• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Light Weight Cryptographic Address Generation (LWCGA) Using System State Entropy Gathering for IPv6 Based MANETs

    2017-04-09 05:52:55ReshmiMurugan
    China Communications 2017年9期
    關(guān)鍵詞:單字南昌大學(xué)除險(xiǎn)

    Reshmi T.R*, Murugan K

    1 VIT University, Chennai, India

    2 Anna University, Chennai, India

    * The corresponding author, email: reshmi.tr@vit.ac.in

    I. INTRODUCTION

    Mobile Ad-hoc Networks (MANETs) are infrastructure-less networks with self-configured hosts communicated via multi-hop communications. IPv6 autoconfiguration was designed to automatically attach a new node to a network and obtain information needed for connectivity. The main goal of autoconfiguration is to have the entire process occur automatically without human interaction, which eases the formation of spontaneous MANETs.Generally key exchange schemes are used to ensure secured communication in MANETs.But these automatic key exchanges can occur only between hosts with established IPv6 addresses. So IPsec is incapable of performing an automatic key exchange, and secure auAtoconfiguration process.

    IPv6 uses a hierarchical addressing scheme for the ease of address management. The IPv6 provides an active network interface with a default IPv6 address called the link-local address. This address is fully functional within the local segment and is not routed by routers.Hosts use this address to communicate with other hosts in same network. The 128-bit link local address consists of two 64-bit portions:a special link-local prefix (FE80:: /10) and a MAC address derived Extended Unique Identifier (EUI-64). The 48-bit MAC is first divided into two 24-bit halves and is filled with 16-bit FFFE in the middle. The 7th bit of the interface identifier (IID) signifies whether the address is global (0) or local (1). The 8th bit is called the group bit; and it signifies whether the address is unicast (0) or multicast (1). The EUI-64 based address generation in Stateless Address Autoconfiguration (SLAAC) [2] is shown in figure 1.

    When a node generates a tentative link-local address, it is checked for duplication on the subnet by the Neighbor Discovery Protocol(NDP) [1] assisted process called Duplicate Address Detection (DAD). Each network interface card (NIC) has multiple valid IPv6 addresses such as link-local, assigned unicast, solicited-node multicast, and all-nodes multicast addresses etc. The interfaces are configured with the all-nodes and solicited-node multicast group addresses to perform DAD. During DAD process, the Neighbor Solicitation (NS)messages are sent to the solicited-node multicast address. A Neighbor Advertisement (NA)message allows two nodes to detect the use of the same addresses on the network. When a duplicate is detected, the node with a permanent address, sends back an NA message to the requestor’s solicited node multicast address stating the collision. The node then performs regeneration of addresses and DAD up to two more times, after which a warning is written to the system log and the interface attempting to autoconfigure is disabled. If no duplication is detected, the address is considered unique and is assigned as permanent address.

    Fig. 1 EUI-64 generation in SLAAC

    The link-local address is used as an initial default address to retrieve the global and other network-prefix addresses. In a network, when a node receives a Router Advertisement (RA)(unsolicited or as a reply for Router Solicitation (RS)), it creates an IPv6 address appropriate for the advertised network prefix. These addresses are created by attaching the advertised prefix to the already derived EUI-64.

    The EUI-64 in IPv6 addresses remains stable for each subnet with the same network interface address, even when the client moves across different networks. So the one-to-one mapping of MAC addresses and EUI-64 in IPv6 addresses paves way to many privacy and security issues. When a node continues using the identity of a EUI-64 based link-local address and retrieves other addresses, it will be permanently bounded to the node and hence the mobility pattern of the node can be easily tracked. Beyond creating privacy issues,it also poses as potential source for information leakage. The EUI-64 based addresses in SLAAC are prone to different types of attacks given below.

    ● Impersonation: The lack of link layer control and spoofed MAC addresses can indulge any node to claim to be the existing member node in a network by generating the genuine member’s EUI-64 based address. These attacks can impersonate as both routers and hosts too. The address spoofing of router results in higher damage,as it can imply man-in-the-middle attacks.

    ● Denial of Service (DoS): Spoofing of DAD replies can introduce DoS attacks as the neighbor nodes consider that the network is undergoing a network merge or partition.Thereby the attackers will never allow genuine member nodes to participate or get services in the network.

    The SeND augmented IPv6 packets with the different fields of CGA options is given in figure 2.

    The above three categories of attacks are launched by altering the Internet Control Message Protocol Version 6 (ICMPv6) messages exchanged during autoconfiguration. The details of the ICMPv6 message exchanges are given in table 1.

    “沒(méi)錯(cuò),這兩棟樓之間的距離并不遠(yuǎn)。如果用木板架起一座橋的話,就好解釋多了?!被翳F不動(dòng)聲色地說(shuō),“可是,我向陸叔叔的助手了解過(guò)了,這段時(shí)間他根本就沒(méi)出過(guò)工作室的門(mén)。”

    ii. L1 Data Cache: The L1 cache also known as the primary cache memory in the processor core possesses information of the latest data used by a processor. In the LW-CGA, the cache lines of the L1 data cache are assumed to be in one of the seven possible states. This data is usually mapped in the SCROLL table between any one of the available 32 byte block .The L1 cache is selected as one of the 7512 possible states.The processor might additionally possess L2 and L3 caches which are not considered in this implementation.

    Table I ICMP message exchanged during autocofiguration

    Table II Attacks launched during autoconfiguration

    Table III ICMPv6 option types in SeND

    Fig. 2 SeND augmented IPv6 packet format

    The proposal is a light weight cryptographic address generation which is an alternate for CGA in SeND, The proposed scheme aims to bring a new address generation technique to adapt to MANET environment and is not targeted to improve the security of the scheme.The motivation of the proposed scheme is to assure:

    (1) The IPv6 addresses after CGA generation does not any way relate to MAC addresses and are unique within each subnet for each address in the same network interface of the same client.

    The LW-CGA includes several options to regenerate the CGA, resulting in different IPv6 addresses. These regenerations are explicitly prompted by a function call REGENERATE( )in the daemon. The various options provided by the LW-CGA regeneration are listed below.

    (3) The CGA based IPv6 addresses are reconfigured during network merging, partitioning or renumbering.

    The paper is organized into five sections.Section 1 discusses the introduction of the paper following the discussion of the existing work in Section 2. The Section 3 discusses the proposed work and the working of the scheme.Section 4 discusses the experimental setup and evaluations. Section 5 discusses the conclusion and the future works.

    II. BACKGROUND

    The SeND uses an asymmetric cryptography to enforce authentication and integrity without changing the zero configuration standard of the ND protocol. SeND encodes its ICMPv6 messages [6] by using few new option types that are not used in the regular ND messages.The table 3 lists the new ICMPv6 option types used in SeND. RSA keys and Cryptographically Generated Address (CGA) [5] are used to ensure authenticity in SeND. CGA alike regular IPv6 address has two 64-bit portions.

    ● Redirection: The methodology of redirection attack is almost similar to the impersonation attack. The attacker misdirects the target node or nodes attempting to connect to the destination nodes by directing to any other unsafe destination to capture the communication packets or interrupt the node communication. Attackers may also announce the change in router address, or network prefixes to interrupt the node communications.

    The first 64 bits represents the network prefix and the second represents the IID, which is derived using the SeND specific CGA generation process. The augmented option fields of CGA in SeND includes Public Key,128-bit-modifier, 64-bit subnet prefix of the address and 8-bit collision count. The SeND uses two hash functions using the parameters given in the CGA option field. The HASH1 and HASH2 functions play a major role in CGA generation. The generations of CGAs involve determining the public key of the owner address, selecting the appropriate security-level (Sec) ranging from 0 to 7and generation of a random 128 bit modifier. Then it is subjected to SHA-1 hashing and is looped continuously with various values assigned to the modifier until 16 × Sec leftmost-bits of HASH2 equals zero. This final modifier value is again used along with the various other CGA parameters as the input to the HASH1. HASH1 is the leftmost 64-bit of the SHA-1 hash function.It concatenates the modifier, subnet, collision count and the public key fields of CGA options. HASH1 resultant is modified and used as the IID in CGA. The seventh bit of HASH1 is modified to represent whether the address is global or local. The eighth bit represents whether the address represents unicast or multicast groups. TheHASH1 uses a hash extension technique using the Security Parameter (Sec) to decide the strength of the hash function. In CGA Sec is used as the first 3 bits of the IID. The CGA generation process is represented in figure 3.

    During the verification process, the CGA options in the ICMPv6 packets are first extracted to calculate the HASH1 and HASH2 values. At first the bit sequence (excluding seventh and eighth bit) of the calculated HASH1 is compared with the IID. The SeND daemon then compares the 16 x Sec leftmost bits of HASH2 to zero. If any of these comparisons fails, the packet processing is stopped and the packet is discarded. Following these verification the digital signatures are verified.The RSA signature method helps to prove whether the public key corresponds to the private key of the packet sender. This binds the CGA and the key pair of the same origin.Even though authentication is well addressed by CGA and RSA, authorization is still a challenging issue in SeND. Hence this scheme is prone to rouge router attacks like poisoned router, malicious router, default router kill etc.(discussed in table 2).

    Both packet size and the computational intensity for CGA generation in SeND is a major concern for MANETs. In general,MANETs are at risk as it would be easy for an attacker to flood the network with large, expensive-to-process packets, consuming bandwidth, resources and energy, resulting in limited responsiveness of the nodes. Due to the frequent exchange of packets during merging and partitioning of MANETs, SeND employs reconfiguration of nodes that would greatly increase the resource consumption of nodes.

    A SeND context is an internal data structure that stores information about the interface,options, prefixes, and keys used by packets.So for every packet that fails or pass the verification process adds a context to the stored information, and hence adds unnecessary computation. The computational cost of a CGA generation, with a non-zero Sec value,increases the address configuration time. Even though there are many modifications suggested in SeND, these schemes couldn’t overcome the issues faced by the existing schemes. The privacy addresses generated in a scheme proposed by Narten et al. [7] used the Message Digest (MD5) on the message stored in a stable storage to retrieve the addresses. But these addresses can be easily predicted by tracking the file usage history. Bos et al. [8] proposed an analyzed optimal CGA generation, but the scheme is for infrastructure based networks and hence is not adopted for MANETs. Jiang[9] introduced an interactive method of address generation with DHCPv6, but the dynamic nature of MANETs restricted assigning dedicated services and interactive communication packets.

    Fig. 3 CGA generation

    The extended SeND [10] and windows based SeND [11], were not implemented and standardized because of the limitation of applicability. The cryptographic algorithms of SeND are extended or modified in many schemes [12-19] by replacing RSA with ECC and newly designed cryptographic algorithms to reduce the computational complexity of authentication. But as MANETs are provided with low resources, these schemes may drain the resources and hence are not applicable for MANETs. SAVI [20] scheme is a link-layer authentication protocol scheme which ensures the authenticity of the packets exchanged during autoconfiguration. But it fails to assure protection against other ND vulnerabilities.The surveys [21-23] on the existing schemes emphasize the requirement for a light weight and empirically strong CGA generation for resource constrained MANETs and is the motivation for the proposed work.

    III. PROPOSED WORK

    The SeND protocol designed to overcome the security threats during autoconfiguration has proven to face security and technical issues in MANETs (discussed in Section 2). The paper proposes an unpredictable random number based address generation using internal system states, for ensuring security of autoconfiguration with minimum resource consumption. The internal system states based address generation is an inspirational proposal of Hardware Volatile Entropy Gathering and Expansion(HAVEGE) [24]. Pseudo random numbers exhibiting high degree of randomness are needed for highly secured cryptographic algorithms.

    A heuristic algorithm that relies on entropy gathered from unpredictable system events is proposed. This entropy gathering technique is used in pseudorandom number generator to generate the IID during autoconfiguration. The algorithm implements a hardware clock cycle counter to gather the entropy from the system states of the nodes. The system states are hardware mechanisms that improve performance of caches, branch predictors and external devices. These system states are not architectural, but volatile and cannot be directly monitored by the user and hence are used as source for highly random pseudorandom numbers.Since the system state includes thousands of internal volatile hardware states, it is impossible for the user to reproduce the generated bit sequences. Any attempt to indirectly gather the bit sequence triggers the internal state of the system and therefore, reproducing the bit sequences is virtually impossible. Although the proposed address generation method is a light weight scheme with fewer computations,it has proven compliance to all the security standards discussed in NIST statistical test suite [25]. The internal system states based address generation called as Light Weight Cryptographic Address Generation (LW-CGA) is a novel light weight autoconfiguration scheme designed to ensure high security and adaptability in MANETs.

    3.1 Light weight cryptographic address generation (LW-CGA)

    iv. Regeneration at regular intervals: The regeneration at regular interval is an option included for maintenance and security purposes. The option has been included to add the renumbering features.

    The algorithmic steps are given below.

    Step 1:The functionCLKREAD()is defined to read and return the hardware clock counter value of the node.

    Step 2:Two concurrentSCROLLoperations are performed in parallel in a table of 4B. The table 1s twice the size of L1 data cache. If theSCROLLis random, then the probability of a hit in the cache is very close to 1/2 on each data reading from the table.

    陳邦設(shè)強(qiáng)調(diào),“我們?cè)跈z驗(yàn)工作成效時(shí),要以企業(yè)增效、員工增收、企業(yè)經(jīng)營(yíng)質(zhì)量持續(xù)增長(zhǎng)、企業(yè)團(tuán)隊(duì)能力持續(xù)提升為標(biāo)準(zhǔn)”。因?yàn)?,只有合理、高效地進(jìn)行企業(yè)人事管理,才能增加員工對(duì)企業(yè)的信任感;也只有這樣,團(tuán)隊(duì)對(duì)企業(yè)文化的認(rèn)同感才會(huì)轉(zhuǎn)化為強(qiáng)大的力量,推動(dòng)企業(yè)蒸蒸日上地發(fā)展。

    Step 3:Two data dependent tests are introduced on iterations ofSCROLLto make its behavior depend on branch prediction information. For both branches, the probability of the branch being taken is 1/2 if the content of the table 1s random.

    每個(gè)調(diào)類(lèi)有15個(gè)單字,共有75個(gè)單字,為防止受試有不熟悉的字,75個(gè)單字提前打印以供受試熟悉。錄音和語(yǔ)音分析軟件為Praat,錄音在安靜環(huán)境中進(jìn)行,每人相同字表都錄音兩次,3人均為一次性錄完.

    在中職教育以及旅游業(yè)快速發(fā)展的過(guò)程中,中職旅游專(zhuān)業(yè)教育也進(jìn)一步擴(kuò)張。當(dāng)前,中職旅游管理專(zhuān)業(yè)已經(jīng)慢慢發(fā)展成為較為成熟的發(fā)展體系,不過(guò)在教學(xué)過(guò)程中并沒(méi)有徹底擺脫傳統(tǒng)的灌輸式教學(xué)模式,這樣就導(dǎo)致培養(yǎng)的人才不能滿足社會(huì)發(fā)展需要。因此,旅游業(yè)重點(diǎn)關(guān)注的問(wèn)題是各院校如何培養(yǎng)適應(yīng)社會(huì)需要的旅游管理專(zhuān)業(yè)人才。通過(guò)實(shí)踐調(diào)查研究發(fā)現(xiàn),我國(guó)當(dāng)前在旅游管理專(zhuān)業(yè)人才培養(yǎng)以及教育改革方面的研究比較少,特別是在“互聯(lián)網(wǎng)+”時(shí)代,更應(yīng)該加強(qiáng)此方面的探索。

    Step 4:TheSCROLLis iterated to the number of unrolled steps (y) for data reads from instruction cache. This maximizes the number of instruction blocks (and associated branch prediction information) extracted from the instruction cache on each operating system interrupts.

    Step 5:The two distinct data read (Steps 3 and 4) acquired duringSCROLLperforms Exclusive-OR (XOR) in memory table. If memory table 1s directly read for random number generation, then an observer can follow up theSCROLLfor a while and try to guess the partial content of the table. XOR is used to hide the content of theSCROLLtable from any possible observer.

    Step 6:The 64 bit Least Significant Bits(LSB) extracted from random bits of the output of the algorithm are used as IID for CGA generation.

    3.1.1 System states for random number generation

    The system states of the nodes are unpredictable 5olatile hardware states and are activated by the instruction cache and branch predictors.Any node with a processor can implement the algorithm and collect the system states. The volatile states of the nodes are influenced by the following components.

    方法二:將a,b看成一元二次方程x2=3x-1的兩根,用根與系數(shù)的關(guān)系分別求出a+b,ab的值代入式子得到18.

    Fig. 4 Algorithm of CGA generation in LW-CGA

    i. DATA Translation Look-aside Buffer(TLB): The TLB buffer is a table consisting of information of the pages in the memory that are accessed by the processor. Each entry of a page in the TLB possesses about 129 states which invoke system states. The LWCGA is constructed with a loop that access 128 pages of memory.

    The various sub classes of attacks launched in the networks during autoconfiguration are also given in table 2. These attacks are launched in both infrastructure and ad-hoc networks with the ICMPv6 messages. The survey[3] states that most of the attacks launched in ad-hoc networks are still not addressed and exist as an open research area. The unique or unpredictable 1nterface identifier based address can reduce the chances of exposure to these attacks. But today there are many solutions available to alter the unique MAC addresses of the devices and hence it is impossible to assure uniqueness of MAC addresses. More over MANETs are dynamic, with frequent merging and partitioning; therefore setting a static policy and expecting it to uphold a secure state is unrealistic. Moreover the Neighbor Discovery(ND) was not designed to deal with security issues and is not suitable for MANETs. Secure Neighbor Discovery Protocol (SeND)[4] addresses few of these issues and it was targeted for infrastructure based networks. As MANETs are infrastructure-less multi-hop communication networks with high resource consumption, there are many technical issues for the implementation of SeND in MANETs.

    iii. L1 Instruction Cache: The L1 instruction cache consists of 256 sets in which, each set possesses 7 possible states. The LW-CGA is made of a loop body that performs self-modifying paces over the level 1 instruction cache.

    3.1.2 Regeneration options of LW-CGA

    由圖16可以獲得faFM和waFM歐式空間點(diǎn)的坐標(biāo)變換,faFM在Lv、Q方向的變動(dòng)范圍分別為-0.08 mm~0.08 mm和-0.1 mm~0.1 mm,waFM在Lv、Q方向的變動(dòng)范圍都為-0.2 mm~0.2 mm。

    (2) The CGA based IPv6 addresses cannot be predicted by the attacker.

    i. Regeneration on updated RA and NA: The RA and NA message contains new prefix advertisements or updates to indicate prefix-change or MANET merging or partitioning. So whenever an advertisement with new prefix is received the daemon calls REGENERATE( )

    綜上所述,再次定位CT2圖像較首次定位CT1圖像肺的體積增大,腫瘤靶區(qū)體積縮小,能夠減小患肺及全肺受照射劑量,可減輕放療副作用及保護(hù)正常器官,值得臨床關(guān)注。

    ii. Regeneration on interface status change:The option enables a new IID generation when a node enables a network interface.So when an interface is enabled state it will be configured with a new address even if the network-prefix remains the same. By default as in existing schemes, each node with multiple interfaces will be configured with different IIDs.

    裝配式建筑結(jié)構(gòu)對(duì)住宅產(chǎn)業(yè)的發(fā)展和推動(dòng)起到了很大的促進(jìn)作用,這與日本政府的干預(yù)和大力支持是密不可分的:日本政府方面制定了一系列的建設(shè)住宅工業(yè)化方針,并建立了相應(yīng)統(tǒng)一的標(biāo)準(zhǔn)。這樣就解決了標(biāo)準(zhǔn)化與住宅多樣化、復(fù)雜化之間的各種矛盾。通過(guò)在不斷的探索和研究中,繼續(xù)進(jìn)一步的快速進(jìn)步。

    iii. Regeneration on user choice: The CGA generation can be explicitly invoked by the user based on his/her choice. This feature is added for testing purpose and entropy calculation on each generation.

    The LW-CGA algorithm uses a heuristic algorithm to collect entropy of system states and generate a sequence of random number bits as IID. A hardware clock counter is used to gather the sequence of uncertainty of the system states. The entropy gathered from the system states are generated from the instruction cache and branch prediction structures. A function to read the hardware clock called CLKREAD( )is used and it verifies the difference with last read values. The counter INTERRUPTCOUNT is incremented by function CLKREAD( ) when the difference of the clock read is higher than a threshold level MAX indicating an interrupt between two successive reads. Throughout the algorithm,CLKREAD( )is called several times and the resultant is combined by XOR and shifts in an arrayENTROPY[ ].Since the entropy in the least significant bits (LSB)of the hardware clock counter is more than the most significant (MSB), the read value is combined with circular shift of the previously accumulated data for even diffusion of entropy throughout the arrayENTROPY [ ].The entropy collection loop runs until theINTERRUPTCOUNTreaches a predefined threshold.BUFFERSIZEis the size of the table used to gather the values of the hardware clock counter. At an instance the content of theENTROPY[ ]is saved and reinitialized to zero. The savedENTROPY[ ]is combined with a simple pseudorandom number generator. ADYNAMTABLE[]is used to record the two instants of updates in the singleENTROPY[ ]table.SCROLL[ ]is a memory table which is twice the size of the L1 Cache (discussed in Section 3.2.1 and is assumed in power of 2). TheSCROLL[ ]stores the resultant empirically strong random number which is assigned as the IID of the CGA addresses. The random bit sequence from the internal micro architectural status of a system and integration to the link local address makes the addresses unpredictable. The figure 4 shows the pseudocode of LW-CGA algorithm.

    IV. EXPERIMENTAL EVALUATIONS

    The LW-CGA and SeND autoconfiguration schemes are implemented in real networks for experimental evaluations. The flow chart of LW-CGA and SeND implementation is shown in figure 5.

    4.1 Experimental set-up

    ● IID regeneration time is the time taken for the IID regeneration by CGA regeneration without key generation. The CGA regeneration of SeND requires a HASH1 calculation alone, whereas only a random number generation in LW-CGA.

    The LW-CGA as like SeND uses the RSA based key (1024 bits) exchange scheme during the first CGA generation. But during regeneration of CGA (caused by node mobility or change in network gateway), the keys are not regenerated but verified for authenticity. In SeND scheme, the HASH1 alone is recomputed during CGA regeneration. The SeND evaluation of Sec values higher than 1are not validated as it is proven to be impractical [23].The following parameters are used for evaluations.

    ● IID generation time is the total time duration for the generation of public key, their verification and computation of CGA followed by IID configuration

    如今,因?yàn)閾?dān)心夫人摔著,潘際鑾院士不再騎車(chē)載她了,而是改為手牽手,去菜場(chǎng)、去學(xué)校、去訪學(xué)……時(shí)時(shí)刻刻不分離。潘際鑾是南昌大學(xué)的老校長(zhǎng),南昌大學(xué)有一條“際鑾路”,老兩口回南昌大學(xué)故地重游,牽手走在這條路上,也被學(xué)生拍到了。

    新的有機(jī)硅樹(shù)脂工廠將位于陶氏在張家港的有機(jī)硅一體化生產(chǎn)基地。該基地坐落于江蘇揚(yáng)子江國(guó)際化學(xué)工業(yè)園,于2006年開(kāi)工建設(shè),2010年投產(chǎn),占地近百萬(wàn)平方米,是中國(guó)最大的有機(jī)硅生產(chǎn)基地。

    The Linux kernel version of 2.6.34 is used in nodes for the implementation of the LW-CGA and SeND autoconfiguration schemes. The experimental analysis can be interrupted by the scheduler as its time is accounted for the measurements. Hence single mode Linux kernels are used for experimentations. The SLAAC implementation of IPv6 is modified for the implementations. The modified kernel provides several sys-controls which can be read and written to and by user-space programs,controlling the operation of IPv6 privacy extensions. SeND-CGA project developed and maintained by Huawei Technologies Corp.and BUPT (Beijing University of Post and Telecommunications) [26], is implemented as a modified kernel and invoked with a daemon.The LW-CGA is an extension of HAVEGE[24] and the same is implemented as a modified kernel. The kernel sys-controls are adjusted to characterize MANETs. No changes pertaining to IPv6, ICMPv6, and NDv6 parameters were made, so as to preserve the other network layer features. SeND is compiled with the minimal options required to compile on Linux and is used for the testing.

    ● Entropy is the measure of randomness in a closed system. The entropy of a random variable X with probabilities pi, …, pnis defined as

    Fig. 5 Flow Chart of LW-CGA and SeND Implementations

    The NIST Test Suite [25] is a statistical package with 15 tests to test the randomness or entropy of the binary sequences generated by the algorithms. We have conducted NIST tests to test the randomness of binary sequences generated by SHA-1 in SeND and random number generator in LW-CGA. These tests focus on a variety of non-randomness that could exist in a sequence. Various statistical tests were applied to the bit sequence generated by LW-CGA and SeND to compare and evaluate the randomness. The randomness of bit sequences was characterized and described in terms of probability. These statistical tests were formulated to test a specific null hypothesis (H0). The null hypothesis was the sequence being tested is random. Associated with this null hypothesis is the alternative hypothesis (Ha), for which the sequence is not random. For each test, the decision declares the acceptance or rejection of null hypothesis,i.e., whether the sequence generated is truly random or not. In each test, a relevant randomness statistic was chosen to determine the acceptance or rejection of the null hypothesis

    A mathematical method was used to determine the theoretical reference distribution of this statistic under null hypothesis. A critical value was selected from this reference distribution (typically, this value is “far out” in the tails of the distribution say, out at the 99% point). During the tests, the statistic value computed on the bit sequence was compared to the critical value. If the test statistic value was higher than the critical value, the null hypothesis was rejected. Otherwise, the null hypothesis was accepted. For these tests, the probability of randomness determined as P-value was compared with the derived significant level (α). If P-value ≥α, then the bit sequence was considered random and if it was not so, then it was considered non-random.Typically, α was chosen in the range 0.001 and 0.01.

    Fifteen tests of NIST Statistical Test Suite have significant purpose to confirm the randomness of the bit sequence. The Block and Frequency Monobit tests determine whether the number of ones and zeros in a sequence are approximately the same as expected for a truly random sequence. The Binary Matrix Rank Test checks for linear dependence among fixed length substrings of the original sequence. The Longest Run Test determine whether the length of the longest run of ones within the tested sequence is consistent with the length of the longest run of ones as expected in a random sequence. The Run Test determines whether the oscillation between ones and zeros of various lengths is as expected for a random sequence. Spectral Discrete Fourier Test (DFT) detects repetitive patterns in the tested sequence to indicate a deviation from the assumption of randomness. Non-Overlapping Template Matching Test checks whether too many occurrences of a given non-periodic pattern occur in tested sequence. Overlapping Template Matching Test determines the number of occurrences of pre-specified target strings. It uses the same m bit window as in Non-Overlapping Template Matching Test, to search for a specific m bit pattern (B). The difference is that when the pattern is found, the window slides only one bit before resuming the search.

    唐詩(shī)的模糊美初探 ……………………………………………………………… 王華琴,張青華,張 紅(5.76)

    The Maurer’s Universal Test detects whether the sequence is significantly compressed without loss. The Linear Complexity Test determines whether the sequence is complex enough to be considered random. The Serial Test determines whether the number of occurrences of the 2m m bit overlapping patterns is approximately the same as expected for a random sequence. Approximate Entropy Test compares the frequency of overlapping blocks of two consecutive lengths (m and m+1) against the expected result for a random sequence. The Cumulative Sum (cusum) Test determines whether the cumulative sum of the partial sequences in the sequence is too large or too small relative to the expected behavior of cumulative sum for random sequences. The Random Excursion Test determines whether the number of visits to a particular state within a cycle deviates from that expected for a random sequence. The Random Excursion Variant Test detects deviations from the expected number of visits to various states in random scroll.

    4.2 Experimental results

    The CGA generation time of SeND and LWCGA is measured with an internal counter clock. The experimental results of more than 100 samples have been averaged to validate the analysis. The result shown in table 4 concludes that the LW-CGA takes less time when compared to SeND. The key generation time is almost the same for both the schemes, but the verification and CGA generation time is high in SeND which contributes to extra time consumption.

    該水庫(kù)防滲工程施工結(jié)束后,經(jīng)蓄水檢驗(yàn),主副壩下游坡原潮濕散浸現(xiàn)象完全消失;據(jù)壩后量水三角堰量測(cè),主壩為0.33L/s,副壩為0.015L/s,相比除險(xiǎn)加固前均大為減少,達(dá)到除險(xiǎn)加固目的。

    The CGA generation time for Sec=1 is greater than Sec=0 of SeND. The difference in time is to generate the modifier that requires further time for calculating HASH2 values until the 16 x Sec leftmost bits are zeros. Hence at Sec=1 the key generation followed by verification, HASH1 and HASH2 computation for CGA generation time contribute to the total IID generation time. At Sec=0, the key generation time, verification time and HASH1 computation time for CGA generation time only contribute to the total IID generation time. The HASH1 and HASH2 computation involves the use of public key as a parameter;hence these computations are sequential and are interdependent (discussed in Section 2).The LW-CGA uses a key exchange scheme for verification and validation of the keys generated. The CGA generation scheme in LW-CGA is not dependent on the keys and involves random bit generations from entropy gathered from system states. LW-CGA scheme uses a less computational intensive method for CGA generation and hence the time taken for the IID generation is comparatively very less compared to the SeND.

    The CGA regeneration time of SeND at Sec=0 and Sec=1 does not involve key exchanges and verifications, but computation of HASH1. The LW-CGA just recertifies the authenticity of the keys and regenerates the random number. The results conclude that the time required for CGA generation in LW-CGA is very less when compared to SeND.

    The security of the schemes can be evaluated with the entropy of the algorithms. The security flaws of SHA-1 have invoked many on-going works in the CGA and SeND maintenance working group in IETF. These have issued the recommendation of SHA-2, SHA-256 etc. But these schemes are highly computational intensive and fail in resource constrained environments. The SHA-1 in SeND and random number generator in LW-CGA are tested using the NIST statistical test suite [25].The recommended statistical tests are done to evaluate the performance in security algorithms. For a p-value ≥ 0.001, the sequence is considered to be random with a confidence of 99.9% or else non random with a confidence of 99.9%. The analysis shows that random number generator of LW-CGA performs well in cryptanalysis.

    圖5是原始WENO-CU6-M2格式及其改進(jìn)A和改進(jìn)B在400個(gè)網(wǎng)格點(diǎn)上計(jì)算得到的t = 0.038時(shí)刻的密度和速度曲線及局部放大. 它們?cè)趫D5(a)和圖5(b)中初看起來(lái)沒(méi)有差別, 但在圖5(c)和圖5(d)的局部放大圖中可觀察到, 原始WENO-CU6-M2格式的密度曲線和x≈0.865附近的激波出現(xiàn)了微小的偽波, 而兩種改進(jìn)格式消除了這些偽波.

    V. CONCLUSION AND FUTURE WORKS

    SeND uses RSA and SHA-1 implementation for ensuring privacy enabled autoconfiguration. The generation time and the computational intensity of CGA make SeND implementation impractical for MANETs. Moreover the improved security level of SeND varying from 0 to 7 worsens the computational intensity and battery consumption in wireless devices. Thepaper proposed a light weight cryptographic scheme called LW-CGA that ensures high security with minimal and faster computations.The random number generations in the scheme uses an entropy gathering algorithm from the system states and are independent of the keys.The bit sequences generated by the algorithm are impossible for guessing and cannot be even monitored by the system users. Hence the scheme is highly random and assures security.It’s proven that the usages of LW-CGA satisfies all the characteristic requirements of cryptographic algorithms and are more suitable for constrained devices like PDA and Tablet PC.The schemes are evaluated with real time implementation to study CGA generation using SHA-1 in SeND and random number generation in LW-CGA. The experimental results show significantly reduced address generation time while using LW-CGA. The NIST statistical tests demonstrate that a higher security is assured with LW-CGA without the need for a high cost algorithm. Future works of the authors mainly focus on more light weight techniques for privacy enabled autoconfiguration in MANETs.

    Table IV IID generation time of SeND (at Sec=0 and Sec=1) and LW-CGA

    Table V IID regeneration time of SeND (at Sec=0 and Sec=1) and LW-CGA

    Table VI NIST statistical tests on SeND and LW-CGA

    [1] T. Narten et al., “Neighbor Discovery for IP Version 6 (IPv6),” RFC 4861, Sept. 2007; htp://tools.ietf.org/ html/rfc4861.

    [2] S. Thomson, T. Narten, and T. Jinmei, “IPv6 Stateless Address Autoconfiguration,” RFC 4862,Sept. 2007; htp://tools.ietf.org/html/rfc4862.

    [3] P. Nikander, J. Kempf, and E. Nordmark, “IPv6 Neighbor Discovery (ND) Trust Models and hreats,” RFC 3756, May 2006, htp://tools.ietf.org/html/rfc3756.

    [4] J. Arkko et al., “SEcure Neighbor Discovery(SEND),” RFC 3971, Mar. 2005, htp://tools.ietf.org/html/rfc3971.

    [5] T. Aura, “Cryptographically Generated Addresses (CGA),” RFC 3972, Mar. 2005, htp://tools.ietf.org/html/rfc3972.

    [6] Conta, S. Deering, and M. Gupta, “Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Speciication,”RFC 4443, Mar. 2006, htp://tools.ietf.org/html/rfc4443.

    [7] T. Narten, R. Draves, and S. Krishnan, “Privacy Extensions for Stateless Address Autoconiguration in IPv6,” RFC 4941, Sept. 2007, htp://tools.ietf.org/html/ rfc4941.

    [8] J.W. Bos, O. Ozen, and J.-.P Hubaux, “Analysis and Optimization of Cryptographically Generated Addresses,” LNCS 5735, Springer, pp. 17–32,2009.

    [9] S. Jiang, “Analysis of Possible DHCPv6 and CGA Interactions,” draft, 12 Mar. 2012, htp://tools.ietf.org/html/drat-ietf-csi-dhcpv6-cga-ps-09.

    [10] S. Chiu and E. Gamess, “A Free and Didactic Implementation of the SEND Protocol for IPv6”,Machine Learning and Systems Engineering, vol.68, S.-I. Ao, B. Rieger, and M.A. Amouzegar, eds.Springer, pp. 451–463, 2010.

    [11] H. Raiee, A. AlSa’deh, and C. Meinel, “WinSEND:Windows Secure Neighbor Discovery,” 4th Int’l Conf. Security of Information and Networks(SIN 11), ACM, pp.243–246, 2011.

    [12] Kukek and B.A. Zeeb, “Native Send Kernel API for BSD,” 2010; htp://people.freebsd.org/~anchie/SeND_AsiaBSDCon_2010.pdf.

    [13] T. Cheneau, A. Boudguiga, and M. Laurent,“Significantly Improved Performances of the Cryptographically Generated Addresses thanks to ECC and GPGPU,” Computers & Security, vol.29, no. 4, pp. 419–431, 2010.

    [14] S. Guangxue et al., “A Quick CGA Generation Method,” 2nd Int’l Conf. Future Computer and Communication (ICFCC), IEEE, pp. V1-769–V1-773, 2010.

    [15] S. Jiang and S. Xia, “Configuring Cryptographically Generated Addresses (CGA) Using DHCPv6,” 11 Apr. 2012, http://tools.ietf.org/html/draft-ietf-dhc-cga-config-dhcpv6-02.

    [16] T. Aura and M. Roe, “Strengthening Short Hash Values,” http://citeseerx.ist.psu.edu/viewdoc/summary?doi 10.1.1.145.7681

    [17] Gont, F., and W. Liu, “A Method for Generating Semantically Opaque Interface Identifiers (IIDs)with the Dynamic Host Configuration Protocol for IPv6 (DHCPv6)”, RFC 7943, 2016.

    [18] Shah JL, “A novel approach for securing IPv6 link local communication”, Information Security Journal: A Global Perspective, Vol. 22, 1-5, 2016.

    [19] Rehman SU, Manickam S, “Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process”, International Journal of Security and Its Applications,Vol. 10(4), 143-54, 2016.

    [20] Supriyanto, Iznan Husainy Hasbullah, Raja Kumar Murugesan, Sureswaran Ramadass, “Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods”, IETE Technical Review, Vol 30,2013.

    [21] Minoli, Daniel, and Jake Kouns, “Security in an IPv6 environment”, CRC Press, 2016.

    [22] Rehman SU, Manickam S, “Significance of duplicate address detection mechanism in IPv6 and its security issues: A survey”. Indian Journal of Science and Technology, 8(30), 2015.

    [23] A.AlSa’deh and C. Meinel, “Secure Neighbor Discovery: Review, Challenges, Perspectives,and Recommendations”, IEEE Security & Privacy Magazine, Vol. 10, no. 4, pp. 26 –34, August 2012.

    [24] Seznec, N. Sendrier, “HAVEGE: a user-level software heuristic for generating empirically strong random numbers”, ACM Transaction on Modeling and Computer Simulations (TOMACS), Vol.13, Issue 4, October 2003.

    [25] National Institute of Standards and Technology,NIST Special Publication 800-22rev1a, “A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications”,http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf, April 2010.

    [26] https://code.google.com/p/ipv6-send-cga/downloads/list

    猜你喜歡
    單字南昌大學(xué)除險(xiǎn)
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    不忘初心創(chuàng)沂沭泗基建新篇 除險(xiǎn)加固保南四湖治水安瀾
    治淮(2021年12期)2021-12-31 05:46:30
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)稿約》
    《南昌大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)稿約》
    河北大名話單元音韻母、單字調(diào)及雙音節(jié)非輕聲詞連調(diào)的實(shí)驗(yàn)語(yǔ)音學(xué)初探
    “對(duì)仗不宜分解到單字”毋庸置疑——答顧紳先生“四點(diǎn)質(zhì)疑”
    鹽城方言單字調(diào)聲學(xué)實(shí)驗(yàn)研究
    太浦閘除險(xiǎn)加固工程通過(guò)竣工驗(yàn)收
    淺談水庫(kù)的除險(xiǎn)加固
    河南科技(2014年8期)2014-02-27 14:08:04
    国产av一区二区精品久久| 色综合婷婷激情| 叶爱在线成人免费视频播放| 天天影视国产精品| 大型黄色视频在线免费观看| 日本五十路高清| 女同久久另类99精品国产91| 欧美大码av| 女警被强在线播放| 99香蕉大伊视频| 又大又爽又粗| 国产一区二区三区综合在线观看| 国产欧美日韩一区二区三| 欧美乱色亚洲激情| 国产av一区在线观看免费| 免费在线观看亚洲国产| av超薄肉色丝袜交足视频| 18禁美女被吸乳视频| 日日干狠狠操夜夜爽| 男女下面进入的视频免费午夜 | 美国免费a级毛片| 中文字幕高清在线视频| 国产免费男女视频| 国产97色在线日韩免费| 99国产综合亚洲精品| 啦啦啦 在线观看视频| 亚洲熟妇中文字幕五十中出 | 欧美在线一区亚洲| 宅男免费午夜| 欧美日本亚洲视频在线播放| 又黄又爽又免费观看的视频| 人妻久久中文字幕网| 成人手机av| 国产精品久久久久久人妻精品电影| 又大又爽又粗| 69精品国产乱码久久久| 18美女黄网站色大片免费观看| 国产精品九九99| 两个人免费观看高清视频| 女人被躁到高潮嗷嗷叫费观| 国产亚洲精品久久久久久毛片| 亚洲成人免费电影在线观看| 热re99久久国产66热| 女警被强在线播放| 久久人妻熟女aⅴ| 久久狼人影院| 变态另类成人亚洲欧美熟女 | 久久久国产一区二区| 亚洲七黄色美女视频| 亚洲精品美女久久av网站| 国产欧美日韩一区二区三| www.999成人在线观看| 深夜精品福利| 他把我摸到了高潮在线观看| 国产熟女xx| 国产极品粉嫩免费观看在线| 免费高清在线观看日韩| 中文字幕另类日韩欧美亚洲嫩草| 中文字幕另类日韩欧美亚洲嫩草| 69av精品久久久久久| 在线观看免费日韩欧美大片| 又大又爽又粗| 男女之事视频高清在线观看| 五月开心婷婷网| 国产一区二区三区在线臀色熟女 | 成年人黄色毛片网站| 欧美成狂野欧美在线观看| 高清毛片免费观看视频网站 | 一个人观看的视频www高清免费观看 | 亚洲在线自拍视频| 亚洲第一欧美日韩一区二区三区| 两性夫妻黄色片| 精品熟女少妇八av免费久了| 极品人妻少妇av视频| 在线观看午夜福利视频| 一级,二级,三级黄色视频| 男女床上黄色一级片免费看| 久久狼人影院| 咕卡用的链子| 麻豆成人av在线观看| 久久久久久免费高清国产稀缺| 天堂俺去俺来也www色官网| 亚洲 欧美 日韩 在线 免费| 一区二区三区激情视频| 性欧美人与动物交配| av网站免费在线观看视频| 日本黄色日本黄色录像| 精品一品国产午夜福利视频| 亚洲专区中文字幕在线| 国产1区2区3区精品| 制服人妻中文乱码| 19禁男女啪啪无遮挡网站| 狠狠狠狠99中文字幕| 麻豆国产av国片精品| 交换朋友夫妻互换小说| 国产男靠女视频免费网站| 久久国产乱子伦精品免费另类| 中文字幕人妻熟女乱码| 国产精品久久电影中文字幕| 老司机午夜福利在线观看视频| 精品无人区乱码1区二区| 日本wwww免费看| 中文欧美无线码| 在线观看日韩欧美| 国产亚洲欧美精品永久| 美女 人体艺术 gogo| 制服诱惑二区| 午夜老司机福利片| 欧美日韩亚洲国产一区二区在线观看| 国产精品久久电影中文字幕| 日本一区二区免费在线视频| 欧美人与性动交α欧美精品济南到| 视频区图区小说| 一进一出抽搐动态| 首页视频小说图片口味搜索| 欧美人与性动交α欧美精品济南到| 欧美日韩视频精品一区| 国产高清激情床上av| 日本免费一区二区三区高清不卡 | 欧美乱妇无乱码| 国产成人精品无人区| 99精国产麻豆久久婷婷| 深夜精品福利| 80岁老熟妇乱子伦牲交| 男人舔女人下体高潮全视频| 精品人妻1区二区| 亚洲国产欧美日韩在线播放| 亚洲专区国产一区二区| 老司机亚洲免费影院| 两性午夜刺激爽爽歪歪视频在线观看 | 涩涩av久久男人的天堂| 国产av在哪里看| 热re99久久精品国产66热6| 亚洲全国av大片| 最好的美女福利视频网| 巨乳人妻的诱惑在线观看| 国产av在哪里看| 在线观看免费视频网站a站| 久久精品aⅴ一区二区三区四区| 久久香蕉精品热| 一区二区三区激情视频| 757午夜福利合集在线观看| 9191精品国产免费久久| 99久久精品国产亚洲精品| 欧美成狂野欧美在线观看| 少妇裸体淫交视频免费看高清 | 久久精品国产综合久久久| 在线国产一区二区在线| 精品一区二区三区av网在线观看| 美女扒开内裤让男人捅视频| 99久久精品国产亚洲精品| 老司机午夜福利在线观看视频| 国产极品粉嫩免费观看在线| 国产色视频综合| 精品免费久久久久久久清纯| 最近最新免费中文字幕在线| 亚洲av第一区精品v没综合| 日韩视频一区二区在线观看| 99在线人妻在线中文字幕| 久久久精品欧美日韩精品| 国产精品一区二区三区四区久久 | 精品人妻在线不人妻| 久久精品国产亚洲av香蕉五月| 一进一出好大好爽视频| 国产av精品麻豆| 久久九九热精品免费| 成人三级做爰电影| 欧美最黄视频在线播放免费 | 精品卡一卡二卡四卡免费| 可以在线观看毛片的网站| 成人18禁在线播放| 色尼玛亚洲综合影院| 中文字幕高清在线视频| av免费在线观看网站| 自线自在国产av| 成人国产一区最新在线观看| av视频免费观看在线观看| 国产精品免费一区二区三区在线| 成人三级黄色视频| 80岁老熟妇乱子伦牲交| 午夜福利免费观看在线| 精品福利永久在线观看| 老鸭窝网址在线观看| 母亲3免费完整高清在线观看| 国产成人精品久久二区二区91| 国产精华一区二区三区| 99精品久久久久人妻精品| 校园春色视频在线观看| 欧美乱码精品一区二区三区| 中文字幕av电影在线播放| 国产熟女xx| 99久久久亚洲精品蜜臀av| 亚洲片人在线观看| 亚洲av电影在线进入| 黑丝袜美女国产一区| 亚洲精华国产精华精| 97超级碰碰碰精品色视频在线观看| 亚洲色图综合在线观看| 热re99久久国产66热| 国产精品久久久久成人av| 久久人人97超碰香蕉20202| 亚洲片人在线观看| 国产一区二区激情短视频| 一区二区三区精品91| 制服诱惑二区| 欧美黄色淫秽网站| 高清在线国产一区| 久久青草综合色| 香蕉久久夜色| 最近最新中文字幕大全电影3 | 侵犯人妻中文字幕一二三四区| av天堂在线播放| 18禁国产床啪视频网站| 亚洲精品国产精品久久久不卡| 国产高清激情床上av| av视频免费观看在线观看| 少妇被粗大的猛进出69影院| 国产一卡二卡三卡精品| 少妇被粗大的猛进出69影院| 欧美激情 高清一区二区三区| 亚洲av日韩精品久久久久久密| 黄色视频不卡| 日韩视频一区二区在线观看| 国产精品成人在线| av福利片在线| 国产精品秋霞免费鲁丝片| av福利片在线| 精品国产一区二区久久| 欧洲精品卡2卡3卡4卡5卡区| 成人永久免费在线观看视频| 国产精品综合久久久久久久免费 | 国产亚洲精品综合一区在线观看 | xxx96com| 正在播放国产对白刺激| 精品高清国产在线一区| 国产亚洲av高清不卡| 精品人妻1区二区| 成年人免费黄色播放视频| 在线观看午夜福利视频| 成人三级做爰电影| 日日摸夜夜添夜夜添小说| 亚洲在线自拍视频| 女人爽到高潮嗷嗷叫在线视频| 99久久久亚洲精品蜜臀av| 国产欧美日韩精品亚洲av| 久久精品国产清高在天天线| 欧美激情高清一区二区三区| 中文字幕人妻熟女乱码| 最新美女视频免费是黄的| 亚洲专区字幕在线| 高清欧美精品videossex| 12—13女人毛片做爰片一| 国产高清激情床上av| 亚洲一码二码三码区别大吗| 久久久国产成人精品二区 | 午夜福利一区二区在线看| 欧美日韩乱码在线| 99香蕉大伊视频| 夜夜躁狠狠躁天天躁| 91大片在线观看| 亚洲国产欧美网| 中文字幕精品免费在线观看视频| 黄色成人免费大全| 久久婷婷成人综合色麻豆| 一区福利在线观看| 人人妻人人爽人人添夜夜欢视频| 亚洲熟妇熟女久久| 午夜亚洲福利在线播放| 欧美色视频一区免费| 桃色一区二区三区在线观看| 久久伊人香网站| 国产成人免费无遮挡视频| 欧美精品亚洲一区二区| 国产无遮挡羞羞视频在线观看| 久久久久亚洲av毛片大全| 亚洲精品久久成人aⅴ小说| 日本精品一区二区三区蜜桃| 亚洲久久久国产精品| 午夜福利免费观看在线| 啪啪无遮挡十八禁网站| 精品久久久久久电影网| 啦啦啦在线免费观看视频4| 久久精品91蜜桃| 日本精品一区二区三区蜜桃| 免费人成视频x8x8入口观看| 精品免费久久久久久久清纯| 91国产中文字幕| 91麻豆av在线| 9热在线视频观看99| 国产亚洲精品第一综合不卡| 日韩三级视频一区二区三区| 国产精品成人在线| 免费久久久久久久精品成人欧美视频| 黄色怎么调成土黄色| 国产亚洲精品综合一区在线观看 | 一边摸一边抽搐一进一小说| 久久午夜亚洲精品久久| 国产精品美女特级片免费视频播放器 | 国产99白浆流出| 99国产极品粉嫩在线观看| 男人舔女人下体高潮全视频| 1024香蕉在线观看| 色综合站精品国产| 99久久国产精品久久久| 人妻久久中文字幕网| 91大片在线观看| 国产成人精品久久二区二区免费| 国产精品亚洲一级av第二区| 精品人妻在线不人妻| 久久久精品欧美日韩精品| 如日韩欧美国产精品一区二区三区| 国产亚洲欧美精品永久| www.熟女人妻精品国产| 成人三级做爰电影| av国产精品久久久久影院| 中文字幕精品免费在线观看视频| 99久久久亚洲精品蜜臀av| 1024香蕉在线观看| 日韩高清综合在线| 一级片'在线观看视频| 又黄又粗又硬又大视频| 久热爱精品视频在线9| 精品人妻1区二区| 日韩欧美三级三区| 十八禁人妻一区二区| 夜夜夜夜夜久久久久| 亚洲精品国产色婷婷电影| 欧美乱码精品一区二区三区| 日本黄色日本黄色录像| 欧美大码av| 国产成人影院久久av| 精品国产一区二区久久| 欧美久久黑人一区二区| 亚洲专区国产一区二区| 亚洲av美国av| 成人手机av| 美女福利国产在线| 老熟妇乱子伦视频在线观看| 可以免费在线观看a视频的电影网站| 激情在线观看视频在线高清| 日韩三级视频一区二区三区| 成熟少妇高潮喷水视频| 丰满饥渴人妻一区二区三| 深夜精品福利| 亚洲成国产人片在线观看| 精品国产超薄肉色丝袜足j| 精品国产乱码久久久久久男人| 久久午夜综合久久蜜桃| av免费在线观看网站| 日韩免费高清中文字幕av| 国产真人三级小视频在线观看| 亚洲色图 男人天堂 中文字幕| 国产1区2区3区精品| 亚洲少妇的诱惑av| 午夜福利在线免费观看网站| 麻豆国产av国片精品| 亚洲情色 制服丝袜| 中文亚洲av片在线观看爽| 五月开心婷婷网| 久久伊人香网站| 亚洲色图 男人天堂 中文字幕| 国产精品一区二区在线不卡| 日本五十路高清| 91av网站免费观看| 久久久久精品国产欧美久久久| 亚洲精品在线观看二区| 国产成人精品无人区| 亚洲色图综合在线观看| 亚洲精品久久成人aⅴ小说| 黄色片一级片一级黄色片| 成熟少妇高潮喷水视频| 精品人妻1区二区| 亚洲色图 男人天堂 中文字幕| 看黄色毛片网站| 国产av在哪里看| 黄片大片在线免费观看| 超碰成人久久| 亚洲,欧美精品.| 桃色一区二区三区在线观看| 亚洲av五月六月丁香网| 亚洲中文av在线| 日韩一卡2卡3卡4卡2021年| 亚洲五月色婷婷综合| 精品久久久久久久毛片微露脸| 日韩欧美在线二视频| 自线自在国产av| 久久中文字幕人妻熟女| 可以免费在线观看a视频的电影网站| 国产成人精品久久二区二区免费| 精品久久久久久,| 青草久久国产| 成人永久免费在线观看视频| 欧美日本亚洲视频在线播放| 精品国产超薄肉色丝袜足j| 咕卡用的链子| 日本五十路高清| 免费人成视频x8x8入口观看| 黑人欧美特级aaaaaa片| 天天躁狠狠躁夜夜躁狠狠躁| 欧美乱妇无乱码| 国产国语露脸激情在线看| 日韩国内少妇激情av| 精品一品国产午夜福利视频| 老司机靠b影院| 看片在线看免费视频| 99久久99久久久精品蜜桃| 亚洲自拍偷在线| 老汉色∧v一级毛片| 乱人伦中国视频| 亚洲成av片中文字幕在线观看| 视频区图区小说| 免费日韩欧美在线观看| 成年人黄色毛片网站| 黄色成人免费大全| 9191精品国产免费久久| 丁香欧美五月| 老鸭窝网址在线观看| 国产精品亚洲av一区麻豆| 欧美日韩黄片免| 一级片免费观看大全| 久久久久久久久中文| 男女下面进入的视频免费午夜 | 99久久国产精品久久久| 日本黄色视频三级网站网址| 亚洲七黄色美女视频| 啦啦啦在线免费观看视频4| 80岁老熟妇乱子伦牲交| 别揉我奶头~嗯~啊~动态视频| 国产成+人综合+亚洲专区| 亚洲国产毛片av蜜桃av| 老司机靠b影院| 极品教师在线免费播放| 两个人看的免费小视频| 99国产极品粉嫩在线观看| 一边摸一边抽搐一进一小说| 99精品在免费线老司机午夜| 久久人人精品亚洲av| 十八禁人妻一区二区| 99久久99久久久精品蜜桃| 午夜免费观看网址| 美女 人体艺术 gogo| 黄网站色视频无遮挡免费观看| 黄色视频,在线免费观看| 最新美女视频免费是黄的| 美女扒开内裤让男人捅视频| 国产午夜精品久久久久久| 91国产中文字幕| 国产精品一区二区免费欧美| 免费在线观看影片大全网站| 少妇裸体淫交视频免费看高清 | 久久国产乱子伦精品免费另类| 亚洲av熟女| 精品一区二区三区av网在线观看| 999久久久国产精品视频| 国产一区二区三区在线臀色熟女 | 97碰自拍视频| 中文字幕另类日韩欧美亚洲嫩草| 可以在线观看毛片的网站| 嫩草影视91久久| 久久精品亚洲av国产电影网| 丁香六月欧美| 亚洲欧美日韩无卡精品| 午夜福利在线观看吧| 黄色怎么调成土黄色| 午夜免费成人在线视频| 免费人成视频x8x8入口观看| 国产aⅴ精品一区二区三区波| 纯流量卡能插随身wifi吗| 香蕉丝袜av| 丰满人妻熟妇乱又伦精品不卡| 国产三级在线视频| 一级,二级,三级黄色视频| 精品国内亚洲2022精品成人| 国产野战对白在线观看| 亚洲五月天丁香| 黄色怎么调成土黄色| 亚洲成人免费av在线播放| 很黄的视频免费| 纯流量卡能插随身wifi吗| 国产精品av久久久久免费| 欧美激情高清一区二区三区| 黄色a级毛片大全视频| 日韩成人在线观看一区二区三区| 日韩一卡2卡3卡4卡2021年| 国产三级在线视频| 久久性视频一级片| 9热在线视频观看99| 精品免费久久久久久久清纯| 99精品在免费线老司机午夜| 日本免费a在线| 国产人伦9x9x在线观看| 一级片'在线观看视频| 亚洲精品中文字幕在线视频| 99精国产麻豆久久婷婷| 国产高清videossex| av天堂在线播放| 波多野结衣一区麻豆| 欧美精品亚洲一区二区| 久久久久久大精品| 国产日韩一区二区三区精品不卡| 亚洲国产毛片av蜜桃av| 99香蕉大伊视频| 超碰97精品在线观看| 日日干狠狠操夜夜爽| 热re99久久国产66热| 亚洲熟妇熟女久久| 成人18禁在线播放| 久久国产乱子伦精品免费另类| 18禁黄网站禁片午夜丰满| 国产亚洲av高清不卡| 黄频高清免费视频| 丁香六月欧美| 深夜精品福利| 国产激情久久老熟女| 亚洲自拍偷在线| 欧美在线一区亚洲| netflix在线观看网站| 长腿黑丝高跟| 精品第一国产精品| 80岁老熟妇乱子伦牲交| 亚洲第一欧美日韩一区二区三区| 日韩精品青青久久久久久| 青草久久国产| 激情视频va一区二区三区| 一个人观看的视频www高清免费观看 | 天堂中文最新版在线下载| 亚洲精品久久午夜乱码| 亚洲国产精品sss在线观看 | 中文字幕最新亚洲高清| 国产真人三级小视频在线观看| x7x7x7水蜜桃| 在线观看免费视频日本深夜| 黄频高清免费视频| 男男h啪啪无遮挡| 亚洲av成人av| 黑人欧美特级aaaaaa片| 国产欧美日韩一区二区三| 国产精品永久免费网站| 午夜福利欧美成人| 国产成人欧美在线观看| 国产三级在线视频| e午夜精品久久久久久久| 大型黄色视频在线免费观看| 久久精品91无色码中文字幕| 欧美国产精品va在线观看不卡| 久久精品影院6| 久久久久精品国产欧美久久久| 无遮挡黄片免费观看| 国产国语露脸激情在线看| 黄网站色视频无遮挡免费观看| 久久99一区二区三区| 亚洲欧美一区二区三区久久| 国产精品一区二区三区四区久久 | 男男h啪啪无遮挡| 亚洲精品美女久久久久99蜜臀| 黑人猛操日本美女一级片| 国产xxxxx性猛交| 精品久久久久久电影网| 成人国产一区最新在线观看| 亚洲欧美激情综合另类| 人人妻,人人澡人人爽秒播| 亚洲成人国产一区在线观看| 69精品国产乱码久久久| 精品少妇一区二区三区视频日本电影| 久久久久久久久久久久大奶| 国产精品乱码一区二三区的特点 | 国产精品一区二区在线不卡| 免费少妇av软件| 99久久综合精品五月天人人| 国产真人三级小视频在线观看| av片东京热男人的天堂| 国产深夜福利视频在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 麻豆久久精品国产亚洲av | www日本在线高清视频| 叶爱在线成人免费视频播放| 好看av亚洲va欧美ⅴa在| 久久久久久大精品| 热re99久久国产66热| 国产免费现黄频在线看| 91精品国产国语对白视频| 19禁男女啪啪无遮挡网站| 国产99久久九九免费精品| 琪琪午夜伦伦电影理论片6080| 亚洲精品av麻豆狂野| 欧美日本中文国产一区发布| 搡老乐熟女国产| 久久天堂一区二区三区四区| 日本三级黄在线观看| 日韩精品免费视频一区二区三区| 久久草成人影院| 成人三级黄色视频| 最新在线观看一区二区三区| 日韩欧美国产一区二区入口| 女警被强在线播放| 无遮挡黄片免费观看| 欧美丝袜亚洲另类 | 国产成+人综合+亚洲专区| 日韩视频一区二区在线观看| 男男h啪啪无遮挡| 亚洲中文av在线| 久久国产亚洲av麻豆专区| 亚洲中文av在线| 99国产精品99久久久久| 成人免费观看视频高清| 啦啦啦在线免费观看视频4| 亚洲熟妇熟女久久| 窝窝影院91人妻| 亚洲熟妇熟女久久| 中文字幕高清在线视频| 久久人妻熟女aⅴ| 九色亚洲精品在线播放| 十八禁人妻一区二区| 999精品在线视频| 视频区图区小说|