• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    2022-11-10 02:29:16KunLinTsaiLiWoeiChenFangYieLeuandChuanTianWu
    Computers Materials&Continua 2022年10期

    Kun-Lin Tsai,Li-Woei Chen,Fang-Yie Leu and Chuan-Tian Wu

    1Department of Electrical Engineering,Tunghai University,Taichung,407,Taiwan

    2Research Center for Smart Sustainable Circular Economy,Tunghai University,Taichung,407,Taiwan

    3Department of Computer and Information Sciences,Chinese Military Academy,Kaohsiung,830,Taiwan

    4Department of Computer Science,Tunghai University,Taichung,407,Taiwan

    5Emergency Response Management Center,Industry-Academia Collaboration and University Extension Division,Ming-Chuan University,Taipei,111,Taiwan

    Abstract:Secure data communication is an essential requirement for an Internet of Things (IoT) system.Especially in Industrial Internet of Things(IIoT)and Internet of Medical Things(IoMT)systems,when important data are hacked,it may induce property loss or life hazard.Even though many IoTrelated communication protocols are equipped with secure policies,they still have some security weaknesses in their IoT systems.LoRaWAN is one of the low power wide-area network protocols,and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality.However,LoRaWAN’s encryption key update scheme can be further improved.In this paper,a Two-stage High-efficiency LoRaWAN encryption key Update Scheme(THUS for short)is proposed to update LoRaWAN’s root keys and session keys in a secure and efficient way.The THUS consists of two stages,i.e.,the Root Key Update(RKU)stage and the Session Key Update(SKU)stage,and with different update frequencies,the RKU and SKU provide higher security level than the normal LoRaWAN specification does.A modified AES encryption/decryption process is also utilized in the THUS for enhancing the security of the THUS.The security analyses demonstrate that the THUS not only protects important parameter during key update stages,but also satisfies confidentiality,integrity,and mutual authentication.Moreover,The THUS can further resist replay and eavesdropping attacks.

    Keywords:Key update;AES;LoRaWAN;IoT security;high efficiency

    1 Introduction

    Due to the rapid developments of Internet of Things (IoT),Artificial Intelligence (AI),and communication technologies,in recent years,IoT applications have been built for different fields.For example,an IoT system can be used in industry and medical treatment,and forms the so-called Industrial Internet of Things(IIoT)[1]and Internet of Medical Things(IoMT)[2]systems.For human daily lives,a smart home system[3]and a smart city[4]can also be created by combining IoT and AI technologies.In an IoT system,massive sensors are linked to network via wired and wireless connections,and then sensed data are delivered to control center,so that the corresponding operations can be performed.

    In order to provide mass,wide-range and low-power connections,the concept of Low Power Wide Area Network(LPWAN)communication structure is established.In the past decade,many LPWAN communication systems have been proposed,e.g.,Narrow Band IoT(NB-IoT)[5],Long Range Wide-Area Network (LoRaWAN)[6],Sigfox[7],DASH7[8],etc.Due to business and research reason,many NB-IoT and LoRaWAN related studies have been proposed.To allow mass IoT devices to communicate with each other,NB-IoT utilizes licensed telecommunication bands,while LoRaWAN uses unlicensed band.Generally,both NB-IoT and LoRaWAN have the features of wide-area and low-energy communication.Moreover,LoRaWAN is an evolving protocol and can be used for many modern IoT environments.

    The IoT security is as important as general computer and network security since its applications relate to businesses,industries,cities,and even human healthcare[9,10].Providing information confidentiality,data integrity,and device availability becomes an essential requirement for LPWAN communication systems.The Advanced Encryption Standard (AES)[11]is adopted by LoRaWAN to ensure the transmitted data can be safely delivered from sender to receiver.Besides,two types of session keys are utilized in AES data encryption and decryption processes between end-devices and servers[12].

    Even though LoRaWAN uses AES to protect the security of transmitted data,it still exists some security problems that need to be solved[13-15].For example,LoRaWAN’s root keys are kept in join-server and end-devices,but lack their own update mechanisms.Once the root keys are stolen,LoRaWAN’s security might be crashed.Besides,the session keys are updated through the end-device re-join process which may also lead to device management and data consistency problems.

    In order to deal with the key management and update problem,in this study,a Two-stage Highefficiency LoRaWAN key Update Scheme(THUS for short)is proposed to update LoRaWAN’s root keys and session keys in a secure and efficient way.The THUS utilizes modified AES process and system time stamp to achieve the goal of mutual authentication,confidentiality and message integrity during its update procedure.Besides,the security analysis also shows that the THUS has the ability to resist replay and eavesdropping attacks.In the THUS,the root key and session key can be renewed without changing the device information recorded in join-server,network-server,and applicationserver.Besides,with different key update frequencies,the THUS provides higher security level than the conventional LoRaWAN specification does.The main contributions of this paper are listed below.

    (i) The proposed THUS improves LoRaWAN key management by updating both root keys and session keys.

    (ii) The modified AES algorithm is utilized in the THUS so that the security of key update procedure can be enhanced and the processing performance can also be improved.

    (iii) During the key update procedure,the proposed THUS provides the features of mutual authentication,confidentiality and message integrity and has the ability to resist eavesdropping attack and replay attack.

    The remaining part of this paper is organized as follows.LoRaWAN security policy and some IoTrelated studies are introduced in Section 2.Then,Section 3 presents the detailed process of the THUS,including the Root Key Update (RKU) stage and Session Key Update (SKU) stage.The security analyses and discussion are presented in Section 4.Section 5 addresses the THUS performance.Section 6 concludes this study and points out our future study.

    2 Preliminary

    2.1 LoRaWAN Security

    Since LoRaWAN is one of the communication protocols designed for IoT applications,it provides many attractive features including low power and long-distance communication.The security policy of LoRaWAN[16,17]is established under the requirements of data confidentiality,mutual authentication between devices and servers,message integrity.Accordingly,AES cryptographic algorithm and two operation modes,i.e.,Counter Mode (CTR) and Cipher-based Message Authentication Code(CMAC),are adopted in the LoRaWAN data transmission.The CTR is used for data encryption and decryption,while the CMAC is utilized to guarantee the message integrity.Besides,LoRaWAN uses two types of session keys to protect data security,one for end-devices and application-servers,namely application session key(AppSKey),and another for end-devices and network-servers,namely network session key(NwkSKey for R1.0,and FNwkSIntKey,SNwkSIntKey,NwKSEncKey for R1.1.To simplify,in this study,the NwkSKey is used to represent all network session keys).As shown in Fig.1,when an end-device new joins to an IoT system,a globally unique identifier DevEUI and two unique root keys,including AppKey and NwkKey,are registered in join-server.And then,the join process between end-device and join-server generates two types of session keys by using DevEUI,AppKey and NwkKey.Following that,the NwkSKey and AppSKey are delivered to network-server and application-server,respectively.

    2.2 Related Studies

    Since IoT security is an important topic for constructing an IoT system,many related studies[18-21]have been proposed in the past years.According to the announced LoRaWAN 1.0 protocol,Naoui et al.[18]pointed out two important parameters might be attacked.The first parameter is a 16-bit counter,DevNonce,which is used to record the join times of an end-device.Since theDevNonceis transmitted with unencrypted format,the replay attack might be launched by some attacker.The second parameter isAppNoncewhich is utilized for mutual authentication between application-server and end-device.An attacker may forge the join acceptance message sent by network server,retransmit the same message to the end-device,and then pretend to be a legitimate application-server.In[18],Naoui et al.utilized an independent computer to be the trusted third party and created a timeline for every message so that the session keys can be delivered to network-server and application-server in a secure way.

    Eldefrawy et al.[19]checked the security policies of different LoRaWAN protocols.Similarly,they also claimed that the transmitted data will be disclosed when the parameterAppNoncein LoRaWAN v1.0 is known by attackers.However,LoRaWAN v1.1 utilized join-server to generate and dispatch session keys,hence enhanced the security level.Even though LoRaWAN improves its security in v1.1,many researchers still think the root key management is a drawback of LoRaWAN’s security policy.

    Chen et al.[20]proposed a comprehensive LoRaWAN key management scheme,which addressed key updating,key generation,key backup,and key backward compatibility.The centralized key management server designed in[20]was a trusted agent dealing with the whole lifecycle of the key management,i.e.,key generation/derivation,updating,backup/recovery,and key revocation.Compared with other previous studies,they provided a good and secure solution for LoRaWAN key management.However,involving an extra server may also lead to other security problems.Xing et al.[21]used elliptic curve cryptography for root key update scheme.Both end-devices and server adopted the hierarchical deterministic wallet to manage the key pair,and the key agreement between the end-devices and the server was realized by the elliptic curve Diffie-Hellman key exchange algorithm.They also used bi-directional Hash algorithm during communication.Although their method indeed enhanced the security of LoRaWAN key management,the complex elliptic curve cryptography algorithm consumed much power during key update procedure.

    D?nmez et al.[22]utilized a master device to store the original root keys of end-devices so as to enhance the LoRaWAN’s security.The connections between master device and end-devices are physical links,as a result,the master device can be considered as an extension part of end-devices.Moreover,the master device can also be utilized to charge the batteries of end-devices.However,when master device was hacked,it may result in serious problem of whole IoT system.

    Because original root keys are stored in end-devices,and in LoRaWAN standard,only session key can be update by using rejoin process;however,the root keys cannot be update.In[23],Han and Wang created a root key update method by using key derivation function to solve the key management problem.Their experiment showed that the key generation process can generate new root keys with very high degree of randomness.

    3 Two-Stage LoRaWAN Key Update Scheme

    As abovementioned,LoRaWAN’s protocols[16,17]do not take root key management into account.Once the root keys are attacked and stolen,it can easily induce security problems.In this section,as shown in Fig.2,a two-stage LoRaWAN key update scheme is proposed.The first one is root key update (RKU) stage,and the second one is session key update (SKU) stage.In Section 3.1,the modified AES is introduced so as to enhance the security level and reduce the computational complexity at the same time.Then,the detailed steps of RKU stage and SKU stage are described in Sections 3.2 and 3.3,respectively.The notations used in the RKU and SKU stage are illustrated and defined in Tab.1.

    Table 1:Notations used in RKU stage and SKU stage

    Table 1:Continued

    3.1 Modified AES

    In order to improve AES’s security strength and operating speed,a dynamic-box (D-Box) is designed to replace the original substitution-box(S-Box).The enhanced dynamic accumulated shifting substitution(EDASS)algorithm proposed in[24]and used in[25]is a randomized function which can be used to generate irreversible text.The EDASS based D-Box Generation(DBG)process uses three inner keys and three insertion arrays to generate a D-Box.During the RKU and SKU stage,the inputs of modified AES are plaintext and a D-Box,and the corresponding output is a ciphertext.Besides,a flag array is also utilized to prevent duplicate elements appear in the D-Box.For security reason,the D-Box is required irregular renewal.In this study,the D-Box of modified AES has 256 elements,which means that a total number ofpossible combinations of a D-Box.When an attacker captures some encrypted messages and would like to decrypt them,he needs 128-bit session key and the D-Box,indicating that the combination is up to 2128× 256!.Since EDASS algorithm and DBG process are input-sensitivity and randomness,decrypting the encrypting messages in a short period of time without correct session key and D-Box are very difficult.Besides,as shown in[25],by replacing S-Box with the D-Box,the encryption cycles of the conventional 128-bit AES can be simplified to 5 rounds.As a result,the modified AES with D-Box has high efficiency than the conventional AES does.

    3.2 Stage 1:Root Key Update Procedure

    In the RKU stage,there are three important parameters,i.e.,α,β,andγ,which are generated by network-server,end-device,and join-server,respectively.Firstly,network-server deliversαto joinserver and end-device so as to state up the RKU procedure.Then,the end-device sendsβto join-server by integratingαinto the encrypted message so that the feature of message integrity can be achieved.At the same time,the join-server also transmitsγto end-device.Once when end-device and join-server haveβandγin hand,they utilize these two parameters to generate two new root keys.As shown in Fig.3,in the RKU stage,there are 8 steps,which are described as follows.

    Figure 3:There are 8 steps in the RKU stage

    3.3 Stage 2:Session Key Update Procedure

    In the SKU stage,once the join-server receives the session key update request sent by networkserver,it generates an important parameter?,and utilizes?and new root keys generated in RKU stage to calculate new session keys,i.e.,AppSKeyandNwkSKey.Then the parameter?is delivered to the end-device so that the end-device can generate the same session keys.Next,the end-device sends a new-session-key encrypted acknowledgement message to join-server,and the join-server confirms the acknowledgement message to ensure that the session keys generated by the end-device are the correct.After that,the join-server delivers network session key and application session key to networkserver and application-server,respectively.Finally,both application-server and network-server send encrypted messages to the end-device to guarantee new session keys’function.As shown in Fig.4,in the SKU stage,there are 13 steps,which are described as follows.

    Figure 4:The SKU stage consists of 13 steps

    4 Security Analyses

    In this section,we analyze the security of THUS with Scyther tool[26]and discuss the security features of the THUS.The Scyther tool traces all parameters of the THUS,and checks whether these parameters are safe during transmission.The analyzed result is shown in Fig.5,in which the important parameters are not threatened by attackers.

    The other THUS security features are discussed as follows.

    ? Mutual authenticationindicates that the data transmission parties can authenticate with each other.In the RKU stage of the THUS,bothDevEUIandDevNonceare used to guarantee the authenticities of each communication pair.When an attacker lacks correctDevNonce,the correctandα⊕DevNoncecannot be calculated,and fails the checking in Steps(3.3),(4.3),(7.3),and (8.3).In the SKU stage,theJoinNonce,JoinEUI,andDevNonceare adopted to verify the identities of join-server,network-server,end-device,and application-server.Once an attacker is short of correctJoinNonce,JoinEUI,andDevNonce,the accurateAppSKeynewandNwkSKeynewcannot be calculated,and thus the Steps(4.6),(6.5),and(6.6)of SKU stage will generate wrong message,so that the checking in Steps(6.3),(9.3),and(11.3)will also be failed.Thus,the THUS equips mutual authentication feature.

    ? Confidentialityrepresents that the THUS has the ability to protect all important parameters.In the RKU stage and SKU stage of the THUS,all parameters become ciphertext by utilizing modified AES before transmission.In Steps(2a)and(2b)of RKU stage,the messagesD-Boxnewandαare encrypted by using encryption keysNwkSKeyoldandkns-js,respectively.In Steps(5)and(6)of RKU stage,the messages are both encrypted by usingAppSKeyold.In Steps(3)and(5)of SKU stage,the messages are encrypted by usingAppSKeyoldandAppSKeynew,respectively.In Steps(7)and(10)of SKU stage,the messages are encrypted by usingAppSKeynew,while in Steps(8)and(12)of SKU stage,the messages are encrypted by usingNwkSKeynew.According to abovementioned steps,different messages and important parameters can then be protected by using different encryption keys.

    Figure 5:The analyzed result of the proposed THUS

    ? Message integrityfeature makes sure the transmitted messages not be forged.In the THUS,eight message integrity patterns,i.e.,are generated to guarantee the integrity of transmitted message.When one of these patterns fails,the RKU or SKU stage is stopped.Consequentially,the THUS equips message integrity feature.

    ? Resist replay attackmeans some attacker captures some messages delivered by sender,duplicates those messages,and then retransmit them to receiver so as to pretend to be the legal sender.In the THUS,both RKU and SKU stages utilize time parameters (tnonce) to resist replay attack.Before data transmission,the time parameter is encrypted and embedded in the transmitted message.As shown in steps (3.2),(4.2),(7.2),and (8.2) of the RKU and steps (4.3),(6.2),(9.2),and(11.2)of the SKU,when receiver receives the message,the time parameter is utilized to guarantee the transmission time shorter than a predefine time limit.Once the actual transmission time is longer than the predefined time limit,it indicates that the message may send by illegal part,which means it may suffer replay attack.Accordingly,the THUS has the ability to prevent the replay attack.

    ? Resist eavesdropping attackindicates that an attacker captures massive messages and tries to obtain important information from them.In the THUS,parametersα,β,γ,ε,and D-Box are the most important parameters.The former three parameters are generated randomly and the D-Box is also produced by utilizing random box R-Box via DBG algorithm.All of these parameters and D-Box are encrypted by using EDASS before transmission.Since these parameters vary in every RKU stage and SKU stage,attackers cannot extract any parameters from the captured messages.

    The comparisons between the proposed THUS and five previous works are listed in Tab.2.As shown,the THUS equips not only root key update scheme,but also session key update scheme.By using modified AES algorithm,the THUS has the ability to provide high level security with efficient process.

    Table 2:The comparisons between the THUS and five previous works

    Table 2:Continued

    5 THUS Performance

    Tab.3 lists the operating time of the THUS,whereTrindicates random number generation time,TSHAis the secure hash algorithm computational time,TAESstands for AES computational time,TEDASSrepresents the EDASS algorithm operation time,andTbmeans the binary operation (addition and subtraction)time.According to the evaluation proposed in[24,25],TEDASSis less than half ofTAES,andTrandTbcan be ignored when compared withTAES,TEDASS,andTSHA,thus the THUS with modified AES has the feature of high-efficiency when compared with traditional AES encryption method.

    Table 3:The operating time of THUS with traditional AES and modified AES

    6 Conclusion and Future Studies

    Secure data communication is a basic requirement for every IoT system.Although LoRaWAN utilizes AES cryptography to achieve the goal of data integrity and confidentiality,the encryption key management can be further improved.In this paper,the THUS is proposed to update LoRaWAN’s root keys and session keys so that the LoRaWAN’s security scheme can be enhanced.The modified AES algorithm with dynamic substitution-box is utilized in both RKU stage and SKU stage.According to the security discussion above,the proposed THUS has the features of mutual authentication,confidentiality and message integrity,and can resist replay and eavesdropping attacks.

    In the future,the formal security verification for the RKU and SKU will be performed.Besides,the implementation of THUS on a FPAG (Field Programmable Gate Array) system will also be developed so that the real performance can be evaluated.These constitute our future studies.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    9191精品国产免费久久| 满18在线观看网站| 亚洲精品在线美女| 国产亚洲精品一区二区www| 精品卡一卡二卡四卡免费| 亚洲av中文字字幕乱码综合 | 99热6这里只有精品| 国产成人一区二区三区免费视频网站| 69av精品久久久久久| 午夜免费激情av| 香蕉国产在线看| 一本一本综合久久| 99riav亚洲国产免费| 亚洲aⅴ乱码一区二区在线播放 | 国产三级黄色录像| 免费电影在线观看免费观看| 男女床上黄色一级片免费看| 亚洲第一青青草原| 国产亚洲欧美在线一区二区| 一夜夜www| 69av精品久久久久久| 久久精品国产亚洲av高清一级| 午夜亚洲福利在线播放| 亚洲国产精品成人综合色| 国产成人精品无人区| 国产精品久久久久久人妻精品电影| 夜夜爽天天搞| 亚洲成av人片免费观看| 亚洲七黄色美女视频| 久久人妻福利社区极品人妻图片| 天天添夜夜摸| 国产精品日韩av在线免费观看| 亚洲狠狠婷婷综合久久图片| 欧美成人性av电影在线观看| 亚洲五月天丁香| 国产亚洲av嫩草精品影院| 午夜精品久久久久久毛片777| 两人在一起打扑克的视频| 日本三级黄在线观看| 亚洲国产精品久久男人天堂| 精品久久久久久久久久久久久 | 精品不卡国产一区二区三区| 在线观看www视频免费| 婷婷精品国产亚洲av在线| 精品国产一区二区三区四区第35| 色在线成人网| 一区福利在线观看| 国产亚洲精品久久久久久毛片| 亚洲电影在线观看av| 婷婷精品国产亚洲av在线| 男女做爰动态图高潮gif福利片| 18禁国产床啪视频网站| 久久精品aⅴ一区二区三区四区| 亚洲国产看品久久| avwww免费| 亚洲av成人不卡在线观看播放网| 亚洲成人精品中文字幕电影| 免费电影在线观看免费观看| 欧美性猛交黑人性爽| 亚洲五月天丁香| 久久九九热精品免费| 久久性视频一级片| 中文字幕精品亚洲无线码一区 | 午夜福利在线观看吧| 午夜福利免费观看在线| 制服丝袜大香蕉在线| 18美女黄网站色大片免费观看| 欧美成狂野欧美在线观看| 老司机午夜十八禁免费视频| av免费在线观看网站| 精品一区二区三区视频在线观看免费| 亚洲 国产 在线| 亚洲片人在线观看| 国产欧美日韩精品亚洲av| 国产精品精品国产色婷婷| 18禁裸乳无遮挡免费网站照片 | 两人在一起打扑克的视频| 法律面前人人平等表现在哪些方面| xxx96com| 黑人操中国人逼视频| 亚洲成人久久性| 国产亚洲精品第一综合不卡| 日韩欧美一区视频在线观看| 深夜精品福利| 丝袜美腿诱惑在线| 国产成人精品无人区| 欧美色视频一区免费| 一卡2卡三卡四卡精品乱码亚洲| 中文字幕最新亚洲高清| 丁香六月欧美| 欧美 亚洲 国产 日韩一| 欧美日韩精品网址| 日韩欧美 国产精品| 男人舔奶头视频| 久久狼人影院| 少妇被粗大的猛进出69影院| 国产黄a三级三级三级人| 亚洲av第一区精品v没综合| 国产色视频综合| 夜夜夜夜夜久久久久| 国产一区二区激情短视频| 日韩 欧美 亚洲 中文字幕| 国产欧美日韩一区二区三| 女性生殖器流出的白浆| 久久天躁狠狠躁夜夜2o2o| 欧美色欧美亚洲另类二区| 成人18禁高潮啪啪吃奶动态图| 99久久99久久久精品蜜桃| 午夜两性在线视频| 国产男靠女视频免费网站| 午夜福利一区二区在线看| 琪琪午夜伦伦电影理论片6080| 亚洲av熟女| a在线观看视频网站| 亚洲色图 男人天堂 中文字幕| 最新在线观看一区二区三区| 最近最新中文字幕大全电影3 | 国产在线精品亚洲第一网站| 9191精品国产免费久久| 亚洲国产高清在线一区二区三 | 午夜福利在线观看吧| 少妇的丰满在线观看| 免费观看精品视频网站| 在线观看舔阴道视频| 一级a爱视频在线免费观看| 婷婷精品国产亚洲av在线| 欧美激情 高清一区二区三区| 免费高清在线观看日韩| 99riav亚洲国产免费| 成人亚洲精品av一区二区| 久久国产亚洲av麻豆专区| 国语自产精品视频在线第100页| 国产三级在线视频| 国产一区二区激情短视频| 久久久久九九精品影院| 欧美另类亚洲清纯唯美| 一级毛片高清免费大全| 久久香蕉精品热| 亚洲国产精品sss在线观看| 国产黄a三级三级三级人| 国产精品 国内视频| 女人被狂操c到高潮| 黄色毛片三级朝国网站| 中文亚洲av片在线观看爽| 国产不卡一卡二| 国产精品精品国产色婷婷| 男人的好看免费观看在线视频 | 日本一区二区免费在线视频| 熟女少妇亚洲综合色aaa.| 真人做人爱边吃奶动态| 一级黄色大片毛片| 精品人妻1区二区| 国产精品一区二区三区四区久久 | 欧美成人免费av一区二区三区| 成人精品一区二区免费| 777久久人妻少妇嫩草av网站| 搡老岳熟女国产| a级毛片a级免费在线| 一区二区三区精品91| 午夜成年电影在线免费观看| 精品高清国产在线一区| 亚洲电影在线观看av| 神马国产精品三级电影在线观看 | 国产三级在线视频| 亚洲成人国产一区在线观看| 搡老妇女老女人老熟妇| 久99久视频精品免费| 日本三级黄在线观看| 香蕉国产在线看| www国产在线视频色| 久久久久免费精品人妻一区二区 | 国产一区二区激情短视频| 日本 欧美在线| 中出人妻视频一区二区| 中文在线观看免费www的网站 | 美女国产高潮福利片在线看| 黄色 视频免费看| 黄片小视频在线播放| 国产成人精品无人区| 国产精品亚洲av一区麻豆| 9191精品国产免费久久| 妹子高潮喷水视频| 久久婷婷人人爽人人干人人爱| 欧美激情高清一区二区三区| 亚洲一卡2卡3卡4卡5卡精品中文| 成人18禁高潮啪啪吃奶动态图| 亚洲一区中文字幕在线| 久久国产精品男人的天堂亚洲| av在线天堂中文字幕| 大香蕉久久成人网| 成熟少妇高潮喷水视频| 亚洲一区二区三区不卡视频| 天天躁夜夜躁狠狠躁躁| 国产一区二区在线av高清观看| 最近在线观看免费完整版| 怎么达到女性高潮| 国产视频一区二区在线看| av在线播放免费不卡| 天天添夜夜摸| 可以在线观看的亚洲视频| 精品久久久久久久久久免费视频| 手机成人av网站| 久久国产精品男人的天堂亚洲| 久久久精品欧美日韩精品| 国产极品粉嫩免费观看在线| 国产精品久久电影中文字幕| 欧美绝顶高潮抽搐喷水| 亚洲国产高清在线一区二区三 | 欧美成人一区二区免费高清观看 | 亚洲精品粉嫩美女一区| 一级片免费观看大全| 国产成人欧美在线观看| 国产伦一二天堂av在线观看| 一级a爱片免费观看的视频| 黄频高清免费视频| xxxwww97欧美| 国产伦在线观看视频一区| 国内少妇人妻偷人精品xxx网站 | 丁香六月欧美| 韩国精品一区二区三区| 久久久水蜜桃国产精品网| 国产欧美日韩一区二区精品| 久久国产精品人妻蜜桃| 中文亚洲av片在线观看爽| 午夜福利一区二区在线看| 亚洲精华国产精华精| 国产精品久久电影中文字幕| 婷婷亚洲欧美| 男人舔女人下体高潮全视频| 国产黄色小视频在线观看| 国产视频内射| 无限看片的www在线观看| 18禁观看日本| 亚洲人成77777在线视频| 国产成人一区二区三区免费视频网站| 国产1区2区3区精品| 国产视频一区二区在线看| 欧美又色又爽又黄视频| 十八禁网站免费在线| 亚洲五月婷婷丁香| 中文在线观看免费www的网站 | 动漫黄色视频在线观看| 国产精品免费一区二区三区在线| 香蕉国产在线看| 脱女人内裤的视频| 亚洲精品在线观看二区| av在线天堂中文字幕| 最新在线观看一区二区三区| av电影中文网址| 国产精品久久久av美女十八| 中文字幕另类日韩欧美亚洲嫩草| 无人区码免费观看不卡| 亚洲 欧美一区二区三区| 男人舔女人的私密视频| 国产精品日韩av在线免费观看| e午夜精品久久久久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 婷婷六月久久综合丁香| 色精品久久人妻99蜜桃| 黄片播放在线免费| 18禁观看日本| 一个人免费在线观看的高清视频| 在线看三级毛片| 亚洲国产日韩欧美精品在线观看 | 19禁男女啪啪无遮挡网站| 国产国语露脸激情在线看| 国产成人精品久久二区二区免费| 一区二区三区高清视频在线| 免费电影在线观看免费观看| 一区二区三区精品91| 怎么达到女性高潮| 91字幕亚洲| 丝袜美腿诱惑在线| 国产视频内射| 黄色毛片三级朝国网站| 国产精品免费视频内射| 欧美在线黄色| cao死你这个sao货| 欧美日韩亚洲国产一区二区在线观看| 美女国产高潮福利片在线看| 国产av一区二区精品久久| av超薄肉色丝袜交足视频| 大型黄色视频在线免费观看| 国产欧美日韩精品亚洲av| 中文字幕人妻熟女乱码| 在线国产一区二区在线| 午夜福利欧美成人| 禁无遮挡网站| 啦啦啦韩国在线观看视频| 人人妻人人澡欧美一区二区| 99国产综合亚洲精品| 国产单亲对白刺激| 激情在线观看视频在线高清| 亚洲久久久国产精品| 麻豆成人午夜福利视频| 中文资源天堂在线| 波多野结衣高清无吗| 久久人妻福利社区极品人妻图片| 欧美色欧美亚洲另类二区| 757午夜福利合集在线观看| 日韩欧美三级三区| 99久久精品国产亚洲精品| 欧美国产精品va在线观看不卡| 97人妻精品一区二区三区麻豆 | 久久久久久亚洲精品国产蜜桃av| 久久久久国产精品人妻aⅴ院| 亚洲av美国av| 人人妻人人澡人人看| 超碰成人久久| 村上凉子中文字幕在线| 成人午夜高清在线视频 | 99re在线观看精品视频| 一区二区三区精品91| 国产精品电影一区二区三区| 国产精品影院久久| 久久人妻福利社区极品人妻图片| www.精华液| 日韩欧美国产一区二区入口| 两个人视频免费观看高清| 国产激情久久老熟女| 精品国产超薄肉色丝袜足j| 亚洲人成77777在线视频| 亚洲国产精品久久男人天堂| 国内少妇人妻偷人精品xxx网站 | 亚洲人成网站在线播放欧美日韩| 在线免费观看的www视频| 99精品久久久久人妻精品| 久久久久精品国产欧美久久久| 国产高清视频在线播放一区| 性色av乱码一区二区三区2| 中文字幕最新亚洲高清| 午夜免费成人在线视频| 又大又爽又粗| 无限看片的www在线观看| 亚洲成人国产一区在线观看| 久久这里只有精品19| 搡老熟女国产l中国老女人| 久久精品国产清高在天天线| 99在线视频只有这里精品首页| 一本大道久久a久久精品| 免费av毛片视频| 非洲黑人性xxxx精品又粗又长| 色老头精品视频在线观看| 免费电影在线观看免费观看| 99热6这里只有精品| 99国产精品一区二区三区| 亚洲国产欧洲综合997久久, | 天天躁夜夜躁狠狠躁躁| 午夜亚洲福利在线播放| 中文在线观看免费www的网站 | 在线观看www视频免费| 久久中文字幕人妻熟女| 观看免费一级毛片| 国产野战对白在线观看| 久久精品成人免费网站| 99国产精品99久久久久| 在线永久观看黄色视频| 99久久国产精品久久久| 人人妻人人看人人澡| 久久精品国产清高在天天线| 三级毛片av免费| 老熟妇乱子伦视频在线观看| 国产黄a三级三级三级人| 人妻久久中文字幕网| 国产精品影院久久| 久久久久国内视频| 中文字幕高清在线视频| 国产精品香港三级国产av潘金莲| 国产真实乱freesex| 国产精品国产高清国产av| 国产精品免费一区二区三区在线| 十分钟在线观看高清视频www| 动漫黄色视频在线观看| 香蕉丝袜av| 夜夜躁狠狠躁天天躁| 一级a爱片免费观看的视频| 在线观看日韩欧美| 国产乱人伦免费视频| 99在线人妻在线中文字幕| 欧美另类亚洲清纯唯美| 日韩欧美国产一区二区入口| 色精品久久人妻99蜜桃| 亚洲一区二区三区不卡视频| 99精品欧美一区二区三区四区| 97超级碰碰碰精品色视频在线观看| 亚洲中文字幕日韩| 变态另类丝袜制服| 黄色丝袜av网址大全| 久久国产乱子伦精品免费另类| 好男人在线观看高清免费视频 | 99热只有精品国产| 在线看三级毛片| 精品一区二区三区视频在线观看免费| 久久久国产精品麻豆| 国产麻豆成人av免费视频| 日韩精品中文字幕看吧| 久久久久久国产a免费观看| 级片在线观看| 成人特级黄色片久久久久久久| 1024香蕉在线观看| 99久久精品国产亚洲精品| 国产精品免费视频内射| 一区二区日韩欧美中文字幕| 国产精华一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 1024香蕉在线观看| 国产亚洲欧美98| 国产精品乱码一区二三区的特点| 一进一出好大好爽视频| 久久精品国产99精品国产亚洲性色| 好男人电影高清在线观看| 成年人黄色毛片网站| 激情在线观看视频在线高清| 一个人免费在线观看的高清视频| svipshipincom国产片| 美女大奶头视频| 无人区码免费观看不卡| 动漫黄色视频在线观看| 国产高清有码在线观看视频 | 久久中文字幕人妻熟女| 一卡2卡三卡四卡精品乱码亚洲| 久久热在线av| 久久久久亚洲av毛片大全| 亚洲第一av免费看| 亚洲人成伊人成综合网2020| 亚洲精品在线美女| 久久亚洲真实| 色婷婷久久久亚洲欧美| 欧美激情高清一区二区三区| 观看免费一级毛片| 久久国产精品男人的天堂亚洲| 午夜老司机福利片| 精品国产超薄肉色丝袜足j| 亚洲精华国产精华精| 超碰成人久久| 国产精品av久久久久免费| 精品高清国产在线一区| 亚洲熟妇中文字幕五十中出| 少妇的丰满在线观看| 久久欧美精品欧美久久欧美| 午夜精品久久久久久毛片777| 一二三四在线观看免费中文在| 一夜夜www| 国产亚洲精品一区二区www| 国产蜜桃级精品一区二区三区| 久久九九热精品免费| 久热爱精品视频在线9| 久久亚洲真实| 国产精品乱码一区二三区的特点| 天天添夜夜摸| 麻豆一二三区av精品| 长腿黑丝高跟| 亚洲在线自拍视频| 在线永久观看黄色视频| 国产v大片淫在线免费观看| 此物有八面人人有两片| 最近在线观看免费完整版| 黄色 视频免费看| 两性夫妻黄色片| 超碰成人久久| 亚洲性夜色夜夜综合| 波多野结衣巨乳人妻| 国产欧美日韩精品亚洲av| 精品久久久久久久久久免费视频| 午夜免费观看网址| 99热这里只有精品一区 | 精华霜和精华液先用哪个| 久久这里只有精品19| 亚洲专区中文字幕在线| 精品欧美国产一区二区三| 成人特级黄色片久久久久久久| 亚洲精品久久国产高清桃花| 色老头精品视频在线观看| 午夜亚洲福利在线播放| 亚洲av片天天在线观看| 天堂动漫精品| 国产精品永久免费网站| 久久婷婷人人爽人人干人人爱| 欧美中文综合在线视频| 亚洲色图av天堂| 成人午夜高清在线视频 | 日本a在线网址| 女性被躁到高潮视频| 欧美zozozo另类| 亚洲午夜理论影院| 欧美性猛交黑人性爽| 夜夜躁狠狠躁天天躁| 精品乱码久久久久久99久播| 国产高清videossex| 国内揄拍国产精品人妻在线 | 757午夜福利合集在线观看| 中文字幕另类日韩欧美亚洲嫩草| 韩国av一区二区三区四区| 日韩视频一区二区在线观看| 黑人欧美特级aaaaaa片| 日本一区二区免费在线视频| 精品电影一区二区在线| 操出白浆在线播放| 国产成人欧美| 18美女黄网站色大片免费观看| 免费在线观看视频国产中文字幕亚洲| 亚洲av电影在线进入| 99国产精品99久久久久| 国产一区二区三区在线臀色熟女| 色播在线永久视频| 日韩视频一区二区在线观看| 热re99久久国产66热| 亚洲精品国产精品久久久不卡| 可以在线观看毛片的网站| 亚洲国产欧洲综合997久久, | 男女做爰动态图高潮gif福利片| 国产单亲对白刺激| 国产在线观看jvid| 校园春色视频在线观看| 日韩 欧美 亚洲 中文字幕| 国产精品亚洲av一区麻豆| 欧美又色又爽又黄视频| 很黄的视频免费| 97碰自拍视频| 在线观看免费午夜福利视频| 久久久久久九九精品二区国产 | 成人国语在线视频| 色在线成人网| 久久精品国产99精品国产亚洲性色| 国产成人系列免费观看| 久久草成人影院| 国产又爽黄色视频| 精品午夜福利视频在线观看一区| 久久久国产欧美日韩av| 国产日本99.免费观看| 99国产极品粉嫩在线观看| aaaaa片日本免费| 婷婷精品国产亚洲av在线| 日本一区二区免费在线视频| 999久久久精品免费观看国产| 给我免费播放毛片高清在线观看| 色哟哟哟哟哟哟| 国产麻豆成人av免费视频| 久久欧美精品欧美久久欧美| 午夜老司机福利片| 国产精品影院久久| 十分钟在线观看高清视频www| 美女大奶头视频| 亚洲avbb在线观看| 色综合亚洲欧美另类图片| 国产aⅴ精品一区二区三区波| 亚洲第一青青草原| 怎么达到女性高潮| 色综合站精品国产| 国产亚洲精品一区二区www| 欧美zozozo另类| 日本成人三级电影网站| 制服诱惑二区| 男人舔女人的私密视频| 免费在线观看成人毛片| 国产成人系列免费观看| 色综合欧美亚洲国产小说| 国产主播在线观看一区二区| 伦理电影免费视频| 十八禁网站免费在线| 亚洲av片天天在线观看| 91av网站免费观看| 午夜福利视频1000在线观看| 亚洲电影在线观看av| 1024手机看黄色片| 亚洲av成人不卡在线观看播放网| 国内精品久久久久久久电影| 在线视频色国产色| 国产片内射在线| 日本精品一区二区三区蜜桃| 看片在线看免费视频| 丝袜美腿诱惑在线| 少妇熟女aⅴ在线视频| 又大又爽又粗| 少妇粗大呻吟视频| 精品无人区乱码1区二区| 中文字幕人成人乱码亚洲影| 午夜久久久久精精品| 国产黄a三级三级三级人| 国产亚洲精品av在线| av视频在线观看入口| 黑人巨大精品欧美一区二区mp4| 国产熟女午夜一区二区三区| 日韩欧美国产一区二区入口| www国产在线视频色| 久久99热这里只有精品18| 黄片播放在线免费| 久久久精品欧美日韩精品| 激情在线观看视频在线高清| 黄片大片在线免费观看| 国产高清视频在线播放一区| 99久久精品国产亚洲精品| 国产精品香港三级国产av潘金莲| 国产在线精品亚洲第一网站| 黄色视频不卡| 国产伦一二天堂av在线观看| 久久精品成人免费网站| 岛国在线观看网站| 国内毛片毛片毛片毛片毛片| 精品高清国产在线一区| 久久婷婷人人爽人人干人人爱| 99久久综合精品五月天人人| 亚洲精品中文字幕在线视频| 99riav亚洲国产免费| 欧美乱色亚洲激情| 欧美日韩亚洲综合一区二区三区_| 日本一本二区三区精品| 国产又色又爽无遮挡免费看| 校园春色视频在线观看| 999久久久国产精品视频| 一级片免费观看大全| 久久久久久久久中文| 国产一卡二卡三卡精品| 国产成人欧美在线观看| 久久精品91蜜桃|