期刊文献+
共找到1,358篇文章
< 1 2 68 >
每页显示 20 50 100
Discussion on data-security of space-earth integrated network and analysis ofspace communications protocol standards
1
作者 LiZehui LiuYong SunJin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期290-294,共5页
The architecture and protocols of Internet can't work well in space environments. To form a reliable and safe space network, characteristics of space communication network one discusse, brief synthesis is performe... The architecture and protocols of Internet can't work well in space environments. To form a reliable and safe space network, characteristics of space communication network one discusse, brief synthesis is performed for consultative committee for space data system (CCSDS) space communications protocol standards (SCPS), and a model accounting for data security problem of space-earth integrated network is provided. 展开更多
关键词 space network protocol security.
下载PDF
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
2
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission protocol(LTP) network Performance network protocols Parameter optimization Performance improvement
原文传递
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
3
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet protocol security Virtual Private network Video Conferencing Voice over Internet protocol JITTER End to End Delay
下载PDF
Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1
4
作者 Vladimir Krylov Kirill Kravtsov 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址
下载PDF
Adaptive link layer security architecture for telecommand communications in space networks 被引量:3
5
作者 Lei Zhang Chengjin An +1 位作者 Susanna Spinsante Chaojing Tang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第3期357-372,共16页
Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links am... Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission. 展开更多
关键词 space network telecommand security adaptive estimate performance optimization misbehavior detection.
下载PDF
A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks
6
作者 CHEN Jing CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1781-1784,共4页
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cry... In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 展开更多
关键词 ad hoc network security routing protocol partially non-cryptographic
下载PDF
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
7
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service security protocol Analysis Formal Theory Strand space Model Internet Key Exchange
下载PDF
SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks 被引量:12
8
作者 WANGXiao-yun YANGLi-zhen CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期127-131,共5页
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ... LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network. 展开更多
关键词 wireless sensoi network routing protocol security
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
9
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
10
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
A Novel Review on Security and Routing Protocols in MANET
11
作者 Muhammad Kashif Nazir Rameez U. Rehman Atif Nazir 《Communications and Network》 2016年第4期205-218,共15页
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which ever... The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination. Due to its dynamic topology, MANET can be created anywhere, anytime. As there are limited resources in MANET so it faces many problems such as security, limited bandwidth, range and power constraints. Due to this, many new routing protocols are proposed. This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET. 展开更多
关键词 Mobile Ad Hoc networks MANET security Attacks Routing protocols
下载PDF
A Routing Protocol for Enhanced Efficiency in Cognitive Radio Networks
12
作者 Athina Bourdena George Mastorakis +1 位作者 Evangelos Pallis Georgios Kormentzas 《通讯和计算机(中英文版)》 2013年第5期675-685,共11页
关键词 无线电网络 路由协议 通信节点 模拟实验 信令机制 监管制度 绩效考核 仿真结果
下载PDF
Performance of unique and secure routing protocol(USRP)in flying Adhoc Networks for healthcare applications
13
作者 J.Vijitha Ananthi P.Subha Hency Jose 《High-Confidence Computing》 EI 2024年第1期24-31,共8页
Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.I... Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network. 展开更多
关键词 Secure routing protocol Flying Adhoc networks Unmanned aerial vehicles Mobile Adhoc network Attackers Denial of service attacks
原文传递
Developing a reliable route protocol for mobile self-organization networks
14
作者 Shaohu Li Bei Gong 《High-Confidence Computing》 EI 2024年第3期1-12,共12页
Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.Fr... Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.From the perspective of communication and data collection,the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally,namely,according to the established network rules.However,mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution,openness,and distributed characteristics.Therefore,during the network operation,it is necessary to classify and detect the behavior and characteristics of each node.However,most existing research only analyzes and considers responses against a single or small number of attacks.To address these issues,this article first systematically analyzed and classified common active attacks in MANETs.Then,a node trust model was proposed based on the characteristics of various attacks;subsequently,a new secure routing protocol,namely,TC-AODV,was proposed.This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop,wormhole,Session hijacking,and other main attacks in MANETs.The NS3 simulation results show that the proposed routing protocol attains good transmission performance,can effectively identify various attacks and bypass malicious nodes,and securely complete the communication process. 展开更多
关键词 Mobile ad hoc networks AODV Trust level Secure routing protocol Reliable path
原文传递
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
15
作者 Chen Ping Ji Yimu +2 位作者 Wang Ruchuan Huang Haiping Zhang Dan 《Journal of Electronics(China)》 2013年第2期190-197,共8页
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. 展开更多
关键词 Secure multi-party computation PRIVACY-PRESERVING Euclid-distance protocol Wireless Sensor networks (WSNs) Density-Based Clustering protocol (DBCP)
下载PDF
EDSM-Based Binary Protocol State Machine Reversing
16
作者 Shen Wang Fanghui Sun +3 位作者 Hongli Zhang Dongyang Zhan Shuang Li Jun Wang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3711-3725,共15页
Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols ... Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols,most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging)to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition,this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications. 展开更多
关键词 network security protocol state machine EDSM algorithm protocol reverse engineering protocol analyzing
下载PDF
Automatic discovery of stateful variables in network protocol software based on replay analysis
17
作者 Jianxin HUANG Bo YU +1 位作者 Runhao LIU Jinshu SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第3期403-416,共14页
Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states ... Network protocol software is usually characterized by complicated functions and a vast state space.In this type of program,a massive number of stateful variables that are used to represent the evolution of the states and store some information about the sessions are prone to potentialflaws caused by violations of protocol specification requirements and program logic.Discovering such variables is significant in discovering and exploiting vulnerabilities in protocol software,and still needs massive manual verifications.In this paper,we propose a novel method that could automatically discover the use of stateful variables in network protocol software.The core idea is that a stateful variable features information of the communication entities and the software states,so it will exist in the form of a global or static variable during program execution.Based on recording and replaying a protocol program’s execution,varieties of variables in the life cycle can be tracked with the technique of dynamic instrument.We draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful characteristics.We also implement a prototype system that can discover stateful variables automatically and then perform it on nine programs in Pro FuzzBench and two complex real-world software programs.With the help of available open-source code,the evaluation results show that the average true positive rate(TPR)can reach 82%and the average precision can be approximately up to 96%. 展开更多
关键词 Stateful variables network protocol software Program analysis technology network security
原文传递
An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors
18
作者 Junyan Guo Ye Du +1 位作者 Xuesong Wu Meihong Li 《Journal of Communications and Information Networks》 CSCD 2021年第3期301-311,共11页
With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However... With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However,due to the openness of the air-to-ground channel,the device will face a series of security threats when accessing SIN,such as replay attacks,eavesdropping attacks,impersonation attacks,and man-in-the-middle attacks.These security threats will lead to illegal entity access and further endanger the reliability and availability of the system.Although scholars have proposed many enhanced security access authentication protocols,most of them have been proved to have security vulnerabilities.In addition,with the development of quantum computing,the previous authentication protocols based on some asymmetric cryptographic mechanisms such as discrete logarithm and elliptic curve cryptographic mechanisms may face new security challenges.In this context,this paper proposes a novel antiquantum access authentication protocol based on ring learning with errors(RLWE),which meets more security requirements and greatly reduces the authentication delay through prenegotiation.Through the security analysis and performance analysis,it is shown that our protocol can be more suitable for delaysensitive IoT devices to access SIN while ensuring higher security. 展开更多
关键词 space information networks access security anti-quantum authentication protocol
原文传递
A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks
19
作者 Mosab Manaseer Maram Bani Younes 《Computer Systems Science & Engineering》 2024年第6期1699-1721,共23页
This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication... This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication among traveling vehicles.Finally,it aims to find a secure solution to prevent blackhole attacks on vehicular network communications.The proposed solution relies on authenticating vehicles by joining a blockchain network.This technology provides identification information and receives cryptography keys.Moreover,the ad hoc on-demand distance vector(AODV)protocol is used for route discovery and ensuring reliable node communication.The system activates an adaptive mode for monitoring communications and continually adjusts trust scores based on packet delivery performance.From the experimental study,we can infer that the proposed protocol has successfully detected and prevented blackhole attacks for different numbers of simulated vehicles and at different traveling speeds.This reduces accident rates by 60%and increases the packet delivery ratio and the throughput of the connecting network by 40%and 20%,respectively.However,extra overheads in delay and memory are required to create and initialize the blockchain network. 展开更多
关键词 Vehicular networks blockchain collision avoidance protocol design security mechanisms
下载PDF
NHRPA:a novel hierarchical routing protocol algorithm for wireless sensor networks 被引量:1
20
作者 CHENG Hong-bing YANG Geng HU Su-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第3期75-81,共7页
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt... Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing 展开更多
关键词 wireless sensor networks (WSN) routing protocol network security
原文传递
上一页 1 2 68 下一页 到第
使用帮助 返回顶部