• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones(IoD)

    2022-11-11 10:49:14SaeedUllahJanIrshadAhmedAbbasiandFahadAlgarni
    Computers Materials&Continua 2022年9期

    Saeed Ullah Jan,Irshad Ahmed Abbasiand Fahad Algarni

    1Department of Computer Science&IT,University of Malakand,Chakadara,18800,Pakistan

    2Faculty of Science&Arts Belqarn,Department of Computer Science,University of Bisha,Sabtul Alaya 61985,Saudi Arabia

    3Faculty of Computing and Information Technology,University of Bisha,Bisha 67714,Saudi Arabia

    Abstract: With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is different in shapes,sizes,characteristics,and configurations.It can be classified on the purpose of its deployment,either in the civilian or military domain.Drone’s manufacturing, equipment installation, power supply, multi-rotor system,and embedded sensors are not issues for researchers.The main thing is to utilize a drone for a complex and sensitive task using an infrastructureless/self-organization/resource-less network type called Flying Ad Hoc Network(FANET).Monitoring data transmission traffic,emergency and rescue operations, border surveillance, search and physical phenomenon sensing,and so on can be achieved by developing a robust mutual authentication and cross-verification scheme for IoD deployment civilian drones.Although several protocols are available in the literature,they are either design issues or suffering from other vulnerabilities;still,no one claims with conviction about foolproof security mechanisms.Therefore,in this paper,the researchers highlighted the major deficits in prior protocols of the domain,i.e.,these protocols are either vulnerable to forgery,side channel,stolen-verifier attacks,or raised the outdated data transmission flaw.In order to overcome these loopholes and provide a solution to the existing vulnerabilities,this paper proposed an improved and robust public key infrastructure (PKI)based authentication scheme for the IoD environment.The proposed protocol’s security analysis section has been conducted formally using BAN(Burrows-Abadi-Needham)logic, ProVerif2.03 simulation, and informally using discussion/pragmatic illustration.While the performance analysis section of the paper has been assessed by considering storage,computation,and communication cost.Upon comparing the proposed protocol with prior works,it has been demonstrated that it is efficient and effective and recommended for practical implementation in the IoD environment.

    Keywords:Cryptography;authentication;confidentiality;reachability;ZSP

    1 Introduction

    Earlier, drones were mainly used for military mission delivery.However, with the invention of small unmanned aerial vehicles(UAVs or drones)becoming opened new possibilities to be applied in incident monitoring,search and rescue operations,disaster relief,and packages’delivery.A popular Mobile Ad hoc Network (MANET)paradigm is Flying Ad hoc Networks (FANETs)are used for data transmission in the IoD environment.In contrast to other ad hoc network types, FANETs are distinguished by many unique features because it changes their topology dynamically [1].Due to which it presents the research community with security challenges.The only solution to these security challenges is to design a robust authentication protocol for FANET to establish an efficient data transmission with the control station server.Besides security,energy consumption is also a big issue in UAVs (drones).As some tasks assigned to a drone need maximum flight time, while the electric power is not too to accomplish it, if the internal processing capabilities become modified without affecting its external functionalities, it can guarantee a complex operation with minimum power consumption.In this regard, the computation process to generate shared session key also needs to be adequate to transmit information among all the participants of IoD efficiently.This challenge is also possible by designing a protocol with fast and secure computation and communication features for data broadcasting[2].

    In the Information society, cryptographic algorithms play a crucial role, and they secure us when we use debit cards or credit cards, call someone on a cell phone, get access to health care services, or buy something on the internet.These algorithms ensure that our transactions and bank accounts are secure,our telephone,voice-over-internet protocol(VoIP),or instant messaging cannot be listened to by anyone, and that confidential health information is protected from unauthorized access.Cryptographic protocols support digital signatures, user and data authentication, and more advanced functionalities such as electronic money or electronic voting,e-government,and e-commerce in the near term[3].Moreover,a cryptographic hash function is a technique for verifying data validity,can run on data for checksum purposes, and cryptographically encompasses algorithms for cyclic redundancy checks.It translates data of arbitrary size into a fixed valued numerical string called a hash[4].In the same way,the researchers in this paper have used cryptographic algorithms to design a security mechanism for working in the IoD environment.

    Furthermore, the already available cryptographic algorithms can also be used to secure the transmission path of drones with the control station server or external user to perform a tactical task.However,due to the existence of a strong adversary,only cryptographic-based protocols cannot achieve the goal of sensitive transmission security in IoD.It must need to be appropriately formalized;so that one must determine what the opponent/adversary is permitted to do and when the attack is successful.Under any complexity assumption, a cryptosystem would be “secure”if it demonstrates that the security principle is fulfilling, and the attacker could not crack the protocol [5].However,a cryptographic system’s security is most often proximate: its security is based on an assumption of complexity which is commonly believed in confidentiality.In the cryptographic research community,these methodologies are now the standard [6].We, too, will first identify all possible threats to the system, design a cryptographic-based security mechanism, then evaluate its security as stated above and pragmatically illustrate them in the informal security analysis section of the paper to make it trustworthy in drone information transmission security for IoD.

    Although,the increasing use of drones is raising security issues.Without incorporating the issue of security in the IoD, we cannot mitigate all other associated issues and challenges like power and navigation, product and traffic, privacy and obstacle detection, etc.Therefore, this research focuses on designing cryptographic hash functions, XOR operations, and public key infrastructure (PKI)based authentication protocol for IoD using FANET.Because the security of exchanged information among all the IoD’s participants is a challenging issue, it needs a robust, lightweight authentication protocol.The authentication protocol presented in this paper can extract dynamic identities and random numbers to ensure the dynamism feature in the protocol.The cryptographic hash-based function assimilates different security features like untraceability and anonymity and caters to the flaw of outdated data broadcasting.All these cryptographic algorithms (PKI, hash, XOR, SHA-1,MD5,AES,etc.)collaboratively used for the protocol design can guarantee to mitigate forgery,side channel, privileged insider, and stolen verifier attacks often seen in prior authentication protocols.Furthermore, it can show resistance to known attacks such as denial of service (DoS), man-in-themiddle,replay,drone capture attacks,and spoofing with other drones.

    2 System Model

    According to this model, a valid user must first register with the control station registry, and then a drone must also register with CSS.It is worth noting that the control station server has been designated as a wholly trusted individual.Their confidence must be consistent as a lack of trust could jeopardize the system’s reliability.The proposed scheme means that the user and the remote server will fully trust the registration center,while any other entity alone cannot be fully trusted.Gharibi et al.[1]defined the flying zone strategy for a large geographical region in detail.We also consider their zone strategy for achieving impartiality,modularity,and standardization so that a drone can securely communicate with the ground station and external users.According to Gharibi et al.[1], for each drone,the Zone Service Provider(ZSP)is responsible to facilitate a drone for navigation services and designate zone on the request of a drone.Also,ZSP has the authority to put orders for landing drone,hold the drone in the current flying zone, or switch drones from one flying zone to another.ZSP planned collision-free navigation services to a drone, route maintenance between two drones, along many performance characteristics.

    Furthermore,to cover a larger area,such as an entire country,the ground stations must communicate logically with one another.This technique would track drones in a cluster at various flying zones,traffic,and drone switching from one flying zone to another and provide mandatory statistics.[1]also clarified handover strategies when a drone moves from one flying zone to another,as shown in Fig.1.

    In Fig.1, the certification for all drones is considered from a specialized framework installed within CSS,providing networking,information management support,and real-time problem-solving capabilities.The CSS is in charge of controlling,monitoring,and supervising drone navigation services.Network services and a wireless communication interface are also needed on all drones and are closely supervised by the CSS.The flight zones are another challenge for the CSS, and the drone must be operationalized in pre-determined flight zones/clusters.An external user can access a designated drone from a specific zone is also monitored by the CSS.CSS controls its flight and verifies its existence when a drone enters the IoD environment.The confirmation authenticity of a legitimate drone or the identification of an unauthorized drone in the flying zone can also easily be detected by the CSS due to its services agent capabilities.

    Figure 1:System model

    2.1 Adversary Model

    Any public networked-based correspondence may be altered, eavesdropped on, or snooped on by an intruder.An adversary can pose as an authentic node at a specific location and initiate contact with the legal peer.However,an adversary cannot reach the server to access the internal secret without authorization.However, he or she may compromise some tags to obtain the shared session key.Furthermore, an adversary has complete authority to begin negotiations with a legitimate client, to insert false tags with the standard message in a public network channel during contact,to remove the entire or part of the message,to copy the message and replay it at a later time[6].

    2.2 Threat Model

    Malicious users(attackers)have become more powerful nowadays.Therefore,all possible attacks are easy to launch against a legitimate user.Further,malicious users have many capabilities,such as editing,deleting,modifying,and blocking messages over IoD wireless networks.The possible threats against real users are: routing and session key threats, unauthorized access untraceability threats,perfect forward secrecy and data leakage threats, signal jamming and privacy threat, flight control and collation threats,signal spoofing and forgery threats,insider and deauthentication threats,stolen verifier and desynchronization threats, masquerade and impersonation threats, and clogging and ephemeral secret leakage threats.

    2.3 Public Key Infrastructure

    During peer authentication, efficient and secure management of keys (random numbers or public/private)pair is difficult to keep secret from a strong adversary.However,cryptographers[7,8]developed a scenario in which first the key pair is generated,secondly professionally deployed(public key is for encryption and private for decryption),and finally,the process of overturning it is performed.The overturning or invalidation step is initiated when the whole session is accomplished then the key pair becomes null or compromised.Therefore,to achieve secure communication over the public,insecure networks, protocols for the mutual authentication of two parties, and the generation of a cryptographically generated shared key among the participants are fundamental.In contrast, the cryptographically-hash-based message authentication code depends on cross-verified session shared keys that need dynamic updates,as shown in Fig.2.

    Figure 2:Single,double,and triple secret exchange scenarios

    2.4 XOR Operation

    For encrypting/decrypting the message using a single key or to secretly transmit a message without changing its size, a bit-wise XOR technique is used.It is a well-known technique in information security;a message having XOR cannot be cracked,which is also known as a one-time-pad[6].

    2.5 Research Contribution

    This article presents a PKI-based authentication protocol for IoD using FANET.The protocol offered in this research paper authenticates each participant(Uia,Vja,CSS)before procuring data from the drone using FANET.This lightweight and resource-efficient authentication protocol use SHA-1,PKI,XOR operations,and AES(Advanced Encryption Standard)for a secure key generation before broadcasting data with each other.The main contributions of the research work are as under:

    1.The protocol concentrates on generating secure keys among users,drone,and CSS,consisting of user’s password change, dynamic drone addition, and drone revocation/reissue phases.Besides, the hash function, which is used for cyclic checksum, has fewer storage overheads and high security.It also allows joint public network channels between User →Drone,Drone→CSS,CSS →Drones,and Drone →CSS without performance loss.

    2.The protocol offered in the article is validated using BAN logic and ProVerif2.03.A comprehensive, pragmatic illustration for prominent attacks shows that the scheme is verifiably protected against each.

    3.A comparative analysis section has been offered by considering three aspects, computation,storage,and communication costs which shows that the scheme is better than the state-of-theart protocols.

    3 Related Works

    The drone’s computing resources are severely limited, making it vulnerable to various security threats such as replay attacks, forgery attacks, and man-in-the-middle attacks.Seriously, a drone’s surveillance work in smart cities could cause serious harm at any moment.He et al.[5]suggested an elliptic curve cryptography-based lightweight identity authentication scheme.However,they neglect to mention drone addition,revocation,and password update phases.According to[9],malicious drone in contact between ground stations and drone causes data transmission and instruction data leakage.The identity authentication,validity,reliability,and privacy of a drone with the ground station have been addressed by[10]but do not offer perfect forward secrecy.

    According to[11],low latency authentication plays a fundamental role on the internet of drones in a disaster environment where latency is between life and death.Furthermore,unauthorized access,energy consumption, and latency concern the internet of the drone’s network [3].The author [12]proposed a lightweight protocol that achieved performance but compromised security and could not resist most attacks.Another mutual authentication protocol was proposed in[13],and the scheme is based on PUF but failed to provide comprehensive security.The protocol proposed in[14]provides poor performance,leading to a fatal accident in IoD networks.

    Furthermore,the author[15]cryptanalysis the scheme[16]and finds out that they cannot resist stolen authentication and traceability issues.According to[17],the scheme used in[18]suffers from session key leakage,inability to provide user anonymity,and scalability issues.Moreover,the scheme[19]used the same certificate in the authentication phase;thus,it does not provide anonymity.

    In recent years,the idea of the Internet of Things(IoT)has been implemented for the IoD environment.The data,communication,and network technology are incorporated for drones in IoD because it is used for consumer conveniences like entertainment,toys,agricultural-land monitoring,high-value industries,and wide applications in the defence field shooter product[10].Suppose improved battery power,sensing systems,communication security,and other technologies and incorporating them into drone technologies can become a top-rated product in recent years, advancing various fields and activities.In that case,small UAVs have enormous potential and have significant application versatility.In addition to personal aerial photography,entertainment,and commercial markets,they can be used in a range of surveillance activities,such as disaster relief,in diverse environments involving animals and plants,coasts and borders,in the transport of goods,military,and police enforcement tasks,and also in agricultural and industrial applications.Also, the smart city features like traffic monitoring and management,merchandise distribution,health and emergency services,and air taxi services,for example, will increase the efficiency, effectiveness, timeliness, reliability, and performance of these services and may help reduce the cost of delivering these services[20].

    Small UAVs, however, can also pose many security threats when misused.Different researchers made several attempts to secure its data transmission.For example, Hussain et al.[21] proposed an elliptic curve cryptographic-based authentication scheme to secure the communication of external users and drones in the pre-defined flying zone.After successful information broadcasting,the drones can then be deployed for different applications like broadening IoT base IoD,smart cities surveillances,sidewalk monitoring, and stealth purposes.Yahuza et al.[22] identified flaws in some prior IoDbased protocols like switching drones from one flying zone to another needed a robust mechanism for self-organizing its previous secure transmission path.They mitigated the flying zone flaw and proposed a provably secure protocol, and named it SLPAKA.Gope et al.[23] claimed that robust information authentication is necessary to successfully deploy UAVs in crop spraying,public safety,and critical infrastructure surveillance.For this, they proposed a privacy-aware edge-assisted UAVs protocol by taking into account the procedure for resistance of UAVs from physical capturing.Tian et al.[24] also proposed a security framework for edge-assisted IoD using the securely computed authenticated key in online and offline mode for efficient open-access communication.However,due to batch verification of the signature, the computation tie complexity of their framework is not good.Ever [25] demonstrated that the key features of drone-like mobility, energy consumption,reliability, and efficiency for an open network are fundamental because all the IoD participants are not designed with an integrated security phenomenon.Therefore,they proposed a security framework for IoD using WSN.They used the elliptic curve discrete logarithmic function to secure participants’computing keys.However, it still suffered from a key-escrow problem; [26] provision of secure and efficient communication between drone & ground station for smart city surveillance, [27] secured the confidential data transmission between drones in IoD environment, [28] presented protocol for public cloud data security in IoT enabled equipment using MANET,and[29]presented three-factor key-agreement protocol for network-enabled devices using WSN.Similarly, [30] demonstrated an authentication scheme for an e-health-care system using WMSN,and[31]published a homomorphic encryption-based authentication scheme for IoD environment in which innovative knowledge for the different environments has been presented.Also,[32]proposed a privacy protection protocol for grid computing has been presented in which guarantees secure communication between service providers and smart objects, and [33] presented a three-factor (password, smart-card and biometric)based authentication scheme,which works for Unmanned Aerial Vehicular Networks.

    Zhang et al.[14]designed a one-way hash function based on authentication and key agreement scheme for the Internet of Drone in which they claim that their scheme can guarantee for cross verification of each participant during communication.They presented the scheme in three phases:setup, registration, and mutual authentication.After the extensive analysis, it has been noted that their scheme is suffering from the following drawbacks:

    1.An attacker can intercept the first message sent between the user and the control server,which leads to forgery attacks.The intruder may then modify the timestamp ST1,but the CS would not detect this.Furthermore, if an intruder physically captures the drone [14], store security credentials in its memory to participate in the authentication protocol;as a result,an attacker can gain access to the memory or use side-channel attacks to obtain the stored credentials.It means the scheme is suffering from side-channel attacks.

    2.If an attacker forges the previous or current session key SKij, as the verification data is without encryption, the attacker can then transmit it towards the control center (SC)and force it to declare himself/herself as a legal user for the upcoming authentication session.For example, let suppose an attackerAcan steal {M5, M6, M7} message from the open network channel and transmit it towards drone.Vjacomputes r1//=M5⊕h(PIDj||αj),PIDi//=M6⊕h(PIDj||PIDs||αj||r1//), M7/=h(PIDi//||PIDj||PIDs||αj||r1//)and forced drone to confirmed: M7/?=M7.Next attackerAgenerates random number rAand computes:M8=h(PIDj||PIDi//)⊕rA, and M9=h(r1//||rA).Further he/she might calculate session key SKij=h(PIDi//||PIDj||PIDs||M9)which,then can be used for potential reply,DoS,insider and stolen-verifier attacks.Therefore,Zhang et al.[14]scheme is not safe against these attacks.

    3.Zhang et al.[32] used ST1in the first round trip, while they forgot to use it in the next two round trips,which in turn does not guarantee the transmission of new data among drone and control centers(SC).Therefore,the scheme suffers from outdated data transmission flaws.

    4.Since the scheme only uses a timestamp for the first-round trip and does not use a timestamp for any subsequent round trips,it suffers from a global time-synchronization issue.

    4 Proposed Solution

    To solve the weaknesses mentioned in Zhang et al.[14]scheme above,we,as a result of this,have proposed the following improved scheme consisting of 1)setup phase,2)registration phase,3)mutual authentication and cross-verification phase, 4)user’s biometric/password update Phase, 5)dynamic drone addition phase,and 6)drone revocation/reissue phases,each of these are described one by one as under,while the different notations used for designing the scheme are shown in Tab.1.

    Table 1: Notations and its description

    4.1 Setup Phase

    Let the control station server (CSS)choose a random numberlcalled a public key,sis a secret key and dispatches public parameterspms.Furthermore, CSS chooses collision-free one-way-hash function h(.)∈Zq*,identity IDsand calculates PIDs=h(IDs||s).The control station server(CSS)stores{l,s}and issues{PIDs,h(.),pms}.The CSS useslfor encryption(Public key),sfor decryption(private)in one session,and different keys for the next session.

    4.2 Registration Phase

    This phase of the proposed scheme is divided into two sub-phases:

    4.2.1 User’s Registration

    This sub-phase of the scheme,completed in the following steps:

    i.A legitimate user chooses his/her identity IDia,password PWiaand sends a registration request towards the control station server(CSS)over a secure channel.

    ii.Upon receiving the registration request, the control station server (CSS)computes PIDia=h(IDia||s),Ai=h(IDia||l),store{PIDia,Ai,IDia}and transmit{PIDia,Ai}towards user over a secure channel.

    iii.Upon receiving {PIDia, Ai}, the user imprints his/her biometrics BIOia, and computes:Gen(BIOia)=(σia,τia), Aim=h(IDia||PWia)⊕Ai, and PIDiam=h(IDia||PWia)⊕PIDiawhereσia&τiaare biometric keys associated with BIOia.Finally, Uiastores {Aim, PIDiam, Gen(.),Rep(.)} in its memory.Biometric Gen(.)and Rep(.)functions to concealed credentials from privileged user,as shown in Module I.

    Module I:User’s registration phase

    4.2.2 Drone’s Registration Phase

    This sub-phase of registration phase is accomplished on the following steps:

    i.A drone randomly selects IDjaand transmits it to the control station server(CSS)over a secure channel.

    ii.Upon receiving the request message, the control station server (CSS)computes PIDja=h(IDja||s), Aj=h(IDja||l)stores {IDja, PIDja, Aj} and sends {PIDja, Aj} towards drone over a private channel.

    iii.Upon receiving the message of CSS,the drone stores{PIDja,Aj}in its memory for future usage,as shown in Module II.

    Module II:Drone’s registration phase

    4.3 Mutual Authentication&Cross Verification Phase

    After registering user(Ui)and drone(Vj),they can communicate with each other subject to the condition that they can compute a secret shared session key SK.For such purpose,the following steps will perform:

    i.The user first enters his/her IDia,PWia,imprints biometric BIO/iaand computesσ/ia=Rep(BIOia,τia),PIDia=PIDiam⊕h(IDia||PWia),Ai=Aiam⊕h(IDia||PWia).Next generate a number R1∈Z*n,present timestamp ST1and compute:M1=h(PIDs||ST1)⊕PIDia,M2=h(PIDia||PIDs||Ai)⊕R1,M3=h(PIDia||PIDs||Ai||R1)⊕PIDja, M4=h(PIDia||PIDja||PIDs||Ai||R1)and transmits {M1,M2,M3,M4,ST1}message towards control server over a public network channel.Here using public key for the encryption of h(PIDja||PIDia//||ST3)⊕R2message.

    ii.Upon receiving{M1,M2,M3,M4,ST1}message,the CSS checks the received timestamp with the current system time (Tc-ST1≤ΔT), if not found within the prescribed time threshold,the CSS consider it for potential replay attack and stops computation.But when found valid,CSS decrypts M1using private keysand computes PIDia/=M1⊕h(PIDs||ST1)and retrieves Ai/and calculates R1/=M2⊕h(PIDia/||PIDs||Ai/), PIDja/=M3⊕h(PIDia/||PIDs||Ai/||R1/)and M4/=h(PIDia/||PIDja/||PIDs||Ai/||R1/).The control station server(CSS)confirms M4/?=M4,if found no confirmation, the process is terminated, else, it generates another timestamp ST2and computes M5=h(PIDja/||Aj/||ST2)⊕R1/,M6=h(PIDja/||PIDs||Aj/||R1/)⊕PIDia/,M7=h(PIDia/||PIDja/||PIDs||Aj/||R1/)and transmits{M5,M6,M7,ST2}message towards drone over a public network channel.

    iii.Upon receiving{M5,M6,M7,ST2}message,drone first check the timestamp with system time(Tc-ST2≤Δ T),computes R1//=M5⊕h(PIDja||Aj),PIDia//=M6⊕h(PIDja||PIDs||Aj||R1//)and M7/=h (PIDia//||PIDja||PIDs||Aj||R1//), confirms M7/?=M7, if found no validation,the drone rejects the authentication request, else, it generates random number R2∈Z*n, ST3and computes M8=h (PIDja||PIDia//||ST3)⊕R2, M9=h (R1//||R2), SKiaja=h(PIDia//||PIDja||PIDs||M9),M10=h(PIDia//||PIDja||PIDs||R1//||R2||M9)and sends{M8,M9,M10,ST3}message towards CSS over a public channel.Here M8must perform encryption usingli.e.,M8=El(h(PIDja||PIDia//||ST3)⊕R2).

    iv.The CSS,when receiving{M8,M9,M10,ST3}message,check the time,decrypt M8,and computes,R2/=M8⊕h(PIDja|PIDia||R1),M9/=h(R1||R2/),and M10=h(PIDia||PIDja||PIDs||R1||R2/).It then Confirms:M10/?=M10,if matches,compute:SKiaja=h(PIDia||PIDja||PIDs||M9/),else,stop calculation.Finally,{M8,M9,M10,ST4}message towards the user.

    v.The user,upon receiving{M8,M9,M10,ST3}message,checks drone time with its current time(Tc-ST3≤ΔT),if found no validation,the process is discarded,else,it decrypts M8using s and computes R2/=M8⊕h(PIDja|PIDia||R1),M9/=h(R1||R2/),M10=h(PIDia||PIDja||PIDs||R1||R2/),confirms M10/?=M10,if found no validation,the process once again be terminated,otherwise keeps SKiaja=h(PIDia||PIDja||PIDs||M9/)as the session shared key,as shown in Module III.

    Module III:Mutual authentication phase

    4.4 Dynamic Drone Addition Phase

    Let us suppose a new drone denoted by Vjnewis required to add to the IoD environment.The control station server (CSS)initially generates a distinctive IDjanewand computes PIDjanew=h(IDjanew||s),where s is the secret key.Next,CSS chooses a 160-bits public keyl,computes:Ajnew=h(IDjanew||l)and stores{IDjanew,PIDjanew,Aj}in its memory and{PIDjanew,Aj}in drone’s memory.The operator sitting on CSS informs all the previously registered drones from the newly added drone available on IoD for dynamic changing of its topology and deploy for the possible task.

    4.5 User’s Biometric/Password Update Phase

    If a legitimate user desires to change his/her password or biometrics, our protocol offers changing facilities to him/her freely and securely.To do so, the user first enters his/her old identity IDia, old password PWia, and imprint biometric BIO/ia; and computes:σ/ia=Rep(BIO/ia,τia), Aim=h(IDia||PWia)⊕Ai, PIDiam=h(IDia||PWia)⊕PIDia, generates R1∈Z*nand computes M1/= h(PIDs||R1)⊕PIDia.If M1/?=M1, tells the user to fresh password PWianew, or re-imprints biometrics BIOianew, Locally the computations performed as: PIDia=h(IDia||s), Ai=h(PWianew||l),Gen(BIOianew)=(σianew,τianew), Ainew=h(IDia||PWianew)⊕Ai, PIDianew=h(IDia||PWianew)⊕PIDiaand replaces{Aim,PIDiam}with{Ainew,PIDianew},as shown in Module IV.

    Module IV:Password/Biometric change phase

    4.6 Drone Revocation/Reissue Phase

    If a drone goes out of service or is physically captured by an attacker or taken down/crashed,its data is available in the CSS poses a severe threat.This can, in turn, be used by the unauthorized entity,which means the danger of IoD.Therefore,we suggested that the CSS have a list/database table consisting of unique identities of compromised drones.Personal values can be added and removed from the record correspondingly,i.e.,Aja=IDja||s,Ajadel=IDja||s,IDja?=IDjadel,if it confirms,delete IDjadeland completely remove the record of such drone from the CSS.

    5 Security Analysis

    Security analysis for any protocol is considered an essential task.Because security analysis uses system engineering ideas and trust to scrutinize and examine the strength of a cryptographic-based designed protocol,this section identifies the protocol’s credibility,authenticates the IoD environment protocol’s stability, shared authentication, and integrity.The protocol mentioned above analyzed formally using BAN Logic[34]and,ProVerif2.02[35],which are as under:

    5.1 Formal Security Analysis

    The formal security analysis of the proposed authentication protocol will be conducted using the following different methods used by different researchers from time to time like using BAN Logic[34]and,ProVerif2.02[35],are as under:

    5.1.1 BAN Logic

    Before analyzing the proposed protocol using BAN logic [34], let’s, define a few concepts and different notation defined are shown in Tab.2,below:

    Table 2: BAN logic notations and its description

    Different rules defined are as under:

    Rule 1:Message Meaning

    If Uiabelieves that Uiaand CSS share SK sees message X,then Uiabelieves CSS once said.

    Rule 2:Nonce Verification

    If Uiabelieves that message X is fresh that CSS once said X,then Uiabelieves that CSS trust X

    Rule 3:Jurisdiction Rule

    If Vjabelieves CSS control X because it is under the jurisdiction of both and Vjabelieves that CSS believes X,then Vja believes X.

    Rule 4:Freshness Rule

    If Vjabelieves that message X is fresh,and CSS believes X,then Vjabelieves they sharedkey.

    Rule 5:Belief Rule

    If Uiabelieves that X,then CSS believe in message X and Vja

    1)Goals

    The following goals are demonstrated for the proposed authentication protocol.

    2)Idealized Form

    The following idealized form is as a result of this described for the proposed authentication scheme:

    3)Assumption

    The following assumptions will prove our protocol:

    4)Proof

    Now to verify each statement,take message1,and assumption 2,i.e.,

    Therefore,from this proof,it has been cleared that the keys exchanges between the user,control station server(CSS),and the drone are fully authenticated by each peer,and no one can compromise its integrity at any stage during communication.

    5.1.2 ProVerif2.02 Simulation

    To check the proposed protocol’s security, a verification software toolkit [35] is now used to confirm its reachability and authorization.The coding is explained in different parts as given as:

    SIMULATION RESULT

    5.2 Informal Security Analysis

    Suppose an adversary has full power by entering the open channel for eavesdropping, altering,deleting,or updating the message exchange between participants.Then how the proposed authentication protocol can resist such known flaws[36].We will discuss such suppositions one by one here in this section of the paper.

    5.2.1 Resists Privileged Insider Attack

    Firstly, the control station server (CSS)chooses a big random number l of 160-bits, and a 160-bits secrete number s, collision-free one-way hash function h(.): {0, 1}*∈Zq* and public parameters pms.Secondly, messages exchanged between Uia→CSS, CSS →V-jaand Vja→Uia, i.e., {M1, M2,M3,M4,ST1},{M5,M6,M7,ST2}and{M8,M9,M10,ST3}are in encrypted form in which an insider(let be a privileged one)cannot figure out the internal credentials.Because l is used for encryption,s for decryption purposes and insiders cannot identify anything from it.Also, the exchange among participants is entirely unreadable,so he/she failed to identify the identity or password from the stored information.Therefore,the proposed protocol shows resistance to privileged insider attacks.

    5.2.2 Stolen Verifier Attack

    Suppose an adversary steals the information from the shared memory and tries to compute identity and other information.Due to exchanging of random numbers R1, R1/, R2, R1//on each communication, the attacker failed to do so.Similarly, it is hard for him/her to find the big 160-bits random numbers,as these numbers are linked with IDia,IDja,IDs,PIDia,PIDja,PIDs,biometric(BIOia),and password(PWia).Therefore,the proposed protocol resists stolen verifier attacks.

    5.2.3 Replay Attack

    Let suppose if an attacker copies message{M1,M2,M3,M4,ST1}from a communication channel and desires to replay it at some other time.At this stage,due to the involvement of random numbers and timestamps, the system can quickly identify the replay message and discards such request.The attacker can do the same also for other messages, i.e., {M5, M6, M7, ST2} and {M8, M-9, M10, ST3}.Therefore,the proposed authentication protocol shows resilience to replay attacks.

    5.2.4 Untraceability

    The drone or user starts each session with different session keys;let us suppose,if an adversary can record the session of a user/drone and tries to record another session at some other time,he/she may find a different session key.We can say that the adversary cannot figure out the same credentials from these session keys for which he/she can identify the exact location or trace user/drone.Therefore,the proposed authentication scheme is untraceable.

    5.2.5 Anonymity

    Due to the dynamic identities,random numbers,and timestamps,each time a message transmission over a public channel can be performed dynamically.If an adversary desires to copy one message in TAand another message from the same line on time TA/, he/she cannot identify the surrounding of a user/drone because different messages are communicated between the participants each time.Therefore,the proposed protocol preserves anonymity security features.

    5.2.6 DoS Attack

    If an adversary copy {M5, M6, M7, ST2} and chooses timestamp STAand the CSS passed Tc-STA≤ΔT, computes PIDia/=M1⊕h(PIDs||STA), retrieves Ai/and calculates R1/=M2⊕h(PIDia/||PIDs||Ai/),PIDja/=M3⊕h (PIDia/||PIDs||Ai/||R1/)and M4/=h(PIDia/||PIDja/||PIDs||Ai/||R1/).Next server has to match M4/?=M4, which is not possible.So, in such situations, the process is terminated and stops further computations.Similarly,if an adversary selects TA,catch message{M8,M-9,M10,STA}and transmits it towards drone(Vja).Next drone suppose can successfully perform Tc-STA≤ΔT and computes R1//=M5⊕h(PIDja||Aj),PIDia//=M6⊕h(PIDja||PIDs||Aj||R1//),and M7/=h(PIDia//||PIDja||PIDs||Aj||R1//).Now, check M7/with M7and if not match then the connection will terminate.Therefore,the proposed protocol is strong against DoS attack.

    5.2.7 Drone Capture Attack

    Due to unique credentials stored in the memory of a remote drone and distinct session key established among drone, user, and CSS in the network, attackers at any stage cannot capture or divert a drone towards itself.Therefore, the proposed protocol resists drone captures attacks.Similarly,a drone might be required to engage in dangerous situations where it is abandoned during military mission delivery, making it vulnerable to physical capture and traditional cyber threats.An adversary uses white-box attack capabilities to completely control the internal credentials, figure outing identity,and execute the cryptography modules in static and dynamic ways,including all sidechannel information.Therefore,the proposed protocol had guaranteed not to disclose any parameters when someone takedown/captured a drone physically.

    5.2.8 Resists Side-Channel Attack

    Due to being less dependent on fundamental values, confirmation of values at different stages of the protocol, and computing the session shared key randomly for each session which leads to the sequence of operations changing,can generally make the proposed protocol better to resist sidechannel attack.

    6 Performance and Comparison Analysis

    In this section,the performance analysis/evaluation of the proposed authentication protocol can be performed from the perspective of storage overheads,computation,and communication costs by keeping the already experiment conducted by[37],which are as under:

    6.1 Storage Overheads Analysis

    The storage overheads mean the parameters stored during the registration phase of the proposed scheme.In this regard,IDia,IDja,IDs,and PWiaare stored in 64 bits,each of a total sum of 256 bits in memory space.Biometric keys(σia,τia)are in 128-bit space;timestamp takes 56 bits space,R1,R1/,R1//,R2needs 160+160+160+160=640 bits,l,andsneeds 320 bits space.Encryption/Decryption functions require every 192 bits,a total sum of 384 bits.Therefore,the storage overheads cost of the proposed authentication protocol is 1784 bits.

    6.2 Computation Cost Analysis

    The computation cost can be analyzed by keeping in view the experiment done by[37].According to [24], during the selection of a random numbers the CPU consume 0.539 ms (total random numbers 6 (6×0539=3.234 ms)), public-key encryption 3.8500 ms (3×3.8500=11.55 ms), decryption 3.8500 ms (3×3.8500=11.55 ms), hashing 0.0023 ms (24×0.0023=0.0552 ms), multiplication 2.226 ms(2×2.226=4.452 ms),and addition 0.0288 ms(11×0.0288=0.3168 ms).The estimated cost for hash-based message authentication is 0.0056 ms.Therefore, the final computation cost for the proposed authentication scheme is 31.158 ms.

    Table 3: Comparison analysis

    6.3 Communication Cost Analysis

    Based on[37],the messages exchanged among all the participants over the public network channel can be considered communication costs.The communication cost for the first message is 1080bits({M1,M2, M3, M4, ST1}=256+256+256+256+56=1080 bits), second and 3rdare 824 each ({M5, M6,M7, ST2}=256+256+256+56=824 bits, {M8, M9, M10, ST3}=256+256+256+56=824 bits).Therefore,the total communication costs for the proposed authentication protocol are 2728 bits.

    6.4 Comparison Analysis

    Comparing the proposed authentication protocol with state of the art protocols like Challa et al.[20],Seo et al.[26],Farash et al.[27],and Zhang et al.[14],the communication cost is slightly higher than [26], but it is much better in computation cost.The results are shown in Tab.3, followed by a graph in Fig.3.

    Figure 3:Comparison Chart with state-of-the-art protocols

    Furthermore,the various sections in Tab.4 represent the comparison of the proposed solutions with different security functionalities as given in Challa et al.[20],Seo et al.[26],Farash et al.[27],and Zhang et al.[14].For example,in Tab.4,I represent the Physical Security of the Drone,II represents its security against Impersonation attack, III shows resistance to location threat, IV represents safe against stolen verifier attack,and V represents secure privileged insider threat.

    Table 4: Functionalities comparison analysis

    7 Conclusion

    The widespread usage of IoD technology and the non-availability of foolproof secure authentication protocols for the IoD environment motivates us to design a mutual authentication and crossverification protocol.The current research work deeply examined different protocols available in the literature and highlighted the various flaws in Zhang et al.protocol.We then presented a PKI,XOR,and simple hash function-based protocol used for checksum at both ends.This cyclic checksum of hash functions has the capability of less storage and high security.Its performance is better than any other method because it allows mutual processing of public network channels between Drone-CSS, CSSDrones, User-Drone, and CSS-Drone without loss of security.The proposed scenario’s security has been verified formally using BAN logic of authentication.While the key secrecy,confidentiality,and reachability have been verified using the ProVerif2.02 toolkit.Moreover, the strength of the scheme has been discussed pragmatically in the informal analysis section of the paper.At the end of the article, the performance analysis section has been completed by considering three metrics storage,communication,and computation costs.Upon comparing the proposed scheme with state-of-the-art protocol, it has been shown that it is efficient and effective and can be recommended for practical implementation in the IoD environment.

    Acknowledgement:The authors would like to express their sincere thanks to the University of Bisha,Bisha,Saudi Arabia,for the support provided during the research.

    Funding Statement:No funding has been received for conducting this research.

    Conflicts of Interest:The authors declared that they have no conflict of interest.

    欧美高清成人免费视频www| 天天躁日日操中文字幕| 99热精品在线国产| 九九热线精品视视频播放| www日本黄色视频网| 国产免费av片在线观看野外av| 美女 人体艺术 gogo| 美女高潮的动态| 久久热在线av| 欧美日本视频| 国产99白浆流出| 三级国产精品欧美在线观看 | 宅男免费午夜| 免费大片18禁| 日日干狠狠操夜夜爽| 性色av乱码一区二区三区2| 国产真实乱freesex| 欧美大码av| 91老司机精品| 特大巨黑吊av在线直播| 国产精品免费一区二区三区在线| 悠悠久久av| 亚洲精品美女久久av网站| 日本与韩国留学比较| 一级黄色大片毛片| svipshipincom国产片| 在线永久观看黄色视频| 香蕉av资源在线| 欧美性猛交黑人性爽| 露出奶头的视频| 综合色av麻豆| 欧美一区二区国产精品久久精品| 99在线人妻在线中文字幕| 欧美在线黄色| 久久久国产欧美日韩av| 精品电影一区二区在线| 国产av在哪里看| 国产三级在线视频| 午夜视频精品福利| 999精品在线视频| 精华霜和精华液先用哪个| 国产伦精品一区二区三区视频9 | 国产精品野战在线观看| 91九色精品人成在线观看| 免费看光身美女| 国产亚洲精品av在线| 很黄的视频免费| 精品一区二区三区四区五区乱码| 亚洲人成电影免费在线| 在线观看午夜福利视频| 99riav亚洲国产免费| 高清毛片免费观看视频网站| 国模一区二区三区四区视频 | 在线观看66精品国产| av在线蜜桃| 亚洲成人精品中文字幕电影| 欧美日本亚洲视频在线播放| 亚洲片人在线观看| 男女床上黄色一级片免费看| 琪琪午夜伦伦电影理论片6080| 欧美性猛交╳xxx乱大交人| 99久久无色码亚洲精品果冻| 99在线视频只有这里精品首页| 法律面前人人平等表现在哪些方面| 在线观看舔阴道视频| 成人国产一区最新在线观看| 久久中文字幕一级| 亚洲欧美精品综合久久99| 韩国av一区二区三区四区| 97碰自拍视频| 国内毛片毛片毛片毛片毛片| 人妻久久中文字幕网| 搡老熟女国产l中国老女人| 神马国产精品三级电影在线观看| 一个人免费在线观看电影 | 国产一级毛片七仙女欲春2| 宅男免费午夜| 女警被强在线播放| 成人精品一区二区免费| 欧美又色又爽又黄视频| 听说在线观看完整版免费高清| 在线看三级毛片| 大型黄色视频在线免费观看| 久久久久久久午夜电影| 国产97色在线日韩免费| 欧美日韩瑟瑟在线播放| 久久精品国产清高在天天线| 精品一区二区三区视频在线 | 每晚都被弄得嗷嗷叫到高潮| 视频区欧美日本亚洲| 后天国语完整版免费观看| 淫妇啪啪啪对白视频| 欧美激情久久久久久爽电影| 精品久久久久久,| 91av网站免费观看| 欧美中文日本在线观看视频| 免费看光身美女| 国产真人三级小视频在线观看| 最近最新中文字幕大全免费视频| 亚洲avbb在线观看| 久久国产精品影院| 亚洲18禁久久av| 成年人黄色毛片网站| 精品国产乱子伦一区二区三区| 黄色 视频免费看| 美女高潮喷水抽搐中文字幕| 国产亚洲精品久久久com| 久久热在线av| 神马国产精品三级电影在线观看| 欧美成人性av电影在线观看| 色综合欧美亚洲国产小说| 在线十欧美十亚洲十日本专区| 搡老岳熟女国产| 啪啪无遮挡十八禁网站| 欧美大码av| 久久精品91蜜桃| 波多野结衣高清作品| 亚洲欧美日韩高清专用| 在线观看舔阴道视频| 天天躁狠狠躁夜夜躁狠狠躁| 一个人免费在线观看电影 | 亚洲av免费在线观看| 久久久久九九精品影院| 免费一级毛片在线播放高清视频| 身体一侧抽搐| 天天添夜夜摸| 欧美日韩一级在线毛片| 美女被艹到高潮喷水动态| 午夜福利在线在线| a级毛片在线看网站| 久久午夜综合久久蜜桃| 国产三级中文精品| 国产精品久久久久久人妻精品电影| 法律面前人人平等表现在哪些方面| 国产亚洲精品久久久久久毛片| 岛国视频午夜一区免费看| 麻豆国产av国片精品| 久久久久久久久中文| 久久人人精品亚洲av| 岛国在线免费视频观看| 淫妇啪啪啪对白视频| 又粗又爽又猛毛片免费看| 我要搜黄色片| 国产在线精品亚洲第一网站| 每晚都被弄得嗷嗷叫到高潮| 亚洲av熟女| 黄色丝袜av网址大全| 精品一区二区三区视频在线观看免费| 成在线人永久免费视频| 国产精品永久免费网站| 97碰自拍视频| 99国产精品一区二区蜜桃av| 人妻丰满熟妇av一区二区三区| 国产乱人视频| 亚洲国产欧美一区二区综合| 法律面前人人平等表现在哪些方面| xxx96com| 香蕉丝袜av| or卡值多少钱| 久久香蕉国产精品| 国产精品女同一区二区软件 | 综合色av麻豆| 亚洲欧美日韩高清专用| 黄色丝袜av网址大全| 欧美绝顶高潮抽搐喷水| 国产精品综合久久久久久久免费| 午夜免费观看网址| 两个人视频免费观看高清| 老司机午夜十八禁免费视频| 99热精品在线国产| 午夜福利在线观看免费完整高清在 | 亚洲一区二区三区色噜噜| 久久久久久久午夜电影| 成人18禁在线播放| 久久精品人妻少妇| 一边摸一边抽搐一进一小说| 99久久精品一区二区三区| 村上凉子中文字幕在线| 桃红色精品国产亚洲av| 国产精品99久久久久久久久| 免费av毛片视频| 成人av在线播放网站| 欧美乱色亚洲激情| 国产欧美日韩精品亚洲av| 国产97色在线日韩免费| 九九在线视频观看精品| 我要搜黄色片| 国产激情欧美一区二区| avwww免费| 1024手机看黄色片| 亚洲色图av天堂| 日韩欧美三级三区| 特大巨黑吊av在线直播| 嫩草影视91久久| 国产成人精品无人区| 男女那种视频在线观看| 91av网一区二区| 毛片女人毛片| 亚洲成av人片在线播放无| 亚洲片人在线观看| 亚洲人成伊人成综合网2020| 亚洲国产精品合色在线| 噜噜噜噜噜久久久久久91| 精品久久久久久成人av| 午夜免费成人在线视频| 久久久国产成人免费| 少妇熟女aⅴ在线视频| 深夜精品福利| 亚洲av电影不卡..在线观看| 每晚都被弄得嗷嗷叫到高潮| 最近最新中文字幕大全免费视频| 国产成人精品久久二区二区免费| 午夜a级毛片| 国产高清视频在线播放一区| 欧美av亚洲av综合av国产av| 日本一二三区视频观看| 两性午夜刺激爽爽歪歪视频在线观看| 国产蜜桃级精品一区二区三区| 黄色片一级片一级黄色片| 亚洲色图av天堂| 国产一区二区激情短视频| 色av中文字幕| 精品人妻1区二区| 欧美成人一区二区免费高清观看 | 黄频高清免费视频| 国产精品一区二区免费欧美| 在线视频色国产色| 99久久国产精品久久久| 网址你懂的国产日韩在线| 精品国产美女av久久久久小说| 欧美日韩中文字幕国产精品一区二区三区| 神马国产精品三级电影在线观看| 88av欧美| 18禁裸乳无遮挡免费网站照片| 国产精品亚洲av一区麻豆| 网址你懂的国产日韩在线| 日本与韩国留学比较| 18美女黄网站色大片免费观看| 亚洲男人的天堂狠狠| 亚洲国产精品合色在线| 国产免费av片在线观看野外av| 亚洲av熟女| 亚洲男人的天堂狠狠| xxx96com| 欧美日本视频| 在线a可以看的网站| 亚洲一区二区三区色噜噜| 久久人人精品亚洲av| 欧美午夜高清在线| 国产亚洲欧美在线一区二区| 叶爱在线成人免费视频播放| 亚洲av第一区精品v没综合| 色精品久久人妻99蜜桃| 别揉我奶头~嗯~啊~动态视频| 97超级碰碰碰精品色视频在线观看| 欧美另类亚洲清纯唯美| 免费在线观看日本一区| 亚洲自偷自拍图片 自拍| 国产精品一区二区精品视频观看| 成年女人看的毛片在线观看| 亚洲真实伦在线观看| 亚洲国产看品久久| 一二三四社区在线视频社区8| 国产精品九九99| 成人午夜高清在线视频| 欧美成狂野欧美在线观看| 国产69精品久久久久777片 | 三级男女做爰猛烈吃奶摸视频| 国产高潮美女av| 五月伊人婷婷丁香| 国产精品一及| 欧美日韩中文字幕国产精品一区二区三区| 亚洲av熟女| 在线观看日韩欧美| 特大巨黑吊av在线直播| 脱女人内裤的视频| 在线十欧美十亚洲十日本专区| 亚洲一区二区三区色噜噜| 欧美av亚洲av综合av国产av| 亚洲18禁久久av| 国产成人精品无人区| 久99久视频精品免费| 欧洲精品卡2卡3卡4卡5卡区| 99久久精品一区二区三区| 亚洲色图av天堂| 国产精品综合久久久久久久免费| 国产一区在线观看成人免费| 99在线人妻在线中文字幕| 亚洲黑人精品在线| 欧洲精品卡2卡3卡4卡5卡区| 日本免费一区二区三区高清不卡| 91av网站免费观看| 真实男女啪啪啪动态图| 日韩欧美国产一区二区入口| 国产成人精品无人区| 一级毛片精品| 国产精品久久久av美女十八| 日韩高清综合在线| 国产精品99久久久久久久久| 国产黄a三级三级三级人| 精品久久久久久成人av| 日韩欧美国产一区二区入口| 国产精品久久视频播放| 一区二区三区国产精品乱码| 国产精品av视频在线免费观看| 美女 人体艺术 gogo| 国产伦一二天堂av在线观看| 色综合亚洲欧美另类图片| 亚洲成a人片在线一区二区| 动漫黄色视频在线观看| 日本a在线网址| 天堂av国产一区二区熟女人妻| 国产av在哪里看| 免费看十八禁软件| 国产精品野战在线观看| 啦啦啦免费观看视频1| 成人性生交大片免费视频hd| 婷婷精品国产亚洲av| 91av网站免费观看| 欧洲精品卡2卡3卡4卡5卡区| 亚洲真实伦在线观看| 国产亚洲精品久久久com| 一个人看视频在线观看www免费 | 在线永久观看黄色视频| 国产视频内射| 亚洲精品在线美女| 欧美激情在线99| 亚洲成av人片在线播放无| 国产欧美日韩一区二区三| 三级毛片av免费| 免费av不卡在线播放| 欧美性猛交黑人性爽| 国产成人啪精品午夜网站| 日韩欧美国产一区二区入口| 18美女黄网站色大片免费观看| 欧美日韩国产亚洲二区| avwww免费| 嫩草影院入口| 国产av一区在线观看免费| 亚洲真实伦在线观看| 叶爱在线成人免费视频播放| АⅤ资源中文在线天堂| 别揉我奶头~嗯~啊~动态视频| 一个人看视频在线观看www免费 | or卡值多少钱| 制服人妻中文乱码| 国产野战对白在线观看| 麻豆av在线久日| 搞女人的毛片| 日本精品一区二区三区蜜桃| 成年女人毛片免费观看观看9| 身体一侧抽搐| or卡值多少钱| 国产亚洲欧美98| 窝窝影院91人妻| 国产不卡一卡二| 日韩有码中文字幕| 免费在线观看视频国产中文字幕亚洲| 97超视频在线观看视频| 在线看三级毛片| 亚洲一区二区三区色噜噜| av在线天堂中文字幕| 亚洲欧美精品综合久久99| 亚洲中文字幕一区二区三区有码在线看 | 1024手机看黄色片| 男女那种视频在线观看| 五月伊人婷婷丁香| 两人在一起打扑克的视频| av天堂中文字幕网| 91av网站免费观看| 淫妇啪啪啪对白视频| 欧美在线黄色| 三级毛片av免费| 又紧又爽又黄一区二区| 天天添夜夜摸| 色av中文字幕| 午夜免费成人在线视频| 男人的好看免费观看在线视频| 久久精品亚洲精品国产色婷小说| 久久99热这里只有精品18| 在线看三级毛片| 12—13女人毛片做爰片一| 欧美激情在线99| 国产精品亚洲美女久久久| 国产精品日韩av在线免费观看| 精品国产乱子伦一区二区三区| 九九久久精品国产亚洲av麻豆 | 亚洲自偷自拍图片 自拍| 国产精品一区二区三区四区久久| 最新在线观看一区二区三区| 一区二区三区高清视频在线| 69av精品久久久久久| 久久久久精品国产欧美久久久| 18禁观看日本| 国产精品女同一区二区软件 | 国产探花在线观看一区二区| 天天躁日日操中文字幕| 91久久精品国产一区二区成人 | 中文字幕久久专区| 激情在线观看视频在线高清| 亚洲国产精品999在线| 免费观看人在逋| 久久久国产成人精品二区| 91九色精品人成在线观看| 一级a爱片免费观看的视频| 啪啪无遮挡十八禁网站| 亚洲第一电影网av| 久久伊人香网站| 国产精品永久免费网站| 久久国产精品人妻蜜桃| 在线观看免费视频日本深夜| 亚洲av成人av| 18禁黄网站禁片午夜丰满| 真人做人爱边吃奶动态| 日韩欧美 国产精品| 亚洲国产欧美人成| 成人性生交大片免费视频hd| 免费一级毛片在线播放高清视频| 日本五十路高清| 国产成人精品久久二区二区91| 国产在线精品亚洲第一网站| 一区二区三区高清视频在线| or卡值多少钱| 99热这里只有精品一区 | 国产精品一区二区精品视频观看| 天堂动漫精品| 日本三级黄在线观看| 成人国产一区最新在线观看| 18禁裸乳无遮挡免费网站照片| 精品福利观看| 久久久水蜜桃国产精品网| 少妇的丰满在线观看| 黄色 视频免费看| 亚洲七黄色美女视频| 一级毛片高清免费大全| 88av欧美| 在线播放国产精品三级| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲人成电影免费在线| 国产亚洲av高清不卡| 精品免费久久久久久久清纯| 波多野结衣巨乳人妻| 97超视频在线观看视频| 国产精品久久电影中文字幕| 99国产极品粉嫩在线观看| 真人一进一出gif抽搐免费| 久久精品国产综合久久久| 一进一出好大好爽视频| 色综合欧美亚洲国产小说| 999久久久国产精品视频| 亚洲精品久久国产高清桃花| 少妇熟女aⅴ在线视频| 欧美性猛交╳xxx乱大交人| 国产av麻豆久久久久久久| АⅤ资源中文在线天堂| 高潮久久久久久久久久久不卡| 天堂动漫精品| 99精品在免费线老司机午夜| 老汉色av国产亚洲站长工具| 日日夜夜操网爽| 成年女人永久免费观看视频| 99精品在免费线老司机午夜| 欧美日韩黄片免| 国产v大片淫在线免费观看| 国产极品精品免费视频能看的| 亚洲国产精品成人综合色| 亚洲一区二区三区不卡视频| 亚洲中文av在线| 精品国产乱子伦一区二区三区| 丰满的人妻完整版| 色综合欧美亚洲国产小说| 午夜影院日韩av| 成人av在线播放网站| 夜夜看夜夜爽夜夜摸| 欧美成人一区二区免费高清观看 | 国产精品香港三级国产av潘金莲| 波多野结衣高清无吗| 桃红色精品国产亚洲av| 黄色日韩在线| 亚洲av熟女| 国产精品99久久久久久久久| 色综合站精品国产| 精品国内亚洲2022精品成人| 18禁国产床啪视频网站| 午夜成年电影在线免费观看| 精华霜和精华液先用哪个| 性欧美人与动物交配| 国产精品久久久久久亚洲av鲁大| 熟女人妻精品中文字幕| 久久久久久人人人人人| 成人性生交大片免费视频hd| 欧美一区二区精品小视频在线| tocl精华| 免费在线观看影片大全网站| 午夜精品在线福利| 国内精品美女久久久久久| 久久久久九九精品影院| 亚洲熟女毛片儿| www.www免费av| 在线观看免费视频日本深夜| 亚洲精品久久国产高清桃花| 国产黄片美女视频| 国产精品久久久久久人妻精品电影| 亚洲最大成人中文| 99国产综合亚洲精品| 黑人操中国人逼视频| 亚洲狠狠婷婷综合久久图片| 国产成人精品久久二区二区免费| 亚洲av电影在线进入| 免费观看精品视频网站| АⅤ资源中文在线天堂| 国产av麻豆久久久久久久| 麻豆国产97在线/欧美| 99久久精品一区二区三区| 亚洲精品粉嫩美女一区| 日日摸夜夜添夜夜添小说| 亚洲国产欧美人成| 久久久久久久久中文| 一个人免费在线观看的高清视频| 亚洲av成人一区二区三| 叶爱在线成人免费视频播放| 在线十欧美十亚洲十日本专区| 久久久久久久午夜电影| 欧美国产日韩亚洲一区| 亚洲欧洲精品一区二区精品久久久| 三级国产精品欧美在线观看 | 中文字幕高清在线视频| 国产精品九九99| 午夜日韩欧美国产| 一个人免费在线观看电影 | 久久久久久久精品吃奶| 又紧又爽又黄一区二区| 久久性视频一级片| 国产乱人视频| 成年女人毛片免费观看观看9| 精品国产三级普通话版| 国产久久久一区二区三区| 日本精品一区二区三区蜜桃| 国产av麻豆久久久久久久| 俄罗斯特黄特色一大片| 在线十欧美十亚洲十日本专区| 最近最新中文字幕大全免费视频| 久久香蕉精品热| 欧美日韩一级在线毛片| av天堂在线播放| 午夜激情欧美在线| 成人三级黄色视频| 高清在线国产一区| 久久久久久久久久黄片| 黑人欧美特级aaaaaa片| 天堂√8在线中文| 99精品在免费线老司机午夜| 中文字幕熟女人妻在线| 熟妇人妻久久中文字幕3abv| 麻豆av在线久日| 色哟哟哟哟哟哟| av视频在线观看入口| 日本成人三级电影网站| 免费看十八禁软件| 两个人的视频大全免费| 99热6这里只有精品| 美女免费视频网站| 国产精品永久免费网站| 97超视频在线观看视频| 日日摸夜夜添夜夜添小说| 亚洲九九香蕉| 日韩精品中文字幕看吧| 香蕉丝袜av| 亚洲最大成人中文| 亚洲七黄色美女视频| 日韩欧美在线乱码| 长腿黑丝高跟| 真人做人爱边吃奶动态| 国产一区二区在线av高清观看| 成人精品一区二区免费| 少妇裸体淫交视频免费看高清| 亚洲色图av天堂| tocl精华| 人人妻人人澡欧美一区二区| 熟女少妇亚洲综合色aaa.| 丰满人妻一区二区三区视频av | 成人三级做爰电影| 99热只有精品国产| 韩国av一区二区三区四区| 日韩av在线大香蕉| 身体一侧抽搐| 亚洲欧美激情综合另类| 巨乳人妻的诱惑在线观看| 色视频www国产| 在线永久观看黄色视频| 一级毛片女人18水好多| 黄色视频,在线免费观看| 国产伦一二天堂av在线观看| 一个人观看的视频www高清免费观看 | 一个人看的www免费观看视频| 桃红色精品国产亚洲av| 午夜福利在线在线| 日本在线视频免费播放| 长腿黑丝高跟| 国产午夜精品论理片| 日本 欧美在线| 欧美一区二区精品小视频在线| 国产v大片淫在线免费观看| 国产精品免费一区二区三区在线| 国产精品野战在线观看| 亚洲九九香蕉| 免费av不卡在线播放| 亚洲色图 男人天堂 中文字幕| 成人国产一区最新在线观看| 久久草成人影院| 久久天堂一区二区三区四区| 高潮久久久久久久久久久不卡| 国产一区二区三区在线臀色熟女| 一个人看视频在线观看www免费 | 成人性生交大片免费视频hd|