• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Optimized Fuzzy Based Ant Colony Algorithm for 5G-MANET

    2022-11-09 08:15:26NithyaAmudhaSyedMusthafaDilipKumarSharmaEdwinHernanRamirezAsisPriyaVelayuthamSubramaniyaswamyandSudhakarSengan
    Computers Materials&Continua 2022年1期

    R.Nithya,K.Amudha,A.Syed Musthafa,Dilip Kumar Sharma,Edwin Hernan Ramirez-Asis,Priya Velayutham,V.Subramaniyaswamy and Sudhakar Sengan

    1Department of Computer Science and Engineering,Vivekananda College of Engineering for Women,Tiruchengode,637205,Tamil Nadu,India

    2Department of Electronics and Communication Engineering,Kongunadu College of Engineering and Technology,Thottiam,621215,Tamil Nadu,India

    3Department of Information Technology,M.Kumarasamy College of Engineering,Karur,639113,Tamil Nadu,India

    4Department of Mathematics,Jaypee University of Engineering and Technology,Guna,473226,M.P.,India

    5Business and Tourism Faculty,Universidad Nacional Santiago Antunez De Mayolo,Huaraz,Peru

    6Department of Computer Science and Engineering,Paavai Engineering College,Namakkal,637018,Tamil Nadu,India

    7School of Computing,SASTRA Deemed University,Thanjavur,613401,Tamil Nadu,India

    8Department of Computer Science and Engineering,PSN College of Engineering and Technology,Tirunelveli,627152,Tamil Nadu,India

    Abstract:The 5G demonstrations in a business has a significant role in today’s fast-moving technology.Manet in 5G,drives a wireless system intended at an enormously high data rate,lower energy,low latency,and cost.For this reason,routing protocols of MANET have the possibility of being fundamentally flexible,high performance,and energy-efficient.The 5G communication aims to afford higher data rates and significantly low Over-The-Air latency.Motivated through supplementary ACO routing processes,a security-aware,fuzzy improved ant colony routing optimization protocol is proposed in MANETs.The goal is to develop a MANET routing protocol that could provide a stable packet transmission ratio,less overhead connectivity,and low end-to-end latency in shared standard scenarios and attack states.MANET demonstrates effective results with hybrid architecture and proved to be effective than other state-of-the-art routing protocols of MANETs,like AODV,its routing organization implemented through Optimized Fuzzy based ACO Algorithm for 5G.Millimeter-wavelengths are required to perform a significant role in 5G.This research proposed to test the efficiency of MANET consisting of only mmWave User Equipment.MANET reduced packet transmission loss of UEs with mmWave,meaning well-transmitted SNR leads directly to a better packet delivery ratio.To verify results,simulation using the NS-3 simulator mmWave module is used.

    Keywords: 5G;attacks;D2D communications;MANET; mmWave;security

    1 Introduction

    As technology advances,smartphones,iPad,and added advanced portable devices are widely accepted in the average lifespan.Smart devices like mobile offer user’s various kinds of facilities that made life more comfortable,easy,and entertaining.Such portable devices have historically been associated with infrastructure-based networks like cellular networks,Wi-Fi,hot spots,and cable nets.Simultaneously,this kind of method can also form a Mobile Ad hoc NETwork(MANET) [1] that does not need any infrastructure.The MANETs are generally composed of wireless portable devices that can link and dispense the network free.Because of deficiency in an organization,a MANET would be set up at lower costs than required by deploying the wired network.Unlike portable devices that may link directly with each other through Wi-Fi or Bluetooth,the existence of supplementary specifications for routers,cables,or other forms of infrastructure-based equipment is not compulsory.They were studied over many years,and networks are developed uniquely through [2] mobile UE so that they are active in exchanging data in a wireless environment.MANET would be used in several applications,including disastrous areas,tactical edge operations,and crowded environments such as stadiums and educational campuses,where many users are willing to exchange data directly with everyone or use routers from other devices.

    The 5thGeneration (5G) in wireless communication [3] intends to offer great data rates with much reduced Over-The-Air (OTA) latency.The Millimetre-Wave (mmWave) wavelength plays a key role in 5G standards.This has the benefits of primarily presented bandwidth and reduced latency.Simultaneously,Millimetre-Wave (mmWave) wavelength also has certain drawbacks due to the restricted propagation spectrum [4] and the need to relay small beams to reach longer distances.This research is proposed to test the MANET’s efficiency ofmmWave User Equipment without eNodeB (or gNodeB as recently suggested by 3GPP) [5].For viability and reliability ofmmWaveMANET systems,the transmission ratio of data transferred among any two mobile nodes is essential in the network.This complex network topology (because of the complexity and lack of infrastructure) is inappropriate for regular end-to-end routing algorithms [6],which is why many MANETs routing protocols have been introduced for monitoring the data transmission from one node to other nodes in MANET using multi-hop nodes.MANET [7] currently has routing protocols that typically depend on wireless signals transmitted in the sub-6 GHz band.The claim is that wireless signals are no longer valid in the directional antennas and beamforming of the mmWave.To investigate such a lacking,mmWave systems use various methods to search the whole environment around them,such as Random Beam Forming (RBF),beam sweeping,etc.and deliver small directional beams [8] the predictable destination nodes for minimizing loss of propagation route.

    The Ant Colony Optimization (ACO) method is motivated through biology and incorporated with the method [9] used by ants to find effective routes by detecting deposited pheromones simultaneously.ACO perfectly suits networks in the environment and provides a collective framework for NP-hard optimization problems [10].Because of the dynamic environment of ACO’s networking,it continuously gets adapted to real-time network changes.Additionally,artificial ants can simultaneously catch multiple results to the problem under consideration.ACO-based models are therefore capable of finding optimum paths efficiently,which leads to being realistic in network communication routing.MANET applications [11] raise the attackers’stimulus to manipulate or interrupt them.For complex MANET systems,threats that seek to intrude the network or find private information in the network are always likely to be present.For example,in VANET situations,malicious vehicles will relay false road safety signals that could cause traffic jams or even crashes [12].Human life can be vulnerable in such circumstances if the network does not function correctly because of assaults.Also,some MANET nodes may be self-interested in the routing process for protecting the battery power or store data [13].

    Consequently,routing protocol architecture plays an essential role in maintaining MANET confidentiality [14].This study purports to develop an active routing protocol in MANETs that would not provide a high Packet Delivery Ratio (PDR) [15],minimize the overhead,and reduce end-to-end latency.Nevertheless,it can also be resilient contrary to malicious users and malfunctioning devices in the MANET.

    The first approach depends on a specific context in the implemented nodes and offers instructions to define the optimal option as a feature of the device parameters.A Digitally Enabled Phase Shifter Network (DPSN)-depends on a hybrid precoding scheme ofmmWave Massive MIMO,which leverages the low-rank property ofmmWave Massive MIMO channel matrix and incurs necessary cost and flexibility of transceiver in a marginal loss of control [16].This issue is common in scheduling and controlling congestion inmmWave multi-hop networks utilizing the Network Utility Maximization (NUM) method.Intrusion is developed on an exact model with two models: real intrusion,along with a graph-based Signal to Intrusion plus Noise Ratio measurement subjected to complex relation operation and position [17],in addition to these upper and lower limits derived by worst-case intrusion and Interference-Free (IF) estimate.

    Models and studies have multiple implications [18]: 1) for detailed parameter settings,mmWave systems are more significantly noise-limited than sub-6 GHz;2) initial exposure is far more complicated inmmWave;3) self-backhauling is more feasible than sub-6 GHz systems,which allow ultra-dense implementations more viable..However,it contributes to progressively intrusionlimited behavior;and 4) under direct comparison with sub-6-GHz wireless networks,operators may support each other by exchanging their spectrum licenses if the free conflict comes from this.In conclusion,the studies describe many significant extensions leading to the baseline model,several of which open the door for future research avenues [19].

    2 Related Works

    The range of disjoint paths in D2D networks becomes more complicated since the disjointed nodes affect their transmission ranges.When two routes could not disjoint the broadcast-rangeoverlap,the same eavesdropper will intercept communication in either direction.A privacy-aware 2-factor authentication protocol [20,21] based on ECC is suggested for WSNs.This latest protocol fulfills numerous security procedures required for implementations in real-life environments while retaining practical effectiveness.They presented that the newest protocol achieves the Burrows-Abadi-Needham basis of shared authentication.

    Regarding system usability,the design architecture also helps data processing and management [22].They often compare the edge and core computing regarding the hypervisor form,virtualization,stability,and heterogeneity of the node by directing the complexity of nodes at the edge or center of 5G and self-important security issues and possible methods of attacks on the shared data in the 5G network between various devices.

    A modern,secure,Time-Key-based,Single Sign-On (TK-SSO) key management protocol aims [23] at mobile devices by applying ECC.Thus,this helps one to obtain desired security properties,besides significantly lesser computation and connectivity.TK-SSO also allows device consumer and application revocations.They proved TK-SSO’s security in a commonly agreed intruder real-or-random model.Also,TK-SSO uses Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham logic (BAN) method to validate the TK-SSO withstand several known attacks.

    For Femtocell Users (FUs) [24],they suggested a combined channel distribution and energyaware algorithm using cerebral non-orthogonal multiple Access Radio.The aim is to optimize the FU’s volume of secure QoS policy.Cognitive Radio Non-Orthogonal Multiple Access (CRNOMA) is used by the Femto Base Station (FBS) to maintain QoS for FUs.

    The motivation for recent cellular mmWave technologies,intruder detection methods,and equipment give a range of test findings demonstrating 28-38 GHz frequencies [25] by utilizing steerable directional antennas in the BS and portable devices.The author [26] recommended a probabilistic model for characterizing the beam distribution and the possibility of convergence in automotivemmWave networks.The aim is to demonstrate several dynamic and well-formed tradeoffs that need to be addressed while improving vehicle scenario resolutions depending onmmWave networks.The traditional problem is dealing with the network’s mobility and managing protocols in single and multi-hop infrastructure.This network mobility should give global connectivity to the user without interrupting ongoing processes.Solving this primary issue needs to go for a better delivery ratio through mmWave networks in 5G.

    2.1 Relevant Methods

    For many years,MANET has demanded the focus of many research studies.Several routing protocols for MANET have been recommended,and the ones discussed in this work were ubiquitous.It is also important in this network to ensure connection setup and network stability and provide appropriate data transmission protocols.The design of routes for achieving Ergodic Rate Density (ERD) in every routing path has been verified [27].However,ERD is also considered as an upper bound,which achieved specific sub-optimal and other real-world protocols.

    An energy-efficient routing protocol integrates an ACO algorithm into it,naming it as ant-swarm inspired Energy-Efficient Ad Hoc On-Demand Routing protocol CO-EEAODR.This weighs the remaining energy level and path length before choosing the most energy-efficient route.Because of the energy efficiency goals within this procedure,the first criteria load is set at 0.71.In comparison,pheromone-value changes in every node focused on the remaining energy level.An ant chooses to move a node by advanced energy relatively lesser than the shortest routing path.

    Eavesdropping includes an attacker’s successful attention to data exchange that can take various forms based upon the nature of an intruder’s data and capacities.The author states that the relay node is viewed as an eavesdropper [28] in a relay scenario,in addition to 5G Deviceto-Device (D2D) communication contact in which data is protected even if it is necessary for transmission [29].

    Multipath routing is an important and challenging issue in wireless networks [30].They assume that the route discovery requirements differ between wired and wireless networks due to common unauthorized access and probability.Not only do nodes utilize bandwidth with their connections,but they also interact with nodes nearby [31].

    Interflow intrusion happens when two sections of the same flow try to utilize the same channel simultaneously [32].It is difficult to detect and measure intrusion while counting the output of paths since the connection uses both the routes and the network link can exert intrusion on its neighborhood using the relationship.This provides a survey about the MANET integrated with 5G.That provides more views of about 20 proposals towards discovery-based mobility management solutions.In that,optimized link-state routing and BATMAN protocol [33] provides the best outcome towards the integrated network.

    2.2 Summarization of Our Proposed Work

    1) For each case,we list various well-known and newly recommended channel models and equivalent path propagation loss,and expected energy is established.

    2) They analyze the impact of severalmmWave channel models (for different circumstances)tested in recent years on the output of specific well-known MANET routing protocols through the literature (delivery speed,error rate,energy efficiency,etc.,)

    3) The analysis shows that usingmmWave frequency bands (e.g.,28 GHz) for MANET standard routing protocols will.

    4) The architecture and study of 5GmmWave beamformed cell exploration for remote networks has been stated in part.

    5) The data transmission multi-hop routing in 5GmmWave V2X networks has been partially released.

    This emerges from observations,and its feasibility relies on the application of Fuzzy logic,and ACO seems to improve MANET health.Nonetheless,it is essential to select suitable parameters [34] involved in the fuzzy framework.The option may be profoundly affected by the protocol’s design goals and even linked to the designer’s viewpoints.For,e.g.,a practice typically permits the rule base used for a complicated structure to affect performance results.More attention is mandatory in this field,addressing or examining such accessible issues.Authentication backgrounds are an essential function that is used to reduce wireless networks’security.Such a framework was executed by 80% of trust-based models in this segment.

    As can be shown,the transmission ratio and also the number of packets transmitted in the simulator during network research are much higher and more reliable for the rural and industrialmmWave networks than standard Wi-Fi networks.This indicates the immense capacity thatmmWave has for short-range communications as predictable in the Ultra-Dense Networks (UDN).There are various research investigations ongoing to discover the drawbacks and characteristics of mmWave in the MANET domain that must be performed in this area.In addition to the transmission rate and the lack of propagation,the impact of Broad bandwidth (whichmmWave offers as a feature) on energy-driven device’s longevity and network capacity (especially in the catastrophic regions) is also significant [35] to be studied.The final step in this analysis ofmmWave in MANET impacts the packet distribution ratio of the transmission range.It is said that increased energy minimizes route loss due to intrusion for transmitting wireless networks.Still,less energy is more than enough formmWave’s directional beams to perform the same.

    We specified the issues of optimizing a feasible data rate formmWave HetNets,seeing both uplink and downlink connection,and connectivity link transmissions.We also suggested a resource allocation algorithm and hybrid scheduling,consisting of the maximal independent set scheduling algorithm,equal,fair slot allocation algorithm,and even the water-filling space allocation algorithm to effectively address the maximization problem [36].In addition to this,a hybrid routing algorithm using the path discovery algorithm is discovered;further,this algorithm increases the data rate obtained via the process of shared scheduling and allocation of resources with predefined static routes [37].

    It is exposed that,both with and without a dynamic routing algorithm,the suggested combined scheduling and resource allocation algorithm outperforms the benchmark schemes concerning feasible data rate and reaches theoretical equilibrium so far from lower latency [38].Also,the proposed algorithms enable versatile uplink,and downlink slot allocation to be modified,endorses half-duplex and full-duplex modes by significant performance improvements.Specifically,the proposed protocols can achieve different efficiency criteria with point-to-multipoint communications and point-to-point communications through specific importance on data transmission in the vehicle group examined by 5G standardization organizations and testing activities [39].

    3 System Model of OFACA-5G in MANET

    Motivated through additional ACO routing processes,a-security-aware,fuzzy enriched ant colony routing optimization protocol is proposed in MANETs.The goal is for an expanding MANET routing protocol that could provide a guaranteed packet transmission ratio,less overhead connectivity,and low end-to-end latency in shared standard scenarios and attack states.As a routing protocol for MANETs,an Optimized Fuzzy-based Ant Colony Algorithm for 5G(OFACA-5G) must,therefore,guarantee both efficiency and security because ANT proves effective outcomes with hybrid architecture and verified to be supplementarily effective than the additional state-of-the-art routing protocols of MANETs,like AODV,its routing organization implemented through OFACA-5G.

    3.1 Route Setup in OFACA-5G

    To relate the ACO system to routing in MANETs,it is essential for viewing the network as a graph.Ants only move beside edges of the table,reflecting contact relations between active nodes in the network.Node S emits sensitive FANTs to find a route [37].The likelihood of a reactive Path starting node‘i’for pick node‘j’is the next-hop stated in Eq.(1).

    3.2 Reactive Route Setup in OFACA-5G

    The sensitive Forward ANT (FANT) is one or the other unicast or transmitted at every intermediate node,as exposed in Fig.1,such that the present node has routing discovery details for the destination node.Whereas intermediate nodes first forward duplicate only,every obtained ant to limit overhead is incurred by transmitting ants.Reactive hop FANT moves to the destination node,or it reaches ANT at maximum travel hop count.According to this,the FANT selects one of its neighboring nodes for each move.

    It transforms into a Backward ANT (BANT),and afterward,the ant reaches the destination node and returns to the source node almost in the same path.The BANT changes the count for every intermediate node by applying the last hop’s count,and it reflects the cost of packet distribution on starting node ‘i’to node d beside the path.The sum of behaviour is kept informed to the transmission link since it depends on the active route in this link and the rate of desertion of the behaviour as presented in Eq.(2).An ant treats the efficiency of the path as quantity inversely comparative to the routing cost.

    is the previous reasonable behavior percentage of node ‘i’link and is modified standard behavior percentage with the node‘i’connection,and‘j’is the rate of evaporation of pheromones.In the tests,p set to 0.7,which is identical to ANT.Meanwhile,the cumulative cost is incurred for directing a packet node‘i’to node‘d’beside this path;thus,node A →B are adjacent to two nodes in this particular route),whereas the rate of directing a data packet from nodes A →B →D is well-defined.

    Figure 1:The flow of route set-up process

    3.3 Route Maintenance in OFACA-5G

    A proactive route discovery method consisting of dynamic behavior and distribution ant sampling is proposed in OFACA-5G to improve routing performance.

    Proactive Ant Sampling

    Core nodes sent out constructive forward ants periodically in the dynamic ant sampling cycle to collect routing details for ongoing data sessions.In this test,positive forward ants are focused during each second data session [38].The Proactive forward ant’s source likelihood rule is welldefined in Eq.(3) to decide their next step.

    This rule is similar to that defined in Eq.(1).Theαin Eq.(3) is set to 3 in the tests.Once forward ant becomes proactive,ant enters their target node to transform forward ant into passive backward ant with similar reactive backward ant’s behavior.On the way back to its source node,forwards ANT changes common—behavior values.

    3.4 Data Transmission in OFACA-5G

    Hop-by-hop,the data packets are forwarded to the target node after path initialization.Each hop then creates the routing choice to send data packets to the following path.Another thing is that routing decisions find regular behavior.In OFACA-5G,nodes forward data packets—random distribution depending upon varieties in standard behavior percentage stored for the proposed destination node in the—behavior table.

    3.5 Malicious Behavior in OFACA-5G

    This section describes the suspicious behavior detection method in addition to its primary routing method and describes the MANET’s intrusion detection.

    4 Fuzzy Logic Dependent Misbehavior Detection Model in MANETs

    In this research,the initial set of studies was focused on MANETs.These tests’objective is to secure the network from Sybil attacks and the black hole.There are much more data around those two attacks.The described intrusion detection system is described in this section.The new packet transmission and the forward rate were provided as input values to the intrusion detection system,whereas reliability is the outcome.

    4.1 Fuzzy Input

    Suppose a node transfers the packet in advance through another node;the transmitting node must continue to listen on the wireless channel to verify whether the receiving node is currently forwarding the packet inside a sec.In this method,only the latest 30 packets are investigated for sniffing connection.The PDR packets sent through the node represents the forward hop.These levels are SMALL/MID/HIGH in the Fuzzy system.Fuzzy logic controls the routing policies and dynamically boost controls the routing policies.From this input value,the membership function is applied in Fig.2.The Fuzzy framework’s subsequent input is a new transmission labeled as the number of packets transferred for forwarding to the assumed node,irrespective of whether it was acknowledged.The process of obtaining—fresh inputs as of the selected input variables and measuring the degree of the data belong to every respective fuzzy set is called Fuzzification.As the packets are distributed from the last 30 s,this will control a maximum of 30 packets as defined in the forward data rate.

    4.2 Fuzzy Output

    The fuzzy logic element accomplishes fuzzy inference over two input values,and it creates reliability of the output value.The combined output of the fuzzy set is assumed as input in this step,and a single—new number produces output.This outcome value is either be “Highly Unreliable,” “Unreliable,” “Neutral,” or “Reliable” in membership function—this output value is used to make decisions about the routing process.

    Figure 2:Experimental set-up of fuzzy based OFACA-5G in MANET

    4.3 Fuzzy Rules

    Rule 1:If the forward rate and current transmission are less,it is supposed that reliability is neutral,as minor is identified about node behavior.The node is classified as very weak if the latest communication is low [37].

    Rule 2:If forward performance is average,then every recent value of the low,medium and high transmission leads to stable,neutral,and inaccurate reliability values.

    Rule 3:Eventually,the node is accurate when the new transmission is low,and the forward rate is high.It is understood that the node is exact for new transmission values of low and high.

    4.4 Fuzzy Inference System Rules

    OFACA-5G improves ANT through a centralized suspicious activity detection system focused on a traffic monitoring system based on Fuzzy logic.Meanwhile,the network’s traffic monitoring within the network has no additional control packets present in the routing protocol,unlike the intrusion detection system.In MANET tests,each node paths every neighboring node’s activities.It transfers the new parameters,namely the forward rate and the number of new packets forwarded,through its fuzzy inferential device.In this experiment,the reliable threshold value was originated at 0:12.Whereas all nodes with reliability rates lesser than the threshold are considered unreliable,they would not select proactive or reactive forward ants.In this event,a node has only behavior rates to unstable nodes.The node sent new and sensitive forward ants to determine new possible routes that may lead to additional overhead.5 Model of mmWave Routing Algorithm for MANET

    Remote ad hoc networks made up of more UE are accomplished by directly sending and receiving through one another without network infrastructure.The network is accepted to have(n) UE at some moment.There will be a definite number of receivers and transmitters to share data packets through network service at particular times.The primary motive of this antenna is to gain directionality with performance,and reports various channel models.

    5 MANET Routing

    5.1 Differences from Traditional MANET Routing Algorithms

    We analyzed specific channel models recommended through [9] 3GPP to affect efficiency through several renowned MANET routing protocols.To recognize improvement in performance among traditional Wi-Fi andmmWave networks,we must first elucidate the following:

    1) Wi-Fi devices broadcast wireless signals and cover more extensive distances in all ways.Thus,mmWave devices transmit only narrow beams through specific directions and include smaller ranges.

    2) The Friis equation defines route Loss of Wi-Fi signal propagation.

    If we use similar path loss ofmmWave UE and proceeds,Txgain reflections

    Where n represents the Path Loss Exponent (PLE),and a single model parameter,with 10nperformance path loss indBin relations with times of spaces starting at 1m,whereas d is separate space between receiver and transmitter nodes,SF is a standard deviation that defines wide signal variations over mean path loss with space,and loss of Free Space Path Loss (FSPL)(f,1,m)signifies free path lossi.The FSPL might also be designated as: such thatcis the speed of light.

    While this is valid only for omnidirectional antennas,Fig.3 shows that the use of beamforming and directional antennas has a much-reduced path loss than comparable short-distance Wi-Fi devices.Thus,these proofs suggest the UE in MANET,which uses Wi-Fi frequencies,to transfer messages to root nodes that signify more loss in propagation.Compared,the UE withmmWave tends to transmit signals to closer nodes and narrow beams of significant directional gains that mean lesser distribution loss.The reduced transmission loss of UEs withmmWave means a well-communicated SNR that leads directly to a better packet delivery ratio.

    5.2 Multipath Routing and Security

    D2D network security requires other sensitive data and the sharing of keys.As soon as transmitting data through a single path,the attacker has to target only one node through the path.Having several disjoint routes to transfer data means an intruder needs to focus on the number of nodes.Multipath routing protocols may depend upon the theory of max-flow/min-cut.The maximum number of disjoint paths among source S and destination D is proportional to min-cut among S and D.

    Figure 3:Route path loss vs. route models vs. route distance

    5.2.1 Methodology City Section Mobility Model

    They implement node mobility by using the City Section Mobility Framework.Many multipath routing approaches are proposed in the sense of cognitive radio and wireless sensor networks.Multipath routing and cryptographic methods don’t exclude each other.Throughout combination,they can be used to provide greater security.

    5.2.2 Transmission Radius and Eavesdropping Rate

    In our simulation,the nodes can link a communication range with other nodes.They separate two nodes,the root node where the message is created and the destination node where the message is ended.During the simulation,we mark all relay nodes as eavesdropping nodes.

    5.2.3 Transmission Radius and Eavesdropping Rate

    For selecting a path from multipath,we proposed a well-known Path selection algorithm.Our simulations equate towards results when using multipath routing,but there is no account of security features of selecting-intruders-aware routes in the following algorithm.

    5.2.4 Algorithm 1:Optimized Multi-Path Selection Algorithm

    Step 1 Input: Link graph G (V,E)

    Step 2 Output: The optimal pathψ

    Step 3 Initialization:Vt={},Vn={},VC={s},w(v)=∞,?v∈V/s

    Step 4 Start

    Step 5 WhileVt/=Vdo

    Step 6 For Eachv €Vc,do

    Step 7 Eachu €V/Vtthat is neighbor ofv Do

    Step 8 If w (u)=∞OR w(u)=min {Wv-u,W(v)} then

    w(u)=min{wv-u,w(v)}

    P(u)=P(u)U{v}

    Vn=VnU{u}

    Step 9 Else If w(u)<min {min wv-u,w(v)} Then

    Empty P(u)

    P(u)={u};Vn=VnU{u}

    Else,Continue

    Step 10 End

    Empty Vc→Vc=Vn

    Empty Vn

    Step 11 End

    Return

    The optimal pathψ:s→...→P(P(d))→P(d)→d

    Step 12 End

    6 Result and Discussions

    Tab.1 displays the eavesdropping levels for every method in an overly dangerous world.Each transmission node is a-malicious eavesdropper,with varying radii and node size.The Multipath Route algorithm has less eavesdropping rate in every case,though there is no situation where eavesdropping is removed entirely.This algorithm results in a 28% eavesdropping rate in many networks with an effective transmission radius,affecting an 11% rate with a smaller range.It is known that except in two instances,the incidence of eavesdropping decreases as the distance rises.

    Table 1:Table caption

    6.1 MANET Scenarios

    To investigate the activity of OFACA-5G in particular,multiple tests are conducted based on different scenarios.The maximal node speed and amount of CBR sessions vary for black hole attack scenarios in the experiments.In the Sybil attack situations,the number of Sybil nodes occurs over the network,and the number of Sybil identities per Sybil node will differ.Tab.2 outlines different investigative series conducted in MANET scenarios.

    Table 2:Experiments of OFACA-5G

    6.2 Performance Evaluation Metrics

    The routing algorithms through sub-6GHz andmmWave algorithms are labeled below:

    1) Number of Packets Diffused (NPD)

    2) Packet Delivery Ratio (PDR)

    3) Average Delivery Ratio (ADR)

    6.3 Performance Evaluation

    The purpose of this research is to examine the viability of routing protocols inmmWave MANETs and then equate their efficiency for different network settings with the standard routing protocols in MANET.The newly developed module formmWave in (NS-3) is primarily used for simulation specified in Tab.3.The module offers variousmmWave channel models extracted from multiple dimension campaigns recently undertaken through different eco-friendly conditions and unique places.

    Table 3:Simulation scenario parameters

    On another side,the packets are moved through similar routing protocols usingmmWave frequencies.Also,it is evident that when utilized withmmWave,it provides excellent reliability and delivery ratio than sub-6GHz rates.

    The final step in ourmmWave investigation in MANET impacts the distribution ratio of transmitting capacity.It is well understood that increased energy could minimize route loss due to attenuation and intruders for sending wireless networks.Still,less energy should be enough formmWave’s directional beams to do the same.So,we analyzed the result of increasing UE’sTxcapacity on data packet transmission rate for specific routing protocols in MANETs.The results uncovered in Fig.4 are expected,which means that mmWave performs better than regular Wi-Fi frequency.According to the recent Federal Communication Commission (FCC),the maximum UE EIRP is 42dBm(nearly 20watts).We therefore,analyzed the effects of an aggregate of the EU’s Tx capacity on data packet transmission rate for various routing protocols in ad-hocnnetworks and outcomes referred.

    Figure 4:Average packet delivery of Wi-Fi vs.mmWave

    6.4 Presentation Beneath Black Hole Attacks

    Creation with the simple scenario labeled in this section,the nodes’maximum speed ranges in 5mssteps from 5-30ms.Since the aim is to test OFACA-5G’s output in both conventional and complex settings,OFACA-5G is pretending in three types of states: no black hole attacks,two continuous black hole nodes,and one ongoing black hole node.ANT is both selected in different scenarios for contrast.It triggers a lower PDR.Due to buffer time through intermediate nodes,the recovered data packets also cause a more significant delay.

    Fig.5 anticipated the OFACA-5 G and ANT PDR simulation outcomes when maximal node speed decreases.For the efficiency comparison,AODV without attacks is given as a secure attribute.This situation displays that ANT is the best PDR performance in states with no attacks;OFACA-5G outperforms AODV.If there are any black hole nodes in the network,then ANT will fail more than the other two protocols,and OFACA-5G will turn out to be the best solution.Although a substantial decrease in output triggered through a black hole is referred to in all three protocols,the number of black hole nodes present in the network raises.ANT with an average PDR drop of 41:8% loses more,while OFACA-5G performs the best with a 7:0% drop.In comparison,when focusing on differing node sizes,OFACA-5G’s PDR stays at the same standard,and above all other solutions are under consideration in all black hole attack scenarios.

    Figure 5:Average PDR with/without attack

    Overall,OFACA-5G’s PDR is resilient and more stable for attacks.It shows an average overhead of packets and bytes on behalf of all protocols nominated.Deviations are respectively: 8:4%and 7:6%.Relatively,AODV and ANT’s latency can be assumed to continue at some point as node speed increases.It shows that the AODV routing approach is outperforming the ACO-based routing methods.However,ANT has a minor delay,especially under blackhole attacks;it is mostly an object of how the delay is measured in tests.The delay is started by dropped packets,which are not reproduced.Fig.6 reveals which attacks of black hole ANT lose the most data packets.When several black hole nodes within the network grow,the protocol latency parameter decreases.One potential reason for this behaviour is which expired packets are not observed through delay measurement.It demonstrates that the Black Hole attacks in ANT-2BH and OFACA-5G-2BH are causing different packs to decrease.Hence,all protocols achieve better average latency.Looking at OFACA-5G’s calculations as speed rises reveal that the latency increases slightly as pace increases.In all estimated situations,the latency of simple ANT is significantly higher than OFACA-5G.

    It shows that more black hole nodes give the network more harmful effects.Unlike ANT,a second black hole node’s impact is highly prominent;OFACA-5G’s robustness just slightly decreases with two black hole nodes.ANT does not contain a precise defence method compared to black hole attacks,so lower power values than OFACA-5G are appropriate for it to have.When node speed is high,its solidity is no better than ANT’s robustness,and in some situations,it is even worse.OFACA-5G’s robustness is not significantly affected by rising node speeds.The output of OFACA-5G’s at a similar level with ANT is consistently overhead through both black hole nodes.From this point,OFACA-5G is the best solution for securing the network from attacks through the black hole.

    Figure 6:Average signal strength

    6.5 Performance Under Sybil Attacks

    This segment describes OFACA-5G’s success under Sybil assaults.Sybil nodes alter their uniqueness and do not have a destructive effect on routing efficiency.Thus,black hole intrusions [38] are involved in the operation.Sybil attack is applied in subsequent attacks through embedded black hole assaults unless it is not stated differently.In principle,this type of outbreak on Sybil is essentially a variation of black hole attacks.It can also provide further chances for malicious nodes to target the network.For instance,if the systematic nodes identify the first identity,the Sybil node will be unique to another new individuality in the network.The corresponding nodes must accept that identity as a new node.

    The different experiments’simulation findings demonstrate that OFACA-5G fits well into specific MANET environments and permits effective routing high PDR and small or equivalent end-to-end latency and overhead.This study examined the effectiveness of some well-known routing protocols formmWavefrequency bands for MANETs [39].This study demonstrated howmmWave frequencies would improve the network capacity and transmission ratio.Many network parameters were modified,and the MANET withmmWave is vulnerable to Wi-Fi equivalent in each situation.

    Security is a dynamic review in 5G networks and exciting due to cellular and 5G networks’private attributes;these methods vary from security against similar attacks on cable and other networks.Due to this open design and system collaboration,eavesdropping is an ongoing problem.Jamming restricts device access to limited space on the network.The communication moves to different channels,preferably because a jammer cannot track it.The first user simulation attack is a denial-of-service attack that is mainly vulnerable to 5G networks.It is observed that while increasing mobile device broadcast range improves potential eavesdropping and increases node density.It mitigates the issue by providing additional feasible routes.

    7 Conclusion

    In this proposed work,OFACA-5G introduced a MANETs routing protocol focusing on security-aware fuzzy logic and improved ant colony optimization with the hybrid routing solution by ANT.It uses a distributed fuzzy logic detection modelstructure to avoid suspicious or malicious nodes since the routing.The ACO algorithm and Fuzzy logic-based detection model are implemented.This detection model strongly analyses nodes’lack of network traffic information and has built-in strong fault tolerance to minimize false identification.The fuzzy reliability attribute is constantly modified,but regular nodes’ false identification like malicious nodes reasonably need a chance to show trustworthiness through secure data packets forwarding.To validate outcomes,simulation using the NS-3 (Network Simulator),which provides simulation results towards discrete-event network and mmWave module,is deployed for virtual reality towards broadband,transport systems,etc.

    Funding Statement: The authors received no specific funding for this study.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    黄片小视频在线播放| 丰满乱子伦码专区| 午夜福利在线在线| 国产精品国产高清国产av| 尤物成人国产欧美一区二区三区| 最后的刺客免费高清国语| 亚洲av免费在线观看| 亚洲中文字幕日韩| 男女那种视频在线观看| 亚洲av一区综合| 亚洲成人中文字幕在线播放| 精品福利观看| 国内精品久久久久精免费| 精品无人区乱码1区二区| 亚洲七黄色美女视频| 他把我摸到了高潮在线观看| 不卡一级毛片| 欧美高清成人免费视频www| 非洲黑人性xxxx精品又粗又长| 淫秽高清视频在线观看| 91午夜精品亚洲一区二区三区 | 精品久久久久久成人av| 午夜福利视频1000在线观看| 国产一区二区在线av高清观看| 午夜福利18| 网址你懂的国产日韩在线| 国产大屁股一区二区在线视频| 亚洲五月婷婷丁香| 亚州av有码| 好男人电影高清在线观看| 国产成+人综合+亚洲专区| 久久精品国产亚洲av天美| 成年人黄色毛片网站| 国产精品自产拍在线观看55亚洲| 国产免费av片在线观看野外av| ponron亚洲| 亚洲色图av天堂| 日本在线视频免费播放| www.www免费av| 国产精品免费一区二区三区在线| 有码 亚洲区| 国产一区二区三区视频了| 国产伦一二天堂av在线观看| 国产在视频线在精品| 国产中年淑女户外野战色| 国产精品久久久久久人妻精品电影| 婷婷六月久久综合丁香| 国产亚洲精品久久久久久毛片| 级片在线观看| 亚洲人成电影免费在线| 观看美女的网站| 国产精品,欧美在线| 老熟妇仑乱视频hdxx| 日韩国内少妇激情av| 亚洲天堂国产精品一区在线| 午夜激情欧美在线| 一区二区三区四区激情视频 | 三级男女做爰猛烈吃奶摸视频| 免费一级毛片在线播放高清视频| 日韩欧美在线二视频| 国产人妻一区二区三区在| 亚洲欧美日韩卡通动漫| 99热只有精品国产| 成人国产一区最新在线观看| 中文资源天堂在线| 亚洲第一电影网av| xxxwww97欧美| 国产亚洲av嫩草精品影院| 性色av乱码一区二区三区2| 十八禁网站免费在线| 日韩欧美精品v在线| 欧美三级亚洲精品| 9191精品国产免费久久| 亚洲欧美精品综合久久99| 国产亚洲精品久久久com| 午夜亚洲福利在线播放| 男女床上黄色一级片免费看| 丁香欧美五月| 大型黄色视频在线免费观看| .国产精品久久| 亚洲无线观看免费| 亚洲天堂国产精品一区在线| 欧美日韩亚洲国产一区二区在线观看| 亚洲欧美日韩高清专用| 亚洲aⅴ乱码一区二区在线播放| 久久精品久久久久久噜噜老黄 | 露出奶头的视频| 久久99热这里只有精品18| 人人妻人人澡欧美一区二区| 我的老师免费观看完整版| 黄色日韩在线| 国产精品不卡视频一区二区 | 日韩中字成人| 大型黄色视频在线免费观看| 女同久久另类99精品国产91| 国产毛片a区久久久久| 欧美潮喷喷水| 婷婷丁香在线五月| 国内精品久久久久久久电影| 国产精品嫩草影院av在线观看 | 全区人妻精品视频| 欧美日韩瑟瑟在线播放| 免费av观看视频| 亚洲人成网站高清观看| 亚洲久久久久久中文字幕| 99热6这里只有精品| 中国美女看黄片| 亚洲最大成人av| 亚洲av免费在线观看| 久久精品久久久久久噜噜老黄 | 精品久久久久久久末码| 亚洲av第一区精品v没综合| 淫秽高清视频在线观看| 少妇的逼好多水| 久久久成人免费电影| 亚洲自拍偷在线| 悠悠久久av| 欧美精品啪啪一区二区三区| 国产在线男女| 看免费av毛片| 亚洲人成网站高清观看| 免费电影在线观看免费观看| 少妇丰满av| 国产av在哪里看| 12—13女人毛片做爰片一| 国产精品98久久久久久宅男小说| 欧美日本视频| av专区在线播放| 国产成人a区在线观看| 精品人妻一区二区三区麻豆 | 成人精品一区二区免费| 亚洲av成人精品一区久久| 色av中文字幕| 三级毛片av免费| 日韩亚洲欧美综合| 亚洲五月婷婷丁香| 日韩高清综合在线| 一边摸一边抽搐一进一小说| 最近最新免费中文字幕在线| 久久6这里有精品| 美女xxoo啪啪120秒动态图 | 国内久久婷婷六月综合欲色啪| 国产单亲对白刺激| 狂野欧美白嫩少妇大欣赏| 日本一二三区视频观看| 97热精品久久久久久| 免费搜索国产男女视频| 99国产精品一区二区蜜桃av| 国产伦人伦偷精品视频| 偷拍熟女少妇极品色| 欧美性猛交黑人性爽| 亚洲熟妇中文字幕五十中出| 国产91精品成人一区二区三区| 一区福利在线观看| 久久这里只有精品中国| 国产高清激情床上av| 亚洲片人在线观看| 3wmmmm亚洲av在线观看| 无遮挡黄片免费观看| 欧美+亚洲+日韩+国产| 日韩欧美 国产精品| 欧美一区二区精品小视频在线| 亚洲成人久久性| 国产精品一区二区性色av| 999久久久精品免费观看国产| 久久国产精品影院| 激情在线观看视频在线高清| 在线十欧美十亚洲十日本专区| 国产探花极品一区二区| 99国产精品一区二区三区| 国产精品综合久久久久久久免费| 夜夜躁狠狠躁天天躁| 直男gayav资源| 亚洲久久久久久中文字幕| 亚洲美女搞黄在线观看 | 久久精品人妻少妇| av中文乱码字幕在线| 色在线成人网| 男人舔奶头视频| 午夜福利高清视频| 欧美一区二区精品小视频在线| 午夜福利高清视频| 日本五十路高清| 亚洲国产精品999在线| 亚洲成人中文字幕在线播放| 亚洲成人精品中文字幕电影| 日本五十路高清| 深夜a级毛片| 久久亚洲精品不卡| 3wmmmm亚洲av在线观看| av欧美777| 在线观看一区二区三区| 一级a爱片免费观看的视频| 国产不卡一卡二| 精品一区二区免费观看| 在线免费观看的www视频| 欧美黑人欧美精品刺激| 精品乱码久久久久久99久播| 天堂动漫精品| 噜噜噜噜噜久久久久久91| 国内毛片毛片毛片毛片毛片| 69av精品久久久久久| 性插视频无遮挡在线免费观看| 日本 欧美在线| 亚洲精品久久国产高清桃花| 久久性视频一级片| 国产成人aa在线观看| 亚洲成a人片在线一区二区| 桃色一区二区三区在线观看| 欧美黄色淫秽网站| 蜜桃久久精品国产亚洲av| 老女人水多毛片| 亚洲欧美日韩高清在线视频| 亚洲av中文字字幕乱码综合| 亚洲最大成人av| 国产精品久久久久久精品电影| 免费高清视频大片| 久久久久久大精品| 18禁在线播放成人免费| 岛国在线免费视频观看| 国产精华一区二区三区| 国产精品美女特级片免费视频播放器| 很黄的视频免费| 性欧美人与动物交配| 人妻久久中文字幕网| 日本一本二区三区精品| 少妇的逼水好多| 亚洲av五月六月丁香网| 亚洲第一区二区三区不卡| 日韩欧美国产一区二区入口| 欧美bdsm另类| www.999成人在线观看| 国产精品爽爽va在线观看网站| 欧美一区二区亚洲| 欧美zozozo另类| 一本一本综合久久| 成人鲁丝片一二三区免费| 亚洲人成网站在线播| 最近最新中文字幕大全电影3| 亚洲欧美日韩高清在线视频| 18+在线观看网站| 国语自产精品视频在线第100页| 麻豆久久精品国产亚洲av| 欧美日本亚洲视频在线播放| 亚洲精品亚洲一区二区| 三级男女做爰猛烈吃奶摸视频| h日本视频在线播放| 亚洲va日本ⅴa欧美va伊人久久| 日韩中文字幕欧美一区二区| 青草久久国产| 欧美成人性av电影在线观看| 日韩欧美精品免费久久 | 日韩国内少妇激情av| 精品不卡国产一区二区三区| 午夜福利在线在线| 99久久精品热视频| 国产精品三级大全| 欧美日韩乱码在线| 亚洲五月婷婷丁香| 美女高潮的动态| 九色国产91popny在线| 久久久久久久久中文| 日韩精品中文字幕看吧| 夜夜看夜夜爽夜夜摸| 欧美日本亚洲视频在线播放| 国产精品,欧美在线| 露出奶头的视频| 欧美在线一区亚洲| 亚洲人成电影免费在线| 一卡2卡三卡四卡精品乱码亚洲| 啦啦啦韩国在线观看视频| 好看av亚洲va欧美ⅴa在| 麻豆成人av在线观看| 欧美又色又爽又黄视频| 3wmmmm亚洲av在线观看| 一二三四社区在线视频社区8| 极品教师在线免费播放| 男人的好看免费观看在线视频| 欧美丝袜亚洲另类 | 欧美乱妇无乱码| 97超级碰碰碰精品色视频在线观看| 亚洲不卡免费看| 国产精品不卡视频一区二区 | 国产精品女同一区二区软件 | 噜噜噜噜噜久久久久久91| 俺也久久电影网| 国产精品亚洲av一区麻豆| 观看免费一级毛片| 日韩国内少妇激情av| ponron亚洲| 一进一出好大好爽视频| 日韩欧美免费精品| 久久九九热精品免费| 又爽又黄无遮挡网站| 日日夜夜操网爽| 一级黄色大片毛片| 国产av在哪里看| 宅男免费午夜| 两个人视频免费观看高清| 亚洲成人久久爱视频| www.熟女人妻精品国产| 特级一级黄色大片| 国产午夜福利久久久久久| 日韩中字成人| 亚洲内射少妇av| 久久午夜福利片| 蜜桃亚洲精品一区二区三区| 国产伦精品一区二区三区四那| 网址你懂的国产日韩在线| av天堂在线播放| 欧美黄色片欧美黄色片| 岛国在线免费视频观看| 亚洲成a人片在线一区二区| 亚洲精品乱码久久久v下载方式| 一级黄色大片毛片| 99久久精品热视频| 国产精华一区二区三区| 尤物成人国产欧美一区二区三区| 黄色配什么色好看| 深夜a级毛片| 欧美性感艳星| 国产精品久久久久久精品电影| 偷拍熟女少妇极品色| 成人av在线播放网站| 国产探花极品一区二区| 国产精品免费一区二区三区在线| 99热6这里只有精品| 欧美潮喷喷水| 欧美三级亚洲精品| 在线观看一区二区三区| or卡值多少钱| 午夜精品久久久久久毛片777| 一本精品99久久精品77| 亚洲色图av天堂| 亚洲精品一区av在线观看| 床上黄色一级片| 国产淫片久久久久久久久 | 国产久久久一区二区三区| 欧美乱色亚洲激情| 日韩精品青青久久久久久| 波多野结衣高清作品| 日本 欧美在线| 特大巨黑吊av在线直播| 久久久久免费精品人妻一区二区| 成人国产一区最新在线观看| 亚洲av免费在线观看| 亚洲精品影视一区二区三区av| 成熟少妇高潮喷水视频| 内射极品少妇av片p| 久久人人精品亚洲av| 久久久精品欧美日韩精品| 国产成人av教育| 国产成人a区在线观看| 亚洲精品一卡2卡三卡4卡5卡| 日韩中字成人| 天美传媒精品一区二区| xxxwww97欧美| 成人精品一区二区免费| 午夜福利高清视频| 国产一区二区在线av高清观看| 精品欧美国产一区二区三| 午夜久久久久精精品| 激情在线观看视频在线高清| 中文字幕人成人乱码亚洲影| 一夜夜www| 久久久国产成人精品二区| 亚洲成av人片在线播放无| av在线观看视频网站免费| 俄罗斯特黄特色一大片| 国产日本99.免费观看| 在线观看舔阴道视频| 日本五十路高清| 免费看美女性在线毛片视频| 欧美色欧美亚洲另类二区| 91九色精品人成在线观看| 99国产极品粉嫩在线观看| 舔av片在线| 欧美黄色淫秽网站| 国产免费男女视频| 最好的美女福利视频网| 俄罗斯特黄特色一大片| 美女高潮的动态| 免费看光身美女| 18禁黄网站禁片免费观看直播| 听说在线观看完整版免费高清| bbb黄色大片| 日韩欧美在线乱码| 波多野结衣高清无吗| 国产精品三级大全| 精品无人区乱码1区二区| 亚洲国产日韩欧美精品在线观看| 波多野结衣高清无吗| 久久久久久久午夜电影| 国产中年淑女户外野战色| 国产精品不卡视频一区二区 | 久久午夜福利片| av黄色大香蕉| 成年女人看的毛片在线观看| 九色成人免费人妻av| 热99re8久久精品国产| 亚洲国产日韩欧美精品在线观看| 午夜福利高清视频| 亚洲av电影在线进入| 国产精品亚洲av一区麻豆| 国内精品一区二区在线观看| eeuss影院久久| 色播亚洲综合网| 国产aⅴ精品一区二区三区波| 亚洲电影在线观看av| 色哟哟·www| 无人区码免费观看不卡| 91狼人影院| 午夜福利18| 岛国在线免费视频观看| 精品99又大又爽又粗少妇毛片 | 真人做人爱边吃奶动态| 99国产极品粉嫩在线观看| 在线观看美女被高潮喷水网站 | 精品久久久久久久人妻蜜臀av| 神马国产精品三级电影在线观看| 少妇裸体淫交视频免费看高清| 成人亚洲精品av一区二区| h日本视频在线播放| 亚洲,欧美精品.| 精品熟女少妇八av免费久了| 小蜜桃在线观看免费完整版高清| 欧美又色又爽又黄视频| 亚洲七黄色美女视频| 日本在线视频免费播放| 日本黄色视频三级网站网址| 九色成人免费人妻av| 亚洲成a人片在线一区二区| 日韩精品中文字幕看吧| 日韩欧美一区二区三区在线观看| 给我免费播放毛片高清在线观看| 日韩大尺度精品在线看网址| 婷婷精品国产亚洲av在线| 51午夜福利影视在线观看| 内地一区二区视频在线| 久久精品91蜜桃| 90打野战视频偷拍视频| 性欧美人与动物交配| 在线观看66精品国产| 亚洲熟妇熟女久久| 女人被狂操c到高潮| 国产白丝娇喘喷水9色精品| 精品午夜福利在线看| 狂野欧美白嫩少妇大欣赏| 国产伦一二天堂av在线观看| 一区福利在线观看| 精品欧美国产一区二区三| 免费av观看视频| 午夜a级毛片| 麻豆国产av国片精品| 成年版毛片免费区| 99久久成人亚洲精品观看| 国产视频一区二区在线看| 日本精品一区二区三区蜜桃| 老司机午夜十八禁免费视频| 欧美激情久久久久久爽电影| 久久精品国产清高在天天线| 欧美xxxx性猛交bbbb| 成人毛片a级毛片在线播放| 国产成人a区在线观看| 国产精品嫩草影院av在线观看 | 特大巨黑吊av在线直播| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 久久午夜亚洲精品久久| 精品无人区乱码1区二区| 露出奶头的视频| 欧美国产日韩亚洲一区| 永久网站在线| 久久6这里有精品| 欧美日本视频| 国产精品三级大全| av黄色大香蕉| 3wmmmm亚洲av在线观看| 超碰av人人做人人爽久久| 亚洲欧美激情综合另类| 日日摸夜夜添夜夜添小说| 三级国产精品欧美在线观看| 嫩草影视91久久| 亚洲综合色惰| 久久99热6这里只有精品| 午夜福利高清视频| 性色avwww在线观看| 精品福利观看| 国产黄色小视频在线观看| 看黄色毛片网站| 色噜噜av男人的天堂激情| 国产一区二区亚洲精品在线观看| 午夜久久久久精精品| 亚洲片人在线观看| 精品日产1卡2卡| 亚洲国产精品sss在线观看| 九色成人免费人妻av| 十八禁网站免费在线| 欧美成狂野欧美在线观看| 国产高清三级在线| 亚洲电影在线观看av| 美女黄网站色视频| 亚洲成av人片免费观看| 午夜精品一区二区三区免费看| 久久精品91蜜桃| 亚洲国产欧洲综合997久久,| 99在线视频只有这里精品首页| 观看免费一级毛片| 国内精品美女久久久久久| 国产欧美日韩精品亚洲av| 欧美日韩福利视频一区二区| a级一级毛片免费在线观看| 久久热精品热| 亚洲av一区综合| 婷婷丁香在线五月| 亚洲经典国产精华液单 | 久久久久久久午夜电影| 99久久精品国产亚洲精品| 亚洲一区二区三区不卡视频| 亚洲成人精品中文字幕电影| 51午夜福利影视在线观看| 91麻豆av在线| 变态另类成人亚洲欧美熟女| 美女黄网站色视频| 久99久视频精品免费| 欧美3d第一页| 国产精品人妻久久久久久| 亚洲专区国产一区二区| 欧美日本亚洲视频在线播放| 乱人视频在线观看| 男人狂女人下面高潮的视频| 午夜影院日韩av| 亚洲欧美精品综合久久99| 国产精品久久久久久亚洲av鲁大| 搡老妇女老女人老熟妇| 观看免费一级毛片| 国产精品综合久久久久久久免费| 国产精品爽爽va在线观看网站| 很黄的视频免费| 成人永久免费在线观看视频| 亚洲成人精品中文字幕电影| 亚洲国产精品成人综合色| 天堂影院成人在线观看| 国产午夜福利久久久久久| 亚洲最大成人av| 国产久久久一区二区三区| av在线蜜桃| 男女之事视频高清在线观看| 亚洲第一电影网av| 亚洲av成人不卡在线观看播放网| 99久久精品国产亚洲精品| 一级a爱片免费观看的视频| 一级黄片播放器| 网址你懂的国产日韩在线| 国产成年人精品一区二区| 成年免费大片在线观看| 国语自产精品视频在线第100页| 精品午夜福利在线看| 欧美3d第一页| 亚洲中文字幕一区二区三区有码在线看| 亚洲性夜色夜夜综合| 欧美国产日韩亚洲一区| 亚洲专区中文字幕在线| 免费人成视频x8x8入口观看| 亚洲三级黄色毛片| 精品久久久久久久久亚洲 | 精品久久国产蜜桃| 亚洲av不卡在线观看| 我的老师免费观看完整版| 亚洲七黄色美女视频| 免费在线观看日本一区| 久久精品久久久久久噜噜老黄 | 精品国内亚洲2022精品成人| 搡老岳熟女国产| 久久久国产成人免费| 亚洲国产精品合色在线| 有码 亚洲区| 别揉我奶头 嗯啊视频| 午夜福利在线在线| 男插女下体视频免费在线播放| 国产伦在线观看视频一区| www.999成人在线观看| 国产精品久久久久久久久免 | 日本五十路高清| 亚洲五月婷婷丁香| 亚洲电影在线观看av| 一本一本综合久久| 国产爱豆传媒在线观看| 久久精品国产99精品国产亚洲性色| 少妇丰满av| 别揉我奶头 嗯啊视频| 久久精品国产自在天天线| 夜夜夜夜夜久久久久| 全区人妻精品视频| 18美女黄网站色大片免费观看| 欧美日本视频| 成人特级av手机在线观看| 国产伦精品一区二区三区四那| 亚洲精品色激情综合| 成人美女网站在线观看视频| 我的女老师完整版在线观看| 亚洲欧美精品综合久久99| 国产男靠女视频免费网站| 一级作爱视频免费观看| 在线a可以看的网站| 久久6这里有精品| 欧美+日韩+精品| 俄罗斯特黄特色一大片| 日日摸夜夜添夜夜添小说| 天堂动漫精品| 久久久久精品国产欧美久久久| 国产三级在线视频| 欧美日韩福利视频一区二区| 久久精品91蜜桃| 高清毛片免费观看视频网站| 婷婷亚洲欧美|