• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology

    2024-03-11 06:27:54ZhenZhangBingGuoChengjieLi
    China Communications 2024年2期

    Zhen Zhang ,Bing Guo,* ,Chengjie Li

    1 College of Computer Science,Sichuan University,Chengdu 610064,China

    2 The Key Laboratory for Computer Systems of State Ethnic Affairs Commission,School of Computer Science and Technology,Southwest Minzu University,Chengdu 610225,China

    3 National Key Laboratory of Science and Technology on Communications,University of Electronic Science and Technology of China,Chengdu 611731,China

    Abstract: In mega-constellation Communication Systems,efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer.However,the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing,it introduces security and reliability challenges in open satellite communication channels.To address these challenges,we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems.This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network.Additionally,we introduce a reputation management mechanism for nodes within the blockchain,evaluating their trustworthiness,workload,and efficiency.Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized.Simulation results demonstrate that our approach achieves a task result reliability of 95%while improving computational speed.

    Keywords: blockchain;consensus mechanism;edge computing;mega-constellation;reputation management

    I.INTRODUCTION

    With the rapid development of satellite internet,researchers have paid significant attention to the wide coverage,flexibility,scalability,and diverse applications of mega-constellation communication systems.In a mega-Constellation Communication System (MCCS),it comprises a large number of lowcost and low-performance satellites,but a highperformance network architecture is a prerequisite for the normal operation of the system.Cloud computing,due to its advantages of low cost,high flexibility,scalability,reliability,and strong fault tolerance capabilities,is the preferred computing technology for mega-constellation communication systems.To better support high-density,large bandwidth,and low delay business scenarios,a more effective way is to build a business platform (edge data center) at the edge of the network close to the task provider (TP).In this way,some critical business applications are sunk to the edge of the network to reduce the loss of bandwidth and delay caused by network transmission and multi-level forwarding.However,due to the wide distribution of edge nodes and the vulnerable network environment,it is not easy to evaluate the reliability of their transmitted data.Therefore,how to ensure the reliability of the computing results is a scientific problem worthy of discussion.

    In edge computing research,there are two common assumptions:one is that the computing nodes are honest and can provide reliable computing results for TPs[1,2].WNs in the public network can freely join or exit,and unreliable workers in the network may deliberately or unintentionally perform unwelcome behaviors to mislead the task results [3,4],so how to select WNs in the untrusted network environment is of great importance.Second,researchers assume that all devices unconditionally contribute their resources[5].Since computing brings energy consumption,the assumption of selfless dedication is unrealistic in the real world[5].Therefore,it is necessary to design an effective incentive mechanism to motivate end devices to become the WNs of edge computing tasks.

    This paper aims to get efficient and reliable results in an untrusted environment in the MCCS so as to provide security (i.e.,the reliability of the computing results)and efficiency,the incentive framework for federated learning in multi-tp scenarios in MCCS is shown in Figure 1.A fair index is needed to evaluate the quality of WNs.Current researchers judge reputation as a measurement to assess the reliability or credibility of an entity due to its past behavior [6,7].However,when the number of tasks in the network is large,the workload of WNs with high reputation is significant,resulting in long task delays.

    For the MCCS,this paper designs an extensible task allocation mechanism based on the above reputation management methods and redundancy computing methods.This allocation mechanism evaluates the busy situation of computing devices in the network,gives honest and efficient reputation evaluation to WNs on the premise of ensuring efficient and reliable computing results,and provides work opportunities to WNs that do not have high reputation evaluation,for the time being,the task throughput of the whole network is improved.To ensure safe reputation management and reliable reputation calculation,we do not adopt the traditional centralized management structure but manage reputation in a decentralized manner through the blockchain with openness and tamper-proof characteristics.A public blockchain is a trusted technology,which can widely combine computing devices in the network to realize computing services,but the popular public blockchain technology has shortcomings in efficiency.Innovative blockchain technology can provide efficient computing services and quickly reach a consensus on computing results[8-10].

    To encourage employees to join the blockchain and share their resources,TPs use the blockchain to record the working status of WNs and design an incentive mechanism to reward WNs.The more tasks they complete,the higher the reputation of WNs and the more rewards they receive from TPs.More reliable and efficient task execution can improve TPs’and WNs’profits.To address the heterogeneity and multilevel nature of MCCS,the main contributions of this article are listed as follows.

    This paper uses the task records on the blockchain and subjective logic model to manage and evaluate the reputation of WNs in a decentralized and efficient manner and evaluate WN’s efficiency and workload according to the public information in the blockchain.

    This paper uses a novel blockchain technology to ensure the efficiency and reliability of edge computing results and significantly improve the parallel processing efficiency of distributed tasks in the network by using multiple low-reputation WNs to work together in a high-load and untrusted environment.

    This paper designs an effective arithmetic auction algorithm,which has feasibility and individual rationality,can maintain the interests of WNs and TP,stimulate honest and efficient behavior,and resist malicious attacks.

    Experiments proves that when the malicious nodes are less than half and the workload is small,the throughput of the network is slightly affected by the malicious WNs on the premise of ensuring the network security,and with the increase of the malicious WNs,the WNs are more willing to maintain honesty.

    The rest of this article is organized as follows.We present the related work in Section II.Section III outlines the architecture of edge computing system,introduces the task-oriented blockchain consensus and describes the WNs selection scheme based on reputation,workload and efficiency-evaluation,then an incentive mechanism based on auction model for highreputation WNs selection is proposed.The perfor-mance evaluation in Section IV.Finally,we summarize this article in Section V.

    II.RELATED WORK AND SYSTEM ARCHITECTURE

    In MCCS,to improve computing efficiency and reduce energy consumption,a strategy is proposed to offload the tasks to the computing device nearby.[11]proposes a lightweight offload framework to support offloading computing-intensive tasks,deploy servers efficiently,and optimize overall execution time and energy consumption.[12] establishes a hybrid offload model and proposes a distributed deep learning driven task offload (DDTO) algorithm to generate near-optimal offload decisions on MDS,edge ECs and central ECs.[13] proposes an online incentivedriven task allocation scheme to maximize system utility,promote faster computing speed,and stimulate collaborative computing.

    2.1 Related Work

    As a distributed computing architecture,the computing resources of edge computing can be managed by companies or individuals,which brings security problems to distributed edge computing service providers.Many works of literature introduced blockchain to provide trust,security,and privacy support for edge computing.[14] proposes a blockchain framework to provide a trusted collaboration mechanism among edge servers in a work node environment.[15]offers a computing offload method named BENG based on blockchain.[16]uses Hyperledger’s blockchain architecture,a safe and reliable federal learning platform to build crossed data and then record them on the distributed ledger.[17]proposes a blockchain-based federated learning model designed for edge computing deployment against poisoning attacks.

    In edge computing,efficient and honest computing devices should get computing tasks as much as possible,so reputation management is proposed.WNs can also improve their reputation by completing tasks honestly and efficiently.TPs can choose WNs with high reputations for completing tasks.Accordingly,if a WN provides wrong results or computing results over time,it causes reputation damage.[18]proposes a process to support smart contracts and automated reputation management through incentive design to reduce malicious behavior.[19] measures the reputation of WNs from the accuracy,integrity,efficiency,and historical data of results,an incentive mechanism is proposed to stimulate WNs to provide efficient and accurate computing results and eliminate malicious nodes.[20]proposes a reputation evaluation system based on blockchain.[13] proposes the cooperation mode of WNs.

    Traditional reputation management is a centralized platform of third-party[21].The centralized platform is easy to be attacked by hackers,resulting in errors in reputation data.In addition,third-party platforms may snoop on data,leading to user information disclosure.Contrary to centralization,distributed reputation management system.Due to the distributed management of data,it cannot be easily tampered with,so it can provide trusted data.Because distributed devices redundantly back up the reputation data,TPs can access the nearest device to obtain reputation data efficiently.

    2.2 System Architecture

    The system architecture is shown in Figure 2,where a TP (Task Provider) submits a task to an Oracle node,and the Oracle node sends the task to the public blockchain.After the blockchain completes the task through one or several smart contracts,the result is sent to the Oracle node,which then provide the feedback to TP.The Oracle node is also called a MN(master node)and nodes in blockchain are called WNs(worker nodes).We assume that the MNs are trusted[22,23].In the public blockchain,the WNs are divided into several groups based on their proximity to the MNs.Within a group,all WNs redundantly complete a task delegated by the MN and vote on the task results.The blockchain considers the result with more support as trustworthy.WNs that provide trustworthy result are rewarded,and logs and rewards of all tasks are backed up on all WNs in the blockchain.

    Figure 2.High-level architecture of the proposed system.

    The closer a TP is to a group of WNs,the smaller the network delay caused by transferring data.The task should ideally be assigned to the nearest group of WNs.However,these WNs may have insufficient resources and take too long to complete the task.In such cases,the MN delegates the task to a nearby group of WNs.Since these WNs are part of the public network,there is a risk of malicious behavior where incorrect results are provided to deceive rewards.To address this,a task allocation mode is required to evaluate and manage the reputation value of WNs in the public network.This mode should mobilize nearby WNs to assist in completing the task based on their credibility,capability,network conditions,and workload.Furthermore,it should incentivize honest behavior among the WNs.

    2.3 Novel Consensus Mechanism

    The objective of applying blockchain to edge computing is to ensure the speed and reliability of task execution.To achieve this,we utilize the blockchain consensus mechanism described in [10].Unlike traditional block-based systems,this blockchain directly publishes transactions without packaging them into blocks.The consensus mechanism is depicted in Figure 3.The Oracle contract selects an appropriate group and publish a new task transaction,which is represented by the white square.These transactions contain task information and allocation details.

    The WNs participating in the task complete the smart contract and receive the encrypted computing results from other WN in same group,which are represented by the colored squares.The transactions related to the same task are linked to the task’s genesis point,denoted by the white square.These linked squares of different colors form a task chain,as illustrated by the black arrows in Figure 3.Furthermore,the tasks completed by a specific worker WN are linked back and forth,forming a chain of WNs represented by the blue arrows [10,24].The combined chains of tasks and WNs create a network structure.

    Figure 3.Novel consensus mechanism.

    Through the use of hash encryption,data tampering is prevented,ensuring the integrity of reputation information.This means that reputation information cannot be altered without detection.

    In contrast to traditional blockchains,each WN in blockchain publishes a single transaction that contains the result of a task.As there are multiple tasks being processed concurrently in the network,there exist multiple task chains simultaneously.When multiple WNs provide the same feedback for a particular task,their transactions are linked together.The task chain with the highest number of supporters becomes the main chain,while the chains outside the main chain are referred to as parasitic chains[9].

    Within the main chain,the credibility of a WN is determined by the height of its transaction.WNs with lower transaction heights have higher credibility.However,it is important to note that transactions at the tip of the chain are not yet confirmed,which means that the corresponding WNs do not receive any credibility or rewards until the confirmation takes place.

    III.REPUTATION AND AUCTION MODEL

    Reliability and efficiency is key to computing QoS,to provide high-level computing service,a reputation management and auction model is needed.

    3.1 Multi-Factor Evaluation on a WN

    WNs have the freedom to join and exit the public network at will.However,the trustworthiness of the computing results provided by these WNs cannot be guaranteed.In the context of distributed computing,the speed and accuracy of results are of utmost importance.Therefore,it is crucial to identify and prioritize WNs with high credibility and efficiency in order to enhance the performance of distributed computing in an untrusted environment.To rate a WN,we consider factors such as its historical track record and workload[20].

    3.1.1 Reputation of a WN

    Taskxis assigned to a group of WNs to collaborate on its completion.The possible outcomes for taskxare represented by the sample spaceU={u1,···,un,null},a specific WN namedUAcan be in one of two states when working on taskxmay be in one of the two states: Working or Done.WhenUAis in the Working state for taskx,the corresponding result isnull,indicating that the task is still in progress.On the other hand,whenUAis in the Done state for taskx,it provides a resultui,whereui ∈U,representing the outcome it has produced for the task.

    Definition: Letnidenote the number of WNs that provide a computing resultui.If for anyi=j,there is nonisuch thatni ≥nj+nnull,it indicates that there is no reliable result for taskx.However,if?ni ≥nj+nnull,?j=i,uiis considered the reliable result for taskx,and?uj ∈{U-ui-null}are regarded as unreliable results[25].

    The status of results provided byUAis defined as:

    which corresponds toUAproviding a reliable result(positive),an unreliable result (negative),no reliable result(uncertainty),no results respectively.

    A TP namedUBdelegatesktasks toUA,The status ofUAforUB’s tasks is denoted as:

    1.Credibility evaluation

    UA’s credibility is expressed by a tuple vector

    2.Time effect on accuracy The reputation of WNs is dynamic and can change over time.WNs cannot be considered trustworthy at all times.The accuracy evaluation of WNs is crucial for recent tasks,and to account for this,a fading parameterf(0<f <1)is introduced.The accuracy value is affected bynow-tm(x),wheretm(x)represents the generation time ofx,i.e.,the creation time ofx’s genesis.The accuracy evaluation ofUAis influenced by time according to the Equation(6):

    Considering above,credibility ofUAforUBis expressed as follows:

    whereηpv,ηnv,ηucandηnoneindicate the influence weights of the states pv,nv,uc and none.

    3.1.2 Workload of WNs

    Given the transparent nature of the blockchain,all transactions are publicly accessible.The MN can assess the workloads of WNs by examining the task chains,specifically by tracing the tasks from the genesis block to the latest transaction in each task chain.This allows the MN to identify which WNs have not yet completed their tasks.By analyzing all the task chains,the overall workloads of WNs in the network can be determined.When there is a backlog of pending tasks,it is important to consider the efficiency of WNs and avoid assigning new tasks to already busy WNs.The workload ofUAis illustrated as follows:

    In the case of tasks that were delegated a long time ago,the work WN might have abandoned the task and is available to accept new tasks.As time passes,the likelihood of task abandonment increases,thus diminishing the negative impact of the workload.Consequently,the workload variation over time can be expressed as in Equation(10):

    3.1.3 Efficiency Evaluation

    Honest and efficient work history serves as a reference for the MNs.In order to evaluate the work efficiency of WNs,we avoid relying on transmission time due to its uncertainty in the network.Instead,we utilize the height of transactions in the task chains as a measure.A lower transaction height indicates a higher level of responsiveness from the WN,which could be attributed to either superior performance or fast network transmission speed.The efficiency evaluation of a WN is as follows:

    whereHx(UA)indicates the height of transactionUApublishes in task chain ofx.Hxindicates the height of the longest chain ofx.

    Considering time,the efficiency evaluation ofUAforUBis as below:

    3.1.4 Dynamic Task Allocation Mechanism

    In an untrusted environment,both honest WNs and malicious WNs coexist and have the freedom to join or exit the network.While it is assumed that the majority of WNs are honest [26],low-reputation WNs can still participate in voting to contribute their results and obtain reliable outcomes.Alternatively,a highreputation WN can independently complete the task.Drawing inspiration from the consensus mechanisms employed in existing public blockchains,we propose the following methods to ensure the attainment of reliable results:

    1.The most secure approach is to involve a large number of WNs in the computation and determine the results based on the majority through voting.This method is similar to the Proof of Work(PoW)consensus used in Bitcoin.However,it comes with the drawback of consuming significant energy,resulting in low overall network task execution efficiency.

    2.An improved approach is to select one or several highly reputable WNs to participate in the computation.This method shares similarities with the Proof of Stake(PoS)or Delegated Proof of Stake(DPoS) consensus in blockchain.It enhances task execution efficiency and reduces computation costs.However,the drawback is that highly reputable WNs in the network are often occupied,making it difficult for newly joined WNs to obtain task opportunities.Moreover,task delegation to a limited number of WNs reduces security and hampers overall network task throughput improvement as task volume increases.

    3.A further enhancement involves dynamically selecting a few WNs,based on their reputation values and task requirements,to participate in the task.WNs with high reputation values are assigned the task individually,while WNs with lower reputation values collaborate as a group.This approach ensures the reliability of computing results while minimally impacting efficiency[10].

    A TP sends a task to the MN with a desired reliability level ofq.To achieve this reliability,the MN has two options: it can select a single WN with a reputation valuer ≥q,or it can choose multiple WNs withr <q.Among all the WNs that are available to work forUBi.e.i ∈available(UB),the selection process follows a specific priority.The selection of WNs continues until the following condition is met.

    WNs with high reliability tend to receive a large number of tasks,resulting in heavy workloads.Therefore,the MNs needs to strike a balance between the efficiency and workload of the WNs.The efficiency and workload of a WN should meet the following condition:

    ζand?are the predefined weights of efficiency and workload,respectively.?is a threshold.When the difference between efficiency and workload is greater than?,the MN considersUAa candidate WN.

    3.2 Auction Model

    After a TP submits a task to a MN,the MN selects one or several WNs to complete it.This process can be treated as an auction.The TP is the buyer,the WNs are the sellers,and the blockchain is the auctioneer.In the auction process,the auctioneer needs to maximize the buyer’s interests through the reputation information on the blockchain.

    First,a TP sends bidding informationB={x,t0,τ,v,N,q},xis the task,t0isx’s arrival time,τis the maximum tolerance time ofx,vis the reward of a WN for completingx,Nis the maximum number of WNs for completingx,the TP paysNvto WNs at most forx,qis requiring reliability ofx.

    Second,after receiving bidding information,the MN tends to delegate tasks to honest,efficient WNs.Wx={w1,w2,···,wn}is the set of employed WNs that work forx.

    Third,afterWxis determined,the MN transfer data and deploys the task to the WNs.

    Fourth,the WNs complete the task,encrypt the results,then publish transactions containing the results to the blockchain.The transactions can be mutually verified by WNs and form a chain,and the chain with most transactions is the main chain.If a WN does not complete the task after maximum tolerance time,the WNs lose the opportunity to get paid.

    3.2.1 Information Exchange Model

    The task is defined asx={s,ω},srepresentsx’s size,ωis the required computing resources.

    xis delegated by a MN namedUB,UA∈Wx,the transmission time is:

    wherer(UB→UA)=B×ln(1+P×g/σ2)represent the transmission rate,Bis the transmission bandwidth,Pis the transmission power,gis the channel gain between WNs and the TP,σ2is the power of additive Gaussian white noise.

    The computing time ofUAforxis:

    wherefUAis the computing resourceUAcontributes,i.e.the CPU frequency.

    So the timeUAspends forxis:

    wherecisUA’s unit energy value.δis the effective capacitance parameter ofUA’s computing chipset.Similarly,the total cost in terms of time and energy of the execution mode is:

    where?is the energy consumption coefficient.

    Several WNs work onxand the execution time ofxistx=min(Done_time(Wx),τ),where Done_time(Wx) represents the time to get a reliable result.In the most optimistic case,all WNs publishes transactions with the same results and transactions are linked in the main chain.In this case,when half of the WN inWxcomplete the task,the task is completed.In the most pessimistic case,all the transactions are not linked to each other,the reliable result is confirmed till all of the WN inWxcomplete the task.In the most pessimistic case,

    wheretpending(wi) is the time required for previous tasks that have not been completed by thiswi.For the convenience of the following calculations,we settpending(wi)=0.

    3.2.2 Utility Function

    TP’s utility function isUTP=?(τ-tx)-nv,where? >0 is the satisfaction parameter of the task publisher.In order to maximize the profits of TP,the auction must meet the following constraints: 1.the results meet the reliability criteriaq;2.rationalization of WNs;3.maximization of TP’s expected benefits.

    For constraint 1,it is discussed in subsection Dynamic task allocation mechanism in this section.

    For constraint 2,Honest WNwiget rewardvby completing the task.The utility function of honest WN is:

    whereμis the predefined weight parameter of energy consumption.

    If the resources of the WNs are insufficient to complete the task,i.e.,the WNs reject to work on this task.

    For constraint 3,as a TP,UBwants to maximize the benefits.

    whichtx(wi) decreases,UBincreases or does not change.

    The higher the reputation of each WN,the fewer WNs are required,and the greater the UBis.In order to maximize the utility function,TP preferentially selects WNs with high reputation and a large amount of idle computing resources to work on the task.

    Requirements of algorithm:

    1.In order to maximize the benefits of TP,the working time of the WNs should be as short as possible.

    2.In order to ensure the reliability of the results,the high-reputation WNs are preferred according to the reputation ranking of available WNs.

    3.The MN should judge whether the task can be accepted according to the estimated utility function of the WNs.

    4.The MN should judge whether the task can be completed before theτaccording to the available resources of the WNs.In the whole system,we assume that the MN is completely trusted,but the TPs and the WNs are free devices in the public network.Therefore,we only consider the malicious behaviors of TPs and WNs for benefits.

    Proposition 1.WNs will not misreport their available resource.

    Proof.The WNs will not publish false network information or available resources because:

    1.The rewardsvhas no direct relationship to the network environment nor available resourcesf;

    2.If the WNUAfalsely publishes higher available resources or a better network environment than actual on the blockchain,all the MNs in the network can see this new information,andUAwill receive inappropriate tasks and miss appropriate tasks.AfterUAreceives taskx,and fails to completexinτ,UA’s reputation will be lost,and the possibility of obtaining other tasks will be lost;Even ifUAis lucky to complete the task in time,it will obtain extremely low rewards due to its transaction is near the tip or even no rewards if its transaction is the tip.

    Proposition 2.TP will not misreport their resource demand.

    Proof.The TPs will not publish false resource demand because:(1) If the demand resource is reported high,the selection range of WNs will become smaller.In order to make the reliability of the computing result reachq,more WNs will be required to work,resulting in a larger compensationnv;(2) If the required resource is reported low,the WN may not be able to complete the task inτ,and the results are of low reliability.

    Proposition 3.The WNs will keep honest on results.

    Proof.In pursuit of rewards,self-interested and illintentioned WNs might engage in the subsequent behaviors:

    1.They may abstain from computation altogether,opting to fabricate inaccurate outcomes directly.Additionally,they could collaborate with other malicious WNs to disseminate misleading results;

    2.They could furnish outcomes identical to credible results,even without conducting any actual computation.

    For Proposition 1,reputations are essential to WNs.The WNs with high reputations have an excellent working history and are unlikely to collude;When high reputation WNs are busy,many low reputation WNs are selected.Based on the assumption that most WNs are honest,false results may have a dominant position at the beginning of the task handling and will eventually be surpassed by reliable results.

    For Proposition 2,since a WN can only publish one result for one task,this selfish and lazy WN needs to know the results provided by other WNs,then publish its transaction behind.The WN needs a long time to find out the main chain,so the transaction published by this WN is high in the chain.The selfish WN will not be rewarded if there are no transactions behind this transaction.In addition,the result in the transaction is an encryption result(for example,asymmetric encryption is realized by using the WNs’IDs).The selfish result cannot get the actual results,so the transaction is even less likely to be verified by other WNs.This situation is the same as in Proposition 1.In addition,as the number of malicious WNs gets more and more,and the malicious WNs are less than the honest ones,the honest WNs get more and more tasks and earn more,so honest WNs are more willing to keep honest.

    IV.SIMULATION AND EVALUATION

    4.1 Simulation Models and Settings

    This paper uses C++and socket technology to simulate a blockchain model and the simulation experiments conducted are grounded in the parameter settings of the Hongyan LEO satellite system,which operates at an orbital altitude of roughly 1100 kilometers.This blockchain consists of twenty-two WNs,two MNs,and two TPs.The initial reputation value of each WN is 0.49.Each WN in the blockchain can be directly or indirectly connected,and TPs are directly connected to the corresponding MNs.In MCCS,the server virtualization platform serves as the test environment,and the hardware configuration of the virtual environment is specified as follows.Apart from configuring the parameters at the physical layer,the wireless signal transmission network incorporates the parameters listed in Table 1.

    Table 1.Experimental parameters.

    Because the blockchain in this paper is used to solve real-time computing tasks,the amount of information in the network is greatly increased compared with the traditional blockchain,which causes a tremendous burden on the network.This paper adopts two methods to solve the problem of network burden:

    1.Reduce the amount of data transmitted.The realtime data transmission(i.e.transaction)only occurs among the WNs employed to the task.After the reliable results are determined,all the data containing the results are packaged into a data package and distributed to all WNs in the network.

    2.Reduce the amount of data sent by a WN.Referring to the gossip protocol,we design that WNs can only send data to adjacent WNs.In this way,the whole network will receive the data several forwarding times.

    Due to the network transmission delay,the same computing results may not be connected in a chain.In this case,our simulation sets a super WN to connect transactions with the same task results into a chain[9].When the TP submit a task to the MN,the results’reliability is required.If there is no WN with a reputation that meets this requirement,the computing results proposed by multiple decentralized WNs have higher credibility than that of a single WN[25].According to the records on the blockchain,the MN analyzes the reputation,workload,and network transmission time of the WNs,then selects the appropriate WNs and publishes a new task to the blockchain as a transaction.The WNs start to work after receiving this transaction.

    4.2 Performance Evaluation

    Referring to the work on the mobile/IOT blockchain[27-29],we assume that the task interval time is exponentially distributed with the average value of 30 seconds,i.e.the expected arrival interval time of the tasks(equal to the average task interval time) is Δt=30 seconds.

    Our goal is to use a consensus mechanism,reputation evaluation,and incentive mechanism to encourage honest WNs to provide TPs with secure(i.e.,the reliability of the computing results)and efficient computing results so as to improve the system’s security(i.e.the number of malicious WNs that the system can tolerate)and throughput(i.e.the number of transactions verified per time unit).When all WNs in the network are trusted,the required reliability is 0.8,0.9,and 0.95,respectively.The consensus mechanism adopted in this paper compared with POW and POS(with four accounting WNs)consensus can 1)significantly shorten the processing time of each task,as shown in Figure 4;2)reduce the number of WNs occupied by the task,as shown in Figure 5;3)improve the utility of TP,as shown in Figure 6.

    Figure 4.Time consumptions for consensus mechanisms and required reliabilities.

    Figure 5.WNs occupied by tasks for consensus mechanisms and required reliabilities.

    Figure 6.Utilities of the TP for consensus mechanisms and required reliabilities.

    From Figure 5 we can see,the idle rate of WNs is high due to the influence of gossip protocol.The transmission time of WNs far from the TP is affected,and these WNs are not delegated with tasks.In a distributed network,decentralized task sources can improve the utilization rate of WNs,and improve the network throughput and the income of WNs per unit of time.

    Since the WNs close to the TP do not need much time for transmission when processing tasks,the efficiency for processing tasks is higher,thus obtaining a higher reputation than those far from the TP.The high reputation of the WNs makes the TP reduces the number of WNs required for the task.Efficient completion of tasks and a small number of WNs for the task improve the utility of TP.Therefore,the method used in this paper significantly improves the utility of TP compared with PoW and PoS consensus as shown in Figure 6.

    Next,when there are malicious WNs in the network,the task needs to be delegated to honest WNs.In our simulation,when the reliability requirement is low,the system selects only a few WNs during initialization,which is not conducive to evaluating the reliability.Therefore,in this simulation,it is appropriate to set the reliability of the task to 0.95.In the network,malicious WNs are evenly distributed.With the increase of malicious WNs in the network,honest WNs with a dominant number can still get tasks,while malicious WNs cannot get tasks gradually.The time consumption per task of the network is shown in Figure 7.

    Figure 7.Influence of malicious WNs proportion on time consumption per task.

    As in Figure 7,with the increase of malicious WNs,the fluctuation time of the broken line becomes more extended,and the TP needs more time to evaluate their reputations.Finally,the processing time of each task is shortened to about 30s,which is the shortest time among the WNs to process tasks.As in Figure 8,when the proportion of malicious WNs is less than 45%,the network’s throughput does not change much.It is because when the number of tasks in the network is small and there are enough idle WNs,the honest idle WNs near the TP can take the malicious WNs’place in the tasks.When the number of malicious WNs reaches 45%,the network needs more time to find honest WNs so that the throughput is affected.

    Figure 8.Influence of malicious WNs proportion on average time consumption.

    As in Figure 9,the fluctuation of TP’s utility wave line extends with the increase of the proportion of malicious WNs.It is due to the consumption brought by the establishment of WNs’reputation.The higher the proportion of malicious nodes,the more rounds of trust evaluation are required to stabilize the utility of the TP in each task.This is because the larger the proportion of malicious nodes,the more challenging the reputation evaluation becomes,requiring more rounds of computation for reputation assessment.Although,different proportions of malicious nodes have little impact on the utility per task of the TP after stabilization as shown in Figure 9,total utilities of the TP in several rounds of tasks are decreasing along with the increase of malicious WNs as shown in Figure 10.

    Figure 9.Influence of malicious WNs’proportion on TP’s utility per task.

    Figure 10.Influence of malicious WNs’proportion on TP’s average utility.

    The average profit of honest WNs is shown in Figure 11.As the proportion of malicious nodes increases,the profit of each honest node increases.This is because the number of malicious WNs increases,resulting in the decrease of honest WNs,and thus the workload of each honest WNs increases,so the profit increases.

    Figure 11.Influence of malicious WNs’ proportion on rewards of honest WNs.

    V.CONCLUSION

    For MCCS,this paper designs a multi-factor reputation management and evaluation,a dynamic task allocation mechanism and an incentive mechanism based on blockchain for edge computing.This incentive mechanism combines the consensus mechanism that can quickly process computing tasks and can provide distributed computing services for TPs,achieving the goal of improving network throughput and security.Advantages of these in MCCS are as follows.(1)Reduced network latency: Edge computing enables placing computing tasks and data processing functions on edge devices closer to the users,avoiding the latency of transmitting data to remote cloud centers for processing.(2)Reduced data transmission: Massive constellation communication systems involve large-scale data transmission,and transmitting all the data to the cloud for processing would consume significant bandwidth resources.By leveraging edge computing,local processing and data filtering can be performed on edge devices,reducing the amount of data transferred to the cloud and thereby lowering the risk of network congestion and operational costs.(3) Enhanced data privacy and security:Edge computing enables processing sensitive data on local devices instead of transmitting it to the cloud,thereby enhancing data privacy and security.(4)Improved system reliability: Satellite WNs in massive constellation communication systems face various environmental and failure risks.By performing local computing on edge devices,dependence on the central cloud is reduced,enhancing the overall system’s robustness and reliability.At last,we show the results of the algorithm through several experiments.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Natural Science Foundation of China under Grant No.U2268204,62172061 and 61 871422;National Key R&D Program of China under Grant No.2020YFB1711800 and 2020YFB1 707900;the Science and Technology Project of Sichuan Province under Grant No.2023ZHCG0014,2023ZHCG0011,2022YFG0155,2022YFG0157,2021GFW019,2021YFG0152,2021YFG0025,2020YFG0322;Central Universities of Southwest Minzu University under Grant No.ZYN2022032,2023NYXXS034 and the State Scholarship Fund of the China Scholarship Council under Grant No.202008510081.

    9色porny在线观看| 青春草视频在线免费观看| 老汉色av国产亚洲站长工具| 男女边摸边吃奶| 日韩大片免费观看网站| 亚洲精品久久午夜乱码| 亚洲国产欧美日韩在线播放| 国产成人午夜福利电影在线观看| 最近最新中文字幕大全免费视频 | 国产女主播在线喷水免费视频网站| 日韩制服骚丝袜av| 亚洲欧美一区二区三区久久| 久久久久久人人人人人| 91精品三级在线观看| 麻豆av在线久日| 自拍欧美九色日韩亚洲蝌蚪91| 欧美日韩国产mv在线观看视频| 久久久久久人人人人人| 性高湖久久久久久久久免费观看| 美女主播在线视频| 观看美女的网站| 少妇人妻精品综合一区二区| 精品一品国产午夜福利视频| 99国产综合亚洲精品| 视频区图区小说| 精品少妇久久久久久888优播| 久久人人爽人人片av| 久久精品熟女亚洲av麻豆精品| 肉色欧美久久久久久久蜜桃| av免费在线看不卡| 超碰成人久久| 精品亚洲成国产av| 一级毛片黄色毛片免费观看视频| 精品一区二区三区四区五区乱码 | 久久精品国产自在天天线| 人人澡人人妻人| 一级黄片播放器| 午夜免费观看性视频| 男女免费视频国产| 国产亚洲午夜精品一区二区久久| 9热在线视频观看99| 天天影视国产精品| 免费观看av网站的网址| 国产成人精品婷婷| 韩国av在线不卡| av视频免费观看在线观看| 久久久久久久久久久久大奶| 18禁裸乳无遮挡动漫免费视频| 青青草视频在线视频观看| 中文字幕精品免费在线观看视频| 欧美 亚洲 国产 日韩一| videossex国产| 最近手机中文字幕大全| 欧美日韩精品网址| 三上悠亚av全集在线观看| 美女午夜性视频免费| 99re6热这里在线精品视频| 人体艺术视频欧美日本| 男女边摸边吃奶| 国产欧美日韩综合在线一区二区| 久久久久国产一级毛片高清牌| 亚洲情色 制服丝袜| 好男人视频免费观看在线| 成年人午夜在线观看视频| 曰老女人黄片| av线在线观看网站| 欧美日韩综合久久久久久| 最近最新中文字幕大全免费视频 | 日本色播在线视频| 久久精品国产综合久久久| 久久精品国产鲁丝片午夜精品| 色94色欧美一区二区| 一区二区av电影网| 亚洲国产最新在线播放| 国产日韩欧美亚洲二区| 成人毛片60女人毛片免费| 日韩av免费高清视频| 美女国产高潮福利片在线看| 午夜福利乱码中文字幕| 亚洲人成电影观看| 久久 成人 亚洲| 男人舔女人的私密视频| 亚洲成人av在线免费| 亚洲av.av天堂| av电影中文网址| 丝袜喷水一区| 最近最新中文字幕大全免费视频 | 亚洲av.av天堂| 国产精品久久久久成人av| 国产xxxxx性猛交| 男的添女的下面高潮视频| 国产精品三级大全| 国产一级毛片在线| 人体艺术视频欧美日本| 欧美日韩亚洲国产一区二区在线观看 | 制服丝袜香蕉在线| 制服人妻中文乱码| 韩国精品一区二区三区| 亚洲一码二码三码区别大吗| 男女高潮啪啪啪动态图| 久久久久久人人人人人| 亚洲国产精品一区二区三区在线| 国产精品 欧美亚洲| 少妇人妻精品综合一区二区| 亚洲精品美女久久久久99蜜臀 | 18在线观看网站| 国产精品女同一区二区软件| 欧美 日韩 精品 国产| 精品酒店卫生间| 七月丁香在线播放| 久久久久国产精品人妻一区二区| 深夜精品福利| 少妇被粗大猛烈的视频| 丰满少妇做爰视频| 热99久久久久精品小说推荐| 哪个播放器可以免费观看大片| 久久 成人 亚洲| videos熟女内射| 午夜福利在线观看免费完整高清在| xxx大片免费视频| 欧美日韩精品网址| 不卡视频在线观看欧美| 日日撸夜夜添| 99久国产av精品国产电影| 亚洲国产看品久久| 欧美日韩精品成人综合77777| 看免费av毛片| 久久国产精品男人的天堂亚洲| av网站免费在线观看视频| 青春草亚洲视频在线观看| 国产一级毛片在线| 熟女电影av网| www.熟女人妻精品国产| 国产深夜福利视频在线观看| 国产成人精品久久久久久| 黑人猛操日本美女一级片| 婷婷色av中文字幕| 中文字幕另类日韩欧美亚洲嫩草| 久久久国产一区二区| 久久精品夜色国产| 捣出白浆h1v1| 日韩中文字幕视频在线看片| 亚洲五月色婷婷综合| 国产一区二区三区综合在线观看| 亚洲综合色惰| 99热全是精品| 美女脱内裤让男人舔精品视频| 欧美日韩亚洲国产一区二区在线观看 | 国产 一区精品| 国产免费视频播放在线视频| 国产xxxxx性猛交| 国产极品天堂在线| 亚洲成人手机| 午夜福利一区二区在线看| 91aial.com中文字幕在线观看| 亚洲欧美成人综合另类久久久| 夜夜骑夜夜射夜夜干| 日韩欧美一区视频在线观看| 69精品国产乱码久久久| 亚洲精品日本国产第一区| 宅男免费午夜| 亚洲国产av新网站| 韩国av在线不卡| 日韩熟女老妇一区二区性免费视频| 十分钟在线观看高清视频www| 免费日韩欧美在线观看| 精品人妻熟女毛片av久久网站| 美女国产视频在线观看| 在线免费观看不下载黄p国产| 成年人免费黄色播放视频| 国产成人91sexporn| 久久久久精品性色| 亚洲经典国产精华液单| 精品一区在线观看国产| 精品亚洲乱码少妇综合久久| 18在线观看网站| 热re99久久国产66热| 国产免费又黄又爽又色| av福利片在线| 亚洲五月色婷婷综合| 性高湖久久久久久久久免费观看| 国产精品三级大全| 亚洲精品国产av蜜桃| 亚洲国产精品一区二区三区在线| 精品少妇久久久久久888优播| 久久久国产欧美日韩av| 国产 一区精品| 中文字幕精品免费在线观看视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 亚洲欧美中文字幕日韩二区| 精品少妇黑人巨大在线播放| 亚洲国产欧美在线一区| 欧美成人午夜免费资源| 久久99蜜桃精品久久| 久久午夜福利片| 日韩精品免费视频一区二区三区| 最黄视频免费看| 国产精品熟女久久久久浪| 亚洲成av片中文字幕在线观看 | 女人被躁到高潮嗷嗷叫费观| 欧美日本中文国产一区发布| 99热国产这里只有精品6| 不卡av一区二区三区| 国产深夜福利视频在线观看| 男女免费视频国产| 99久久综合免费| 久久狼人影院| 美女国产视频在线观看| 如何舔出高潮| 老鸭窝网址在线观看| 久久精品久久精品一区二区三区| 女人被躁到高潮嗷嗷叫费观| kizo精华| 国产爽快片一区二区三区| 成人亚洲欧美一区二区av| 久久久精品国产亚洲av高清涩受| 不卡av一区二区三区| 亚洲视频免费观看视频| 观看av在线不卡| 人人澡人人妻人| 另类精品久久| 在线观看人妻少妇| 高清黄色对白视频在线免费看| 777米奇影视久久| 国产片特级美女逼逼视频| 欧美精品高潮呻吟av久久| 欧美日韩综合久久久久久| 一区在线观看完整版| 激情五月婷婷亚洲| 国产精品熟女久久久久浪| 99久久人妻综合| 波野结衣二区三区在线| 汤姆久久久久久久影院中文字幕| 精品一区二区免费观看| 亚洲国产精品一区三区| 亚洲精品国产av成人精品| 蜜桃国产av成人99| 亚洲精品久久成人aⅴ小说| 亚洲成人av在线免费| 制服诱惑二区| 国产精品一区二区在线不卡| 人妻少妇偷人精品九色| 久久久久久久亚洲中文字幕| 99精国产麻豆久久婷婷| 日本wwww免费看| 国产精品久久久久久精品电影小说| 亚洲第一av免费看| 午夜福利网站1000一区二区三区| 国产精品三级大全| 丰满饥渴人妻一区二区三| 免费在线观看完整版高清| 男人操女人黄网站| 91精品国产国语对白视频| 国产亚洲精品第一综合不卡| 亚洲国产精品一区二区三区在线| 免费av中文字幕在线| 国产精品久久久久久精品古装| 深夜精品福利| 国产国语露脸激情在线看| 春色校园在线视频观看| 精品国产一区二区三区四区第35| 电影成人av| 国产片内射在线| 美女视频免费永久观看网站| 久久久久久久久久久免费av| 色吧在线观看| 男人爽女人下面视频在线观看| 久久久久久久亚洲中文字幕| 交换朋友夫妻互换小说| 欧美精品av麻豆av| 飞空精品影院首页| 国产av精品麻豆| 午夜久久久在线观看| 韩国av在线不卡| av有码第一页| 少妇人妻 视频| 男人爽女人下面视频在线观看| 国产不卡av网站在线观看| 欧美精品一区二区免费开放| 天美传媒精品一区二区| 亚洲图色成人| 香蕉丝袜av| 午夜久久久在线观看| 妹子高潮喷水视频| 日韩,欧美,国产一区二区三区| 又大又黄又爽视频免费| 咕卡用的链子| 男人添女人高潮全过程视频| 国产极品天堂在线| 黄色毛片三级朝国网站| 精品亚洲成a人片在线观看| 永久免费av网站大全| 丰满迷人的少妇在线观看| 免费黄网站久久成人精品| 免费观看av网站的网址| 国产精品 欧美亚洲| 欧美 日韩 精品 国产| 欧美激情高清一区二区三区 | 亚洲色图综合在线观看| 久久久久久人人人人人| 99国产综合亚洲精品| 国产男女内射视频| 久久久久久免费高清国产稀缺| 午夜福利在线免费观看网站| 亚洲综合色网址| 妹子高潮喷水视频| 国产男女超爽视频在线观看| 十分钟在线观看高清视频www| 亚洲欧美中文字幕日韩二区| 欧美激情 高清一区二区三区| 亚洲国产av影院在线观看| 色婷婷久久久亚洲欧美| 久久久精品免费免费高清| 婷婷色综合大香蕉| 欧美 亚洲 国产 日韩一| 亚洲精华国产精华液的使用体验| 婷婷色综合大香蕉| 我要看黄色一级片免费的| 久久久欧美国产精品| 成人国产麻豆网| 久久国内精品自在自线图片| 1024香蕉在线观看| 欧美bdsm另类| 欧美国产精品va在线观看不卡| 久久亚洲国产成人精品v| 菩萨蛮人人尽说江南好唐韦庄| 欧美日韩av久久| 日韩,欧美,国产一区二区三区| 亚洲精品乱久久久久久| 人妻系列 视频| 亚洲,欧美,日韩| 各种免费的搞黄视频| 黄网站色视频无遮挡免费观看| 90打野战视频偷拍视频| 日韩av免费高清视频| 中文字幕亚洲精品专区| 亚洲在久久综合| 精品国产乱码久久久久久小说| 人人澡人人妻人| 狂野欧美激情性bbbbbb| 亚洲欧美成人精品一区二区| 欧美xxⅹ黑人| 国产亚洲欧美精品永久| 欧美 日韩 精品 国产| 寂寞人妻少妇视频99o| 天美传媒精品一区二区| 国产精品麻豆人妻色哟哟久久| 免费人妻精品一区二区三区视频| 久久国产亚洲av麻豆专区| 亚洲国产看品久久| 哪个播放器可以免费观看大片| av不卡在线播放| 久久精品国产亚洲av涩爱| 一级毛片 在线播放| 一级黄片播放器| 黑丝袜美女国产一区| 久久午夜综合久久蜜桃| 日韩制服丝袜自拍偷拍| 男女下面插进去视频免费观看| 一二三四中文在线观看免费高清| 精品国产一区二区三区四区第35| 国产精品无大码| 欧美人与性动交α欧美软件| 亚洲精品一二三| 成人国语在线视频| 免费看av在线观看网站| 久久精品国产亚洲av高清一级| 亚洲国产精品一区三区| 少妇精品久久久久久久| 丝袜人妻中文字幕| 一区二区三区乱码不卡18| 久久毛片免费看一区二区三区| 如日韩欧美国产精品一区二区三区| 午夜91福利影院| 国产午夜精品一二区理论片| 亚洲av成人精品一二三区| 少妇熟女欧美另类| 精品国产一区二区三区久久久樱花| 亚洲国产精品一区三区| 国产精品麻豆人妻色哟哟久久| av免费观看日本| 国产精品99久久99久久久不卡 | 国产精品一区二区在线观看99| 夫妻午夜视频| av线在线观看网站| 这个男人来自地球电影免费观看 | 水蜜桃什么品种好| 最近中文字幕2019免费版| 国产精品一区二区在线不卡| 丝袜喷水一区| 看非洲黑人一级黄片| 水蜜桃什么品种好| 国产精品.久久久| 欧美少妇被猛烈插入视频| 日日啪夜夜爽| 国产极品天堂在线| 女性被躁到高潮视频| 国产精品一区二区在线观看99| 在线观看国产h片| 男人添女人高潮全过程视频| 久久精品国产自在天天线| 亚洲欧美精品综合一区二区三区 | 久久久久国产一级毛片高清牌| 亚洲精品成人av观看孕妇| av.在线天堂| 中文字幕av电影在线播放| 亚洲人成网站在线观看播放| 日韩不卡一区二区三区视频在线| 三级国产精品片| 国产成人精品久久二区二区91 | 亚洲欧洲日产国产| 国产在线一区二区三区精| 免费观看a级毛片全部| 97人妻天天添夜夜摸| 大陆偷拍与自拍| 国产av国产精品国产| 亚洲精品久久成人aⅴ小说| 亚洲av成人精品一二三区| 婷婷色av中文字幕| 肉色欧美久久久久久久蜜桃| 中文字幕av电影在线播放| 国产午夜精品一二区理论片| 国产精品亚洲av一区麻豆 | 亚洲精品中文字幕在线视频| 欧美xxⅹ黑人| 亚洲精品av麻豆狂野| 一区二区日韩欧美中文字幕| 十分钟在线观看高清视频www| 亚洲精品成人av观看孕妇| 满18在线观看网站| 少妇猛男粗大的猛烈进出视频| 亚洲第一青青草原| 欧美精品国产亚洲| 高清在线视频一区二区三区| 日韩av不卡免费在线播放| 国产在视频线精品| 欧美日本中文国产一区发布| 搡老乐熟女国产| 成年女人在线观看亚洲视频| 亚洲欧洲国产日韩| 妹子高潮喷水视频| www.av在线官网国产| 精品国产乱码久久久久久男人| 久久精品久久精品一区二区三区| 久久毛片免费看一区二区三区| 亚洲av福利一区| 欧美成人午夜免费资源| 香蕉国产在线看| 国产精品免费视频内射| 免费观看在线日韩| 大片免费播放器 马上看| 国产探花极品一区二区| 亚洲欧洲日产国产| 在线观看一区二区三区激情| 国产国语露脸激情在线看| 啦啦啦啦在线视频资源| 天天躁夜夜躁狠狠久久av| 国语对白做爰xxxⅹ性视频网站| 国产成人精品福利久久| 久久综合国产亚洲精品| 国产色婷婷99| 亚洲av.av天堂| 国产深夜福利视频在线观看| 91aial.com中文字幕在线观看| 午夜激情av网站| 久久人妻熟女aⅴ| 精品国产国语对白av| 久久久国产精品麻豆| xxxhd国产人妻xxx| 国产伦理片在线播放av一区| 午夜久久久在线观看| 国产日韩欧美在线精品| 色婷婷av一区二区三区视频| 如何舔出高潮| 大香蕉久久成人网| 麻豆乱淫一区二区| 电影成人av| a 毛片基地| 久久久久久久久久久久大奶| 美女国产高潮福利片在线看| 色94色欧美一区二区| 国产精品欧美亚洲77777| 女人高潮潮喷娇喘18禁视频| 亚洲欧洲国产日韩| 久久久久久久国产电影| 观看av在线不卡| 999精品在线视频| 黄片无遮挡物在线观看| 久久人人爽人人片av| 天天躁夜夜躁狠狠久久av| 曰老女人黄片| 国产成人精品无人区| 色婷婷久久久亚洲欧美| 最近中文字幕2019免费版| 丝袜美足系列| 成年女人在线观看亚洲视频| 日韩精品有码人妻一区| 丰满饥渴人妻一区二区三| 精品国产一区二区三区久久久樱花| 国产精品一区二区在线不卡| 国产av一区二区精品久久| 国产男人的电影天堂91| 国产精品久久久av美女十八| 十分钟在线观看高清视频www| 在线观看人妻少妇| 一级毛片 在线播放| 波多野结衣av一区二区av| 国产麻豆69| 国产亚洲av片在线观看秒播厂| 久久这里只有精品19| 久久精品国产鲁丝片午夜精品| 性少妇av在线| 精品亚洲成a人片在线观看| 日本vs欧美在线观看视频| 乱人伦中国视频| 精品一区二区免费观看| 新久久久久国产一级毛片| 成人国语在线视频| av在线app专区| 各种免费的搞黄视频| 一级爰片在线观看| 在线观看三级黄色| 青春草视频在线免费观看| 欧美中文综合在线视频| 久久婷婷青草| 伦理电影免费视频| 国产不卡av网站在线观看| 国产高清国产精品国产三级| a级片在线免费高清观看视频| 欧美精品av麻豆av| 国产成人午夜福利电影在线观看| 欧美精品av麻豆av| a级片在线免费高清观看视频| 久久综合国产亚洲精品| 中文字幕人妻丝袜一区二区 | 黄色毛片三级朝国网站| 国产成人精品福利久久| 国产成人a∨麻豆精品| 大香蕉久久网| 国产成人a∨麻豆精品| 波野结衣二区三区在线| 亚洲欧美一区二区三区久久| 精品国产乱码久久久久久男人| 99久国产av精品国产电影| 久久精品国产亚洲av高清一级| a级毛片黄视频| 男女啪啪激烈高潮av片| 国产精品国产三级国产专区5o| 国产精品成人在线| 亚洲国产欧美日韩在线播放| 最新中文字幕久久久久| 国产深夜福利视频在线观看| 日本vs欧美在线观看视频| 欧美精品高潮呻吟av久久| 欧美中文综合在线视频| 久久毛片免费看一区二区三区| 青春草亚洲视频在线观看| 日本黄色日本黄色录像| av卡一久久| 成年美女黄网站色视频大全免费| 日本欧美国产在线视频| 久久久久久久久久久免费av| 性色avwww在线观看| 国产福利在线免费观看视频| av女优亚洲男人天堂| 视频在线观看一区二区三区| 妹子高潮喷水视频| 国产欧美日韩综合在线一区二区| 亚洲精品国产av蜜桃| 极品人妻少妇av视频| 亚洲欧美色中文字幕在线| www.精华液| 亚洲精华国产精华液的使用体验| 美女xxoo啪啪120秒动态图| 久久久久精品人妻al黑| 亚洲成人手机| 香蕉丝袜av| 狂野欧美激情性bbbbbb| 久久99蜜桃精品久久| 午夜精品国产一区二区电影| 亚洲av男天堂| 美女中出高潮动态图| 国产精品 欧美亚洲| kizo精华| 啦啦啦在线免费观看视频4| 国产av码专区亚洲av| 高清欧美精品videossex| 国产精品 国内视频| 超碰97精品在线观看| 看非洲黑人一级黄片| 午夜福利视频在线观看免费| 高清av免费在线| 亚洲精品一二三| 国产1区2区3区精品| 男女边摸边吃奶| 国产日韩欧美视频二区| 成人手机av| 亚洲国产精品国产精品| 亚洲内射少妇av| 91精品三级在线观看| 亚洲欧美清纯卡通| 中文天堂在线官网| 999精品在线视频| 亚洲av男天堂| 人妻 亚洲 视频| 久久青草综合色| 一级毛片黄色毛片免费观看视频| 水蜜桃什么品种好| 免费观看a级毛片全部| 国产亚洲精品第一综合不卡| 国产精品免费大片| 尾随美女入室| av卡一久久| 成人毛片a级毛片在线播放| 蜜桃国产av成人99|