• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card

    2018-04-08 03:11:20JaewookJungDonghoonLeeHakjunLeeandDonghoWon

    Jaewook Jung, Donghoon Lee, Hakjun Lee, and Dongho Won

    1.Introduction

    With the rapid development of the Internet service and electronic commerce technology, many people rely on computer networks to exchange information, access resource,and process data in wireless networks now. Such public wireless networks may be intruded by malicious attackers and other unauthorized users. To ensure the secure environment, the password-based user authentication technique is one of the most widely adopted mechanisms to deal with the secret data over the public channels.

    Since Lamport[1]first proposed a user authentication protocol in 1981, numerous user authentication schemes have been proposed[2]-[9]afterwards. In 2009, Xu et al.[2]proposed a smart-card-based password authentication scheme. They claimed that the scheme can resist various types of attacks even if the information stored in the smart card is revealed.However, in 2010, Song[3]proved that Xu et al.’s scheme[2]cannot be secure against an impersonation attack, and then Song[3]proposed an improved scheme. In the same year, Sood et al.[4]also found that Xu et al.’s scheme[2]cannot resist the off-line guessing attack and forgery attack, and then presented an enhanced scheme. Unfortunately, in 2013, Chen et al.[5]demonstrated that Song’s scheme[3]is vulnerable to stolen smart card attack. Chen et al.[5]also proved that Sood et al.’s scheme[4]does not provide mutual authentication, which means that a legitimate user has no way to verify the validity of the server. Then Chen et al.[5]proposed a robust smart-card-based remote user password authentication scheme. However, in 2013, Li et al.[6]pointed out that Chen et al.’s scheme[5]cannot ensure the perfect forward secrecy and detect the wrong password in login phase. Besides that, the password change of Chen et al.’s scheme[5]is inefficient since the user has to communicate with the server to update his/her password. Then Li et al.[6]proposed an enhanced user authentication scheme.

    Recently, Liu et al.[7]pointed out that Li et al.’s scheme[6]is insecure against the man-in-the-middle attack and insider attack. To address the weaknesses in the Li et al.’s scheme[6],Liu et al. proposed an improved smart card based password authentication scheme[7]. However, after careful analysis, we find that Liu et al.’s scheme is vulnerable to off-line password guessing attack and user impersonation attack as well as it fails to preserve user anonymity in login phase. In order to eliminate all the above problems existed in Liu et al.’s scheme, a security enhanced anonymous user authenticated key agreement scheme is proposed.

    The remainder of the paper is organized as follows: Section 2 describes a review of Liu et al.’s scheme. Section 3 points out the weaknesses of Liu et al.’s scheme. The proposed scheme and security analysis of the proposed scheme are presented in Sections 4 and 5, respectively. Lastly, Section 6 concludes this paper.

    2.Review of Liu et al.’s Scheme

    This section describes Liu et al.’s authentication scheme[7]which involves four phases: Registration, login, authentication,and password change. For convenience, the notations used throughout this paper are summarized in Table 1.

    2.1 Registration Phase

    Step 1. The user Uiselects his/her IDiand PWi, and generates random number r. Then Uicomputesand sends a registration requestto the server S through a secure channel.

    Table 1: Notations

    Step 2. The server S computes,, and. The server S storesinto a smart card and issues this smart card to the user Uithrough a secure channel.

    Step 3. The user Uistores the random number r into the card. Finally, the smart card contains.

    2.2 Login Phase

    Step 1. The user Uiinserts his/her smart card into a card reader and inputs IDiand PWi. The smart card computesand, then compares Ci′ with the stored value Ci. If this condition is hold,the smart card acknowledges the legitimacy of Ui, and proceeds with the next steps. Otherwise, it terminates this phase.

    Step 2. The smart card generates a random number α,computesand.

    Step 3. Finally, the user Uisends login request messageto the server S.

    2.3 Authentication Phase

    Step 1. The server S checks the validity of timestampand computes, then compares Di′ with the received value Di. If this condition is hold, the procedure goes to the next steps. Otherwise, this phase is terminated.

    Step 2. The server S generates a random number β,computesand. Then the server S sends the authentication messageto Ui.

    Step 3. The user Uichecks the validity of timestampand computes, then compares F′ with the received valueiFi. If this condition is hold, the Uiacknowledges the legitimacy of the S, and proceeds with the next step. Otherwise, it terminates this phase.

    Step 4. Finally, the user Uicomputes a session keyand the server S also computes the same shared session key

    2.4 Password Change Phase

    Step 1. The Uiinserts his/her smart card into a card reader and inputs IDiand password PWi.

    Step 2. The smart card computes, then compareswith the stored value Ci. If it is hold, Uiselects a new passwordOtherwise, this phase is terminated.

    Step 3. The smart card computesand. Finally, the smart card replaces (Bi, Ci) with (,), respectively.

    3.Security Weaknesses of Liu et al.’s Scheme

    In this section, the weaknesses of Liu et al.’s scheme[7]are demonstrated. We find that Liu et al.’s scheme cannot resist the off-line password guessing attack and user impersonation attack as well as it fails to preserve user anonymity. The details of these weaknesses are described as follows.

    3.1 Failure to Preserve User Anonymity

    User anonymity is a highly desirable property for user authentication scheme, as the leakage of user’s identity may allow an unauthorized entity to track the user’s login record and behavior pattern. However, in Liu et al.’s scheme,user’s identity IDiis in plaintext form in the login request. Using an eavesdropping attack, the attacker can maliciously monitor the public channels[8]-[10], and also identify some of the valuable information in messages transmitted over these public channels[11]-[17]. In this manner, an attacker can eavesdrop on login messages to collect the plaintext identities without difficulty. For this reason, user anonymity cannot be preserved in Liu et al.’s scheme[7].

    3.2 Off-Line Password Guessing Attack

    In Liu et al.’s scheme[7], the attacker can obtain the informationin the smart card after physically monitoring power consumption[10], and intercept login request message. Then the off-line password guessing attack can be done by performing the following steps:

    Step 1. The attacker extracts the stored parametersfrom the stolen smart card by using the power consumption attack[10].

    Step 2. The attacker obtains the exact user’s identity IDiby executing the steps discussed in subsection 3.1.

    Step 3. The attacker selects a password candidate

    Step 4. By using the obtained user’s identity IDi, the attacker computes

    Step 5. The attacker repeats above steps from step 3 to step 4 until the computed result Ci*equals the stored Ci.

    If they are equal, PWi*= PWi, this means that the attacker has successfully obtained the user’s password PWiby offline password guessing attack.

    3.3 User Impersonation Attack

    In this subsection, we demonstrate that an attacker can successfully login to the server S by using the stolen smart card of a user Ui. The steps are as follows:

    Step 1. The attacker obtains the user’s identity IDiby executing the steps discussed in subsection 3.1 and also obtains the user’s password PWiby executing the steps discussed in subsection 3.2.

    Step 2. The attacker generates a random number R, and computesThen The attacker sends the forged messageto the server S for login request.

    Step 3. Upon receiving the forged login request messagefrom the attacker, the server S first checks the validity of timestamp. After that, S computesthen compares Di′ with the received value

    Step 4. Finally, the server S successfully verifies the forged login request messagebecause the computed value Di′ correctly equals the received valueWith these correct verifications, the server S accepts the forged login request and allows the attacker to login.

    Through the aforementioned steps, we can see that the attacker can successfully impersonate the legal Ui.

    4.Proposed Scheme

    In this section, we propose a security enhanced authentication and key agreement scheme to overcome the security weaknesses in Liu et al.’s scheme[7]. The proposed scheme also consists of four phases: Registration, login,authentication, and password change. The notations in the scheme are summarized in Table 1. Fig. 1 provides an illustration of login and authentication phases of the proposed scheme.

    4.1 Registration Phase

    Step 1. The user Uiselects his/her IDiand PWiand generates the random number r. Then Uicomputes h(r||PWi)and sends a registration requestto the server S through a secure channel.

    Step 2. The server S computes,The server S stores {Bi, Ci, h(·)} into a smart card and issues this smart card to the user Uithrough a secure channel.

    Step 3. The user Uistores the random number r into the card. Finally, the smart card contains {Bi, Ci, h(·), r}.

    4.2 Login Phase

    Step 1. The user Uiinserts his/her smart card into a card reader and inputs IDiand PWi. The smart card computesthen compares Ci′ with the stored value Ci. If this condition is hold,the smart card acknowledges the legitimacy of the Ui, and proceeds with the next steps. Otherwise, it terminates this phase.

    Step 2. The smart card generates a random number α and computes,, and.

    Step 3. Finally, the user Uisends the login request message{Di, Ei, Fi, Ti} to the server S.

    4.3 Authentication Phase

    Step 1. The server S checks the validity of timestampand computes, then compares Fi′ with the received value Fi. If this condition is hold, the procedure goes to the next steps. Otherwise, this phase is terminated.

    Step 2. The server S generates a random number β, and computes. Then the server S sends the authentication message {Gi, Hi, Ts} to Ui.

    Step 3. The user Uichecks the validity of timestampand computesand, then compares Gi′ with the received value Gi. If this condition is hold, Uiacknowledges the legitimacy of the S, and proceeds with the next step. Otherwise, it terminates this phase.

    4.4 Password Change Phase

    Step 1. The user Uiinserts his/her smart card into a card reader, inputs IDiand password PWi.

    Fig. 1. Login and authentication phase of the proposed scheme.

    Step 2. The smart card computesthen compareswith the stored Ci. If it is hold, Uiselects a new password. Otherwise, this phase is terminated.

    Step 3. The smart card computesandFinally, the smart card replaces (Bi, Ci) with,).

    5.Security Analysis of Proposed Scheme

    In this section, we will analyze the proposed scheme in terms of security. Table 2 shows the security comparisons of the proposed scheme and other related schemes[5]-[7]. The detail descriptions are as follows.

    Table 2: Security comparisons of the proposed scheme and other related schemes

    5.1 Preserve User Anonymity

    Suppose that the attacker has intercepted the user Ui’s login request {Di, Ei, Fi, Ti}. However, it is not feasible to derive IDifrom the login request because the login request includes Diinstead of IDi. Therefore, the use of Diwill ensure any information related to the user identity could not be acquired by the attacker.

    5.2 Provide Mutual Authentication

    In the scheme, the server S can authenticate the user by checking whether the login request {Di, Ei, Fi, Ti} is correct.Also, the user Uican authenticate the server S by checking whether the authentication message {Fi, Gi, Ts} is correct.

    5.3 Resistance to Off-Line Password Guessing Attack

    To successfully carry out a password guessing attack in the proposed scheme, the attacker has to know the user’s IDi. However, it is impossible for the attacker to obtain the user’s identity IDiin the proposed scheme. Thus, the proposed scheme is secure against the off-line password guessing attack.

    5.4 Resistance to Insider Attack

    In the proposed scheme, the user Uisends the password information to the server S in the form of h (r||PWi) instead of the form PWi. Accordingly, the inside attacker is unable to acquire the user’s password PWi.

    5.5 Resistance to User Impersonation Attack

    If an attacker tries to impersonate a legal user Uiin order to cheat the server S, the attacker needs to modify {Di, Ei, Fi, Ti}to start a new session. In order to change these values, the attacker has to guess the secret key x. However, the probability of successfully guessing x is negligible.

    5.6 Resistance to Replay Attack

    An attacker can intercept data packets and try to resend it to server in order to launch the replay attack. However, the login request message of the proposed scheme includes a current timestamp, i.e., Tiof {Di, Ei, Fi, Ti}. Hence, the proposed scheme can withstand against the replay attack.

    6.Conclusions

    We have proposed an enhanced user authentication scheme in order to remedy the security weaknesses of Liu et al.’s scheme[7]. The proposed scheme achieves the mutual authentication and the user anonymity. In addition, the proposed scheme can withstand the password guessing attack, user impersonation attack, and insider attack even if the attacker obtains the user’s smart card. The security of the proposed scheme has been analyzed and the result shows that the scheme is more secure than other related schemes.

    [1]L. Lamport, “Password authentication with insecure communication,”Communications of the ACM, vol. 24, no.11, pp. 770-772, 1981.

    [2]J. Xu, W.-T. Zhu, and D.-G. Feng, “An improved smart card based password authentication scheme with provable security,”Computer Standards and Interfaces, vol. 31, no. 4,pp. 723-728, 2009.

    [3]R. Song, “Advanced smart card based password authentication protocol,”ComputerStandardsand Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.

    [4]S. K. Sood, A. K. Sarje, and K. Singh, “An improvement of Xuet al.’s authentication scheme using smart cards,” inProc. of the 3rd Annual ACM Bangalore Conf., India, 2010,pp. 22-23.

    [5]B.-L. Chen, W.-C. Kuo, and L.-C. Wu, “Robust smart-cardbased remote user password authentication scheme,”Intl.Journal of Communication Systems, vol. 27, no. 2, pp. 377-389, 2012.

    [6]X. Li, J. Niu, M. K. Khan, and J. Liao, “An enhanced smart card based remote user password authentication scheme,”Journal of Network and Computer Applications, vol. 36, no.5, pp. 1365-1371, 2013.

    [7]Y.-J. Liu, C.-C. Chang, and S.-C. Chang, “An efficient and secure smart card based password authentication scheme,”Intl. Journal of Network Security, vol. 19, no. 1, pp. 1-10, 2016.

    [8]D. Kang, J. Jung, J. Mun, D. Lee, Y. Choi, and D. Won,“Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain,”Security and Communication Networks, vol. 9, no. 11, pp. 1462-1476,2016.

    [9]Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won,“Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,”Sensors,vol. 14, no. 6, pp. 10081-10106, 2014.

    [10]P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,”inProc. of Annual Intl. Cryptology Conf., 1999, pp. 388-397.

    [11]J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won, “Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks,”Sensors, vol. 14, no. 4, pp. 6443-6462, 2014.

    [12]J. Moon, Y. Choi, J. Kim, and D. Won, “An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps,”Journal of Medical Systems, vol. 40, no. 3, pp. 1-11, 2016.

    [13]Y. Chung, S. Choi, Y. Lee, N. Park, and D. Won, “An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service inwireless sensor networks,”Sensors, vol. 16, no. 10, pp. 1653: 1-21, 2016.

    [14]J. Moon, Y. Choi, J. Jung, and D. Won, “An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards,”Plos One, vol. 10, no. 12, pp. e0145263: 1-15, 2015.

    [15]F. B. Degefa, D. Lee, J. Kim, Y. Choi, and D. Won,“Performance and security enhanced authentication and key agreement protocol for SAE/LTE network,”Computer Networks, vol. 94, no. 15, pp. 145-163, 2016.

    [16]J. Nam, K. K. R. Choo, S. Han, M. Kim, J. Paik, and D.Won, “Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation,”Plos One,vol. 10, no. 4, pp. 0116709: 1-21, 2015.

    [17]Y. Choi, Y. Lee, and D. Won, “Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction,”Intl. Journal of Distributed Sensor Networks,, vol. 2016, no. 2, pp. 1-16, 2016.

    老司机影院成人| 赤兔流量卡办理| 在线亚洲精品国产二区图片欧美| 国产 精品1| 下体分泌物呈黄色| 国产又爽黄色视频| 午夜福利在线免费观看网站| 又大又黄又爽视频免费| 亚洲精品国产色婷婷电影| 成人免费观看视频高清| 一区二区日韩欧美中文字幕| 中文字幕另类日韩欧美亚洲嫩草| 成人国产麻豆网| 亚洲精品久久午夜乱码| 中文字幕亚洲精品专区| 欧美日本中文国产一区发布| 大香蕉久久网| 日本黄色日本黄色录像| 国产午夜精品一二区理论片| 久久女婷五月综合色啪小说| 69精品国产乱码久久久| 国产综合精华液| 国产精品99久久99久久久不卡 | 亚洲av在线观看美女高潮| 极品少妇高潮喷水抽搐| 女的被弄到高潮叫床怎么办| 美女国产高潮福利片在线看| 丰满少妇做爰视频| 国产黄色视频一区二区在线观看| 婷婷色av中文字幕| 免费黄频网站在线观看国产| 精品国产露脸久久av麻豆| 亚洲色图 男人天堂 中文字幕| 亚洲欧美一区二区三区黑人 | 免费久久久久久久精品成人欧美视频| 久久午夜综合久久蜜桃| 黄色毛片三级朝国网站| 亚洲国产精品成人久久小说| 韩国av在线不卡| av不卡在线播放| 国产男女内射视频| 亚洲成国产人片在线观看| av一本久久久久| 啦啦啦视频在线资源免费观看| 一二三四中文在线观看免费高清| av线在线观看网站| 中文字幕人妻丝袜制服| 欧美日韩精品成人综合77777| 免费在线观看黄色视频的| 免费高清在线观看视频在线观看| 精品福利永久在线观看| videosex国产| 午夜福利网站1000一区二区三区| 制服诱惑二区| 国产精品人妻久久久影院| 黄色毛片三级朝国网站| 日韩制服丝袜自拍偷拍| 男人添女人高潮全过程视频| 老女人水多毛片| 久久久久久久国产电影| 亚洲第一av免费看| 黄频高清免费视频| √禁漫天堂资源中文www| 亚洲精品日本国产第一区| 国产色婷婷99| 一级片免费观看大全| 亚洲一级一片aⅴ在线观看| 国产97色在线日韩免费| 国产一区二区在线观看av| 少妇人妻 视频| 亚洲av成人精品一二三区| 国产亚洲午夜精品一区二区久久| 亚洲 欧美一区二区三区| 99久国产av精品国产电影| 欧美成人午夜免费资源| 美女脱内裤让男人舔精品视频| 国产熟女午夜一区二区三区| 91午夜精品亚洲一区二区三区| 免费观看av网站的网址| 捣出白浆h1v1| 永久免费av网站大全| 日韩精品有码人妻一区| 精品一区在线观看国产| 日韩欧美精品免费久久| 免费黄频网站在线观看国产| 人人妻人人澡人人爽人人夜夜| 亚洲欧美精品自产自拍| 免费观看av网站的网址| 婷婷色综合大香蕉| 夫妻午夜视频| 国产人伦9x9x在线观看 | 国产精品欧美亚洲77777| 综合色丁香网| 午夜激情av网站| 国产深夜福利视频在线观看| 九草在线视频观看| 美女大奶头黄色视频| 日日撸夜夜添| 久久精品久久精品一区二区三区| 久久人人爽人人片av| 国产xxxxx性猛交| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 日韩欧美一区视频在线观看| 飞空精品影院首页| 丝瓜视频免费看黄片| 国产一区有黄有色的免费视频| a级片在线免费高清观看视频| 叶爱在线成人免费视频播放| 欧美日韩视频精品一区| 国产成人免费观看mmmm| 热re99久久国产66热| 色婷婷久久久亚洲欧美| 又黄又粗又硬又大视频| 男人爽女人下面视频在线观看| 久久精品国产亚洲av高清一级| 在线看a的网站| 日韩人妻精品一区2区三区| 欧美日韩精品成人综合77777| 永久网站在线| 国产成人精品久久二区二区91 | 久久久欧美国产精品| 成人亚洲欧美一区二区av| 欧美日韩精品成人综合77777| 精品少妇内射三级| 老女人水多毛片| 深夜精品福利| 精品少妇黑人巨大在线播放| 久久久久久久久久人人人人人人| 国产精品 国内视频| 日本猛色少妇xxxxx猛交久久| 三级国产精品片| 捣出白浆h1v1| 高清av免费在线| 三级国产精品片| 美女高潮到喷水免费观看| 一区在线观看完整版| 免费在线观看黄色视频的| 日本色播在线视频| 有码 亚洲区| 久久久精品区二区三区| 色94色欧美一区二区| 亚洲精品乱久久久久久| 亚洲三区欧美一区| 国产高清不卡午夜福利| 色婷婷av一区二区三区视频| www.精华液| 国产一区亚洲一区在线观看| 桃花免费在线播放| www.熟女人妻精品国产| 久久久久久久国产电影| a级毛片在线看网站| 校园人妻丝袜中文字幕| 国产xxxxx性猛交| 18在线观看网站| 国产精品一区二区在线不卡| 亚洲国产精品成人久久小说| 超碰97精品在线观看| 国产在线一区二区三区精| 精品亚洲成国产av| 日韩熟女老妇一区二区性免费视频| 日本wwww免费看| av女优亚洲男人天堂| 在线精品无人区一区二区三| 午夜激情久久久久久久| 97精品久久久久久久久久精品| 青春草国产在线视频| 丝瓜视频免费看黄片| 久久久欧美国产精品| 欧美激情极品国产一区二区三区| 肉色欧美久久久久久久蜜桃| 只有这里有精品99| 卡戴珊不雅视频在线播放| 午夜福利视频在线观看免费| 久久精品亚洲av国产电影网| 亚洲精品日本国产第一区| 欧美黄色片欧美黄色片| 中国三级夫妇交换| 国产老妇伦熟女老妇高清| 久久精品aⅴ一区二区三区四区 | 高清黄色对白视频在线免费看| 最新的欧美精品一区二区| 99香蕉大伊视频| 毛片一级片免费看久久久久| 少妇被粗大的猛进出69影院| 少妇人妻久久综合中文| 日韩一区二区三区影片| 精品国产乱码久久久久久男人| 欧美精品av麻豆av| 伊人久久大香线蕉亚洲五| 日本黄色日本黄色录像| 亚洲av日韩在线播放| 日韩av不卡免费在线播放| 极品人妻少妇av视频| 成年人午夜在线观看视频| 久久精品国产亚洲av涩爱| 成年女人毛片免费观看观看9 | 亚洲精品国产一区二区精华液| 王馨瑶露胸无遮挡在线观看| 丝袜脚勾引网站| 国产欧美日韩一区二区三区在线| 涩涩av久久男人的天堂| 视频在线观看一区二区三区| 免费在线观看视频国产中文字幕亚洲 | 色94色欧美一区二区| 丝袜人妻中文字幕| 又大又黄又爽视频免费| www.精华液| 啦啦啦视频在线资源免费观看| videos熟女内射| 亚洲精品自拍成人| 丝袜美足系列| 亚洲成av片中文字幕在线观看 | 国产成人欧美| 日韩av在线免费看完整版不卡| 久久影院123| 欧美 亚洲 国产 日韩一| 啦啦啦啦在线视频资源| 美女午夜性视频免费| 夫妻性生交免费视频一级片| 黄片播放在线免费| 欧美av亚洲av综合av国产av | 日韩大片免费观看网站| 建设人人有责人人尽责人人享有的| 亚洲成色77777| 少妇的丰满在线观看| 国产成人av激情在线播放| 精品国产国语对白av| 国产日韩欧美视频二区| 色94色欧美一区二区| av网站在线播放免费| 国产无遮挡羞羞视频在线观看| 熟女电影av网| 久久97久久精品| 亚洲精品久久成人aⅴ小说| 免费在线观看黄色视频的| 黄色视频在线播放观看不卡| 亚洲婷婷狠狠爱综合网| 国产在线一区二区三区精| 成人毛片a级毛片在线播放| 久久97久久精品| 一区二区日韩欧美中文字幕| 亚洲精品乱久久久久久| 亚洲伊人色综图| 久久99蜜桃精品久久| 免费在线观看视频国产中文字幕亚洲 | 国产日韩欧美视频二区| 精品视频人人做人人爽| 国产成人精品在线电影| 精品午夜福利在线看| 丝袜在线中文字幕| 大香蕉久久成人网| 侵犯人妻中文字幕一二三四区| 国产成人精品在线电影| 亚洲精品av麻豆狂野| 考比视频在线观看| 婷婷色综合大香蕉| 久久韩国三级中文字幕| 人妻系列 视频| 亚洲三级黄色毛片| 久久精品国产亚洲av高清一级| 久久久久久久精品精品| 久久亚洲国产成人精品v| av又黄又爽大尺度在线免费看| 欧美成人精品欧美一级黄| 日韩人妻精品一区2区三区| 亚洲欧美一区二区三区久久| 国产成人精品福利久久| 日本爱情动作片www.在线观看| 91成人精品电影| 人体艺术视频欧美日本| 一区在线观看完整版| 国产成人av激情在线播放| 一级黄片播放器| 日本黄色日本黄色录像| 亚洲国产精品一区三区| 热99久久久久精品小说推荐| 亚洲av.av天堂| 如何舔出高潮| 国产精品成人在线| 精品第一国产精品| 午夜福利影视在线免费观看| 免费少妇av软件| 欧美亚洲 丝袜 人妻 在线| 搡老乐熟女国产| 亚洲国产色片| 亚洲伊人色综图| 成人免费观看视频高清| 9色porny在线观看| tube8黄色片| 日韩伦理黄色片| 天堂俺去俺来也www色官网| 纵有疾风起免费观看全集完整版| 欧美国产精品va在线观看不卡| 九草在线视频观看| 一区二区三区四区激情视频| 日韩欧美一区视频在线观看| 成人黄色视频免费在线看| 久久久国产一区二区| 99久久综合免费| 丝袜喷水一区| 一区二区av电影网| 午夜精品国产一区二区电影| 汤姆久久久久久久影院中文字幕| 久久久久国产精品人妻一区二区| 日韩一本色道免费dvd| 好男人视频免费观看在线| 亚洲,欧美精品.| 欧美日韩亚洲国产一区二区在线观看 | 免费av中文字幕在线| 国产在线一区二区三区精| 午夜av观看不卡| 97精品久久久久久久久久精品| 寂寞人妻少妇视频99o| 丰满少妇做爰视频| 美女脱内裤让男人舔精品视频| 国产成人免费无遮挡视频| 熟女av电影| 精品午夜福利在线看| 三级国产精品片| 欧美黄色片欧美黄色片| 中文字幕另类日韩欧美亚洲嫩草| 中国三级夫妇交换| 免费看av在线观看网站| 91aial.com中文字幕在线观看| 久久精品夜色国产| 这个男人来自地球电影免费观看 | av在线老鸭窝| 亚洲一级一片aⅴ在线观看| 狠狠精品人妻久久久久久综合| 国产精品 国内视频| 看免费av毛片| 国产精品一二三区在线看| 美女高潮到喷水免费观看| 亚洲国产欧美在线一区| 巨乳人妻的诱惑在线观看| 18禁裸乳无遮挡动漫免费视频| 999久久久国产精品视频| 街头女战士在线观看网站| 99热全是精品| 91国产中文字幕| 精品少妇一区二区三区视频日本电影 | 欧美在线黄色| 叶爱在线成人免费视频播放| 日韩制服骚丝袜av| 亚洲四区av| 亚洲国产日韩一区二区| 亚洲 欧美一区二区三区| 在线精品无人区一区二区三| 校园人妻丝袜中文字幕| 国产欧美亚洲国产| 男男h啪啪无遮挡| 久久精品国产亚洲av涩爱| 久久久久久久久免费视频了| 在线精品无人区一区二区三| 久久97久久精品| 亚洲国产看品久久| 免费女性裸体啪啪无遮挡网站| 99热网站在线观看| 婷婷色综合www| www.av在线官网国产| 日本av手机在线免费观看| 欧美人与善性xxx| 久久久久久久久免费视频了| 成年人免费黄色播放视频| 观看美女的网站| 久久av网站| 亚洲情色 制服丝袜| 蜜桃在线观看..| 久久午夜综合久久蜜桃| 免费黄频网站在线观看国产| 最新的欧美精品一区二区| 久久久久久久精品精品| 青春草国产在线视频| 久久精品国产亚洲av涩爱| 成人影院久久| 亚洲成av片中文字幕在线观看 | 一区二区日韩欧美中文字幕| av一本久久久久| 热99久久久久精品小说推荐| 在线观看美女被高潮喷水网站| 国产精品二区激情视频| 国精品久久久久久国模美| 精品少妇黑人巨大在线播放| 国产成人91sexporn| 日日摸夜夜添夜夜爱| 国产黄色视频一区二区在线观看| 老汉色av国产亚洲站长工具| 黄片播放在线免费| 国产一区二区激情短视频 | 久久精品国产亚洲av高清一级| 天天躁日日躁夜夜躁夜夜| 国产成人午夜福利电影在线观看| 99热网站在线观看| 美国免费a级毛片| av线在线观看网站| 男女边摸边吃奶| 免费日韩欧美在线观看| 电影成人av| 少妇熟女欧美另类| 免费观看a级毛片全部| 在线亚洲精品国产二区图片欧美| 少妇人妻久久综合中文| 免费少妇av软件| www.精华液| 考比视频在线观看| 国产成人av激情在线播放| 尾随美女入室| 国产精品免费大片| 超碰97精品在线观看| 看十八女毛片水多多多| 一边亲一边摸免费视频| 国产野战对白在线观看| 精品久久久久久电影网| 国产xxxxx性猛交| 国产精品三级大全| 伦精品一区二区三区| av在线播放精品| 国产精品一区二区在线观看99| 午夜91福利影院| 久久女婷五月综合色啪小说| 在现免费观看毛片| 汤姆久久久久久久影院中文字幕| 国产黄色视频一区二区在线观看| 欧美日韩一区二区视频在线观看视频在线| 欧美精品av麻豆av| 丝瓜视频免费看黄片| 亚洲av中文av极速乱| 一二三四中文在线观看免费高清| 赤兔流量卡办理| 丰满迷人的少妇在线观看| 欧美日本中文国产一区发布| 人妻人人澡人人爽人人| 老鸭窝网址在线观看| 在线 av 中文字幕| 亚洲精品,欧美精品| 久久久久久久大尺度免费视频| 成人国产麻豆网| 久久久a久久爽久久v久久| 亚洲内射少妇av| 日韩一区二区视频免费看| 日韩中文字幕视频在线看片| 亚洲五月色婷婷综合| 国产精品香港三级国产av潘金莲 | 婷婷成人精品国产| 制服丝袜香蕉在线| 热re99久久国产66热| 国产有黄有色有爽视频| 黄色视频在线播放观看不卡| 国产一区二区三区av在线| 午夜精品国产一区二区电影| 久久久久视频综合| 亚洲精品一二三| 中文字幕av电影在线播放| 久久女婷五月综合色啪小说| 男人爽女人下面视频在线观看| 最新的欧美精品一区二区| 飞空精品影院首页| 街头女战士在线观看网站| 国产成人aa在线观看| 熟女电影av网| 中文字幕av电影在线播放| 尾随美女入室| 激情五月婷婷亚洲| 欧美黄色片欧美黄色片| 好男人视频免费观看在线| 满18在线观看网站| 国产无遮挡羞羞视频在线观看| 日本wwww免费看| 美女中出高潮动态图| 国产一区二区 视频在线| 成人免费观看视频高清| a级毛片黄视频| 街头女战士在线观看网站| av线在线观看网站| √禁漫天堂资源中文www| 美女中出高潮动态图| 少妇的丰满在线观看| 国产深夜福利视频在线观看| 欧美精品一区二区免费开放| a 毛片基地| 永久免费av网站大全| 日韩 亚洲 欧美在线| 69精品国产乱码久久久| 国产亚洲av片在线观看秒播厂| 国产激情久久老熟女| 欧美+日韩+精品| 性色avwww在线观看| 欧美精品一区二区大全| 18禁动态无遮挡网站| 亚洲成国产人片在线观看| 成年动漫av网址| 亚洲精品国产色婷婷电影| 久久婷婷青草| 国产激情久久老熟女| 久久这里有精品视频免费| 夫妻午夜视频| 国产又色又爽无遮挡免| 搡老乐熟女国产| 99国产精品免费福利视频| 最近中文字幕高清免费大全6| 国产在线免费精品| 亚洲 欧美一区二区三区| 九草在线视频观看| 日本爱情动作片www.在线观看| 成人午夜精彩视频在线观看| 久久久久视频综合| 一个人免费看片子| 国产片内射在线| 性高湖久久久久久久久免费观看| 久久午夜福利片| 精品国产一区二区三区久久久樱花| 午夜日韩欧美国产| 女人久久www免费人成看片| 日本爱情动作片www.在线观看| 午夜福利一区二区在线看| 夫妻午夜视频| 国产毛片在线视频| 我要看黄色一级片免费的| 在线观看免费日韩欧美大片| 91成人精品电影| 成人18禁高潮啪啪吃奶动态图| 黑丝袜美女国产一区| 亚洲精品第二区| 菩萨蛮人人尽说江南好唐韦庄| 少妇被粗大的猛进出69影院| 好男人视频免费观看在线| 日韩av在线免费看完整版不卡| 免费黄网站久久成人精品| 色哟哟·www| 18+在线观看网站| 亚洲国产精品一区三区| 91精品三级在线观看| 激情五月婷婷亚洲| 国语对白做爰xxxⅹ性视频网站| 久久鲁丝午夜福利片| videossex国产| 亚洲欧美精品自产自拍| 精品少妇一区二区三区视频日本电影 | 激情视频va一区二区三区| 99香蕉大伊视频| 男女午夜视频在线观看| 成人国语在线视频| 久久久久久久亚洲中文字幕| 国产成人91sexporn| 波多野结衣av一区二区av| 国产亚洲午夜精品一区二区久久| 尾随美女入室| 91精品伊人久久大香线蕉| 寂寞人妻少妇视频99o| 欧美成人午夜精品| 又大又黄又爽视频免费| 日本91视频免费播放| 黑人猛操日本美女一级片| 日韩,欧美,国产一区二区三区| 天天躁日日躁夜夜躁夜夜| 电影成人av| 在线亚洲精品国产二区图片欧美| 亚洲国产av新网站| 亚洲第一av免费看| 久久ye,这里只有精品| 十八禁网站网址无遮挡| 国产精品久久久久久av不卡| 国产男女超爽视频在线观看| 在线 av 中文字幕| 成人手机av| 国产日韩欧美亚洲二区| 欧美少妇被猛烈插入视频| 久久精品国产亚洲av涩爱| 亚洲婷婷狠狠爱综合网| 人成视频在线观看免费观看| 性色av一级| 搡女人真爽免费视频火全软件| 免费观看在线日韩| av女优亚洲男人天堂| 超色免费av| 中文字幕亚洲精品专区| 一本色道久久久久久精品综合| 一级爰片在线观看| 精品第一国产精品| 午夜福利在线免费观看网站| 我要看黄色一级片免费的| 视频在线观看一区二区三区| 欧美 日韩 精品 国产| 精品一区二区免费观看| 久久国产精品男人的天堂亚洲| www.精华液| 久久精品国产亚洲av涩爱| 美女xxoo啪啪120秒动态图| 亚洲av电影在线进入| 亚洲欧美中文字幕日韩二区| 国产精品无大码| 男女午夜视频在线观看| 大片电影免费在线观看免费| a级片在线免费高清观看视频| 热re99久久国产66热| 伊人亚洲综合成人网| 啦啦啦啦在线视频资源| 菩萨蛮人人尽说江南好唐韦庄| 日韩精品免费视频一区二区三区| 青青草视频在线视频观看| 波野结衣二区三区在线| 欧美国产精品va在线观看不卡| 丝袜人妻中文字幕| 日韩制服丝袜自拍偷拍| 色哟哟·www| 十八禁网站网址无遮挡| 亚洲综合精品二区| 国产黄色免费在线视频| 国产深夜福利视频在线观看| 国产精品三级大全| 国产一区二区激情短视频 | 国产xxxxx性猛交| 精品少妇久久久久久888优播| 久久国产精品大桥未久av| 欧美日韩精品网址|