• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    2023-12-15 03:57:10ArifHussainMagsiAliGhulamSaifullahMemonKhalidJaveedMusaedAlhusseinandImadRida
    Computers Materials&Continua 2023年11期

    Arif Hussain Magsi,Ali Ghulam,Saifullah Memon,Khalid Javeed,Musaed Alhussein and Imad Rida

    1State Key Laboratory of Networking and Switching Technology,Beijing University of Post and Telecommunication,Beijing,100876,China

    2Information Technology Center,Sindh Agriculture University,Tandojam,70050,Pakistan

    3Department of Computer Engineering,College of Computing and Informatics,University of Sharjah,Sharjah,27272,United Arab Emirate

    4Department of Computer Engineering,College of Computer and Information Sciences,King Saud University,P.O.Box 51178,Riyadh,11543,Saudi Arabia

    5Laboratory Biomechanics and Bioengineering,University of Technology of Compiegne,Compiegne,60200,France

    ABSTRACT Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection (BurST-ADMA).We used five (05) hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication.

    KEYWORDS Named data networking;vehicular networks;reputation;caching;machine-learning

    1 Introduction

    The persistent increase in traditional vehicles has led to greater convenience for people but has also raised the risk of fatal incidents.As per a forecast made in 2015,the number of automobiles is expected to double in coming 10 to 20 years [1].In such a situation,VANET [2] is an indispensable and most prominent state-of-the-art solution.It exchanges massive amounts of information to improve transportation efficiency,prevent road accidents,deliver emergency services,provide traffic and weather updates,reduce traffic congestion,and delivers infotainment services.VANET-aided vehicles are equipped with robust Onboard Unit(OBU)resources,including fast computational power,ample storage capacity,and communication capabilities via Dedicated short-range communication(DSRC)and Wireless in Vehicular Environment(WAVE),also denoted as IEEE 802.11p[3].Within VANET,vehicles can communicate in various ways,including Vehicle-to-Vehicle(V2V)and Vehicleto-Infrastructure (V2I) communication.Despite its numerous capabilities,the existing IP-based communication system in VANET cannot support an extremely complex network caused by the mobility of vehicles,intermittent connectivity,device heterogeneity,and rapid topology changes that cause performance bottlenecks.

    To address these unprecedented challenges,Named Data Networking (NDN) [4],which is one of the most effective network paradigms in the realm of Information-Centric Networking (ICN)[5] architecture.NDN is poised to replace the host-centric content transmission with a contentcentric network.Van Jacobson is credited for introducing the NDN technology as part of a research project initiated by the Palo Alto Research Center (PARC) [6].NDN has emerged as a prominent communication architecture in the realm of ICN by leveraging content as the fundamental unit of communication without regard for the content provider or its physical location.NDN comprises three distinct nodes.Content Consumer:The content consumer is a resource-intensive node that requests the data.Content Producer:It provides the requested data to the content consumer nodes.Intermediate Node:The intermediate nodes serve as relay nodes.They forward interest and data packets between consumers and producers.Another vital responsibility of this node involves storing the content within its local cache memory,thereby serving consumers without approaching the producers.The communication in NDN comprises two types of packets:interest packetsanddata packets.A content consumer initiates the communication by sending an interest packet that expresses the desired content’s name.The intermediate node forwards the interest packet to neighboring nodes if it has no content in its CS.Upon receiving the interest packet,the producer sends a corresponding data packet with the requested content,following the reverse path to the consumer.The data packet contains the content metadata,such as the name or identifier of the content and cryptographic signatures.This interest-data packet exchange model in NDN differs from the traditional client-server model used in IP networks,where a client sends a request to a specific server for content.

    In addition,NDN incorporates three essential data structures in each node.Content Store(CS):Vehicles can cache content they receive and use it to respond to future requests for the same content.This caching behavior can reduce the network’s load and latency by allowing content to be served locally instead of being fetched from the source every time.Pending Interest Table(PIT):It is a table in every NDN node that records pending interests and their names received from different interfaces that have yet to be satisfied.Forward Information Base(FIB):Maintains information about corresponding outgoing interfaces to route the interest packet.

    These data structures allow nodes to efficiently store,retrieve,and route content in the network.The content retrieval mechanism in NDN is based on the pull model,where a consumer node initiates communication by sending an interest packet.Upon receiving the interest packet,the nodes within one hop of the consumer check their CS for the requested content.If the content is found at any neighboring node,it is returned to the consumer as a data packet.If the requested content is unavailable in CS,the intermediate node turns to the PIT table to check for unmet interests and their interfaces.If a similar interest already exists in the PIT,the interest is discarded,and the interface name is recorded.If no matching interest exists in the PIT,a new entry is created,and the interest is forwarded to the upstream node based on the longest prefix match in FIB.Eventually,the content-producing node provides the required content as a data packet since the provider cannot provide the content without receiving an interest packet.Fig.1 illustrates the communication architecture of VNDN.

    Figure 1:Content transmission in VNDN

    NDN has been exploited in various research arenas,namely VANET [7],Internet of Things(IoT) [8],Wireless Sensor Networks (WSN) [9],and others.Unlike IP-based architecture,NDN supports high mobility and a dynamic typology that allows content transmission without establishing a connection between two endpoints.In contrast to IP-based communication,NDN retrieves content using a unique hierarchical name,irrespective of the content provider or its location,which shifted the content retrieval mechanism from“where”to“what”[10].In particular,NDN has excellent potential to improve network performance by enhancing content access and reducing communication delay.

    However,existing VNDN encounters various challenges,including caching,routing,security,and privacy.In particular,security attacks,including Content Poisoning Attacks(CPA)[11],Interest Flooding Attacks (IFA) [12] and Man-in-Middle Attacks [13].These attacks can pose significant threats to network security and should be mitigated through appropriate measures.Specifically,CPA is exceptionally challenging due to attacker vehicles employing forged packets with correct names.Consequently,intermediate nodes receive,cache and serve the malicious content to consumers.Thus,the whole network fails to receive the correct information.On the other hand,the default content caching strategy in NDN,such as Leave Copy Everywhere (LCE),caches and forwards the content among other nodes without evaluating the legitimacy of content,which leads the intermediate nodes to store a plethora of incorrect content in their local storage.

    Another drawback of the existing NDN in VANET is its default receiver driven content dissemination mechanism,where vehicles must initial an interest packet to receive corresponding information.However,this request-response mechanism fails to provide incident reports,traffic information and advertisements in VANET.In VANET,the vehicles cannot wait for content consumers to request specific information.For instance,traffic jam information in a specific location must be shared among other vehicles without expecting an interest packet.

    Meanwhile,existing NDN in VANET lacks to ensure the vehicles’privacy due to the unavailability of reliable and secure infrastructure.The centralized cloud architecture[14]is a famous infrastructure to provide several services.For example,companies like Amazon and eBay leverage a trusted third party to maintain their reputations [15].However,centralized cloud infrastructure is infeasible in VNDN due to the mobility of vehicles.

    In order to address the issues mentioned above,several innovative methodologies have been suggested in the scientific literature.Among these,the signature verification strategy has been proposed as a viable approach to prevent CPA by verifying the genuineness of content using digital signatures[16,17].In this connection,authors in[11]proposed Public Key Digests(PPKD)information of the content publisher.This approach uses an interest packet self-authentication verification system.In response to a packet,the intermediate node verifies the PPKD of the interest packet and identifies the CPA.However,verifying each packet at the intermediate node VNDN is infeasible due to the vehicles’mobility and intermittent connectivity.Other strategies include popularity-based content caching[18,19],reputation-based systems[20],and trust management schemes[21].An initial attempt to address these challenges was made in[20],which proposed an in-network trusted content caching system based on a reputation system.Although this approach is essential,it does not adhere to the native content exchange mechanism of NDN.At present,less effective or partial solutions to detect and prevent CPA have been considered in the literature.Moreover,Machine-Learning (ML)-based prediction systems have been exploited in various areas,including e-commerce[22],fraud detection,disease diagnosis[23]and so forth.However,no research contribution has yet been made to collectively cope with ML-based security attacks,privacy,routing,and caching problems in VNDN.

    Unlike traditional rules-based techniques in literature,we propose a novel and efficient approach to identify and prevent CPA attackers using highly accurate Machine Learning(ML)algorithms.In this research,we initially enable the Roadside Units(RSUs) to collect and store every host vehicle’s reputation (positive or negative) in a blockchain database.Subsequently,RSUs perform ML algorithms over the aggregate reputation of host vehicles and classify them as attackers or non-attacker.In order to perform ML classification,there are various publicly available datasets[24].The most recent real-time dataset for V2V is proposed in[25],including car tracking,cooperative perception tasks,and localization.Another recent work presented a dataset for accident prediction[26].In order to detect CPA,we employed a publicly accessible BurST-Australian dataset for Misbehavior Detection(BurSTADMA)[27].Based on classification results,we provide a content caching algorithm implemented at the intermediate nodes that queries the legitimacy of host vehicles from RSU and determines to store or discard the content.Moreover,we propose a content dissemination system that uses the pub-sub mechanism to disseminate host vehicles’reputations among RSUs.

    Thus,the motivation of this study is to detect and thwart attacker attacker vehicles from serving malicious content and ensure the trustworthiness between vehicles.This research aims to enhance the privacy of every vehicle and propose a reliable content dissemination and caching solution.For this paper,the main contributions are as follows:

    (1) We propose an ML-based CPA identification and mitigation mechanism that enables the intermediate nodes to store or drop the packet based on the content provider legitimacy.

    (2) We use five(5)different ML classifiers and compare their accuracy in identifying attacker and non-attacker vehicles.

    (3) We incorporate blockchain to ensure the privacy of vehicles.Our blockchain system maintains the credibility of each vehicle in distributed ledger.

    (4) We enhance default NDN’s scope from pull to a push-based content dissemination using pubsub mechanism.

    The remainder of this article is organized as follows: Section 2 outlines the existing work.In Section 3,we propose a content caching architecture.Section 4 presents our ML framework for reputation evaluation.Section 5 exhibits experimental results.Lastly,Section 6 ends the article with a conclusion.

    2 Related Work

    Over the years,a wide range of literature has focused on detecting anomalies and attacks in VNDN[28].The existing research witnesses a significant contribution in detecting and preventing CPA.In particular,efficient content caching in VNDN[29]has been explored in the literature.The strategies for effective CPA detection includes popularity-oriented content caching [30],cooperative caching[31]and rating-based trust management systems[32,33].Conversely,ML has been incorporated into VANET for CPA detection and prevention.Hence,we divided the related work into the non-learning rule-based approach and the learning-based system for CPA detection and prevention.

    2.1 Rule-Based CPA Mitigation

    The non-learning-based CPA detection mechanism involves a static and pre-defined thresholdbased rule.A content producer is considered trusted in this architecture if it meets a user-defined threshold value.In a non-learning-based attack detection system,the intermediate nodes determine the reputation value of host vehicles before caching content.To this end,authors in [34] proposed a rating-based blockchain scheme to detect and prevent CPA in NDN.This scheme assigns the ratings (positive or native) to the node based on their legitimacy.This work proposed a honeyguide search algorithm that is derived from a biological rule-based system.This mechanism assigns an initial reputation to each node that is updated as per behavior of the content-producing node.This work includes a Malicious Vehicle Table(MVT)that contains a list of CPA.The intermediate nodes query the reputation of CPA from MVT before caching content.Rezaeifar et al.[33] introduced a CPA detection scheme using trust management in NDN.This mechanism identifies invalid content by defining three metrics: the node’s credibility,the content’s popularity,and the negative feedback the content consumers provide.Similarly,Khelifi et al.[20] presented a caching scheme based on reputation in VNDN that utilizes blockchain technology to enable secure and efficient caching.This scheme involves an intermediate node caching content if the provider meets a threshold reputation value.Subsequently,the authors extended the scope of their current work in[35]by integrating IFA.The reputation-based content caching policy in both references is based on an algorithm that decides whether to allow the data packet to be cached and forwarded back to the consumer or to drop the packet.Ghali et al.[36]introduced a ranking-based content caching scheme that assigns the ranking to cached content based on an exclusion field provided by consumers.This field includes three metrics:the number of exclusions,the exclusion time distribution,and the exclusion ratio.By evaluating these metrics,a router determines the ranking of stored content and provides high-ranked content to the consumer.

    In addition,reference [18] introduced a Most Popular Content (MPC) system,which enables the nodes to store the most popular content.The content popularity depends on the hit ratio at each node.In order to achieve this goal,each node stores a local popularity table containing the name of content and its corresponding popularity score.If a piece of content exceeds a pre-defined popularity threshold,the corresponding node will cache it in its local cache.However,this scheme is vulnerable to content pollution attacks,where adversary nodes can repeatedly send interests for unpopular content,which leads the nodes to cache unwanted content.In[37],authors proposed trustbased traffic validation information,where RSUs collect traffic events from vehicles and evaluate the legitimacy of the information by broadcasting the same information among vehicles passing through the corresponding area.Once the collected data is identified as valid,the host vehicle will be considered reputed and notified about the event to all the adjacent vehicles.The authors integrated blockchain with VANET[38]to securely store the reputation scores of each vehicle.In this scheme,all the vehicles collectively elect a temporary miner based on the threshold value defined by Trusted Authority(TA).The elected miner has the right to broadcast the block,followed by packing the transactions,which are then verified by other receiving vehicles before being stored in the blockchain.Sun et al.[39]presented a trust-based scheme for evaluating the reputation of vehicles.They used Kalman filtering and chisquared tests to identify the trusted vehicles in VANET.Based on the reputation of a vehicle,the neighboring vehicles determine whether to accept or reject the information.Similarly,Yang et al.[40]proposed a reputation system for determining the content’s reputation in VANET.In this work,ratings are handed over to the content providers and further disseminated to a provisionally chosen node as blocks.Thus,these nodes disseminate the reputation among other nodes.Despite significant contributions,the works mentioned above have limitations,as mentioned in Table 1 below:

    Table 1: Rule-based CPA detection

    2.2 Learning-Based Attack Mitigation

    ML and Deep Learning (DL) have rapidly developed in different research areas,such as attack detection,image inpainting models [41] and fraud detection.Specifically,ML is most accurate for classification problems,whereas DL has obvious advantages in complex problems such as image[42] and voice recognition.The learning-based attack detection mechanism involves ML algorithms for classifying attackers and non-attackers with high accuracy.Several ML-based attack detection mechanisms proposed in the literature,such as authors in[43],evaluated the performance of Logistic Regression(LR)and Support Vector Machine(SVM)for misbehavior detection.Their results exhibit that SVM performs better than LR in terms of accuracy.Similar to our research,reference [44]exploits a reputation-based misbehavior detection system,where every vehicles’reputation is shared with RSUs.The RSUs perform ML classification to validate the host vehicle’s reputation.When a vehicle is classified as an attacker,the RSU propagates such information among all the neighboring RSUs and vehicles.Similarly,the authors in[45]employed binary and multi-classification techniques for detecting and identifying attack types.Their significant contributions showed promising results for detecting misbehaving vehicles in traditional VANETs.In[27],authors proposed a BrustADMA dataset and evaluated the performance of different classifiers.Based on the results,RF performed excellently compared to other ML algorithms.Table 2 illustrates the summarized ML-based related work and their limitations in attack detection systems.

    Table 2: ML-based CPA detection

    Compared to existing contributions,which focus on an individual issue or have not adequately addressed the ML-based attacks detection solutions in VNDN,our proposed approach addresses multiple challenges by leveraging ML to detect and predict vehicles’reputations and integrating blockchain technology to store this information in a VNDN environment securely.Our method mitigates CPA by allowing intermediate nodes to store or neglect the data packet based on prior legitimacy detected by ML classifiers.See Table 3 for a list of notations used in our research.

    Table 3: Summary of notations

    3 Proposed System Model

    This section is mainly divided into three parts.First,we introduce the primary components and their respective responsibility in our proposed scheme.Afterward,we propose a content forwarding and caching mechanism based on Algorithm 1,aiming to detect and prevent CPA In addition,we present Algorithm 2,which is designed for content validation and dissemination among RSU through the utilization of a suitable naming structure.Finally,we propose a blockchain oriented block dissemination and validation scheme.

    3.1 System Components

    Our proposed mechanism mainly comprises three entities:the TA,vehicles,and RSUs.Each entity plays an important role in ensuring content transmission in VNDN.

    TA:In our proposed mechanism,the TA is the governmental traffic department responsible for registering and authenticating vehicles and RSUs.The TA generates a pair of public and private keys for each registered entity,which are used to encrypt and decrypt blockchain transactions.

    Vehicles:The OBU-equipped vehicles are the main entities in our proposed mechanism.The vehicle can be content consumers,intermediate nodes or content producers.The vehicles are further divided into two categories: public buses and cars.Depending on the situation,the role of vehicles in our proposed model is interchangeable.For example,a content consumer can be a relay node or producer in another situation.

    RSU:The role of RSU is pivotal in our proposed system;they serve as important infrastructure elements that help to support communication between vehicles and facilitate the delivery of services to vehicles.RUSs are equipped with superior computational power and uninterrupted stability in the network.All RSUs have been designated to gather and anticipate reputation data through ML algorithms.We assume all the RSUs are blockchain nodes.

    3.2 Content Forwarding and Caching Scheme

    As indicated in Fig.2,the content consumer initiates the communication process by broadcasting an interest packet to request specific content.When a vehicle receives an interest packet,it first verifies its cache to see if it has the requested content.If the content is in its CS,it will immediately send a data packet containing the content back to the requester.If the content is not in the CS,the interest packet will be forwarded further into the network until it reaches a producer.A vehicle with the matching content transmits a data packet to the intermediate vehicle,which contains additional information,such as the producer’s cryptographic signature,identification details,and other optional fields.The intermediate vehicle then queries its local storage to check the aggregate reputation of the content producer.It is to be noted that every vehicle can obtain an updated reputation of vehicles from the nearest RSU at any time.If the reputation of the content producer is found to be an attacker,the intermediate vehicle immediately discards the data packet without caching and forwarding it to the content consumer.The RSU utilizes ML to detect the reputation and classify the vehicles as either attacker (0) or legitimate (1).Based on this information,the intermediate vehicle determines whether to store and provide the content to the consumer or discard the packet.

    Figure 2:Content caching mechanism

    Our proposed Algorithm 1 verifies the legitimacy of host vehicle before storing content at the intermediate node.The intermediate vehicle caches the content in its CS and transmits it to the content consumer only when the reputation value obtained from the RSU is“Legitimate”(0).Conversely,the intermediate vehicle discards the data packet if the reputation value received is“Attacker”(1).

    3.3 Content Validation Policy

    Following Algorithm 2,once the content consumer vehicle receives the data packet,it verifies the content’s legitimacy.If the content is deemed legitimate,a non-attacker identification(0)is rewarded to the legitimate vehicle and communicated to the RSUs.However,if the content is identified as malicious,an attacker classification(1)is charged to the producer and shared with the RSUs.

    3.4 Reputation Dissemination

    The consumer leverages pub-sub and propagates the content producer’s reputation to the presubscribed RSUs.In our proposed system model,a pub-sub enables the NDN nodes to broadcast the content among pre-subscriber nodes without expecting an interest packet for every content.The proposed system allows content consumer vehicles to propagate reputation (either 1 or 0) to the nearest RSUs.Due to the dynamic and uncertain reputation generation time,RSUs cannot send a subscription request for each reputation individually.Determining too short or frequent broadcast time will deteriorate the network performance.In order to address this problem,an appropriate naming structure is outlined below.

    3.5 Naming Structure

    NDN uses opaque naming structure that allows users to construct their naming hierarchy as needed.Leveraging opaque naming structure of NDN,we designed naming for content dissemination,reputation dissemination,and subscription.To avoid sending multiple subscription requests for each reputation,the RSUs subscribe to all versions of reputations using a prefix naming structure.We propose the following naming structures as per requirement of content and reputation dissemination.

    Reputation retrieval request:VNDN/Reputation/Vehicle/No/MustBeFresh

    Content retrieval request:VNDN/Infotainment/Music/Album/XYZ.mp4

    Reputation subscription request:VNDN/Pub-Sub/Reputation

    The reputation retrieval request with the“MustBeFresh”keyword indicates that a vehicle requires a reputation for a specific vehicle with the most recent reputation.Similarly,the naming structure in content retrieval requests depicts a node requesting music named“XYZ”in the infotainment section.On the other hand,the reputation subscription request is a prefix that informs the vehicles to deliver the reputation of every vehicle.The prefix is a broad naming structure that allows vehicles to send the reputation of every vehicle.

    3.6 Block Dissemination

    As mentioned earlier,the primary responsibility of RSUs is to store and compute the vehicles’reputation within the blockchain network Once RSU receives reputation,it aggregates and classifies the reputation using ML algorithms.Once the reputation is determined,the RSU creates a transaction and adds it to a new block in the blockchain.Consequently,the newly generated block is disseminated among all nodes within blockchain network that ensures the a secure reputation in a decentralized manner.Afterward,each blockchain nodeverifies the by exploiting a consensus algorithm.In order to varify blocks,we consider a Proof of Work(PoW)consensus mechanism,a most secure and renowned algorithm,where nodes are required to mine the block with complex calculations.

    4 Reputation Evaluation Framework

    This section assesses the performance of ML classifier in detecting the credibility of vehicles by using a publicly available dataset at RSU.The analysis mains to employ ML classification techniques to identify attackers and legitimate vehicles using binary classification on the dataset.The motive of our proposed research is to identify misbehavior of vehicles by using ML classifiers and performance metrics,including precision,recall,and F1 score,to assess the accuracy of the models.The ultimate motive of this research is establish an accurate reputation detection and prevention framework to enhance VANET’s security and efficiency.Moreover,our proposed reputation evaluation identifies the best ML classifier for accurately detecting attacks.

    4.1 Method and Data Source

    As illustrated in Fig.3,our proposed system investigates the reputation of vehicles,wherein RSUs are exploited for collecting and storing every individual host vehicles’reputation.The collected reputation scores are then used to train and test various ML classifiers to distinguish between benign and attacker vehicles.In order to achieve this,the reputation evaluation process is divided into three phases:dataset collection,data preparation,and performance evaluation of classifiers.

    Figure 3:Proposed framework model

    4.2 Dataset Collection

    In order to identify the behavior of vehicles,we utilized the publicly available BurST-Australian dataset for Misbehavior Analysis(BurST-ADMA)[27].This dataset was simulated using the Urban Mobility(SUMO)in the Burwood suburbs of Melbourne,Victoria,Australia.The dataset comprises seven entities: bicycles,buses,motorcycles,pedestrians,public transport buses and trams,trucks,and passenger vehicles.It contains 207,315 messages,of which 179,126 are legitimate and 28,189 are malicious.Although BurST-ADMA contains seven different types of attacks,our research is focused on identifying malicious vehicles,irrespective of the attack type.Therefore,we treat all the attack types as a single attack,represented by(1),while legitimate entities are represented by(0).The dataset provides seven features,including timestamp,vehicle ID,X and Y coordinates,speed,heading,and attack type.We used all features in our proposed research.

    4.3 Data Preprocessing

    In this stage,we consolidated the seven different attack types (1-7) into one attack type.We categorized them into binary labels of either “attacker”(1) or “l(fā)egitimate”(0) for classification.To ensure the accuracy of our proposed model,we randomly divided the dataset into 70% (145,120 messages)for training and 30%(53,737 messages)for testing and employed 10-fold cross-validation to assess the model’s performance.We first partitioned the entire dataset into k-folds and then utilized 10-fold cross-validation to estimate the performance of our proposed algorithm.This method enables to demonstrate the accuracy of our proposed ML-based approach for accurately detecting and preventing the reputation of host vehicles.

    4.4 Classification

    It is supervised ML that is used to allocate a known input data point to one of the pre-determined classes or categories.The classification method is initially trainedon a preprocessed dataset where each data point is labeled with its corresponding class.The model learns from the underlying patterns and relationships between the input features and the class labels during the training phase and then uses the learned knowledge to classify the new,unseen data instances known as testing.In order to identify and anticipate vehicles’actions,we use the following ML classifiers.

    4.4.1 LR Classification

    The LR[47]classification model utilized to predict the probability of categorical data.LR uses a logistic function for calculating the probability for two class classification.The expression for logistic function in binary classification is represented as:

    whereαandβare linear prediction,X is an independent variable,andαandβare linear predictors.

    4.4.2 Decision Tree(DT)Classification

    The DT is a well-known ML classifier,which categorizes samples based on their feature values.The DT creation involves investigating training samples and deciding the best features to separate the data into subsets based on a specific principle,such as information gain or the Gini index.The motive is to establish a tree that can accurately calculate the results of latest data based on the existing features.The DT begins with a root node or vertex,encompassing features selected using attribute selection metrics like the Gini Index and Information Gain[48].The Gini Index is expressed as:

    wherePiis a probability that a feature vector belonging to an attacker.

    4.4.3 K-Nearest Neighbor(KNN)Classification

    The KNN classifier [49] is a renowned ML algorithm for managing large datasets.It is a straightforward and flexible ML classifier that can be utilized for both classification and regression tasks.It is able to operate multi-class classification and straightforwardness makes it a good choice for different applications.KNN groups latest data points in the training set,delegates the latest data point to the most common class among those K neighbors,and returns the majority or average label of those neighbors.The best value of K varies based on the specifics of the dataset.

    4.4.4 Random Forest(RF)

    The RF[50]ML classifier is one of the most powerful ML classifier that combines different DTs’outputs using majority voting.This method results in a more robust solution to difficult problems,and the prediction is made by taking the mean of the outputs from individual DTs.

    4.4.5 Gaussian Naive Bayes(GNB)Classification

    The GNB algorithm is a straightforward classification method that uses Bayes’theorem to predict the class of unlabeled data points.It calculates the prior probabilities of the classes and applies them to new,unseen data.The independence of the features in GNB makes it a simple and computationally efficient approach.

    4.5 Model Evaluation

    We conducted an experimental evaluation on the BurST-ADMA dataset to evaluate the effectiveness of various ML classifiers.We evaluated the performance of these classifiers using accuracy,precision,recall,and the F1 score as evaluation metrics.The corresponding mathematical models for each algorithm are as follows:

    The evaluation consists of four performance metrics: True positive (TP),which represents the correctly classified ‘Positive Reputation’of positive samples;False positive (FP) is classified as a proportion of samples if they are not in the class;True negative (TN) is the correctly classified as a negative proportion of samples,while False negatives(FN)is the samples which are as classified as a positive proportion of samples.

    5 Experimental Results and Discussion

    Our research aims to identify and prevent CPA in VNDN.Thus,we accomplished this by evaluating the performance of various ML algorithms considering the vehicles’behavior.Table 4 illustrates our proposed model’s precision,recall,and F1 score.In order to assess the performance of each ML algorithm,we utilized a precision-recall curve in conjunction with a Receiving Operative Characteristics(ROC)curve to visualize the obtained outcomes.The precision and recall curves are mainly used for evaluating binary classification performance.The curve in ROC indicates the tradeoff between precision and recall values,with a larger area under the curve suggesting high values for both metrics.A high precision value corresponds to a low false positive rate,whereas a high recall value corresponds to a low false negative rate.As illustrated in Table 4,RF,DT and KNN yielded outstanding accuracy in detecting CPA attackers.On the other hand,LG and GNB also showed satisfactory results.

    Table 4: Performance evolution of various ML algorithms

    5.1 Visualized Results

    To gain insights into the performance of our ML models,we visualized our results using accuracy calculation techniques with a ROC.First,we employed precision-recall and ROC curves to assess the trade-off between precision and recall for binary classification.The Area Under Curve (AUC)indicated strong performance in three models,with the highest AUC achieved by the RF,DT,and KNN models.In contrast,GNB and LG depicted average performance.According to the experimental findings,ML classifiers such as RF,DT,and KNN exhibited outstanding performance in classifying the attacker and legitimate vehicles with high accuracy.Figs.4 to 6 show the precision-recall curve performances for DT,KNN,and RF classifiers,respectively.The precision-recall in these classifiers shows a perfect curve,reflecting the highest accuracy.LR in Fig.7 and GNB in Fig.8 illustrate a satisfactory performance.Fig.9 depicts the consolidated and comparative evaluation.

    5.2 Comparative Performance Evaluation

    Existing literature uses different ML techniques to detect and prevent attacks and ensure security and privacy in VANET.However,none of them evaluated ML classifiers for attack detection in VNDN.Thus,our research has a novel contribution to detecting and preventing CPA in VNDN.Our comparative performance analysis aims to evaluate several ML classifiers for attack detection and compare them with existing related work in VANET.Our comparative analysis in Table 5 shows that our proposed RF classifier outperformed all other related works,achieving 100% accuracy in detecting attacks.These findings have important implications for the development of effective attack detection systems.The proposed RF classifier has the potential to significantly enhance the accuracy and reliability of such systems,thereby improving their effectiveness in detecting and mitigating attacks.Overall,our proposed ML-based attack detection and prevention has a novel contribution to preventing attacker vehicles from serving malicious content.

    Table 5: Performance evolution of various related works

    Figure 4:DT accuracy score

    Figure 5:KNN accuracy score

    Figure 6:RF accuracy score

    Figure 7:LR accuracy score

    Figure 8:GNB accuracy score

    Figure 9:Consolidated accuracy scores

    6 Conclusion

    Security and privacy are essential research areas in VNDN as they directly involve human lives.In order to protect sensitive information from unauthorized access,a secure network architecture must be implemented to ensure the safety and confidentiality of passengers and drivers.Specifically,CPA attacks have dire consequences,including road accidents.In order to tackle CPA in VNDN,several rule-based research contributions are presented in the literature.However,none of them exploited ML features to classify and prevent CPA in VNDN.In this paper,we mainly focused on identifying and preventing CPA attacks using the potential of ML classifiers.Based on our proposed ML classification results,our reputation-based content caching algorithm allows or prevents vehicles from serving content.In addition,our proposed system allows vehicles to propagate the reputation information of host vehicles using push-based content dissemination using a pub-sub approach among blockchain-empowered RSUs.As a result,RSUs collect reputations in binary form and perform an ML algorithm on the aggregate reputation.Upon querying reputation,the RSUs provide classification results to the intermediate nodes.We implement our proposed ML algorithm on the publicly available dataset BurST-ADMA.Our experimental findings demonstrate that RF has achieved 100%accuracy in detecting attackers.Meanwhile,DT achieved 99.7%,KNN obtained 99.4%accuracy,GNB achieved 86.9%,and LR provided 88.4% accuracy.Hence,our proposed research identifies and prevents attacker vehicles,ensures the privacy of vehicles,and enhances NDN’s scope from pull to pushbased content dissemination using the pub-sub approach.In addition,this research is limited to ML classification over the simulation-based dataset.However,this approach can be further implemented in real-time scenarios for reliable and trusted content dissemination between vehicles in the future.

    Acknowledgement:The authors acknowledge the Researchers Supporting Project Number(RSPD2023R553),King Saud University,Riyadh,Saudi Arabia.

    Funding Statement:This research is funded by Research Supporting Project Number(RSPD2023R553),King Saud University,Riyadh,Saudi Arabia.

    Author Contributions:Study conception and design: A.H.Magsi,A.Ghulam,S.Memon;data collection: A.H.Magsi,K.Javeed,M.Alhussein,I.Rida;analysis and interpretation of results:A.Ghulam,S.Memon,I.Rida;draft manuscript preparation:A.H.Magsi,A.Ghulam,K.Javeed,M.Alhussein;data curation:A.H.Magsi,S.Memon,I.Rida;visualization:A.H.Magsi,A.Ghulam,M.Alhussein;resources:A.H.Magsi,S.Memon,K.javed,M.Alhussein.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data used to support the findings of this study are available from first author upon request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    激情视频va一区二区三区| 天天影视国产精品| 免费av不卡在线播放| 亚洲熟女精品中文字幕| 国产日韩一区二区三区精品不卡| 下体分泌物呈黄色| 国产成人精品一,二区| 波野结衣二区三区在线| 精品一区二区三区四区五区乱码 | 韩国精品一区二区三区 | 一本大道久久a久久精品| 三上悠亚av全集在线观看| 另类亚洲欧美激情| 只有这里有精品99| 视频中文字幕在线观看| 国产精品久久久久久久久免| 亚洲中文av在线| 91aial.com中文字幕在线观看| 欧美另类一区| 亚洲国产色片| 免费看不卡的av| av网站免费在线观看视频| 日韩三级伦理在线观看| 最近手机中文字幕大全| 在线观看人妻少妇| 九九在线视频观看精品| 777米奇影视久久| 亚洲精品国产av成人精品| 亚洲国产精品国产精品| 免费av不卡在线播放| 亚洲美女视频黄频| 性色avwww在线观看| 成年av动漫网址| 亚洲精品一二三| 人体艺术视频欧美日本| 亚洲人成网站在线观看播放| 美女视频免费永久观看网站| 国产一级毛片在线| 男人添女人高潮全过程视频| 免费黄频网站在线观看国产| 在线观看人妻少妇| videosex国产| 国产极品天堂在线| 婷婷色麻豆天堂久久| 大香蕉久久成人网| av有码第一页| 日韩,欧美,国产一区二区三区| 夫妻性生交免费视频一级片| 久久久亚洲精品成人影院| 啦啦啦在线观看免费高清www| 国产高清国产精品国产三级| 啦啦啦视频在线资源免费观看| 性色avwww在线观看| 欧美国产精品va在线观看不卡| 国产亚洲一区二区精品| 国产成人欧美| 久久久久久人妻| 久久精品国产亚洲av天美| 校园人妻丝袜中文字幕| 我要看黄色一级片免费的| 国产精品久久久久成人av| av国产久精品久网站免费入址| 成年人午夜在线观看视频| 春色校园在线视频观看| 九色亚洲精品在线播放| 久久精品久久久久久久性| 中文字幕免费在线视频6| 国产欧美日韩一区二区三区在线| 国产精品久久久久久久久免| 亚洲国产欧美日韩在线播放| 免费黄频网站在线观看国产| 日韩电影二区| 国产成人午夜福利电影在线观看| 久久毛片免费看一区二区三区| 亚洲国产日韩一区二区| 国产高清不卡午夜福利| 寂寞人妻少妇视频99o| 男女免费视频国产| 午夜福利在线观看免费完整高清在| 欧美日韩一区二区视频在线观看视频在线| 男女下面插进去视频免费观看 | 美女xxoo啪啪120秒动态图| 青春草亚洲视频在线观看| 狂野欧美激情性xxxx在线观看| 亚洲av电影在线观看一区二区三区| 午夜免费鲁丝| 日本欧美视频一区| 考比视频在线观看| 国产精品99久久99久久久不卡 | 亚洲精品视频女| 欧美日韩综合久久久久久| 男人添女人高潮全过程视频| 亚洲伊人色综图| 在线免费观看不下载黄p国产| 中文乱码字字幕精品一区二区三区| www日本在线高清视频| 色视频在线一区二区三区| 日本av免费视频播放| 亚洲av日韩在线播放| 交换朋友夫妻互换小说| 男女啪啪激烈高潮av片| 亚洲精品自拍成人| 中文欧美无线码| 少妇人妻 视频| 午夜久久久在线观看| 天美传媒精品一区二区| 久久韩国三级中文字幕| 美国免费a级毛片| 在现免费观看毛片| 人妻系列 视频| 伊人久久国产一区二区| 成人综合一区亚洲| 日韩在线高清观看一区二区三区| 国产成人精品在线电影| 这个男人来自地球电影免费观看 | 高清视频免费观看一区二区| 香蕉丝袜av| 国产精品 国内视频| 国产精品一国产av| 久久人人爽人人爽人人片va| 91精品伊人久久大香线蕉| 日韩免费高清中文字幕av| 啦啦啦啦在线视频资源| 成年av动漫网址| 国产xxxxx性猛交| 赤兔流量卡办理| 亚洲精品美女久久av网站| 亚洲第一区二区三区不卡| 日本黄大片高清| 男人操女人黄网站| 一级毛片 在线播放| 欧美精品av麻豆av| 黄片播放在线免费| 久久韩国三级中文字幕| 又黄又粗又硬又大视频| 免费看av在线观看网站| a级毛色黄片| 亚洲少妇的诱惑av| 蜜桃在线观看..| 国产不卡av网站在线观看| 久久久国产欧美日韩av| 建设人人有责人人尽责人人享有的| 咕卡用的链子| 丰满乱子伦码专区| 一区二区三区精品91| 十分钟在线观看高清视频www| 嫩草影院入口| av黄色大香蕉| 精品国产一区二区三区久久久樱花| 国产不卡av网站在线观看| 熟女电影av网| www.色视频.com| 欧美另类一区| 日本爱情动作片www.在线观看| 99九九在线精品视频| 国产精品久久久久久精品电影小说| 麻豆精品久久久久久蜜桃| 九九爱精品视频在线观看| tube8黄色片| 国产探花极品一区二区| 老司机影院毛片| 午夜av观看不卡| 日本vs欧美在线观看视频| 国产片内射在线| 9191精品国产免费久久| 亚洲精品第二区| videos熟女内射| 国产精品不卡视频一区二区| 在线看a的网站| 桃花免费在线播放| 国产乱来视频区| 九草在线视频观看| 国产亚洲欧美精品永久| 国产日韩欧美视频二区| 国产av码专区亚洲av| 一级a做视频免费观看| 在线观看www视频免费| 亚洲成色77777| 色哟哟·www| 18禁动态无遮挡网站| 天堂中文最新版在线下载| 丰满迷人的少妇在线观看| 高清毛片免费看| 成人毛片60女人毛片免费| 免费大片18禁| av卡一久久| 国产又爽黄色视频| 国产极品粉嫩免费观看在线| 少妇熟女欧美另类| 欧美日韩一区二区视频在线观看视频在线| 最近中文字幕高清免费大全6| videos熟女内射| 2022亚洲国产成人精品| 欧美人与性动交α欧美软件 | 国产日韩一区二区三区精品不卡| 国产成人精品一,二区| 香蕉国产在线看| 久久国产亚洲av麻豆专区| 欧美97在线视频| 国产 一区精品| 亚洲综合精品二区| 黄色一级大片看看| 啦啦啦在线观看免费高清www| 日本欧美国产在线视频| 国产精品麻豆人妻色哟哟久久| 黄网站色视频无遮挡免费观看| 精品一区二区三区四区五区乱码 | 老熟女久久久| 免费女性裸体啪啪无遮挡网站| 国产欧美日韩综合在线一区二区| 青春草亚洲视频在线观看| 人妻人人澡人人爽人人| 免费观看无遮挡的男女| 国产亚洲精品第一综合不卡 | 亚洲精品色激情综合| 中文字幕精品免费在线观看视频 | 成人国产av品久久久| 免费日韩欧美在线观看| 97在线人人人人妻| 国产伦理片在线播放av一区| 亚洲一码二码三码区别大吗| 18禁裸乳无遮挡动漫免费视频| 亚洲欧美清纯卡通| 天天躁夜夜躁狠狠躁躁| 少妇高潮的动态图| 亚洲色图 男人天堂 中文字幕 | 国产精品久久久久久精品古装| 欧美97在线视频| 成年美女黄网站色视频大全免费| 人人妻人人澡人人看| 美女xxoo啪啪120秒动态图| 妹子高潮喷水视频| 91精品三级在线观看| 波多野结衣一区麻豆| 中文字幕av电影在线播放| 在线亚洲精品国产二区图片欧美| 亚洲精品自拍成人| 热99国产精品久久久久久7| 91精品三级在线观看| 午夜激情久久久久久久| 精品人妻一区二区三区麻豆| 久久精品国产自在天天线| 狂野欧美激情性bbbbbb| 永久网站在线| 日韩欧美精品免费久久| 青春草国产在线视频| 国产成人精品一,二区| av福利片在线| 久久精品久久久久久久性| 高清黄色对白视频在线免费看| 国产1区2区3区精品| 热99久久久久精品小说推荐| 国产国拍精品亚洲av在线观看| 女人被躁到高潮嗷嗷叫费观| 91国产中文字幕| 精品一区二区三区视频在线| 亚洲人成77777在线视频| 在线观看国产h片| 亚洲第一av免费看| 亚洲综合色惰| 黑人巨大精品欧美一区二区蜜桃 | 久久精品国产亚洲av天美| 婷婷色麻豆天堂久久| 高清欧美精品videossex| 欧美激情极品国产一区二区三区 | 国产成人精品在线电影| 一区二区三区四区激情视频| 免费在线观看完整版高清| 大片电影免费在线观看免费| 老女人水多毛片| 中文字幕人妻熟女乱码| 国产成人欧美| 午夜av观看不卡| 少妇人妻精品综合一区二区| 国产永久视频网站| 国产老妇伦熟女老妇高清| 波野结衣二区三区在线| 久久国产亚洲av麻豆专区| 国产伦理片在线播放av一区| 搡老乐熟女国产| 青春草视频在线免费观看| 亚洲国产精品专区欧美| 老熟女久久久| 草草在线视频免费看| 欧美亚洲日本最大视频资源| 国产永久视频网站| 黄色视频在线播放观看不卡| 男女免费视频国产| 一区二区三区乱码不卡18| 日本黄色日本黄色录像| 久久久久久久精品精品| 亚洲成av片中文字幕在线观看 | 黄色毛片三级朝国网站| 国产在线视频一区二区| 久久久久久久精品精品| 亚洲在久久综合| 伦理电影免费视频| 久久这里有精品视频免费| 爱豆传媒免费全集在线观看| 又黄又爽又刺激的免费视频.| 日本wwww免费看| 丝袜在线中文字幕| 国产熟女午夜一区二区三区| 香蕉精品网在线| av在线观看视频网站免费| 国产精品一区www在线观看| 午夜福利在线观看免费完整高清在| 国产精品久久久久久av不卡| av有码第一页| 国产成人a∨麻豆精品| 欧美激情国产日韩精品一区| 日韩成人av中文字幕在线观看| 国产精品国产av在线观看| 啦啦啦在线观看免费高清www| 国产亚洲av片在线观看秒播厂| 免费在线观看黄色视频的| 激情视频va一区二区三区| 日韩一本色道免费dvd| 亚洲精品日本国产第一区| 亚洲成人av在线免费| 卡戴珊不雅视频在线播放| 精品少妇黑人巨大在线播放| 人人妻人人添人人爽欧美一区卜| 亚洲性久久影院| 欧美另类一区| 日韩在线高清观看一区二区三区| 久久午夜综合久久蜜桃| 色5月婷婷丁香| 丰满乱子伦码专区| 亚洲欧美成人精品一区二区| 亚洲第一区二区三区不卡| 免费观看无遮挡的男女| 五月开心婷婷网| 精品久久国产蜜桃| 亚洲精品久久成人aⅴ小说| 欧美精品国产亚洲| 亚洲三级黄色毛片| 国产男女内射视频| 久热这里只有精品99| 久久人人爽人人爽人人片va| 午夜福利乱码中文字幕| 亚洲av福利一区| av在线老鸭窝| 又粗又硬又长又爽又黄的视频| 高清在线视频一区二区三区| 99久久中文字幕三级久久日本| 国产在线一区二区三区精| 精品国产一区二区久久| 新久久久久国产一级毛片| 极品人妻少妇av视频| 亚洲精品国产av蜜桃| 观看av在线不卡| 亚洲精品456在线播放app| 蜜臀久久99精品久久宅男| 最近2019中文字幕mv第一页| 这个男人来自地球电影免费观看 | 色婷婷久久久亚洲欧美| 天天操日日干夜夜撸| 欧美人与性动交α欧美软件 | 青春草国产在线视频| 亚洲精品久久久久久婷婷小说| 九色亚洲精品在线播放| 91午夜精品亚洲一区二区三区| 亚洲国产色片| 男女边摸边吃奶| 国产精品一区www在线观看| 成人毛片a级毛片在线播放| 国产老妇伦熟女老妇高清| 高清黄色对白视频在线免费看| 色婷婷久久久亚洲欧美| 男女啪啪激烈高潮av片| 少妇熟女欧美另类| 午夜av观看不卡| 美女视频免费永久观看网站| 又大又黄又爽视频免费| 乱人伦中国视频| 亚洲国产av影院在线观看| 免费黄网站久久成人精品| 少妇人妻 视频| av线在线观看网站| 日韩大片免费观看网站| 精品视频人人做人人爽| 狂野欧美激情性xxxx在线观看| 亚洲精品一二三| 国产日韩一区二区三区精品不卡| 亚洲在久久综合| av在线播放精品| 国产在线免费精品| 精品久久久精品久久久| 99视频精品全部免费 在线| 一级毛片我不卡| 免费观看在线日韩| 国产精品久久久久久精品电影小说| 成人毛片a级毛片在线播放| 亚洲人与动物交配视频| 国产精品无大码| 亚洲精品中文字幕在线视频| 亚洲美女视频黄频| 一个人免费看片子| 日韩三级伦理在线观看| 日韩精品免费视频一区二区三区 | av在线app专区| 最近最新中文字幕免费大全7| 国产精品久久久av美女十八| 国产亚洲午夜精品一区二区久久| 宅男免费午夜| 亚洲色图综合在线观看| 精品国产一区二区三区久久久樱花| 春色校园在线视频观看| 成人毛片a级毛片在线播放| 最近的中文字幕免费完整| 丝袜人妻中文字幕| 国产精品久久久久久精品古装| 日韩中字成人| 国产日韩欧美亚洲二区| 高清av免费在线| 热99久久久久精品小说推荐| 亚洲精品久久午夜乱码| 久久久久久久久久人人人人人人| 欧美国产精品va在线观看不卡| 亚洲精品aⅴ在线观看| 欧美xxxx性猛交bbbb| 欧美精品人与动牲交sv欧美| a级毛色黄片| 五月伊人婷婷丁香| 精品人妻一区二区三区麻豆| 少妇的逼好多水| 国产成人午夜福利电影在线观看| 久久精品久久精品一区二区三区| 色网站视频免费| 国产精品久久久久成人av| 精品福利永久在线观看| 少妇熟女欧美另类| 99热国产这里只有精品6| 国产深夜福利视频在线观看| 精品久久蜜臀av无| kizo精华| 久久韩国三级中文字幕| 国产有黄有色有爽视频| 九色亚洲精品在线播放| 成人黄色视频免费在线看| 自线自在国产av| 各种免费的搞黄视频| 日韩电影二区| 视频中文字幕在线观看| 波野结衣二区三区在线| 中文字幕精品免费在线观看视频 | 日日摸夜夜添夜夜爱| 一个人免费看片子| 美女中出高潮动态图| 伦理电影大哥的女人| 国产男人的电影天堂91| 欧美亚洲日本最大视频资源| 亚洲美女黄色视频免费看| 欧美 亚洲 国产 日韩一| 宅男免费午夜| www.色视频.com| 18禁观看日本| 在线观看免费日韩欧美大片| a级毛片黄视频| 最近中文字幕2019免费版| 欧美日韩视频高清一区二区三区二| h视频一区二区三区| 黑人高潮一二区| 黄网站色视频无遮挡免费观看| 日本wwww免费看| 妹子高潮喷水视频| 日日撸夜夜添| 国产精品国产av在线观看| 啦啦啦中文免费视频观看日本| 女性生殖器流出的白浆| 国产精品熟女久久久久浪| 男女边摸边吃奶| 久久久久久久大尺度免费视频| 成人国语在线视频| 宅男免费午夜| 国产免费一区二区三区四区乱码| 成人毛片60女人毛片免费| 激情视频va一区二区三区| 亚洲欧洲国产日韩| 久久狼人影院| 国产精品一区二区在线不卡| 国产白丝娇喘喷水9色精品| 五月天丁香电影| av播播在线观看一区| 乱人伦中国视频| 国产精品三级大全| 日本黄色日本黄色录像| 热99国产精品久久久久久7| 免费人妻精品一区二区三区视频| av线在线观看网站| 黑人猛操日本美女一级片| 捣出白浆h1v1| 国产精品熟女久久久久浪| av在线观看视频网站免费| 亚洲图色成人| 97在线视频观看| 黄色配什么色好看| 在线 av 中文字幕| 成人黄色视频免费在线看| 国产色爽女视频免费观看| av一本久久久久| 国产在线免费精品| 亚洲欧美中文字幕日韩二区| 五月伊人婷婷丁香| 久久国产精品男人的天堂亚洲 | 亚洲丝袜综合中文字幕| 亚洲精品av麻豆狂野| 成年美女黄网站色视频大全免费| 欧美丝袜亚洲另类| 一本色道久久久久久精品综合| 午夜视频国产福利| 精品少妇内射三级| 我的女老师完整版在线观看| 亚洲精品一二三| 99九九在线精品视频| 久久免费观看电影| 内地一区二区视频在线| 97在线视频观看| 日韩熟女老妇一区二区性免费视频| 中文乱码字字幕精品一区二区三区| 国产 一区精品| 午夜影院在线不卡| 视频中文字幕在线观看| 制服丝袜香蕉在线| 欧美 日韩 精品 国产| 国产男人的电影天堂91| 看免费成人av毛片| av女优亚洲男人天堂| 看非洲黑人一级黄片| 成年女人在线观看亚洲视频| 精品少妇久久久久久888优播| 午夜福利在线观看免费完整高清在| 在线观看www视频免费| 日日撸夜夜添| 午夜福利,免费看| 高清欧美精品videossex| 亚洲美女黄色视频免费看| 久久久久久久亚洲中文字幕| 天美传媒精品一区二区| 在线看a的网站| 18禁动态无遮挡网站| 国产男女内射视频| 国产免费现黄频在线看| 九色亚洲精品在线播放| 国产一区二区在线观看av| 国产成人午夜福利电影在线观看| 午夜老司机福利剧场| 一级片免费观看大全| 国产精品蜜桃在线观看| 国产精品三级大全| 成人免费观看视频高清| 99热6这里只有精品| av片东京热男人的天堂| 免费在线观看完整版高清| 我要看黄色一级片免费的| 国产 一区精品| 美女中出高潮动态图| 少妇猛男粗大的猛烈进出视频| 中文天堂在线官网| av线在线观看网站| 丰满迷人的少妇在线观看| 亚洲第一区二区三区不卡| 香蕉精品网在线| 国产精品三级大全| 黑丝袜美女国产一区| 久久久精品区二区三区| 自拍欧美九色日韩亚洲蝌蚪91| 国产欧美亚洲国产| 国产精品99久久99久久久不卡 | 亚洲天堂av无毛| 老女人水多毛片| 校园人妻丝袜中文字幕| 男的添女的下面高潮视频| 亚洲伊人色综图| 中国国产av一级| 国产免费福利视频在线观看| 欧美 日韩 精品 国产| √禁漫天堂资源中文www| 波野结衣二区三区在线| 性色av一级| 国产亚洲欧美精品永久| 成年人免费黄色播放视频| 日韩 亚洲 欧美在线| 国产一区二区在线观看av| 午夜福利,免费看| 成年人午夜在线观看视频| 欧美bdsm另类| 日韩在线高清观看一区二区三区| 2021少妇久久久久久久久久久| 国产一区二区在线观看日韩| 午夜视频国产福利| 夜夜骑夜夜射夜夜干| 免费观看a级毛片全部| 成人午夜精彩视频在线观看| 性色avwww在线观看| 欧美人与性动交α欧美精品济南到 | 黄色毛片三级朝国网站| 亚洲精品日韩在线中文字幕| 一级爰片在线观看| 卡戴珊不雅视频在线播放| 久久99精品国语久久久| 国产免费又黄又爽又色| 国产精品久久久久久av不卡| 国产黄频视频在线观看| 日韩精品免费视频一区二区三区 | 久久鲁丝午夜福利片| 少妇人妻精品综合一区二区| 国产欧美另类精品又又久久亚洲欧美| 免费大片黄手机在线观看| 国产日韩欧美视频二区| 大片电影免费在线观看免费| 成人亚洲欧美一区二区av| 国产精品久久久久久久久免| 国产亚洲最大av|