• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    CF-BFT:A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    2023-10-26 13:14:00ZhiruoZhangFengWangYangLiuYangLuandXinleiLiu
    Computers Materials&Continua 2023年9期

    Zhiruo Zhang,Feng Wang,Yang Liu,Yang Lu and Xinlei Liu

    Department of Computer Technology,Henan University of Technology,Zhengzhou,450001,China

    ABSTRACT The consensus protocol is one of the core technologies in blockchain,which plays a crucial role in ensuring the block generation rate,consistency,and safety of the blockchain system.Blockchain systems mainly adopt the Byzantine Fault Tolerance(BFT)protocol,which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus.In this paper,this paper proposes a new dual-mode consensus protocol based on node identity authentication.It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT.In Check_BFT,the replicas authenticate the primary’s identity by monitoring its behaviors.First,assume that the system is in a pessimistic environment,Check_BFT protocol detects whether the current environment is safe and whether the primary is an honest node;Enter the fast consensus stage after confirming the environmental safety,and implement Fast_BFT protocol.It is assumed that there are 3f +1 nodes in total.If more than 2f +1 nodes identify that the primary is honest,it will enter the Fast_BFT process.In Fast_BFT,the primary is allowed to handle transactions alone,and the replicas can only receive the messages sent by the primary.The experimental results show that the CF-BFT protocol significantly reduces the communication overhead and improves the throughput and scalability of the consensus protocol.Compared with the SAZyzz protocol,the throughput is increased by 3 times in the best case and 60% in the worst case.

    KEYWORDS Blockchain;consensus protocol;dual-mode;Byzantine fault tolerance;distributed system

    1 Introduction

    Early consensus protocols focused on ensuring data and operation consistency in distributed systems,resulting in mainly Crash Fault Tolerance (CFT) protocols [1].However,the emergence of cryptocurrencies such as Bitcoin[2]in 2008 brought attention to the decentralized and tamper-proof features of blockchain technology,leading to its application in federated learning [3],data sharing[4],and other various fields[5–13].At the same time,Byzantine Fault Tolerance(BFT)protocol[14]has gradually become the focus of consensus protocol research,which cannot only tolerate network delays,node failures,and crashes but also handle Byzantine nodes intentionally disrupting system consistency.

    Hence,BFT protocols make different“sacrifices”to prevent attacks,which can result in issues such as low consensus performance and high resource overhead.Proof of Work(PoW)uses computational competition for ledger rights and rewards to prevent malicious behavior and blockchain fork problems,but it results in excessive resource consumption.Proof of Stake (PoS) [15],on the other hand,uses stake competition and“Coin Days”to measure node rights but sacrifices fair competition and decentralization characteristics of the blockchain.Practical Byzantine Fault Tolerance (PBFT)protocol [16] uses cryptographic technology and mutual voting to maintain consistency,but its communication complexity and high demand have limited its scalability.

    To solve these issues,this paper presents a dual-mode consensus protocol based on node identity authentication.The protocol divides the consensus process into two subprotocols: Check_BFT and Fast_BFT.By monitoring the behavior of the primary in Check_BFT to verify the primary’s identity,the Fast_BFT protocol is initiated if appropriate to allow the primary node to handle transactions alone.The protocol greatly improves consensus efficiency and reduces communication costs without relying on extensive resource consumption,while ensuring consistency and security.The particular contributions of this paper are:

    ? This paper introduces a node identity verification process and divides the protocol into two modes: preparatory mode Check_BFT subprotocol and fast consensus mode Fast_BFT subprotocol,which improves the performance and throughput of the protocol.

    ? In Check_BFT,this paper introduces an information verification process that allows all nodes to monitor the behavior of the primary to determine if its identity is honest without requiring client participation.

    ? Based on the authentication result of the primary,the Check_BFT determines whether to enter the Fast_BFT.There is no need to perform the regular view change.Which reduces communication consumption.

    ? In CF-BFT,this paper introduces two useful mechanisms.One is the node reputation mechanism and the other is the fast mode consensus number random mechanism.Which ensures the safety and decentralization of the blockchain effectively.

    The rest sections of this paper are organized as follows:The related work is discussed in Section 2;the overall design and implementation of CF-BFT are presented in detail in Section 3;the safety,consistency,and communication complexity of CF-BFT are comprehensively analyzed in Section 4;the performance evaluation and comparison results of CF-BFT are discussed in Section 5;the conclusion and prospect are concluded in Section 6.

    2 Related Work

    Most BFT protocols [17,18] have high complexity because they need to maintain consistency in the worst condition.However,the blockchain is not always in the worst condition.Because BFT consensus is based on the primary,some scholars have proposed improved methods based on primary selection and primary authentication.These protocols improve performance by avoiding selecting Byzantine nodes as primary.For example,Algorand [19],IBFT [20],Prosecurtor [21],and other protocols have added primary selection algorithms to select the honest node as primary by calculating the reputation of nodes.Another type of improvement method,such as Thunderella[22],Trust[23],and other protocols,improves protocol performance by monitoring primary behavior to identify whether nodes are honest or malicious.Thunderella monitors primary by the clients,and if there are problems with transactions,the client will report errors to the blockchain system and send the transaction information they sent.The blockchain system judges whether the primary is an honest node by analyzing the messages sent by the client.Trust builds a blockchain data structure or thirdparty that filters the malicious behavior of Byzantine nodes and improves protocol performance.The characteristics of some representative protocols are summarized in Table 1.

    One kind of method for improving consensus efficiency is to use dual-mode or multi-mode protocols.These protocols have two subprotocols typically: a fast subprotocol for optimistic conditions to increase performance and a backup subprotocol for extreme conditions to ensure safety and consistency.The characteristics of dual-mode protocols are summarized in Table 2.CheapBFT[24] consists of three subprotocols: the normal case protocol CheapTiny,the transition protocol CheapSwitch,and the fallback protocol MinBFT.During optimistic conditions,CheapTiny only requires f+1 active replicas to participate.Thunderella selects a committee and a primary called the Accelerator to quickly process messages if more than 3/4 nodes of the committee and primary are honest.Zyzzyva[25]assumes an optimistic condition but requires all nodes to be honest,with clients helping to converge to the total order of requests if nodes are faulty.AZyzzyva [26] separates the“fast path”and“slow path”of Zyzzyva using PANIC messages sent to replicas instead of“commitcertificate”messages sent to clients.SAZyzz[27]enhances scalability and reduces the communication complexity of both modes toO(logn)through a tree-based communication model,and SBFT [28]divides nodes into primary,commit collectors,and execution collectors,different sets can handle different phases without mutual voting.

    The aforementioned dual-mode protocols are proposed based on the number of honest nodes in the system and the identity of nodes that assume certain roles.In contrast,protocols such as Bolt-Dumbo [29],Jolteon-Ditto [30],and Flexico [31] are proposed based on synchronous and asynchronous environments.When the designated nodes are in a synchronous or weakly synchronous state,the fast protocol is used.When nodes are in an asynchronous environment,the backup protocol takes over the blockchain system to ensure safety.The Flexico protocol divides nodes into active nodes and passive nodes while setting a weakly synchronous network condition,where most active nodes can communicate within a known upper bound.

    Table 2:Comparison of dual-mode consensus protocols

    In conclusion,most consensus protocols have two directions for improvement.One approach is to enhance performance by increasing the selection algorithm for primary,which avoids selecting Byzantine nodes as primary.The other approach is to invoke appropriate subprotocols under different conditions,which ensures both security and consistency while improving protocol performance.

    3 CF-BFT Protocol

    This section introduces the CF-BFT protocol model,which is a dual-mode protocol based on node identity authentication and describes in detail the execution methods of the protocol in optimistic and pessimistic conditions.

    3.1 CF-BFT Protocol Overview

    CF-BFT protocol is divided into the Check_BFT subprotocol for the preparation and Fast_BFT subprotocol for the fast consensus,as shown in Fig.1.In Check_BFT,all nodes perform message computation and processing through mutual voting.At the same time,replicas monitor the behavior of the primary and detect whether the primary has any behavior that violates consistency or reduces protocol efficiency.In Fast_BFT,only the primary needs to process messages,and replicas only need to passively replicate messages transmitted by the primary.Thereby improving the protocol’s performance and reducing communication overhead.

    This paper assumes that CF-BFT consists of 3f+1 nodes,and the adversaries can controlfnodes at most.Each node has a key pair(including a public key and a private key)and a data structure to record the address,reputation of nodes,and other local data.Adversaries can control and coordinate malicious nodes to perform any destructive behavior that affects system consistency.As shown in Fig.2,consensus can be achieved using the Check_BFT or Fast_BFT protocol.

    Firstly,after selecting the primary,the protocol initiates a round of message consensus which is transmitted by the client and performs voting calculations in conjunction with the replicas.When 2f+1 nodes reach consensus,the message is considered to reply and enters the primary authentication phase.In the consensus phase,all replicas monitor the behavior of the primary.Subsequently,the primary initiates authentication voting.If the primary does not engage in malicious behavior that violates system consistency,the replicas will provide support votes.Otherwise,the replicas will cast opposing votes.

    Figure 1:Consensus nodes for Fast_BFT and Check_BFT protocols

    Figure 2:Overall operation of CF_BFT dual-mode protocol

    When the primary receives support votes from 2f+1 nodes,CF-BFT begins the fast consensus phase and runs the Fast_BFT subprotocol.At this point,the protocol calculates a random numberr,to determine the number of times the current primary can receive messages from the client.During fast consensus,only the primary needs to process messages,while other nodes passively replicate the messages sent by the primary.Each time a fast consensus is carried out,the number of consensuses,FastTime,increases,and when theFastTimereaches the specified upper limit,Fast_BFT ends.Subsequently,all nodes calculate the hash value of all messages in Fast_BFT and vote mutually to authenticate the result.If the result is consistent,the reputation value of the primary increases and the protocol switches to Check_BFT.Else,the most recentrmessages among honest nodes are converged.

    3.2 CF-BFT Protocol Overview

    Check_BFT is a distributed consistency protocol based on Byzantine fault tolerance technology.The notations used are summarized in Table 3.The total number of nodes isn=3f+1,and it can toleratefByzantine nodes.Check_BFT is divided into four phases.The phases arePrepare,Test,Commit,andVerify,as shown in Fig.3.In this protocol,replicas determine whether the primary is an honest node by monitoring its behavior.

    Table 3:Notations of symbols

    Figure 3:Check_BFT operation

    Specifically,the protocol first selects a primary p=vmodn.The client c sends a

    InPreparephase,the primary nodepbroadcasts thePREPAREmessage<to replicas after signing and encrypting the client message.If the primary fails to broadcast and reply to the message in the specified time,the replicas consider it a Byzantine node and switch to electing a new primary.

    InTestphase,the replicas receive and validate thePREPAREmessage sent by the primary.If the validation is successful,they broadcast aTESTmessage

    InCommitphase,the primary and all replicas participate in message submission and validation.If nodes consider the message to have passed theTestvalidation,it sends a

    In addition,the protocol introduces a random timeout mechanism to prevent the failure of the primary from disrupting the replication service.During the execution of each phase,the primary needs to complete the operation within a specified time.Otherwise,the replicas will consider it a faulty node and begin broadcasting to elect a new primary.This mechanism helps prevent such malicious behavior of the primary as the coordinating of faulty nodes or delayed communication.Which can disrupt the service’s safety and consistency.

    3.3 Fast_BFT Protocol

    Most consensus protocols are inefficient and require high communication costs because nodes need to prevent malicious behavior in distributed protocols,therefore need to verify each other through voting.However,if proving that the primary is an honest node,message validation and reply only need to be completed through the primary.The other replicas no longer need to verify messages and vote for each other.They only need to be responsible for receiving messages sent by the primary.Fast_BFT can be divided into the preparation phaseFast_Prepareand the submission phaseFast_Commit,as shown in Fig.4.

    Figure 4:Fast_BFT operation

    The specific process is as follows: a client sends awhereFastTimeis the number of messages processed by the primary in the Fast_BFT protocol.Upon receiving theFAST_PREPAREmessage,the replicas verify the signature and the consensus message count,store the message in a temporary message pool,and send the primary with a message

    3.4 Protocol Switching

    Most dual-mode or multi-mode consensus protocols assume an optimistic environment,executing fast consensus protocols.Once a fork or other disruption to consistency and performance occurs,the protocol falls back to a backup protocol for error repair.In contrast,the CF-BFT protocol assumes a pessimistic environment by default,using the Check_BFT protocol to detect whether the current environment is safe and whether the primary is an honest node.After confirming the security of the current environment,Fast_BFT is switched for processing messages.Therefore,in CF-BFT,protocol switching is simpler and faster than other multi-mode protocols.

    CF-BFT protocol applies a mode-switching scheme.In which the modes are switched by triggeringSWITCHFASTandSWITCHCHECKmessages.The following two conditions need to be met to trigger theSWITCHFASTmessage:

    ? The primary successfully reply a message in the Check_BFT for this view;

    ? More than 2freplicas do not detect malicious behavior from the primary.

    After replying to a message in Check_BFT,the primary initiates a protocol switching request,enters the nodeVerifyphase,and broadcasts aVERIFYmessage

    3.5 Fast_BFT Protocol’s Verification

    To further improve the safety of consensus and prevent adversary nodes from attacking the primary when it processes transactions alone,a fast protocol re-verify mechanism is introduced.When the number ofFastTimereaches the upper limitrof Fast_BFT,all nodes consider the current term of primary to be over and enter theFast_Verifyphase.The normal nodes calculate the hash valuehof the lastrreplied messages and broadcast a

    4 Theoretical Analysis of CF-BFT

    In this section,the safety,consistency,and communication complexity of the CF-BFT protocol is analyzed.

    4.1 Safety

    The Check_BFT and Fast_BFT subprotocols assume that there are 3f+1 nodes in the worst condition,wherefis the number of Byzantine nodes.Safety is ensured through mutually voting and keys between nodes.

    Lemma 1.In the Check_BFT protocol,if the primary is a Byzantine node,it can’t pass authentication,and a view change is initiated to elect a new primary.

    Proof.Assuming the primary is Byzantine,it signs and broadcasts verifiable messages,and the replicas receive and verify the results.Since there are at mostfByzantine nodes,replicas can receive at mostfvotes,which is not enough to enter the message submission phase.The message validation fails and a view change is initiated to elect a new primary.

    Lemma 2.In the Fast_BFT protocol,if the primary does not work properly,replicas elect a new primary.

    Proof.If the primary is attacked and becomes unresponsive,either by not responding to clients or not forwarding messages,the client sends a request message to all nodes after the timeout period.And the replicas initiate message validation and elect a new primary after detecting that the primary is unresponsive.This does not affect the final consensus result.

    4.2 Consistency

    Lemma 3.If the primary is a Byzantine node in the Check_BFT protocol and proposes different messages,conflicting messages cannot be submitted.

    Lemma 4.In the Fast_BFT protocol,if the primary tries to destroy consistency,the Fast_BFT validation phase ensures consistency.

    Proof.If the primary is attacked and sends different messages under the Fast_BFT protocol,it will temporarily cause different messages among the nodes.However,during the Fast_BFT validation phase,inconsistent messages can be detected,and the inconsistent messages will be rolled back for reverification.And correct messages will be verified for completeness and consistency while conflicting messages will be deleted to ensure consistency.

    4.3 Communication Complexity

    Here the communication costs of the protocols are calculated and compared.In the Check_BFT protocol,this paper set the average communication cost to beZcheckand the average communication cost to beZfastin the Fast_BFT.

    The average communication cost of the protocol is defined asZ,whereZminrepresents the communication cost in the best condition andZmaxrepresents the communication cost in the worst condition.A random variableμrepresents the number of times the primary processes messages in the Fast_BFT protocol.It is easy to prove that in the best condition:

    Compared to traditional BFT protocols which can tolerate up to 1/3 Byzantine nodes,in CF-BFT protocol,the worst case is when all 1/3 of the nodes are attacked and turn from honest to malicious during their terms.Therefore,the conditions for CF-BFT protocol to reach the worst case are more stringent,and the requirements for the optimistic condition are lower,as long as the malicious nodes do not attack during their extremely short terms.

    5 Performance Evaluation

    In this section,by comparing with traditional PBFT protocol,BFT-SmaRt,and other improved BFT protocols,as well as SAZyzz dual-mode protocol,the throughput and latency will be analyzed.One of the main objectives of test evaluation is to detect whether CF-BFT protocol still has an advantage over some traditional protocols in the worst condition of tolerating Byzantine nodes.The tests were conducted using a 2.10 GHz Intel(R)Xeon(R)5218R CPU and 8 GB RAM.

    5.1 Performance Comparison with BFT Protocols

    Consensus latency is one of the most critical metrics for evaluating consensus protocols.In the experiment,this paper varied the block size and ran tests with 4,8,16,32,and 64 nodes to measure the throughput and latency,using 512,1024,2048,4096,and 8192 transactions per block.The results are shown in Fig.5.As expected,the impact of increasing the number of nodes on protocol latency is not high when the block size is moderate.

    Fig.6 shows the impact of launching different numbers of nodes on the throughput and latency of CF-BFT,PBFT,BFT-SMaRt,and Hotstuff under the Bitcoin benchmark(256 bytes per transaction,1024 transactions per block).The experiment results show that the advantage of the CF-BFT protocol increases as the number of nodes increases.Due to the use of full broadcast,PBFT and other protocols are heavily influenced by the number of nodes,while CF-BFT protocol is less affected.Moreover,even in the worst-case scenario,CF-BFT still has advantages.

    The theoretical communication times of CF-BFT and PBFT are calculated as shown in Fig.7.Here,μrepresents the number of transactions processed by the primary in the Fast_BFT.The impact ofμ=10 andμ=20 on the number of communication are compared.The data shows that the larger number of nodes,the greater advantage of the CF-BFT protocol.

    5.2 Performance Comparison with Dual Mode Protocol

    This section compared CF-BFT in optimistic and worst conditions with the SAZyzz dual-mode protocol by setting a block size to 100–400 KB under 4,7,10,25,and 46 deployed nodes.Results are shown in Fig.8,CF-BFT protocol consistently outperformed SAZyzz,particularly with more nodes.CF-BFT has stricter worst condition requirements,where each malicious node must be flipped during its term,leading to a high usage rate of the fast protocol in practical applications.

    Figure 6:BFT protocols performance comparison

    Figure 7:Number of communications

    CF-BFT switches modes by triggeringSWITCHmessages,and the protocol switching time can be ignored.Compared to traditional dual-mode protocols that require a lot of resources to switch protocols,CF-BFT has a significant advantage in protocol switching speed.

    Figure 8:Dual-mode protocols performance comparison

    6 Conclusion

    This paper presents a node-authenticated CF-BFT dual-mode consensus protocol,consisting of Check_BFT and Fast_BFT subprotocols.By authenticating nodes before entering the fast protocol and implementing a simpler protocol switch,it outperforms previous BFT consensus protocols and other dual-mode protocols in terms of throughput and consensus efficiency.Unlike traditional dualmode protocols,the CF-BFT protocol defaults to a pessimistic condition and switches to the optimistic fast protocol only after node identity is verified.Therefore,even in the worst condition,CF-BFT also can significantly improve throughput and consensus efficiency.The advantages of the protocol become more pronounced as the number of nodes increases.In addition,to enhance the safety of the protocol and prevent attacks from Byzantine nodes,the CF-BFT provides the replica alert mechanism that can package evidence of the primary’s malfeasance and provide it to other nodes to ensure the correctness of main node identity authentication.Furthermore,the protocol introduces a node reputation mechanism,where nodes with higher reputation values are more likely to process transactions alone in the Fast_BFT.Test results show that CF-BFT outperforms traditional BFT protocols and other dual-mode protocols in all performance indicators.Under the premise of ensuring consistency and safety,it dramatically reduces communication costs and improves performance,providing more efficient and secure consensus services for blockchain systems.

    Based on the feature of CF-BFT protocol that does not require client nodes to participate in consensus and its high performance,it has potential application prospects in public chains,enterpriselevel chains,Internet of Things (IoT),financial services,and public services.It can be used in distributed systems in IoT,such as sensor data collection and processing,and security control;in distributed ledgers in financial services,such as insurance contract execution and securities trading settlement;as well as in distributed systems in public services,such as election voting and supply chain management.

    Currently,CF-BFT has been tested with a maximum of 64 nodes.However,in the case of a largescale Internet of Things network composed of more nodes,further research is needed to improve the performance of the CF-BFT.The next step is to improve the protocol in three aspects.Firstly,by using a pipelined consensus approach,reducing the computational difficulty of each primary.Secondly,the blockchain structure can be optimized by introducing a DAG graph-style structure [32] to improve efficiency.Thirdly,we can optimize the structure of the nodes by changing the communication method[33]to reduce consumption between nodes.

    Acknowledgement:The authors would like to thank the support of the Distributed Computing &BlockChain Lab,Henan University of Technology and Government,and the hard work of the editors and reviewers.

    Funding Statement:The authors are supported by the Key Laboratory of Network Password Technology in Henan Province,China(LNCT2022-A20);the Major Science and Technology Special Project of Henan Province,China (Nos.201300210100,201300210200);the Key Scientific Research Project of Higher Education Institutions in Henan Province,China(No.23ZX017);the Key Special Project for Science and Technology Collaborative Innovation in Zhengzhou City,Henan Province,China(No.21ZZXTCX07);and the Key Science and Technology Project of Henan Province,China (No.232102211082).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Zhiruo Zhang,Xinlei Liu,Feng Wang;data collection:Zhiruo Zhang,Yang Lu,Feng Wang;code development: Zhiruo Zhang,Xinlei Liu;analysis and interpretation of results: Zhiruo Zhang,Feng Wang;draft manuscript preparation:Zhiruo Zhang,Feng Wang;supervision:Feng Wang,Yang Liu;project administration:Feng Wang,Yang Liu.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The datasets used and analysed during the current study are available from the first author on reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产日韩欧美在线精品| 久久精品国产a三级三级三级| 露出奶头的视频| 在线观看免费视频日本深夜| 两个人看的免费小视频| 欧美日韩中文字幕国产精品一区二区三区 | 国产无遮挡羞羞视频在线观看| 五月天丁香电影| 每晚都被弄得嗷嗷叫到高潮| avwww免费| 日韩视频一区二区在线观看| 99久久精品国产亚洲精品| 日日夜夜操网爽| 亚洲中文字幕日韩| 亚洲成人国产一区在线观看| 麻豆av在线久日| 欧美成人免费av一区二区三区 | 不卡av一区二区三区| 国产精品影院久久| 国产欧美亚洲国产| 日本一区二区免费在线视频| 日日夜夜操网爽| 丝袜在线中文字幕| av有码第一页| 亚洲伊人久久精品综合| 美国免费a级毛片| 老熟女久久久| 亚洲九九香蕉| 亚洲精品乱久久久久久| 亚洲一区中文字幕在线| 天天影视国产精品| av网站免费在线观看视频| 狂野欧美激情性xxxx| 一区二区三区国产精品乱码| 国产男靠女视频免费网站| 日韩熟女老妇一区二区性免费视频| 亚洲天堂av无毛| 国产一区二区 视频在线| 一级a爱视频在线免费观看| av网站在线播放免费| 又黄又粗又硬又大视频| 亚洲国产看品久久| 亚洲精华国产精华精| 一级片'在线观看视频| 夜夜骑夜夜射夜夜干| 日韩欧美国产一区二区入口| videosex国产| 色婷婷av一区二区三区视频| 99国产精品一区二区三区| 色在线成人网| 满18在线观看网站| 国产精品免费大片| 一边摸一边做爽爽视频免费| av视频免费观看在线观看| 久久亚洲真实| 91大片在线观看| 亚洲欧美日韩另类电影网站| 一本一本久久a久久精品综合妖精| 99riav亚洲国产免费| av一本久久久久| 手机成人av网站| 亚洲国产看品久久| 国产精品久久久久久人妻精品电影 | 建设人人有责人人尽责人人享有的| 热99久久久久精品小说推荐| tocl精华| 一区二区三区国产精品乱码| 色在线成人网| 99国产精品一区二区蜜桃av | 国产精品久久久久久精品电影小说| 国产又爽黄色视频| 亚洲精品自拍成人| 91大片在线观看| 精品国产亚洲在线| 欧美日韩中文字幕国产精品一区二区三区 | 日日爽夜夜爽网站| 极品少妇高潮喷水抽搐| 久久国产精品大桥未久av| 亚洲人成伊人成综合网2020| 老司机深夜福利视频在线观看| 日韩成人在线观看一区二区三区| 少妇裸体淫交视频免费看高清 | 男女下面插进去视频免费观看| 老司机福利观看| 久久精品亚洲熟妇少妇任你| 午夜福利一区二区在线看| 久久精品91无色码中文字幕| 亚洲欧美日韩高清在线视频 | 99久久精品国产亚洲精品| 成人永久免费在线观看视频 | 色综合欧美亚洲国产小说| 老司机亚洲免费影院| 美女午夜性视频免费| 99国产精品一区二区蜜桃av | 中文亚洲av片在线观看爽 | 后天国语完整版免费观看| 黄色怎么调成土黄色| 12—13女人毛片做爰片一| 国产午夜精品久久久久久| 精品国产乱码久久久久久小说| 国产免费视频播放在线视频| 亚洲国产看品久久| 成人黄色视频免费在线看| 窝窝影院91人妻| 日韩免费av在线播放| 亚洲性夜色夜夜综合| 一本色道久久久久久精品综合| 免费在线观看视频国产中文字幕亚洲| 在线永久观看黄色视频| 欧美日韩一级在线毛片| 夜夜骑夜夜射夜夜干| avwww免费| 欧美亚洲 丝袜 人妻 在线| 精品一区二区三区av网在线观看 | 亚洲国产欧美一区二区综合| 丰满迷人的少妇在线观看| 国产无遮挡羞羞视频在线观看| 亚洲精品国产精品久久久不卡| 亚洲伊人久久精品综合| 一级a爱视频在线免费观看| 美女高潮喷水抽搐中文字幕| 日本撒尿小便嘘嘘汇集6| 国产精品熟女久久久久浪| 国产精品香港三级国产av潘金莲| 欧美精品一区二区免费开放| 丰满少妇做爰视频| 少妇被粗大的猛进出69影院| 操出白浆在线播放| 岛国在线观看网站| 精品少妇黑人巨大在线播放| 亚洲伊人久久精品综合| 激情在线观看视频在线高清 | 黄片大片在线免费观看| 亚洲午夜理论影院| 国产不卡一卡二| 这个男人来自地球电影免费观看| 成人精品一区二区免费| 成年动漫av网址| 男女边摸边吃奶| 脱女人内裤的视频| 在线观看一区二区三区激情| 久久精品亚洲av国产电影网| 天天躁日日躁夜夜躁夜夜| 在线观看一区二区三区激情| 高清毛片免费观看视频网站 | 日本vs欧美在线观看视频| 免费在线观看视频国产中文字幕亚洲| 日本精品一区二区三区蜜桃| 亚洲第一欧美日韩一区二区三区 | 精品免费久久久久久久清纯 | 亚洲熟女毛片儿| 久久久水蜜桃国产精品网| 亚洲人成伊人成综合网2020| 国产老妇伦熟女老妇高清| 国产精品国产av在线观看| 欧美成狂野欧美在线观看| 成人精品一区二区免费| 蜜桃在线观看..| 最黄视频免费看| 一区二区三区乱码不卡18| 成年动漫av网址| 欧美精品一区二区免费开放| 成年人午夜在线观看视频| 亚洲国产欧美日韩在线播放| 亚洲七黄色美女视频| 亚洲精品国产色婷婷电影| 欧美亚洲日本最大视频资源| 满18在线观看网站| 美女福利国产在线| 国产免费av片在线观看野外av| 69精品国产乱码久久久| 国产精品久久久久久精品电影小说| 人妻一区二区av| 国产麻豆69| a级毛片黄视频| 人妻一区二区av| 免费不卡黄色视频| 国产亚洲一区二区精品| 免费女性裸体啪啪无遮挡网站| 多毛熟女@视频| 欧美亚洲日本最大视频资源| 亚洲黑人精品在线| 大片免费播放器 马上看| 日韩视频在线欧美| 国产精品美女特级片免费视频播放器 | 人妻 亚洲 视频| 欧美精品一区二区免费开放| 成年人午夜在线观看视频| 十八禁网站免费在线| 国产精品亚洲av一区麻豆| 黄网站色视频无遮挡免费观看| 91成年电影在线观看| 多毛熟女@视频| 久久久久久久国产电影| 电影成人av| 久久国产亚洲av麻豆专区| avwww免费| 精品熟女少妇八av免费久了| 久久精品亚洲熟妇少妇任你| 人人妻人人澡人人爽人人夜夜| av网站在线播放免费| 免费在线观看影片大全网站| 久久精品成人免费网站| 亚洲成人手机| 亚洲av美国av| 大片电影免费在线观看免费| www.自偷自拍.com| 中国美女看黄片| 在线观看免费高清a一片| 午夜福利欧美成人| 久久久精品国产亚洲av高清涩受| 亚洲欧美日韩另类电影网站| 亚洲av日韩在线播放| 淫妇啪啪啪对白视频| 精品亚洲乱码少妇综合久久| 如日韩欧美国产精品一区二区三区| 天天躁日日躁夜夜躁夜夜| 欧美老熟妇乱子伦牲交| 久久久久久亚洲精品国产蜜桃av| 日本黄色视频三级网站网址 | 可以免费在线观看a视频的电影网站| 另类精品久久| 电影成人av| 色播在线永久视频| 高清视频免费观看一区二区| 国产精品欧美亚洲77777| 午夜精品国产一区二区电影| 99riav亚洲国产免费| 亚洲专区字幕在线| 亚洲熟妇熟女久久| 两个人看的免费小视频| 精品一区二区三卡| 日本wwww免费看| 中文亚洲av片在线观看爽 | 自拍欧美九色日韩亚洲蝌蚪91| 999久久久精品免费观看国产| 50天的宝宝边吃奶边哭怎么回事| 狠狠精品人妻久久久久久综合| 69av精品久久久久久 | 午夜福利免费观看在线| 久久ye,这里只有精品| 免费黄频网站在线观看国产| 免费在线观看黄色视频的| 欧美性长视频在线观看| 90打野战视频偷拍视频| 久久国产精品人妻蜜桃| 在线观看免费视频网站a站| 日本一区二区免费在线视频| 欧美亚洲日本最大视频资源| 亚洲av国产av综合av卡| 在线 av 中文字幕| 性高湖久久久久久久久免费观看| 丰满迷人的少妇在线观看| 国产xxxxx性猛交| 国产成人av教育| 侵犯人妻中文字幕一二三四区| 老司机影院毛片| 91大片在线观看| 美女午夜性视频免费| 一区二区av电影网| 蜜桃国产av成人99| 十八禁人妻一区二区| 无限看片的www在线观看| 亚洲熟妇熟女久久| 青青草视频在线视频观看| 午夜福利视频在线观看免费| 精品国产乱码久久久久久小说| 亚洲五月色婷婷综合| 香蕉丝袜av| xxxhd国产人妻xxx| 国产精品免费一区二区三区在线 | 久久久久久久久免费视频了| 欧美黑人精品巨大| 性少妇av在线| 日韩免费av在线播放| 桃红色精品国产亚洲av| 国产精品99久久99久久久不卡| 久久中文字幕人妻熟女| 亚洲中文日韩欧美视频| av有码第一页| 日日爽夜夜爽网站| 成年人免费黄色播放视频| 欧美成人免费av一区二区三区 | 两个人免费观看高清视频| 性少妇av在线| 精品亚洲乱码少妇综合久久| 久久这里只有精品19| 黄色 视频免费看| 久久免费观看电影| a级毛片黄视频| 欧美日韩亚洲综合一区二区三区_| 精品一区二区三区av网在线观看 | 成年女人毛片免费观看观看9 | 国产不卡一卡二| av片东京热男人的天堂| 男人舔女人的私密视频| 久久久国产成人免费| 亚洲欧美精品综合一区二区三区| 久久久久久久久久久久大奶| 岛国在线观看网站| 亚洲av日韩在线播放| 在线观看舔阴道视频| 美女高潮到喷水免费观看| av天堂久久9| 国产主播在线观看一区二区| av又黄又爽大尺度在线免费看| 国产精品影院久久| 性少妇av在线| 国产日韩欧美亚洲二区| 国产一区二区在线观看av| 悠悠久久av| 大香蕉久久成人网| 一边摸一边做爽爽视频免费| 日韩大码丰满熟妇| 美女国产高潮福利片在线看| 亚洲精品中文字幕一二三四区 | 久久亚洲真实| 777久久人妻少妇嫩草av网站| 国产欧美日韩一区二区精品| 国产1区2区3区精品| 欧美老熟妇乱子伦牲交| 久久国产精品人妻蜜桃| 亚洲男人天堂网一区| 国产精品 欧美亚洲| 亚洲欧美色中文字幕在线| 亚洲成a人片在线一区二区| 伊人久久大香线蕉亚洲五| 欧美成狂野欧美在线观看| 亚洲欧美激情在线| 久久性视频一级片| 久久久精品区二区三区| 桃红色精品国产亚洲av| 另类精品久久| 久久香蕉激情| 少妇粗大呻吟视频| 69精品国产乱码久久久| 18禁观看日本| 黄色片一级片一级黄色片| 婷婷成人精品国产| 欧美日韩福利视频一区二区| 自线自在国产av| 欧美日韩一级在线毛片| 欧美+亚洲+日韩+国产| 国产av又大| 国产日韩欧美视频二区| 十八禁人妻一区二区| 女同久久另类99精品国产91| 大香蕉久久成人网| 老汉色∧v一级毛片| 日本av免费视频播放| 国产精品亚洲一级av第二区| 高清毛片免费观看视频网站 | 最近最新中文字幕大全电影3 | 欧美日本中文国产一区发布| av国产精品久久久久影院| 深夜精品福利| 窝窝影院91人妻| 成年人免费黄色播放视频| 怎么达到女性高潮| 女性生殖器流出的白浆| 中文字幕高清在线视频| 精品国产一区二区三区久久久樱花| 9191精品国产免费久久| 黄色视频,在线免费观看| 99九九在线精品视频| 十八禁网站免费在线| xxxhd国产人妻xxx| videosex国产| 成人永久免费在线观看视频 | 亚洲三区欧美一区| 91国产中文字幕| 亚洲三区欧美一区| 一区在线观看完整版| 悠悠久久av| 在线观看免费午夜福利视频| 狠狠精品人妻久久久久久综合| 国产极品粉嫩免费观看在线| 精品亚洲乱码少妇综合久久| 久久精品国产99精品国产亚洲性色 | 精品国产一区二区三区久久久樱花| 亚洲欧美一区二区三区久久| 精品免费久久久久久久清纯 | 一区二区日韩欧美中文字幕| www.熟女人妻精品国产| 宅男免费午夜| 我的亚洲天堂| 国产欧美亚洲国产| 咕卡用的链子| 精品免费久久久久久久清纯 | 亚洲欧美激情在线| 满18在线观看网站| 欧美日韩视频精品一区| 在线观看舔阴道视频| 日韩欧美三级三区| 国产成人欧美在线观看 | 亚洲人成电影观看| 中文字幕人妻丝袜制服| 国产精品久久电影中文字幕 | 怎么达到女性高潮| 久久中文看片网| 久久久国产一区二区| 男女午夜视频在线观看| 操出白浆在线播放| 亚洲精品在线美女| 久久久久久久精品吃奶| 日日爽夜夜爽网站| 国产淫语在线视频| 中文欧美无线码| 成年版毛片免费区| 成在线人永久免费视频| 夫妻午夜视频| 国产日韩欧美亚洲二区| 视频在线观看一区二区三区| 女性被躁到高潮视频| 人人妻人人澡人人爽人人夜夜| 黑人猛操日本美女一级片| 丝瓜视频免费看黄片| 嫁个100分男人电影在线观看| 不卡av一区二区三区| 免费高清在线观看日韩| 国产精品一区二区免费欧美| 国产又色又爽无遮挡免费看| 国产黄色免费在线视频| 天天躁日日躁夜夜躁夜夜| 国产欧美日韩精品亚洲av| 国产激情久久老熟女| 久久久精品区二区三区| 日本a在线网址| 黄色怎么调成土黄色| 在线永久观看黄色视频| 老司机午夜十八禁免费视频| 精品国产亚洲在线| 久久中文字幕人妻熟女| 精品第一国产精品| 在线观看一区二区三区激情| 久久九九热精品免费| 美女福利国产在线| 免费在线观看完整版高清| 欧美日韩一级在线毛片| 下体分泌物呈黄色| 国产精品一区二区在线观看99| 一级毛片电影观看| 搡老岳熟女国产| 国产欧美日韩综合在线一区二区| 一本综合久久免费| 久久久国产精品麻豆| 国产日韩一区二区三区精品不卡| 巨乳人妻的诱惑在线观看| 久久精品人人爽人人爽视色| 高清在线国产一区| 制服诱惑二区| 在线观看免费视频日本深夜| av网站免费在线观看视频| 高清欧美精品videossex| 久久国产精品男人的天堂亚洲| 久久这里只有精品19| 亚洲中文字幕日韩| a级毛片在线看网站| 国产亚洲精品一区二区www | 国产伦理片在线播放av一区| 亚洲人成伊人成综合网2020| 老熟妇仑乱视频hdxx| 嫁个100分男人电影在线观看| 老司机在亚洲福利影院| 亚洲七黄色美女视频| 免费日韩欧美在线观看| 91av网站免费观看| 99久久99久久久精品蜜桃| 国产亚洲欧美在线一区二区| 久久这里只有精品19| 99九九在线精品视频| 日韩三级视频一区二区三区| 国产高清videossex| 在线观看免费视频网站a站| 亚洲人成电影免费在线| 欧美日韩黄片免| 欧美亚洲 丝袜 人妻 在线| 9热在线视频观看99| 国产福利在线免费观看视频| netflix在线观看网站| 天堂动漫精品| 搡老乐熟女国产| 精品国产一区二区三区四区第35| 欧美黄色淫秽网站| 日韩欧美国产一区二区入口| 欧美日韩福利视频一区二区| 不卡一级毛片| 青草久久国产| 亚洲熟女毛片儿| 午夜福利在线观看吧| 欧美日韩精品网址| 亚洲一码二码三码区别大吗| 久久精品亚洲精品国产色婷小说| 91成年电影在线观看| 99九九在线精品视频| 成在线人永久免费视频| 丰满少妇做爰视频| 国产av精品麻豆| 搡老熟女国产l中国老女人| 老司机影院毛片| 午夜日韩欧美国产| 日韩视频一区二区在线观看| 真人做人爱边吃奶动态| 91成年电影在线观看| 亚洲欧美一区二区三区久久| 91成年电影在线观看| 午夜91福利影院| 国产有黄有色有爽视频| 我要看黄色一级片免费的| 久久中文字幕人妻熟女| 精品国产国语对白av| 捣出白浆h1v1| 亚洲精品av麻豆狂野| 老汉色av国产亚洲站长工具| 国产av国产精品国产| 久久久国产精品麻豆| 久久 成人 亚洲| 国产精品九九99| 中文字幕高清在线视频| 大香蕉久久网| 亚洲成人手机| 久久国产精品大桥未久av| 免费在线观看日本一区| 国产精品二区激情视频| 99精品在免费线老司机午夜| 成人免费观看视频高清| 国产免费视频播放在线视频| 91成年电影在线观看| 咕卡用的链子| 久久中文字幕一级| 国产在视频线精品| 99国产综合亚洲精品| 亚洲自偷自拍图片 自拍| 亚洲七黄色美女视频| 天天躁日日躁夜夜躁夜夜| 精品国产一区二区三区久久久樱花| 一区二区三区乱码不卡18| 天堂中文最新版在线下载| 一边摸一边抽搐一进一出视频| 高清黄色对白视频在线免费看| 一边摸一边抽搐一进一出视频| 老鸭窝网址在线观看| 少妇 在线观看| 久久亚洲真实| 麻豆乱淫一区二区| tocl精华| 亚洲av成人不卡在线观看播放网| 精品一区二区三区四区五区乱码| 亚洲精品在线观看二区| 99热网站在线观看| av线在线观看网站| 国产成人免费观看mmmm| 国产精品久久久av美女十八| 午夜久久久在线观看| 日韩欧美一区视频在线观看| 成人影院久久| 欧美激情 高清一区二区三区| 人人妻人人添人人爽欧美一区卜| 日本黄色日本黄色录像| 久久青草综合色| 五月开心婷婷网| 日日摸夜夜添夜夜添小说| 一个人免费在线观看的高清视频| 精品卡一卡二卡四卡免费| 日韩欧美一区二区三区在线观看 | 久久久久久久精品吃奶| 亚洲专区国产一区二区| 嫁个100分男人电影在线观看| 老司机靠b影院| 精品国产一区二区久久| 国产日韩欧美亚洲二区| 精品午夜福利视频在线观看一区 | 国产精品av久久久久免费| 成年人午夜在线观看视频| 久久天躁狠狠躁夜夜2o2o| 一边摸一边做爽爽视频免费| 欧美成狂野欧美在线观看| 亚洲全国av大片| 最新在线观看一区二区三区| 国产精品麻豆人妻色哟哟久久| 法律面前人人平等表现在哪些方面| 国产91精品成人一区二区三区 | 国产一区二区三区综合在线观看| 一级毛片精品| 亚洲精品国产精品久久久不卡| netflix在线观看网站| 亚洲国产精品一区二区三区在线| 午夜激情av网站| 欧美乱妇无乱码| 老熟女久久久| av又黄又爽大尺度在线免费看| av在线播放免费不卡| 久久久精品94久久精品| 黄片小视频在线播放| 黄片播放在线免费| videosex国产| 中文字幕精品免费在线观看视频| 狠狠狠狠99中文字幕| 久热爱精品视频在线9| 亚洲av欧美aⅴ国产| 国产无遮挡羞羞视频在线观看| 国产国语露脸激情在线看| 新久久久久国产一级毛片| 国产亚洲午夜精品一区二区久久| 天堂动漫精品| 咕卡用的链子| av超薄肉色丝袜交足视频| 一边摸一边做爽爽视频免费| 国产熟女午夜一区二区三区| 大型黄色视频在线免费观看| 亚洲综合色网址| 国产一卡二卡三卡精品| 中文字幕最新亚洲高清| 国产在线免费精品| 日韩免费高清中文字幕av|