• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart Security Framework for Educational Institutions Using Internet of Things(IoT)

    2019-11-07 03:12:12AfzalBadshahAnwarGhaniMuhammadAhsanQureshiandShahaboddinShamshirband
    Computers Materials&Continua 2019年10期

    Afzal Badshah,Anwar Ghani,Muhammad Ahsan Qureshi and Shahaboddin Shamshirband

    Abstract:Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.

    Keywords:Internet of things,smart security framework,massacres,terrorism,smart emergency alert.

    1 Introduction

    Educational institutions massacres are the severe threat to security in increasing terrorist attacks.These are easy targets.The recent history reveals that thousands of children have been killed in such as attacks.In 2004,334 students killed and 783 were injured in Beslan School Siege,Russia.In 2000,191 students were killed and hundreds were injured in Walisongo School in Indonesia.In 1990,158 students were killed and hundreds were injured in Eastern University,Srilanka.In 2016,153 students were killed and hundreds were injured in Army Public School Peshawar,Pakistan.

    Numbers of security system have been devolved.Security agencies have launched the number of initiatives to notify the attack on the institutions immediately.Emergency mobile phone numbers,alarm systems,and smart security cameras installed.Instead of spending billions of assets on security,no new technologies have been adopted to undertake these issues smartly.All these existing systems need to be updated to the new demands of threat and technology.The basic alarm system is not a valid solution for increasing attacks on educational institutions.To safeguard our children and assets,a smart alarming system must be installed in institutions[Tsakalozos,Verroios,Roussopoulos et al.(2017)].

    IoT is becoming very popular in academia and day to day life as an emerging intelligent technology,in which smart devices are connected to the cloud.It uses the idea of fog and cloud computing to process a large amount of data.Its basic concept is to connect the smart devices to the cloud through the internet.IoT facilitates users to take the whole world on the smartphone.IoT is changing human lives by making it smart and easy.Data management,wireless communications,and real-time decisions are the key features of IoT.There has been a great deal of IoT research on different applications,such as smart homes,e-health systems,wearable devices,etc.According to the Industrial Analytical Firm(IAF),it is expected that about 50 billion devices will be connected to the internet up to 2020.Embedded technology is used in devices and sensors.Wireless technology enables them to connect with other devices or internet[Vermesan and Friess(2014)].

    Smart home,smart e-health,and smart cities are popular topics in recent years,but Smart Security Frameworks have not been well investigated.IoT is the ideal technology to deal with such issues.The most beneficial is that existing infrastructure such as security cameras and control rooms may be utilized to convert them to the SSF.

    The main contribution of this article is

    ●To design an SSF for educational institutions to instantly notify the concern departments to resist or to minimize the disaster.

    ●To remotely monitor and control the sensors and security devices during normal or in operational conditions to get full control over it at any time and from any place.Not only to monitor them but also to remotely program and configure all these devices.

    ●Collecting and analyzing data of all sensors and security devices to make smart decisions during an emergency or in abnormal situations.

    Figure 1:Data flow diagram of smart security framework

    In the proposed SSF,different types of sensors,security threat detectors,and security cameras are used.These devices are connected to the Emergency Control Room(ECR)and Central Emergency Control Center(CECC)by wire and wireless technologies.In an emergency situation,the proposed system instantly notifies the concerns within a second and starts all sensors and security cameras streaming to ECR.Panic button,installed on the smart watch,is used to activate the SSF manually.Fig.1 shows the data flow of Smart Security Framework.

    SSF uses several types of algorithms to get data from all installed security devices.These algorithms help to categorize the alert.An alarm is issued to the concern departments with live streaming.The CECC is the centralized place in the region.CECC has members from police,rescue and ambulance services.Live updates and attack nature is displayed on monitoring screens.All top stack holders control and monitor the operation from that centres to make smart decisions.Tab.1 shows the symbols used in formulation.

    The rest of the paper is arranged as follows.Section 2 reviews the related work on IoT,sensors and security systems.Section 3 discusses the proposed SSF model,different types of sensors,ECR and CECC for SSF.Section 4 discusses the proposed algorithms for the smart alerting system,smart decision and alarms.Section 5 discusses the experimental setup.The proposed system simulation was run for numbers of times to demonstrate the supremacy of the proposed approach.Finally,Section 6 concludes all work.

    Table 1: Symbols used in the article

    2 Related work

    IoT is getting a full range of attention in today academia and market.Sensors are making this world smarter.Smart security systems are getting more attention due to the wide spread of terrorism.In Advanced Safety Life Support System,different sensors is used[Lei,Liao,Huang et al.(2010)].The system gathers different information such as contactless fingerprint and vein sensor,the intelligent detector of moving objects,the self-management security system on a Web and the 3D facial shape measurement system etc.This is a lowcost security system and can be installed by those organizations that cannot support costly security system.This work is limited only to the fingerprint security.Cho et al.designed low power CMIOS Image Sensor with a variable resolution technique for a smart security[Cho,Kim,Sohn et al.(2016)].CIS is based on the high-resolution mode.During normal conditions,the pixel of the picture drops to one-fourth of the original pixels.When any movement is detected,the high pixel is restored,and data is being transmitted to the server.In normal conditions,no data is transmitted to the server to save the cost.This work is limited only to video streaming and cost saving in security systems.

    Radio Frequency(RF)is widely used in security projects.Bhawana et al.[Bhawna and Shweta(2017)]used RF to design a smart threat alert system.They proposed an emergency alert system combined with IoT to overcome some drawbacks of present EASs.It uses various types of detectors to identify transmission of various frequencies.They used Raspberry Pi to generate and detect different types of transmissions.This work is limited to radio frequency detection only.The same RF technology was used[Ruinian and Capurso(2017)]to design smart shopping system.The first time,UHFRFID was used to enhance the shopping experience and security issues.They developed a prototype to test the smart shopping system.With a smart cart system,billing can be conducted from the shopping cart itself,preventing customers from waiting in a long queue at the checkout.This work is limited to shopping billing security.This article helped us in SSF framework creation.

    Now a day,IoT is widely used in electricity grids and electrical appliances.It is the primary market of the IoT industry.Guneet Bedi discussed the specific role of IoT in different smart systems[Guneet,Ganesh,Rajendra et al.(2018)].They provided a detailed assessment of the technical parameters of IoT.IoT reduces energy wastage and generates savings.it improves the efficiency,reliability,resiliency,security,and sustainability of the electric power networks.This article helped us to get familiar with IoT devices and its working.Li et al.[Li and Dong(2018)]developed a deep learning framework for large data coming from IoT sensors deployed in the complex environment.Because the nodes have limited capabilities of processing and storing,so they worked on the offloading framework to increase the performance of deep learning applications with edge computing.This article helps us how to process a large amount of data coming from different smart devices.Shoaib et al.[Shoaib,Havinga,Paul et al.(2016)]discussed the use of smoke sensors in smart devices,Deve et al.[Deve,Hanacke and Silva(2016)]discussed a smart system for fire detection and notification.Junhui et al.[Junhui and Guorong(2016)]worked on metal detectors.Alharbi et al.[Alharbi and David(2018)]discussed the motion detectors and lighting system for the city.Packet Tracer is the CISCO devices based network simulator.In its 7 versions,they have embedded IoT simulation tools.It is widely used for IoT devices simulation.Vijaya[Vijaya(2016)]discussed the use of Packet Tracer for different networking projects.They introduced a structured learning approach to learn Packet Tracer.These structure clear students in use of physical devices like router,access points,switch and their configurations.They introduced errors deliberately to remove errors in the simulations.In our proposed framework,we used Packet Tracer to simulate and evaluate the proposed framework.This article helped us in Packet Tracer usage.

    3 System model

    SSF uses IoT,fog and cloud concepts.IoT devices sense the environment.This data is further forwarded toward fog cloud servers.In case of alerts or request,this is streamed to cloud centers.Higher authorities take decisions according to the sensing data.The great type of decisions and operations depends on the good type of sensing and communicating data to the control centers.In this section,we evaluated the functioning of the proposed framework.This could be precise advantageous to combine IoT into safety and emergency alerting schemes.Several sorts of sensors are utilized to implement the SSF.All the sensors remain active and connected to the internet round the clock.Fig.2 shows the proposed structure of the Smart Security Framework.

    Figure 2:Proposed structure of smart security framework

    3.1 Smart sensor board

    Smart Sensor Board is a circuit board which has different types of sensors.Every sensor board has pressure,temperature,humidity,smoke,motion,flames and high-sensitive voice sensors.Smart board uses embedded technology.Algorithms are used to transmit its data to the ECR and to the CECC.Other smart security tools such as smart metal detectors,the smart walk through gats,smart alarm system and also security cameras are used.In case of any exceptions,it automatically notifies the concern admins.Smart sensor board uses Algorithm 1 to initialize the SSF.Tab.2 shows the threshold values used in the experimental setup.

    3.1.1 Temperature sensor

    The temperature fluctuates during flames,firing or explosion.This fluctuation is used to categorize the alert and to determine the reason.ECR is alerted if the temperature rises from the initial threshold value.An emergency alert is sent to the CECC if the temperature rises from the second threshold value.The temperature reading is continuously displayed on the ECR display board.

    Table 2: Threshold values used in article

    3.1.2 Vibration/wind sensor

    Firing or explosion produces a strong wave force.Vibration sensors in smart board detect any type of vibration in the walls.The “x” and “y” vibration can easily be detected and categorized that what object has hit the wall.This vibration helps the CECC team to categorize the type of alert.If vibration increases from the first threshold,an alert is sent to ECR and if passes by the second threshold value,CECC is notified.

    3.1.3 Light sensor

    Light fluctuates during flames,firing,and explosion.These fluctuations help to categorize the nature of the alert.

    3.1.4 Smoke sensor

    Smoke is the indication of flames or firing.In the case of fire,it timely informs the concern authorities.If the smoke crosses the initial threshold value,ECR is alerted,secondly,CECC is notified.Smoke reading is continuously displayed on the ECR display board.

    3.1.5 Sound sensor

    The intensity of sounds not only help to alert the smart security system in an emergency but also help the CECC officials to categorize the alert.It also helps during operations.voice recognition software may also be used to categorize firing,explosions and screaming.

    3.1.6 Air pressure sensor

    During the analysis of the nature of the alert,an air pressure sensor plays a good part.If the air pressure sensor is forcefully activated,it clearly shows that some explosion has taken place.Air pressure fluctuations also help to categorize the alert.

    3.1.7 Metal detector

    The smart metal detector and walk through gates are placed on the entrance.If metal is detected on someone entry,ECR is notified.This also helps to monitor the security guards too,because most of the security guards do not properly scan the people at the entrance.On such phenomenon,security guards may be directed to rescan the person.

    3.1.8 Panic button

    The panic button is installed on the smart watch.It is a traditional button instead of touch functionality.More than one person has the smart watch panic button so to press it instantly in case of any attack or danger.

    Type of alert may be classified by different sensors data such as the temperature,light intensity,wave shocks,value of smoke,and intensity of sound etc.

    3.2 Emergency control room

    Fog computing is the edge of IoT and cloud computing.Instead of sending all data to the cloud for processing,primarily,it is send to local devices for processing.The ECR uses the concept of fog computing.This saves the cost of sending all streaming to cloud servers.Although CECC may access the gateway any time to monitor the situations.All the sensors,metal detectors,security cameras,emergency alarm and the panic button is connected to ECR.All initial alerts is notified to ECR.

    For the proposed simulation,we are using the following threat categorization techniques to categorize the alert.Implementers' or organization may alter it according to the requirements and sensitivity of the security.

    Eq.(9)shows the situation when anyone sensor reading crosses the first threshold values.If temperature,smoke,vibration or noise little bit increases from the normal situation then ECR is notified.

    Eq.(10)shows the situation when almost all sensors reading crosses the first threshold values.If temperature,smoke,vibration or noise all reading increases from the normal situation then ECR and CECC is notified.

    Eq.(11)shows the situation when sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold value then ECR as well as CECC is notified.

    Eq.(12)shows the situation when almost all sensors reading crosses the second threshold values.If temperature,smoke,vibration or noise increases from the second threshold values then CECC is notified.

    Eq.(13)shows abnormal attacked position in the institutions.CECC is informed in such like situations.

    3.2.1 Smart watch

    A panic button is installed on the smart watch.It is a traditional button which can be pressed easily,instead of a touch sensor.It has all the smartphone sensors and Wi-Fi connection.When the panic button is pressed,all the smart watch sensors are activated and data is automatically streamed to the ECR and CECC.More than one person has the smart watch button due to security issues.

    3.2.2 Smart phone

    The ECR applications are also run on several smartphones to instantly generate an alert.Smartphones are popularly used devices today.In the proposed scenario they are connected with the ECR.All sensors can be accessed on a smartphone.In case of an emergency,its application opens automatically to categorize the threat.If the user fails to respond,the system automatically categorizes the threat.

    3.2.3 Laptop

    The smart home gateway is used to integrate all the smart devices.This gateway is connected to the laptop to monitor the system.LCD monitor may also be used to monitor the system.The laptop is used tomake changes in connections,functions or algorithms.3.2.4 Security cameras

    Smart security cameras are the most important part of the security systems.The modern Digital Video Recorder(DVR)has advance types of software which help in threat detection.Smart cameras are used to record the videos,detect any motions,detect faces and also for voice alerts.In educational institutions,because there are too many students,so we are not going to use its voice and face recognition functionality for threat detection.In case of any alert,cameras streaming is directed to the CECC.In normal situations,video streaming is not forwarded to the CECC to save the cost and traffic load.Security cameras existing functionality may be used to get alert at ECR.

    3.2.5 Emergency gate

    Every organization has emergency doors and gates for emergency exit.In an emergency,it is not possible to manually open these doors for the exit.We have proposed to attach these doors and gates with SSF.In SSF,as the alert is notified,all the connected emergency doors get open automatically.

    3.3 Cloud server

    The IoT and cloud,both services work together.IoT has billion of devices and produces massive data.Cloud computing provides the infrastructure to process and store this large amount of data.In an emergency call,the cloud server starts to receive live streaming from different sensors.With the help of different algorithms,the nature of the attack is categorized.Notifications are sent to concern departments.Incoming streaming is directed toward CECC.

    3.4 Central emergency control center

    CECC is a building or room where all emergency alerts are received from the region.Every district has its own CECC.CECC guarantees a 24/7 service through a complex communications' system.It also uses the emergency numbers to receive emergency phone calls.CECC permits the police,the armed forces,civil protection department and the rescue department to take urgent action.Initially,CECC is monitored by an operator.In case of an emergency,stockholders officer take the control of CECC.CECC has the representatives of police,the ambulance services,the fire brigade,and rescue services.Live streaming of all the sensors are shown in CECC.All concern stack holders monitor the issue.They manage the response to the alert.Hospitals are updated according to the situations.

    Figure 3:Conditional data flow of smart security system

    4 Proposed algorithms

    The proposed system notifies the concerns in case of an emergency.Fig.3 shows the conditional flow of the proposed framework.In the normal situation,data is only streamed to the ECR situated within the organization to save the network cost.Although,CECC may get the live streaming of sensors any time.In case of an alert detection,all sensors data is directed to the CECC.Fig.3 shows the conditional data flow of Smart Security Framework

    An Algorithm 1 is embedded in smart-board and ECR.It reads temperature,pressure,smoke,motion and sounds etc.If the values increase from the threshold values,emergency notification is sent to the ECR and CECC and the smart emergency alarm starts ringing.

    Algorithm 2 works in Emergency Control Room and in home-gateway.As emergency accrues,alert categorization application automatically opens on smartphones and ECR alarm starts ringing to categorize the alert.If the user fails to respond to the application,It automatically sends the alert to CECC.

    Algorithm 3 is used in CECC.As the alert is received,CECC starts to get data from all the sensors placed in different locations.According to the data,the nature of alert is categorized.Notification and live streaming are issued to the concern departments.

    5 Experimental setup and evaluation

    This section first describes the experimental setup and then presents the performance evaluation of the proposed framework.We used Cisco Packet Tracer 7 and Java,which is popularly used simulation tool for IoT network simulation.Cisco Packet Tracer 7 is specially designed to simulate IoT applications.This package includes different IoT devices,sensors,gateways and IoT servers for simulation.

    5.1 Experimental setup

    In the laboratory setup,we distributed the work into three layers.In the first layer,all sensors read the environment.On the second layer,fog computing technologies are utilized to analyze these data and send an alarm to the ECR&CECC.On the third layer,all the concern departments and CECC works.All the sensors are remotely monitored and controlled and smart decisions are made.Fig.4 shows the simulation structure of Smart Security Framework.

    Figure 4:Simulation structure of smart security framework

    5.1.1 Sensor board

    Several types of sensors are connected to Microprocessor Control Unit(MCU).MCU is a small circuit board,which have links to install sensors on it.Using IoT cable,we connected temperature,motion,smoke,sound sensors and also the panic button to it.We programmed the MCU using java language to read data from all the connected sensors and transmit it to the ECR.To make the sensor board remote connection with the home gateway,IP address is assigned to the home gateway and set the MCU default gateway as the home gateway.We programmed the MCU to transmit its reading toward the home gateway.

    5.1.2 Emergency control room

    After making all connections,we connected the MCU board with home gateway.The home gateway is a wireless switch device,which can connect numbers of devices.It uses the fog computing concepts to process initial data on edge before sending it to the cloud.Digital Video Recorder(DVR),which has connections to numbers of cameras,are also connected to the home gateway.Home gateway has a wireless card to easily connect wireless devices to it.Laptop,smartphone,and smart watch are connected to the home gateway to get notifications from all sensor devices during on warning.Sirens installed in different locations of the institution are also connected to the home gateway.This emergency alarm ring during any alert.MCU circuit boards are used to connect emergency doors to the home gateway.In case of an emergency,all emergency doors open automatically.The laptop is used to get access to the home gateway and to implement programs on different sensor devices.It also facilitates to impose different types of conditions on the sensors and other connected IoT devices.To monitor SSF,we first converted the home gateway as IoT server.To implement the program,we opened the IoT monitor application,registered gateway as IoT server.The same application helps to program and executes the devices remotely.We wrote proposed algorithms here to get detail monitoring data from different sensors and to analyze that data.ECR and CECC are notified as any threat is detected.For example,when the panic button is pressed it instantly play the emergency alarm at ECR and CECC.

    5.1.3 Central emergency control center

    We used switches to create different departments.CECC is the central place where all the security devices are monitored.When a warning is identified,its emergency alarm starts ringing.The concern location is monitored online to get detail information about any warning.CECC has the authorization to access the local gateway.Alarm and the display screens are connected with the MCU board.Laptop and smartphone are also connected to the internal switch.MCU is programmed to receive notification from all over security devices.When an alert is received,the alarm system starts ringing.

    5.2 Evaluation of proposed system

    The proposed system is tested for different types of Alerts.We examined its functionality and performance.Average results of different tests are shown in below tables.Fig.5 shows the snapshot of CISCO Packet Tracer results.

    Figure 5:Running time of IoT devices

    Tab.3 describes the test of a motion sensor.To check the operation of a motion sensor,we switched the Packet Tracer to simulation mode and brought the Alt+Mouse closer to it which is the default trigger of the motion sensor.As we brought it closer,the emergency alarm system of ECR started ringing.Same movement option is displayed on CECC.Packet Tracer result shows that the response time of the motion sensor is 0.01 seconds while the transfer time to the emergency alarm is 1.557 seconds.

    Table 3: Motion sensor test

    Tab.4 explains the working of a metal detector.To evaluate the performance of the metal detector,we run the Packet Tracer in simulation mode and brought the metal closer to the metal detector which is its default trigger.As we brought it closer,the emergency alarm system of ECR started ringing.Packet Tracer results show that the response time of the metal sensor is 0.01 seconds.Transfer time of metal sensor signal to CECC is 2.19 seconds.

    Table 4: Metal sensor

    Tab.5 displays the functioning of a temperature sensor.Temperature sensor reads the temperature of the current environment and detail is sent to the ECR.A check has been placed on temperature to ring the alarm if the temperature passes by 50C.Temperature sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of metal sensor signal to CECC is 1.226 seconds.

    Table 5: Temperature reader

    Tab.6 shows the working of a smoke sensor.The smoke sensor detects the smoke of current environment and detail is shown on ECR display.A check has been placed on smoke to ring the alarm if the smoke crosses 50 pp.The smoke sensor was efficiently displaying results on ECR.Packet Tracer result shows that the transfer time of the metal sensor signal to CECC is 1.524 seconds.

    Table 6: Smoke sensor

    Tab.7 demonstrates the working of the panic button.To check the panic button,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the emergency alarm of ECR and CECC started ringing.Packet Tracer result shows that the response time of the panic button is 0.01 seconds and the transfer time of the emergency signal to CECC is 1.674 seconds.

    Table 7: Panic button

    Tab.8 shows the operations of security cameras.Security cameras video is displayed 24/7 at ECR.The video is streamed to CECC only in emergency detection.However,CECC may watch this online streaming at any time.To assess the working of security cameras,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the security cameras video is directed toward the server.Packet Tracer result shows that the response time of security camera is 0.01 seconds and the transfer time of the emergency signal to CECC is 0.111 seconds.

    Table 8: Security cameras

    Tab.9 represents the working of emergency gates.We have connected one door to the Smart Security Framework to check it is working.Emergency gates are open only on an emergency call.To check the working of the emergency gate,we run the Packet Tracer in simulation mode and pressed the panic button.As we pressed the button,the gates open automatically.Packet Tracer result shows that the response time of gate is 0.01 seconds.

    Table 9: Emergency doors

    Tab.10 shows the different protocols used by different devices during transmission.We used the ping command to note the protocol used and time taken in the transfer.Fig.5(d)shows that when the IoT protocols and micro-controller are used the transfer time increases.

    Table 10: Protocol used in simulation

    Fig.9 shows the results of Packet Tracer.We checked it only for the ping command to note down the total time taken in request transfer.Tab.10 shows the protocol used in communication.The result shows that transfer time increases where MCU is used.It also uses the IoT protocol to communicate.In the proposed simulation,we are keeping the wire length constant.The result shows that the transfer time also increases if we increase intermediate communication nodes.

    Figure 6:Packet Tracer simulation results

    The above result and discussion shows that SSF is very good initiative towards instant notification about security issues.Security departments will be able to instantly move toward the threat direction.With this setup,control centers official will be able to properly guide the operation to minimize the losses.

    6 Conclusion and future work

    In this article,Smart Security Framework(SSF)has been introduced for educational institutions.The recent past massacres have taken many precious lives.This might be depreciated by adopting an efficient and smart alerting system.SSF is efficient and intelligent in alerting concerns in case of an emergency.Different types of sensors are placed in different locations of the building,reading environment 24/7.In case of any warning detection,an alert is sent to the Emergency Control Room(ECR)and also to Central Emergency Control Center(CECC).Smart emergency doors are connected with the proposed system which automatically opens in case of any alert detection.SSS is not confined only to the educational institutions,it may also be used in any other organizations for security objects.Our future plane is to extend this framework for the Smart Security Framework for the City(SSSC).In the SSSC,sensors will be placed in streets,public places and especially religion places to notify the concern on time.

    亚洲aⅴ乱码一区二区在线播放| 久久精品国产亚洲av天美| 十八禁国产超污无遮挡网站| 精品国产一区二区三区久久久樱花 | 日本黄大片高清| 亚洲欧美精品专区久久| 欧美性猛交黑人性爽| 日本欧美国产在线视频| 国产亚洲av片在线观看秒播厂 | 亚洲va在线va天堂va国产| 97热精品久久久久久| 丰满少妇做爰视频| 国产黄色小视频在线观看| 欧美性猛交╳xxx乱大交人| 国产黄片视频在线免费观看| 18禁在线播放成人免费| 激情 狠狠 欧美| 国产精品女同一区二区软件| 一个人观看的视频www高清免费观看| 亚洲精品国产av成人精品| 久久久色成人| 国产亚洲一区二区精品| 晚上一个人看的免费电影| 中文在线观看免费www的网站| 精品久久久久久久人妻蜜臀av| 国产精品一区二区三区四区免费观看| 欧美日韩一区二区视频在线观看视频在线 | 菩萨蛮人人尽说江南好唐韦庄 | 麻豆精品久久久久久蜜桃| 99久国产av精品| 精品久久久噜噜| 亚洲,欧美,日韩| 成人亚洲欧美一区二区av| 日韩欧美精品v在线| 亚洲精品色激情综合| 91精品一卡2卡3卡4卡| 国产成人a区在线观看| 中文资源天堂在线| 欧美不卡视频在线免费观看| 欧美区成人在线视频| 久久精品91蜜桃| 99视频精品全部免费 在线| 寂寞人妻少妇视频99o| 天天躁夜夜躁狠狠久久av| 国产av在哪里看| 精品一区二区免费观看| 男女国产视频网站| 亚洲av熟女| 亚洲国产色片| 如何舔出高潮| 99久久精品一区二区三区| 日韩国内少妇激情av| 欧美日韩综合久久久久久| 精品人妻偷拍中文字幕| 国产真实伦视频高清在线观看| 亚州av有码| or卡值多少钱| 精品久久久久久久末码| 久久久色成人| 欧美xxxx黑人xx丫x性爽| 国产伦理片在线播放av一区| 国产不卡一卡二| 黄片wwwwww| 久久久久久大精品| 男人的好看免费观看在线视频| 三级毛片av免费| 亚洲精品一区蜜桃| 久久久欧美国产精品| 网址你懂的国产日韩在线| 国产女主播在线喷水免费视频网站 | 国产伦精品一区二区三区四那| 国产精品.久久久| 精品一区二区三区人妻视频| 国产一区二区亚洲精品在线观看| 国产精品美女特级片免费视频播放器| 欧美潮喷喷水| 午夜福利在线在线| 69av精品久久久久久| 国产久久久一区二区三区| 国产精品一区二区在线观看99 | 国产亚洲午夜精品一区二区久久 | 午夜精品在线福利| 在线播放无遮挡| 国产三级在线视频| 国产黄色小视频在线观看| 亚洲av不卡在线观看| 岛国毛片在线播放| 97超视频在线观看视频| 一级黄片播放器| 亚洲无线观看免费| 五月伊人婷婷丁香| 国产精华一区二区三区| 91精品一卡2卡3卡4卡| 黄片无遮挡物在线观看| 久久6这里有精品| 国产精品久久电影中文字幕| 国内精品美女久久久久久| 麻豆国产97在线/欧美| 国产成人aa在线观看| 国产在线男女| 久久精品国产自在天天线| 六月丁香七月| 久久这里有精品视频免费| 2022亚洲国产成人精品| 亚洲精品影视一区二区三区av| 亚洲天堂国产精品一区在线| 久久欧美精品欧美久久欧美| 六月丁香七月| 精品久久久久久久人妻蜜臀av| 国产亚洲5aaaaa淫片| 欧美一区二区亚洲| 精品99又大又爽又粗少妇毛片| 免费av不卡在线播放| 色吧在线观看| 亚洲国产精品成人久久小说| 一个人看视频在线观看www免费| 91av网一区二区| 男女视频在线观看网站免费| 国产精品麻豆人妻色哟哟久久 | 国产精品日韩av在线免费观看| 日韩一区二区三区影片| 天天一区二区日本电影三级| 国产精品一及| 国产视频内射| 亚洲色图av天堂| 免费电影在线观看免费观看| 一级黄片播放器| 国产成人freesex在线| 热99在线观看视频| av女优亚洲男人天堂| 久久久欧美国产精品| 国产 一区精品| 亚洲aⅴ乱码一区二区在线播放| 中文在线观看免费www的网站| 午夜福利网站1000一区二区三区| 日本av手机在线免费观看| 直男gayav资源| 永久网站在线| 国产黄片视频在线免费观看| 99久久成人亚洲精品观看| 国产午夜精品论理片| 看十八女毛片水多多多| 三级男女做爰猛烈吃奶摸视频| 日韩av不卡免费在线播放| av免费观看日本| 高清av免费在线| 亚洲国产精品成人久久小说| 亚洲在线自拍视频| 欧美日韩综合久久久久久| 七月丁香在线播放| 我要搜黄色片| 久久久国产成人精品二区| 亚洲精华国产精华液的使用体验| 国产爱豆传媒在线观看| 国产成人福利小说| 国产亚洲精品久久久com| 级片在线观看| 欧美激情久久久久久爽电影| av国产免费在线观看| 青青草视频在线视频观看| 99久久精品国产国产毛片| 中文字幕人妻熟人妻熟丝袜美| 白带黄色成豆腐渣| 精品久久久久久久久亚洲| or卡值多少钱| 成人鲁丝片一二三区免费| kizo精华| 亚洲精品自拍成人| 国产成人精品婷婷| 老司机影院成人| 亚洲人成网站高清观看| 最近中文字幕2019免费版| 中文欧美无线码| 久久精品综合一区二区三区| 好男人在线观看高清免费视频| 国产探花在线观看一区二区| av.在线天堂| 亚洲18禁久久av| 免费观看的影片在线观看| videos熟女内射| 国语自产精品视频在线第100页| 亚洲精品亚洲一区二区| 国产精品三级大全| 国产麻豆成人av免费视频| 欧美97在线视频| 国产黄片美女视频| av免费观看日本| 国产精品精品国产色婷婷| 一区二区三区免费毛片| 人妻制服诱惑在线中文字幕| 在线天堂最新版资源| 亚洲一级一片aⅴ在线观看| 午夜老司机福利剧场| 国产精品永久免费网站| 色综合色国产| www日本黄色视频网| 一级二级三级毛片免费看| 人妻系列 视频| 日韩在线高清观看一区二区三区| 午夜福利在线在线| 综合色av麻豆| 国产成人aa在线观看| 91精品一卡2卡3卡4卡| 99久久精品热视频| 久久精品国产99精品国产亚洲性色| 中文亚洲av片在线观看爽| 亚洲最大成人av| 别揉我奶头 嗯啊视频| 成人毛片a级毛片在线播放| av在线播放精品| 国产淫语在线视频| 色吧在线观看| 99热这里只有精品一区| 国产三级在线视频| 精品欧美国产一区二区三| 精品少妇黑人巨大在线播放 | 久久久久网色| 少妇熟女aⅴ在线视频| 长腿黑丝高跟| 天堂影院成人在线观看| 欧美又色又爽又黄视频| 麻豆成人午夜福利视频| 在线天堂最新版资源| 亚洲av一区综合| 日韩视频在线欧美| 国产私拍福利视频在线观看| 老司机福利观看| 寂寞人妻少妇视频99o| av在线播放精品| 成人欧美大片| 国产欧美另类精品又又久久亚洲欧美| 精品久久久久久成人av| 亚洲国产精品sss在线观看| 国产精品熟女久久久久浪| 精品少妇黑人巨大在线播放 | 特级一级黄色大片| 色哟哟·www| 亚洲精品一区蜜桃| 亚洲国产精品sss在线观看| 好男人在线观看高清免费视频| www.av在线官网国产| 国产黄a三级三级三级人| av线在线观看网站| 村上凉子中文字幕在线| 六月丁香七月| 国产毛片a区久久久久| 国产欧美另类精品又又久久亚洲欧美| 2021少妇久久久久久久久久久| 成年av动漫网址| 国产精品乱码一区二三区的特点| 亚洲欧美成人综合另类久久久 | 男人舔女人下体高潮全视频| 麻豆av噜噜一区二区三区| 欧美三级亚洲精品| 国产黄片视频在线免费观看| 中国美白少妇内射xxxbb| 亚洲18禁久久av| 国产精品久久电影中文字幕| av免费观看日本| 水蜜桃什么品种好| 两个人的视频大全免费| 国产成人a∨麻豆精品| 亚洲国产日韩欧美精品在线观看| 精品久久久久久久久av| 国产成人a区在线观看| 午夜a级毛片| 精品无人区乱码1区二区| 你懂的网址亚洲精品在线观看 | 麻豆久久精品国产亚洲av| 69av精品久久久久久| 97超碰精品成人国产| 国产精品一区二区三区四区久久| 高清在线视频一区二区三区 | 亚洲欧美一区二区三区国产| 国产女主播在线喷水免费视频网站 | 亚洲欧美清纯卡通| 亚洲成人av在线免费| 美女xxoo啪啪120秒动态图| 啦啦啦韩国在线观看视频| 免费av毛片视频| 蜜桃亚洲精品一区二区三区| 国产午夜精品久久久久久一区二区三区| 麻豆成人午夜福利视频| 三级国产精品欧美在线观看| 一区二区三区免费毛片| 国产精品.久久久| 我要搜黄色片| 伦精品一区二区三区| 久久精品综合一区二区三区| 国产欧美日韩精品一区二区| 亚洲国产欧美在线一区| 国产精品麻豆人妻色哟哟久久 | 97热精品久久久久久| 成人高潮视频无遮挡免费网站| 久久久精品94久久精品| 美女被艹到高潮喷水动态| 国产精品久久久久久精品电影| 婷婷色av中文字幕| 村上凉子中文字幕在线| 国产69精品久久久久777片| 天天躁夜夜躁狠狠久久av| 禁无遮挡网站| 全区人妻精品视频| 最近手机中文字幕大全| 在线天堂最新版资源| 六月丁香七月| av福利片在线观看| 丝袜美腿在线中文| 欧美激情国产日韩精品一区| 少妇裸体淫交视频免费看高清| 免费一级毛片在线播放高清视频| 亚洲av福利一区| 国产在视频线在精品| 3wmmmm亚洲av在线观看| 晚上一个人看的免费电影| 人人妻人人澡欧美一区二区| 熟女人妻精品中文字幕| 久久久久久九九精品二区国产| 男插女下体视频免费在线播放| 女人久久www免费人成看片 | 午夜福利高清视频| 99久久精品国产国产毛片| 伦精品一区二区三区| av免费在线看不卡| 狂野欧美白嫩少妇大欣赏| 亚洲欧美日韩东京热| 高清日韩中文字幕在线| 日韩 亚洲 欧美在线| 国内精品一区二区在线观看| 在线免费观看的www视频| 99热6这里只有精品| 精品不卡国产一区二区三区| 精品久久久久久久久av| 桃色一区二区三区在线观看| www.av在线官网国产| 男女国产视频网站| 久久精品国产亚洲av天美| 我的老师免费观看完整版| 成年女人永久免费观看视频| 国产精品久久久久久精品电影小说 | 国模一区二区三区四区视频| 久久久a久久爽久久v久久| 九九在线视频观看精品| 国产乱人视频| 国产成人a∨麻豆精品| 亚洲av中文字字幕乱码综合| 婷婷色综合大香蕉| 禁无遮挡网站| 麻豆成人av视频| 美女黄网站色视频| 日本黄色片子视频| 夜夜看夜夜爽夜夜摸| 免费看美女性在线毛片视频| 观看免费一级毛片| 国产精品无大码| 在线免费十八禁| 国产白丝娇喘喷水9色精品| 91久久精品国产一区二区三区| 欧美成人午夜免费资源| 久久欧美精品欧美久久欧美| 国产在视频线精品| 日韩国内少妇激情av| 亚洲精品色激情综合| 免费在线观看成人毛片| 三级男女做爰猛烈吃奶摸视频| 国国产精品蜜臀av免费| 国产精华一区二区三区| 伦精品一区二区三区| 热99在线观看视频| 2021少妇久久久久久久久久久| av专区在线播放| 2021天堂中文幕一二区在线观| 亚洲精品影视一区二区三区av| 免费av观看视频| 国产成人免费观看mmmm| 超碰97精品在线观看| 亚洲欧美精品自产自拍| 69人妻影院| 国产淫语在线视频| 久久婷婷人人爽人人干人人爱| 99热6这里只有精品| 亚洲电影在线观看av| 岛国在线免费视频观看| 99热精品在线国产| 婷婷六月久久综合丁香| 久久精品夜色国产| 久久精品91蜜桃| 日日摸夜夜添夜夜爱| 国产午夜精品一二区理论片| 亚洲av男天堂| 麻豆av噜噜一区二区三区| 国产免费一级a男人的天堂| 91久久精品国产一区二区成人| 日韩成人伦理影院| 国产成人精品婷婷| av线在线观看网站| 亚洲欧美日韩无卡精品| 能在线免费观看的黄片| 夜夜看夜夜爽夜夜摸| 欧美成人a在线观看| av福利片在线观看| 在现免费观看毛片| 日韩一本色道免费dvd| 99热6这里只有精品| 欧美日本亚洲视频在线播放| 久久久久久久国产电影| www.色视频.com| videos熟女内射| 五月玫瑰六月丁香| 18+在线观看网站| 免费大片18禁| 亚洲av二区三区四区| 一区二区三区乱码不卡18| 熟女电影av网| 亚洲成人久久爱视频| 国产亚洲5aaaaa淫片| 又爽又黄无遮挡网站| 黄片wwwwww| 亚洲精品一区蜜桃| 天堂√8在线中文| 成人午夜精彩视频在线观看| 午夜亚洲福利在线播放| 国产白丝娇喘喷水9色精品| 一级毛片我不卡| 午夜福利在线观看免费完整高清在| 国产片特级美女逼逼视频| 久久热精品热| 日本黄色片子视频| 国产伦精品一区二区三区视频9| 色尼玛亚洲综合影院| 色吧在线观看| 国产在线男女| av视频在线观看入口| 小说图片视频综合网站| 在现免费观看毛片| 亚洲真实伦在线观看| 特大巨黑吊av在线直播| 九九久久精品国产亚洲av麻豆| 男女那种视频在线观看| or卡值多少钱| 99久久九九国产精品国产免费| 国语对白做爰xxxⅹ性视频网站| 我的老师免费观看完整版| 午夜激情福利司机影院| 97人妻精品一区二区三区麻豆| 久久久久性生活片| 亚洲精品aⅴ在线观看| 日本与韩国留学比较| 麻豆国产97在线/欧美| 欧美极品一区二区三区四区| 日本与韩国留学比较| 亚洲欧美一区二区三区国产| 又爽又黄a免费视频| 免费观看在线日韩| 久久6这里有精品| 18+在线观看网站| 久久精品影院6| 国产乱人偷精品视频| 欧美bdsm另类| 国产精品久久久久久久久免| 久久99精品国语久久久| 最近2019中文字幕mv第一页| 免费观看在线日韩| 18禁裸乳无遮挡免费网站照片| 亚洲色图av天堂| 日本一本二区三区精品| АⅤ资源中文在线天堂| 亚洲在久久综合| 日韩av在线大香蕉| 看十八女毛片水多多多| 精品一区二区三区视频在线| 深夜a级毛片| 国产在视频线在精品| 国产一区二区在线av高清观看| 特级一级黄色大片| 亚洲精品国产av成人精品| 中文字幕av成人在线电影| 99久国产av精品| 在线免费观看的www视频| 人人妻人人看人人澡| 一二三四中文在线观看免费高清| 精品一区二区三区人妻视频| 女人被狂操c到高潮| 久久久成人免费电影| 美女被艹到高潮喷水动态| 国国产精品蜜臀av免费| 国产激情偷乱视频一区二区| 成人国产麻豆网| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 免费观看人在逋| 亚洲国产精品国产精品| 亚洲欧美日韩无卡精品| a级毛色黄片| 久久99精品国语久久久| 国产乱来视频区| 日韩精品青青久久久久久| 午夜激情欧美在线| 男人舔奶头视频| 国产精品美女特级片免费视频播放器| 国内少妇人妻偷人精品xxx网站| 国产精品久久久久久精品电影小说 | 成年女人看的毛片在线观看| 日本一二三区视频观看| 夜夜看夜夜爽夜夜摸| 久久国内精品自在自线图片| 久久精品久久久久久噜噜老黄 | 日本午夜av视频| 国产精品伦人一区二区| 久久精品国产自在天天线| 在线免费观看不下载黄p国产| 久久久a久久爽久久v久久| 九九久久精品国产亚洲av麻豆| 成年av动漫网址| 亚洲av中文av极速乱| 成人性生交大片免费视频hd| 国产女主播在线喷水免费视频网站 | 最新中文字幕久久久久| 蜜桃久久精品国产亚洲av| 精品久久久久久电影网 | www.色视频.com| 十八禁国产超污无遮挡网站| 亚洲18禁久久av| 看片在线看免费视频| 91久久精品国产一区二区三区| 久久亚洲国产成人精品v| 欧美性感艳星| 国产伦一二天堂av在线观看| 久久精品久久精品一区二区三区| 九草在线视频观看| 18禁在线无遮挡免费观看视频| 国产av码专区亚洲av| 日本欧美国产在线视频| 成人毛片a级毛片在线播放| 国产成人aa在线观看| 日产精品乱码卡一卡2卡三| 一级av片app| www日本黄色视频网| 日本三级黄在线观看| 亚洲精品乱久久久久久| 大又大粗又爽又黄少妇毛片口| 97在线视频观看| 中国美白少妇内射xxxbb| 视频中文字幕在线观看| 久久精品国产亚洲av涩爱| 99九九线精品视频在线观看视频| 天天一区二区日本电影三级| 国产免费视频播放在线视频 | 久久99精品国语久久久| 婷婷色av中文字幕| 中文精品一卡2卡3卡4更新| 国产伦一二天堂av在线观看| 一本一本综合久久| 看非洲黑人一级黄片| av专区在线播放| 亚洲高清免费不卡视频| 午夜福利在线在线| 日本一本二区三区精品| 国产黄片视频在线免费观看| 久久久久久九九精品二区国产| 亚洲精品乱码久久久v下载方式| 色综合站精品国产| 九九在线视频观看精品| 一级av片app| 变态另类丝袜制服| 亚洲色图av天堂| 久久人人爽人人片av| 日韩大片免费观看网站 | 91久久精品国产一区二区三区| 亚洲成人av在线免费| 久久精品久久久久久久性| 爱豆传媒免费全集在线观看| 久久久久国产网址| 三级毛片av免费| 国产精品一及| 亚洲最大成人中文| 亚洲欧美一区二区三区国产| 国产成人免费观看mmmm| 免费看光身美女| 午夜爱爱视频在线播放| 亚洲国产精品专区欧美| 国产免费男女视频| 国产精品一区www在线观看| 久久久成人免费电影| 欧美日本视频| 丝袜美腿在线中文| 夜夜看夜夜爽夜夜摸| 亚洲国产精品成人久久小说| 国产午夜精品久久久久久一区二区三区| 国产精品永久免费网站| 免费观看人在逋| 国产精品综合久久久久久久免费| 久久久久久久久久久丰满| 超碰av人人做人人爽久久| 一区二区三区高清视频在线| 国产精品久久电影中文字幕| 亚洲av电影在线观看一区二区三区 | 亚洲在线自拍视频| 久久韩国三级中文字幕| 日产精品乱码卡一卡2卡三| 国产免费又黄又爽又色| 美女内射精品一级片tv| 国产真实伦视频高清在线观看| 秋霞伦理黄片| 午夜免费激情av| 在线观看一区二区三区| 久久亚洲国产成人精品v| 久久久久网色| 亚洲国产精品专区欧美| 日韩,欧美,国产一区二区三区 | 日韩欧美精品v在线| 国产亚洲av片在线观看秒播厂 | 99久久中文字幕三级久久日本| 美女被艹到高潮喷水动态| 超碰av人人做人人爽久久| 在线a可以看的网站|