• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart Security Framework for Educational Institutions Using Internet of Things(IoT)

    2019-11-07 03:12:12AfzalBadshahAnwarGhaniMuhammadAhsanQureshiandShahaboddinShamshirband
    Computers Materials&Continua 2019年10期

    Afzal Badshah,Anwar Ghani,Muhammad Ahsan Qureshi and Shahaboddin Shamshirband

    Abstract:Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.

    Keywords:Internet of things,smart security framework,massacres,terrorism,smart emergency alert.

    1 Introduction

    Educational institutions massacres are the severe threat to security in increasing terrorist attacks.These are easy targets.The recent history reveals that thousands of children have been killed in such as attacks.In 2004,334 students killed and 783 were injured in Beslan School Siege,Russia.In 2000,191 students were killed and hundreds were injured in Walisongo School in Indonesia.In 1990,158 students were killed and hundreds were injured in Eastern University,Srilanka.In 2016,153 students were killed and hundreds were injured in Army Public School Peshawar,Pakistan.

    Numbers of security system have been devolved.Security agencies have launched the number of initiatives to notify the attack on the institutions immediately.Emergency mobile phone numbers,alarm systems,and smart security cameras installed.Instead of spending billions of assets on security,no new technologies have been adopted to undertake these issues smartly.All these existing systems need to be updated to the new demands of threat and technology.The basic alarm system is not a valid solution for increasing attacks on educational institutions.To safeguard our children and assets,a smart alarming system must be installed in institutions[Tsakalozos,Verroios,Roussopoulos et al.(2017)].

    IoT is becoming very popular in academia and day to day life as an emerging intelligent technology,in which smart devices are connected to the cloud.It uses the idea of fog and cloud computing to process a large amount of data.Its basic concept is to connect the smart devices to the cloud through the internet.IoT facilitates users to take the whole world on the smartphone.IoT is changing human lives by making it smart and easy.Data management,wireless communications,and real-time decisions are the key features of IoT.There has been a great deal of IoT research on different applications,such as smart homes,e-health systems,wearable devices,etc.According to the Industrial Analytical Firm(IAF),it is expected that about 50 billion devices will be connected to the internet up to 2020.Embedded technology is used in devices and sensors.Wireless technology enables them to connect with other devices or internet[Vermesan and Friess(2014)].

    Smart home,smart e-health,and smart cities are popular topics in recent years,but Smart Security Frameworks have not been well investigated.IoT is the ideal technology to deal with such issues.The most beneficial is that existing infrastructure such as security cameras and control rooms may be utilized to convert them to the SSF.

    The main contribution of this article is

    ●To design an SSF for educational institutions to instantly notify the concern departments to resist or to minimize the disaster.

    ●To remotely monitor and control the sensors and security devices during normal or in operational conditions to get full control over it at any time and from any place.Not only to monitor them but also to remotely program and configure all these devices.

    ●Collecting and analyzing data of all sensors and security devices to make smart decisions during an emergency or in abnormal situations.

    Figure 1:Data flow diagram of smart security framework

    In the proposed SSF,different types of sensors,security threat detectors,and security cameras are used.These devices are connected to the Emergency Control Room(ECR)and Central Emergency Control Center(CECC)by wire and wireless technologies.In an emergency situation,the proposed system instantly notifies the concerns within a second and starts all sensors and security cameras streaming to ECR.Panic button,installed on the smart watch,is used to activate the SSF manually.Fig.1 shows the data flow of Smart Security Framework.

    SSF uses several types of algorithms to get data from all installed security devices.These algorithms help to categorize the alert.An alarm is issued to the concern departments with live streaming.The CECC is the centralized place in the region.CECC has members from police,rescue and ambulance services.Live updates and attack nature is displayed on monitoring screens.All top stack holders control and monitor the operation from that centres to make smart decisions.Tab.1 shows the symbols used in formulation.

    The rest of the paper is arranged as follows.Section 2 reviews the related work on IoT,sensors and security systems.Section 3 discusses the proposed SSF model,different types of sensors,ECR and CECC for SSF.Section 4 discusses the proposed algorithms for the smart alerting system,smart decision and alarms.Section 5 discusses the experimental setup.The proposed system simulation was run for numbers of times to demonstrate the supremacy of the proposed approach.Finally,Section 6 concludes all work.

    Table 1: Symbols used in the article

    2 Related work

    IoT is getting a full range of attention in today academia and market.Sensors are making this world smarter.Smart security systems are getting more attention due to the wide spread of terrorism.In Advanced Safety Life Support System,different sensors is used[Lei,Liao,Huang et al.(2010)].The system gathers different information such as contactless fingerprint and vein sensor,the intelligent detector of moving objects,the self-management security system on a Web and the 3D facial shape measurement system etc.This is a lowcost security system and can be installed by those organizations that cannot support costly security system.This work is limited only to the fingerprint security.Cho et al.designed low power CMIOS Image Sensor with a variable resolution technique for a smart security[Cho,Kim,Sohn et al.(2016)].CIS is based on the high-resolution mode.During normal conditions,the pixel of the picture drops to one-fourth of the original pixels.When any movement is detected,the high pixel is restored,and data is being transmitted to the server.In normal conditions,no data is transmitted to the server to save the cost.This work is limited only to video streaming and cost saving in security systems.

    Radio Frequency(RF)is widely used in security projects.Bhawana et al.[Bhawna and Shweta(2017)]used RF to design a smart threat alert system.They proposed an emergency alert system combined with IoT to overcome some drawbacks of present EASs.It uses various types of detectors to identify transmission of various frequencies.They used Raspberry Pi to generate and detect different types of transmissions.This work is limited to radio frequency detection only.The same RF technology was used[Ruinian and Capurso(2017)]to design smart shopping system.The first time,UHFRFID was used to enhance the shopping experience and security issues.They developed a prototype to test the smart shopping system.With a smart cart system,billing can be conducted from the shopping cart itself,preventing customers from waiting in a long queue at the checkout.This work is limited to shopping billing security.This article helped us in SSF framework creation.

    Now a day,IoT is widely used in electricity grids and electrical appliances.It is the primary market of the IoT industry.Guneet Bedi discussed the specific role of IoT in different smart systems[Guneet,Ganesh,Rajendra et al.(2018)].They provided a detailed assessment of the technical parameters of IoT.IoT reduces energy wastage and generates savings.it improves the efficiency,reliability,resiliency,security,and sustainability of the electric power networks.This article helped us to get familiar with IoT devices and its working.Li et al.[Li and Dong(2018)]developed a deep learning framework for large data coming from IoT sensors deployed in the complex environment.Because the nodes have limited capabilities of processing and storing,so they worked on the offloading framework to increase the performance of deep learning applications with edge computing.This article helps us how to process a large amount of data coming from different smart devices.Shoaib et al.[Shoaib,Havinga,Paul et al.(2016)]discussed the use of smoke sensors in smart devices,Deve et al.[Deve,Hanacke and Silva(2016)]discussed a smart system for fire detection and notification.Junhui et al.[Junhui and Guorong(2016)]worked on metal detectors.Alharbi et al.[Alharbi and David(2018)]discussed the motion detectors and lighting system for the city.Packet Tracer is the CISCO devices based network simulator.In its 7 versions,they have embedded IoT simulation tools.It is widely used for IoT devices simulation.Vijaya[Vijaya(2016)]discussed the use of Packet Tracer for different networking projects.They introduced a structured learning approach to learn Packet Tracer.These structure clear students in use of physical devices like router,access points,switch and their configurations.They introduced errors deliberately to remove errors in the simulations.In our proposed framework,we used Packet Tracer to simulate and evaluate the proposed framework.This article helped us in Packet Tracer usage.

    3 System model

    SSF uses IoT,fog and cloud concepts.IoT devices sense the environment.This data is further forwarded toward fog cloud servers.In case of alerts or request,this is streamed to cloud centers.Higher authorities take decisions according to the sensing data.The great type of decisions and operations depends on the good type of sensing and communicating data to the control centers.In this section,we evaluated the functioning of the proposed framework.This could be precise advantageous to combine IoT into safety and emergency alerting schemes.Several sorts of sensors are utilized to implement the SSF.All the sensors remain active and connected to the internet round the clock.Fig.2 shows the proposed structure of the Smart Security Framework.

    Figure 2:Proposed structure of smart security framework

    3.1 Smart sensor board

    Smart Sensor Board is a circuit board which has different types of sensors.Every sensor board has pressure,temperature,humidity,smoke,motion,flames and high-sensitive voice sensors.Smart board uses embedded technology.Algorithms are used to transmit its data to the ECR and to the CECC.Other smart security tools such as smart metal detectors,the smart walk through gats,smart alarm system and also security cameras are used.In case of any exceptions,it automatically notifies the concern admins.Smart sensor board uses Algorithm 1 to initialize the SSF.Tab.2 shows the threshold values used in the experimental setup.

    3.1.1 Temperature sensor

    The temperature fluctuates during flames,firing or explosion.This fluctuation is used to categorize the alert and to determine the reason.ECR is alerted if the temperature rises from the initial threshold value.An emergency alert is sent to the CECC if the temperature rises from the second threshold value.The temperature reading is continuously displayed on the ECR display board.

    Table 2: Threshold values used in article

    3.1.2 Vibration/wind sensor

    Firing or explosion produces a strong wave force.Vibration sensors in smart board detect any type of vibration in the walls.The “x” and “y” vibration can easily be detected and categorized that what object has hit the wall.This vibration helps the CECC team to categorize the type of alert.If vibration increases from the first threshold,an alert is sent to ECR and if passes by the second threshold value,CECC is notified.

    3.1.3 Light sensor

    Light fluctuates during flames,firing,and explosion.These fluctuations help to categorize the nature of the alert.

    3.1.4 Smoke sensor

    Smoke is the indication of flames or firing.In the case of fire,it timely informs the concern authorities.If the smoke crosses the initial threshold value,ECR is alerted,secondly,CECC is notified.Smoke reading is continuously displayed on the ECR display board.

    3.1.5 Sound sensor

    The intensity of sounds not only help to alert the smart security system in an emergency but also help the CECC officials to categorize the alert.It also helps during operations.voice recognition software may also be used to categorize firing,explosions and screaming.

    3.1.6 Air pressure sensor

    During the analysis of the nature of the alert,an air pressure sensor plays a good part.If the air pressure sensor is forcefully activated,it clearly shows that some explosion has taken place.Air pressure fluctuations also help to categorize the alert.

    3.1.7 Metal detector

    The smart metal detector and walk through gates are placed on the entrance.If metal is detected on someone entry,ECR is notified.This also helps to monitor the security guards too,because most of the security guards do not properly scan the people at the entrance.On such phenomenon,security guards may be directed to rescan the person.

    3.1.8 Panic button

    The panic button is installed on the smart watch.It is a traditional button instead of touch functionality.More than one person has the smart watch panic button so to press it instantly in case of any attack or danger.

    Type of alert may be classified by different sensors data such as the temperature,light intensity,wave shocks,value of smoke,and intensity of sound etc.

    3.2 Emergency control room

    Fog computing is the edge of IoT and cloud computing.Instead of sending all data to the cloud for processing,primarily,it is send to local devices for processing.The ECR uses the concept of fog computing.This saves the cost of sending all streaming to cloud servers.Although CECC may access the gateway any time to monitor the situations.All the sensors,metal detectors,security cameras,emergency alarm and the panic button is connected to ECR.All initial alerts is notified to ECR.

    For the proposed simulation,we are using the following threat categorization techniques to categorize the alert.Implementers' or organization may alter it according to the requirements and sensitivity of the security.

    Eq.(9)shows the situation when anyone sensor reading crosses the first threshold values.If temperature,smoke,vibration or noise little bit increases from the normal situation then ECR is notified.

    Eq.(10)shows the situation when almost all sensors reading crosses the first threshold values.If temperature,smoke,vibration or noise all reading increases from the normal situation then ECR and CECC is notified.

    Eq.(11)shows the situation when sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold value then ECR as well as CECC is notified.

    Eq.(12)shows the situation when almost all sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold values then CECC is notified.

    Eq.(13)shows abnormal attacked position in the institutions.CECC is informed in such like situations.

    3.2.1 Smart watch

    A panic button is installed on the smart watch.It is a traditional button which can be pressed easily,instead of a touch sensor.It has all the smartphone sensors and Wi-Fi connection.When the panic button is pressed,all the smart watch sensors are activated and data is automatically streamed to the ECR and CECC.More than one person has the smart watch button due to security issues.

    3.2.2 Smart phone

    The ECR applications are also run on several smartphones to instantly generate an alert.Smartphones are popularly used devices today.In the proposed scenario they are connected with the ECR.All sensors can be accessed on a smartphone.In case of an emergency,its application opens automatically to categorize the threat.If the user fails to respond,the system automatically categorizes the threat.

    3.2.3 Laptop

    The smart home gateway is used to integrate all the smart devices.This gateway is connected to the laptop to monitor the system.LCD monitor may also be used to monitor the system.The laptop is used tomake changes in connections,functions or algorithms.3.2.4 Security cameras

    Smart security cameras are the most important part of the security systems.The modern Digital Video Recorder(DVR)has advance types of software which help in threat detection.Smart cameras are used to record the videos,detect any motions,detect faces and also for voice alerts.In educational institutions,because there are too many students,so we are not going to use its voice and face recognition functionality for threat detection.In case of any alert,cameras streaming is directed to the CECC.In normal situations,video streaming is not forwarded to the CECC to save the cost and traffic load.Security cameras existing functionality may be used to get alert at ECR.

    3.2.5 Emergency gate

    Every organization has emergency doors and gates for emergency exit.In an emergency,it is not possible to manually open these doors for the exit.We have proposed to attach these doors and gates with SSF.In SSF,as the alert is notified,all the connected emergency doors get open automatically.

    3.3 Cloud server

    The IoT and cloud,both services work together.IoT has billion of devices and produces massive data.Cloud computing provides the infrastructure to process and store this large amount of data.In an emergency call,the cloud server starts to receive live streaming from different sensors.With the help of different algorithms,the nature of the attack is categorized.Notifications are sent to concern departments.Incoming streaming is directed toward CECC.

    3.4 Central emergency control center

    CECC is a building or room where all emergency alerts are received from the region.Every district has its own CECC.CECC guarantees a 24/7 service through a complex communications' system.It also uses the emergency numbers to receive emergency phone calls.CECC permits the police,the armed forces,civil protection department and the rescue department to take urgent action.Initially,CECC is monitored by an operator.In case of an emergency,stockholders officer take the control of CECC.CECC has the representatives of police,the ambulance services,the fire brigade,and rescue services.Live streaming of all the sensors are shown in CECC.All concern stack holders monitor the issue.They manage the response to the alert.Hospitals are updated according to the situations.

    Figure 3:Conditional data flow of smart security system

    4 Proposed algorithms

    The proposed system notifies the concerns in case of an emergency.Fig.3 shows the conditional flow of the proposed framework.In the normal situation,data is only streamed to the ECR situated within the organization to save the network cost.Although,CECC may get the live streaming of sensors any time.In case of an alert detection,all sensors data is directed to the CECC.Fig.3 shows the conditional data flow of Smart Security Framework

    An Algorithm 1 is embedded in smart-board and ECR.It reads temperature,pressure,smoke,motion and sounds etc.If the values increase from the threshold values,emergency notification is sent to the ECR and CECC and the smart emergency alarm starts ringing.

    Algorithm 2 works in Emergency Control Room and in home-gateway.As emergency accrues,alert categorization application automatically opens on smartphones and ECR alarm starts ringing to categorize the alert.If the user fails to respond to the application,It automatically sends the alert to CECC.

    Algorithm 3 is used in CECC.As the alert is received,CECC starts to get data from all the sensors placed in different locations.According to the data,the nature of alert is categorized.Notification and live streaming are issued to the concern departments.

    5 Experimental setup and evaluation

    This section first describes the experimental setup and then presents the performance evaluation of the proposed framework.We used Cisco Packet Tracer 7 and Java,which is popularly used simulation tool for IoT network simulation.Cisco Packet Tracer 7 is specially designed to simulate IoT applications.This package includes different IoT devices,sensors,gateways and IoT servers for simulation.

    5.1 Experimental setup

    In the laboratory setup,we distributed the work into three layers.In the first layer,all sensors read the environment.On the second layer,fog computing technologies are utilized to analyze these data and send an alarm to the ECR&CECC.On the third layer,all the concern departments and CECC works.All the sensors are remotely monitored and controlled and smart decisions are made.Fig.4 shows the simulation structure of Smart Security Framework.

    Figure 4:Simulation structure of smart security framework

    5.1.1 Sensor board

    Several types of sensors are connected to Microprocessor Control Unit(MCU).MCU is a small circuit board,which have links to install sensors on it.Using IoT cable,we connected temperature,motion,smoke,sound sensors and also the panic button to it.We programmed the MCU using java language to read data from all the connected sensors and transmit it to the ECR.To make the sensor board remote connection with the home gateway,IP address is assigned to the home gateway and set the MCU default gateway as the home gateway.We programmed the MCU to transmit its reading toward the home gateway.

    5.1.2 Emergency control room

    After making all connections,we connected the MCU board with home gateway.The home gateway is a wireless switch device,which can connect numbers of devices.It uses the fog computing concepts to process initial data on edge before sending it to the cloud.Digital Video Recorder(DVR),which has connections to numbers of cameras,are also connected to the home gateway.Home gateway has a wireless card to easily connect wireless devices to it.Laptop,smartphone,and smart watch are connected to the home gateway to get notifications from all sensor devices during on warning.Sirens installed in different locations of the institution are also connected to the home gateway.This emergency alarm ring during any alert.MCU circuit boards are used to connect emergency doors to the home gateway.In case of an emergency,all emergency doors open automatically.The laptop is used to get access to the home gateway and to implement programs on different sensor devices.It also facilitates to impose different types of conditions on the sensors and other connected IoT devices.To monitor SSF,we first converted the home gateway as IoT server.To implement the program,we opened the IoT monitor application,registered gateway as IoT server.The same application helps to program and executes the devices remotely.We wrote proposed algorithms here to get detail monitoring data from different sensors and to analyze that data.ECR and CECC are notified as any threat is detected.For example,when the panic button is pressed it instantly play the emergency alarm at ECR and CECC.

    5.1.3 Central emergency control center

    We used switches to create different departments.CECC is the central place where all the security devices are monitored.When a warning is identified,its emergency alarm starts ringing.The concern location is monitored online to get detail information about any warning.CECC has the authorization to access the local gateway.Alarm and the display screens are connected with the MCU board.Laptop and smartphone are also connected to the internal switch.MCU is programmed to receive notification from all over security devices.When an alert is received,the alarm system starts ringing.

    5.2 Evaluation of proposed system

    The proposed system is tested for different types of Alerts.We examined its functionality and performance.Average results of different tests are shown in below tables.Fig.5 shows the snapshot of CISCO Packet Tracer results.

    Figure 5:Running time of IoT devices

    Tab.3 describes the test of a motion sensor.To check the operation of a motion sensor,we switched the Packet Tracer to simulation mode and brought the Alt+Mouse closer to it which is the default trigger of the motion sensor.As we brought it closer,the emergency alarm system of ECR started ringing.Same movement option is displayed on CECC.Packet Tracer result shows that the response time of the motion sensor is 0.01 seconds while the transfer time to the emergency alarm is 1.557 seconds.

    Table 3: Motion sensor test

    Tab.4 explains the working of a metal detector.To evaluate the performance of the metal detector,we run the Packet Tracer in simulation mode and brought the metal closer to the metal detector which is its default trigger.As we brought it closer,the emergency alarm system of ECR started ringing.Packet Tracer results show that the response time of the metal sensor is 0.01 seconds.Transfer time of metal sensor signal to CECC is 2.19 seconds.

    Table 4: Metal sensor

    Tab.5 displays the functioning of a temperature sensor.Temperature sensor reads the temperature of the current environment and detail is sent to the ECR.A check has been placed on temperature to ring the alarm if the temperature passes by 50C.Temperature sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of metal sensor signal to CECC is 1.226 seconds.

    Table 5: Temperature reader

    Tab.6 shows the working of a smoke sensor.The smoke sensor detects the smoke of current environment and detail is shown on ECR display.A check has been placed on smoke to ring the alarm if the smoke crosses 50 pp.The smoke sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of the metal sensor signal to CECC is 1.524 seconds.

    Table 6: Smoke sensor

    Tab.7 demonstrates the working of the panic button.To check the panic button,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the emergency alarm of ECR and CECC started ringing.Packet Tracer result shows that the response time of the panic button is 0.01 seconds and the transfer time of the emergency signal to CECC is 1.674 seconds.

    Table 7: Panic button

    Tab.8 shows the operations of security cameras.Security cameras video is displayed 24/7 at ECR.The video is streamed to CECC only in emergency detection.However,CECC may watch this online streaming at any time.To assess the working of security cameras,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the security cameras video is directed toward the server.Packet Tracer result shows that the response time of security camera is 0.01 seconds and the transfer time of the emergency signal to CECC is 0.111 seconds.

    Table 8: Security cameras

    Tab.9 represents the working of emergency gates.We have connected one door to the Smart Security Framework to check it is working.Emergency gates are open only on an emergency call.To check the working of the emergency gate,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the gates open automatically.Packet Tracer result shows that the response time of gate is 0.01 seconds.

    Table 9: Emergency doors

    Tab.10 shows the different protocols used by different devices during transmission.We used the ping command to note the protocol used and time taken in the transfer.Fig.5(d)shows that when the IoT protocols and micro-controller are used the transfer time increases.

    Table 10: Protocol used in simulation

    Fig.9 shows the results of Packet Tracer.We checked it only for the ping command to note down the total time taken in request transfer.Tab.10 shows the protocol used in communication.The result shows that transfer time increases where MCU is used.It also uses the IoT protocol to communicate.In the proposed simulation,we are keeping the wire length constant.The result shows that the transfer time also increases if we increase intermediate communication nodes.

    Figure 6:Packet Tracer simulation results

    The above result and discussion shows that SSF is very good initiative towards instant notification about security issues.Security departments will be able to instantly move toward the threat direction.With this setup,control centers official will be able to properly guide the operation to minimize the losses.

    6 Conclusion and future work

    In this article,Smart Security Framework(SSF)has been introduced for educational institutions.The recent past massacres have taken many precious lives.This might be depreciated by adopting an efficient and smart alerting system.SSF is efficient and intelligent in alerting concerns in case of an emergency.Different types of sensors are placed in different locations of the building,reading environment 24/7.In case of any warning detection,an alert is sent to the Emergency Control Room(ECR)and also to Central Emergency Control Center(CECC).Smart emergency doors are connected with the proposed system which automatically opens in case of any alert detection.SSS is not confined only to the educational institutions,it may also be used in any other organizations for security objects.Our future plane is to extend this framework for the Smart Security Framework for the City(SSSC).In the SSSC,sensors will be placed in streets,public places and especially religion places to notify the concern on time.

    老鸭窝网址在线观看| 老熟妇乱子伦视频在线观看| 午夜精品一区二区三区免费看| 精品高清国产在线一区| 在线观看66精品国产| 两个人的视频大全免费| av欧美777| 亚洲男人天堂网一区| a级毛片a级免费在线| 一级片免费观看大全| tocl精华| 午夜福利成人在线免费观看| 国产精品一区二区免费欧美| 久久久久国产精品人妻aⅴ院| 国产亚洲av高清不卡| 此物有八面人人有两片| 免费在线观看完整版高清| 变态另类丝袜制服| 中亚洲国语对白在线视频| 久99久视频精品免费| 免费看日本二区| 亚洲在线自拍视频| 精品福利观看| 无遮挡黄片免费观看| 免费电影在线观看免费观看| 在线观看免费日韩欧美大片| 久久人妻av系列| 一本大道久久a久久精品| 久久久久免费精品人妻一区二区| 两个人的视频大全免费| 精品乱码久久久久久99久播| 搡老妇女老女人老熟妇| 久久久精品国产亚洲av高清涩受| 婷婷丁香在线五月| 韩国av一区二区三区四区| 全区人妻精品视频| 美女午夜性视频免费| 波多野结衣高清作品| 男女之事视频高清在线观看| av福利片在线| 九色国产91popny在线| 精品国产乱子伦一区二区三区| 久久久久免费精品人妻一区二区| 精品电影一区二区在线| 久久久久久久久久黄片| 久久天躁狠狠躁夜夜2o2o| 热99re8久久精品国产| 正在播放国产对白刺激| 午夜影院日韩av| 日韩精品青青久久久久久| 两个人的视频大全免费| 大型黄色视频在线免费观看| 全区人妻精品视频| 久久久国产欧美日韩av| 亚洲av日韩精品久久久久久密| 1024视频免费在线观看| svipshipincom国产片| 国产亚洲精品综合一区在线观看 | 日韩欧美一区二区三区在线观看| 岛国在线免费视频观看| 性欧美人与动物交配| 国产99久久九九免费精品| 成年版毛片免费区| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲欧美激情综合另类| 天堂av国产一区二区熟女人妻 | 12—13女人毛片做爰片一| 国产又色又爽无遮挡免费看| 久久久久久久精品吃奶| 日本在线视频免费播放| 不卡一级毛片| 亚洲av日韩精品久久久久久密| 中文字幕精品亚洲无线码一区| 看片在线看免费视频| 国产精品一区二区三区四区免费观看 | 黄色毛片三级朝国网站| 亚洲第一电影网av| 韩国av一区二区三区四区| 一级毛片高清免费大全| 国产探花在线观看一区二区| 一级毛片精品| 国产成人啪精品午夜网站| 一卡2卡三卡四卡精品乱码亚洲| 一级作爱视频免费观看| 免费搜索国产男女视频| 别揉我奶头~嗯~啊~动态视频| 99热这里只有精品一区 | 免费在线观看亚洲国产| 麻豆一二三区av精品| 一级黄色大片毛片| 少妇被粗大的猛进出69影院| 亚洲七黄色美女视频| 麻豆国产av国片精品| 后天国语完整版免费观看| 午夜激情福利司机影院| 日本撒尿小便嘘嘘汇集6| 久久午夜综合久久蜜桃| 久久婷婷成人综合色麻豆| 国产蜜桃级精品一区二区三区| 免费观看人在逋| 免费在线观看黄色视频的| 男女那种视频在线观看| 身体一侧抽搐| 久久精品影院6| 嫁个100分男人电影在线观看| 亚洲欧美激情综合另类| 久久久久免费精品人妻一区二区| 波多野结衣高清无吗| 岛国视频午夜一区免费看| 在线观看午夜福利视频| 制服人妻中文乱码| 在线a可以看的网站| 精华霜和精华液先用哪个| 久久精品综合一区二区三区| 久久久精品欧美日韩精品| 一级作爱视频免费观看| 亚洲精品av麻豆狂野| 在线观看www视频免费| 久久精品国产亚洲av香蕉五月| 国产亚洲精品久久久久5区| 久久精品成人免费网站| 日本三级黄在线观看| 岛国在线观看网站| 男女下面进入的视频免费午夜| 香蕉丝袜av| 国产精品久久视频播放| 级片在线观看| 国产精品1区2区在线观看.| 亚洲欧美日韩无卡精品| 免费av毛片视频| 88av欧美| 一级a爱片免费观看的视频| 中文字幕高清在线视频| 国产黄片美女视频| 99久久久亚洲精品蜜臀av| 亚洲真实伦在线观看| 亚洲自拍偷在线| 一级a爱片免费观看的视频| 精品国产美女av久久久久小说| 国产精品九九99| 久久精品综合一区二区三区| 丝袜美腿诱惑在线| 欧美在线一区亚洲| 1024视频免费在线观看| av超薄肉色丝袜交足视频| 国产精品久久久久久人妻精品电影| 中亚洲国语对白在线视频| 亚洲五月婷婷丁香| 久9热在线精品视频| 亚洲欧美激情综合另类| 1024手机看黄色片| 国产成人影院久久av| 人成视频在线观看免费观看| 麻豆成人av在线观看| 国产亚洲精品综合一区在线观看 | 最新美女视频免费是黄的| 高清在线国产一区| 国内久久婷婷六月综合欲色啪| 一个人观看的视频www高清免费观看 | 午夜日韩欧美国产| 三级国产精品欧美在线观看 | or卡值多少钱| 日本免费a在线| 1024手机看黄色片| 正在播放国产对白刺激| www日本在线高清视频| av天堂在线播放| 免费在线观看完整版高清| 1024视频免费在线观看| 特大巨黑吊av在线直播| 99国产精品一区二区三区| 久久久久亚洲av毛片大全| 日韩精品免费视频一区二区三区| 麻豆av在线久日| 操出白浆在线播放| 一级毛片女人18水好多| 免费无遮挡裸体视频| 国产精品影院久久| 日韩三级视频一区二区三区| 欧美日韩亚洲综合一区二区三区_| 亚洲一卡2卡3卡4卡5卡精品中文| 日韩欧美在线二视频| 99国产精品一区二区三区| 日韩欧美 国产精品| 18禁黄网站禁片免费观看直播| 搡老岳熟女国产| 亚洲男人天堂网一区| 久久天躁狠狠躁夜夜2o2o| 欧美中文日本在线观看视频| 看片在线看免费视频| 国产精品影院久久| 国产欧美日韩精品亚洲av| 黄片大片在线免费观看| 91麻豆av在线| 无限看片的www在线观看| 亚洲成人精品中文字幕电影| 极品教师在线免费播放| x7x7x7水蜜桃| 国产成人精品久久二区二区免费| 999久久久国产精品视频| 免费电影在线观看免费观看| 人成视频在线观看免费观看| 老司机午夜福利在线观看视频| 最近最新中文字幕大全电影3| 欧美不卡视频在线免费观看 | 午夜福利视频1000在线观看| 一进一出抽搐动态| 啦啦啦韩国在线观看视频| 三级男女做爰猛烈吃奶摸视频| 美女免费视频网站| 视频区欧美日本亚洲| 久久午夜亚洲精品久久| 国产成人一区二区三区免费视频网站| 好看av亚洲va欧美ⅴa在| 男人舔女人的私密视频| 亚洲精品粉嫩美女一区| 欧美色欧美亚洲另类二区| 中文资源天堂在线| 99国产极品粉嫩在线观看| 黄频高清免费视频| 成年免费大片在线观看| 亚洲av中文字字幕乱码综合| 亚洲精品中文字幕在线视频| 嫩草影视91久久| 国产精品一区二区三区四区久久| 色精品久久人妻99蜜桃| 午夜成年电影在线免费观看| 麻豆成人av在线观看| 亚洲美女视频黄频| 国内毛片毛片毛片毛片毛片| 一卡2卡三卡四卡精品乱码亚洲| 伦理电影免费视频| 久久久水蜜桃国产精品网| 18禁裸乳无遮挡免费网站照片| 精品久久久久久成人av| 亚洲午夜精品一区,二区,三区| 男女那种视频在线观看| 99久久久亚洲精品蜜臀av| 色综合站精品国产| 欧美日韩福利视频一区二区| 人妻久久中文字幕网| 国产免费男女视频| 亚洲国产精品sss在线观看| 香蕉丝袜av| 老司机福利观看| 精品久久久久久久人妻蜜臀av| 亚洲专区中文字幕在线| 国产一区二区三区在线臀色熟女| x7x7x7水蜜桃| 女人爽到高潮嗷嗷叫在线视频| 女人高潮潮喷娇喘18禁视频| 亚洲九九香蕉| 欧美日韩亚洲国产一区二区在线观看| 国产伦在线观看视频一区| 亚洲av成人不卡在线观看播放网| 嫩草影院精品99| 欧美国产日韩亚洲一区| 97碰自拍视频| 亚洲精华国产精华精| 久久久久久久久中文| 999久久久国产精品视频| 国产精品爽爽va在线观看网站| 国产97色在线日韩免费| 久久久久久久久免费视频了| 亚洲中文字幕日韩| 老汉色av国产亚洲站长工具| 99热6这里只有精品| 一级毛片精品| 亚洲av成人不卡在线观看播放网| 久久久久久久午夜电影| 首页视频小说图片口味搜索| 日本成人三级电影网站| 天堂动漫精品| 1024手机看黄色片| 欧美最黄视频在线播放免费| 国产精品1区2区在线观看.| 日本 av在线| 国产成人精品无人区| 最近最新中文字幕大全电影3| 最好的美女福利视频网| 一级片免费观看大全| √禁漫天堂资源中文www| 亚洲精品一卡2卡三卡4卡5卡| 婷婷六月久久综合丁香| 久9热在线精品视频| 怎么达到女性高潮| 动漫黄色视频在线观看| 精品乱码久久久久久99久播| 精品久久久久久久末码| xxx96com| 日韩成人在线观看一区二区三区| 十八禁人妻一区二区| 又爽又黄无遮挡网站| 免费无遮挡裸体视频| 国产欧美日韩精品亚洲av| 国产成人av教育| 女人爽到高潮嗷嗷叫在线视频| 精华霜和精华液先用哪个| 99riav亚洲国产免费| 九色国产91popny在线| 中文亚洲av片在线观看爽| av在线播放免费不卡| 一级片免费观看大全| 日日夜夜操网爽| av中文乱码字幕在线| 欧美黑人巨大hd| 欧美中文综合在线视频| 亚洲一区二区三区色噜噜| 久久香蕉国产精品| 可以免费在线观看a视频的电影网站| 国产探花在线观看一区二区| 精品国产超薄肉色丝袜足j| 99热只有精品国产| 丝袜人妻中文字幕| 国内精品久久久久精免费| 中文亚洲av片在线观看爽| 亚洲18禁久久av| 久久久国产成人免费| 香蕉久久夜色| 国产主播在线观看一区二区| 在线观看午夜福利视频| 国产精品野战在线观看| 午夜影院日韩av| 国产精品久久视频播放| 啦啦啦韩国在线观看视频| 美女免费视频网站| 91国产中文字幕| 色综合婷婷激情| 日本五十路高清| 老鸭窝网址在线观看| 午夜日韩欧美国产| 丰满人妻一区二区三区视频av | 久9热在线精品视频| 观看免费一级毛片| 亚洲中文字幕一区二区三区有码在线看 | 亚洲专区国产一区二区| 亚洲,欧美精品.| 在线看三级毛片| 免费无遮挡裸体视频| 亚洲熟妇熟女久久| xxxwww97欧美| 欧美日韩瑟瑟在线播放| 男女床上黄色一级片免费看| 18禁黄网站禁片午夜丰满| 757午夜福利合集在线观看| 草草在线视频免费看| 后天国语完整版免费观看| 特级一级黄色大片| 黄色女人牲交| 青草久久国产| 国产亚洲精品综合一区在线观看 | 精品日产1卡2卡| 久久久久久免费高清国产稀缺| 丝袜美腿诱惑在线| 亚洲天堂国产精品一区在线| 波多野结衣高清无吗| 国产精品 国内视频| 天堂av国产一区二区熟女人妻 | 男人的好看免费观看在线视频 | 变态另类丝袜制服| 国产v大片淫在线免费观看| 麻豆久久精品国产亚洲av| 一个人免费在线观看的高清视频| 中文字幕高清在线视频| 视频区欧美日本亚洲| 天堂av国产一区二区熟女人妻 | 精品久久久久久久久久免费视频| 88av欧美| 一级毛片女人18水好多| 琪琪午夜伦伦电影理论片6080| 一级毛片精品| 九九热线精品视视频播放| 久久久久久久久中文| 午夜福利免费观看在线| 久久久久免费精品人妻一区二区| 亚洲av第一区精品v没综合| 熟妇人妻久久中文字幕3abv| 亚洲aⅴ乱码一区二区在线播放 | 无人区码免费观看不卡| 欧美日本亚洲视频在线播放| 精品午夜福利视频在线观看一区| 国产主播在线观看一区二区| 91大片在线观看| 在线免费观看的www视频| 久久国产精品人妻蜜桃| 黄色视频不卡| 人人妻人人看人人澡| 嫩草影院精品99| 国产亚洲精品一区二区www| 香蕉丝袜av| 99国产精品一区二区三区| 岛国在线免费视频观看| 麻豆成人av在线观看| 一本久久中文字幕| 国产精品综合久久久久久久免费| aaaaa片日本免费| 婷婷精品国产亚洲av在线| 国产区一区二久久| 18禁黄网站禁片免费观看直播| 色av中文字幕| 国产91精品成人一区二区三区| 中文字幕最新亚洲高清| 国产欧美日韩精品亚洲av| 看片在线看免费视频| 国产一区二区三区在线臀色熟女| 欧美性长视频在线观看| 午夜福利在线观看吧| 国产精品亚洲一级av第二区| 香蕉国产在线看| 久久婷婷成人综合色麻豆| 日韩有码中文字幕| 村上凉子中文字幕在线| 校园春色视频在线观看| 免费电影在线观看免费观看| 亚洲精品av麻豆狂野| 国产精品爽爽va在线观看网站| 久久久久免费精品人妻一区二区| 大型av网站在线播放| 在线观看66精品国产| 禁无遮挡网站| 国产三级中文精品| 又爽又黄无遮挡网站| 午夜福利欧美成人| 丰满人妻熟妇乱又伦精品不卡| 免费在线观看完整版高清| 脱女人内裤的视频| 极品教师在线免费播放| 亚洲av五月六月丁香网| 久久九九热精品免费| 日本免费一区二区三区高清不卡| 首页视频小说图片口味搜索| 国产av一区二区精品久久| 午夜久久久久精精品| 一二三四社区在线视频社区8| 成人精品一区二区免费| 国产亚洲精品久久久久5区| 老熟妇乱子伦视频在线观看| 成人手机av| 午夜视频精品福利| 女人被狂操c到高潮| 男人舔女人下体高潮全视频| 最新美女视频免费是黄的| 亚洲熟妇熟女久久| 国产伦一二天堂av在线观看| 欧美成人性av电影在线观看| 久久伊人香网站| 丁香欧美五月| 久99久视频精品免费| 国产精品一区二区精品视频观看| 久久久久久大精品| 午夜精品一区二区三区免费看| 国产精品久久久人人做人人爽| 久久久国产成人精品二区| 日本免费一区二区三区高清不卡| 午夜福利视频1000在线观看| 国产亚洲精品久久久久久毛片| 国产精品久久久久久人妻精品电影| 欧美乱色亚洲激情| 国产一区二区三区在线臀色熟女| 亚洲精品av麻豆狂野| 长腿黑丝高跟| 欧美大码av| 国产精品久久久人人做人人爽| 欧美另类亚洲清纯唯美| 搡老岳熟女国产| 久久久国产成人精品二区| 最好的美女福利视频网| 午夜老司机福利片| 久久久久久人人人人人| 1024手机看黄色片| 亚洲精品中文字幕在线视频| 久久这里只有精品19| 亚洲国产精品sss在线观看| 国产av一区二区精品久久| 淫妇啪啪啪对白视频| 中文字幕熟女人妻在线| 国产精品一区二区精品视频观看| 久久香蕉激情| 亚洲成人精品中文字幕电影| 级片在线观看| 91成年电影在线观看| 超碰成人久久| 久久性视频一级片| 99国产极品粉嫩在线观看| 99热这里只有精品一区 | 久久久精品欧美日韩精品| 欧美日韩精品网址| 欧美日韩一级在线毛片| 在线视频色国产色| 黑人欧美特级aaaaaa片| 亚洲九九香蕉| 亚洲熟女毛片儿| 非洲黑人性xxxx精品又粗又长| av在线播放免费不卡| 淫妇啪啪啪对白视频| av在线天堂中文字幕| av福利片在线观看| 99久久国产精品久久久| 久久精品夜夜夜夜夜久久蜜豆 | 精品国产美女av久久久久小说| 成人欧美大片| 人成视频在线观看免费观看| 成人av一区二区三区在线看| 久久草成人影院| 免费电影在线观看免费观看| 中文资源天堂在线| 18禁裸乳无遮挡免费网站照片| 日韩精品青青久久久久久| 国产激情久久老熟女| 日本精品一区二区三区蜜桃| 熟妇人妻久久中文字幕3abv| 91国产中文字幕| 国产三级在线视频| 最近最新中文字幕大全电影3| 亚洲人成77777在线视频| 欧美乱色亚洲激情| 18禁裸乳无遮挡免费网站照片| 此物有八面人人有两片| www.熟女人妻精品国产| 国产精品爽爽va在线观看网站| 国产乱人伦免费视频| 久99久视频精品免费| 女人高潮潮喷娇喘18禁视频| 中文在线观看免费www的网站 | 亚洲欧美精品综合一区二区三区| 日韩有码中文字幕| 久久这里只有精品中国| 可以在线观看毛片的网站| 日本免费a在线| 亚洲成人免费电影在线观看| 国产97色在线日韩免费| 亚洲av美国av| 特级一级黄色大片| 真人一进一出gif抽搐免费| 美女免费视频网站| 99精品在免费线老司机午夜| 免费人成视频x8x8入口观看| 又粗又爽又猛毛片免费看| 欧美国产日韩亚洲一区| 久久久久久久久久黄片| 欧美绝顶高潮抽搐喷水| 精品久久久久久久末码| 人人妻,人人澡人人爽秒播| 国产高清videossex| 成在线人永久免费视频| 久久精品91蜜桃| 夜夜夜夜夜久久久久| 免费电影在线观看免费观看| 又黄又粗又硬又大视频| tocl精华| 在线观看一区二区三区| 成人精品一区二区免费| 这个男人来自地球电影免费观看| 午夜福利在线在线| 久久热在线av| 免费观看人在逋| 999精品在线视频| 精品久久蜜臀av无| 黄色视频不卡| 亚洲欧美精品综合一区二区三区| 欧美日韩福利视频一区二区| 精华霜和精华液先用哪个| 日日夜夜操网爽| 日韩av在线大香蕉| 亚洲专区中文字幕在线| 国产精品永久免费网站| 亚洲九九香蕉| 黄色 视频免费看| 欧美中文综合在线视频| 久久久精品欧美日韩精品| 一区二区三区激情视频| 91麻豆av在线| 久久久久久久午夜电影| 国产视频一区二区在线看| 国产精品亚洲av一区麻豆| 深夜精品福利| 成人高潮视频无遮挡免费网站| 久99久视频精品免费| 婷婷六月久久综合丁香| 人人妻人人看人人澡| 嫁个100分男人电影在线观看| 国产成人系列免费观看| 国产av麻豆久久久久久久| 18美女黄网站色大片免费观看| 午夜免费成人在线视频| 黄色a级毛片大全视频| 亚洲国产精品成人综合色| 国产精品久久久久久亚洲av鲁大| xxx96com| 日韩av在线大香蕉| 精品人妻1区二区| 黑人欧美特级aaaaaa片| 日韩av在线大香蕉| 亚洲精品一区av在线观看| 男女那种视频在线观看| 99国产精品一区二区蜜桃av| 久久欧美精品欧美久久欧美| 国产又黄又爽又无遮挡在线| 国产高清有码在线观看视频 | 青草久久国产| 男人舔女人下体高潮全视频| 亚洲成av人片在线播放无| 国产av又大| 国产av一区二区精品久久| 特级一级黄色大片| 18禁黄网站禁片午夜丰满| 黄片小视频在线播放| 激情在线观看视频在线高清| 热99re8久久精品国产| 岛国视频午夜一区免费看| 亚洲色图av天堂| 最新在线观看一区二区三区| 床上黄色一级片| 熟女电影av网| 亚洲精品国产一区二区精华液|