• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    2023-12-15 03:58:04RuiQiaoandShiDong
    Computers Materials&Continua 2023年11期

    Rui Qiao and Shi Dong

    Schooomputer Science and Technology,Zhoukou Normal University,Zhoukou,466001,China

    ABSTRACT Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism (ABBCM) is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.

    KEYWORDS Consortium chain;Byzantine;consensus;generation mechanism;Internet of Things;consensus vulnerability

    1 Introduction

    With the great success of the permissionless blockchain application in electronic cryptocurrency,blockchain networks based on decentralized identity authentication and group consensus attract increasing attention.However,limited by the scale,performance,and deployment cost of distributed application systems,permissionless blockchain technology is challenging to use widely.Consortium Blockchain(CBC)inherits the security characteristics of public chain to some extent with the openness that private chain does not provide,so more research focuses on CBCs [1-3].The CBC limits the proposer set to a few known nodes and relies on a trusted service or consortium organization to authenticate the nodes.Based on proof of interest of chain or Byzantine Fault Tolerance(BFT),CBC proposes new blocks in the way of fault-tolerant consensus and verifies new transactions without needing confirmations,thus reducing the influence of potential Byzantine nodes on the system.Moreover,liquidity is achieved by deploying and running smart contracts on CBCs [4],of which the efficiency is significantly higher than that of the permissionless public chain driven by the proofof-work mechanism.With the continuous expansion of the application scenarios of CBC in recent years,the diversity and durability of the services it can provide have been improved unprecedentedly.Therefore,CBC provides a new way for identity authentication and trust transfer among parties in the network[5-7].

    The consensus mechanism of CBC ensures the consistency of contents stored by each node in the distributed ledger and protects data from unauthorized access,which is important for realizing the scalability,transaction speed,transaction certainty,and security of CBC[8,9].The consensus mechanism of CBC is constantly improved to maintain compatibility of high efficiency and scalable applications such as side chain and sharding mechanisms[10-12].Users of the CBC can create parallel and separate CBCs through the Application Program Interface (API) and set the initial consensus mechanism,allowing different parallel and separate CBCs belonging to the same consortium organization to adopt different consensus mechanisms.Meanwhile,the consensus mechanism of each parallel and separate CBC can be upgraded through voting at any time.The system can reach a consensus safely among several side chains or sharding chains by deploying smart contracts in CBC.

    However,under the environment of a Byzantine partition consortium network,the information service entities of heterogeneous CBCs interact frequently and lack collaborative management,making it difficult for the data owner to control the access of other trusted domain entities to the data,resulting in the risk of data being stolen,tampered with and replayed when the data is shared across domains[13].Chen et al.[14]proposed a blockchain-based cross-domain data-sharing method for the Internet of Things (IoT),which uses the threshold proxy re-encryption method to process the ciphertext to avoid collusion between malicious agents and visitors.Yu et al.[15]proposed an industrial IoT datasharing scheme based on blockchain and proxy re-encryption,where cloud servers verify whether user attributes meet the access policy and generate decryption parameters to send to users when data users request cross-domain data.Existing consensus mechanisms can satisfy the scalability or security of distributed systems,but it is impossible to do both as long as the consensus mechanism of the final determination of block conflict is different and the impact of system scalability on security is also different.Thus,the consensus mechanism based on asynchronous communication still faces challenges.Therefore,it is of great academic significance and extensive application value to further research the consensus mechanism of CBC to improve the security and scalability of the partitioning network consensus mechanism in heterogeneous CBCs based on privacy protection and increase the efficiency of trust transfer and data sharing between different trust domains[16-19].

    This paper established a new consortium chain generation model to solve the above problems.The rules of chain generation are extracted.The behaviors of nodes are analyzed and verified,based on which the consensus vulnerability of CBCs is deeply analyzed.Based on this,the paper proposes a novel generation mechanism for CBC based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM).The main contributions of this work are as follows:

    (1)A new generation model of CBC is established.The influence of logical and physical topology structure on the CBC performance is analyzed from the perspective of the chain generation process.The single-chain generation rule is given to avoid chain forking.

    (2) The node behavior is analyzed and verified.Based on the node behavior,the consensus vulnerability of CBCs is deeply analyzed.The normalized verification node aggregation index is obtained to represent the consensus ability of consortium institutions.

    (3) A novel CBC generation mechanism,ABBCM,based on asynchronous binary Byzantine consensus,is proposed,which extends the general definition of Byzantine consensus and allows a definite set of consensus values to combine multiple proposals.The experimental results show that under the four classical Byzantine node attack behaviors,BA1 to BA4,the ABBCM obtains better time delay than the Coin,a classical random Byzantine consensus mechanism,and can meet the throughput of most IoT applications.

    This paper is structured as follows.Section 2 describes the related work of CBCs and consensus algorithms.Section 3 analyzes the effect of logical and physical topology on the CBC performance from the perspective of chain generation and gives the single chain generation rule avoiding chain forking.Section 4 analyzes the consensus vulnerability of CBCs based on node behavior.Section 5 introduces a novel consortium chain generation mechanism based on asynchronous binary Byzantine consensus.In Section 6,the proposed mechanism is simulated,and the results are discussed.Section 7 concludes with lessons learned and a plan for future work.

    2 Related Works

    Decentralized applications based on CBC have been involved in data governance [20],cloud storage [21],IoT [22],supply chain [23],and other fields to establish a trusted environment for stakeholders,achieving trusted and durable services.However,its low scalability and throughput limit the performance of the hosted decentralized applications.The section enfolds works to improve the performance of CBCs in recent years: mainstream platforms and consensus mechanisms.Various works related to the cross-domain consensus of CBCs are also compared based on research description,techniques,and limitations.

    2.1 CBC Platforms

    The mainstream CBC platforms include HyperLedger,Corda,and Quorum.In 2015,led by the Linux Foundation,International Business Machines Corporation (IBM),Intel,Cisco,and others announced the establishment of the HyperLedger project,which provides open-source reference and implementation for transparent,public,and decentralized enterprise-level distributed ledger technology.It also introduces blockchain into the application of distributed consortium ledger for the first time,which is grounds for building an efficient business network based on blockchain in the future [24-27].Like Hyperledger,Corda uses a distributed notary mechanism to meet growing business demands [28,29].However,the distributed consensus mechanism’s performance between nodes significantly impacts ledger synchronization between nodes and system performance.This project provides consensus mechanism selection strategies for different businesses.For example,in applications with high trust between nodes,Raft,Paxos,and other Crash Fault Tolerance (CFT)algorithms are selected to achieve high system performance.

    On the contrary,the BFT class algorithm is applied to obtain higher system security and reliability.Subsequently,JPMorgan launched a distributed ledger protocol,Quorum,based on the Raft consensus mechanism based on Ethereum.It greatly improved the system performance by introducing the Enclave module with transaction isolation and specific encryption functions to realize parallel operation [30,31].Although the implementation schemes of the above CBC platforms are different,they pursue usability and scalability to ensure performance and adapt to different industries’requirements.

    2.2 Consensus Mechanism Based on CBCs

    Based on the existing CBC platform,much research has been done to improve its performance[32].Some performance-driven consensus protocols of CBCs ensure ledger consistency and partition fault tolerance through the delegation mechanism [33-37] but reduce the number of core nodes participating in the consensus and the security brought by system decentralization.Sun et al.[38]proposed a blockchain-based on-board social network data-sharing system.This scheme can realize one-to-many data sharing,but the identity of the shared entity needs to be determined in advance,making it difficult to realize large-scale and fine-grained data sharing.Su et al.[39] proposed an authorization Byzantine fault-tolerant algorithm based on node reputation,which can reach consensus among the various authorization partitions in CBCs.Yang et al.[40]built a new blockchainbased energy management architecture for IoT-assisted smart homes,enabling smart homes to interact with the grid and other users in an energy Internet system.Based on[40],Abishu et al.[41]proposed a new consensus mechanism,which takes advantage of practical Byzantine fault tolerance and proof of reputation to ensure the high reliability of energy transactions.Zhang et al.[42] proposed a consensus mechanism based on credit risk assessment to realize credit management of counterparties in distributed energy transactions.However,the above consensus research based on CBC still cannot meet high concurrency,low delay,and strong security in Byzantine cross-domain applications.

    There are also researches such as Tezos [43],which proposed an on-chain governance model to generate blocks dynamically and realized the autonomous management of chain ecology by establishing a digital federation,thus simplifying the verification process of transactions and smart contracts,which has a broad application prospect in IoT where the computing power of node is limited.A time segmentation solution of CBC based on the Tezos blockchain was proposed by [44],which allows computing devices with low storage capacity to keep only the latest segmentation ledger instead of the whole consortium ledger.It supports the construction of mobile self-organizing CBC and interchain transactions under a 5G network of heterogeneous vehicle networking and conducts the built-in form verification of some transactions and smart contracts.Qasse et al.[45]tried to solve the crossdomain authentication and trust transfer between independent Inter-blockchain Communication(IBC) systems based on CBC to ensure the security of multi-domain consensus consistency of user identity.Practical Byzantine Fault Tolerance (PBFT) and other BFT consensus protocols do not require verification nodes to solve encryption problems or provide proof of stake to determine the ownership of accounting rights [46,47].Generally,only a subset of participating nodes need to run the BFT protocol.The consensus can be reached by exchanging rounds of messages so that nodes can reach the consensus of the current round before the next round starts.Therefore,it has good anti-fork and potential application prospects in CBCs[48].

    BFT protocol usually can be verified mathematically as long as 2/3 of the participants follow the protocol.Then,the BFT protocol can ensure no block conflicts regardless of whether there is an upper limit of network delay[46].Some studies further explored solutions to improve the performance of the BFT consensus mechanism[49].They proposed that cloud computing and programmable hardware can be used to improve the efficiency of the BFT consensus,allowing the consortium chain to deliver higher throughput,lower latency,and the ability to scale with better network bandwidth and hardware environments.However,BFT-like consensus protocols still face challenges,such as the communication systems’high complexity and weak scalability.

    Table 1 compares the existing research with the proposed work based on the research description,techniques,and limitations.However,these existing solutions usually require some nodes to be coordinators.If the coordinators are non-Byzantine nodes and messages are delivered timely in the asynchronous round,they broadcast their proposals to all nodes in the consortium network.If not,exploiting its power within the consensus round can significantly hinder the performance.This paper proposed a new consortium chain generation mechanism,which can realize cross-domain asynchronous message passing between multi-consortium chains without reducing the system’s security.

    Table 1: Overview of current related research work

    3 Chain Generation Model

    CBC is usually endorsed by institutions to determine the set of verification nodes and the block generation mechanism.In CBC,child blocks are voted from existing blocks to build a growing tree of blocks,the root of which is called a“creation block”.Normally,blocks form a single chain under the block generation mechanism,meaning a parent block has only one child block.However,due to network delays or malicious attacks,one parent block inevitably generates more than one child block to be confirmed.The consensus of CBC is to select only one child block from several unconfirmed child blocks of each parent block when asynchronous nodes are executed asynchronously and sequentially,that is,to select the most authoritative chain from the block tree.

    The following is an Asynchronous node-based CBC Generation Model (ACCGM),of which the practicability and effectiveness are illustrated by experiments.From the perspective of chain generation,the influence of the logical and physical topology structure of the CBC network on its performance is analyzed.Then,a single chain generation rule is given to prevent CBC from forking.

    Definition 1: Asynchronous Node Set (ANS).ANS refers to a set of asynchronous sequential execution nodes and their public keys in CBC,denoted as“Asynchronous”means that each node works at a specific speed that varies over time,and the node’s performance is transparent to others.“Sequence”means that each node performs one atomic step at a time as the work progresses.

    ANS communicates by exchanging data through an asynchronous and reliable point-to-point consortium network.Any pair of nodes can be connected through a two-way communication channel.The transaction will not be lost,copied,or tampered with in the network transmission process,but there is a transaction transmission delay.ni∈Γ represents the CBC node,andBrepresents the block.It is assumed that each node has obtained part or all of the block ledgerBon the chain whent≥0,i.e.,={B,t≥0}.Genesis Blockgis the only block known to all nodes at the initial time,i.e.,={g}.The public and private keys of each node are generated by an elliptic curve encryption algorithm.The node private key is used to verify the new block.

    The ACCGM chain generation model satisfies the following properties:

    Property 1:Recursion.Each new blockBis linked to the current tail blockP(B)by the mapping functionP.The relationship between blocks can be expressed recursively as:

    Eqs.(1) and (2) are recursive representations of blockchains.In Eq.(3),gis a creation block without a parent block.Eq.(4)defines that there is no cycle between blocks.By property 1,we defined a chainC(B)that generates and contains a blockBas the path fromBtog,i.e.,

    Property 2:Locality.Due to network delay,eclipse attack,and other reasons,different CBC nodes are allowed to perceive different block sets in the chain generation model,namely:

    Property 3:Inheritance.In the process of CBC generation,blockchain consensus has inheritance,namely:

    IfB′/=B,andB′∈CB,then,B′is called the ancestor block ofB,whileBis called the descendant block ofB′;ifB′=P(B),thenBis called the direct descendant node ofB′.Property 3 indicates that the state of the blockchain in which the blockBresides is obtained by executing all transactions inCBfrom Genesis Blockg.

    It is assumed that a maximum ofK(3K+1<k)Byzantine nodes are allowed to exist in CBC consisting ofknodes.They may crash,fail to send or receive messages,send any messages,start at any state,perform any state transitions,etc.For example,they can also use honest node“pollution”calculations by sending a message with the same content as a partial honest node error estimate,thus affecting the system consensus.Byzantine nodes cannot delay receiving messages indefinitely but can control the network by modifying the order in which messages are received.In particular,no consensus mechanism can ensure system security and scalability in a completely asynchronous messaging system[36].This paper assumes an upper limit timeδfor message transmission and node computation delay to ensure the system reaches the final consensus after a certain time.

    Definition 2:Upper limit timeδ.If any nodevof CBC receives a message at timet,other nodes in the chain can guarantee the message receive within the time window[t,t+δ].

    In Definition 2,the local time deviation of each node on CBC is incorporated intoδ.It is assumed that the nodenais currently processing a block with a timestamp ofta_Stampwhen a block has a timestamp oftb_Stamp,andtb_Stamp >ta_Stamp,meaning that a block with a timestamp oftb_Stampoccurs in the future.Nodenawill reject the block.Iftb_Stamp <ta_Stamp-δindicates that the block with timestamptb_Stamphas been confirmed,nodenawill also reject the block.

    Definition 3:δ-Validation.Under the upper limit of delay timeδ,the system considers a legitimate verification that at timets_Stamp,which contains the block headers,the highest block heightl(s),the block hashH(s),the hashh(s|u) of the new proposed blocku,and the valid signatureVcreated by the private key of the verifierv,and satisfies Eq.(8) as a correct verification,indicated as〈s,l(s),H(s),H(s|u),ts_Stamp,V〉

    δ.

    It can be seen that the correctness of node voting depends on the chain in which the node votes.Typically,the verifiervbroadcasts a six-tuple voting message:block headersof the current tail node,the heightl(s),the hashH(s)to the block headers,the hashh(s|u)to the new proposed blocku,the timestamp,and the signature of the verifierv.The current tail nodesmust be the ancestor of the new proposed blocku;otherwise,the vote is considered illegal.If the public key of the verifiervis not in the verifier set,then this vote is also illegal.

    Definition 4:If blockson CBC has a descendant blocku,anduobtains the correct votes exceeding the threshold value,then blocksis considered to be determined.That is:

    As a basis for the recursive definition,it is generally assumed that Genesis Blockghas both received the correct votes over the threshold and is final.In Definition 4,blocku′is the descendant block of blocku.If both blocksand its descendant blockuobtain correct votes exceeding the threshold value,then blocksis considered to be determined.sthresholdanduthresholdare the consensus threshold values when the upper limit of delay isδ.

    Definition 5: Absolute majority link.An absolute majority link means that for ordered block(s,u),denoted ass→u,at least one verifier exceeding the threshold has issued a confirmation vote for the current end-of-chain blocksand aδ-verification for the newly packaged blocku.

    Definition 6:Block conflict.Block conflict is considered to occur between blockssanduif and only if the two blockssandusharing the same Genesis Blockgare located in different branches.That is:

    From Definitions 2 to 6,it can be seen that if neither blocksnor blockuon the chain is the ancestor or descendant of the other,the two finally determined blocks conflict.Therefore,the tail blocksis final;either it is the genesis block or if and only if

    (1)The tail blockshas obtained a verification node vote exceeding the threshold;

    (2)There is an absolute majority links→u;

    (3)Blockssandudo not conflict;

    (4)Block heighth(u)=h(s)+1.

    Thus,the single chain generation rule avoiding chain forking and ensuring at most one reasonable block heightn(n >0)on a single alliance chain is obtained:

    Rule 1: Unequal height rule.If ?gmakesPi(s1)=Pj(s2)=g(i >0,j >0),ands1→u1ands2→u2are distinct absolute majority joins,thenh(u1)/=h(u2).

    Rule 2:Exclude rule.If ?gmakesPi(s1)=Pj(s2)=g(i >0,j >0),ands1→u1ands2→u2are distinct absolute majority joins,thenh(s1)<h(s2)<h(u2)<h(u1)is not true.

    Rule 3:Nonoverlapping rule.For any heightn(n >0),at most,one absolute majority joinss→usuch thath(u)=n.

    4 Vulnerability Analysis

    The existing access mechanism of CBC helps improve the ability of the ACCGM-based CBC system to resist external attacks.Still,it cannot identify and prevent the threats of Byzantine nodes to the system.The impact of the behavior of Byzantine nodes in the ACCGM consensus on the system is analyzed as follows.

    4.1 Behavior of Verification Node

    In the ACCGM consensus process,Byzantine nodes can initiate abnormal voting without violating the rules to obtain a final result or retain the intermediate data in the calculation process to infer and snoop the data of other participants.On the one hand,when the verification node initiates non-voting behavior,the correct voting proportion of the verifier will be lower than the consensus threshold,and a consensus block will not be generated.On the other hand,if two or more conflicting validation blocks are generated in the same round due to malicious voting or incorrect behavior of the verifier,either the chain forks or the off-chain governance mechanism is used to support one branch at the expense of the other.Therefore,the analysis of verification node behavior matters in constructing the system incentive mechanism and ensuring the correct formation of CBC.

    The voting behavior of the verification node will be written into the block as a transaction,which can be divided into correct voting,malicious voting,incorrect voting,and no voting.

    A.Correct voting

    If only a single block meets Definition 3 and has verification nodes exceeding the threshold and voting correctly in a certain round,the block will be written into CBC,and each node synchronizes the ledger.

    B.Malicious voting

    Malicious voting means that the verifier votes for two new blocks in the same round simultaneously,which meets Definition 6,thus causing a conflict.

    C.Incorrect voting

    Incorrect voting refers to the situation in which the verifier cannot vote correctly in the same consensus round due to some incorrect behavior.Typical cases of incorrect voting are as follows:

    (1)The verifier sends the vote later,resulting in the vote not reaching CBC within the consensus round.

    (2)Some nodes do not propagate the vote of a verification node,resulting in the vote not reaching CBC within the consensus round.

    (3)The vote does not reach CBC within the consensus round due to network delay.

    (4)The signature of the verifier’s vote is invalid.

    (5)The voting block is not generated in the current highest block.

    D.No voting

    No voting includes no voting of the verification node and voting loss.

    Non-byzantine nodes may produce votes A and C,and Byzantine nodes may produce votes B,C,and D.When dealing with voting transactions,CBC based on ABBCM only processes the correct voting A and malicious voting B defined above;the incorrect voting and no voting are invalid votes and will be ignored.If only correct votes exist,the system will select a single legal block within a specified time cycle and record it in CBC.Otherwise,the system may fail to obtain consensus due to the failure to obtain more than the threshold number of verification signatures in a specific time round,called active failure,or the system forks due to two conflicting blocks being finalized simultaneously,called a security failure.

    The consortium institutions will use the punishment mechanism for cases B,C,and D.The mechanism is affected by the following aspects:

    (1) The larger the proportion of malicious voting nodes,incorrect voting nodes,or non-voting nodes,the more serious the penalty will be.

    (2)Failure to consensus or chain forks will increase punishment.The following is a formal analysis.

    It is assumed thatmblocks(mis constant)are written on a blocksin CBC,and blocksis confirmed by probability,then the Block Finalisation Factor(BFF)of blocksin roundiis:

    wherers,i∈N is the consensus round experienced from blockswriting into CBC to the current roundi.Whenrs,i≥m,h(si)-h(s)<m,it indicates that there are non-consensus rounds inrs,irounds after blocks.For example,the correct voting cannot reach the preset consensus threshold due to the large proportion of malicious voting nodes,incorrect voting nodes,or non-voting nodes.Thus,consensus cannot be obtained.

    vj∈V,0<j≤Mi,whereMiis the total number of verification nodes in roundi,and the vote of verification nodevjin roundiis denoted as

    By analyzing the behavior of validation nodes,the polymerization index of validation nodes was obtained to represent the consensus ability of consortium institutions.The node polymerization indexCifor normalization verification of the mechanism in roundican be expressed as:

    According to the Byzantine node proportiona∈(0,1/3),2/3<(1-a)<1,and whenBFFi <N,|BFFi-N|≥1,soCi∈(0,1).

    4.2 Vulnerability of CBC Consensus

    In the chain generation model ACCGM,the CBC network is partially synchronous,and the transaction transfer between nodes has an upper bound finite delay.Although the verification node can independently choose the time for issuing the voting transaction within each consensus round,it cannot ensure that the voting transaction of each verification node in each round will be synchronized among the CBC nodes before the end of the round.If the voting transaction is issued too early,the verification node will fail to vote on other more competitive blocks within the consensus round.Late issuance of voting transactions may result in activity consensus failure.In addition,the authentication node update transaction is allowed to be sent after only consensus blocks are generated in each consensus round,and the authentication node set is dynamically managed.Therefore,in a single consensus round,it is necessary to consider the impact of network partition,network delay,Byzantine node proportion,verification node state,and other factors on the consensus.Network partition and delay have been explained in the previous section.The following focuses on analyzing the influence of Byzantine node proportion and verification node state on the consensus.

    4.2.1 Consensus Vulnerability Based on Byzantine Node Proportion

    Consortium nodes are divided into ordinary nodes,which sort transactions and package blocks in the underlying chain,and verification nodes,which vote for new blocks;however,they are somewhat interdependent.Ordinary nodes collect and classify transactions,determine the order of transactions in CBC,and write global computer state information(contract variables,etc.)and related data into the block as part of the transaction.The voting transaction sent by the verification node is the same as the ordinary transaction,which needs to be packaged and recorded by the ordinary node.Byzantine ordinary nodes can refuse to include the voting transactions of some verification nodes in their proposed blocks.It can also improve the probability of successful execution of the above attacks by increasing the proportion of Byzantine nodes in a working state,sending out voting transactions in advance in consensus rounds,or even forcing other nodes to perform the same operation by network attacks.

    When enough non-Byzantine nodes are offline in a certain period,the proportion of Byzantine nodes will increase,greatly improving the possibility of chain forking in the system.It is assumed that the proportion of Byzantine nodes in ACCGM-based CBC isa,and the honest nodes working together on the single CBC account for the majority.In the actual working scenario,node offline,network delay,eclipse attack,sybil attack,etc.,will impacta.In the ACCGM-based CBC network,Byzantine nodes in the current tail blocksmay create a longer chain than the current chain.The probability of the above event decreases exponentially to the block height differencemof the forked blocksand the new tail blocks′(s/=s′).When the Byzantine node attacks,if there aremdescendant blocks after the original chain blocks,the probability of generating a longer forked chains′from the blocksis(a/(1-a))m.Whenmis large enough,the above malicious attacks will become impractical.The relationship between Byzantine node proportion and system security is shown in Fig.1.

    Figure 1:The relationship between Byzantine node proportion and system security

    It can be seen that whenais constant,the probability of generating Byzantine chain forking will be significantly lower asmincreases.Whena=1/3,m=9,the probability of generating Byzantine chain forking will be about 5×10-4,almost negligible.However,asaincreases,especially approaches 0.5,the probability of producing a Byzantine chain forking approaches 1 for any value ofm.

    4.2.2 Consensus Vulnerability Based on Node Reputation

    In the ACCGM-based CBC distributed network environment,the initial reputation of the node is provided by the endorsement of the institutions,which is a static trust management mechanism based on authentication and authorization.However,when each node participates in the calculation autonomously,using the initial reputation to evaluate the node often presents a lag to some extent.For example,nodes in the CBC network have the capability of routing and forwarding transactions or blocks.Nodes with high initial reputations hijacked by malicious forces can independently change the forwarding route or discard part of transactions or blocks.If nodes with high initial reputations provide fraudulent services or do not provide services,the system consensus will be seriously threatened.This paper established a node trust model of CBC based on consensus rotation information feedback and proposed a dynamic maintenance mechanism of node reputation relying on weighted trust feedback from nodes to improve the accuracy and dynamic adaptability of node reputation evaluation.The above model is quantitatively evaluated to further analyze the relationship between node reputation and CBC consensus.

    Definition 7:Node reliability evaluation function.The reliability evaluation of nodepto nodeqin consensus roundiis defined as functionf(p,q)i:

    where?is the standard deviation of the trust degree of the consortium institution to the consortium node set.

    Definition 8:Node set trust evaluation function.It is assumed that the number of CBC nodes in each consensus round isk,andη∈(0,1]represents the proportion of verification nodes that normally work within a period.(1-η)represents the proportion of verification nodes that work abnormally,and the institutional credit value changes dynamically withη,then the trust degree of the node set of the consortium institutions in consensus roundican be expressed as Eq.(15).

    In Eq.(15),i=0 indicates that there is no interaction history between nodes in the initial round,so the direct trust degree of the initial round is set asη.

    Before the system reaches a consensus at the beginning of each round,when the value of the trust evaluation functionDΓ,iof the verification node set is lower than the threshold,the set is dynamically adjusted by

    (1)keeping the credit value of the verification node whose value of credibility evaluation function is higher than the preset value in each round unchanged;

    (2)reducing the credibility value of verification nodes whose credibility evaluation function value is lower than the preset value or does not vote;

    (3)removing the verification nodes whose reputation value is lower than the reputation threshold from the set of verification nodes,which will increase the influence of normally working verification nodes in the consortium institutions,significantly reducing the risk of system consensus.

    5 Asynchronous Binary Byzantine Consensus-Based Chain Generation Mechanism

    The above analysis of the influence of network partition,network delay,Byzantine node proportion,verification node state,and other factors on the consensus found that in CBC withK <k/3 Byzantine nodes,the consensus betweenknodes can be probabilistically achieved by using the local random strategy of nodes or the shared common random strategy.However,these solutions typically require a unique coordinator process,sometimes called a leader,to be non-faulty.The advantage is that if the coordinator is non-faulty and the messages are delivered timely in an asynchronous round,then the coordinator broadcasts its proposal to all processes,and this value is decided after a constant number of message delays.The drawback is that a faulty coordinator can dramatically impact the algorithm’s performance by leveraging the power and imposing its value on all.Nonfaulty processes thus have no choice but to decide nothing in this round.Thus,the above method cannot effectively achieve consensus in asynchronous messaging systems.For the above problems,the influence of Byzantine nodes on CBC consensus is further analyzed,and a novel mechanism of CBC generation based on asynchronous binary Byzantine consensus mechanism is presented,which is time optimal and resilience optimal without needing signatures.Unlike a classic(strong)coordinator,the weak coordinator in this mechanism does not impose its value.On the one hand,this allows non-faulty processes to decide a value quickly without the coordinator’s help.On the other hand,the coordinator helps the algorithm terminate if non-faulty processes know that they proposed distinct values that might all be decided.

    The ABBCM-based CBC generation mechanism relies on many-to-many communication of binary values of nodes,extending the common definition of Byzantine consensus and allowing a definite set of consensus values to combine multiple proposals.On the one hand,it is assumed that values proposed only by Byzantine nodes cannot be agreed upon,and non-Byzantine nodes can quickly achieve consensus without the help of coordinating nodes.On the other hand,if the consensus values proposed by non-Byzantine nodes are not consistent,the round of consensus will be terminated early.Let R be a set of consensus values proposed by the node.In the multivariate consensus,R may contain any number of values.To simplify the problem,let R={0,1}in the binary consensus.Assuming that each non-Byzantine node proposes a value for consensus,the binary Byzantine consensus problem can be translated into having each node determine a value in a way that satisfies the following properties:

    ? Certainty.Each non-Byzantine node will eventually propose a value for consensus.

    ? Consistency.No two non-Byzantine nodes determine different values.

    ? Validity.If all non-Byzantine nodes propose the same value for the consensus,the final consensus value will not be something else.

    ABBCM relies on many-to-many communication(binary value broadcast)of node binary values,expressed as BiVa-B.In the BiVa-B instance,each non-Byzantine nodenibroadcasts the current round of binary values for consensus and obtains a set of binary values for consensus proposed by other nodes over the network,stored in the local read-only variable setξi,whereξiis initialized toφ,and the element in setξiis added when a new value is received.

    The following rules define BiVa-B:

    Rule 1: Incremental rule.If at least (κ+1) non-Byzantine nodesnibroadcast the same value R,then each nodeniadds R to its local read-only variable setξi.

    Rule 2: Reverse rule.Ifniis a non-Byzantine node and R ∈ξi,R has been broadcast by a non-Byzantine node.

    Rule 3: Diffusion rule.If a non-Byzantine nodeniadds R to its local read-only variable setξi,eventually,for every non-Byzantine nodenj,there is R ∈ξi.

    Rule 4:Balancing rule.Finally,the local read-only variable setξifor each non-Byzantine nodeniis not empty.

    Based on the above rules,the set of local read-only variablesξifor each non-Byzantine nodeni:(1)becomes non-empty,(2)becomes equal,(3)contains all values broadcast by non-Byzantine nodes,and(4)contains no values broadcast only by Byzantine nodes.

    System modelABBCMk,Kδ[K <k/3]is established below,which can provide strong effectiveness and consistency in asynchronous message communication system,as well as certainty to meet the needs of CBC applications.The local variables involved in nodeniare shown in Table 2,and the main process is shown in Algorithm 1.Nodeniproposes the initial consensus value by calling bin-propose(Ri)in the asynchronous round and assigns Rito the local current estimateestimateiof the binary proposal consensus value;After that,each non-Byzantine node enters a series of asynchronous rounds.In any rotationr,the non-Byzantine nodeniproceeds in three stages.

    Table 2: Local variables of nodes

    Stage 1: Consensus value cleaning to filter out the consensus value proposed by the Byzantine node.Nodenienters the next round and broadcasts its current binary consensus value estimate.In BiVa-broadcast(),nodenireceives the same consensus proposal value fromK+1 nodes and rebroadcasts the value.When R is received from 2K+1 different processes,each nodeniadds it toξi[r]and forwards the value.Also,when BiVa-deliver forwards a consensus proposal value,it is added toξi[r].Finally,the setξof all non-Byzantine nodes becomes non-empty and equal and contains only all the consensus proposal values broadcast by non-Byzantine nodes.

    Stage 2:Consensus value estimate exchange to reach a consensus.At this stage,nodenibroadcasts the message Auxiliary[r](),whose content is c.Nodenithen waits until it receives a set ofαithat satisfy the following two properties:

    ? The values ofαicome from Auxiliary[r]()sets of at least(k-K)different nodes.

    ?αi?ξi[ri].Because the BiVa-broadcast()return values of Byzantine nodes can be filtered out in the first stage,even if Byzantine nodes send their false message set Auxiliary[r](),which contains values proposed only by Byzantine nodes,αiwill also only contain consensus estimates broadcast by non-Byzantine nodes.

    Thus,in any round ofr,αi?{0,1}contains only the values broadcast by non-Byzantine nodes with BiVa-broadcast()algorithm.

    Stage 3: Consensus values converge,a local calculation stage,to determine the candidate of consensus value of nodeni.The convergence process of consensus value depends on the content ofαi.

    ? Ifαicontains a single element R,R becomes the new consensus estimate for nodeniand a candidate for consensus determination.

    ? Ifαi={0,1},nodesnicannot determine the new estimate of consensus value.Since both values are presented by non-Byzantine nodes,to converge uniformly,nican choose one of them as its new estimate of consensus value based on the sharing strategy,for example,b=rmod2,because the value is the same among all non-Byzantine nodes in the same round.

    In the above ABBCM-based CBC generation mechanism,nodeniobtains the consensus value R of the current round by calling decide(R).However,calling decide(R)does not terminate its participation in the algorithm,which means nodenicontinues to execute circularly after the call returns because it may be necessary to help other nodes converge to the determined consensus value in the following two rounds in the node decision-making.

    6 Experiments

    To test the performance of the asynchronous binary Byzantine consensus-based chain generation mechanism proposed in this paper,we built the Ethereum simulation test environment consisting of 100 virtual verification nodes on five servers and compared its performance with“Coin,”the recent randomized algorithm from Mostéfaoui et al.[52]used in the HoneyBadger blockchain.Experiments show that under all our workloads,our mechanism outperforms“Coin,”which is known to terminate in O(1)round in expectation.This is due to the overhead of the Coin implementation that slows down every round and the risks of being unlucky at tossing the coin by increasing the number of rounds needed to decide.Even with Byzantine behaviors,our method is always superior to the latter.

    The experimental platform was CPU Xeon-E5 with memory size 64 G and operating system Ubuntu-64bit.Consortium chainCAwas constructed.The total number of verification nodes isn=100,the proportion of Byzantine nodes is denoted asa,the time interval for consortium chain to construct transactions is denoted as Δ,and the number of consensus transactions in a single round is denoted asτ.

    Considering that the behavior of Byzantine node can greatly affect chain generation based on binary Byzantine consensus,the following four typical Byzantine attack behaviors are constructed for performance testing:

    BA1:Byzantine nodes send bit flip value;when the protocol specification expects to send bit ?b,the Byzantine node sends bitb.

    BA2:Byzantine nodes send the combination of the random value and the flipped value of the bit.

    BA3:Byzantine nodes do not respond to any transactions.

    BA4:Byzantine nodes form consortiums to block the consensus of non-Byzantine nodes in each round by sending messages.

    6.1 Delay Test

    To eliminate the influence of the time interval of constructing transactions on the delay,referring to the previous work[53]and take Δ=1ms,under the four classical attack behaviors BA1 to BA4 of the Byzantine node defined in this paper,the comparison of the delay under the classical Byzantine consensus mechanism Coin[52]proposed by Mostéfaoui et al.is shown in Fig.2.

    Figure 2:Delay comparison between ABBCM and Coin

    As shown in Fig.2,when the Byzantine node proportionagradually increases,the time delay of both ABBCM and Coin increases.The largerais,the more significant the delay increment of the two algorithms is,indicating that the transaction processing delay is positively correlated with the Byzantine node proportion.Under the specific value ofaand the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,the time delay of ABBCM is better than Coin’s.Under the four attacks,the total delay of ABBCM is reduced by 52%compared with Coin.Whena→0+,the transaction delay between ABBCM and Coin tends to be stable.Asaincreases,the transaction delay presents a certain weak robustness under four classical Byzantine node attack behaviors BA1 to BA4.In Fig.2c,under the attack behavior of BA3,ABBCM obtains a minimum average delay of 382 ms.In Fig.2d,under the attack behavior of BA4,ABBCM obtains a maximum average delay of 331 ms.

    6.2 Throughput Test

    (1)The consensus round timeris not limited

    Consensus round timeris not limited,which means thatris set to be large enough so that transactions of block can reach consensus within a time less thanr.In this case,consensus round time will not impact consensus time and throughput.According to the delay test results,ris set as 1 s,the proportion of Byzantine nodesa=33%,the interval for the consortium chain to construct transactions Δ=1ms,and the number of consensus transactions in a single roundτ=10,20,30,40.The throughput test is conducted under the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,of which the results are shown in Fig.3.

    Figure 3:Throughput test under unrestricted conditions

    As can be seen from Fig.3,when consensus round timeris not limited,throughput in four Byzantine attack scenarios increases with the increase of consensus transactions in a single round.In a specific Byzantine attack scenario,when the consensus transactions in a single round increase slowly from 1,the system throughput increases significantly,such as the phase fromτ=10 toτ=20 in Fig.3.When the consensus transactions in a single round increase to a certain extent,the system throughput increment slows down,such as the phase fromτ=30 toτ=40 in Fig.3.Under the four attack scenarios,Byzantine attack BA3 has the weakest impact on system throughput,with a maximum average throughput of 243TPS,which is because the attack mode of Byzantine nodes without any response increases the proportion of non-Byzantine nodes,reducing the consensus time to some extent.On the contrary,Byzantine attack BA4 has the strongest effect on system throughput,with a maximum average throughput of 232TPS.

    (2)The consensus round timeris limited

    Consensus round timeris limited,so settingrto a reasonable value affects consensus time and throughput.According to the delay test results,ris set to 500 ms,the proportion of Byzantine nodesa=33%,the interval for consortium chain to construct transactions Δ=1ms,and the number of consensus transactions in a single roundτ=10,20,30,40.The throughput test is conducted under the four classical Byzantine node attack behaviors BA1 to BA4 limited in this paper,of which the results are shown in Fig.4.

    Figure 4:Throughput test under restricted conditions

    Compared with the throughput test under unrestricted conditions,the system throughput decreases under the four attack modes when the consensus round time is set to 500 ms in Fig.4.Under the same conditions,the average value of the highest throughput decreases by 9.2%,and the average value of the lowest throughput decreases by about 50%.In Fig.4c,under attack BA3,system throughput declines slightly because Byzantine nodes do not respond to anything,which increases the influence of non-Byzantine nodes to some extent and thus weakens the influence of the reduction of consensus round time on consensus efficiency.In Figs.4a and 4d,under attacks BA1 and BA4,the system throughput decreases greatly because the influence of Byzantine nodes reduces the consensus efficiency,failing part of the consensus to be completed within a consensus round time,especially when the number of consensus transactions in a single round is large.In addition,under attack BA4,after Byzantine nodes form a consortium,they cannot control the speed or order of messages from non-Byzantine nodes.However,they can observe and decide the time to send messages according to the time when non-Byzantine nodes receive or forward messages.Thus,they can significantly hinder the consensus progress within the round.

    7 Conclusion

    There is not yet an effective consensus algorithm ensuring safety and liveness in fully asynchronous message-passing systems,and even a single process may cause a consortium chain system to crash.However,the crash failure model is less severe than the Byzantine failure model because if the process commits Byzantine failure,the system cannot reach a consensus.To ensure consensus is reached,a consortium chain generation model based on ANS in the Byzantine environment is established to further analyze the influence of chain structure on its performance,obtaining single chain generation rules to avoid chain forking.On this basis,the influence of network partition,network delay,Byzantine node proportion,and verification node state on the consensus process is further analyzed,and a novel consortium chain generation mechanism based on asynchronous binary Byzantine consensus is proposed.The mechanism neither uses a classical(strong)coordinator nor relies on randomization or signatures,meaning it does not wait for a specific message.The above mechanism shows better consensus efficiency under the four classical Byzantine aggression behaviors and asynchronous environment.In the future,based on the study of the asynchronous binary Byzantine consensus mechanism,the relationship between the effectiveness of multiple Byzantine consensus mechanisms and the behavior of nodes in the chain generation process will be studied to meet the needs of more practical application scenarios.

    Acknowledgement:The authors gratefully acknowledge the helpful comments and suggestions of the reviewers,which have improved the presentation.

    Funding Statement:This work is supported by Henan University Science and Technology Innovation Talent Support Program (23HASTIT029),the National Natural Science Foundation of China(61902447),Tianjin Natural Science Foundation Key Project(22JCZDJC00600),Research Project of Humanities and Social Sciences in Universities of Henan Province(2024-ZDJH-061),Key Scientific Research Projects of Colleges and Universities in Henan Province (23A520054) and Henan Science and Technology Research Project(232102210124).

    Author Contributions:Study conception and design:Rui Qiao;data collection:Shi Dong;analysis and interpretation of results:Rui Qiao,Shi Dong;draft manuscript preparation:Rui Qiao,Shi Dong.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the paper.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人免费观看视频高清| 18禁国产床啪视频网站| 亚洲欧美精品综合一区二区三区| svipshipincom国产片| 99riav亚洲国产免费| 高清视频免费观看一区二区| 丝瓜视频免费看黄片| 热re99久久国产66热| 精品欧美一区二区三区在线| 色精品久久人妻99蜜桃| 男女床上黄色一级片免费看| 国产精品影院久久| 久久久久网色| 91大片在线观看| 99热国产这里只有精品6| 极品教师在线免费播放| 国产xxxxx性猛交| 亚洲欧美激情在线| 男男h啪啪无遮挡| 美女扒开内裤让男人捅视频| 免费人妻精品一区二区三区视频| 大香蕉久久网| 国产精品麻豆人妻色哟哟久久| 亚洲精品乱久久久久久| 亚洲国产欧美一区二区综合| www.999成人在线观看| 涩涩av久久男人的天堂| 曰老女人黄片| 国精品久久久久久国模美| 婷婷丁香在线五月| 亚洲熟女精品中文字幕| 黄片大片在线免费观看| 肉色欧美久久久久久久蜜桃| 99精品欧美一区二区三区四区| 男女床上黄色一级片免费看| 日本精品一区二区三区蜜桃| 美女午夜性视频免费| 美女视频免费永久观看网站| 国产精品亚洲一级av第二区| 少妇 在线观看| 另类亚洲欧美激情| 精品国产亚洲在线| 国产亚洲精品一区二区www | 老司机影院毛片| 他把我摸到了高潮在线观看 | 国产精品亚洲av一区麻豆| 欧美成狂野欧美在线观看| 在线看a的网站| 亚洲精品美女久久久久99蜜臀| 亚洲av电影在线进入| av有码第一页| 极品教师在线免费播放| 99精国产麻豆久久婷婷| 极品教师在线免费播放| 中文字幕另类日韩欧美亚洲嫩草| 叶爱在线成人免费视频播放| 国产伦人伦偷精品视频| 天天操日日干夜夜撸| 国产精品av久久久久免费| 一进一出好大好爽视频| 久久精品aⅴ一区二区三区四区| 在线观看一区二区三区激情| 免费看a级黄色片| 国产xxxxx性猛交| 国产一区有黄有色的免费视频| 日本五十路高清| 国产成人欧美| 成年版毛片免费区| 咕卡用的链子| 午夜福利视频精品| 亚洲欧洲精品一区二区精品久久久| 伦理电影免费视频| 亚洲精品av麻豆狂野| 精品卡一卡二卡四卡免费| 最近最新中文字幕大全电影3 | 国产精品偷伦视频观看了| 亚洲国产精品一区二区三区在线| 国产免费福利视频在线观看| 国产精品 国内视频| 久久天躁狠狠躁夜夜2o2o| 日韩人妻精品一区2区三区| 电影成人av| 汤姆久久久久久久影院中文字幕| 国产色视频综合| 最黄视频免费看| 国产精品秋霞免费鲁丝片| 99久久精品国产亚洲精品| 成人国产av品久久久| 丰满人妻熟妇乱又伦精品不卡| 操出白浆在线播放| 一边摸一边抽搐一进一小说 | 国产一卡二卡三卡精品| 国产精品一区二区精品视频观看| 老司机亚洲免费影院| 一本久久精品| 国产精品久久久久久精品电影小说| 黄色视频在线播放观看不卡| 法律面前人人平等表现在哪些方面| 欧美成狂野欧美在线观看| 国产精品久久久人人做人人爽| 天天躁狠狠躁夜夜躁狠狠躁| 五月天丁香电影| 色婷婷久久久亚洲欧美| 国产免费视频播放在线视频| 成人18禁在线播放| 欧美日韩亚洲国产一区二区在线观看 | 一区在线观看完整版| 亚洲av欧美aⅴ国产| 91av网站免费观看| 午夜福利免费观看在线| 欧美日本中文国产一区发布| 深夜精品福利| 一进一出好大好爽视频| 精品一品国产午夜福利视频| 国产精品久久久av美女十八| 国产精品影院久久| 999精品在线视频| 天堂俺去俺来也www色官网| 手机成人av网站| 久久精品亚洲精品国产色婷小说| 黄色毛片三级朝国网站| 国产在线精品亚洲第一网站| av网站在线播放免费| 日本一区二区免费在线视频| 青草久久国产| 久久精品成人免费网站| 国产成人精品无人区| 久久久久久久久久久久大奶| 精品国产一区二区三区久久久樱花| 亚洲性夜色夜夜综合| 久久人妻熟女aⅴ| 久久中文字幕一级| 19禁男女啪啪无遮挡网站| 精品国产一区二区三区久久久樱花| 色精品久久人妻99蜜桃| 亚洲色图 男人天堂 中文字幕| 欧美亚洲 丝袜 人妻 在线| 久久久久久久精品吃奶| 国产伦人伦偷精品视频| av超薄肉色丝袜交足视频| 久久久久国内视频| 亚洲精华国产精华精| 男女床上黄色一级片免费看| 亚洲伊人色综图| 亚洲精品国产区一区二| 少妇猛男粗大的猛烈进出视频| 人人澡人人妻人| 国产色视频综合| 午夜精品久久久久久毛片777| 日韩大片免费观看网站| 一区二区av电影网| 亚洲成a人片在线一区二区| 亚洲精品乱久久久久久| 男人操女人黄网站| 欧美精品一区二区免费开放| 男人操女人黄网站| 免费观看a级毛片全部| 亚洲成a人片在线一区二区| www.精华液| 怎么达到女性高潮| 王馨瑶露胸无遮挡在线观看| 99九九在线精品视频| 精品少妇内射三级| 国产av国产精品国产| 高清在线国产一区| 免费久久久久久久精品成人欧美视频| 国产成人欧美在线观看 | 午夜福利在线观看吧| 电影成人av| 又大又爽又粗| 亚洲av国产av综合av卡| 亚洲一区二区三区欧美精品| 日韩大码丰满熟妇| 99久久国产精品久久久| 亚洲国产av新网站| 高清av免费在线| 精品国内亚洲2022精品成人 | 人人妻人人澡人人爽人人夜夜| 日韩欧美三级三区| 少妇被粗大的猛进出69影院| 国产淫语在线视频| 热99久久久久精品小说推荐| 热99久久久久精品小说推荐| 成人亚洲精品一区在线观看| 999久久久国产精品视频| 纯流量卡能插随身wifi吗| 国产一区有黄有色的免费视频| 日韩精品免费视频一区二区三区| 91精品三级在线观看| 国产有黄有色有爽视频| 亚洲人成伊人成综合网2020| 欧美日韩福利视频一区二区| 国产欧美日韩一区二区精品| 国产色视频综合| 69精品国产乱码久久久| 欧美日韩一级在线毛片| 人人妻人人澡人人看| 在线av久久热| 狂野欧美激情性xxxx| 欧美另类亚洲清纯唯美| 成人18禁在线播放| 亚洲欧洲日产国产| 国产成人av激情在线播放| 久久久精品94久久精品| 一级毛片女人18水好多| 亚洲欧洲日产国产| 操美女的视频在线观看| 首页视频小说图片口味搜索| 自拍欧美九色日韩亚洲蝌蚪91| 国产亚洲欧美精品永久| 一级毛片电影观看| 真人做人爱边吃奶动态| 久久精品亚洲熟妇少妇任你| 日韩一区二区三区影片| 999久久久国产精品视频| 久久久国产欧美日韩av| 久久久精品免费免费高清| 免费在线观看完整版高清| 在线天堂中文资源库| 极品教师在线免费播放| 性色av乱码一区二区三区2| 亚洲国产欧美一区二区综合| 嫁个100分男人电影在线观看| av福利片在线| 亚洲精品乱久久久久久| 91老司机精品| 黄色a级毛片大全视频| 久久精品国产综合久久久| 曰老女人黄片| 美女视频免费永久观看网站| 免费看a级黄色片| 日韩精品免费视频一区二区三区| 人妻一区二区av| 大香蕉久久成人网| 亚洲第一欧美日韩一区二区三区 | 欧美大码av| 少妇猛男粗大的猛烈进出视频| 夜夜骑夜夜射夜夜干| 国产精品98久久久久久宅男小说| 蜜桃国产av成人99| 在线观看一区二区三区激情| 一个人免费在线观看的高清视频| 欧美精品一区二区免费开放| 欧美中文综合在线视频| 色播在线永久视频| 中文字幕制服av| 他把我摸到了高潮在线观看 | 欧美日韩亚洲国产一区二区在线观看 | 国产精品麻豆人妻色哟哟久久| 亚洲av美国av| 久久国产精品大桥未久av| 亚洲一区二区三区欧美精品| 久久久久国产一级毛片高清牌| 国产99久久九九免费精品| 老熟妇乱子伦视频在线观看| 中文字幕制服av| 免费在线观看完整版高清| 大陆偷拍与自拍| tocl精华| 午夜成年电影在线免费观看| 精品卡一卡二卡四卡免费| 妹子高潮喷水视频| 啦啦啦免费观看视频1| 国产在线免费精品| 丝袜人妻中文字幕| 国产成人免费观看mmmm| 在线观看免费高清a一片| 999久久久精品免费观看国产| 亚洲成人免费av在线播放| 亚洲精品美女久久久久99蜜臀| 99国产精品一区二区蜜桃av | 老司机影院毛片| 亚洲欧美一区二区三区黑人| 中文字幕另类日韩欧美亚洲嫩草| 国产福利在线免费观看视频| 精品熟女少妇八av免费久了| 2018国产大陆天天弄谢| 亚洲成人手机| 国产亚洲av高清不卡| 久久久精品免费免费高清| 欧美亚洲 丝袜 人妻 在线| 欧美大码av| 亚洲专区国产一区二区| 久久国产精品男人的天堂亚洲| 99在线人妻在线中文字幕 | 在线天堂中文资源库| 久久久久久久精品吃奶| 夜夜夜夜夜久久久久| 欧美 亚洲 国产 日韩一| 美女午夜性视频免费| 免费观看av网站的网址| 精品一区二区三区四区五区乱码| 日本av手机在线免费观看| 少妇 在线观看| 三上悠亚av全集在线观看| 国产一卡二卡三卡精品| 亚洲七黄色美女视频| 日韩有码中文字幕| 久久人人爽av亚洲精品天堂| 我要看黄色一级片免费的| 国产亚洲一区二区精品| 久久亚洲精品不卡| 午夜福利一区二区在线看| 亚洲精品一二三| 深夜精品福利| 久久久久久久精品吃奶| 精品一区二区三区四区五区乱码| 色老头精品视频在线观看| 在线观看免费视频网站a站| 中文字幕另类日韩欧美亚洲嫩草| 亚洲人成电影免费在线| 日日爽夜夜爽网站| 久久久久久久大尺度免费视频| 中文字幕人妻丝袜一区二区| 一级,二级,三级黄色视频| 老司机福利观看| 美女国产高潮福利片在线看| 亚洲精品久久成人aⅴ小说| 亚洲九九香蕉| 18禁裸乳无遮挡动漫免费视频| 在线观看舔阴道视频| 好男人电影高清在线观看| 国产三级黄色录像| 老熟妇乱子伦视频在线观看| 人人澡人人妻人| 手机成人av网站| 国产成人系列免费观看| 亚洲性夜色夜夜综合| 亚洲伊人久久精品综合| 一区二区三区国产精品乱码| 建设人人有责人人尽责人人享有的| 日本黄色视频三级网站网址 | 最近最新免费中文字幕在线| 最近最新中文字幕大全免费视频| 久久精品91无色码中文字幕| tocl精华| 亚洲精品国产一区二区精华液| av国产精品久久久久影院| xxxhd国产人妻xxx| 亚洲av成人一区二区三| 一本综合久久免费| 在线观看66精品国产| 日韩一区二区三区影片| 国产精品免费视频内射| 久久国产精品影院| 亚洲精品中文字幕在线视频| 丝袜在线中文字幕| 亚洲av成人不卡在线观看播放网| av线在线观看网站| av欧美777| 日韩欧美三级三区| 欧美日韩中文字幕国产精品一区二区三区 | 丰满饥渴人妻一区二区三| 在线永久观看黄色视频| 亚洲一区二区三区欧美精品| 亚洲精品国产色婷婷电影| 老汉色∧v一级毛片| 国产精品av久久久久免费| 大片电影免费在线观看免费| 少妇 在线观看| 99精品欧美一区二区三区四区| 国产欧美日韩一区二区精品| 久久国产精品人妻蜜桃| 老司机在亚洲福利影院| 久久精品熟女亚洲av麻豆精品| 亚洲精品自拍成人| 久久影院123| 丝袜在线中文字幕| 国产三级黄色录像| 欧美日韩福利视频一区二区| 搡老乐熟女国产| 一区二区三区激情视频| 一二三四社区在线视频社区8| 日韩欧美免费精品| 十分钟在线观看高清视频www| 精品国内亚洲2022精品成人 | 黑人猛操日本美女一级片| 日韩中文字幕欧美一区二区| 精品人妻熟女毛片av久久网站| 女警被强在线播放| 在线 av 中文字幕| av欧美777| 国产免费福利视频在线观看| 熟女少妇亚洲综合色aaa.| 日韩免费高清中文字幕av| 国产野战对白在线观看| 51午夜福利影视在线观看| 亚洲avbb在线观看| 精品少妇一区二区三区视频日本电影| 日韩制服丝袜自拍偷拍| 久久久水蜜桃国产精品网| 欧美日韩福利视频一区二区| 窝窝影院91人妻| 成人国产一区最新在线观看| 美女高潮到喷水免费观看| 日本一区二区免费在线视频| 一本久久精品| 搡老岳熟女国产| 久久久久久久精品吃奶| 18禁裸乳无遮挡动漫免费视频| 午夜福利影视在线免费观看| 亚洲欧美色中文字幕在线| 久久亚洲真实| 成人影院久久| 激情视频va一区二区三区| 欧美黄色片欧美黄色片| 亚洲熟女精品中文字幕| 丁香六月欧美| 97在线人人人人妻| 天堂中文最新版在线下载| 18禁黄网站禁片午夜丰满| 精品卡一卡二卡四卡免费| 亚洲美女黄片视频| 狠狠狠狠99中文字幕| www.精华液| 在线观看www视频免费| 成年人免费黄色播放视频| 日本wwww免费看| 欧美 亚洲 国产 日韩一| 一区二区日韩欧美中文字幕| 成人黄色视频免费在线看| 午夜日韩欧美国产| 国产日韩欧美亚洲二区| 久久免费观看电影| 美女福利国产在线| 久久久精品免费免费高清| 两人在一起打扑克的视频| 欧美国产精品va在线观看不卡| 国产欧美日韩一区二区三| 日韩大码丰满熟妇| 最新美女视频免费是黄的| 亚洲av片天天在线观看| 老熟女久久久| 国产成人精品无人区| 亚洲情色 制服丝袜| 人人妻,人人澡人人爽秒播| 国产黄色免费在线视频| 色视频在线一区二区三区| 91成人精品电影| 亚洲五月婷婷丁香| 在线观看舔阴道视频| 欧美变态另类bdsm刘玥| bbb黄色大片| 欧美变态另类bdsm刘玥| 国产在线免费精品| 亚洲国产av影院在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美中文综合在线视频| 精品国产亚洲在线| 日韩欧美免费精品| www.熟女人妻精品国产| 乱人伦中国视频| 亚洲一区二区三区欧美精品| netflix在线观看网站| kizo精华| 女人精品久久久久毛片| 少妇 在线观看| 国产欧美亚洲国产| 狂野欧美激情性xxxx| 国产成人欧美| 亚洲av欧美aⅴ国产| 一级毛片精品| 精品人妻在线不人妻| 黄色片一级片一级黄色片| 色老头精品视频在线观看| 亚洲男人天堂网一区| 一本—道久久a久久精品蜜桃钙片| 亚洲三区欧美一区| 国产有黄有色有爽视频| 免费一级毛片在线播放高清视频 | 免费看a级黄色片| 亚洲五月婷婷丁香| 天天躁日日躁夜夜躁夜夜| 欧美黑人欧美精品刺激| 在线av久久热| 另类精品久久| 久久99一区二区三区| 国产精品一区二区免费欧美| 极品少妇高潮喷水抽搐| 汤姆久久久久久久影院中文字幕| 亚洲国产欧美网| 亚洲精品一二三| 国产区一区二久久| 黄色 视频免费看| 国产男女超爽视频在线观看| 亚洲第一欧美日韩一区二区三区 | av国产精品久久久久影院| 麻豆乱淫一区二区| 午夜福利一区二区在线看| 国产免费福利视频在线观看| 亚洲成a人片在线一区二区| 国产精品电影一区二区三区 | 中文欧美无线码| 免费av中文字幕在线| 水蜜桃什么品种好| 国产免费av片在线观看野外av| 一区二区三区精品91| 午夜成年电影在线免费观看| 亚洲三区欧美一区| 国产精品.久久久| 狂野欧美激情性xxxx| 女性被躁到高潮视频| av欧美777| 久久精品91无色码中文字幕| 成人18禁在线播放| 国产亚洲一区二区精品| 99精品欧美一区二区三区四区| 超色免费av| 精品一区二区三区av网在线观看 | 国产91精品成人一区二区三区 | 悠悠久久av| 亚洲国产欧美一区二区综合| 久久精品国产综合久久久| 欧美黄色片欧美黄色片| 777米奇影视久久| 成人国产一区最新在线观看| 视频在线观看一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 18禁国产床啪视频网站| 亚洲avbb在线观看| 色在线成人网| 久久久久久亚洲精品国产蜜桃av| 精品一区二区三区视频在线观看免费 | 这个男人来自地球电影免费观看| 久热爱精品视频在线9| 久久中文字幕人妻熟女| 丰满迷人的少妇在线观看| 免费少妇av软件| 日韩有码中文字幕| 女同久久另类99精品国产91| 亚洲国产精品一区二区三区在线| 9191精品国产免费久久| 亚洲精品国产精品久久久不卡| 久久99热这里只频精品6学生| 国产在线免费精品| 热re99久久国产66热| 1024香蕉在线观看| 久久久久久亚洲精品国产蜜桃av| 午夜免费成人在线视频| 亚洲天堂av无毛| a级毛片黄视频| 久久中文字幕人妻熟女| 高清欧美精品videossex| 国产福利在线免费观看视频| 亚洲午夜理论影院| videosex国产| 亚洲国产欧美网| a级片在线免费高清观看视频| 国产成人免费观看mmmm| 女人高潮潮喷娇喘18禁视频| 成人手机av| 亚洲午夜精品一区,二区,三区| 亚洲欧美一区二区三区黑人| 久久 成人 亚洲| 91麻豆精品激情在线观看国产 | 悠悠久久av| 亚洲五月婷婷丁香| 亚洲一区中文字幕在线| 五月开心婷婷网| 久久青草综合色| 少妇被粗大的猛进出69影院| 一本—道久久a久久精品蜜桃钙片| 欧美日韩亚洲高清精品| 久久中文字幕人妻熟女| 欧美一级毛片孕妇| 黄色成人免费大全| 亚洲成人国产一区在线观看| 欧美精品一区二区免费开放| 黑人操中国人逼视频| 国产成人系列免费观看| 99国产精品一区二区蜜桃av | 美女高潮到喷水免费观看| 老司机午夜福利在线观看视频 | 中文字幕高清在线视频| 国产精品久久久av美女十八| 99国产精品一区二区蜜桃av | 久久久国产精品麻豆| 日本撒尿小便嘘嘘汇集6| 美女国产高潮福利片在线看| 考比视频在线观看| 欧美成狂野欧美在线观看| 国产成人精品久久二区二区免费| av视频免费观看在线观看| 国产成人免费观看mmmm| 精品少妇一区二区三区视频日本电影| 成年人免费黄色播放视频| 精品久久蜜臀av无| 亚洲精品中文字幕在线视频| 91av网站免费观看| 国产在线精品亚洲第一网站| 色在线成人网| 久久午夜亚洲精品久久| 99久久99久久久精品蜜桃| 另类亚洲欧美激情| 国产成人一区二区三区免费视频网站| 一边摸一边做爽爽视频免费| 又大又爽又粗| 丰满饥渴人妻一区二区三| 汤姆久久久久久久影院中文字幕| 久久国产精品影院| 最新的欧美精品一区二区| 建设人人有责人人尽责人人享有的| 如日韩欧美国产精品一区二区三区| 日韩免费av在线播放| 操美女的视频在线观看| 精品一区二区三卡| 搡老乐熟女国产| 黄色视频不卡| 一本久久精品| 男女下面插进去视频免费观看| 女同久久另类99精品国产91| 久久久国产成人免费| 人人妻,人人澡人人爽秒播| 亚洲成国产人片在线观看| 国产高清激情床上av|