• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    2024-03-23 08:17:54NazikAlturkiRaedAlharthiMuhammadUmerOumaimaSaidaniAmalAlshardanReemahAlhebshiShtwaiAlsubaiandAliKashifBashir

    Nazik Alturki ,Raed Alharthi ,Muhammad Umer ,Oumaima Saidani ,Amal Alshardan ,Reemah M.Alhebshi ,Shtwai Alsubai and Ali Kashif Bashir

    1Department of Information Systems,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia

    2Department of Computer Science and Engineering,University of Hafr Al-Batin,Hafar Al-Batin,Saudi Arabia

    3Department of Computer Science&Information Technology,The Islamia University of Bahawalpur,Bahawalpur,Pakistan

    4Department of Computer Science,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,Saudi Arabia

    5Department of Computer Science,College of Computer Engineering and Sciences,Prince Sattam bin Abdulaziz University,Al-Kharj,Saudi Arabia

    6Department of Computing and Mathematics,Manchester Metropolitan University,Manchester,UK

    7Woxsen School of Business,Woxsen University,Hyderabad,India

    8Department of Computer Science and Mathematics,Lebanese American University,Beirut,Lebanon

    ABSTRACT The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.

    KEYWORDS Blockchain;Internet of Things(IoT);smart home automation;cybersecurity

    1 Introduction

    The Internet of Things(IoT)is an emerging domain linked with software programs and sensorsbased devices to program certain events to be controlled with smart devices either physically or remotely using Internet-based technology [1,2].It incorporates a variety of technical advances,including RFID,nanotechnology,sensor machinery,and smart technology[3],and sensor technology,to enable efficient information gathering and processing.Rather than being a standalone technology,IoT leverages significant advancements to bridge the gap that exists between the actual and the metaverse[4].In today’s fast-paced society,when individuals have hectic schedules,there is a growing demand for convenience and assistance in various aspects of life.While IoT encompasses a broad spectrum of research areas,this study specifically focuses on smart homes and related environment domains due to their user-friendly nature.A smart house is an automated home [5,6],where all the appliances are interconnected and controlled through a smartphone,tablet,or computer with internet connectivity.Home automation has gained significant attention in recent years as individuals prefer the capacity to manage and monitor their appliances remotely from anywhere in the globe.Consequently,home automation has become an essential requirement in today’s times.

    The Internet of Things(IoT)offers cost-effective and versatile solutions that enhance the quality of life for users,addressing everyday challenges.Previous studies have presented different home automation systems,incorporating multiple sensors [7,8].However,due to limitations in research efforts,it is important to outline the reasons behind proposing a comprehensive and well-structured system for home automation.

    ? The previously developed home automation systems have been associated with high costs and implementation challenges.

    ? A prior study’s Bluetooth-based home automation system necessitates undesired installation processes.

    ? The previously mentioned home-automation systems rely on Internet connectivity,which poses a limitation as there are areas where Internet access is not available.

    ? Earlier studies have been unsuccessful in developing a home automation system that ensures both security and safety.

    ? When it comes to intelligent decision-making mechanisms,the home automation systems suggested in earlier research fall short,especially in the security arena.

    Integrating security measures into home automation system design is a difficult procedure that requires the use of a formal risk analysis technique.It has been recognized as one of the main challenges in automating smart homes,underlining the need to handle this difficult yet vital task.To guarantee that a home automation system operates efficiently,it is essential to evaluate the key parameters that may contribute to system complexity.The lack of a GUI environment is a crucial element that is frequently absent in previously created home automation systems,which limits users’knowledge of how the system works.Existing home automation solutions lack device restoration capabilities and cannot predict electricity bills accurately,making them expensive and potentially harmful to home appliances.The proposed smart home automation system addresses these shortcomings.It allows users to manage and monitor sensors and appliances,and the associated mobile app enables users to modify their home design layout and perform other functions.This study has leveraged blockchain technology to implement secure communication and authentication between IoT devices,and to allow users to change device status.This efficient approach overcomes the limitations of previous solutions.To achieve this,we follow the following aims:

    ? This research introduces an economical home automation system that enables remote control of electrical devices without relying on devices that use IP.

    ? The proposed system is an IoT-based system that utilizes an accompanying mobile application.This app enables users to simply drag and drop components to conveniently create automated homes.

    ? A GSM modem is included in this automation system.This connection allows the management of household equipment such as security systems,lighting,and climate control via SMS.

    ? The projected system contains a device restoration function that enables users to return electronic equipment or appliances to their default settings.This functionality is useful for users who want to restore their devices to a previous state or factory setting.

    ? The developed system includes Raspberry Pi and Arduino implementations,as a crucial tool for electronics enthusiasts and amateurs.These tools are not only popular but also reasonably priced.Raspberry Pi is well-suited for networked applications due to its simple internet access,but Arduino is well-suited for live software and hardware implementations.

    ? The suggested system incorporates data logging features to help customers improve energy efficiency alongside the performance of their appliances and also includes a mechanism for intelligently categorizing the state of IoT devices.

    ? The proposed system incorporates blockchain technology to enable secure authentication and user identity.

    The rest of the paper is organized as follows:Section 2 gives a quick summary of current literature as well as important advances in IoT based solutions domain.Section 3 describes the used approach in this study for an efficient solution.Section 4 presents the data and techniques applied in experiments Section 5 describes how the suggested technique is implemented,including the software and hardware used.Section 6 contains the experimental findings,along with a detailed analysis.Finally,Section 8 brings the article to a close.

    2 Related Work

    This section focuses on the research gap in home automation systems and smart environments.Numerous research on smart buildings and smart homes have been undertaken.As an example,Gill et al.[7]utilized the ZigBee microcontroller to facilitate device connectivity within homes.However,this system lacks support for long-range communication and has low data transfer speeds.Similarly,Al-Ali [8] used a computer-based webserver for distant communication with household machines,despite it being a costly approach because of wire incorporation.Another research presented a phonebased controller for household appliances by[9],but GUI’s absence restricts its utility for consumers.Reference[10]created a unique hand-gesture-controlled home automation system,but it had problems effectively recognizing hand movements,causing users to be inconvenienced.

    In reference[11],authors created a home monitoring system for electronic gadgets by connecting electrical switches to the Internet.This technology,however,had a drawback in terms of secure transmission and communication between network devices.Reference[12]developed a home automation system that included GPRS and voice recognition in their study.However,the system lacked secure user identification and authentication.Similarly,Javale et al.[13]aimed to provide remote control of home appliances for elderly and handicapped individuals using an Android APK.But,the system’s functionality is restricted,only automating light controls and power toggling for electronic devices.

    In reference[14],authors sought to create a Bluetooth-enabled cellphone-based home automation system.However,the graphical user interface (GUI) of the system is only compatible with cell phones running the Symbian operating system,and the Bluetooth range is restricted to 100 meters.Similarly,while Sriskanthan et al.[15] used Bluetooth-based technology,their suggested approach encountered difficulties due to the invasive nature of the installation procedure.In recent years,blockchain technology has gained attention for its reliability.By introducing blockchain into their approach,Farshidi et al.[16]overcame the technology selection challenge.Furthermore,as illustrated by[17],blockchain technology is used in e-government services by researchers.

    The threat landscape for network security has significantly worsened due to the increase in cyberattacks and intrusion tactics.In addressing this issue,Ding et al.[18]proposed an effective anomaly detection technique that considers the complex patterns of communication between network topology and node attributes.In a study by[19],researchers examined cyber-attacks that occur recently,utilizing AI-based techniques,and identified several mitigation approaches to counteract such AI attacks.Reference[20]created an authentication mechanism tailored to RFID systems.The authors explored the integration of blockchain technology applications with the IoT to develop an energy-efficient system[21].In another work[22],the authors incorporated a Blockchain network into the surveillance system.

    In reference[23],researched Internet of Things-based cyber-attacks,explored defense techniques,and emphasized the issues connected with them.Reference [24] provided a method for evaluating the security of block cyphers that are optimized for GPU computers and are based on the branch and bound technique.Reference[25]built an effective certificate-less signing architecture using blockchain technology.Reference [26] used Arduino Tmega2560 and IoT technology to help disabled people monitor and operate their household appliances.The suggested system,however,lacked a secure authentication scheme for users.Reference[27]proposed using an Elegoo Mega 2560 controller and a web server to create an automated door-opening system at workplaces or houses.This approach,however,necessitated the storage of information about the signals sent by multiple transmitters and did not allow safe authentication.Reference[28]incorporated Arduino UNO,ESP-8266,and Wi-Fi for connection in an effort to build a system to manage household appliances remotely.However,this system had delays while turning on or off appliances.Reference[29]created a secure and energyefficient home automation system employing a wireless sensor network.However,this device is pricey and only provides temperature control.

    Current home automation systems suffer from significant limitations,including poor long-range communication support,slow data transfer,high costs,lack of secure authentication,restricted functionality,and compatibility issues.Additionally,while blockchain technology has demonstrated promise in other areas,its potential to improve home automation remains untapped.To address these shortcomings and enhance user experience,convenience,and safety,further research and innovative solutions are necessary.Bridging this research gap will lead to more efficient,secure,and user-friendly smart home systems that meet the needs of modern consumers.

    2.1 Research Gap and Challenges for Smart Home Automation System

    In this section,we have identified some of the research gaps that this work addresses.Addressing these challenges and filling these gaps is essential for the continued growth and development of smart home automation systems.

    1.Interoperability:Compatibility issues between devices from different manufacturers can hinder a smart home’s seamless operation.This research proposes an app that runs on all smart devices.

    2.Security Concerns:Smart devices are vulnerable to hacking and cyberattacks,which could expose personal data or compromise home security.This research proposes a blockchain-based security framework for smart home automation that is significantly more secure.

    3.Complex Installation and Setup:Setting up and configuring smart home devices can be challenging for non-technical users,so we designed simplified setup processes and user-friendly interfaces that allow users to set up their entire home prototype with a drag-and-drop interface.

    4.Cost:High upfront costs can deter homeowners from adopting smart home systems.This research proposes automating daily usage appliances to smart devices,which significantly reduces the cost of smart home systems.

    5.Energy Consumption:This research proposes a unique automatic ON/OFF predictive model that turns electrical devices on and off according to their usage pattern.

    3 Proposed Approach

    This study presents a smart home automation system that allows users to remotely control and monitor various appliances in their homes,such as lighting,ventilation,air conditioners,heating,and sensors.The system is designed to be both time-efficient and energy-efficient,providing users with insights into device energy use.This cost-effective and energy-efficient solution has the potential to be deployed in a variety of settings,including hotels,restaurants,domestic households,and industrial environments.The system features a user-friendly graphical user interface (GUI) and a notification system with an icon-based interface,allowing users to receive notifications and stay connected to their homes from anywhere in the world.Furthermore,the suggested system is cost-effective since it can automate routinely used electrical equipment at home,removing the requirement for specialized IP devices such as RJ-45[30].The suggested automation system is depicted in Fig.1 in a visual manner.

    Figure 1:Schematic diagram of IoT-based smart home system

    The suggested system includes an admin panel that allows users to easily create a layout of their home using a drag-and-drop interface.The process starts by adding floors to the layout,followed by adding rooms to the selected floor.Users may then add appliances to each area and place them according to the room’s real construction[31].The UI also allows you to customize the house layout by adding unique gadgets,rooms,or stories.A user’s home structure is synchronized in JSON format with a server when the user has completely configured his home layout in the admin panel and the database is updated accordingly.This synchronization process utilizes VOLLEY for updating the database[32].After syncing,the user can log in to the admin panel using their credentials and access the home structure.It takes approximately 30 s for the database to be synced and available in the admin panel.The application interface displays precise information about each level as well as the various equipment in the house.The bottom of the main screen contains three tabs.One tab reveals sensor status,while the other one provides device activity history and the identity of the person who altered the state of a given device.The third and last tab in this navigation menu allows the user to exit the application.Data durability is ensured by managing user credentials through shared preferences.

    Furthermore,a supervised learning classifier is utilized to divide the status of household gadgets into two categories: “OFF” and “ON.” This classifier is trained using the devices’use habits.The classifier’s input data contains categorical variables such as,device_id,floor_id,and room_id alongside continuous numeric values such as device_time,room_light,room_temperature,and the device’s current state.To select the best predictive model for the classification task,a comparative analysis is conducted,evaluating the performance of various conventional models.The model with the highest performance is chosen for implementation in the system.Furthermore,credentials’authentication and secure communication are guaranteed in our anticipated system between IoT devices and users that request status updates.This is accomplished by using blockchain technology,which ensures secure data transmission across smart home apps,servers,devices,and consumers.

    3.1 Exploring the Potential of Blockchain for Enhanced Home Automation Security

    The key focus of a home-automated system is to offer secure and reliable authentication and identification for IoT devices.To achieve this,we have implemented blockchain technology,which guarantees these objectives.Reference [33] invented blockchain technology,which has important qualities such as anonymity,decentralization,and security[34].The IoT may construct a highly secure central server using blockchain technology,decreasing reliance and improving overall security.

    Blockchain technology is leveraged in IoT-based smart homes to create a secure and organized data structure.Timestamping,encryption,hash functions,and Java-based modules are used to ensure data integrity and protect sensitive information.Additionally,the blockchain administers connectivity authorization,enhancing security,and trust within the smart home network.The verification of blockchain integrity through hash comparisons adds an extra layer of security,making it a robust solution for IoT-based smart home environments.

    Timestamping:Timestamping is a fundamental feature of blockchain technology.It involves recording the exact time at which a transaction or data entry occurs.In the context of IoT-based smart homes,timestamping is crucial for maintaining a chronological record of events,such as when devices are activated,sensors collect data,or commands are executed.Timestamps help establish the order of events,ensuring data consistency and enabling forensic analysis if needed.

    Data Encryption:Data encryption is employed to protect the confidentiality and integrity of data stored on the blockchain.In IoT-based smart homes,sensitive information such as user preferences,security codes,or personal data may be transmitted and recorded on the blockchain.Encryption ensures that this data is only accessible to authorized parties,preventing eavesdropping or data breaches.

    Hash Functions:Hash functions are cryptographic algorithms that generate a fixed-size output(the hash)from an arbitrary input.In the context of blockchain,hash functions are used to create a unique identifier(hash)for the contents of each block.This hash serves as a digital fingerprint of the block’s data.Any change in the block’s data,even a single character,will result in a completely different hash.This property ensures data integrity,as any tampering with the data can be easily detected by comparing hashes.

    Blockchain Module in Java:Java is a widely used programming language known for its portability and security features.In this context,a blockchain module implemented in Java likely refers to a software component responsible for managing the blockchain.This module would handle functions like block creation,hashing,validation,and interactions with other components of the smart home system.

    Connectivity Authorization via Blockchain Administration:This phrase suggests that blockchain technology is used to manage and authorize connectivity between IoT devices within the smart home network.Each device’s identity and access permissions are recorded on the blockchain.When a certain condition (e.g.,user approval or authentication) is met,the blockchain’s administration component grants authorization for devices to connect and communicate securely.

    Integrity Verification:Ensuring the integrity of the entire blockchain is essential.The lines mention that the blockchain’s integrity is authenticated by comparing the hash values of preceding and subsequent blocks.This is a critical security feature.Blockchain’s immutability ensures that once a block is added to the chain,it cannot be altered without changing the data and recalculating the hash.By comparing hash values,the system can quickly detect any unauthorized changes or tampering attempts,maintaining the trustworthiness of the blockchain.

    3.2 Workflow of Blockchain Security

    Furthermore,timestamping and data encryption are used in this technology to provide a wellorganized data structure.The suggested solution uses the hash function as the unique identifier for the contents of each block to construct the blockchain module in Java.Each block’s SHA-256 hash is computed to get a block hash.When a certain condition is met,the block is created by providing connectivity authorization via blockchain administration.The integrity of the whole blockchain is authenticated by comparing the hash values of preceding and subsequent blocks.A user’s connection request is authenticated using the Fig.2 illustrated method.The blockchain technology working is described in Algorithm 2 in further depth.This Algorithm 2 outlines the process of creating,hashing,storing,validating,and potentially repeating steps to maintain the integrity and security of the blockchain.While Fig.2 depicts the process of installing blockchain.

    The procedure begins with the creation of a block using a Java block class.Relying on the data string,the previous hash,and the timestamp,this class computes the hash value.SHA-256 method is used to generate a hash after the block is created.The created blocks are then saved.The blockchain is then validated by comparing the computed hash value with the stored hash value.If the hash values before and following are the same,the user is allowed access.If the hash values mismatch,the whole process is restarted afresh.

    4 Material and Methods

    This section demonstrates the data collection,visualization,and supervised machine learning methods used to determine device status.

    4.1 Data Collection and Visualization

    The application produced captures data,which is subsequently saved in an Excel file.Subsequently,this data undergoes analysis to examine the connections and associations among different attributes.Light,temperature,and smoke measurements are included in the attribute data.A number of 0 in the status column indicates“OFF,”whereas a value of 1 indicates“ON.”

    The scatter plot in Fig.3 demonstrates the link between temperature and smoke,the x-axis displays the temperature values and the y-axis prints the smoke values.Temperature values are also displayed on the y-axis,while light readings are presented on the x-axis.A scatter plot demonstrating the relationship between smoke and light is shown in Fig.4 with smoke values on the x-axis and light values on the y-axis.Fig.5 is a kernel density plot,which provides a visual depiction of the data distribution.

    Finally,Fig.6 depicts the state of light and smoke,with“ON”denoting 1 and“OFF”denoting 0.The status values are shown on the x-axis,while the equivalent values are shown on the y-axis.

    To ensure continuity in the event of a power outage or Raspberry Pi restarts,all devices are configured to revert to their previous states.This is accomplished by utilizing a database server to maintain and retrieve the last state of each device.Regular updates are scheduled for the devices installed in the home.For instance,if the home temperature exceeds a specific threshold,ventilation fans are automatically activated.Light sensors are fitted to manage the time of lights while keeping the day and night cycles in mind.The project is sturdy and different since it contains features such as sensor updates,data logging,Raspberry Pi compatibility,a cloud-based database,and deep learning models.The system is designed to be flexible and user-friendly,with customized device designs tailored to the specific requirements of each house.

    Figure 2:Flowchart of the implementation of security through blockchain technology

    Figure 4:Scatter plot depicting the relationship between light and smoke

    4.2 Supervised Learning Algorithms

    Extensive trials are needed to evaluate the condition of appliances using cutting-edge models in this research.Several deep learning and ML models are used for this specific purpose,as described in the following sections.

    4.2.1 Random Forest

    RF creates several trees and then uses these trees randomly to reduce variation.It has reaped a lot of traction in the literature for dealing with grouping and regression challenges.RF uses a bagging approach to create predictions by aggregating the findings by majority vote.A bootstrap subset of the original data is used in this approach[35].RF working principle is written as:

    The final output,denoted by“p,”is determined through majority voting among the predictions of the individual trees,represented asT1,T2,andTm.

    Figure 5:Scatter plot between smoke and light

    Figure 6:Scatter plot smoke status

    4.2.2 Support-Vector Machine

    The support-vector machine (SVM) stands as a potent machine-learning method capable of addressing classification as well as regression tasks.It achieves this by transforming the data using the kernel trick and establishing an optimal boundary line,known as hyperplanes,between different outputs.These hyperplanes effectively separate data points of one type from another.The fundamental approach of data classification involves constructing a function that assigns consistent labels to the data points while minimizing errors or maximizing the margin.A larger margin around the separating function results in fewer errors.By constructing the function,the labels become better isolated from each other.In this case,the linear kernel is employed,which provides high accuracy while minimizing time complexity.The regularisation parameter C is set at 2.0.For likelihood calculations,500=the option random state is used.

    4.2.3 Logistic Regression

    LR [36] is a popular approach for dealing with classification difficulties.It is a statistics-based model and study method that functions on the basis of the probability notion.It is particularly effective when working with binary data and aims to determine the output using one or more variables.Logistic regression employs a sigmoid function,also known as a logistic function,which establishes a relationship between the categorical data.The sigmoid function converts any input value into a number ranging from 0 and 1,producing an S-shaped curve.This enables logistic regression to estimate the likelihood of a specific class or event.The number given in logistic regression refers to the real numerical value to be translated,where “e”is the natural algorithmic base.To optimize the model,logistic regression is used with 100 iterations(max_iter).The parameter“penalty”is set to“12,”which determines the model’s penalization norm.

    4.2.4 Stochastic Gradient Descent

    SGD[37]is a method that uses the one-vs.-all techniques to merge many classifiers.It is suited to large datasets because it uses all data sampling in every repetition.Because of its fundamental idea,its implementation is simple.It is,however,sensitive to feature scaling,and proper hyperparameter values are required.It is a linear classifier whose cost function is regularised linear models.It provides regularised linear models with learning in order to generate an estimator.This classifier offers ease of use,and efficiency,and performs effectively with large datasets.You can utilize the sci-kit package to implement the stochastic gradient descent classifier.

    4.2.5 Decision Tree

    DT[38]is a basic yet effective supervised machine-learning technique that works well with both numerical and categorical input.It is extremely adaptable and has been widely used in a variety of disciplines.One of the primary benefits of decision trees is their simplicity in implementation.Decision trees utilize decision rules and feature subsets at various levels of classification.It is composed of branches with internal and leaf nodes.Feature is a representative of internal nodes while feature combinations are represented by branches leading to grouping.Every leaf node is a class representing an example.The construction quality of a DT is the hallmark of its performance on the training datasets.The decision tree is limited to a maximum growth of 300 in this example by max_depth setting=300.

    4.2.6 Gradient Boosting Machine

    GBM is a strong learning classifier made up of multiple weaker classifiers[39].GBM is based on decision trees and builds separate trees,resulting in a longer execution time.The algorithm has been improved through tweaks,specifically the PAC(probability approximately correct learning)algorithm,which enhances its performance.GBM handles missing values effectively and hence performs well on raw data.GBM requires a segregated loss mechanism to work.While regression methods commonly use logarithmic loss,classification algorithms can also utilize it.The advantage of GBM is that it can employ any differentiable loss function instead of creating a new one for each boosting iteration.Several hyperparameters in GBM must be tweaked to attain great accuracy.Setting “n”to 100,for example,shows 100 trees contributing to the forecast.Averaging all 100 decision trees’projections is needed to arrive at the final projections.The“max_depth”option can be used to limit the maximum depth of 60 levels.

    4.2.7 Extra Trees classifier

    The Extra Trees Classifier (ETC) algorithm [40] is comparable to the Random Forest (RF)technique but builds trees differently.Unlike RF,ETC uses original data to construct trees rather than using samples from bootstrap data.In ETC,decision-making is based on random data sampling from the k-best characteristics.The Gini index is used to find the top feature for dividing the tree.ETC and RF are regarded as equivalent since both are ensemble learning models used for categorization.The main distinction between ETC and RF lies in how the trees are constructed within the forests.In ETC,K features’random samples are drawn from feature collection randomly and distributed to each tree’s test node.

    4.2.8 Long Short Term Memory

    LSTM is a deep learning prototype and is an extension of the Recurrent Neural Network RNN[41].The LSTM contains a forget gate(fk),an input gate(ik)and an output gate(ok).Data is channelled via these gates,retaining significant data while discarding useless information based on the set dropout value.The LSTM model also includes a memory block calledCk,where important information is stored.There are various variants of LSTM,and the one used in this study is represented by Eqs.(3)–(5).

    The symbolsWandVin the LSTM model’s Eqs.(4)–(6)denote the related weights with the matrix components.The hidden state up to thek-1 time step is represented byh,whereas the characterskrepresents the input at that moment of the time step.The bias term is represented by the symbolb.At thek-1 time step,the memory block cell,represented byc,is modified.All neurons in the LSTM’s output layer are linked to every neuron in the dense layer,suggesting a completely connected structure.

    4.2.9 Convolutional Neural Network

    CNN is a deep neural network that learns complicated characteristics by using pooling layers and convolution layers [42].CNNs are frequently used for image segmentation and classification.The layered CNN model’s resilience is enhanced by end-to-end training.As a feed-forward network model,the convolution layers of CNNs collect input data by using filters to the preceding levels’output.Activation layers,pooling layers,dropout layers,and fully linked layers are also included in CNN models.Pooling layers aid in feature selection by lowering feature dimensions,and they may be implemented as average or max-pooling.The preceding layers’output is sent to the completely linked layers,which decide the final outcome.Dropout layers are employed to avoid overfitting.The activation function is critical in identifying the significance of input information.

    The activation function’s output is represented byy,while the input is represented byi.The convolutional layers in CNNs extract high-level features during the training process using weights.To compute the loss function,cross-entropy is commonly employed,as shown in Eq.(7).

    The class labels are represented byi,and the anticipated probability is represented byp.The sigmoid function is used to forecast output in CNN models,which are an extension of the backpropagation model.A CNN model generating output for two target classes is represented by multiple neurons in its output layer.When the device is in the“ON”state,the first neuron will have an output 1 and 0 for the other neurons.In the“OFF”state,the values are inverted,with 1 for the first neuron and 0 for the others.

    4.2.10 Proposed(RF-CNN)

    Voting classifiers integrate the findings of many classifiers to generate a final voting-based conclusion.Soft voting and hard voting are the two forms of voting classifiers.Soft voting is used to determine each classifier’s weight,whereas hard voting is used to forecast classifier outputs.This prototype predicts the final outcome by multiplying class likelihood by classifier weight and then averaging the results for each entry.In our study,we combine a voting classifier,an RF,and a CNN to outperform previous strategies for predicting device status.Algorithm 2 demonstrates the process employed by the projected voting classifier,while the comprehensive pseudocode for the proposed model is provided in Algorithm 3.

    Figure 7:RF-CNN architecture

    5 Implementation Detail

    Fig.1 illustrates the suggested model’s entire functionality,demonstrating the integration of numerous devices to provide a thorough knowledge of solutions to smart homes.Here a project’s flow is shown as an arrow path for managing equipment’s status from a user’s smartphone.Depending on their location,the user can interact with a server based on the Raspberry Pi through two modules[43,44].The first module allows for interaction with IoT devices in the home without the need for an internet connection.Quick communication between the user and the device is ensured by using a local network,which is obviously the biggest advantage of this module.Internet access is required for the second module to function,as it allows global access to the device irrespective of the global position of the user,but functions only when the user is away from the home network.In this example,the connection request is sent to the Microsoft Azure Cloud for processing[45].The credentials are then entered,which are synced with a database of Azure and routed to the appropriate server(Raspberry Pi) for processing.Individual account management is ensured by Microsoft Azure Cloud’s usage of different databases for each user.When a request is initiated,services are offered to each user based on the credentials they enter.APIs are available in the cloud,even if the user is not connected to their home network.But if the user is connected to their home network,the Raspberry Pi server stores copies of the same APIs.

    Data in JSON format is sent between the server and the user during communication.APIs are secured using hashing algorithms.The Raspberry Pi GPIO pins[46]are used to control and modify electronic devices’status in the system.When a request is delivered,the Raspberry Pi receives it and connects with the devices based on the user’s request.The requests of the users are saved in a cloud database.This configuration allows the examination of complete user interactions on their smartphone by setting a time period.Every 30 s,the sensors in the home update their status and synchronize with the server.As a consequence,the Raspberry Pi synchronizes data from the whole database stored on the cloud and changes the mobile application values.

    5.1 Hardware Components

    As shown in Fig.1,the proposed system integrates a wide range of sensors and electrical components.This section contains a detailed explanation of the hardware components used in the system.Table 1 summarises these components for simple reference.

    Table 1:Details of the hardware components used in designing the smart home automation system

    The Raspberry Pi is a low-cost,single-board computer(SBC)built primarily for computer science instruction in educational institutions and developing nations.It has an ARM Cortex-A7 quad-core CPU with 900 MHz clock speed and 1 GB of RAM.The Raspberry Pi has a 100 Mbps Ethernet connection a card interface,four USB ports,and 40 GPIO pins.It also has full HDMI compatibility,enabling for camera use,and is SD card compatible.It also has a 3.5 mm audio connection for audio communication and enables composite video output.A relay is an electrical device that is commonly used in automatic control circuits.It consists of an output circuit called a controlled system or output contractor,and an input circuit called a control system or input contractor.The relay functions as a switching device,for automatically controlling the high-current circuit by using the low-current signal.It operates using electricity and serves to regulate the flow of electrical power within a circuit.

    L293D[47]is a monolithic integrated driver that provides four channels for high-current and highvoltage applications.This implies that by utilizing the chip L293D,power sources and DC motors with voltages of up to 16V,including reasonably big motors,may be incorporated per channel.A maximum current of 600 mA may be delivered by the chip circuit.This chip(L293D)is composed of serial HBridges,which are electrical circuits capable of supplying power across a load,such as a motor,in any direction.

    A single-wire temperature sensor interface DS18B20 allows users to easily measure and record temperature.It uses a bus communication system,allowing multiple devices to be connected While reading their temperature readings requires only a single Raspberry Pi GPIO pin.

    The MQ2 sensor,also known as a chemiresistor,is a popular choice for detecting smoke and various gases in the MQ2 sensor series.It operates by detecting changes in resistance within its sensing element when it comes into contact with smoke particles.A main voltage divider network may be used to assess the concentration of smoke.The MQ2 sensor can detect CO(carbon monoxide),C3H8(propane),CH4(methane),H(hydrogen),smoke,alcohol,and LPG,with detection ranging from 200 to 10,000 parts per million(ppm).It is powered by a 5 V DC power source and consumes around 800 milliwatts(mW).

    The module named GSM is equipped with a dual-mode that is commonly used in embedded applications and the Internet of Things(IoT).It operates within the frequency range of 900 to 1,800 MHz.One notable advantage of the GSM module is its low power consumption requirement.It has a multislot class functionality,such as class 8 and class 10,which allows for efficient data transfer.The TXD and RDX pins receive and transfer data,running between 3.4–4.5 V.Any voltage above this range can damage the module.

    5.2 Software Components

    Many mobile application development platforms are there,including Android,iOS,Windows Mobile,and Symbian.This project is completely developed using the Android platform due to its immense popularity and widespread use throughout the world.Almost every smartphone manufacturer supports Android applications,making it a flexible platform.The Android Software Development Kit(SDK)in the Java programming language is used for the development and implementation of the proposed smart home system.The Android SDK includes a complete set of tools and resources for developing Android apps.

    Android APKs are created using Android Studio in this project[48].It includes tools like libraries,handset emulators to test apps on different handsets without purchasing them,and debuggers.The Volley library,which provides easy functions for managing sensor data,is included in the project to enable the integration and use of numerous sensors.Furthermore,by utilizing the Material Design toolkit,the Android application gains an interactive user interface.In this project,LAMP is used,an abbreviation for Linux,Apache,MySQL,and PHP,as a backend development framework on the cloud within the Raspberry Pi environment.

    5.3 User Interface:Navigating the Smartphone App

    The smartphone app is designed with the following characteristics.

    Modules:The app contains two distinct modules to enhance user experience.In theAdmin module,users can effortlessly create a digital prototype of their home by employing a user-friendly drag-anddrop interface.Each component in the prototype corresponds to a specific Raspberry Pi pin,enabling seamless backend control of various electronic devices.

    Theuser moduleprovides users with a visual representation of their home design,as created in the admin module.It allows users to manage and control their electronic devices conveniently as shown in Fig.8.The main page of the mobile application furnishes users with essential information about the home,including floor layouts and the inventory of installed gadgets.Navigation between various functions is facilitated through a tabbed layout.

    Figure 8:Operations of household gadgets

    Intuitive and Interactive GUI:The graphical user interface(GUI)boasts a visually appealing and user-friendly design that simplifies user interaction as shown in Fig.9.Dynamic icons change to reflect the real-time status of electronic devices.Users can easily toggle device states using responsive touch buttons.Moreover,an interactive intensity bar permits users to adjust fan speed and light brightness effortlessly.Active devices are clearly labelled as“active,”while inactive ones are indicated as“inactive.”

    Real-Time Sensor Monitoring:The second tab on the home screen enables users to monitor sensor data,such as temperature and light levels,in real time as shown in Fig.10.These sensor readings are updated every 30 s via the backend,ensuring users stay informed about their environment.For instance,Fig.11 displays a light sensor value of 0.0,indicating that it is in the “OFF” mode and detecting daylight.

    Figure 9:User Interface on the screen

    Figure 10:Household appliances’s state

    Figure 11:Sensor data

    Comprehensive Device History:The third tab on the home screen provides users with detailed insights into the history of their devices.The system maintains an extensive log of user activities,including changes in device states,accompanied by timestamped records.This log allows users to track the duration for which electronic devices have been active or inactive.

    Efficient Energy Management:The system proactively notifies users when a device has been in an“ON”state for more than 2 h,encouraging responsible energy consumption.This feature promotes power monitoring,whether users are present in the room or there’s excessive electricity usage,as illustrated in Fig.12.Furthermore,the mobile app facilitates electricity consumption calculations based on the power usage data of electrical appliances and the corresponding timeframes.

    Figure 12:History log

    6 Experiments and Results

    Fig.13 illustrates the project’s functionality.The suggested framework is divided into a couple of scenarios.Remote access is handled by the first scenario for users who are not at home and make use of a Microsoft Azure cloud database.The user’s request is routed to the cloud using their APIs.The second scenario concerns individuals who are directly linked to a Raspberry Pi from within their houses.Fig.14 shows how user queries are sent to the Raspberry Pi,and then to either the cloud.Without relying on the cloud,local processing allows for speedier processing.

    Figure 13:Schematic diagram of connectivity with cloud database Microsoft Azure

    6.1 Results

    Extensive tests have been carried out utilizing powerful classifiers to assess the status of the appliance in smart home automation.support vector machine,random forest,decision tree,logistic regression,extra tree classifier,gradient boosting machine,convolutional neural network (CNN),long short-term memory (LSTM),and voting classifier (RF-CNN) are the classifiers used in these experiments.The documented data has been split into 70:30 training and test sets.All tests are run on a Dell PowerEdge serverT430 GPU with a capacity of 2 GB,as well as 2xIntel Xeon eight-core CPUs running at 2.4 GHz and 32 GB DDR4 RAM.The studies are carried out in the Jupyter Notebook environment using the Python programming language and Anaconda.TensorFlow,sci-kit-learn,and Keras are used to build the classifiers.Table 2 shows the classifier’s predictions of the“ON”and“OFF”classes for household appliances.

    Table 2:Experimental results of all classifiers

    Figure 14:Schematic diagram of connectivity with a local database

    SVM(91.4%),voting classifier(RF-CNN)(98.9%),gradient boosting machine(87.7%),decision tree (92.7%),Random forest (93.9%),logistic regression (93%),stochastic gradient descent (90.8%),and extra tree classifier(93.8%)achieved the highest accuracy values.Deep learning models such as CNN (96.6%) and LSTM (91.6%) are also used.It is worth mentioning that the voting of the two best-performing models,RF from machine learning and CNN from deep learning beats other models in predicting the state of household appliances,with a 98.9% accuracy rate.RF is computationally simple and often demonstrates superior performance due to its reliance on decision tree interpretation.However,the gradient boosting machine performed poorly in this circumstance,possibly due to challenges in tuning.Deep neural networks,including CNN,require ample training data to yield optimal results.When comparing CNN with RNN,CNN exhibits higher feature compatibility,RNN,on the other hand,excels at dealing with random input or output.LSTM works well with sequential data,whereas CNN investigates spatial relationships among features and works well with categorical data.As a consequence,CNN emerges as the best classifier for forecasting the status of domestic appliances and may be utilised to make sound decisions.

    6.2 Significance of Proposed System

    Combining Random Forest and CNN in an ensemble for classification tasks leverages the strengths of both models,resulting in improved accuracy,robustness,and the ability to handle diverse and heterogeneous data sources.Some useful aspects of using this ensemble are:

    ?Feature Diversity:Random Forest and CNN excel in extracting different types of features.Random Forest focuses on feature importance,while CNN learns hierarchical features from raw data.Ensembling these models ensures a more comprehensive coverage of feature space.

    ?Reduction of Overfitting:Ensemble methods often reduce overfitting because they combine multiple models that have different sources of errors.This can lead to more stable and reliable predictions.

    ?Interpretability:Random Forest provides feature importance scores,allowing you to interpret which features contribute the most to the classification decisions.This can enhance your understanding of the classification process and help identify important factors in the decisionmaking process.

    ?Reduced Risk:Ensembling can reduce the risk associated with relying on a single model.If one model fails to capture certain patterns or makes errors on specific instances,the ensemble’s collective decision-making can compensate for these shortcomings.

    ?Robustness:Random Forest is known for its robustness against overfitting,making it a valuable component in the ensemble.CNN,on the other hand,can benefit from this robustness when dealing with limited data.The ensemble’s overall performance can be more stable and reliable.

    Furthermore,In order to check the significance of the suggested system,it is compared to previously suggested home automation system mock-ups.Several important elements are addressed while doing a performance comparison.Among these aspects,the type of devices or sensors used has a significant impact on installation and costs.Furthermore,the suggested system includes advantageous controls including concurrent sensor data,sensor data automatically recorded for optimization based on user preferences,remote accessibility,and a mechanism for system recovery.Table 3 compares home automation systems with our proposed system,highlighting the performance benchmarks considered for comparing them.Our suggested system separates itself from other systems for its extensive collection of features and functions,which are presented in Table 3.It makes it easier for the user to create a personalized home model and strategically deploy individual equipment as per the layout of the area to engage with electronic gadgets.

    Table 3:Evaluation of the proposed system’s performance relative to previous systems

    7 Analysis of Risk Associated with IoT Smart Home

    In the future,IoT-based smart home automation will be an area of utmost importance.With the ever-increasing number of smart devices in the homes including TVs and energy management systems,the need of an hour is to protect the households against possible security and safety threats and the impact on their lives.Reference [57] classified hazards into five broad categories including communication,information,and human-related hazards.Insufficient accountability of the internal gateway and the lack of system event logs for traceability are among the biggest software risks.The most serious negative impact is linked to poor authentication in the application programming interface(API).Unauthorized changes to system operations via mobile applications,providing access to end user’s system resources without the appropriate authentication,have the greatest risk value.Unauthorized tampering or alteration of physical detectors are examples of hardware dangers.The inadequate distinction of user account credentials is classified as an information risk.Communication concerns include the server’s possible deletion.Human-related hazards are associated with the use of weak or readily guessable passwords,as well as end users’susceptibility to fraud.Design phase security measures implementation in smart home system development is needed to address the privacy concerns related to such systems.A complete approach that addresses both security and privacy issues becomes critical.The next concern is how to build such a model,including the crucial aspects required to maintain security and privacy.The following stages are advised by this study to be included as minimum requirements in the model:

    ? During the transfer of personal data in the context of smart homes,identification and classification are performed.

    ? The key dangers and challenges to privacy and security are assessed and described.

    ? The objective is to discover and apply proactive,investigative,and reactive strategies to mitigate risks and enhance security measures.

    ? Developing a comprehensive plan to effectively manage information within smart homes while ensuring the protection of privacy.

    Additional work is required to develop a framework to categorize the data collected,warehoused,updated,and shared by smart homes.This involves more work on developing a user-generated approach for managing data in smart homes,alongside integrating it with the digital ecosystems with which they interact.However,it is critical to recognize that the suggested approach is limited and requires improved privacy and security measures,particularly in cyber-network situations.

    8 Conclusion

    This research presents a comprehensive overview of a smart home automation project and its features.The main goal is to develop a user-friendly and customizable system that allows users to make informed decisions about the status of their appliances at home.The proposed system has two modes:admin and user.These modes are designed to perform specific tasks.The admin mode allows users to create a layout of their homes for automation tasks,while the user mode allows users to operate specific home appliances through a GUI.Users can manage the state of each device based on their previous usage patterns and data.A voting ensemble learning model based on random forest and convolutional neural networks (CNNs) aids in decision-making for detecting the “ON” and“OFF”status of household appliances.Additionally,the proposed framework leverages blockchain technology to authenticate IoT devices.The need for intelligent and flexible decision-making in home automation cannot be overstated in today’s world.Risk analysis highlights the importance of incorporating security and privacy safeguards into the design of smart home systems.This home automation project also offers a simple,versatile,reliable,and affordable solution.Deep learning models will be used in the future to improve the system’s decision-making efficiency.Two future research directions for the current proposed work are: (1) Integrate edge computing into the smart home architecture to process data closer to the source,reducing latency and bandwidth usage while improving real-time decision-making.(2) Evaluate the environmental impact of IoT-based smart homes,including energy consumption and electronic waste,and explore sustainable design options.

    Acknowledgement:This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Funding Statement:This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Author Contributions:Study conception and design: Muhammad Umer,Nazik Alturki,Oumaima Saidani,and Amal Alshardan;data collection: Shtwai Alsubai,Raed Alharthi,and Reemah M.Alhebshi;analysis and interpretation of results: Muhammad Umer,Ali Kashif Bashir,and Shtwai Alsubai;draft manuscript preparation: Muhammad Umer,Ali Kashif Bashir,Nazik Alturki,Oumaima Saidani,and Amal Alshardan;funding: Raed Alharthi.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:All the data related to the development of mobile applications and artificial intelligence techniques can be found upon suitable request from the corresponding authors or from the following link MUmerSabir/HomeAutomation(github.com).

    Conflicts of Interest:The authors declare that they have no conflicts of interest.

    菩萨蛮人人尽说江南好唐韦庄| 免费电影在线观看免费观看| 精品少妇久久久久久888优播| 国产精品嫩草影院av在线观看| 国产欧美日韩一区二区三区在线 | 国产精品女同一区二区软件| 熟女人妻精品中文字幕| 丝袜喷水一区| 天堂中文最新版在线下载 | 啦啦啦啦在线视频资源| 日本熟妇午夜| 哪个播放器可以免费观看大片| 亚洲欧洲日产国产| 国产中年淑女户外野战色| 国产 一区 欧美 日韩| 五月开心婷婷网| av播播在线观看一区| 精品久久国产蜜桃| 51国产日韩欧美| 国产大屁股一区二区在线视频| 白带黄色成豆腐渣| 日本wwww免费看| av国产精品久久久久影院| 午夜爱爱视频在线播放| 欧美变态另类bdsm刘玥| 亚洲激情五月婷婷啪啪| 成人漫画全彩无遮挡| 亚洲国产色片| 午夜视频国产福利| 欧美亚洲 丝袜 人妻 在线| 一边亲一边摸免费视频| 国产美女午夜福利| 80岁老熟妇乱子伦牲交| 欧美精品一区二区大全| 大片电影免费在线观看免费| 在线免费十八禁| 久久久久久久亚洲中文字幕| 制服丝袜香蕉在线| 久久精品综合一区二区三区| 国产乱来视频区| 亚洲av中文字字幕乱码综合| 汤姆久久久久久久影院中文字幕| 少妇裸体淫交视频免费看高清| 国产精品国产三级国产专区5o| 国产伦精品一区二区三区四那| 国产免费一级a男人的天堂| 亚洲av免费在线观看| 亚洲va在线va天堂va国产| 久久精品国产鲁丝片午夜精品| 女人久久www免费人成看片| 97人妻精品一区二区三区麻豆| 观看美女的网站| 秋霞在线观看毛片| 最近最新中文字幕大全电影3| 国产又色又爽无遮挡免| 高清视频免费观看一区二区| 老司机影院毛片| 日本-黄色视频高清免费观看| 久久久亚洲精品成人影院| 国产一区二区在线观看日韩| 久久久久久久精品精品| 男人爽女人下面视频在线观看| 国产欧美日韩一区二区三区在线 | 成人午夜精彩视频在线观看| 人妻一区二区av| 欧美激情久久久久久爽电影| 国产爱豆传媒在线观看| 男女下面进入的视频免费午夜| 日产精品乱码卡一卡2卡三| 少妇被粗大猛烈的视频| 国产欧美另类精品又又久久亚洲欧美| 日韩亚洲欧美综合| 国产成人精品一,二区| 亚洲欧美精品自产自拍| 亚洲精品国产成人久久av| 免费黄色在线免费观看| 国产探花极品一区二区| 五月伊人婷婷丁香| 午夜福利视频精品| 亚洲天堂国产精品一区在线| 亚洲国产高清在线一区二区三| 爱豆传媒免费全集在线观看| 亚洲最大成人手机在线| 日韩一区二区视频免费看| 日本黄大片高清| 午夜激情久久久久久久| 国产精品一区www在线观看| 亚洲丝袜综合中文字幕| 国产真实伦视频高清在线观看| 色视频在线一区二区三区| 婷婷色av中文字幕| 久久久久久久久久人人人人人人| 最近最新中文字幕免费大全7| 2021少妇久久久久久久久久久| 大又大粗又爽又黄少妇毛片口| 日韩欧美 国产精品| 亚洲内射少妇av| 国产成人aa在线观看| 91精品一卡2卡3卡4卡| 国产亚洲5aaaaa淫片| 欧美日韩视频高清一区二区三区二| 啦啦啦啦在线视频资源| 欧美日韩综合久久久久久| 亚洲自偷自拍三级| 最近的中文字幕免费完整| 日韩在线高清观看一区二区三区| 97人妻精品一区二区三区麻豆| 午夜福利视频精品| 成人一区二区视频在线观看| 国产一区二区三区av在线| 日本av手机在线免费观看| 在线亚洲精品国产二区图片欧美 | 精华霜和精华液先用哪个| 91在线精品国自产拍蜜月| 亚洲美女搞黄在线观看| 国产女主播在线喷水免费视频网站| 国产精品三级大全| 男人狂女人下面高潮的视频| 最近中文字幕2019免费版| 国产男人的电影天堂91| 三级国产精品片| 久久精品国产亚洲av涩爱| 黄片wwwwww| 免费观看性生交大片5| 欧美高清性xxxxhd video| 在线a可以看的网站| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久久久国产网址| 亚洲一级一片aⅴ在线观看| 在线 av 中文字幕| 成人高潮视频无遮挡免费网站| 亚洲欧洲国产日韩| 人妻少妇偷人精品九色| 黄色配什么色好看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲成人av在线免费| 国产精品国产三级国产av玫瑰| 亚洲国产精品成人久久小说| 国产探花极品一区二区| 亚洲国产欧美在线一区| 国产人妻一区二区三区在| 又爽又黄无遮挡网站| 国产色爽女视频免费观看| 久久久国产一区二区| 啦啦啦中文免费视频观看日本| 人妻系列 视频| 免费少妇av软件| 人妻制服诱惑在线中文字幕| 午夜福利高清视频| 少妇人妻久久综合中文| 亚洲精品国产色婷婷电影| 禁无遮挡网站| 成人亚洲精品av一区二区| 免费av不卡在线播放| 中文精品一卡2卡3卡4更新| 久久久久国产精品人妻一区二区| 免费av不卡在线播放| 啦啦啦在线观看免费高清www| 国产精品国产三级国产专区5o| 成年版毛片免费区| 久久久久久国产a免费观看| 国产亚洲一区二区精品| 久久女婷五月综合色啪小说 | 国产美女午夜福利| 亚洲国产日韩一区二区| 亚洲一区二区三区欧美精品 | 熟女电影av网| 国产黄片美女视频| 1000部很黄的大片| 国产 一区精品| 国产黄a三级三级三级人| 久久韩国三级中文字幕| 美女高潮的动态| 亚洲三级黄色毛片| 亚洲经典国产精华液单| 亚洲精品日韩av片在线观看| 久久久精品94久久精品| 99久久精品国产国产毛片| 亚洲国产成人一精品久久久| 精品久久久久久久人妻蜜臀av| 亚洲国产高清在线一区二区三| 日本猛色少妇xxxxx猛交久久| 色视频www国产| 人人妻人人澡人人爽人人夜夜| 日本猛色少妇xxxxx猛交久久| 好男人在线观看高清免费视频| 亚洲av成人精品一区久久| 白带黄色成豆腐渣| 一级片'在线观看视频| 国产69精品久久久久777片| 波野结衣二区三区在线| 99九九线精品视频在线观看视频| 高清在线视频一区二区三区| 一区二区三区精品91| 日韩欧美精品免费久久| 免费看光身美女| 亚洲一级一片aⅴ在线观看| a级毛色黄片| 国产av码专区亚洲av| 精品一区在线观看国产| 国产成人精品一,二区| 91aial.com中文字幕在线观看| 国模一区二区三区四区视频| 人人妻人人爽人人添夜夜欢视频 | 国产乱人偷精品视频| 久久女婷五月综合色啪小说 | 国产精品精品国产色婷婷| 亚洲欧美中文字幕日韩二区| 国产高清三级在线| 欧美xxⅹ黑人| 亚洲欧美成人综合另类久久久| 国产黄片视频在线免费观看| 国产一级毛片在线| 人人妻人人澡人人爽人人夜夜| 黑人高潮一二区| 国产老妇伦熟女老妇高清| 亚洲av成人精品一区久久| 亚洲电影在线观看av| 亚洲av.av天堂| 最后的刺客免费高清国语| 国产日韩欧美亚洲二区| 国产一区二区三区综合在线观看 | 日韩制服骚丝袜av| 最后的刺客免费高清国语| 国产日韩欧美亚洲二区| 99视频精品全部免费 在线| 亚洲怡红院男人天堂| 王馨瑶露胸无遮挡在线观看| 丝瓜视频免费看黄片| 美女脱内裤让男人舔精品视频| 中国国产av一级| 久久久a久久爽久久v久久| 欧美日韩在线观看h| 亚洲四区av| 特级一级黄色大片| 国产精品三级大全| 在线亚洲精品国产二区图片欧美 | 国产乱来视频区| 国产色婷婷99| 国产女主播在线喷水免费视频网站| 日本猛色少妇xxxxx猛交久久| 婷婷色综合www| 国产日韩欧美在线精品| 成年女人看的毛片在线观看| 精品午夜福利在线看| 亚洲国产精品成人久久小说| 午夜视频国产福利| 免费高清在线观看视频在线观看| 久久韩国三级中文字幕| 国产欧美日韩精品一区二区| 高清日韩中文字幕在线| 欧美高清性xxxxhd video| 亚洲精品久久久久久婷婷小说| 亚洲va在线va天堂va国产| 久久久久久久久久成人| 91久久精品国产一区二区三区| 老师上课跳d突然被开到最大视频| 久久99蜜桃精品久久| 色婷婷久久久亚洲欧美| 色网站视频免费| 偷拍熟女少妇极品色| 在线观看一区二区三区激情| 日韩制服骚丝袜av| 又爽又黄无遮挡网站| 国产高潮美女av| 国产精品久久久久久av不卡| 18+在线观看网站| 丰满人妻一区二区三区视频av| 一级av片app| 精品人妻偷拍中文字幕| 久久午夜福利片| 高清视频免费观看一区二区| 青春草亚洲视频在线观看| 又黄又爽又刺激的免费视频.| 亚洲精品久久久久久婷婷小说| 亚洲国产精品成人综合色| 国产大屁股一区二区在线视频| 午夜福利网站1000一区二区三区| 国产成人精品婷婷| 99热6这里只有精品| 伦精品一区二区三区| 美女主播在线视频| 美女内射精品一级片tv| 一级爰片在线观看| 国产永久视频网站| 国产在视频线精品| 九九在线视频观看精品| 性插视频无遮挡在线免费观看| 麻豆成人av视频| av又黄又爽大尺度在线免费看| 色视频www国产| 国产老妇女一区| 国产男女内射视频| 国产亚洲一区二区精品| 大香蕉久久网| 亚洲av免费在线观看| 少妇 在线观看| 尾随美女入室| eeuss影院久久| 国产亚洲精品久久久com| 99久久精品一区二区三区| 国产一区二区三区av在线| 午夜福利视频1000在线观看| 欧美变态另类bdsm刘玥| 日韩欧美精品v在线| 色播亚洲综合网| 涩涩av久久男人的天堂| 男女啪啪激烈高潮av片| 少妇裸体淫交视频免费看高清| 如何舔出高潮| 欧美日韩在线观看h| 亚洲欧美日韩另类电影网站 | 亚洲精品视频女| 久久久色成人| 我的老师免费观看完整版| 亚洲aⅴ乱码一区二区在线播放| 日韩电影二区| 久久久久精品久久久久真实原创| 久久国内精品自在自线图片| 国产白丝娇喘喷水9色精品| 校园人妻丝袜中文字幕| 免费看光身美女| 深爱激情五月婷婷| 国产伦精品一区二区三区四那| 国产男人的电影天堂91| 男女无遮挡免费网站观看| 免费电影在线观看免费观看| tube8黄色片| 欧美bdsm另类| 一级av片app| 成人毛片60女人毛片免费| 我要看日韩黄色一级片| 小蜜桃在线观看免费完整版高清| 精品久久久久久电影网| 国产精品一二三区在线看| av.在线天堂| 国模一区二区三区四区视频| 99精国产麻豆久久婷婷| 色视频在线一区二区三区| 国产免费又黄又爽又色| 日本与韩国留学比较| 六月丁香七月| 夜夜爽夜夜爽视频| 免费高清在线观看视频在线观看| 男男h啪啪无遮挡| 99久久精品一区二区三区| 精品国产三级普通话版| 在线免费观看不下载黄p国产| 日本黄大片高清| 日本一二三区视频观看| 欧美xxⅹ黑人| 亚洲欧美中文字幕日韩二区| 男女边摸边吃奶| 国产精品99久久99久久久不卡 | 国产乱来视频区| 人体艺术视频欧美日本| 美女xxoo啪啪120秒动态图| 观看免费一级毛片| 久久久午夜欧美精品| 国产高清有码在线观看视频| 国产精品麻豆人妻色哟哟久久| 亚洲真实伦在线观看| 亚洲国产最新在线播放| 久久久欧美国产精品| 日日撸夜夜添| 亚洲人成网站高清观看| 777米奇影视久久| 国产精品麻豆人妻色哟哟久久| 亚洲一级一片aⅴ在线观看| 久久久a久久爽久久v久久| 丰满人妻一区二区三区视频av| 老女人水多毛片| 97超视频在线观看视频| 国产淫语在线视频| 激情五月婷婷亚洲| 国产精品不卡视频一区二区| 黄色怎么调成土黄色| 十八禁网站网址无遮挡 | 亚洲国产欧美人成| 91精品一卡2卡3卡4卡| 一级二级三级毛片免费看| 麻豆成人av视频| 天美传媒精品一区二区| h日本视频在线播放| 六月丁香七月| 精品熟女少妇av免费看| 日韩亚洲欧美综合| 男女边摸边吃奶| 韩国av在线不卡| 久久99蜜桃精品久久| 一级av片app| 美女主播在线视频| av黄色大香蕉| xxx大片免费视频| 久久精品熟女亚洲av麻豆精品| 亚洲欧洲日产国产| 亚洲精华国产精华液的使用体验| 色视频在线一区二区三区| 亚洲欧美日韩东京热| 91久久精品国产一区二区成人| 亚洲精品456在线播放app| 日日啪夜夜撸| 麻豆精品久久久久久蜜桃| 欧美亚洲 丝袜 人妻 在线| 久久精品久久久久久久性| 亚洲成人中文字幕在线播放| 国产久久久一区二区三区| 亚洲怡红院男人天堂| 国产大屁股一区二区在线视频| av又黄又爽大尺度在线免费看| 男人添女人高潮全过程视频| 精品一区在线观看国产| 日韩国内少妇激情av| 啦啦啦中文免费视频观看日本| 女人久久www免费人成看片| 毛片一级片免费看久久久久| 成年女人看的毛片在线观看| 亚洲成人久久爱视频| 免费高清在线观看视频在线观看| 女的被弄到高潮叫床怎么办| 七月丁香在线播放| av专区在线播放| 我要看日韩黄色一级片| 国产探花极品一区二区| 在线观看免费高清a一片| 欧美区成人在线视频| 亚洲av免费高清在线观看| 男的添女的下面高潮视频| 久久久久性生活片| av免费观看日本| 高清毛片免费看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 日韩,欧美,国产一区二区三区| 五月伊人婷婷丁香| 高清毛片免费看| 国产精品国产三级国产av玫瑰| 日韩电影二区| 国产综合精华液| 成人免费观看视频高清| 亚洲精品国产av成人精品| 国产高潮美女av| 国产精品国产三级国产专区5o| 免费观看a级毛片全部| 99久久人妻综合| 大码成人一级视频| 国产精品人妻久久久久久| 午夜免费鲁丝| av福利片在线观看| 国产人妻一区二区三区在| 亚洲精品,欧美精品| 亚洲精品国产av蜜桃| 国产成人91sexporn| 男人添女人高潮全过程视频| 国产精品女同一区二区软件| 免费av不卡在线播放| 老司机影院成人| 婷婷色麻豆天堂久久| 晚上一个人看的免费电影| 精品久久久久久电影网| 成人欧美大片| 综合色丁香网| 国产av码专区亚洲av| 国产 精品1| 亚洲成人精品中文字幕电影| 蜜桃久久精品国产亚洲av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久99蜜桃精品久久| 亚洲久久久久久中文字幕| 亚州av有码| 80岁老熟妇乱子伦牲交| 免费观看无遮挡的男女| 国产免费福利视频在线观看| 性色av一级| 日韩制服骚丝袜av| 久久久精品免费免费高清| 亚洲精品久久午夜乱码| 日本免费在线观看一区| 麻豆乱淫一区二区| 免费播放大片免费观看视频在线观看| 国产色婷婷99| 国产男女内射视频| 国产淫语在线视频| 国产黄a三级三级三级人| 夜夜爽夜夜爽视频| 我的女老师完整版在线观看| 久久久久久久国产电影| 少妇人妻一区二区三区视频| 秋霞在线观看毛片| 午夜日本视频在线| 免费黄色在线免费观看| 中文字幕av成人在线电影| 亚洲成人久久爱视频| 两个人的视频大全免费| 国产老妇伦熟女老妇高清| 交换朋友夫妻互换小说| 成年人午夜在线观看视频| 亚洲欧美精品自产自拍| 久久久色成人| 亚洲av欧美aⅴ国产| 男人狂女人下面高潮的视频| 免费不卡的大黄色大毛片视频在线观看| 亚洲人成网站在线观看播放| 国产精品久久久久久av不卡| 国产永久视频网站| 九九爱精品视频在线观看| 日韩av免费高清视频| 伊人久久精品亚洲午夜| 国产精品嫩草影院av在线观看| 亚洲欧美精品专区久久| 国产色爽女视频免费观看| 久久影院123| 成年版毛片免费区| 国产精品99久久99久久久不卡 | 涩涩av久久男人的天堂| 嫩草影院精品99| 国产精品一区二区在线观看99| 久久久久精品性色| av国产免费在线观看| 99热这里只有是精品50| 18禁在线播放成人免费| 欧美日韩一区二区视频在线观看视频在线 | 美女cb高潮喷水在线观看| 蜜臀久久99精品久久宅男| av黄色大香蕉| 亚洲av电影在线观看一区二区三区 | 久久影院123| 三级男女做爰猛烈吃奶摸视频| 少妇 在线观看| 亚洲国产av新网站| 看黄色毛片网站| 美女内射精品一级片tv| 久久久午夜欧美精品| 久久精品国产鲁丝片午夜精品| 一级毛片电影观看| 成人亚洲精品一区在线观看 | 欧美一级a爱片免费观看看| 欧美精品国产亚洲| 小蜜桃在线观看免费完整版高清| 国产精品精品国产色婷婷| 丝瓜视频免费看黄片| 九九在线视频观看精品| av在线播放精品| 亚洲色图av天堂| 亚洲婷婷狠狠爱综合网| 在线天堂最新版资源| 在线免费十八禁| 一区二区三区精品91| 一级av片app| 久久热精品热| 一级a做视频免费观看| 国产色爽女视频免费观看| 亚洲内射少妇av| 亚洲人成网站在线观看播放| 精品少妇久久久久久888优播| 天天一区二区日本电影三级| 毛片一级片免费看久久久久| 老司机影院毛片| 久久久久网色| 神马国产精品三级电影在线观看| 午夜精品国产一区二区电影 | 国产真实伦视频高清在线观看| 亚洲图色成人| 亚州av有码| 欧美老熟妇乱子伦牲交| 国产高清有码在线观看视频| 天天一区二区日本电影三级| 一区二区三区乱码不卡18| 亚洲av欧美aⅴ国产| 久热久热在线精品观看| 精品一区二区免费观看| 国产欧美日韩精品一区二区| 少妇裸体淫交视频免费看高清| 亚洲成色77777| 禁无遮挡网站| 男人舔奶头视频| 久久午夜福利片| 免费观看在线日韩| 久久久久国产精品人妻一区二区| 久久99蜜桃精品久久| 亚洲人成网站在线播| 高清日韩中文字幕在线| 久久这里有精品视频免费| 日本av手机在线免费观看| 国产有黄有色有爽视频| 国产人妻一区二区三区在| 一区二区三区精品91| 熟妇人妻不卡中文字幕| 18禁裸乳无遮挡动漫免费视频 | 中国三级夫妇交换| 亚洲av成人精品一区久久| 欧美另类一区| 天天一区二区日本电影三级| 国产av国产精品国产| 99久久九九国产精品国产免费| 国产成人a∨麻豆精品| 欧美最新免费一区二区三区| 欧美日韩国产mv在线观看视频 | 午夜视频国产福利| 亚洲,一卡二卡三卡| 国内精品美女久久久久久| 亚洲精品456在线播放app| 精品午夜福利在线看| 日韩国内少妇激情av| 亚洲欧美中文字幕日韩二区| 欧美bdsm另类| 国产欧美日韩精品一区二区| 亚洲高清免费不卡视频| 久久热精品热| 极品少妇高潮喷水抽搐| 久久久精品欧美日韩精品| 成人亚洲欧美一区二区av| 日韩一区二区三区影片| 国产欧美另类精品又又久久亚洲欧美| 搞女人的毛片| 在线 av 中文字幕|