• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    2023-12-12 15:50:12ShadiAlSarawiMohammedAnbarBasimAhmadAlabsiMohammadAdnanAladailehandShazaDawoodAhmedRihan
    Computers Materials&Continua 2023年10期

    Shadi Al-Sarawi,Mohammed Anbar,?,Basim Ahmad Alabsi,Mohammad Adnan Aladaileh and Shaza Dawood Ahmed Rihan

    1National Advanced IPv6 Centre(NAv6),University Sains Malaysia,Gelugor,Penang,11800,Malaysia

    2Applied College,Najran University,King Abdulaziz Street,P.O.Box 1988,Najran,Saudi Arabia

    3Cybersecurity Department,School of Information Technology,American University of Madaba(AUM),Amman,11821,Jordan

    ABSTRACT The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators: DODAG Information Object (DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.

    KEYWORDS Internet of Things;IPv6 over low power wireless personal area networks;Routing Protocol for Low-Power and Lossy Networks;Internet Protocol Version 6;distributed denial of service;wireless sensor networks

    1 Introduction

    The sinkhole attack poses a significant threat to Wireless Sensor Networks(WSNs).It manipulates routing information,drops packets,alters data,and selectively transfers data,resulting in energy depletion in neighboring nodes and causing a network energy gap [1–3].Consequently,numerous researchers have proposed various detection approaches for sinkhole attacks in RPL-based networks.

    The Internet Engineering Task Force (IETF) has standardized the RPL protocol in documents RFC4919 and RFC6550 [4,5].These documents focus on IP for Low-Power and Lossy Networks(LLNs)by utilizing IPv6 over 6LoWPAN,which has become the standard for IPv6 in IEEE 802.15.4 networks.RPL has emerged as the standard routing protocol for establishing IPv6 connectivity in these networks,including those in the IoT domain.

    In RPL,the objective function of the protocol selects the optimal route for data transmission.Each node is assigned an ID based on its rank and IPv6 address.To exchange graph-related information,nodes utilize three RPL-specific Internet Control Message Protocol version 6(ICMPv6)messages: DIS (DODAG Information Solicitation),DAO (DODAG Destination Advertisement Object),and DIO,as shown in Fig.1[6].

    Figure 1:RPL topology

    In network security,intrusion detection systems have been the subject of extensive research.Recently,researchers have also focused on detecting sinkhole attacks in IoT networks,categorized into two main approaches: Signature-Based and Anomaly-Based.Among these,Anomaly-Based approaches have demonstrated higher efficiency in detecting attacks than Signature-Based approaches.An Anomaly-Based approach establishes a baseline of normal network behavior and detects anomalies when deviations from this baseline occur,triggering alerts when traffic behavior surpasses a predefined threshold.Any behavior that deviates from the normal pattern is considered an intrusion[7].

    However,existing approaches for detecting sinkhole attacks often overlook the significant behavioral characteristics contributing to accurate detection.Additionally,many of these approaches consume excessive energy due to their deployment design.Consequently,there is a need for a solution that combines low power consumption with high accuracy for detecting sinkhole attacks.

    This research paper makes two contributions to the existing body of knowledge.Firstly,a behavior set that indicates a sinkhole attack in an RPL-based network.These indicators include (I) DIO Transaction Frequency,(II) Rank Harmony Behavioral,and (III) Power Consumption Behavior.Secondly,an unweighted voting method utilizes information from these abnormal behaviors to determine the presence of a sinkhole attack.

    The organization of this research paper is as follows:Section 2 provides an overview of IoT,IPv6,RPL,and sinkhole attacks.Section 3 discusses related works in the field.In Section 4,we outline the proposed approach.The results of our experiments are presented and discussed in Section 5.Finally,we conclude the paper by exploring several avenues for future research in the last section.

    2 Background

    This section aims to provide a comprehensive overview of the IoT,the IPv6 protocol,and the RPL.Furthermore,it highlights the significance of sinkhole attacks in the context of these technologies.

    2.1 IoT Overview

    IoT technologies and their applications have gained worldwide attention in many fields,such as science,commerce,industry,healthcare,transportation,and crowd management,such as in[8],which have become necessary for daily life across all segments of society.

    The rise of IoT and its applications in sensing led to a significant increase in multimedia data shared over insecure networks.However,IoT setups face resource constraints due to their small size,making conventional data encryption algorithms unsuitable.Therefore,it needs a lightweight cryptographic algorithm for IoT,such as the algorithm proposed in[9].

    According to Kaspersky Lab’s IoT report,there were over 120,000 malware attacks targeting IoT devices in the first six months of 2018,three times the number of attacks in 2017.Additionally,there was a ten-fold increase in smart device malware in 2017 compared to 2016[10,11].IBM reported that between October 2019 and June 2020,the combined number of IoT attacks was 400%higher than in the previous two years,as shown in Fig.2[12].

    2.2 IPv6 Overview

    There are several limitations associated with IoT,including limited processing capability,storage capacity,power life,and radio communication range.As a result,the implementation of IoT leverages the existing IP infrastructure to optimize resource utilization and take advantage of the extensive address space provided by IPv6[13,14].A promising approach for integrating low-power networks is through IPv6 over Low Power Wireless Personal Area Networks(6LoWPAN).This approach adds an adaptation layer to the network protocol stack.The 6LoWPAN protocol stack is designed to integrate wireless sensor networks based on 802.15.4 with IPv6 networks.It comprises a PHY layer,MAC layer,6LoWPAN adaptation layer,network layer,transport layer,and application layer with specific 6LoWPAN applications,as shown in Fig.3[15].By employing 6LoWPAN with constrained devices and utilizing the existing IP architecture and infrastructure,it helps maximize resource utilization and leverage the vast IPv6 address space[16,17].

    Figure 2:IoT attack volume between 2018 and 2020

    Figure 3:6LoWPAN protocol stack

    IPv6 is the successor to Internet Protocol Address Version 4(IPv4)and is designed to replace it to support the growing number of network devices worldwide.Table 1 summarizes the six key differences between IPv6 and IPv4[18].

    Table 1:Differences between IPv4 and IPv6

    2.3 RPL Overview

    RPL is a widely used routing protocol in Wireless Sensor Networks(WSNs)and finds applications in various domains such as smart grids,industrial networks,and home networks.The RPL protocol operates by initiating messages from a root or sink node,known as DIO messages,to construct a Directed Acyclic Graph (DAG) known as a DODAG.The DODAG tree consists of a single root node,and each node receiving a DIO message determines its parent based on the parent’s rank value and other parameters.The rank value is calculated considering factors such as the distance from the root node and the energy of the link.The network owner can determine the specific parameters used for rank value calculation.Nodes in the network continue to broadcast DIO messages,maintaining and updating the Routing Tree[19].

    2.4 Sinkhole Attack

    A sinkhole attack is considered one of the most devastating routing attacks due to its ability to deceive neighboring nodes by providing false routing information and selectively manipulating or blocking data transmission.This type of attack can deplete the energy resources of surrounding nodes,creating energy gaps within Wireless Sensor Networks (WSNs) [3].Among various routing attacks,the sinkhole attack falls under the Denial of Service(DoS)category and poses a severe threat to IoT environments[20].Its destructive impact is further amplified when combined with other attacks,potentially causing significant damage.If left undetected,the sinkhole attack can result in information loss and prevent packets from reaching the base station,effectively disconnecting nodes from the internet.Additionally,this type of attack introduces additional network overhead and accelerates energy consumption,ultimately leading to the deterioration of the network’s lifespan[21].

    3 Related Works

    An anomaly-based approach is employed to detect sinkhole attacks by establishing a baseline of normal network behavior and identifying anomalies that deviate from this baseline.When the traffic behavior exceeds a predefined threshold,an alert is generated,considering any deviations from the normal behavior as potential intrusions.However,this method often causes false positives[22–26].

    Tumrongwittayapak et al.proposed a sinkhole attack detection method based on Received Signal Strength Indicator(RSSI)values,incorporating an Extra Monitor(EM)component.During network deployment,EM monitors the RSSI values of all nodes and transmits relevant information to the base station.The EM calculates RSSI values and forwards them to the base station along with the source ID and next hop.The base station utilizes these RSSI values to calculate the Visual Geographical Map(VGM),which displays the positions of each node.EM continuously updates the RSSI values for the base station[27].Any changes in packet flow exceeding a predefined threshold indicate the presence of a sinkhole attack.However,this approach is limited because it cannot detect sinkhole attacks if launched immediately after network deployment and before the RSSI values are calculated[28].

    Cervantes et al.proposed an Intrusion Detection System(IDS)approach called Intrusion detection of Sinkhole attack on 6LoWPAN for IoT(INTI)to detect sinkhole attacks on the routing services of 6LoWPAN IoT networks.The INTI approach consists of four modules:the Cluster Configuration module,responsible for classifying nodes as members,leaders,and associates based on their network functions;the Monitoring module,which tracks the number of transmissions;the Attacker Detection module,responsible for identifying the sinkhole attacking node;and the Isolation of the Attacker module,which isolates malicious nodes from the cluster and alerts neighboring nodes.The network nodes are categorized as Leader(L),Member(M),Free(F),Associated(A),or Base(B)stations,with each node possessing unique IP addresses.Nodes form virtual clusters that can be repositioned and communicated wirelessly.L nodes receive information from M and A nodes and transmit it to the B station,while A nodes facilitate inter-cluster data transmission.The results demonstrate that INTI achieves a sinkhole detection rate of up to 92% in a fixed scenario and 75% in a mobile scenario.The INTI method has been evaluated and compared to SVELTE for detecting sinkhole attacks.The evaluation results demonstrate that INTI exhibits lower false-positive and false-negative rates than SVELTE.It offers advantages such as high detection accuracy and low false positives and negatives rates.However,it requires substantial computational resources,which can reduce the lifetime of the IoT ecosystem.Furthermore,INTI can only detect sinkhole attacks[24,25,29].

    Grgic et al.stated that each IDS module,deployed on every node,listens to the traffic of its neighboring nodes and collects data that represents input parameters for the collective decisionmaking process.The maximum number of packet drops is defined as a threshold.A node is considered suspicious if the number of dropped packets exceeds this threshold.The researchers evaluated their method using a COOJA simulator on three networks with six,ten,and seventeen nodes,respectively.To assess the impact of the IDS on network performance,tests were conducted both with and without the IDS.The main advantage of this system is its high detection accuracy.However,it faces a challenge in distinguishing between malicious and misbehaving nodes[30].

    Alzubaidi et al.proposed a lightweight technique called the Neighbor Passive Monitoring Technique(NPMT)for detecting sinkhole attacks in RPL-based IoT networks.Their IDS employs a Passive Intermediate Node(PN)to listen to and analyze the broadcasts of nodes.Neighboring nodes with similar ranks do not raise suspicion,while those with different ranks are flagged as suspicious nodes.The proposed technique outperforms the existing SVELTE in terms of performance.COOJA simulation results demonstrate that the NPMT achieved a 99.5%Accuracy Rate with a false-positive rate of 0.53%.However,a drawback of this technique is the overhead caused by passive intermediate nodes and passive edge nodes[31].

    Verma et al.proposed a signature-based detection system called Ensemble Learning Intrusion Detection System(ELNIDS),which utilizes machine learning(ML)mechanisms.The system incorporates four ensemble-based ML classifiers: Bagged Trees,RUSBoosted Trees,Boosted Trees,and Subspace Discriminant for sinkhole attack detection.ELNIDS comprises six modules: the sniffer model,sensor events and traffic repository,feature extraction module,analysis engine,rule base database,and attack notification manager.The sniffer module listens,monitors,and records traffic data in the database,while the feature extraction module characterizes network traffic to assist the analyzer in classification using ensemble models.The evaluation of ELNIDS was conducted using the RPL-NIDDS17 dataset,which contains traffic traces of various attack types,including Blackhole,Sinkhole,Sybil,Selective Forwarding,Clone ID,Hello Flooding,and Local Repair attacks.These attacks are explained in [32,33].The results demonstrate the effectiveness of ELNIDS,with the ensemble of Boosted Trees achieving the highest detection accuracy (94.5%),while the Subspace Discriminant method achieved the lowest detection accuracy(77.8%)[34].

    In summary,the existing mechanisms for detecting sinkhole attacks suffer several issues.Firstly,they exhibit high overheads in terms of network and memory consumption.Secondly,they have a significant false-positive rate,incorrectly flagging normal network activity as sinkhole attacks.Thirdly,there is a lack of sufficient research on the behavioral characteristics of sinkhole attacks,resulting in low detection accuracy.Additionally,many mechanisms have overlapping features and struggle to select the most crucial features for detecting sinkhole attacks.This problem undermines detection accuracy and contributes to a high false-positive rate.Lastly,the deployment design leads to challenges such as high overhead and energy consumption.

    To summarize,the problems with existing mechanisms for detecting sinkhole attacks include high overheads,a high false-positive rate,insufficiently studied behavioral characteristics,identification issues,and high overhead and energy consumption in deployment design.

    4 Proposed Approach

    This section explains the proposed UVM approach,which aims to detect sinkhole attacks while maintaining low power consumption and achieving high detection accuracy.Fig.4 illustrates the general stages of UVM.

    Figure 4:General stages of UVM

    4.1 Data Collection and Preprocessing(Stage 1)

    In this stage,power consumption data and ICMPv6 packets are collected passively from each node to gather helpful information for sinkhole attack detection.This stage describes collecting,capturing,and filtering data to construct a dataset.The data collection and preprocessing stage can be divided into two steps,as shown in Fig.5.

    Figure 5:Data collection and preprocessing steps

    4.1.1 Data Filtration

    The primary objective of the Data Filtration step is to refine the power consumption data(such as Central Processing Units (CPU),Low Power Mode (LPM),Transmitted Traffic (TX),and Received Traffic(RX))and from ICMPv6 packet information(such as Source,Destination,and Rank)by selecting specific features.The “collect view”feature in the COOJA simulator provides detailed information about the energy consumption of each node,while the Wireshark tool offers insights into the network traffic of ICMPv6 transmissions.

    The filtered dataset,which includes the relevant features from both the ICMPv6 packet and power consumption data,will proceed to the next stage,Features Selection.In this stage,the most significant features contributing to the detection of sinkhole attacks will be identified.Furthermore,these features will be categorized based on their contributions to sinkhole attack detection.

    4.1.2 Data Cleansing

    The Data Cleansing step reduces the traffic volume by addressing issues such as corrupted,incorrectly formatted,duplicate,or incomplete data within the dataset.This process aims to improve the detection accuracy and decrease the search time of the dataset [35].Once the data cleansing is complete,the resulting dataset containing the relevant features from the ICMPv6 packet and power consumption data will be passed on to the next stage,Features Selection.

    4.2 Feature Selection(Stage 2)

    The Feature Selection stage plays a crucial role in reducing the size of the feature set by identifying the most significant features that contribute to the detection of sinkhole attacks.Feature selection is achieved using a ranking technique that assigns a weight value to each feature based on its importance.

    Several algorithms are available for feature ranking,including ReliefF,Information Gain Ratio(IGR),and Principal Component Analysis(PCA).ReliefF[36]is widely used among these due to its simplicity,operational efficiency,and satisfactory results.It exhibits good convergence and efficiency,making it suitable for feature selection in various scenarios[36].

    In the proposed method,the ReliefF algorithm is adapted using the Waikato Environment for Knowledge Analysis (Weka) software [36,37].This adaptation allows for effective feature selection,and the output of this phase is the final feature listδ,which consists of the essential features that significantly contribute to the detection of sinkhole attacks.

    4.3 Behavioral Indicators(Stage 3)

    The Behavioral Indicators stage is a crucial component of this approach as it aims to detect suspicious nodes exhibiting abnormal behavior in RPL networks.By analyzing the selected features from the previous stage (Feature Selection),which include ICMPv6 and power consumption data,this stage identifies and flags any abnormal behavior associated with sinkhole attacks in RPLbased networks.Identifying these abnormal behavior indicators requires repeated experiments and continuous monitoring of sinkhole attack behaviors.Our analysis has revealed that these behaviors can effectively distinguish sinkhole nodes from normal nodes.Moreover,selecting an odd number of behaviors aims to achieve majority voting and prevent deadlock situations,wherein an equal number of votes could lead to indecisiveness.The Behavioral Indicators stage consists of three specific indicators:

    (I)DIO Transaction Frequency:This indicator analyzes the frequency of DIO(DODAG Information Object) transactions in the network.Deviations from the expected transaction patterns can indicate the presence of a sinkhole attack.

    (II) Rank Harmony Behavior: This indicator examines the consistency of rank values among neighboring nodes in the network.In a normal scenario,nodes within a network exhibit a harmonious rank structure.Any significant inconsistencies or disruptions in rank values can suggest the presence of a sinkhole attack.

    (III)Power Consumption Behavior:This indicator monitors the power consumption patterns of individual nodes.Sinkhole attacks often involve abnormal energy usage,and this behavior can be captured by analyzing power consumption data.

    These behavioral indicators serve as footprints or indicators that help identify the presence of sinkhole attacks in RPL networks.By analyzing and comparing the observed behaviors against expected norms,suspicious nodes exhibiting abnormal behavior can be flagged for further investigation.

    4.3.1 DIO Transmission Frequency Behavior

    DIO messages are crucial in RPL as they contain metrics necessary for route creation.As the reliability of the route improves,the frequency and quantity of DIO messages decrease [38].Round Trip Time (RTT) is a control packet that helps determine the distance between neighbors and the root.When the topology is stable,the frequency of DIO messages decreases[39].RPL creates routing topologies based on DODAGs;nodes use DIO messages to establish and maintain these topologies.An increased number of DIO messages indicates an unstable network routing topology[40].The total quantity of DIO messages sent by each node within a specific period,time(t),can determine the impact of a sinkhole attack.The node is considered an attacker if the total quantity of delivered DIO messages falls below or exceeds a threshold.The threshold is determined by the node transmitting data every 10 s.The root adds that node to the blocklist if the received messages are below 30%of the expected quantity[35].The values of DIO_Current and DIO_Previous are calculated using Eqs.(1)and(2).

    If the value of DIO_Current exceeds the threshold,it indicates abnormal DIO Transaction messages.This behavior leads to a significant increase in DIO messages being delivered to neighboring regions.It also affects the topology surrounding the malicious node,generating more DIO messages.This,in turn,increases control overhead and packet collisions.Additionally,the power consumption around sinkhole nodes varies based on the number of sinkholes,which can impact network performance.

    On the other hand,the rest of the network consumes power as it would in the absence of sinkhole attacks.The monitoring node’s role is to passively listen and log all messages passing through the network,which are then sent to the IDS.Whenever a DIO Transmission Frequency Behavior event occurs,triggering an alarm,the next stage(Sinkhole Attack Detection)is initiated.

    4.3.2 Rank Harmony Behavior

    In Rank Harmony Behavior,source nodes in the network select a set of parent nodes and choose the one with a better rank value as their preferred parent.The rank value represents the node’s proximity to the root.However,in a sinkhole attack,the malicious node falsely claims to have a better rank than other nodes,tricking them into selecting it as the preferred parent.The sinkhole node manipulates the network topology by advertising fake routing metrics through illegitimate DIO messages.This behavior becomes evident when multiple illegitimate DIO messages contain false rank information from the parent node to deceive its neighboring nodes in the DODAG.As a result,when data packets are routed through the malicious node,they either get dropped or their routing information is altered,preventing them from reaching the base station.This routing manipulation can change the topology around the malicious node,causing increased control overhead and packet collisions[41,42].Two steps have been defined to identify abnormal ranking behavior,which indicates a sinkhole attack.

    Step 1:Differences between Node’s Rank with Its Parent Node(NRP)

    RPL determines each node’s rank value.The sink node has Rank=0;according to Fig.6,each node’s rank is determined by the sink node count from that node to the sink node plus one.

    In the UVM approach,it is assumed that the initial IoT network is free from any malicious nodes,and the correct routing tables are broadcasted to all nodes before the occurrence of a sinkhole attack[41,42].For instance,in Fig.6,labeled as“DODAG graph(NRP),”the NRP(Neighbor Rank Precedence)value for node N9 is calculated based on its rank and the rank of its parent node N8.The rank of N9 is 4,and its parent node N8 has a rank of 3.By applying Eq.(3),the NRP value of node N9 is determined as|3-4|,resulting in a value of 1.This calculation helps determine the precedence or priority of neighboring nodes in the routing process.

    Step 2:Differences between Source Node Rank with Node Itself(SRN)

    When a malicious sinkhole node attacks the network,the M node(Malicious Node)announces its rank as zero using the DIO message to all neighboring nodes,as shown in Fig.7,practically declaring it as the sink node.Once the sinkhole node’s DIO message is received,node N9 calculates the SRN value according to Eq.(4)[41,42].

    Since the rank value is zero for the source node that transmits the DIO message,and the rank value for node N9=4;therefore,the SRN value for node N9=|0-4|=4.

    Rank harmony classifies a DIO message as malicious when SRN Rank Value>NRP Rank Value.In Fig.7: “DODAG graph (SRN),”node M’s DIO message will be classified as malicious since the SRN Rank Value of N9>NRP Rank Value of N9,as 4>1.

    Figure 6:DODAG graph(NRP)

    The Monitoring node passively listens to all messages passing through the topology.Whenever a Rank Harmony Behavior event occurs,an alarm is triggered to the next stage (Sinkhole Attack Detection).

    4.3.3 Power Consumption Behavior

    The sensors near the sinkhole attack experience a significant depletion of battery power,resulting in a reduced network lifetime and increased control overhead.Additionally,the energy flow around the sinkholes is altered,negatively impacting the network’s overall performance.The extent of energy drainage on neighboring nodes depends on the number of nodes affected by the attack.Conversely,the energy consumption in the remaining parts of the network behaves normally without sinkhole attacks.

    Figure 7:DODAG graph(SRN)

    The monitoring node assumes a passive role,listening to all messages transmitted within the network topology.Whenever a Power Consumption Behavior event is detected,an alarm is triggered,indicating the occurrence of abnormal power consumption.This alarm is then forwarded to the next stage,the Sinkhole Attack Detection phase.

    4.4 Sinkhole Attack Detection(Stage 4)

    This stage aims to decide whether there is a Sinkhole attack according to information from the previous stage(Behavioral Indicators).This stage consists of the following subsequent steps.

    4.4.1 Rule Based

    This step aims to identify suspicious nodes by analyzing the ICMPv6 and power consumption features using specific rules and thresholds.Determining these threshold values involves conducting experiments,observations,and analyses under normal and abnormal conditions.The threshold values obtained are then applied to the behavioral indicators.The following are the rules applied:

    Rule#1:DIO Transaction Frequency Behavior

    The first proposed rule aims to detect DIO Transmission Frequency Behavior using the following rule:

    Here,this the total number of DIO previous messages.Every minute,the total(DIO Transmission frequency behavior) will be calculated for each node.An alert will be triggered if the sum of DIO Transmission messages for each node exceeds the threshold(th).

    Rule#2:Rank Harmony Behavior

    The second proposed rule aims to detect Rank Harmony Behavior using the following rule:

    NRP and SRN will be calculated for each node every minute.Rank Harmony will flag a DIO message as malicious if SRN Rank Value>NRP Rank Value.An alert will be triggered if SRN Rank Value for each node exceeds the NRP Rank Value.

    Rule#3:Power Consumption Behavior

    The third proposed rule aims to detect Power Consumption Behavior using the following rule:

    Here,this the predetermined threshold,configurable and determined by experiments,observation,and analysis under normal and abnormal conditions.The Power Consumption(Node)for each node is calculated.An alert will be triggered if the sum of Power Consumption for each node exceeds theth.

    4.4.2 Unweighted Voting Method for Detecting Sinkhole Attack

    The proposed approach employs an unweighted voting method to correctly identify sinkhole anomalies,where each voter or rule carries equal weight.This means that voters do not express apreference for one candidate over another,making the method less complex as no intricate measures are involved[43].The detection of a sinkhole attack is achieved by applying a majority voting rule to the outcomes of the behavioral rules.In particular,the unweighted voting method requires a majority of over 65%to determine the presence of a sinkhole attack based on the voting result[44].Eq.(5)is utilized for the detection of sinkhole attacks.

    The uniqueness of the unweighted voting method lies in the fact that each voter has equal weight in the decision-making process.Unlike other selection methods,such as Preference Ballots or Plurality,the unweighted voting method does not involve complex measures and allows voters to express their preferences for candidates equally.

    The selection of DIO Transaction Frequency,Rank Harmony Behavior,and Power Consumption Behavior as the indicators for the unweighted voting method is based on their relevance and contribution to the identification of sinkhole nodes in the context of the proposed research.These indicators have been carefully chosen among other options based on their ability to capture key characteristics of sinkhole attacks and differentiate them from normal network behavior.

    While the specific indicators may be tailored to the sinkhole attack detection problem in the IoT context,the unweighted voting method itself can be generalized and applied to other related applications,such as in[31].The method can be adapted by selecting appropriate indicators relevant to the problem at hand.For instance,in a different application domain,such as anomaly detection in network traffic,the unweighted voting method can be employed by selecting indicators that capture the abnormal behavior patterns of interest.

    The unweighted voting method offers simplicity and fairness by providing equal weight to each voter or rule in the decision-making process.It allows for a straightforward implementation and interpretation while ensuring that all indicators are considered equally.This generalizability and flexibility make the unweighted voting method useful in various applications where multiple indicators contribute to decision-making processes.

    The proposed approach is exemplified in the following steps:

    1.Collect and transform the power consumption values and the captured ICMPv6 network traffic into a meaningful format.Filter the power consumption data (e.g.,CPU,LPM,TX,and RX)and from the ICMPv6 packet(e.g.,Source,Destination,and Rank)to select specific features.

    2.Cleanse the data to reduce traffic volume by fixing or removing corrupted,incorrectly formatted,duplicate,or incomplete data within the dataset.

    3.Perform feature selection to decrease the size of the features by selecting the most significant features that contribute to detecting sinkhole attacks.

    4.By analyzing the selected features,utilize behavioral indicators to identify suspicious nodes based on abnormal behavior in RPL networks.The selected features of the ICMPv6 and power consumption from the previous step are inputted into this stage to identify abnormal behavior of the sinkhole attack in RPL-based networks.

    5.In the detection step,two sub-steps are involved:

    a.Rule-Based: Identify suspicious nodes by analyzing the ICMPv6 and power consumption features using specific rules with thresholds.

    b.Unweighted Voting Method: Utilize this method to identify sinkhole anomalies correctly.A sinkhole attack is detected when the results of the rules are received,and a majority voting rule requires a majority of greater than 50%to determine whether there is a sinkhole attack or not,according to the voting result from the UVM.

    5 Experimental Results

    This section explains the dataset used to evaluate the proposed approach and provides insight and discussion regarding the experimental results.

    5.1 Dataset

    The RPL-NIDDS17 dataset evaluates UVM regarding detection accuracy,false-positive rate,and power consumption.To detect sinkhole attacks,to detect sinkhole attacks,the UVM reads the data,and when any of the rules are met,an alert will be triggered to the unweighted voting method.The traffic will be considered an attack if the Sum(Triggers)exceeds 65%.

    The RPL-NIDDS17 dataset contains seven types of modern routing attacks(Sinkhole,Blackhole,Selective Forwarding,Clone ID,Sybil,Hello Flooding,and Local Repair attacks).The analysis of the RPL-NIDDS17 dataset involves evaluating four machine-learning classifiers[45,46].

    NetSim is a tool used to create the RPL-NIDDS17 dataset.The IoT network includes a gateway,sensor nodes,wired nodes,and a router to create the dataset,as shown in Fig.8.

    Figure 8:ELNIDS architecture

    The RPL-NIDDS17 dataset consists of twenty-two attributes,such as Time,Source Destination ID,Packet Type Transmission Control Protocol (TCP),ICMPv6,User Datagram Protocol (UDP),Attack Category,and Label(Normal or Attack)[45,47,48].

    5.2 Hardware and Software Requirements

    The following are the specifications of the hardware used in the proposed approach:

    ? Processors:64-bit Intel?Core i5,2.4 GHz

    ? Hard Drive:250 GB

    ? RAM:12 GB

    ? Network Interface Card:Intel?dual-band Wireless AC 8260

    The following are the specifications of the software used in the proposed approach:

    ? Operating Systems:Ubuntu 12.04,Microsoft Windows 10 Pro(64-bit)

    ? WSN Operating System:Contiki v2.7

    ? Sensor Simulator:COOJA Network Simulator

    ? Hypervisor:VMware Workstation Player 12

    ? Data Cleansing:OpenRefine v3.5.1

    ? Database:Structured Query Language(SQL)Server Management Studio 2017,v17.8.1

    ? Feature’s Selection:WEKA v3.9.5

    ? Network Monitoring Tools:Wireshark v3.2.3

    5.3 Results of Feature Selection Stage

    Sixteen features with the highest ReliefF algorithm value weights are eventually selected and nominated as they contribute to detecting sinkhole attacks.The result of field ranking using the ReliefF algorithm in WEKA tools is shown in Table 2.

    Table 2:List of selected features

    5.4 Results of Behavioral Indicators Stage

    This stage aims to identify suspicious nodes based on abnormal behavior in RPL-based networks by analyzing the features listed in Table 2.The features for abnormal behavior are illustrated in the previous step for detection purposes.

    5.4.1 Detection of DIO Transaction Frequency

    The DIO Transaction Frequency behavior occurs when the quantity of DIO messages reaches its highest level,allowing the determination of a packet as malicious or not [17,49].An abnormal frequency of DIO transmission is observed when the number of released DIO messages exceeds the threshold value.Once the total DIO Transaction Frequency exceeds the threshold value,it indicates that the attack has damaged the DODAG routes.Therefore,the instability of DIO messages may indicate a potential attack.Meanwhile,an alert is triggered by the IDS to proceed to the next stage(Sinkhole Attack Detection).Table 3 displays the DIO Transaction Frequency behavior records for the RPL-NIDDS17 datasets between the parent and destination nodes,as shown in Fig.9.

    Table 3:DIO transaction frequency records

    Figure 9:DIO transaction frequency result

    The RPL-NIDDS17 dataset provides insights into the DIO transmission frequency behavior of Node 07,Node 17,and Node 18.By comparing the total number of DIO transaction messages at minute four(SUM(DIO_Current_Messages))with the threshold represented by the total number of DIO transaction messages at minute three (SUM (DIO_Previous_Messages)),we can determine if there is a potential attack.If the current DIO transaction messages exceed the previous threshold,indicating abnormal behavior,Node 07 is identified as the attacker,confirming that the observed DIO transmission frequency behavior results from a sinkhole attack.Furthermore,Rule No.1 is applied to validate the detection if the sum of DIO transmission messages exceeds the threshold value defined in Eqs.(1)and(2)are considered abnormal behavior and categorized as suspicious.The DIO frequency behavior is then input for the unweighted voting method in the Sinkhole Attack Detection process.

    5.4.2 Detection of Rank Harmony Behavioral Indicators

    The core concept behind Rank Harmony behavior is that nodes in an RPL network are assigned ranks based on their position relative to the root,and their ranks should always be higher than their parent nodes to maintain acyclicity.However,in a sinkhole attack,malicious nodes falsely claim to have better ranks than others,tricking neighboring nodes into selecting them as their preferred parent nodes in the RPL network.This allows the attacker,who has a lower rank,to position themselves closer to the root.By manipulating routing metrics,the malicious node deceives neighboring nodes into establishing communication.

    The Rank Harmony value is calculated and monitored to detect such sinkhole attacks.If the Rank Harmony value exceeds predefined thresholds,it may indicate the presence of an attack.The instability of Rank Harmony values can serve as an indication of a potential attack.Whenever a Rank Harmony behavior event is detected,an alarm is triggered and forwarded to the Sinkhole Attack Detection stage for further analysis.

    By examining the RPL-NIDDS17 dataset,it is observed that Node 07 has a higher Rank Harmony value compared to its parent Node 01.This discrepancy in ranks indicates the presence of Rank Harmony behavior in the dataset.Consequently,in Table 4,Node 07 is labeled as an attacker,affirming that the observed Rank Harmony behavior results from the sinkhole attack.

    Table 4:Rank harmony records

    As a result of applying Rule No.2,it has been confirmed that the NRP Rank Value exceeds the SRN Rank Value;therefore,it is considered suspicious behavior.Rank Harmony behavior results are used as input to the unweighted voting method in the Sinkhole Attack Detection.

    5.4.3 Detection of Power Consumption Behavioral Indicator

    Power consumption values are obtained from passive nodes,and an increase in the power consumption values for CPU,LPM,TX,and RX indicates an unstable network routing topology.Conversely,a decrease in power consumption values suggests network stability.By analyzing the power consumption of each node,the impact of the sinkhole attack can be determined.Table 5 describes the power consumption behavior for the sinkhole node in the RPL-NIDDS17 dataset.

    Table 5:Power consumption records for sinkhole(Node 07)—RPL-NIDDS17 dataset

    As a result of applying Rule No.3,it has been confirmed that the power consumption exceeds the threshold value of 1 mW,indicating suspicious behavior.This increase in power consumption is caused by the sinkhole node collecting traffic from nearby nodes.The sinkhole node receives and processes TX and RX,generating higher power consumption.Table 6 shows the power consumption without the sniffer node,while Table 7 shows the power consumption with the node.

    Table 6:Power consumption(mW)without sniffer node—RPL-NIDDS17 dataset

    The power consumption results presented in Tables 6 and 7 provide insights into the impact of the proposed passive sniffer node on the overall network power consumption.Without the sniffer node,the average power consumption of the entire network is measured at 0.8004 mW.However,when the sniffer node is introduced,the average power consumption slightly increases to 0.8102 mW.This comparison indicates that the average power consumption of the network remains nearly unchanged with the inclusion of the sniffer node,even in the absence of an attack.These findings suggest that the proposed passive sniffer node does not impose a significant power consumption overhead on the network.

    These results are significant as they demonstrate that the proposed passive sniffer node can be seamlessly integrated into the network without causing a notable increase in power consumption.This is crucial for ensuring the practicality and efficiency of the network,as it allows for continuous monitoring and detection of attacks without compromising the overall power efficiency of the system.Fig.10 shows the power consumption results.

    The analysis of power consumption behavior is used as input to the unweighted voting method to detect Sinkhole attacks.

    Figure 10:Power consumption result

    5.5 Comparison with ELNIDS Approach

    This section compares the detection accuracy between the UVM and ELNIDS approaches using the RPL-NIDDS17 dataset,as illustrated in Table 8.

    Table 8:Comparison between UVM and ELNIDS on false-positive rate and detection accuracy rate

    Table 8 shows that the ELNIDS approach achieves the highest detection accuracy rate of 94.5%.Conversely,the lowest detection accuracy rate observed is 77.8%.Furthermore,the simulation results presented in Table 8 illustrate that the UVM approach achieves a 100%detection accuracy rate when utilizing the unweighted voting method,whereas,without the unweighted voting method,the UVM approach achieves a detection accuracy rate of 90% with a false-positive rate of 0.2%.The superior detection accuracy of the UVM approach compared to ELNIDS can be attributed to its utilization of three indicators supported by rules and an unweighted voting method.

    5.6 Discussion

    The results in Table 8 demonstrate that the UVM approach achieves a higher detection accuracy than ELNIDS,as the experimental findings support.This can be attributed to UVM’s utilization of five indicators backed by rules and unweighted voting methods.In contrast,although ELNIDS accurately detects known attacks through its signature-based intrusion detection technique,its reliance on only two indicators,power consumption and ranking,can lead to the failure of attack detection if either of these indicators is not triggered.

    By employing unweighted voting methods,UVM leverages its three major behavioral indicators,namely Rank Harmony,DIO Transaction,and power consumption behavior,resulting in significantly improved detection accuracy.This highlights the effectiveness of UVM in detecting sinkhole attacks within RPL networks compared to ELNIDS.

    Additionally,regarding power consumption,UVM demonstrates the ability to meet the requirements of constrained nodes without increasing energy usage.This contributes to conserving energy,prolonging battery life,and reducing power consumption.In contrast,ELNIDS consumes considerable power due to the necessity of maintaining an extensive attack signature database.The passive node,which collects data without impacting other constrained nodes,measures power consumption with and without its presence.Notably,the average power consumption without the passive node is nearly identical to the average power consumption with the passive node and without any attacks.The passive node,connected through a wired network,ensures it does not interfere with the power supply of normal nodes,aligning with the primary objective of proposing an approach for detecting sinkhole attacks in RPL-based IoT networks with low power consumption.

    6 Conclusion and Future Work

    This paper introduces the UVM as a solution for identifying sinkhole nodes.UVM utilizes three key behavioral indicators,namely DIO Transaction Frequency,Rank Harmony,and Power Consumption,carefully selected for their significant role in detecting sinkhole attacks.These indicators and relevant features from previous research form the foundation of the UVM method.UVM employs an unweighted voting mechanism,enhancing its effectiveness in accurately identifying sinkhole nodes.To evaluate the effectiveness of the UVM in detecting sinkhole attacks on RPL networks for IoT,we conducted experiments using a dataset generated with actual sinkhole attack traffic.The results demonstrate that UVM achieves a high level of accuracy in detecting sinkhole attacks.Without the unweighted voting method,the detection rate is 90%,while with the unweighted voting method,it reaches 100%.The false-positive detection rate is significantly low at 0.2%,with improvement percentages ranging from 12.2% to 5.5%.For future research,there are several avenues to explore.Efforts can be made to expand the applicability of the proposed method to detect other types of attacks on RPL-based networks,such as selective-forward and blackhole attacks.Also,conducting experiments using diverse datasets from different network environments will provide valuable insights.Additionally,exploring the use of real-world testbeds or simulations that closely mimic real-world network conditions will help evaluate the performance of the proposed approach in terms of detection accuracy and power consumption.Furthermore,we intend to conduct additional experiments and observations to identify other behavioral indicators that can assist in detecting sinkhole attacks.

    Acknowledgement:Authors would like to acknowledge the support of the Deanship of Scientific Research at Najran University for this research through Research Groups at Najran University,Saudi Arabia.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Najran University for this research through a Grant (NU/RG/SERC/12/50) under the Research Groups at Najran University,Saudi Arabia.

    Author Contributions:Study conception and design:Al-Sarawi.Shadi,Alabsi.Basim;data collection:Anbar.Mohammed,Rihan.Shaza;analysis and interpretation of results: Anbar.Mohammed,Al-Sarawi.Shadi;draft manuscript preparation: Aladaileh.Mohammad,Rihan.Shaza.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data supporting this study’s findings are available from the corresponding author of[34]upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成熟少妇高潮喷水视频| 日韩欧美国产在线观看| 在线观看日韩欧美| 美女 人体艺术 gogo| 在线av久久热| 搡老熟女国产l中国老女人| 欧美精品啪啪一区二区三区| 91九色精品人成在线观看| 老汉色∧v一级毛片| 大型黄色视频在线免费观看| 久久狼人影院| 欧美在线一区亚洲| 丝袜人妻中文字幕| 91大片在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 国产一区二区激情短视频| 亚洲中文av在线| 最近最新免费中文字幕在线| 美女扒开内裤让男人捅视频| 久久精品亚洲熟妇少妇任你| 国产xxxxx性猛交| 俄罗斯特黄特色一大片| 久久久国产成人精品二区| 一区二区三区国产精品乱码| 婷婷精品国产亚洲av在线| 99在线人妻在线中文字幕| cao死你这个sao货| 一级片免费观看大全| 天天添夜夜摸| 中文字幕高清在线视频| 国产av一区在线观看免费| 精品日产1卡2卡| 日韩一卡2卡3卡4卡2021年| 级片在线观看| 日本三级黄在线观看| 一级毛片女人18水好多| 黑人欧美特级aaaaaa片| 老汉色∧v一级毛片| 后天国语完整版免费观看| 老鸭窝网址在线观看| 国产熟女午夜一区二区三区| 亚洲片人在线观看| 天天躁夜夜躁狠狠躁躁| 国产高清激情床上av| 成人亚洲精品一区在线观看| 亚洲aⅴ乱码一区二区在线播放 | 精品熟女少妇八av免费久了| 国产亚洲av嫩草精品影院| 老鸭窝网址在线观看| 麻豆av在线久日| 日韩有码中文字幕| 老司机福利观看| 国产片内射在线| 亚洲av片天天在线观看| 国产精品亚洲一级av第二区| 女人爽到高潮嗷嗷叫在线视频| 久久久久国产精品人妻aⅴ院| 12—13女人毛片做爰片一| 午夜福利18| 亚洲少妇的诱惑av| 日韩三级视频一区二区三区| 日韩高清综合在线| 少妇的丰满在线观看| 国产aⅴ精品一区二区三区波| 久久国产亚洲av麻豆专区| 国产亚洲精品av在线| 国产亚洲精品一区二区www| 亚洲中文字幕一区二区三区有码在线看 | 精品国产乱子伦一区二区三区| 丝袜美足系列| 亚洲成人免费电影在线观看| 久久国产精品影院| 成人国产一区最新在线观看| 老司机靠b影院| 精品国产超薄肉色丝袜足j| 日本 av在线| 国产伦人伦偷精品视频| 免费久久久久久久精品成人欧美视频| 一边摸一边做爽爽视频免费| 日韩三级视频一区二区三区| 两人在一起打扑克的视频| 欧美日本视频| 亚洲国产看品久久| 丰满人妻熟妇乱又伦精品不卡| 国产1区2区3区精品| 久久久久久人人人人人| 亚洲性夜色夜夜综合| 非洲黑人性xxxx精品又粗又长| 一区二区三区国产精品乱码| 亚洲国产高清在线一区二区三 | 日日摸夜夜添夜夜添小说| 国产亚洲精品久久久久久毛片| 在线永久观看黄色视频| 欧美色视频一区免费| 精品国产乱子伦一区二区三区| 免费在线观看影片大全网站| 亚洲av电影在线进入| 精品国产一区二区久久| 久久精品亚洲熟妇少妇任你| 久久天堂一区二区三区四区| 亚洲人成电影免费在线| 午夜福利影视在线免费观看| 精品一品国产午夜福利视频| 亚洲五月婷婷丁香| 精品久久久久久久人妻蜜臀av | 禁无遮挡网站| 日日爽夜夜爽网站| 国产av在哪里看| 成人免费观看视频高清| www国产在线视频色| 欧美精品啪啪一区二区三区| 在线免费观看的www视频| 如日韩欧美国产精品一区二区三区| 怎么达到女性高潮| 99国产极品粉嫩在线观看| 久久精品人人爽人人爽视色| 中出人妻视频一区二区| 亚洲中文字幕日韩| 亚洲av电影在线进入| 性少妇av在线| 午夜激情av网站| av视频免费观看在线观看| 午夜福利在线观看吧| 91大片在线观看| 麻豆久久精品国产亚洲av| 国产精品九九99| 欧美日韩一级在线毛片| 无限看片的www在线观看| 午夜福利欧美成人| 成人手机av| 中文字幕久久专区| 久久人人精品亚洲av| 日日干狠狠操夜夜爽| 日本三级黄在线观看| 成人特级黄色片久久久久久久| 19禁男女啪啪无遮挡网站| 国产成人一区二区三区免费视频网站| 曰老女人黄片| 变态另类丝袜制服| 成年女人毛片免费观看观看9| 亚洲最大成人中文| 99国产精品免费福利视频| 国产极品粉嫩免费观看在线| 岛国在线观看网站| 国产一区二区三区综合在线观看| 久久草成人影院| 成年版毛片免费区| 国产精品免费一区二区三区在线| 免费在线观看亚洲国产| 九色亚洲精品在线播放| 成人免费观看视频高清| 在线观看午夜福利视频| 十分钟在线观看高清视频www| 欧美一级a爱片免费观看看 | 性色av乱码一区二区三区2| 波多野结衣一区麻豆| 一级毛片高清免费大全| 日本黄色视频三级网站网址| 婷婷精品国产亚洲av在线| 叶爱在线成人免费视频播放| 久久国产精品人妻蜜桃| 色在线成人网| 国产亚洲av嫩草精品影院| 麻豆一二三区av精品| 天天躁狠狠躁夜夜躁狠狠躁| 欧美成狂野欧美在线观看| 波多野结衣巨乳人妻| 丁香欧美五月| 亚洲五月婷婷丁香| 超碰成人久久| 国产精品,欧美在线| 免费人成视频x8x8入口观看| 亚洲第一欧美日韩一区二区三区| 高潮久久久久久久久久久不卡| 精品国产超薄肉色丝袜足j| 国产精品香港三级国产av潘金莲| 叶爱在线成人免费视频播放| 成人国语在线视频| 国产伦一二天堂av在线观看| 妹子高潮喷水视频| 免费在线观看完整版高清| 最近最新免费中文字幕在线| www国产在线视频色| 好看av亚洲va欧美ⅴa在| 黑人巨大精品欧美一区二区蜜桃| 女生性感内裤真人,穿戴方法视频| 国产精品精品国产色婷婷| 免费人成视频x8x8入口观看| 亚洲色图 男人天堂 中文字幕| 亚洲一区高清亚洲精品| 看免费av毛片| 亚洲av成人一区二区三| 亚洲人成网站在线播放欧美日韩| 亚洲成人精品中文字幕电影| 丁香欧美五月| 国产免费av片在线观看野外av| 国产黄a三级三级三级人| 国产精品精品国产色婷婷| 日韩高清综合在线| 亚洲第一欧美日韩一区二区三区| 国产高清视频在线播放一区| 又大又爽又粗| 亚洲专区字幕在线| 99在线人妻在线中文字幕| 成年女人毛片免费观看观看9| 激情视频va一区二区三区| 午夜福利免费观看在线| 久久热在线av| 国产又色又爽无遮挡免费看| 女警被强在线播放| 一边摸一边做爽爽视频免费| 日本a在线网址| 久久国产精品人妻蜜桃| 国产不卡一卡二| 欧美成狂野欧美在线观看| 成人永久免费在线观看视频| 天堂√8在线中文| 成年女人毛片免费观看观看9| 欧美黄色淫秽网站| 午夜激情av网站| 亚洲成av片中文字幕在线观看| 女警被强在线播放| 亚洲中文字幕日韩| 国产亚洲欧美在线一区二区| 国产亚洲欧美98| 9热在线视频观看99| 成人三级黄色视频| 最近最新免费中文字幕在线| 超碰成人久久| 亚洲av电影在线进入| 级片在线观看| 久久狼人影院| 两人在一起打扑克的视频| 黄网站色视频无遮挡免费观看| 丝袜美腿诱惑在线| 国产日韩一区二区三区精品不卡| 国产一区在线观看成人免费| 性少妇av在线| 黄色 视频免费看| 国产高清有码在线观看视频 | 一级,二级,三级黄色视频| 日韩大尺度精品在线看网址 | 国产精品一区二区免费欧美| 男人舔女人下体高潮全视频| 夜夜夜夜夜久久久久| 亚洲 欧美 日韩 在线 免费| 免费人成视频x8x8入口观看| 熟妇人妻久久中文字幕3abv| 一二三四社区在线视频社区8| 亚洲av电影不卡..在线观看| 波多野结衣高清无吗| 日韩高清综合在线| 9热在线视频观看99| 亚洲av日韩精品久久久久久密| 丰满人妻熟妇乱又伦精品不卡| 涩涩av久久男人的天堂| 99精品久久久久人妻精品| 黄色成人免费大全| 亚洲欧美一区二区三区黑人| 午夜日韩欧美国产| 美女高潮喷水抽搐中文字幕| 成人三级做爰电影| 亚洲少妇的诱惑av| 三级毛片av免费| 亚洲精品一卡2卡三卡4卡5卡| 国产成人精品在线电影| 国产精品电影一区二区三区| 色综合亚洲欧美另类图片| 亚洲人成伊人成综合网2020| 精品电影一区二区在线| 青草久久国产| 亚洲专区国产一区二区| 大型av网站在线播放| 热re99久久国产66热| 免费在线观看完整版高清| 亚洲av电影不卡..在线观看| 亚洲欧美日韩无卡精品| aaaaa片日本免费| 老汉色∧v一级毛片| 亚洲精品中文字幕一二三四区| 久久青草综合色| 丰满的人妻完整版| 亚洲国产中文字幕在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 最新在线观看一区二区三区| 嫩草影视91久久| 午夜免费激情av| 久久久久国产精品人妻aⅴ院| 日韩视频一区二区在线观看| 精品久久久久久久人妻蜜臀av | 免费久久久久久久精品成人欧美视频| 丁香欧美五月| 国内精品久久久久久久电影| 纯流量卡能插随身wifi吗| 亚洲人成电影观看| 久久国产精品影院| 最近最新免费中文字幕在线| 9热在线视频观看99| 免费看美女性在线毛片视频| 欧美乱码精品一区二区三区| 欧美激情极品国产一区二区三区| 欧美一级a爱片免费观看看 | 在线观看免费视频网站a站| 黄色片一级片一级黄色片| 国产视频一区二区在线看| 日日干狠狠操夜夜爽| 美国免费a级毛片| 国产黄a三级三级三级人| 91大片在线观看| 亚洲精品久久成人aⅴ小说| 成人国语在线视频| 午夜福利18| 精品一区二区三区四区五区乱码| 午夜精品国产一区二区电影| 在线观看日韩欧美| 每晚都被弄得嗷嗷叫到高潮| 久久性视频一级片| 黄网站色视频无遮挡免费观看| 母亲3免费完整高清在线观看| 国产伦一二天堂av在线观看| 欧美日韩乱码在线| 国产熟女xx| 亚洲精品粉嫩美女一区| 窝窝影院91人妻| 国产一卡二卡三卡精品| 午夜成年电影在线免费观看| 日韩 欧美 亚洲 中文字幕| 最新在线观看一区二区三区| 在线视频色国产色| 日本vs欧美在线观看视频| 麻豆久久精品国产亚洲av| 一本久久中文字幕| 亚洲欧美激情在线| 日韩高清综合在线| 成人特级黄色片久久久久久久| a级毛片在线看网站| 日韩国内少妇激情av| 黄色视频,在线免费观看| 国产激情欧美一区二区| 国产黄a三级三级三级人| 黄片播放在线免费| 十八禁网站免费在线| 亚洲天堂国产精品一区在线| 黄色女人牲交| 午夜久久久久精精品| 亚洲精品久久成人aⅴ小说| 成人三级做爰电影| 男女下面进入的视频免费午夜 | 成人国语在线视频| 亚洲电影在线观看av| 久久中文字幕一级| 国产在线精品亚洲第一网站| 国产亚洲精品第一综合不卡| 大香蕉久久成人网| 91九色精品人成在线观看| 国产精品免费一区二区三区在线| 免费在线观看亚洲国产| 久热爱精品视频在线9| 国产一区二区三区在线臀色熟女| 成人18禁高潮啪啪吃奶动态图| 国产男靠女视频免费网站| 国产色视频综合| 中文字幕精品免费在线观看视频| 亚洲片人在线观看| 99香蕉大伊视频| 又黄又爽又免费观看的视频| 国产精品免费一区二区三区在线| 国产精品秋霞免费鲁丝片| 激情在线观看视频在线高清| 欧美激情 高清一区二区三区| 欧美丝袜亚洲另类 | 日韩欧美国产一区二区入口| 久久亚洲真实| 黄色成人免费大全| 日韩高清综合在线| 欧美日韩黄片免| 国产av又大| 身体一侧抽搐| 国产精品美女特级片免费视频播放器 | 日本黄色视频三级网站网址| 给我免费播放毛片高清在线观看| 午夜视频精品福利| 国产成人av教育| 成人av一区二区三区在线看| 18禁黄网站禁片午夜丰满| 午夜福利高清视频| 国内精品久久久久久久电影| 亚洲国产精品sss在线观看| 女人被狂操c到高潮| 国产三级在线视频| 少妇的丰满在线观看| 巨乳人妻的诱惑在线观看| www国产在线视频色| 亚洲伊人色综图| 亚洲免费av在线视频| 婷婷精品国产亚洲av在线| 女人精品久久久久毛片| 国产xxxxx性猛交| 色av中文字幕| 少妇被粗大的猛进出69影院| 久久人妻av系列| 在线免费观看的www视频| 黄色a级毛片大全视频| 国产精品免费一区二区三区在线| 免费观看精品视频网站| 色综合站精品国产| 黑人操中国人逼视频| 欧美日韩亚洲综合一区二区三区_| 无限看片的www在线观看| 日本a在线网址| 老熟妇乱子伦视频在线观看| 一级,二级,三级黄色视频| 黑人巨大精品欧美一区二区mp4| 大香蕉久久成人网| 午夜福利高清视频| 夜夜夜夜夜久久久久| 国产又爽黄色视频| 法律面前人人平等表现在哪些方面| 婷婷六月久久综合丁香| 我的亚洲天堂| 91成年电影在线观看| 国产亚洲精品一区二区www| 午夜亚洲福利在线播放| av免费在线观看网站| 国产成人影院久久av| 妹子高潮喷水视频| 久久这里只有精品19| 亚洲精品一区av在线观看| 性欧美人与动物交配| 日韩 欧美 亚洲 中文字幕| 国产精品 欧美亚洲| 日韩欧美三级三区| 啦啦啦韩国在线观看视频| 琪琪午夜伦伦电影理论片6080| 热re99久久国产66热| 精品国产乱码久久久久久男人| 熟妇人妻久久中文字幕3abv| 久久亚洲真实| 欧美日韩黄片免| 黄色片一级片一级黄色片| 午夜免费成人在线视频| 欧美成人免费av一区二区三区| 亚洲熟妇中文字幕五十中出| 日韩大尺度精品在线看网址 | 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲人成网站在线播放欧美日韩| 久9热在线精品视频| 999久久久国产精品视频| 午夜老司机福利片| 国产在线观看jvid| 亚洲欧洲精品一区二区精品久久久| 精品乱码久久久久久99久播| 看黄色毛片网站| 男女之事视频高清在线观看| 国产精品98久久久久久宅男小说| 99在线视频只有这里精品首页| 波多野结衣高清无吗| 欧美一级毛片孕妇| 在线永久观看黄色视频| 啦啦啦韩国在线观看视频| 大陆偷拍与自拍| 亚洲一区中文字幕在线| 久久久久九九精品影院| 自线自在国产av| 国产亚洲欧美98| 久久精品aⅴ一区二区三区四区| 黑人欧美特级aaaaaa片| 嫩草影院精品99| 欧美 亚洲 国产 日韩一| 中亚洲国语对白在线视频| 身体一侧抽搐| 国产97色在线日韩免费| 国产精品久久久人人做人人爽| 精品久久久久久久久久免费视频| 亚洲无线在线观看| 欧美日本视频| 18美女黄网站色大片免费观看| 亚洲国产高清在线一区二区三 | 亚洲男人的天堂狠狠| 亚洲第一青青草原| 热re99久久国产66热| 欧美成人性av电影在线观看| 亚洲成人免费电影在线观看| 国内精品久久久久久久电影| avwww免费| 高潮久久久久久久久久久不卡| or卡值多少钱| 激情在线观看视频在线高清| 99在线视频只有这里精品首页| 免费看a级黄色片| 亚洲国产精品久久男人天堂| 免费高清视频大片| 又黄又粗又硬又大视频| www.www免费av| 18禁观看日本| 成人三级做爰电影| 99国产精品免费福利视频| 欧美日本视频| 日韩高清综合在线| 久久欧美精品欧美久久欧美| svipshipincom国产片| 欧美日本中文国产一区发布| 天天一区二区日本电影三级 | 伊人久久大香线蕉亚洲五| 欧美一级毛片孕妇| 深夜精品福利| 亚洲自偷自拍图片 自拍| 麻豆av在线久日| 18禁观看日本| 午夜久久久在线观看| 日本精品一区二区三区蜜桃| 一本综合久久免费| 久久久久九九精品影院| 最好的美女福利视频网| 亚洲天堂国产精品一区在线| 大陆偷拍与自拍| 侵犯人妻中文字幕一二三四区| bbb黄色大片| 国产一区在线观看成人免费| 怎么达到女性高潮| 18禁美女被吸乳视频| 久久精品91蜜桃| 日本撒尿小便嘘嘘汇集6| 日本 av在线| 一级毛片精品| 一级片免费观看大全| 午夜福利高清视频| 法律面前人人平等表现在哪些方面| 天堂√8在线中文| 欧美日韩瑟瑟在线播放| 精品欧美国产一区二区三| 欧美+亚洲+日韩+国产| 久久伊人香网站| 99在线人妻在线中文字幕| 757午夜福利合集在线观看| 制服诱惑二区| 久久国产精品男人的天堂亚洲| xxx96com| 国产亚洲精品久久久久5区| 一边摸一边做爽爽视频免费| e午夜精品久久久久久久| 亚洲激情在线av| 黑人操中国人逼视频| 亚洲人成电影观看| 国产三级在线视频| 久久国产精品人妻蜜桃| 黄频高清免费视频| 老汉色∧v一级毛片| 成人三级做爰电影| 亚洲精品国产精品久久久不卡| 亚洲国产精品合色在线| 亚洲人成电影免费在线| 国产av一区二区精品久久| 精品久久久久久久人妻蜜臀av | 搞女人的毛片| 后天国语完整版免费观看| 99re在线观看精品视频| 可以在线观看毛片的网站| 99国产精品一区二区蜜桃av| 少妇粗大呻吟视频| 成人亚洲精品av一区二区| 琪琪午夜伦伦电影理论片6080| 欧美精品亚洲一区二区| 久久这里只有精品19| 久久精品国产清高在天天线| 咕卡用的链子| 成人手机av| 国产一区在线观看成人免费| 免费一级毛片在线播放高清视频 | 亚洲精品中文字幕在线视频| 人妻久久中文字幕网| 国产精品日韩av在线免费观看 | 国产麻豆成人av免费视频| 国产蜜桃级精品一区二区三区| netflix在线观看网站| 久久久久九九精品影院| 亚洲国产精品999在线| 脱女人内裤的视频| a级毛片在线看网站| 婷婷精品国产亚洲av在线| 久久影院123| 少妇裸体淫交视频免费看高清 | 国语自产精品视频在线第100页| 国产麻豆69| 国产又色又爽无遮挡免费看| 久久久久久久久中文| 日韩大码丰满熟妇| 国产三级在线视频| 脱女人内裤的视频| av视频在线观看入口| 欧美+亚洲+日韩+国产| 欧美大码av| 日日干狠狠操夜夜爽| 999久久久国产精品视频| 狂野欧美激情性xxxx| 国产蜜桃级精品一区二区三区| 一级毛片女人18水好多| 超碰成人久久| 精品熟女少妇八av免费久了| 久久精品国产亚洲av香蕉五月| 91在线观看av| 一区二区三区精品91| 美女大奶头视频| 一级毛片高清免费大全| 国产成人影院久久av| 99re在线观看精品视频| 一区二区三区国产精品乱码| 国产亚洲av嫩草精品影院| 国产不卡一卡二| 在线观看舔阴道视频| 真人一进一出gif抽搐免费| 久久婷婷人人爽人人干人人爱 | 99riav亚洲国产免费| 一级a爱片免费观看的视频| 波多野结衣巨乳人妻|