• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    PoIR:A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    2023-12-15 03:59:02JauzakHussainiWindiatmajaDelphiHanggoroMuhammadSalmanandRiriFitriSari
    Computers Materials&Continua 2023年11期

    Jauzak Hussaini Windiatmaja,Delphi Hanggoro,Muhammad Salman and Riri Fitri Sari

    Department of Electrical Engineering,Faculty of Engineering,Universitas Indonesia,Depok,16424,Indonesia

    ABSTRACT This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reputationbased consensus mechanisms by proposing a more decentralized and fair node selection process.The proposed PoIR consensus combines Bidirectional Long Short-Term Memory(BiLSTM)with the Network Entity Reputation Database(NERD)to generate reputation scores for network entities and select authoritative nodes.NERD records network entity profiles based on various sources,i.e.,Warden,Blacklists,DShield,AlienVault Open Threat Exchange(OTX),and MISP(Malware Information Sharing Platform).It summarizes these profile records into a reputation score value.The PoIR consensus mechanism utilizes these reputation scores to select authoritative nodes.The evaluation demonstrates that PoIR exhibits higher centralization resistance than PoS and PoW.Authoritative nodes were selected fairly during the 1000-block proposal round,ensuring a more decentralized blockchain ecosystem.In contrast,malicious nodes successfully monopolized 58%and 32%of transaction processes in PoS and PoW,respectively,but failed to do so in PoIR.The findings also indicate that PoIR offers efficient transaction times of 12 s,outperforms reputation-based consensus such as PoW,and is comparable to reputation-based consensus such as PoS.Furthermore,the model evaluation shows that BiLSTM outperforms other Recurrent Neural Network models,i.e.,BiGRU(Bidirectional Gated Recurrent Unit),UniLSTM(Unidirectional Long Short-Term Memory),and UniGRU (Unidirectional Gated Recurrent Unit) with 0.022 Root Mean Squared Error (RMSE).This study concludes that the PoIR consensus mechanism is more resistant to centralization than PoS and PoW.Integrating BiLSTM and NERD enhances the fairness and efficiency of blockchain applications.

    KEYWORDS Blockchain;blockchain consensus;node selection;BiLSTM;RNN;regression

    1 Introduction

    Blockchain is a data structure in the form of interconnected data blocks that record encrypted blocks as an immutable distributed ledger[1].Blockchain technology comprises two key elements:a peer-to-peer network of participating nodes and a distributed data structure.The primary function of the blockchain is as a database that stores assets distributed across various institutions,geographies,or sites,where all nodes in the network must own the same ledger.The concept of a distributed database applies to peer-to-peer networks on the blockchain.The significant difference between blockchain and distributed database systems is that there is no need for a third party to ensure network security and to trust as a reference[2].Trusted third parties have the potential for a single point of failure problems.If a third party has a security hole,the network members will suffer losses or can trigger a conflict of interest between members who want to invoke a transaction.Blockchain maintains the security and reliability of data through a cooperative network,schemes,and cryptography that connect all blocks,making the data cannot be tampered with or changed.

    All nodes in the blockchain network can propose transactions by sending broadcast messages[3].Leader nodes,or miner nodes,will be responsible for validating,selecting,and ordering a series of transactions into a single block[4].After successfully building blocks,miners will distribute them to all nodes in the network.The network will reach a consensus and execute transactions once all the nodes have added a new block to their copy of the blockchain.The network forms rules to reach a consensus and determine nodes eligible to validate and propagate blocks.With these rules,blockchain ensures information consistency within its network.By fulfilling all the rules in the consensus protocol,blockchain can guarantee the immutability,integrity,and consistency of data in the network.

    In reliable distributed computing,reaching a consensus is essential.All participants must follow specific rules to coordinate and ensure system status consistently,even if there is a system conflict.Among the various blockchain consensus protocols,mainstream blockchain initiatives like Bitcoin and Ethereum are adopting Proof-of-Work(PoW)[5].In PoW,mining nodes are selected based on their computational capabilities.PoW used nodes’computational capabilities to solve cryptographic puzzles with different levels of complexity according to the network processing capacity and desired block time.However,a PoW-based blockchain network requires enormous electricity consumption.According to data from the Cambridge Bitcoin Electricity Consumption Index,annual electricity consumption for Bitcoin mining reached 107.65 TWh in 2022,most of which is used to solve cryptographic puzzles.Besides providing trustless consensus,some studies argue that PoW serves no other useful purpose[6].

    Researchers have conducted recent works to reduce the computational demand of PoW,i.e.,Proof of Stake(PoS)[7]and Delegated Proof of Stake(DpoS)[8]as a public blockchain,Proof of Authority(PoA)[9],Proof of Space(PoSpace)[10],Proof of Elapsed Time(PoET)[11],Proof of Burn[12],and Proof of Weight [13] as private blockchain.These consensus protocols remove the mining process,which attracts massive computational demand.The node selection only involves calculations that do not consume massive computational resources.These consensuses use the nodes’reputation value to select the eligible node instead,i.e.,nodes’stake,authority,or disk space.

    However,these reputation-based consensuses tend to be less decentralized [14].The condition might happen because selecting eligible nodes can be monopolized by accumulating resources considered when selecting miners.For instance,PoS attempts to identify authoritative nodes through the value of the original digital currency,which can partially address the deficiencies of PoW.However,the nodes with a significant stake system can monopolize the system easily.PoS nodes can also manipulate the network by increasing their stake in the blockchain network to win the mining process continuously.Therefore,PoS is usually denoted as nothing more than proof of oligarchy,as it establishes a validation system through which a small group of people with the most money has control over the network.

    This paper proposes a new node selection mechanism in a reputation-based blockchain consensus using Bidirectional Long Short-Term Memory (BiLSTM) called Proof of Intelligent Reputation(PoIR) to deal with these issues.The nodes with a high reputation in PoIR will be responsible for mining and validating the blocks.PoIR is adopting the PoS consensus protocols,which lets the number of its stake select a leader.However,unlike PoS,PoIR considers multi-variable calculation.PoIR uses Network Entity Reputation Database(NERD)[15]to find authoritative nodes.NERD records network entity profiles for each IP address and summarizes them into a reputation score.This record includes metadata about the reports and other relevant details,i.e.,hostname,Autonomous System Number(ASN),and country.

    Moreover,this paper implements the BiLSTM algorithm to estimate the probability of the reputation score of blockchain nodes.The score expresses each node’s expected behavior and shows an accumulation of information about each node,enabling comparisons between nodes.Therefore,the proposed mechanism will be purely decentralized while having better transaction time than PoW.

    The motivation for this study stems from the need to address the limitations of existing reputationbased consensus mechanisms in blockchain networks.While reputation-based approaches offer potential benefits such as improved scalability and reduced energy consumption compared to traditional PoW mechanisms,they often face challenges related to centralization,lack of fairness,and vulnerability to manipulation.Therefore,there is a need to develop an innovative reputation-based consensus mechanism that overcomes these limitations and fosters decentralization and fairness within blockchain networks.

    This paper makes the following key contributions:

    1.The paper proposes a novel node selection mechanism in a reputation-based blockchain consensus protocol,the Proof of Intelligent Reputation(PoIR),which integrates Bidirectional Long Short-Term Memory (BiLSTM) and Network Entity Reputation Database (NERD)to estimate nodes’reputation score.Integrating deep learning techniques with consensus protocols provides a dynamic and adaptive framework.The NERD system profiles each node’s reputation score based on various metrics,allowing for a more nuanced and fair selection of authoritative nodes.

    2.The proposed PoIR consensus balances decentralization and computational efficiency.It promises to improve performance-based consensus transaction time while preserving the decentralization principles of blockchain technology.

    3.The paper addresses the pitfalls of current performance-based consensus mechanisms like PoW and reputation-based consensus mechanisms like PoS,providing a solution that reduces potential centralization and monopoly scenarios,making it a fairer option for all participants regardless of their stake or tenure in the network.This research will thus be instrumental in enhancing the robustness and fairness of blockchain applications.

    The rest of this paper is organized as follows.Section 2 reviews related works on the blockchain consensus and the network entity reputation database.Section 3 describes the proposed PoIR mechanism.Section 4 shows the implementation results and analysis of the evaluation.Section 5 concludes the findings.

    2 Literature Review

    This section describes the related work,i.e.,blockchain fundamentals,performance-based blockchain consensus,reputation-based blockchain,and Network Entity Reputation Database.

    2.1 Blockchain

    Haber et al.[16]discovered blockchain technology in 1991.They implement a method to secure digital documents.Their solution is based on time stamps and linking document hashes to create an incorruptible system and tamper-resistant.Blockchain became popular with its first application in Bitcoin,which Satoshi Nakamoto made.Blockchain then defines it as a technology that provides data storage and transmission.A peer-to-peer architecture arranges blockchain technology,enabling nodes to communicate securely and transparently without relying on a single centralized authority.

    Blockchain is a distributed and decentralized database,as seen in Fig.1a.The participating nodes have the exact database copy.While being decentralized on the blockchain allows the system not to have a central authority and governing entity,each node has an equal role.In addition,how each block is stored also provides more security,as seen in Fig.1b.Each block will be wrapped by an SHA-256 hash function and generate a block header.Each block header will be connected to the next block.With this process,if there is a block that a particular party changes,it will produce an invalid hash for the next block,then the blockchain will be invalid.Combining these two characteristics and processes makes the blockchain secure,transparent,and distributed.

    Figure 1:A general architecture of blockchain:(a)blockchain data is shared as a distributed ledger,(b)the data structure of each block on the blockchain(adapted from[1])

    Blockchain has a consensus protocol that all network members must follow to determine some rules in a network that does not have a central authority.Thus,the network can coordinate and maintain data consistency without a central authority.In terms of how the authoritative party is selected,blockchain consensus can be divided into two types,i.e.,performance-based and reputationbased.Table 1 provides a comprehensive overview of recent research focusing on performance-based and reputation-based blockchain consensus algorithms.

    2.2 Performance-Based Blockchain Consensus

    PoW was introduced in 2009 and applied to Bitcoin.Since Bitcoin was introduced,PoW has become a popular and widely used consensus.PoW works based on nodes’computational power.Every member wanting to participate to become a block proposer in the system must participate in a competition to solve cryptographic hashes.Members that have won the competition to complete or find the cryptographic puzzle and propagate the block that meets the requirements will receive a predetermined reward or transaction fee.Then the block will be stored on the blockchain network[28].Finding a hash target uses immense computing power and is stochastic.Resolving this issue is similar to a miner coming across gold.Searching for a target hash is called mining,while members who complete it are called miners[29].Each member participating in the hash target search competition uses computing power individually.Thus,each member does mining,and only one member is considered the winner,which makes PoW consume much energy [30,31].The workflow example of performance-based blockchain consensus is shown in Fig.2.

    Figure 2: Workflow of PoW,an example of performance-based blockchain consensus (adapted from[33])

    Another performance-based consensus proposed is PoSe(Proof-of-Search).Similar to PoW,PoSe uses the expended computing effort to determine block leaders.Instead of using computing power to solve cryptographic hashes,they use it to find solutions to optimization problems [17].PoSe works on requests from clients containing to find solutions to optimization problems.The client supplies a search program that uses any search algorithm that determines a good outcome by assessing many potential solutions.The node that discovers the closest solution will get a reward from the client.As a result,the issue of PoW competition can be moved to a more beneficial scenario.

    Bravo-Mazquez et al.proposed a performance-based consensus named Proof-of-Learning(PoL)[18].PoL is a concept for validating blocks in blockchain networks inspired by machine learning competition events,i.e.,Codalab and Kaggle.This kind of competition helps advance machine learning development with relevant tasks such as recommender systems,image recognition,voice recognition,and many more.PoL can establish a mutually beneficial relationship between two different complex technologies,i.e.,reCAPTCHA [32].reCAPTCHA is a concept that connects two different tasks: a system for finding out if a web user is a real person(for safety)while helping to turn printed material into digital form.In extending Proof of Learning,other consensus algorithms are based on deep learning[6,19-21].In a deep learning-based consensus,the energy that blockchain transactions should consume is shifted as deep learning computing tasks.The consensus calls for miners to conduct deep learning training tasks and provide a trained model as proof.

    2.3 Reputation-Based Blockchain Consensus

    PoW’s need for enormous computational demand has ignited researchers to develop a new approach.In the alternative approach,instead of proving its computational works,the network members only need to provide their reputation,which does not require enormous energy.This approach is often referred to as reputation-based consensus.The following are some examples of reputation-based consensus:

    The first PoW alternate consensus is Proof of Stake (PoS) [7].PoS is an alternate consensus system offering the benefits of PoW while eliminating some of its drawbacks.To participate in PoS,a participant must own a set amount of cryptocurrency for verifying trades on the system.For example,20% of the stake (coins) gives a participant a 20% possibility of mining the next block.The PoS consensus protocol has the following block proposal mechanism: validators,also known as staking nodes,stake a particular amount of currency to be allowed to participate in the block creation process.The protocol chooses the entity or node that holds the most stake to mine the next block.With this mechanism,PoS can eliminate cryptographic hash computations and reduce the amount of high computational power PoW.However,PoS is at risk of being exposed to a 51%attack if one individual owns more than half of the total cryptocurrency on the network,thus allowing them to propose a block every round.The workflow example of reputation-based blockchain consensus is shown in Fig.3.

    Another reputation-based consensus that has been proposed is Proof of Elapsed Time(PoET)[11].PoET,proposed by Intel,does not use computing resources or cryptocurrency staking to participate in the competition but instead uses a random back-off scheme to compete[34].Generally,the nodes participating in the process ask for a randomly assigned waiting time.The node that has the shortest waiting time is the one selected to be the block leader.To propose a block,the proposer of the block must show that the time he has is the shortest,then propagate the block before the waiting time runs out.With PoET,all members can become block proposers equally.Unfortunately,this consensus does not have good scalability potential,so it is unsuitable for public blockchains.Besides that,PoET must use Intel-specific devices.

    PoS has been developed further into Delegated Proof-of-Stake (DPoS) [8].DPoS is an election process similar to a board of directors,in which the network member selects a restricted number of people.They have the authority granted to them by their constituents to exercise their rights.Voting rights on DPoS are determined by the set amount of cryptocurrency at stake,and validators are selected using a replacement and election system.Invested funds used for voting rounds are secured via smart contracts.The group selected as a delegate will maintain the network and its operations,making blocks and validating transactions.The Block Producers(BPs)receive a suitable reward in return for their work.In addition,DPoS has a backup concept to choose a group of BP that will replace the main BP.If something goes wrong,BP backups are also given a reward but smaller.

    Figure 3:Workflow of PoS,an example of reputation-based blockchain consensus(adapted from[33])

    Besides DPoS,PoS was also developed into Proof-of-Authority (PoA) [9].PoA was initially developed for a private network on Ethereum.In PoA,selected nodes called validators are responsible for creating blocks and validating transactions.The network can handle lots of transactions because only a few validators are needed,making it highly scalable and with nearly no cost to process.Unlike PoS,a validator does not need to put any of their assets at stake but instead their reputation.If a reputation is established,which takes time from participating in the network,the problem of PoS can be solved.In PoS,the participant with the most stakes will receive the biggest reward in the network.However,PoA still leans towards a centralized system,as the entire network is under the authority of a few members.

    The following consensus that is developed from PoS is Proof of Burn (PoB) [12].PoB protocol deliberately destroys cryptocurrency coins as a method to pick block leaders,in contrast to how PoW works,which depends on physical resources to conduct mining operations.Block validation in PoBbased networks does not require extensive computational resources.Thus,powerful mining hardware such as ASICs is not needed.As a substitute for the currency that has been burned,PoB replaces it with a virtual mining system.By sacrificing short-term losses,a node can demonstrate its commitment to the network for long-term benefit.Sending coins to a predetermined burn address will cause them to be destroyed and not recoverable.

    Proof of Weight(PoWeight)[13]is also the development of PoS.Similar to PoS,the stake owned by the participant is called “weight” instead of “stake”.Algorand is one of the digital currencies that implements PoWeight.PoWeight will stay safe from double spending if the majority of users in the system are honest.Each PoWeight block creation round will randomly select a committee of network members and assign tasks based on the amount of digital currency they have.The concept is similar to PoS,but the random formation of committees makes the selection of block proposers evenly distributed so that they are not vulnerable to 51%attacks.

    Proof-of-Space(PoSpace)is a development carried out by[10].PoS requires members to dedicate a certain amount of storage space or memory to solve problems issued by the system.A system requesting a specific space called a Prover will send a PoSpace specification to the Verifier indicating that the Prover reserved the specific space.For example,if someone needs a certain amount of disk space,the Verifier will check it for accuracy with a particular procedure.Validation of a certain amount of disk space must be done accurately and quickly but not take up a lot of disk space.

    The dynamic reputation-based consensus mechanism [22] proposed mainly includes the nodes group generation algorithm,the validators group generation algorithm,node behavior discrimination,and the reputation evaluation algorithm.Previously,in PoA consensus,the blockchain selects several authorities to validate the ledger,but authorities may not be trusted entirely.Therefore,this scheme assigns a reputation value to each node through a reputation evaluation model.Each validator performs block packing by pledging its reputation value,and all nodes can complete the reputation accumulation by maintaining the blockchain.The trustworthiness of the validators is ensured by selecting the nodes with high reputation values to become the validator group.

    A Reputation-based Sharding Consensus model applied to information-centric networking [23]has been proposed.This consensus optimizes by using Affinity Propagation (AP) algorithms and multi-dimensional trust to divide network members into shards.Thus,it can minimize the occurrence of validation errors from security and provide real-time processes that the client can see directly.

    The Trust-Based Shard Distribution scheme [24] considers the reputation of blockchain nodes,which utilizes genetic algorithms to maximize security in a fault-tolerant Shard blockchain network.This multi-dimensional reputation model calculates reputation values depending on trust parameters such as Quality of Security Performance(QoSP),Quality of Service(QoS),and the set of reputations in the data.

    To extend the trust-based shard distribution scheme,TDCB-D3P has been proposed[25].TDCBD3P is a secure trust-based delegated consensus blockchain with a Dueling Double Deep-Q network with Prioritized Experience replay (D3P).This system improves the blockchain’s capabilities by utilizing deep reinforcement learning technology.

    The Mobility-aware Reputation-based Blockchain Framework (MRBF) [26] is a novel solution addressing the stability issues of Mobile Consensus Nodes (MCNs).It utilizes the Practical Byzantine Fault Tolerance (PBFT) algorithm and introduces the Intelligent Consensus Node Selection Algorithm (ICNS) based on deep learning.MCNs are selected using live and historical reputation information,considering factors such as the Age of the Node(AoN),Stability of the Node(SoN),and Success Rate of Block Proposals(SoB).MRBF aims to improve the stability of MCNs by leveraging reputation-based selection mechanisms and enhancing the overall performance of consensus in mobile environments.

    A novel consensus algorithm called Pharmaceutical-Practical Byzantine Fault Tolerance (PPBFT) [27] is presented for large-scale pharmaceutical traceability systems.P-PBFT incorporates a grouping strategy based on response speed among supply chain nodes to form independent consensus sets,ensuring high security and low communication overhead.This approach claims to enhance network scalability and aligns with the requirements of pharmaceutical supply chains with numerous participating nodes.

    2.4 Network Entity Reputation Database System

    Bartos et al.[15] have introduced the Network Entity Reputation Database (NERD),a system for evaluating the reputation of network entities.NERD gathers information related to cybersecurity threats from multiple sources and creates a database that is updated regularly with details of known network entities that have malicious intent.This information is gathered from various sources that detect suspicious activities in networks.These various sources include:

    1.Warden

    CESNET (Czech Education and Scientific Network) operates a system called Warden that facilitates the sharing of alerts.The alerts are collected from honeypots,NetFlow analyzers,and other malicious traffic detectors,primarily utilized in Czech academic networks.Over a million alerts from approximately a dozen detection systems are exchanged daily through this platform.

    2.Blacklists

    To create its database,NERD relies on approximately 50 public blacklists from about 20 providers.The database records the details of any IP address that is listed in these blacklists.

    3.DShield(Distributed Intrusion Detection System)

    The SANS(SysAdmin,Audit,Network,and Security)Institute operates a collaborative system called DShield,which involves correlating firewall logs.A community of contributors shares data related to unanticipated incoming connections and statistics about individual Ips and ports.

    4.AlienVault Open Threat Exchange(OTX)

    OTX is a platform that enables a collaborative community of researchers and security professionals to share millions of threat indicators daily.

    5.MISP(Malware Information Sharing Platform)

    NERD is linked to a sizable MISP run by CIRCL(Computer Incident Response Center Luxembourg),a platform for sharing information about internet threats.

    The NERD framework,as proposed by Bartos et al.[15],is shown in Fig.4.Each IP address is assigned a reputation score,a single number summarizing the level of threat the address poses,based on the number of events and the number of distinct sources which reported it within the last 14 days.The score takes values between 0.0(no events)and 1.0(worst case).The NERD system implements a scoring mechanism based on the following calculations:

    1.Every day within 14 days,calculate the:

    a)n_events(d)-Number of events reported to Warden within the day with the evaluated IP address listed as the source.

    b)n_nodes(d)-Number of distinct nodes(detectors)that reported those alerts.

    c) Daily reputation score.The daily reputation score can be calculated with Eq.(1).

    2.The final reputation score is the weighted average of the 14 daily scores with decreasing weight linearly(the last day has the highest weight to show favoritism to the recent days’rep(d)).The final reputation score formula can be calculated with Eq.(2).

    Figure 4:Network entity reputation database framework(adapted from[15])

    3 Proposed PoIR Consensus

    This section describes the proposed work,including PoIR blockchain architecture,node selection algorithm,and BiLSTM model for node selection implemented using the NERD dataset.

    3.1 PoIR Blockchain Architecture

    The proposed PoIR blockchain architecture is shown in Fig.5.There are two main components in PoIR:Machine Learning Component and Blockchain Network Component.PoIR consensus begins by training the NERD dataset using machine learning with the BiLSTM architecture,producing a trained BiLSTM model.Furthermore,in the blockchain network component,the trained model will be integrated into the Intelligent Node Selector (INS) on the blockchain network.Thus,when new members join the network,they will be selected by INS and given a reputation score to determine the class of members.They can become miners,validators,or common nodes if they meet the requirements.

    Figure 5:Proposed PoIR system workflow

    PoIR implements a peer-to-peer architecture that is commonly used in distributed ledger systems.In this architecture,each network entity,or node,has the same capabilities to communicate directly.PoIR adopts a public blockchain architecture in which the data and access to the system are available to anyone willing to participate in the network.However,unlike PoW,PoIR will monitor the nodes’NERD reputation before its connection to the blockchain network and will be constantly monitored on each block proposal cycle.The reputation will represent nodes’behavior and intention.By monitoring the reputation of the nodes periodically,it is hoped that only behaved and honest nodes will connect to the PoIR network.

    There are four main objects in the PoIR network,i.e.,miner node,validator node,common node,and node selector.The miner node objective is to propose a new block to the blockchain network.Unlike performance-based PoW,the miner node will not compete with other nodes to add the following block of transactions to the blockchain,which draws enormous computational resources.The validator nodes’objective is to validate the miner’s format of a new proposed block and check the ledger’s integrity.Validator nodes are also responsible for distributing the confirmed ledger to the blockchain network.The common node is only eligible to join the network and read the distributed ledger.However,it should be noted that the common node’s higher goal is to become a validator or miner node,which can be achieved by boosting its reputation score.The node selector acts as an investigator of nodes’behavior.It monitors nodes’behavior by multi-variable features,which are represented by a reputation score.As shown in Fig.5,the reputation is divided into clusters,which denotes nodes’eligibility to perform tasks,i.e.,mining and validating block.The class division and threshold will be described in Section 3.2.

    3.2 Intelligent Node Selector Mechanism

    Intelligent Node Selector(INS)is used two times:node join request and new block proposal.Each scenario is described in Figs.6a and 6b and further described through Algorithms 1 and 2.The nodes judged by INS are divided into three clusters by their reputation score threshold.Table 2 describes the reputation score threshold of each node class.

    Table 2: PoIR class clustering by reputation score threshold

    Figure 6:Node join proposal in PoIR(a)and new block proposal in PoIR(b)

    The specific requirements of reputation clustering in PoIR were considered.Generally,the determination of thresholds in clustering regression values into classes will be evenly divided according to the number of classes.For example,in the PoIR case,the classes will be typically divided into two: scores greater than 50 will fall into the excellent node class,and scores less than 50 will fall into the lousy node class.However,the thresholds were tweaked to align with the desired behavior of nodes within the network and to provide meaningful differentiation in terms of trustworthiness and reliability.Assuming the network covers all possible reputation scores,nodes that will be allowed to participate are 75%of the total reputation score range(25-100).This range is intended to involve more nodes.By involving more nodes,the INS will be less discriminatory,and the PoIR network will be moderately inclusive while still being protected from malicious nodes(Class III,under 25 reputation score).

    Furthermore,the network classes will be divided into two to ensure the network operates securely.Only nodes with reputation scores more than 50 (Class I,following the general threshold determination principle)can fully operate the blockchain(propose new blocks,manage nodes).The remaining nodes(Class II,25-50 reputation score)will only act as ledger keepers operated by Class I nodes.The relationship between Classes I and II nodes can be depicted as a pseudo-masterslave configuration.However,the relationship becomes dynamic as nodes’reputation is periodically updated.This dynamic relationship enables nodes from the Class II cluster to transcend into Class I nodes and operate the blockchain.Considering those issues,the INS will only merge Class I and Class II node to the blockchain network,while Class III is denied as its reputation is considered too low.

    For the new block proposal request,the node selector will only select the node from Class I.Suppose the node proposes a new block with the highest reputation.In that case,the network will allow the node to become the miner and send the proposed block to be validated by selected validator nodes.However,it is acknowledged that only selecting the node with the highest reputation will lead to a centralized block proposer.Therefore,the round-robin rule is applied.Node from Class I,which already proposed a new block,will not be selected as the leader again until other Class I nodes propose their blocks.Furthermore,the selected validators can vote to approve or reject the proposed block.If all validators approve,the proposed block will later be distributed to all network’s ledgers.

    3.3 BiLSTM Model for Node Selection

    The BiLSTM trained with the NERD dataset is applied as a model for developing the node selection mechanism.The following subsection will describe how the dataset is created,the model’s architecture,and the model’s training process,respectively.

    3.3.1 Network Entity Reputation Dataset

    To train the BiLSTM,NERD as the dataset is adopted.The dataset is derived from NERD’s public website.It consists of 141.070 data rows containing several network entity properties with its initial reputation score.The example rows of the derived dataset are shown in Table 3.

    Table 3: Example of derived NERD dataset

    Before using the dataset,the statistics from the NERD dataset were evaluated.Fig.7 describes some of the dataset’s feature distribution,which is depicted through the Kernel Density Estimate(KDE) diagram.KDE visualizes the distribution of observations in a dataset.It reviews the joint distribution of pairs of columns from the dataset.In the NERD dataset,entities are differentiated based on their IP address values,representing individual PoIR network nodes.The top row of the figure elaborates on the relationship between IP address and other features.It can be observed that the dataset shows a fairly even distribution,i.e.,the KDE between IP address and reputation score(row 1,column 8).The IP addresses are evenly distributed across the reputation range from 0.0 to 1.0,indicating that the entities in the NERD dataset represent all class clusters.

    Figure 7:Selected feature distribution of derived NERD dataset

    However,some outliers are detected in the KDE diagram for the IP address and events(row 1,column 5).Typically,the total number of events in the NERD dataset ranges from 0 to 116266.Nevertheless,four entities stand out with unusually high event counts.These entities recorded 177986,288894,390378,and 633256 events,respectively.Although these outliers are relatively insignificant in the overall dataset,they appear as distinct data points that deviate significantly from the primary trend.These outliers may arise due to rare occurrences or instances that deviate from the expected patterns in the data.Further,the check reveals that these outliers correspond to the Netherland IP addresses,specifically those associated with the hostname recyber[dot]net,and were tagged for ReconScanning and AttemptLogin activities.

    The dataset was adjusted to fit the PoIR context better.Some adjustments and pre-process of the derived dataset are described as follows:

    1.Invert the reputation score

    As NERD’s reputation score hierarchy indicate the opposite of PoIR (in original NERD,1.0 shows the worst value,and 0.0 shows the best value),the score was inverted with the formula in Eq.(3).

    The formula in Eq.(3)is implemented on pseudocode as described in Algorithm 3.

    2.Create additional features

    Additional features were added to extend the better meaning of NERD’s dataset.The additional features include the count and weighted count of the blacklist,event categories,and tags.The process of each features addition is described in Algorithm 4.The count represents the number of items shown in the respective feature.For example,if a node has a blacklist of blocklist_net_ua_ips|ciarmy|dshield|turris_greylist,it has four counts of the blacklist.Furthermore,the weight represents the total occurrence of the blacklist on the respective node divided by the total blacklist available.

    3.Encode the data

    It is noted that some of the dataset features are categorical,i.e.,ip_address,hostname,asn,and country.The data was encoded into numerical values using mean encoding to make the data trainable by BiLSTM.The mean encoding uses the target variable(inverted reputation)as the basis to generate the new encoded feature.The mean encoding steps are described as follows:

    a) Define categorical features to transform.

    b) Group the dataset by the categorical feature and get the total sum of the feature,i.e.,hostname.

    c) Group the dataset by the categorical feature and get the number of respective features.

    d) Divide the step b to step c results.

    e) Merge the results of step d into the dataset.

    Furthermore,the pseudocode of data encoding is described in Algorithm 5.

    4.Normalize the data

    Table 4 shows the overall statistics of the dataset.Each feature covers very different scales and ranges,i.e.,events have a mean of 1420.Meanwhile,blacklist_w only has a mean of 0.33.For this matter,the dataset was normalized.

    Table 4: Dataset overall statistics

    Normalization is essential as the features will be multiplied by the model weights.As a result,the scale of the inputs influences the scale of the outputs and the scale of the slopes.The Keras Normalization module was used to normalize the dataset—the example of the before and after normalization vector is shown in Eqs.(4)and(5),respectively.

    Further to the data adjustment process,the correlation between features and targets in the dataset and map it on the correlation heatmap diagram is analyzed and shown in Fig.8.

    Figure 8:Correlation heatmap of derived NERD dataset

    The correlation heatmap is calculated using the Pearson Correlation Coefficient formula.Pearson Correlation Coefficient measures the strength and relationship between features and targets.Pearson Correlation Coefficient is examined using the formula in Eq.(6).

    In the given formula,nrefers to the total number of pairs of stocks that are being analyzed.The symbols ∑xy,∑x,∑y,∑x2,and ∑y2represent the sum of products of paired stocks,the sum of all x scores,the sum of all y scores,the sum of the squared values of x scores,and the sum of the squared values of y scores,respectively.

    3.3.2 Model Architecture and Training

    The Bidirectional Long Short-Term Memory(BiLSTM)network architecture is adopted in this work.LSTM is a variant of Recurrent Neural Network(RNN)with the learning ability of long-term dependencies.Long short-term memory units are composed of four components:a cell,a forget gate,an input gate,and an output gate,distinct from recurrent neural networks.Within a predetermined period,the cell stores data,and gates manage the passage of information to and from the cell.This process consists of two states:a hidden state and a cell state.In an LSTM cell,the cell state serves as a form of memory,while the hidden state is responsible for storing the output of the cell.Thus,a hidden state and a cell input decide the information stored in the cell,i.e.,to discard or store new information.

    Fig.9 depicts the architecture of the BiLSTM network,which is an extension of the traditional LSTM model featuring an additional layer.This second layer is connected through hidden-to-hidden linkages that allow information to flow in reverse temporal order,as shown in Fig.9b.The model can incorporate information from past and future contexts during training.The forward and backward pass outputs are added element-wise to predict the output of theith word,as indicated in Eq.(7).

    Figure 9:BiLSTM network architecture(a)and detailed LSTM cell(b)

    The BiLSTM model consists of multiple LSTM cells,and the architecture of an LSTM cell is shown in Fig.9a.At time stept,the forget gate,which implements a sigmoid function(σ),determines whether to retain or forget information in the cell state.To make this decision,it takes inputxtand receives the output of the previous hidden stateht-1,and uses Eq.(8) to calculate the probability of retaining current information.

    Once the forget gate in the LSTM cell determines the probability of retaining new information,the LSTM cell decides whether to keep that information in the cell state.Additionally,the input gate,which is implemented using a sigmoid function,determines the values to be updated based on Eq.(9).Meanwhile,the tanh function generates a candidate vector ?Ct,which is combined with the cell state to update it.Eq.(10)is used to generate this candidate vector.

    Then,Eq.(11)is used to update the previous cell stateCt-1into a new cell stateCt.

    Eq.(11)uses the forget gateftto regulate the gradient passes through the LSTM cell,which helps mitigate issues of vanishing or exploding gradients commonly observed in recurrent neural networks.After the cell stateCtis updated,the sigmoid function at the output gate is used to determine which portion of the cell state should be returned,as specified in Eq.(12).This resulting cell stateCtis then passed through a tanh function and multiplied with another sigmoid function to produce the hidden statehtas shown in Eq.(13).

    The model architecture build and train process is described in Algorithm 6.There are three main activities in Algorithm 6.The first activity,which is shown in lines 1-27,is the architecture definition.This activity defines a function to create the model in bidirectional and unidirectional ways.A function to fit models with the dataset is also defined.In addition,models to train are defined,i.e.,BiLSTM,BiGRU,UniLSTM,and UniGRU.The second activity in lines 28-31 explains the model’s training process.The third activity,shown in lines 32-35,describes the model’s save process.

    4 Results and Analysis

    This section discusses the BiLSTM model evaluation,monopoly attack evaluation,and transaction time evaluation.The evaluation environment is described in Table 5.The models are implemented and evaluated using Python 3.7.Google Colaboratory platform[35]is used to develop the BiLSTM model and PoIR blockchain architecture.

    Table 5: Evaluation environment description

    4.1 Model Evaluation

    Approximately 20% of the total rows of the training dataset are used for validation in the training phase.To evaluate the performance of the model,BiLSTM is compared with other Recurrent Neural Network models,i.e.,Unidirectional LSTM(UniLSTM),Bidirectional Gated Recurrent Unit(BiGRU),and Unidirectional Gated Recurrent Unit(UniGRU).

    The validation is conducted in 100 epochs with similar model architecture.Each model only differs in their direction (Unidirection or Bi-direction) and RNN unit (LSTM or GRU).Adadelta[36]with a 0.25 clipping norm is used as an optimizer.Adadelta is used as it can adapt the learning rate dynamically during training,which usually helps to overcome the problem of diminishing learning rates.Root Mean Squared Error(RMSE)is used as the metric in model evaluation.RMSE measures the average difference between values predicted by a model and the actual values.RMSE formula is described in Eq.(14).

    The model validation result is described in Fig.10.It can be seen that the proposed BiLSTM outperforms other models.BiLSTM generates a 0.022 error on the last epoch.Meanwhile,UniLSTM,BiGRU,and UniGRU produce 0.072,0.052,and 0.092,respectively.It is noted that Bidirectional models generally perform better.BiLSTM outperforms UniLSTM,and BiGRU outperforms UniGRU.It is also noted that the LSTMs perform better than the GRUs.However,the overall model results(either the proposed or others)have shown that RNN and the adopted NERD dataset are well-fitted to perform this task.

    Figure 10:Models validation result

    Furthermore,the BiLSTM is evaluated to predict the test set.Tes set consists of 14,000 rows(±10%of the total dataset)which is not included in the training process.The result in Fig.11a shows that the error line generally swamps the y-?y matrices.It means that the model usually predicts the data with a small error value.The prediction results are also validated by Fig.11b,which shows that the error distribution frequently occurs in the region of minor errors.

    Figure 11:Model evaluation(a)and error frequency distribution(b)using the test set

    4.2 Monopoly Attack Evaluation

    A monopoly attack refers to an attack on the integrity of a blockchain system in which a single malicious actor manages to control the majority of the network,potentially causing network disruption.For performance-based blockchains such as PoW,the attack might happen if the actor outpowers the performance of other nodes.The attacker would have enough mining power to intentionally modify the ordering of transactions,preventing some or all transactions from being confirmed.Meanwhile,for reputation-based blockchains such as PoS,the attack might happen if the actor manages to capitulate most of the resource that is used as the reputation metric,i.e.,stake.An attacks simulation against PoW,PoS,and PoIR consensus algorithms is conducted to prove that PoIR is more resistant to monopoly attacks.Monopoly attacks on the PoS and PoW networks are carried out by giving enormous stake values and hash power to nodes 1-4,expecting these nodes to win the mining process most of the time.For the PoIR network,the simulation considers nodes 1-4 attempting to modify their identity by altering their IP address while maintaining a high reputation.

    Fig.12 shows the monopoly attack evaluation.The evaluation is conducted in 1000 iteration rounds of block submissions.It can be seen that nodes 1-4 on PoS that conduct the attacks(highlighted in red)manage to control the majority(58%)of transaction processes.In 1000 rounds of PoS block submission,the average malicious node can win the transaction process 145 times,while the average node can only win 26 times.Results in PoW show a slight centralization.For PoW,the node with highperformance capability can also win the majority(32%)of the transaction process.In 1000 rounds of PoW block submission,the average malicious node can win the transaction process 80 times,while the average node can only win 42 times.Meanwhile,the supposed to be malicious nodes on PoIR failed to win the majority of the transaction.The leader is fairly distributed over 1000 iterations,with its standard deviation only 0.73 compared to 48.8 in PoS and 15.5 in PoW.This evaluation confirms that PoIR is more resistant to monopolization than PoS and PoW.

    Figure 12:Leader distribution on attacked blockchain consensus

    4.3 Transaction Time Evaluation

    Transaction time denotes the process a blockchain network needs to complete its transaction.This evaluation aims to verify that PoIR does not require enormous computational demands.The transaction time metric is used to measure computational demand,with the expectation that the longer the transaction time required,the more resources a blockchain network uses to complete its transaction.PoW with various levels of leading zero will be compared to PoS and PoIR.

    Fig.13 shows the transaction time evaluation result.The figure described that PoW as a performance-based consensus algorithm requires higher computational resources when compared to PoS and PoIR.It can be seen that as the difficulty value of the leading zero being sought increases,the time required also increases.PoW,with the highest leading zero,needed 120 s to complete a transaction,while PoS and PoIR only needed 10 and 12 s,respectively.It was observed that the required transaction time for the PoIR consensus algorithm appears to be±2 s longer compared to the PoS consensus algorithm.The proposed characteristics of the PoIR mechanism can explain this difference.Unlike PoS,which primarily relies on the nodes’stake or ownership of the original digital currency for node selection,PoIR takes into account multiple variables and factors.This outcome is expected as having more variables to consider may result in a longer transaction time.However,considering the results of the monopoly attack evaluation in Section 4.2,the transaction time in PoIR is still deemed acceptable as the benefits outweigh the drawbacks.This evaluation confirms that PoIR transaction time is good enough compared to established performance-based and reputation-based consensus mechanisms.

    Figure 13:Transaction time evaluation of PoIR,PoA,and PoS

    5 Conclusion

    A node selection mechanism in reputation-based blockchain consensus has been built.PoIR uses BiLSTM to investigate and select nodes based on multi-criteria variables represented as a reputation.The NERD dataset is used to train the BiLSTM model.The performance of PoIR was examined in comparison to the existing blockchain consensus mechanisms,i.e.,PoW and PoS.Additionally,a comparison was made between PoIR and other state-of-the-art RNN models,i.e.,BiGRU,UniLSTM,and UniGRU.Evaluation results present that the proposed PoIR enhances the blockchain performance,which can be seen from relatively good transaction time while having more resistance to monopoly attack,which can happen in other consensuses.Furthermore,the overall model results,either the proposed BiLSTM or others,have shown that RNN and the adopted NERD dataset are well-fitted to perform the node selection task.It can be concluded that the proposed work can be an alternative to PoW by eliminating large computational power consumption while having complete decentralization characteristics that other reputation-based consensuses do not have.

    However,while this work provides a foundation for harnessing state-of-the-art deep learning capability for a fully decentralized reputation-based consensus mechanism,the static nature of reputation thresholds in this work presents an opportunity for improvement.Currently,the reputation score thresholds are fixed at the values mentioned earlier,which may not adequately accommodate network setup and conditions variations.This rigidity in threshold values may limit the PoIR mechanism’s adaptability in different deployment scenarios.

    Future research can focus on developing an adjustable dynamic reputation threshold mechanism based on certain characteristics and dynamics.By incorporating adaptive algorithms such as deep reinforcement learning,the reputation thresholds can be dynamically set based on real-time network conditions,node behavior,and other relevant factors.This self-adjusting reputation thresholds concept might enable a more fine-grained and context-aware classification of nodes.Another aspect to consider is the incorporation of reputation feedback mechanisms.The idea would involve designing protocols or mechanisms through which nodes can provide feedback on the reputation scores of other nodes,enabling a collective assessment of trustworthiness.By leveraging the wisdom of the crowd,the reputation thresholds can be refined and updated based on community consensus,resulting in a more democratic approach.

    Acknowledgement:We would like to thank the Ministry of Education,Culture,Research,and Technology(Kemendikbudristek)of Indonesia,who provided financial support for this research.We would also like to express our gratitude to the members of the IoT+research group,who provided valuable feedback at every stage of the research.

    Funding Statement:This research was funded by the Ministry of Education,Culture,Research,and Technology (Kemendikbudristek) of Indonesia under PDD Grant with Grant Number NKB-1016/UN2.RST/HKP.05.00/2022.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:J.H.Windiatmaja,D.Hanggoro,R.F.Sari;data collection:J.H.Windiatmaja;analysis and interpretation of results: J.H.Windiatmaja;draft manuscript preparation: J.H.Windiatmaja,D.Hanggoro,M.Salman,R.F.Sari.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The original Network Entity Reputation Database is available and can be accessed at https://nerd.cesnet.cz/nerd/ips/.The PoIR code and pre-processed dataset is also available at https://gitlab.com/jauzak/poir.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    女人精品久久久久毛片| 亚洲精品中文字幕一二三四区| 亚洲av成人av| 亚洲成av片中文字幕在线观看| 欧美黑人精品巨大| 国产91精品成人一区二区三区| 国产一卡二卡三卡精品| 欧美黑人欧美精品刺激| 亚洲,欧美精品.| 91麻豆精品激情在线观看国产 | 免费看a级黄色片| 午夜免费观看网址| 亚洲av欧美aⅴ国产| 午夜老司机福利片| 啦啦啦在线免费观看视频4| 一二三四在线观看免费中文在| 久久国产乱子伦精品免费另类| 岛国毛片在线播放| 国产极品粉嫩免费观看在线| 高潮久久久久久久久久久不卡| 国产精品99久久99久久久不卡| 91成人精品电影| 亚洲熟妇熟女久久| 欧美日韩成人在线一区二区| 丰满迷人的少妇在线观看| 九色亚洲精品在线播放| 99re在线观看精品视频| 男女免费视频国产| 777米奇影视久久| 午夜91福利影院| 国产成人欧美| 国产精品免费一区二区三区在线 | 精品国产国语对白av| 少妇粗大呻吟视频| 欧美老熟妇乱子伦牲交| 日韩免费av在线播放| 亚洲熟妇中文字幕五十中出 | 亚洲国产中文字幕在线视频| 热99国产精品久久久久久7| 国产在线一区二区三区精| 国产欧美亚洲国产| 午夜精品久久久久久毛片777| 久久国产精品人妻蜜桃| 一区二区三区激情视频| 欧美黄色片欧美黄色片| 国产欧美日韩一区二区精品| 国产成人免费无遮挡视频| 身体一侧抽搐| 日韩三级视频一区二区三区| 三级毛片av免费| 一级毛片女人18水好多| 亚洲色图av天堂| 亚洲国产看品久久| 日本黄色日本黄色录像| 亚洲成人国产一区在线观看| 男女午夜视频在线观看| 久久中文看片网| av有码第一页| 少妇裸体淫交视频免费看高清 | 超碰97精品在线观看| 国产日韩欧美亚洲二区| 亚洲片人在线观看| 亚洲精品美女久久久久99蜜臀| 成人亚洲精品一区在线观看| 叶爱在线成人免费视频播放| 在线观看免费高清a一片| 一本综合久久免费| 精品国产一区二区三区四区第35| 视频在线观看一区二区三区| 人人澡人人妻人| 久久香蕉精品热| 久热这里只有精品99| 久久中文字幕一级| 欧美精品人与动牲交sv欧美| 黄频高清免费视频| 十八禁人妻一区二区| 青草久久国产| 成年女人毛片免费观看观看9 | 变态另类成人亚洲欧美熟女 | 国产激情久久老熟女| 国产激情久久老熟女| 久久国产精品人妻蜜桃| 亚洲情色 制服丝袜| 色综合婷婷激情| 老熟妇乱子伦视频在线观看| 成人特级黄色片久久久久久久| 日韩欧美国产一区二区入口| 国产成人系列免费观看| 少妇被粗大的猛进出69影院| 精品人妻熟女毛片av久久网站| 19禁男女啪啪无遮挡网站| 久久人妻福利社区极品人妻图片| 桃红色精品国产亚洲av| 人人妻人人澡人人看| 国产亚洲欧美精品永久| 欧洲精品卡2卡3卡4卡5卡区| 国产片内射在线| 丰满迷人的少妇在线观看| 黄色a级毛片大全视频| 成人影院久久| 99国产精品99久久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 久久亚洲精品不卡| 欧美黑人欧美精品刺激| 日韩欧美免费精品| 中亚洲国语对白在线视频| 国产熟女午夜一区二区三区| 美女扒开内裤让男人捅视频| 国产激情欧美一区二区| 女人爽到高潮嗷嗷叫在线视频| 久久 成人 亚洲| 成人永久免费在线观看视频| 9热在线视频观看99| 悠悠久久av| 国产精品影院久久| 久久国产乱子伦精品免费另类| 中文字幕人妻丝袜一区二区| av网站免费在线观看视频| 欧美国产精品一级二级三级| 久热爱精品视频在线9| av视频免费观看在线观看| 亚洲一区二区三区欧美精品| 啦啦啦视频在线资源免费观看| 女人被躁到高潮嗷嗷叫费观| 午夜福利在线免费观看网站| 亚洲综合色网址| 欧美日韩瑟瑟在线播放| 18禁国产床啪视频网站| 日本一区二区免费在线视频| 国产成+人综合+亚洲专区| av天堂在线播放| 国产高清激情床上av| 日韩欧美三级三区| 久久人妻熟女aⅴ| 黄片大片在线免费观看| 欧美黄色淫秽网站| 黄色a级毛片大全视频| 欧美人与性动交α欧美软件| 国产成人欧美| 国产麻豆69| av一本久久久久| 黄色毛片三级朝国网站| 欧美国产精品va在线观看不卡| 精品国产超薄肉色丝袜足j| 一a级毛片在线观看| 91成年电影在线观看| 最新在线观看一区二区三区| 欧美性长视频在线观看| 亚洲av美国av| 国产成人免费观看mmmm| 亚洲精品成人av观看孕妇| 亚洲成av片中文字幕在线观看| av福利片在线| www日本在线高清视频| 久久精品aⅴ一区二区三区四区| 天堂中文最新版在线下载| 久久香蕉激情| www.熟女人妻精品国产| 9191精品国产免费久久| 黄色成人免费大全| 国产亚洲精品第一综合不卡| 亚洲第一青青草原| 少妇裸体淫交视频免费看高清 | 精品无人区乱码1区二区| 在线国产一区二区在线| 免费看a级黄色片| 人成视频在线观看免费观看| 国产1区2区3区精品| 777久久人妻少妇嫩草av网站| 一区二区日韩欧美中文字幕| 久久亚洲真实| 法律面前人人平等表现在哪些方面| 国产精品99久久99久久久不卡| 人人妻人人爽人人添夜夜欢视频| e午夜精品久久久久久久| 成年人午夜在线观看视频| 国产不卡av网站在线观看| 麻豆国产av国片精品| 精品卡一卡二卡四卡免费| 国产又色又爽无遮挡免费看| 别揉我奶头~嗯~啊~动态视频| 香蕉久久夜色| 久久精品国产清高在天天线| 99热国产这里只有精品6| 咕卡用的链子| 亚洲成人国产一区在线观看| 成人国语在线视频| 国产精品98久久久久久宅男小说| 五月开心婷婷网| 久久久国产成人精品二区 | 1024香蕉在线观看| 日本vs欧美在线观看视频| 老熟妇乱子伦视频在线观看| 人人妻人人澡人人爽人人夜夜| 欧美一级毛片孕妇| 18禁观看日本| 中亚洲国语对白在线视频| 99精品在免费线老司机午夜| 国产野战对白在线观看| 日韩欧美一区视频在线观看| 亚洲性夜色夜夜综合| 在线观看午夜福利视频| 可以免费在线观看a视频的电影网站| 真人做人爱边吃奶动态| 黑人巨大精品欧美一区二区mp4| 国产亚洲精品第一综合不卡| 国产三级黄色录像| 丝袜人妻中文字幕| 亚洲综合色网址| 欧美日韩瑟瑟在线播放| 日韩三级视频一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | videos熟女内射| 亚洲av欧美aⅴ国产| 人妻丰满熟妇av一区二区三区 | 在线观看免费日韩欧美大片| 国产亚洲精品一区二区www | 美国免费a级毛片| 午夜免费观看网址| 久久久久国产一级毛片高清牌| 精品少妇一区二区三区视频日本电影| 成在线人永久免费视频| 国产精品永久免费网站| 色在线成人网| 免费观看a级毛片全部| 欧美人与性动交α欧美软件| 欧美日韩中文字幕国产精品一区二区三区 | 久久精品国产清高在天天线| 中出人妻视频一区二区| 午夜精品国产一区二区电影| 男女下面插进去视频免费观看| 人人澡人人妻人| 精品久久久久久,| 欧美日韩乱码在线| 一进一出抽搐动态| 黑人猛操日本美女一级片| 757午夜福利合集在线观看| 涩涩av久久男人的天堂| 国产亚洲欧美在线一区二区| 日韩人妻精品一区2区三区| 免费久久久久久久精品成人欧美视频| 又黄又粗又硬又大视频| 精品人妻1区二区| 精品久久久久久久毛片微露脸| 久久久精品国产亚洲av高清涩受| 国产人伦9x9x在线观看| 激情在线观看视频在线高清 | 三级毛片av免费| 脱女人内裤的视频| 国产高清视频在线播放一区| 99国产精品免费福利视频| 午夜福利在线观看吧| 亚洲成国产人片在线观看| 亚洲午夜理论影院| 亚洲伊人色综图| 国产精品.久久久| 别揉我奶头~嗯~啊~动态视频| 高潮久久久久久久久久久不卡| 亚洲三区欧美一区| 久久精品国产清高在天天线| 满18在线观看网站| av片东京热男人的天堂| 亚洲中文日韩欧美视频| 精品国产亚洲在线| 一级毛片高清免费大全| 999久久久国产精品视频| 亚洲七黄色美女视频| 亚洲精品久久午夜乱码| 少妇被粗大的猛进出69影院| 99久久综合精品五月天人人| 伊人久久大香线蕉亚洲五| 一级片免费观看大全| 日日摸夜夜添夜夜添小说| 午夜福利一区二区在线看| 很黄的视频免费| 欧美成人午夜精品| 国产av精品麻豆| 亚洲情色 制服丝袜| 国产又爽黄色视频| 99久久精品国产亚洲精品| 天堂俺去俺来也www色官网| 免费女性裸体啪啪无遮挡网站| 怎么达到女性高潮| 黄片小视频在线播放| 女人被狂操c到高潮| 999精品在线视频| 国产成人精品无人区| 日日摸夜夜添夜夜添小说| 精品国产美女av久久久久小说| 最新在线观看一区二区三区| 中文字幕制服av| 色精品久久人妻99蜜桃| 国产在视频线精品| 精品久久久久久久毛片微露脸| 亚洲情色 制服丝袜| 可以免费在线观看a视频的电影网站| 啦啦啦在线免费观看视频4| 国产精品综合久久久久久久免费 | aaaaa片日本免费| 啦啦啦视频在线资源免费观看| 涩涩av久久男人的天堂| 母亲3免费完整高清在线观看| √禁漫天堂资源中文www| 国产精品亚洲一级av第二区| 精品乱码久久久久久99久播| 亚洲一卡2卡3卡4卡5卡精品中文| 一级毛片精品| 好男人电影高清在线观看| 女性生殖器流出的白浆| 欧美日韩福利视频一区二区| 搡老熟女国产l中国老女人| 日韩制服丝袜自拍偷拍| 丝袜美腿诱惑在线| 精品欧美一区二区三区在线| 9热在线视频观看99| a级片在线免费高清观看视频| 午夜精品在线福利| 亚洲 欧美一区二区三区| 久久国产精品男人的天堂亚洲| 人人妻人人澡人人看| 美女视频免费永久观看网站| 大香蕉久久成人网| 黑人巨大精品欧美一区二区mp4| cao死你这个sao货| 成人永久免费在线观看视频| 中文字幕另类日韩欧美亚洲嫩草| 精品国产国语对白av| 欧美日本中文国产一区发布| 91老司机精品| 午夜福利,免费看| 一级片'在线观看视频| 精品亚洲成a人片在线观看| 人人妻人人澡人人爽人人夜夜| 十分钟在线观看高清视频www| av国产精品久久久久影院| 黄色成人免费大全| 亚洲成人国产一区在线观看| 国产精品美女特级片免费视频播放器 | 欧美日韩成人在线一区二区| 精品国内亚洲2022精品成人 | 精品亚洲成国产av| 欧美成狂野欧美在线观看| av不卡在线播放| 人妻一区二区av| 欧美日韩一级在线毛片| 99国产精品99久久久久| 午夜免费观看网址| 日本vs欧美在线观看视频| 老司机深夜福利视频在线观看| 亚洲视频免费观看视频| 免费观看a级毛片全部| 久久青草综合色| 亚洲全国av大片| 久久中文字幕一级| 免费久久久久久久精品成人欧美视频| 国产视频一区二区在线看| 久久国产精品男人的天堂亚洲| 这个男人来自地球电影免费观看| 怎么达到女性高潮| tube8黄色片| 久久天躁狠狠躁夜夜2o2o| 啦啦啦视频在线资源免费观看| 新久久久久国产一级毛片| 男女免费视频国产| 亚洲情色 制服丝袜| 欧美日韩亚洲高清精品| 国产精品自产拍在线观看55亚洲 | 嫩草影视91久久| 51午夜福利影视在线观看| av天堂久久9| av天堂在线播放| a级毛片在线看网站| 亚洲色图综合在线观看| av天堂在线播放| 免费人成视频x8x8入口观看| 国产日韩一区二区三区精品不卡| 极品少妇高潮喷水抽搐| 久久久久久久午夜电影 | 国产成人欧美在线观看 | 一级,二级,三级黄色视频| 免费在线观看日本一区| a级片在线免费高清观看视频| 日韩一卡2卡3卡4卡2021年| 欧美 亚洲 国产 日韩一| 老熟妇仑乱视频hdxx| 俄罗斯特黄特色一大片| 国产单亲对白刺激| 九色亚洲精品在线播放| 久久久久精品人妻al黑| 免费不卡黄色视频| 一级黄色大片毛片| 大香蕉久久网| 中出人妻视频一区二区| 日韩 欧美 亚洲 中文字幕| av网站在线播放免费| 99re在线观看精品视频| svipshipincom国产片| 两个人免费观看高清视频| 老司机福利观看| 国产又爽黄色视频| 法律面前人人平等表现在哪些方面| 亚洲国产看品久久| svipshipincom国产片| 人妻 亚洲 视频| 法律面前人人平等表现在哪些方面| 啦啦啦视频在线资源免费观看| 老汉色av国产亚洲站长工具| 午夜日韩欧美国产| 午夜免费观看网址| 一级片'在线观看视频| 99久久人妻综合| 欧美乱妇无乱码| 亚洲国产欧美网| 在线观看免费视频日本深夜| 久久中文字幕一级| 精品国产乱子伦一区二区三区| 亚洲国产精品sss在线观看 | 9191精品国产免费久久| 精品久久久久久,| 国产极品粉嫩免费观看在线| 亚洲精品成人av观看孕妇| 精品免费久久久久久久清纯 | 亚洲av美国av| 国产精品免费大片| 日本五十路高清| 中文字幕人妻熟女乱码| 9热在线视频观看99| 俄罗斯特黄特色一大片| 人妻丰满熟妇av一区二区三区 | 色精品久久人妻99蜜桃| 欧美乱码精品一区二区三区| 一二三四社区在线视频社区8| 国产男女内射视频| 大型黄色视频在线免费观看| 超色免费av| 9热在线视频观看99| 18禁美女被吸乳视频| 少妇猛男粗大的猛烈进出视频| 亚洲视频免费观看视频| 欧美日韩亚洲国产一区二区在线观看 | 亚洲欧美激情在线| а√天堂www在线а√下载 | 大香蕉久久网| 国产精品一区二区免费欧美| 亚洲精品久久成人aⅴ小说| 91麻豆av在线| 成人国产一区最新在线观看| 欧美日韩视频精品一区| 成人特级黄色片久久久久久久| 日韩大码丰满熟妇| 久热爱精品视频在线9| 麻豆av在线久日| 在线观看66精品国产| 亚洲精品自拍成人| 一二三四在线观看免费中文在| 一级片免费观看大全| 亚洲专区国产一区二区| 国产精品 国内视频| 两性午夜刺激爽爽歪歪视频在线观看 | 在线观看舔阴道视频| 18禁国产床啪视频网站| 熟女少妇亚洲综合色aaa.| 人人妻,人人澡人人爽秒播| 国产色视频综合| 一级黄色大片毛片| 免费女性裸体啪啪无遮挡网站| 日日爽夜夜爽网站| 亚洲成人国产一区在线观看| 成年女人毛片免费观看观看9 | 黄色视频不卡| 法律面前人人平等表现在哪些方面| 女人被躁到高潮嗷嗷叫费观| 久久精品91无色码中文字幕| 欧美 亚洲 国产 日韩一| 黄色视频不卡| 欧美国产精品一级二级三级| 无遮挡黄片免费观看| 热99re8久久精品国产| 在线观看免费视频日本深夜| 中文字幕人妻丝袜制服| 9191精品国产免费久久| 国产欧美亚洲国产| 久久久久久久久免费视频了| 国产精品国产av在线观看| svipshipincom国产片| 天天影视国产精品| 中文字幕色久视频| 99国产极品粉嫩在线观看| tocl精华| 成人特级黄色片久久久久久久| 这个男人来自地球电影免费观看| 岛国在线观看网站| 亚洲熟妇熟女久久| 91大片在线观看| 一a级毛片在线观看| 成熟少妇高潮喷水视频| 色在线成人网| 两人在一起打扑克的视频| 好男人电影高清在线观看| 国产精品偷伦视频观看了| 欧美国产精品va在线观看不卡| 国产亚洲欧美在线一区二区| 久久久国产成人精品二区 | 久久中文字幕人妻熟女| 午夜免费鲁丝| 国产成人系列免费观看| 国产熟女午夜一区二区三区| 亚洲欧美日韩另类电影网站| 18禁裸乳无遮挡免费网站照片 | 热99国产精品久久久久久7| 国产不卡av网站在线观看| 法律面前人人平等表现在哪些方面| tube8黄色片| 亚洲免费av在线视频| 精品一区二区三区四区五区乱码| 国产精品98久久久久久宅男小说| 久久中文字幕一级| 亚洲av成人一区二区三| 美女高潮喷水抽搐中文字幕| svipshipincom国产片| 午夜福利视频在线观看免费| 欧美人与性动交α欧美精品济南到| 在线观看舔阴道视频| 五月开心婷婷网| 久久久久精品国产欧美久久久| avwww免费| av超薄肉色丝袜交足视频| 久久精品亚洲精品国产色婷小说| 美女高潮到喷水免费观看| 欧美中文综合在线视频| 丝袜在线中文字幕| 亚洲av日韩在线播放| 50天的宝宝边吃奶边哭怎么回事| 久久精品熟女亚洲av麻豆精品| 久久香蕉激情| 老司机在亚洲福利影院| 国内毛片毛片毛片毛片毛片| 国产精品一区二区在线不卡| 婷婷精品国产亚洲av在线 | 看黄色毛片网站| 国产成人欧美| 欧美+亚洲+日韩+国产| 一级片免费观看大全| 超碰成人久久| 日韩欧美三级三区| 国产精品欧美亚洲77777| 国产日韩欧美亚洲二区| 最新的欧美精品一区二区| 99国产精品一区二区三区| 免费观看人在逋| 一级毛片精品| 在线天堂中文资源库| 精品国产一区二区久久| 精品国产超薄肉色丝袜足j| 久久天躁狠狠躁夜夜2o2o| av电影中文网址| 国产午夜精品久久久久久| 国产区一区二久久| 亚洲精品成人av观看孕妇| 国产精品 国内视频| 一级毛片女人18水好多| 日本精品一区二区三区蜜桃| 免费看十八禁软件| 亚洲av成人一区二区三| 午夜福利,免费看| 伦理电影免费视频| 亚洲成人免费av在线播放| 国产精品美女特级片免费视频播放器 | 精品卡一卡二卡四卡免费| 欧美黑人欧美精品刺激| 午夜成年电影在线免费观看| 欧美av亚洲av综合av国产av| 国产成人免费观看mmmm| 一级a爱片免费观看的视频| 99热网站在线观看| 韩国精品一区二区三区| 亚洲第一欧美日韩一区二区三区| 亚洲av成人不卡在线观看播放网| 国产单亲对白刺激| 国产免费av片在线观看野外av| 国内久久婷婷六月综合欲色啪| 国产又色又爽无遮挡免费看| 中文字幕色久视频| 国产精品久久久av美女十八| 欧美日韩亚洲国产一区二区在线观看 | 国产99白浆流出| 大片电影免费在线观看免费| 国产99白浆流出| 欧美亚洲 丝袜 人妻 在线| 黄色成人免费大全| 国产精品成人在线| 激情视频va一区二区三区| 午夜精品久久久久久毛片777| 九色亚洲精品在线播放| 成人亚洲精品一区在线观看| 中文字幕高清在线视频| 99在线人妻在线中文字幕 | 欧美 日韩 精品 国产| 麻豆av在线久日| 午夜激情av网站| 亚洲五月天丁香| 女同久久另类99精品国产91| 精品卡一卡二卡四卡免费| 午夜影院日韩av| 99精品久久久久人妻精品| 三上悠亚av全集在线观看| 后天国语完整版免费观看| 黄网站色视频无遮挡免费观看| 亚洲五月婷婷丁香| 亚洲三区欧美一区| 国产国语露脸激情在线看| 国产一区二区三区视频了| 欧美日韩成人在线一区二区| 中文字幕制服av| 久久久国产成人免费|