• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization

    2024-05-25 14:41:08KranthiAlluriandGopikrishnan
    Computers Materials&Continua 2024年4期

    Kranthi Alluri and S.Gopikrishnan

    School of Computer Science and Engineering,VIT-AP University,Amaravathi,Andhra Pradesh,522241,India

    ABSTRACT Secure authentication and accurate localization among Internet of Things(IoT)sensors are pivotal for the functionality and integrity of IoT networks.IoT authentication and localization are intricate and symbiotic,impacting both the security and operational functionality of IoT systems.Hence,accurate localization and lightweight authentication on resource-constrained IoT devices pose several challenges.To overcome these challenges,recent approaches have used encryption techniques with well-known key infrastructures.However,these methods are inefficient due to the increasing number of data breaches in their localization approaches.This proposed research efficiently integrates authentication and localization processes in such a way that they complement each other without compromising on security or accuracy.The proposed framework aims to detect active attacks within IoT networks,precisely localize malicious IoT devices participating in these attacks,and establish dynamic implicit authentication mechanisms.This integrated framework proposes a Correlation Composition Awareness (CCA)model,which explores innovative approaches to device correlations,enhancing the accuracy of attack detection and localization.Additionally,this framework introduces the Pair Collaborative Localization (PCL) technique,facilitating precise identification of the exact locations of malicious IoT devices.To address device authentication,a Behavior and Performance Measurement(BPM)scheme is developed,ensuring that only trusted devices gain access to the network.This work has been evaluated across various environments and compared against existing models.The results prove that the proposed methodology attains 96%attack detection accuracy,84%localization accuracy,and 98%device authentication accuracy.

    KEYWORDS Sensor localization;IoT authentication;network security;data accuracy;precise location;access control;security framework

    1 Introduction

    The Internet of Things (IoT) is a network of interconnected electronic and mechanical devices that can communicate autonomously without human intervention.IoT is dependent on connectivity to function,enabling sensors,actuators,and controllers to communicate with one another and the cloud.Connected devices are changing industries,homes,and lives,paving the way for an intelligent,connected future.IoT devices possess diverse internet connections during real-time deployment.The connectivity of IoT devices is impacted by various issues,including security vulnerabilities,reliability concerns,limited scalability,and the need for seamless integration of connectivity technologies to ensure accurate position estimation.Additionally,the deployment of localization devices such as anchors or beacons poses challenges.Sensor localization improves IoT security,dependability,and efficiency.IoT applications can improve authentication,access control,data accuracy,and resource allocation by knowing sensor locations[1].Sensor localization uses many methods and technologies.The Global Positioning System(GPS)is used to accurately measure latitude,longitude,and altitude.GPS works best outdoors and may struggle indoors or in obstructed areas with weak satellite signals[2].

    Network Grouping:IoT authentication groups devices by parameters using network grouping.Effective management and security of large IoT networks require this grouping strategy.Clustering devices help network managers manage authentication,access,and security.IoT devices include sensors,actuators,gateways,and controllers.Authentication and security processes tailored to each device type’s demands and vulnerabilities can be applied by administrators.Another major network grouping factor is device proximity [3].IoT devices are commonly spread between zones.Administrators can implement context-aware access controls and authentication by grouping devices by location.

    Sensor Identification:Each IoT sensor has a unique identity,either a globally unique identifier(GUID)[4]or a device-specific key.This digital fingerprint distinguishes the sensor from other network devices.An IoT sensor’s unique identifier is registered with the network or a central authentication authority during setup or deployment.Registering the sensor with the network verifies its presence and involvement.

    Sensor Authentication:Sensor authentication usually involves a challenge-response system [5] while connecting to the network or other devices.The sensor must correctly answer a cryptographic inquiry like a nonce or random value using its identification credentials.IoT sensor authentication often uses public key cryptography.A sensor may have a private key that matches the network’s public key.

    2 Background and Literature Review

    The fundamentals of sensor discovery,localization algorithms,and IoT authentication schemes employed in our proposed scheme are covered in this section.To distinguish themselves from other devices,sensor devices should have Media Access Control (MAC) addresses or digital certificates[6].During authentication,this identification verifies the device.To authenticate the sensor and IoT platform before data sharing,robust authentication protocols [7],such as mutual authentication,should be used.Role-Based Access Control(RBAC)should be used to design and enforce permissions and access restrictions for each sensor device[8]to ensure they only execute authorized actions and access relevant data.

    2.1 Localization Techniques

    IoT authentication relies on device geolocation[9].Many IoT devices position themselves using GPS or Wi-Fi triangulation [10].The IoT platform can use this data to verify the device’s location before giving access.Virtual “fences”surround geographic locations in geofencing.IoT devices can perform actions or authentication checks while entering or exiting specific zones.Place Bluetooth beacons in recognized places to transmit signals.IoT devices with Bluetooth can detect beacons for proximity-based authentication.Nearby Wi-Fi SSIDs and access point signal intensity are identified.Radio-Frequency Identification (RFID) and Near Field Communication (NFC) offer proximitybased verification.Nearby readers or devices can read IoT RFID or NFC tags.As a summary,the magnetic calibration technique is employed in [11] to attain energy efficiency.However,the incorporation of cloud computing is necessary in this model.The paper[12]introduces convolutional neural networks,highlighting their offline preprocessing advantage.However,it necessitates the exploration of optimising algorithms.The concept of dead reckoning is introduced in[13],highlighting the advantage of magnetic calibration.However,there is still a need to improve its performance in localization.The Time Difference of Arrival (TDOA) technique,as described in [14],is utilised to attain a high level of precision.However,it is necessary to further investigate and employ advanced positioning techniques.The Rivest-Shamir-Adleman cryptosystem technique,proposed in[15],aims to leverage blockchain technology for trust management.However,optimisation is necessary in order to decrease the computational cost.

    2.2 Authentication Schemes

    Device authentication and secure communication in IoT environments depend on authentication schemes[16].Based on IoT deployment requirements and constraints,many approaches and schemes can be used[17].Password-Based Authentication is a simple IoT platform authentication mechanism that uses a username and password[18].However,improper security can make this strategy vulnerable to password-guessing attacks.Certificate-based authentication,which uses X.509 certificates,is safer.A trusted Certificate Authority(CA)issues a unique certificate for each device.Certificates are more secure than passwords and resistant to common attacks.The desired level of security,IoT device capabilities,and use case determine the authentication strategy[19].To strengthen security,many IoT implementations use various authentication mechanisms.The Rivest Shamir Adleman cryptosystem is proposed in[15].Blockchain technology improves wireless sensor network(WSN)security and trust.Optimisation for scalability and computational cost.Based on mobile terminal radio signal quality,the paper[20]locates Narrowband IoT(NB-IoT)nodes using RF fingerprinting and machine learning.The location of NB-IoT nodes using mobile terminal radio signal quality without hardware is proposed in the article.Reference[21]proposes blockchain-based cascade encryption and trust evaluation.Malicious node localization and detection increase network security and service.Consider blockchainbased secure IoT-WSNs with hybrid machine learning for large,safe deployments.Reference [22]proposes machine learning-based correlation analysis for feature selection.Faster Message Queuing Telemetry Transport (MQTT) anomaly detection helps.Advanced correlation analysis can improve research efficiency.The model[23]leverages blockchain for authentication,data exchange,and nonrepudiation.For security and decentralisation,the proposed approach saves legitimate nodes’identities on a consortium blockchain.

    2.3 Attack Detection Techniques

    The federated intrusion detection system,(F-IDS)[24],uses federated learning.This model uses deep,convolutional,and recurrent neural networks as classifiers.Local learning allows devices to benefit from their peers’knowledge by sharing only model updates with an aggregation server to improve detection models while protecting data privacy.When one or more edge nodes are malicious,the model’s robustness can be improved.B-LSTM[25]is a hybrid IDS model that uses Map Reduce,Black Widow Optimised Convolutional-Long Short-Term Memory (BWO-CONV-LSTM),and the Artificial Bee Colony (ABC) algorithm for feature selection.Improving the B-LSTM to adapt to other public intrusion detection datasets and investigate adaptive strategies to detect higher-similarity attack classes like low-frequency Distributed Denial of Service(DDoS)attacks is still required.The paper[26]uses lightweight federated learning.This method uses ambient sensor and wearable device data from mobile user entities and equipment (UEs) to collaboratively and privately learn medical symptoms like COVID-19 with high accuracy.Investigating the seamless integration of asynchronous federated learning and blockchain can address open research issues and improve B5G network security and privacy.FC-IDS [27] is a machine learning-based,two-layer hierarchical intrusion detection method for IoT networks.This two-layer fog-cloud intrusion detection model finds intrusions into IoT networks while working with limited resources.It is better than other methods in terms of accuracy,precision,recall,and F1-score.Our security architecture relies on the CCA model,which introduces unique device correlation methods that greatly increase IoT attack detection and localization.Using coarse-grained IoT device correlations like delay and network quality,our strategy aims to detect active attacks and geolocate hostile IoT devices.Data is used to develop dynamic implicit authentication systems.Our method uses PCL to precisely locate hostile IoT devices and CCA model insights into attack detection.Faster response times and better isolation and mitigation increase IoT security.

    2.4 Requirements and Challenges

    Sensor localization in IoT authentication is difficult.IoT devices can operate in low-network environments [28].Localization algorithms may use offline or delayed processing to circumvent network difficulties.Securing it is another priority.Privacy and the integrity of location data matter.Thus,safe IoT authentication requires robust encryption and authentication.IoT sensors localise using GPS,Wi-Fi,Bluetooth,and RFID.Integrating various sensor data consistently and accurately is tough.Environmental variables like signal interference can also impair sensor data accuracy.Effective localization algorithms must withstand various environmental challenges in diverse environments.Managing and tracking many sensors in large IoT deployments is complex.Location data is crucial,making privacy a priority.IoT authentication must protect user location data and authorised access[29].Automated cars need real-time localization with low latency[30].Meeting these rigorous timing criteria is tough but critical for application safety and efficiency.

    2.5 Problem Statement

    Growing IoT use has enhanced connectivity and convenience.IoT networks face security risks as they grow.Underusing coarse IoT device correlations like delay and link quality to secure networks is troublesome.This problem demands a full security solution that uses these correlations to detect active attacks,locate rogue IoT devices,and establish dynamic implicit authentication.The framework must easily connect to existing IoT networks for practicality and scalability.This study has many goals.First,update the Correlation Composition Awareness model,which uses unique device correlation methods to detect and localise assaults.Second,localise malicious IoT devices with Pair Collaborative Localization.Behaviour and performance measurement authentication are needed to restrict network access to trusted devices.This issue shows that IoT network security requires a coarse device correlation security architecture.

    3 Proposed Identification and Authentication Algorithm

    This section covers the basic system model,identification,authentication,and verification processes for detecting assaults,malicious nodes,and suspicious devices.Fig.1 demonstrates a multilayered beacon node and signal processing system for IoT network attacker detection.Edge servers calculate and notify hostile nodes’positions to cloud servers for network protection from data theft and disturbances.Sensor nodes report signal strength.

    Figure 1: Process of localizing malicious nodes of the proposed model

    3.1 System Model

    Wireless sensor nodes are divided into ten regions and clusters as sink,cluster head,and sensor nodes based on computational capabilities in the network model.Sensor nodes lack location knowledge;thus,beacon and sink nodes find locations and identify malicious nodes with unique identifiers.Organising nodes into clusters,correct position determination,detecting and addressing rogue nodes,and using unique identities for node support are model priorities for efficient performance.The system model establishes the wireless sensor node network structure and assumptions for algorithms 1,2,and 3.The system model separates the network into sink,cluster head,and sensor node areas and clusters.The algorithms improve IoT network performance and security by addressing system model challenges.The CCA-PCL model uses coarse IoT device correlations,targeting latency,and network quality to make attack detection and localization better.Bayesian Sensor Relocation and Traffic Monitoring (BSRTM) [15],Weighted K-Nearest Neighbours (WKNN) [20],Block-Based Sparse Localization (BBSL) [21],Improved Range-Free Detection Algorithm (IRDA) [22],Adaptive Detection of Sybil Nodes (ADSN) [23],Flow-based Intrusion Detection System (F-IDS) [24],Bidirectional Long Short-Term Memory (B-LSTM) [25],Low-Frequency Logistic Model (LFLM)[26],Fuzzy-based Classification Intrusion Detection System (FC-IDS) [27],and High-Performance Boundary-based Feature Learning(HBFL)[28]offer IoT security insights,whereas CCA-PCL uses correlation composition awareness.The proposed methodology is unique in its ability to scale and evaluate the chain of trust using intelligent communication among IoT nodes in a specific area.The security performance of the system is isolated for each area,ensuring that DoS attacks are unable to manipulate and gain simultaneous access to multiple regions.

    3.2 Identification Phase

    The proposed method uses correlation analysis to detect and localise wireless network assaults using Gated Recurrent Units (GRU) machine learning.It addresses wireless channel randomnessrelated latency and link quality correlations.GRU helps the attack detection model,trained on dataset DL with pairings (G;ML),detect attacks with comparable correlations.Delays and link quality are correlated between devices.Attack localization auxiliary model is trained on HL,where labels(ML) represent adversary zones,using the detection model’s outcome.The system has an early exit feature and two auxiliary classifiers for robustness.Gated Recurrent Units overcome wireless channel randomization by using correlation information across IoT devices to identify and localise assaults.

    1.If denotes the count of IoT devices,the correlation of link quality (Q) or packet delay (D)between IoT devicesiandjis computed according to Eq.(1).Here,N{Q,D}and T represent the size of the window.

    For the training of our attack detection model,we generated a training dataset.Where the input features consist of correlations between pairs of devices in terms of delay and link quality.

    2.For training the attack detection model,a data set was constructed incorporating delay and link quality{(G,YD|G=whereYDrepresents the results from the detection model.Additionally,

    to train the auxiliary attack localization model,a separate dataset was generated leveraging the outcomes obtained from the detection model.Algorithm 1 discovers IoT nodes collaboratively.Start model optimisation by initialising training epochs and stochastic gradient descent.A training loop updates the model with paired data and calculates losses.The final model predicts dataset node IDs.Algorithms train models to detect IoT nodes in networks.

    3.3 Authentication Phase

    Continuous device authentication in IoT networks reduces battery life due to communication and computational issues.CCA-PCL has a Device Anomaly Detection module to address this.This module detects malicious IoT devices by analysing CPU and memory consumption.Based on Pair Collaborative Localization results,CCA-PCL dynamically narrows suspect devices,implicitly authenticating them and minimising system overhead for longer device life spans.It optimises authentication by targeting threats and exploiting performance metrics to improve accuracy and reduce network load.The algorithm detects anomalies in behavior and performance measurement to protect IoT devices by comparing data points to a model.Designing dynamic and adaptive implicit authentication solutions for IoT systems to address changing threats and network conditions while protecting user privacy and system integrity is difficult.Continuous authentication tracking of user and device activities is essential.With anomaly detection and machine learning to generate behavioral profiles,systems can dynamically adjust authentication criteria and identify questionable activities to trigger re-authentication.To minimise CCA model and PCL strategy effects from network heterogeneity and device variability,the proposed security architecture must be thoroughly reviewed.The CCA model adapts to IoT devices and networks via adaptive learning and feature engineering for robustness.

    3.4 Verification Phase

    Validating and confirming network transactions is called verification.To ensure transaction accuracy and integrity,many peers run the verification algorithm.Due to the many computations and communication overhead,this verification procedure can diminish operational efficiency and energy waste.The verification step authenticates people,devices,and data using various authentication protocols and cryptographic algorithms.A chaos-based privacy-preserving cryptographic algorithm and MAC can safeguard smart home data communications.Specialised smart contracts and authorization mechanisms can also help implement blockchain authentication and access control.Using lightweight anti-malware solutions to protect IoT devices from malware and developing lightweight cryptographic algorithms and efficient key management schemes to secure data while allowing authorised access can reduce computational overhead and speed up verification.The Algorithm 2 helps grid devices locate themselves like a GPS.Data is collected from reliable“anchor”points first.It then analyses patterns in paired data points,adjusts internal data representations,and minimises inconsistencies to improve its grid comprehension.This optimization process,fueled by“stochastic gradient descent,”produces a revised map that lets each device calculate its position depending on its neighbors.

    3.5 Attack Detection Phase

    The correlation composition-aware attack detection algorithm (Algorithm 3) and the performance algorithm hunt for hidden attackers in a network.It challenges target devices,analyses their responses,and uses extracted features to train a model that identifies malicious patterns.Suspicious devices are flagged with confidence scores,helping system defenders prioritise and neutralise potential threats.Real-world testing and validation of the proposed security framework across IoT domains are essential to assessing its flexibility and efficacy.The validation procedure will include many evaluations to verify robustness in various environments and attack vectors.First,we will run lab tests to simulate different assault situations and environmental conditions.This lets us assess the framework’s attack detection accuracy,malicious device localization precision,and dynamic implicit authentication effectiveness.By integrating privacy-enhancing features alongside powerful security procedures,the proposed IoT sensor localization architecture addresses changing data protection legislation and standards.To comply,the CCA model prioritises anonymized data aggregation,reducing sensitive information while using correlations for attack detection and location.PCL uses encrypted communication channels and encryption to locate rogue IoT devices,enhancing privacy.The BPM device authentication approach follows privacy-by-design principles to rigorously validate trusted devices without compromising user data.

    4 Result Evaluation

    Our method uses trust evaluation to discover rogue sensor nodes in the network.To prevent network intrusion,we added authentication.A trust value is calculated for each beacon node to determine its reliability and security.The model was tested using a large-scale network simulation model.This research needed several implementations of state-of-the-art current models to compare the proposed model’s performance to existing models.Fig.2 shows the simulation model.For the two main aims of this work,the suggested model was compared against two sets of similar models.In the initial phase,the proposed model’s attack detection performance is assessed using metrics like accuracy,F1-score,precision score,and recall score,and the results are compared to F-IDS[24],B-LSTM [25],LFLM [26],FC-IDS [27],and HBFL [28].The proposed model’s localization performance is assessed in the second phase.The proposed model was compared to BSRTM [15],WKNN [20],BBSL [21],IRDA [22],ADSN [23],and the proposed CCA-PCL model on accuracy,F1-score,precision score,and other parameters.In conclusion,the suggested localization model is evaluated for transaction delay,energy utilisation,throughput,and honesty.Comparing the suggested model to localization analysis models confirmed its improvement.

    Figure 2: Simulation model

    4.1 Simulation Model

    Simulation findings from numerous scenarios validate the suggested system model.Our models’network planning and simulation were done in MATLAB R2021a on a workstation with an Intel(R)Xeon(R)Silver 4214 CPU@2.20 GHz 2.19 GHz(2 processors),128 GB of RAM(128 GB useable),64-bit Windows 10,and an x64-based processor.Python was used for data analysis and processing.Table 1 summarizes network deployment and extensive security analysis simulation setup parameters.We used Solidity to create smart contracts and consensus processes in addition to Python and MATLAB.

    Table 1: Simulation setup for proposed network model

    4.2 Performance Metrics

    The proposed system’s performance is assessed through the examination of the following four metrics: Localization error (LE): This measure quantifies how far away the estimated position of a sensor node is from its true position.This can be calculated as LE=and average localizationerror (ALE) is calculated as ALEIn the anonymous node I,while(xi,yi) represent its computed coordinates.The variable p signifies the number of unknown nodes,and Q denotes the communication radius of the network.Localization errors are standardised by normalising them to the radio range of sensor nodes.This involves dividing the localization errors by the radio range of the sensor nodes,simplifying the comparison of performance across different localization systems[30].This research area’s average localization accuracy assesses node placement precision.This is calculated using all study nodes’average localization errors.Unknown sensor node location: It assesses how well the system finds new sensor nodes.A confusion matrix: This matrix rates the system’s attack classification.The system is tested using the publicly available CICIDS 2017 benchmark dataset with varied assaults.Localization error and ALE are calculated from predicted sensor node coordinates and dataset positions.Localization of unknown sensor nodes assesses the system’s ability to find new ones.The dataset has training and test sets.The system is taught and tested on training and test sets.The confusion matrix measures system attack classification.Compare system-predicted attack labels to ground-truth labels.Calculate precision,recall,and F1-score from the confusion matrix.The system’s effectiveness is measured by its average detection rate,accuracy,precision,and recall.The system’s attack detection and classification metrics are calculated in[21].

    4.3 Energy Utilization Performance

    Energy optimisation and node-to-node communication in wireless sensor networks are crucial.It assesses the trustworthiness of network nodes.We examined energy use in low-power IoT nodes to boost energy.For a data transmission of k bits across a distance D and a threshold distance Do,the required transmission energy is calculated as ETX(s)=k × (Ee+Ef) × D2,for beacon packets ETX(b)=0.2 × (Ee+Ef).Hence the total energy utilization for the time slice t is calculated as Et=ETX(s)+ETX(b).Here,Efis the energy being received,and Eeis the power being lost somewhere along the line.Innovative integration of correlation composition analysis awareness and pair collaborative localization into a single framework improves model efficiency at low-power IoT nodes and reduces communication overhead.Fig.3 compares Region 1’s average energy use.Energy utilisation performance of the proposed model with 10 IoT sensor nodes:BSRTM 70%,WKNN 71.5%,BBSL 72.5%,IRDA 71.86%,ADSN 72.68%,and our proposed method 71.234%.With 100 IoT sensor nodes,BSRTM uses 91.254% of energy,whereas our proposed technique uses 75.648%,a 15.606%variation,and a minimum of 5.587%.Attack detection is done internally during localization.The region’s reward function from the previous round updates peer node location process outcomes.This reduces computational costs and improves low-power IoT node location accuracy.

    Figure 3: Energy utilization comparison

    4.4 Honesty Analysis

    We analyse honesty to calculate behavioral trust for secure attack localization and detection in IoT-based wireless sensor networks.This honesty performance metric is calculated as ho=Ks/Knthat proves the behavioral trust.There areKninteractions between source and destination nodes,andKsinteractions between source and destination nodes which lead to successful results.Behavioral trust in beacons is compromised when malicious nodes are within the radius of an anchor node.Impaired beacon node trust leads to incorrect selection of anchor and cluster head nodes for accurate localization of malicious nodes in the IoT.We have calculated the honesty of each IoT node,and the average honesty performance of all the IoT nodes in a region is depicted in Fig.4.We calculated each IoT node’s honesty,and Fig.4 shows the region’s average honesty performance.When we assessed 10 IoT sensor nodes,BSRTM gave honesty as 97.0085%,WKNN 96.4379%,BBSL 96.4379%,IRDA 96.7308%,and ADSN 98.0842%.Our proposed method is 2%–3%more honest than our comparative methods.

    4.5 Transaction Delay Performance

    The transaction delay between base and sensor nodes was studied by adjusting the number of IoT nodes from 10 to 100 and setting the communication packets to 100 64 KB packets.We tested 10 IoT sensor nodes and found that BSRTM took 4 s,WKNN 7 s,BBSL 5 s,IRDA 6 s,ADSN 8 s,and our proposed solution 3 s.For 100 IoT sensor nodes,IRDA offers 88 s transaction delay while our proposed technique gives 78 s with 10 s fluctuations which is depicted in Fig.5.

    Now when friends ask him what happened out there, he wiggles his nose and gives them a stare. Of fishing I m particularly fond. But there s just too many surprises in McFeeglebee s pond.

    Figure 4: Honesty comparison

    Figure 5: Transaction delay comparison

    4.6 Attack Detection Analysis

    This method aims to detect and locate rogue nodes in IoT-based wireless sensor networks to improve security.It uses a comprehensive strategy that incorporates correlation composition and pair-wise collaborative localization.Investigation of IoT device-initiated assaults on network security and operation.Denial-of-service (DoS) attacks,unauthorised access attempts,and other malicious activities designed to disrupt the IoT network are evaluated.

    The system uses benchmark datasets like CICIDS 2017 and UNSW-NB15 to evaluate its performance,which cover normal network behavior and popular attacks.Many present and past intrusion detection experiments use the UNSW-NB15 dataset.The IXIA Perfect Storm programme created regular and anomalous network traffic packets.The tool simulates nine attack classes to update security vulnerabilities and exposures in the collected packets.Fig.6 depicts attack detection accuracy.When we evaluated 10 IoT sensor nodes,F-IDS had an 85% accuracy attack,B-LSTM had 85%,LFLM had 84%,FC-IDS had 86%,HBFL had 85%,and our proposed method had 87%.The HBFL technique delivers a 94%accuracy attack for 100 IoT sensor nodes,whereas our method gives 98.5%with 4.5%fluctuation.The assault detection F1-score is in Fig.7.When we tested 10 IoT sensor nodes,BSRTM gave F1-score attack 86.82%,WKNN 85.4%,BBSL 85.4%,IRDA 86.24%,ADSN 83.5%,and our suggested method 89.2%.The ADSN technique yields an 86.85%F1-score attack for 100 IoT sensor nodes,while our method gives 91.9%with a 5.05%variance.The attack detection precision score is presented in Fig.8.When we evaluate with 10 IoT sensor nodes,by applying BSRTM technique we got precision attack as 91.82%,WKNN technique 91.65%,BBSL technique 96.2%,IRDA technique 94.2%ADSN technique 97.6%.where our proposed method gives precision attack as 93.6%.When we evaluate this for 100 IoT sensor nodes ADSN method gives precision attack as 91.9%and our proposed method gives 96.5% with 4.6% variation.The recall score performance is presented in Fig.9.When we evaluate with 10 IoT sensor nodes,by applying BSRTM technique we got recall attack as 70.82%,WKNN technique 85.2%,BBSL technique 80.52%,IRDA technique 84.92%ADSN technique 93.5%gives recall attack as 93.5% where our proposed method gives recall accuracy as 94.6%.When we evaluate with 100 IoT Sensor nodes BSRTM gives recall attack as 85.2%and our proposed method gives the recall attack as 94.8%.

    Figure 6: Attack detection accuracy

    Figure 7: Attack detection F1-score

    Figure 8: Attack detection precision score

    Figure 9: Attack detection recall score

    4.7 Localization Performance

    In the proposed localization scheme,we calculate all node positions and deviations.Fig.1 shows how malicious nodes are organized.False negatives misclassify honest nodes as malevolent in network traffic.Along with honesty,intimacy is one technique to measure the behavioral trustworthy values of anchor nodes.It may be computed asIn=wheremais the time consumed for the node to communicate with the anchor node andmiis the collaboration time of a particular node with beacon i.

    Fig.10 shows localization precision.Localizing 10 IoT sensor nodes using BSRTM gives 92.13%accuracy.WKNN 91.52%,BBSL 91.68%,IRDA 91.78%,ADSN 91.89%,and our technique gives 92% localization accuracy.BBSL localizes 100 IoT sensor nodes with 92.84% accuracy,while our method has 94.21%,a 1.37%difference.These F1-score performance can be observed from Fig.11.The localization precision score is in Fig.12.BSRTM locates 10 IoT sensor nodes:81.54%,WKNN 91.25%,BBSL 85.45%,IRDA 90.5%,and ADSN 85.23%.Overall,our localization method is 79.25%accurate.ADSN’s 90.245% accuracy with 100 IoT sensor nodes is 5% lower than our suggested method’s 95.24%precision score localization.The localization recall score is in Fig.13.BSRTM locates 71.15% of 10 IoT sensor nodes,WKNN 70.45%,BBSL 73.5%,IRDA 71.25%,and ADSN 76.89%.This localization approach has a 79.25%recall.Localizing 100 IoT sensor nodes with BBSL yields a 75.542% recall score,4.448% lower than our suggested method’s 79.99%.Simulations show that 10 IoT sensor nodes can detect and locate rogue nodes with 100%honesty,71.234%energy use,and a 3-s transactional latency.

    Figure 10: Localization accuracy

    Figure 11: Localization F1-score

    Figure 12: Localization precision score

    Figure 13: Localization recall score

    5 Conclusion

    The correlation composition awareness model and the pair-collaborative localization technique are crucial to attack detection and localization accuracy.By simultaneously addressing numerous security objectives,the framework provides a strong defence against potential threats and improves IoT system security,dependability,and efficiency.The Behavior and Performance Measurement (BPM)scheme ensures strict device authentication,allowing only trusted devices to access the network,boosting framework effectiveness.The system’s dynamic implicit authentication algorithms adapt to changing security environments,protecting the IoT ecosystem.Overall,this research offers practical methods that advance IoT security and promise secure IoT implementations in the future.

    Acknowledgement:We acknowledge the support for the evaluation of the proposed model from Intel IoT Center for Excellence,VIT-AP University.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:Kranthi A;data collection:Kranthi A;analysis and interpretation of results:Kranthi A,Gopikrishnan S;draft manuscript preparation: Kranthi A.,Gopikrishnan S;supervision and result analysis:Gopikrishnan S.All authors reviewed the results and approved the final version.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男人狂女人下面高潮的视频| 国产av一区在线观看免费| 天堂影院成人在线观看| 97超碰精品成人国产| 国产白丝娇喘喷水9色精品| 91午夜精品亚洲一区二区三区| 99久久中文字幕三级久久日本| 成人漫画全彩无遮挡| 男人狂女人下面高潮的视频| 亚洲在线观看片| 看十八女毛片水多多多| 久久这里只有精品中国| 日韩av在线大香蕉| 九九爱精品视频在线观看| 91精品一卡2卡3卡4卡| 成人毛片a级毛片在线播放| 久久久久久久久大av| 午夜亚洲福利在线播放| 久久久国产成人精品二区| 小蜜桃在线观看免费完整版高清| 欧美精品一区二区大全| 又粗又硬又长又爽又黄的视频 | 欧美3d第一页| 亚洲精华国产精华液的使用体验 | 一级黄片播放器| 啦啦啦观看免费观看视频高清| 小说图片视频综合网站| 99久久中文字幕三级久久日本| 男女视频在线观看网站免费| 日韩 亚洲 欧美在线| 乱系列少妇在线播放| 欧美xxxx性猛交bbbb| 成人av在线播放网站| 最近2019中文字幕mv第一页| 男人的好看免费观看在线视频| 免费观看人在逋| 国产精品女同一区二区软件| 69人妻影院| 久久久久久久午夜电影| 在线观看美女被高潮喷水网站| 国产高清有码在线观看视频| 欧美成人a在线观看| 好男人在线观看高清免费视频| 99热6这里只有精品| 午夜福利成人在线免费观看| 大又大粗又爽又黄少妇毛片口| 欧美高清成人免费视频www| 久久久久国产网址| 国产女主播在线喷水免费视频网站 | 国产男人的电影天堂91| 性插视频无遮挡在线免费观看| 久久久久九九精品影院| 亚洲av免费高清在线观看| 午夜福利在线观看吧| 成人无遮挡网站| 国产老妇伦熟女老妇高清| 亚洲精品久久国产高清桃花| 高清毛片免费观看视频网站| 一进一出抽搐动态| 成人二区视频| 国产又黄又爽又无遮挡在线| 99精品在免费线老司机午夜| 中文资源天堂在线| 在线观看66精品国产| ponron亚洲| eeuss影院久久| 床上黄色一级片| 男女视频在线观看网站免费| 国产日本99.免费观看| 久久精品国产鲁丝片午夜精品| 国产在线男女| 在线a可以看的网站| 日本与韩国留学比较| 欧美精品国产亚洲| 欧美xxxx黑人xx丫x性爽| 99热这里只有是精品在线观看| 国产精品麻豆人妻色哟哟久久 | av卡一久久| 在现免费观看毛片| 国产人妻一区二区三区在| 国产精品美女特级片免费视频播放器| 夜夜夜夜夜久久久久| 国内久久婷婷六月综合欲色啪| 国产伦精品一区二区三区四那| 一个人看视频在线观看www免费| 亚洲中文字幕一区二区三区有码在线看| 只有这里有精品99| 日韩欧美一区二区三区在线观看| 国产精品三级大全| 国产成人a∨麻豆精品| 人妻少妇偷人精品九色| 又爽又黄无遮挡网站| 联通29元200g的流量卡| 国产激情偷乱视频一区二区| 欧美人与善性xxx| 日产精品乱码卡一卡2卡三| 美女xxoo啪啪120秒动态图| 久久99热6这里只有精品| 欧美变态另类bdsm刘玥| 自拍偷自拍亚洲精品老妇| 五月玫瑰六月丁香| 最近2019中文字幕mv第一页| 久久久久免费精品人妻一区二区| 99久久精品热视频| 亚洲成人久久爱视频| 日本一本二区三区精品| 欧美激情久久久久久爽电影| 大香蕉久久网| 国产熟女欧美一区二区| 最好的美女福利视频网| 菩萨蛮人人尽说江南好唐韦庄 | 久久久久久久久久久免费av| 寂寞人妻少妇视频99o| 日产精品乱码卡一卡2卡三| 男人舔奶头视频| 国产人妻一区二区三区在| 一本久久中文字幕| 最近2019中文字幕mv第一页| 在线播放国产精品三级| 91精品一卡2卡3卡4卡| 国产极品精品免费视频能看的| 少妇被粗大猛烈的视频| 亚洲婷婷狠狠爱综合网| 久久久a久久爽久久v久久| 我的老师免费观看完整版| 久久久久久国产a免费观看| 午夜激情福利司机影院| 国语自产精品视频在线第100页| 久久婷婷人人爽人人干人人爱| 一边摸一边抽搐一进一小说| a级一级毛片免费在线观看| 国产极品天堂在线| 两个人视频免费观看高清| 亚洲精品456在线播放app| 亚洲在久久综合| 国产高清激情床上av| 日本一二三区视频观看| av在线亚洲专区| 精品久久久久久久久亚洲| 久久韩国三级中文字幕| 国产综合懂色| 悠悠久久av| 久久久久久大精品| 亚洲图色成人| 不卡一级毛片| 日本爱情动作片www.在线观看| 免费黄网站久久成人精品| 小说图片视频综合网站| 噜噜噜噜噜久久久久久91| 又爽又黄无遮挡网站| 欧美不卡视频在线免费观看| 国产精品国产三级国产av玫瑰| 简卡轻食公司| 亚洲最大成人中文| 国产精品一区二区三区四区久久| 韩国av在线不卡| 两性午夜刺激爽爽歪歪视频在线观看| 五月玫瑰六月丁香| 女人被狂操c到高潮| 九草在线视频观看| 亚州av有码| 热99re8久久精品国产| 天天一区二区日本电影三级| 国产成人精品婷婷| 国产精品蜜桃在线观看 | 搡老妇女老女人老熟妇| 欧美丝袜亚洲另类| 观看免费一级毛片| 久久久久免费精品人妻一区二区| 欧美日韩综合久久久久久| 2021天堂中文幕一二区在线观| 精品一区二区免费观看| 亚洲欧洲日产国产| 嫩草影院入口| 热99re8久久精品国产| 亚洲精品乱码久久久v下载方式| 99久久人妻综合| 久久久久免费精品人妻一区二区| 大型黄色视频在线免费观看| 久久99热这里只有精品18| 国产黄片视频在线免费观看| 国产亚洲欧美98| 天堂av国产一区二区熟女人妻| 国产免费一级a男人的天堂| 亚洲av男天堂| 色播亚洲综合网| 国产v大片淫在线免费观看| 亚洲,欧美,日韩| 亚洲精品日韩在线中文字幕 | 亚洲不卡免费看| 国产在线精品亚洲第一网站| 日本熟妇午夜| av在线观看视频网站免费| 久久精品国产自在天天线| 亚洲七黄色美女视频| 久久精品国产99精品国产亚洲性色| 小蜜桃在线观看免费完整版高清| 1000部很黄的大片| 亚洲精品色激情综合| 中国美女看黄片| 成熟少妇高潮喷水视频| 亚洲国产精品合色在线| 成人三级黄色视频| 偷拍熟女少妇极品色| 久久精品国产亚洲网站| 午夜视频国产福利| 久久欧美精品欧美久久欧美| 嫩草影院精品99| 国产中年淑女户外野战色| 尾随美女入室| 深夜精品福利| 免费看日本二区| 你懂的网址亚洲精品在线观看 | 国产中年淑女户外野战色| 少妇高潮的动态图| 日韩强制内射视频| 天堂网av新在线| 中文欧美无线码| 男插女下体视频免费在线播放| 尾随美女入室| 精品久久久久久久久av| 国产乱人偷精品视频| 久久欧美精品欧美久久欧美| 久久久色成人| 一个人看的www免费观看视频| 久久久久久国产a免费观看| 蜜桃久久精品国产亚洲av| 日韩人妻高清精品专区| 日韩欧美精品免费久久| 国产精品乱码一区二三区的特点| a级毛片a级免费在线| 高清毛片免费看| ponron亚洲| 免费搜索国产男女视频| 国产精品不卡视频一区二区| 五月玫瑰六月丁香| 在线播放国产精品三级| 欧美日韩精品成人综合77777| 99久久精品国产国产毛片| 91狼人影院| 国产精品免费一区二区三区在线| 中文字幕制服av| 欧美一区二区精品小视频在线| 免费搜索国产男女视频| 欧美+日韩+精品| 国产一区亚洲一区在线观看| 直男gayav资源| 国产精品久久久久久亚洲av鲁大| 日本一二三区视频观看| 网址你懂的国产日韩在线| 亚洲无线在线观看| 亚洲天堂国产精品一区在线| 日本与韩国留学比较| 少妇猛男粗大的猛烈进出视频 | 蜜臀久久99精品久久宅男| 国产精品人妻久久久影院| 97热精品久久久久久| 亚洲精品乱码久久久v下载方式| 久久久久国产网址| 91aial.com中文字幕在线观看| 免费大片18禁| 久久精品国产99精品国产亚洲性色| 日韩国内少妇激情av| 精品久久久久久久久亚洲| 欧美在线一区亚洲| 日本在线视频免费播放| 美女脱内裤让男人舔精品视频 | 久久国内精品自在自线图片| 亚洲欧美日韩高清在线视频| 99久久久亚洲精品蜜臀av| 97在线视频观看| 午夜激情福利司机影院| 国产精品久久久久久久电影| av卡一久久| 91狼人影院| 国产国拍精品亚洲av在线观看| 国产91av在线免费观看| 美女大奶头视频| 午夜爱爱视频在线播放| 色哟哟哟哟哟哟| 欧美成人a在线观看| 国产伦理片在线播放av一区 | 亚洲精品乱码久久久v下载方式| 蜜臀久久99精品久久宅男| 午夜精品在线福利| 亚洲色图av天堂| 黄色视频,在线免费观看| 免费观看精品视频网站| 日韩三级伦理在线观看| 国产av一区在线观看免费| 久久国产乱子免费精品| 久久精品久久久久久久性| 三级国产精品欧美在线观看| 久久九九热精品免费| 网址你懂的国产日韩在线| 免费看美女性在线毛片视频| 99热精品在线国产| 国产精品一及| 直男gayav资源| 91av网一区二区| 亚洲人与动物交配视频| 欧美一区二区精品小视频在线| 高清毛片免费观看视频网站| 欧美日韩综合久久久久久| 两个人视频免费观看高清| 亚洲成av人片在线播放无| 亚州av有码| 亚洲精品乱码久久久v下载方式| 91aial.com中文字幕在线观看| 日韩 亚洲 欧美在线| 亚洲第一区二区三区不卡| 亚洲高清免费不卡视频| 久久鲁丝午夜福利片| 欧美性猛交╳xxx乱大交人| 国产欧美日韩精品一区二区| 波多野结衣高清作品| 直男gayav资源| eeuss影院久久| 国产亚洲欧美98| 亚洲精品乱码久久久久久按摩| 午夜福利视频1000在线观看| 美女脱内裤让男人舔精品视频 | 色5月婷婷丁香| 国产一区二区激情短视频| 男女那种视频在线观看| 日本色播在线视频| 在线观看午夜福利视频| 国产精品麻豆人妻色哟哟久久 | 亚洲精品久久国产高清桃花| 别揉我奶头 嗯啊视频| 成年版毛片免费区| 在线免费观看的www视频| 99热全是精品| 国产伦理片在线播放av一区 | 在线观看美女被高潮喷水网站| 日本欧美国产在线视频| 国产久久久一区二区三区| 欧美+日韩+精品| 欧美又色又爽又黄视频| 亚洲国产精品成人综合色| 99精品在免费线老司机午夜| 亚洲美女视频黄频| 国产黄色视频一区二区在线观看 | 国内精品美女久久久久久| 日日干狠狠操夜夜爽| 久久久精品大字幕| 成人毛片a级毛片在线播放| 最近视频中文字幕2019在线8| av黄色大香蕉| 国产乱人视频| 男人的好看免费观看在线视频| av专区在线播放| 只有这里有精品99| 69av精品久久久久久| 国产在线精品亚洲第一网站| 国产精品福利在线免费观看| 久久国内精品自在自线图片| 内射极品少妇av片p| 久久精品国产清高在天天线| 国产真实乱freesex| 免费无遮挡裸体视频| 欧美精品国产亚洲| 亚洲精品456在线播放app| 久久精品91蜜桃| 激情 狠狠 欧美| 久久久a久久爽久久v久久| 自拍偷自拍亚洲精品老妇| 99久久精品国产国产毛片| 伦精品一区二区三区| 国产蜜桃级精品一区二区三区| 99热6这里只有精品| 亚洲经典国产精华液单| 色哟哟·www| 老女人水多毛片| 国产熟女欧美一区二区| 一级二级三级毛片免费看| 久久人妻av系列| 五月伊人婷婷丁香| 热99re8久久精品国产| 成人亚洲欧美一区二区av| 亚洲av第一区精品v没综合| 免费观看精品视频网站| 男女下面进入的视频免费午夜| 精品人妻熟女av久视频| 免费无遮挡裸体视频| 中文字幕熟女人妻在线| 久久久a久久爽久久v久久| 日韩精品青青久久久久久| 免费人成视频x8x8入口观看| 精品久久久久久久久久免费视频| 亚洲国产精品sss在线观看| 成人无遮挡网站| 国产在线精品亚洲第一网站| 少妇人妻一区二区三区视频| 欧美色视频一区免费| 国产又黄又爽又无遮挡在线| 我的老师免费观看完整版| 国产精品精品国产色婷婷| 国产单亲对白刺激| 人妻夜夜爽99麻豆av| 国产成人影院久久av| 日韩欧美三级三区| 欧美成人免费av一区二区三区| 国产午夜精品久久久久久一区二区三区| 最近的中文字幕免费完整| 边亲边吃奶的免费视频| 国内精品宾馆在线| 高清午夜精品一区二区三区 | 欧美人与善性xxx| av在线天堂中文字幕| 小蜜桃在线观看免费完整版高清| 一边亲一边摸免费视频| 国产精品麻豆人妻色哟哟久久 | 欧美三级亚洲精品| 欧美成人a在线观看| 色综合色国产| 久久6这里有精品| 看免费成人av毛片| 一夜夜www| 赤兔流量卡办理| av又黄又爽大尺度在线免费看 | 给我免费播放毛片高清在线观看| 97超碰精品成人国产| www.色视频.com| 乱系列少妇在线播放| 99久久九九国产精品国产免费| 亚洲av一区综合| 国产精品电影一区二区三区| 男人舔女人下体高潮全视频| 国产精品美女特级片免费视频播放器| 搞女人的毛片| 深夜精品福利| 最近的中文字幕免费完整| 亚洲av中文字字幕乱码综合| 亚洲av男天堂| 中文字幕制服av| 亚洲真实伦在线观看| 国产片特级美女逼逼视频| 老熟妇乱子伦视频在线观看| 国国产精品蜜臀av免费| 99久久成人亚洲精品观看| 哪个播放器可以免费观看大片| 麻豆成人午夜福利视频| 夫妻性生交免费视频一级片| 观看美女的网站| 看黄色毛片网站| 长腿黑丝高跟| 国产大屁股一区二区在线视频| av免费观看日本| 秋霞在线观看毛片| 久久精品91蜜桃| 老司机影院成人| 亚洲精品亚洲一区二区| 国产一级毛片在线| 日日撸夜夜添| 免费一级毛片在线播放高清视频| 狂野欧美激情性xxxx在线观看| a级一级毛片免费在线观看| 又粗又硬又长又爽又黄的视频 | 色哟哟哟哟哟哟| 一级毛片我不卡| 看免费成人av毛片| 天美传媒精品一区二区| 国产伦精品一区二区三区四那| av免费在线看不卡| 可以在线观看的亚洲视频| 国产精品1区2区在线观看.| 亚洲精品国产成人久久av| 久久久精品大字幕| 99久久精品热视频| 免费看日本二区| 免费看a级黄色片| 最近2019中文字幕mv第一页| 三级国产精品欧美在线观看| 一区二区三区免费毛片| 日本熟妇午夜| 免费观看人在逋| 亚洲欧美成人精品一区二区| a级毛片a级免费在线| 十八禁国产超污无遮挡网站| 日本色播在线视频| 中文字幕精品亚洲无线码一区| 日本免费一区二区三区高清不卡| 午夜福利在线观看吧| 18+在线观看网站| 国产av不卡久久| 国产探花在线观看一区二区| 99热只有精品国产| 国产在视频线在精品| 色综合亚洲欧美另类图片| 亚洲不卡免费看| 精品人妻视频免费看| 青春草国产在线视频 | 久久久久久久久久黄片| 一卡2卡三卡四卡精品乱码亚洲| 成人毛片a级毛片在线播放| 乱系列少妇在线播放| 欧美日韩一区二区视频在线观看视频在线 | 久久热精品热| 国产亚洲av嫩草精品影院| 国产精品.久久久| 日韩av在线大香蕉| 国产精品1区2区在线观看.| 少妇裸体淫交视频免费看高清| 日韩欧美在线乱码| 中文字幕熟女人妻在线| 国产色婷婷99| 久久久成人免费电影| 午夜精品国产一区二区电影 | 一区二区三区高清视频在线| 国产淫片久久久久久久久| 全区人妻精品视频| 中国美女看黄片| 亚洲国产高清在线一区二区三| 禁无遮挡网站| 欧美区成人在线视频| 一个人观看的视频www高清免费观看| h日本视频在线播放| 亚洲va在线va天堂va国产| 亚洲欧美精品自产自拍| 亚洲高清免费不卡视频| 看十八女毛片水多多多| 成人无遮挡网站| 精品一区二区三区人妻视频| 最近2019中文字幕mv第一页| 只有这里有精品99| 久久精品国产亚洲网站| 日韩精品青青久久久久久| 精品无人区乱码1区二区| 色哟哟哟哟哟哟| 两个人视频免费观看高清| 免费av观看视频| 久久综合国产亚洲精品| 特级一级黄色大片| 青春草亚洲视频在线观看| 97超碰精品成人国产| 免费电影在线观看免费观看| 亚洲一区高清亚洲精品| 最好的美女福利视频网| a级毛色黄片| 麻豆久久精品国产亚洲av| 一级毛片我不卡| 日本黄大片高清| 精品欧美国产一区二区三| 日本黄色视频三级网站网址| av卡一久久| av天堂中文字幕网| 欧美xxxx黑人xx丫x性爽| 精品不卡国产一区二区三区| 欧美成人一区二区免费高清观看| 欧美不卡视频在线免费观看| 男女视频在线观看网站免费| 久久精品国产亚洲av涩爱 | av又黄又爽大尺度在线免费看 | 欧美3d第一页| 村上凉子中文字幕在线| 麻豆精品久久久久久蜜桃| 国产真实伦视频高清在线观看| 老司机福利观看| 久久久久久伊人网av| 欧美最黄视频在线播放免费| 波多野结衣高清作品| 免费人成在线观看视频色| 亚洲无线在线观看| 国产精品人妻久久久久久| 亚洲欧洲日产国产| 级片在线观看| 亚洲av男天堂| 久久久a久久爽久久v久久| 久久人人爽人人爽人人片va| 亚洲丝袜综合中文字幕| 国国产精品蜜臀av免费| 日韩国内少妇激情av| 久久午夜福利片| 插逼视频在线观看| 亚洲最大成人手机在线| 一进一出抽搐gif免费好疼| 久久精品夜色国产| 日韩精品青青久久久久久| 免费在线观看成人毛片| 久久久久久九九精品二区国产| 欧美色欧美亚洲另类二区| 在线观看一区二区三区| 国产日韩欧美在线精品| 欧美一区二区国产精品久久精品| 久久久久免费精品人妻一区二区| 欧美日韩乱码在线| 国产精品一区二区三区四区免费观看| 最近手机中文字幕大全| 成人毛片a级毛片在线播放| 少妇人妻精品综合一区二区 | 国国产精品蜜臀av免费| 国产精品不卡视频一区二区| 亚洲国产精品成人综合色| 身体一侧抽搐| 一进一出抽搐动态| 国产真实伦视频高清在线观看| 免费黄网站久久成人精品| 日韩三级伦理在线观看| 亚洲三级黄色毛片| 国国产精品蜜臀av免费| 日韩,欧美,国产一区二区三区 | videossex国产| 不卡一级毛片| 国产精品久久久久久精品电影小说 | 99久久精品国产国产毛片| av天堂在线播放| 国产v大片淫在线免费观看| 草草在线视频免费看| 大又大粗又爽又黄少妇毛片口| 我要搜黄色片| 波野结衣二区三区在线| 给我免费播放毛片高清在线观看| 久久精品人妻少妇| 欧美另类亚洲清纯唯美|