• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Internet of Things Authentication Protocols:Comparative Study

    2024-05-25 14:38:46SouhaylaDargaouiMouradeAzrourAhmadElAllaouiAzidineGuezzazAbdulatifAlabdulatifandAbdullahAlnajim
    Computers Materials&Continua 2024年4期

    Souhayla Dargaoui ,Mourade Azrour,? ,Ahmad El Allaoui ,Azidine Guezzaz ,Abdulatif Alabdulatif and Abdullah Alnajim

    1Engineering Science and Technology Laboratory,IDMS Team,Faculty of Sciences and Techniques,Moulay Ismail University of Meknes,Errachidia,52000,Morocco

    2Higher School Essaouira,Cadi Ayyad University,Marrakesh,44000,Morocco

    3Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    4Department of Information Technology,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    ABSTRACT Nowadays,devices are connected across all areas,from intelligent buildings and smart cities to Industry 4.0 and smart healthcare.With the exponential growth of Internet of Things usage in our world,IoT security is still the biggest challenge for its deployment.The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment,protect privacy,and confidentiality,and guarantee the safety of IoT users,infrastructures,data,and devices.Authentication,as the first line of defense against security threats,becomes the priority of everyone.It can either grant or deny users access to resources according to their legitimacy.As a result,studying and researching authentication issues within IoT is extremely important.As a result,studying and researching authentication issues within IoT is extremely important.This article presents a comparative study of recent research in IoT security;it provides an analysis of recent authentication protocols from 2019 to 2023 that cover several areas within IoT(such as smart cities,healthcare,and industry).This survey sought to provide an IoT security research summary,the biggest susceptibilities,and attacks,the appropriate technologies,and the most used simulators.It illustrates that the resistance of protocols against attacks,and their computational and communication cost are linked directly to the cryptography technique used to build it.Furthermore,it discusses the gaps in recent schemes and provides some future research directions.

    KEYWORDS Attacks;cryptography;Internet of Things;security;authentication

    1 Introduction

    IoT is an extensive network of intelligent goods interconnected and connected to the Internet that may visualize and control a big part of the world surrounding us.Over the past few years,IoT has immersed increasingly in our daily lives [1–5].This extensive integration of IoT services anywhere and everywhere generates significant data flow[6–10].The limited nature of IoT appliances concerning computational capability,energy,and memory storage makes the processing of IoT data a very sophisticated task[11–13].As a result,IoT users’data becomes susceptible to illegitimate use,and attacks against IoT networks become increasingly sophisticated,numerous,and of excellent quality.According to recent examinations,this increase is a direct result of poor security configurations placed throughout the IoT ecosystem[14–16].Several factors make IoT security very hard to achieve,such as the absence of security configuration in IoT devices since the constructors are more interested in getting their devices on the market quicker than in conducting sufficient tests to include security from the outset[17–20].In addition,wireless communication networks used in IoT,like Wi-Fi,are known for their vulnerability to enormous interferences.Furthermore,the lack of a unique perspective of IoT and universal standards may increase the difficulty of designing a security scheme for an IoT network with heterogeneous equipment.Moreover,high mobility and dynamic network topology may increase the attack area and complicate the implementation of a universal security scheme.

    Authentication as a method of verifying and ensuring the identification of entities is the first step towards security and privacy assurance in an IoT environment.Generally,in IoT networks,each node should be able to distinguish and attest all other nodes in the network to ensure that the data comes from a legitimate source[21].Authentication is a process that allows verification or authentication of a user’s identity.It answers the question:“Are you that entity?”.Authentication methods are diverse,but all are founded upon one or more of the knowledge,possession,and attribute factors.

    Overall,the more factors we use,the higher the level of safety we provide.However,multifactor authentication requires more computational power,storage memory,and energy,which cannot be ensured by IoT-embedded devices,known by their limitations.Over the past few years,several lightweight authentications have been proposed to overcome those limitations.The performance of proposed authentication schemes and their costs differ based on the cryptographic techniques used,such as Advanced Encryption Standard(AES),Rivest–Shamir–Adleman(RSA),Elliptic Curve Cryptography(ECC),and so on[22].

    New researchers attend this survey as a guideline to enhance future research and opportunities.It offers the analysis of a comparison study between more than thirty current authentication protocols published from 2019 to 2023 based on the cryptographic mechanisms used,the provided security features,the resistance against most popular attacks,and the computation and communication cost.The contributions of this paper are as follows:

    ? We summarize and analyze recent research in the IoT authentication field to provide a comprehensive understanding of the current literature,providing the most used cryptographic techniques,and simulation tools.

    ? We present a simple taxonomy of IoT authentication schemes.

    ? We undertake a comparative analysis to determine if the current literature satisfies the security service requirements and resists well-known attacks.

    ? We pinpoint open challenges exploring gaps and weaknesses and afford new research directions.

    The remainder of our survey is structured that way.The related works are introduced in section two.In the third section,the research methodology is presented.A simple taxonomy of authentication protocols is presented in section four.The comparison study is detailed in section five.The sixth section presents future research directions.Finally,the seventh section concludes the paper.

    2 Related Work

    Over the past few years,multiple authentication systems and key agreements have been offered to ensure privacy and security in IoT environments.Several authentication comparison studies are offered in the literature to help future researchers by offering security issues,open challenges,and future scopes (see Table 1).Kumar et al.presented an exhaustive investigation of the Internet-of-Things authentication methods and their conjunctions [23].They analyzed the potentialities and drawbacks of the existing approaches.Furthermore,discussing the fundamentals of authentication and its related raids,they interlinked the evolution of the solution strategies and offered a taxonomy of IoT authentication.Finally,they discussed the future opportunities in this area.Trnka et al.[24]offered a road map for future research,providing an overview of recent research from 2017 to 2020.They categorized implicated mechanics and norms requested in current approaches to finding the taxonomy of IoT security solutions.Saqib et al.afforded a methodical IoT security assessment and review concerning authentication [25].Their review aims to discover and summarize security issues in IoT regarding authentication tools and identify available mechanisms and holes in several kinds of authentication.Firstly,they identified security and privacy issues and explained the security warning throughout multiple levels of the IoT architecture.Secondly,they mentioned the countermeasures attainable for handling security problems.

    Table 1: Areas covered by some related works

    Additionally,they used different robustness parameters such as computational cost,communications costs,and energy use to benchmark some of the current standard authentication protocols developed for IoT.In the end,network simulators employed to estimate the efficiency of authentication approaches are covered.Bahache et al.[26]presented a comprehensive study of today’s authentication protocols regarding security and achievement.They also offered new categorization of the authentication schemes in wireless medical sensor networks(WMSNs)based on their architecture.Ahmed et al.[27]also summarized existing research on identity management,lightweight authentication,and authorization in an IoT environment.As a result,they highlighted topical IoT security trends and their accomplishments.

    To explore how Blockchain-based decentralized architecture can enhance IoT authentication,Singh et al.proposed a review of access management of IoT devices using access control mechanisms and decentralized authentication[28].They analyzed existing studies on Blockchain applications and detailed efforts to improve security in IoT applications.Accordingly,they summarized various security issues related to decentralized authentication in the IoT environment.Mohsin et al.[29]also provided helpful information that may improve the comprehension of how authentication approaches may be blended with Blockchain technology.They came up with a taxonomy of Blockchain technology in IoT network authentication.At last,they surveyed issues related to Blockchain technology,presented solutions,and discussed future research directions.

    Recently,IoT over 5G networks have improved healthcare applications.Sodhro et al.[30]produced an exhaustive review of authentication approaches for protecting IoT-5G appliances in the medical field.They reviewed,characterized,clustered,and classified IoT-5G appliance authentication,radio-frequency fingerprinting,and mutual authentication.Finally,they presented some artificial intelligence methods for developing authentication and recommendations for future research.Jiang et al.[31]briefly investigated machine learning-based physical layer authentication for the 5Gbased Internet of Things.The paper also covered research directions of machine learning approaches applications in 5G-based IoT security.Wazid et al.[32]presented a survey detailing probable rules and raids in 5G-enabled IoT networks.They compared current security schemes that lead to future search obstacles,and orientations in 5G IoT environmental security.

    Given that bio-features have become a vital agent in IoT device authentication.Ferrag et al.presented a survey about IoT mobile device authentication and authorization using bio-features[33].They delivered distinct data mining and machine-learning approaches to authentication and authorization mechanisms of IoT devices.Finally,analyzing the available biometrics authentication systems posed various issues for future investigation works.Yang et al.[34] presented a review to assist scientists in comprehending future problems with biometrics for IoT security and future research directions.They studied the existing studies in biometrics-based IoT security,specifically authentication,and encryption.Additionally,they classified the research about several biometric features and the number of biometric characteristics used in the mechanism.

    3 Research Methodology

    Our review was conducted between 2019 and 2023 since IoT authentication has received a lot of attention recently.The research published within the last five years presents the integration of emerging technologies and tendencies to enhance IoT authentication,the thing that helps to better understand the state of the art.

    The research process consisted of several phases.Firstly,we collected papers using a pre-defined set of keywords(attacks,cryptography,Internet of Things,security,authentication).For this purpose,we navigated some digital sources such as:

    ?Google Scholar(https://scholar.google.com/).

    ?HEC Digital Library(http://www.digitallibrary.edu.pk/).

    ?ACM Digital Library(http://dl.acm.org).

    ?IEEE eXplore(http://ieeexplore.ieee.org).

    ?ScienceDirect(https://www.sciencedirect.com).

    Then,the articles were classified based on the following criteria:

    Inclusion criteria

    ?Papers target IoT authentication.

    ?Papers afford a new IoT authentication scheme.

    ?Papers provide a security analysis section for the proposed scheme.

    ?Papers provide a performance evaluation section for the proposed scheme.

    ?Papers explore the challenges,issues,and shortcomings of IoT authentication.

    Exclusion criteria

    ?Papers not written in the English language.

    ?Papers published before 2019.

    ?Papers duplicated.

    ?Papers that do not provide any new authentication protocol.

    Then,reviewing the titles and keywords we excluded unrelated papers.Later,the analysis of each article’s abstract was performed to decide their relevance and exclude irrelevant publications.

    Finally,the quality of the papers was checked using three quality assessment questions,if the answer to at least two of these questions was “yes”the papers were concluded,else the papers were excluded from the review study,the questions are the following:

    ?Is there sufficient coverage of the relevant work and research subject in the paper?

    ?Is there enough information in the paper about the proposed authentication methodology?

    ?Is there a clear description,analysis,and evaluation of the findings?

    In the end,we admit thirty-one papers as the subject of the comparison study.

    4 Taxonomy of the IoT Authentication Protocols

    We classify IoT authentication protocols in this fraction according to several parameters [35].These parameters are pictured in Fig.1 and summarized as follows:

    Figure 1: Classification of IoT authentication protocols

    Authentication factor:Can be either identity[36–40],which is information(Username,password)presented by one party to another to authenticate,or an attribute[41–44](what we need to be),that can be physical like fingerprints or hand geometry,or behavioral like typing dynamics or voice prints[45–48].

    Architecture:This is distributed when a direct authentication method distributed between the communicating parties is used [49–53],or centralized [54–58] when a trusted authority that allows us to distribute and manage identification data used during authentication is used.

    Procedure:This can be unidirectional in case only one party authenticates to the other while the other is not authenticated.Bidirectional(mutual authentication[59–61])whenever the two items attest to each other.Three-way authentication once a trusted power certificates both items and assists them to certificate each other[62–64].

    Tokens use:In token-based authentication schemes[65–69],the user authenticates from a proof of identity(data)established by a server[70].

    The chips use:That may be implicit,whether it uses material physical features to improve authentication,including physical unclonable functions [71–75],or explicit,where it uses chips that store and process keys used for authentication[76].

    5 Comparative Study

    5.1 Comparative Criteria

    Resistance against attacks:This is a notable feature in an authentication scheme.The authentication protocol must resist attacks as much as possible to secure the data exchanged during the session.As a result,the stronger the resistance,the better the authentication.

    Complexity:In IoT networks,energy is the most critical limiting factor relative to the capabilities of a sensor node.To extend as much as possible,the life of a sensor and that of the network,it is necessary to manage its energy reserve reasonably.Therefore,to build an effective authentication mechanism,it is necessary to limit the number of operations performed.

    Session key management: A session key is used to define encryption between two parties to communicate securely over an open network.The management of session keys is a crucial issue of IoT,which includes several steps: Generation,distribution,storage,updating,and destruction of keys.Generally,a key agreement protocol should be used to negotiate a session key influenced by all communicating parties.

    Factor number: We can distinguish between three authentication schemes depending on the number of factors considered to authenticate the user.A single-factor authentication(SFA)is where the user authenticates using the password only.A dual-factor authentication (2FA) is where the customer uses a smart card and a keyword to authenticate.Multi-factor authentication(MFA)requires additional factors such as location information and biometrics.

    Mutual authentication: Is an essential concept in the IoT authentication systems.It allows an IoT device to verify the legitimacy of the access request made by an entity(human being or another system)to authorize its access to network resources.On the other hand,the user must also be sure of the device’s legitimacy.

    Cryptographic algorithm used:Several cryptographic algorithms can be used during authentication.Based on these algorithms,we can classify authentication schemes into four classes.The first class is built on symmetric algorithms,given their low cost.The second category is based solely on asymmetric algorithms that may be separated into two types: Those using usual algorithms(RSA[77–80])and those using elliptic curve cryptography(ECC[81–84]).The third category is hash functions-based schemes.The last category consists of hybrid solutions mixing two or all existing methods[85–89].

    5.2 Comparison of the Studied Protocols

    This section provides the comparison result between some of the latest authentication protocols,especially the protocols proposed between 2019 and 2023.Most of these protocols have four steps:The initialization step,the registration step,the login and authentication step,and the password change step.To fully understand and evaluate the protocols studied,we used several comparison criteria:Cryptography techniques,security services provided,resistance against attacks,computational complexity(execution time),and communication cost.

    5.2.1 IoT Authentication Schemes Review

    Table 2 shows the cryptographic techniques used in each protocol[90–120].Hence,Chen et al.[90,95,109,120]presented four different protocols based on two authentication factors using random numbers and hash functions.Finally,Oh et al.[95]and Azrour et al.[120]used the Automated Validation of Internet Security Protocols and Applications AVISPA and Scyther simulators,respectively,to formally analyze their protocol.

    Table 2: Authentication schemes review

    Kaurl et al.[94,97,107,111]provided four dual-factor authentication protocols built on encryption and decryption algorithms,random numbers,and hash functions.The formal analysis of the scheme provided by Kaurl et al.[94]was carried out using the ProVerif simulator,as Yadav et al.’s protocol[107]and Rostampour et al.’s protocol[111]was carried out using the Scyther.

    Krishnasrija et al.[104]presented a scheme using two authentication factors,random numbers,hash functions,and Chebyshev’s chaotic map.At the same time,Kumar et al.[93]also used encryption and decryption algorithms.The formal analysis of the presented schemes was performed by exploiting Scyther and Random Oracle,respectively.

    Hu et al.[91,96,101] used random numbers,hash functions,and ECC to build two-factor authentication protocols.Azrour et al.[92,114,116,118]combined those mechanisms with encryption and decryption algorithms to build their schemes.Subsequently,Hu et al.[91]and Nyangaresi[101]used ProVerif,while Azrour et al.[92]and Panda et al.[96]used Scyther and AVISPA,respectively,to conduct a formal analysis.

    Dwivedi et al.[110]suggested a two-factor authentication scheme using encryption and decryption algorithms,random numbers,hash functions,and Blockchain technology.The proposed scheme was formally analyzed using the Scyther simulator.

    Cui et al.[102,105,108,113,117] proposed five three-factor authentication protocols based only on random numbers and hash functions.In the end,Lee et al.[105]and Khalid et al.[113]used the Scyther and AVISPA simulators to perform a formal analysis of their protocol.

    Xie et al.[98–100,103,106,112,115,119]presented three-factor protocols that use the fuzzy extractor to extract numerical variables from user biometric information,random numbers,and hash functions.The difference between these protocols is that [99,103,112] are based on encryption and decryption algorithms,[98,106,115]are based on ECC,however,references[100,119]combined both techniques.Afterward,Xie et al.used ProVerif,Butt et al.[100],Yu et al.[103,112]used AVISPA,and Wang et al.[106]and Hajian et al.[115]used Scyther to make a formal analysis of their schemes.

    Cryptography Techniques

    The backbone of the authentication scheme is the cryptographic technique used to build it.It is the key element to establish authenticity,and the most critical factor that can construct the characteristics of the scheme;especially,its security and efficiency.The schemes examined in this review employ several cryptology technologies as shown in Table 2.

    The hash function has been used in all the studied protocols,mathematically it is a one-way function that maps arbitrary-size data to fixed-size values.In authentication schemes,the utility of hash functions is to hide and protect confidential parameters from attacks.

    ECC brings together a group of cryptographic techniques that take advantage of one or more attributes of elliptical curves.Given Q=k ?P where P is an elliptic curve point,the most crucial feature of ECC is the impossibility of recovering the value of k when only P and Q are known.Using this feature,the ECC can be used to interchange keys and secret parameters in the Diffie-Hellman manner or to verify authenticity using an elliptic curve digital signature algorithm and so on.

    Encryption and decryption are popular techniques that may be used in authentication schemes to exchange confidential parameters securely in public channels or even store identity data safely in smart cards.

    The chaotic map is an evolution function with some kind of chaotic behavior.It has an important characteristic that makes it suitable for security implementation;given Tu(x) and x,u is hard to compute.Considering this characteristic chaotic map may be used for key exchange or the authenticity warranty in the Diffie-Hellman approach.

    Random numbers as it is clear from their name,are the numbers selected unexpectedly,randomly from a group of numbers.They play critical roles in the authentication schemes,hence they ensure untraceability and secure the scheme against freshness and replay attacks.

    Formal Security Verification Tool

    Authentication schemes are mathematical processes,the application of those procedures safely requires their verification and analysis.The formal analysis may reduce the computational cost,the communication cost,and even some time memory demand by detecting and eliminating unnecessary steps.Furthermore,the verification may lead to protocols enhancing by exploring their vulnerabilities.Table 2 shows that in the reviewed schemes the most used simulators are the following.

    ProVerif which is a formal verification tool enables the verification of the security properties of cryptographic techniques.It runs the protocol only for an unlimited number of sessions and can reconstruct attacks.This tool accepts Horn clauses and Pi calculus codes as input and provides the same output in both cases.Furthermore,it does not demand any such specification or particular code in cases of schemes lacking freshness attacks.It necessitates the specification of communication channels and it only examines attacks that have the‘query’defined in the code[25].

    AVISPA is a push-button tool introduced by Armando et al.as a toolkit for the validation of internet security protocols and applications.It affords four back-ends: The On-the-Fly Model-Checker,the Constraint-Logic-based Attack Searcher,the SAT-based Model Checker,and the TA4SP protocol analyzer.AVISPA tool can analyze all the components of the scheme at the same time,detect the protocol’s flaws,and check the robustness against replay and man-in-the-middle attacks.However,it is rather difficult to use,demands solid knowledge of the verified schemes,and requires the learning of the High-Level Protocol Specification Language(HLPSL)[25].

    Scyther is a simulator that provides automated verification,falsification,and analysis of security mechanisms.It has three usage modes:Claim verification to determine if the security claims made in the description are true or not,automatic claims to automatically elaborate and certify suitable claims for a protocol,and characterization to characterize and analyze the security mechanism and create a finite trace depicting the execution of the protocol role.Scyther tool offers a graphical user interface and provides graphs of attacks which facilitate understanding the security mechanism.More than that it can execute the protocol for a limited or unlimited number of sessions,and it may check all the used variables.Nevertheless,this tool requires a compromised module to detect that a previous session has been captured in case of a mechanism vulnerable to freshness threats,also it cannot check the quality of any variables the thing that obligates the user to simplify the protocol before the simulation[25].

    5.2.2 Security Services

    Generally,to trust an authentication protocol,it must ensure various security characteristics,such as mutual authentication,a security process that allows communicating parties to verify each other identities and trust the exchanged data in an IoT network.The anonymity secures the user’s identity to overcome impersonation attacks;untraceability protects persons from disclosing confidential and sensitive information.Key agreement to generate a key,which may be used for encrypting the exchanged data.Perfect forward secrecy blocks unauthorized individuals from intercepting,deducting,or obtaining the key.Moreover,key secret,guards sensitive data secretly.As it is clear from Table 3 the schemes[91,93,94,101–105,115,118,120]are the most effective schemes providing all security services,then the schemes[95,97,98,106,107,111,113,116,117,119]which do not guarantee the key secret,and[108,109] that do not guarantee the perfect forward secrecy.However,protocol [112] offers mutual authentication,anonymity,untraceability,and key agreement.Protocols [99,100,114] allow mutual authentication,anonymity,and key agreement.Protocols [90,92] enable mutual authentication,key agreement,and key secret.Protocol[96]provides mutual authentication,key agreement,and perfect forward secrecy.Protocol[110]ensures only anonymity and untraceability.

    Table 3: Security features and resistance against attacks

    5.2.3 Resistance against Attacks

    The comparison based on security services provided by each protocol may give an idea about the studied protocol;instead,more is needed to evaluate it.For this reason,resistance against known attacks is examined in this section.Analyzing Table 3,security features and resistance against attacks,we can conclude the following results:

    The scheme[98]is the most robust of the 31 studied;it is resistant to impersonation attacks,replay attacks,node capture attacks,password guessing,DoS attacks,stolen verifier attacks,insider attacks,stolen verifier attacks,a man in the middle,and smart card loss attack.Nevertheless,references[99,103]resist all recent attacks except the node capture attack.In addition,references [93,94] resist GWN bypassing attacks and the same attacks as [98] except man-in-the-middle and node capture attacks.The protocol[106]resists in opposition to GWN bypassing attacks and the same attacks as[98],except for the DoS attack.The scheme[117]protects against GWN bypassing attacks and the same attacks as[98],apart from the stolen verifier,DoS.

    The protocol [118] is resilient in the face of impersonation raids,replay attacks,node capture attacks,password guessing,stolen verifier attacks,DoS attacks,and man-in-the-middle attacks.The protocol [97] is resistant to an insider attack,token modification,and the same attacks as [118],aside from the man in the middle and Dos raids.The approach [102] resists impersonation attacks,replay attacks,node capture attacks,insider attacks,man-in-the-middle attacks,password guessing,and smart card loss attacks.On the other side,reference [105] resists stolen verifier attacks and all recent attacks except insider attacks.

    The protocol[92]is resilient in the face of replay attacks,Denning-ssaco,DoS attacks,password guessing,insider attack,and stolen verifier attack.However,reference [120] is resilient regarding smart card loss and the same attacks as [92] other than the Denning-ssaco attack.The mechanism[95]is resistant,contrary to impersonation attacks,replay attacks,insider attacks,man-in-the-middle,password guessing,and smart card loss attacks,even though the mechanism [109] is resistant in the face of node capture attacks and the same attacks as[95]aside from password guessing.

    The scheme[112]resists in the face of impersonation attacks,replay attacks,insider attacks,smart card loss,and password guessing.Nevertheless,the scheme [104] resists man-in-the-middle attacks coupled with all later attacks excluding impersonation attacks.In addition,reference[91]also resists node capture attacks,and all attacks resisted by the scheme [112] aside from insider attacks.The approach [108] seems strong against impersonation attacks,replay attacks,smart card loss,insider attacks,and man-in-the-middle attacks.However,the approach[115]can resist counter-node capture attacks and attacks resisted by [108] apart from the smart card loss.The scheme [96] also resists password guessing,and all attacks resisted by[108]exclude smart card loss.

    The mechanism [116] withstands man-in-the-middle,replay attacks,impersonation attacks,and insider attacks.At the same time,the mechanism [114] fights back stolen verifier attacks,and all attacks are restrained by[116]but insider attacks.On the other hand,the mechanism[101]resists DoS attacks and raids resisting by the mechanism[116]aside from insider attacks.The scheme[100]resists impersonation attacks,insider attacks,replay attacks,and password-guessing attacks.Nonetheless,the protocol[90]resists insider attacks,replay attacks,GWN bypassing,and stolen verifier attacks.The scheme[107]can also resist the same attacks as the scheme[116]apart from the man in the middle.

    The schemes[110,111,113]are resistant to impersonation attacks coupled with man-in-the-middle attacks,replay attacks,and smart card loss,respectively.Although,[119]fights back only smart card loss and replay attacks.

    5.2.4 Computational Cost

    In this section,we examine the computational needs of the studied schemes.The notation Th is defined as the temporal requirements of the hash function.Te is the temporal requirement of the elliptic curve point’s multiplication.Tc is the temporal need of Chebyshev’s chaotic map use.Ts is the temporal need of symmetric encryption/decryption.Tf is the temporal exigency of the fuzzy extractor.Tasym is the temporal need of asymmetric encryption/decryption.Tpuf is the temporal requirement of the physically unclonable function.Tsig is the computational cost of a Hyperelliptic Curve-based Digital Signature Arithmetic signature generation/verification execution.The cost of calculating the operation or exclusive is generally overlooked because it requires minimal calculations.According to[93],Th=0.0005 s,Tc=0.02102 s,Te=0.063075 s and Ts=0.0087 s and according to[97],Tasym=Te=Tf=0.063075 s.Depending on [105] Th=1.91%?Tpuf,as a result,we consider Tpuf=0,02608 s.Based on[93,114],Tsig=0.47 s.

    As mentioned in Table 4,two-factor lightweight authentication schemes,[90,95,109,120],require 24Th,42Th,16Th,and 17Th,respectively.However,three-factor lightweight authentication schemes,[102,105,108,113,117]need 35Th+Tf,34Th+2Tf+Tpuf,29Th+Tf,18Th+2Tf,and 2Tp+16Th+Tf,respectively.

    Table 4: Computational requirement of login and authentication phase

    ECC-based schemes[91,96,98,101,106,115]demand 23Th+6Te,9Th+8Te,18Th+6Te+Tf,13Th+2Te,25Th+6Te,and 8Te +14Th severally.Symmetric encryption/decryption-based authentication schemes[94,97,99,103,107,110,111,112]necessitate 21Th+4Ts,42Th+Ts,25Th+Tf+4Ts,15Th+Tf+2Ts,6Ts +2Th,6Th+9Ts,2Ts,and 24Th+2Ts individually.In addition,[104]requires 20Th+3Tc.While hybrid authentication schemes[92,93,100,114,116,118,119]stipulate 13Th+6Te,15Th+4Tc+4Ts,5Th+4Te+Tf+3Ts,15Th+2Tf+4Ts+2Tsig,2Ts+4Tasym+11Th,13Th+8Te+2Ts,and Ts+15Th+6Te,respectively.

    Fig.2 shows that the protocols [90,95,97,109–112,120] are very fast compared to the schemes[91,92,96,98,100,106,114,118,119],for the simple reason that those letters use elliptic curve cryptography that is very overpriced compared to the hash functions that are used in schematics[90,95,97,109–112,120].

    Figure 2: Login and identity verification estimated run time

    5.2.5 Communication Cost

    To enhance communication efficiency,the communication cost of an authentication scheme must be reduced as it as possible.Based on the graphs in Fig.3,the schemes in [104,106,108,118,119]incur the highest communication overheads.Then there are the protocols in[94–102,105,109,112,113,115,117],and the schemes in[103,107,111]with acceptable costs.While the schemes[107,111]require the lowest communication cost,and they are weak against the majority of known attacks,as has been mentioned before,more than that,they cannot ensure perfect forward secrecy.

    Figure 3: Login and identity verification estimated storage

    5.3 Classification of the Studied Protocols

    This section classifies the protocols we have studied into two categories.According to cryptographic algorithms,we distinguish lightweight schemes that are based only on hash functions,random numbers,and in some cases encryption and decryption algorithms,and hybrid schemes which combine the techniques used in the lightweight authentication schemes with one or more of the following mechanisms: Elliptic curve cryptography,chaotic maps,and encryption systems.Depending on the authentication factors,we distinguish between dual-factor schemes that require a smart card and password,and three-factor schemes that demand a smart card,key word,and digital fingerprint.The classification results in cryptographic algorithms and authentication factors are presented in Figs.4 and 5,respectively.The analysis of Fig.5 shows that a major part of the proposed schemes in the literature are two-factor-based schemes because the addition of the third factor increases partially the computational cost and the energy consumption.Furthermore,the correlation between the results presented in Fig.2 which provides the login and identity verification estimated run time for each scheme,and the results shown in Fig.4 indicate that hybrid authentication schemes require much more execution time than lightweight schemes.The thing that explains the wide deployment of lightweight schemes compared with others.

    Figure 4: Classification results based on cryptographic technics

    Figure 5: Classification results based on authentication factors

    6 Future Research Directions

    The comparison made in this paper illustrates that the reviewed schemes provide a high level of security,nonetheless,some attacks still require more interest such as node capture,DoS attack,stolen verifier,denning-ssaco attack,and GWN bypassing.Besides,the maturity of the authentication schemes is centralized,as a result,they cannot be efficient with decentralized infrastructures and networks.To overcome the gaps in the literature schemes this section offered some new directions for future research.

    6.1 Blockchain-Based Authentication

    Considering that a major part of the current IoT authentication schemes relies on centralized infrastructures,are inconsistent with distributed frameworks,and are vulnerable to several attacks,Blockchain-based authentication balances Blockchain technology with MFA to produce a trustworthy authentication mechanism.Using decentralized ledgers that protect critical credentials,Blockchainbased authentication offers an additional layer of protection.However,this kind of solution demands strong technical knowledge,accurate implementation,and realistic evaluation.More than that,it requires a high computational power.The whole potential of Blockchain-based authentication can be reached by decreasing complexity and costs and increasing flexibility and authenticity[121].

    6.2 Post-Quantum Cryptography

    Currently,ECC is considered one of the most lightweight cryptographic techniques that can be used to build a robust authentication scheme,and it is the most suitable for IoT device’s limitations.Unfortunately,this method is at risk of being ruptured by Quantum Computing attacks such as Shor’s Algorithm,Grover’s Algorithm,Side-Channel Attack,Multi-target Pre-image Search Attack,and so on.However,the existence of some computational problems resistant to quantum attacks such as quasi-cyclic syndrome decoding (QCSD) with parity problem,and ring learning with rounding(RLWR)problems have motivated researchers to construct secure post-quantum cryptography(PQC).In 2017,a standardization proceeding was started by the National Institute of Standards and Technology,which classify which classify post-quantum cryptography algorithms into five classes:Latticebased Cryptography,Code-based Cryptography,Multivariate Polynomial Cryptography,Hash-based Signatures,and Isogeny-based Cryptosystem.After the 3rd round,seven schemes were announced.However,the standardization document is expected to be published in 2024[122].

    6.3 Machine Learning for Authentication

    Machine learning (ML) is an artificial intelligence field that relies on data and algorithms to imitate the way human learning,progressively improving its accuracy.Recently,Machine learning techniques have been widely considered to assist in the authentication process for IoT networks.Generally,the use of ML in authentication can be either:Supervised learning which is useful against intrusion and DDoS attacks,unsupervised learning which is useful to identify irregularities and threats without any previous knowledge,and powerful for communication detection attacks such as Sybil attacks,or reinforcement learning used to determine an optimal set of actions that maximize the reward in a given environment.Even though ML provides robust solutions for IoT authentication resistance against attacks,it demands high computation power and energy requirements.Researchers have a strong interest in making these solutions effective considering the limited nature of IoT devices[123,124].

    7 Conclusion

    This paper presents a deep comparative study of recent IoT authentication schemes regarding the importance of authentication in the Internet of Things as the first line of defense counter to security threats in such an environment.Firstly,we presented a simple taxonomy of authentication mechanisms in IoT.Then we offered the result of our detailed comparison.Our comparison was based on four criteria: The cryptographic mechanisms and simulators used,the provided security features,the resistance against most popular attacks,and the computational and communication cost.The result of our comparison shows that the authentication schemes in the literature may be based on several cryptography technics including Hash function,ECC,Encryption and decryption,Chaotic map,and Random numbers.Each one of the listed technologies has some features which may help provide authenticity and confidentiality.The requirement of the authentication scheme in terms of computational and communication costs differs according to the technology used.Accordingly,the analysis of the advantages and weaknesses of the studied schemes determines the attacks and the security services that need more interest to overcome the gaps in recent schemes namely node capture,DoS attack,stolen verifier,denning-ssaco attack,GWN bypassing,unlinkability,key secrecy,and perfect forward.Finally,we provided some future research directions that may enhance the IoT authentication schemes.As a result,the wide deployment and scalability of the IoT networks.

    Acknowledgement:Researchers would like to thank the Deanship of Scientific Research,Qassim University for funding publication of this project.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows:Study conception and design: Mourade Azrour and Ahmad El Allaoui;data collection: Souhayla Dargaoui;analysis and interpretation of results:Azidine Guezzaz and Abdulatif Alabdulatif;draft manuscript preparation:Abdullah Alnajim.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The used data are available once the readers want by contacting mo.azrour@umi.ac.ma.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    妹子高潮喷水视频| 国产成人影院久久av| 少妇人妻 视频| 搡老乐熟女国产| 一区二区三区乱码不卡18| 妹子高潮喷水视频| 久久精品国产亚洲av涩爱| cao死你这个sao货| 精品欧美一区二区三区在线| 老司机深夜福利视频在线观看 | 国产精品久久久久久精品古装| 欧美97在线视频| 久久久国产精品麻豆| 男人操女人黄网站| 2018国产大陆天天弄谢| 高清不卡的av网站| 亚洲国产欧美日韩在线播放| 亚洲午夜精品一区,二区,三区| 美女国产高潮福利片在线看| 精品一区二区三卡| 久久人妻熟女aⅴ| 老司机午夜十八禁免费视频| 真人做人爱边吃奶动态| 嫩草影视91久久| 蜜桃在线观看..| 天天躁夜夜躁狠狠久久av| 一级毛片 在线播放| 久久久久久久精品精品| 国产一级毛片在线| 91精品三级在线观看| 亚洲精品久久久久久婷婷小说| 大片电影免费在线观看免费| 夜夜骑夜夜射夜夜干| 日本五十路高清| 波野结衣二区三区在线| 日本vs欧美在线观看视频| 精品高清国产在线一区| 女人高潮潮喷娇喘18禁视频| 国产亚洲精品久久久久5区| 国产成人91sexporn| 日日夜夜操网爽| 婷婷成人精品国产| 黄色一级大片看看| 别揉我奶头~嗯~啊~动态视频 | 精品少妇一区二区三区视频日本电影| 亚洲精品久久成人aⅴ小说| 满18在线观看网站| 国产片内射在线| 狂野欧美激情性bbbbbb| 久久亚洲国产成人精品v| 国产女主播在线喷水免费视频网站| 性少妇av在线| 欧美性长视频在线观看| 久久精品熟女亚洲av麻豆精品| 久久人妻福利社区极品人妻图片 | 精品视频人人做人人爽| 亚洲精品自拍成人| 激情五月婷婷亚洲| 国产精品99久久99久久久不卡| 欧美在线黄色| 亚洲av日韩在线播放| 亚洲精品乱久久久久久| 久久精品亚洲熟妇少妇任你| 亚洲精品久久成人aⅴ小说| 男的添女的下面高潮视频| 各种免费的搞黄视频| 色播在线永久视频| 欧美在线黄色| 嫁个100分男人电影在线观看 | 成人免费观看视频高清| 久久精品久久久久久噜噜老黄| 免费在线观看日本一区| 黑人巨大精品欧美一区二区蜜桃| 国产精品二区激情视频| 国产成人一区二区三区免费视频网站 | 国产在视频线精品| 乱人伦中国视频| 国产成人精品在线电影| 亚洲综合色网址| 一边摸一边抽搐一进一出视频| 波多野结衣av一区二区av| 免费观看av网站的网址| 美女扒开内裤让男人捅视频| 精品福利观看| 国产午夜精品一二区理论片| 国产精品偷伦视频观看了| 黑人欧美特级aaaaaa片| 欧美+亚洲+日韩+国产| 人人妻人人澡人人爽人人夜夜| 欧美日韩福利视频一区二区| 最近手机中文字幕大全| 午夜影院在线不卡| 国产女主播在线喷水免费视频网站| 国产男人的电影天堂91| 国产精品一区二区精品视频观看| 宅男免费午夜| 精品熟女少妇八av免费久了| 免费一级毛片在线播放高清视频 | 精品福利观看| 欧美老熟妇乱子伦牲交| 精品国产乱码久久久久久小说| 看免费av毛片| 精品人妻1区二区| 中文字幕人妻丝袜制服| 亚洲欧美成人综合另类久久久| 美女扒开内裤让男人捅视频| 97精品久久久久久久久久精品| 啦啦啦啦在线视频资源| 免费高清在线观看日韩| 欧美少妇被猛烈插入视频| 国产亚洲av高清不卡| 人妻一区二区av| 两性夫妻黄色片| xxxhd国产人妻xxx| av在线老鸭窝| 丝袜人妻中文字幕| 午夜福利视频精品| 波多野结衣av一区二区av| 国产精品久久久久久人妻精品电影 | 国产免费福利视频在线观看| 男女边吃奶边做爰视频| 欧美 日韩 精品 国产| 国产一区二区激情短视频 | 久久 成人 亚洲| 日本五十路高清| 亚洲七黄色美女视频| 多毛熟女@视频| 久久久久久免费高清国产稀缺| 精品少妇黑人巨大在线播放| 中文字幕人妻熟女乱码| 又黄又粗又硬又大视频| 18禁国产床啪视频网站| 婷婷色综合大香蕉| 无限看片的www在线观看| 在线观看免费视频网站a站| 久久久亚洲精品成人影院| 男女国产视频网站| 成年av动漫网址| 色网站视频免费| 免费不卡黄色视频| 国产视频一区二区在线看| 99re6热这里在线精品视频| 亚洲美女黄色视频免费看| 日日摸夜夜添夜夜爱| 久久人人97超碰香蕉20202| 香蕉丝袜av| 国产精品欧美亚洲77777| 国产亚洲一区二区精品| 岛国毛片在线播放| 亚洲欧洲国产日韩| 欧美精品啪啪一区二区三区 | 亚洲久久久国产精品| 又大又黄又爽视频免费| 老司机亚洲免费影院| 国产午夜精品一二区理论片| 美女主播在线视频| 99久久综合免费| 国产真人三级小视频在线观看| 纵有疾风起免费观看全集完整版| 久久久久久久久免费视频了| 天天影视国产精品| av福利片在线| 狂野欧美激情性bbbbbb| 成在线人永久免费视频| av天堂久久9| 欧美日韩亚洲高清精品| 免费女性裸体啪啪无遮挡网站| 国产精品人妻久久久影院| 国产视频一区二区在线看| 国产亚洲欧美在线一区二区| 男女边吃奶边做爰视频| 亚洲精品一区蜜桃| 1024视频免费在线观看| 女人爽到高潮嗷嗷叫在线视频| 天天影视国产精品| 99香蕉大伊视频| 美国免费a级毛片| 欧美变态另类bdsm刘玥| 视频区图区小说| 国产片特级美女逼逼视频| 宅男免费午夜| 啦啦啦在线观看免费高清www| 亚洲欧美一区二区三区国产| 男女床上黄色一级片免费看| 女人精品久久久久毛片| 婷婷色av中文字幕| 男女之事视频高清在线观看 | 97在线人人人人妻| 久久99精品国语久久久| 少妇猛男粗大的猛烈进出视频| 十八禁高潮呻吟视频| 美女大奶头黄色视频| 人人妻人人添人人爽欧美一区卜| 国产在线观看jvid| 精品国产超薄肉色丝袜足j| 天天添夜夜摸| 国产视频首页在线观看| 乱人伦中国视频| 欧美在线一区亚洲| 丝袜美足系列| 男女床上黄色一级片免费看| 亚洲免费av在线视频| 亚洲欧美一区二区三区国产| 五月开心婷婷网| 欧美日韩亚洲国产一区二区在线观看 | 国产精品久久久人人做人人爽| 波多野结衣一区麻豆| 亚洲欧美一区二区三区久久| 亚洲国产精品999| 国产成人91sexporn| 久久久久网色| 国产在线免费精品| 中文字幕最新亚洲高清| 国产日韩欧美亚洲二区| 久9热在线精品视频| 亚洲精品日本国产第一区| 尾随美女入室| 日本猛色少妇xxxxx猛交久久| 亚洲精品中文字幕在线视频| 天天操日日干夜夜撸| 亚洲,一卡二卡三卡| 男女无遮挡免费网站观看| 精品熟女少妇八av免费久了| 国产日韩欧美视频二区| 国产有黄有色有爽视频| 黄色a级毛片大全视频| 天天影视国产精品| 国产极品粉嫩免费观看在线| 一区二区三区激情视频| 欧美精品一区二区大全| 亚洲国产欧美网| 国产午夜精品一二区理论片| 免费不卡黄色视频| 超碰97精品在线观看| 叶爱在线成人免费视频播放| 天堂8中文在线网| av在线老鸭窝| 国产成人一区二区三区免费视频网站 | 波多野结衣av一区二区av| 欧美成狂野欧美在线观看| 我要看黄色一级片免费的| 久久av网站| 中文精品一卡2卡3卡4更新| 蜜桃国产av成人99| 亚洲人成电影观看| a 毛片基地| 国产男女超爽视频在线观看| 久久ye,这里只有精品| 国产亚洲av片在线观看秒播厂| 视频在线观看一区二区三区| 欧美人与性动交α欧美软件| www.999成人在线观看| 亚洲国产欧美在线一区| 精品国产超薄肉色丝袜足j| 久久精品国产亚洲av高清一级| 91老司机精品| 久久天堂一区二区三区四区| 欧美日韩亚洲国产一区二区在线观看 | 国产成人一区二区在线| svipshipincom国产片| 亚洲伊人色综图| 青草久久国产| 久久国产精品影院| 满18在线观看网站| 老司机深夜福利视频在线观看 | 别揉我奶头~嗯~啊~动态视频 | 午夜福利一区二区在线看| 亚洲伊人久久精品综合| 亚洲精品中文字幕在线视频| 国产精品国产三级专区第一集| 国语对白做爰xxxⅹ性视频网站| 黄片小视频在线播放| 亚洲成国产人片在线观看| 两个人看的免费小视频| 国产欧美日韩一区二区三区在线| 叶爱在线成人免费视频播放| 亚洲av片天天在线观看| 日韩熟女老妇一区二区性免费视频| 精品一区二区三区四区五区乱码 | 国产精品.久久久| av网站在线播放免费| 欧美亚洲日本最大视频资源| 婷婷色麻豆天堂久久| 王馨瑶露胸无遮挡在线观看| 美女高潮到喷水免费观看| 激情五月婷婷亚洲| 久久狼人影院| 精品久久蜜臀av无| 国产精品麻豆人妻色哟哟久久| 午夜av观看不卡| 一二三四在线观看免费中文在| 精品久久久久久久毛片微露脸 | 啦啦啦在线免费观看视频4| 91麻豆精品激情在线观看国产 | 精品久久久精品久久久| 日韩,欧美,国产一区二区三区| 高清av免费在线| 亚洲 国产 在线| 成人手机av| 国产精品99久久99久久久不卡| 国产男女超爽视频在线观看| 国产av国产精品国产| 日韩欧美一区视频在线观看| 精品久久蜜臀av无| 精品亚洲成国产av| 国产97色在线日韩免费| 在线观看人妻少妇| 欧美日韩福利视频一区二区| 女人被躁到高潮嗷嗷叫费观| 久9热在线精品视频| 亚洲熟女毛片儿| 日韩一本色道免费dvd| 欧美精品啪啪一区二区三区 | 亚洲欧美精品自产自拍| 久久精品国产综合久久久| 91精品三级在线观看| 搡老乐熟女国产| 国产又爽黄色视频| 各种免费的搞黄视频| 亚洲国产精品国产精品| 免费在线观看黄色视频的| 超碰97精品在线观看| 老鸭窝网址在线观看| 2021少妇久久久久久久久久久| 国产在线免费精品| 少妇猛男粗大的猛烈进出视频| 亚洲,欧美精品.| 欧美中文综合在线视频| 午夜福利乱码中文字幕| 黑人猛操日本美女一级片| 免费少妇av软件| 久久这里只有精品19| 午夜视频精品福利| 18禁黄网站禁片午夜丰满| 老汉色∧v一级毛片| 在线观看免费日韩欧美大片| 欧美成人午夜精品| 久久性视频一级片| 一区二区三区激情视频| 亚洲久久久国产精品| 在线观看国产h片| 青春草视频在线免费观看| 99久久精品国产亚洲精品| 韩国精品一区二区三区| 精品国产一区二区久久| 亚洲精品一区蜜桃| 别揉我奶头~嗯~啊~动态视频 | 国产伦理片在线播放av一区| av一本久久久久| 日本91视频免费播放| 亚洲人成电影免费在线| 天天躁夜夜躁狠狠躁躁| 极品人妻少妇av视频| 成人国产一区最新在线观看 | 狠狠精品人妻久久久久久综合| 嫁个100分男人电影在线观看 | 久久精品久久久久久噜噜老黄| 久久久精品区二区三区| 69精品国产乱码久久久| 久久人人97超碰香蕉20202| 精品熟女少妇八av免费久了| 丝瓜视频免费看黄片| 如日韩欧美国产精品一区二区三区| 国产精品免费视频内射| 免费看十八禁软件| 一级黄色大片毛片| 成人手机av| 妹子高潮喷水视频| 婷婷色麻豆天堂久久| 中文乱码字字幕精品一区二区三区| 欧美日韩亚洲综合一区二区三区_| 啦啦啦在线免费观看视频4| 国产欧美亚洲国产| 99久久综合免费| 国产高清不卡午夜福利| 午夜福利影视在线免费观看| 最近最新中文字幕大全免费视频 | 汤姆久久久久久久影院中文字幕| 久久久久国产精品人妻一区二区| 美女大奶头黄色视频| 男人爽女人下面视频在线观看| 国产有黄有色有爽视频| 高清欧美精品videossex| 黑丝袜美女国产一区| 91九色精品人成在线观看| 老司机影院毛片| 精品少妇内射三级| 精品久久久久久久毛片微露脸 | 亚洲精品日本国产第一区| 免费女性裸体啪啪无遮挡网站| 亚洲国产最新在线播放| 99精国产麻豆久久婷婷| 我要看黄色一级片免费的| 精品免费久久久久久久清纯 | 久久久久久久久久久久大奶| 亚洲精品成人av观看孕妇| 一级,二级,三级黄色视频| 国产亚洲av高清不卡| 国产黄频视频在线观看| 婷婷成人精品国产| 久久这里只有精品19| 男女午夜视频在线观看| 91麻豆av在线| 国产又色又爽无遮挡免| 久久影院123| 亚洲成av片中文字幕在线观看| 我的亚洲天堂| 国产欧美日韩精品亚洲av| 91老司机精品| 视频区欧美日本亚洲| 欧美日韩国产mv在线观看视频| 国产精品.久久久| 国产成人免费无遮挡视频| 亚洲成色77777| av在线播放精品| 成年人免费黄色播放视频| 国产免费视频播放在线视频| 国产有黄有色有爽视频| 老司机亚洲免费影院| 久久久久久久久久久久大奶| 一区二区三区激情视频| 视频区图区小说| 国产野战对白在线观看| 欧美日韩亚洲国产一区二区在线观看 | 成人亚洲欧美一区二区av| 亚洲精品久久午夜乱码| 久久久欧美国产精品| 国产男女内射视频| 国产欧美日韩一区二区三 | 中文字幕最新亚洲高清| 99国产精品免费福利视频| 啦啦啦中文免费视频观看日本| 国产一区二区三区综合在线观看| 亚洲色图综合在线观看| 国产av精品麻豆| 一本大道久久a久久精品| 欧美精品一区二区大全| 99热全是精品| 亚洲熟女精品中文字幕| 国产欧美日韩精品亚洲av| 日日爽夜夜爽网站| 免费观看人在逋| 一边摸一边抽搐一进一出视频| 欧美精品人与动牲交sv欧美| 天堂俺去俺来也www色官网| 欧美日韩一级在线毛片| videos熟女内射| 国产一区亚洲一区在线观看| 国产淫语在线视频| 美女扒开内裤让男人捅视频| 高清视频免费观看一区二区| 精品少妇内射三级| 永久免费av网站大全| 亚洲欧美一区二区三区国产| 国产黄频视频在线观看| 午夜精品国产一区二区电影| 国产一区亚洲一区在线观看| 成人午夜精彩视频在线观看| 国产一区二区 视频在线| 美女高潮到喷水免费观看| 日韩免费高清中文字幕av| 交换朋友夫妻互换小说| 亚洲av综合色区一区| 日韩制服骚丝袜av| 久久久国产欧美日韩av| 国产人伦9x9x在线观看| 亚洲成av片中文字幕在线观看| 国精品久久久久久国模美| 国产免费现黄频在线看| 亚洲精品日本国产第一区| 一级,二级,三级黄色视频| 亚洲国产欧美日韩在线播放| 亚洲成国产人片在线观看| 亚洲人成网站在线观看播放| 校园人妻丝袜中文字幕| 肉色欧美久久久久久久蜜桃| 麻豆乱淫一区二区| 99香蕉大伊视频| 欧美av亚洲av综合av国产av| 亚洲av电影在线观看一区二区三区| 人人妻人人爽人人添夜夜欢视频| 国产1区2区3区精品| 性色av乱码一区二区三区2| 一级黄片播放器| 18禁黄网站禁片午夜丰满| 免费少妇av软件| www.熟女人妻精品国产| 五月开心婷婷网| 女性被躁到高潮视频| 大香蕉久久成人网| 精品亚洲成a人片在线观看| 一级毛片电影观看| 国产欧美日韩精品亚洲av| 国产在视频线精品| 久久久亚洲精品成人影院| 精品国产超薄肉色丝袜足j| 国产一区二区在线观看av| 在线观看免费视频网站a站| 久久99热这里只频精品6学生| 五月开心婷婷网| 国产老妇伦熟女老妇高清| 亚洲av国产av综合av卡| 三上悠亚av全集在线观看| xxx大片免费视频| 亚洲视频免费观看视频| 色播在线永久视频| 麻豆av在线久日| 亚洲专区中文字幕在线| 高清av免费在线| 午夜福利,免费看| 亚洲国产最新在线播放| 电影成人av| 午夜视频精品福利| 高清av免费在线| 一本一本久久a久久精品综合妖精| 99国产精品99久久久久| 亚洲国产欧美一区二区综合| 91字幕亚洲| 国产精品免费大片| 国产在线免费精品| 精品福利观看| 亚洲av成人精品一二三区| 美女午夜性视频免费| 日本av手机在线免费观看| 捣出白浆h1v1| av不卡在线播放| 成年人黄色毛片网站| av在线老鸭窝| 50天的宝宝边吃奶边哭怎么回事| 成在线人永久免费视频| 亚洲熟女毛片儿| 七月丁香在线播放| 国产午夜精品一二区理论片| 国产1区2区3区精品| 亚洲黑人精品在线| 18禁观看日本| 又粗又硬又长又爽又黄的视频| 国产91精品成人一区二区三区 | 在线观看国产h片| 成在线人永久免费视频| 亚洲成人免费电影在线观看 | 久久久精品免费免费高清| 久久青草综合色| 高清黄色对白视频在线免费看| 性色av一级| 成人国产av品久久久| 妹子高潮喷水视频| 亚洲国产欧美在线一区| 欧美黑人欧美精品刺激| 国产精品熟女久久久久浪| 中文欧美无线码| 极品少妇高潮喷水抽搐| 久久久精品94久久精品| 九草在线视频观看| 欧美国产精品va在线观看不卡| 久久性视频一级片| 国产又爽黄色视频| 国产1区2区3区精品| 色精品久久人妻99蜜桃| 国产精品久久久久久精品古装| 欧美黄色淫秽网站| 十八禁网站网址无遮挡| 9热在线视频观看99| 99热国产这里只有精品6| 久热这里只有精品99| 9191精品国产免费久久| 一区二区三区精品91| 国产在线观看jvid| 亚洲精品av麻豆狂野| 母亲3免费完整高清在线观看| 午夜视频精品福利| www.熟女人妻精品国产| 国产熟女欧美一区二区| 欧美亚洲日本最大视频资源| 美女扒开内裤让男人捅视频| 久久女婷五月综合色啪小说| 亚洲欧美激情在线| 精品久久蜜臀av无| 久久鲁丝午夜福利片| 色婷婷久久久亚洲欧美| 国产国语露脸激情在线看| 欧美黑人欧美精品刺激| 一级毛片 在线播放| 久久亚洲国产成人精品v| 女人爽到高潮嗷嗷叫在线视频| 最新的欧美精品一区二区| 欧美av亚洲av综合av国产av| 国精品久久久久久国模美| 欧美在线一区亚洲| 十八禁高潮呻吟视频| 午夜免费鲁丝| 欧美在线一区亚洲| 日本五十路高清| 日本av手机在线免费观看| 最近最新中文字幕大全免费视频 | 成年女人毛片免费观看观看9 | 国产激情久久老熟女| 免费高清在线观看日韩| 国产无遮挡羞羞视频在线观看| 久久久久视频综合| 国产精品.久久久| 久热爱精品视频在线9| 一本色道久久久久久精品综合| 中文字幕人妻丝袜一区二区| 欧美日韩精品网址| 国产97色在线日韩免费| 国产欧美亚洲国产| 99热全是精品| 亚洲成国产人片在线观看| 美女高潮到喷水免费观看| 午夜两性在线视频| 一边亲一边摸免费视频| 国产免费现黄频在线看| 热re99久久精品国产66热6| av网站在线播放免费|