• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    2023-12-12 15:50:12ShadiAlSarawiMohammedAnbarBasimAhmadAlabsiMohammadAdnanAladailehandShazaDawoodAhmedRihan
    Computers Materials&Continua 2023年10期

    Shadi Al-Sarawi,Mohammed Anbar,?,Basim Ahmad Alabsi,Mohammad Adnan Aladaileh and Shaza Dawood Ahmed Rihan

    1National Advanced IPv6 Centre(NAv6),University Sains Malaysia,Gelugor,Penang,11800,Malaysia

    2Applied College,Najran University,King Abdulaziz Street,P.O.Box 1988,Najran,Saudi Arabia

    3Cybersecurity Department,School of Information Technology,American University of Madaba(AUM),Amman,11821,Jordan

    ABSTRACT The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators: DODAG Information Object (DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.

    KEYWORDS Internet of Things;IPv6 over low power wireless personal area networks;Routing Protocol for Low-Power and Lossy Networks;Internet Protocol Version 6;distributed denial of service;wireless sensor networks

    1 Introduction

    The sinkhole attack poses a significant threat to Wireless Sensor Networks(WSNs).It manipulates routing information,drops packets,alters data,and selectively transfers data,resulting in energy depletion in neighboring nodes and causing a network energy gap [1–3].Consequently,numerous researchers have proposed various detection approaches for sinkhole attacks in RPL-based networks.

    The Internet Engineering Task Force (IETF) has standardized the RPL protocol in documents RFC4919 and RFC6550 [4,5].These documents focus on IP for Low-Power and Lossy Networks(LLNs)by utilizing IPv6 over 6LoWPAN,which has become the standard for IPv6 in IEEE 802.15.4 networks.RPL has emerged as the standard routing protocol for establishing IPv6 connectivity in these networks,including those in the IoT domain.

    In RPL,the objective function of the protocol selects the optimal route for data transmission.Each node is assigned an ID based on its rank and IPv6 address.To exchange graph-related information,nodes utilize three RPL-specific Internet Control Message Protocol version 6(ICMPv6)messages: DIS (DODAG Information Solicitation),DAO (DODAG Destination Advertisement Object),and DIO,as shown in Fig.1[6].

    Figure 1:RPL topology

    In network security,intrusion detection systems have been the subject of extensive research.Recently,researchers have also focused on detecting sinkhole attacks in IoT networks,categorized into two main approaches: Signature-Based and Anomaly-Based.Among these,Anomaly-Based approaches have demonstrated higher efficiency in detecting attacks than Signature-Based approaches.An Anomaly-Based approach establishes a baseline of normal network behavior and detects anomalies when deviations from this baseline occur,triggering alerts when traffic behavior surpasses a predefined threshold.Any behavior that deviates from the normal pattern is considered an intrusion[7].

    However,existing approaches for detecting sinkhole attacks often overlook the significant behavioral characteristics contributing to accurate detection.Additionally,many of these approaches consume excessive energy due to their deployment design.Consequently,there is a need for a solution that combines low power consumption with high accuracy for detecting sinkhole attacks.

    This research paper makes two contributions to the existing body of knowledge.Firstly,a behavior set that indicates a sinkhole attack in an RPL-based network.These indicators include (I) DIO Transaction Frequency,(II) Rank Harmony Behavioral,and (III) Power Consumption Behavior.Secondly,an unweighted voting method utilizes information from these abnormal behaviors to determine the presence of a sinkhole attack.

    The organization of this research paper is as follows:Section 2 provides an overview of IoT,IPv6,RPL,and sinkhole attacks.Section 3 discusses related works in the field.In Section 4,we outline the proposed approach.The results of our experiments are presented and discussed in Section 5.Finally,we conclude the paper by exploring several avenues for future research in the last section.

    2 Background

    This section aims to provide a comprehensive overview of the IoT,the IPv6 protocol,and the RPL.Furthermore,it highlights the significance of sinkhole attacks in the context of these technologies.

    2.1 IoT Overview

    IoT technologies and their applications have gained worldwide attention in many fields,such as science,commerce,industry,healthcare,transportation,and crowd management,such as in[8],which have become necessary for daily life across all segments of society.

    The rise of IoT and its applications in sensing led to a significant increase in multimedia data shared over insecure networks.However,IoT setups face resource constraints due to their small size,making conventional data encryption algorithms unsuitable.Therefore,it needs a lightweight cryptographic algorithm for IoT,such as the algorithm proposed in[9].

    According to Kaspersky Lab’s IoT report,there were over 120,000 malware attacks targeting IoT devices in the first six months of 2018,three times the number of attacks in 2017.Additionally,there was a ten-fold increase in smart device malware in 2017 compared to 2016[10,11].IBM reported that between October 2019 and June 2020,the combined number of IoT attacks was 400%higher than in the previous two years,as shown in Fig.2[12].

    2.2 IPv6 Overview

    There are several limitations associated with IoT,including limited processing capability,storage capacity,power life,and radio communication range.As a result,the implementation of IoT leverages the existing IP infrastructure to optimize resource utilization and take advantage of the extensive address space provided by IPv6[13,14].A promising approach for integrating low-power networks is through IPv6 over Low Power Wireless Personal Area Networks(6LoWPAN).This approach adds an adaptation layer to the network protocol stack.The 6LoWPAN protocol stack is designed to integrate wireless sensor networks based on 802.15.4 with IPv6 networks.It comprises a PHY layer,MAC layer,6LoWPAN adaptation layer,network layer,transport layer,and application layer with specific 6LoWPAN applications,as shown in Fig.3[15].By employing 6LoWPAN with constrained devices and utilizing the existing IP architecture and infrastructure,it helps maximize resource utilization and leverage the vast IPv6 address space[16,17].

    Figure 2:IoT attack volume between 2018 and 2020

    Figure 3:6LoWPAN protocol stack

    IPv6 is the successor to Internet Protocol Address Version 4(IPv4)and is designed to replace it to support the growing number of network devices worldwide.Table 1 summarizes the six key differences between IPv6 and IPv4[18].

    Table 1:Differences between IPv4 and IPv6

    2.3 RPL Overview

    RPL is a widely used routing protocol in Wireless Sensor Networks(WSNs)and finds applications in various domains such as smart grids,industrial networks,and home networks.The RPL protocol operates by initiating messages from a root or sink node,known as DIO messages,to construct a Directed Acyclic Graph (DAG) known as a DODAG.The DODAG tree consists of a single root node,and each node receiving a DIO message determines its parent based on the parent’s rank value and other parameters.The rank value is calculated considering factors such as the distance from the root node and the energy of the link.The network owner can determine the specific parameters used for rank value calculation.Nodes in the network continue to broadcast DIO messages,maintaining and updating the Routing Tree[19].

    2.4 Sinkhole Attack

    A sinkhole attack is considered one of the most devastating routing attacks due to its ability to deceive neighboring nodes by providing false routing information and selectively manipulating or blocking data transmission.This type of attack can deplete the energy resources of surrounding nodes,creating energy gaps within Wireless Sensor Networks (WSNs) [3].Among various routing attacks,the sinkhole attack falls under the Denial of Service(DoS)category and poses a severe threat to IoT environments[20].Its destructive impact is further amplified when combined with other attacks,potentially causing significant damage.If left undetected,the sinkhole attack can result in information loss and prevent packets from reaching the base station,effectively disconnecting nodes from the internet.Additionally,this type of attack introduces additional network overhead and accelerates energy consumption,ultimately leading to the deterioration of the network’s lifespan[21].

    3 Related Works

    An anomaly-based approach is employed to detect sinkhole attacks by establishing a baseline of normal network behavior and identifying anomalies that deviate from this baseline.When the traffic behavior exceeds a predefined threshold,an alert is generated,considering any deviations from the normal behavior as potential intrusions.However,this method often causes false positives[22–26].

    Tumrongwittayapak et al.proposed a sinkhole attack detection method based on Received Signal Strength Indicator(RSSI)values,incorporating an Extra Monitor(EM)component.During network deployment,EM monitors the RSSI values of all nodes and transmits relevant information to the base station.The EM calculates RSSI values and forwards them to the base station along with the source ID and next hop.The base station utilizes these RSSI values to calculate the Visual Geographical Map(VGM),which displays the positions of each node.EM continuously updates the RSSI values for the base station[27].Any changes in packet flow exceeding a predefined threshold indicate the presence of a sinkhole attack.However,this approach is limited because it cannot detect sinkhole attacks if launched immediately after network deployment and before the RSSI values are calculated[28].

    Cervantes et al.proposed an Intrusion Detection System(IDS)approach called Intrusion detection of Sinkhole attack on 6LoWPAN for IoT(INTI)to detect sinkhole attacks on the routing services of 6LoWPAN IoT networks.The INTI approach consists of four modules:the Cluster Configuration module,responsible for classifying nodes as members,leaders,and associates based on their network functions;the Monitoring module,which tracks the number of transmissions;the Attacker Detection module,responsible for identifying the sinkhole attacking node;and the Isolation of the Attacker module,which isolates malicious nodes from the cluster and alerts neighboring nodes.The network nodes are categorized as Leader(L),Member(M),Free(F),Associated(A),or Base(B)stations,with each node possessing unique IP addresses.Nodes form virtual clusters that can be repositioned and communicated wirelessly.L nodes receive information from M and A nodes and transmit it to the B station,while A nodes facilitate inter-cluster data transmission.The results demonstrate that INTI achieves a sinkhole detection rate of up to 92% in a fixed scenario and 75% in a mobile scenario.The INTI method has been evaluated and compared to SVELTE for detecting sinkhole attacks.The evaluation results demonstrate that INTI exhibits lower false-positive and false-negative rates than SVELTE.It offers advantages such as high detection accuracy and low false positives and negatives rates.However,it requires substantial computational resources,which can reduce the lifetime of the IoT ecosystem.Furthermore,INTI can only detect sinkhole attacks[24,25,29].

    Grgic et al.stated that each IDS module,deployed on every node,listens to the traffic of its neighboring nodes and collects data that represents input parameters for the collective decisionmaking process.The maximum number of packet drops is defined as a threshold.A node is considered suspicious if the number of dropped packets exceeds this threshold.The researchers evaluated their method using a COOJA simulator on three networks with six,ten,and seventeen nodes,respectively.To assess the impact of the IDS on network performance,tests were conducted both with and without the IDS.The main advantage of this system is its high detection accuracy.However,it faces a challenge in distinguishing between malicious and misbehaving nodes[30].

    Alzubaidi et al.proposed a lightweight technique called the Neighbor Passive Monitoring Technique(NPMT)for detecting sinkhole attacks in RPL-based IoT networks.Their IDS employs a Passive Intermediate Node(PN)to listen to and analyze the broadcasts of nodes.Neighboring nodes with similar ranks do not raise suspicion,while those with different ranks are flagged as suspicious nodes.The proposed technique outperforms the existing SVELTE in terms of performance.COOJA simulation results demonstrate that the NPMT achieved a 99.5%Accuracy Rate with a false-positive rate of 0.53%.However,a drawback of this technique is the overhead caused by passive intermediate nodes and passive edge nodes[31].

    Verma et al.proposed a signature-based detection system called Ensemble Learning Intrusion Detection System(ELNIDS),which utilizes machine learning(ML)mechanisms.The system incorporates four ensemble-based ML classifiers: Bagged Trees,RUSBoosted Trees,Boosted Trees,and Subspace Discriminant for sinkhole attack detection.ELNIDS comprises six modules: the sniffer model,sensor events and traffic repository,feature extraction module,analysis engine,rule base database,and attack notification manager.The sniffer module listens,monitors,and records traffic data in the database,while the feature extraction module characterizes network traffic to assist the analyzer in classification using ensemble models.The evaluation of ELNIDS was conducted using the RPL-NIDDS17 dataset,which contains traffic traces of various attack types,including Blackhole,Sinkhole,Sybil,Selective Forwarding,Clone ID,Hello Flooding,and Local Repair attacks.These attacks are explained in [32,33].The results demonstrate the effectiveness of ELNIDS,with the ensemble of Boosted Trees achieving the highest detection accuracy (94.5%),while the Subspace Discriminant method achieved the lowest detection accuracy(77.8%)[34].

    In summary,the existing mechanisms for detecting sinkhole attacks suffer several issues.Firstly,they exhibit high overheads in terms of network and memory consumption.Secondly,they have a significant false-positive rate,incorrectly flagging normal network activity as sinkhole attacks.Thirdly,there is a lack of sufficient research on the behavioral characteristics of sinkhole attacks,resulting in low detection accuracy.Additionally,many mechanisms have overlapping features and struggle to select the most crucial features for detecting sinkhole attacks.This problem undermines detection accuracy and contributes to a high false-positive rate.Lastly,the deployment design leads to challenges such as high overhead and energy consumption.

    To summarize,the problems with existing mechanisms for detecting sinkhole attacks include high overheads,a high false-positive rate,insufficiently studied behavioral characteristics,identification issues,and high overhead and energy consumption in deployment design.

    4 Proposed Approach

    This section explains the proposed UVM approach,which aims to detect sinkhole attacks while maintaining low power consumption and achieving high detection accuracy.Fig.4 illustrates the general stages of UVM.

    Figure 4:General stages of UVM

    4.1 Data Collection and Preprocessing(Stage 1)

    In this stage,power consumption data and ICMPv6 packets are collected passively from each node to gather helpful information for sinkhole attack detection.This stage describes collecting,capturing,and filtering data to construct a dataset.The data collection and preprocessing stage can be divided into two steps,as shown in Fig.5.

    Figure 5:Data collection and preprocessing steps

    4.1.1 Data Filtration

    The primary objective of the Data Filtration step is to refine the power consumption data(such as Central Processing Units (CPU),Low Power Mode (LPM),Transmitted Traffic (TX),and Received Traffic(RX))and from ICMPv6 packet information(such as Source,Destination,and Rank)by selecting specific features.The “collect view”feature in the COOJA simulator provides detailed information about the energy consumption of each node,while the Wireshark tool offers insights into the network traffic of ICMPv6 transmissions.

    The filtered dataset,which includes the relevant features from both the ICMPv6 packet and power consumption data,will proceed to the next stage,Features Selection.In this stage,the most significant features contributing to the detection of sinkhole attacks will be identified.Furthermore,these features will be categorized based on their contributions to sinkhole attack detection.

    4.1.2 Data Cleansing

    The Data Cleansing step reduces the traffic volume by addressing issues such as corrupted,incorrectly formatted,duplicate,or incomplete data within the dataset.This process aims to improve the detection accuracy and decrease the search time of the dataset [35].Once the data cleansing is complete,the resulting dataset containing the relevant features from the ICMPv6 packet and power consumption data will be passed on to the next stage,Features Selection.

    4.2 Feature Selection(Stage 2)

    The Feature Selection stage plays a crucial role in reducing the size of the feature set by identifying the most significant features that contribute to the detection of sinkhole attacks.Feature selection is achieved using a ranking technique that assigns a weight value to each feature based on its importance.

    Several algorithms are available for feature ranking,including ReliefF,Information Gain Ratio(IGR),and Principal Component Analysis(PCA).ReliefF[36]is widely used among these due to its simplicity,operational efficiency,and satisfactory results.It exhibits good convergence and efficiency,making it suitable for feature selection in various scenarios[36].

    In the proposed method,the ReliefF algorithm is adapted using the Waikato Environment for Knowledge Analysis (Weka) software [36,37].This adaptation allows for effective feature selection,and the output of this phase is the final feature listδ,which consists of the essential features that significantly contribute to the detection of sinkhole attacks.

    4.3 Behavioral Indicators(Stage 3)

    The Behavioral Indicators stage is a crucial component of this approach as it aims to detect suspicious nodes exhibiting abnormal behavior in RPL networks.By analyzing the selected features from the previous stage (Feature Selection),which include ICMPv6 and power consumption data,this stage identifies and flags any abnormal behavior associated with sinkhole attacks in RPLbased networks.Identifying these abnormal behavior indicators requires repeated experiments and continuous monitoring of sinkhole attack behaviors.Our analysis has revealed that these behaviors can effectively distinguish sinkhole nodes from normal nodes.Moreover,selecting an odd number of behaviors aims to achieve majority voting and prevent deadlock situations,wherein an equal number of votes could lead to indecisiveness.The Behavioral Indicators stage consists of three specific indicators:

    (I)DIO Transaction Frequency:This indicator analyzes the frequency of DIO(DODAG Information Object) transactions in the network.Deviations from the expected transaction patterns can indicate the presence of a sinkhole attack.

    (II) Rank Harmony Behavior: This indicator examines the consistency of rank values among neighboring nodes in the network.In a normal scenario,nodes within a network exhibit a harmonious rank structure.Any significant inconsistencies or disruptions in rank values can suggest the presence of a sinkhole attack.

    (III)Power Consumption Behavior:This indicator monitors the power consumption patterns of individual nodes.Sinkhole attacks often involve abnormal energy usage,and this behavior can be captured by analyzing power consumption data.

    These behavioral indicators serve as footprints or indicators that help identify the presence of sinkhole attacks in RPL networks.By analyzing and comparing the observed behaviors against expected norms,suspicious nodes exhibiting abnormal behavior can be flagged for further investigation.

    4.3.1 DIO Transmission Frequency Behavior

    DIO messages are crucial in RPL as they contain metrics necessary for route creation.As the reliability of the route improves,the frequency and quantity of DIO messages decrease [38].Round Trip Time (RTT) is a control packet that helps determine the distance between neighbors and the root.When the topology is stable,the frequency of DIO messages decreases[39].RPL creates routing topologies based on DODAGs;nodes use DIO messages to establish and maintain these topologies.An increased number of DIO messages indicates an unstable network routing topology[40].The total quantity of DIO messages sent by each node within a specific period,time(t),can determine the impact of a sinkhole attack.The node is considered an attacker if the total quantity of delivered DIO messages falls below or exceeds a threshold.The threshold is determined by the node transmitting data every 10 s.The root adds that node to the blocklist if the received messages are below 30%of the expected quantity[35].The values of DIO_Current and DIO_Previous are calculated using Eqs.(1)and(2).

    If the value of DIO_Current exceeds the threshold,it indicates abnormal DIO Transaction messages.This behavior leads to a significant increase in DIO messages being delivered to neighboring regions.It also affects the topology surrounding the malicious node,generating more DIO messages.This,in turn,increases control overhead and packet collisions.Additionally,the power consumption around sinkhole nodes varies based on the number of sinkholes,which can impact network performance.

    On the other hand,the rest of the network consumes power as it would in the absence of sinkhole attacks.The monitoring node’s role is to passively listen and log all messages passing through the network,which are then sent to the IDS.Whenever a DIO Transmission Frequency Behavior event occurs,triggering an alarm,the next stage(Sinkhole Attack Detection)is initiated.

    4.3.2 Rank Harmony Behavior

    In Rank Harmony Behavior,source nodes in the network select a set of parent nodes and choose the one with a better rank value as their preferred parent.The rank value represents the node’s proximity to the root.However,in a sinkhole attack,the malicious node falsely claims to have a better rank than other nodes,tricking them into selecting it as the preferred parent.The sinkhole node manipulates the network topology by advertising fake routing metrics through illegitimate DIO messages.This behavior becomes evident when multiple illegitimate DIO messages contain false rank information from the parent node to deceive its neighboring nodes in the DODAG.As a result,when data packets are routed through the malicious node,they either get dropped or their routing information is altered,preventing them from reaching the base station.This routing manipulation can change the topology around the malicious node,causing increased control overhead and packet collisions[41,42].Two steps have been defined to identify abnormal ranking behavior,which indicates a sinkhole attack.

    Step 1:Differences between Node’s Rank with Its Parent Node(NRP)

    RPL determines each node’s rank value.The sink node has Rank=0;according to Fig.6,each node’s rank is determined by the sink node count from that node to the sink node plus one.

    In the UVM approach,it is assumed that the initial IoT network is free from any malicious nodes,and the correct routing tables are broadcasted to all nodes before the occurrence of a sinkhole attack[41,42].For instance,in Fig.6,labeled as“DODAG graph(NRP),”the NRP(Neighbor Rank Precedence)value for node N9 is calculated based on its rank and the rank of its parent node N8.The rank of N9 is 4,and its parent node N8 has a rank of 3.By applying Eq.(3),the NRP value of node N9 is determined as|3-4|,resulting in a value of 1.This calculation helps determine the precedence or priority of neighboring nodes in the routing process.

    Step 2:Differences between Source Node Rank with Node Itself(SRN)

    When a malicious sinkhole node attacks the network,the M node(Malicious Node)announces its rank as zero using the DIO message to all neighboring nodes,as shown in Fig.7,practically declaring it as the sink node.Once the sinkhole node’s DIO message is received,node N9 calculates the SRN value according to Eq.(4)[41,42].

    Since the rank value is zero for the source node that transmits the DIO message,and the rank value for node N9=4;therefore,the SRN value for node N9=|0-4|=4.

    Rank harmony classifies a DIO message as malicious when SRN Rank Value>NRP Rank Value.In Fig.7: “DODAG graph (SRN),”node M’s DIO message will be classified as malicious since the SRN Rank Value of N9>NRP Rank Value of N9,as 4>1.

    Figure 6:DODAG graph(NRP)

    The Monitoring node passively listens to all messages passing through the topology.Whenever a Rank Harmony Behavior event occurs,an alarm is triggered to the next stage (Sinkhole Attack Detection).

    4.3.3 Power Consumption Behavior

    The sensors near the sinkhole attack experience a significant depletion of battery power,resulting in a reduced network lifetime and increased control overhead.Additionally,the energy flow around the sinkholes is altered,negatively impacting the network’s overall performance.The extent of energy drainage on neighboring nodes depends on the number of nodes affected by the attack.Conversely,the energy consumption in the remaining parts of the network behaves normally without sinkhole attacks.

    Figure 7:DODAG graph(SRN)

    The monitoring node assumes a passive role,listening to all messages transmitted within the network topology.Whenever a Power Consumption Behavior event is detected,an alarm is triggered,indicating the occurrence of abnormal power consumption.This alarm is then forwarded to the next stage,the Sinkhole Attack Detection phase.

    4.4 Sinkhole Attack Detection(Stage 4)

    This stage aims to decide whether there is a Sinkhole attack according to information from the previous stage(Behavioral Indicators).This stage consists of the following subsequent steps.

    4.4.1 Rule Based

    This step aims to identify suspicious nodes by analyzing the ICMPv6 and power consumption features using specific rules and thresholds.Determining these threshold values involves conducting experiments,observations,and analyses under normal and abnormal conditions.The threshold values obtained are then applied to the behavioral indicators.The following are the rules applied:

    Rule#1:DIO Transaction Frequency Behavior

    The first proposed rule aims to detect DIO Transmission Frequency Behavior using the following rule:

    Here,this the total number of DIO previous messages.Every minute,the total(DIO Transmission frequency behavior) will be calculated for each node.An alert will be triggered if the sum of DIO Transmission messages for each node exceeds the threshold(th).

    Rule#2:Rank Harmony Behavior

    The second proposed rule aims to detect Rank Harmony Behavior using the following rule:

    NRP and SRN will be calculated for each node every minute.Rank Harmony will flag a DIO message as malicious if SRN Rank Value>NRP Rank Value.An alert will be triggered if SRN Rank Value for each node exceeds the NRP Rank Value.

    Rule#3:Power Consumption Behavior

    The third proposed rule aims to detect Power Consumption Behavior using the following rule:

    Here,this the predetermined threshold,configurable and determined by experiments,observation,and analysis under normal and abnormal conditions.The Power Consumption(Node)for each node is calculated.An alert will be triggered if the sum of Power Consumption for each node exceeds theth.

    4.4.2 Unweighted Voting Method for Detecting Sinkhole Attack

    The proposed approach employs an unweighted voting method to correctly identify sinkhole anomalies,where each voter or rule carries equal weight.This means that voters do not express apreference for one candidate over another,making the method less complex as no intricate measures are involved[43].The detection of a sinkhole attack is achieved by applying a majority voting rule to the outcomes of the behavioral rules.In particular,the unweighted voting method requires a majority of over 65%to determine the presence of a sinkhole attack based on the voting result[44].Eq.(5)is utilized for the detection of sinkhole attacks.

    The uniqueness of the unweighted voting method lies in the fact that each voter has equal weight in the decision-making process.Unlike other selection methods,such as Preference Ballots or Plurality,the unweighted voting method does not involve complex measures and allows voters to express their preferences for candidates equally.

    The selection of DIO Transaction Frequency,Rank Harmony Behavior,and Power Consumption Behavior as the indicators for the unweighted voting method is based on their relevance and contribution to the identification of sinkhole nodes in the context of the proposed research.These indicators have been carefully chosen among other options based on their ability to capture key characteristics of sinkhole attacks and differentiate them from normal network behavior.

    While the specific indicators may be tailored to the sinkhole attack detection problem in the IoT context,the unweighted voting method itself can be generalized and applied to other related applications,such as in[31].The method can be adapted by selecting appropriate indicators relevant to the problem at hand.For instance,in a different application domain,such as anomaly detection in network traffic,the unweighted voting method can be employed by selecting indicators that capture the abnormal behavior patterns of interest.

    The unweighted voting method offers simplicity and fairness by providing equal weight to each voter or rule in the decision-making process.It allows for a straightforward implementation and interpretation while ensuring that all indicators are considered equally.This generalizability and flexibility make the unweighted voting method useful in various applications where multiple indicators contribute to decision-making processes.

    The proposed approach is exemplified in the following steps:

    1.Collect and transform the power consumption values and the captured ICMPv6 network traffic into a meaningful format.Filter the power consumption data (e.g.,CPU,LPM,TX,and RX)and from the ICMPv6 packet(e.g.,Source,Destination,and Rank)to select specific features.

    2.Cleanse the data to reduce traffic volume by fixing or removing corrupted,incorrectly formatted,duplicate,or incomplete data within the dataset.

    3.Perform feature selection to decrease the size of the features by selecting the most significant features that contribute to detecting sinkhole attacks.

    4.By analyzing the selected features,utilize behavioral indicators to identify suspicious nodes based on abnormal behavior in RPL networks.The selected features of the ICMPv6 and power consumption from the previous step are inputted into this stage to identify abnormal behavior of the sinkhole attack in RPL-based networks.

    5.In the detection step,two sub-steps are involved:

    a.Rule-Based: Identify suspicious nodes by analyzing the ICMPv6 and power consumption features using specific rules with thresholds.

    b.Unweighted Voting Method: Utilize this method to identify sinkhole anomalies correctly.A sinkhole attack is detected when the results of the rules are received,and a majority voting rule requires a majority of greater than 50%to determine whether there is a sinkhole attack or not,according to the voting result from the UVM.

    5 Experimental Results

    This section explains the dataset used to evaluate the proposed approach and provides insight and discussion regarding the experimental results.

    5.1 Dataset

    The RPL-NIDDS17 dataset evaluates UVM regarding detection accuracy,false-positive rate,and power consumption.To detect sinkhole attacks,to detect sinkhole attacks,the UVM reads the data,and when any of the rules are met,an alert will be triggered to the unweighted voting method.The traffic will be considered an attack if the Sum(Triggers)exceeds 65%.

    The RPL-NIDDS17 dataset contains seven types of modern routing attacks(Sinkhole,Blackhole,Selective Forwarding,Clone ID,Sybil,Hello Flooding,and Local Repair attacks).The analysis of the RPL-NIDDS17 dataset involves evaluating four machine-learning classifiers[45,46].

    NetSim is a tool used to create the RPL-NIDDS17 dataset.The IoT network includes a gateway,sensor nodes,wired nodes,and a router to create the dataset,as shown in Fig.8.

    Figure 8:ELNIDS architecture

    The RPL-NIDDS17 dataset consists of twenty-two attributes,such as Time,Source Destination ID,Packet Type Transmission Control Protocol (TCP),ICMPv6,User Datagram Protocol (UDP),Attack Category,and Label(Normal or Attack)[45,47,48].

    5.2 Hardware and Software Requirements

    The following are the specifications of the hardware used in the proposed approach:

    ? Processors:64-bit Intel?Core i5,2.4 GHz

    ? Hard Drive:250 GB

    ? RAM:12 GB

    ? Network Interface Card:Intel?dual-band Wireless AC 8260

    The following are the specifications of the software used in the proposed approach:

    ? Operating Systems:Ubuntu 12.04,Microsoft Windows 10 Pro(64-bit)

    ? WSN Operating System:Contiki v2.7

    ? Sensor Simulator:COOJA Network Simulator

    ? Hypervisor:VMware Workstation Player 12

    ? Data Cleansing:OpenRefine v3.5.1

    ? Database:Structured Query Language(SQL)Server Management Studio 2017,v17.8.1

    ? Feature’s Selection:WEKA v3.9.5

    ? Network Monitoring Tools:Wireshark v3.2.3

    5.3 Results of Feature Selection Stage

    Sixteen features with the highest ReliefF algorithm value weights are eventually selected and nominated as they contribute to detecting sinkhole attacks.The result of field ranking using the ReliefF algorithm in WEKA tools is shown in Table 2.

    Table 2:List of selected features

    5.4 Results of Behavioral Indicators Stage

    This stage aims to identify suspicious nodes based on abnormal behavior in RPL-based networks by analyzing the features listed in Table 2.The features for abnormal behavior are illustrated in the previous step for detection purposes.

    5.4.1 Detection of DIO Transaction Frequency

    The DIO Transaction Frequency behavior occurs when the quantity of DIO messages reaches its highest level,allowing the determination of a packet as malicious or not [17,49].An abnormal frequency of DIO transmission is observed when the number of released DIO messages exceeds the threshold value.Once the total DIO Transaction Frequency exceeds the threshold value,it indicates that the attack has damaged the DODAG routes.Therefore,the instability of DIO messages may indicate a potential attack.Meanwhile,an alert is triggered by the IDS to proceed to the next stage(Sinkhole Attack Detection).Table 3 displays the DIO Transaction Frequency behavior records for the RPL-NIDDS17 datasets between the parent and destination nodes,as shown in Fig.9.

    Table 3:DIO transaction frequency records

    Figure 9:DIO transaction frequency result

    The RPL-NIDDS17 dataset provides insights into the DIO transmission frequency behavior of Node 07,Node 17,and Node 18.By comparing the total number of DIO transaction messages at minute four(SUM(DIO_Current_Messages))with the threshold represented by the total number of DIO transaction messages at minute three (SUM (DIO_Previous_Messages)),we can determine if there is a potential attack.If the current DIO transaction messages exceed the previous threshold,indicating abnormal behavior,Node 07 is identified as the attacker,confirming that the observed DIO transmission frequency behavior results from a sinkhole attack.Furthermore,Rule No.1 is applied to validate the detection if the sum of DIO transmission messages exceeds the threshold value defined in Eqs.(1)and(2)are considered abnormal behavior and categorized as suspicious.The DIO frequency behavior is then input for the unweighted voting method in the Sinkhole Attack Detection process.

    5.4.2 Detection of Rank Harmony Behavioral Indicators

    The core concept behind Rank Harmony behavior is that nodes in an RPL network are assigned ranks based on their position relative to the root,and their ranks should always be higher than their parent nodes to maintain acyclicity.However,in a sinkhole attack,malicious nodes falsely claim to have better ranks than others,tricking neighboring nodes into selecting them as their preferred parent nodes in the RPL network.This allows the attacker,who has a lower rank,to position themselves closer to the root.By manipulating routing metrics,the malicious node deceives neighboring nodes into establishing communication.

    The Rank Harmony value is calculated and monitored to detect such sinkhole attacks.If the Rank Harmony value exceeds predefined thresholds,it may indicate the presence of an attack.The instability of Rank Harmony values can serve as an indication of a potential attack.Whenever a Rank Harmony behavior event is detected,an alarm is triggered and forwarded to the Sinkhole Attack Detection stage for further analysis.

    By examining the RPL-NIDDS17 dataset,it is observed that Node 07 has a higher Rank Harmony value compared to its parent Node 01.This discrepancy in ranks indicates the presence of Rank Harmony behavior in the dataset.Consequently,in Table 4,Node 07 is labeled as an attacker,affirming that the observed Rank Harmony behavior results from the sinkhole attack.

    Table 4:Rank harmony records

    As a result of applying Rule No.2,it has been confirmed that the NRP Rank Value exceeds the SRN Rank Value;therefore,it is considered suspicious behavior.Rank Harmony behavior results are used as input to the unweighted voting method in the Sinkhole Attack Detection.

    5.4.3 Detection of Power Consumption Behavioral Indicator

    Power consumption values are obtained from passive nodes,and an increase in the power consumption values for CPU,LPM,TX,and RX indicates an unstable network routing topology.Conversely,a decrease in power consumption values suggests network stability.By analyzing the power consumption of each node,the impact of the sinkhole attack can be determined.Table 5 describes the power consumption behavior for the sinkhole node in the RPL-NIDDS17 dataset.

    Table 5:Power consumption records for sinkhole(Node 07)—RPL-NIDDS17 dataset

    As a result of applying Rule No.3,it has been confirmed that the power consumption exceeds the threshold value of 1 mW,indicating suspicious behavior.This increase in power consumption is caused by the sinkhole node collecting traffic from nearby nodes.The sinkhole node receives and processes TX and RX,generating higher power consumption.Table 6 shows the power consumption without the sniffer node,while Table 7 shows the power consumption with the node.

    Table 6:Power consumption(mW)without sniffer node—RPL-NIDDS17 dataset

    The power consumption results presented in Tables 6 and 7 provide insights into the impact of the proposed passive sniffer node on the overall network power consumption.Without the sniffer node,the average power consumption of the entire network is measured at 0.8004 mW.However,when the sniffer node is introduced,the average power consumption slightly increases to 0.8102 mW.This comparison indicates that the average power consumption of the network remains nearly unchanged with the inclusion of the sniffer node,even in the absence of an attack.These findings suggest that the proposed passive sniffer node does not impose a significant power consumption overhead on the network.

    These results are significant as they demonstrate that the proposed passive sniffer node can be seamlessly integrated into the network without causing a notable increase in power consumption.This is crucial for ensuring the practicality and efficiency of the network,as it allows for continuous monitoring and detection of attacks without compromising the overall power efficiency of the system.Fig.10 shows the power consumption results.

    The analysis of power consumption behavior is used as input to the unweighted voting method to detect Sinkhole attacks.

    Figure 10:Power consumption result

    5.5 Comparison with ELNIDS Approach

    This section compares the detection accuracy between the UVM and ELNIDS approaches using the RPL-NIDDS17 dataset,as illustrated in Table 8.

    Table 8:Comparison between UVM and ELNIDS on false-positive rate and detection accuracy rate

    Table 8 shows that the ELNIDS approach achieves the highest detection accuracy rate of 94.5%.Conversely,the lowest detection accuracy rate observed is 77.8%.Furthermore,the simulation results presented in Table 8 illustrate that the UVM approach achieves a 100%detection accuracy rate when utilizing the unweighted voting method,whereas,without the unweighted voting method,the UVM approach achieves a detection accuracy rate of 90% with a false-positive rate of 0.2%.The superior detection accuracy of the UVM approach compared to ELNIDS can be attributed to its utilization of three indicators supported by rules and an unweighted voting method.

    5.6 Discussion

    The results in Table 8 demonstrate that the UVM approach achieves a higher detection accuracy than ELNIDS,as the experimental findings support.This can be attributed to UVM’s utilization of five indicators backed by rules and unweighted voting methods.In contrast,although ELNIDS accurately detects known attacks through its signature-based intrusion detection technique,its reliance on only two indicators,power consumption and ranking,can lead to the failure of attack detection if either of these indicators is not triggered.

    By employing unweighted voting methods,UVM leverages its three major behavioral indicators,namely Rank Harmony,DIO Transaction,and power consumption behavior,resulting in significantly improved detection accuracy.This highlights the effectiveness of UVM in detecting sinkhole attacks within RPL networks compared to ELNIDS.

    Additionally,regarding power consumption,UVM demonstrates the ability to meet the requirements of constrained nodes without increasing energy usage.This contributes to conserving energy,prolonging battery life,and reducing power consumption.In contrast,ELNIDS consumes considerable power due to the necessity of maintaining an extensive attack signature database.The passive node,which collects data without impacting other constrained nodes,measures power consumption with and without its presence.Notably,the average power consumption without the passive node is nearly identical to the average power consumption with the passive node and without any attacks.The passive node,connected through a wired network,ensures it does not interfere with the power supply of normal nodes,aligning with the primary objective of proposing an approach for detecting sinkhole attacks in RPL-based IoT networks with low power consumption.

    6 Conclusion and Future Work

    This paper introduces the UVM as a solution for identifying sinkhole nodes.UVM utilizes three key behavioral indicators,namely DIO Transaction Frequency,Rank Harmony,and Power Consumption,carefully selected for their significant role in detecting sinkhole attacks.These indicators and relevant features from previous research form the foundation of the UVM method.UVM employs an unweighted voting mechanism,enhancing its effectiveness in accurately identifying sinkhole nodes.To evaluate the effectiveness of the UVM in detecting sinkhole attacks on RPL networks for IoT,we conducted experiments using a dataset generated with actual sinkhole attack traffic.The results demonstrate that UVM achieves a high level of accuracy in detecting sinkhole attacks.Without the unweighted voting method,the detection rate is 90%,while with the unweighted voting method,it reaches 100%.The false-positive detection rate is significantly low at 0.2%,with improvement percentages ranging from 12.2% to 5.5%.For future research,there are several avenues to explore.Efforts can be made to expand the applicability of the proposed method to detect other types of attacks on RPL-based networks,such as selective-forward and blackhole attacks.Also,conducting experiments using diverse datasets from different network environments will provide valuable insights.Additionally,exploring the use of real-world testbeds or simulations that closely mimic real-world network conditions will help evaluate the performance of the proposed approach in terms of detection accuracy and power consumption.Furthermore,we intend to conduct additional experiments and observations to identify other behavioral indicators that can assist in detecting sinkhole attacks.

    Acknowledgement:Authors would like to acknowledge the support of the Deanship of Scientific Research at Najran University for this research through Research Groups at Najran University,Saudi Arabia.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Najran University for this research through a Grant (NU/RG/SERC/12/50) under the Research Groups at Najran University,Saudi Arabia.

    Author Contributions:Study conception and design:Al-Sarawi.Shadi,Alabsi.Basim;data collection:Anbar.Mohammed,Rihan.Shaza;analysis and interpretation of results: Anbar.Mohammed,Al-Sarawi.Shadi;draft manuscript preparation: Aladaileh.Mohammad,Rihan.Shaza.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data supporting this study’s findings are available from the corresponding author of[34]upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品在线美女| 亚洲第一青青草原| 日本av手机在线免费观看| 国产福利在线免费观看视频| 黄色 视频免费看| 国产老妇伦熟女老妇高清| 美女主播在线视频| 看十八女毛片水多多多| 精品亚洲成国产av| av天堂久久9| 视频区图区小说| bbb黄色大片| 日本一区二区免费在线视频| 少妇人妻久久综合中文| 狠狠精品人妻久久久久久综合| 欧美日韩国产mv在线观看视频| 各种免费的搞黄视频| 最近中文字幕2019免费版| 2021少妇久久久久久久久久久| 国产男人的电影天堂91| 亚洲精品自拍成人| a级片在线免费高清观看视频| 韩国精品一区二区三区| 久久精品国产综合久久久| 国产精品免费大片| 久久这里只有精品19| 亚洲激情五月婷婷啪啪| 欧美 日韩 精品 国产| 午夜福利影视在线免费观看| 亚洲国产精品一区三区| 久久九九热精品免费| 日本a在线网址| 人体艺术视频欧美日本| 午夜福利一区二区在线看| 另类亚洲欧美激情| kizo精华| 1024香蕉在线观看| 国产精品国产av在线观看| 国产精品香港三级国产av潘金莲 | 99国产精品免费福利视频| 巨乳人妻的诱惑在线观看| 另类精品久久| 高清欧美精品videossex| 精品卡一卡二卡四卡免费| 日日摸夜夜添夜夜爱| 校园人妻丝袜中文字幕| 亚洲欧美成人综合另类久久久| 99香蕉大伊视频| 99久久精品国产亚洲精品| 中文精品一卡2卡3卡4更新| 久久久久国产一级毛片高清牌| 欧美中文综合在线视频| 丰满迷人的少妇在线观看| 9色porny在线观看| xxxhd国产人妻xxx| 免费在线观看视频国产中文字幕亚洲 | 亚洲国产精品999| 亚洲,欧美精品.| 一本一本久久a久久精品综合妖精| 欧美黄色片欧美黄色片| 亚洲av美国av| 国产老妇伦熟女老妇高清| 亚洲,一卡二卡三卡| 日韩制服骚丝袜av| 一二三四社区在线视频社区8| 亚洲欧美激情在线| 亚洲国产欧美网| 91麻豆av在线| 欧美日韩成人在线一区二区| 亚洲人成77777在线视频| 亚洲第一青青草原| 一本一本久久a久久精品综合妖精| 国产在线免费精品| 女性生殖器流出的白浆| 老司机影院毛片| 性色av乱码一区二区三区2| 国产成人精品久久二区二区91| 久久久亚洲精品成人影院| 国产精品一国产av| 亚洲伊人久久精品综合| 国产成人欧美在线观看 | 七月丁香在线播放| 亚洲免费av在线视频| 免费不卡黄色视频| 久久免费观看电影| 亚洲一码二码三码区别大吗| 午夜福利免费观看在线| 国产精品久久久人人做人人爽| 男人舔女人的私密视频| 97人妻天天添夜夜摸| 女人爽到高潮嗷嗷叫在线视频| xxxhd国产人妻xxx| 亚洲精品国产一区二区精华液| 日韩一卡2卡3卡4卡2021年| 午夜老司机福利片| 久久久久久久久久久久大奶| 久久人妻福利社区极品人妻图片 | 欧美精品一区二区免费开放| 女性生殖器流出的白浆| 欧美变态另类bdsm刘玥| 18禁国产床啪视频网站| 国产欧美亚洲国产| 国产熟女午夜一区二区三区| 一本—道久久a久久精品蜜桃钙片| 一级毛片 在线播放| 欧美少妇被猛烈插入视频| 丝袜美足系列| 九色亚洲精品在线播放| 黑人巨大精品欧美一区二区蜜桃| 久久久久久久大尺度免费视频| 久久精品国产综合久久久| 久久久精品国产亚洲av高清涩受| 精品熟女少妇八av免费久了| 日本午夜av视频| 极品人妻少妇av视频| 国产成人一区二区三区免费视频网站 | 日韩视频在线欧美| 成人午夜精彩视频在线观看| 免费在线观看完整版高清| 90打野战视频偷拍视频| 美女脱内裤让男人舔精品视频| 国产福利在线免费观看视频| 男女下面插进去视频免费观看| 天天操日日干夜夜撸| 1024视频免费在线观看| 欧美日韩视频精品一区| 少妇人妻久久综合中文| 2018国产大陆天天弄谢| 久久午夜综合久久蜜桃| 亚洲精品av麻豆狂野| 一区二区av电影网| 美女主播在线视频| 久久精品国产亚洲av高清一级| 亚洲第一青青草原| 久久久久精品人妻al黑| 91成人精品电影| 精品少妇一区二区三区视频日本电影| 韩国高清视频一区二区三区| 9热在线视频观看99| 九色亚洲精品在线播放| 亚洲熟女毛片儿| 丝瓜视频免费看黄片| 精品视频人人做人人爽| 高清视频免费观看一区二区| 国产成人精品久久久久久| 日本午夜av视频| 国产高清videossex| 亚洲精品av麻豆狂野| 老司机在亚洲福利影院| 国产无遮挡羞羞视频在线观看| 亚洲国产毛片av蜜桃av| 日本黄色日本黄色录像| 久久亚洲国产成人精品v| 黄色视频不卡| 免费高清在线观看日韩| 精品人妻熟女毛片av久久网站| 午夜福利一区二区在线看| 亚洲欧美色中文字幕在线| av在线老鸭窝| 国产日韩欧美亚洲二区| 精品国产国语对白av| 高潮久久久久久久久久久不卡| 欧美日韩亚洲国产一区二区在线观看 | 永久免费av网站大全| 男女之事视频高清在线观看 | 超色免费av| 老鸭窝网址在线观看| 国产有黄有色有爽视频| 国产亚洲欧美在线一区二区| 成在线人永久免费视频| 18在线观看网站| e午夜精品久久久久久久| 亚洲情色 制服丝袜| 久热爱精品视频在线9| 亚洲成人免费av在线播放| www.999成人在线观看| 伊人亚洲综合成人网| 精品一区二区三区四区五区乱码 | 日韩中文字幕视频在线看片| 99热网站在线观看| 在线av久久热| 欧美日韩视频高清一区二区三区二| 中文乱码字字幕精品一区二区三区| 亚洲精品中文字幕在线视频| 欧美精品高潮呻吟av久久| 亚洲国产毛片av蜜桃av| 十八禁网站网址无遮挡| 久久免费观看电影| 七月丁香在线播放| 国产高清国产精品国产三级| 超碰成人久久| 亚洲av在线观看美女高潮| 蜜桃在线观看..| 黑丝袜美女国产一区| 久久精品亚洲av国产电影网| 国产成人免费观看mmmm| 久久久久久久精品精品| 手机成人av网站| 嫩草影视91久久| 欧美激情 高清一区二区三区| 黄色一级大片看看| 嫩草影视91久久| 欧美在线黄色| 蜜桃国产av成人99| 亚洲中文字幕日韩| 国产欧美日韩一区二区三区在线| 又紧又爽又黄一区二区| videos熟女内射| 久久人人爽人人片av| a级毛片黄视频| 男人舔女人的私密视频| 国产真人三级小视频在线观看| h视频一区二区三区| 性色av乱码一区二区三区2| 国产熟女午夜一区二区三区| 久久精品久久精品一区二区三区| 麻豆乱淫一区二区| 欧美变态另类bdsm刘玥| 男女之事视频高清在线观看 | 国产精品三级大全| 91九色精品人成在线观看| 免费在线观看影片大全网站 | 免费少妇av软件| 国产精品二区激情视频| 日韩av在线免费看完整版不卡| 免费在线观看黄色视频的| 又粗又硬又长又爽又黄的视频| 黄色毛片三级朝国网站| 欧美人与性动交α欧美软件| 美女国产高潮福利片在线看| a级毛片黄视频| 婷婷成人精品国产| 下体分泌物呈黄色| 久久久久久免费高清国产稀缺| 亚洲av成人不卡在线观看播放网 | 99久久人妻综合| 日韩 欧美 亚洲 中文字幕| 久久精品国产亚洲av涩爱| 国产熟女欧美一区二区| 1024视频免费在线观看| 久久久精品国产亚洲av高清涩受| 亚洲欧洲精品一区二区精品久久久| 高清不卡的av网站| 亚洲欧美清纯卡通| 少妇粗大呻吟视频| 国产精品香港三级国产av潘金莲 | 99久久精品国产亚洲精品| 国产精品人妻久久久影院| 我的亚洲天堂| 亚洲精品在线美女| 宅男免费午夜| 日韩一本色道免费dvd| 国产精品 欧美亚洲| 少妇 在线观看| 午夜福利,免费看| 久久精品亚洲av国产电影网| 日韩大片免费观看网站| 99国产精品99久久久久| 丝瓜视频免费看黄片| 看免费成人av毛片| 久久精品成人免费网站| 亚洲一码二码三码区别大吗| 最黄视频免费看| 一区二区av电影网| 欧美大码av| 九色亚洲精品在线播放| 亚洲精品久久成人aⅴ小说| 免费观看av网站的网址| 极品人妻少妇av视频| 夫妻午夜视频| 99国产精品一区二区三区| 久久天堂一区二区三区四区| 免费看十八禁软件| 中国国产av一级| 亚洲精品成人av观看孕妇| 一区二区日韩欧美中文字幕| 婷婷色麻豆天堂久久| 欧美大码av| 妹子高潮喷水视频| 国产91精品成人一区二区三区 | www日本在线高清视频| 波多野结衣av一区二区av| 欧美日韩综合久久久久久| 国产麻豆69| 超碰成人久久| 天天影视国产精品| 男女免费视频国产| 在线av久久热| 中文精品一卡2卡3卡4更新| 咕卡用的链子| 久久精品亚洲熟妇少妇任你| 精品人妻一区二区三区麻豆| 日本91视频免费播放| 成年人免费黄色播放视频| 久久女婷五月综合色啪小说| 久久久亚洲精品成人影院| 嫁个100分男人电影在线观看 | 建设人人有责人人尽责人人享有的| 在线观看人妻少妇| 啦啦啦 在线观看视频| 麻豆国产av国片精品| 99国产精品99久久久久| 极品少妇高潮喷水抽搐| 叶爱在线成人免费视频播放| 18禁裸乳无遮挡动漫免费视频| 中文乱码字字幕精品一区二区三区| 亚洲美女黄色视频免费看| 亚洲国产日韩一区二区| 欧美人与善性xxx| 性高湖久久久久久久久免费观看| 国产精品九九99| 亚洲精品美女久久av网站| 亚洲人成77777在线视频| 电影成人av| 国产成人精品无人区| 纵有疾风起免费观看全集完整版| 亚洲七黄色美女视频| 日韩av不卡免费在线播放| 久久天躁狠狠躁夜夜2o2o | 在线 av 中文字幕| 1024香蕉在线观看| 美女主播在线视频| 婷婷色综合大香蕉| 高清av免费在线| 777久久人妻少妇嫩草av网站| 精品人妻在线不人妻| 精品久久久精品久久久| 亚洲欧美精品自产自拍| svipshipincom国产片| 久久精品久久久久久久性| 国产欧美日韩精品亚洲av| 国产成人av教育| av不卡在线播放| 成在线人永久免费视频| av福利片在线| xxxhd国产人妻xxx| 亚洲图色成人| 黄频高清免费视频| 国产精品一区二区在线不卡| 成人国产一区最新在线观看 | 黄色视频不卡| 大话2 男鬼变身卡| 多毛熟女@视频| 色视频在线一区二区三区| 又大又黄又爽视频免费| 国产精品一区二区免费欧美 | 日本av手机在线免费观看| 午夜91福利影院| 永久免费av网站大全| 自拍欧美九色日韩亚洲蝌蚪91| 欧美成人午夜精品| 十八禁网站网址无遮挡| 国产成人av教育| 亚洲人成电影免费在线| 欧美黑人精品巨大| 欧美日韩综合久久久久久| 观看av在线不卡| 啦啦啦啦在线视频资源| 亚洲欧洲精品一区二区精品久久久| 777久久人妻少妇嫩草av网站| 蜜桃在线观看..| 免费人妻精品一区二区三区视频| 亚洲欧洲精品一区二区精品久久久| av电影中文网址| 男人操女人黄网站| 午夜日韩欧美国产| 亚洲国产毛片av蜜桃av| 久久久亚洲精品成人影院| 精品一区二区三区av网在线观看 | 国产真人三级小视频在线观看| 国产精品麻豆人妻色哟哟久久| 午夜福利乱码中文字幕| 色94色欧美一区二区| 超色免费av| 免费av中文字幕在线| 亚洲专区国产一区二区| 亚洲国产日韩一区二区| 自拍欧美九色日韩亚洲蝌蚪91| 久久久久久免费高清国产稀缺| 美女午夜性视频免费| 久久人妻熟女aⅴ| 18禁黄网站禁片午夜丰满| 亚洲欧美日韩高清在线视频 | 天天添夜夜摸| 一区二区av电影网| 亚洲精品av麻豆狂野| 亚洲中文字幕日韩| 80岁老熟妇乱子伦牲交| 亚洲美女黄色视频免费看| 国语对白做爰xxxⅹ性视频网站| 日韩电影二区| 亚洲av国产av综合av卡| av在线播放精品| 成年动漫av网址| 波多野结衣一区麻豆| 老司机深夜福利视频在线观看 | 亚洲久久久国产精品| 一本—道久久a久久精品蜜桃钙片| 天堂俺去俺来也www色官网| 久久女婷五月综合色啪小说| 国产精品三级大全| 男女午夜视频在线观看| 亚洲av国产av综合av卡| 我要看黄色一级片免费的| 国产三级黄色录像| 国产精品一区二区免费欧美 | 久久亚洲精品不卡| 菩萨蛮人人尽说江南好唐韦庄| 我要看黄色一级片免费的| 国产午夜精品一二区理论片| 国产国语露脸激情在线看| 亚洲欧美一区二区三区国产| 在线精品无人区一区二区三| 七月丁香在线播放| 亚洲一区中文字幕在线| 欧美人与善性xxx| 在线av久久热| 一二三四在线观看免费中文在| 国产精品二区激情视频| 老司机午夜十八禁免费视频| 天天躁日日躁夜夜躁夜夜| 一区二区日韩欧美中文字幕| 一区二区三区精品91| 精品少妇内射三级| 国产在线观看jvid| 国产成人影院久久av| 啦啦啦在线免费观看视频4| 波多野结衣av一区二区av| 亚洲国产欧美一区二区综合| 中文字幕av电影在线播放| 无遮挡黄片免费观看| 免费人妻精品一区二区三区视频| 日日夜夜操网爽| 日本欧美视频一区| 操美女的视频在线观看| 久久99热这里只频精品6学生| 日韩欧美一区视频在线观看| 国产成人91sexporn| 啦啦啦啦在线视频资源| 男女之事视频高清在线观看 | 婷婷色av中文字幕| 美女脱内裤让男人舔精品视频| av天堂久久9| 91成人精品电影| 亚洲一区二区三区欧美精品| 99九九在线精品视频| 免费在线观看完整版高清| 久久久久视频综合| 老司机靠b影院| 免费看十八禁软件| 亚洲一区中文字幕在线| 天天添夜夜摸| 国产1区2区3区精品| 91麻豆精品激情在线观看国产 | 在线天堂中文资源库| 一级毛片电影观看| 91成人精品电影| 母亲3免费完整高清在线观看| 日韩人妻精品一区2区三区| 午夜日韩欧美国产| 另类亚洲欧美激情| 日韩伦理黄色片| 久久人人爽人人片av| 国产精品av久久久久免费| 校园人妻丝袜中文字幕| 欧美黑人精品巨大| 99久久精品国产亚洲精品| 老司机靠b影院| 亚洲精品日韩在线中文字幕| av不卡在线播放| 深夜精品福利| 又大又黄又爽视频免费| 一级黄色大片毛片| 黄色一级大片看看| 亚洲av男天堂| 亚洲国产成人一精品久久久| 人体艺术视频欧美日本| 国产精品亚洲av一区麻豆| 久久99热这里只频精品6学生| 在线亚洲精品国产二区图片欧美| 大陆偷拍与自拍| 男人操女人黄网站| 欧美日韩国产mv在线观看视频| 精品一品国产午夜福利视频| av福利片在线| 一边摸一边做爽爽视频免费| 国产伦人伦偷精品视频| 50天的宝宝边吃奶边哭怎么回事| 欧美黑人精品巨大| 欧美日韩亚洲国产一区二区在线观看 | 色94色欧美一区二区| 看免费av毛片| 亚洲男人天堂网一区| 伦理电影免费视频| 午夜福利乱码中文字幕| 免费久久久久久久精品成人欧美视频| 免费黄频网站在线观看国产| 国产麻豆69| 天天躁夜夜躁狠狠躁躁| 国产精品一国产av| 99热全是精品| 男的添女的下面高潮视频| 一本久久精品| 天天添夜夜摸| 亚洲av片天天在线观看| 久久精品国产亚洲av涩爱| 国产成人啪精品午夜网站| videos熟女内射| 日本午夜av视频| 亚洲欧美激情在线| 国产免费福利视频在线观看| 91精品伊人久久大香线蕉| 亚洲精品美女久久久久99蜜臀 | 免费在线观看影片大全网站 | 中文字幕色久视频| 亚洲国产成人一精品久久久| 日韩一本色道免费dvd| 无限看片的www在线观看| 看免费成人av毛片| 欧美大码av| 成年动漫av网址| 欧美黄色淫秽网站| 自线自在国产av| 制服诱惑二区| 一级a爱视频在线免费观看| 满18在线观看网站| 国产在视频线精品| 国产免费现黄频在线看| 国产高清国产精品国产三级| 午夜影院在线不卡| 亚洲伊人久久精品综合| 久久久久久免费高清国产稀缺| 国产精品久久久久久人妻精品电影 | 亚洲三区欧美一区| 日韩一本色道免费dvd| 亚洲欧美日韩另类电影网站| 日韩人妻精品一区2区三区| 国产黄色视频一区二区在线观看| 伊人亚洲综合成人网| 精品福利观看| 国产精品久久久久久人妻精品电影 | 久热这里只有精品99| av又黄又爽大尺度在线免费看| 国产成人系列免费观看| 日韩中文字幕视频在线看片| avwww免费| 亚洲欧洲日产国产| 精品人妻在线不人妻| 国产视频首页在线观看| 亚洲成人国产一区在线观看 | 国产成人系列免费观看| 精品一区二区三区四区五区乱码 | 国产欧美日韩一区二区三 | 视频在线观看一区二区三区| 国产精品国产三级国产专区5o| 丝袜人妻中文字幕| 99热全是精品| 1024视频免费在线观看| 曰老女人黄片| 国产高清不卡午夜福利| 少妇猛男粗大的猛烈进出视频| 国产三级黄色录像| 亚洲精品第二区| 交换朋友夫妻互换小说| 97人妻天天添夜夜摸| 母亲3免费完整高清在线观看| 国产精品免费视频内射| 欧美亚洲 丝袜 人妻 在线| 亚洲精品在线美女| 波多野结衣一区麻豆| 欧美 日韩 精品 国产| av福利片在线| 乱人伦中国视频| 桃花免费在线播放| 午夜影院在线不卡| 可以免费在线观看a视频的电影网站| 亚洲欧美色中文字幕在线| 国产男人的电影天堂91| 精品人妻在线不人妻| 青春草亚洲视频在线观看| 91精品三级在线观看| 久久 成人 亚洲| 精品久久久久久久毛片微露脸 | 国产男人的电影天堂91| 亚洲成人免费av在线播放| 精品国产一区二区久久| 国产高清视频在线播放一区 | 久久久亚洲精品成人影院| 老司机影院成人| 少妇裸体淫交视频免费看高清 | 日韩中文字幕视频在线看片| 久久国产精品男人的天堂亚洲| 国产97色在线日韩免费| av在线app专区| 久久久久视频综合| 美女午夜性视频免费| 久久久国产一区二区| 欧美变态另类bdsm刘玥| 久久午夜综合久久蜜桃| 深夜精品福利| 中文字幕av电影在线播放| 夫妻性生交免费视频一级片| 欧美人与性动交α欧美软件| 在线看a的网站| 9热在线视频观看99| 亚洲精品日韩在线中文字幕| 激情视频va一区二区三区| 99精品久久久久人妻精品| 亚洲少妇的诱惑av| 成人三级做爰电影| 久久亚洲国产成人精品v| 啦啦啦中文免费视频观看日本| 亚洲av日韩精品久久久久久密 | 黄色 视频免费看| 少妇人妻 视频|