• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Lightweight Authentication Protocol Based on Physical Unclonable Function

    2022-11-11 10:46:36HanguangLuoTaoZouChunmingWuDanLiShunbinLiandChuChu
    Computers Materials&Continua 2022年9期

    Hanguang Luo,Tao Zou,*,Chunming Wu,Dan Li,Shunbin Li and Chu Chu

    1Zhejiang Lab,Hangzhou,311121,China

    2Zhejiang University,Hangzhou,310058,China

    3Tsinghua University,Beijing,100084,China

    4The University of British Columbia,Vancouver,V1V1V7,Canada

    Abstract: In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS)attacks in a practical way.In this paper, we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy, DoS attacks, and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT.

    Keywords:Lightweight;authentication;physically unclonable functions

    1 Introduction

    With the development of Internet of Things (IoT)technology, machine-to-machine (M2M)communication supports various applications for monitoring and control in such areas as eHealth,smart factory, and smart city.The research by Gartner [1] estimates that up to $2.5 million will be spent on sensing devices/actuators in a single minute by 2021,which means that the IoT devices will not only be used in home or office but also deployed in industrial manufacture,known as Industrial IoT or Industrial 4.0.A typical IIoT scenario primarily comprises the sensors, actuators, and other devices that periodically capture data of their immediate surroundings.A specific resource-constrained IIoT system is depicted in Fig.1.

    Figure 1:Typical resource-constrained IIoT system

    Since the development of openness and extensive interconnection in IIoT,security has become a global challenge in M2M communication.Although authentication is the cornerstone of providing adequate protection,and numerous schemes have been proposed to ensure security in traditional IT networks [2-10], these schemes cannot be readily applied for IIoT.Because in IIoT, many resourceconstrained devices are limited to computation power and communication bandwidth,such as Radio Frequency Identification(RFID)chips,wireless sensors,and so on.Therefore,it is essential to reduce the operational cost while ensuring the authentication protocol’s security for resource-constrained devices.This paper proposes a lightweight authentication protocol based on a series of operations,namely Physically Unclonable Functions(PUF),hash function,and exclusive-OR(XOR)operations,respectively,to provide mutual authentication between resource-constrained IIoT devices and gateway.The proposed protocol guarantees a higher degree of practicality,efficiency,and security than existing schemes.

    2 Related Work and Motivation

    Over the past years,some lightweight authentication schemes for IIoT have been proposed,which can be divided into two categories:hash-based schemes and PUF based schemes.Hash-based methods are designed only on the hash function,which cannot guarantee security against cloning attacks.On the contrary,PUF based methods add Physically Unclonable Functions to the authentication process on the foundation of a hash-based scheme to resist cloning attacks.A PUF is considered a unique physical feature of an electronic device,just like biometric features like fingerprints.When queried with a challenge C,it generates a response R that depends on both C and the specific physical properties of the device that cannot be reproduced or cloned, i.e.,R=PUF(C).Because of that, PUF based schemes have become popular research in recent years.

    In 2012, Kardas et al.[11] proposed an RFID authentication scheme based on PUFs.However, this protocol cannot ensure forward secrecy and resilience of DoS [12] attacks.Hereafter,Akgun et al.[13] proposed another PUF based protocol.Regrettably, their scheme cannot ensure forward secrecy,which is an imperative security requirement for the authentication protocol.In 2017,Esfahani et al.[14]proposed a hash-based authentication scheme for M2M communication,but the protocol is vulnerable to traceability,impersonation,DoS,and cloning attacks.Recently,Gope et al.[15] proposed a novel PUF based scheme and claimed that the protocol is more practical and can overcome the limitations of existing schemes,especially ensuring forward secrecy and resilience of DoS attacks simultaneously.However, according to our analysis, the DoS resistance mechanism of their protocol is impractical.In their scheme,the additional use of emergency challenge and response pairs(i.e.,the(Cem,Rem))will be exhausted soon and unable to be synchronized again when suffered from DoS attacks frequently.Furthermore,the large number of(Cem,Rem)pairs stored in the server will cost expensive search and synchronization recovery overhead, which cannot be scalable for applications with a large database scale.

    To solve the problems in the existing authentication schemes above, we proposed a lightweight PUF based authentication protocol in this paper.Our new method achieves higher security,efficiency,and practicality compared to the existing schemes.Furthermore,our protocol’s novel authentication and synchronization recovery mechanism can better deal with the problem between forward secrecy and resilience of DoS attacks that cannot be well resolved in the existing schemes.

    3 Proposed Scheme

    In this section, we describe the proposed lightweight authentication protocol for resourceconstrained devices in IIoT.The proposed scheme has two phases: registration and authentication.The symbols and cryptographic functions used in this article are defined in Tab.1.

    Table 1: Symbols and cryptographic function

    3.1 Registration Phase

    Each resource-constrained device should be registered into the backend server through a secure channel.Firstly, the server generates a random challengeCj1and a temporary identityTID1jand then sends them to the device.Upon receiving the server’s message, the device storesTID1jandCj1then produces and sends the cor responding responsesto the server.Finally, the server stores the corresponding entry for each device,i.e.,theDetails of this phase are depicted in Fig.2.

    Figure 2:Registration phase of the proposed scheme

    3.2 Authentication Phase

    This phase achieves authentication between the resource-constrained devices(abbreviated as D),gateway,and the backend server.Since each gateway is connected to the server through a secure wired link,we consider the gateway and server as a single unitGSUin the authentication phase.For that,the authentication phase consists of the following steps.The details of the authentication phase are depicted in Fig.3.

    Figure 3:Authentication phase of the proposed scheme

    (1)TheDgenerates a random numberNd,computes its temporary identityTIDij,and then sends them to theGSU.There are two cases.For the first round(wheni=1),theTID1jcan be picked from the register directly.When thei >1,TIDijcan achieve bywhereis the challenge fori-th round andis the temporary identity for(i-1)-th round.

    (2)Upon receiving the,GSUuses it as an index to search the corresponding entry in the database.When a matched entry is found, theGSUgenerates a random numberNsand computesAt last,GSUconstitutes a response messageM2: 〈V1,Ns〉and sendsitto the D.If there is no matchTIDijin the database,the authentication requests will be rejected.

    (3)After receiving theGSU’s response message, theDusesCjito generate the responseRijby its PUF.Subsequently,Dchecks whether the response parameterV1is valid or not.If the validation is successful, thenDcomputesand sendstoGSU.Finally,DupdatesCji,TIDij-1andCji-1withCji+1,TIDijandCjirespectively.

    (4)Upon receiving the response message from D,GSUfirst computesandThen validates whether the response parameterV2is valid or not.If the validation is successful, thenGSUcalculatesand subsequently storesandin its memory for the following round communication.

    In the case of the DoS attacks,the resynchronization mechanism will be executed by our scheme.When theGSUrejects the authentication request fromDfor the first time, where the temporary identityTIDijis computed bytheDwill directly chooseas the request parameter and generate a new random number,then send them toGSUagain.Sincemust have been used in the previous round successfully,GSUdefinitely can find the matched entry in its database.After that, the authentication process will do the same as the process above from steps (1)to (4).Finally,GSUandDwill update and hold the newest authentication entry together after the resynchronization mechanism.

    4 Security Analysis

    In this section, the security analysis shows that our scheme can overcome several imperative security properties and the malicious behaviors assumed in the security properties.Through both the rigorous informal and formal security analysis,we figure out that our proposed scheme achieves the desired security features to tolerate various known attacks in authentication in IIoT.

    4.1 Informal Security Analysis

    4.1.1 User Anonymity

    Anonymity includes untraceability and unlinkability.Untraceability means that an adversary cannot identify which identities from the same group belong to whom.In comparison,unlinkability implies that an adversary cannot distinguish whether two identities belong to the same user.In our proposed scheme, the devices don’t reveal their real identities or secrets during each authentication instance since all the transmitted messages are computed with a random number.Hence,the devices are not traceable to the adversary with temporary identities or other secrets.Moreover, the temporary identitiesTIDijare calculated by random challengeand one-way hash function h, i.e.,whereCijis updated with the random number in each round.So,it is difficult for an adversary to correlate the current round temporary identityTIDijwith the next round.The same is between the different devices.

    4.1.2 Confidentiality

    The transmitted messagesM1,M2andM3between theDandGSUare all related to the secret response parameterRij.Without knowingRij,the adversary cannot forge the valid parameterandV2,which are used for authentication and transmitting confidential information.Besides,in the authentication process,all the verified messages and parameters are protected by hash function h.Even if the adversary may obtain the corresponding temporary identities and challenges from the captured device’s memory, it cannot recover other secrets that can help itself pass theGSU’s interrogation process.

    4.1.3 Forward Secrecy

    In the authentication phase, mutual authentication between theDandGSUcan be achieved based on the verified messagesM2andM3.DauthenticatesGSUby verifying the parameterV1=where an adversary cannot generate legitimateV1without knowing the responseRij.A similar process takes place when theGSUreceives messagesM3.TheGSUverifies the parameterto verify the legality of D.As depicted in the authentication process,an attacker also cannot generate a legalV2without the correct responseRij.Hence,our protocol achieves mutual authentication between resource constrain device and Gateway-Server Unit.

    4.1.4 Mutual Authentication

    An authentication protocol should provide forward secrecy to protect past sessions against future compromises of the secret keys.In our protocol, after completing each successful mutual authentic ation,the challenge parameterCjiand responseparameterRijwill be updated with the random number,i.e.,Due to the one-way characteristic of the hash function and PUF,the attacker cannot acquirefromorfrom.

    4.1.5 The Resilience of DoS Attacks

    Since both communicators need to update their secret security credentials to ensure forward secrecy, an attacker can cause a desynchronization problem by blocking the messages between two communicators,eventually causing the DoS problem.As mentioned in sect.2,almost all the existing lightweight authentication protocols fail to deal with the problem of forward secrecy and DoS attacks at once.In our proposed scheme, we utilize an ingenious resynchronization mechanism to cope with this problem.SinceDandGSUupdate temporary identityTIDij, challengeCji, and responseRijafter e ach authentication process,theGSUneeds to preserve current and previous round authentication entry, i.e.,whileDonly needs to preserve the last round authentication entryand the present round challenge parameterCji.When it comes to thei-th round authentication,Dcomputes the current round temporary identityTIDijby,and one-way hash function h,i.e.,theSuppose thatGSUhas rejected D’s first authentication request becauseGSUfailed to update the authentication entry during the last round by spontaneous failure or malicious attack.Since bothDandGSUmust have kept the previous successful authentication entry, they can revert to the synchronization state byDsendingtoGSUonce again.In this way,the proposed scheme ensures security against DoS to desynchronization attacks.

    4.1.6 The Resilience of Clone Card Attack

    An attacker can capture a valid device and access secrets stored in it to produce the cloned devices.Since PUF is based on a unique and complex physical characteristic,in our proposed scheme,even if the attackers obtain the device’s memory(i.e.,the,and),they cannot use them to forge or get the secret,which must be generated by the PUF.As a result,the attacker cannot impersonate a valid device by clone attack to pass theGSU’s authentication in our proposed scheme.

    4.2 Formal Security Analysis

    This section conducts a formal security verification using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA)[16] tool to demonstrate that our protocol fulfills the required security properties.It provides a modular and expressive formal language for specifying protocols and their security properties and integrates different backends that implement various state-of-the-art automatic analysis techniques.The formal security verification and the results of our protocol using OFMC backend are depicted in Fig.4.The details of the HLPSL code are provided in the supplementary material at https://github.com/lhguestc/AVISPA.

    Figure 4:The result of the analysis of the proposed scheme using OFMC

    5 Performance Analysis and Comparison

    5.1 Security Feature Comparison

    In this section,we compare some critical security properties of our protocol with recently proposed schemes.From Tab.2, we can see that our protocol can satisfy all the important required security requirements.Particularly, only our scheme can better ensure forward secrecy with the resistance of the DoS attack.

    Table 2: Comparison of the required security properties(SP)

    5.2 Computational and Communication Cost Comparison

    Since resource-constrained devices generally have limited res ources such as storage and computation,it is important to consider the efficiency of the proposed scheme.We compare the performance of the proposed scheme in terms of the computation cost as shown in Tab.3, which illustrates the numbers of operations including hash (denoted by H), PUF (denoted by P), and random number generator (denoted by RNG).Tab.3 shows that our protocol’s computation overhead is lower than other existing schemes for the same condition.However, it provides better security which is shown earlier in Tab.2.It is worth mentioning that the computational cost of SHA-256 is similar to 256-bit Arbiter PUF[17],which can provide a reference for the comparison between our scheme and[14].

    Table 3: Comparison of the computational cost

    In Tab.4, we compare the efficiency of our scheme to the existing schemes in terms of device storage overhead,communication cost,and resynchronization complexity.According to[14]and[15],each authentication parameter will cause 128-bit storage or communication costs.Tab.4 shows that,in our proposed scheme,the device storage overhead and communication costs are 384-bit and 768-bit,which is less than all other existing schemes for the same condition.Furthermore,the proposed protocol’s resynchronization mechanism complexity is less than the latest Gope scheme [15], which claims to be the only scheme to meet the challenge between forward secrecy and DoS attacks.

    Table 4: Comparison of the other cost

    6 Conclusion

    In this paper,we propose a PUF based lightweight authentication scheme for resource-constrained devices in IIoT.The proposed scheme provides ubiquitous demands for mutual authentication in M2M communication.Formal and informal security analysis shows that the proposed protocol achieves better security features than existing schemes.Moreover, the performance analysis and comparison indicate that our proposed approaches are more practical and suitable for ensuring secure communication in IIoT.

    Funding Statement:This work was supported by China Postdoctoral Science Foundation under Grant Nos.2020M681959 and 2020TQ0291, in part by the national key R&D project under Grant No.2018YFB2100401, in part by the National Key Research and Development Project No.2018YFB2100400.

    Conflicts of Interest:The authors of this paper declare that there are no conflicts of interest regarding the publication of this paper.

    99国产精品99久久久久| 精品久久久久久电影网| 欧美久久黑人一区二区| 下体分泌物呈黄色| 伊人久久大香线蕉亚洲五| 日韩成人在线观看一区二区三区| 女性生殖器流出的白浆| 国产精华一区二区三区| 国产精品亚洲av一区麻豆| a在线观看视频网站| 操美女的视频在线观看| 人人妻人人添人人爽欧美一区卜| 搡老熟女国产l中国老女人| 一边摸一边做爽爽视频免费| 日韩 欧美 亚洲 中文字幕| 国产成人精品在线电影| 99香蕉大伊视频| 国产激情久久老熟女| 免费一级毛片在线播放高清视频 | 侵犯人妻中文字幕一二三四区| 黄色 视频免费看| 日韩欧美国产一区二区入口| 亚洲国产欧美日韩在线播放| 少妇 在线观看| 亚洲一区中文字幕在线| 欧美 亚洲 国产 日韩一| 日日夜夜操网爽| 黑人操中国人逼视频| 亚洲 欧美一区二区三区| 国产区一区二久久| 国产成人一区二区三区免费视频网站| 一区在线观看完整版| 久久精品亚洲av国产电影网| 国产精华一区二区三区| 制服诱惑二区| 两性夫妻黄色片| 十八禁人妻一区二区| 免费看十八禁软件| 中国美女看黄片| 在线观看午夜福利视频| 国产精品偷伦视频观看了| 中文字幕色久视频| 高潮久久久久久久久久久不卡| 久久精品亚洲熟妇少妇任你| 999精品在线视频| 久久精品国产亚洲av香蕉五月 | 亚洲色图 男人天堂 中文字幕| 一级片免费观看大全| 丝袜人妻中文字幕| 亚洲熟女精品中文字幕| 日韩一卡2卡3卡4卡2021年| 免费观看a级毛片全部| 麻豆国产av国片精品| 丝瓜视频免费看黄片| 久久九九热精品免费| 国产真人三级小视频在线观看| 国产xxxxx性猛交| 国产xxxxx性猛交| 国产一区有黄有色的免费视频| 飞空精品影院首页| 丝袜在线中文字幕| 身体一侧抽搐| 黄色 视频免费看| 999久久久国产精品视频| 91字幕亚洲| 国产一区在线观看成人免费| 国产精品香港三级国产av潘金莲| 身体一侧抽搐| 国产一区有黄有色的免费视频| 国产一区在线观看成人免费| 好男人电影高清在线观看| 国产精品影院久久| 啦啦啦免费观看视频1| 久热这里只有精品99| 欧美激情 高清一区二区三区| 巨乳人妻的诱惑在线观看| 久久久久久免费高清国产稀缺| 午夜久久久在线观看| 午夜福利一区二区在线看| 国产一卡二卡三卡精品| 99热只有精品国产| 日韩熟女老妇一区二区性免费视频| 一个人免费在线观看的高清视频| 午夜亚洲福利在线播放| 亚洲一码二码三码区别大吗| 欧美激情高清一区二区三区| 亚洲精品中文字幕一二三四区| 最近最新免费中文字幕在线| 亚洲五月婷婷丁香| 免费在线观看黄色视频的| 性少妇av在线| 久9热在线精品视频| 一级a爱片免费观看的视频| 乱人伦中国视频| 999久久久国产精品视频| 国产在线一区二区三区精| 男女午夜视频在线观看| 午夜影院日韩av| 久久国产精品男人的天堂亚洲| 免费在线观看影片大全网站| 亚洲成人免费电影在线观看| www.精华液| 婷婷丁香在线五月| 久久草成人影院| 免费在线观看亚洲国产| x7x7x7水蜜桃| 美女高潮到喷水免费观看| 国产免费现黄频在线看| 国产av精品麻豆| 一本综合久久免费| 色综合欧美亚洲国产小说| 大陆偷拍与自拍| 99久久人妻综合| 国产亚洲精品第一综合不卡| 亚洲片人在线观看| 午夜福利,免费看| 91成年电影在线观看| 国产成人精品久久二区二区91| 18禁裸乳无遮挡免费网站照片 | 精品国产超薄肉色丝袜足j| 老汉色∧v一级毛片| 国产男靠女视频免费网站| 国产主播在线观看一区二区| 美女高潮喷水抽搐中文字幕| 久久国产精品大桥未久av| 久久精品人人爽人人爽视色| 久久人妻熟女aⅴ| 久久天躁狠狠躁夜夜2o2o| 亚洲人成电影免费在线| 国产亚洲欧美98| aaaaa片日本免费| 久久香蕉激情| 亚洲午夜精品一区,二区,三区| 色播在线永久视频| 在线十欧美十亚洲十日本专区| 变态另类成人亚洲欧美熟女 | 国产精品二区激情视频| 免费黄频网站在线观看国产| 午夜福利乱码中文字幕| 免费在线观看完整版高清| 久久久精品免费免费高清| 深夜精品福利| 午夜福利免费观看在线| 母亲3免费完整高清在线观看| 波多野结衣一区麻豆| 国产av又大| 精品欧美一区二区三区在线| xxx96com| 岛国在线观看网站| 好男人电影高清在线观看| 久久人人97超碰香蕉20202| 国产精华一区二区三区| 色婷婷av一区二区三区视频| 国产精品欧美亚洲77777| 久久久久国产一级毛片高清牌| 在线播放国产精品三级| 精品卡一卡二卡四卡免费| 麻豆乱淫一区二区| 国产深夜福利视频在线观看| avwww免费| 精品一品国产午夜福利视频| 不卡一级毛片| 亚洲精品在线观看二区| 亚洲,欧美精品.| 国产精品二区激情视频| 99国产综合亚洲精品| 亚洲精品粉嫩美女一区| 在线观看午夜福利视频| 国产成人精品在线电影| 又大又爽又粗| x7x7x7水蜜桃| 淫妇啪啪啪对白视频| 黄色a级毛片大全视频| 国精品久久久久久国模美| 国产精品99久久99久久久不卡| 国产高清视频在线播放一区| 巨乳人妻的诱惑在线观看| 欧美黄色片欧美黄色片| 久久精品人人爽人人爽视色| 免费人成视频x8x8入口观看| 亚洲精华国产精华精| 亚洲熟女精品中文字幕| 国产极品粉嫩免费观看在线| 国产淫语在线视频| 涩涩av久久男人的天堂| 99国产极品粉嫩在线观看| 国产一区在线观看成人免费| 天堂动漫精品| 在线永久观看黄色视频| 亚洲中文日韩欧美视频| 两性午夜刺激爽爽歪歪视频在线观看 | 日本a在线网址| 欧美人与性动交α欧美精品济南到| 国产精品免费大片| 精品亚洲成国产av| 亚洲黑人精品在线| a在线观看视频网站| 欧美色视频一区免费| 在线av久久热| 黄色a级毛片大全视频| 老司机亚洲免费影院| 色在线成人网| 亚洲人成77777在线视频| 欧美日韩福利视频一区二区| 高潮久久久久久久久久久不卡| 亚洲成人免费电影在线观看| 宅男免费午夜| 亚洲五月婷婷丁香| xxx96com| 12—13女人毛片做爰片一| 两个人免费观看高清视频| 一级,二级,三级黄色视频| 老司机午夜福利在线观看视频| 精品高清国产在线一区| 亚洲国产欧美日韩在线播放| 欧美日韩黄片免| 黑人巨大精品欧美一区二区蜜桃| 欧美黑人精品巨大| 久久中文字幕一级| 亚洲人成电影观看| 国产国语露脸激情在线看| 亚洲 欧美一区二区三区| 变态另类成人亚洲欧美熟女 | 国产精品 国内视频| 久久久久国内视频| 最新在线观看一区二区三区| 一进一出抽搐动态| 很黄的视频免费| 男女高潮啪啪啪动态图| 下体分泌物呈黄色| 精品一品国产午夜福利视频| 国产精品av久久久久免费| 在线观看免费午夜福利视频| 精品国产乱子伦一区二区三区| 又紧又爽又黄一区二区| 波多野结衣av一区二区av| 人人妻人人澡人人爽人人夜夜| av福利片在线| 最新美女视频免费是黄的| 欧美激情久久久久久爽电影 | 村上凉子中文字幕在线| 亚洲av日韩精品久久久久久密| 欧美人与性动交α欧美精品济南到| av国产精品久久久久影院| 亚洲中文字幕日韩| 少妇被粗大的猛进出69影院| 大陆偷拍与自拍| 黄色片一级片一级黄色片| 淫妇啪啪啪对白视频| 9热在线视频观看99| 精品国产一区二区三区四区第35| 欧美日韩中文字幕国产精品一区二区三区 | 国产成人系列免费观看| 亚洲,欧美精品.| 亚洲精品久久成人aⅴ小说| 欧美日韩中文字幕国产精品一区二区三区 | 精品久久久久久电影网| 高清在线国产一区| 黄色成人免费大全| 天堂俺去俺来也www色官网| 十八禁高潮呻吟视频| 国产欧美日韩一区二区三| 男女床上黄色一级片免费看| 电影成人av| 国产成人欧美在线观看 | 女同久久另类99精品国产91| av在线播放免费不卡| 久久中文字幕一级| 精品国产一区二区久久| 国产99久久九九免费精品| 欧美激情久久久久久爽电影 | 桃红色精品国产亚洲av| 久久久久精品国产欧美久久久| 99国产精品一区二区三区| 久久精品国产清高在天天线| 人人妻人人澡人人看| 亚洲国产精品合色在线| 人人妻人人爽人人添夜夜欢视频| 日本撒尿小便嘘嘘汇集6| 亚洲色图av天堂| 日韩三级视频一区二区三区| 中出人妻视频一区二区| 久久久精品区二区三区| 国产成人精品久久二区二区91| 淫妇啪啪啪对白视频| 亚洲成人免费av在线播放| 国产精品 国内视频| 国精品久久久久久国模美| 日本欧美视频一区| 在线观看免费午夜福利视频| 免费日韩欧美在线观看| 日韩三级视频一区二区三区| 大片电影免费在线观看免费| 悠悠久久av| 久久中文字幕一级| xxx96com| 精品视频人人做人人爽| 亚洲欧美激情综合另类| 精品国产超薄肉色丝袜足j| 欧美激情高清一区二区三区| 最近最新中文字幕大全电影3 | 另类亚洲欧美激情| 国产区一区二久久| 12—13女人毛片做爰片一| 在线看a的网站| 免费观看精品视频网站| 一区福利在线观看| 老司机午夜十八禁免费视频| 亚洲精品一卡2卡三卡4卡5卡| 五月开心婷婷网| 首页视频小说图片口味搜索| 色播在线永久视频| 免费看十八禁软件| 99精品久久久久人妻精品| 久久 成人 亚洲| 欧美 日韩 精品 国产| 大香蕉久久网| 两性夫妻黄色片| 丰满迷人的少妇在线观看| 国产亚洲av高清不卡| 日韩欧美一区视频在线观看| 在线看a的网站| 法律面前人人平等表现在哪些方面| 夫妻午夜视频| 搡老熟女国产l中国老女人| 亚洲成人免费av在线播放| 日韩欧美免费精品| 亚洲成国产人片在线观看| 搡老熟女国产l中国老女人| 久久精品国产a三级三级三级| 国产午夜精品久久久久久| 免费观看a级毛片全部| 国产精品电影一区二区三区 | 男女午夜视频在线观看| 久久中文字幕人妻熟女| 精品久久久久久电影网| 国产成+人综合+亚洲专区| 巨乳人妻的诱惑在线观看| 国产一区二区三区在线臀色熟女 | 欧美激情高清一区二区三区| 国产精品一区二区免费欧美| 天天躁狠狠躁夜夜躁狠狠躁| 国产熟女午夜一区二区三区| 曰老女人黄片| 90打野战视频偷拍视频| 亚洲情色 制服丝袜| 一级a爱片免费观看的视频| 精品熟女少妇八av免费久了| 少妇 在线观看| 香蕉丝袜av| 国产成人av激情在线播放| 亚洲国产看品久久| 精品无人区乱码1区二区| 在线国产一区二区在线| 黑人巨大精品欧美一区二区蜜桃| 国产精品av久久久久免费| 91麻豆av在线| 日韩免费高清中文字幕av| av在线播放免费不卡| 欧美精品一区二区免费开放| 超碰成人久久| 黄色视频不卡| 欧美久久黑人一区二区| 一进一出好大好爽视频| 老司机午夜福利在线观看视频| 老熟妇仑乱视频hdxx| 亚洲一卡2卡3卡4卡5卡精品中文| 久久久久精品人妻al黑| 女人被狂操c到高潮| 99国产极品粉嫩在线观看| 精品一区二区三区四区五区乱码| 国产深夜福利视频在线观看| 精品国产一区二区久久| 亚洲美女黄片视频| 免费不卡黄色视频| tube8黄色片| 久久久久久亚洲精品国产蜜桃av| av中文乱码字幕在线| 日本撒尿小便嘘嘘汇集6| 国产男靠女视频免费网站| 最新在线观看一区二区三区| 精品久久久久久,| 国产单亲对白刺激| 欧美黑人精品巨大| 两个人看的免费小视频| 成年人免费黄色播放视频| 脱女人内裤的视频| 视频区欧美日本亚洲| 色播在线永久视频| 一夜夜www| 欧美人与性动交α欧美软件| 日本a在线网址| 亚洲一区中文字幕在线| 99riav亚洲国产免费| 成人特级黄色片久久久久久久| 久久九九热精品免费| 老司机靠b影院| av福利片在线| 涩涩av久久男人的天堂| 成熟少妇高潮喷水视频| 午夜福利一区二区在线看| 国产高清国产精品国产三级| 99热只有精品国产| 看片在线看免费视频| 精品久久久久久久毛片微露脸| 午夜91福利影院| 少妇裸体淫交视频免费看高清 | 成年版毛片免费区| 亚洲五月婷婷丁香| 纯流量卡能插随身wifi吗| 久久这里只有精品19| 国产野战对白在线观看| 国产精品久久电影中文字幕 | 自拍欧美九色日韩亚洲蝌蚪91| 日本欧美视频一区| 国产人伦9x9x在线观看| 国产欧美日韩精品亚洲av| 国精品久久久久久国模美| 90打野战视频偷拍视频| 免费日韩欧美在线观看| 18在线观看网站| 精品一区二区三区视频在线观看免费 | 亚洲九九香蕉| 成年版毛片免费区| 青草久久国产| 午夜精品国产一区二区电影| 18禁黄网站禁片午夜丰满| 亚洲精品在线观看二区| 校园春色视频在线观看| 国产xxxxx性猛交| 国产亚洲欧美98| 老司机深夜福利视频在线观看| 老司机在亚洲福利影院| 成人亚洲精品一区在线观看| xxx96com| 国产高清激情床上av| 女警被强在线播放| 午夜视频精品福利| 波多野结衣一区麻豆| 精品国产亚洲在线| 成人黄色视频免费在线看| 亚洲五月色婷婷综合| 免费看十八禁软件| 热99国产精品久久久久久7| 国产亚洲av高清不卡| 成人免费观看视频高清| 免费在线观看日本一区| 99热只有精品国产| 自拍欧美九色日韩亚洲蝌蚪91| 自线自在国产av| 如日韩欧美国产精品一区二区三区| av不卡在线播放| 天天添夜夜摸| 免费在线观看日本一区| 欧美老熟妇乱子伦牲交| 亚洲九九香蕉| 18禁裸乳无遮挡动漫免费视频| 男人舔女人的私密视频| 欧美成狂野欧美在线观看| 变态另类成人亚洲欧美熟女 | 满18在线观看网站| 日日摸夜夜添夜夜添小说| 99精品欧美一区二区三区四区| 正在播放国产对白刺激| 国产高清激情床上av| 成人三级做爰电影| 国产深夜福利视频在线观看| 中国美女看黄片| 亚洲中文日韩欧美视频| 又黄又爽又免费观看的视频| 国内毛片毛片毛片毛片毛片| 一级毛片精品| 日本黄色日本黄色录像| 国产aⅴ精品一区二区三区波| 久久精品aⅴ一区二区三区四区| 久久久久国产一级毛片高清牌| 午夜影院日韩av| 久久这里只有精品19| 成人av一区二区三区在线看| а√天堂www在线а√下载 | 十八禁高潮呻吟视频| tocl精华| 欧美日韩黄片免| 欧美日韩成人在线一区二区| 侵犯人妻中文字幕一二三四区| 国产成人精品无人区| 亚洲va日本ⅴa欧美va伊人久久| 叶爱在线成人免费视频播放| 精品久久久精品久久久| 亚洲性夜色夜夜综合| 91在线观看av| 日韩视频一区二区在线观看| 久久 成人 亚洲| videosex国产| 一区二区三区国产精品乱码| 亚洲精品美女久久av网站| 久久人人爽av亚洲精品天堂| 亚洲成人国产一区在线观看| 国产精品一区二区在线不卡| 久久精品aⅴ一区二区三区四区| 亚洲国产中文字幕在线视频| av在线播放免费不卡| 免费久久久久久久精品成人欧美视频| 日韩 欧美 亚洲 中文字幕| 免费久久久久久久精品成人欧美视频| 精品国产美女av久久久久小说| 丰满迷人的少妇在线观看| 人妻一区二区av| 精品国产乱子伦一区二区三区| 午夜福利在线免费观看网站| 亚洲欧美精品综合一区二区三区| 三级毛片av免费| 一区二区日韩欧美中文字幕| 国产成人免费无遮挡视频| 国产亚洲精品久久久久5区| 亚洲三区欧美一区| 操美女的视频在线观看| 亚洲成人国产一区在线观看| 在线观看舔阴道视频| 亚洲五月天丁香| 欧美+亚洲+日韩+国产| 日本撒尿小便嘘嘘汇集6| 日韩制服丝袜自拍偷拍| 一区在线观看完整版| 女同久久另类99精品国产91| 一级片免费观看大全| 搡老熟女国产l中国老女人| 成在线人永久免费视频| 午夜91福利影院| 99国产综合亚洲精品| 王馨瑶露胸无遮挡在线观看| 99精国产麻豆久久婷婷| 精品国内亚洲2022精品成人 | 99精品久久久久人妻精品| 悠悠久久av| 亚洲熟女精品中文字幕| 999精品在线视频| 69精品国产乱码久久久| 老司机靠b影院| 国产极品粉嫩免费观看在线| 久久人人97超碰香蕉20202| 精品国产一区二区久久| 国产在线一区二区三区精| e午夜精品久久久久久久| 欧美av亚洲av综合av国产av| 18禁裸乳无遮挡动漫免费视频| 国产成人系列免费观看| 美女扒开内裤让男人捅视频| 人妻一区二区av| 久久 成人 亚洲| 国产精品av久久久久免费| 中文字幕精品免费在线观看视频| 国产成人精品久久二区二区91| 亚洲va日本ⅴa欧美va伊人久久| 性色av乱码一区二区三区2| 在线十欧美十亚洲十日本专区| 男女下面插进去视频免费观看| 欧美日韩精品网址| 在线观看午夜福利视频| 亚洲精品在线美女| 一级作爱视频免费观看| 韩国精品一区二区三区| 18禁黄网站禁片午夜丰满| 午夜免费成人在线视频| 女人被狂操c到高潮| 99re在线观看精品视频| 日韩欧美在线二视频 | 午夜成年电影在线免费观看| 一进一出好大好爽视频| av天堂久久9| 99国产精品免费福利视频| 日日摸夜夜添夜夜添小说| 91成年电影在线观看| 国产亚洲精品一区二区www | 9热在线视频观看99| 十八禁人妻一区二区| 欧美日韩亚洲高清精品| 女警被强在线播放| 亚洲成人免费av在线播放| 久久久国产一区二区| 午夜免费观看网址| 看免费av毛片| 99国产综合亚洲精品| 欧美精品亚洲一区二区| 后天国语完整版免费观看| 丝瓜视频免费看黄片| 久久久久视频综合| 久久精品aⅴ一区二区三区四区| 精品第一国产精品| 亚洲精品美女久久av网站| 国产成人精品久久二区二区免费| 俄罗斯特黄特色一大片| 欧美精品啪啪一区二区三区| 精品福利永久在线观看| 久久香蕉精品热| 又大又爽又粗| 免费在线观看影片大全网站| 操出白浆在线播放| 丝瓜视频免费看黄片| 中出人妻视频一区二区| 日韩欧美一区二区三区在线观看 | 国产高清视频在线播放一区| x7x7x7水蜜桃| 精品一区二区三卡| 欧美大码av| 午夜福利免费观看在线| 欧美激情久久久久久爽电影 | 一级a爱片免费观看的视频| 制服人妻中文乱码| 久久香蕉国产精品| 成年人午夜在线观看视频| 黄色片一级片一级黄色片| 午夜福利,免费看| 精品福利观看| 亚洲成国产人片在线观看|