• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking

    2023-10-26 13:14:02ArifHussainMagsiGhulamMuhammadSajidaKarimSaifullahMemonandZulfiqarAli
    Computers Materials&Continua 2023年9期

    Arif Hussain Magsi ,Ghulam Muhammad ,Sajida Karim ,Saifullah Memon and Zulfiqar Ali

    1State Key Laboratory of Networking and Switching Technology,Beijing University of Post and Telecommunication,Beijing,100876,China

    2Department of Computer Engineering,College of Computer and Information Sciences,King Saud University,Riyadh,11543,Saudi Arabia

    3School of Computer Science and Technology,Harbin Institute of Technology,Harbin,150001,China

    4School of Computer Science and Electronic Engineering,University of Essex,Colchester,CO4 3SQ,UK

    ABSTRACT Recent advancements in the Vehicular Ad-hoc Network (VANET) have tremendously addressed road-related challenges.Specifically,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding features.However,the NDN communication framework fails to address two important issues.The current NDN employs a pull-based content retrieval network,which is inefficient in disseminating crucial content in Vehicular Named Data Networking(VNDN).Additionally,VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles.Although various solutions have been proposed for detecting vehicles’behavior,they inadequately addressed the challenges specific to VNDN.To deal with these two issues,we propose a novel push-based crucial content dissemination scheme that extends the scope of VNDN from pullbased content retrieval to a push-based content forwarding mechanism.In addition,we exploit Machine Learning(ML)techniques within VNDN to detect the behavior of vehicles and classify them as attackers or legitimate.We trained and tested our system on the publicly accessible dataset Vehicular Reference Misbehavior(VeReMi).We employed five ML classification algorithms and constructed the best model for illusion attack detection.Our results indicate that Random Forest(RF)achieved excellent accuracy in detecting all illusion attack types in VeReMi,with an accuracy rate of 100% for type 1 and type 2,96% for type 4 and type 16,and 95% for type 8.Thus,RF can effectively evaluate the behavior of vehicles and identify attacker vehicles with high accuracy.The ultimate goal of our research is to improve content exchange and secure VNDN from attackers.Thus,our ML-based attack detection and prevention mechanism ensures trustworthy content dissemination and prevents attacker vehicles from sharing misleading information in VNDN.

    KEYWORDS Named data networking;vehicular networks;pull-push;illusion attack;machine learning

    1 Introduction

    The continuous growth in the number of traditional vehicles has posed a significant threat to the safety of both drivers and passengers.According to an estimation in 2015,vehicles will increase twofold in the next 10 to 20 years [1].The World Health Organization (WHO) predicts that road accidents will be the fifth leading cause of mortality by 2030 [2].To cope with these issues,the Vehicular Ad-hoc Network(VANET)[3]has emerged as an indispensable solution for mitigating road accidents and traffic congestion.VANET-enabled vehicles can communicate as Vehicle-to-Vehicle(V2V),Vehicle-to-Pedestrians(V2P),and Vehicle-to-Infrastructure(V2I)[4]through Dedicated Short-Range Communication(DSRC),as illustrated in Fig.1.

    Figure 1:Content forwarding in VNDN

    VANET-enabled vehicles are different from traditional vehicles;they are empowered with an Onboard Unit (OBU),which has computation,storage,and communication capabilities.However,the current VANET encounters several communication challenges due to the traditional Transmission Control Protocol/Internet Protocol(TCP/IP)[5].TCP/IP is a host-centric,connection-oriented,and end-to-end communication system.TCP/IP must establish a connection before data transmission,which cannot support high mobility and intermittent connectivity in VANET[6].As a result,Quality of Service (QoS) [7] leads to network degradation.The VANET is an extremely unbounded and intermittent network where nodes are interested in content rather than the source.

    Alternatively,Named Data Networking (NDN) [8] has appeared as a special implementation of Information-Centric Networks (ICN) [9].NDN is poised to be a promising candidate for nextgeneration internet architecture that considers content a“first-class citizen”.This advancement has several benefits,including reduced overhead,lower latency,energy efficiency,and eliminating senderreceiver dependency.Particularly,the in-network content caching has significantly reduced latency in NDN.In contrast to traditional IP-based network architecture,NDN leverages content names to retrieve data without considering the content provider or its location.The naming structure in NDN follows a unique hierarchical structure separated by“/”.In NDN,the content transmission uses two key packet types:interestanddata.

    NDN employs a pull-based request-response model to retrieve the content,where the content is delivered in response to specific consumer requests.Each vehicle in the Vehicular NDN(VNDN)holds three different data structures.1.Content Store(CS):The CS is an onboard storage component that temporarily caches the data to facilitate neighboring vehicles to access the content locally.The CS serves the consumer when the requested interest packet matches the content in the CS.2.Pending Interest Table(PIT):It is a table that maintains a record of all the interest packets and their associated interfaces that have not yet been delivered to the consumers.3.Forwarding Information Base(FIB):It maintains the name prefixes of the next hop interface where interest is to be forwarded.

    Despite its numerous capabilities,NDN has two significant limitations.The first limitation is associated with its reliance on a pull-based communication mechanism.In this approach,the consumer expresses interest in a specific piece of data by transmitting an interest packet.The network then forwards the interest packet to the producer,which responds to the consumer with a data packet.It is important to note that the producer can only respond to the content once the consumer initiates an interest request.However,this request-response-based communication mechanism fails to disseminate crucial content to the vehicles in an emergency and introduces an undesirable delay.In VNDN,a vehicle should be able to disseminate the crucial content among its neighboring vehicles without considering interest packet requests.On the other hand,push-based communication is a producerdriven approach where the producer initiates data transmission without waiting for a consumer’s request.

    Several studies in the literature have proposed push-based content dissemination approaches to enable the vehicles to propagate crucial data.The authors in[10]introduced a push-based layer-2 beacon forwarding mechanism among roadside units(RSUs)via one more intermediate vehicle.However,including payload in beacon messages within VNDN leads to increased latency.Similarly,reference[11] considered betweenness centrality to forward the push-based content using Publish-Subscribe(pub-sub)scheme.In pub-sub communication,consumers subscribe to the topic of their interest.When a producer publishes topic-related data,the network delivers it to all subscribed consumers.However,pub-sub cannot be suitable for disseminating crucial content in VNDN.In VNDN,every node must receive crucial content,such as emergency information,without a subscription.

    Unlike existing layer-2 beacon message forwarding schemes and pub-sub-oriented mechanisms,we consider the interest packet naming structure as a candidate for disseminating crucial information among neighboring vehicles.Instead of including a payload for disseminating crucial content or relying on consumer nodes to subscribe,we leverage an interest packet naming structure.Our proposed naming structure contains crucial information within the name of the interest packet.To disseminate the crucial content,we consider the opaque naming structure in NDN,which utilizes interest packets according to the network application requirements.Thus,our proposed push-based content dissemination outperforms existing approaches because this scheme neither contains a payload nor waits for consumers to request specific content.

    Secondly,NDN is highly vulnerable to various attacks[12]with severe implications,especially in the context of VNDN,where human lives are directly involved.In VNDN,the illusion of attacker vehicles can disseminate invalid information among their neighboring vehicles.For instance,an illusion attacker vehicle informs its neighboring vehicles about the traffic jam in a particular location.In contrast,there is no traffic jam at the corresponding location.Due to such bogus information dissemination,trust between vehicles can be compromised.Therefore,it is essential to consider the existence of attacker vehicles during crucial content dissemination.They can jeopardize road safety with several attacks,including content pollution attacks(CPA),Distributed Denial of Services(DDoS)attacks[13],and illusion attacks[14].

    To identify and prevent these attacks,Machine Learning(ML)plays a significant role in learning from previous behavior and predicting their behavior with high accuracy.Conversely,traditional rulebased systems and other conventional methods are limited by the explicit knowledge programmed into them.In contrast,ML models can uncover and leverage complex patterns and relationships within data that are difficult or impossible to capture with traditional methods.Additionally,ML can handle large amounts of data,making it well-suited for complex and dynamic problem domains.It can be adapted to new data and situations,making it a flexible and robust approach.

    Prior research has made noteworthy contributions to mitigating several attacks using ML techniques.In[15],the Deep Learning(DL)techniques were exploited to detect the misbehavior of vehicles using the Vehicular Reference Misbehavior(VeReMi)dataset[16].The authors in[17–21]proposed a misbehavior detection system based on ML in VANET.Another work in[22]utilized ML and DL for misbehavior detection in VANET.However,these studies provided learning-based solutions with fewer classifiers,and none of them mentioned above exploited the misbehavior detection system in VNDN.

    Unlike the above-mentioned research,we initially address crucial content dissemination using an interest packet naming structure.We utilize the interest packet naming structure to disseminate the crucial content among neighboring vehicles.Secondly,we enable vehicles to identify and prevent illusion attackers in VNDN.To achieve our goal,we evaluate the effectiveness of five ML classifiers and exhibit the best algorithm for detecting illusion attacker vehicles.To the best of our knowledge,this research article presents a novel contribution that exploits interest packet naming structure for disseminating crucial messages among neighboring vehicles in VNDN.Additionally,our ML-based misbehavior detection system identifies and prevents attacker vehicles.The key contributions of this research are as follows:

    ? We propose push-based crucial content dissemination using an interest packet naming structure without violating the native interest-data architecture of NDN.

    ? We enable the vehicles to classify the illusion attacker and the legitimate vehicles using ML techniques.By leveraging ML evaluation,vehicles can act or reject crucial information.

    ? We evaluate the performance of five ML classifiers and identify the most accurate classifier to detect illusion attacker vehicles.

    The rest of the article is structured as follows:Section 2 outlines related work in push-based content dissemination and ML-based misbehavior detection in VANET.Section 3 presents a push-based information dissemination architecture.We evaluate the ML classifiers’performance in Section 4.Section 5 exhibits the experimental results.Section 6 concludes the paper.We present the future work in Section 7.

    2 Related Work

    VNDN has emerged as a promising communication paradigm for Intelligent Transportation Systems (ITS),enabling efficient data dissemination among vehicles and infrastructure.Push-based content dissemination has been proposed to address pull-based content dissemination challenges,and ML techniques have been introduced to detect attacker vehicles in VNDN.This section reviews the related work on push-based crucial content dissemination and ML-oriented misbehavior detection systems in VNDN.We divide the related work into two categories,which are described below.

    2.1 Push-Based Content Dissemination

    The push-based content dissemination is an excellent addition to NDN,particularly in VANET,where emergency messages cannot wait for consumers to request the content.Although VNDN has been studied over the last decade,push-based techniques are still in the infancy stages of study.Yaqub et al.[23] modified vanilla NDN by introducing a single interest with multiple data packets.They modified the interest packet format with an additional field Crucial Data (cData),which indicates that the consumer requests crucial data.Upon identifying the crucial data request,the nodes with a 1-hop must store crucial information in PIT until the corresponding PIT entry expires.Another push-based routing mechanism in[11]proposed a hyperbolic forwarding scheme that exploits the betweenness and popularity of nodes.Similar to pub-sub,a hyperbolic push-based mechanism introduces a new table named Pending Data Table(PDT),which stores every pushed interest packet.PDT never expires even after content has been served.This architecture enables the consumer nodes to push interest packets with their coordinates.Based on the PDT,the intermediate node forwards the interest packet to the nearest producers.

    Moreover,authors in[24] proposed a push-based critical content dissemination approach using beacon messages to advertise crucial messages among nearby RSUs.Subsequently,neighboring nodes send interest packets to receive the critical content.Similarly,reference[10]presented a pushbased beacon message dissemination scheme in VNDN.Another work in [25] proposed a beacon message-oriented emergency message dissemination in VANET.In addition,the pub-sub paradigm has gained significant attention in the literature.Reference[26]introduced a group-based pub-sub content dissemination scheme that enables the nodes to subscribe to the specific content of their interest within a particular group.They proposed a subscription controller that holds various subscription topics.The pub-sub architecture in[27–29]has significantly contributed to pushing infotainment,news,and advertisement services among subscribers.However,this scheme is infeasible for dynamic critical content dissemination,where neighboring nodes must receive crucial content without a subscription.Table 1 summarizes and presents the limitations of existing push-based content dissemination.

    Table 1:Summarized push-based related works and their limitations

    Unlike the push-based content dissemination mentioned in VNDN,we utilize an interest packet naming structure to deliver crucial information among neighboring vehicles.Our push-based approach can disseminate crucial information without any subscription or payload.

    2.2 Misbehavior Detection

    Disseminating false information among vehicles in VANETs can result in severe accidents and other safety hazards[30].It has been a significant concern for academia and industry for many years.The impact of attacks in VANET can be devastating,with disruption to public safety and business activities leading to significant loss of life and property.Existing literature has actively exploited several strategies to cope with attacks,including static threshold-based content identification,prevention,and cryptographic solutions.Authors in[31]exploited ML and DL-based misbehavior detection systems to identify and predict the behavior of vehicles.We present each misbehavior detection technique separately as follows:

    2.2.1 Non-Learning-Based Misbehavior Detection

    Authors in [32] proposed a reputation-based content identification system in which vehicles evaluate the credibility of content senders before relying on their content.This approach considers content trustworthy if the sender’s reputation meets a specified threshold value.The vehicles then share the reputation with a trusted authority.The authors in reference[33]examined the level of cooperation and selfishness among relay vehicles based on their ability to forward packets to the intended receiver.This architecture considers vehicles cooperative if they meet a specified threshold value,while those without a threshold value are considered selfish.Khelifi et al.[34]proposed a static threshold-based reputation evaluation system for content producer vehicles.Each vehicle has an initial reputation value in this system,updated according to its behavior.

    Similarly,Yang et al.[35] designed a blockchain-based reputation system for assessing content credibility in VANET.This approach assigns ratings to the content-providing vehicles and forwards them to a temporarily selected node as blocks.The temporarily selected node is responsible for propagating the reputation among other nodes.In addition,Sun et al.[30] proposed a reputationbased prediction scheme that evaluates the vehicle’s reputation using Kalman filtering and chi-squared tests to determine the most reputable vehicle in the network.Other vehicles decide whether to follow a particular vehicle based on its trustworthiness.Table 2 depicts the related works and their limitations in a non-learning-based misbehavior detection system.

    Table 2:Summarized non-learning-based related works and their limitations

    2.2.2 ML-Based Misbehavior Detection

    ML algorithms have significantly contributed to various fields,including healthcare [39] and anomaly detection[40].Specifically,they play a critical role in identifying attacks through the binary classification method on datasets,making them an essential tool for attack detection.ML can learn from data automatically and improve its performance over time.The literature has proposed several approaches that leverage the precision of various ML classifiers to detect and mitigate attacks.In[41],the authors presented a Support Vector Machine(SVM)and Logistic Regression(LR)algorithm to detect position falsification attacks in VANET.They exploited the sender’s position and speed features.The results indicated that SVM outperformed LR.The authors in [42] proposed a beacon message dissemination system where attackers and legitimate vehicles propagate Basic Safety Messages(BSM) among neighboring vehicles and RSUs.The RSUs accumulate all the BSMs and perform ML evaluation to validate the content based on the previous credibility shared by vehicles.The RSU propagates such information among all the neighboring RSUs and vehicles when it classifies a vehicle as an attacker.Moreover,reference [18] proposed an ML-based misbehavior detection scheme and compared their results with previous works,which demonstrates better performance than others in K-Nearest Neighbor(KNN)and Random Forest(RF).Similarly,the authors in[43]focused on developing ML models to detect misbehaving vehicles.The authors employed binary and multi-classification techniques.Their significant contributions showed promising results for detecting misbehaving vehicles in traditional VANETs [44] designed an Australian Dataset for Misbehaviour Analysis(ADMA)for misbehavior detection in VANET.The authors evaluated their dataset over five ML classifiers:SVM,KNN,RF,Decision Tree(DT),and Gaussian Na?ve Bayes(GNB).According to the results,RF performed an outstanding job compared to other ML classifiers.Table 3 summarizes the related ML-based work and their limitations in the misbehavior detection systems.

    Table 3:Summarized ML-based related works and their limitations

    The above-mentioned related works either proposed a static threshold-based misbehavior detection method or utilized a limited number of ML classifiers to detect the misbehavior of vehicles.Additionally,none of those works focused on misbehavior detection in VNDN.Conversely,we propose five ML algorithms and compare their accuracy in detecting illusion attacks in VNDN.

    3 System Model

    This section presents our proposed push-based crucial content and regular interest packet dissemination system.Our system model includes the key components and their roles.This section also presents the naming structure for crucial and regular interest packets in this section.Additionally,we propose a reputation dissemination system among RSUs for performing ML classifications.Finally,this section exhibits a detailed algorithm for crucial content dissemination,reputation propagation,and ML classification.

    3.1 System Components

    3.1.1 Trusted Authority(TA)

    We consider the traffic department a trusted authority solely responsible for vehicle registration and the issuance of vehicle identification numbers.It is worth mentioning that the traffic department has no other role except vehicle registration.

    3.1.2 Vehicles

    Our system consists of OBU-equipped vehicles that are capable of delivering emergency messages.The vehicles can act as consumers,producers,or intermediate (relay) nodes,depending on the situation.For example,a vehicle that is a consumer in one scenario may act as a producer in another scenario.

    3.1.3 RSUs

    The RSUs in our system collect the reputation values of the host vehicle,evaluate their authenticity based on their reputation score,and employ ML techniques to identify attackers and benign vehicles.RSUs maintain a database accessible to any vehicle.We assume that all infrastructure-based RSU nodes are connected to a wired network and use a blockchain network to share the reputation among all RSUs.

    3.2 Interest Packet Propagation

    In NDN,interest packets are structured hierarchically and contain content requests.These packets include the content name and additional information,such as nonce,hop limit,and other optional fields.Unlike traditional NDN,our system comprises two types of interest packets:crucial interest packetsandregular interest packets.The crucial interest packets contain information for other vehicles,such as incident information,and the regular interest packet requests content similar to the NDN interest packet.

    3.3 Crucial Information Dissemination

    The communication mechanism of our proposed system initiates with transmitting an interest packet among 1-hop neighboring vehicles.The neighboring vehicles first identify the type of interest packet.If it is a crucial message,they check the reputation table to verify the credibility of the host vehicle.The crucial packet is discarded without further action if the host vehicle is identified as an attacker.Conversely,if the host vehicle is deemed legitimate,the neighboring vehicles follow the crucial message.It is important to note that each vehicle can receive an aggregated reputation score from an RSU using a regular interest packet with the optional field“MustBeFresh (MBF)”.We distinguish between critical and regular interest packets based on their naming structure,as mentioned below:

    3.3.1 Regular Interest Packet Naming Structure

    The non-crucial interest packets are pull-based content retrieval packets in VNDN.The consumer requires content,and the producer nodes provide the content as a data packet.The naming structure of a regular interest packet is written as follows:

    VNDN/Infotainment/Music/xyz.mp4

    Where a vehicle requests music as an infotainment service,the neighboring vehicle checks its CS for a matching interest packet and provides the content to the consumer.If the requested interest packet is not in CS,it is recorded in the PIT table.The PIT records unsatisfied interests and their interface.If the same interest exists in the table,the PIT updates the interface information and drops the duplicate packet.All unsatisfied interest packets are forwarded to the FIB for prefix matching.

    3.3.2 Crucial Packet Naming Structure

    We place the wordcrucialat the beginning of the naming structure to differentiate crucial packets from regular interest packets.The nearby vehicles instantly recognize it as a crucial packet and act accordingly based on the host vehicles’reputation.According to Algorithm 1,neighboring vehicles will either follow or ignore the crucial packet based on the reputation of the host vehicle.If the host vehicle is identified as an attacker,the packet will be dropped,and no action will be taken.However,if the host vehicle is recognized as legitimate,neighboring vehicles will act upon the message.The crucial messages are no longer required to be stored in the PIT of neighboring vehicles.The naming structure of the crucial message is:

    Vehicle_No/Crucial/Incident/location/traffic_congestion/avoid

    Where a vehicle notifies other vehicles to avoid a specific location due to heavy traffic,in this situation,the attacker vehicles can manipulate their exact location with a fake position.

    3.4 Reputation Propagation

    After verifying the legitimacy of the content provided by the host vehicle,neighboring vehicles generate a reputation(either positive(0)or negative(1))and forward it to the RSUs using a reputation dissemination scheme similar to the crucial packet dissemination mechanism mentioned above.The naming structure for the reputation dissemination scheme is as follows:

    Reputation/VNDN/Vehicle/No/1 or 0

    We assign(1)to illusion attackers and(0)to legitimate vehicles.The term“reputation”refers to the reputation of the host vehicle,in which RSUs accept the packets and vehicles ignore them.Afterward,the RSU incorporates all the reputations of a host vehicle and performs ML algorithms to classify the vehicle.Table 4 depicts the notation used in Algorithm 1,and Fig.2 shows an overall transmission and ML performance evaluation architecture.

    Table 4:Summary of notations used in Algorithm 1

    Figure 2:Crucial message dissemination and ML-based reputation verification

    4 ML-Based Evaluation

    This section evaluates the behavior of vehicles and classifies them as benign or attacker vehicles using the ML-based binary classification technique.The ML evaluation comprises three stages:dataset collection and extraction,data preparation,and binary classification.

    4.1 Dataset Collection and Extraction

    Our ML-based misbehavior identification process uses an open dataset called VeReMi [16],designed for detecting vehicles’misbehavior.The VeReMi simulation is performed on OMNET++and Simulation of Urban Mobility (SUMO) [45] on the Luxembourg traffic scenario (LuST) [46].It consists of 255 simulations with heterogeneous traffic scenarios,including five different types of attacks: constant (type 1),constant offset (type 2),random (type 4),random offset (type 8),and eventual stop (type 16).The description of these attacks is depicted in Table 5.The simulation contains three attacker densities(10%,20%,and 30%)with multiple log files and a single truth file in each simulation.The log files contain messages received from multiple vehicles,including legitimate messages(0)and attack messages(1).

    Table 5:VeReMi attack types

    4.2 Data Preparation

    After determining the dataset,we converted all the log files from JSON to CSV format and merged them with ground truth files to generate a labeled dataset for each attack type.We removed duplicate messages and non-contributing features such as position noise,speed noise,and RSSI.To train and test our model efficiently and to prevent over-fitting,we performed k-fold cross-validation.We split the entire dataset into k-fold and applied 10-fold cross-validation.

    4.3 Classification

    We utilized binary classification to distinguish between attacker and legitimate vehicles across five attack environments of VeReMi.We experimented with various ML classifiers,including DT,KNN,RF,GNB,and LR.

    4.4 Performance Evaluation

    We trained and tested various ML classifiers on the VeReMi dataset to see how well they work.We analyzed the performance in terms of accuracy,precision,recall,and the F-1 score:

    4.4.1 Accuracy

    It is a ratio of correct detections,True Positive (TP) and True Negative (TN),out of the total number of detections:TP,TN,False Positive(FP),and False Negative(FN).The accuracy is measured as shown in Eq.(1).

    4.4.2 Precision

    The proportion of misbehavior was accurately identified out of all values.A lower precision value shows that the model has many FP.Eq.(2)shows the precision model.

    4.4.3 Recall

    It is described as the proportion of misbehavior accurately identified as actual misbehavior.The lower recall score demonstrates a model’s inability to identify misbehavior.Eq.(3)refers recall model.

    4.4.4 F-1 Score

    As the harmonic mean of recall and precision,the F-1 score evaluates the overall detection quality of a model.Eq.(4)shows the F-1 model.

    5 Experimental Results and Discussion

    Our research aims to identify and mitigate illusion attacks in VNDN.To achieve this,we evaluate the performance of various ML algorithms based on the behavior of vehicles.In order to perform ML classification,we implemented our ML classification in Python using an Intel desktop core i7 CPU with 2.8 GHz and 16 GB of RAM.We conducted our experiments on the Windows 11 operating system.To evaluate the effectiveness of each ML classifier in detecting vehicle misbehavior,we utilized a precision-recall curve [47] in conjunction with a Receiver Operating Characteristic (ROC) curve to visualize the outcomes.Precision and recall curves are commonly employed for assessing binary classification performance.The curve indicates the trade-off between precision and recall values,where a larger area under the curve indicates higher values for both metrics.A high precision value corresponds to a low false positive rate,whereas a high recall value corresponds to a low false negative rate.As shown in Table 6,our evaluation involves assessing the performance of various ML classifiers on different attacker scenarios using the VeReMi dataset.Based on the results,RF and DT have shown excellent performance in detecting all attacks.Similarly,KNN has also achieved better results.On the other hand,GNB and LR showed poor results.The performance of each ML classifier for each attack is mentioned below.

    Table 6:ML classifiers’performance evaluation

    Attack Type 1:It is relatively simple to identify attackers due to constant position transmission with unfixed velocity.As shown in Fig.3,RF,DT,and KNN reflect outstanding performance in terms of precision,recall,and F-1,whereas GNB and LR demonstrate poor performance.

    Attack Type 2:The attackers continuously broadcast a constant offset position using their actual position in this attack.Like attack type 1,the RF,DT,and KNN showed outstanding accuracy in attack type 2.However,GNB and LR indicated a lower performance.Fig.4 illustrates the performance of all ML classifiers in detecting attack type 2.

    Attack Type 4:The type 4 attackers constantly broadcast a new random position for each message.The ML classifiers such as RF,DT,and KNN exhibit high accuracy in identifying the attacks,as shown in Fig.5.Moreover,LR and GNB reflected unsatisfactory performance.

    Attack Type 8:In attack type 8,the attackers broadcast a pre-configured random position for each content.The results depicted in Fig.6 show that RF achieves 95% accuracy,while DT and KNN achieved satisfactory results.On the other hand,LR and GNB have a low accuracy performance.

    Attack Type 16:The attackers initially transmit their actual position,similar to a benign vehicle,but later turn to a stable position.This type of attack is challenging to detect due to its floating behavior,making it difficult to identify the misbehavior of attackers.Fig.7 shows the performance of various ML classifiers in detecting attack type 16.The results indicate that the RF classifier achieved higher accuracy than the other ML algorithms.

    We evaluated the performance of various ML classifiers on the VeReMi dataset.Our observations revealed that RF and DT classifiers achieved high accuracy rates in terms of precision,recall,and F-1 score across all the attack types.Specifically,the RF classifier delivered an outstanding performance,achieving 100% accuracy in attack types 1 and 2 and over 95% accuracy in the other attack types.Table 6 presents the performance evaluation results of the ML classifiers on the VeReMi dataset.We observed that DT provided highly accurate results,achieving 99% accuracy in attack types 1 and 2 and more than 91% accuracy in other attack types.Similarly,KNN also showed promising results,with 96% accuracy in attack types 1 and 2,89% accuracy in attack types 4 and 8 and 90% accuracy in attack type 16.In contrast,LR and GNB demonstrated poor performance.Our findings suggest that RF and DT can effectively detect illusion attacker vehicles accurately.

    Visualized Results

    We employed various ML classifiers to the VeReMi dataset and compared their efficiency based on obtained results.To assess the performance of our ML models,we visualized our results using accuracy calculation techniques as mentioned in Eqs.(1)–(4).First,we utilized precision-recall and ROC curves to evaluate the trade-off between precision and recall for binary classification.The Area Under Curve (AUC) curves indicated strong performance in three models,with the highest AUC achieved by the RF,DT,and KNN models.In contrast,GNB and LR depicted poor performance.Based on the experimental findings,RF and DT accurately classify illusion attackers and legitimate vehicles.These classifiers effectively detected the misbehavior of vehicles in all attack types.Overall,our visualized results provide a comprehensive view of the performance of our ML models.From Figs.3–7,we can observe that RF and DT perform well in five different attacker scenarios.

    Figure 3:Attack type 1 results

    Figure 4:Attack type 2 results

    Figure 5:Attack type 4 results

    Figure 6:Attack type 8 results

    Figure 7:Attack type 16 results

    6 Conclusion

    The crucial information dissemination and its trustworthiness are the essential facets of VNDN due to the involvement of human lives in it.Fake information dissemination can lead to road accidents,traffic congestion,and increased energy consumption.In addition,the traditional NDN in VANET lacks push-based content dissemination and fake information detection techniques.In order to address these challenges,this research aims to improve NDN’s capability to distribute critical messages in the VNDN environment without relying on an interest packet.In this connection,we used a novel pushbased content dissemination technique in VNDN.We leveraged the NDN’s interest packet naming structure to disseminate crucial content without waiting for a content consumer to broadcast an interest packet.However,push-based content dissemination can be vulnerable to illusion attacks where adversaries can inject fake information and broadcast it among neighboring vehicles.To cope with this risk,we enabled neighboring vehicles to query the aggregate reputation of host vehicles from RSUs.The RSUs classify host vehicles as attackers or legitimate based on ML classification.This study used five ML classifiers,including DT,RF,KNN,GNB,and LR,on a publicly available dataset VeReMi.Our proposed ML classification results demonstrate that RF and DT accurately detect all attack types within the VeReMi dataset.RF achieved an accuracy of 100% in attack types 1 and 2.It achieved 95% accuracy in attack types 4 and 8 and 96% in attack type 16.On the other hand,DT achieved an accuracy of 99% in attack types 1 and 2,whereas it attained 91% accuracy in attack types 4 and 8 and 93% in attack type 16.Our research is the first to modify interest packet naming structures and utilize them for crucial content dissemination.Moreover,evaluating ML classifiers for detecting illusion attacks in VNDN advocates the novelty of our proposed study.Thus,our proposed network architecture ensures crucial content dissemination and enhances trust between vehicles.

    7 Future Work

    Our proposed research classifies attacker and legitimate vehicles using ML classifiers.However,further investigations can focus on exploiting DL classifiers to improve the accuracy and efficiency of the misbehavior detection system in VNDN.

    Acknowledgement:The authors acknowledge the Researchers Supporting Project Number(RSP2023R34),King Saud University,Riyadh,Saudi Arabia.

    Funding Statement:This work was supported by the Researchers Supporting Project Number(RSP2023R34),King Saud University,Riyadh,Saudi Arabia.

    Author Contributions:Study conception and design: A.H.Magsi,G.Muhammad,Z.Ali;data collection:A.H.Magsi,S.Kareem;analysis and interpretation of results:G.Muhammad,S.Memon;draft manuscript preparation: A.H.Magsi,G.Muhammad,Z.Ali,S.Kareem;data curation:S.Memon,S.Kareem,Z.Ali;visualization: A.H.Magsi,G.Muhammad,S.Memon,S.Kareem;resources:S.Kareem,S.Memon;Z.Ali.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data used to support the findings of this study are available from authors upon request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    老熟女久久久| 精品国产亚洲在线| 国产精品99久久99久久久不卡| 男人舔女人的私密视频| 女人久久www免费人成看片| 国产精品偷伦视频观看了| 日韩中文字幕视频在线看片| 91精品国产国语对白视频| 日韩一区二区三区影片| 久久精品熟女亚洲av麻豆精品| 极品教师在线免费播放| 欧美日韩福利视频一区二区| 91大片在线观看| 亚洲色图av天堂| 国产精品麻豆人妻色哟哟久久| 成人亚洲精品一区在线观看| 两人在一起打扑克的视频| 国产高清国产精品国产三级| 国产亚洲一区二区精品| 深夜精品福利| 亚洲天堂av无毛| 国产高清videossex| 欧美日韩精品网址| 人妻 亚洲 视频| 在线看a的网站| 成人国语在线视频| 欧美精品啪啪一区二区三区| 亚洲精品乱久久久久久| 国产成人精品久久二区二区免费| 97在线人人人人妻| 肉色欧美久久久久久久蜜桃| 一级片'在线观看视频| 一本大道久久a久久精品| av天堂在线播放| 一二三四社区在线视频社区8| 嫁个100分男人电影在线观看| 丰满人妻熟妇乱又伦精品不卡| 曰老女人黄片| 精品人妻在线不人妻| 国内毛片毛片毛片毛片毛片| 国产精品 国内视频| 三级毛片av免费| 精品欧美一区二区三区在线| 法律面前人人平等表现在哪些方面| 国产高清国产精品国产三级| 脱女人内裤的视频| 91九色精品人成在线观看| 美女国产高潮福利片在线看| 亚洲欧美激情在线| 在线亚洲精品国产二区图片欧美| 极品少妇高潮喷水抽搐| h视频一区二区三区| 一本一本久久a久久精品综合妖精| 国产三级黄色录像| 亚洲av日韩在线播放| 久久九九热精品免费| 国产成人av教育| 色尼玛亚洲综合影院| 久久 成人 亚洲| 欧美激情久久久久久爽电影 | 亚洲精品久久成人aⅴ小说| 亚洲av日韩在线播放| 人妻久久中文字幕网| 无限看片的www在线观看| 在线观看人妻少妇| av网站免费在线观看视频| 欧美另类亚洲清纯唯美| 国产精品99久久99久久久不卡| 80岁老熟妇乱子伦牲交| 欧美成狂野欧美在线观看| 黑人欧美特级aaaaaa片| 久久久久久久大尺度免费视频| 日本黄色日本黄色录像| 视频区图区小说| 色综合婷婷激情| 国产精品影院久久| 精品免费久久久久久久清纯 | 热99国产精品久久久久久7| 国产精品麻豆人妻色哟哟久久| 国产免费福利视频在线观看| 亚洲精品国产一区二区精华液| 精品福利观看| 女人高潮潮喷娇喘18禁视频| 亚洲成人免费av在线播放| 久久人妻av系列| 丝袜美足系列| 一本综合久久免费| 在线 av 中文字幕| 精品一区二区三区视频在线观看免费 | 免费看a级黄色片| 波多野结衣一区麻豆| 欧美黄色片欧美黄色片| 国产又色又爽无遮挡免费看| 亚洲久久久国产精品| 亚洲精品国产精品久久久不卡| 亚洲av日韩在线播放| 国产av又大| 久久久久久亚洲精品国产蜜桃av| 亚洲精品国产色婷婷电影| 91精品国产国语对白视频| 国产精品久久久久久精品电影小说| 午夜精品国产一区二区电影| 国产又色又爽无遮挡免费看| 成人免费观看视频高清| 精品福利永久在线观看| 国产欧美日韩综合在线一区二区| 日本撒尿小便嘘嘘汇集6| 夜夜骑夜夜射夜夜干| 巨乳人妻的诱惑在线观看| 亚洲av欧美aⅴ国产| 高清在线国产一区| 大型黄色视频在线免费观看| 男女免费视频国产| 色视频在线一区二区三区| 午夜精品国产一区二区电影| 国内毛片毛片毛片毛片毛片| 国产日韩一区二区三区精品不卡| 人人妻,人人澡人人爽秒播| 肉色欧美久久久久久久蜜桃| 久久久久精品国产欧美久久久| 精品国产亚洲在线| 久久中文字幕一级| 制服人妻中文乱码| 午夜视频精品福利| 亚洲av第一区精品v没综合| 亚洲国产中文字幕在线视频| 久久久久久久大尺度免费视频| 老司机影院毛片| 亚洲第一欧美日韩一区二区三区 | 美女高潮喷水抽搐中文字幕| 色婷婷av一区二区三区视频| 女同久久另类99精品国产91| 国产免费现黄频在线看| 欧美另类亚洲清纯唯美| 午夜精品国产一区二区电影| 香蕉丝袜av| 亚洲国产中文字幕在线视频| 999久久久精品免费观看国产| 亚洲中文av在线| 十分钟在线观看高清视频www| 国产精品久久久久久精品电影小说| 欧美老熟妇乱子伦牲交| 老司机午夜十八禁免费视频| av免费在线观看网站| 99国产精品免费福利视频| 久久久精品国产亚洲av高清涩受| 欧美日韩黄片免| 在线天堂中文资源库| 国产成人免费观看mmmm| 欧美精品亚洲一区二区| 欧美激情极品国产一区二区三区| 91麻豆av在线| 天堂俺去俺来也www色官网| 国产三级黄色录像| 夫妻午夜视频| 国产深夜福利视频在线观看| 69av精品久久久久久 | 一个人免费在线观看的高清视频| 欧美中文综合在线视频| 狠狠精品人妻久久久久久综合| 久久人妻福利社区极品人妻图片| 天堂8中文在线网| 乱人伦中国视频| 最近最新中文字幕大全免费视频| 脱女人内裤的视频| 国产主播在线观看一区二区| 日本wwww免费看| 热99国产精品久久久久久7| 国产一卡二卡三卡精品| 国产精品秋霞免费鲁丝片| 国产成+人综合+亚洲专区| 涩涩av久久男人的天堂| 精品一区二区三卡| 天天影视国产精品| 成人亚洲精品一区在线观看| 啪啪无遮挡十八禁网站| 中文字幕人妻丝袜一区二区| 欧美精品人与动牲交sv欧美| 黑人猛操日本美女一级片| 色老头精品视频在线观看| 国产精品久久久av美女十八| 日本a在线网址| 精品欧美一区二区三区在线| 亚洲自偷自拍图片 自拍| 日韩成人在线观看一区二区三区| 国产午夜精品久久久久久| 亚洲五月婷婷丁香| 最新在线观看一区二区三区| 国产1区2区3区精品| 动漫黄色视频在线观看| 久久精品熟女亚洲av麻豆精品| 99精国产麻豆久久婷婷| 在线观看免费午夜福利视频| 一级毛片女人18水好多| 亚洲三区欧美一区| 久热这里只有精品99| 69av精品久久久久久 | 一本久久精品| 精品亚洲成国产av| 亚洲精品国产精品久久久不卡| 一区在线观看完整版| 精品欧美一区二区三区在线| 成人永久免费在线观看视频 | 亚洲av国产av综合av卡| 国产精品 欧美亚洲| 亚洲欧洲日产国产| 亚洲色图 男人天堂 中文字幕| 欧美另类亚洲清纯唯美| 手机成人av网站| 亚洲欧美精品综合一区二区三区| 国产真人三级小视频在线观看| av欧美777| 最近最新中文字幕大全免费视频| 国产黄色免费在线视频| 欧美一级毛片孕妇| 美女福利国产在线| 狠狠精品人妻久久久久久综合| 亚洲国产成人一精品久久久| 他把我摸到了高潮在线观看 | 高清在线国产一区| 久久青草综合色| 啦啦啦中文免费视频观看日本| 麻豆乱淫一区二区| 国产精品久久久久久精品古装| av欧美777| 亚洲av电影在线进入| 国产一区二区在线观看av| 欧美乱码精品一区二区三区| 男女午夜视频在线观看| 成人免费观看视频高清| 亚洲成a人片在线一区二区| 欧美乱码精品一区二区三区| 精品国产一区二区三区四区第35| 中国美女看黄片| 丰满迷人的少妇在线观看| 亚洲精品成人av观看孕妇| 亚洲久久久国产精品| 国产成人av教育| 又黄又粗又硬又大视频| 欧美变态另类bdsm刘玥| 日本av免费视频播放| av国产精品久久久久影院| 一二三四在线观看免费中文在| 国产野战对白在线观看| 黄频高清免费视频| 国产熟女午夜一区二区三区| 在线av久久热| 亚洲精品久久午夜乱码| 成人av一区二区三区在线看| 国产精品二区激情视频| 中国美女看黄片| 欧美另类亚洲清纯唯美| 天天躁日日躁夜夜躁夜夜| 日韩免费av在线播放| 91精品三级在线观看| 丝袜人妻中文字幕| 亚洲欧洲精品一区二区精品久久久| 国产精品免费视频内射| 一区福利在线观看| 久久亚洲真实| 高清在线国产一区| 欧美精品亚洲一区二区| 老熟妇仑乱视频hdxx| www.999成人在线观看| 亚洲av国产av综合av卡| 日本撒尿小便嘘嘘汇集6| 亚洲午夜精品一区,二区,三区| 午夜福利一区二区在线看| 黄片大片在线免费观看| 国产成人免费观看mmmm| 精品一区二区三区四区五区乱码| 成年女人毛片免费观看观看9 | 精品一区二区三区四区五区乱码| 欧美激情久久久久久爽电影 | 久久人妻熟女aⅴ| 欧美中文综合在线视频| 悠悠久久av| 俄罗斯特黄特色一大片| 久久精品国产99精品国产亚洲性色 | 伦理电影免费视频| 国产成+人综合+亚洲专区| 亚洲精品国产一区二区精华液| 免费在线观看视频国产中文字幕亚洲| 一区二区三区激情视频| tube8黄色片| 香蕉丝袜av| 久久久国产一区二区| 亚洲专区国产一区二区| 久久天堂一区二区三区四区| 久久精品成人免费网站| 午夜久久久在线观看| 欧美精品啪啪一区二区三区| h视频一区二区三区| 麻豆av在线久日| xxxhd国产人妻xxx| 好男人电影高清在线观看| 岛国毛片在线播放| 国产精品秋霞免费鲁丝片| 欧美国产精品va在线观看不卡| 日韩 欧美 亚洲 中文字幕| 亚洲黑人精品在线| 亚洲欧洲精品一区二区精品久久久| 妹子高潮喷水视频| 成人亚洲精品一区在线观看| 可以免费在线观看a视频的电影网站| 国产精品免费视频内射| 亚洲熟妇熟女久久| 中文字幕色久视频| 亚洲中文字幕日韩| 美女高潮到喷水免费观看| av一本久久久久| 男女无遮挡免费网站观看| 桃花免费在线播放| 国产精品影院久久| 日本撒尿小便嘘嘘汇集6| 日韩免费av在线播放| 欧美成狂野欧美在线观看| 精品少妇一区二区三区视频日本电影| 久久久久久久精品吃奶| 色老头精品视频在线观看| 国产亚洲精品久久久久5区| 9191精品国产免费久久| 精品国产一区二区三区久久久樱花| 国产成人免费无遮挡视频| 人人妻人人爽人人添夜夜欢视频| 91老司机精品| 99re6热这里在线精品视频| 亚洲欧洲精品一区二区精品久久久| 日韩精品免费视频一区二区三区| 国产亚洲欧美精品永久| 午夜福利欧美成人| 国产男女内射视频| 亚洲精品久久成人aⅴ小说| 欧美成人免费av一区二区三区 | 大型黄色视频在线免费观看| 三级毛片av免费| 久久久久久久大尺度免费视频| 成年人黄色毛片网站| 久热爱精品视频在线9| 亚洲欧美一区二区三区黑人| 91九色精品人成在线观看| 日韩三级视频一区二区三区| 婷婷丁香在线五月| 国产老妇伦熟女老妇高清| 青青草视频在线视频观看| 999精品在线视频| 亚洲精品美女久久av网站| 国产精品美女特级片免费视频播放器 | 满18在线观看网站| 我的亚洲天堂| 99国产极品粉嫩在线观看| 美女高潮到喷水免费观看| svipshipincom国产片| 天堂俺去俺来也www色官网| 91av网站免费观看| 天堂8中文在线网| 在线观看人妻少妇| av又黄又爽大尺度在线免费看| 丝袜喷水一区| 大片电影免费在线观看免费| 日韩精品免费视频一区二区三区| 一级毛片电影观看| 免费在线观看完整版高清| 制服人妻中文乱码| 十八禁网站免费在线| 午夜免费鲁丝| 欧美日韩中文字幕国产精品一区二区三区 | 丝袜在线中文字幕| 在线观看免费午夜福利视频| 久久精品国产a三级三级三级| 国产麻豆69| 男人舔女人的私密视频| 操美女的视频在线观看| 少妇精品久久久久久久| 亚洲综合色网址| 久久狼人影院| 黄色丝袜av网址大全| av视频免费观看在线观看| av一本久久久久| 国产欧美日韩一区二区三| 国产片内射在线| 热99久久久久精品小说推荐| 精品一区二区三区av网在线观看 | 久久久精品94久久精品| 欧美激情 高清一区二区三区| 国产一区二区 视频在线| 欧美黑人欧美精品刺激| 亚洲精品av麻豆狂野| 国产亚洲欧美在线一区二区| 精品久久久精品久久久| 在线看a的网站| 欧美日韩av久久| 午夜福利在线观看吧| 又紧又爽又黄一区二区| 大香蕉久久成人网| 日韩免费av在线播放| 精品国产一区二区久久| 91成人精品电影| 18禁裸乳无遮挡动漫免费视频| 少妇精品久久久久久久| 国产亚洲午夜精品一区二区久久| 国产一卡二卡三卡精品| 99精品在免费线老司机午夜| 黑丝袜美女国产一区| 我要看黄色一级片免费的| 亚洲av第一区精品v没综合| 美女国产高潮福利片在线看| 欧美亚洲 丝袜 人妻 在线| 另类精品久久| 免费在线观看黄色视频的| 日韩制服丝袜自拍偷拍| 少妇的丰满在线观看| 日韩 欧美 亚洲 中文字幕| 午夜成年电影在线免费观看| 午夜福利,免费看| 亚洲 欧美一区二区三区| 视频区欧美日本亚洲| 丰满少妇做爰视频| 天天操日日干夜夜撸| 精品少妇一区二区三区视频日本电影| 久9热在线精品视频| 欧美+亚洲+日韩+国产| 久久久久久亚洲精品国产蜜桃av| 午夜福利乱码中文字幕| 最黄视频免费看| 婷婷成人精品国产| 亚洲人成伊人成综合网2020| 免费少妇av软件| 精品国产亚洲在线| 丝袜人妻中文字幕| 老熟妇仑乱视频hdxx| 99久久精品国产亚洲精品| 亚洲欧美色中文字幕在线| 欧美中文综合在线视频| 天堂动漫精品| 99九九在线精品视频| 亚洲七黄色美女视频| 在线观看66精品国产| 欧美精品一区二区免费开放| av线在线观看网站| 欧美日韩亚洲国产一区二区在线观看 | 91成人精品电影| 成人三级做爰电影| 欧美午夜高清在线| 中文字幕av电影在线播放| 99国产综合亚洲精品| 欧美性长视频在线观看| 午夜福利在线观看吧| 女同久久另类99精品国产91| 老鸭窝网址在线观看| 欧美人与性动交α欧美软件| 老司机影院毛片| 黑人操中国人逼视频| 亚洲中文av在线| 黄色a级毛片大全视频| 欧美午夜高清在线| 欧美一级毛片孕妇| 国产男靠女视频免费网站| 99热国产这里只有精品6| 麻豆乱淫一区二区| 母亲3免费完整高清在线观看| 美国免费a级毛片| 天天添夜夜摸| 少妇猛男粗大的猛烈进出视频| 精品少妇黑人巨大在线播放| 伦理电影免费视频| 欧美黑人精品巨大| 777米奇影视久久| 亚洲成人免费av在线播放| 亚洲国产av新网站| 久久人人97超碰香蕉20202| 成人黄色视频免费在线看| 成人特级黄色片久久久久久久 | 我的亚洲天堂| www.999成人在线观看| 9色porny在线观看| 亚洲精品一二三| 欧美大码av| 亚洲第一青青草原| 久久影院123| 午夜福利一区二区在线看| 老司机午夜十八禁免费视频| 国产男女内射视频| av线在线观看网站| 国产国语露脸激情在线看| 亚洲专区中文字幕在线| 男人操女人黄网站| 婷婷成人精品国产| cao死你这个sao货| 午夜91福利影院| 国产午夜精品久久久久久| 丰满人妻熟妇乱又伦精品不卡| 久久久国产欧美日韩av| 国产麻豆69| 亚洲全国av大片| 别揉我奶头~嗯~啊~动态视频| 另类精品久久| 欧美精品一区二区免费开放| 在线观看www视频免费| 成人手机av| 建设人人有责人人尽责人人享有的| 视频在线观看一区二区三区| 久热爱精品视频在线9| 久久精品91无色码中文字幕| 一级a爱视频在线免费观看| 最近最新免费中文字幕在线| 国产精品免费视频内射| 亚洲av国产av综合av卡| 国产视频一区二区在线看| 18在线观看网站| 中文亚洲av片在线观看爽 | 天堂中文最新版在线下载| 超碰成人久久| 精品免费久久久久久久清纯 | 欧美日韩黄片免| 69精品国产乱码久久久| 纯流量卡能插随身wifi吗| av福利片在线| 国产欧美日韩一区二区三区在线| 纵有疾风起免费观看全集完整版| 亚洲精品自拍成人| 日日摸夜夜添夜夜添小说| 亚洲精品美女久久久久99蜜臀| 在线播放国产精品三级| 在线永久观看黄色视频| 91大片在线观看| 日本精品一区二区三区蜜桃| 啦啦啦中文免费视频观看日本| 亚洲精品国产精品久久久不卡| 男男h啪啪无遮挡| 国产成人精品在线电影| 天天躁日日躁夜夜躁夜夜| 狠狠婷婷综合久久久久久88av| 欧美 亚洲 国产 日韩一| 在线看a的网站| 亚洲精品一卡2卡三卡4卡5卡| 国产成人影院久久av| 精品国产亚洲在线| 波多野结衣一区麻豆| 午夜精品国产一区二区电影| aaaaa片日本免费| 国产精品久久久av美女十八| 欧美另类亚洲清纯唯美| 久久毛片免费看一区二区三区| 正在播放国产对白刺激| 国产伦理片在线播放av一区| 高潮久久久久久久久久久不卡| 大香蕉久久网| 欧美日韩国产mv在线观看视频| 亚洲av第一区精品v没综合| 97人妻天天添夜夜摸| a在线观看视频网站| 国产一区二区三区视频了| 黄色片一级片一级黄色片| 两个人免费观看高清视频| 国产免费视频播放在线视频| 母亲3免费完整高清在线观看| 黑人巨大精品欧美一区二区蜜桃| 国产高清国产精品国产三级| 国产有黄有色有爽视频| 欧美日韩黄片免| 人妻久久中文字幕网| av有码第一页| 黑人巨大精品欧美一区二区mp4| 国产一区二区在线观看av| 18禁国产床啪视频网站| 国产精品久久久久成人av| 欧美人与性动交α欧美精品济南到| 日韩 欧美 亚洲 中文字幕| 久久 成人 亚洲| 视频在线观看一区二区三区| 久久久国产欧美日韩av| 啦啦啦中文免费视频观看日本| 久久久久久久久久久久大奶| av天堂在线播放| 91老司机精品| 欧美精品一区二区大全| 国产精品影院久久| 国产一区二区 视频在线| 男女免费视频国产| 伊人久久大香线蕉亚洲五| 久久ye,这里只有精品| 国产亚洲精品久久久久5区| 成人av一区二区三区在线看| 免费av中文字幕在线| 99国产综合亚洲精品| 老汉色∧v一级毛片| 国产精品 欧美亚洲| 极品教师在线免费播放| 国产成人欧美| 免费av中文字幕在线| 久久人妻福利社区极品人妻图片| 亚洲国产欧美日韩在线播放| 黑人猛操日本美女一级片| 亚洲性夜色夜夜综合| 动漫黄色视频在线观看| 高清av免费在线| 国产一区二区三区在线臀色熟女 | 精品高清国产在线一区| 大香蕉久久成人网| av在线播放免费不卡| 精品国产国语对白av| 亚洲熟女精品中文字幕| h视频一区二区三区| 精品久久久精品久久久| 午夜精品久久久久久毛片777| 日韩欧美一区视频在线观看| 久久精品国产综合久久久| 国产欧美日韩一区二区精品| 欧美变态另类bdsm刘玥| 免费在线观看视频国产中文字幕亚洲| 国产精品美女特级片免费视频播放器 | 在线观看免费高清a一片| 亚洲av国产av综合av卡| 巨乳人妻的诱惑在线观看|