999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

2021-12-11 13:32:54GeetanjaliRatheeRaziIqbalandAdelKhelifi
Computers Materials&Continua 2021年8期

Geetanjali Rathee,Razi Iqbaland Adel Khelifi

1Department of Computer Science and Engineering,Jaypee University of Information Technology,Waknaghat,Solan,173234,Himachal Pradesh,India

2Department of Computer Information Systems,University of Fraser Valley,Canada

3Department of Computer Science and IT,Abu Dhabi University,United Arab Emirates,UAE

Abstract:Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes, IoV has not been completely explored by business organizations.In order to tackle this problem, we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition, the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulationresults show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.

Keywords: Pervasive computing; vehicular networks; security; trust;decision schemes; trusted internet of vehicles; big data

1 Introduction

Pervasive computing plays a significant role in resolving the issues of data processing in distributed heterogeneous environments.The involvement of various machine learning and IoT devices allows automatic communication among the devices in real-time environment.Over the last few decades, a massive effort is being employed around the globe to introduce smart applications, including smart cities, smart homes, smart industries, smart grids, smart healthcare and smart transportation, to name a few [1,2].The Internet and deployment of new technologies allow organizations and business players to communicate among each other.This pertains to the supply strategies, product suppliers, perspective and physical customers etc.In order to ensure an accurate, fast and immediate response, pervasive computing offers an excellent solution to various organizations and business perspectives.The term pervasive computing is defined as the use of automotive devices where number of objects share, access and process accurate and timely communications through various devices.It is a growing trend of computational capability where objects interact efficiently with the minimum or negligible involvement of the users.The devices are network-connected that interacts automatically from anywhere and at any time.Nowadays,industries are spending a lot of time and cost on research and development to explore various applications of pervasive computing.Because pervasive computing is capable of gathering, processing and exchanging information automatically, the technology can be adopted in variety of applications including activity and data context.IoV can be considered as a vital part of pervasive computing where the vehicles exchange or process the generated data through smart/intelligent devices.The pervasive IoV models can be further benefitted in reducing the traffic congestion,road accidents, weather forecasting and shortest route directions etc.From the user’s perspective,pervasive computing is becoming a formidable solution in IoV to ensure an accurate and immediate vehicular communication as depicted in Fig.1.The depicted Fig.1 details the pervasive computing scheme in IoV having different types of processing methods such as integrating,transmission and analyzing over various vehicles.In addition, the subsection logic and decision making schemes are integrated to ensure a trusted and secure communication using several domain parameters over various attribute values.However, the number of security threats while computing or generating the pervasive decisions still reduces the business interest to fully adopt this technology.The IoV is a novel transportation technology or an application of pervasive computing where vehicles embedded with smart/intelligent sensors are connected to each other or with the adjacent infrastructure [3-5].These vehicles collaborate with each other by sharing information such as accident warning etc.Furthermore, IoV is an emerging application of Intelligent Transportation System (ITS) which enables the users to make safer and better informed decisions by providing innovative services related to different modes of traffic management systems [6-9].

Figure 1:Pervasive computing in internet-of-vehicles

1.1 Motivation

The heterogeneity of various devices in pervasive computing makes IoV-enabled systems vulnerable to several security threats such as man-in-middle attack, denial-of-service attack, message alteration etc.In addition, the involvement of compromised devices while making pervasive decisions may involve various network degradation factors.The preservation of IoT objects from various security threats is also measured as a key issue along with the concern of revamping millions of daily life objects with latest technology which might not even get adapted as IoT devices.However, the goal to reduce environmental impact with the increasing number of vehicles on public roads evokes traffic safety concerns, which integrated with technological advancement leads to development and research in the area of cooperative and autonomous driving [10,11].In addition, sovereign vehicles have the ability to improve the comfort for the drivers as well as passengers.Nevertheless, to bring automated vehicles in the market, we encounter substantial security issues that may only be conquered by critical research with insight along with driver support and local awareness by enabling pervasive vehicular systems.The main motive of autonomous driving is to perceive the environment with on board vehicle sensors, but due to high cost of sensors and their proximity limitations, sensors are only capable of detecting cooperative driving and line-ofsight objects.Platooning is considered as one of the popular vehicle to vehicle communication method where a vehicle follows the vehicle in its front by determining its distance and speed with its sensors [12,13].In cooperative systems where sensors read data from other vehicles, it may also require certain methods to include those signals in their existing control systems for dealing with several security and complexity issues.Therefore, the main objective of this paper is to design a secure and trusted model using pervasive techniques for IoV.

1.2 Research Objective

By considering a variety of real-time applications of various smart devices, it is of utmost to secure the devices by preventing them from various intruders.Pervasive computing in the ITS environment transmit very sensitive information, such as the real time traffic monitoring, traffic congestion, weather conditions etc.Therefore, it must be a paramount necessity that security by design is provided to the automated network.Besides, the presence of malicious nodes may have severe impact on the automated network as they have the ability to tamper the data generated by the IoT devices [14,15].Therefore, this leads to the question about how to provide a secure networking paradigm for enabling the devices to share data in an attack-free pervasive computing environment.In addition, the involvement of various security schemes may invade various security threats while making a real time decisions in the network.Therefore, we have considered the ITS application of IoV pervasive computing to highlight the need of security/trust during communication.

1.3 Contribution of the Paper

The aim of this paper is to introduce a trust system that examines real time traffic situations based on sensory readings and data from surrounding vehicles to guide decision making in automated and cooperative vehicles.The proposed mechanism is inspired by Xia et al.[16] where number of factors and attributes are considered to solve the trust of a sensor using decision making controller to provide safe and reliable decisions.In addition, for securing the communication among vehicles and devices, security schemes are foreseeable for pervasive computing vehicles.The proposed model has a system that supports real time decisions by indicating the trust in perceived situations.The potential contribution of the paper is further detailed as follows:

? A graph theory based trust factor mechanism is used to compute the authenticity of communicating vehicles in the network.

? Further, a multi-attribute scheme known as SAW method is applied to further improve the decision mechanism of the proposed ITS framework.

? The proposed scheme is analyzed over various simulating parameters such as trust nodes,record accuracy, DoS threat and detection rate security metrics.

The rest of the paper is structured as follows.Section 2 illustrates the related work in automated vehicular systems and the use of subjective logic and trust management system in ITS.Section 3 provides details of our proposed solution using subjective logic and trust methods to secure ITS networks.Next, Section 4 provides the details of the simulation model and the results and lastly, Section 5 concludes and directs the prospect of the paper.

2 Related Work

Variety of security schemes have been proposed by scientists and authors to include pervasive computing in ITS.This section describes various security mechanisms through several cryptographic, hypothetical, game theory and experimental methods to ensure security in pervasive computing ITS systems.Ivanov et al.[17] have presented a detailed discussion on vehicular to vehicular communication while exchanging the information among each other.They have illustrated the standardized mechanisms and cyber security threats such as ITU and ISO,ETSI and IEEE for enabling a security communication process in internet based vehicular systems.Tab.1 determines the proposed mechanisms with their performance outcomes of various researchers/scientists.Rawat et al.[18] have proposed a data falsification detection approach in IoV using hash based scheme.The author’s have used hash based encryption mechanism to enhance the vehicular communication mechanism by adopting accurate information about their neighboring environments.The authors have improved throughput and end-to-end delay using clustering scheme for reducing the traffic congestion.

Walker et al.[19] have determined an intrusion detection system within pervasive and ubiquitous environment to classify the threats both qualitatively and quantitative.The authors have examined the cyber security concerned in pervasive computing environment while processing the information through various smart/intelligent devices.Pei et al.[20] have proposed a secure pervasive edge computing model for IoV by designing a model having minimum system delay by considering the speed of vehicles.The sub-optimal and lower bound expressions are formed for allocating the power coefficients.Further, wold and frank algorithm is proposed to achieve an optimum power.Tithi et al.[21] have proposed a friendly jamming location verification security technique for vehicles in ITS to prevent eavesdropping attacks during communication among parties.In addition, the authors have presented an efficient distance bounding and friendly jamming method to detect any deviation and verify the velocity and location of vehicular infrastructure.The results analysis validated the realistic traffic using friendly jamming method with an improvement of 92% reduction rate against existing works.Passerone et al.[22] have addressed a secure pervasive computing issue among vehicles related to authorization and authentication of intervehicular safety commends.The authors have proposed a contract approach with the integration of arrowhead frameworks to ensure secure communication.The proposed mechanism is validated by representing the results on autonomous vehicles.The researchers are now days working on ITS deployment and development by addressing privacy and security concerns.In order to deploy successful communication among vehicles, it is needed that life-critical-safety concerns are not modified by the intruders.Panagiotopoulos et al.[23] have proposed a Diffie-Hellman vehicular communication mechanism for authenticating the data in pervasive computing.The authors improved the security towards internet of vehicles system.

Table 1:Secure IoV mechanism proposed by various researchers

In order to enhance the security among automated vehicles such as channels, sensors and existing methods, various controlling systems are used.To protect the arithmetic operations of these controllers, Cheon et al.[24] have proposed homomorphic cryptographic scheme by proposing a linear homomorphic authentication encryption.The proposed mechanism successfully enhances the security against forgery and eavesdropping attacks against computational tractability.To further improve the road side accidents and safety, high precision maps can be used as additional information.Lai et al.[25] have proposed a privacy and security scheme for real time updates solving two issues i.e., completing quality and payment control systems.The authors have proposed a blockchain mechanism to protect the vehicles’privacy through blind signature techniques.The simulation and theoretical results indicate the optimal benefits in real time map updations to guarantee the reliability and efficiency of the pervasive vehicles.

The improvements in communication, sensing and computations have led to the development of driver-assisted systems.In order to prevent from crashes and control the driver tasks, an adaptive cruise control mechanism was used to maintain the safety and security of the vehicles.Dasjardins et al.[26] have proposed a novel autonomous vehicle based on modern machine learning approaches.The authors presented the benefit of using reinforcement learning for secure longitudinal measures.The authors have used approximation function using gradient descent algorithm.In order to resolve this issue, Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verified the information using a two-level method i.e., data verification along with the selection of miner nodes.Also, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.

Though a variety of security schemes in pervasive techniques based upon encryption algorithm, Blockchain mechanism, hypothetical scenarios and probability methods have been proposed by the scientists.However, each algorithm has its own security concerns such as computation delay, verification delay, key management overhead and so on.Further, the existing mechanisms have significant delay for validating the legitimacy of communicating device in real-time scenarios.In order to overcome from these issue, this paper has proposed a decision making scheme to ensure a secure IoV mechanism with reduced delay and overhead.

3 Proposed Mechanism

The trust among the communicating entities is defined to a significant factor to ensure a secure process in ITS mechanism.The involvement of trusted intermediate nodes during communication may reduce the efforts of computation process and delay in the network.Very few papers have introduced the concept of trust based security in ITS.This paper has proposed a trusted decision scheme while transmitting the message in ITS mechanism.

3.1 System Model

The system model of the proposed mechanism is shown in Fig.2 and is based on graph theory consisting of verticesV, edgesE, and Trust Factor(TF).The vertex V includingv1,v2,...,vn, is the set of vertices that define the number of nodes in the network,Eare the edges or links that establish a connection while sharing or transmitting the information in the network andeijis defined as a relation or a link from nodevitovj.

Figure 2:Identification of trusted IoT device

The links among nodes in the network may be direct (neighboring nodes that are directly attached) or indirect (nodes that are attached via more than 1 hop).Additionally,TFis a function asand represents a trust value that is a real number between 0 and 1 and betweenviandvj.According to our proposed phenomenon, the trust model of IoV network is defined as a directed graph as shown in Fig.2 consisting of five devices asv1,v2,...v5, with their edgeseijand trust factorTFij.Now, the working of trusted pervasive mechanism using trust based factor is now detailed in below subsections.

3.2 Node’s Trust Factor

TheTFof each node inviandvjis represented between 0 and 1 where 0 signifies an untrustworthy node while 1 implies a completely readable and trusted node.The trust grading criteria is depicted in Tab.2 to determine the behavior of each node in the network.Further, a threshold value is assumed in order to differentiate between malicious and faulty nodes.If theTFof any device is less than 0.75 then it is regarded as a completely disinfected and malevolent node.

Now, theTFof the nodes in the directed graph are computed by analyzing their in-degree and out-degree whereTFinis defined asTFthat the neighboring node gets aboutviwhileTFoutis theTFthatvihas about its neighbors.

Table 2:Definition of trust factor

3.3 Trust Classification

The trust values can be classified into three different types i.e., path information and historical information.Path trust value is defined as the value of a path from source to destination computed usingTFinandTFoutwhile the historical trust is the summation of multiple trust values such as recommended trust, direct trust, activeness and incentive function of each node.

Path trust on the other hand, is the one that determines the service levels based on the assessment of pathTV.It can be determined as a constriction in routing decisions asPTFij=min(TFik)as shown in Fig.2.PTF14is defined as path 124 and isi≤k≤j?1min(0.90,0.86)=0.86.

3.4 Historical TF(HTF)

It is defined as a node’s topological behavior based on historical information interaction computed by various decision factors such as recommended trust factorRTFij, Direct Trust FactorDTFij, Activation Trust FactorATFijand Incentive Trust FactorITFijthat can be computed by Eq.(1).

3.5 Recommending TF(RTF)

In order to fasten up the communication mechanism and reduce computational and communication overhead, theRTFijis used to predict theTFof the nodes that are repeatedly used while sharing or transmitting the information through a particular path in real time scenario.Initially,the threshold credibility of a recommended value is used to compared to theTFof a node.If theRTFijis greater than threshold, then we may use the recommendedTFof that node.RecommendedTFmay use theRTFof that node.RTFmay be for direct or indirect path recommended by only reliable and highly trusted nodes.DTF=minTFijwhileITF=minTik+Tkj.

3.6 Direct TF(DTF)

The direct path or link between two nodes is defined as a direct connection where theTFfor direct link is calledDTF.However, interaction among multiple hops and their information is defined asITF.The directTFijof a nodevito nodevjis defined as the summation oftintovjwith total number of interactions as given in Eq.(2).

wherekis the average of overall interaction computations withinNintervals.

3.7 Activeness TF(ATF)

The malicious nodes in the network try to attract maximum number of nodes by specifying shortest path and a highly reliable behavior to trap ideal devices.The activation function is the degree through which the behavior of a number of nodes can be easily computed by analyzing their activeness in the network is defined as Eq.(3).

whereIdetermines the cumulative entities that are associated with the node under evaluationvjwhereμis termed as threshold value.

3.8 Incentive Function(IF)

In order to encourage trustworthy nodes to participate in network communication and to generate an alarm upon identification of malicious neighboring nodes, the proposed framework has used an incentive function.An extra credit is assigned to each trusted node to find or inform any malicious node that is directly or indirectly connected to the network.Further, penalties are imposed on the nodes that act maliciously, the nodes having high penalty rates would be assigned a lowTFand may be blocked permanently from future communication.The nodes having higher credit points are considered as highly trusted and can be used to recommend maximum number of neighboring nodes to fasten up their communication process as defined in Eqs.(4) and (5).

3.9 Subjective Adjective Weight(SAW)

Subjective Adjective Weight (SAW) [28] theory is a decision making model that is considered as one of the most significant multi criterion decision making schemes.SAW method integrates the quantitative and qualitative factors via multiple index assessment procedure in four different steps.

Step 1:Initially, generate an evaluation matrix consisting ofMentities/node known as alternatives andNservices.The first procedure of SAW is to create a decision matrix with the junction of each alternative and criteria.Now, let’s denoteD=as the matrix of decision, wheredijis the ith device rating with respect to the jth criteria.

Step 2:The generated matrix is normalized torijby constructing a normalized matrix of decisions for beneficial and non beneficial attributes known as:

Beneficial attribute

Non-Beneficial attribute

Step 3:A weight setWifor eachi=1,2...nis fixed for the service measures by creating weighted and normalized matrix of decision as:

Step 4:The score of the ith alternative is computed by:

Step 5:At last, the Optimal Alternative (OA) is chosen as:whereSiis the score metrics from alternatives score i.

We have used SAW to precisely determine the weight of trusted decision factors based upon nodes’historical behaviors as:

The execution of proposed mechanism is also described through an algorithm as mentioned in Algorithm 1.

Algorithm 1:Trusted algorithm (subjective logic and SAW)Input:A set of ‘n’devices/vehicles Output:Device is trusted or malicious Step 1:A network is represented through a directed graph having ‘n’number of vertices ‘V’?v1,v2...vn and ‘n’number of edges ‘E’?e1,e...en Step 2:TF is computed by each node depending upon various criterions such as:TF=RTF+DTF+ATF+ITF Step 3:SAW approach is used to further to compute the TF to identify beneficial and non-beneficial attributes where,

Beneficial attribute rij= dij dmax ij Non-Beneficial attribute rij=dmax ij dij If (deviceTF >threshold) then Device is trusted Else Device is malicious End if

4 Performance Analysis

4.1 System State

The proposed trusted mechanism is analyzed using trust management system through SAW decision model against Kang et al framework.To validate and compare the results, the proposed approach is evaluated against number of networking metrics over existing method such as trusted nodes, data alteration, accuracy, satisfaction rate and etc.200 nodes are initially deployed whose decision factors are updated after every 80 seconds.Further, the proposed approach’s legitimacy is validated by intentionally adding malicious devices in the network.The simulation criteria used to determine the simulated results are represented in Tab.3.Assumptions:Threshold valueμused to distinguish between types of devices is assumed as 0.49.The malicious nodes are increasing at 5% and 10% rate upon increasing the network size.

Table 3:Simulation parameters

4.2 Existing(Conventional)Method

The efficiency and management of the proposed approach is evaluated using numerical simulations through MATLAB.Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verifies the information using two-level method as data verification along with the selection of miner nodes.Furthermore, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.Incentive function, activation record and SAW approaches are used to analyze the trust of each communicating node.The SAW decision method is used to evoke the node’s legitimacy by analyzing number of metrics using subjective logic function.The out performance of the proposed framework is verified against various security measures such as message alteration, node satisfaction, accuracy and detection of legitimate nodes.

4.3 Results and Discussion

The impacts of a trusted message system and SAW model while analyzing each and every activity of the IoV system are discussed in this paper.Fig.3 depicts correct node identification based on the proposed approach.As clearly seen in the presented Fig.3, the involvement of reputation model, incentive function and SAW function using multiple decision function ensures a better identification of communicating nodes (either malicious or trusted).However, existing (baseline) scheme performs less and exhibits reduced efficiency after increasing the intercommunication among IoT devices.

In addition, Fig.4 represents record accuracy graph where upon increasing the number of nodes, it is very difficult to alter the transmitted or recorded data.The record accuracy of proposed phenomenon is better as compare to existing mechanism because of trust computation approach of each device while exchanging the information among each other.

Figure 3:Identification of trusted IoT device

The incentive and activation functions adversely affect a node’s reputation upon behaving maliciously and may possibly block or disown from communicating in the network.Subjective logic function efficiently analyzes the accuracy of communicating nodes by computing their trust values.However, the continuous analysis and recording of communicating nodes is very difficult in case of baseline mechanism.In addition, Fig.5 determines the detection rate of malicious nodes using SAW approach.Subjective logic system filters out the overhead communication and networking congestion by computing non-beneficial and beneficial attributes.The filtered record management may speed up the computation process and identification of trust factors with more accuracy.

Figure 4:Record accuracy

Figure 5:Detection rate

Finally, Fig.6 evaluates the proposed scheme’s out-performance against DoS malicious threat.During initial node’s establishment where it is necessary to analyze node’s authenticity, it may involve various malicious threats.The proposed approach outperforms as compare to existing mechanism because of involved pervasive techniques while communicating among various devices.

However, upon increasing the devices, proposed approach is successfully able to predict the malicious nodes performing various attacks in the network.

Figure 6:DoS detection threat

5 Conclusion

In this paper, we have considered an IoV application in pervasive computing to secure the process of data transfer in real-time environment.To further improve the safety and prevent road accidents and security issues, a variety of intelligent transportation systems have been proposed by various researchers.In this paper, a trusted security mechanism is proposed using various decision making factors and trust classification schemes.The proposed mechanism enhances the network security during pervasive computing where smart devices are generating and processing real time information without any involvement of human power.The proposed mechanism efficiently enhances the trusted node identification, record accuracy and detection rate using SAW approach having accurate and immediate identification of ideal communication nodes in the network.The results are simulated by analyzing the trust value of each device analyzing its communicational behavior.All the simulated results are verified over a conventional (baseline)approach.The number of patterns that can be further analyzed and learned by attackers still needs to be determined.

Further, how the proposed mechanism can be further improved having intelligent transportation scheme over dynamic attacking patterns with modified security threats may be considered in future work.

Acknowledgement:This work is supported by the Jaypee University of Information Technology,India, University of Fraser Valley, Canada and Abu Dhabi University, United Arab Emirates.

Funding Statement:The work was funded by the Abu Dhabi University, Faculty Research Incentive Grant (19300483-Adel Khelifi), United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 伊人久久精品无码麻豆精品| 99人妻碰碰碰久久久久禁片| 无码在线激情片| 日韩在线成年视频人网站观看| 久久国产免费观看| 欧美一级夜夜爽| 久久精品亚洲热综合一区二区| 亚洲天堂精品在线观看| 国产一区免费在线观看| 亚洲欧洲日产国产无码AV| 黄片在线永久| 国产伦片中文免费观看| 国产精品偷伦视频免费观看国产| 91亚洲免费| 蜜桃臀无码内射一区二区三区 | 99re视频在线| 中文字幕在线看视频一区二区三区| 97se亚洲综合在线韩国专区福利| 成人综合久久综合| 日韩在线影院| 国产美女丝袜高潮| 无码内射在线| 亚洲精品另类| 亚洲精品国产综合99久久夜夜嗨| 天天色天天操综合网| 国产精品视频a| 四虎成人在线视频| 国内精品久久久久久久久久影视 | 国产极品美女在线观看| 久久99蜜桃精品久久久久小说| 免费va国产在线观看| 日韩欧美高清视频| 欧美天堂在线| 成人一级免费视频| 无码福利视频| 天天躁日日躁狠狠躁中文字幕| 波多野结衣亚洲一区| 亚洲国产欧美中日韩成人综合视频| 亚洲AV无码久久精品色欲| 丰满人妻久久中文字幕| 天天色天天综合| 亚洲V日韩V无码一区二区| 精品国产毛片| 激情在线网| av在线5g无码天天| 精品国产网| 黄色污网站在线观看| 午夜精品国产自在| 青草国产在线视频| …亚洲 欧洲 另类 春色| 黄色网址手机国内免费在线观看| 色欲综合久久中文字幕网| 精品一区二区久久久久网站| 538精品在线观看| 亚洲男人天堂2018| 热久久国产| 色婷婷色丁香| 巨熟乳波霸若妻中文观看免费| 欧美精品亚洲精品日韩专区va| 狠狠v日韩v欧美v| 欧美一级专区免费大片| 中文字幕va| 日韩a在线观看免费观看| 久久精品娱乐亚洲领先| 手机成人午夜在线视频| 中文字幕亚洲乱码熟女1区2区| 亚洲区一区| 欧美精品另类| 亚洲国产清纯| 麻豆精品在线播放| 国产精品9| 青青青国产视频| 超碰精品无码一区二区| 亚洲天堂色色人体| 亚洲v日韩v欧美在线观看| 精品自窥自偷在线看| 亚洲国产91人成在线| 国产正在播放| 免费一级毛片在线播放傲雪网| 中文字幕欧美日韩高清| 欧美成人精品一级在线观看| 国产手机在线小视频免费观看|