• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Internet of Things Authentication Protocols:Comparative Study

    2024-05-25 14:38:46SouhaylaDargaouiMouradeAzrourAhmadElAllaouiAzidineGuezzazAbdulatifAlabdulatifandAbdullahAlnajim
    Computers Materials&Continua 2024年4期

    Souhayla Dargaoui ,Mourade Azrour,? ,Ahmad El Allaoui ,Azidine Guezzaz ,Abdulatif Alabdulatif and Abdullah Alnajim

    1Engineering Science and Technology Laboratory,IDMS Team,Faculty of Sciences and Techniques,Moulay Ismail University of Meknes,Errachidia,52000,Morocco

    2Higher School Essaouira,Cadi Ayyad University,Marrakesh,44000,Morocco

    3Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    4Department of Information Technology,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia

    ABSTRACT Nowadays,devices are connected across all areas,from intelligent buildings and smart cities to Industry 4.0 and smart healthcare.With the exponential growth of Internet of Things usage in our world,IoT security is still the biggest challenge for its deployment.The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment,protect privacy,and confidentiality,and guarantee the safety of IoT users,infrastructures,data,and devices.Authentication,as the first line of defense against security threats,becomes the priority of everyone.It can either grant or deny users access to resources according to their legitimacy.As a result,studying and researching authentication issues within IoT is extremely important.As a result,studying and researching authentication issues within IoT is extremely important.This article presents a comparative study of recent research in IoT security;it provides an analysis of recent authentication protocols from 2019 to 2023 that cover several areas within IoT(such as smart cities,healthcare,and industry).This survey sought to provide an IoT security research summary,the biggest susceptibilities,and attacks,the appropriate technologies,and the most used simulators.It illustrates that the resistance of protocols against attacks,and their computational and communication cost are linked directly to the cryptography technique used to build it.Furthermore,it discusses the gaps in recent schemes and provides some future research directions.

    KEYWORDS Attacks;cryptography;Internet of Things;security;authentication

    1 Introduction

    IoT is an extensive network of intelligent goods interconnected and connected to the Internet that may visualize and control a big part of the world surrounding us.Over the past few years,IoT has immersed increasingly in our daily lives [1–5].This extensive integration of IoT services anywhere and everywhere generates significant data flow[6–10].The limited nature of IoT appliances concerning computational capability,energy,and memory storage makes the processing of IoT data a very sophisticated task[11–13].As a result,IoT users’data becomes susceptible to illegitimate use,and attacks against IoT networks become increasingly sophisticated,numerous,and of excellent quality.According to recent examinations,this increase is a direct result of poor security configurations placed throughout the IoT ecosystem[14–16].Several factors make IoT security very hard to achieve,such as the absence of security configuration in IoT devices since the constructors are more interested in getting their devices on the market quicker than in conducting sufficient tests to include security from the outset[17–20].In addition,wireless communication networks used in IoT,like Wi-Fi,are known for their vulnerability to enormous interferences.Furthermore,the lack of a unique perspective of IoT and universal standards may increase the difficulty of designing a security scheme for an IoT network with heterogeneous equipment.Moreover,high mobility and dynamic network topology may increase the attack area and complicate the implementation of a universal security scheme.

    Authentication as a method of verifying and ensuring the identification of entities is the first step towards security and privacy assurance in an IoT environment.Generally,in IoT networks,each node should be able to distinguish and attest all other nodes in the network to ensure that the data comes from a legitimate source[21].Authentication is a process that allows verification or authentication of a user’s identity.It answers the question:“Are you that entity?”.Authentication methods are diverse,but all are founded upon one or more of the knowledge,possession,and attribute factors.

    Overall,the more factors we use,the higher the level of safety we provide.However,multifactor authentication requires more computational power,storage memory,and energy,which cannot be ensured by IoT-embedded devices,known by their limitations.Over the past few years,several lightweight authentications have been proposed to overcome those limitations.The performance of proposed authentication schemes and their costs differ based on the cryptographic techniques used,such as Advanced Encryption Standard(AES),Rivest–Shamir–Adleman(RSA),Elliptic Curve Cryptography(ECC),and so on[22].

    New researchers attend this survey as a guideline to enhance future research and opportunities.It offers the analysis of a comparison study between more than thirty current authentication protocols published from 2019 to 2023 based on the cryptographic mechanisms used,the provided security features,the resistance against most popular attacks,and the computation and communication cost.The contributions of this paper are as follows:

    ? We summarize and analyze recent research in the IoT authentication field to provide a comprehensive understanding of the current literature,providing the most used cryptographic techniques,and simulation tools.

    ? We present a simple taxonomy of IoT authentication schemes.

    ? We undertake a comparative analysis to determine if the current literature satisfies the security service requirements and resists well-known attacks.

    ? We pinpoint open challenges exploring gaps and weaknesses and afford new research directions.

    The remainder of our survey is structured that way.The related works are introduced in section two.In the third section,the research methodology is presented.A simple taxonomy of authentication protocols is presented in section four.The comparison study is detailed in section five.The sixth section presents future research directions.Finally,the seventh section concludes the paper.

    2 Related Work

    Over the past few years,multiple authentication systems and key agreements have been offered to ensure privacy and security in IoT environments.Several authentication comparison studies are offered in the literature to help future researchers by offering security issues,open challenges,and future scopes (see Table 1).Kumar et al.presented an exhaustive investigation of the Internet-of-Things authentication methods and their conjunctions [23].They analyzed the potentialities and drawbacks of the existing approaches.Furthermore,discussing the fundamentals of authentication and its related raids,they interlinked the evolution of the solution strategies and offered a taxonomy of IoT authentication.Finally,they discussed the future opportunities in this area.Trnka et al.[24]offered a road map for future research,providing an overview of recent research from 2017 to 2020.They categorized implicated mechanics and norms requested in current approaches to finding the taxonomy of IoT security solutions.Saqib et al.afforded a methodical IoT security assessment and review concerning authentication [25].Their review aims to discover and summarize security issues in IoT regarding authentication tools and identify available mechanisms and holes in several kinds of authentication.Firstly,they identified security and privacy issues and explained the security warning throughout multiple levels of the IoT architecture.Secondly,they mentioned the countermeasures attainable for handling security problems.

    Table 1: Areas covered by some related works

    Additionally,they used different robustness parameters such as computational cost,communications costs,and energy use to benchmark some of the current standard authentication protocols developed for IoT.In the end,network simulators employed to estimate the efficiency of authentication approaches are covered.Bahache et al.[26]presented a comprehensive study of today’s authentication protocols regarding security and achievement.They also offered new categorization of the authentication schemes in wireless medical sensor networks(WMSNs)based on their architecture.Ahmed et al.[27]also summarized existing research on identity management,lightweight authentication,and authorization in an IoT environment.As a result,they highlighted topical IoT security trends and their accomplishments.

    To explore how Blockchain-based decentralized architecture can enhance IoT authentication,Singh et al.proposed a review of access management of IoT devices using access control mechanisms and decentralized authentication[28].They analyzed existing studies on Blockchain applications and detailed efforts to improve security in IoT applications.Accordingly,they summarized various security issues related to decentralized authentication in the IoT environment.Mohsin et al.[29]also provided helpful information that may improve the comprehension of how authentication approaches may be blended with Blockchain technology.They came up with a taxonomy of Blockchain technology in IoT network authentication.At last,they surveyed issues related to Blockchain technology,presented solutions,and discussed future research directions.

    Recently,IoT over 5G networks have improved healthcare applications.Sodhro et al.[30]produced an exhaustive review of authentication approaches for protecting IoT-5G appliances in the medical field.They reviewed,characterized,clustered,and classified IoT-5G appliance authentication,radio-frequency fingerprinting,and mutual authentication.Finally,they presented some artificial intelligence methods for developing authentication and recommendations for future research.Jiang et al.[31]briefly investigated machine learning-based physical layer authentication for the 5Gbased Internet of Things.The paper also covered research directions of machine learning approaches applications in 5G-based IoT security.Wazid et al.[32]presented a survey detailing probable rules and raids in 5G-enabled IoT networks.They compared current security schemes that lead to future search obstacles,and orientations in 5G IoT environmental security.

    Given that bio-features have become a vital agent in IoT device authentication.Ferrag et al.presented a survey about IoT mobile device authentication and authorization using bio-features[33].They delivered distinct data mining and machine-learning approaches to authentication and authorization mechanisms of IoT devices.Finally,analyzing the available biometrics authentication systems posed various issues for future investigation works.Yang et al.[34] presented a review to assist scientists in comprehending future problems with biometrics for IoT security and future research directions.They studied the existing studies in biometrics-based IoT security,specifically authentication,and encryption.Additionally,they classified the research about several biometric features and the number of biometric characteristics used in the mechanism.

    3 Research Methodology

    Our review was conducted between 2019 and 2023 since IoT authentication has received a lot of attention recently.The research published within the last five years presents the integration of emerging technologies and tendencies to enhance IoT authentication,the thing that helps to better understand the state of the art.

    The research process consisted of several phases.Firstly,we collected papers using a pre-defined set of keywords(attacks,cryptography,Internet of Things,security,authentication).For this purpose,we navigated some digital sources such as:

    ?Google Scholar(https://scholar.google.com/).

    ?HEC Digital Library(http://www.digitallibrary.edu.pk/).

    ?ACM Digital Library(http://dl.acm.org).

    ?IEEE eXplore(http://ieeexplore.ieee.org).

    ?ScienceDirect(https://www.sciencedirect.com).

    Then,the articles were classified based on the following criteria:

    Inclusion criteria

    ?Papers target IoT authentication.

    ?Papers afford a new IoT authentication scheme.

    ?Papers provide a security analysis section for the proposed scheme.

    ?Papers provide a performance evaluation section for the proposed scheme.

    ?Papers explore the challenges,issues,and shortcomings of IoT authentication.

    Exclusion criteria

    ?Papers not written in the English language.

    ?Papers published before 2019.

    ?Papers duplicated.

    ?Papers that do not provide any new authentication protocol.

    Then,reviewing the titles and keywords we excluded unrelated papers.Later,the analysis of each article’s abstract was performed to decide their relevance and exclude irrelevant publications.

    Finally,the quality of the papers was checked using three quality assessment questions,if the answer to at least two of these questions was “yes”the papers were concluded,else the papers were excluded from the review study,the questions are the following:

    ?Is there sufficient coverage of the relevant work and research subject in the paper?

    ?Is there enough information in the paper about the proposed authentication methodology?

    ?Is there a clear description,analysis,and evaluation of the findings?

    In the end,we admit thirty-one papers as the subject of the comparison study.

    4 Taxonomy of the IoT Authentication Protocols

    We classify IoT authentication protocols in this fraction according to several parameters [35].These parameters are pictured in Fig.1 and summarized as follows:

    Figure 1: Classification of IoT authentication protocols

    Authentication factor:Can be either identity[36–40],which is information(Username,password)presented by one party to another to authenticate,or an attribute[41–44](what we need to be),that can be physical like fingerprints or hand geometry,or behavioral like typing dynamics or voice prints[45–48].

    Architecture:This is distributed when a direct authentication method distributed between the communicating parties is used [49–53],or centralized [54–58] when a trusted authority that allows us to distribute and manage identification data used during authentication is used.

    Procedure:This can be unidirectional in case only one party authenticates to the other while the other is not authenticated.Bidirectional(mutual authentication[59–61])whenever the two items attest to each other.Three-way authentication once a trusted power certificates both items and assists them to certificate each other[62–64].

    Tokens use:In token-based authentication schemes[65–69],the user authenticates from a proof of identity(data)established by a server[70].

    The chips use:That may be implicit,whether it uses material physical features to improve authentication,including physical unclonable functions [71–75],or explicit,where it uses chips that store and process keys used for authentication[76].

    5 Comparative Study

    5.1 Comparative Criteria

    Resistance against attacks:This is a notable feature in an authentication scheme.The authentication protocol must resist attacks as much as possible to secure the data exchanged during the session.As a result,the stronger the resistance,the better the authentication.

    Complexity:In IoT networks,energy is the most critical limiting factor relative to the capabilities of a sensor node.To extend as much as possible,the life of a sensor and that of the network,it is necessary to manage its energy reserve reasonably.Therefore,to build an effective authentication mechanism,it is necessary to limit the number of operations performed.

    Session key management: A session key is used to define encryption between two parties to communicate securely over an open network.The management of session keys is a crucial issue of IoT,which includes several steps: Generation,distribution,storage,updating,and destruction of keys.Generally,a key agreement protocol should be used to negotiate a session key influenced by all communicating parties.

    Factor number: We can distinguish between three authentication schemes depending on the number of factors considered to authenticate the user.A single-factor authentication(SFA)is where the user authenticates using the password only.A dual-factor authentication (2FA) is where the customer uses a smart card and a keyword to authenticate.Multi-factor authentication(MFA)requires additional factors such as location information and biometrics.

    Mutual authentication: Is an essential concept in the IoT authentication systems.It allows an IoT device to verify the legitimacy of the access request made by an entity(human being or another system)to authorize its access to network resources.On the other hand,the user must also be sure of the device’s legitimacy.

    Cryptographic algorithm used:Several cryptographic algorithms can be used during authentication.Based on these algorithms,we can classify authentication schemes into four classes.The first class is built on symmetric algorithms,given their low cost.The second category is based solely on asymmetric algorithms that may be separated into two types: Those using usual algorithms(RSA[77–80])and those using elliptic curve cryptography(ECC[81–84]).The third category is hash functions-based schemes.The last category consists of hybrid solutions mixing two or all existing methods[85–89].

    5.2 Comparison of the Studied Protocols

    This section provides the comparison result between some of the latest authentication protocols,especially the protocols proposed between 2019 and 2023.Most of these protocols have four steps:The initialization step,the registration step,the login and authentication step,and the password change step.To fully understand and evaluate the protocols studied,we used several comparison criteria:Cryptography techniques,security services provided,resistance against attacks,computational complexity(execution time),and communication cost.

    5.2.1 IoT Authentication Schemes Review

    Table 2 shows the cryptographic techniques used in each protocol[90–120].Hence,Chen et al.[90,95,109,120]presented four different protocols based on two authentication factors using random numbers and hash functions.Finally,Oh et al.[95]and Azrour et al.[120]used the Automated Validation of Internet Security Protocols and Applications AVISPA and Scyther simulators,respectively,to formally analyze their protocol.

    Table 2: Authentication schemes review

    Kaurl et al.[94,97,107,111]provided four dual-factor authentication protocols built on encryption and decryption algorithms,random numbers,and hash functions.The formal analysis of the scheme provided by Kaurl et al.[94]was carried out using the ProVerif simulator,as Yadav et al.’s protocol[107]and Rostampour et al.’s protocol[111]was carried out using the Scyther.

    Krishnasrija et al.[104]presented a scheme using two authentication factors,random numbers,hash functions,and Chebyshev’s chaotic map.At the same time,Kumar et al.[93]also used encryption and decryption algorithms.The formal analysis of the presented schemes was performed by exploiting Scyther and Random Oracle,respectively.

    Hu et al.[91,96,101] used random numbers,hash functions,and ECC to build two-factor authentication protocols.Azrour et al.[92,114,116,118]combined those mechanisms with encryption and decryption algorithms to build their schemes.Subsequently,Hu et al.[91]and Nyangaresi[101]used ProVerif,while Azrour et al.[92]and Panda et al.[96]used Scyther and AVISPA,respectively,to conduct a formal analysis.

    Dwivedi et al.[110]suggested a two-factor authentication scheme using encryption and decryption algorithms,random numbers,hash functions,and Blockchain technology.The proposed scheme was formally analyzed using the Scyther simulator.

    Cui et al.[102,105,108,113,117] proposed five three-factor authentication protocols based only on random numbers and hash functions.In the end,Lee et al.[105]and Khalid et al.[113]used the Scyther and AVISPA simulators to perform a formal analysis of their protocol.

    Xie et al.[98–100,103,106,112,115,119]presented three-factor protocols that use the fuzzy extractor to extract numerical variables from user biometric information,random numbers,and hash functions.The difference between these protocols is that [99,103,112] are based on encryption and decryption algorithms,[98,106,115]are based on ECC,however,references[100,119]combined both techniques.Afterward,Xie et al.used ProVerif,Butt et al.[100],Yu et al.[103,112]used AVISPA,and Wang et al.[106]and Hajian et al.[115]used Scyther to make a formal analysis of their schemes.

    Cryptography Techniques

    The backbone of the authentication scheme is the cryptographic technique used to build it.It is the key element to establish authenticity,and the most critical factor that can construct the characteristics of the scheme;especially,its security and efficiency.The schemes examined in this review employ several cryptology technologies as shown in Table 2.

    The hash function has been used in all the studied protocols,mathematically it is a one-way function that maps arbitrary-size data to fixed-size values.In authentication schemes,the utility of hash functions is to hide and protect confidential parameters from attacks.

    ECC brings together a group of cryptographic techniques that take advantage of one or more attributes of elliptical curves.Given Q=k ?P where P is an elliptic curve point,the most crucial feature of ECC is the impossibility of recovering the value of k when only P and Q are known.Using this feature,the ECC can be used to interchange keys and secret parameters in the Diffie-Hellman manner or to verify authenticity using an elliptic curve digital signature algorithm and so on.

    Encryption and decryption are popular techniques that may be used in authentication schemes to exchange confidential parameters securely in public channels or even store identity data safely in smart cards.

    The chaotic map is an evolution function with some kind of chaotic behavior.It has an important characteristic that makes it suitable for security implementation;given Tu(x) and x,u is hard to compute.Considering this characteristic chaotic map may be used for key exchange or the authenticity warranty in the Diffie-Hellman approach.

    Random numbers as it is clear from their name,are the numbers selected unexpectedly,randomly from a group of numbers.They play critical roles in the authentication schemes,hence they ensure untraceability and secure the scheme against freshness and replay attacks.

    Formal Security Verification Tool

    Authentication schemes are mathematical processes,the application of those procedures safely requires their verification and analysis.The formal analysis may reduce the computational cost,the communication cost,and even some time memory demand by detecting and eliminating unnecessary steps.Furthermore,the verification may lead to protocols enhancing by exploring their vulnerabilities.Table 2 shows that in the reviewed schemes the most used simulators are the following.

    ProVerif which is a formal verification tool enables the verification of the security properties of cryptographic techniques.It runs the protocol only for an unlimited number of sessions and can reconstruct attacks.This tool accepts Horn clauses and Pi calculus codes as input and provides the same output in both cases.Furthermore,it does not demand any such specification or particular code in cases of schemes lacking freshness attacks.It necessitates the specification of communication channels and it only examines attacks that have the‘query’defined in the code[25].

    AVISPA is a push-button tool introduced by Armando et al.as a toolkit for the validation of internet security protocols and applications.It affords four back-ends: The On-the-Fly Model-Checker,the Constraint-Logic-based Attack Searcher,the SAT-based Model Checker,and the TA4SP protocol analyzer.AVISPA tool can analyze all the components of the scheme at the same time,detect the protocol’s flaws,and check the robustness against replay and man-in-the-middle attacks.However,it is rather difficult to use,demands solid knowledge of the verified schemes,and requires the learning of the High-Level Protocol Specification Language(HLPSL)[25].

    Scyther is a simulator that provides automated verification,falsification,and analysis of security mechanisms.It has three usage modes:Claim verification to determine if the security claims made in the description are true or not,automatic claims to automatically elaborate and certify suitable claims for a protocol,and characterization to characterize and analyze the security mechanism and create a finite trace depicting the execution of the protocol role.Scyther tool offers a graphical user interface and provides graphs of attacks which facilitate understanding the security mechanism.More than that it can execute the protocol for a limited or unlimited number of sessions,and it may check all the used variables.Nevertheless,this tool requires a compromised module to detect that a previous session has been captured in case of a mechanism vulnerable to freshness threats,also it cannot check the quality of any variables the thing that obligates the user to simplify the protocol before the simulation[25].

    5.2.2 Security Services

    Generally,to trust an authentication protocol,it must ensure various security characteristics,such as mutual authentication,a security process that allows communicating parties to verify each other identities and trust the exchanged data in an IoT network.The anonymity secures the user’s identity to overcome impersonation attacks;untraceability protects persons from disclosing confidential and sensitive information.Key agreement to generate a key,which may be used for encrypting the exchanged data.Perfect forward secrecy blocks unauthorized individuals from intercepting,deducting,or obtaining the key.Moreover,key secret,guards sensitive data secretly.As it is clear from Table 3 the schemes[91,93,94,101–105,115,118,120]are the most effective schemes providing all security services,then the schemes[95,97,98,106,107,111,113,116,117,119]which do not guarantee the key secret,and[108,109] that do not guarantee the perfect forward secrecy.However,protocol [112] offers mutual authentication,anonymity,untraceability,and key agreement.Protocols [99,100,114] allow mutual authentication,anonymity,and key agreement.Protocols [90,92] enable mutual authentication,key agreement,and key secret.Protocol[96]provides mutual authentication,key agreement,and perfect forward secrecy.Protocol[110]ensures only anonymity and untraceability.

    Table 3: Security features and resistance against attacks

    5.2.3 Resistance against Attacks

    The comparison based on security services provided by each protocol may give an idea about the studied protocol;instead,more is needed to evaluate it.For this reason,resistance against known attacks is examined in this section.Analyzing Table 3,security features and resistance against attacks,we can conclude the following results:

    The scheme[98]is the most robust of the 31 studied;it is resistant to impersonation attacks,replay attacks,node capture attacks,password guessing,DoS attacks,stolen verifier attacks,insider attacks,stolen verifier attacks,a man in the middle,and smart card loss attack.Nevertheless,references[99,103]resist all recent attacks except the node capture attack.In addition,references [93,94] resist GWN bypassing attacks and the same attacks as [98] except man-in-the-middle and node capture attacks.The protocol[106]resists in opposition to GWN bypassing attacks and the same attacks as[98],except for the DoS attack.The scheme[117]protects against GWN bypassing attacks and the same attacks as[98],apart from the stolen verifier,DoS.

    The protocol [118] is resilient in the face of impersonation raids,replay attacks,node capture attacks,password guessing,stolen verifier attacks,DoS attacks,and man-in-the-middle attacks.The protocol [97] is resistant to an insider attack,token modification,and the same attacks as [118],aside from the man in the middle and Dos raids.The approach [102] resists impersonation attacks,replay attacks,node capture attacks,insider attacks,man-in-the-middle attacks,password guessing,and smart card loss attacks.On the other side,reference [105] resists stolen verifier attacks and all recent attacks except insider attacks.

    The protocol[92]is resilient in the face of replay attacks,Denning-ssaco,DoS attacks,password guessing,insider attack,and stolen verifier attack.However,reference [120] is resilient regarding smart card loss and the same attacks as [92] other than the Denning-ssaco attack.The mechanism[95]is resistant,contrary to impersonation attacks,replay attacks,insider attacks,man-in-the-middle,password guessing,and smart card loss attacks,even though the mechanism [109] is resistant in the face of node capture attacks and the same attacks as[95]aside from password guessing.

    The scheme[112]resists in the face of impersonation attacks,replay attacks,insider attacks,smart card loss,and password guessing.Nevertheless,the scheme [104] resists man-in-the-middle attacks coupled with all later attacks excluding impersonation attacks.In addition,reference[91]also resists node capture attacks,and all attacks resisted by the scheme [112] aside from insider attacks.The approach [108] seems strong against impersonation attacks,replay attacks,smart card loss,insider attacks,and man-in-the-middle attacks.However,the approach[115]can resist counter-node capture attacks and attacks resisted by [108] apart from the smart card loss.The scheme [96] also resists password guessing,and all attacks resisted by[108]exclude smart card loss.

    The mechanism [116] withstands man-in-the-middle,replay attacks,impersonation attacks,and insider attacks.At the same time,the mechanism [114] fights back stolen verifier attacks,and all attacks are restrained by[116]but insider attacks.On the other hand,the mechanism[101]resists DoS attacks and raids resisting by the mechanism[116]aside from insider attacks.The scheme[100]resists impersonation attacks,insider attacks,replay attacks,and password-guessing attacks.Nonetheless,the protocol[90]resists insider attacks,replay attacks,GWN bypassing,and stolen verifier attacks.The scheme[107]can also resist the same attacks as the scheme[116]apart from the man in the middle.

    The schemes[110,111,113]are resistant to impersonation attacks coupled with man-in-the-middle attacks,replay attacks,and smart card loss,respectively.Although,[119]fights back only smart card loss and replay attacks.

    5.2.4 Computational Cost

    In this section,we examine the computational needs of the studied schemes.The notation Th is defined as the temporal requirements of the hash function.Te is the temporal requirement of the elliptic curve point’s multiplication.Tc is the temporal need of Chebyshev’s chaotic map use.Ts is the temporal need of symmetric encryption/decryption.Tf is the temporal exigency of the fuzzy extractor.Tasym is the temporal need of asymmetric encryption/decryption.Tpuf is the temporal requirement of the physically unclonable function.Tsig is the computational cost of a Hyperelliptic Curve-based Digital Signature Arithmetic signature generation/verification execution.The cost of calculating the operation or exclusive is generally overlooked because it requires minimal calculations.According to[93],Th=0.0005 s,Tc=0.02102 s,Te=0.063075 s and Ts=0.0087 s and according to[97],Tasym=Te=Tf=0.063075 s.Depending on [105] Th=1.91%?Tpuf,as a result,we consider Tpuf=0,02608 s.Based on[93,114],Tsig=0.47 s.

    As mentioned in Table 4,two-factor lightweight authentication schemes,[90,95,109,120],require 24Th,42Th,16Th,and 17Th,respectively.However,three-factor lightweight authentication schemes,[102,105,108,113,117]need 35Th+Tf,34Th+2Tf+Tpuf,29Th+Tf,18Th+2Tf,and 2Tp+16Th+Tf,respectively.

    Table 4: Computational requirement of login and authentication phase

    ECC-based schemes[91,96,98,101,106,115]demand 23Th+6Te,9Th+8Te,18Th+6Te+Tf,13Th+2Te,25Th+6Te,and 8Te +14Th severally.Symmetric encryption/decryption-based authentication schemes[94,97,99,103,107,110,111,112]necessitate 21Th+4Ts,42Th+Ts,25Th+Tf+4Ts,15Th+Tf+2Ts,6Ts +2Th,6Th+9Ts,2Ts,and 24Th+2Ts individually.In addition,[104]requires 20Th+3Tc.While hybrid authentication schemes[92,93,100,114,116,118,119]stipulate 13Th+6Te,15Th+4Tc+4Ts,5Th+4Te+Tf+3Ts,15Th+2Tf+4Ts+2Tsig,2Ts+4Tasym+11Th,13Th+8Te+2Ts,and Ts+15Th+6Te,respectively.

    Fig.2 shows that the protocols [90,95,97,109–112,120] are very fast compared to the schemes[91,92,96,98,100,106,114,118,119],for the simple reason that those letters use elliptic curve cryptography that is very overpriced compared to the hash functions that are used in schematics[90,95,97,109–112,120].

    Figure 2: Login and identity verification estimated run time

    5.2.5 Communication Cost

    To enhance communication efficiency,the communication cost of an authentication scheme must be reduced as it as possible.Based on the graphs in Fig.3,the schemes in [104,106,108,118,119]incur the highest communication overheads.Then there are the protocols in[94–102,105,109,112,113,115,117],and the schemes in[103,107,111]with acceptable costs.While the schemes[107,111]require the lowest communication cost,and they are weak against the majority of known attacks,as has been mentioned before,more than that,they cannot ensure perfect forward secrecy.

    Figure 3: Login and identity verification estimated storage

    5.3 Classification of the Studied Protocols

    This section classifies the protocols we have studied into two categories.According to cryptographic algorithms,we distinguish lightweight schemes that are based only on hash functions,random numbers,and in some cases encryption and decryption algorithms,and hybrid schemes which combine the techniques used in the lightweight authentication schemes with one or more of the following mechanisms: Elliptic curve cryptography,chaotic maps,and encryption systems.Depending on the authentication factors,we distinguish between dual-factor schemes that require a smart card and password,and three-factor schemes that demand a smart card,key word,and digital fingerprint.The classification results in cryptographic algorithms and authentication factors are presented in Figs.4 and 5,respectively.The analysis of Fig.5 shows that a major part of the proposed schemes in the literature are two-factor-based schemes because the addition of the third factor increases partially the computational cost and the energy consumption.Furthermore,the correlation between the results presented in Fig.2 which provides the login and identity verification estimated run time for each scheme,and the results shown in Fig.4 indicate that hybrid authentication schemes require much more execution time than lightweight schemes.The thing that explains the wide deployment of lightweight schemes compared with others.

    Figure 4: Classification results based on cryptographic technics

    Figure 5: Classification results based on authentication factors

    6 Future Research Directions

    The comparison made in this paper illustrates that the reviewed schemes provide a high level of security,nonetheless,some attacks still require more interest such as node capture,DoS attack,stolen verifier,denning-ssaco attack,and GWN bypassing.Besides,the maturity of the authentication schemes is centralized,as a result,they cannot be efficient with decentralized infrastructures and networks.To overcome the gaps in the literature schemes this section offered some new directions for future research.

    6.1 Blockchain-Based Authentication

    Considering that a major part of the current IoT authentication schemes relies on centralized infrastructures,are inconsistent with distributed frameworks,and are vulnerable to several attacks,Blockchain-based authentication balances Blockchain technology with MFA to produce a trustworthy authentication mechanism.Using decentralized ledgers that protect critical credentials,Blockchainbased authentication offers an additional layer of protection.However,this kind of solution demands strong technical knowledge,accurate implementation,and realistic evaluation.More than that,it requires a high computational power.The whole potential of Blockchain-based authentication can be reached by decreasing complexity and costs and increasing flexibility and authenticity[121].

    6.2 Post-Quantum Cryptography

    Currently,ECC is considered one of the most lightweight cryptographic techniques that can be used to build a robust authentication scheme,and it is the most suitable for IoT device’s limitations.Unfortunately,this method is at risk of being ruptured by Quantum Computing attacks such as Shor’s Algorithm,Grover’s Algorithm,Side-Channel Attack,Multi-target Pre-image Search Attack,and so on.However,the existence of some computational problems resistant to quantum attacks such as quasi-cyclic syndrome decoding (QCSD) with parity problem,and ring learning with rounding(RLWR)problems have motivated researchers to construct secure post-quantum cryptography(PQC).In 2017,a standardization proceeding was started by the National Institute of Standards and Technology,which classify which classify post-quantum cryptography algorithms into five classes:Latticebased Cryptography,Code-based Cryptography,Multivariate Polynomial Cryptography,Hash-based Signatures,and Isogeny-based Cryptosystem.After the 3rd round,seven schemes were announced.However,the standardization document is expected to be published in 2024[122].

    6.3 Machine Learning for Authentication

    Machine learning (ML) is an artificial intelligence field that relies on data and algorithms to imitate the way human learning,progressively improving its accuracy.Recently,Machine learning techniques have been widely considered to assist in the authentication process for IoT networks.Generally,the use of ML in authentication can be either:Supervised learning which is useful against intrusion and DDoS attacks,unsupervised learning which is useful to identify irregularities and threats without any previous knowledge,and powerful for communication detection attacks such as Sybil attacks,or reinforcement learning used to determine an optimal set of actions that maximize the reward in a given environment.Even though ML provides robust solutions for IoT authentication resistance against attacks,it demands high computation power and energy requirements.Researchers have a strong interest in making these solutions effective considering the limited nature of IoT devices[123,124].

    7 Conclusion

    This paper presents a deep comparative study of recent IoT authentication schemes regarding the importance of authentication in the Internet of Things as the first line of defense counter to security threats in such an environment.Firstly,we presented a simple taxonomy of authentication mechanisms in IoT.Then we offered the result of our detailed comparison.Our comparison was based on four criteria: The cryptographic mechanisms and simulators used,the provided security features,the resistance against most popular attacks,and the computational and communication cost.The result of our comparison shows that the authentication schemes in the literature may be based on several cryptography technics including Hash function,ECC,Encryption and decryption,Chaotic map,and Random numbers.Each one of the listed technologies has some features which may help provide authenticity and confidentiality.The requirement of the authentication scheme in terms of computational and communication costs differs according to the technology used.Accordingly,the analysis of the advantages and weaknesses of the studied schemes determines the attacks and the security services that need more interest to overcome the gaps in recent schemes namely node capture,DoS attack,stolen verifier,denning-ssaco attack,GWN bypassing,unlinkability,key secrecy,and perfect forward.Finally,we provided some future research directions that may enhance the IoT authentication schemes.As a result,the wide deployment and scalability of the IoT networks.

    Acknowledgement:Researchers would like to thank the Deanship of Scientific Research,Qassim University for funding publication of this project.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows:Study conception and design: Mourade Azrour and Ahmad El Allaoui;data collection: Souhayla Dargaoui;analysis and interpretation of results:Azidine Guezzaz and Abdulatif Alabdulatif;draft manuscript preparation:Abdullah Alnajim.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The used data are available once the readers want by contacting mo.azrour@umi.ac.ma.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    嫩草影院精品99| av视频免费观看在线观看| 欧美黄色淫秽网站| 中文字幕人妻丝袜一区二区| 亚洲成人久久性| 国产精品一区二区精品视频观看| 成人永久免费在线观看视频| 搡老熟女国产l中国老女人| 久久久久久久久免费视频了| 校园春色视频在线观看| 国产精品久久电影中文字幕| 啪啪无遮挡十八禁网站| 日韩 欧美 亚洲 中文字幕| 在线观看免费视频日本深夜| 黄色a级毛片大全视频| 18禁黄网站禁片午夜丰满| 色播亚洲综合网| 88av欧美| av天堂在线播放| 国产成人欧美| 精品电影一区二区在线| 老司机靠b影院| 精品国产亚洲在线| 美女国产高潮福利片在线看| 亚洲自偷自拍图片 自拍| 成人永久免费在线观看视频| www日本在线高清视频| 欧美乱码精品一区二区三区| 国产亚洲精品av在线| 韩国av一区二区三区四区| 男女之事视频高清在线观看| 亚洲少妇的诱惑av| 老司机深夜福利视频在线观看| 成人国语在线视频| 99国产精品一区二区蜜桃av| 亚洲中文av在线| 亚洲国产精品sss在线观看| 国产亚洲精品第一综合不卡| 日本五十路高清| 欧美+亚洲+日韩+国产| 此物有八面人人有两片| 欧美日韩黄片免| 久久精品91蜜桃| 国产午夜福利久久久久久| 不卡一级毛片| 日本撒尿小便嘘嘘汇集6| 精品国产乱码久久久久久男人| ponron亚洲| 中文字幕久久专区| 久99久视频精品免费| 母亲3免费完整高清在线观看| 午夜福利免费观看在线| 1024香蕉在线观看| 一级a爱片免费观看的视频| 亚洲中文字幕日韩| 热re99久久国产66热| 色av中文字幕| 可以在线观看的亚洲视频| 麻豆国产av国片精品| 女警被强在线播放| 99在线视频只有这里精品首页| av有码第一页| 久热这里只有精品99| 成人国产一区最新在线观看| 国产男靠女视频免费网站| 美女午夜性视频免费| 久久久久国产精品人妻aⅴ院| 亚洲第一电影网av| 女人被狂操c到高潮| 国产精品亚洲av一区麻豆| 亚洲成国产人片在线观看| 国产单亲对白刺激| 精品免费久久久久久久清纯| 在线天堂中文资源库| 一区福利在线观看| av视频免费观看在线观看| 欧美黄色片欧美黄色片| 激情视频va一区二区三区| 亚洲av片天天在线观看| 级片在线观看| a在线观看视频网站| 满18在线观看网站| 视频区欧美日本亚洲| 日韩欧美一区二区三区在线观看| 色在线成人网| 自线自在国产av| 身体一侧抽搐| 黄色成人免费大全| 欧美日韩精品网址| 国产1区2区3区精品| 午夜久久久久精精品| 大码成人一级视频| 国产97色在线日韩免费| av片东京热男人的天堂| 美女 人体艺术 gogo| 91国产中文字幕| 母亲3免费完整高清在线观看| 亚洲国产欧美一区二区综合| 91国产中文字幕| 18禁裸乳无遮挡免费网站照片 | 国内精品久久久久精免费| 99久久99久久久精品蜜桃| 变态另类成人亚洲欧美熟女 | 亚洲性夜色夜夜综合| 极品教师在线免费播放| 欧美日韩亚洲综合一区二区三区_| 亚洲成av片中文字幕在线观看| 亚洲av五月六月丁香网| 久久精品亚洲熟妇少妇任你| 精品国产国语对白av| 高潮久久久久久久久久久不卡| 日本三级黄在线观看| 人妻久久中文字幕网| 亚洲色图综合在线观看| 色老头精品视频在线观看| 久久精品91蜜桃| 好男人电影高清在线观看| 男女下面进入的视频免费午夜 | 亚洲熟女毛片儿| 亚洲精品在线美女| 无遮挡黄片免费观看| 在线永久观看黄色视频| 99精品欧美一区二区三区四区| 国产精品香港三级国产av潘金莲| 亚洲精品一区av在线观看| 91字幕亚洲| 国产欧美日韩一区二区三区在线| 国产乱人伦免费视频| 99国产精品一区二区三区| 高潮久久久久久久久久久不卡| 午夜成年电影在线免费观看| 婷婷丁香在线五月| 非洲黑人性xxxx精品又粗又长| 真人一进一出gif抽搐免费| 久久人妻熟女aⅴ| 免费观看人在逋| 国产成人欧美| 侵犯人妻中文字幕一二三四区| 不卡av一区二区三区| 亚洲专区字幕在线| 看黄色毛片网站| 人妻丰满熟妇av一区二区三区| 正在播放国产对白刺激| 午夜免费鲁丝| 一卡2卡三卡四卡精品乱码亚洲| 国产国语露脸激情在线看| 国产av又大| 欧美乱妇无乱码| 18禁黄网站禁片午夜丰满| 1024视频免费在线观看| 夜夜爽天天搞| 亚洲av熟女| 亚洲av熟女| 国产伦人伦偷精品视频| 国产一区二区激情短视频| 亚洲成av片中文字幕在线观看| 他把我摸到了高潮在线观看| 99热只有精品国产| 国产欧美日韩一区二区三| 97人妻精品一区二区三区麻豆 | 最近最新中文字幕大全电影3 | 亚洲中文av在线| videosex国产| 亚洲性夜色夜夜综合| 免费看美女性在线毛片视频| 亚洲av电影在线进入| 国产一区二区三区综合在线观看| 亚洲,欧美精品.| 久久久久久国产a免费观看| 天堂√8在线中文| 十八禁网站免费在线| 亚洲av成人av| 欧美黑人欧美精品刺激| 国产成人精品在线电影| 淫秽高清视频在线观看| 变态另类丝袜制服| 十八禁网站免费在线| 男女床上黄色一级片免费看| 亚洲视频免费观看视频| 免费在线观看影片大全网站| 一边摸一边做爽爽视频免费| 激情视频va一区二区三区| 亚洲精品中文字幕在线视频| 中文亚洲av片在线观看爽| 亚洲中文字幕日韩| 成人特级黄色片久久久久久久| 在线观看免费视频日本深夜| 女人被躁到高潮嗷嗷叫费观| 国产成人欧美| 乱人伦中国视频| 午夜影院日韩av| 在线视频色国产色| 日本 av在线| 一a级毛片在线观看| 久久婷婷人人爽人人干人人爱 | 色尼玛亚洲综合影院| 脱女人内裤的视频| 亚洲精品av麻豆狂野| 热re99久久国产66热| 一本综合久久免费| 亚洲国产精品合色在线| 亚洲专区国产一区二区| 精品不卡国产一区二区三区| 午夜两性在线视频| 老熟妇仑乱视频hdxx| 韩国精品一区二区三区| 成人av一区二区三区在线看| 精品电影一区二区在线| 亚洲精品一区av在线观看| 国产精品久久久人人做人人爽| 在线视频色国产色| 黄色女人牲交| 国产一区二区在线av高清观看| 欧美日韩中文字幕国产精品一区二区三区 | 精品无人区乱码1区二区| 可以在线观看的亚洲视频| 无人区码免费观看不卡| 免费在线观看黄色视频的| 国产av又大| 久久久久久亚洲精品国产蜜桃av| 成人亚洲精品av一区二区| 久久影院123| 啦啦啦观看免费观看视频高清 | 亚洲av美国av| 欧美日韩中文字幕国产精品一区二区三区 | www.自偷自拍.com| 丁香欧美五月| av在线播放免费不卡| 天堂动漫精品| 19禁男女啪啪无遮挡网站| 90打野战视频偷拍视频| 亚洲狠狠婷婷综合久久图片| av在线天堂中文字幕| 99国产精品一区二区蜜桃av| 一区在线观看完整版| 性少妇av在线| 亚洲av电影不卡..在线观看| 亚洲在线自拍视频| 欧美乱色亚洲激情| 黄色 视频免费看| 一级a爱片免费观看的视频| 深夜精品福利| 制服丝袜大香蕉在线| 日韩大码丰满熟妇| 精品一区二区三区四区五区乱码| 欧美另类亚洲清纯唯美| 国产成人精品久久二区二区免费| 久久久久国产精品人妻aⅴ院| 欧美日韩黄片免| 日韩成人在线观看一区二区三区| 亚洲第一青青草原| 中文字幕另类日韩欧美亚洲嫩草| 精品免费久久久久久久清纯| 国产熟女午夜一区二区三区| 老司机午夜福利在线观看视频| 黑人欧美特级aaaaaa片| 中文字幕高清在线视频| 欧美国产精品va在线观看不卡| 麻豆成人av在线观看| 久久人人97超碰香蕉20202| 亚洲第一av免费看| 亚洲,欧美精品.| 国产一区二区三区在线臀色熟女| 亚洲aⅴ乱码一区二区在线播放 | 亚洲一区中文字幕在线| 一级黄色大片毛片| 国产男靠女视频免费网站| 一区二区三区高清视频在线| 亚洲欧美日韩无卡精品| 亚洲男人天堂网一区| 久久人妻福利社区极品人妻图片| 在线观看免费日韩欧美大片| 精品无人区乱码1区二区| www.熟女人妻精品国产| 看免费av毛片| 精品久久久精品久久久| 国产亚洲av高清不卡| 亚洲精品一区av在线观看| 成人精品一区二区免费| 天天一区二区日本电影三级 | 亚洲aⅴ乱码一区二区在线播放 | 国产99白浆流出| 欧美日本亚洲视频在线播放| 岛国视频午夜一区免费看| 性色av乱码一区二区三区2| 高清毛片免费观看视频网站| 少妇的丰满在线观看| 欧美久久黑人一区二区| 欧美 亚洲 国产 日韩一| 不卡一级毛片| 国产又色又爽无遮挡免费看| 国产一区二区三区综合在线观看| 高清黄色对白视频在线免费看| 制服诱惑二区| 精品午夜福利视频在线观看一区| 中文字幕高清在线视频| 国产一级毛片七仙女欲春2 | 亚洲伊人色综图| 国产蜜桃级精品一区二区三区| 欧美成人性av电影在线观看| 国产极品粉嫩免费观看在线| 亚洲国产中文字幕在线视频| 精品久久久久久久人妻蜜臀av | 在线视频色国产色| АⅤ资源中文在线天堂| 日韩av在线大香蕉| 女人精品久久久久毛片| 脱女人内裤的视频| 国产精品免费视频内射| 中文字幕人成人乱码亚洲影| 亚洲中文av在线| www.www免费av| 亚洲精品国产一区二区精华液| 久久国产亚洲av麻豆专区| 精品少妇一区二区三区视频日本电影| 波多野结衣av一区二区av| 亚洲熟妇熟女久久| 女性生殖器流出的白浆| 免费看美女性在线毛片视频| 亚洲人成电影免费在线| 人人澡人人妻人| 欧洲精品卡2卡3卡4卡5卡区| 夜夜躁狠狠躁天天躁| 欧洲精品卡2卡3卡4卡5卡区| 9191精品国产免费久久| 侵犯人妻中文字幕一二三四区| 久久狼人影院| 亚洲精品美女久久久久99蜜臀| 国产精品久久视频播放| 久久草成人影院| 欧美日本视频| ponron亚洲| 丰满的人妻完整版| 亚洲av熟女| 很黄的视频免费| 精品一区二区三区av网在线观看| 亚洲午夜精品一区,二区,三区| 国产亚洲精品第一综合不卡| 中文字幕人妻丝袜一区二区| 午夜福利在线观看吧| 91麻豆av在线| 搡老熟女国产l中国老女人| 91字幕亚洲| 色综合站精品国产| 高清毛片免费观看视频网站| 多毛熟女@视频| 亚洲专区字幕在线| 免费在线观看影片大全网站| 久久婷婷人人爽人人干人人爱 | 中文字幕高清在线视频| 欧美亚洲日本最大视频资源| 一进一出好大好爽视频| 日本 欧美在线| 国产精品久久电影中文字幕| 亚洲午夜精品一区,二区,三区| av中文乱码字幕在线| 黄色视频不卡| 欧美乱妇无乱码| 天堂影院成人在线观看| 岛国在线观看网站| 国产精品香港三级国产av潘金莲| 少妇裸体淫交视频免费看高清 | 亚洲avbb在线观看| 国产伦一二天堂av在线观看| 国产精品香港三级国产av潘金莲| 91av网站免费观看| 国产麻豆成人av免费视频| 国产高清videossex| 老熟妇乱子伦视频在线观看| 美女午夜性视频免费| 国产伦人伦偷精品视频| 日本撒尿小便嘘嘘汇集6| 亚洲精品av麻豆狂野| 黄色 视频免费看| АⅤ资源中文在线天堂| 好男人在线观看高清免费视频 | 美女扒开内裤让男人捅视频| 岛国在线观看网站| 国产又色又爽无遮挡免费看| 亚洲七黄色美女视频| 久久精品国产99精品国产亚洲性色 | 日韩av在线大香蕉| 午夜福利成人在线免费观看| 欧美不卡视频在线免费观看 | 在线观看舔阴道视频| 啦啦啦观看免费观看视频高清 | www国产在线视频色| 777久久人妻少妇嫩草av网站| 久久久国产欧美日韩av| av福利片在线| 精品国产亚洲在线| 美女高潮到喷水免费观看| 国产精品一区二区免费欧美| 久久国产乱子伦精品免费另类| 制服诱惑二区| 精品少妇一区二区三区视频日本电影| 久久久久久久午夜电影| 在线观看免费日韩欧美大片| 欧美中文综合在线视频| 纯流量卡能插随身wifi吗| 久久天躁狠狠躁夜夜2o2o| 黑人操中国人逼视频| 男女床上黄色一级片免费看| 日韩一卡2卡3卡4卡2021年| 亚洲 欧美 日韩 在线 免费| 成人免费观看视频高清| 精品第一国产精品| 国产三级在线视频| 国产精品 国内视频| 9色porny在线观看| 久久精品国产亚洲av香蕉五月| 欧美色欧美亚洲另类二区 | 亚洲欧美一区二区三区黑人| 两人在一起打扑克的视频| 亚洲欧美激情在线| 最近最新免费中文字幕在线| 又黄又粗又硬又大视频| 深夜精品福利| 精品久久蜜臀av无| ponron亚洲| 久久九九热精品免费| 一二三四在线观看免费中文在| 香蕉丝袜av| 欧美大码av| 波多野结衣高清无吗| 亚洲人成77777在线视频| 国产99久久九九免费精品| 免费av毛片视频| 欧美日韩亚洲国产一区二区在线观看| 好男人电影高清在线观看| 日韩大码丰满熟妇| 99国产精品一区二区三区| 视频区欧美日本亚洲| 怎么达到女性高潮| 精品人妻在线不人妻| 女人被狂操c到高潮| 欧美+亚洲+日韩+国产| 欧美成人一区二区免费高清观看 | 国产成人精品久久二区二区免费| 国产精品久久久人人做人人爽| 欧美黄色淫秽网站| 久久久久久免费高清国产稀缺| 90打野战视频偷拍视频| 亚洲av日韩精品久久久久久密| 很黄的视频免费| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲精品av麻豆狂野| 精品电影一区二区在线| 免费女性裸体啪啪无遮挡网站| 国产精品 欧美亚洲| 欧美亚洲日本最大视频资源| 国产精品爽爽va在线观看网站 | 性色av乱码一区二区三区2| 一边摸一边抽搐一进一小说| 欧美大码av| 午夜精品国产一区二区电影| av在线天堂中文字幕| 成人18禁在线播放| 日本免费一区二区三区高清不卡 | 亚洲午夜理论影院| 欧美黑人精品巨大| 亚洲成av人片免费观看| 无限看片的www在线观看| 日韩欧美三级三区| 久久这里只有精品19| 麻豆成人av在线观看| 精品久久久久久久毛片微露脸| 法律面前人人平等表现在哪些方面| 12—13女人毛片做爰片一| 亚洲七黄色美女视频| 夜夜躁狠狠躁天天躁| 久久久国产欧美日韩av| 午夜福利视频1000在线观看 | 18禁国产床啪视频网站| 无人区码免费观看不卡| 日韩精品中文字幕看吧| 亚洲熟妇中文字幕五十中出| 久久久久久亚洲精品国产蜜桃av| av免费在线观看网站| 久久久久久久午夜电影| 熟女少妇亚洲综合色aaa.| 韩国精品一区二区三区| 亚洲国产欧美一区二区综合| 国产亚洲精品综合一区在线观看 | 狂野欧美激情性xxxx| 亚洲成人免费电影在线观看| 亚洲中文av在线| 精品第一国产精品| 亚洲国产看品久久| 精品无人区乱码1区二区| 亚洲成人免费电影在线观看| 中文字幕另类日韩欧美亚洲嫩草| 精品久久久久久久久久免费视频| 亚洲自拍偷在线| 中国美女看黄片| 久久精品亚洲精品国产色婷小说| 国产精品久久久人人做人人爽| 很黄的视频免费| 亚洲一区二区三区色噜噜| 国产亚洲精品久久久久5区| 可以在线观看毛片的网站| 精品一品国产午夜福利视频| 性少妇av在线| 丝袜在线中文字幕| 夜夜爽天天搞| 亚洲国产日韩欧美精品在线观看 | 黄片播放在线免费| 精品人妻在线不人妻| 久久久久久亚洲精品国产蜜桃av| 国产99白浆流出| 免费看十八禁软件| 成人精品一区二区免费| 黄片小视频在线播放| 欧美日韩亚洲国产一区二区在线观看| 国产精品影院久久| 午夜免费激情av| 免费无遮挡裸体视频| 国内毛片毛片毛片毛片毛片| 日日夜夜操网爽| 国产精品,欧美在线| 可以免费在线观看a视频的电影网站| 亚洲国产欧美日韩在线播放| 啪啪无遮挡十八禁网站| 欧美乱色亚洲激情| 亚洲性夜色夜夜综合| 啦啦啦韩国在线观看视频| 在线观看一区二区三区| 精品国产一区二区久久| 亚洲一区二区三区色噜噜| 亚洲精品久久国产高清桃花| 老司机深夜福利视频在线观看| 视频区欧美日本亚洲| 人人澡人人妻人| 国产av一区二区精品久久| 精品久久蜜臀av无| 天天躁夜夜躁狠狠躁躁| 青草久久国产| 激情在线观看视频在线高清| 女性生殖器流出的白浆| 免费一级毛片在线播放高清视频 | 亚洲精品国产一区二区精华液| 久久精品国产亚洲av高清一级| 丁香六月欧美| 99在线人妻在线中文字幕| 亚洲国产精品久久男人天堂| 亚洲美女黄片视频| 两性夫妻黄色片| 麻豆成人av在线观看| 日韩av在线大香蕉| 不卡av一区二区三区| 精品久久久久久久毛片微露脸| 可以在线观看毛片的网站| 99国产精品免费福利视频| 丰满人妻熟妇乱又伦精品不卡| 搡老岳熟女国产| 日本vs欧美在线观看视频| 91字幕亚洲| 久9热在线精品视频| 日韩中文字幕欧美一区二区| 最近最新免费中文字幕在线| 欧美激情久久久久久爽电影 | 国产成人欧美在线观看| 日韩精品青青久久久久久| 久久久国产成人免费| 国产99白浆流出| 国产色视频综合| 日韩中文字幕欧美一区二区| 午夜免费激情av| 亚洲三区欧美一区| 免费人成视频x8x8入口观看| 色婷婷久久久亚洲欧美| 亚洲av第一区精品v没综合| 好看av亚洲va欧美ⅴa在| 久久久久久大精品| 91老司机精品| 亚洲成av片中文字幕在线观看| 国产aⅴ精品一区二区三区波| 丰满的人妻完整版| 色综合欧美亚洲国产小说| 国产xxxxx性猛交| 久久久国产成人精品二区| 波多野结衣av一区二区av| 欧美黄色淫秽网站| 午夜福利18| 国产精品亚洲av一区麻豆| 久久久国产欧美日韩av| 欧美中文日本在线观看视频| 亚洲自拍偷在线| 久久久国产成人精品二区| 日韩成人在线观看一区二区三区| aaaaa片日本免费| 午夜免费成人在线视频| 亚洲免费av在线视频| 神马国产精品三级电影在线观看 | 麻豆成人av在线观看| 久久久久国内视频| 日韩中文字幕欧美一区二区| 久久九九热精品免费| 国产一级毛片七仙女欲春2 | a级毛片在线看网站| 欧美成人午夜精品| 91国产中文字幕| 精品一区二区三区视频在线观看免费| 91国产中文字幕| 身体一侧抽搐| 中文字幕人妻熟女乱码| 精品电影一区二区在线| 一进一出抽搐动态| 神马国产精品三级电影在线观看 | 色哟哟哟哟哟哟| 别揉我奶头~嗯~啊~动态视频| 亚洲 国产 在线| 精品无人区乱码1区二区| 国产精品影院久久| 性欧美人与动物交配|