• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

    2022-11-10 02:32:46FasilaandSheenaMathew
    Computers Materials&Continua 2022年10期

    K.A.Fasilaand Sheena Mathew

    School of Engineering,Cochin University of Science and Technology,Kerala,India

    Abstract:Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well.The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems.Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above.In this work,a novel and efficient scheme for providing security in IoT applications is introduced.The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and transfer phases.Existing works rely on a single key for communication between sensing device and the attached gateway node.In proposed scheme,this session key is updated after each session and this is done by applying principles of cellular automata.The proposed system provides multilevel security by using incomparable benefits of blockchain,dynamic key and random number generation based on cellular automata.The same was implemented and tested with the widely known security protocol verification tool called Automated Validation of Internet Security Protocols and Applications(AVISPA).Results show that the scheme is secure against various attacks.The proposed scheme has been compared with related schemes and the result analysis shows that the new scheme is fast and efficient also.

    Keywords:Cellular automata based key generation;dynamic key generation;IoT security;No-share key Exchange;blockchain for IoT;mutual authentication

    1 Introduction

    Internet of things (IoT)[1]was introduced by Kevin Ashton in 1999.IoT is a collection of heterogeneous interconnected things[2].Uniquely identifiable devices involved in IoT networks can communicate with each other.They can be connected to the network with the help of gateway nodes through Internet Protocol[3].With widely increased usage of IoT applications,attacks on IoT systems also increased,and this leads to crucial security requirements.Considering the power requirements and constrained resource capabilities,conventional algorithms are not always suitable for providing security in IoT networks.With the development in the fields of internet and ubiquitous computing,many applications or services have been provided by the service providers to the users.Such applications will contain private information of users and hence,all security objectives become very relevant.Data sensed by the IoT devices will be uploaded to cloud storage and these can be accessed by authorized users anywhere anytime.Cloud services are of 2 types-public and private.Public platforms are open to all kinds of users whereas,private cloud platforms are accessible only to authorized users.So,proper authentication of users must be ensured to permit access to information stored in cloud.For this,several techniques like authentication protocols were proposed.In the network model of an IoT application,there are 3 levels.The first level consists of IoT devices such as sensors and actuators and these devices have features like low memory,low battery life,less computational and processing capabilities.They are connected to a gateway node in the second level,and finally,gateway nodes are connected to the cloud storage in the third level.This is the network model of a conventional IoT application.

    In case of distributed IoT applications,there may be several such gateway nodes and sub networks,each with the same architecture.It is highly beneficial if the security of participating entities in a distributed environment can be assured.For ensuring the authentication of nodes and integrity of data,blockchain can be used.Blockchain[4]is an upcoming paradigm with distributed ledger technology as its backbone.Applications of blockchain are not restricted to crypto-currencies.Blockchain has the capability to provide a ‘tamper-proof’ledger of transactions and this will help to maintain integrity of data.Leveraging blockchain technologies to IoT will definitely improve the security aspects of the system.Authentication credentials of involved entities are strictly verified in the blockchain with the help of cryptographic protocols.Hence,adopting blockchain technology for implementing distributed IoT applications will strengthen the security in terms of integrity,authentication,access control,etc.

    The works given in the literature review section proposed several security schemes.Some of these cover encryption only while some others focus on key management,authentication,etc.Complete schemes that ensure security goals in all the phases of IoT network communication are comparatively a few.Here,a new scheme,that considers security in all the phases,is proposed.Highlights of the work are the following.

    ? The work proposes a lightweight security scheme,which ensures security of data.

    ? Gateway nodes participating in the communication will become blockchain members,and this ensures the authentication.

    ? Communication between a gateway node and its connected constrained devices is always protected by a dynamic group key.

    ? Provides three levels of protection for the data.Three levels are encryption with a master key,encryption with the dynamic group key,and access control by attribute-based encryption.Last one also refers to authenticated encryption.

    ? Key management does not involve a central authority.Hence,it avoids several issues caused by a centralized entity such as bottleneck and center point of failure.

    ? Constrained nodes have to store less information with small number of keys.

    ? Constrained nodes do not have to perform any asymmetric encryption or authentication schemes.

    ? Blockchain-based data transfer ensures message integrity.

    ? Scheme does not involve any costly computations since the operations involved are lighter compared to other schemes.

    ? The proposed scheme is resilient to various types of attacks and proves to be safe after security analysis.

    ? This paper is arranged as follows.Next section discusses a few related works in similar systems.This is followed by the detailed explanation of proposed model,implementation and results,verification with the formal analysis tool Automated Validation of Internet Security Protocols and Applications(AVISPA)in further sections.

    2 Related Works

    Several research works were done in IoT security and these include authentication protocols,key management schemes,and lightweight encryption methods and so on.Wolf et al.[5]proposed a new threat model and also discussed various types of issues faced by IoT systems and Cyber-Physical Systems.Relevance of fog nodes was discussed in[6].Possible attacks like physical attacks,security protocol attacks,and application security attacks on IoT systems were studied in several research works[7-12].Proper security measures must be developed and used,to provide protection from all such attacks.Since,IoT systems are based on low power devices with resource limitations,lightweight methods should be designed.Elliptic Curve Cryptography based authentication protocols were proposed in[13,14].The authentication protocol introduced in[15]is applicable to heterogeneous wireless sensor networks.But,all these are prone to attacks such as password guessing,smart card theft,and node impersonation.After all,these protocols are not concerned about the mutual authentication.A user authentication and key establishment technique for heterogeneous wireless sensor networks was given in[16].This was proved to be insecure[17]to attacks like password guessing,smart card stealing,node capturing,and replay attack.

    The device authentication protocol proposed in[18]was based on public and private key pairs.However,the execution of asymmetric computations is not suitable for constrained devices,as they involve more computational overhead and complexity.A two factor authentication scheme was proposed in[19],in which mutual authentication between the device and a server was explained well.The steps involved fuzzy extractor generation and this created computational overhead.Another important aspect in IoT security is the Group Key Management.An approach for proper group key management was proposed in[20]and this was based on the use of hash functions and lightweight cryptographic operations.Lightweight operations such as bitwise-XOR and one way hash functions are suitable for constrained devices.

    Encryption algorithms can be symmetric or asymmetric.Advanced Encryption Standard(AES)is proved to be one of the strongest symmetric algorithms.Several AES-based lightweight encryption schemes[21-25]were introduced for IoT security.However,these methods did not handle the authentication of communicating entities.Another interesting scheme for IoT security was based on attribute-based encryption[26,27]and this is capable of achieving multiple security goals such as access control and data confidentiality simultaneously.A lightweight cipher technique based on Cellular Automata (CA) was proposed in[28].Principles of CA were introduced by Neumann[29]and Ulam[30],and these concepts could be used to model complex systems.CA concepts were used to conduct researches and studies regarding biological processes such as self-reproduction and spread of diseases[31].The lightweight algorithms based on CA are stronger because of the feature of rule vector selection.But,most of the schemes lack an efficient key management scheme.

    As it was mentioned previously,CA consists of a grid like structure.In a one-dimensional CA[31],the cell before the leftmost cell and the cell after the rightmost cell,are assumed to hold the value zero.Value of the current cell,Ciat time t+1 is decided by the rule number and the value of that cell at time t,value in the left cell and the right cell.This can be represented as follows.

    where Ri is the rule number.

    Sample rule 60 for a rule vector of length eight is given below in Fig.1.All CA rules can be represented as mathematical functions[32].The computations involved are lightweight operations like XOR and complement.For example,Rule 60 can be represented as follows.

    Secure distributed IoT application can be implemented with the help of blockchain[33].Even though blockchain was designed for crypto-currency applications,its scope is far beyond that.

    Blockchain is a distributed ledger of all occurring transactions.It was initially proposed for ensuring security of transactions with crypto-currencies.Blockchain architecture contains a set of blocks in which one will be designated as the root/genesis node.This genesis node will keep the history of all transactions occurred so far.Each block contains a proof of work,a link to its previous block and the relevant transaction data.In a blockchain-based technology,the end node performs the computation,which is treated as a transaction and signs it with his private key.Then,the user broadcasts this transaction to other members in peers.All nodes in peer will validate this transaction based on some criteria.The validated transaction will be embedded to a block by the designated root node,called miner,and then appended to the block chain only after a consensus agreement is fulfilled.Basic structure of a blockchain is given in Fig.2.

    A user in blockchain signs the transaction with private key and sends it to the associated peers.Peer nodes are responsible to validate this transaction.Miner node packs the validate transaction into a block.Block will contain hash and timestamp description and this will be used to ensure the message integrity.The hash value inside a block depends on the previous block and hence,if a block contents get changed,it is easily identifiable and can be discarded.If the verification is completed successfully,the block will be added to the blockchain.Thus,it is clear that only properly validated user can modify a data item in an authorized manner.

    There are three types of blockchain networks-private,public and consortium.In a public blockchain,there are no restrictions to join,whereas private blockchain is more centralized.In a private blockchain,all members will not have equal rights.While forming blockchain with the gateway nodes in an IoT network,it will ensure data integrity and user authentication of participating nodes.The computational power of IoT gateway nodes is more compared to sensor level devices,but less compared to the cloud servers.When implemented as a blockchain participant,gateways can take either the role of a full node in which each gateway will be performing all functionalities,or they can be implemented as a thin client[34].In the proposed algorithm,blockchain concept is used for minimal functionalities only.Hence,gateway nodes can be selected to form blockchain networks.These nodes are capable enough to control access to a data item and to ensure data integrity.Gateway devices are components in conventional IoT architecture.So,no additional infrastructure is required to form blockchain with these gateway nodes.

    Several IoT-based applications have been already developed using blockchain.A few of them are given in[34-38].All these works show that using blockchain in IoT applications improves security.In some of these,the extra space in memory of participating nodes is used for storage of data.Some other blockchain-based algorithms have proposed the dissemination of supporting functionalities to blockchain,rather than giving the entire control to cloud storage.Blockchain has been used to develop IoT applications in several use cases including healthcare,vehicular networks,energy management,agriculture etc.Open source platform called Hyperledger fabric[39]can be used for implementing blockchain-based applications.

    3 Proposed Method

    In conventional IoT applications,IoT devices form the basic layer.They can join or leave at any time depending on the application,and they are registered under a gateway node.These constrained nodes are responsible for sensing and data acquisition.The gateway nodes in middle layer provide data aggregation and upload to the cloud storage.Distributed IoT applications can be implemented in a hybrid manner.The term‘hybrid’is used in the sense that,the system can be built up with the help of a blockchain of gateway nodes and simultaneously,cloud storage can be used for data storage.Gateway nodes are included as participants in blockchain network.These nodes are selected because of the relatively higher resource capabilities,compared to IoT nodes like sensors.The network architecture followed in this proposed method is given in Fig.3.

    When a new member gateway node joins the blockchain,user credentials are allocated and these will be used for ensuring the authentication of that entity.Also,if any gateway node in the system tries to modify data that have been stored already,it is not possible without the consent from all other member nodes.The potential benefits of using blockchain in distributed IoT applications can be summarized as follows:

    ? Authentication of all gateway nodes will be verified with the support of cryptographic suite provided by the blockchain platform,here it is Hyperledger Fabric.

    ? The secure communication between gateway and server is always ensured by the blockchain with the help of its default security techniques like cryptographic credentials,hash values and timestamps.

    ? Data uploaded by a gateway node cannot be tampered by an untrusted entity.This ensures data integrity.

    It can be concluded that,once the data are uploaded to the storage by gateway nodes,blockchain paradigm helps to build a strong security foundation.Hence,the major concern in proposed work is ensuring the security of data in the collection and uploading phases of a blockchain-supported IoT application.

    Major assumptions are:

    ? Device registration is completed by the corresponding gateway node.

    ? Constrained nodes will perform symmetric encryptions and lightweight operations that include only XOR,multiplications,etc.to avoid complicated computations.

    ? For encryption,an efficient lightweight symmetric encryption algorithm can be used.For implementation purpose,AES-128 is used.

    ? Gateway nodes and server are able to perform both symmetric as well as asymmetric encryption.

    ? In the context of blockchain,gateway nodes are also referred as organizations.

    Different phases in the proposed scheme are as follows.

    1)Registration Phase:

    Devices are registered successfully under a particular gateway node and several gateway nodes are forming the blockchain.During registration phase,when a new device is added successfully under a gateway node,a master key will be generated.Similarly,gateway node has a shared key,KGAfor secure communication between the device and gateway.

    2)Blockchain Formation Phase:

    Gateway nodes,which are also known as organizations,construct the blockchain.Distributed ledger is shared through a channel,to which the organizations are connected.Smart contracts are written and installed to the channels and this will be instantiated by a blockchain participant.All the required cryptographic materials and certificates are generated when a new member is added to the blockchain.These include a private key-public key pair and the same can be used to ensure user authentication in all upcoming transactions.Access control to the cloud stored information is restricted by the blockchain entities with the help of attribute-based encryption.Key will be shared to the requesting node,only if the attributes specified by the key-owner matches with that of requesting device.When any node tries to modify the stored data,it has to be approved by all the participating entities.Then only,the change is considered as a legitimate modification and this ensures integrity of data.Hence,authentication,data integrity and access control will be handled by the blockchain.

    3)Key management phase:

    This is the strongest part of the proposed system that provides multiple levels of security.When the device is registered under a gateway node,it generates a master key,KM.This is the symmetric key used for first level encryption at the device.Since it is a symmetric key,it should be shared with the gateway node.Similarly,the session key used for second level of encryption will be generated by the gateway node.This key is denoted as KGAand it is also a symmetric one.

    ? Master key exchange:Master key is exchanged between two nodes by using No-Share Key Exchange(NSKE)algorithm[40].According to this algorithm,the master key will be reformed to a 4×4 matrix and with only 4 handshaking steps,the key is exchanged with the intended recipient.The computations involved are only matrix multiplications and matrix inverse calculations.The four message exchanges will be encrypted by using the recipient’s public key.The request sent from a gateway node will be verified by the blockchain.Access control is granted based on attribute-based encryption.

    ? Dynamic Group key(KGA) generation:The initial value of KGAwill be received by the device when it is registered under the gateway node,G.Both the device and the gateway node will have the set of CA rules preloaded in memory.For improving security,this group key is generated dynamically for every session.This step relies on the previous value of KGA.

    Let the initial value obtained by the new device is KGA0(this means,value of KGAat time,t=0).The value of KGAat time,t=i can be computed from previous key value,KGAi-1and a selected CA rule number.CA rules are either reversible or irreversible.Since it is not necessary to retrieve the previous value of KGA,it is not mandatory to use reversible CA rule.There are 255 CA rules and these can be used to compute next state from a given state.If the current value of the group key is given as input and a CA rule is selected randomly,it will be applied to that value and output will be a new KGA.This transition is shown in Fig.4.

    4)Mutual authentication phase:

    When a device wants to begin a communication session with the gateway node,it must undergo a mutual authentication phase,after which the authentication of device to gateway node,G and the authentication of gateway to device will be completed.After this phase,for every session,device selects a random number,RN and exchanges it with the gateway node.This consists of following steps.

    a.The device(say,A)sends a message,“Message_1”encrypted with the current group key KGAi,to the gateway node as shown below.

    Message_1=E({IDa,IDg,M1,M2,TSi},KGAi)

    Where,E is the encryption algorithm

    KGAiis the ithgroup key

    IDa is the unique identity of device,A.

    IDg is the identity of gateway node,G.

    M1=H(IDa||TSi)⊕Na

    M2=H(IDa||IDg||TSi,Na)

    H is the hash function commonly agreed between A and G.

    TSi is the Timestamp value when A sends the Message_1.Na is the nonce value generated randomly by the device,A.‘⊕’denotes the XOR operator and‘||’denotes concatenation.

    b.On receiving this message at time,TSi’,G decrypts the message with KGAand checks whether|TSi’-TS|>T where T represents the maximum permitted transmission delay between the nodes.If the value is greater than T,the message is discarded.

    Otherwise,G proceeds to compute the value of Na from the known values and received M1 component.This is done as follows.G retrieves the component M1 from the message.

    It computes Na’as follows..

    Na’= M1 ⊕H(IDa || TSi).Since ⊕operator is complementary,the result will be the nonce produced by A,if not modified by an adversary.This calculated nonce value is used to compute M2’by using the following equation,

    M2’=H(IDa||IDg||TSi,Na’)

    Then,G checks whether M2’=M2.If both are same,this means no attack occurred.

    c.If this verification step is successful,in next step,G sends a message,“Message_2” to A as follows.

    Message_2=E({IDg,IDa,M3,M4,Ng,TSj},KGA)

    Where,IDg,IDa,Na,H,⊕and||are same as that of Message_1 components.

    M3=H(IDg||TSj)⊕Ng

    M4=H(IDg||IDa||TSj||Ng||Na)

    TSj is the timestamp at which G sends Message_2 to A.Ng is the nonce generated randomly by the gateway node,G.

    d.On receiving this,A decrypts the message with KGAand checks whether the received timestamp Tj’differs from the actual timestamp Tj more than the specified delay T.i.e.,if |TSj’- TSj|>T,Message_2 is discarded.Otherwise,A computes Ng from the known values of IDg and TSj as given below.

    Ng’=M3 ⊕H(IDg||TSj)

    Using this computed nonce,Ng’A computes M4’= H(IDg || IDa || TSj || Ng’|| Na).Then A checks whether M4=M4’.If this comparison returns TRUE,that means no adversary affected this transmission.

    To summarize these,steps a and b proves the authentication of A to G,and steps c and d verifies the authentication of G to A.

    If all these steps are executed successfully,mutual authentication phase is considered to be successful and after this,the device selects the CA rule randomly.This rule number is represented as RN.Device shares the value of RN with the authenticated gateway node,G.When G receives this final message,A deletes the current value of KGAfrom its local memory and computes the new value.To conclude,device A will have IDa,IDg,KM,KGAi+1,where KGAi+1=RN(KGAi)and gateway node,G will have IDg,IDa,KGAi,RN finally in the memory.

    5)Data encryption and uploading phase:

    After successful completion of registration,mutual authentication phases and dynamic computation of new group key,KGAi+1,data item to be uploaded is encrypted in 2 levels.Flowchart with device A,is given in Fig.5 and steps are given below.

    a) A computes the message,X1 = E({X},KM),where X is the data to be uploaded,E is the encryption algorithm and KMis the master key.This first level encryption is device specific.Each device will have its own master key.

    b) A applies second level encryption on X1 and gets Y=E(X1,KGAi+1)

    c) A sends the message Y to gateway node,G.

    6)Data exchange:

    Gateway node G receives the message Y and performs the following steps.

    a) G decrypts it with the computed KGAi+1value.

    b) G gets the value of X1=D(Y,KGAi+1).

    c) G encrypts the message X1 with the public key,KBUof recipient node,B and uploads it to the server node.

    Finally,the message can be retrieved by the node,B after decryption with its private key,KBR.The master key,KMcan be shared with the node,B with NSKE algorithm.

    4 Implementation and Results

    An electronic health record based IoT application was developed.Data sensed by the sensors were connected with the help of a Raspberry Pi machine.Since,the application was dealing with a distributed scenario,as mentioned in the previous sections;blockchain paradigm was used to implement it.Here,it was implemented with the Hyperledger fabric platform.Hyperledger fabric is a type of consortium blockchain.In this,all participating entities will be having known identities.Since we are forming blockchain of gateway nodes that are already part of an IoT application,all nodes will be having their own identities.

    Blockchain implementation was assisted by nodejs,Go and Docker installations.Two gateway nodes were added as organizations with two peers each.When added to the blockchain,each organization will be assigned a public key-private key pair.These nodes are capable to perform asymmetric encryption.The test case developed here consists of two organizations.A device with ID,“device_1”is registered successfully with the“Organization_1.”Master key of device_1 is generated successfully and shared with Organization_1 with No-Share Key Exchange algorithm.Algorithm used for encryption here is AES with 128 bit key length.Even though AES is not a lightweight algorithm,for implementation purpose,it is used.Since NSKE algorithm works on the basis of non-linear computations,with 128 bit length key,the proposed method provides security.Data generated by the device are encrypted by using KMand then by using new KGAvalue and uploaded to the storage.Here,for testing purpose,storage used is MongoDB.Master key will also be shared with the recipient organization,only if its attributes are matched with the specified set of attributes.This attribute-based encryption scheme provides another layer of security in addition to the two-level encryption in the proposed method.This provides access control also and this checking functionality is executed by the blockchain participants.

    When a user requests for data,blockchain will check whether the attributes of that user matches with the set of attributes specified by the data owner.The code for testing this is written in the smart contract(chaincode in Hyperledger fabric)in Go language.The same will be tested and if attributes match,access to encrypted data will be given.Once the encrypted data are received,the same can be decrypted by the authenticated receiver.

    5 Security Analysis

    Here,a detailed analysis of the proposed method is given.First section gives the informal analysis,in which the performance of the proposed algorithm against each attack is analyzed.This discussion is followed by the formal analysis of the new protocol using the verification tool AVISPA.

    5.1 Informal Analysis

    Proposed method is resistant to almost all kinds of possible attacks with the three levels of encryption and with the default security methods in blockchain.

    ? Replay attack:Timestamp values are embedded in the authentication messages.This is enough to provide protection against replay attacks.For example,in initial step,when the device,A sends the message to gateway node,G,timestamp value,TSi is embedded in the message.When it is received at G,let the timestamp be TSi’.The node G computes the difference between these two and if this difference is more than a permissible delay,T,that means an intruder has involved in between and the message is discarded.Hence,the proposed model is protected against replay attack.

    ? Man in the middle attack:Even though a third party stands in between,it is not possible to involve in the communication because,the exchange of master key depends on private key matrices.Since the attacker is not aware of the private key values of involved parties,master key can be shared only between properly authenticated users.Blockchain members are authenticated by the peer participants for every communication.Cryptogen tool in hyperledger fabric provides certificated credentials for the verification of user identities.Also,all message exchanges are encrypted with a dynamically generated group key.

    ? Eavesdropping attack:Network used is based on Dolev-Yao model[41].This means,all message transmissions over the network are visible to an adversary also.Even though there is an unintended observer,he/she will never be able to retrieve the two keys involved in data protection.This is because,the master key used is not exchanged over network as such,but exchanged with NSKE algorithm.Even though the steps are observed by the attacker,it is never possible to retrieve the private key matrices from the handshaking steps of NSKE.Second layer of security is that,the group key value of KGA,is computed dynamically for each session.When the rule number is selected by the device,immediately it calculates the new value of KGAand deletes the old value.The adversary is not aware of the previous value of KGAand hence,it is not possible for him to get the new key value.Furthermore,all the transmissions between the device and the gateway are encrypted with the current session group key.

    ? Brute Force attack:In this attack,the unintended third party will try several possibilities of the key to retrieve the message.In proposed model,there are two keys used for providing data security.The master key size is 128 bits and the group key is also 128 bits long.Even though current value of group key is obtained,it is not possible to compute the next value of group key without getting the rule number.There are 255 rule possibilities.So,the security of key space relies on 2128× 2128× 255 possibilities.Time required to complete brute force analysis by an attacker will be more compared to the expiry time of the data validity.

    ? Node tampering:All IoT systems are prone to physical theft since the lower layer involves small IoT devices.The nodes or the devices may be captured and attacker can perform attacks like power analysis to obtain the contents of local memory.This information can be used further to retrieve the private information like key values.In the proposed method,local memory of the device consists of the group key.But,this group key value will be replaced immediately with the newly computed KGA.As soon as the rule number is determined,current value of KGAwill be removed from the memory.The dynamic generation of group key can provide a significant level of security for each session.Complete protection can be achieved by using any tamper resistance mechanism.One such technique,which can be easily adopted in the proposed system,is the sharing of location information during mutual authentication phase.If the location information differs from the details that were shared during registration phase,node can be considered as malicious.

    ? Privileged insider attack:In this attack,a privileged insider will reveal some information to the attacker.But,in the proposed method,encryption in each step relies on two symmetric keys-KMand KGA.The value of KGAis computed dynamically for each session and hence,it is not possible to retrieve the contents without getting this new value and the rule number in each session.

    ? Offline/online password guessing:Guessing the secret key is applicable if same value is used for all session encryptions.Proposed method relies on dynamic values of key involved.Each session is initiated with a mutual authentication phase and hence,only authenticated entities will get the secret values.During the mutual authentication phase,guessing of nonce is also not possible because the attacker does not know the pre-shared hash function.

    In addition to the resistance against these types of attacks,authentication and integrity are ensured.Gateway nodes are participants of blockchain and hence,the involved entities are authenticated.Device-gateway communication is also authenticated with the mutual authentication phase.Nonce values are generated by the device and the gateway node and these are exchanged in hashed form.Message authentication is ensured with the help of this pre-shared hash function.This maintains integrity of the exchanged messages.In addition to all these,all steps in a particular session are encrypted with the corresponding group key.

    5.2 Formal Analysis

    Formal security analysis of the proposed method is done with the widely accepted verification tool called AVISPA[42].It is a security protocol verification and analysis tool in which new security protocols can be represented in High Level Protocol Specification Language (HLPSL) and then analyzed with the built-in backend compilers.AVISPA consists of four different back-end compilers:On-the-fly Model-Checker(OFMC),Constraint-Logic-based Attack Searcher(CL-AtSe),SAT-based Model-Checker(SATMC)and Tree Automata based on Automatic Approximations for the Analysis of Security Protocols(TA4SP).

    Different phases of the proposed model have been written in HLPSL and tested in AVISPA.For illustration,gateway role is given in detail below in Fig.6.These HLPSL codes were compiled with the backend compilers provided in AVISPA.The proposed protocol was proved to be“SAFE”under OFMC,“SAFE” under ATSE,INCONCLUSIVE under SATMC and INCONCLUSIVE under TA4SE compilers.OFMC backend compiler verifies the protection status of protocol against passive intruder and here,our method was proved to be“SAFE.”Results from OFMC and ATSE compilers prove that,proposed method is safe from possible passive and active attacks like man in the middle attack,replay etc.The system is based on Dolev-Yao model.According to this threat model,all the information exchange will be through a public insecure channel.This means,the proposed method satisfies the security goals(secrecy and authentication)specified in the environment section.

    6 Performance Analysis

    Performance of the proposed scheme is analyzed in terms of computational cost,computation time and the key space.

    role gateway(A,G:agent,Kga:symmetric_key,H:hash_func,SND,RCV:channel(dy))played_by G def=%%Variables declaration local State:nat,IDa,IDg,TS1,TS2,Km,M1,M2,M3,M4:text,Rn,Na,Ng:message const m:protocol_id,init State:=1%%Transition rulesof steps taken by gateway node in HLPSL transition 1.State=1/RCV({IDa’.IDg’.M1’.M2’.TS1’}_Kga)/M2’=H(IDa’.IDg’.TS1’.xor(H(IDa’.TS1’),M1’))=|>State’:=2/Na’:=xor(H(IDa’.TS1’),M1’)/Ng’:=new()/M3’:=xor(H(IDg.TS2),Ng’)/M4’:=H(IDg.IDa’.TS2.Ng’.Na’)/SND({IDg.IDa’.M3’.M4’.Ng’.TS2}_Kga)2.State=3/RCV({IDa’.IDg’.Rn’.Km’}_Kga)

    6.1 Computational Cost

    The authentication and key establishment phases of the proposed scheme are compared with two related schemes.First is matrix based key management scheme[43]and second is Lightweight Device Authentication and Key Management Scheme (LDAKM)[44].As mentioned in[45]and[46],computational cost of a security scheme depends on encryption,decryption and the hash computations for authentication.Cost of an AES encryption/decryption with 128 bits key would be 9 μJ(milli Joules).A hash operation energy cost is 40 mJ.Cost of encryption is less compared to the cost of hash operations.The cost of the proposed scheme for authentication and key establishment are less compared to the same phases in matrix based key management scheme and LDAKM.Cost computation steps are explained in Tab.1.

    Table 1 Energy cost summary of constrained node computations for the proposed scheme

    Only encryption and hash computation costs are considered.Key exchange steps do not involve any encryption or hash computations.However,for security,all these message exchanges are sent in encrypted form and this is done with group key.Both the protocols in[43]and[44]were proved to have better performance and lower cost compared to several related schemes.As it is clear from the Fig.7,our proposed scheme is having better performance in terms of computational cost compared to these two.

    6.2 Computation Time

    The proposed algorithm is fast and efficient in terms of computational time involved.It has only lightweight operations like bitwise-XOR and collision resistant one-way hash functions.CA rules are selected randomly for generating dynamic session key values.Exchange of secret information is done by using NSKE algorithm,which has proved to be fast and efficient,compared to conventional key exchange algorithms.Also,it does not involve any complex mathematical operations and simultaneously,it provides non-linear(matrix)security.

    6.3 Key Space

    Another strength of the proposed algorithm is its key space.Data encryption involves two levels.The first level contains encryption with the master key and the second level contains encryption with the dynamic session key.Both these are of 128 bits length.As the current value of session key is deleted from the local memory immediately after transferring the rule number,it is not possible for the attacker to retrieve it.Dynamic generation of new session key takes place at respective nodes only.The rule set consists of 255 possibilities.So,there is a possibility of 2128×2128×255.Also,the proposed algorithm is proved to be resistant against several possible attacks.Hence,it can be concluded that the new system is efficient in terms of security,complexity and computational speed.

    Further enhancements on this system can be done on the encryption algorithm.Now,AES is used for ease of implementation.This is the major limitation as constrained nodes have to perform encryption.It can be replaced by any other efficient symmetric lightweight algorithm.In addition to this,the feasibility of blockchain-based methods for malicious node detection can be analyzed.

    7 Conclusion

    The system is based on a hybrid architecture in which cloud storage can be used for storing encrypted information.Data processing and access control functionalities have been simultaneously disseminated to the blockchain entities.Gateway nodes with more computational capabilities compared to low power IoT devices,are included in blockchain.The proposed method protects data with two levels of encryption and the access control is provided with attribute-based encryption.Each session begins with a mutual authentication phase between the gateway node and the device.Encryption steps rely on two stronger keys named master key and session group key.Group key for the next session is computed by using CA rules.The NSKE algorithm and the dynamic key generation phase based on the principles of CA rules make the system highly secure and efficient.The operations involved are lightweight and include only matrix operations and simple XOR operations,and can be executed in a faster way.Hence,the computational overhead is very less compared to existing methods.The proposed algorithm is also proved to be secure with formal security protocol analysis tool AVISPA.

    Acknowledgement:We thank Cochin University of Science and Technology,Kerala for supporting this research work.We would like to extend thanks to APJ Abdul Kalam Technological University for providing the infrastructure for completing the work.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品亚洲一区二区| 男人狂女人下面高潮的视频| 一区在线观看完整版| 免费黄网站久久成人精品| 国产黄色视频一区二区在线观看| av在线播放精品| 免费av中文字幕在线| 精品久久久久久久久亚洲| 国产亚洲5aaaaa淫片| 亚洲av中文av极速乱| 男女无遮挡免费网站观看| 晚上一个人看的免费电影| 熟女人妻精品中文字幕| 亚洲成人手机| 亚洲情色 制服丝袜| 亚洲自偷自拍三级| 日本wwww免费看| 国产免费一级a男人的天堂| 免费av不卡在线播放| 久久av网站| 免费人成在线观看视频色| 亚洲国产成人一精品久久久| 久久久久精品性色| 午夜老司机福利剧场| 最近中文字幕高清免费大全6| 日本黄大片高清| 亚洲人与动物交配视频| 亚洲av免费高清在线观看| av在线播放精品| 亚洲精品国产色婷婷电影| 国产视频首页在线观看| av天堂中文字幕网| 久久精品国产亚洲网站| 热re99久久国产66热| 中国国产av一级| 亚洲精品乱久久久久久| 观看av在线不卡| 交换朋友夫妻互换小说| 亚洲中文av在线| 亚洲精华国产精华液的使用体验| av黄色大香蕉| 在线观看www视频免费| 女性被躁到高潮视频| 青青草视频在线视频观看| 亚洲国产欧美在线一区| 久久久久精品久久久久真实原创| 国产极品天堂在线| 亚洲电影在线观看av| 免费大片黄手机在线观看| 午夜视频国产福利| 老女人水多毛片| 99久久人妻综合| 成年人午夜在线观看视频| 色吧在线观看| 99精国产麻豆久久婷婷| 一个人免费看片子| 乱系列少妇在线播放| 日韩成人av中文字幕在线观看| 国产男女内射视频| 蜜臀久久99精品久久宅男| 欧美+日韩+精品| 少妇的逼水好多| 精品一品国产午夜福利视频| 在线观看一区二区三区激情| 亚洲国产精品国产精品| av线在线观看网站| 成人二区视频| 热re99久久精品国产66热6| 97精品久久久久久久久久精品| 一本一本综合久久| 一本久久精品| 最后的刺客免费高清国语| 毛片一级片免费看久久久久| 午夜福利视频精品| 一区二区三区四区激情视频| 人人妻人人添人人爽欧美一区卜| 国产亚洲午夜精品一区二区久久| 亚洲自偷自拍三级| 亚洲自偷自拍三级| 国产成人精品婷婷| av又黄又爽大尺度在线免费看| 色婷婷av一区二区三区视频| 亚洲怡红院男人天堂| 最新中文字幕久久久久| 精华霜和精华液先用哪个| 日本午夜av视频| 91久久精品电影网| av网站免费在线观看视频| 国内少妇人妻偷人精品xxx网站| 亚洲av二区三区四区| 国产在线视频一区二区| 国产毛片在线视频| 午夜免费男女啪啪视频观看| 国产免费又黄又爽又色| 久久久国产欧美日韩av| 亚洲国产成人一精品久久久| 在线观看www视频免费| 青春草国产在线视频| 99热6这里只有精品| 亚洲人成网站在线播| 日韩电影二区| 男女无遮挡免费网站观看| 丁香六月天网| 精品99又大又爽又粗少妇毛片| 国产精品蜜桃在线观看| 国产精品一二三区在线看| 久久人人爽人人片av| 男人爽女人下面视频在线观看| 亚洲综合精品二区| 男男h啪啪无遮挡| 黄色毛片三级朝国网站 | 少妇 在线观看| 曰老女人黄片| 老司机影院成人| 老司机影院成人| 中文乱码字字幕精品一区二区三区| 我要看黄色一级片免费的| 99久久精品热视频| 久久这里有精品视频免费| 中文字幕久久专区| 又黄又爽又刺激的免费视频.| 国产亚洲av片在线观看秒播厂| 丝瓜视频免费看黄片| 熟妇人妻不卡中文字幕| 国产欧美日韩一区二区三区在线 | 国产伦精品一区二区三区视频9| 亚洲精品亚洲一区二区| 一级毛片黄色毛片免费观看视频| 熟女av电影| 男人添女人高潮全过程视频| 丰满饥渴人妻一区二区三| 女性被躁到高潮视频| 在线观看免费高清a一片| 亚洲欧洲精品一区二区精品久久久 | 国产乱来视频区| 欧美日韩av久久| 欧美xxxx性猛交bbbb| 欧美3d第一页| 亚洲人成网站在线播| 免费黄频网站在线观看国产| 秋霞伦理黄片| 久久av网站| 三级经典国产精品| 高清午夜精品一区二区三区| 中文天堂在线官网| 黄片无遮挡物在线观看| 国产一区二区在线观看日韩| 少妇人妻久久综合中文| 桃花免费在线播放| 一级a做视频免费观看| 国产亚洲最大av| 久久久久久久精品精品| 卡戴珊不雅视频在线播放| 高清欧美精品videossex| 精品人妻熟女av久视频| 欧美丝袜亚洲另类| 中文字幕免费在线视频6| 中文字幕人妻熟人妻熟丝袜美| 黄色欧美视频在线观看| 中文资源天堂在线| 日韩,欧美,国产一区二区三区| 色网站视频免费| 国产熟女欧美一区二区| 亚洲av欧美aⅴ国产| 亚洲国产精品专区欧美| 中文字幕av电影在线播放| 水蜜桃什么品种好| 美女视频免费永久观看网站| 精品亚洲成国产av| 日韩在线高清观看一区二区三区| 精品酒店卫生间| 欧美日韩一区二区视频在线观看视频在线| 国产精品偷伦视频观看了| 少妇丰满av| 久久午夜综合久久蜜桃| 一级毛片我不卡| 99久国产av精品国产电影| 美女内射精品一级片tv| 中文字幕精品免费在线观看视频 | 人人妻人人澡人人爽人人夜夜| 精品国产露脸久久av麻豆| 三级国产精品欧美在线观看| a级毛片在线看网站| 亚洲精品日韩av片在线观看| 日本vs欧美在线观看视频 | 久热久热在线精品观看| 欧美成人午夜免费资源| 又黄又爽又刺激的免费视频.| 日韩欧美一区视频在线观看 | 一级片'在线观看视频| 成人漫画全彩无遮挡| av卡一久久| 亚洲国产色片| 中文字幕免费在线视频6| 久久精品国产亚洲av涩爱| 日韩av在线免费看完整版不卡| 最新的欧美精品一区二区| 久久99蜜桃精品久久| 精品国产一区二区久久| 日韩中文字幕视频在线看片| 日本猛色少妇xxxxx猛交久久| 久久精品久久精品一区二区三区| 亚洲高清免费不卡视频| 国产精品久久久久久精品电影小说| 国产视频内射| 精品人妻一区二区三区麻豆| 精品一品国产午夜福利视频| 99re6热这里在线精品视频| 国产男女超爽视频在线观看| 日本-黄色视频高清免费观看| 日韩av在线免费看完整版不卡| 99热国产这里只有精品6| 亚洲av福利一区| 亚洲精品久久午夜乱码| 热re99久久国产66热| av女优亚洲男人天堂| 成人二区视频| 亚洲第一av免费看| 国产在线视频一区二区| 日本-黄色视频高清免费观看| 一区二区三区精品91| 七月丁香在线播放| 我要看日韩黄色一级片| 亚洲四区av| 超碰97精品在线观看| 老熟女久久久| 日韩欧美一区视频在线观看 | 国产高清国产精品国产三级| 日日爽夜夜爽网站| 欧美日韩av久久| 成年av动漫网址| 99久久精品一区二区三区| 黄色一级大片看看| 亚洲av欧美aⅴ国产| 亚洲美女视频黄频| 亚洲精品国产色婷婷电影| 日韩欧美精品免费久久| 麻豆精品久久久久久蜜桃| 男人添女人高潮全过程视频| 国产在线免费精品| 国产黄色免费在线视频| 国产成人免费观看mmmm| 精品少妇久久久久久888优播| 国产淫片久久久久久久久| av在线app专区| 国产一区二区三区综合在线观看 | 国产 精品1| 高清在线视频一区二区三区| 内射极品少妇av片p| 国产女主播在线喷水免费视频网站| 最黄视频免费看| 男女国产视频网站| 高清欧美精品videossex| 特大巨黑吊av在线直播| 蜜桃在线观看..| 中文字幕人妻丝袜制服| 成人国产麻豆网| 日韩成人av中文字幕在线观看| 丝袜脚勾引网站| 国产一区有黄有色的免费视频| 免费av不卡在线播放| 亚洲精品日韩av片在线观看| 伦理电影免费视频| 国产精品久久久久久精品电影小说| 丝瓜视频免费看黄片| 欧美人与善性xxx| 亚洲精品久久久久久婷婷小说| 国产精品国产三级国产av玫瑰| 国产综合精华液| 国产精品一区www在线观看| 久久精品国产a三级三级三级| 亚洲,欧美,日韩| 欧美精品人与动牲交sv欧美| 七月丁香在线播放| 亚洲色图综合在线观看| 免费在线观看成人毛片| 中文字幕久久专区| 插逼视频在线观看| 视频区图区小说| 18禁在线播放成人免费| 狂野欧美白嫩少妇大欣赏| 丝袜喷水一区| 女人久久www免费人成看片| 国产熟女午夜一区二区三区 | 大片电影免费在线观看免费| 一本大道久久a久久精品| 久久久久久久大尺度免费视频| 欧美日本中文国产一区发布| 久久久午夜欧美精品| 亚洲欧洲国产日韩| 亚洲欧洲日产国产| 亚洲成人手机| 少妇 在线观看| 精品亚洲成a人片在线观看| 久久久精品免费免费高清| 免费看光身美女| 天天操日日干夜夜撸| 国内揄拍国产精品人妻在线| 97在线视频观看| 嫩草影院入口| 日韩一区二区三区影片| 精品亚洲成国产av| 91精品一卡2卡3卡4卡| 一级毛片黄色毛片免费观看视频| 国产黄频视频在线观看| 国产成人免费观看mmmm| 搡老乐熟女国产| 亚洲欧美中文字幕日韩二区| 亚洲在久久综合| 精品国产乱码久久久久久小说| 国产亚洲午夜精品一区二区久久| 大片免费播放器 马上看| 最近的中文字幕免费完整| 又爽又黄a免费视频| 国产成人一区二区在线| 日本-黄色视频高清免费观看| 国产精品福利在线免费观看| 丰满人妻一区二区三区视频av| 亚洲国产精品一区三区| 国产精品久久久久成人av| 久久久久久久大尺度免费视频| 青春草视频在线免费观看| 亚洲成色77777| 黄片无遮挡物在线观看| 大片电影免费在线观看免费| 亚洲成人手机| 超碰97精品在线观看| av专区在线播放| 国产成人精品久久久久久| 亚州av有码| 在线亚洲精品国产二区图片欧美 | 亚洲精品国产av蜜桃| 亚洲久久久国产精品| 国产一区二区三区av在线| 久久人人爽av亚洲精品天堂| 麻豆乱淫一区二区| kizo精华| 免费人妻精品一区二区三区视频| 我要看日韩黄色一级片| 国产亚洲一区二区精品| 国产伦理片在线播放av一区| 久久99蜜桃精品久久| 视频中文字幕在线观看| 亚洲av综合色区一区| 内射极品少妇av片p| 久久久久精品久久久久真实原创| 啦啦啦视频在线资源免费观看| 嘟嘟电影网在线观看| 亚洲欧美日韩东京热| 美女主播在线视频| 久久国产亚洲av麻豆专区| 亚洲国产成人一精品久久久| 五月开心婷婷网| 日韩精品有码人妻一区| 六月丁香七月| 国产亚洲av片在线观看秒播厂| 欧美xxⅹ黑人| 精品久久国产蜜桃| 亚洲精品第二区| 久久久欧美国产精品| 只有这里有精品99| 国产综合精华液| 亚洲国产成人一精品久久久| 久久久久国产网址| 亚洲欧美成人综合另类久久久| av国产久精品久网站免费入址| 欧美精品高潮呻吟av久久| 亚洲真实伦在线观看| 久久韩国三级中文字幕| 亚洲国产毛片av蜜桃av| 亚洲天堂av无毛| 一本久久精品| 欧美激情国产日韩精品一区| 菩萨蛮人人尽说江南好唐韦庄| 欧美精品亚洲一区二区| 九草在线视频观看| 一本色道久久久久久精品综合| 中文字幕精品免费在线观看视频 | 精品一区二区免费观看| 最后的刺客免费高清国语| 老女人水多毛片| 纵有疾风起免费观看全集完整版| √禁漫天堂资源中文www| 亚洲欧美日韩另类电影网站| 亚洲国产精品999| 美女主播在线视频| 美女内射精品一级片tv| 亚洲不卡免费看| 日本免费在线观看一区| 少妇的逼好多水| 99热6这里只有精品| 欧美激情国产日韩精品一区| 欧美bdsm另类| 午夜老司机福利剧场| 日韩视频在线欧美| 2022亚洲国产成人精品| 久久99热这里只频精品6学生| 狠狠精品人妻久久久久久综合| 国产有黄有色有爽视频| 亚洲内射少妇av| 国产亚洲一区二区精品| 欧美人与善性xxx| 欧美xxⅹ黑人| 一级a做视频免费观看| 一级毛片我不卡| 久久久久久人妻| 国产成人精品久久久久久| av一本久久久久| 如何舔出高潮| 国产熟女欧美一区二区| 高清av免费在线| 欧美3d第一页| 80岁老熟妇乱子伦牲交| 亚洲精品日韩在线中文字幕| 天堂8中文在线网| 久久精品国产鲁丝片午夜精品| 国产高清不卡午夜福利| 国产精品人妻久久久影院| 在线免费观看不下载黄p国产| 亚洲欧美日韩东京热| 一级毛片 在线播放| 丝袜脚勾引网站| 精品少妇黑人巨大在线播放| 99热网站在线观看| 51国产日韩欧美| 九草在线视频观看| 黑人高潮一二区| 三级国产精品片| 免费av不卡在线播放| 九色成人免费人妻av| 男人狂女人下面高潮的视频| 亚洲成人av在线免费| 精品一区在线观看国产| 午夜精品国产一区二区电影| 国产av精品麻豆| 国产视频首页在线观看| 国产爽快片一区二区三区| 亚洲欧美一区二区三区黑人 | 日韩成人av中文字幕在线观看| 久久精品熟女亚洲av麻豆精品| 日本午夜av视频| 最近的中文字幕免费完整| 国产成人freesex在线| 免费不卡的大黄色大毛片视频在线观看| 久久精品夜色国产| 日韩熟女老妇一区二区性免费视频| 久久久久视频综合| 丰满饥渴人妻一区二区三| 国产av精品麻豆| 噜噜噜噜噜久久久久久91| 亚洲av在线观看美女高潮| 精品人妻偷拍中文字幕| 日日爽夜夜爽网站| 精品视频人人做人人爽| av福利片在线| 欧美日韩av久久| 亚洲成色77777| 亚洲精品国产成人久久av| 高清在线视频一区二区三区| 亚洲精品亚洲一区二区| 亚洲高清免费不卡视频| 国产又色又爽无遮挡免| 色婷婷av一区二区三区视频| 韩国av在线不卡| 亚洲国产精品一区二区三区在线| 青春草亚洲视频在线观看| 亚洲人成网站在线播| 我的老师免费观看完整版| 免费av中文字幕在线| videos熟女内射| 国产精品久久久久久久电影| 少妇裸体淫交视频免费看高清| 日韩一区二区视频免费看| 亚洲av福利一区| 观看免费一级毛片| 中文欧美无线码| 色婷婷久久久亚洲欧美| 成年人免费黄色播放视频 | 人人澡人人妻人| 夜夜爽夜夜爽视频| 欧美bdsm另类| 国产中年淑女户外野战色| 插逼视频在线观看| 午夜免费鲁丝| 精品视频人人做人人爽| 少妇人妻 视频| 韩国av在线不卡| 亚洲第一区二区三区不卡| 国产高清有码在线观看视频| 久久这里有精品视频免费| 少妇人妻久久综合中文| 建设人人有责人人尽责人人享有的| 全区人妻精品视频| 久久青草综合色| 两个人免费观看高清视频 | 91精品国产九色| 精品人妻偷拍中文字幕| 99九九在线精品视频 | 精品久久国产蜜桃| 精品亚洲乱码少妇综合久久| 蜜臀久久99精品久久宅男| 一本一本综合久久| 亚洲中文av在线| 亚洲情色 制服丝袜| 在线观看免费视频网站a站| 国产一区二区在线观看av| 丰满饥渴人妻一区二区三| 久久99一区二区三区| 18禁在线无遮挡免费观看视频| 色5月婷婷丁香| 免费久久久久久久精品成人欧美视频 | 亚洲成人手机| 国产成人一区二区在线| 亚洲内射少妇av| 日韩电影二区| 一边亲一边摸免费视频| 亚洲国产毛片av蜜桃av| 97超视频在线观看视频| 久久久久久久亚洲中文字幕| 精品午夜福利在线看| 在线观看一区二区三区激情| 我的女老师完整版在线观看| 欧美成人精品欧美一级黄| 午夜日本视频在线| 色婷婷久久久亚洲欧美| 色网站视频免费| 久久国产亚洲av麻豆专区| 人人妻人人爽人人添夜夜欢视频 | 99久久精品国产国产毛片| 日韩熟女老妇一区二区性免费视频| 成人漫画全彩无遮挡| 秋霞伦理黄片| 午夜激情久久久久久久| 国产色爽女视频免费观看| 九九久久精品国产亚洲av麻豆| 晚上一个人看的免费电影| 自拍偷自拍亚洲精品老妇| 水蜜桃什么品种好| 亚洲av日韩在线播放| 最近手机中文字幕大全| 久久女婷五月综合色啪小说| 亚洲色图综合在线观看| 在线精品无人区一区二区三| 我要看日韩黄色一级片| 少妇的逼水好多| 有码 亚洲区| 大又大粗又爽又黄少妇毛片口| 中国三级夫妇交换| 亚洲精品一区蜜桃| 搡女人真爽免费视频火全软件| 欧美成人精品欧美一级黄| 国产真实伦视频高清在线观看| 少妇熟女欧美另类| 日韩一本色道免费dvd| 人妻少妇偷人精品九色| 日本-黄色视频高清免费观看| 亚洲国产最新在线播放| 久久久国产精品麻豆| 黄色毛片三级朝国网站 | 国产高清国产精品国产三级| 国产在线男女| 伦理电影免费视频| 国产又色又爽无遮挡免| 国产视频首页在线观看| av视频免费观看在线观看| 色哟哟·www| 99久久精品一区二区三区| 有码 亚洲区| 日韩欧美一区视频在线观看 | tube8黄色片| 国产成人免费观看mmmm| 亚洲av综合色区一区| 如日韩欧美国产精品一区二区三区 | 三级国产精品欧美在线观看| 乱系列少妇在线播放| 最新的欧美精品一区二区| 妹子高潮喷水视频| 中文欧美无线码| 国产精品久久久久久精品古装| 亚洲精品,欧美精品| 久久精品国产亚洲网站| 只有这里有精品99| 超碰97精品在线观看| 免费观看a级毛片全部| 亚洲国产欧美日韩在线播放 | 国产精品一二三区在线看| 欧美日韩视频精品一区| 韩国高清视频一区二区三区| 亚洲精品久久久久久婷婷小说| 国产美女午夜福利| 男的添女的下面高潮视频| 亚洲国产色片| 国产女主播在线喷水免费视频网站| 99久国产av精品国产电影| 午夜福利在线观看免费完整高清在| 亚洲欧美清纯卡通| 欧美日韩一区二区视频在线观看视频在线| videossex国产| 成人亚洲欧美一区二区av| 99九九在线精品视频 | 天美传媒精品一区二区| 国产精品99久久久久久久久| 天堂8中文在线网| 精品人妻熟女毛片av久久网站| 噜噜噜噜噜久久久久久91| 久久久欧美国产精品| 在线观看国产h片| 赤兔流量卡办理| 偷拍熟女少妇极品色| 乱系列少妇在线播放| 这个男人来自地球电影免费观看 | 亚洲精品乱码久久久久久按摩| 亚洲人与动物交配视频| 日日啪夜夜撸| 国产精品久久久久久精品古装|