• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Privacy and security federated reference architecture for Internet of Things#

    2023-05-10 03:33:40MusabKAMALImranRASHIDWaseemIQBALMuhammadHaroonSIDDIQUISohaibKHANIjazAHMAD

    Musab KAMAL ,Imran RASHID ,Waseem IQBAL ,Muhammad Haroon SIDDIQUI ,Sohaib KHAN ,Ijaz AHMAD

    1Department of Information Security,National University of Sciences and Technology,Islamabad 44000,Pakistan

    2Faculty of Information Technology,Majan University College,Muscat 112,Oman

    Abstract: Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things (IoT) a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care systems,wearables,connected vehicles,and industries.This has given rise to risks associated with the privacy and security of systems.Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture.To counter these issues,we need to implement privacy and security right from the building blocks of IoT.The IoT architecture has evolved over the years,improving the stack of architecture with new solutions such as scalability,management,interoperability,and extensibility.This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns.In this study,we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards.We propose an architecture,the privacy-federated IoT security reference architecture (PF-IoT-SRA),which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment.It is a step toward the standardization of the domain architecture.We effectively validate our proposed reference architecture using the architecture trade-offanalysis method (ATAM),an industry-recognized scenario-based approach.

    Key words: Architecturally significant requirement (ASR);Architecture trade-offanalysis method (ATAM);Internet architecture board;Internet of Things (IoT);Privacy enhancing technologies;Privacy validation chain

    1 Introduction

    In this technology-driven era in which everything is interconnected with each other,we can communicate despite being separated by thousands of miles.This usually refers to the Internet of Things(IoT)where everything is connected.IoT is a system of smart lightweight devices that consist of embedded processors,sensors,actuators,and communication hardware that intelligently acquire,collect,and send data from their respective environments.These IoT devices share the collected data through the gateway or other edge devices that analyze data on the cloud or locally.These are called smart and intelligent devices because they do all the work without human intervention.IoT has evolved greatly over the years;if we observe the statistics,the number of IoT devices is projected to increase to 75.44 billion in 2025 (Zhou et al.,2019).It was expected that by 2022,the machine-to-machine(M2M)traffic flows would constitute up to 45%of the entire Internet traffic.The market share and economic impact of IoT was expected to be between 2.7 trillion to 6.2 trillion dollars by 2025(Al-Fuqaha et al.,2015).IoT has been the center of attention for quite a while in research and development.It constitutes the platforms that use radio frequency identification(RFID)for the traceability of goods and algorithms for new solutions.It promises to evolve further in the context of cloud computing(CC),big data,networking,and social networks.

    This evolution of things (devices,sensors,and actuators) connected with the Internet has brought up heterogeneity in the ecosystem of IoT,giving rise to security and privacy concerns for the users.IoT devices have become significantly prone to cyber attacks.The Mirai malware affected several vulnerable IoT devices such as printers,Internet protocol(IP) cameras,residential gateway,and baby monitors.The load of this attack was 1.2 terabits per second (Tb/s);experts labeled it to be the largest distributed denial of service(DDoS)attack on record(Frustaci et al.,2018).Not much work has been done on the privacy of users in the IoT ecosystem.Very limited work has been done on the privacy and data security of sensitive sensors and actuators.The sensors store sensitive information about the habits and patterns of the end users,including details such as when they are present at home,when they leave,and when guests arrive.This could also be perceived as a violation of privacy (Psychoula et al.,2019).There remain big questions regarding whether the data of users are being profiled based on identities,where the data are being stored on the cloud,and for what purpose.Psychoula et al.(2018a) described the data-retention-time concerns and privacy concerns for people,especially the younger group.This study highlighted that women care more about privacy than men.Psychoula et al.(2020)introduced a privacy-risk awareness framework to enable privacypreserving data management and suggested integrating privacy into wearable IoT devices.

    IoT devices are gaining ground in smart homes and health care systems.They have been used to address sleep disorders.Fallmann and Chen (2019)highlighted the importance of wearables for sleep monitoring and assessment.Sensors were used in Doppler radar devices and smartwatches to collect data.Dhelim et al.(2021) highlighted the new research area of artificial social intelligence in mental and behavioral disorders.Such applications predict the mental health condition of patients.Chen LM et al.(2012) analyzed smart homes and activities of daily living.Okeyo et al.(2011) presented a novel approach in learning and behavior models.Smart health care and smart homes are the applications of IoT in digital health and assisted living.Vehicular ad hoc networks(VANETs),mission-critical applications,and control systems are also the applications of IoT (Javed et al.,2017).Without the incorporation of privacy,security,and standardization in the IoT architecture,there is a huge risk in the functionality and reliability of such applications.

    To deliver quality products to the consumers in the market,IoT needs a standard architecture.To meet the challenges of IoT,its architecture should be revised.This can be achieved only through a refined reference architecture.Many organizations are working on the building blocks of IoT,following different standard bodies such as the International Organization for Standards (ISO),International Electrotechnical Commission (IEC),Institute of Electrical and Electronics Engineers (IEEE),World Standards Cooperation(WSC),Electronic Product Code Global(EPCglobal),China Electronics Standardization Institute(CESI),and National Institute of Standards and Technology (NIST) (Solapure and Kenchannavar,2016).There is a need to make the standard bodies converge to address the IoT ecosystem as a whole.Standardization leads to interoperability,which enhances the integration and exchange of information between distributed systems (Al-Qaseemi et al.,2016).

    Pan et al.(2022) adopted a federated-learning mechanism,incorporating energy security and information privacy to mitigate the concerns in energy harvesting technology.Energy harvesting has a propitious future in IoT as it helps overcome the vulnerabilities and energy limitations in the context of the limited battery capacity of IoT.They proposed a joint protection framework for both energy security and privacy leakage but limited its application to energy harvesting technology rather than the complete IoT architecture.

    The Internet Architecture Board (IAB) has defined communication models as device to device(D2D),device to cloud,device to gateway,and back-end sharing models.Each model has its way of communication.IoT devices are usually resourceconstrained entities,containing limited processing,power,and storage capabilities.The combination of multi-functional devices and sensors is extremely effective for communication with each other and the Internet.This physical world,using these smart devices,is connected to cyberspace and IoT.These physical objects are equipped with RFID tags,near-field communication(NFC)tags,and electronic bar codes,which can be scanned by smartphones,tablets,and other smart devices integrated with RFID/NFC readers (Kraijak and Tuwanut,2015).The structure of the paper is shown in Fig.1.There is a need for a modular and interoperable architecture that leads us toward a standard architecture for IoT,just like the Open Systems Interconnection(OSI) layered model for network communications.Systemic privacy flaws are found in popular IoT devices from manufacturers such as iHome,Merkury,Momentum,Oco,Practecol,TP-Link,Wyze,and Zmodo.These devices can be purchased from popular retailers such as Walmart,Best Buy,and Amazon(O’Donnell,2019).There is a need to fully develop a privacy-federated IoT security reference architecture(PF-IoT-SRA) that could help develop a standard and facilitate implementation of privacy and security metrics from the root in the architecture of IoT.

    Fig.1 Structure of the paper

    The diverse ways of data generation and utilization of the applications performing data collection,analysis,and prediction,have increased the rate of privacy issues.There must be privacy by design,a framework embedded within the IoT architecture to address all the concerns relevant to it.One of the major building blocks for IoT devices is the wireless sensor network(WSN).It is an ad hoc network that gathers data from the surroundings to deliver to the users.It consists of nodes that can detect,compute,and communicate with the devices.Low-power and lossy networks (LLNs) are used in the IoT network.These are specialized for IoT;however,IoT possesses the constraints of memory,energy,and processing power.Lightweight,encrypted algorithms are used to secure IoT ecosystems.These aspects are not used in conventional wireless networks(Alaba et al.,2017).

    IoT has the potential to transform connectivity at any time to anyone from anywhere.These can connect to real-time environments,process smart and intelligent communication,and make autonomous decisions.IoT has the potential to assist our economies,transportation,environment,and health in a way that we never expected before(Kraijak and Tuwanut,2015).

    This paper focuses on federating detailed privacy and security metrics to the reference architecture of IoT.The following salient points are presented in the paper:

    1.identifying the core requirements for IoT,

    2.breaking down the identified core requirements into quantifiable metrics,

    3.identifying the privacy and security requirements through the standards,

    4.analyzing the existing IoT reference architectures based on the identified metrics,

    5.identifying the shortcomings of the existing IoT reference architectures,

    6.proposing a PF-IoT-SRA,

    7.identifying PF-IoT-SRA’s countermeasures against major IoT threats and attacks,and

    8.validating the proposed PF-IoT-SRA.

    The contribution of this work is the critical analysis of recent IoT architectures on the detailed requirements of IoT and the metrics of privacy and security.The analysis is comprehensive and includes the privacy metrics which none of the previous studies have incorporated.We propose a novel IoT reference architecture that covers all the security and privacy concerns of the stakeholders.This paper identifies the countermeasures against major threats and attacks in the IoT ecosystem.It is a step toward standardization as we validate our proposed architecture through the architecture trade-offanalysis method(ATAM).

    2 Gaps and related works

    A systematic literature review conducted in 2019 highlighted the existing IoT architectures,their evolution from the initial phases of 2008 through 2018,and concerns regarding security and privacy(Alshohoumi et al.,2019).The study compared the evolution of architectures and defined the architectural stack,challenges,the techniques used,and critical issues of security and privacy.The initial architectures conveyed a basic meaning of IoT,which lacked a sound description of its nature.Advanced architectures provide a comprehensive meaning of IoT,explaining the data transmission,collection,processing,and dissemination processes.Therefore,the architecture stack has been improved in addressing challenges such as scalability,interoperability,extensibility,and management.However,none of the evolving IoT architectures addresses the concerns of privacy,which is considered to be a critical factor in IoT sustainability and success.

    Hu et al.(2019) proposed an open IoT architecture with a newly defined concept of softwaredefined device.The concept has been adopted from software-defined networking.They designed a centralized logical controller to manage physical devices and incorporated a software-defined device layer between the network and application layers.Softwarebased control management has been done with the virtualization of device resources.However,this architecture does not incorporate privacy and security metrics.

    There must be a comprehensive architecture model that homogenizes heterogeneity in IoT.Division of the functionality to the elements and data flow is known as a reference model.These requirements are controlled by the reference architecture to form the supersets of functionalities,structures,mechanisms,and protocols.The requirements on which the analysis is done are defined by different consortia and manufacturers.The International Telecommunications Union Telecommunication Standardization Sector(ITU-T)reference model and some areas have been highlighted which need to be addressed in upcoming work (Torkaman and Seyyedi,2016).

    Little work has been done to secure the sensor data after transmission.Hence,there is a need for a privacy-preserving mechanism to protect the data against malicious attacks and unauthorized access.Privacy-aware IoT frameworks will ensurethe privacy and security of data collection,transmission,and usage.Psychoula et al.(2019) proposed a privacy-preserving architecture for IoT which converged to CC.An efficient privacy-preserving deep learning mechanism in a privacy layer was proposed,and physical unclonable functions(PUFs)were used for identity management and authentication.Farha et al.(2021) introduced a PUF-based authentication to access remote devices.The authentication is based on static random access memory PUF.The output of PUF is tested in different environmental conditions.Psychoula et al.(2018a) introduced a new method for privacy preservation and highlighted the lack of research on it using deep learning.Psychoula et al.(2018b) proposed a new encoding technique in ambient assisted living and health care data environments.

    The abrupt development of microelectronic technology has made the size of IoT devices smaller.The size does not have any effect on its functionality as the range of functions is increasing.The increase of functions whereby these devices are interconnected everywhere in the IoT ecosystem has given rise to security and privacy challenges.Yao et al.(2021) introduced a security architecture for IoT,which divides the physical objects into three stages,i.e.,pre-working,in-working,and post-working,to explain complicated security and privacy issues.This work does not incorporate the standard requirements of security and privacy for a secure IoT architecture.

    IoT standardization bodies such as ISO/IEC Special Working Group-5 (SWG5) of the Joint Technical Committee-1 (JTC1) submitted a report on IoT reference architectures and frameworks(ISO/IEC,2014).In this report,a layered IoT reference architecture was proposed by the Korean Study Group(KSG).

    In general,IoT devices have limited computation power and storage capacity,but CC has catered to this limitation by increasing computational power and storage capacity by relying on the sharing of resources.Therefore,the integration of CC and IoT seems to be a promising solution.Pierleoni et al.(2019) compared the performance of three main cloud platforms: Google Cloud Platform (GCP),Amazon Web Services(AWS),and Microsoft Azure.These cloud platforms have integrated CC into reference architectures of IoT.The study did not declare a winner among the three.The strategies applied for the data-driven IoT architecture guide us toward development and complexity and ensure that the IoT solutions remain scalable,robust,and flexible.These strategies enable us to achieve security by design and through the layered architecture approach (Gerber and Kansal,2017).

    The Seventh Framework Program (FP7) research project of the European Union(EU)has reinforced the reference architecture,paving way for the development of a concrete architecture.This reference architecture provides a high-level perspective to construct a solid building block architecture (Bassi et al.,2013).

    In a previous paper (Li and Palanisamy,2019),legal principle support was analyzed to implement privacy enhancing technologies(PETs)at the layer of an IoT architecture model to fulfill the requirements of users interacting with the IoT ecosystem.

    3 Existing reference architectures

    Existing reference architectures possess specific system designs and architectural patterns.Their structural frameworks and functions are highlighted below.

    3.1 Intel

    The reference architecture of Intel is shown in Fig.S1 (see the supplementary materials for Figs.S1–S14).It is a layered architecture (McKinney,2015).

    1.Communications and connectivity layer

    For data ingestion and device control,the Intel IoT reference architecture uses broad protocol normalization and control systems.It uses multiprotocol data communication between the gateways and devices.It uses personal area network (PAN),local area network (LAN),and wide area network(WAN).PAN/LAN usually connects to the edge nodes of the sensors,actuators,devices,control systems,and assets(Iqbal et al.,2020).PANs are more constrained in comparison with LANs in terms of antenna distance and battery life.WAN can be the corporate network for the Internet,fourth/fifthgeneration (4G/5G) mobile networks,or satellite networks.

    2.Data layer with analytics

    This layer provides customer value through data analytics and controlled closed-loop systems.These analytics are distributed across the cloud,gateways,and smart end-point devices.The advantage of this distribution is that it provides flexibility to provide time-critical and computation-intensive applications.

    3.Management layer

    This management layer comprises the managed devices,which consist of a management agent that executes management in the device.It has the main management functionality,which consists of updated applications,operating systems,discover registers,and provision of new devices.It manages data flow,destination,storage policy,uploading of stream data,alarms,notifications,organizations,and user access rights.

    4.Control layer

    This layer separates the management layer into the management and control planes (control objects,policies,and application programming interfaces(APIs)).

    5.Security layer

    The Intel IoT reference architecture provides a security software product portfolio for the developers to deliver interoperable and scalable solutions.This security is implemented at three phase end-points,i.e.,device level,network level,and cloud level.

    3.2 Microsoft Azure

    The Microsoft Azure IoT reference architecture is as shown in Fig.S2.This architecture is based on the cloud-native and microservices.These IoT subsystems must be independently deployed and built as discrete services.This allows greater flexibility in updating the systems and choosing the right technology on a subsystem basis (Microsoft,2018).

    1.Devices,device connectivity,field gateway(edge devices),and cloud gateway

    IoT edge devices are connected through the field gateway.This connection results in edge intelligent capabilities.Raw telemetry and aggregation of data are enabled.Connectivity patterns are direct devices connected to the cloud gateway via the field gateway.This option is very useful for devices that use industry standards such as the constrained application protocol (CoAP).Connectivity via a custom cloud gateway requires some form of custom processing for the devices that need a translation of the protocol.

    2.Data transformation

    It manipulates and aggregates the telemetry stream either before or after it is received by the cloud gateway,i.e.,the IoT hub.This is done by converting the binary stream data to JavaScript Object Notation (JSON).It integrates IoT hub and Azure functions for the translation of the telemetry data before they are received at the IoT hub.

    3.Machine learning

    This subsystem in the architecture is intelligent and learns from data and experience to respond without explicit programming.Predictive maintenance is programmed through machine learning(ML).Azure ML fulfills all such requirements.

    4.User management

    This subsystem allows user management and capabilities,such as command and control,upgrading the firmware,and user application capabilities.

    5.Data flow and stream processing

    Data records go through different stages: storage,routing,analysis,and action/display.Memory caches,temporary queues,and permanent archives included in storage routing involve the dispatching of data records to the end-points for analysis and actions.Analysis puts the data records through certain conditions that can result in different output data.These records are available for display and actions,such as emails,instant messages,incident tickets,customer relationship management (CRM)tasks,and device commands.

    6.User interface and reporting

    User interface (UI) and reporting,no matter whether it be a website,mobile,or desktop application,provides access and visualization for data analysis,discovery through registry,and command and control capabilities.It provides interaction with the live dashboards.

    7.Business system integration

    This layer is responsible for the downstream business such as CRM,enterprise resource planning(ERP),and line of business (LOB) applications.It includes service billing,customer support,dealers,service stations,third-party data sources,and job tracking.

    8.Warm storage and cold storage

    The data should be available in the database(DB) within seconds when they are absorbed into the cloud from the device.Warm storage stores the easily accessible data to the last known state per device.All the data are kept in warm storage with low latency,high throughput,and query capabilities.The cold storage might not be as quick or frequent,but can be very helpful for reporting,analysis,and ML.

    3.3 Mongo database (MongoDB)

    Apart from the DBs,storage,pre-aggregation,and advanced analytics using the aggregation framework,MongoDB plays an essential role in the IoT solution and presents a reference architecture(Mongo,2019)for IoT as shown in Fig.S3.

    1.Edge gateways

    These are high-powered devices based on the same network as the sensors,which also communicate with them.These edge gateways are used for data collection,filtering,offline data storage,and local aggregation.These can also communicate with the backend systems for analytics and data storage.MongoDB realm software development kit (SDK)allows uni-or bi-directional sync between the edge gateway and the MongoDB realm.

    2.Remote management

    It monitors and manages the environment.Nonstructured query language (NoSQL) DB is used for application development and object modeling.The management devices are abreast with the processed events so that the end users can see the alerts on the mobile devices and respond to them in a real-time environment.

    3.Data storage

    Things in IoT generate a huge amount of data,which requires storage for analysis and real-time usage.MongoDB,the best platform for IoT data storage,gives access to both real-time and batch-based workloads against the MongoDB cluster.This bypasses data extract,transform,and load (ETL) for batch analysis.MongoDB Atlas is a service that allows storing archived data in simple storage service(S3)buckets.

    4.Real-time analytics

    It processes high volumes of data connected to the assets in real time.It allows the organization to flag the event and follow up later whenever it is urgent.

    5.Stream analytics and event processing

    Stream analytics performs queries and actions on real-time data.MongoDB can be used as the data source and data destination for streaming platforms such as Apache Spark and MongoDB.MongoDB enables the applications to use event-driven processing to respond to the changes.

    6.Advanced analytics

    This layer prevents system failures.ML,which includes advanced analytics,prevents system failures by predicting the component failure.Apache Spark is a cluster computing system that provides API in Java,Scala,Python,and R.It supports libraries such as MLlib for ML and Graph X and Spark for graph processing and streaming.

    7.Visualizing IoT data

    MongoDB provides custom dashboard as well as third-party platform for visualization.MongoDB charts can visualize complex data,arrays,and subdocuments,providing a visual representation of performance.

    8.Security

    MongoDB Atlas has been incorporated and audited to meet the privacy and compliance standards such as service organization control (SOC) type-2 and privacy shield.This supports authentication mechanisms such as salted challenge response authentication mechanism (SCRAM),X.509 authentication,lightweight directory access protocol(LDAP)proxy,and Kerberos.For access control,it follows role-based access control.For network protection and encryption,it uses and supports transport layer security (TLS)/secure socket layer (SSL) network encryption.

    3.4 IBM

    The reference architecture presented by IBM with the respective cloud components is shown in Fig.S4.This is a three-tier architecture consisting of edge,platform,and enterprise tiers.The edge deals with data collection and transmission.The platform tier deals with analysis,API management,and visualization.The enterprise tier deals with enterprise data,enterprise user directory,and applications(dos Santos et al.,2020).

    1.User layer

    This layer consists of IoT users and end users.IoT users are persons or automated systems that allow user applications to achieve the goal.The end user application is an application that a user uses on smart-phones,tablets,and specialized IoT devices.

    2.Physical entities

    These are the things that are subject to sensor measurement and actuator behaviors.This layer differentiates the entities and devices that sense and act on them.

    3.Device

    The device layer consists of sensors,actuators,firmware,network connection,and UI.This includes an agent that supports the device management protocol that gives remote management capabilities through firmware.

    4.IoT gateway

    The gateway is an essential decoupling element that connects one or more devices with the network and the Internet.The local network allows the devices to communicate with the local IoT gateway.

    5.Peer cloud

    It is a third-party cloud system that provides services to bring data to the IoT platform.These peer clouds can contribute to IoT systems and also provide competence in the IoT architecture.

    6.Edge services

    These include a domain name system (DNS)that translates the uniform resource locator (URL)of the Web resource to the IP address of the system,which can then deliver the resource.

    7.IoT transformation and connectivity

    It enables secure connectivity from IoT devices and routes the high volumes of messages to the right components.The key capabilities in this domain are secure connectivity,scalable messaging,and scalable transformation.

    8.Application logic

    It is an event-based model that includes trigger,action,and rule-based programming of IoT application logic.It controls the workflow.

    9.Analytics

    Discovery and communication patterns in IoT data improve and predict business performance.Cognitive capabilities create intelligent systems,which themselves learn and adapt for augmented human intelligence.Actionable insight drives actions that are used by the business applications stored in the data repositories.

    10.Transformation and connectivity

    It enables secure connections to enterprise systems.It can filter,aggregate,and modify the data as they move among the cloud,IoT,and enterprise systems.It includes enterprise secure connectivity,transformation,and enterprise data connectivity.

    11.Enterprise data

    Enterprise data consist of the metadata about the data and system of record for enterprise applications.This sort of data flows directly to data integration or the repositories providing the feedback loop to the analyzed IoT system.

    12.Enterprise applications

    To address the business goals,enterprise applications consume cloud data and analytics.These consist of customer experience,new business models,financial performance,risk analytics,economics,and operations.

    13.Security

    It addresses the importance of the security layer in the reference architecture.Areas to consider are identity,access management,data protection,security monitoring,analysis,response,system application,and solution life cycle management.

    3.5 Secure and safe IoT(SerIoT)

    SerIoT (Domanska et al.,2018) is a project funded by EU’s Horizon 2020 research and innovation program.The reference architecture presented by SerIoT is followed by the ISO/IEC 30141 standard.The architecture is as shown in Fig.S5.This architecture targets security-driven solutions to address the threats.

    1.Physical entity domain

    This domain consists of the sensed and controlled physical objects in the IoT system.It consists of the physical and virtual entities that are responsible for monitoring,sensing,and controlling.

    2.Sensing and controlling domain

    The sensing and controlling domain(SCD)provides critical information about the environment to other domains in the IoT system through proximity networks that use specialized protocols.

    3.Operations and management domain

    It contains a set of functions that manage,monitor,and optimize systems and their performance in real time.Managers and system operators maintain the health of the system.

    4.Resource and interchange domain

    In terms of resources,the domain interacts with entities,applications,services,and systems.The resources can be physical or monetary.The domain includes the processing of data,including data assurance,quality,transformation,distribution,and storage.

    5.Application service domain

    It consists of business services and service providers.These service providers interact with the users,as well as the sensors and actuators,to gain the data from physical objects.

    6.User domain

    It consists of stakeholders and actors in the IoT system.It can also be an individual,household,society,an organization,or government department.

    3.6 Cisco

    Cisco proposed a seven-layered reference architecture that can lead to standardization worldwide(Cisco,2014).The architecture is as shown in Fig.S6.

    1.Physical devices and controllers

    This layer consists of sensors,devices,machines,and things in IoT.Physical devices and controllers generate data and convert analog data to digital.

    2.Connectivity

    The function of this layer is to transmit the information between the devices and the network,and across or between the networks.

    3.Edge computing

    This layer focuses on high-volume data analysis and transformation.This layer involves data evaluation,formatting,expansion,distillation,and assessment.It also deals with packet and content inspection,threshold,and event generation.

    4.Data accumulation

    This layer captures the data and puts them on rest in the memory or disk.These applications usually access the data when necessary.The event-based data are converted to query-based data for processing.It also reduces the data through filtering.

    5.Data abstraction

    It abstracts the data interface for applications.This layer creates schemas and views of the data according to the application’s needs.It combines the data from multiple sources.To fulfill the client applications,it filters,projects,and reformats the data.It also reconciles differences in data shape,semantics,access control,and security.

    6.Application

    It varies based on device data and business needs.The example of the applications can be ERP or business applications,mobile applications,business intelligence reports,and analytic applications.

    7.Collaboration and processes

    It includes people and processes.People should be able to collaborate and communicate to make use of the information.

    3.7 IoT architectural reference model(ARM)

    The representation of IoT ARM (Bassi et al.,2013)is given in Fig.S7.This proposed architecture in FP7,a research project by the EU,helps us toward the construction of a concrete architecture.

    1.Functional view

    The functional view of IoT ARM is shown in Fig.S8.It consists of nine functional groups and components.

    2.Information view

    The smart objects interact with each other to exchange information among the external entities.Information between the entities is handled and stored to keep track of the life cycle.

    3.Deployment and operation view

    It investigates how components communicate with each other,encompassing quality,requirements,applicability,and architectural tactics.

    3.8 Korean Study Group (KSG)

    KSG has presented this reference architecture for IoT from two view points,i.e.,functional and communication.Six blocks are present in the functional representation of the architecture (ISO/IEC,2014).In Fig.S9,the functional view of the IoT reference architecture proposed by KSG is presented.

    1.Communication viewpoint

    This viewpoint consists of a connection method and interoperability.The connection method consists of IoT devices that are directly connected with the Internet.Due to implementation issues,some are connected through the gateways to avoid such errors even with the ability to connect directly.The other devices communicate indirectly through intermediate nodes.

    2.Functional viewpoint

    It consists of the following blocks:

    (1)Infrastructure.It consists of the basic structure containing hardware,network,and system resources that are necessary for the core operations.

    (2) Core functions.As shown in Fig.S9,this layer contains knowledge,semantics,resource management,connectivity,and network management,integrating security and privacy concerns.

    (3) Application and services support functions.This layer provides an abstraction to the components and their core functions,making it easy for the upper layer.

    (4) Tools.This layer provides tools for the development of new applications.

    (5)Test and deployment.It deals with the testing of the developed IoT system before it becomes available for the users.

    The detailed core function representation of the reference architecture by KSG is shown in Fig.S10.

    3.9 China Communications Standards Association(CCSA)

    The representation of the IoT reference architecture proposed by CCSA (Chen SZ et al.,2014) is shown in Fig.S11.

    1.Sensing layer

    It consists of the sensors,controllers,RFID readers,and location-sensing devices of the network layer.This layer supports modularization,and its components can self-adapt,operate intelligently,and configure by themselves.

    2.Network and service layer

    It consists of the resource administration platform,application and support platform,and backbone network.This layer supports control functions such as access control,authorization,authentication,and mobility.

    3.Application layer

    This layer deals with the modularization of common functions that can be used in the development of applications by the developers.

    3.10 Web Services Oxygenated (WSO2)

    The reference architecture of the IoT presented by WSO2,shown in Fig.S12,consists of five horizontal and two vertical layers.The cross-cutting vertical layers consist of the device manager,identity,and access management(Fremantle,2015).

    1.Device layer

    The device layer consists of the devices that can communicate with the Internet with a direct (Arduino with Arduino Ethernet,Raspberry pi-WiFi)or indirect (ZigBee through the gateway or Bluetooth connection through a mobile phone) connection.This architecture suggests having a unique,unmodifiable identifier,as well as Open Authorization 2.0 (OAuth2) Refresh and Bearer token,stored in electrically erasable programmable read-only memory(EEPROM).

    2.Communications layer

    This layer manages the connectivity of IoT devices.The most commonly used protocols for communication are the hypertext transfer protocol/hypertext transfer protocol secure (HTTP/HTTPS),message queuing telemetry transport(MQTT 3.1/3.11),and constrained application protocol(CoAP).

    3.Aggregation/bus layer

    It incorporates legacy protocols and correlates and maps the device identity (ID) to the user’s ID.This layer incorporates the policy enforcement point(pep) for policy-based access.

    4.Event processing and analytics layer

    This layer processes events taken from the bus layer and stores data in the DB.It also performs analytics on the data coming from the aggregation layer.

    5.Client/external communication layer

    This layer uses all the functionalities such as Web-based portals,to communicate with the devices,dashboards,and APIs that need to communicate with the systems outside the network.

    6.Device management

    This layer communicates with the devices through protocols and gives control of devices at both individual and bulk levels.It works with the identity and access management layer and maintains the identities of the devices to map them to their users.

    7.Identity and access management

    This layer provides services such as OAuth2 token issuing and validation,identity services such as security assertion markup language-2(SAML2),single sign-on (SSO),OpenID,and LDAP,policy management,and access control.

    3.11 Google

    GCP possesses tools to connect,store,process,and analyze data both at the edge and in the cloud.It has three essential components: device,gateway,and cloud(dos Santos et al.,2020).In this reference architecture,the device can be hardware or software and can connect directly or indirectly to the Internet.The reference architecture is shown in Fig.S13.The services of the gateway are for devices that are not directly connected to the Internet for cloud services.The gateway processes the data on behalf of a group of devices.The data are collected by the devices and sent to the cloud platform through the gateway.The data are transmitted to the cloud IoT core.The devices that are using the MQTT protocol send the data to the same global end-point regardless of the source region or location.The data are sent to the cloud publish/subscribe (Pub/Sub) after being received through the cloud IoT core.The data processed through the cloud IoT core or from the cloud Pub/Sub,message queue,and event broker can take several different paths.The cloud ML engine anonymizes the data stored on Google cloud storage.Control configuration in the Google IoT reference architecture allows the data to be sent back to IoT devices by the cloud IoT core.

    This reference architecture incorporates edge computing with rapid response,thus reducing latency and the number of round trips.Unconstrained by connectivity limitations,edge devices locally store and process the data to maintain reliability in the operations.

    The cost of network bandwidth,data storage,and computational power can hinder the deployment of solutions by the customers.The use of edge computing can help businesses spread the computational load to the cloud and edge devices for costeffectiveness and good return on investment(ROI).

    The cloud IoT core in the context of Google cloud consists of subsystems,i.e.,protocol bridge and device manager.The data are transmitted to the cloud IoT core using TLS and protocol bridge using secure MQTT port and HTTP/S port.

    3.12 AWS

    The IoT reference architecture presented by AWS (dos Santos et al.,2020) is shown in Fig.S14.This architecture provides secure bidirectional communication between the Internet and the devices.

    1.Device gateway

    This layer helps the devices securely and effi-ciently communicate with AWS IoT.

    2.Message broker

    The communication between the devices and AWS IoT is usually done by a message broker that distributes data to the devices and core AWS services.

    3.Device shadow

    This layer maintains the states of online or offline devices.The applications should communicate with the devices.The data are maintained for the connected applications when offline and are synchronized back to their states when online to the device shadow service.

    4.Rule engine

    For storage and processing,the data are transferred from the message broker to AWS services through the rule engine.The expressions defined in the rule engine can be used to update,insert,or query a DynamoDB table.

    5.Security and identity

    The communication is secured by X.509 certificates for authentication.The credentials should be secured.Both the message broker and rule engine use the AWS security and identity layer to send the data securely to the devices and AWS services.The core IoT rule engine can connect to the following AWS services:

    (1) Amazon DynamoDB.This is a scalable and NoSQL DB service that gives us good and predictable DB performance.

    (2) Amazon Kinesis.It collects,processes,and analyzes the streaming data to know the new information.This layer uses audio,video,and application logs for ML,data analytics,and applications.

    (3)AWS Lambda.This executes the code without servers.The mobile application and Web can be used to directly execute the code from AWS IoT data automatically.

    (4) Amazon simple storage service (S3).In Amazon S3,the data can be stored and retrieved anytime from anywhere through the Web.These data can also be sent for storage purposes.

    (5) Amazon simple notification service (SNS).Amazon SNS is a Web service that enables applications,users,and devices to send information to and receive information from the cloud.

    (6)Amazon simple queue service(SQS).This is a message queuing service used to decouple and scale services,distributed systems,and applications.

    4 Quantified requirements and analysis

    4.1 Quantified requirements

    There are some specific and unique requirements of the IoT network,which need to be met while designing an IoT network.Reference architectures have been analyzed based on the requirements quantified through the standards.Twenty-two requirements with metrics have been identified.These are divided into two categories,i.e.,functional and nonfunctional requirements.The functional requirements are further expanded into metrics.This is done to extract a tangible meaning out of the requirements and make its deployment to the network easy.It must adhere to the nonfunctional requirements.The quantifiable metrics are shown in Fig.2.

    Fig.2 Quantifiable metrics (API,application programming interface)

    4.2 Analysis of IoT reference architectures

    We have analyzed 12 reference IoT architectures based on the quantifiable requirements and metrics.We have extracted these requirements from the standards.We have evaluated,through detailed literature study,whether a reference architecture from a particular vendor or organization addresses that particular metric.The analysis is shown in Table 1.Through this analysis,we have identified the shortcomings of the reference architectures and identified the metrics that have been excluded from a particular reference architecture.The following requirements are absent in most of the reference architectures analyzed.

    Table 1 Analysis of existing IoT reference architectures

    1.Device integrity

    The reference architecture of the IoT proposed by various organizations,research projects,and vendors must incorporate the integrity of the devices,so that the data cannot be altered or destroyed by unauthorized users.The integrity of data is very important for the reliability of IoT systems.Data of IoT applications must not be altered through any sort of malicious activity,and the reference architectures must support such a requirement in IoT systems.This ensures the security of the system.

    2.Encryption

    To improve the security of IoT systems,encryption algorithms and techniques could be applied and analyzed,no matter whether the mechanism is present in the architecture or not.The storage and communication of the data must be encrypted,with private data communication in the form of hidden data routing.Encryption encodes a message from the sender to the intended recipient.No user other than the intended user can read it.It consists of a secret key or password that allows the user to decrypt the message.

    3.Security audit

    The analysis indicates the lack of auditing mechanisms adopted by IoT reference architectures.Most of the architectures do not audit the security mechanisms implemented or conform to the information security standards.The data access,processing,and storage must have a proper purpose defined under the laws and regulations.The vulnerabilities get exposed in the form of cyber attacks such as DDoS and eavesdropping in IoT systems.These devices,when hacked or exposed,can be used as a helping hand to disrupt the services of the server.The IoT architecture must incorporate security audit.

    4.Intelligent network communication

    IoT devices must be intelligent in communication,and the architecture must include this particular metric,but our analysis indicates that most of the reference architectures lack this particular metric.Intelligent,autonomic,and redundant networking is required to possess the capabilities of selfhealing,self-rectification,and self-selection of the path and direction of traffic.Path selection redundancy and routing of content-aware communication are required.Network flow analytics helps us come up with better efficiency and results,without any delay in communication.Congestion in network traffic can be avoided through this intelligent network communication.

    5.Risk management

    IoT devices have vulnerabilities and can be exposed to cyber attacks;e.g.,a car that consists of sensors can be compromised and involved in a lethal accident.The risks can be calculated and avoided through risk management to counter vulnerabilities in the IoT system.

    6.Support for legacy components

    Outdated components need support in IoT systems,along with the updated technologies.The analysis shows a deficiency in the support of such components in the IoT reference architecture.The integration of updated and legacy components is beneficial for systems.It is good to come up with new components without completely abandoning legacy devices.

    7.Data validation

    Integrity is one of the major concerns in terms of security.Tampering of the data must be avoided as it affects the reliability and functionality of the system.Data validation must be incorporated in the IoT building block.Without validation,the data can be corrupted or tampered,affecting the efficiency of the system.

    8.Virtual storage and processing

    Large numbers of things in IoT systems collect and process a large amount of data.However,IoT devices are resource-constrained due to low power and processing capability.Since big data analytics is an essential component of an IoT reference architecture,overcoming such constraints and integrating big data require CC support in the form of virtual storage and processing.

    9.Service tracking

    Services such as mobility,autonomy,management,and discovery are important to be incorporated in IoT systems.The awareness of time,context,content,and location is essential for mobile services.The services must start automatically on the expiry of one service and also warn the user before its expiry.The services must start without human intervention and must not be required to start only through human command and control.

    10.Privacy

    Privacy of users is one of the important aspects with regard to the nature of IoT.Protection of the privacy of users must be guaranteed.As privacy is a basic right of an individual,the identities of users must not be traced back to them.Information related to them must be stored and processed under the defined purpose.These privacy principles must be applied in data collection,storage,and processing.Data anonymization and minimization techniques must be incorporated in the privacy-federated reference architecture.Authentication,encryption,access control,and authorization must also be included in the protection of users’ privacy.Privacy can be achieved through confidentiality.To prevent the leakage of data,privacy requirements must be applied for data removal,requisition,and encryption.

    11.Geolocation privacy

    The geolocation of the user can be traced through user identities.The data must be concealed,as this type of information can be used for illegal purposes.The analysis highlights that most of the reference architectures do not value the privacy of users in terms of their geolocation.Data must not be profiled based on geolocation.

    12.Digital footprint privacy

    Digital footprint privacy promotes the use of privacy settings and private data communication.IoT devices are connected to the Internet all the time.Such a scenario can lead to vulnerabilities as the devices are continuously exposed to cyber attacks.Data can be traced through devices that must be secured through effective lightweight security protocols to prevent the gathering of digital footprints of the devices and their owners.Surveillance of linking accounts and private data communication,including encrypted data communication and hidden data routing,must be embedded in digital footprint privacy.

    13.Query privacy

    By tracking the IP address,search queries can reveal the identity of the user.Search query privacy is supposed to answer high-level data instead of raw data.Giving raw data can lead to privacy violations of users due to its secondary usage.Search query can overcome raw data through open personal data store(PDS).It gives a high-level answer to the queries instead of raw data,protecting the privacy of end users.Through analysis,we can block repeated queries that can lead to a malicious activity that discloses the data from users.

    14.Privacy accountability

    The data controller is responsible for the accountability of privacy in an IoT system through data collection,by defining the purpose of data collection,limiting the required data,and data dissemination.Only required data must be collected,with no trade-offs that can compromise the privacy of users.Access controls should be defined in the form of access control list (ACL) and a digital certificate.Privacy impact assessment can be done through privacy safety data sheets (SDSs) and privacy control record (PCR).The analysis shows that none of the reference architectures of IoT incorporate privacy accountability.

    15.Data privacy

    Data privacy must be embedded in the form of data subjects,collection,storage,minimization,anonymization,and processing.In privacy design,the data provider manages privacy.

    5 PF-IoT-SRA framework

    5.1 Proposed reference architecture

    In this work,we propose a novel PF-IoT-SRA framework that is secured from the risks associated with IoT in terms of privacy and security.It consists of a dedicated,separate layer for privacy,with metrics that are not incorporated in previous works.The architecture,i.e.,a modular and interoperable reference architecture of IoT,covers some new features at both individual and system levels.It consists of nine horizontal and two vertical layers,along with a layer that addresses the nonfunctional requirements of IoT.The new features are implemented based on the standards and shortcomings identified in the analysis of existing reference architectures.These features are described below in their respective layers.Each layer is interrelated and addresses specific metrics and functionality.It is a step toward a standard architecture as we incorporate a combined list of standards including ISO/IEC,ITUT,and NIST.The proposed architecture is shown in Fig.3.

    Fig.3 Proposed reference architecture (API,application programming interface;LPWAN,low-power wide area network)

    1.Device layer

    Edge gateway and autonomy are embedded as new features in the first layer.The devices have their unique identification and are autonomous.In case of malfunction and errors,these devices are able to configure and rectify themselves without human intervention.Rectification is done in the real-time environment supporting dynamic adaptation.Protocols used for unique identification are electronic product code (EPC),ubiquitous code (uCode),IP version 6(IPv6),and uniform resource identifier (URI).This layer supports the edge gateway,present on the same layer with sensors and actuators.These are highpowered devices capable of initial data collection,filtering,local aggregation,analysis,and offline data storage.

    2.Network/connectivity layer

    The network/connectivity layer incorporates a new feature of CC.It is a serverless platform and can support many connected devices.The dispersed data of many IoT devices can be converted to the cloud IoT platform.It contains a computer network,a mobile communication network,a low-power WAN,and a CC.This layer helps in connectivity of the things with the network using connectivity protocols.The computer network uses a wired or wireless medium for connectivity,which contains the protocols shown in Table 2.

    3.Transport/communication layer

    Private communication and error control communication are the new features added in the third layer,which incorporates backend data sharing from the devices.Automatic communication modes are required between users and devices.Error control is important to handle the interference with the devices regarding communication and to minimize errors.Private communication helps prevent cyber attacks through encryption.The protocols for communication are shown in Table 3.

    Table 2 Protocols

    Table 3 Communication protocols

    4.Data transformation layer

    Virtual storage and virtual processing are the new features introduced in the proposed architecture.The fourth layer transforms data for the upper layers through data assessment,data reduction,data decoding,data formatting,data distillation,and data evaluation.The data are evaluated and checked regarding whether they are in a suitable format for the upper layer.It handles a large amount of data;therefore,virtual storage and processing are also embedded.Big data are managed through virtual storage and processing.

    5.Advanced analytics layer

    Location awareness is embedded as a new feature in the fifth layer.ML and artificial intelligence algorithms are applied to the data collected from the below layers to obtain the best results from the upcoming data.This includes big data analysis,content awareness,knowledge management,time awareness,and location awareness.Advanced analytics can be achieved through knowledge management,which consists of information gathering and intelligent learning.This incorporates deep business insights to predict the failure of a component through analytics.

    6.Management layer

    The new features of promptitude and legacy component management are incorporated in the sixth layer.After the advanced analytics layer,data will go to the management layer,which provides management services including risk management through asset categorization and risk value.Fog computing,promptitude,service management,session management,communication management,and identity management are included.

    7.Service layer

    Semantic service is incorporated as a new feature in layer 7.It is responsible for service resolution,composition,tracking,mobility,autonomy,discovery,and semantic service.Multicast domain name system (mDNS),universal plug and play (UPnP),physical Web,and HyperCat are some protocols used in service discovery.

    8.Application layer

    It incorporates smart services for users and application management as new features.Smart services are in the form of applications for the users.The management of the applications is also done in this layer.

    9.Business layer

    Executive reports and business strategies are new features incorporated in this layer.It provides business insights of an IoT system through graphs,flowcharts,and executive reports for the top management.These reports play a vital role in development.Strategies are also developed to capture the market.The business layer carries the profit models for the system.

    10.Privacy layer

    Previous works focus on assisting users with mobile application permissions,protecting data and privacy-aware video streaming.Our goal is to design an architecture that will allow the users to store and manage data according to the level of privacy they want,trading the data for services rather than allowing the individuals to view,control,and disclose their data.

    Privacy of users can be ensured through the integration of privacy by design metrics to the reference architecture of IoT.This includes the privacy validation chain (PVC),which acts among the data owner,data controller,and data processor to define the purpose of the usage of user data.This acts between the data provider and data controller,which manage and assess privacy protection,respectively.Privacy-enhancing technologies (PETs) enhance the privacy of the system.PVC answers the most important question about who is collecting the data and under what defined purpose.User authorization is required according to the predefined security policies to access IoT,followed by ACL and digital certificates.

    (1) Data anonymization.This technique can remove personally identifiable information before it is used by IoT applications.It leads the data to be anonymous.This reduces the risk of identification of personal information and privacy violations.It can include the secret key encryption mechanism andkanonymity with a large value ofk,which exploits quasi-identifier attributes to preserve sensitive data.Strong identities without unique identifiers in the DB can lead to protection of privacy for the users.

    (2)Data storage.To ensure minimum data storage,raw data must be deleted after deriving secondary contexts.Privacy can be enhanced by preventing the storage of long-term personal characteristics.It includes distributed data storage,limiting storage data and defining legal needs to store the user’s data,purpose of storage,and encrypted data storage.

    (3)Data processing.The processing of the data must be distributed and encrypted to prevent data tampering by malicious attacks.Encryption is the encoding of data in such a way that only authorized users can read the data.Those who are processing the data must not be allowed to read the data.

    (4) Data minimization.It incorporates minimum knowledge discovery.Discovering the data is needed to achieve the primary objectives of an IoT application.However,the remainder of the detailed information must not be collected.Minimizing raw data intake will prevent privacy violation through secondary usage of the data.Since a long retention period can enhance the chance of malicious activity,which may breach the privacy of the user,minimization of the data retention period is an effective approach.

    (5) Reduced data granularity.IoT technologies should implement a lower level of granularity because if a higher level is implemented,fine-grained data and information will result in high privacy risk.

    (6)Data controller.Data subjects must be controlled through a mechanism.The data controller is accountable for the protection of privacy,including privacy auditing through systematic checking of the logs and procedures.

    11.Security layer

    It incorporates the new features of runtime verification,malware detection,and security audit.It consists of lightweight authentication mechanisms with communication and data security.Security audits should be done in the form of fair,clearly informed,and transparent data access.Data access must abide by laws and regulations.This layer performs runtime verification,malware detection,and data encryption.Lightweight data security protocols are shown in Table 4.

    Table 4 Lightweight data security protocols

    12.Nonfunctional requirements

    This layer incorporates high availability,adaptability,accessibility,manageability,reliability,scalability,interoperability,and compliance as nonfunctional requirements.

    5.2 Threats and attacks on the IoT architecture

    We know that IoT-based systems are vulnerable to various types of attacks.Fig.4 shows the threats and attacks in the IoT communication environment,along with their countermeasures,as present in our proposed architecture(PF-IoT-SRA).This identifies which layer and metric will prevent these threats and attacks(Karale,2021).

    Fig.4 Threats and attacks on the IoT architecture (DDoS,distributed denial of service)

    1.Replay attack

    It is a network attack in which attackers analyze the traffic and use it for their own benefit (Chen KJ et al.,2018).The proposed architecture has the security layer with data encryption embedded to counter such a type of attack.

    2.Sybil attack

    It is a network attack in which the attacker creates a bottleneck to decrease the performance of devices.Our proposed architecture has the security layer with a data encryption metric to prevent such attacks.

    3.Injection attack

    This attack injects a malicious code into the sensors and the network.To prevent such attacks,our proposed architecture possesses a security layer with a secure protocol metric.

    4.Buffer overflow

    It is a type of software-coding vulnerability that an attacker exploits.We can prevent such attacks by auditing the code.The proposed architecture possesses a security audit metric in the security layer to counter it.

    5.Man-in-the-middle attack

    It is a real-time network attack in which an attacker disguises himself/herself as a legitimate user.Our proposed architecture possesses a communication security and data encryption metric in the security layer to counter this attack.

    6.Phishing attack

    It is an application layer attack in which an attacker sends fraudulent messages to trick the user into revealing sensitive information.Our proposed architecture possesses an authentication metric embedded in the security layer to counter such an attack.

    7.DDoS attack

    It blocks the access of application for legitimate users through flooding.Our proposed architecture has communication security integrated in the security layer to counter this attack (Frustaci et al.,2018).

    8.Side channel attack

    This type of attack does not rely on the vulnerabilities of a system;rather,its attacks originate from system implementation.The data security metric in the security layer can prevent such attacks.

    9.Eavesdropping

    It is a type of attack in which an attacker listens,interprets,and reads the user’s communication.Communication security and data encryption metrics in the security layer can counter this type of attack.

    10.Malicious scripts

    This type of attack exploits the vulnerabilities in a system.It is a software attack that modifies the code.Our proposed architecture has a runtime verification and malware detection metric embedded in the security layer to counter such an attack.

    11.Trojan virus

    It is a software attack in which an attacker steals data by disguising as a legitimate program.A runtime verification and malware detection metric in the security layer can counter such an attack.

    12.Information tampering

    This attack manipulates and destroys data.Secure protocols embedded in the security layer can counter information tampering.

    13.Theft identification

    It is a privacy breach threat that steals personal information.Our proposed architecture has identity privacy and authorization metrics in the privacy layer to counter it.

    14.Linkage

    Data linkage identifies records and data belonging to the same person.It is a privacy breach threat,and we have identity privacy and data anonymization metrics in the privacy layer to counter this privacy threat.

    15.Location-based personalization

    This privacy threat associates an identifier with the user and records the user’s location.It is a privacy threat,and our proposed architecture has geolocation integrated in the privacy layer to prevent such threats.

    16.Sniffing

    It is a network attack that captures network traffic using packet sniffers.Our proposed architecture possesses communication security and data encryption in the security layer to counter it.

    17.Weak authentication/authorization

    The attacker accesses the system with brute force attack and uses default passwords against weak authentication.Our proposed architecture has authentication and authorization metrics in the security and privacy layers,respectively,to counter it.

    18.Impersonation

    The attacker impersonates a legitimate user to gain sensitive information.Our proposed architecture has authorization and identity privacy metrics in the privacy layer to counter it.

    6 Validation

    To validate the proposed PF-IoT-SRA,we have followed the industry-recognized scenario-based approach.Researchers have termed this approach better,in comparison to the questionnaire-driven and decision-based approaches.We have adopted ATAM to validate the proposed architecture.This method provides us insight into how the quality goals interact with each other and how they can trade-offeach other.ATAM is the leading methodology to evaluate and validate architectures.This methodology consists of the following steps.

    6.1 Presenting ATAM

    ATAM evaluation can identify and expose the risks that inhibit the achievement of an organization’s business goals.It is a scenario-based approach in which the proposed reference architecture is evaluated and validated through quality attributes in brainstormed scenarios.It evaluates whether an architecture meets the functional requirements addressed in the standards of NIST,ISO/IEC,and ITU-T.This results in the identification of the tradeoffs,sensitivity points,and risks associated with the architecture.

    6.2 Business drivers

    The following are the business drivers for IoT:(1) revenue and innovation,large investments on IoT,(2) low cost of sensors and shift from traditional to smart sensors,which have contributed to the growth of IoT businesses,(3) better customer service and support,and improved customer experience,(4) high mobile adaptation ratio,(5)product service improvement and innovation,(6)supply chain and logistics,(7) new consumer demands,(8)diverse and expanded Internet connectivity,and(9)asset tracking,utilization,and inventory management.

    However,despite business growth,problems relevant to implementation and security may also arise.Therefore,it is crucial to identify how we can deploy the IoT architecture to connected devices and services.Lack of standardization is also a major factor that can hinder business growth.

    6.3 Presenting the architecture

    The architecture is presented in Section 5.

    6.4 Identifying architectural approaches

    PF-IoT-SRA is a layered,scalable,secure,and flexible architecture that has no restrictions in terms of numbers and types of layers.It consists of nine horizontal and two vertical layers,along with a layer with nonfunctional requirements.We have followed the ITU-T Y.2066 and ISO/IEC 30141 standards for the proposed IoT reference architecture.The other standards are ITU-T Y.2060 and NIST,but these focus on the device and physical object communication.They do not completely address the end-to-end IoT systems reference architecture model.ISO/IEC 30141 elaborates more on the system architecture of IoT in terms of the conceptual,system,domain,network,functional,and cross-sectional service views of the ecosystem.It is a modular and scalable architecture that provides an understanding of the key aspects of an IoT architecture.Two vertical layers integrate the security and privacy concerns of end users.The metrics embedded are incorporated through the requirements defined in standards.

    6.5 Quality attribute utility tree

    The utility tree identifies the quality attributes needed to achieve the most important quality goals in the architecture and validates the architecture based on the requirements.This follows the topdown approach.The quality factors that determine system utility are performance,usability,reliability,installing ability,functionality,security,portability,and privacy.In the next level,there are refinements of the quality attributes,specified down to the scenarios,which are also called the leaves of the trees.The architecturally significant requirement(ASR),provided by business drivers for the quality attributes,has been mapped in the quality attribute tree.

    Scenarios are generated through brainstorming events in real-time scenarios.Day-to-day usage of IoT applications and utilization of the proposed reference architecture metrics can generate the scenarios for validation.We have then validated,through mapping,whether the proposed architecture’s significant metrics meet the defined quality attributes and their refinements.The utility tree along with the scenarios is shown in Fig.5 in accordance with the quality attributes.

    Fig.5 Quality attribute utility tree

    6.6 Brainstormed and prioritized scenarios

    Based on the scenarios generated in the utility tree,a larger set of scenarios is elicited from stakeholders.These real-time scenarios are prioritized by stakeholders,using the ASR collected previously.The characterization and prioritization of the quality attribute indicate the success of the system,and difficulty in achieving it can be the architect’s assessment.This will be prioritized as high,medium,and low.The scenarios and their priorities are described in Table 5.

    6.7 Analyzing architectural approaches

    We map the brainstormed scenarios in the quality attribute tree to see whether the architecture responds to the stimulus of the scenario.End user input sends a stimulus about the failure of a particular system.The environment is the mode or state of the system while receiving a stimulus.It could be starting up the system,shutting down the system,recovering from a failure,or normal operations.This will identify the risks,sensitivity points,and trade-offs.The architecture’s decisions are specified.Through mapping,we evaluate our proposed reference architecture regarding whether it responds against a particular stimulus in the prioritized scenarios.We also evaluate the architecture against quality goals.

    Table 6 evaluates scenario 1.The success of the system is high,and the difficulty in achieving it is medium.To validate the architecture in terms of decision-making capability in a particular scenario,we generate a stimulus in normal operating conditions to evaluate the response and architecture decision.In this scenario,we evaluate the functionality of our proposed architecture and the trade-offthat can be made.

    Table 7 evaluates scenario 2.The success of the system is high,and the difficulty in achieving it is medium.The quality attribute evaluated is reliability under normal operating conditions.We generate a stimulus about the failure of the system to check what will be the decision of our proposed architecture to handle the failed state of the system.

    Table 8 evaluates scenario 3.The success of the system is medium,and the difficulty in achieving it is medium.A scenario is generated to evaluate the usability attribute while starting up the system.We check the architecture’s decision in a particular stimulus,i.e.,failure of the system.

    Table 9 evaluates scenario 4.The success of the system is high,and the difficulty in achieving it is high.The system is recovering from a failure,and the quality attributes addressed are security and availability.The scenario addresses whether the system has the response to the state of the system and which particular metric addresses the response to the stimulus.

    Table 10 evaluates scenario 5.The success of the system is medium,and the difficulty in achieving it is low.The quality attribute evaluated in this scenario is the performance of the system in extreme working conditions.The risk attached to this scenario is thatit can affect the goodwill of the consumers and halt the sales.

    Table 5 Brainstormed scenarios and their priorities

    Table 6 Scenario 1

    Table 11 evaluates scenario 6.The success of the system is medium,and the difficulty in achievingit is high.The quality attribute evaluated in this scenario is privacy under normal operating conditions.The architecture proposed should mitigate the risk associated with the specific scenario.

    Table 7 Scenario 2

    Table 8 Scenario 3

    Table 9 Scenario 4

    Table 10 Scenario 5

    Table 12 evaluates scenario 7.The success of the system is medium,and the difficulty in achieving it is low.This scenario evaluates the portability quality attribute from the utility tree.The response of the system identifies the architecture decision.

    Table 13 evaluates scenario 8.The success of the system is high,and the difficulty in achieving it is medium.The installing ability attribute is evaluated in terms of whether it is achieved or not and which layer or particular metric responds to the system.

    Table 11 Scenario 6

    Table 12 Scenario 7

    Table 13 Scenario 8

    6.8 Presenting the results

    ATAM gives us the trade-offs,sensitivity points,and risks associated with the proposed IoT reference architecture.It gives us a clear sight of how the reference architecture should perform under the brainstormed real-time scenarios.We generate the stimulus in brainstormed scenarios of the failures of the system,evaluate and map it with our proposed architecture.It has been derived that the architecture addresses and responds to a particular stimulus in the given environment.The trade-offs provide insight into which quality attribute could be given up to gain the other.The achievement of the quality goals and attributes refines,evaluates,and validates the proposed reference architecture.

    7 Conclusions and future work

    IoT has made our world smarter through communication between objects and humans.In the form of its applications such as smart devices and technologies,it has found its path in our daily lives.However,there are different standardization bodies for IoT,which have not embedded privacy metrics,and IoT still lacks a standard architecture.In this study,we have identified the core requirements from the standards and thereafter federated privacy and security to the reference architecture of IoT.Based on these requirements and metrics,we have analyzed 12 existing reference architectures.We have identified their shortcomings and proposed PF-IoT-SRA,which will help make a concrete and standard architecture.PF-IoT-SRA will counter major threats and attacks in IoT communication and address allthe concerns for the domain system and functional point of view.We have validated our proposed reference architecture through an industry-recognized scenario-based technique known as ATAM,which will support the proposed reference architecture from a business perspective.

    The IoT ecosystem can face security and privacy challenges.For future work,we recommend studying each layer in detail to identify which protocol mix is the best to optimize the IoT network.We recommend proposing PETs to be embedded within smart IoT devices,incorporating all the metrics in the privacy layer.Considering the resource-constrained environment of IoT,lightweight protocols should be introduced,and the IoT network should be optimized in federation to privacy and security.Complex encryption and authentication algorithms consisting of less latency and fewer computing resources on tiny IoT devices could be a great breakthrough in the future.We recommend coming up with a lightweight trust management system to address hardware insecurities of IoT devices.

    Contributors

    Musab KAMAL and Imran RASHID initiated the idea.Musab KAMAL,Imran RASHID,and Waseem IQBAL drafted the paper.Muhammad Haroon SIDDIQUI,Sohaib KHAN,and Ijaz AHMAD revised and finalized the paper.

    Compliance with ethics guidelines

    Musab KAMAL,Imran RASHID,Waseem IQBAL,Muhammad Haroon SIDDIQUI,Sohaib KHAN,and Ijaz AHMAD declare that they have no conflict of interest.

    List of supplementary materials

    Fig.S1 Intel IoT reference architecture

    Fig.S2 Microsoft Azure IoT reference architecture

    Fig.S3 MongoDB IoT reference architecture

    Fig.S4 IBM IoT reference architecture

    Fig.S5 SerIoT reference architecture

    Fig.S6 Cisco IoT reference architecture

    Fig.S7 IoT ARM view

    Fig.S8 IoT ARM functional view

    Fig.S9 KSG IoT reference architecture

    Fig.S10 KSG detailed core functions

    Fig.S11 CCSA IoT reference architecture

    Fig.S12 WSO2 IoT reference architecture

    Fig.S13 Google IoT reference architecture

    Fig.S14 AWS IoT reference architecture

    看黄色毛片网站| av福利片在线观看| 亚洲精品日韩av片在线观看| 色哟哟·www| 高清毛片免费观看视频网站| 日本在线视频免费播放| 看免费成人av毛片| 精品国产三级普通话版| 天美传媒精品一区二区| 干丝袜人妻中文字幕| 成人午夜精彩视频在线观看| 亚洲中文字幕一区二区三区有码在线看| 亚洲精品日韩av片在线观看| 丝袜美腿在线中文| 尤物成人国产欧美一区二区三区| 伦理电影大哥的女人| 国产精品福利在线免费观看| 国产精品精品国产色婷婷| 成人av在线播放网站| 老女人水多毛片| 白带黄色成豆腐渣| 久久精品夜夜夜夜夜久久蜜豆| 青青草视频在线视频观看| 国产中年淑女户外野战色| 免费观看精品视频网站| 男女啪啪激烈高潮av片| 久久久精品欧美日韩精品| 国产亚洲精品久久久com| 久久久久久久久久久丰满| 99久久九九国产精品国产免费| 91aial.com中文字幕在线观看| 91久久精品国产一区二区三区| 午夜爱爱视频在线播放| 联通29元200g的流量卡| 欧美+亚洲+日韩+国产| 国产成人福利小说| 久久精品国产亚洲网站| 欧美+日韩+精品| 人人妻人人澡欧美一区二区| 91在线精品国自产拍蜜月| 免费看av在线观看网站| 国产精品一区二区三区四区免费观看| 亚洲欧洲国产日韩| 一本久久中文字幕| 亚洲丝袜综合中文字幕| 人人妻人人澡欧美一区二区| av视频在线观看入口| 嘟嘟电影网在线观看| 内射极品少妇av片p| 免费看a级黄色片| 最近视频中文字幕2019在线8| 国产成人aa在线观看| 成人欧美大片| 村上凉子中文字幕在线| 99国产精品一区二区蜜桃av| 九九爱精品视频在线观看| 国产白丝娇喘喷水9色精品| 18禁黄网站禁片免费观看直播| 日本免费a在线| 成年免费大片在线观看| 欧美人与善性xxx| 1000部很黄的大片| 亚洲欧美精品专区久久| 精华霜和精华液先用哪个| www.色视频.com| 成年女人永久免费观看视频| 国产日本99.免费观看| 看黄色毛片网站| 此物有八面人人有两片| 青青草视频在线视频观看| 国产精品伦人一区二区| 老熟妇乱子伦视频在线观看| 国产蜜桃级精品一区二区三区| 免费搜索国产男女视频| 精品久久久久久久久久免费视频| 亚洲精品自拍成人| 综合色丁香网| 日本三级黄在线观看| 婷婷精品国产亚洲av| 久久久成人免费电影| 好男人视频免费观看在线| 在线播放国产精品三级| 九九在线视频观看精品| 国国产精品蜜臀av免费| 在线免费观看不下载黄p国产| 成人午夜精彩视频在线观看| 少妇人妻一区二区三区视频| 欧美日韩乱码在线| 日本在线视频免费播放| 男的添女的下面高潮视频| 国产精品日韩av在线免费观看| 国产美女午夜福利| 久久久久国产网址| 久久国产乱子免费精品| 国产成人a∨麻豆精品| 色尼玛亚洲综合影院| 一个人看视频在线观看www免费| 91av网一区二区| 99国产精品一区二区蜜桃av| 亚洲人成网站高清观看| 午夜福利在线在线| av视频在线观看入口| 国产久久久一区二区三区| 三级男女做爰猛烈吃奶摸视频| 91麻豆精品激情在线观看国产| 一级毛片我不卡| 精品久久久久久久久久免费视频| 久久99蜜桃精品久久| 日本爱情动作片www.在线观看| 如何舔出高潮| 在线观看66精品国产| 日韩三级伦理在线观看| 热99re8久久精品国产| 91精品一卡2卡3卡4卡| 国产三级在线视频| 一边摸一边抽搐一进一小说| 乱码一卡2卡4卡精品| 黄色日韩在线| 久久午夜福利片| 91在线精品国自产拍蜜月| 给我免费播放毛片高清在线观看| 成年av动漫网址| 色5月婷婷丁香| 精品人妻偷拍中文字幕| 中文欧美无线码| 97超视频在线观看视频| 青春草亚洲视频在线观看| 简卡轻食公司| 国产成人a区在线观看| 一级黄色大片毛片| 少妇人妻一区二区三区视频| 国产精品爽爽va在线观看网站| 精品欧美国产一区二区三| 欧美成人免费av一区二区三区| 日日摸夜夜添夜夜添av毛片| 日韩av不卡免费在线播放| 国产精品一及| 性插视频无遮挡在线免费观看| 国产精品久久久久久久久免| 欧美日韩国产亚洲二区| 亚洲精品日韩在线中文字幕 | 久久午夜亚洲精品久久| 日本在线视频免费播放| 国内精品一区二区在线观看| 人妻夜夜爽99麻豆av| 亚洲国产欧美人成| 丝袜美腿在线中文| 一进一出抽搐动态| 亚洲欧美中文字幕日韩二区| 天堂av国产一区二区熟女人妻| 成人亚洲欧美一区二区av| 精品久久久久久久久亚洲| 草草在线视频免费看| 99久久无色码亚洲精品果冻| 99热这里只有是精品在线观看| 精品久久久噜噜| 久久久久久久久久久免费av| 男女做爰动态图高潮gif福利片| 麻豆国产97在线/欧美| 午夜老司机福利剧场| 色视频www国产| 亚洲人成网站高清观看| 白带黄色成豆腐渣| www日本黄色视频网| 综合色丁香网| 欧美丝袜亚洲另类| 亚洲欧美日韩高清在线视频| 国产精品人妻久久久久久| 日本黄色视频三级网站网址| 日韩欧美精品v在线| 精华霜和精华液先用哪个| 亚洲综合色惰| 最近中文字幕高清免费大全6| 国产精品一区www在线观看| 成人综合一区亚洲| 在线播放无遮挡| 亚洲中文字幕日韩| 99国产极品粉嫩在线观看| 综合色丁香网| 国产老妇伦熟女老妇高清| 国产高清三级在线| 人妻制服诱惑在线中文字幕| 22中文网久久字幕| 国产成年人精品一区二区| 亚洲国产精品成人综合色| 女人十人毛片免费观看3o分钟| 非洲黑人性xxxx精品又粗又长| 九九爱精品视频在线观看| 久久久久久久久久成人| 国产精品无大码| 成人特级av手机在线观看| 亚洲五月天丁香| 国产麻豆成人av免费视频| 中文字幕久久专区| 少妇高潮的动态图| 婷婷色综合大香蕉| 狂野欧美激情性xxxx在线观看| 国内精品美女久久久久久| 我的女老师完整版在线观看| 亚洲婷婷狠狠爱综合网| 少妇熟女欧美另类| 中文字幕制服av| 午夜视频国产福利| 久久久精品大字幕| 中文亚洲av片在线观看爽| 不卡一级毛片| 一级毛片电影观看 | 亚洲综合色惰| 一本久久中文字幕| 国产精品麻豆人妻色哟哟久久 | 国产视频内射| 少妇高潮的动态图| 少妇丰满av| 成人漫画全彩无遮挡| 国产日本99.免费观看| 国产精品不卡视频一区二区| 久久精品91蜜桃| 18禁黄网站禁片免费观看直播| 一级二级三级毛片免费看| 日韩亚洲欧美综合| 亚洲av成人精品一区久久| 在线观看免费视频日本深夜| 丰满的人妻完整版| 丝袜美腿在线中文| 可以在线观看的亚洲视频| 黄色欧美视频在线观看| 两个人的视频大全免费| 国产国拍精品亚洲av在线观看| 欧美xxxx性猛交bbbb| 联通29元200g的流量卡| 在线观看av片永久免费下载| 波多野结衣高清作品| 日本欧美国产在线视频| 国产 一区 欧美 日韩| 网址你懂的国产日韩在线| av国产免费在线观看| 日本av手机在线免费观看| 一级黄片播放器| 欧美变态另类bdsm刘玥| av在线观看视频网站免费| 亚洲精品粉嫩美女一区| 国产美女午夜福利| av在线亚洲专区| 男人舔女人下体高潮全视频| 欧美成人a在线观看| 中出人妻视频一区二区| 国产亚洲精品av在线| 日韩一本色道免费dvd| 我要搜黄色片| 男人狂女人下面高潮的视频| 国产成人freesex在线| 草草在线视频免费看| 日韩av不卡免费在线播放| 国产伦理片在线播放av一区 | 欧美日韩精品成人综合77777| 久久久久久大精品| 99热这里只有是精品在线观看| 夫妻性生交免费视频一级片| 最新中文字幕久久久久| 国产亚洲精品久久久com| 久久久a久久爽久久v久久| 寂寞人妻少妇视频99o| 黑人高潮一二区| 三级毛片av免费| 99久久九九国产精品国产免费| 男女做爰动态图高潮gif福利片| 性色avwww在线观看| av在线老鸭窝| 亚洲乱码一区二区免费版| 国国产精品蜜臀av免费| 美女cb高潮喷水在线观看| 国产91av在线免费观看| 麻豆成人av视频| 久久精品人妻少妇| 亚洲自偷自拍三级| 最后的刺客免费高清国语| 中文字幕免费在线视频6| 久久久久久久久久成人| 亚洲精品亚洲一区二区| 国产黄色小视频在线观看| 在线免费十八禁| 赤兔流量卡办理| 哪个播放器可以免费观看大片| 两个人视频免费观看高清| 天堂影院成人在线观看| 人妻夜夜爽99麻豆av| 我要搜黄色片| 亚洲人成网站在线播| 一级黄色大片毛片| 免费电影在线观看免费观看| 狠狠狠狠99中文字幕| 亚洲一区高清亚洲精品| 成年版毛片免费区| 国产亚洲91精品色在线| 嘟嘟电影网在线观看| 黄色日韩在线| 综合色av麻豆| 精品日产1卡2卡| 一区二区三区高清视频在线| 狠狠狠狠99中文字幕| 青春草视频在线免费观看| 美女大奶头视频| 日本欧美国产在线视频| 看黄色毛片网站| 亚洲精品日韩av片在线观看| 一区二区三区免费毛片| 欧洲精品卡2卡3卡4卡5卡区| 欧美激情久久久久久爽电影| 美女大奶头视频| av视频在线观看入口| 亚洲在线自拍视频| 2021天堂中文幕一二区在线观| 天天躁日日操中文字幕| 99国产极品粉嫩在线观看| 欧美一区二区亚洲| 成熟少妇高潮喷水视频| 女同久久另类99精品国产91| 长腿黑丝高跟| 啦啦啦啦在线视频资源| h日本视频在线播放| 精品久久国产蜜桃| 一级av片app| 久久亚洲国产成人精品v| 国内少妇人妻偷人精品xxx网站| 乱人视频在线观看| 51国产日韩欧美| 亚洲成av人片在线播放无| 久久精品夜夜夜夜夜久久蜜豆| 久久久色成人| 两性午夜刺激爽爽歪歪视频在线观看| 搡女人真爽免费视频火全软件| 能在线免费观看的黄片| 婷婷亚洲欧美| 国产精品一区二区三区四区久久| 午夜激情福利司机影院| 国产伦一二天堂av在线观看| www.色视频.com| 热99re8久久精品国产| 日日摸夜夜添夜夜添av毛片| 丰满人妻一区二区三区视频av| 欧美丝袜亚洲另类| av女优亚洲男人天堂| 国产午夜精品论理片| 国产成人精品婷婷| 国产精品蜜桃在线观看 | 丰满的人妻完整版| 色视频www国产| 又粗又爽又猛毛片免费看| 一本久久精品| 亚洲人成网站在线观看播放| 高清日韩中文字幕在线| 日本撒尿小便嘘嘘汇集6| 国产精品一区二区性色av| 91在线精品国自产拍蜜月| 国产激情偷乱视频一区二区| 久久这里只有精品中国| 麻豆精品久久久久久蜜桃| 天堂中文最新版在线下载 | 亚洲va在线va天堂va国产| 亚洲三级黄色毛片| 色5月婷婷丁香| 蜜臀久久99精品久久宅男| 国产成人a∨麻豆精品| av在线亚洲专区| 色吧在线观看| 欧美极品一区二区三区四区| 91午夜精品亚洲一区二区三区| 夜夜爽天天搞| 男女那种视频在线观看| 亚洲精品成人久久久久久| 日韩 亚洲 欧美在线| 欧美日韩一区二区视频在线观看视频在线 | 国产成人aa在线观看| 亚洲欧美成人精品一区二区| 91aial.com中文字幕在线观看| 69av精品久久久久久| 成年av动漫网址| 精品人妻偷拍中文字幕| 插阴视频在线观看视频| 内射极品少妇av片p| 日韩精品有码人妻一区| 亚洲av免费高清在线观看| 午夜免费男女啪啪视频观看| 自拍偷自拍亚洲精品老妇| 国内精品宾馆在线| 九草在线视频观看| 97在线视频观看| 校园春色视频在线观看| 我的老师免费观看完整版| 国产黄a三级三级三级人| 男人狂女人下面高潮的视频| 成人特级黄色片久久久久久久| 欧美一区二区国产精品久久精品| 亚洲国产精品久久男人天堂| 亚洲乱码一区二区免费版| 国产片特级美女逼逼视频| h日本视频在线播放| 成人漫画全彩无遮挡| 青春草视频在线免费观看| 国产蜜桃级精品一区二区三区| 99热这里只有是精品在线观看| 在线a可以看的网站| 乱人视频在线观看| 亚洲欧美日韩高清在线视频| 亚洲av.av天堂| 欧洲精品卡2卡3卡4卡5卡区| 日产精品乱码卡一卡2卡三| 日韩 亚洲 欧美在线| 午夜福利在线观看免费完整高清在 | 国产日本99.免费观看| 寂寞人妻少妇视频99o| 男插女下体视频免费在线播放| 午夜视频国产福利| 97在线视频观看| a级一级毛片免费在线观看| 波多野结衣高清作品| av在线老鸭窝| 少妇被粗大猛烈的视频| 国产视频内射| 亚洲精品亚洲一区二区| 99久久无色码亚洲精品果冻| 精品国内亚洲2022精品成人| 日本五十路高清| 麻豆乱淫一区二区| 国产爱豆传媒在线观看| 午夜福利视频1000在线观看| 黄色一级大片看看| 久久久精品94久久精品| 亚洲av成人精品一区久久| 在线观看一区二区三区| 久久久国产成人免费| 亚洲经典国产精华液单| av视频在线观看入口| 搞女人的毛片| 欧美日韩乱码在线| 国产伦在线观看视频一区| 精品久久久久久久久av| 精品99又大又爽又粗少妇毛片| 在线观看一区二区三区| 特大巨黑吊av在线直播| 深夜a级毛片| 亚洲最大成人手机在线| 国产精品.久久久| 岛国在线免费视频观看| 亚洲性久久影院| 淫秽高清视频在线观看| 成人欧美大片| 丰满乱子伦码专区| 国产欧美日韩精品一区二区| 变态另类丝袜制服| 老女人水多毛片| 久久人人精品亚洲av| 久久国内精品自在自线图片| 看免费成人av毛片| 最近视频中文字幕2019在线8| 亚洲欧美日韩高清在线视频| 丰满的人妻完整版| 99久国产av精品| 色综合站精品国产| 色视频www国产| 国产成人精品久久久久久| 免费搜索国产男女视频| 国产伦在线观看视频一区| 久久久久久久久久黄片| 嘟嘟电影网在线观看| 91久久精品电影网| 毛片一级片免费看久久久久| 欧美变态另类bdsm刘玥| 亚洲欧洲国产日韩| 久久99热6这里只有精品| 日韩欧美 国产精品| 亚洲av熟女| 免费av观看视频| 久久久久久久久大av| 日本撒尿小便嘘嘘汇集6| ponron亚洲| 亚洲最大成人手机在线| 国语自产精品视频在线第100页| 噜噜噜噜噜久久久久久91| 国产色爽女视频免费观看| 少妇被粗大猛烈的视频| a级毛色黄片| 国产极品天堂在线| 国产中年淑女户外野战色| 日韩一本色道免费dvd| 99久久精品国产国产毛片| 国产老妇女一区| 插阴视频在线观看视频| 一级黄色大片毛片| 成人无遮挡网站| 欧美激情久久久久久爽电影| а√天堂www在线а√下载| 日韩,欧美,国产一区二区三区 | 国产精品免费一区二区三区在线| 国产69精品久久久久777片| 夜夜看夜夜爽夜夜摸| 免费搜索国产男女视频| 色综合色国产| 天天躁日日操中文字幕| .国产精品久久| 国产成人影院久久av| 日本-黄色视频高清免费观看| 一本一本综合久久| 久久久久久九九精品二区国产| 午夜爱爱视频在线播放| 日本黄大片高清| videossex国产| 女同久久另类99精品国产91| 久久国内精品自在自线图片| 久久久久久九九精品二区国产| 久久久久性生活片| 国产 一区精品| 午夜精品国产一区二区电影 | 小说图片视频综合网站| 日韩欧美精品免费久久| 国产成人精品久久久久久| 在线免费十八禁| 男女啪啪激烈高潮av片| 在线免费观看不下载黄p国产| 不卡一级毛片| 国内精品宾馆在线| av福利片在线观看| 能在线免费看毛片的网站| 国产精品1区2区在线观看.| 岛国在线免费视频观看| 欧美激情久久久久久爽电影| 欧美在线一区亚洲| 成年版毛片免费区| 18禁在线无遮挡免费观看视频| 一级黄色大片毛片| 一本久久中文字幕| 两个人的视频大全免费| 亚洲国产色片| 亚洲av中文av极速乱| 久久久久性生活片| 麻豆久久精品国产亚洲av| 菩萨蛮人人尽说江南好唐韦庄 | 可以在线观看毛片的网站| 免费av毛片视频| 又爽又黄a免费视频| 日本与韩国留学比较| 欧美成人免费av一区二区三区| 久久精品国产亚洲av香蕉五月| 久久久精品大字幕| 中文字幕熟女人妻在线| 一个人看视频在线观看www免费| 卡戴珊不雅视频在线播放| 国产极品精品免费视频能看的| 国产精品一区www在线观看| av天堂在线播放| 免费看av在线观看网站| 男人舔女人下体高潮全视频| 中文在线观看免费www的网站| 男女边吃奶边做爰视频| 国内精品久久久久精免费| 舔av片在线| 国产精品一区二区三区四区免费观看| 一边摸一边抽搐一进一小说| 欧美区成人在线视频| 国产精品一区www在线观看| 欧美日本亚洲视频在线播放| 亚洲一区高清亚洲精品| 国产精品av视频在线免费观看| 精品久久久久久久久久免费视频| 麻豆国产97在线/欧美| 亚洲成av人片在线播放无| 成人特级av手机在线观看| 色5月婷婷丁香| 欧美成人a在线观看| 色哟哟哟哟哟哟| 国产视频内射| 亚洲欧美成人综合另类久久久 | 午夜福利成人在线免费观看| 精品久久久久久久久亚洲| 99久国产av精品| 成人国产麻豆网| 中文在线观看免费www的网站| 国产精品免费一区二区三区在线| 国产激情偷乱视频一区二区| 色综合站精品国产| 成人亚洲精品av一区二区| 婷婷六月久久综合丁香| 99久久成人亚洲精品观看| 国产av不卡久久| 国产伦在线观看视频一区| 一区二区三区免费毛片| 22中文网久久字幕| 亚洲精品456在线播放app| www.色视频.com| 午夜视频国产福利| 免费观看人在逋| 女同久久另类99精品国产91| 一进一出抽搐动态| av天堂在线播放| 99热这里只有精品一区| 亚洲av免费在线观看| 久久久久久久久中文| 两个人视频免费观看高清| 久久精品91蜜桃| 人妻系列 视频| 久久这里只有精品中国| 精品国内亚洲2022精品成人| 久久综合国产亚洲精品| 三级男女做爰猛烈吃奶摸视频| 亚洲国产精品成人久久小说 | 热99re8久久精品国产| 五月伊人婷婷丁香| 亚洲国产精品国产精品| 亚洲熟妇中文字幕五十中出| 色5月婷婷丁香| 欧美在线一区亚洲| 人妻夜夜爽99麻豆av| 久久99热6这里只有精品| 在线免费观看不下载黄p国产| 欧美日本亚洲视频在线播放|