• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Dynamic Bayesian-Based Comprehensive Trust Evaluation Model for Dispersed Computing Environment

    2023-03-12 12:02:18HongwenHuiZhengxiaGongJianweiAnJianzhongQi
    China Communications 2023年2期

    Hongwen Hui,Zhengxia Gong,Jianwei An,*,Jianzhong Qi

    1 School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China

    2 Shunde Graduate School of University of Science and Technology Beijing,Guangdong 528399,China

    3 China Academy of Information and Communications Technology(CAICT),Beijing 100191,China

    4 Department of Information Engineering,North China University of Technology,Beijing 100144,China

    Abstract: Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its development.The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks.In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment.Specifically,in the calculation of direct trust,a logarithmic decay function and a sliding window are introduced to improve the timeliness.In the calculation of indirect trust,a random screening method based on sine function is designed,which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks.Finally,the comprehensive trust value is dynamically updated based on historical interactions,current interactions and momentary changes.Simulation experiments are introduced to verify the performance of the model.Compared with existing model,the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost.

    Keywordst: dispersed computing; trust evaluation model; malicious node; interaction success rate; detection rate

    I.INTRODUCTION

    1.1 Motivation

    Dispersed computing connects all networked computation points(NCPs)to provide services for users in a way of collaboration and sharing between nodes[1,2].Compared with fog computing[3],mobile edge computing[4],the dispersed computing makes use of idle resources in the network to realize the new vision of joint computing.The dispersed computing breaks through the traditional fixed Client-Server (C/S) architecture.When computing tasks appear,the task nodes and the NCPs that complete the task establish a provisional cooperative relationship [5—7].However,due to the high openness of dispersed computing,it brings two important challenges to the development of dispersed computing: there is no trust foundation between nodes,which reduces the enthusiasm of nodes to participate in collaborative computing; malicious nodes infiltrate task assignments for the purpose of obtaining resources and data,which will lead to the risk of user data leakage.Therefore,in the face of this new computing paradigm,users still remain skeptical and cautious.They are worried that they will be attacked by malicious nodes and cause privacy data leakage.

    In order to solve these two challenges,it is first necessary to establish a trust foundation in dispersed computing environment to provide a basis for cooperation between nodes and help identify interacting objects.At the same time,it protects user data security through a trust mechanism,ensures resource sharing among friendly nodes,and effectively prevents malicious attacks and misconduct.The development of trust evaluation technology provides the necessary guarantee for users to complete information interaction and data transmission in untrusted networks.The issue of trust management has become a unique and important part of network service security[8,9].This paper aims to establish a new trust evaluation model in the highly dynamic and heterogeneous dispersed computing environment.This model can provide a reliable basis for task nodes to choose to cooperate with unfamiliar NCPs in dispersed computing environment,and can efficiently and accurately identify malicious nodes.In addition,the proposed model is designed to ensure the stability of network services in the event of human error and management vulnerabilities,as well as cyber attacks and sabotage.

    1.2 Related Works

    Trust is the evaluation node’s expectation of the service capability or cooperation probability of the target node,and the quantitative expression of the evaluation node’s prediction of the target node’s cooperation probability is the trust value[10,11].Comprehensive trust computations mainly includes: direct trust and indirect trust(recommendations based trust)[12].The comprehensive trust calculation process is to integrate the effective information of multiple evaluation indicators to make a more objective evaluation of the target node.The main methods of trust evaluation include:Bayesian inference model,weighted average model,fuzzy logic,information entropy model,game theory,cloud model,machine learning model[13].Trust evaluation techniques are widely used in wireless sensor networks(WNSs),peer-to-peer(P2P)networks,Internet of Things Scenario,Social networks,which plays an important role in establishing trust relationships,detecting malicious nodes,and ensuring network security.

    Cheet al.[14] proposed a lightweight trust management method based on Bayesian and entropy for WNSs,calculated the direct trust value of the evaluated node through Bayesian inference,and then judge whether the direct trust can replace the global trust according to the confidence level of the direct trust.This method aims at reducing the weight of the algorithm and replaces the global trust value with the direct trust to a certain extent,which is very one-sided and subjective.Alqahtani et al.[15]proposed a trust management algorithm for P2P platforms,which divided into multiple levels of trustworthiness based on the quality of narrator and content.Gao et al.[16] modeled the trust relationship between users in networking social service as a two-dimensional vector,and proposed a semi-ring based trust propagation and fusion model as the building block of the trust inference framework.Yan et al.[17]proposed a novel blockchain-based decentralized system for trust evaluation in social networks,called Social-Chain.Considering that mobile devices usually lack computing resources to handle cryptographically difficult computations,the authors design a lightweight proof-of-trust-based consensus mechanism (Proof-of-Trust,PoT) instead of Proof of Work(PoW).This method provides a new exploration for trust evaluation in large-scale node networks.Alhussain et al.[18]proposed a data network-based intelligent trust management system that leverages the power of neural networks to provide recommendations on the trustworthiness of each peer,further detecting malicious collectives and their suspicious group members.The experimental results show that the identification accuracy of malicious nodes of the system is 62%-97%.Li et al.[19]proposed a multi-dimensional trust model for large-scale P2P computing,which incorporates multiple factors to reflect the complexity of trust.In order to avoid the subjectivity of multiple factor weights,the weights are dynamically assigned through a combination of weighted moving average and ordered weighted average algorithm.

    Trust assessment is a complex calculation,and the accuracy and objectivity of assessment require researchers to continuously explore and improve.Specific trust attributes,the selection of different attribute weights,and the definition of trust boundaries will all affect the results of trust assessment.Therefore,smarter schemes are needed to find these weighting factors and thresholds that define the confidence boundaries.Machine learning-based methods are an effective exploration.Some scholars have tried to design a new trust feature classification algorithm with machine learning method,classify the extracted trust features and combine them to generate the final trust value [20].Ma et al.[21] proposed a trust assessment method based on machine learning-enabled IoT devices,calculated node trust attributes digitally,and designed a new algorithm based on machine learning principles to classify the extracted trust features,and combine them to produce the final trust value,which is used in decision making.Machine learningbased trust assessment technology still needs to break through some important challenges,such as improving the accuracy of trust assessment,realizing fine-grained trust representation,feature extraction and automatic learning of algorithms,model scalability[22].

    Trust assessment has been widely used in different application scenarios,and its main security goals can be summarized in two aspects.One is to establish a trust foundation,and then establish a cooperative relationship between nodes.In various scenarios,cooperation and sharing between nodes are inseparable,including file sharing and storage,distributed computing,and collaborative applications.Trust assessment provides a basis for this.The second is to identify malicious nodes and predict malicious attack behaviors to provide important guarantees for maintaining network security.Although these works have achieved some good results for specific scenarios,but the malicious nodes detection rate and the interaction success rate need to be further improved.To the best of our knowledge,at present,there is currently no dynamic trust assessment model specifically used for dispersed environments,and our work aims to fill this gap.

    1.3 Main Contributions

    In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is developed for dispersed computing environment.In the calculation of direct trust,in view of the fact that the credibility of history records decays with time,a time sliding window is firstly designed to replace the long history records with new interaction records in turn.Further,a weight assign factor is constructed based on logarithmic function,which can dynamically assign different weights according to the interaction at different moments.This method can fully reflect the attenuation of interactive records over time,and improve the accuracy and timeliness of trust evaluation.In the calculation of indirect trust,a random screening mechanism is established to curb the collusion of multiple malicious nodes(mainly collusion with evaluation nodes to provide false reports).First of all,by deleting the maximum and minimum values in the recommended trust,the possibility of malicious nodes exaggerating or devaluing the trust value of the evaluation node is avoided.The recommended trust value is selected through a sine function interval.Due to the randomness of this method,the purpose of destroying the collusion of malicious nodes can be achieved.In the calculation of comprehensive trust,a dynamic update formula is proposed to improve the robustness of the evaluation method and tolerate the impact of unexpected failures on the results,which comprehensively considers current trust evaluation value,historical information and instantaneous change of trust value.Through dynamic updates,the impact of unexpected factors (such as network failures) on node trust evaluation can be reduced.Our main contributions are summarized as follows.

    1) We propose a dynamic Bayesian-based comprehensive trust evaluation model in dispersed computing,which mainly includes: design a weight assign factor and a time sliding window;design a random screening mechanism based on sine function;design a dynamic update formulation.

    2) We implement our model in NetLogo Platforms.The experimental results demonstrate the effectiveness and efficiency of our model.

    The remainder of this paper is organized as follows.In Section II,a comprehensive trust estimation model presented for dispersed computing is presented.In Section III,the experimental simulations are carried out.Finally,in Section IV,the conclusion is introduced.

    II.COMPREHENSIVE TRUST ESTIMATION MODEL

    In this section,we mainly consider how to build a trust evaluation model in the task allocation process of dispersed computing.All nodes in dispersed computing can be divided into two categories: task nodes that publish tasks and NCPs that have idle resources to provide computing services.The task node assigns all tasks to NCPs through the task matching algorithm of the middleware.In order to effectively identify the malicious attack behaviors of NCPs using trust relationships to obtain services or resources,task nodes need to complete a trust assessment for cooperative nodes(NCPs)each time a task is assigned.

    Figure 1.System model.

    Figure 2.Flow graph of trust derivation.

    In dispersed computing environment,task node is usually used as an evaluation node,and NCP that provide computing services is used as target node.The direct trust is the trust from task nodes to NCPs based on its previous cooperation experiences.Indirect trust is a combination of feedback and suggestions from other task nodes to the target NCP.The system model as shown in Figure 1.We aim to establish trust foundation and identify malicious nodes for dispersed computing environment through trust evaluation technology.

    A new dynamic comprehensive trust estimation model will be proposed between task nodes and NCPs Figure 2 depicts the flow graph of trust trust evaluation.In this paper,we letxiandyjbe two nodes whereDTxi,yj(t) isyj’s direct trust aboutxi,ITxi,yj(t) isyj’s indirect trust aboutxi,andCTxi,yj(t)yj’s comprehensive trust aboutxi.Next,we will specifically give this paper the calculation method of the trust evaluation model.

    2.1 Evaluation of Direct Trust

    Assuming that each interaction has two results,the interaction is successful or the interaction fails.We userandsrespectively represent the number of occurrences of positive events and negative events.Then the calculation method ofrandsis as follows

    whereTt0,t={ti|ti ∈[t0,t)}(tiis the moment when thei-th interaction is completed),and

    In particular,in order to avoid interaction failures due to communication failures or network instability,a network detection function is added.After a period of interaction is completed,it is necessary to detect the operation of the network.If the interaction fails due to network failure,the interaction will not be recorded.Since the beta distribution function can be interpret equivalently the direct trust [15],then the statistical expectation of the direct trust of the nodexito the nodeyjis as follows:

    The limitation of formula (3) is that it does not reflect the time decay of interactive recording[23].Because a record at any moment has the same weight,as time increases,the timeliness and accuracy of trust calculation will decrease.Therefore,we modify the formula(3).We first modify the time intervalTinto a sliding window

    whereαis a positive constant.That is,we only pay attention to the interaction records that are away fromαat the current moment,and gradually ignore the influence of long-term information (the smaller theα,the more focused on the information close tot).Further,we introduce a time degradation factor based on a logarithmic function as follows

    We get the updated direct trust value calculation formula

    whereis called punishment factor.Obviously,for every additional failed interaction record,there is an exponential decrease in direct trust.

    2.2 Evaluation of Indirect Trust

    In the calculation of indirect trust,we only select task nodes as recommendation nodes.Assuming that there arektask nodes denoted asST={x1,x2,···,xk},then the set of recommended nodes can be expressed asSre={xl|l=1,2,···,i ?1,i+1,···,k}.First,we calculate the direct trustDTl,j(t) of the recommended nodexl ∈Sretoyj.Then we need to determine the weightωlof each recommended node as follows

    The reliability of the recommended node plays an important role in the evaluation of indirect trust [24].If a recommending node maliciously raises or degrades the trust value of the target node for its own purposes,and sends a false report to the evaluation node,it will have a serious impact on the final trust evaluation of the target node [25].In particular,if multiple recommended nodes form an alliance and provide false reports with a common purpose,a collusion attack will be formed.This will affect the reliability of the overall trust evaluation mechanism,which in turn will affect the performance and security of distributed computing.In order to reduce the impact of the bad mouthing attack of a single node and the collusion attack of multiple nodes on the accuracy of trust evaluation,we must propose a method that can mitigate and prevent false reports.

    In this paper,we introduce a random deletion mechanism to mitigate recommended nodes with evaluation node collusion.We construct a sine function-based non-negative piecewise function as following

    where

    andβis a positive number.We arrangekrecommend trust valuesDTxl,yj(t)in order of magnitude

    whereν1,ν2,···,νk?1is a permutation of 1,2,···,i ?1,i+1,···,k.Letting the set

    whereη < k/2 is a positive integer number.Then we can getS={νi|f(vi)≥0,νi ∈S3}.We only select the elements in the setSas effective recommendation nodes,then the indirect trust of the evaluation device is calculated as follows

    The structure of the setSplays an important role in preventing bad mouthing attack and collusion attack:

    ? By removing the highest value and the lowest value(one or more,determined by the value ofη),the probability of a single node or multiple nodes providing false reports is reduced.False reports are often maliciously raising or degrading the true trust of the target node,and the setSis precisely to prevent false reports by removing suspiciously high or too low recommendation values.

    ? When selecting effective recommended values,a sine function based set is constructed to achieve the purpose of decentralized point selection and random point selection.This reduces the possibility of successful conspiracy by malicious nodes.

    2.3 Evaluation of Comprehensive Trust

    We need to determine the relative importance of the two parameters of direct trust and indirect trust to the comprehensive trust calculation,that is,determine their weight.In order to avoid the subjectivity of artificially setting weights,we adopt a method based on information entropy.Information entropy can reflect the degree of disorder of the information,so the weight can be modified according to the difference between direct and indirect trust to achieve adaptive weight distribution

    The entropy of direct trust (indirect trust) adopts the trust degreeDTxi,yj(t) (ITxi,yj(t)) and the corresponding suspicion 1?DTxi,yj(t)(1?ITxi,yj(t))of the target node measurement.The entropy of direct trust and indirect trust are calculated by the following formulas

    Then we can separately define the entropy based weights of direct trust and indirect trust as following

    Moreover,it follows from(6),(12),and(14),we have

    Due to the dynamics and instability of the decentralized computing environment,the trust evaluation of nodes has brought challenges.A stable trust evaluation mechanism should be able to cope with the impact of sudden changes in node behavior(some unexpected situations) on trust evaluation.In order to make the trust evaluation method more robust,we propose a dynamic update method for the formula(15)as follows

    whereγi ∈(0,1) andγ1+γ2+γ3=1.Note that the updated trust value contains three components of information.The first component reflects the role of current trust value.The second component (integral term)reflects the contribution of the target node’s trust value in the pastαtime.The third component(derivative) reflects the impact of the sudden changes in the trust value of nodes in a small neighborhood at timet.Different from the method in[26],we only take a time period close to timetin the integral term,instead of taking all the historical information.If the lower limit of the second integral term starts from the initial momentt0,the computational complexity will continue to increase over time.In fact,the farther away from the current moment,the lower the value of its information.Therefore,our method is more time-sensitive.

    Compared with formula (15),the dynamically updated trust value(16)has two advantages.

    ? The formula (16) comprehensively considered three factors: the current trust evaluation value,historical information and the instantaneous change of the trust value.At the same time,noting the decay of historical information value and the complexity of calculation,we only take the most recent valid time at the current moment.Compared with formula(15),the formula(16)reflects stronger timeliness.

    ? Formula (16) can not only avoid the impact of sudden events on the trust value,but also enhance the sensitivity to current events.

    III.EXPERIMENTAL SIMULATION

    Table 1.Simulation parameters.

    In this section,performance and security assessments of proposed model are validated on NetLogo.On the NetLogo platform,two types of nodes (task node as evaluation node and NCP as target node)are generated randomly in the area 500m×500m.All target nodes are assigned to evaluation nodes randomly.Each evaluation node stores the trust value of all target nodes that have interacted with itself.The simulation parameters are listed in Table 1.Two types of experiments are set up.First,the performance of proposed model is verified in terms of computational cost and malicious node detection rate.Then,the proposed model is compared with the existing works,dynamic trust evaluation model (DTEM) [27],decision tree algorithm(TEUC)[23],typical reputation-based framework for sensor networks(RFSN)[28].

    3.1 Performance of Proposed Model

    Figure 3.The detection rate of malicious nodes under different the effective time α.

    Before evaluating the performance of the model,it is necessary to discuss the influence of key parameter values on the performance of this model.There are two key parametersαandβin our model.Due to the symmetry of the sine function,the value ofβin the indirect calculation will not affect the selection of valid data,which can prevent malicious collusion and ensure that the final evaluation result tends to a stable value.The parameterαrepresents the effective time for recording the interaction.Whenαis larger,the required calculation cost is larger; when the value ofαis too small,it may lead to insufficient collection of effective information,resulting in inaccurate evaluation.We set up a comparative experiment,keeping other parameters unchanged,αincreases from 25 ms to 50 ms (5 ms each time) to observe the change of the detection rate of malicious nodes with respect to the effective timeα.Figure 3 depicts the change of the malicious node detection rate with respect to the effective timeα.Whenαis less than 40 ms,the detection accuracy increases significantly;whenαis greater than 40 ms,there is no significant change in the detection accuracy.That is to say,historical information 40 ms ago has little effect on the accuracy of our model evaluation.

    Then,the experiments are designed in terms of malicious node detection rate and computational cost to test the performance of our model.First,assuming that there are two trust evaluation models,one of them is the model proposed in this paper,and the other is the comparison model (Model-II).In contrast,in Model-II,there is no random screening mechanism.In its indirect trust value calculation,the indirect trust values of all recommended nodes are adopted with the same weight.In this experiment,5%,10%,15%,20%,25%,and 30% of malicious nodes are added respectively.The malicious node recognition rates of the two models are compared as shown in Figure 4.Obviously,the malicious node detection rate of proposed model is significantly higher than that of Model II.This is because,in the screening mechanism,high and low malicious recommendations are first excluded,which reduces the possibility of collusion between the target node and the evaluation node,and increases the accuracy of the trust evaluation.At the same time,valid recommended values is taken randomly according to a certain interval construction method,which further reduces the possibility of collusion.The conclusion shows that the proposed model has excellent performance in terms of recognition accuracy as well as blocking malicious node attacks.

    Figure 4.Comparison of the malicious node detection rate.

    Similarly,the effect of sliding window and temporal degradation factor on the computational cost of the model can be verified.This model is compare with the model not having time sliding window and time degradation factor(Model-III).The results are shown in Figure 5.In the initial stage of the experiment,the two models use the same length of interaction records,so the computational cost is similar.However,as the number of interactions increases,the proposed only counts interaction records within the time period[t,t+α],while Model-III counts all interaction records.This will result in a cumulative increase in the computational cost of Model-III as the number of interactions increases.The time degradation factor is designed to further improve the sensitivity of the evaluation model to recent interaction records,thereby improving the accuracy of trust evaluation and reducing computational cost.

    3.2 Comparison with Existing Work

    In this subsection,the proposed model is compared model with existing work in terms of malicious node detection rate,interactive success rate,and computational cost.These three factors are important indicators to measure the performance of a trust evaluation model.

    Figure 5.Comparison of computational cost.

    3.2.1 Comparison of Malicious Node Detection Rate In the DTEC and the TEUC,the goal of preventing malicious attacks is mainly achieved by adjusting the reward factor and the penalty factor,which are improved versions of RSFN.In addition to the penalty factor,our model mainly introduces a random screening mechanism in the indirect trust value calculation,which greatly avoids the possibility of collusion attacks by malicious nodes.In contrast,the proposed model has the advantage of being more proactive in defending against attacks.The comparison of malicious node detection rate under four different models are realized as shown in Figure 6.As the proportion of malicious nodes increases,the detection rates of malicious nodes in the four models all decrease.The proposed model significantly outperforms the other three models.In the case of malicious nodes accounting for 30%,its detection rate can still reach 94.4%.

    3.2.2 Comparison of Interaction Success Rate

    The comparison of interaction success rate under four different models is illustrated as shown in Figure 7.The interaction success rate refers to the proportion of NCPs that successfully complete task in a task allocation,which is a key aspect of measuring DCOMP performance.In this experiment,the proportion of malicious nodes is fixed at 20%.In the proposed model,a time window and Logarithmic attenuation function are introduced to quantify the dynamic changes in direct trust over time,random screening mechanism is proposed to solve the problem of malicious recommendation problem in indirect trust computing.Compared with the other three models,the proposed model has a higher interaction success rate.

    Figure 6.Comparison of malicious node detection rate under four different models.

    Figure 7.Comparison of interactive success rate under four different models.

    3.2.3 Comparison of Computational Cost

    The comparison of computational cost under four different models is described is shown in Figure 8.The computational cost of RSFN is significantly higher than that of the other three models,because the other three models all design sliding windows to gradually discard invalid historical records,while RSFN takes all interaction records into account in each calculation.As the number of interactions increases,the computational cost of RSFN will grow faster and faster.The computational cost of the proposed model is lower than that of TEUC and DTEM,mainly reflected in the random screening mechanism of indirect calculation,which can not only alleviate the collusion of malicious nodes,but also reduce the computational cost.

    Figure 8.Comparison of computational cost under four different models.

    Table 2.Comparison of existing work in terms of performance.

    The experiments in the above three subsections are quantitatively compared with the existing work in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost.The advancement of our model can be summarized as shown in Table 2.

    IV.CONCLUSION

    In this paper,a novel trust evaluation model is proposed for dispersed computing environment,in which task nodes serve as evaluation nodes and NCPs serve as target nodes.In the calculation of direct trust,a logarithmic decay function and a time sliding window are introduced to solve the problem of the dynamic change of trust value with time,which improves the accuracy of trust evaluation.In the calculation of indirect trust,a random screening mechanism is innovatively proposed,which can reduce the possibility of single attack and collusion by malicious nodes as well as reduce computational cost.In particular,some unstable network failures will also affect the accuracy of node trust assessment in a highly dynamic dispersed computing environment.Therefore,based on the historical information,current information,and instantaneous changes,a method to dynamically update the comprehensive trust value is proposed.In this way,the influence of external fault factors on the comprehensive trust evaluation of nodes is avoided,thereby improving the detection rate of malicious nodes.Through the simulation experiments on the NetLogo platform,the performance of the model is verified in terms of malicious node detection rate,interaction success rate and computational cost.Compared with existing trust evaluation models,the proposed model shows good performance in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost.As a future work,we will expand the performance evaluation indicators of the model,and deeply study the impact of our model on the throughput,energy consumption and other aspects of the dispersed computing network.Further,the emphasis will be laid on research on trust evaluation-based security threat warning system in dispersed computing environment.

    DECLARATION OF COMPETING INTEREST

    The authors declare that they have no conflict of interest concerning the publication of this manuscript.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Science Foundation Project of P.R.China (No.61931001),the Fundamental Research Funds for the Central Universities under Grant(No.FRFAT-19-010)and the Scientific and Technological Innovation Foundation of Foshan,USTB(No.BK20AF003).

    十八禁国产超污无遮挡网站| 久久久久久九九精品二区国产| 国产精品一区二区三区四区久久| 亚洲真实伦在线观看| 岛国毛片在线播放| 国产激情偷乱视频一区二区| 好男人在线观看高清免费视频| www.色视频.com| 免费电影在线观看免费观看| 国内揄拍国产精品人妻在线| 此物有八面人人有两片| 又粗又爽又猛毛片免费看| 天天躁夜夜躁狠狠久久av| 看免费成人av毛片| 亚洲久久久久久中文字幕| 青春草国产在线视频 | 久久综合国产亚洲精品| 男人舔奶头视频| 色综合色国产| 中文字幕av在线有码专区| 国产v大片淫在线免费观看| 午夜爱爱视频在线播放| 日韩强制内射视频| 日韩欧美三级三区| 免费看a级黄色片| 亚洲国产高清在线一区二区三| 一个人看视频在线观看www免费| 美女被艹到高潮喷水动态| 老女人水多毛片| 中文字幕免费在线视频6| 一级av片app| 成人性生交大片免费视频hd| 能在线免费看毛片的网站| 欧美日韩乱码在线| 少妇的逼好多水| 亚洲综合色惰| 欧美日韩在线观看h| 欧美日韩一区二区视频在线观看视频在线 | 自拍偷自拍亚洲精品老妇| 亚洲图色成人| 一本一本综合久久| 99国产精品一区二区蜜桃av| 人体艺术视频欧美日本| 亚洲不卡免费看| 男女视频在线观看网站免费| 国产一区二区激情短视频| 3wmmmm亚洲av在线观看| 国产免费一级a男人的天堂| 成人高潮视频无遮挡免费网站| 小蜜桃在线观看免费完整版高清| 国产日韩欧美在线精品| 国产精品永久免费网站| 免费黄网站久久成人精品| 国产精品不卡视频一区二区| 夜夜夜夜夜久久久久| 久久午夜亚洲精品久久| 日本一二三区视频观看| 免费人成视频x8x8入口观看| 我要看日韩黄色一级片| 国产一区二区在线av高清观看| 草草在线视频免费看| 日韩欧美精品v在线| 12—13女人毛片做爰片一| 九九在线视频观看精品| 精品少妇黑人巨大在线播放 | 热99re8久久精品国产| 18禁在线无遮挡免费观看视频| 成人特级av手机在线观看| 美女国产视频在线观看| 日本与韩国留学比较| 亚洲精品日韩在线中文字幕 | 久久久久久久午夜电影| 在线观看一区二区三区| 欧美一区二区精品小视频在线| 在线a可以看的网站| 国产在线精品亚洲第一网站| 亚洲国产精品久久男人天堂| 免费看日本二区| 桃色一区二区三区在线观看| 18禁裸乳无遮挡免费网站照片| 欧美性感艳星| 97在线视频观看| 亚洲一级一片aⅴ在线观看| 日本色播在线视频| 久久99精品国语久久久| av在线蜜桃| 看免费成人av毛片| 国产视频内射| 亚洲无线在线观看| 成年女人看的毛片在线观看| 中文字幕制服av| 夜夜爽天天搞| 中文欧美无线码| 在线播放无遮挡| 日本一二三区视频观看| 亚洲18禁久久av| 我的老师免费观看完整版| 直男gayav资源| 国产国拍精品亚洲av在线观看| 日本熟妇午夜| 可以在线观看的亚洲视频| 亚洲精品日韩av片在线观看| 国内精品一区二区在线观看| 欧美成人免费av一区二区三区| 我要搜黄色片| 日韩制服骚丝袜av| 婷婷色综合大香蕉| 久久久久久久久大av| 久久久久久伊人网av| 精华霜和精华液先用哪个| 亚洲第一区二区三区不卡| 国产成人精品久久久久久| 欧美日韩综合久久久久久| 精品不卡国产一区二区三区| 一级黄色大片毛片| 久久精品91蜜桃| 午夜福利高清视频| 日本色播在线视频| 12—13女人毛片做爰片一| 欧美日本视频| 91精品国产九色| 亚洲国产精品国产精品| 老女人水多毛片| 最近的中文字幕免费完整| 狂野欧美激情性xxxx在线观看| 国产精品日韩av在线免费观看| 22中文网久久字幕| 色5月婷婷丁香| 国产探花在线观看一区二区| 乱系列少妇在线播放| 在线免费观看的www视频| 亚洲真实伦在线观看| 国产白丝娇喘喷水9色精品| 午夜久久久久精精品| 欧洲精品卡2卡3卡4卡5卡区| 18禁在线无遮挡免费观看视频| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久人人爽人人爽人人片va| www.av在线官网国产| 国产免费男女视频| 九九爱精品视频在线观看| 国产高清有码在线观看视频| 91久久精品国产一区二区三区| 日本免费a在线| 亚洲最大成人av| 一级毛片久久久久久久久女| 亚洲av熟女| 国产精品久久视频播放| 性色avwww在线观看| 可以在线观看的亚洲视频| 国产中年淑女户外野战色| 可以在线观看的亚洲视频| 午夜福利成人在线免费观看| 成人美女网站在线观看视频| 欧美最黄视频在线播放免费| 久久久久国产网址| 精品熟女少妇av免费看| 久久久久久伊人网av| 亚洲精品国产成人久久av| 天天躁日日操中文字幕| 成年免费大片在线观看| 亚洲天堂国产精品一区在线| 午夜视频国产福利| 日本黄色视频三级网站网址| 国产成人91sexporn| 天美传媒精品一区二区| 97在线视频观看| 日日干狠狠操夜夜爽| 一本一本综合久久| 亚洲国产精品久久男人天堂| 国产精品野战在线观看| 看十八女毛片水多多多| www.av在线官网国产| 看免费成人av毛片| 99久久九九国产精品国产免费| 国产精品.久久久| 成年版毛片免费区| 免费无遮挡裸体视频| 一个人看的www免费观看视频| 国产毛片a区久久久久| 免费看光身美女| 大香蕉久久网| 亚洲,欧美,日韩| 欧美激情国产日韩精品一区| 国产成人aa在线观看| 少妇猛男粗大的猛烈进出视频 | 日韩中字成人| 国产精品人妻久久久影院| 亚洲国产欧美人成| 亚洲七黄色美女视频| 欧美色视频一区免费| 可以在线观看的亚洲视频| 午夜爱爱视频在线播放| 久久午夜亚洲精品久久| 精品欧美国产一区二区三| 免费观看的影片在线观看| 久久久久九九精品影院| 国产精品久久视频播放| 亚洲精品影视一区二区三区av| 能在线免费看毛片的网站| 最近2019中文字幕mv第一页| 成人无遮挡网站| 99国产精品一区二区蜜桃av| 亚洲国产精品成人综合色| 国产精品久久久久久av不卡| 午夜老司机福利剧场| 精品欧美国产一区二区三| 麻豆国产av国片精品| 老司机影院成人| 国产精品一二三区在线看| 美女高潮的动态| 成人性生交大片免费视频hd| 偷拍熟女少妇极品色| 一级毛片电影观看 | 在线免费观看的www视频| 亚洲中文字幕一区二区三区有码在线看| 国产色爽女视频免费观看| 免费观看的影片在线观看| АⅤ资源中文在线天堂| 色噜噜av男人的天堂激情| 成人毛片60女人毛片免费| 亚洲人成网站在线观看播放| 极品教师在线视频| 性色avwww在线观看| 亚洲内射少妇av| eeuss影院久久| 麻豆久久精品国产亚洲av| 两个人的视频大全免费| 中文欧美无线码| 久久精品夜夜夜夜夜久久蜜豆| 神马国产精品三级电影在线观看| 中国美白少妇内射xxxbb| 黄色一级大片看看| 精品不卡国产一区二区三区| 22中文网久久字幕| 国产一区二区三区av在线 | 国产日本99.免费观看| 亚洲成a人片在线一区二区| 午夜福利成人在线免费观看| 99久久人妻综合| 美女被艹到高潮喷水动态| 免费av不卡在线播放| 国产精品一区二区性色av| 3wmmmm亚洲av在线观看| 国产精品人妻久久久影院| 99九九线精品视频在线观看视频| 国产精品久久久久久av不卡| 国产精品美女特级片免费视频播放器| 麻豆国产av国片精品| 波多野结衣高清无吗| 国内精品一区二区在线观看| 欧洲精品卡2卡3卡4卡5卡区| 一本久久中文字幕| 观看美女的网站| 国产一区二区在线av高清观看| 99在线人妻在线中文字幕| 久久精品影院6| 天天躁日日操中文字幕| 免费搜索国产男女视频| 春色校园在线视频观看| 亚洲av熟女| 国产精品久久视频播放| 精品欧美国产一区二区三| 麻豆av噜噜一区二区三区| 女人被狂操c到高潮| 国产久久久一区二区三区| 中文字幕久久专区| 在线观看免费视频日本深夜| 久久婷婷人人爽人人干人人爱| 69人妻影院| 亚洲av免费高清在线观看| 免费看日本二区| 日韩大尺度精品在线看网址| 免费看光身美女| 国产 一区精品| 久久久精品94久久精品| 免费搜索国产男女视频| 欧美xxxx性猛交bbbb| 国产综合懂色| 欧美激情久久久久久爽电影| 精品熟女少妇av免费看| 日韩制服骚丝袜av| 岛国在线免费视频观看| 蜜桃亚洲精品一区二区三区| 午夜免费男女啪啪视频观看| 亚洲电影在线观看av| 亚洲精品亚洲一区二区| 欧美一级a爱片免费观看看| 又黄又爽又刺激的免费视频.| 国产伦在线观看视频一区| 麻豆久久精品国产亚洲av| avwww免费| 少妇的逼好多水| 天天躁日日操中文字幕| 99热这里只有是精品在线观看| 久久久久久久亚洲中文字幕| 少妇熟女aⅴ在线视频| 亚洲国产精品合色在线| 国产精品综合久久久久久久免费| 草草在线视频免费看| 偷拍熟女少妇极品色| 国产精品一区www在线观看| 别揉我奶头 嗯啊视频| av在线亚洲专区| 小说图片视频综合网站| 少妇人妻一区二区三区视频| 床上黄色一级片| 免费搜索国产男女视频| 日本撒尿小便嘘嘘汇集6| 老师上课跳d突然被开到最大视频| 国产成人一区二区在线| 亚洲色图av天堂| 2022亚洲国产成人精品| 国产一区亚洲一区在线观看| 日韩成人av中文字幕在线观看| 老司机影院成人| 精品人妻一区二区三区麻豆| 国产免费男女视频| 国产乱人视频| 国国产精品蜜臀av免费| 老司机影院成人| 国内精品久久久久精免费| 国产亚洲精品久久久久久毛片| 亚洲欧洲国产日韩| 日本免费a在线| 午夜激情福利司机影院| 日本一本二区三区精品| 女同久久另类99精品国产91| 免费大片18禁| 最近视频中文字幕2019在线8| 日韩亚洲欧美综合| 国产在视频线在精品| 成人高潮视频无遮挡免费网站| 99国产极品粉嫩在线观看| 亚洲18禁久久av| 色播亚洲综合网| 国产精品一二三区在线看| 国产乱人偷精品视频| 日韩一区二区视频免费看| 国产黄片美女视频| 亚洲自拍偷在线| 91久久精品国产一区二区三区| 国产精品嫩草影院av在线观看| 久久精品国产亚洲av天美| 内射极品少妇av片p| 91狼人影院| 亚洲精华国产精华液的使用体验 | 一本精品99久久精品77| 国产精品永久免费网站| 观看免费一级毛片| 亚洲在线自拍视频| 99久久精品一区二区三区| 日本在线视频免费播放| 日韩欧美国产在线观看| 免费观看精品视频网站| 赤兔流量卡办理| 日日摸夜夜添夜夜添av毛片| 日本熟妇午夜| 欧美最新免费一区二区三区| 熟女电影av网| 久久热精品热| 18禁黄网站禁片免费观看直播| 久久久久久久午夜电影| 一进一出抽搐动态| 国产在线精品亚洲第一网站| 一个人看的www免费观看视频| 国产三级中文精品| or卡值多少钱| 久久精品夜色国产| 精品久久久久久久人妻蜜臀av| 久久久久久九九精品二区国产| 国产一区亚洲一区在线观看| 亚洲va在线va天堂va国产| 蜜桃久久精品国产亚洲av| 久久久久久久久久久免费av| 91aial.com中文字幕在线观看| 偷拍熟女少妇极品色| 麻豆av噜噜一区二区三区| 亚洲,欧美,日韩| 成人三级黄色视频| 69人妻影院| 99热这里只有精品一区| 日韩,欧美,国产一区二区三区 | 亚洲中文字幕日韩| 黑人高潮一二区| 午夜精品在线福利| 99久久精品一区二区三区| 男女啪啪激烈高潮av片| 久久久久久大精品| 国产亚洲欧美98| 网址你懂的国产日韩在线| 少妇人妻一区二区三区视频| 国产成人a∨麻豆精品| 又爽又黄a免费视频| 成年女人看的毛片在线观看| 少妇的逼好多水| 在线免费观看不下载黄p国产| 国产大屁股一区二区在线视频| 亚洲国产高清在线一区二区三| 国产一区亚洲一区在线观看| 欧美色视频一区免费| 亚洲丝袜综合中文字幕| 中文欧美无线码| 一个人观看的视频www高清免费观看| 亚洲第一电影网av| 一级黄色大片毛片| 99在线人妻在线中文字幕| 国产黄色视频一区二区在线观看 | 亚洲天堂国产精品一区在线| 欧美日韩一区二区视频在线观看视频在线 | 日韩高清综合在线| 久久久久久久亚洲中文字幕| 成人毛片60女人毛片免费| 国产一区二区亚洲精品在线观看| 夜夜夜夜夜久久久久| 老熟妇乱子伦视频在线观看| 久久久久久伊人网av| 欧美色视频一区免费| 伊人久久精品亚洲午夜| 久久久成人免费电影| 1024手机看黄色片| 国产午夜精品论理片| 久久99热这里只有精品18| 久久午夜亚洲精品久久| 干丝袜人妻中文字幕| 欧美潮喷喷水| av天堂在线播放| 少妇裸体淫交视频免费看高清| 亚洲欧美精品综合久久99| 黄色日韩在线| 丰满人妻一区二区三区视频av| 99在线视频只有这里精品首页| 18+在线观看网站| 久久国产乱子免费精品| 能在线免费看毛片的网站| 国产色婷婷99| 久久久午夜欧美精品| а√天堂www在线а√下载| 乱码一卡2卡4卡精品| 亚洲中文字幕一区二区三区有码在线看| 亚洲av成人av| 久99久视频精品免费| 亚洲国产精品合色在线| 丰满人妻一区二区三区视频av| 国产麻豆成人av免费视频| 久久精品国产亚洲av涩爱 | 久久久国产成人免费| a级毛片免费高清观看在线播放| 亚洲五月天丁香| 精品久久久久久久久久免费视频| 亚洲精品自拍成人| 久久综合国产亚洲精品| 99久久人妻综合| 不卡一级毛片| 黄色视频,在线免费观看| 午夜福利成人在线免费观看| 你懂的网址亚洲精品在线观看 | 国产成人91sexporn| 午夜爱爱视频在线播放| www.av在线官网国产| 国产精品免费一区二区三区在线| 国产精品美女特级片免费视频播放器| 久久精品国产亚洲av天美| 免费一级毛片在线播放高清视频| 国产成人精品久久久久久| a级毛片a级免费在线| 午夜精品国产一区二区电影 | 性欧美人与动物交配| 中文字幕av成人在线电影| av女优亚洲男人天堂| 一级黄色大片毛片| 在线观看美女被高潮喷水网站| 国产av麻豆久久久久久久| 国产私拍福利视频在线观看| 国产一级毛片在线| 亚洲av中文av极速乱| 99久国产av精品国产电影| 欧美人与善性xxx| 久久人人爽人人爽人人片va| 欧美另类亚洲清纯唯美| 在线观看av片永久免费下载| 最近中文字幕高清免费大全6| 看片在线看免费视频| 久久国产乱子免费精品| 国产精品久久久久久精品电影小说 | 又粗又爽又猛毛片免费看| 国产成人a∨麻豆精品| 麻豆一二三区av精品| 美女大奶头视频| 51国产日韩欧美| 免费av不卡在线播放| 国产精品三级大全| 亚洲人成网站在线播| 欧美+亚洲+日韩+国产| 男女视频在线观看网站免费| 麻豆成人av视频| av又黄又爽大尺度在线免费看 | 日本爱情动作片www.在线观看| 中文字幕av在线有码专区| 男女做爰动态图高潮gif福利片| 少妇人妻精品综合一区二区 | 精品国产三级普通话版| 美女 人体艺术 gogo| 在线观看66精品国产| av在线天堂中文字幕| 国产又黄又爽又无遮挡在线| 日韩欧美精品v在线| 亚洲国产精品成人久久小说 | 黄色视频,在线免费观看| 日本三级黄在线观看| 国产精品无大码| 麻豆国产av国片精品| 精品不卡国产一区二区三区| 女人十人毛片免费观看3o分钟| 精品久久久久久久人妻蜜臀av| 日日撸夜夜添| 中出人妻视频一区二区| 国产亚洲5aaaaa淫片| 国产真实乱freesex| 国产老妇女一区| 日本爱情动作片www.在线观看| 精品国内亚洲2022精品成人| 男女做爰动态图高潮gif福利片| 99热这里只有是精品在线观看| 午夜福利在线观看免费完整高清在 | 成人无遮挡网站| 亚洲欧美日韩东京热| 亚洲无线在线观看| 国产日韩欧美在线精品| 精品国产三级普通话版| 99热这里只有是精品在线观看| 亚洲欧美精品自产自拍| 国产精品久久视频播放| 日本熟妇午夜| 我要看日韩黄色一级片| 国产激情偷乱视频一区二区| 亚洲av成人av| 国产欧美日韩精品一区二区| 丰满乱子伦码专区| 大又大粗又爽又黄少妇毛片口| 久久久久久伊人网av| 亚洲人成网站在线播| 国产精品无大码| 99久国产av精品| 最新中文字幕久久久久| 欧美成人免费av一区二区三区| 午夜福利在线在线| 国产麻豆成人av免费视频| 国产精品综合久久久久久久免费| 99久国产av精品国产电影| 日本成人三级电影网站| 日日摸夜夜添夜夜爱| 欧美+日韩+精品| 少妇裸体淫交视频免费看高清| 久久久久免费精品人妻一区二区| 欧美性猛交╳xxx乱大交人| 日韩成人伦理影院| 免费大片18禁| 色5月婷婷丁香| 乱人视频在线观看| 精品久久久久久久人妻蜜臀av| 国产一区二区在线av高清观看| 一级毛片aaaaaa免费看小| 精品久久国产蜜桃| 欧美最黄视频在线播放免费| 长腿黑丝高跟| 国产在线精品亚洲第一网站| 久久久久久伊人网av| 亚洲图色成人| 国产一区二区在线观看日韩| 亚洲欧美精品综合久久99| 国产一区二区在线观看日韩| 精品日产1卡2卡| 日韩欧美精品v在线| 久久精品国产亚洲网站| 久久久久久伊人网av| 能在线免费观看的黄片| 日本免费一区二区三区高清不卡| 一本久久中文字幕| 女同久久另类99精品国产91| 亚洲精品久久国产高清桃花| av天堂中文字幕网| av卡一久久| 亚洲最大成人中文| 欧美性感艳星| 内射极品少妇av片p| 国产高清有码在线观看视频| h日本视频在线播放| 亚洲av熟女| 亚洲经典国产精华液单| 搡老妇女老女人老熟妇| 欧美人与善性xxx| 偷拍熟女少妇极品色| 亚洲欧美成人精品一区二区| 久久久精品94久久精品| 免费人成在线观看视频色| 亚洲国产欧洲综合997久久,| 99热这里只有是精品50| 久久久久久久久久黄片| 久久久a久久爽久久v久久| 日韩欧美一区二区三区在线观看| 午夜精品国产一区二区电影 | 亚洲在线自拍视频| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 九九在线视频观看精品| 色播亚洲综合网| 欧美高清成人免费视频www| 久久亚洲精品不卡| 中文字幕制服av| 日韩欧美精品v在线| 男插女下体视频免费在线播放| 欧美不卡视频在线免费观看| 男女视频在线观看网站免费| 少妇熟女aⅴ在线视频| 亚洲七黄色美女视频|