999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

2021-12-11 13:32:54GeetanjaliRatheeRaziIqbalandAdelKhelifi
Computers Materials&Continua 2021年8期

Geetanjali Rathee,Razi Iqbaland Adel Khelifi

1Department of Computer Science and Engineering,Jaypee University of Information Technology,Waknaghat,Solan,173234,Himachal Pradesh,India

2Department of Computer Information Systems,University of Fraser Valley,Canada

3Department of Computer Science and IT,Abu Dhabi University,United Arab Emirates,UAE

Abstract:Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes, IoV has not been completely explored by business organizations.In order to tackle this problem, we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition, the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulationresults show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.

Keywords: Pervasive computing; vehicular networks; security; trust;decision schemes; trusted internet of vehicles; big data

1 Introduction

Pervasive computing plays a significant role in resolving the issues of data processing in distributed heterogeneous environments.The involvement of various machine learning and IoT devices allows automatic communication among the devices in real-time environment.Over the last few decades, a massive effort is being employed around the globe to introduce smart applications, including smart cities, smart homes, smart industries, smart grids, smart healthcare and smart transportation, to name a few [1,2].The Internet and deployment of new technologies allow organizations and business players to communicate among each other.This pertains to the supply strategies, product suppliers, perspective and physical customers etc.In order to ensure an accurate, fast and immediate response, pervasive computing offers an excellent solution to various organizations and business perspectives.The term pervasive computing is defined as the use of automotive devices where number of objects share, access and process accurate and timely communications through various devices.It is a growing trend of computational capability where objects interact efficiently with the minimum or negligible involvement of the users.The devices are network-connected that interacts automatically from anywhere and at any time.Nowadays,industries are spending a lot of time and cost on research and development to explore various applications of pervasive computing.Because pervasive computing is capable of gathering, processing and exchanging information automatically, the technology can be adopted in variety of applications including activity and data context.IoV can be considered as a vital part of pervasive computing where the vehicles exchange or process the generated data through smart/intelligent devices.The pervasive IoV models can be further benefitted in reducing the traffic congestion,road accidents, weather forecasting and shortest route directions etc.From the user’s perspective,pervasive computing is becoming a formidable solution in IoV to ensure an accurate and immediate vehicular communication as depicted in Fig.1.The depicted Fig.1 details the pervasive computing scheme in IoV having different types of processing methods such as integrating,transmission and analyzing over various vehicles.In addition, the subsection logic and decision making schemes are integrated to ensure a trusted and secure communication using several domain parameters over various attribute values.However, the number of security threats while computing or generating the pervasive decisions still reduces the business interest to fully adopt this technology.The IoV is a novel transportation technology or an application of pervasive computing where vehicles embedded with smart/intelligent sensors are connected to each other or with the adjacent infrastructure [3-5].These vehicles collaborate with each other by sharing information such as accident warning etc.Furthermore, IoV is an emerging application of Intelligent Transportation System (ITS) which enables the users to make safer and better informed decisions by providing innovative services related to different modes of traffic management systems [6-9].

Figure 1:Pervasive computing in internet-of-vehicles

1.1 Motivation

The heterogeneity of various devices in pervasive computing makes IoV-enabled systems vulnerable to several security threats such as man-in-middle attack, denial-of-service attack, message alteration etc.In addition, the involvement of compromised devices while making pervasive decisions may involve various network degradation factors.The preservation of IoT objects from various security threats is also measured as a key issue along with the concern of revamping millions of daily life objects with latest technology which might not even get adapted as IoT devices.However, the goal to reduce environmental impact with the increasing number of vehicles on public roads evokes traffic safety concerns, which integrated with technological advancement leads to development and research in the area of cooperative and autonomous driving [10,11].In addition, sovereign vehicles have the ability to improve the comfort for the drivers as well as passengers.Nevertheless, to bring automated vehicles in the market, we encounter substantial security issues that may only be conquered by critical research with insight along with driver support and local awareness by enabling pervasive vehicular systems.The main motive of autonomous driving is to perceive the environment with on board vehicle sensors, but due to high cost of sensors and their proximity limitations, sensors are only capable of detecting cooperative driving and line-ofsight objects.Platooning is considered as one of the popular vehicle to vehicle communication method where a vehicle follows the vehicle in its front by determining its distance and speed with its sensors [12,13].In cooperative systems where sensors read data from other vehicles, it may also require certain methods to include those signals in their existing control systems for dealing with several security and complexity issues.Therefore, the main objective of this paper is to design a secure and trusted model using pervasive techniques for IoV.

1.2 Research Objective

By considering a variety of real-time applications of various smart devices, it is of utmost to secure the devices by preventing them from various intruders.Pervasive computing in the ITS environment transmit very sensitive information, such as the real time traffic monitoring, traffic congestion, weather conditions etc.Therefore, it must be a paramount necessity that security by design is provided to the automated network.Besides, the presence of malicious nodes may have severe impact on the automated network as they have the ability to tamper the data generated by the IoT devices [14,15].Therefore, this leads to the question about how to provide a secure networking paradigm for enabling the devices to share data in an attack-free pervasive computing environment.In addition, the involvement of various security schemes may invade various security threats while making a real time decisions in the network.Therefore, we have considered the ITS application of IoV pervasive computing to highlight the need of security/trust during communication.

1.3 Contribution of the Paper

The aim of this paper is to introduce a trust system that examines real time traffic situations based on sensory readings and data from surrounding vehicles to guide decision making in automated and cooperative vehicles.The proposed mechanism is inspired by Xia et al.[16] where number of factors and attributes are considered to solve the trust of a sensor using decision making controller to provide safe and reliable decisions.In addition, for securing the communication among vehicles and devices, security schemes are foreseeable for pervasive computing vehicles.The proposed model has a system that supports real time decisions by indicating the trust in perceived situations.The potential contribution of the paper is further detailed as follows:

? A graph theory based trust factor mechanism is used to compute the authenticity of communicating vehicles in the network.

? Further, a multi-attribute scheme known as SAW method is applied to further improve the decision mechanism of the proposed ITS framework.

? The proposed scheme is analyzed over various simulating parameters such as trust nodes,record accuracy, DoS threat and detection rate security metrics.

The rest of the paper is structured as follows.Section 2 illustrates the related work in automated vehicular systems and the use of subjective logic and trust management system in ITS.Section 3 provides details of our proposed solution using subjective logic and trust methods to secure ITS networks.Next, Section 4 provides the details of the simulation model and the results and lastly, Section 5 concludes and directs the prospect of the paper.

2 Related Work

Variety of security schemes have been proposed by scientists and authors to include pervasive computing in ITS.This section describes various security mechanisms through several cryptographic, hypothetical, game theory and experimental methods to ensure security in pervasive computing ITS systems.Ivanov et al.[17] have presented a detailed discussion on vehicular to vehicular communication while exchanging the information among each other.They have illustrated the standardized mechanisms and cyber security threats such as ITU and ISO,ETSI and IEEE for enabling a security communication process in internet based vehicular systems.Tab.1 determines the proposed mechanisms with their performance outcomes of various researchers/scientists.Rawat et al.[18] have proposed a data falsification detection approach in IoV using hash based scheme.The author’s have used hash based encryption mechanism to enhance the vehicular communication mechanism by adopting accurate information about their neighboring environments.The authors have improved throughput and end-to-end delay using clustering scheme for reducing the traffic congestion.

Walker et al.[19] have determined an intrusion detection system within pervasive and ubiquitous environment to classify the threats both qualitatively and quantitative.The authors have examined the cyber security concerned in pervasive computing environment while processing the information through various smart/intelligent devices.Pei et al.[20] have proposed a secure pervasive edge computing model for IoV by designing a model having minimum system delay by considering the speed of vehicles.The sub-optimal and lower bound expressions are formed for allocating the power coefficients.Further, wold and frank algorithm is proposed to achieve an optimum power.Tithi et al.[21] have proposed a friendly jamming location verification security technique for vehicles in ITS to prevent eavesdropping attacks during communication among parties.In addition, the authors have presented an efficient distance bounding and friendly jamming method to detect any deviation and verify the velocity and location of vehicular infrastructure.The results analysis validated the realistic traffic using friendly jamming method with an improvement of 92% reduction rate against existing works.Passerone et al.[22] have addressed a secure pervasive computing issue among vehicles related to authorization and authentication of intervehicular safety commends.The authors have proposed a contract approach with the integration of arrowhead frameworks to ensure secure communication.The proposed mechanism is validated by representing the results on autonomous vehicles.The researchers are now days working on ITS deployment and development by addressing privacy and security concerns.In order to deploy successful communication among vehicles, it is needed that life-critical-safety concerns are not modified by the intruders.Panagiotopoulos et al.[23] have proposed a Diffie-Hellman vehicular communication mechanism for authenticating the data in pervasive computing.The authors improved the security towards internet of vehicles system.

Table 1:Secure IoV mechanism proposed by various researchers

In order to enhance the security among automated vehicles such as channels, sensors and existing methods, various controlling systems are used.To protect the arithmetic operations of these controllers, Cheon et al.[24] have proposed homomorphic cryptographic scheme by proposing a linear homomorphic authentication encryption.The proposed mechanism successfully enhances the security against forgery and eavesdropping attacks against computational tractability.To further improve the road side accidents and safety, high precision maps can be used as additional information.Lai et al.[25] have proposed a privacy and security scheme for real time updates solving two issues i.e., completing quality and payment control systems.The authors have proposed a blockchain mechanism to protect the vehicles’privacy through blind signature techniques.The simulation and theoretical results indicate the optimal benefits in real time map updations to guarantee the reliability and efficiency of the pervasive vehicles.

The improvements in communication, sensing and computations have led to the development of driver-assisted systems.In order to prevent from crashes and control the driver tasks, an adaptive cruise control mechanism was used to maintain the safety and security of the vehicles.Dasjardins et al.[26] have proposed a novel autonomous vehicle based on modern machine learning approaches.The authors presented the benefit of using reinforcement learning for secure longitudinal measures.The authors have used approximation function using gradient descent algorithm.In order to resolve this issue, Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verified the information using a two-level method i.e., data verification along with the selection of miner nodes.Also, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.

Though a variety of security schemes in pervasive techniques based upon encryption algorithm, Blockchain mechanism, hypothetical scenarios and probability methods have been proposed by the scientists.However, each algorithm has its own security concerns such as computation delay, verification delay, key management overhead and so on.Further, the existing mechanisms have significant delay for validating the legitimacy of communicating device in real-time scenarios.In order to overcome from these issue, this paper has proposed a decision making scheme to ensure a secure IoV mechanism with reduced delay and overhead.

3 Proposed Mechanism

The trust among the communicating entities is defined to a significant factor to ensure a secure process in ITS mechanism.The involvement of trusted intermediate nodes during communication may reduce the efforts of computation process and delay in the network.Very few papers have introduced the concept of trust based security in ITS.This paper has proposed a trusted decision scheme while transmitting the message in ITS mechanism.

3.1 System Model

The system model of the proposed mechanism is shown in Fig.2 and is based on graph theory consisting of verticesV, edgesE, and Trust Factor(TF).The vertex V includingv1,v2,...,vn, is the set of vertices that define the number of nodes in the network,Eare the edges or links that establish a connection while sharing or transmitting the information in the network andeijis defined as a relation or a link from nodevitovj.

Figure 2:Identification of trusted IoT device

The links among nodes in the network may be direct (neighboring nodes that are directly attached) or indirect (nodes that are attached via more than 1 hop).Additionally,TFis a function asand represents a trust value that is a real number between 0 and 1 and betweenviandvj.According to our proposed phenomenon, the trust model of IoV network is defined as a directed graph as shown in Fig.2 consisting of five devices asv1,v2,...v5, with their edgeseijand trust factorTFij.Now, the working of trusted pervasive mechanism using trust based factor is now detailed in below subsections.

3.2 Node’s Trust Factor

TheTFof each node inviandvjis represented between 0 and 1 where 0 signifies an untrustworthy node while 1 implies a completely readable and trusted node.The trust grading criteria is depicted in Tab.2 to determine the behavior of each node in the network.Further, a threshold value is assumed in order to differentiate between malicious and faulty nodes.If theTFof any device is less than 0.75 then it is regarded as a completely disinfected and malevolent node.

Now, theTFof the nodes in the directed graph are computed by analyzing their in-degree and out-degree whereTFinis defined asTFthat the neighboring node gets aboutviwhileTFoutis theTFthatvihas about its neighbors.

Table 2:Definition of trust factor

3.3 Trust Classification

The trust values can be classified into three different types i.e., path information and historical information.Path trust value is defined as the value of a path from source to destination computed usingTFinandTFoutwhile the historical trust is the summation of multiple trust values such as recommended trust, direct trust, activeness and incentive function of each node.

Path trust on the other hand, is the one that determines the service levels based on the assessment of pathTV.It can be determined as a constriction in routing decisions asPTFij=min(TFik)as shown in Fig.2.PTF14is defined as path 124 and isi≤k≤j?1min(0.90,0.86)=0.86.

3.4 Historical TF(HTF)

It is defined as a node’s topological behavior based on historical information interaction computed by various decision factors such as recommended trust factorRTFij, Direct Trust FactorDTFij, Activation Trust FactorATFijand Incentive Trust FactorITFijthat can be computed by Eq.(1).

3.5 Recommending TF(RTF)

In order to fasten up the communication mechanism and reduce computational and communication overhead, theRTFijis used to predict theTFof the nodes that are repeatedly used while sharing or transmitting the information through a particular path in real time scenario.Initially,the threshold credibility of a recommended value is used to compared to theTFof a node.If theRTFijis greater than threshold, then we may use the recommendedTFof that node.RecommendedTFmay use theRTFof that node.RTFmay be for direct or indirect path recommended by only reliable and highly trusted nodes.DTF=minTFijwhileITF=minTik+Tkj.

3.6 Direct TF(DTF)

The direct path or link between two nodes is defined as a direct connection where theTFfor direct link is calledDTF.However, interaction among multiple hops and their information is defined asITF.The directTFijof a nodevito nodevjis defined as the summation oftintovjwith total number of interactions as given in Eq.(2).

wherekis the average of overall interaction computations withinNintervals.

3.7 Activeness TF(ATF)

The malicious nodes in the network try to attract maximum number of nodes by specifying shortest path and a highly reliable behavior to trap ideal devices.The activation function is the degree through which the behavior of a number of nodes can be easily computed by analyzing their activeness in the network is defined as Eq.(3).

whereIdetermines the cumulative entities that are associated with the node under evaluationvjwhereμis termed as threshold value.

3.8 Incentive Function(IF)

In order to encourage trustworthy nodes to participate in network communication and to generate an alarm upon identification of malicious neighboring nodes, the proposed framework has used an incentive function.An extra credit is assigned to each trusted node to find or inform any malicious node that is directly or indirectly connected to the network.Further, penalties are imposed on the nodes that act maliciously, the nodes having high penalty rates would be assigned a lowTFand may be blocked permanently from future communication.The nodes having higher credit points are considered as highly trusted and can be used to recommend maximum number of neighboring nodes to fasten up their communication process as defined in Eqs.(4) and (5).

3.9 Subjective Adjective Weight(SAW)

Subjective Adjective Weight (SAW) [28] theory is a decision making model that is considered as one of the most significant multi criterion decision making schemes.SAW method integrates the quantitative and qualitative factors via multiple index assessment procedure in four different steps.

Step 1:Initially, generate an evaluation matrix consisting ofMentities/node known as alternatives andNservices.The first procedure of SAW is to create a decision matrix with the junction of each alternative and criteria.Now, let’s denoteD=as the matrix of decision, wheredijis the ith device rating with respect to the jth criteria.

Step 2:The generated matrix is normalized torijby constructing a normalized matrix of decisions for beneficial and non beneficial attributes known as:

Beneficial attribute

Non-Beneficial attribute

Step 3:A weight setWifor eachi=1,2...nis fixed for the service measures by creating weighted and normalized matrix of decision as:

Step 4:The score of the ith alternative is computed by:

Step 5:At last, the Optimal Alternative (OA) is chosen as:whereSiis the score metrics from alternatives score i.

We have used SAW to precisely determine the weight of trusted decision factors based upon nodes’historical behaviors as:

The execution of proposed mechanism is also described through an algorithm as mentioned in Algorithm 1.

Algorithm 1:Trusted algorithm (subjective logic and SAW)Input:A set of ‘n’devices/vehicles Output:Device is trusted or malicious Step 1:A network is represented through a directed graph having ‘n’number of vertices ‘V’?v1,v2...vn and ‘n’number of edges ‘E’?e1,e...en Step 2:TF is computed by each node depending upon various criterions such as:TF=RTF+DTF+ATF+ITF Step 3:SAW approach is used to further to compute the TF to identify beneficial and non-beneficial attributes where,

Beneficial attribute rij= dij dmax ij Non-Beneficial attribute rij=dmax ij dij If (deviceTF >threshold) then Device is trusted Else Device is malicious End if

4 Performance Analysis

4.1 System State

The proposed trusted mechanism is analyzed using trust management system through SAW decision model against Kang et al framework.To validate and compare the results, the proposed approach is evaluated against number of networking metrics over existing method such as trusted nodes, data alteration, accuracy, satisfaction rate and etc.200 nodes are initially deployed whose decision factors are updated after every 80 seconds.Further, the proposed approach’s legitimacy is validated by intentionally adding malicious devices in the network.The simulation criteria used to determine the simulated results are represented in Tab.3.Assumptions:Threshold valueμused to distinguish between types of devices is assumed as 0.49.The malicious nodes are increasing at 5% and 10% rate upon increasing the network size.

Table 3:Simulation parameters

4.2 Existing(Conventional)Method

The efficiency and management of the proposed approach is evaluated using numerical simulations through MATLAB.Kang et al.[27] have ensured the security to the vehicles by proposing a Blockchain based mechanism.The proposed method verifies the information using two-level method as data verification along with the selection of miner nodes.Furthermore, the internal collaboration of each block is enhanced using content theory system where each and every block is verified by the miners.Incentive function, activation record and SAW approaches are used to analyze the trust of each communicating node.The SAW decision method is used to evoke the node’s legitimacy by analyzing number of metrics using subjective logic function.The out performance of the proposed framework is verified against various security measures such as message alteration, node satisfaction, accuracy and detection of legitimate nodes.

4.3 Results and Discussion

The impacts of a trusted message system and SAW model while analyzing each and every activity of the IoV system are discussed in this paper.Fig.3 depicts correct node identification based on the proposed approach.As clearly seen in the presented Fig.3, the involvement of reputation model, incentive function and SAW function using multiple decision function ensures a better identification of communicating nodes (either malicious or trusted).However, existing (baseline) scheme performs less and exhibits reduced efficiency after increasing the intercommunication among IoT devices.

In addition, Fig.4 represents record accuracy graph where upon increasing the number of nodes, it is very difficult to alter the transmitted or recorded data.The record accuracy of proposed phenomenon is better as compare to existing mechanism because of trust computation approach of each device while exchanging the information among each other.

Figure 3:Identification of trusted IoT device

The incentive and activation functions adversely affect a node’s reputation upon behaving maliciously and may possibly block or disown from communicating in the network.Subjective logic function efficiently analyzes the accuracy of communicating nodes by computing their trust values.However, the continuous analysis and recording of communicating nodes is very difficult in case of baseline mechanism.In addition, Fig.5 determines the detection rate of malicious nodes using SAW approach.Subjective logic system filters out the overhead communication and networking congestion by computing non-beneficial and beneficial attributes.The filtered record management may speed up the computation process and identification of trust factors with more accuracy.

Figure 4:Record accuracy

Figure 5:Detection rate

Finally, Fig.6 evaluates the proposed scheme’s out-performance against DoS malicious threat.During initial node’s establishment where it is necessary to analyze node’s authenticity, it may involve various malicious threats.The proposed approach outperforms as compare to existing mechanism because of involved pervasive techniques while communicating among various devices.

However, upon increasing the devices, proposed approach is successfully able to predict the malicious nodes performing various attacks in the network.

Figure 6:DoS detection threat

5 Conclusion

In this paper, we have considered an IoV application in pervasive computing to secure the process of data transfer in real-time environment.To further improve the safety and prevent road accidents and security issues, a variety of intelligent transportation systems have been proposed by various researchers.In this paper, a trusted security mechanism is proposed using various decision making factors and trust classification schemes.The proposed mechanism enhances the network security during pervasive computing where smart devices are generating and processing real time information without any involvement of human power.The proposed mechanism efficiently enhances the trusted node identification, record accuracy and detection rate using SAW approach having accurate and immediate identification of ideal communication nodes in the network.The results are simulated by analyzing the trust value of each device analyzing its communicational behavior.All the simulated results are verified over a conventional (baseline)approach.The number of patterns that can be further analyzed and learned by attackers still needs to be determined.

Further, how the proposed mechanism can be further improved having intelligent transportation scheme over dynamic attacking patterns with modified security threats may be considered in future work.

Acknowledgement:This work is supported by the Jaypee University of Information Technology,India, University of Fraser Valley, Canada and Abu Dhabi University, United Arab Emirates.

Funding Statement:The work was funded by the Abu Dhabi University, Faculty Research Incentive Grant (19300483-Adel Khelifi), United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产成人亚洲精品蜜芽影院| 国产精品无码AV中文| 伊人婷婷色香五月综合缴缴情| 五月激情婷婷综合| 亚洲AV一二三区无码AV蜜桃| 亚洲精品第一页不卡| 日本久久网站| 2020精品极品国产色在线观看 | 精品久久综合1区2区3区激情| 日本在线欧美在线| 国产一区二区福利| 综合色婷婷| 亚洲色图另类| 激情综合网址| 91人妻在线视频| 欧美在线天堂| 播五月综合| 美臀人妻中出中文字幕在线| 国产XXXX做受性欧美88| 99久视频| 亚洲侵犯无码网址在线观看| 亚洲精品欧美重口| 美女无遮挡被啪啪到高潮免费| 国产白浆在线| 少妇精品在线| 中文字幕无码制服中字| 丁香亚洲综合五月天婷婷| 大学生久久香蕉国产线观看| 国产成人久视频免费| 欧美精品1区2区| 高清亚洲欧美在线看| 久久精品娱乐亚洲领先| 国产精品美女网站| 久久中文无码精品| 看国产毛片| 国产欧美专区在线观看| 亚洲精品无码抽插日韩| 伊人久久婷婷| 人妻丝袜无码视频| 青青草一区| 看av免费毛片手机播放| 欧美性精品| 色综合日本| 免费网站成人亚洲| 成年女人18毛片毛片免费| 无码国产伊人| 亚洲视频一区| 国产精品99一区不卡| 欧类av怡春院| 最新国产高清在线| 国产人人乐人人爱| 91精品最新国内在线播放| 亚洲第一区精品日韩在线播放| 99热免费在线| 91系列在线观看| 久久黄色一级视频| 色婷婷在线影院| 国产精品99在线观看| 国产v精品成人免费视频71pao | 精品久久高清| 97综合久久| 中国黄色一级视频| 久久亚洲国产最新网站| 91精品小视频| 99精品久久精品| 99在线小视频| 一级爱做片免费观看久久| 无码日韩视频| 婷婷丁香色| 亚洲色中色| 精品国产www| 国产制服丝袜91在线| v天堂中文在线| 精品国产污污免费网站| 喷潮白浆直流在线播放| 精品国产污污免费网站| 亚洲国产综合精品中文第一| 亚洲色无码专线精品观看| 成人av专区精品无码国产| 她的性爱视频| 日本高清在线看免费观看| 久久人人妻人人爽人人卡片av|