• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks

    2023-10-26 13:13:38MuhammadFirdausHarashtaTatimmaLarasatiandKyungHyuneRhee
    Computers Materials&Continua 2023年9期

    Muhammad Firdaus ,Harashta Tatimma Larasati and Kyung-Hyune Rhee

    1Department of Artificial Intelligence Convergence,Pukyong National University,Busan,48513,Korea

    2School of Electrical Engineering and Informatics,Institut Teknologi Bandung,Bandung,40132,Indonesia

    3College of Information Technology and Convergence,Division of Computer Engineering and AI,Pukyong National University,Busan,48513,Korea

    ABSTRACT The enormous volume of heterogeneous data from various smart device-based applications has growingly increased a deeply interlaced cyber-physical system.In order to deliver smart cloud services that require low latency with strong computational processing capabilities,the Edge Intelligence System (EIS) idea is now being employed,which takes advantage of Artificial Intelligence(AI)and Edge Computing Technology(ECT).Thus,EIS presents a potential approach to enforcing future Intelligent Transportation Systems(ITS),particularly within a context of a Vehicular Network(VNets).However,the current EIS framework meets some issues and is conceivably vulnerable to multiple adversarial attacks because the central aggregator server handles the entire system orchestration.Hence,this paper introduces the concept of distributed edge intelligence,combining the advantages of Federated Learning(FL),Differential Privacy(DP),and blockchain to address the issues raised earlier.By performing decentralized data management and storing transactions in immutable distributed ledger networks,the blockchain-assisted FL method improves user privacy and boosts traffic prediction accuracy.Additionally,DP is utilized in defending the user’s private data from various threats and is given the authority to bolster the confidentiality of data-sharing transactions.Our model has been deployed in two strategies: First,DP-based FL to strengthen user privacy by masking the intermediate data during model uploading.Second,blockchain-based FL to effectively construct secure and decentralized traffic management in vehicular networks.The simulation results demonstrated that our framework yields several benefits for VNets privacy protection by forming a distributed EIS with privacy budget(ε)of 4.03,1.18,and 0.522,achieving model accuracy of 95.8%,93.78%,and 89.31%,respectively.

    KEYWORDS Edge intelligence;federated learning;differential privacy;blockchain;vehicular networks

    1 Introduction

    In recent years,a vast amount of heterogeneous data created from numerous devices has growingly increased a deeply interlaced cyber-physical system in supporting various internet-connected applications,such as smart industry[1],smart healthcare[2],smart grids[3],and Intelligent Transportation systems(ITS)[4].In order to provide smart cloud services that inquire strong computational processing capabilities with low latency,the study of Edge Intelligence System(EIS)[5],which takes advantage of Artificial Intelligence(AI)and Edge Computing Technology(ECT),has been emerging.In the ITS context,EIS offers a promising approach to enforcing future Vehicular Networks(VNets).AI reduces decision-making delays and provides smart cloud services with high performance [6].Meanwhile,ECT offers reliable storage and computation,where local resources are at the edge of a network that performs computational processing and data storage rather than relying on a central server or data center.Thus,by leveraging its intelligent edge resources,EIS improves real-time services and low-latency communication,offers powerful computational processing,and enables self-aggregating communication systems in VNets[7].

    However,the current AI approach suffers from several privacy risks,including massive overhead in gathering and updating the training data,the possibility of private data leakage,and the occurrence of a Single Point of Failure (SPoF) because it trains the model and aggregates the user’s data on a central aggregator centrally [8].Further,there is a rising need for privacy-preserving AI due to the recent establishment of data privacy preservation rules [9],including the General Data Protection Regulation(GDPR)[10]and the Health Insurance Portability and Accountability Act(HIPAA)[11].Thus,Federated Learning(FL)arose as a favorable method to address these issues.FL keeps the local data stored on the user’s devices and allows a collaborative model training approach among distributed mobile devices without exposing the training data[12].Further,FL demonstrates its effectiveness and preserves user privacy through local collaborative training and shared machine learning model updates without exposing individual datasets.In the context of VNets,FL has presented a potential solution to improve VNets’performance and address several challenges,including the limited availability of data due to privacy concerns and the high mobility of vehicles,which can cause data to be unreliable or untrustworthy.Some works have been widely considering the merits of FL for VNets.In [13],the authors introduced the Federated Vehicular Network (FVN),a resilient distributed VNets that can provide data/computation-intensive applications by utilizing both millimeter wave (mmWave)communication and dedicated short-range communications (DSRC) to reach stable and scalable performance.The authors in [14] offered a selective model aggregation approach,which reduces communication overhead and computational complexity while maintaining the accuracy of the trained model.They also introduce the two-dimension contract theory with selection criteria to facilitate the interactions between users and aggregator server as well as determine the most suitable models for aggregation.Moreover,to address the challenge of heterogeneous model distribution and varying communication quality,the work in [15] suggested a two-layer FL approach with heterogeneous model aggregation for VNets supported by 6G networks.The first layer involves local FL among the vehicles in the same cluster,while the second layer aggregates the models from different clusters using a weighted model aggregation scheme.

    Although FL has great potential to support EIS in improving VNets performance,it is not immune to adversary attacks,including poisoning [16] and membership inference attacks [17].Poisoning attacks,in which an adversary seeks to corrupt the global model by transmitting malicious updates during the collaborative training phase.On the other hand,in membership inference attacks,an adversary attempts to reverse engineer the users’confidential data by examining the trained model updates.Hence,those attacks represent significant threats to the security and integrity of FL systems.Moreover,the central aggregator that coordinates the FL process is vulnerable to SPoF issues,which can compromise user data confidentiality and disrupt the system’s functioning.Thus,these vulnerabilities may discourage users from participating in developing FL-based edge intelligence systems for VNets.For these reasons,to discourse on the issues mentioned above,we require a robust framework that not only prioritizes VNets performance but also provides privacy and security guarantees to motivate users to supply appropriate contributions with long-term participation.Therefore,this paper aims to bridge the gap by introducing a distributed EIS framework that leverages the advantages of FL,blockchain technology,and Differential Privacy (DP) to address the existing FL-based EIS challenges in the context of VNets application.By incorporating blockchain into the FL process,we aim to improve users’privacy and security by using immutable distributed ledger networks and enhance the accuracy of decentralized traffic prediction.Blockchain can be utilized to establish a decentralized network of EIS,where all involved node maintains a copy of the same data,thereby making it more resilient to data loss or tampering.Additionally,blockchain can be a rewarding scheme to encourage users to collaborate in improving the global model based on the local model training process.We also utilize DP to ensure the secrecy of the trained local model and protect user data from adversarial attacks during data-sharing transactions in VNets.Moreover,since FL involves multiple users contributing data to the training process,DP allows each user to maintain ownership of their data while contributing to the overall training process.Through the combination of FL,blockchain,and DP,we seek to enhance the security and privacy of edge intelligence systems.

    The remainder of this paper is organized as follows.We provide a comprehensive overview of the background knowledge relevant to the components of EIS technology in Section 2 before examining previous studies in the field in Section 3.Section 4 introduces our proposed model for secure edge intelligence in VNets.In Section 5,numerical findings are discussed.Lastly,Section 6 concludes the paper.

    2 Preliminaries

    2.1 Federated Learning

    Traditionally,Machine Learning(ML)techniques involve training models on centralized servers by aggregating data from multiple users,which may contain sensitive information.In this sense,in the user-server architecture of classical ML,the training process is always possessed on the server.Users solely perform as data providers,whereas the server accomplishes data training and aggregation.Hence,these approaches can pose significant privacy risks,including the possibility of data leakage and the threat of SPoF,as well as incurring overhead in data collection and storage[18].In order to tackle these challenges,Google presented FL [19] as a novel,communication-efficient optimization algorithm for distributed machine learning.FL is a technique that enables distributed mobile devices to work together to train models without the need to centralize the training data and keep the data held locally on the devices [20].Moreover,it can enable a wide range of applications,including personalization on mobile devices[21],predictive maintenance in the IoT industry[22],personalized medicine in healthcare[23],improved fraud detection in finance[24],and improved traffic prediction and personalization of autonomous vehicles in VNets[25].

    At its core,Federated Learning (FL) seeks to facilitate the collective training of models across multiple entities without the necessity of sharing private data.In this way,sensitive information remains confined to individual devices and is never disseminated [21].FL endeavors to optimize the global loss functionF(ω)by using FL optimization objectives that can be aggregated through empirical risk minimization(ERM)techniques,as described in Eq.(1).

    where the notation employed encompasses the model parameters denoted asω,the number of participating devices represented byk,pmrepresents the proportion of data points originating from devicemin relation to the overall data points,andFm(ω)is notation for the loss function evaluated on devicem.

    Fig.1 depicts the general federated learning procedure [19].The central server,serving as the model provider,disseminates the global model to the participating users.Each user downloads the global model and generates a model update by training it on their local data,which is then uploaded to the central server acting as the aggregator.The aggregator server then averages all the updated models from the users to produce a new global model for the subsequent round.Thus,through this process,federated learning effectively enhances user privacy by blocking various attacks that could potentially compromise access to the local training data.

    Figure 1:Illustration of FL procedures

    2.2 Edge Computing Technology

    ECT is a distributed computing paradigm that brings computation and data storage closer to the location needed to improve response times and save bandwidth[26].It expands upon the idea of cloud computing by bringing its capabilities to the edge of the network.The objectives of ECT are similar to those of cloudlets or fog computing in other literature.Furthermore,ECT provides data storage and performs computational processing locally at the edge of the infrastructure,closer to the data provider or user.Consequently,ECT delivers low-latency communication,real-time services,and location awareness.Additionally,it also reduces delay and conserves bandwidth by eliminating the need for transferring data to remote nodes in the VNets systems [27].In ECT,devices such as smartphones,IoT sensors,and other connected devices perform computation and store data locally rather than transmitting it to a centralized server or cloud for processing.This can be advantageous in situations where internet connectivity is limited or unreliable or where the data being processed is sensitive and must remain on-premises for security purposes.ECT can be beneficial in applications where low latency is of the utmost importance,such as in autonomous vehicles or virtual and augmented reality systems.Ultimately,edge computing aims to improve computation speed and efficiency by bringing it closer to the edge of the network,closer to the devices and users that require it.

    Moreover,ECT is also helpful when large amounts of data are generated in real-time and require immediate processing.For instance,in the context of robotic and facility control systems [28],ECT with AI integration can enable real-time data processing and decision-making capabilities at the edge of the network where the robots and facilities are located.Hence,the system can better adapt to changing environmental conditions and resource availability,enabling efficient resource synchronization and sharing among robots and facilities in a distributed system.Therefore,it can improve the overall efficiency and responsiveness of the system and reduce reliance on centralized cloud servers.

    2.3 Blockchain

    Blockchain technology,first introduced in 2009 by the mysterious figure known as Satoshi Nakamoto through the creation of the first decentralized digital currency,Bitcoin has recently garnered significant attention from both industry professionals and academics for its potential to revolutionize a wide range of applications through the creation of decentralized and secure systems[29].By eliminating the need for centralized servers,blockchain technology can be utilized to address inefficiencies and improve data security through anonymous and trustworthy transactions[30].Transactions recorded on a blockchain are added to a decentralized ledger with timestamps,preventing any single authority from endorsing events in secrecy.The decentralized nature of blockchain technology allows it to operate without the need for a central authority,instead relying on consensus among the participating nodes.This consensus-driven approach helps to ensure the integrity and security of the blockchain,as any attempt to alter the records would need to be coordinated across a majority of the network in order to succeed.

    A blockchain comprises a series of interconnected blocks,each of which contains a record of multiple transactions and a unique cryptographic hash.These hashes are generated using complex mathematical algorithms,which are used to identify and verify the authenticity of each block.The structure of a blockchain is illustrated in Fig.2,with each block comprising a header containing information such as the block number,the previous block’s hash,a timestamp,and other metadata,and a body containing the transactions recorded on the network.

    Figure 2:Illustration of blockchain structure

    2.4 Differential Privacy

    Differential privacy (DP) [31] is a mathematical concept that aims to provide strong privacy guarantees for data collection and analysis.It has been widely recognized as a strong and effective privacy protection mechanism and endorsed by organizations such as the US Census Bureau[32]and the Australian Bureau of Statistics[33].In a few years,it has also obtained an extensive engagement in AI and machine learning.DP works by adding carefully calibrated noise to a dataset,which helps to obscure sensitive information and prevent the identification of individual records.This noise,such as Gaussian or Laplacian noise distribution,is added in such a way as to maximize the utility of the data while still providing strong privacy protections.In order to implement differential privacy,a privacy budget(ε)must be chosen,which represents the maximum amount of privacy loss that is acceptable in order to gain the benefits of the data[34].This budget is then used to determine the appropriate noise level to add to the dataset.The standard definition of differential privacy is explained as follows[31].

    Definition 1(Differential Privacy):A randomized mechanism M provides(ε,δ)-differential privacy if for any two neighboring database D1and D2that differ in only a single entry,?S?Range(M)

    Ifδ=0,Mis stated to attain a state ofε-differential privacy.Here,δrepresents slight odds of failure.Furthermore,as Eq.(2)shows,a larger value ofεleads to a lower degree of privacy,whereas a smaller value ofεleads to a higher degree of privacy(i.e.,more extra noise).

    3 Related Work

    Edge Intelligence System(EIS)is a subfield of the Internet of Things(IoT)and ECT that focuses on enabling intelligent decision-making at the edge of the network rather than relying on a centralized cloud infrastructure.It is built upon two key technologies:ECT and ML.ECT refers to processing data close to the source rather than sending all data to a central location for processing[35,36].It enables low-latency,high-bandwidth,and real-time data processing,which is critical for many IoT applications such as industrial control,autonomous vehicles,and augmented reality.Conversely,ML is a subset of AI that enables computers to learn from data and make predictions or decisions without explicit programming.ML models require large amounts of data to be trained and often require significant computational resources [37].By combining the benefits of these two technologies,EIS enables the deployment of sophisticated ML models on edge devices such as IoT gateways,edge servers,and edge nodes,thereby allowing for real-time data analysis and the ability to execute complex models on devices with limited computational resources[38].

    Currently,several works utilize FL,an ML subfield,to enhance EIS’s usability.FL enables multiple devices to collaborate and improve a shared model without needing a centralized dataset.This can be done in a decentralized way without the need for a central authority to control the data or the model.FL is beneficial for edge intelligence applications,as it allows for the training of models using data that is distributed across multiple devices while preserving data privacy.In [39],the authors survey various FL techniques and protocols that have been proposed for mobile edge networks and highlight the challenges,opportunities,and future research directions.They also provide a taxonomy for categorizing the existing literature in the EIS field.Moreover,in order to enhance the performance of FL-assisted EIS,Wang et al.[40]introduced a novel approach,referred to as Inedge AI protocol which incorporates FL techniques to optimize mobile edge computing,caching,and communication.This protocol aims to optimize resource utilization,reduce transmission overhead,and increase data privacy.The authors in[38]proposed a communication-efficient method to perform FL in wireless EIS for IoT,which addresses the challenges caused by the limited resources and high mobility of wireless edge devices and balances the trade-off between communication efficiency and model accuracy.The work in[41]proposed a joint learning communication system for FL in wireless networks,which aims to optimize communication efficiency and reduce the transmission delay during the FL process by empowering user selection and resource allocation schemes.Also,Lu et al.[42]leveraged FL to establish collaborative edge intelligence to mitigate data leakage and safeguard user privacy information in the context of vehicular cyber-physical systems.

    On the other hand,blockchain,as a distributed ledger technology,has been proposed as a solution to tackle the limitations of conventional data governance systems in VNets.In the context of FL-assisted EIS,blockchain can be leveraged to deliver a decentralized system for incentivizing participation,verifying the integrity of updates to model training,and supporting fair aggregation of global models.Recent research has also explored the potential for merging blockchain and FL in order to enhance privacy.For instance,in[43],a privacy-preserving mechanism for data sharing for the Industrial Internet of Things(IIoT)was suggested for a distributed multi-party scenario,combining FL with the consensus scheme of a permissioned blockchain.Another study[44]presented a framework for preventing dishonest users from accessing the FL system through the use of smart contracts to defend against data or model poisoning attacks.Additionally,a protocol named DeepChain [45]that offers an incentive scheme based on blockchain was proposed to deliver an auditable,fair,secure,and distributed deep learning approach,utilizing incentives to motivate participants to act responsibly and mitigating the drawbacks of a centralized approach.

    Moreover,in an effort to safeguard the confidential nature of local training models from potentially malicious actors,various studies have centered on implementing DP to protect users’data.In [46],the authors suggested a hybrid method that addresses the multifaceted challenges of FL,including a lack of accuracy and inference attacks,through the utilization of both DP and secure multi-party computation (SMPC).This strategy reduces the need for increasingly larger amounts of noise injection as the number of users increases across various applications and use cases.Additionally,another work[47] offered the NbAFL protocol as a means of mitigating data leakage by implementing DP techniques prior to aggregating FL models.This study specifically aims to solve the information leakage issue in FL with distributed stochastic gradient descent (SGD) while also formulating academic conjunction bound for the loss function during FL model training.

    4 Towards Secure Edge Intelligence

    In this paper,we present a joint framework that synergizes the strengths of FL,Local Differential Privacy (LDP),and blockchain technology to establish a robust EIS in VNets.In this context,EIS,composed of FL and ECT,emphasizes enabling intelligent decision-making at the edge of the network along with providing low-latency,high-bandwidth,and real-time data processing,which is critical for VNets.Moreover,ECT-based EIS nodes are employed to reduce communication and computation costs by providing local storage,communication,and computation capabilities,which allows computational processing to be conducted closer to users (i.e.,vehicles) as data providers.On the other hand,LDP is leveraged to defend the vehicle’s sensitive data from various threats and strengthen the confidentiality of data-sharing transactions.By using LDP,we enhance the secrecy of transactions,particularly in protecting private or sensitive data during the process of uploading trained models locally.Furthermore,since FL relies on the contribution of data from multiple users to enhance the training process,the use of LDP ensures that each vehicle retains ownership of its data while still actively participating in the overall training process.Additionally,blockchain as a distributed ledger technology addresses the limitations of centralized servers and transparently manages the uploaded parameters of updated models.Therefore,blockchain is used to enrich the privacy and security of model parameters in the edge resources of FL by encrypting the data using a specific cryptography method.In order to grasp the proposed model,this section delves into the architectural design and detailed procedures of the distributed edge intelligence framework for VNets.

    4.1 Design Architecture Overview

    Fig.3 depicts the proposed joint framework for distributed EIS.In this framework,roadside units(RSUs)and vehicles serve as essential entities which participate as aggregator servers and user participants,exchanging information through vehicle-to-vehicle (V2V) and vehicle-to-infrastructure(V2I)communication,which are based on dedicated short-range communication(DSRC)standards.In our scenario,vehicles are considered distributed edge users,leveraging their local data to collaboratively update FL parameters for improved real-time traffic prediction in VNets.Moreover,they are equipped by onboard units (OBUs) with simple communication and computational capabilities that contain various sensors(e.g.,GPS,LiDAR,video,fuel,pressure,and infrared sensors)to obtain their local dataset regarding traffic and road-related information,including accident information,safety warnings,traffic jams,and weather conditions.RSUs,on the other hand,are positioned as distributed edge servers along the road,supplied with edge computing servers,and connecting vehicles to roadside infrastructure through wireless communication.Moreover,edge computing servers are utilized to reduce communication and computation costs by providing local storage,communication,and computation capabilities,allowing for computational processing to be conducted closer to vehicles as data providers.It is worth noting that all vehicles must be authorized by a trusted party(TP),such as the Department of Transportation,before accessing the network service to verify the legitimacy of their identity (e.g.,driver’s licenses or vehicle ID).Additionally,RSUs serve as intelligent edge servers,gathering and consolidating models from dispersed edge users in VNets,storing them in a decentralized ledger blockchain,and managing EIS traffic efficiently.

    Figure 3:Overview of the joint framework for distributed EIS

    Moreover,the proposed model utilizes a consortium blockchain to ensure that the participating EIS nodes(i.e.,RSUs)are preselected based on their trustworthiness,thereby enhancing the security and reliability of the overall system.Consortium blockchain guarantees the authenticity of the transactions and mitigates the risk of malicious vehicles compromising the EIS network.As such,the consortium blockchain-based FL method represents a promising solution for secure and efficient data sharing along with boosting traffic prediction accuracy in VNets.Blockchain offers a decentralized platform that is suitable for managing large-scale data sharing in VNets.It can facilitate transparent data sharing by leveraging blockchain’s immutability and tamper-proof nature.Furthermore,integrating FL with blockchain can assist in tackling the challenges associated with privacy and data ownership by allowing each vehicle to maintain control over its data while contributing to improving the global model updates.

    4.2 Procedures of Proposed Framework

    Our design architecture includes local model training among users,protecting and validating model parameters through blockchain-based LDP,and aggregating global models in a distributed EIS.Fig.4 shows the workflow of proposed architecture.The procedure starts with creating a task contract and initiating the learning model procedure.During initialization,the initial global model parametersω0are uploaded to the blockchain-powered RSUs,which can be integrated with off-chain storage,e.g.,the InterPlanetary File System(IPFS).Here,TP has created a task contract that includesω0,performance evaluation,and reward mechanism.Public-private key pairs are generated for edge nodes(ENpk,ENsk)to be used in the data-sharing process,and vehicles are also required to generate their own public-private key pairs(mpk,msk).Subsequently,at iterationt,edge users,in this case,legitimated vehicles (donated bymi=m1,m2,...,mn) that pass the registration and authentication process,retrieve the global modelωtfrom blockchain and perform the training of local model to produce trained modelsutilizing their local datasetdmaccording to Eq.(3).

    Figure 4:Workflow of the proposed architecture

    Moreover,the LDP mechanism is employed to reinforce privacy during the uploading of these local models by incorporating random noiseε,thereby mitigating the risk of linkability attacks such as membership and model inference attacks.In this step,the addition of noiseεis carried out bymto attainε-differential privacy through Eq.(2)and the Gaussian mechanism,specified as follows.

    After the vehicles collaboratively upload theirwith LDP protection to distributed edge server RSUs,the blockchain evaluates all updated models from vehicles according to the task contract,where accuracy is the parameter for performance verification that can be calculated through the following formula[48]:

    Later,the global model aggregation is executed as follows:

    5 Numerical Results and Discussion

    In this section,we implement our proposed model to form a distributed edge intelligence framework by combining the advantages of DP,blockchain,and FL.The proposed framework has been applied to two conditions:blockchain-based FL for the efficient establishment of decentralized traffic management in VNets and LDP-based FL for providing randomized privacy protection with the aid of the International Business Machines(IBM)Library for DP.In this study,the computational results were obtained on a desktop computer with Ubuntu operating system version 18.04,which was installed on a virtual machine,Oracle VM VirtualBox.The specification computer has an Intel(R)Core (TM) i7-1165G7 11th Gen Central Processing Unit (CPU) operating at a speed of 2.80 GHz,and it was supported by 16.00 GB of Random Access Memory(RAM).

    A prototype of VNets was devised with an optimized link-state routing protocol using a discrete event simulator to examine system performance,as depicted in our prior works [49].Fig.5 shows the Medium Access Control and Physical Layer (MAC/PHY) overhead in relation to the Packet Delivery Ratio(PDR)during an experiment duration of 100 s to evaluate the performance of VNets.As depicted,after 17 s of simulation,the overhead remains consistently within the range of 0.2 to 0.25 and slowly recedes.In this sense,the more down the overhead,the higher the system’s performance,and vice versa.Based on the results mentioned above,our proposed protocol is relatively efficient as it does not incur considerable overhead.

    Figure 5:Comparison of PDR ando overhead

    We adopted a consortium setting that employs blockchain to construct a decentralized FL framework.Moreover,we utilize the Ethereum platform to transparently assess participants’contributions toward the global model,establish a decentralized incentivization system,and carry out decentralized FL transactions.In our simulation,we utilized the Modified National Institute of Standards and Technology (MNIST) [50] datasets as a benchmark for image classification,with 60,000 images as training and 10,000 as test examples,where the apiece example consists of a 28×28 gray-level image.Here,MNIST datasets represent the traffic and road-related information that is suitable for FL applications.Moreover,we use the Convolutional Neural Network (CNN) model consisting of two 5 × 5 convolution layers to represent the FL model in our scenario.We elaborate on the CNN model that is well-suited for image recognition tasks,which are prevalent in the MNIST dataset.Furthermore,to execute the FL with the DP model,we utilized an open-source library based on python developed by IBM,which provides a simple and efficient method for the simulation and implementation of differential privacy over various applications [51].This library also offers mechanisms for generating the random noise required (e.g.,Laplacian and Gaussian mechanisms)to achieve differential privacy,thus making it suitable for our scenario.

    Fig.6 presents the experiment utilizing DP in FL with varying degrees of privacy level,i.e.,ε=0.522,ε=1.18,andε=4.03,over a period of 15 epochs.This scenario examines the impact of privacy levels (ε) on system accuracy by adding varying degrees of noise sampled to local models during training.Moreover,the Gaussian mechanism is used to accomplish this objective.The simulation results demonstrate that Fig.6a,with a privacy budget ofε=4.03,attains a model accuracy of 95.8%.Conversely,Figs.6b and 6c,with privacy budgets ofε=1.18 andε=0.522,respectively,demonstrate a model accuracy of 93.78% and 89.31% (the detailed result can be found in Table 1).Therefore,as the value ofεdecreases(i.e.,the level of added noise increases),the system’s privacy(according to the interval between validation and accuracy)increases;however,the accuracy decreases,and vice versa.

    Figure 6:Accuracy comparison of various privacy budget

    Fig.7 shows the value of the loss function with various numbers of vehicles (users),i.e.,m=10,20,30,40,and 50.In this experiment,we set 50 epochs training with a learning rate of 0.01.As a result,increasing the number of vehicles leads to better convergence performance because more users will provide larger global datasets for training.On the other hand,Fig.8 depicts smart contracts’initial migration and deployment based on the platform of Ethereum.The graph illustrates the gas units needed for initial migration (164391,0.00328782 Ether (ETH)),federated smart contract(263330,0.0052666 ETH),and participant contribution deployment (1018839,0.02037678 ETH).With deployed smart contracts,we can adjust the number of participants in local model training and fairly calculate their contributions through blockchain technology.

    Table 1:Impact of privacy levels(ε)on system accuracy

    Figure 7:Loss function value for various numbers of vehicles

    The distribution of edge servers’contributions towards generating the global model FL based on the Ethereum platform is depicted in Fig.9.We have designed three separate collaborative edge servers(i.e.,RSUs) to work collaboratively to serve as intelligent EIS,gathering and consolidating models from dispersed edge users in VNets,and storing them in a decentralized ledger blockchain.Later,the incentive or reward is distributed to the participating vehicles upon creating a new global model based on their recorded contributions in the blockchain’s distributed ledger.Additionally,Fig.10 shows that,on average,our proposed protocol achieves better performance accuracy than existing works[51,52]and is comparable to the FL baseline[19].It is worth noting that FedAvg is regarded as the FL’s general standard,and the other methods compared are a DP-based FL approach[51]as well as a blockchainbased FL system[52],the detailed comparison can be seen in Table 2.In summary,this scenario seeks to motivate users to actively participate in preserving the EIS framework and improving the system’s performance.

    Figure 8:Smart contracts’initial migration and deployment

    Figure 9:Distribution of edge servers’contributions

    Figure 10:Performance accuracy comparison

    Table 2:Comparison of the proposed system with related works

    6 Conclusion and Future Work

    In this paper,we introduced the concept of distributed edge intelligence,combining the advantages of FL,DP,and blockchain.We consider utilizing blockchain to protect user privacy and security by recording all transactions in immutable distributed ledger networks.Moreover,by incorporating blockchain into the FL process,we aim to enhance the accuracy of decentralized traffic prediction and provide a decentralized rewarding scheme to encourage users to improve the global model collaboratively.FL-based EIS enables intelligent decision-making at the network’s edge and provides low-latency,high-bandwidth,and real-time data processing,which is critical for VNets.Moreover,integrating FL with blockchain can assist in tackling the challenges associated with privacy and data ownership by allowing each vehicle to maintain control over its data while contributing to improving the global model updates.Additionally,DP is utilized to ensure the secrecy of the trained local model and protect user data from adversarial attacks during data-sharing transactions in VNets.Numerical results show that our proposed protocol is relatively efficient as it does not incur the considerable overhead of VNets performance.We have designed a distributed EIS framework that gathers and consolidates models from dispersed edge users and stores them in a decentralized ledger based on the Ethereum platform.Furthermore,based on our simulation,it is worth noting that the impact of privacy budgetεon the accuracy is when a smallerε(more noise added) results in higher privacy but decreased accuracy.Lastly,even though the EIS approach shows great potential compared to the conventional centralized model training framework,there are still significant challenges and potential risks to user privacy and security that need to be addressed.Further research is needed to investigate potential attacks and defenses to create a more robust EIS framework that can be implemented in real-world scenarios.Additionally,it is necessary to consider other critical factors in VNets,such as the user selection mechanism for model training and the impact of system and statistical heterogeneity.Neglecting these factors could lead to inaccurate models and poor convergence,which could significantly hinder the practical implementation of VNets.Therefore,future studies must take a holistic approach to consider all these factors for designing and implementing VNets that can achieve optimal performance and scalability with reliable privacy protection.

    Acknowledgement:All authors would like to thank the anonymous reviewers for their constructive suggestions,which improve the quality of this work.

    Funding Statement:This research was supported by the Republic of Korea’s MSIT(Ministry of Science and ICT),under the ICT Convergence Industry Innovation Technology Development Project(2022-0-00614) supervised by the IITP and partially supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education(No.2021R1I1A3046590).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:M.F.,K.H.R.;data collection:M.F.;analysis and interpretation of results:M.F.,H.T.L.;draft manuscript preparation:M.F.,H.T.L.,K.H.R.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The MNIST dataset used in this paper refers to[50],which can be accessed at https://yann.lecun.com/exdb/mnist/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    夜夜爽夜夜爽视频| 一级毛片黄色毛片免费观看视频| 午夜免费观看性视频| 免费少妇av软件| 日韩电影二区| 精品视频人人做人人爽| 国产淫语在线视频| 久久这里有精品视频免费| 久久毛片免费看一区二区三区| 日韩欧美一区视频在线观看| 午夜福利视频在线观看免费| 乱人伦中国视频| 免费黄频网站在线观看国产| 午夜福利在线观看免费完整高清在| 国产麻豆69| 青青草视频在线视频观看| 97精品久久久久久久久久精品| 亚洲第一av免费看| 成年美女黄网站色视频大全免费| 亚洲国产欧美在线一区| 大香蕉97超碰在线| 日本91视频免费播放| 又黄又粗又硬又大视频| 亚洲国产成人一精品久久久| videosex国产| 国产精品国产三级专区第一集| 九色成人免费人妻av| 又黄又粗又硬又大视频| 精品视频人人做人人爽| 婷婷色麻豆天堂久久| 一级a做视频免费观看| 欧美人与性动交α欧美软件 | 交换朋友夫妻互换小说| 亚洲av福利一区| 日韩免费高清中文字幕av| 如何舔出高潮| 夫妻性生交免费视频一级片| 色吧在线观看| 咕卡用的链子| 久久国产精品男人的天堂亚洲 | 一本大道久久a久久精品| 国产在线一区二区三区精| 免费大片黄手机在线观看| 久久99精品国语久久久| 欧美另类一区| 国产精品一区www在线观看| 午夜影院在线不卡| 天天躁夜夜躁狠狠久久av| 国产亚洲欧美精品永久| 9热在线视频观看99| 巨乳人妻的诱惑在线观看| 你懂的网址亚洲精品在线观看| 精品一区二区免费观看| 我要看黄色一级片免费的| 新久久久久国产一级毛片| 亚洲人成77777在线视频| 人人妻人人澡人人看| 中文字幕av电影在线播放| 丝袜在线中文字幕| 夫妻性生交免费视频一级片| 色婷婷av一区二区三区视频| 在现免费观看毛片| 少妇的逼水好多| 精品人妻偷拍中文字幕| 日韩三级伦理在线观看| 国产精品三级大全| 午夜福利,免费看| 免费看不卡的av| 巨乳人妻的诱惑在线观看| 日日啪夜夜爽| 尾随美女入室| 成人免费观看视频高清| 狠狠婷婷综合久久久久久88av| 午夜日本视频在线| 午夜福利网站1000一区二区三区| 成人综合一区亚洲| 不卡视频在线观看欧美| 男女下面插进去视频免费观看 | 精品国产国语对白av| 免费黄色在线免费观看| 男女无遮挡免费网站观看| 国产精品国产av在线观看| 色网站视频免费| 日韩人妻精品一区2区三区| 久久99蜜桃精品久久| 日韩伦理黄色片| 亚洲精品乱码久久久久久按摩| 黄色配什么色好看| tube8黄色片| 日韩一区二区视频免费看| 超碰97精品在线观看| 亚洲人成网站在线观看播放| 人体艺术视频欧美日本| 最近中文字幕2019免费版| 交换朋友夫妻互换小说| 爱豆传媒免费全集在线观看| 我的女老师完整版在线观看| 少妇猛男粗大的猛烈进出视频| 国产精品一二三区在线看| 高清在线视频一区二区三区| 赤兔流量卡办理| 欧美97在线视频| 18+在线观看网站| 国产福利在线免费观看视频| 男的添女的下面高潮视频| 成年美女黄网站色视频大全免费| 黄色配什么色好看| 欧美激情极品国产一区二区三区 | 久久这里只有精品19| 亚洲精品国产色婷婷电影| 99九九在线精品视频| 在线免费观看不下载黄p国产| 女人被躁到高潮嗷嗷叫费观| 精品一品国产午夜福利视频| 国产白丝娇喘喷水9色精品| av在线观看视频网站免费| 亚洲av男天堂| 9色porny在线观看| av不卡在线播放| 中文字幕免费在线视频6| 日韩一区二区视频免费看| 18在线观看网站| 天美传媒精品一区二区| av在线老鸭窝| 国产精品成人在线| 亚洲综合精品二区| 宅男免费午夜| 99久久中文字幕三级久久日本| 国产精品熟女久久久久浪| 午夜视频国产福利| 国产麻豆69| 国内精品宾馆在线| 国产成人一区二区在线| 女人精品久久久久毛片| 人妻系列 视频| 十八禁网站网址无遮挡| 国产国语露脸激情在线看| 久久精品国产综合久久久 | 成人18禁高潮啪啪吃奶动态图| 成人免费观看视频高清| 亚洲av电影在线进入| 亚洲国产av新网站| 亚洲欧美中文字幕日韩二区| 九草在线视频观看| 色婷婷av一区二区三区视频| 秋霞在线观看毛片| 国产欧美亚洲国产| 国产成人精品婷婷| 欧美丝袜亚洲另类| 永久网站在线| 日本av手机在线免费观看| 成年av动漫网址| 国产成人精品在线电影| 久久久精品94久久精品| 乱人伦中国视频| 高清黄色对白视频在线免费看| 91久久精品国产一区二区三区| 丝袜在线中文字幕| 边亲边吃奶的免费视频| 久久韩国三级中文字幕| 巨乳人妻的诱惑在线观看| 汤姆久久久久久久影院中文字幕| 18禁在线无遮挡免费观看视频| 日韩视频在线欧美| 99热国产这里只有精品6| 又黄又粗又硬又大视频| 高清视频免费观看一区二区| 色婷婷av一区二区三区视频| 国产69精品久久久久777片| 久久久国产精品麻豆| 黑人高潮一二区| 99热6这里只有精品| 在线天堂中文资源库| 一本—道久久a久久精品蜜桃钙片| 丝袜脚勾引网站| 亚洲,欧美,日韩| 精品一区二区免费观看| 秋霞在线观看毛片| 肉色欧美久久久久久久蜜桃| 日本爱情动作片www.在线观看| 精品亚洲成a人片在线观看| 成人毛片a级毛片在线播放| 两个人看的免费小视频| 国产色婷婷99| 成人国产麻豆网| 在线 av 中文字幕| 久久久久国产网址| 欧美精品国产亚洲| 一本大道久久a久久精品| 中文字幕制服av| 少妇精品久久久久久久| 久久亚洲国产成人精品v| 美女脱内裤让男人舔精品视频| 日本午夜av视频| 青青草视频在线视频观看| 一级黄片播放器| 亚洲国产毛片av蜜桃av| 少妇高潮的动态图| 久久99一区二区三区| 搡女人真爽免费视频火全软件| 精品少妇久久久久久888优播| 欧美3d第一页| 欧美老熟妇乱子伦牲交| 男女啪啪激烈高潮av片| 久久人人爽人人爽人人片va| 亚洲四区av| 国产色爽女视频免费观看| 人人妻人人澡人人爽人人夜夜| 五月伊人婷婷丁香| 日本爱情动作片www.在线观看| 黄网站色视频无遮挡免费观看| 国产午夜精品一二区理论片| 男女下面插进去视频免费观看 | 国产又爽黄色视频| 精品熟女少妇av免费看| 免费观看无遮挡的男女| 日韩成人伦理影院| av又黄又爽大尺度在线免费看| 97人妻天天添夜夜摸| 欧美日本中文国产一区发布| 夫妻午夜视频| 97在线人人人人妻| 大香蕉久久成人网| 午夜激情av网站| 日韩熟女老妇一区二区性免费视频| 日韩av免费高清视频| 欧美成人精品欧美一级黄| 国产免费福利视频在线观看| 18禁在线无遮挡免费观看视频| 国产午夜精品一二区理论片| 美女国产视频在线观看| 天堂俺去俺来也www色官网| 国产av码专区亚洲av| 黄片播放在线免费| 午夜免费观看性视频| 久久这里只有精品19| 亚洲精品成人av观看孕妇| 精品少妇黑人巨大在线播放| 亚洲一级一片aⅴ在线观看| 欧美成人午夜精品| 看十八女毛片水多多多| 美女xxoo啪啪120秒动态图| 涩涩av久久男人的天堂| 看非洲黑人一级黄片| 久久久久精品性色| 欧美日韩一区二区视频在线观看视频在线| 久久99热这里只频精品6学生| 亚洲第一av免费看| av片东京热男人的天堂| 在线亚洲精品国产二区图片欧美| 大香蕉久久成人网| 少妇 在线观看| 大陆偷拍与自拍| 免费大片18禁| 免费看不卡的av| 免费不卡的大黄色大毛片视频在线观看| 激情视频va一区二区三区| 天堂中文最新版在线下载| 啦啦啦中文免费视频观看日本| 久久婷婷青草| 少妇人妻久久综合中文| 精品99又大又爽又粗少妇毛片| 1024视频免费在线观看| 欧美日韩av久久| 国产男女超爽视频在线观看| 免费观看无遮挡的男女| 久久精品国产亚洲av涩爱| 欧美精品国产亚洲| 又黄又爽又刺激的免费视频.| 日本与韩国留学比较| 热99国产精品久久久久久7| 九草在线视频观看| 黄色怎么调成土黄色| 午夜福利乱码中文字幕| 日韩中文字幕视频在线看片| 欧美成人午夜免费资源| 欧美精品一区二区免费开放| 日韩一区二区三区影片| 肉色欧美久久久久久久蜜桃| 免费观看无遮挡的男女| 亚洲欧美成人精品一区二区| 激情五月婷婷亚洲| 国产淫语在线视频| 中文精品一卡2卡3卡4更新| 亚洲精品456在线播放app| 欧美精品人与动牲交sv欧美| 老司机亚洲免费影院| 伦理电影大哥的女人| 中国国产av一级| 久久久久久久亚洲中文字幕| 99久久中文字幕三级久久日本| 久久久久久久大尺度免费视频| 久久免费观看电影| 国产精品偷伦视频观看了| 国内精品宾馆在线| 中文字幕人妻丝袜制服| 日韩免费高清中文字幕av| av有码第一页| 一二三四中文在线观看免费高清| 看免费成人av毛片| 久久久久久久精品精品| 99re6热这里在线精品视频| 国产亚洲午夜精品一区二区久久| 亚洲三级黄色毛片| 一本—道久久a久久精品蜜桃钙片| 国产亚洲一区二区精品| 国产黄色免费在线视频| 久久久久国产精品人妻一区二区| 午夜福利在线观看免费完整高清在| 午夜福利视频精品| 少妇高潮的动态图| 久久国产亚洲av麻豆专区| 亚洲精品一二三| 一边亲一边摸免费视频| 精品视频人人做人人爽| 日韩av免费高清视频| 少妇精品久久久久久久| 色吧在线观看| 午夜福利视频在线观看免费| 日韩大片免费观看网站| 免费黄频网站在线观看国产| 精品久久久久久电影网| 伊人久久国产一区二区| 亚洲国产精品专区欧美| 18禁观看日本| 国产欧美日韩综合在线一区二区| 纯流量卡能插随身wifi吗| 国产精品成人在线| 亚洲精品第二区| 久久99一区二区三区| 日韩免费高清中文字幕av| 亚洲av电影在线进入| 亚洲精品av麻豆狂野| 人人妻人人爽人人添夜夜欢视频| 久久综合国产亚洲精品| 久久av网站| 丰满乱子伦码专区| 80岁老熟妇乱子伦牲交| 91久久精品国产一区二区三区| 久久狼人影院| 亚洲内射少妇av| 天天影视国产精品| 中文精品一卡2卡3卡4更新| 一个人免费看片子| 黑人高潮一二区| 国产亚洲av片在线观看秒播厂| 最新中文字幕久久久久| 内地一区二区视频在线| 日本wwww免费看| 晚上一个人看的免费电影| 欧美日韩视频精品一区| 亚洲四区av| 久久鲁丝午夜福利片| 满18在线观看网站| 最新中文字幕久久久久| 在线 av 中文字幕| 成年人免费黄色播放视频| 777米奇影视久久| 麻豆精品久久久久久蜜桃| 看十八女毛片水多多多| 夫妻午夜视频| 乱人伦中国视频| 母亲3免费完整高清在线观看 | 日日摸夜夜添夜夜爱| 在线天堂中文资源库| 久久99热这里只频精品6学生| 亚洲,欧美,日韩| 黄片播放在线免费| 久久久久国产网址| 大片免费播放器 马上看| 国产免费现黄频在线看| 亚洲高清免费不卡视频| 全区人妻精品视频| 国产片特级美女逼逼视频| 国产免费福利视频在线观看| a 毛片基地| 国产精品 国内视频| 国产精品99久久99久久久不卡 | 女性生殖器流出的白浆| 午夜91福利影院| 精品国产一区二区三区久久久樱花| av国产久精品久网站免费入址| 亚洲成色77777| av卡一久久| 老司机影院毛片| 咕卡用的链子| 亚洲欧美一区二区三区黑人 | 在线观看免费视频网站a站| 国产精品免费大片| 欧美老熟妇乱子伦牲交| 日本爱情动作片www.在线观看| 在线天堂中文资源库| 国产免费视频播放在线视频| 欧美日韩综合久久久久久| av电影中文网址| 国产精品久久久久久久电影| 女性被躁到高潮视频| 亚洲av欧美aⅴ国产| 水蜜桃什么品种好| av播播在线观看一区| 丝袜在线中文字幕| 亚洲国产av影院在线观看| 男女午夜视频在线观看 | 欧美激情 高清一区二区三区| 黑人欧美特级aaaaaa片| 九草在线视频观看| 人妻人人澡人人爽人人| 交换朋友夫妻互换小说| 国产精品一二三区在线看| 如日韩欧美国产精品一区二区三区| 啦啦啦啦在线视频资源| 日韩精品有码人妻一区| 久久久a久久爽久久v久久| 大码成人一级视频| 国产精品国产av在线观看| 亚洲国产精品一区三区| 大香蕉久久网| 婷婷色综合www| 国产成人精品久久久久久| 老司机亚洲免费影院| 天天躁夜夜躁狠狠久久av| 人妻系列 视频| 国产 一区精品| 久久久久久人人人人人| 桃花免费在线播放| 成年女人在线观看亚洲视频| 久久久久人妻精品一区果冻| 亚洲国产日韩一区二区| 性色avwww在线观看| av.在线天堂| 9热在线视频观看99| 国产黄色免费在线视频| 欧美日韩亚洲高清精品| av免费在线看不卡| 精品人妻在线不人妻| 久久热在线av| 亚洲经典国产精华液单| 老司机影院成人| 91午夜精品亚洲一区二区三区| a级毛色黄片| 99香蕉大伊视频| 伊人久久国产一区二区| 免费久久久久久久精品成人欧美视频 | 亚洲欧美色中文字幕在线| 亚洲内射少妇av| 欧美老熟妇乱子伦牲交| 久久韩国三级中文字幕| 男女免费视频国产| 99热这里只有是精品在线观看| 欧美日韩精品成人综合77777| 久久精品国产鲁丝片午夜精品| 成人国语在线视频| 80岁老熟妇乱子伦牲交| 91在线精品国自产拍蜜月| 亚洲经典国产精华液单| a级毛片黄视频| 亚洲精品久久久久久婷婷小说| 亚洲国产欧美日韩在线播放| 七月丁香在线播放| 两个人免费观看高清视频| 国产综合精华液| 看十八女毛片水多多多| 成年人午夜在线观看视频| freevideosex欧美| 天天躁夜夜躁狠狠躁躁| 国产高清国产精品国产三级| 丝瓜视频免费看黄片| 精品久久蜜臀av无| 欧美激情 高清一区二区三区| 亚洲欧美日韩卡通动漫| 永久网站在线| 国产精品一二三区在线看| 免费播放大片免费观看视频在线观看| 又黄又爽又刺激的免费视频.| 丰满乱子伦码专区| 国产在线免费精品| 久久国内精品自在自线图片| 欧美日韩成人在线一区二区| 99久久人妻综合| 啦啦啦在线观看免费高清www| 熟女av电影| 嫩草影院入口| 美女大奶头黄色视频| 在线观看www视频免费| 搡女人真爽免费视频火全软件| 国产免费又黄又爽又色| 9色porny在线观看| 国产精品一区二区在线观看99| 在线 av 中文字幕| 国产 一区精品| 新久久久久国产一级毛片| √禁漫天堂资源中文www| 捣出白浆h1v1| 久久国内精品自在自线图片| 大香蕉久久成人网| 国产日韩欧美亚洲二区| av一本久久久久| 久久鲁丝午夜福利片| 精品卡一卡二卡四卡免费| 国产免费一级a男人的天堂| 热re99久久精品国产66热6| 国产成人91sexporn| 在线观看免费视频网站a站| 看免费av毛片| 免费女性裸体啪啪无遮挡网站| 欧美成人午夜精品| 最黄视频免费看| 内地一区二区视频在线| 精品国产一区二区久久| 三上悠亚av全集在线观看| 天天躁夜夜躁狠狠久久av| 黄色视频在线播放观看不卡| 香蕉丝袜av| 高清欧美精品videossex| 久久女婷五月综合色啪小说| 国产免费视频播放在线视频| 日本黄色日本黄色录像| 综合色丁香网| 久久精品国产亚洲av涩爱| 天美传媒精品一区二区| 久久精品国产亚洲av涩爱| 看免费av毛片| 捣出白浆h1v1| 中文字幕av电影在线播放| 黄色配什么色好看| 美女福利国产在线| 国产精品一区二区在线观看99| 久久午夜福利片| 成人亚洲欧美一区二区av| 国语对白做爰xxxⅹ性视频网站| 九九在线视频观看精品| 婷婷色综合www| 国产福利在线免费观看视频| av女优亚洲男人天堂| 日韩人妻精品一区2区三区| 侵犯人妻中文字幕一二三四区| 亚洲精品日韩在线中文字幕| 麻豆精品久久久久久蜜桃| 亚洲美女视频黄频| h视频一区二区三区| 久久 成人 亚洲| av网站免费在线观看视频| 18禁观看日本| www.熟女人妻精品国产 | www日本在线高清视频| av免费观看日本| 亚洲国产看品久久| 免费观看无遮挡的男女| 日韩人妻精品一区2区三区| 久久久久久人妻| 国产亚洲午夜精品一区二区久久| 色94色欧美一区二区| 亚洲欧美一区二区三区国产| 精品久久久久久电影网| 国产精品不卡视频一区二区| 中文字幕精品免费在线观看视频 | 精品亚洲乱码少妇综合久久| 激情五月婷婷亚洲| 人体艺术视频欧美日本| 超碰97精品在线观看| 五月玫瑰六月丁香| 日韩,欧美,国产一区二区三区| 欧美国产精品va在线观看不卡| 观看av在线不卡| 日韩精品免费视频一区二区三区 | 午夜福利,免费看| av不卡在线播放| 美女主播在线视频| 人妻 亚洲 视频| 久久国产亚洲av麻豆专区| 男女边摸边吃奶| 国产乱人偷精品视频| 丰满迷人的少妇在线观看| 亚洲第一区二区三区不卡| 晚上一个人看的免费电影| √禁漫天堂资源中文www| 国产男女超爽视频在线观看| 建设人人有责人人尽责人人享有的| 成人国产av品久久久| 18禁动态无遮挡网站| 欧美精品国产亚洲| 看十八女毛片水多多多| 欧美成人午夜精品| 国产一区亚洲一区在线观看| 欧美激情极品国产一区二区三区 | 免费播放大片免费观看视频在线观看| 少妇被粗大的猛进出69影院 | 国产一区二区三区综合在线观看 | 看非洲黑人一级黄片| av视频免费观看在线观看| 日韩欧美精品免费久久| 亚洲美女黄色视频免费看| 美女中出高潮动态图| 国产1区2区3区精品| 2022亚洲国产成人精品| 久久久国产欧美日韩av| 亚洲色图综合在线观看| 午夜日本视频在线| 国产精品麻豆人妻色哟哟久久| 日本爱情动作片www.在线观看| 亚洲av欧美aⅴ国产| 极品少妇高潮喷水抽搐| 精品少妇久久久久久888优播| 母亲3免费完整高清在线观看 | 久久毛片免费看一区二区三区| 国产在视频线精品| 少妇被粗大猛烈的视频| kizo精华| 国产精品熟女久久久久浪| 亚洲欧美成人综合另类久久久| 国产精品不卡视频一区二区| 女性被躁到高潮视频| 亚洲国产av新网站| 99国产精品免费福利视频| 人妻少妇偷人精品九色|