• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    2023-12-15 03:58:04RuiQiaoandShiDong
    Computers Materials&Continua 2023年11期

    Rui Qiao and Shi Dong

    Schooomputer Science and Technology,Zhoukou Normal University,Zhoukou,466001,China

    ABSTRACT Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism (ABBCM) is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.

    KEYWORDS Consortium chain;Byzantine;consensus;generation mechanism;Internet of Things;consensus vulnerability

    1 Introduction

    With the great success of the permissionless blockchain application in electronic cryptocurrency,blockchain networks based on decentralized identity authentication and group consensus attract increasing attention.However,limited by the scale,performance,and deployment cost of distributed application systems,permissionless blockchain technology is challenging to use widely.Consortium Blockchain(CBC)inherits the security characteristics of public chain to some extent with the openness that private chain does not provide,so more research focuses on CBCs [1-3].The CBC limits the proposer set to a few known nodes and relies on a trusted service or consortium organization to authenticate the nodes.Based on proof of interest of chain or Byzantine Fault Tolerance(BFT),CBC proposes new blocks in the way of fault-tolerant consensus and verifies new transactions without needing confirmations,thus reducing the influence of potential Byzantine nodes on the system.Moreover,liquidity is achieved by deploying and running smart contracts on CBCs [4],of which the efficiency is significantly higher than that of the permissionless public chain driven by the proofof-work mechanism.With the continuous expansion of the application scenarios of CBC in recent years,the diversity and durability of the services it can provide have been improved unprecedentedly.Therefore,CBC provides a new way for identity authentication and trust transfer among parties in the network[5-7].

    The consensus mechanism of CBC ensures the consistency of contents stored by each node in the distributed ledger and protects data from unauthorized access,which is important for realizing the scalability,transaction speed,transaction certainty,and security of CBC[8,9].The consensus mechanism of CBC is constantly improved to maintain compatibility of high efficiency and scalable applications such as side chain and sharding mechanisms[10-12].Users of the CBC can create parallel and separate CBCs through the Application Program Interface (API) and set the initial consensus mechanism,allowing different parallel and separate CBCs belonging to the same consortium organization to adopt different consensus mechanisms.Meanwhile,the consensus mechanism of each parallel and separate CBC can be upgraded through voting at any time.The system can reach a consensus safely among several side chains or sharding chains by deploying smart contracts in CBC.

    However,under the environment of a Byzantine partition consortium network,the information service entities of heterogeneous CBCs interact frequently and lack collaborative management,making it difficult for the data owner to control the access of other trusted domain entities to the data,resulting in the risk of data being stolen,tampered with and replayed when the data is shared across domains[13].Chen et al.[14]proposed a blockchain-based cross-domain data-sharing method for the Internet of Things (IoT),which uses the threshold proxy re-encryption method to process the ciphertext to avoid collusion between malicious agents and visitors.Yu et al.[15]proposed an industrial IoT datasharing scheme based on blockchain and proxy re-encryption,where cloud servers verify whether user attributes meet the access policy and generate decryption parameters to send to users when data users request cross-domain data.Existing consensus mechanisms can satisfy the scalability or security of distributed systems,but it is impossible to do both as long as the consensus mechanism of the final determination of block conflict is different and the impact of system scalability on security is also different.Thus,the consensus mechanism based on asynchronous communication still faces challenges.Therefore,it is of great academic significance and extensive application value to further research the consensus mechanism of CBC to improve the security and scalability of the partitioning network consensus mechanism in heterogeneous CBCs based on privacy protection and increase the efficiency of trust transfer and data sharing between different trust domains[16-19].

    This paper established a new consortium chain generation model to solve the above problems.The rules of chain generation are extracted.The behaviors of nodes are analyzed and verified,based on which the consensus vulnerability of CBCs is deeply analyzed.Based on this,the paper proposes a novel generation mechanism for CBC based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM).The main contributions of this work are as follows:

    (1)A new generation model of CBC is established.The influence of logical and physical topology structure on the CBC performance is analyzed from the perspective of the chain generation process.The single-chain generation rule is given to avoid chain forking.

    (2) The node behavior is analyzed and verified.Based on the node behavior,the consensus vulnerability of CBCs is deeply analyzed.The normalized verification node aggregation index is obtained to represent the consensus ability of consortium institutions.

    (3) A novel CBC generation mechanism,ABBCM,based on asynchronous binary Byzantine consensus,is proposed,which extends the general definition of Byzantine consensus and allows a definite set of consensus values to combine multiple proposals.The experimental results show that under the four classical Byzantine node attack behaviors,BA1 to BA4,the ABBCM obtains better time delay than the Coin,a classical random Byzantine consensus mechanism,and can meet the throughput of most IoT applications.

    This paper is structured as follows.Section 2 describes the related work of CBCs and consensus algorithms.Section 3 analyzes the effect of logical and physical topology on the CBC performance from the perspective of chain generation and gives the single chain generation rule avoiding chain forking.Section 4 analyzes the consensus vulnerability of CBCs based on node behavior.Section 5 introduces a novel consortium chain generation mechanism based on asynchronous binary Byzantine consensus.In Section 6,the proposed mechanism is simulated,and the results are discussed.Section 7 concludes with lessons learned and a plan for future work.

    2 Related Works

    Decentralized applications based on CBC have been involved in data governance [20],cloud storage [21],IoT [22],supply chain [23],and other fields to establish a trusted environment for stakeholders,achieving trusted and durable services.However,its low scalability and throughput limit the performance of the hosted decentralized applications.The section enfolds works to improve the performance of CBCs in recent years: mainstream platforms and consensus mechanisms.Various works related to the cross-domain consensus of CBCs are also compared based on research description,techniques,and limitations.

    2.1 CBC Platforms

    The mainstream CBC platforms include HyperLedger,Corda,and Quorum.In 2015,led by the Linux Foundation,International Business Machines Corporation (IBM),Intel,Cisco,and others announced the establishment of the HyperLedger project,which provides open-source reference and implementation for transparent,public,and decentralized enterprise-level distributed ledger technology.It also introduces blockchain into the application of distributed consortium ledger for the first time,which is grounds for building an efficient business network based on blockchain in the future [24-27].Like Hyperledger,Corda uses a distributed notary mechanism to meet growing business demands [28,29].However,the distributed consensus mechanism’s performance between nodes significantly impacts ledger synchronization between nodes and system performance.This project provides consensus mechanism selection strategies for different businesses.For example,in applications with high trust between nodes,Raft,Paxos,and other Crash Fault Tolerance (CFT)algorithms are selected to achieve high system performance.

    On the contrary,the BFT class algorithm is applied to obtain higher system security and reliability.Subsequently,JPMorgan launched a distributed ledger protocol,Quorum,based on the Raft consensus mechanism based on Ethereum.It greatly improved the system performance by introducing the Enclave module with transaction isolation and specific encryption functions to realize parallel operation [30,31].Although the implementation schemes of the above CBC platforms are different,they pursue usability and scalability to ensure performance and adapt to different industries’requirements.

    2.2 Consensus Mechanism Based on CBCs

    Based on the existing CBC platform,much research has been done to improve its performance[32].Some performance-driven consensus protocols of CBCs ensure ledger consistency and partition fault tolerance through the delegation mechanism [33-37] but reduce the number of core nodes participating in the consensus and the security brought by system decentralization.Sun et al.[38]proposed a blockchain-based on-board social network data-sharing system.This scheme can realize one-to-many data sharing,but the identity of the shared entity needs to be determined in advance,making it difficult to realize large-scale and fine-grained data sharing.Su et al.[39] proposed an authorization Byzantine fault-tolerant algorithm based on node reputation,which can reach consensus among the various authorization partitions in CBCs.Yang et al.[40]built a new blockchainbased energy management architecture for IoT-assisted smart homes,enabling smart homes to interact with the grid and other users in an energy Internet system.Based on[40],Abishu et al.[41]proposed a new consensus mechanism,which takes advantage of practical Byzantine fault tolerance and proof of reputation to ensure the high reliability of energy transactions.Zhang et al.[42] proposed a consensus mechanism based on credit risk assessment to realize credit management of counterparties in distributed energy transactions.However,the above consensus research based on CBC still cannot meet high concurrency,low delay,and strong security in Byzantine cross-domain applications.

    There are also researches such as Tezos [43],which proposed an on-chain governance model to generate blocks dynamically and realized the autonomous management of chain ecology by establishing a digital federation,thus simplifying the verification process of transactions and smart contracts,which has a broad application prospect in IoT where the computing power of node is limited.A time segmentation solution of CBC based on the Tezos blockchain was proposed by [44],which allows computing devices with low storage capacity to keep only the latest segmentation ledger instead of the whole consortium ledger.It supports the construction of mobile self-organizing CBC and interchain transactions under a 5G network of heterogeneous vehicle networking and conducts the built-in form verification of some transactions and smart contracts.Qasse et al.[45]tried to solve the crossdomain authentication and trust transfer between independent Inter-blockchain Communication(IBC) systems based on CBC to ensure the security of multi-domain consensus consistency of user identity.Practical Byzantine Fault Tolerance (PBFT) and other BFT consensus protocols do not require verification nodes to solve encryption problems or provide proof of stake to determine the ownership of accounting rights [46,47].Generally,only a subset of participating nodes need to run the BFT protocol.The consensus can be reached by exchanging rounds of messages so that nodes can reach the consensus of the current round before the next round starts.Therefore,it has good anti-fork and potential application prospects in CBCs[48].

    BFT protocol usually can be verified mathematically as long as 2/3 of the participants follow the protocol.Then,the BFT protocol can ensure no block conflicts regardless of whether there is an upper limit of network delay[46].Some studies further explored solutions to improve the performance of the BFT consensus mechanism[49].They proposed that cloud computing and programmable hardware can be used to improve the efficiency of the BFT consensus,allowing the consortium chain to deliver higher throughput,lower latency,and the ability to scale with better network bandwidth and hardware environments.However,BFT-like consensus protocols still face challenges,such as the communication systems’high complexity and weak scalability.

    Table 1 compares the existing research with the proposed work based on the research description,techniques,and limitations.However,these existing solutions usually require some nodes to be coordinators.If the coordinators are non-Byzantine nodes and messages are delivered timely in the asynchronous round,they broadcast their proposals to all nodes in the consortium network.If not,exploiting its power within the consensus round can significantly hinder the performance.This paper proposed a new consortium chain generation mechanism,which can realize cross-domain asynchronous message passing between multi-consortium chains without reducing the system’s security.

    Table 1: Overview of current related research work

    3 Chain Generation Model

    CBC is usually endorsed by institutions to determine the set of verification nodes and the block generation mechanism.In CBC,child blocks are voted from existing blocks to build a growing tree of blocks,the root of which is called a“creation block”.Normally,blocks form a single chain under the block generation mechanism,meaning a parent block has only one child block.However,due to network delays or malicious attacks,one parent block inevitably generates more than one child block to be confirmed.The consensus of CBC is to select only one child block from several unconfirmed child blocks of each parent block when asynchronous nodes are executed asynchronously and sequentially,that is,to select the most authoritative chain from the block tree.

    The following is an Asynchronous node-based CBC Generation Model (ACCGM),of which the practicability and effectiveness are illustrated by experiments.From the perspective of chain generation,the influence of the logical and physical topology structure of the CBC network on its performance is analyzed.Then,a single chain generation rule is given to prevent CBC from forking.

    Definition 1: Asynchronous Node Set (ANS).ANS refers to a set of asynchronous sequential execution nodes and their public keys in CBC,denoted as“Asynchronous”means that each node works at a specific speed that varies over time,and the node’s performance is transparent to others.“Sequence”means that each node performs one atomic step at a time as the work progresses.

    ANS communicates by exchanging data through an asynchronous and reliable point-to-point consortium network.Any pair of nodes can be connected through a two-way communication channel.The transaction will not be lost,copied,or tampered with in the network transmission process,but there is a transaction transmission delay.ni∈Γ represents the CBC node,andBrepresents the block.It is assumed that each node has obtained part or all of the block ledgerBon the chain whent≥0,i.e.,={B,t≥0}.Genesis Blockgis the only block known to all nodes at the initial time,i.e.,={g}.The public and private keys of each node are generated by an elliptic curve encryption algorithm.The node private key is used to verify the new block.

    The ACCGM chain generation model satisfies the following properties:

    Property 1:Recursion.Each new blockBis linked to the current tail blockP(B)by the mapping functionP.The relationship between blocks can be expressed recursively as:

    Eqs.(1) and (2) are recursive representations of blockchains.In Eq.(3),gis a creation block without a parent block.Eq.(4)defines that there is no cycle between blocks.By property 1,we defined a chainC(B)that generates and contains a blockBas the path fromBtog,i.e.,

    Property 2:Locality.Due to network delay,eclipse attack,and other reasons,different CBC nodes are allowed to perceive different block sets in the chain generation model,namely:

    Property 3:Inheritance.In the process of CBC generation,blockchain consensus has inheritance,namely:

    IfB′/=B,andB′∈CB,then,B′is called the ancestor block ofB,whileBis called the descendant block ofB′;ifB′=P(B),thenBis called the direct descendant node ofB′.Property 3 indicates that the state of the blockchain in which the blockBresides is obtained by executing all transactions inCBfrom Genesis Blockg.

    It is assumed that a maximum ofK(3K+1<k)Byzantine nodes are allowed to exist in CBC consisting ofknodes.They may crash,fail to send or receive messages,send any messages,start at any state,perform any state transitions,etc.For example,they can also use honest node“pollution”calculations by sending a message with the same content as a partial honest node error estimate,thus affecting the system consensus.Byzantine nodes cannot delay receiving messages indefinitely but can control the network by modifying the order in which messages are received.In particular,no consensus mechanism can ensure system security and scalability in a completely asynchronous messaging system[36].This paper assumes an upper limit timeδfor message transmission and node computation delay to ensure the system reaches the final consensus after a certain time.

    Definition 2:Upper limit timeδ.If any nodevof CBC receives a message at timet,other nodes in the chain can guarantee the message receive within the time window[t,t+δ].

    In Definition 2,the local time deviation of each node on CBC is incorporated intoδ.It is assumed that the nodenais currently processing a block with a timestamp ofta_Stampwhen a block has a timestamp oftb_Stamp,andtb_Stamp >ta_Stamp,meaning that a block with a timestamp oftb_Stampoccurs in the future.Nodenawill reject the block.Iftb_Stamp <ta_Stamp-δindicates that the block with timestamptb_Stamphas been confirmed,nodenawill also reject the block.

    Definition 3:δ-Validation.Under the upper limit of delay timeδ,the system considers a legitimate verification that at timets_Stamp,which contains the block headers,the highest block heightl(s),the block hashH(s),the hashh(s|u) of the new proposed blocku,and the valid signatureVcreated by the private key of the verifierv,and satisfies Eq.(8) as a correct verification,indicated as〈s,l(s),H(s),H(s|u),ts_Stamp,V〉

    δ.

    It can be seen that the correctness of node voting depends on the chain in which the node votes.Typically,the verifiervbroadcasts a six-tuple voting message:block headersof the current tail node,the heightl(s),the hashH(s)to the block headers,the hashh(s|u)to the new proposed blocku,the timestamp,and the signature of the verifierv.The current tail nodesmust be the ancestor of the new proposed blocku;otherwise,the vote is considered illegal.If the public key of the verifiervis not in the verifier set,then this vote is also illegal.

    Definition 4:If blockson CBC has a descendant blocku,anduobtains the correct votes exceeding the threshold value,then blocksis considered to be determined.That is:

    As a basis for the recursive definition,it is generally assumed that Genesis Blockghas both received the correct votes over the threshold and is final.In Definition 4,blocku′is the descendant block of blocku.If both blocksand its descendant blockuobtain correct votes exceeding the threshold value,then blocksis considered to be determined.sthresholdanduthresholdare the consensus threshold values when the upper limit of delay isδ.

    Definition 5: Absolute majority link.An absolute majority link means that for ordered block(s,u),denoted ass→u,at least one verifier exceeding the threshold has issued a confirmation vote for the current end-of-chain blocksand aδ-verification for the newly packaged blocku.

    Definition 6:Block conflict.Block conflict is considered to occur between blockssanduif and only if the two blockssandusharing the same Genesis Blockgare located in different branches.That is:

    From Definitions 2 to 6,it can be seen that if neither blocksnor blockuon the chain is the ancestor or descendant of the other,the two finally determined blocks conflict.Therefore,the tail blocksis final;either it is the genesis block or if and only if

    (1)The tail blockshas obtained a verification node vote exceeding the threshold;

    (2)There is an absolute majority links→u;

    (3)Blockssandudo not conflict;

    (4)Block heighth(u)=h(s)+1.

    Thus,the single chain generation rule avoiding chain forking and ensuring at most one reasonable block heightn(n >0)on a single alliance chain is obtained:

    Rule 1: Unequal height rule.If ?gmakesPi(s1)=Pj(s2)=g(i >0,j >0),ands1→u1ands2→u2are distinct absolute majority joins,thenh(u1)/=h(u2).

    Rule 2:Exclude rule.If ?gmakesPi(s1)=Pj(s2)=g(i >0,j >0),ands1→u1ands2→u2are distinct absolute majority joins,thenh(s1)<h(s2)<h(u2)<h(u1)is not true.

    Rule 3:Nonoverlapping rule.For any heightn(n >0),at most,one absolute majority joinss→usuch thath(u)=n.

    4 Vulnerability Analysis

    The existing access mechanism of CBC helps improve the ability of the ACCGM-based CBC system to resist external attacks.Still,it cannot identify and prevent the threats of Byzantine nodes to the system.The impact of the behavior of Byzantine nodes in the ACCGM consensus on the system is analyzed as follows.

    4.1 Behavior of Verification Node

    In the ACCGM consensus process,Byzantine nodes can initiate abnormal voting without violating the rules to obtain a final result or retain the intermediate data in the calculation process to infer and snoop the data of other participants.On the one hand,when the verification node initiates non-voting behavior,the correct voting proportion of the verifier will be lower than the consensus threshold,and a consensus block will not be generated.On the other hand,if two or more conflicting validation blocks are generated in the same round due to malicious voting or incorrect behavior of the verifier,either the chain forks or the off-chain governance mechanism is used to support one branch at the expense of the other.Therefore,the analysis of verification node behavior matters in constructing the system incentive mechanism and ensuring the correct formation of CBC.

    The voting behavior of the verification node will be written into the block as a transaction,which can be divided into correct voting,malicious voting,incorrect voting,and no voting.

    A.Correct voting

    If only a single block meets Definition 3 and has verification nodes exceeding the threshold and voting correctly in a certain round,the block will be written into CBC,and each node synchronizes the ledger.

    B.Malicious voting

    Malicious voting means that the verifier votes for two new blocks in the same round simultaneously,which meets Definition 6,thus causing a conflict.

    C.Incorrect voting

    Incorrect voting refers to the situation in which the verifier cannot vote correctly in the same consensus round due to some incorrect behavior.Typical cases of incorrect voting are as follows:

    (1)The verifier sends the vote later,resulting in the vote not reaching CBC within the consensus round.

    (2)Some nodes do not propagate the vote of a verification node,resulting in the vote not reaching CBC within the consensus round.

    (3)The vote does not reach CBC within the consensus round due to network delay.

    (4)The signature of the verifier’s vote is invalid.

    (5)The voting block is not generated in the current highest block.

    D.No voting

    No voting includes no voting of the verification node and voting loss.

    Non-byzantine nodes may produce votes A and C,and Byzantine nodes may produce votes B,C,and D.When dealing with voting transactions,CBC based on ABBCM only processes the correct voting A and malicious voting B defined above;the incorrect voting and no voting are invalid votes and will be ignored.If only correct votes exist,the system will select a single legal block within a specified time cycle and record it in CBC.Otherwise,the system may fail to obtain consensus due to the failure to obtain more than the threshold number of verification signatures in a specific time round,called active failure,or the system forks due to two conflicting blocks being finalized simultaneously,called a security failure.

    The consortium institutions will use the punishment mechanism for cases B,C,and D.The mechanism is affected by the following aspects:

    (1) The larger the proportion of malicious voting nodes,incorrect voting nodes,or non-voting nodes,the more serious the penalty will be.

    (2)Failure to consensus or chain forks will increase punishment.The following is a formal analysis.

    It is assumed thatmblocks(mis constant)are written on a blocksin CBC,and blocksis confirmed by probability,then the Block Finalisation Factor(BFF)of blocksin roundiis:

    wherers,i∈N is the consensus round experienced from blockswriting into CBC to the current roundi.Whenrs,i≥m,h(si)-h(s)<m,it indicates that there are non-consensus rounds inrs,irounds after blocks.For example,the correct voting cannot reach the preset consensus threshold due to the large proportion of malicious voting nodes,incorrect voting nodes,or non-voting nodes.Thus,consensus cannot be obtained.

    vj∈V,0<j≤Mi,whereMiis the total number of verification nodes in roundi,and the vote of verification nodevjin roundiis denoted as

    By analyzing the behavior of validation nodes,the polymerization index of validation nodes was obtained to represent the consensus ability of consortium institutions.The node polymerization indexCifor normalization verification of the mechanism in roundican be expressed as:

    According to the Byzantine node proportiona∈(0,1/3),2/3<(1-a)<1,and whenBFFi <N,|BFFi-N|≥1,soCi∈(0,1).

    4.2 Vulnerability of CBC Consensus

    In the chain generation model ACCGM,the CBC network is partially synchronous,and the transaction transfer between nodes has an upper bound finite delay.Although the verification node can independently choose the time for issuing the voting transaction within each consensus round,it cannot ensure that the voting transaction of each verification node in each round will be synchronized among the CBC nodes before the end of the round.If the voting transaction is issued too early,the verification node will fail to vote on other more competitive blocks within the consensus round.Late issuance of voting transactions may result in activity consensus failure.In addition,the authentication node update transaction is allowed to be sent after only consensus blocks are generated in each consensus round,and the authentication node set is dynamically managed.Therefore,in a single consensus round,it is necessary to consider the impact of network partition,network delay,Byzantine node proportion,verification node state,and other factors on the consensus.Network partition and delay have been explained in the previous section.The following focuses on analyzing the influence of Byzantine node proportion and verification node state on the consensus.

    4.2.1 Consensus Vulnerability Based on Byzantine Node Proportion

    Consortium nodes are divided into ordinary nodes,which sort transactions and package blocks in the underlying chain,and verification nodes,which vote for new blocks;however,they are somewhat interdependent.Ordinary nodes collect and classify transactions,determine the order of transactions in CBC,and write global computer state information(contract variables,etc.)and related data into the block as part of the transaction.The voting transaction sent by the verification node is the same as the ordinary transaction,which needs to be packaged and recorded by the ordinary node.Byzantine ordinary nodes can refuse to include the voting transactions of some verification nodes in their proposed blocks.It can also improve the probability of successful execution of the above attacks by increasing the proportion of Byzantine nodes in a working state,sending out voting transactions in advance in consensus rounds,or even forcing other nodes to perform the same operation by network attacks.

    When enough non-Byzantine nodes are offline in a certain period,the proportion of Byzantine nodes will increase,greatly improving the possibility of chain forking in the system.It is assumed that the proportion of Byzantine nodes in ACCGM-based CBC isa,and the honest nodes working together on the single CBC account for the majority.In the actual working scenario,node offline,network delay,eclipse attack,sybil attack,etc.,will impacta.In the ACCGM-based CBC network,Byzantine nodes in the current tail blocksmay create a longer chain than the current chain.The probability of the above event decreases exponentially to the block height differencemof the forked blocksand the new tail blocks′(s/=s′).When the Byzantine node attacks,if there aremdescendant blocks after the original chain blocks,the probability of generating a longer forked chains′from the blocksis(a/(1-a))m.Whenmis large enough,the above malicious attacks will become impractical.The relationship between Byzantine node proportion and system security is shown in Fig.1.

    Figure 1:The relationship between Byzantine node proportion and system security

    It can be seen that whenais constant,the probability of generating Byzantine chain forking will be significantly lower asmincreases.Whena=1/3,m=9,the probability of generating Byzantine chain forking will be about 5×10-4,almost negligible.However,asaincreases,especially approaches 0.5,the probability of producing a Byzantine chain forking approaches 1 for any value ofm.

    4.2.2 Consensus Vulnerability Based on Node Reputation

    In the ACCGM-based CBC distributed network environment,the initial reputation of the node is provided by the endorsement of the institutions,which is a static trust management mechanism based on authentication and authorization.However,when each node participates in the calculation autonomously,using the initial reputation to evaluate the node often presents a lag to some extent.For example,nodes in the CBC network have the capability of routing and forwarding transactions or blocks.Nodes with high initial reputations hijacked by malicious forces can independently change the forwarding route or discard part of transactions or blocks.If nodes with high initial reputations provide fraudulent services or do not provide services,the system consensus will be seriously threatened.This paper established a node trust model of CBC based on consensus rotation information feedback and proposed a dynamic maintenance mechanism of node reputation relying on weighted trust feedback from nodes to improve the accuracy and dynamic adaptability of node reputation evaluation.The above model is quantitatively evaluated to further analyze the relationship between node reputation and CBC consensus.

    Definition 7:Node reliability evaluation function.The reliability evaluation of nodepto nodeqin consensus roundiis defined as functionf(p,q)i:

    where?is the standard deviation of the trust degree of the consortium institution to the consortium node set.

    Definition 8:Node set trust evaluation function.It is assumed that the number of CBC nodes in each consensus round isk,andη∈(0,1]represents the proportion of verification nodes that normally work within a period.(1-η)represents the proportion of verification nodes that work abnormally,and the institutional credit value changes dynamically withη,then the trust degree of the node set of the consortium institutions in consensus roundican be expressed as Eq.(15).

    In Eq.(15),i=0 indicates that there is no interaction history between nodes in the initial round,so the direct trust degree of the initial round is set asη.

    Before the system reaches a consensus at the beginning of each round,when the value of the trust evaluation functionDΓ,iof the verification node set is lower than the threshold,the set is dynamically adjusted by

    (1)keeping the credit value of the verification node whose value of credibility evaluation function is higher than the preset value in each round unchanged;

    (2)reducing the credibility value of verification nodes whose credibility evaluation function value is lower than the preset value or does not vote;

    (3)removing the verification nodes whose reputation value is lower than the reputation threshold from the set of verification nodes,which will increase the influence of normally working verification nodes in the consortium institutions,significantly reducing the risk of system consensus.

    5 Asynchronous Binary Byzantine Consensus-Based Chain Generation Mechanism

    The above analysis of the influence of network partition,network delay,Byzantine node proportion,verification node state,and other factors on the consensus found that in CBC withK <k/3 Byzantine nodes,the consensus betweenknodes can be probabilistically achieved by using the local random strategy of nodes or the shared common random strategy.However,these solutions typically require a unique coordinator process,sometimes called a leader,to be non-faulty.The advantage is that if the coordinator is non-faulty and the messages are delivered timely in an asynchronous round,then the coordinator broadcasts its proposal to all processes,and this value is decided after a constant number of message delays.The drawback is that a faulty coordinator can dramatically impact the algorithm’s performance by leveraging the power and imposing its value on all.Nonfaulty processes thus have no choice but to decide nothing in this round.Thus,the above method cannot effectively achieve consensus in asynchronous messaging systems.For the above problems,the influence of Byzantine nodes on CBC consensus is further analyzed,and a novel mechanism of CBC generation based on asynchronous binary Byzantine consensus mechanism is presented,which is time optimal and resilience optimal without needing signatures.Unlike a classic(strong)coordinator,the weak coordinator in this mechanism does not impose its value.On the one hand,this allows non-faulty processes to decide a value quickly without the coordinator’s help.On the other hand,the coordinator helps the algorithm terminate if non-faulty processes know that they proposed distinct values that might all be decided.

    The ABBCM-based CBC generation mechanism relies on many-to-many communication of binary values of nodes,extending the common definition of Byzantine consensus and allowing a definite set of consensus values to combine multiple proposals.On the one hand,it is assumed that values proposed only by Byzantine nodes cannot be agreed upon,and non-Byzantine nodes can quickly achieve consensus without the help of coordinating nodes.On the other hand,if the consensus values proposed by non-Byzantine nodes are not consistent,the round of consensus will be terminated early.Let R be a set of consensus values proposed by the node.In the multivariate consensus,R may contain any number of values.To simplify the problem,let R={0,1}in the binary consensus.Assuming that each non-Byzantine node proposes a value for consensus,the binary Byzantine consensus problem can be translated into having each node determine a value in a way that satisfies the following properties:

    ? Certainty.Each non-Byzantine node will eventually propose a value for consensus.

    ? Consistency.No two non-Byzantine nodes determine different values.

    ? Validity.If all non-Byzantine nodes propose the same value for the consensus,the final consensus value will not be something else.

    ABBCM relies on many-to-many communication(binary value broadcast)of node binary values,expressed as BiVa-B.In the BiVa-B instance,each non-Byzantine nodenibroadcasts the current round of binary values for consensus and obtains a set of binary values for consensus proposed by other nodes over the network,stored in the local read-only variable setξi,whereξiis initialized toφ,and the element in setξiis added when a new value is received.

    The following rules define BiVa-B:

    Rule 1: Incremental rule.If at least (κ+1) non-Byzantine nodesnibroadcast the same value R,then each nodeniadds R to its local read-only variable setξi.

    Rule 2: Reverse rule.Ifniis a non-Byzantine node and R ∈ξi,R has been broadcast by a non-Byzantine node.

    Rule 3: Diffusion rule.If a non-Byzantine nodeniadds R to its local read-only variable setξi,eventually,for every non-Byzantine nodenj,there is R ∈ξi.

    Rule 4:Balancing rule.Finally,the local read-only variable setξifor each non-Byzantine nodeniis not empty.

    Based on the above rules,the set of local read-only variablesξifor each non-Byzantine nodeni:(1)becomes non-empty,(2)becomes equal,(3)contains all values broadcast by non-Byzantine nodes,and(4)contains no values broadcast only by Byzantine nodes.

    System modelABBCMk,Kδ[K <k/3]is established below,which can provide strong effectiveness and consistency in asynchronous message communication system,as well as certainty to meet the needs of CBC applications.The local variables involved in nodeniare shown in Table 2,and the main process is shown in Algorithm 1.Nodeniproposes the initial consensus value by calling bin-propose(Ri)in the asynchronous round and assigns Rito the local current estimateestimateiof the binary proposal consensus value;After that,each non-Byzantine node enters a series of asynchronous rounds.In any rotationr,the non-Byzantine nodeniproceeds in three stages.

    Table 2: Local variables of nodes

    Stage 1: Consensus value cleaning to filter out the consensus value proposed by the Byzantine node.Nodenienters the next round and broadcasts its current binary consensus value estimate.In BiVa-broadcast(),nodenireceives the same consensus proposal value fromK+1 nodes and rebroadcasts the value.When R is received from 2K+1 different processes,each nodeniadds it toξi[r]and forwards the value.Also,when BiVa-deliver forwards a consensus proposal value,it is added toξi[r].Finally,the setξof all non-Byzantine nodes becomes non-empty and equal and contains only all the consensus proposal values broadcast by non-Byzantine nodes.

    Stage 2:Consensus value estimate exchange to reach a consensus.At this stage,nodenibroadcasts the message Auxiliary[r](),whose content is c.Nodenithen waits until it receives a set ofαithat satisfy the following two properties:

    ? The values ofαicome from Auxiliary[r]()sets of at least(k-K)different nodes.

    ?αi?ξi[ri].Because the BiVa-broadcast()return values of Byzantine nodes can be filtered out in the first stage,even if Byzantine nodes send their false message set Auxiliary[r](),which contains values proposed only by Byzantine nodes,αiwill also only contain consensus estimates broadcast by non-Byzantine nodes.

    Thus,in any round ofr,αi?{0,1}contains only the values broadcast by non-Byzantine nodes with BiVa-broadcast()algorithm.

    Stage 3: Consensus values converge,a local calculation stage,to determine the candidate of consensus value of nodeni.The convergence process of consensus value depends on the content ofαi.

    ? Ifαicontains a single element R,R becomes the new consensus estimate for nodeniand a candidate for consensus determination.

    ? Ifαi={0,1},nodesnicannot determine the new estimate of consensus value.Since both values are presented by non-Byzantine nodes,to converge uniformly,nican choose one of them as its new estimate of consensus value based on the sharing strategy,for example,b=rmod2,because the value is the same among all non-Byzantine nodes in the same round.

    In the above ABBCM-based CBC generation mechanism,nodeniobtains the consensus value R of the current round by calling decide(R).However,calling decide(R)does not terminate its participation in the algorithm,which means nodenicontinues to execute circularly after the call returns because it may be necessary to help other nodes converge to the determined consensus value in the following two rounds in the node decision-making.

    6 Experiments

    To test the performance of the asynchronous binary Byzantine consensus-based chain generation mechanism proposed in this paper,we built the Ethereum simulation test environment consisting of 100 virtual verification nodes on five servers and compared its performance with“Coin,”the recent randomized algorithm from Mostéfaoui et al.[52]used in the HoneyBadger blockchain.Experiments show that under all our workloads,our mechanism outperforms“Coin,”which is known to terminate in O(1)round in expectation.This is due to the overhead of the Coin implementation that slows down every round and the risks of being unlucky at tossing the coin by increasing the number of rounds needed to decide.Even with Byzantine behaviors,our method is always superior to the latter.

    The experimental platform was CPU Xeon-E5 with memory size 64 G and operating system Ubuntu-64bit.Consortium chainCAwas constructed.The total number of verification nodes isn=100,the proportion of Byzantine nodes is denoted asa,the time interval for consortium chain to construct transactions is denoted as Δ,and the number of consensus transactions in a single round is denoted asτ.

    Considering that the behavior of Byzantine node can greatly affect chain generation based on binary Byzantine consensus,the following four typical Byzantine attack behaviors are constructed for performance testing:

    BA1:Byzantine nodes send bit flip value;when the protocol specification expects to send bit ?b,the Byzantine node sends bitb.

    BA2:Byzantine nodes send the combination of the random value and the flipped value of the bit.

    BA3:Byzantine nodes do not respond to any transactions.

    BA4:Byzantine nodes form consortiums to block the consensus of non-Byzantine nodes in each round by sending messages.

    6.1 Delay Test

    To eliminate the influence of the time interval of constructing transactions on the delay,referring to the previous work[53]and take Δ=1ms,under the four classical attack behaviors BA1 to BA4 of the Byzantine node defined in this paper,the comparison of the delay under the classical Byzantine consensus mechanism Coin[52]proposed by Mostéfaoui et al.is shown in Fig.2.

    Figure 2:Delay comparison between ABBCM and Coin

    As shown in Fig.2,when the Byzantine node proportionagradually increases,the time delay of both ABBCM and Coin increases.The largerais,the more significant the delay increment of the two algorithms is,indicating that the transaction processing delay is positively correlated with the Byzantine node proportion.Under the specific value ofaand the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,the time delay of ABBCM is better than Coin’s.Under the four attacks,the total delay of ABBCM is reduced by 52%compared with Coin.Whena→0+,the transaction delay between ABBCM and Coin tends to be stable.Asaincreases,the transaction delay presents a certain weak robustness under four classical Byzantine node attack behaviors BA1 to BA4.In Fig.2c,under the attack behavior of BA3,ABBCM obtains a minimum average delay of 382 ms.In Fig.2d,under the attack behavior of BA4,ABBCM obtains a maximum average delay of 331 ms.

    6.2 Throughput Test

    (1)The consensus round timeris not limited

    Consensus round timeris not limited,which means thatris set to be large enough so that transactions of block can reach consensus within a time less thanr.In this case,consensus round time will not impact consensus time and throughput.According to the delay test results,ris set as 1 s,the proportion of Byzantine nodesa=33%,the interval for the consortium chain to construct transactions Δ=1ms,and the number of consensus transactions in a single roundτ=10,20,30,40.The throughput test is conducted under the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,of which the results are shown in Fig.3.

    Figure 3:Throughput test under unrestricted conditions

    As can be seen from Fig.3,when consensus round timeris not limited,throughput in four Byzantine attack scenarios increases with the increase of consensus transactions in a single round.In a specific Byzantine attack scenario,when the consensus transactions in a single round increase slowly from 1,the system throughput increases significantly,such as the phase fromτ=10 toτ=20 in Fig.3.When the consensus transactions in a single round increase to a certain extent,the system throughput increment slows down,such as the phase fromτ=30 toτ=40 in Fig.3.Under the four attack scenarios,Byzantine attack BA3 has the weakest impact on system throughput,with a maximum average throughput of 243TPS,which is because the attack mode of Byzantine nodes without any response increases the proportion of non-Byzantine nodes,reducing the consensus time to some extent.On the contrary,Byzantine attack BA4 has the strongest effect on system throughput,with a maximum average throughput of 232TPS.

    (2)The consensus round timeris limited

    Consensus round timeris limited,so settingrto a reasonable value affects consensus time and throughput.According to the delay test results,ris set to 500 ms,the proportion of Byzantine nodesa=33%,the interval for consortium chain to construct transactions Δ=1ms,and the number of consensus transactions in a single roundτ=10,20,30,40.The throughput test is conducted under the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,of which the results are shown in Fig.4.

    Figure 4:Throughput test under restricted conditions

    Compared with the throughput test under unrestricted conditions,the system throughput decreases under the four attack modes when the consensus round time is set to 500 ms in Fig.4.Under the same conditions,the average value of the highest throughput decreases by 9.2%,and the average value of the lowest throughput decreases by about 50%.In Fig.4c,under attack BA3,system throughput declines slightly because Byzantine nodes do not respond to anything,which increases the influence of non-Byzantine nodes to some extent and thus weakens the influence of the reduction of consensus round time on consensus efficiency.In Figs.4a and 4d,under attacks BA1 and BA4,the system throughput decreases greatly because the influence of Byzantine nodes reduces the consensus efficiency,failing part of the consensus to be completed within a consensus round time,especially when the number of consensus transactions in a single round is large.In addition,under attack BA4,after Byzantine nodes form a consortium,they cannot control the speed or order of messages from non-Byzantine nodes.However,they can observe and decide the time to send messages according to the time when non-Byzantine nodes receive or forward messages.Thus,they can significantly hinder the consensus progress within the round.

    7 Conclusion

    There is not yet an effective consensus algorithm ensuring safety and liveness in fully asynchronous message-passing systems,and even a single process may cause a consortium chain system to crash.However,the crash failure model is less severe than the Byzantine failure model because if the process commits Byzantine failure,the system cannot reach a consensus.To ensure consensus is reached,a consortium chain generation model based on ANS in the Byzantine environment is established to further analyze the influence of chain structure on its performance,obtaining single chain generation rules to avoid chain forking.On this basis,the influence of network partition,network delay,Byzantine node proportion,and verification node state on the consensus process is further analyzed,and a novel consortium chain generation mechanism based on asynchronous binary Byzantine consensus is proposed.The mechanism neither uses a classical(strong)coordinator nor relies on randomization or signatures,meaning it does not wait for a specific message.The above mechanism shows better consensus efficiency under the four classical Byzantine aggression behaviors and asynchronous environment.In the future,based on the study of the asynchronous binary Byzantine consensus mechanism,the relationship between the effectiveness of multiple Byzantine consensus mechanisms and the behavior of nodes in the chain generation process will be studied to meet the needs of more practical application scenarios.

    Acknowledgement:The authors gratefully acknowledge the helpful comments and suggestions of the reviewers,which have improved the presentation.

    Funding Statement:This work is supported by Henan University Science and Technology Innovation Talent Support Program (23HASTIT029),the National Natural Science Foundation of China(61902447),Tianjin Natural Science Foundation Key Project(22JCZDJC00600),Research Project of Humanities and Social Sciences in Universities of Henan Province(2024-ZDJH-061),Key Scientific Research Projects of Colleges and Universities in Henan Province (23A520054) and Henan Science and Technology Research Project(232102210124).

    Author Contributions:Study conception and design:Rui Qiao;data collection:Shi Dong;analysis and interpretation of results:Rui Qiao,Shi Dong;draft manuscript preparation:Rui Qiao,Shi Dong.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the paper.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品视频女| 另类亚洲欧美激情| 在现免费观看毛片| 黑人猛操日本美女一级片| 亚洲av欧美aⅴ国产| 亚洲中文av在线| 国产淫语在线视频| 日韩 亚洲 欧美在线| 国产亚洲最大av| 久久性视频一级片| 黄色一级大片看看| 午夜影院在线不卡| 国产 精品1| 丰满迷人的少妇在线观看| 极品人妻少妇av视频| 亚洲天堂av无毛| 国产成人精品无人区| 少妇被粗大的猛进出69影院| 在线观看www视频免费| 亚洲国产精品一区三区| 色吧在线观看| 你懂的网址亚洲精品在线观看| 麻豆精品久久久久久蜜桃| 波多野结衣一区麻豆| 看免费成人av毛片| 久久人人爽av亚洲精品天堂| 1024视频免费在线观看| videosex国产| 国产色婷婷99| 日日啪夜夜爽| 久久久久久人妻| av女优亚洲男人天堂| 亚洲精品久久午夜乱码| 国产亚洲欧美精品永久| 99热国产这里只有精品6| 1024视频免费在线观看| 99精国产麻豆久久婷婷| 男女床上黄色一级片免费看| 精品一区二区三卡| 免费黄网站久久成人精品| 久久久久网色| 国产1区2区3区精品| www.熟女人妻精品国产| 亚洲伊人久久精品综合| 亚洲一区二区三区欧美精品| 老司机影院毛片| 免费看不卡的av| videos熟女内射| 亚洲国产精品国产精品| 性色av一级| 免费在线观看视频国产中文字幕亚洲 | 免费观看av网站的网址| 欧美精品高潮呻吟av久久| 精品国产超薄肉色丝袜足j| 国产老妇伦熟女老妇高清| 丰满迷人的少妇在线观看| 一本色道久久久久久精品综合| 视频区图区小说| 亚洲欧美成人综合另类久久久| 欧美日韩视频精品一区| 久久天躁狠狠躁夜夜2o2o | 人妻 亚洲 视频| 国产精品久久久av美女十八| 亚洲精品中文字幕在线视频| 国产老妇伦熟女老妇高清| 亚洲国产欧美网| 我的亚洲天堂| 多毛熟女@视频| 亚洲综合色网址| 国产成人免费观看mmmm| 中文字幕人妻熟女乱码| 男人操女人黄网站| 母亲3免费完整高清在线观看| av有码第一页| a级片在线免费高清观看视频| 男女无遮挡免费网站观看| 嫩草影视91久久| 一区二区三区激情视频| av女优亚洲男人天堂| 亚洲综合精品二区| 精品少妇久久久久久888优播| 久久午夜综合久久蜜桃| 亚洲国产欧美在线一区| 亚洲伊人久久精品综合| 免费在线观看黄色视频的| 街头女战士在线观看网站| 成人毛片60女人毛片免费| 香蕉丝袜av| 精品国产露脸久久av麻豆| 人妻一区二区av| 亚洲,欧美,日韩| 亚洲,欧美,日韩| 少妇被粗大的猛进出69影院| 男女无遮挡免费网站观看| 国产乱人偷精品视频| 欧美 日韩 精品 国产| 亚洲精品在线美女| 一级a爱视频在线免费观看| 成年人午夜在线观看视频| 国语对白做爰xxxⅹ性视频网站| 99九九在线精品视频| 午夜福利视频精品| av卡一久久| 校园人妻丝袜中文字幕| 久久久久久久久免费视频了| 在线观看国产h片| 制服人妻中文乱码| 久久ye,这里只有精品| 七月丁香在线播放| 中文字幕人妻熟女乱码| 国产熟女午夜一区二区三区| 波多野结衣一区麻豆| 欧美日韩视频精品一区| 久久精品亚洲av国产电影网| 久久天躁狠狠躁夜夜2o2o | 国产成人精品福利久久| 黄片小视频在线播放| 1024香蕉在线观看| 亚洲,欧美精品.| 国产伦理片在线播放av一区| 在线天堂中文资源库| 自线自在国产av| 秋霞在线观看毛片| 9热在线视频观看99| 亚洲国产精品成人久久小说| 色婷婷久久久亚洲欧美| 亚洲国产精品成人久久小说| 免费在线观看视频国产中文字幕亚洲 | 亚洲av电影在线观看一区二区三区| 欧美少妇被猛烈插入视频| 自拍欧美九色日韩亚洲蝌蚪91| 国产男人的电影天堂91| svipshipincom国产片| 欧美精品av麻豆av| 丰满乱子伦码专区| 9色porny在线观看| 免费观看性生交大片5| 丝袜美足系列| 亚洲自偷自拍图片 自拍| 国产精品久久久久成人av| 欧美日韩精品网址| 亚洲欧美激情在线| 国产成人欧美| 亚洲av成人不卡在线观看播放网 | 老鸭窝网址在线观看| 色精品久久人妻99蜜桃| av网站免费在线观看视频| 亚洲精品日韩在线中文字幕| 欧美亚洲 丝袜 人妻 在线| 99精品久久久久人妻精品| 一级毛片 在线播放| 欧美国产精品一级二级三级| 夫妻午夜视频| 国产片内射在线| 91老司机精品| 伦理电影免费视频| 久久久久久久久免费视频了| 天堂8中文在线网| 嫩草影院入口| 美国免费a级毛片| 中文乱码字字幕精品一区二区三区| 一二三四在线观看免费中文在| 黄色视频在线播放观看不卡| 777久久人妻少妇嫩草av网站| 99热全是精品| 熟妇人妻不卡中文字幕| 精品一区二区三卡| 丁香六月天网| 搡老岳熟女国产| www.自偷自拍.com| 美女中出高潮动态图| 亚洲第一av免费看| h视频一区二区三区| 成年动漫av网址| 亚洲少妇的诱惑av| 热re99久久精品国产66热6| 日韩制服丝袜自拍偷拍| 老汉色∧v一级毛片| 性色av一级| 九九爱精品视频在线观看| www.自偷自拍.com| 国产精品久久久av美女十八| 国产精品久久久av美女十八| 国产日韩欧美在线精品| avwww免费| 亚洲久久久国产精品| 午夜福利,免费看| 高清视频免费观看一区二区| 亚洲精品美女久久av网站| 免费观看人在逋| 永久免费av网站大全| 1024视频免费在线观看| 观看av在线不卡| 一级毛片 在线播放| 国产成人欧美在线观看 | 97精品久久久久久久久久精品| 97人妻天天添夜夜摸| 天堂俺去俺来也www色官网| 18禁观看日本| 一个人免费看片子| 欧美老熟妇乱子伦牲交| 欧美激情高清一区二区三区 | 99久久99久久久精品蜜桃| 成年人午夜在线观看视频| 在线免费观看不下载黄p国产| 国产精品久久久久久久久免| 新久久久久国产一级毛片| 日本91视频免费播放| 久久久国产欧美日韩av| 美女午夜性视频免费| 尾随美女入室| avwww免费| 91精品三级在线观看| 99精国产麻豆久久婷婷| 天天躁夜夜躁狠狠久久av| 亚洲免费av在线视频| 亚洲国产欧美在线一区| 99热网站在线观看| av片东京热男人的天堂| 男女高潮啪啪啪动态图| 久久 成人 亚洲| 成年人午夜在线观看视频| 久久人人爽人人片av| 久久久久久久国产电影| 97在线人人人人妻| 宅男免费午夜| 国产精品一区二区在线观看99| 男女下面插进去视频免费观看| 成人毛片60女人毛片免费| 99热国产这里只有精品6| 美女扒开内裤让男人捅视频| 高清不卡的av网站| 午夜激情av网站| 成年av动漫网址| 国产毛片在线视频| 欧美激情极品国产一区二区三区| 久久久久久久久久久久大奶| 亚洲欧美成人综合另类久久久| 男女边吃奶边做爰视频| 丝袜喷水一区| 巨乳人妻的诱惑在线观看| 精品人妻在线不人妻| 人体艺术视频欧美日本| 免费高清在线观看视频在线观看| 免费不卡黄色视频| xxxhd国产人妻xxx| 侵犯人妻中文字幕一二三四区| 女人被躁到高潮嗷嗷叫费观| 国产毛片在线视频| 久久人妻熟女aⅴ| 精品国产一区二区久久| 国产视频首页在线观看| 亚洲 欧美一区二区三区| av国产久精品久网站免费入址| 日韩一区二区三区影片| 精品亚洲乱码少妇综合久久| 1024香蕉在线观看| 国产成人精品久久久久久| 99热网站在线观看| 一区二区三区四区激情视频| 国产 精品1| 欧美97在线视频| 叶爱在线成人免费视频播放| 如日韩欧美国产精品一区二区三区| 2018国产大陆天天弄谢| 卡戴珊不雅视频在线播放| 国产精品免费视频内射| videos熟女内射| 啦啦啦 在线观看视频| 老鸭窝网址在线观看| 最近最新中文字幕免费大全7| 一二三四中文在线观看免费高清| 青春草国产在线视频| 国产日韩欧美在线精品| 一级毛片黄色毛片免费观看视频| 如日韩欧美国产精品一区二区三区| 伦理电影免费视频| 国产片特级美女逼逼视频| 日韩制服丝袜自拍偷拍| 久久亚洲国产成人精品v| 最近最新中文字幕大全免费视频 | 久久鲁丝午夜福利片| 高清黄色对白视频在线免费看| 亚洲美女视频黄频| 日本爱情动作片www.在线观看| 国产精品99久久99久久久不卡 | 久久精品久久久久久噜噜老黄| 欧美久久黑人一区二区| 五月天丁香电影| 国产日韩欧美亚洲二区| 精品人妻熟女毛片av久久网站| 99国产综合亚洲精品| 两性夫妻黄色片| av一本久久久久| 婷婷色综合www| 精品亚洲乱码少妇综合久久| 国产伦理片在线播放av一区| 十八禁人妻一区二区| 99久久精品国产亚洲精品| 日本av手机在线免费观看| 少妇人妻精品综合一区二区| 国产深夜福利视频在线观看| 亚洲成av片中文字幕在线观看| 日韩一本色道免费dvd| 精品久久久久久电影网| 久久 成人 亚洲| 亚洲国产成人一精品久久久| 人妻 亚洲 视频| 午夜福利在线免费观看网站| 哪个播放器可以免费观看大片| 午夜激情久久久久久久| 高清不卡的av网站| 亚洲精品在线美女| h视频一区二区三区| 国产有黄有色有爽视频| 少妇人妻 视频| 一区二区三区四区激情视频| 国产精品99久久99久久久不卡 | 中文字幕人妻熟女乱码| 99热网站在线观看| 黑人欧美特级aaaaaa片| a级毛片黄视频| 亚洲精品一区蜜桃| 欧美日本中文国产一区发布| 亚洲av中文av极速乱| 色婷婷av一区二区三区视频| 日日摸夜夜添夜夜爱| 国产成人欧美| 黄片小视频在线播放| 日韩av不卡免费在线播放| av网站在线播放免费| 我要看黄色一级片免费的| 成年av动漫网址| 精品人妻熟女毛片av久久网站| a级毛片在线看网站| 色综合欧美亚洲国产小说| 欧美日韩国产mv在线观看视频| 韩国精品一区二区三区| 成人毛片60女人毛片免费| bbb黄色大片| 久久ye,这里只有精品| 欧美日韩精品网址| 国产xxxxx性猛交| 亚洲精品aⅴ在线观看| 大片电影免费在线观看免费| 又黄又粗又硬又大视频| 极品少妇高潮喷水抽搐| 国产伦人伦偷精品视频| 成人国语在线视频| 夜夜骑夜夜射夜夜干| 日韩视频在线欧美| 一级片免费观看大全| 国产精品欧美亚洲77777| 国产精品国产三级国产专区5o| 人人妻人人爽人人添夜夜欢视频| 亚洲av中文av极速乱| 国产高清国产精品国产三级| 久久久久久久大尺度免费视频| 精品人妻熟女毛片av久久网站| 日本午夜av视频| 王馨瑶露胸无遮挡在线观看| 少妇精品久久久久久久| 天天添夜夜摸| 最近最新中文字幕免费大全7| 久久精品亚洲熟妇少妇任你| 国产xxxxx性猛交| 欧美在线一区亚洲| 青春草亚洲视频在线观看| 天堂俺去俺来也www色官网| 成年人免费黄色播放视频| 久久99精品国语久久久| 看免费av毛片| 久久国产精品大桥未久av| 亚洲国产av影院在线观看| 无限看片的www在线观看| av在线老鸭窝| 电影成人av| 日日爽夜夜爽网站| 精品亚洲成国产av| 美女大奶头黄色视频| 青青草视频在线视频观看| 欧美成人精品欧美一级黄| 欧美最新免费一区二区三区| 桃花免费在线播放| 欧美人与性动交α欧美软件| 亚洲人成网站在线观看播放| 如日韩欧美国产精品一区二区三区| 黄色毛片三级朝国网站| 亚洲国产精品国产精品| 午夜福利网站1000一区二区三区| www.精华液| 99热全是精品| 国产一区二区激情短视频 | 免费看av在线观看网站| 亚洲,欧美,日韩| 成人黄色视频免费在线看| 久久韩国三级中文字幕| 国产精品麻豆人妻色哟哟久久| 日韩一本色道免费dvd| av在线播放精品| 国产在线一区二区三区精| 欧美日韩一区二区视频在线观看视频在线| 免费久久久久久久精品成人欧美视频| 亚洲欧美激情在线| 亚洲国产日韩一区二区| 亚洲国产av影院在线观看| 老司机深夜福利视频在线观看 | 一级毛片电影观看| 亚洲精品国产av蜜桃| 大话2 男鬼变身卡| 久久综合国产亚洲精品| 久久久久久久大尺度免费视频| 欧美xxⅹ黑人| 国产片内射在线| 伊人久久大香线蕉亚洲五| 日韩人妻精品一区2区三区| 亚洲精品久久午夜乱码| 国产深夜福利视频在线观看| 日韩av在线免费看完整版不卡| 久久久久久久精品精品| 亚洲国产精品国产精品| 交换朋友夫妻互换小说| 国产一区二区 视频在线| 亚洲精品国产区一区二| 一级毛片黄色毛片免费观看视频| 丰满乱子伦码专区| 免费黄网站久久成人精品| 亚洲av欧美aⅴ国产| 免费观看性生交大片5| 亚洲欧美色中文字幕在线| 国产精品一国产av| 超碰成人久久| 亚洲第一青青草原| 亚洲美女视频黄频| 午夜激情av网站| 亚洲成人av在线免费| 夫妻午夜视频| 久久精品国产a三级三级三级| 久久久久久久久久久久大奶| 国产av国产精品国产| 青春草视频在线免费观看| 美女主播在线视频| 咕卡用的链子| 尾随美女入室| 亚洲成国产人片在线观看| 麻豆乱淫一区二区| 老司机影院毛片| 久久午夜综合久久蜜桃| 97在线人人人人妻| 十八禁人妻一区二区| av电影中文网址| 久久av网站| 自拍欧美九色日韩亚洲蝌蚪91| 久久久久久人人人人人| 亚洲七黄色美女视频| 久久97久久精品| 欧美97在线视频| 美女主播在线视频| 欧美日韩精品网址| 叶爱在线成人免费视频播放| 中国国产av一级| 在线观看免费视频网站a站| 久久久久精品久久久久真实原创| 久久久久网色| 在线天堂中文资源库| 久久亚洲国产成人精品v| 91精品三级在线观看| 亚洲伊人久久精品综合| 国产日韩欧美视频二区| 成年美女黄网站色视频大全免费| 我的亚洲天堂| 一区二区日韩欧美中文字幕| 女人精品久久久久毛片| 悠悠久久av| 亚洲激情五月婷婷啪啪| 一本久久精品| 在线精品无人区一区二区三| 一边亲一边摸免费视频| 国产爽快片一区二区三区| 婷婷色麻豆天堂久久| 国产精品熟女久久久久浪| 捣出白浆h1v1| 日韩av免费高清视频| 老熟女久久久| 哪个播放器可以免费观看大片| 国产精品免费视频内射| 欧美激情高清一区二区三区 | 久久婷婷青草| 精品久久久久久电影网| 亚洲成人一二三区av| 久久久久久久久久久久大奶| 天天躁日日躁夜夜躁夜夜| 捣出白浆h1v1| av一本久久久久| 在线观看人妻少妇| 国产熟女午夜一区二区三区| 久久人人爽人人片av| 交换朋友夫妻互换小说| 99九九在线精品视频| 欧美人与善性xxx| 欧美中文综合在线视频| 极品少妇高潮喷水抽搐| av免费观看日本| 在线天堂中文资源库| 亚洲成国产人片在线观看| 老汉色∧v一级毛片| 亚洲一码二码三码区别大吗| 大片免费播放器 马上看| a级片在线免费高清观看视频| 亚洲综合色网址| videos熟女内射| 视频区图区小说| 久久久精品区二区三区| 人成视频在线观看免费观看| 亚洲综合精品二区| 伦理电影大哥的女人| 国产成人av激情在线播放| 日韩 欧美 亚洲 中文字幕| 少妇人妻 视频| 久久精品久久久久久久性| 亚洲一码二码三码区别大吗| 欧美乱码精品一区二区三区| 啦啦啦 在线观看视频| 欧美另类一区| 巨乳人妻的诱惑在线观看| 看非洲黑人一级黄片| 黄色视频在线播放观看不卡| 免费观看人在逋| 久久国产亚洲av麻豆专区| 国产又色又爽无遮挡免| 大码成人一级视频| 亚洲国产精品国产精品| 中文字幕人妻熟女乱码| 啦啦啦啦在线视频资源| 老鸭窝网址在线观看| 日韩免费高清中文字幕av| 日韩熟女老妇一区二区性免费视频| 久久影院123| avwww免费| 女人精品久久久久毛片| 天天躁夜夜躁狠狠躁躁| 亚洲美女黄色视频免费看| 亚洲欧美一区二区三区国产| 久久精品国产亚洲av高清一级| 热re99久久国产66热| 捣出白浆h1v1| 两个人看的免费小视频| 日韩一区二区视频免费看| 亚洲av男天堂| 晚上一个人看的免费电影| 国产精品国产三级专区第一集| 亚洲精品成人av观看孕妇| 欧美精品一区二区大全| 超碰成人久久| 久久女婷五月综合色啪小说| 校园人妻丝袜中文字幕| 另类亚洲欧美激情| 久久久精品94久久精品| 欧美在线黄色| 狂野欧美激情性xxxx| av在线app专区| 少妇被粗大猛烈的视频| 飞空精品影院首页| 亚洲精品,欧美精品| 日韩一区二区三区影片| 一级片免费观看大全| a 毛片基地| 欧美精品一区二区大全| 在线 av 中文字幕| 欧美在线一区亚洲| 下体分泌物呈黄色| 中文天堂在线官网| 国产老妇伦熟女老妇高清| 国产精品久久久久久人妻精品电影 | 久久99一区二区三区| 国产精品久久久久成人av| 夫妻性生交免费视频一级片| av电影中文网址| 中文字幕人妻丝袜制服| 大片免费播放器 马上看| 看十八女毛片水多多多| 国产成人a∨麻豆精品| 女性生殖器流出的白浆| 中国国产av一级| 国产成人午夜福利电影在线观看| √禁漫天堂资源中文www| 美女中出高潮动态图| 十分钟在线观看高清视频www| 十八禁高潮呻吟视频| 性少妇av在线| 老熟女久久久| 久久这里只有精品19| 久久精品国产a三级三级三级| 亚洲av成人精品一二三区| 日本91视频免费播放| 中文字幕色久视频| 精品一区二区三卡| 亚洲国产中文字幕在线视频| 日本欧美视频一区| 精品久久蜜臀av无| 国产av一区二区精品久久| 丰满迷人的少妇在线观看| www.av在线官网国产| 久久精品国产综合久久久| 中文字幕人妻丝袜制服| 国产精品久久久久成人av| 母亲3免费完整高清在线观看| 欧美日韩精品网址| 久久天躁狠狠躁夜夜2o2o | a级毛片黄视频| 电影成人av| 热re99久久精品国产66热6| 一区在线观看完整版| 亚洲国产精品国产精品| e午夜精品久久久久久久|