists of unique identity of the Host-Node (Id) and R1 (random number).The random numbers are generated for a secure authentication purpose.We assume that the Host-Node,Supervisory-Node,and MAG generate the random number using the tineyRNG random number generation function [26]3TinyRNG is an efficient,secure,and undetectable Cryptographic Pseudo-Random Number Generator.It has been designed to minimize the memory usage and energy consumption of sensor nodes.for a secure and authentic registration process.

    Step 2:Upon receiving the registration request,the Supervisory-Node scans its Binding-Table to check whether the requested Host-Node is already registered or not.If yes,then Supervisory-Node denies the registration request and updates the location information.If no,then the Supervisory-Node will register the Host-Node by creating a new entry in the Binding-Table.The entry information of the registered Host-Node contains the Host-Node-id,Host-Node-location,and unidentifiable random number.After then,Supervisory-Node accumulates its cluster-id (cId)with a message and sends the updated information to the MAG.

    Step 3:The MAG,upon receiving the update information request,scans its MAG-Table to check whether the Host-Node is already registered or not.If no,then MAG creates an entry for the Host-Node and sends back a registration response to the Supervisory-Node with a temporary identity (tId) and a random number R2.

    Step 4.Then,Supervisory-Node sends a message with<tId,cId,R2>information to the Host-Node.The tId is then published by the Host-Node to the public.The reason is to keep the device information safe from the attackers and prevent attackers from tracking the Host-Node.The Host-Node,Supervisory-Node,and MAG store<Id,tId,cId,R1,R2>information in their tables,accordingly.

    Figure 2:Registration procedure of Host-Nodes with MAG through the Supervisory-Nodes

    3.2 De-registration Procedure of a Host-Node with MAG through the Supervisory-Node

    In our proposed CBAS architecture,the de-registration process occurs when a Host-Node is not performing any activity in the network or when a Host-Node willingly wants to leave a cluster.In a case,if a Host-Node is not active for a long-time duration4The time duration of the inactive node is decided based on its use cases.For instance,in a very active environment,the duration may last from hours to days.However,in a less active environment,the time duration may last from weeks to months.”,its registration information will be removed from both Binging-Table and MAG-Table.In a case,a Host-Node willingly wants to leave the cluster,following steps will be performed.The De-registration procedure is shown in Fig.3.

    Step 1:The Host-Node sends a de-registration call to the Supervisory-Node.

    Step 2:Upon receiving the deregistration request,the Supervisory-Node removes the registration information of the requested Host-Node from its Binding-Table and updates it.

    Step 3:Then,Supervisory Node forwards the de-registration request of the Host-Node to the MAG.

    Step 4:Now the MAG also removes the Host-Node from its MAG-Table and updates it.

    Figure 3:De-registration procedure of Host-Nodes with MAG through the supervisory-node

    3.3 Initial Authentication Procedure

    When a registered Host-Node joins the network after its registration with MAG through the Supervisory-Node,an initial authentication procedure with the MAG is needed.In this procedure,Host-Node,Supervisory-Node and MAG exchange messages to achieve a mutual initial authentication and key establishment.The procedure of initial authentication is shown in Fig.4.

    Step 1:When a Host-Node or group of Host-Nodes join a cluster,they generate a message authentication code (Msg) based on the Hash function (ACi=hACkyHN-LD(tIdi,Idi,R2))5HN refers to Host-Node,while LD refers to Supervisory-Node/leader..Then,the generated authentication message<tIdi,ACi>is sent to the Supervisory-Node.After receiving the authentication message,Supervisory-Node integrates its own authentication information with the authentication message to form a MList.Then,Supervisory-Node calculates the sum of the message values (ACsum=AC1⊕...⊕ACN⊕ACLD),and encrypts the sum of values and MList (MList=tId1,..,tIdN,tIdLD) using a session key.

    Step 2: The Supervisory-Node sends a router solicitation (RS) message (<tIdLD,ekyLD-MAG,ACsum,Mlist) to the MAG.On getting the MList,MAG first derives the identity of each Host-Node to calculate Msg value and verifies the Msg value by comparing it with received Msg value.If the calculated Msg value and the received Msg value are different (Step 1),then MAG sends a message to the Host-Node and requests for detailed Msg values of each Host-Node.The main reason for this step is to investigate whether the Host-Node or group Host-Node are legal or not.If the information included in the Msg values is not correct,a warning message is sent to the Host-Node to inform about the illegitimacy of the devices.If the calculated Msg value matches the value of the received message,then MAG accepts the Host-Node as an authentic node to join the cluster.

    Figure 4:Initial-authentication procedure of host-node or a cluster of host-nodes with the MAG in CBAS

    Step 3: Upon receiving the RS message,MAG generates a random number R3.The function for pairwise keys (established between each group member and their group leaders)f (x)=is used to computes the ciphertext (CtLD) and sends it to the Host-Node in a router advertisement (RA) message.When the Host-Node receives the RA message,it first decryptsCtLDusing key (KyLD-MAG=h (tIdLD,R3,IdMAG,tgId).Now Host-Node is able to obtain the random numbers R3 from the ciphertext.

    Step 4:Then,the message<tIdLD,Cti,eKyHN-LD(tIdLD)>is forwarded to the Host-Node.The functionf(x) is used for establishing the pairwise keys with each group member.Thef(x) function value is stored in its memory.On receiving the authentication response from the Supervisory-Node,host-node decrypts the ciphertext using the session key KyHN-LD.

    3.4 Handover Procedure

    Several proposed authentication schemes [17-21] require that the authentication procedure is performed each time when a Host-Node attaches to a new base station.This results in a longer handover latency and heavy workload on the base station.In contrast,our proposed CBAS scheme supports a group handover authentication.It makes the authentication process not only fast but also leads to a shorter handover delay.The handover procedure is depicted in Fig.5.When a Host-Node or group of Host-Nodes moves from the previous MAG (MAG1) to the new MAG (MAG2),handover occurs and following procedure is carried out:

    Step 1: When a Supervisory-Node detects that a Host-Node or group of Host-Nodes have left their cluster,it sends a deregistration message to the previous MAG (MAG1) and starts to transfer data stored in MAG1to the MAG2.This information is required to attach all Host-Nodes to the MAG2through their Supervisory-Node.

    Figure 5:Handover procedure of host-node or a cluster of host-nodes from the MAG1 to the MAG2 in CBAS

    Step 2: Before entering the domain of an MAG2,the respective Supervisory-Node needs to collect the handover information of each Host-Node of its cluster,then it accumulates the information and then sends RS message to MAG2.

    Step3:After receiving a RS message,MAG2searches for a matched entry of a group of Host-Nodes in its MAG-table.In case of not finding any entry information,MAG2sends a proxy binding update (PBU) request to MAG1to update the Binding entry of Host-Nodes.PBU is a request message sent by a MAG for updating the binding of Host-Node for its current address.

    Step 4:Then MAG1replies through proxy binding acknowledgement (PBA) message to MAG2.PBA is an acknowledgement message sent by a MAG of updating the binding information of Host-Node.

    Step 5:Once MAG2receives PBA,it creates entries for Host-Nodes and replies through the Router advertisement (RA) message and sends to the requesting Supervisory-Nodes.

    Step 6:Then,Supervisory-Nodes re-organizes the buffered data packets and transfers them to MAG2.The group of Host-Nodes now successfully attached to the MAG2.

    4 Performance Evaluation

    This section evaluates the proposed CBAS scheme by comparing it with SGMS [20] and LAMS [21] for 6LoWPAN.SGMS is a “secure group mobility scheme” to authenticate multiple 6LoWPAN resource constrained devices based on PMIPv6 (Proxy Mobile IPv6).LAMS is a lightweight authentication scheme to authenticate resource-constrained industrial devices by combining LMA functionalities with MAG in a 6LoWPAN gateway.All schemes are analyzed and compared based on the handover authentication delay and signaling cost analysis,which are considered key performance metrics.Tab.2 summarizes the notations used in the analysis.

    Table 2:Parameters used for Numerical Analysis [24,25]

    4.1 Evaluation Metrices

    Fig.6 shows the network model that depicts the entities and their relationship in CBAS.In Eq.(1),Tx,y(z)shows the transmission delay of a Host-Node with size ‘z’.Failure probability ‘f’can occur during the movement of Host-Node from x to y through wireless link.The transmission delay for a wireless link is expressed as:

    The Eq.(2) shows the transmission delay of a node with size ‘z’when it travels from one gateway to another gateway connected via a wired link.Hx,ydenotes the total hops between x and y.The transmission delay for wired link is expressed as:

    The Signaling Cost is derived for comparing the performance of proposed CBAS with the existing SGMS and LAMS schemes.Signaling Cost is calculated by adding the Binding Cost (BC)with Delivery Cost (DC) of packets.

    Figure 6:Network model

    4.2 Analysis of Registration Delay

    In this section,we will present the registration analysis of SGMS [20],LAMS [21],and our proposed scheme CBAS in 6LoWPAN.

    4.2.1 Registration Delay of SGMS in 6LoWPAN

    In SGMS scheme host node performs authentication request and reply operations with AAA server and exchanges PBU &PBA signals with LMA for registration of HN.After receiving the PBA message,the Router Advertisement message sends to MAG.The registration delay of SGMS is represented as:

    4.2.2 Registration Delay of LAMS in 6LoWPAN

    In LAMS scheme,when a host node wants to register with a gateway (MAG/LMA),it sends Router Solicitation message.Then,gateway performs authentication request and reply operation with the AAA server.Based on the above scenario and Eq.(2),registration delay of LAMS is represented as:

    4.2.3 Registration Delay of CBAS

    In our proposed CBAS scheme,cluster-based communication is done through the Supervisorynode.During the deployment of host nodes across the network,each HN in a cluster must register itself with the MAG.The HN sends a message to the Supervisory-node FFD.Next,FFD generates a list of all attached nodes and sends it to the MAG through an RS message.After performing the authentication process,the MAG sends an RA message to the HN through its FFD.The registration Delay of proposed CBAS is expressed as:

    4.3 Analysis of Handover Authentication Delay

    In this section,we conduct performance analysis by comparing the proposed scheme (CBAS)with SGMS [20] and LAMS [21].Our analysis focuses on the handover authentication Delay and signaling cost.Handover Delay is defined as the transmission period when a Host-Node cannot receive packets from the previous base station or when a Host-Node receives the first packet from the new base station.

    4.3.1 Handover Authentication Delay of SGMS in 6LoWPAN

    In SGMS scheme,when a Host-Node wants to attach to a new MAG,it must exchange the authentication request and then send the reply signal to the AAA server.After that,it performs PBU and PBA operations with the LMA.The Authentication Delay of SGMS is written as:

    4.3.2 Handover Authentication Delay of LAMS in 6LoWPAN

    In the LAMS scheme,a Host-Node must attach itself with the gateway (MAG/LMA) and exchanges authentication request and reply messages with the AAA server.After the authentication process,gateways perform binding operations to establish a handover tunnel.The Authentication Delay of LAMS is given below:

    4.3.3 Handover Authentication Delay of Proposed CBAS Approach

    In the proposed CBAS scheme,the handover occurs when a Host-Node moves between two MAGs.Once (New MAG) MAG2receives packets from the Host-Node via their supervisory-Node through the RS message.Then,it performs the authentication process with PBU and performs PBA operations with MAG1for a cluster of nodes.Then MAG2sends a RA message to the Host-Node through their supervisory-Node.The Authentication Delay of CBAS is written as:

    4.4 Analysis of Signaling Cost

    The signaling cost is calculated by adding the Binding Cost (BC) with the Delivery Cost (DC)of a packet.Next,we evaluate signaling cost for SGMS,LAMS and proposed CBAS.

    4.4.1 Signaling Cost Analysis of SGMS in 6LoWPAN

    In the SGMS scheme,Tsrepresents the setup time requires for the connection establishment and binding update process between the Host-Node with MAG.2jNMAG-AAA+ 2jNLMA-AAArepresents the authentication operation.2jNMAG-LMA+uloglogis needed for binding operation with the LMA.Accordingly,theBCSGMScan be expressed as:

    In the SGMS scheme,the packet delivery cost from the Host-Node to LMA through the MAG is represented askNMN-MAG+2jNMAG-LMA(kNMN-MAG+2jNMAG-LMA+2jNLMA-CN).The cost of packet sends from LMA to the MAG is (CMAG-LMA).The cost of searching entry for the corresponding nodes isvloglogThe Delivery Cost can be written as:

    Therefore,the TC of SGMS can be expressed as:

    4.4.2 Signaling Cost Analysis of LAMS in 6LoWPAN

    In the LAMS scheme,the handover occurs between two gateways.The cost of connection established between the Host-Node and MAG isTs,.The cost of exchanging the authentication and binding messages between two MAGs is represented asThus,the Binding Cost of the LAMS is written as,

    The process of packet delivery in LAMS is done between two MAGs is written as:

    Therefore,SC of LAMS can be written as:

    4.4.3 Signaling Cost Analysis of the Proposed CBAS

    In the proposed CBAS,during the handover process,the MAG1exchanges the binding update messages with MAG2through the Supervisory-Node and is represented as (2k NFFD-MAG+2tNMAG-MAG.The processing cost of MAG is (2u log logMg+Mah

    )).Thus,binding cost for the CBAS can be written as:

    5 Simulation Results and Discussions

    In this section,we discuss our simulation results.The equations presented in Section 3 are used as a performance criterion.First,we discuss our simulation environment,then detailed analysis on the obtained results is presented.The parameters and their corresponding values are given in Tab.3.

    Table 3:Simulation parameters

    5.1 Simulation Setup

    The simulation environment used for evaluating the proposed scheme CGM6 is Network Simulator version 2 (NS2).The National Institute of Standards and Technology (NIST) package based on PMIPv6 is used with simulation platform ns-2.29 (network simulator version 29) running on Ubuntu 17.10.A patch (nist-pmip6-6lowpan-ns_2.29-ubuntu12_i386.deb) which integrates 6LoWPAN and PMIPv6 is used for the simulation [27].All simulations are done on an Intel machine with a 2.40 GHz Core i3-3110 and 4GB of RAM.The AWK scripting language in NS2 is used for text processing and extraction of tr (tracing) file.NAM (Network Animator) is used for the NS2.29 simulation [28].Results are simulated by using Xgraph.

    5.2 Registration Delay

    Fig.7 shows the impact of registration delay for SGMS,LAMS,and CBAS schemes in 6LoWPAN.We can observe from the figure that our proposed scheme CBAS shows better performance.The implication is that,during the registration process,both SGMS and LAMS schemes exchange extra signaling messages over a wireless link in 6LoWPAN.For instance,in SGMS scheme control signals are exchanged from MAG to LMA and AAA,and in LAMS scheme control signals are exchanged from MAG to AAA.While,in the CBAS scheme,the authentication and binding operations are performed within the MAG.This avoids signaling overhead during the registration process leading to better performance.

    Figure 7:Effects of registration delay

    5.3 Handover Authentication Delay

    Fig.8 shows the effects of the handover authentication Delay for the SGMS,LAMs,and CBAS schemes in 6LoWPAN.It can be observed from the figure that our proposed CBAS scheme performs better than SGMS and LAMS.The reason is that,in the CBAS scheme,authentication and registration operations are combined in MAG.This avoids the extra signal exchange activities among the Host-Nodes in 6LoWPAN.It can also be observed from Fig.7 that SGMS scheme shows the worst performance than LAMS and CBAS.This is due to the relief in LMA operations and integration of the authentication and binding operations in MAG.The implication is that the SGMS scheme consumes more time in processing than the two other schemes.

    Figure 8:Effects of handover authentication delay

    Figs.9a and 9b shows the effects of wireless link delay (dwl) and average queuing delay (da) on handover latency for SGMS,LAMS and CBAS schemes in 6LoWPAN.It can be observed from the figures that handover delay increases as wireless link delay and queuing delay increase.Our proposed CBAS scheme performs better than LAMS and SGMS.The reason is that,in CBAS scheme,group-authentication and binding operations are combined in MAG.This avoids the extra signal exchange activities among the nodes in 6LoWPAN.

    5.4 Analysis of Signaling Cost

    The effects of signaling cost is shown in Fig.10.We can observe from the figure that,the signaling cost of the CBAS is lower than the LAMS and SGMS.This is due to performing the authentication process for a cluster of Host-Nodes via their Supervisory-Nodes,which further has reduced extra signaling messages among the entities of the CBAS.

    6 Security Analysis

    In this section,we provide the security analysis of CBAS,which is illustrated by low communication overhead and signaling cost,while attaining mutual authentication,device’s identity confidentiality,and resistance against the following attacks: Modification attack,Replay attack,Man-in-the-middle attack and Impersonation attack.

    Figure 9:Effect of (a) Wireless link delay (dwl) and (b) Average queuing delay (da) on handover

    Figure 10:Effects of signaling cost

    Proposition 1:Host-Node’s identity confidentiality is provided by the CBAS scheme

    Proof: In the proposed scheme,the Host-Node identity’s confidentiality is based on the random number R1 and hash functionf (x)=Since ‘R1’is random number and difficult to guess by the intruder and hash function is non-reversible,the attacker cannot derive the host-node identity (Idi) without knowing the random number and deriving the hash function.Furthermore,the Host-Node publishes the temporary identity (tId) to the public,and the actual identity is kept secret.It stops the attacker from accessing the Host-Node information and tracking the node.

    Proposition 2:The proposed CBAS scheme provides entity mutual authentication

    Proof.The proposed scheme provides mutual authentication between the Host-Node,Supervisory-Node and MAG because of the authentication code message (Msg).Upon receipt of the authentication code message (Msg),MAG checks and verifies the Host-Node legality by matching the Msg values with the received Msg value.The Host-Nodes cluster is considered valid if the equality holds.Otherwise,a warning message is sent to inform the cluster about the presence of the illegitimate node.Moreover,the adversary cannot generate the Msg value due to the lack of information about the R1 and R2(random numbers).

    Proposition 3.The proposed CBAS resist to modification attack

    Proof.To resist modification attacks,the proposed scheme uses random numbers (R1,R2 and R3) and a hash function h(),which makes it hard for an adversary to modify the information.The usage of random numbers and hash function guarantees that information cannot be modified without being detected.

    Proposition 4.The proposed CBAS scheme provides protection against the replay attack

    Proof.In the initial-authentication phase,a valid Host-Node sends an authentication code message (ACi=hACkyHN-LD(tIdi,Idi,R2i)) to the MAG via its Supervisory-Node.If an attacker tries to impersonate the valid Host-Node by resending the previously obtained messages for extracting secret information,the MAG will not accept the authentication request.The reason is the Id of the Host-Node is based on a random number,which is only known to the valid Host-Node.

    Proposition 5.The proposed CBAS provides protection against the Man-in-the-Middle attack

    Proof.A man-in-the-middle-attack occurs when an unauthorized party intercepts the communication of two people/system.Moreover,two real/original parties assumed that they communicate directly with each other whereas they are interacting with the unauthorized party.In our CBAS approach,theMsg(Message authentication code) and hash function are used to prevent an adversary by launching a man-in-the-middle attack.However,if the attacker changes the ciphertext during communication,the receiver cannot decrypt it successfully using the right key.Thus,the illegal messages would be avoided.

    Proposition 6.The proposed CBAS resist to Impersonation attack

    Proof.An impersonation attack is a form of fraud to disguise as an authorized party by an attacker.In our proposed CBAS approach,all Host-Nodes must register with the MAG through the Supervisory-Node before the deployment.A Host-Node can be impersonated by the attacker,if the attacker hacks its confidential information such as random numbers.Otherwise,the MAG sends a warning message,when comparing the received information from attacker with the stored data in the MAG-Table and the information is unmatched.Moreover,the use of hash function in CBAS scheme also guarantees that information cannot be modified without being detected.

    7 Conclusion

    To resolve the authentication security issue of IP-based sensor nodes in 6LoWPAN,this paper proposed a cluster-based authentication scheme (CBAS) for highly constrained sensor nodes.The main goal of the proposed CBAS is to reduce the signaling cost during the handover and authentication procedures in 6LoWPAN and also ensure secure and efficient communication among the 6LoWPAN.In this approach,sensor nodes are organized into a cluster and communicate with the MAG through a cluster leader;we called Supervisory-Node.The Supervisory-Node communicates with the MAG directly on behalf of the sensor nodes in the cluster.We also introduce a lightweight and efficient registration,de-registration,initial authentication and handover procedures when a sensor node joins or leaves a cluster.Our simulation experiments show that CBAS shows better performance in terms of low signaling cost during the registration and handover procedure compared to the state-of-the-art protocols.For instance,CBAS has reduced the registration delay by 11%,handoff authentication delay by 32%,and signaling cost by 37% compared to the state-of-the-art mobility management schemes.Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.

    Funding Statement: The authors would like to acknowledge the support of the Deputy for Research and Innovation,Ministry of Education,Kingdom of Saudi Arabia for this research through a Grant (NU/IFC/INT/01/008) under the institutional Funding Committee at Najran University,Kingdom of Saudi Arabia.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    久久国产精品男人的天堂亚洲| 97人妻天天添夜夜摸| 色94色欧美一区二区| 亚洲精品一卡2卡三卡4卡5卡 | 最新在线观看一区二区三区| 国产亚洲精品久久久久5区| 亚洲精品中文字幕在线视频| 国精品久久久久久国模美| 中亚洲国语对白在线视频| 久久精品国产亚洲av香蕉五月 | 蜜桃国产av成人99| 中国国产av一级| 香蕉国产在线看| www.av在线官网国产| 久久精品国产a三级三级三级| 欧美人与性动交α欧美软件| 国产男人的电影天堂91| 一区二区三区精品91| 国内毛片毛片毛片毛片毛片| 啦啦啦免费观看视频1| 日韩欧美国产一区二区入口| 国产亚洲精品一区二区www | 精品免费久久久久久久清纯 | 久久热在线av| 久久亚洲精品不卡| 国产精品偷伦视频观看了| av在线app专区| bbb黄色大片| 又紧又爽又黄一区二区| 91成年电影在线观看| 国产亚洲一区二区精品| 欧美乱码精品一区二区三区| 黑人欧美特级aaaaaa片| 精品一区二区三区四区五区乱码| 日韩人妻精品一区2区三区| 日本vs欧美在线观看视频| 国产亚洲欧美在线一区二区| 久久国产精品男人的天堂亚洲| av天堂在线播放| 婷婷色av中文字幕| av免费在线观看网站| av在线播放精品| 男女高潮啪啪啪动态图| 丰满迷人的少妇在线观看| 国产人伦9x9x在线观看| 99精国产麻豆久久婷婷| 日本91视频免费播放| 不卡av一区二区三区| 久久久久精品国产欧美久久久 | 日本av免费视频播放| 丝袜美腿诱惑在线| 男人添女人高潮全过程视频| 精品久久久精品久久久| 黑人猛操日本美女一级片| 亚洲天堂av无毛| 成年美女黄网站色视频大全免费| a级片在线免费高清观看视频| 黑人巨大精品欧美一区二区蜜桃| 女性被躁到高潮视频| 99精品久久久久人妻精品| 成人免费观看视频高清| 在线观看免费视频网站a站| 国产精品国产三级国产专区5o| 欧美激情久久久久久爽电影 | 国产精品久久久久久精品电影小说| 麻豆av在线久日| 人妻一区二区av| 亚洲欧美日韩另类电影网站| 1024视频免费在线观看| 亚洲av美国av| 亚洲精品国产区一区二| 99久久综合免费| 黑人操中国人逼视频| 男女边摸边吃奶| 国产伦理片在线播放av一区| 新久久久久国产一级毛片| 国产精品久久久久成人av| 天堂8中文在线网| 亚洲av男天堂| 嫁个100分男人电影在线观看| 国产欧美日韩一区二区三 | 韩国精品一区二区三区| 少妇粗大呻吟视频| 亚洲精品成人av观看孕妇| 日韩 亚洲 欧美在线| 国产老妇伦熟女老妇高清| 亚洲中文日韩欧美视频| 久久国产精品人妻蜜桃| 中国国产av一级| 99热国产这里只有精品6| 国内毛片毛片毛片毛片毛片| 久久久国产欧美日韩av| 建设人人有责人人尽责人人享有的| 99久久99久久久精品蜜桃| 久久热在线av| 成人三级做爰电影| 欧美日韩视频精品一区| 免费女性裸体啪啪无遮挡网站| 亚洲成av片中文字幕在线观看| 成年动漫av网址| 免费黄频网站在线观看国产| 中文字幕制服av| 成年av动漫网址| 成人国产一区最新在线观看| 精品亚洲成国产av| 女人被躁到高潮嗷嗷叫费观| 日韩中文字幕欧美一区二区| www日本在线高清视频| 亚洲精品国产av成人精品| 亚洲欧美日韩高清在线视频 | 亚洲天堂av无毛| 91av网站免费观看| 俄罗斯特黄特色一大片| 国产伦理片在线播放av一区| 十八禁网站网址无遮挡| 亚洲国产毛片av蜜桃av| 久久久久久人人人人人| 国产日韩欧美视频二区| 18禁观看日本| 丁香六月天网| 蜜桃国产av成人99| 黄网站色视频无遮挡免费观看| 97人妻天天添夜夜摸| 一本大道久久a久久精品| 黑人操中国人逼视频| 中文字幕av电影在线播放| 亚洲中文日韩欧美视频| 一级毛片精品| 黄色毛片三级朝国网站| 国产精品 欧美亚洲| 2018国产大陆天天弄谢| 国产色视频综合| 在线看a的网站| 天天操日日干夜夜撸| 免费女性裸体啪啪无遮挡网站| 啪啪无遮挡十八禁网站| 无遮挡黄片免费观看| 日韩免费高清中文字幕av| 欧美 亚洲 国产 日韩一| 精品国产国语对白av| 国产免费一区二区三区四区乱码| 99九九在线精品视频| 免费日韩欧美在线观看| 丝袜脚勾引网站| 婷婷成人精品国产| 精品视频人人做人人爽| 少妇精品久久久久久久| 涩涩av久久男人的天堂| 久久av网站| 国产精品一区二区在线观看99| 黄色视频,在线免费观看| 啦啦啦 在线观看视频| 午夜免费观看性视频| 精品一区二区三卡| 深夜精品福利| 国产伦理片在线播放av一区| 女人高潮潮喷娇喘18禁视频| 久久青草综合色| 国产男人的电影天堂91| 成人三级做爰电影| 两个人看的免费小视频| 我的亚洲天堂| 亚洲自偷自拍图片 自拍| 手机成人av网站| 一本大道久久a久久精品| 欧美国产精品va在线观看不卡| 99国产精品一区二区三区| 欧美国产精品一级二级三级| 搡老乐熟女国产| 老司机午夜十八禁免费视频| 最新在线观看一区二区三区| 精品一区在线观看国产| 免费观看a级毛片全部| 国产一区二区三区av在线| 国产国语露脸激情在线看| 老司机午夜十八禁免费视频| 极品人妻少妇av视频| 日本一区二区免费在线视频| 国产色视频综合| 欧美日韩视频精品一区| 欧美成狂野欧美在线观看| 亚洲七黄色美女视频| 美女高潮到喷水免费观看| videosex国产| 久久中文字幕一级| 男女下面插进去视频免费观看| 伊人亚洲综合成人网| 视频在线观看一区二区三区| 免费看十八禁软件| tocl精华| 日本wwww免费看| 久久这里只有精品19| 久久久精品国产亚洲av高清涩受| 日韩制服骚丝袜av| 女人精品久久久久毛片| 十分钟在线观看高清视频www| 欧美大码av| 久久国产亚洲av麻豆专区| 欧美少妇被猛烈插入视频| 国产精品亚洲av一区麻豆| 欧美人与性动交α欧美精品济南到| 丝袜美腿诱惑在线| 亚洲国产欧美一区二区综合| 操美女的视频在线观看| 亚洲国产欧美一区二区综合| 亚洲第一青青草原| 黄色视频不卡| 女人久久www免费人成看片| 国产av精品麻豆| 男女之事视频高清在线观看| 一级,二级,三级黄色视频| 亚洲人成电影观看| 亚洲人成电影免费在线| 狂野欧美激情性xxxx| 欧美中文综合在线视频| 国产高清国产精品国产三级| 一级毛片电影观看| 两个人看的免费小视频| 青春草亚洲视频在线观看| 国产高清国产精品国产三级| 啦啦啦中文免费视频观看日本| 秋霞在线观看毛片| 热re99久久精品国产66热6| 免费在线观看影片大全网站| 成年av动漫网址| 国产一区有黄有色的免费视频| 19禁男女啪啪无遮挡网站| 永久免费av网站大全| 欧美日韩视频精品一区| 在线av久久热| 亚洲avbb在线观看| av国产精品久久久久影院| 丝袜人妻中文字幕| 久久久水蜜桃国产精品网| 精品国产乱码久久久久久男人| 十八禁网站网址无遮挡| 午夜福利在线免费观看网站| 亚洲一码二码三码区别大吗| 国产精品久久久久久人妻精品电影 | 大型av网站在线播放| 免费观看av网站的网址| 超色免费av| 中亚洲国语对白在线视频| 十八禁人妻一区二区| 精品久久蜜臀av无| 亚洲国产欧美网| 欧美日韩精品网址| 伊人久久大香线蕉亚洲五| 国产不卡av网站在线观看| 老熟妇仑乱视频hdxx| 99国产极品粉嫩在线观看| 精品亚洲成a人片在线观看| 久久av网站| 亚洲激情五月婷婷啪啪| 色综合欧美亚洲国产小说| 国产高清国产精品国产三级| 国产精品影院久久| 亚洲国产日韩一区二区| 亚洲国产av影院在线观看| 女人爽到高潮嗷嗷叫在线视频| 国产精品国产三级国产专区5o| 国产免费av片在线观看野外av| 午夜福利在线观看吧| 午夜福利视频精品| 久久精品熟女亚洲av麻豆精品| 国产精品偷伦视频观看了| 中文精品一卡2卡3卡4更新| 久久青草综合色| 韩国精品一区二区三区| 69av精品久久久久久 | 男女之事视频高清在线观看| 免费观看av网站的网址| 久久久水蜜桃国产精品网| 精品乱码久久久久久99久播| 悠悠久久av| 一本综合久久免费| 脱女人内裤的视频| 国产成人啪精品午夜网站| 久久香蕉激情| 99国产精品一区二区蜜桃av | 熟女少妇亚洲综合色aaa.| 久久久久久久久免费视频了| 韩国高清视频一区二区三区| 精品国内亚洲2022精品成人 | 黑人操中国人逼视频| 国产一区二区在线观看av| 老司机午夜福利在线观看视频 | 99久久精品国产亚洲精品| 丰满少妇做爰视频| 午夜影院在线不卡| 欧美精品人与动牲交sv欧美| 精品一区在线观看国产| 国产精品久久久久久精品电影小说| 蜜桃在线观看..| 成人黄色视频免费在线看| 一区二区三区四区激情视频| 亚洲伊人色综图| 精品免费久久久久久久清纯 | 亚洲中文av在线| 十分钟在线观看高清视频www| 美女国产高潮福利片在线看| 亚洲国产精品999| 99久久精品国产亚洲精品| 国产精品99久久99久久久不卡| 老汉色av国产亚洲站长工具| 日本vs欧美在线观看视频| 欧美乱码精品一区二区三区| 国产成人系列免费观看| 性少妇av在线| 黑人巨大精品欧美一区二区蜜桃| 日本一区二区免费在线视频| 在线亚洲精品国产二区图片欧美| 桃红色精品国产亚洲av| 99热全是精品| a在线观看视频网站| 欧美激情久久久久久爽电影 | 国产精品偷伦视频观看了| 老熟妇乱子伦视频在线观看 | 中文字幕av电影在线播放| 亚洲第一青青草原| 成人18禁高潮啪啪吃奶动态图| 91成人精品电影| 久久这里只有精品19| 丝袜在线中文字幕| 国产色视频综合| 久久国产精品影院| 麻豆av在线久日| 女性被躁到高潮视频| 美女脱内裤让男人舔精品视频| 国产av国产精品国产| 久久av网站| 精品国产一区二区久久| 无限看片的www在线观看| 日韩,欧美,国产一区二区三区| 成人国产av品久久久| 动漫黄色视频在线观看| 最近最新免费中文字幕在线| 女性被躁到高潮视频| 免费观看人在逋| 热re99久久国产66热| 在线精品无人区一区二区三| 黄色怎么调成土黄色| 欧美老熟妇乱子伦牲交| 精品第一国产精品| 美女高潮喷水抽搐中文字幕| 男女国产视频网站| 国产欧美日韩一区二区三 | 伊人久久大香线蕉亚洲五| 国产欧美日韩一区二区精品| 国产成人欧美| 在线观看免费午夜福利视频| 伊人久久大香线蕉亚洲五| 精品熟女少妇八av免费久了| 悠悠久久av| 制服诱惑二区| 黄网站色视频无遮挡免费观看| 一级,二级,三级黄色视频| 9热在线视频观看99| 99国产精品一区二区蜜桃av | 在线观看免费高清a一片| 老汉色av国产亚洲站长工具| 一级毛片精品| 一个人免费在线观看的高清视频 | 黄片小视频在线播放| 欧美另类一区| 久热这里只有精品99| 亚洲精品国产一区二区精华液| 国产一区有黄有色的免费视频| 成人国产av品久久久| 亚洲av美国av| 久久99热这里只频精品6学生| 中文字幕人妻丝袜一区二区| 亚洲色图综合在线观看| 久久精品人人爽人人爽视色| 天天躁日日躁夜夜躁夜夜| 日韩视频一区二区在线观看| 99久久综合免费| 人人妻人人澡人人爽人人夜夜| 在线观看免费高清a一片| 美女高潮到喷水免费观看| 中文字幕av电影在线播放| 大香蕉久久网| 王馨瑶露胸无遮挡在线观看| 国内毛片毛片毛片毛片毛片| 色婷婷久久久亚洲欧美| 国产精品 国内视频| 日韩 亚洲 欧美在线| 最近最新免费中文字幕在线| 午夜两性在线视频| 男人操女人黄网站| 狠狠精品人妻久久久久久综合| 久9热在线精品视频| 老汉色∧v一级毛片| 久久香蕉激情| 久久精品国产a三级三级三级| 亚洲国产av新网站| av在线老鸭窝| 欧美中文综合在线视频| 亚洲成人国产一区在线观看| 人人妻人人添人人爽欧美一区卜| 国产欧美日韩精品亚洲av| 一级毛片女人18水好多| videosex国产| 日韩免费高清中文字幕av| 免费观看av网站的网址| 老司机在亚洲福利影院| 免费高清在线观看视频在线观看| 丝袜在线中文字幕| 久久这里只有精品19| 精品人妻一区二区三区麻豆| 自拍欧美九色日韩亚洲蝌蚪91| 一个人免费看片子| 亚洲欧洲日产国产| 人妻一区二区av| 久久99热这里只频精品6学生| 19禁男女啪啪无遮挡网站| 黄色毛片三级朝国网站| 欧美日韩亚洲综合一区二区三区_| 夜夜骑夜夜射夜夜干| 亚洲精品中文字幕一二三四区 | 午夜免费观看性视频| 伦理电影免费视频| 99re6热这里在线精品视频| xxxhd国产人妻xxx| 国产一区二区三区在线臀色熟女 | 色精品久久人妻99蜜桃| 热re99久久精品国产66热6| 亚洲一卡2卡3卡4卡5卡精品中文| 精品人妻1区二区| 亚洲精品乱久久久久久| 久热这里只有精品99| 久久影院123| 久久av网站| 亚洲 欧美一区二区三区| 久久精品人人爽人人爽视色| 99国产精品一区二区三区| 欧美在线一区亚洲| 啪啪无遮挡十八禁网站| 少妇 在线观看| 亚洲av国产av综合av卡| 女人被躁到高潮嗷嗷叫费观| 国产区一区二久久| 欧美黑人精品巨大| 久久综合国产亚洲精品| 永久免费av网站大全| 欧美中文综合在线视频| 亚洲精品第二区| 黄频高清免费视频| 日日爽夜夜爽网站| 欧美黄色片欧美黄色片| 亚洲国产精品一区三区| 国产一卡二卡三卡精品| e午夜精品久久久久久久| 悠悠久久av| 久久天躁狠狠躁夜夜2o2o| 老司机深夜福利视频在线观看 | 91av网站免费观看| 久久人人爽av亚洲精品天堂| 新久久久久国产一级毛片| bbb黄色大片| 12—13女人毛片做爰片一| 免费看十八禁软件| 五月天丁香电影| 国产有黄有色有爽视频| 在线观看免费高清a一片| 精品人妻一区二区三区麻豆| 国产精品 国内视频| 老熟妇乱子伦视频在线观看 | 国产成人免费观看mmmm| 12—13女人毛片做爰片一| 一区在线观看完整版| 国产精品国产三级国产专区5o| 亚洲欧美一区二区三区黑人| 亚洲国产欧美网| 99re6热这里在线精品视频| 久久人人爽av亚洲精品天堂| 高清视频免费观看一区二区| 50天的宝宝边吃奶边哭怎么回事| 国产一区有黄有色的免费视频| 国产精品亚洲av一区麻豆| 巨乳人妻的诱惑在线观看| 久久这里只有精品19| 老熟女久久久| 精品国产一区二区久久| 每晚都被弄得嗷嗷叫到高潮| 欧美日韩福利视频一区二区| 久久人人爽人人片av| 久久久国产精品麻豆| 精品卡一卡二卡四卡免费| 国产精品.久久久| 免费在线观看日本一区| 亚洲第一青青草原| 亚洲男人天堂网一区| 少妇人妻久久综合中文| 国产日韩欧美视频二区| 欧美xxⅹ黑人| 五月天丁香电影| 在线看a的网站| 亚洲va日本ⅴa欧美va伊人久久 | 男女边摸边吃奶| 99香蕉大伊视频| 欧美日韩精品网址| 在线看a的网站| 人妻人人澡人人爽人人| 精品久久久久久久毛片微露脸 | 欧美日韩精品网址| 亚洲一码二码三码区别大吗| 免费日韩欧美在线观看| 黄频高清免费视频| 99国产精品一区二区三区| 亚洲av日韩在线播放| 在线十欧美十亚洲十日本专区| 免费观看av网站的网址| 老司机深夜福利视频在线观看 | 夜夜骑夜夜射夜夜干| 国产亚洲精品久久久久5区| 欧美人与性动交α欧美软件| 精品国产乱码久久久久久男人| av电影中文网址| 免费观看av网站的网址| av不卡在线播放| 国产成人精品久久二区二区91| 亚洲午夜精品一区,二区,三区| 国产精品久久久久久人妻精品电影 | 十分钟在线观看高清视频www| 精品亚洲成国产av| 国产区一区二久久| 天天躁狠狠躁夜夜躁狠狠躁| 成人国语在线视频| 无遮挡黄片免费观看| 久久午夜综合久久蜜桃| 最近中文字幕2019免费版| 精品少妇一区二区三区视频日本电影| 久久这里只有精品19| av视频免费观看在线观看| 91精品伊人久久大香线蕉| 电影成人av| 久久人人97超碰香蕉20202| 亚洲精品国产一区二区精华液| 捣出白浆h1v1| 久久久久网色| 欧美日韩福利视频一区二区| 成年动漫av网址| 国产1区2区3区精品| 国产福利在线免费观看视频| 女人被躁到高潮嗷嗷叫费观| 亚洲avbb在线观看| 性高湖久久久久久久久免费观看| 日韩 亚洲 欧美在线| 国产精品秋霞免费鲁丝片| 少妇被粗大的猛进出69影院| 精品少妇内射三级| 最新的欧美精品一区二区| 极品少妇高潮喷水抽搐| 精品第一国产精品| 黄频高清免费视频| 老汉色∧v一级毛片| 中文精品一卡2卡3卡4更新| 久久久水蜜桃国产精品网| 男人爽女人下面视频在线观看| 99香蕉大伊视频| av欧美777| 中文字幕高清在线视频| 久久免费观看电影| 亚洲少妇的诱惑av| 黑人欧美特级aaaaaa片| 成年美女黄网站色视频大全免费| 飞空精品影院首页| 国产成人啪精品午夜网站| 91成年电影在线观看| 亚洲欧美日韩另类电影网站| 久久久久久亚洲精品国产蜜桃av| 人妻一区二区av| 色婷婷久久久亚洲欧美| 精品国产乱码久久久久久小说| 人妻 亚洲 视频| 在线观看舔阴道视频| 亚洲美女黄色视频免费看| 日本欧美视频一区| 国产免费视频播放在线视频| av网站免费在线观看视频| 国产精品影院久久| 国产精品一区二区免费欧美 | 啦啦啦啦在线视频资源| 老司机午夜福利在线观看视频 | 国产精品av久久久久免费| 黄网站色视频无遮挡免费观看| 日韩中文字幕视频在线看片| 日韩三级视频一区二区三区| 美女国产高潮福利片在线看| 国产欧美日韩一区二区精品| 国产主播在线观看一区二区| 精品卡一卡二卡四卡免费| 大香蕉久久成人网| 青春草视频在线免费观看| 脱女人内裤的视频| 久久天躁狠狠躁夜夜2o2o| 日本91视频免费播放| 国产av国产精品国产| 中国美女看黄片| 欧美av亚洲av综合av国产av| 中文字幕av电影在线播放| 又大又爽又粗| 免费少妇av软件| 亚洲成人手机| 国产色视频综合| 久久亚洲精品不卡| 国产亚洲精品一区二区www | 国产精品国产av在线观看| 国产成+人综合+亚洲专区| 99香蕉大伊视频| 蜜桃在线观看..| 老司机影院成人| 国产麻豆69| 一二三四社区在线视频社区8|