• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems

    2015-08-09 04:54:08YongXieMemberIEEELiangjiaoLiuRenfaLiSeniorMemberIEEEJianqiangHuYongHanandXinPeng
    IEEE/CAA Journal of Automatica Sinica 2015年4期

    Yong Xie,Member,IEEE,Liangjiao Liu,Renfa Li,Senior Member,IEEE, Jianqiang Hu,Yong Han,and Xin Peng

    Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems

    Yong Xie,Member,IEEE,Liangjiao Liu,Renfa Li,Senior Member,IEEE, Jianqiang Hu,Yong Han,and Xin Peng

    —Network and software integration pose severe challenges in cyber-security for controller area network(CAN)-based automotive cyber-physical system(ACPS),therefore we employ message authentication code(MAC)to defend CAN against masquerade attack,but the consequent bandwidth overhead makes it a necessity to find the tradeoff among security,real-time and bandwidth utilization for signal packing problem(SPP)of CAN. A mixed-security signal model is firstly proposed to formally describe the properties and requirements on security and real-time for signals,and then a mixed-integer linear programming(MILP) formulation of SPP security-aware signal packing(SASP)is implemented to solve the tradeoff problem,where the bandwidth utilization is improved and the requirements in both security and real-time are met.Experiments based on both society of automotive engineers(SAE)standard signal set and simulated signal set showed the effectiveness of SASP by comparing with the state-of-the-art algorithm.

    Yong Xie,Jianqiang Hu,and Yong Han are with the Key Laboratory for Application Technology of Internet of Things of Fujian Educational Bureau,Xiamen University of Technology,Xiamen 361024,China(email: yongxie@xmut.edu.cn;jqhucn@xmut.edu.cn;yonghan@xmut.edu.cn).

    Liangjiao Liu and Renfa Li are with the Key Laboratory of Embedded and Networking Computing of Hunan Province,Hunan University,Changsha 410082,China(email:lirenfa@vip.sina.com;llj1984109@qq.com).

    Xin Peng is with the Key Laboratory on Complex Systems Optimization& Controlling of Hunan High Education Institutions,Hunan Institute of Science and Technology,Yueyang 414000,China(email:peng-xin@foxmail.com).

    Controller area network(CAN)is the most widely employed real-time communication technologies in ACPS[8].However, it is designed without the consideration of cyber-security.And in itself there are several cyber-security vulnerabilities[5],such as CAN is a CSMA/CD protocol and CAN messages are being broadcasted to all ECU nodes on the network,which means that attacker can easily eavesdrop on the network and read the content of the messages;CAN message do not contain any information to authenticate its sender,thus attacker can potentially masquerade other ECU and send the messages,and etc.Due to the above vulnerabilities,CAN becomes the ideal attacking object for cyber-security attackers in ACPS[9-13].Taking the wide application of CAN in auto industry into account,huge price needs to be paid if the existing CAN specification is modified to protect it against the cyber security attackers.Therefore,the feasible security mechanism should be designed to be compatible with the current CAN specification.In this paper,the MAC-based security enhancement mechanism is integrated into the signal packing problem(SPP)of CAN[14-18],but the bandwidth overhead brought together makes it a necessity to find the tradeoff among the cyber-security,real-time and bandwidth utilization,as CAN’s bandwidth is limited to 1 Mbps,and CAN message’s maximal payload is limited to 8 bytes.

    After the above analysis,we can find that SPP is a typical multi-objective optimization problem.In this paper,we set the requirement in cyber-security and real-time as the key constraints,because only as far as the requirements on these two non-functional properties are met,system’s safety can be guaranteed.We set bandwidth utilization as the final optimization objective due to the limitation of CAN’s bandwidth. Through this research,a security-aware signal packing(SASP) algorithm is proposed for CAN,and the minimization about the bandwidth’s overhead brought by security enhancementis pursued to improve the bandwidth utilization of CAN and consequently to lower the cost for ACPS.

    II.RELATED WORK

    A.Related Work About the SPP of CAN

    SPP can be seen as a special case of the bin packing problem,which is known to be a NP-hard optimization problem. There are several works addressing the SPP with heuristics, and bandwidth utilization and message’s schedulability are the general optimization objective.Sandstrom et al.[14]propose a next-fit-decreasing based heuristic packing algorithm to optimize the bandwidth utilization.Polzlbauer et al.[15]define a metric of bandwidth utilization,and based on it a packing algorithm is designed to optimize both bandwidth utilization and message’s schedulability.And later,Polzlbauer et al.[16]present another extensibility-aware packing algorithm, which is based on the simulated annealing and the bandwidth utilization is its optimization objective.

    Some other research tries to combine the SPP with message scheduling,which are the two key design problems of CAN. Saket et al.[17]propose a best-fit-decreasing based heuristic to optimize the bandwidth utilization with deadline constraint. Pop et al.[18]use the offset to order the signals,and a heuristic algorithm is given to improve message’s schedulability.Zheng et al.[19]and Zhu et al.[20]integrate the design of CAN and ECU into the same optimization framework,and their objectives are end-to-end WCRT(Worst-case response time) and extensibility,respectively.However,cyber-security is not considered in the above works,while our work tries to find the balance among cyber-security,real-time and bandwidth utilization for SPP.

    B.Related Work About the Security Enhancement Mechanisms of CAN

    MAC-based authentication is a widely used security enhancement mechanism for CAN.Nilsson et al.[10]raise a message authentication method with the compound MAC, which supports the split and assembly of MAC and can protect CAN from injection attack and tempering attack.Groza et al.[11]give a light broadcasting authentication mechanism for CAN,which supports the MAC sharing among different nodes and the separate transmitting of MAC and message. Van Herrewege et al.[12]propose a MAC-based backward compatible broadcast authentication protocol for CAN+.Han et al.[13]combine the MAC-based authentication with the anonymous ID based message filtering to defend the CAN against injection and modification attack.However,the above works focus only on the security enhancement mechanisms, while our work integrates the security consideration into the multi-objective design optimization problem of CAN.

    Lin et al.add both the MAC and counter into the CAN message to protect it from masquerade attack and replay attack,and then they also integrate the security mechanism into the design process of CAN in[21].This latest work integrates the SPP of CAN and task allocation together,and a grouping mechanism is used to decrease the bandwidth overhead brought by the security mechanism,its optimization objective is the end-to-end WCRT.The difference between Lin et al’s work and our work is in two aspects:

    1)Lin et al.assume the same security requirement for all signals,while our work takes the software integration trend of ECUs into account and considers the different levels of security requirements for signals included in functions of different criticalities.

    2)We set the bandwidth utilization as the optimization objective and treat the real-time requirement only as a constraint.As for CAN,only if the deadline is not violated for message,system’s safety can be guaranteed,no matter what is the specific WCRT of message.While its bandwidth is quite limited,thus the bandwidth utilization should be improved as much as possible.

    After the above analysis,we can come to the conclusion about the shortcomings of the related works:

    1)Security is not considered enough in the design of CAN system,and the tradeoff among the security,real-time and bandwidth utilization is still an open question;

    2)Different levels of security requirement for mixed criticality functions included in the same ECU is out of their consideration,which will cause the over-design of ACPS.

    Aiming at compensating for the above shortcomings,we first give a mixed security signal model to formally describe the properties and requirement in security and real-time for signals included in mixed criticality functions.Based on that, an optimal MILP formulation based SASP is proposed for SPP to find the tradeoff among security,real-time and bandwidth utilization,where the bandwidth utilization is improved and the requirements on security and real-time are both met.

    III.SYSTEM MODEL AND ASSUMPTIONS

    A.Signal Model and Message Model

    As shown in Fig.1,this is a typical CAN-based ACPS. ECU set is indicated as:E C U={E1,E2,...,Ek,...,EN}. There is a signal set in ECU Ekand it is indicated as: Sk={sk,1,sk,2,...,sk,i,...,sk,L},where L∈N+and L represents the number of signals in Sk.As the signal packing is only used for signals belonging to the same ECU, we omit the subscript k of signal’s notation to keep the signal model clear and simple,thus siis used to indicate the signal for the following part of this paper,and s own(i, k)is used to indicate the relation between siand Ek.Realtime properties of signal can be described with a 3-tuple, si:{s period(i),s size(i),sdeadline(i)},which indicates the period,transmission time and deadline of si,respectively, and we assume that the deadline equals to the period for all signals and messages.

    Fig.1.CAN-based automotive cyber-physical system.

    Signals in Skneed to be packed into messages before they can be transmitted on CAN,and how many messages will be generated depends on the used packing algorithm.The obtained message set in Ekis represented as Mk={mk,1, mk,2,...,mk,i,...,mk,L′},where L′∈N+and L′≤L.As shown in Fig.1,the signal set contained in E1is:S1={s1,1, s1,2,s1,3},and the corresponding message set is:M1={m1,1, m1,2},where m1,1={s1,1,s1,2},m1,2={s1,3}.For the same reason described before,we also omit the subscript k of message’s notation for the following part of this paper,and use m own(j,k)to describe the belonging ECU of mj. Real-time properties of mjcan be described with a 3-tuple: {m period(j),m size(j),mdeadline(j)},which indicate the period,transmission time and deadline of mj,respectively. If signals with different periods are packed into the same message,there will be oversampling for signals with relatively bigger period.As a consequence,we assume that only the signals with the same period can be packed into the same message,which is a common assumption in other works such as[15-16,21-22].Period,transmission time and deadline of mjcan be calculated with the following equations:

    We assume that signals are packed according to the standard format of CAN,thus m size(j)can be calculated from(4)[23]:

    where PLjindicates the payload of mj,and τbitindicates the time for CAN to transmit 1 byte.We assume the bandwidth of CAN is 500 kbps.The payload of CAN message varies from 1 bit to 8 bytes,and besides it there are other segments in message such as the ID and CRC,which are the cause of the bandwidth overhead in message itself.According to(4),the bandwidth overhead for CAN message can vary from 41.35% to 97.8%.

    B.Attacker Model and Security Mechanism

    The masquerade attack is potentially one of the most popular attacking approach on CAN[5,21-22],thus we mainly try to defend the CAN from the masquerade attack in this paper,and the MAC-based authentication mechanism is employed[10-13,21-22].According to this mechanism,there is a public key shared between any two communicating ECUs. The message sender uses the key and the content of the message to generate a MAC MACs,and MACsis also packed into the message together with the signals.After the message’s transmission,another MAC MACrwill be generated in the receiver node according to the content of the received message and the shared key,and a comparison between MACsand MACris done to authenticate the identity of the message sender and make sure that the content of the message is not modified by any other attacker.When the signals inside the same message have the same receiving ECU,they can share the same MAC to reduce the bandwidth overhead. And when there are different receiving ECUs for the same message,several MACs need to be generated and added into the message.

    The security mechnism adopted in this paper is MAC-based,if the attacker does not have any prior knowledge about the MAC,guess of the MAC is quite random,and the success probability of the masquerade attack is 2-H,where H indicates the length of MAC(in bits).On the contrary,if we know the security requirement of the functions,(5)can be used to calculate the value of H,where P represents the security requirement put on message.

    C.Mixed Security Signal Model

    The pressure from the SWaP property will gradually transform the ACPS into a mixed-criticality system,where several functions with different criticalities are integrated into the same ECU[2].The functional safety standard ISO 26262[24]is proposed to give formal and quantitative description about the safety requirement(such as the dependability,security and etc)for automobiles,where the functions are classified into four categories with different levels of safety requirement(or criticality).Therefore,different levels of security protection are needed for signals included in functions with different criticality.In this paper,we extend the basic signal model described in Section III-A and propose a mixed-security signal model to formally describe the security requirement on signals.

    We divide the functions in ACPS into two categories: FunHIand FunLO,which have the high and low level of security requirement,respectively.The mixed-security signal model used to describe the signals with mixed-level of security requirements is described as si:{s period(i),ssize(i), sdeadline(i),s mac(i)},and smac(i)indicates the length of MAC needed to obtain the required level of security for si.For signals belonging to the functions with higher level of security requirement,their smac(i)is larger that that of the signals belonging to the functions with lower level of security requirement.We assume that the security requirement of the functions is known as in[21-22],so s mac(i)can be calculated with(5).As far as we know the required security levels put on functions,this mixed-security signal model can be easily extended to describe the signals with more levels of security requirements.

    IV.MILP FORMULATION OF THE PROPOSED SASP

    SPP can be seen as a special case of the Bin Packing problem[14-16],where signals are the objects needed to be packed into the bins(messages).The size of bin equals to that of the message with maximal payload,and the number of bins equals to that of the signals.The difference is that signals may have different sizes,periods and different levels of security requirement,the packing rules need to be extended to further include the requirements on security and real-time, and the objective is changed to minimize the space utilization of bins(the sum of the bandwidth utilization of all messages).MILP is a powerful method that is often used to solve the binpacking problem,thus we also formulate the SPP problem into a MILP problem and solve it with the CPLEX tool developed by IBM.

    In this section,we first give all the constraints needed to be met by SASP,and then the objective function is explained. Tables I and II show all the known variables and the unknown variables requiring to be solved.The value of binary variable is 1 if the condition is true and 0 otherwise.

    A.Constraints

    For all the following constraints,iandi′are the labels for signals,jandj′are the labels for messages,andkandk′are the labels for ECUs.

    1)Constraint on mapping relation between signals and messages

    Equation(6)indicates the constraint that each signal is exactly packed into only one message,(7)indicates the condition that if signalsiis packed intomjofEk,if that is the truth,thentaken(k,j)=1.

    2)Constraint on size and period of messages

    According to the security mechanism proposed in this paper,two different parts are contained in message’s payload: signals and the attached MACs.Equation(8)calculates the payload formj,which equals to the sum size of the included signals and the attached MACs.Equation(9)indicates the constraint that the maximal payload of message should not be overloaded.Equation(10)calculates the transmission time ofmj.

    According to our assumption that only signals with equal periods can be packed into the same message,message’s period equals to that of the included signals.Thus,(11)and(12)are used to define the constraints about the period of signal and message.

    TABLE I THE KNOWN VARIABLES IN THE MILP FORMULATION

    TABLE II THE UNKNOWN VARIABLES IN THE MILP FORMULATION

    3)Constraint on security

    We consider about the signals with different levels of security requirement,and there are two possible packing strategies for them.Strategy 1 does not allow signals with different levels of security requirement to be packed into the same message, thus all the signals inside the same message have the same level of security requirement,and the security requirement of the message equals to that of the included signals.While Strategy 2 allows signals with different levels of security requirement to be packed into the same message,so we need to give all the included signals the high level of security protection,or else signals with relatively lower security requirement will become the weakness of the message,and the attacker can take advantage of them to attack the message successfully with lesser efforts.Consequently,message’s security requirement is equal to the relatively higher security requirement of the included signals.Equation(13)indicates the required level of security for message:

    After the constraint on period defined in(11)and(12)that only signals with the same period can be packed into the same message,(14)is further used in Strategy 1 to enforce the constraint that only signals with the same level of security requirement can be packed into the same message,where sm(i,i′)indicates if the security requirement on siand si′are the same or not.As Strategy 2 allows signals with different levels of security requirement to be packed together, no constraint needs to be defined for it.

    According to Strategy 1,signals with different levels of security requirement need to be divided into different messages even if their periods are the same,but those signals can be packed together originally when security is not considered.As a consequence,more messages will be generated in Strategy 1 comparing with Strategy 2,and it brings extra bandwidth overhead originated from the bandwidth overhead in message itself.However,although Strategy 2 allows more signals to be packed together,the length of MAC corresponding with the signals with relatively lower level of security requirement needs to be increased so as to guarantee the security of the obtained message.Consequently,Strategy 2 also causes extra bandwidth overhead.As the comparison experiment showed in Section V,Strategy 2 is better than Strategy 1 in bandwidth utilization,thus strategy 2 is used in SASP.

    After the above analysis,the sum of MAC that is needed to obtain the required level of security for all signals included in mjcan be calculated according to(15):

    4)Constraint on response time of message and signal

    For constraint on response time of message,we first give the feasible priority assignment,and then the analysis about the blocking time and WCRT[21,23].

    a)Priority assignment

    As each CAN message has a unique priority,(16)and (17)are used to indicate the constraint on priority relation of any two messages.Equation(18)indicates the transitive property of the priority relation among messages.For example, if hp(j,j′)=1 and hp(j′,j′′)=1,then hp(j,j′′)=1.

    b)Blocking time analysis

    As CAN messages are scheduled non-preemptively, block(j)is used to indicate the blocking delay caused by other messages with lower priority for mj,and it can be calculated with

    c)Response time analysis for message

    Equation(20)is used to analyze the WCRT for mj,the first part indicates the experienced blocking time,the second part indicates the transmission time of mjitself,and the third part indicates the preemption delay caused by other messages with higher priority.Equation(21)describes the schedulability constraint on message’s response time:

    d)Response time analysis for signal

    As Strategy 2 is used for SPP,signal’s WCRT equals to that of the belonging message,so(22)-(23)defines the WCRT for signals.W is a big constant needed for linearization.

    B.Objective Function

    We set bandwidth utilization as the optimization objective of SASP,and it is calculated by summing up the consumed bandwidth of the occupied messages as described in(24), where the consumed bandwidth of each message is obtained by dividing its size by its period.

    C.Conversion to Linear Constraints

    For the described MILP formulation above,(14),(20),(21) and(24)are needed to be linearized before they can be solved by CPLEX tool[21].Equation(14)is an inequality of summation of three binary variables,and it can be linearized and replaced with the following equations:

    Equations(20)and(21)can be linearized similarly in three steps.First,the ceiling function■x■can be replaced by a noninteger variable y,and another constraint:0≤y-x≤1 is added.Second,the multiplication of two binary variables x and y can be replaced by a binary variable z,and then one constraint is added as:x×y=z.And then x×y=z can be replaced by equivalent constraints:x+y-1≤z,z≤x and z≤y.Third,the multiplication of one binary variable x and one non-integer variable y can be replaced by a noninteger variable z,and one constraint x×y=z is added. Next,x×y=z can be replaced by equivalent constraints: 0≤z≤y and y-W×(1-x)≤z≤W×x.For example, (20)can be linearized and replaced with(28),and six more constraints described by(29)through(34)are added:

    Equation(24)also includes a multiplication of binary variable and one non-integer variable,and it can be linearized with the same approach as described above.Equation(24)can be replaced with(35)and two more constraints described by(36) and(37)are added:

    V.EXPERIMENTAL ANALYSIS

    Two sets of experiments based on signal sets from different sources are done to verify the effectiveness of the SASP by comparing it with the SPP algorithm proposed in[21].The first signal set is a standard CAN signal set from the SAE[25], which represents the requirement from the industry.And the second one is generated by Netcarbench 3.4[26],which is a popular simulation tool for CAN Network.According to the ISO 26262,there are four levels of security requirement in ACPS,which are L1-L4,respectively,and we assume that the corresponding length of MACs are 2/4/6/8(in bit).The MILP formulation of SASP is implemented in ILOG CPLEX Optimization Studio 12.6 from IBM,and the configuration of the PC running the experiments is:Intel(R)Core(TM)2 2.13 GHZ and 2 GB RAM.

    A.Introduction About the Two Employed Signal Sets

    1)SAE signal set

    The SAE standard signal set is corresponding to a CAN network composed with 7 ECU nodes and 53 signals,signal’s size varies from 1 bit to 8 bits,and signal’s period varies from 5 ms to 1 000 ms,please refer to[25]for more details about this signal set.When security is not considered,the number of the obtained messages is 17 and the bandwidth utilization is 17.94%.

    2)Simulated signal set

    The simulated signal set generated by Netcarbench 3.4 is for powertrain subsystem of ACPS,which is composed with 14 ECUs and 100 signals.When security is not considered, the number of the obtained messages is 61 and the bandwidth utilization is 39.36%.

    B.Exploration About the Two Candidate Packing Strategies

    We explained in Section IV that there are two candidate packing strategies for SPP(Strategy 2 allows signals with different levels of security requirement to be packed together, while Strategy 1 does not allow that),thus we compared them based on the above two signal sets and the obtained results are shown in Tables III and IV,respectively.

    We can find from Tables III and IV that both the obtained number of messages and the bandwidth utilization are smaller for Strategy 2 as compared to Strategy 1.The reason is that compared with the bandwidth overhead brought by increasing the length of MAC to guarantee the security of message,the bandwidth overhead brought by dividing signals with same period into different messages is much bigger.As we analyzed in Section III-A,the bandwidth overhead in CAN message varies from 41.35%to 97.8%.Therefore,Strategy 2 is better and employed in SASP from now on.

    C.Efficiency of SASP

    To show its efficiency,SASP is used to pack the signal sets when the level of security requirement is set asL1-L4for signals,respectively,and the result is shown in Table V and Table VI.We can see from these two tables that along with the increasing of the security requirement,the obtained number of messages and the bandwidth overhead also increase.But as SASP is based on the optimal MILP formulation,even when the level of security requirement reachesL4,the bandwidth overhead is limited to 5.17%and 8.22%for the two signal sets,respectively.

    D.Comparison Between SASP and the SPP Algorithm Used in[21]

    We did experiments to verify the effectiveness of SASP by comparing it with the SPP algorithm employed in[21].The SPP algorithm used in[21]is also based on MILP formulation,and we modified its objective function to realize the comparison.As it assumes that the same security requirement is put for all signals,the packing result is the same with that of SASP under the same assumption.Please refer to Tables V and VI for detailed packing result.Tables VII and VIII give the detailed packing result of SASP for the two used signal sets.The runtime of the experiments on SAE signal set and the simulated signal set are about 0.5 s and 4 min,respectively.

    We can come to two conclusions from packing result of SASP shown in Tables VII and VIII:1)Horizontal trend,the bandwidth utilization decreases as the percentage of signals with relatively low level of security requirement increases; 2)Vertical trend,the bandwidth utilization increases as the widening of the gap between the two levels of security requirement.

    From the obtained packing results described in Table V through Table VIII,we can get the conclusion that SASP is more efficient in bandwidth utilization as compared to the packing algorithm used in[21],and Figs.2 and 3 show the obtained optimization extent in reducing the bandwidth overhead of SASP for the two used signal sets.According to the comparison result,when different combinations of security requirements are explored,the optimization extent of SASP in bandwidth overhead’s reduction varies from 10.99%to 17.8% and 12.13%to 49.4%for the used two signal sets,respectively.With the increasing of the percentage of signals with relatively low level of security requirement,the optimization extent increases;and with the widening of the gap between the two levels of security requirement,the optimization extent also increases.

    Taking all the experimental results into account,and considering the facts about the integration of functions with several criticalities into the same ECU and the percentage of functions with high security requirement are relatively low,the usefulness of SASP is obvious for ACPS.

    VI.CONCLUSION

    We use MAC-based mechanism to defend CAN from masquerade attack,but this mechanism brings bandwidth overheadin the meantime.Thus,we formulate a MILP-based optimization problem to realize the tradeoff among the security,realtime and bandwidth utilization for the SPP of CAN.First,we give a new mixed-security signal model to formally describe the properties and requirement in security and real-time at the same time.And then,a MILP-based security-aware signal packing algorithm SASP is proposed,which can realize the optimization of the bandwidth utilization while meeting the requirements in both security and real-time.SASP is also compatiable with the existing CAN specification,which makes it feasible for implementation in real applications.Two sets of experiments based on signal sets from both the industry and simulation tool are implemented to compare the SASP with the state-of-the-art algorithm,and the effectiveness and efficiency of the SASP is showed.

    TABLE III COMPARISON RESULT FOR THE TWO PACKING STRATEGIES BASED ON THE SAE SIGNAL SET

    TABLE IV COMPARISON RESULT FOR THE TWO PACKING STRATEGIES BASED ON THE SIMULATED SIGNAL SET

    TABLE V PACKING RESULT OF SAE SIGNAL SET WITH FOUR LEVELS OF SECURITY REQUIREMENT SEPARATELY

    Fig.2.The optimization extent of SASP compared with the SPP algorithm used in[21]based on SAE signal set.

    Fig.3.The optimization extent of SASP compared with the SPP algorithm used in[21]based on the simulated signal set.

    TABLE VI PACKING RESULT OF SIMULATED SIGNAL SET WITH FOUR LEVELS OF SECURITY REQUIREMENT SEPARATELY

    TABLE VII PACKING RESULT OF SASP FOR DIFFERENT COMBINATIONS OF SECURITY REQUIREMENT BASED ON SAE SIGNAL SET

    TABLE VIII PACKING RESULT OF SASP FOR DIFFERENT COMBINATIONS OF SECURITY REQUIREMENT BASED ON SIMULATED SIGNAL SET

    REFERENCES

    [1]Furst S.Challenges in the design of automotive software.In:Proceedings of the 2010 Design,Automation and Test in Europe Conference and Exhibition(DATE).Dresden:IEEE,2010.256-258

    [2]Mixed Criticality Systems.EC workshop on mixed crticality systems [Online],available:http://cordis.eurpa.eu,February 3,2012.

    [3]Li R F,Xie Y,and etc.Survery of cyber-physical systems.Journal of Research and Development,2012,49(6):1149-1161(in Chinese)

    [4]Sagstetter F,Lukasiewycz M,Steinhorst S,Wolf M,Bouard A,Harris W R,Jha S,Peyrin T,Poschmann A,Chakraborty S.Security challenges in automotive hardware/software architecture design.In:Proceedings of the 2013 Design,Automation,and Test in Europe Conference and Exhibition(DATE).Grenoble,France:IEEE,2013.458-463

    [5]Studnia I,Nicomette V,Alata E,Deswarte Y,Kaaniche M, Laarouchi Y.Security of embedded automotive networks:state of the art and a research proposal.In:Proceedings of the 2nd Work-shop on Open Resilient Human-Aware Cyber-Physical Systems[Online],available:http://hal.archives-ouvertes.fr/doc/00/84/82/34/PDF/4-carsistudnia.pdf,July 25,2013.

    [6]Checkoway S,McCoy D,Kantor B,Anderson D,Shacham H,Savage S.Comprehensive experimental analyses of automotive attack surfaces. In:Proceedings of the 20th USENIX Conference on Security[Online], available:https://www.usenix.org/legacy/events/sec11/tech/fullpapers/ Checkoway.pdf,August 8,2011.

    [7]Koscher K,Czeskis A,Roesner F,Patel S,Kohno T,Checkoway S, McCoy D,Kantor B,Anderson D,Shacham H,Savage S.Experimental security analysis of a modern automobile.In:Proceedings of the 2010 IEEE Symposium on Security and Privacy(SP).Oakland,CA:IEEE, 2010.447-462

    [8]Tuohy S,Glavin M,Hughes C,Jones E,Trivedi M,Kilmartin L.Intravehicle networks:a review.IEEE Transactions on Intelligent Transportation Systems,2015,16(2):534-545

    [9]Hoppe T,Kiltz S,Dittmann J.Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliability Engineering and System Safety,2011,96(1):11-25

    [10]Nilsson D K,Larson U E,Jonsson E.Efficient in-vehicle delayed data authentication based on compound message authentication codes. In:Proceedings of the 68th IEEE Vehicular Technology Conference. Calgary,BC:IEEE,2008.1-5

    [11]Groza B,Murvay S,van Herrewege A,Verbauwhede I.LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks.In:Proceedings of the 11th International Conference on Cryptology and Network Security(CANS).Darmstadt:Springer,2012. 185-200

    [12]Van Herrewege A,Singelee D,Verbauwhede I.CANAutha simple,backward compatible broadcast authentication protocol for CAN bus.In:Proceedings of the 2011 ECRYPT Workshop on Lightweight Cryptography[Online],available: http://www.researchgate.net/publication/235323481CANAuth A Simple Backward Compatible Broadcast Authentication Protocol for CANbus,January 19,2015.

    [13]Han K,Weimerskirch A,Shin K G.Automotive cybersecurity for invehicle communication.IQT Quarterly,2014,6(1):22-25

    [14]Sandstrom K,Norstom C,Ahlmark M.Frame packing in real-time communication.In:Proceedings of the 7th International Conference on Real-Time Computing Systems and Applications(RTCSA).Cheju Island:IEEE,2000.399-403

    [15]Polzlbauer F,Bate I,Brenner E.On extensible networks for embedded systems.In:Proceedings of the 20th IEEE International Conference and Workshops on the Engineering of Computer Based Systems(ECBS). Scottsdale,AZ:IEEE,2013.69-77

    [16]Polzlbauer F,Bate I,Brenner E.Optimized frame packing for embedded systems.IEEE Embedded Systems Letters,2012,4(3):65-68

    [17]Saket R,Navet N.Frame packing algorithms for automotive applications.Journal of Embedded Computing,2006,2:93-102

    [18]Pop P,Eles P,Peng Z B.Schedulability-driven frame packing for multicluster distributed embedded systems.ACM Transactions on Embedded Computing Systems,2005,4(1):112-140

    [19]Zheng W,Zhu Q,Di Natale M,Vincentelli A S.Definition of task allocation and priority assignment in hard real-time distributed systems.In: Proceedings of 28th IEEE International Real-Time Systems Symposium. Tucson,AZ:IEEE,2007.161-170

    [20]Zhu Q,Yang Y,Scholte E,Di Natale M,Sangiovanni-Vincentelli A.Optimizing extensibility in hard real-time distributed systems.In: Proceedings of the 15th IEEE Real-Time and Embedded Technology and Applications Symposium(RTAS).San Francisco,CA:IEEE,2009. 275-284

    [21]Lin C W,Zhu Q,Phung C,Sangiovanni-Vincentelli A.Securityaware mapping for CAN-based real-time distributed automotive systems. In:Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design(ICCAD).San Jose,CA:IEEE,2013.115-121

    [22]Lin C W,Sangiovanni-Vincentelli A.Cyber-security for the controller area network(CAN)communication protocol.In:Proceedings of the 2012 International Conference on Cyber Security.Washington,DC: IEEE,2012.1-7

    [23]Davis R I,Burns A,Bril R J,Lukkien J J.Controller area network (CAN)schedulability analysis:refuted,revisited and revised.Real-Time Systems,2007,35(3):239-272

    [24]ISO 26262 Road vehicles(2011)-Functional safety[Online],available: http://www.iso.org,August 1,2014.

    [25]Tindell K W,Burns A.Guaranteed message latencies for distributed safety-critical hard real time control networks.In:Proceedings of the 1994 IEEE International Real-Time Systems Symposium(RTSS)[Online],available:http://www.cs.york.ac.uk/ftpdir/reports/YCS-94-229.pdf, August 1,2014.

    [26]NetcarBench 3.4[Online],available:http://www.netcarbench.org/,August 1,2014.

    Yong Xie received the Ph.D.degree from Hunan University,China,in 2013.He is currently an assistant professor of Xiamen University of Technology, China.His research interests include automotive embedded systems and cyber-physical systems.Corresponding author of this paper.

    Liangjiao Liu Ph.D.candidate at Hunan University.His main research interest is mixed-criticality embedded systems.

    Renfa Li received the Ph.D.degree from Tianjin University,China.He is currently a professor of Hunan University.His research interests include embedded systems,cyber-physical systems,and wireless sensor networks.

    Jianqiang Hu received the Ph.D.degree from National University of Defensive Technology,China. He is currently an associate professor of Xiamen university of Technology.His research interests include medical embedded system and cloud computing.

    Yong Han received the Ph.D.degree from Hunan University,China,in 2011.He is currently an associate professor of Xiamen university of Technology.His research interests include automotive crash safety and injury biomechanics.

    Xin Peng received the Ph.D.degree from Hunan University,China,in 2011.He is currently an associate professor of Hunan Institute of Science and Technology.His main research interest is automotive communication technologies.

    I.INTRODUCTION

    t

    September 2,2014;accepted August 9,2015.This work was supported by National Natural Science Foundation of China (61502405,61300039),Provincial Science Foundation of Hunan Province (14JJ3130),Fujian Educational Bureau(JA15368),and Xiamen University of Technology(YKJ13024R,XYK201437).Recommended by Associate Editor Yilin Mo.

    :Yong Xie,Liangjiao Liu,Renfa Li,Jianqiang Hu,Yong Han,Xin Peng.Security-aware signal packing algorithm for CAN-based automotive cyber-physical systems.IEEE/CAA Journal of Automatica Sinica,2015,2(4): 422-430

    Index Terms—Signal packing,security,automotive cyberphysical systems(ACPS),integer linear programming.

    A S many societal and economical requirements are put on automobiles,such as the improvement of driving performance and comfort,and the enhancement of both passive and active safety,more and more information and communication technology(ICT)contents are brought into the automotive electronic systems in the forms of software,network,and etc[1].As a result,automotive electronic systems are evolved from a close system to an open automotive cyber-physical system(ACPS)comprising of 70 to 100 electronic control units(ECUs)interconnected by several networks[2-3].The openness of ACPS brings many new exciting experiences to the automobile users,while at the same time it imposes severe challenges in cyber-security to auto industry[4-5].In[6-7], the authors showed that ACPS could be attacked through various interfaces,including direct and indirect physical access,short-range and long-range wireless channels.Cybersecurity problems produce numerous adverse impacts to the driver,varying from the discomfort caused by malfunction of air conditioner to endangering of driver and passenger’s life.Despite of these potential cyber-security vulnerabilities, functions of different criticalities(like safety-critical,functioncritical and non-critical functions)are integrated into the same ECU in ACPS because of the pressure from size,weight, and power(SWaP)properties[2].As a consequence,the cybersecurity threat is daily increasing for ACPS.

    亚洲精品av麻豆狂野| 亚洲第一电影网av| 母亲3免费完整高清在线观看| 国产欧美日韩一区二区精品| www.熟女人妻精品国产| 黄色成人免费大全| 国产不卡一卡二| 91成年电影在线观看| 日本 欧美在线| 在线看三级毛片| 精品久久久久久久久久免费视频| 亚洲中文字幕日韩| 国产亚洲精品第一综合不卡| 一个人免费在线观看的高清视频| 黄色片一级片一级黄色片| 精品第一国产精品| 又黄又爽又免费观看的视频| 男人舔奶头视频| 色综合亚洲欧美另类图片| 亚洲av成人不卡在线观看播放网| 亚洲av电影不卡..在线观看| 一进一出抽搐gif免费好疼| 免费在线观看日本一区| 久久这里只有精品19| 成人特级黄色片久久久久久久| 亚洲一码二码三码区别大吗| 在线天堂中文资源库| 香蕉国产在线看| 久久午夜亚洲精品久久| 桃红色精品国产亚洲av| 欧美日韩一级在线毛片| 在线看三级毛片| 日韩有码中文字幕| 99久久综合精品五月天人人| 国产激情久久老熟女| av片东京热男人的天堂| 在线永久观看黄色视频| 久久亚洲精品不卡| 欧美日韩中文字幕国产精品一区二区三区| 国产一区二区三区在线臀色熟女| 国产精品自产拍在线观看55亚洲| 男女视频在线观看网站免费 | 欧美久久黑人一区二区| 一区二区三区精品91| 国产成人精品久久二区二区91| 欧美人与性动交α欧美精品济南到| 青草久久国产| 免费在线观看成人毛片| 两性夫妻黄色片| 国产单亲对白刺激| 欧美中文综合在线视频| 日本三级黄在线观看| 欧美国产日韩亚洲一区| 99精品在免费线老司机午夜| 欧美久久黑人一区二区| 欧洲精品卡2卡3卡4卡5卡区| 免费观看精品视频网站| 少妇熟女aⅴ在线视频| 每晚都被弄得嗷嗷叫到高潮| 999久久久精品免费观看国产| 色哟哟哟哟哟哟| 成人特级黄色片久久久久久久| 99久久久亚洲精品蜜臀av| 亚洲 国产 在线| 色在线成人网| 久久狼人影院| 国产私拍福利视频在线观看| 此物有八面人人有两片| 精品久久蜜臀av无| 香蕉av资源在线| 国产日本99.免费观看| 听说在线观看完整版免费高清| 听说在线观看完整版免费高清| 色综合亚洲欧美另类图片| 久久人人精品亚洲av| 不卡av一区二区三区| 中出人妻视频一区二区| 国产成人av激情在线播放| 精品国产国语对白av| 一区二区三区激情视频| 色在线成人网| 哪里可以看免费的av片| 欧美zozozo另类| 人人妻人人澡人人看| 丰满人妻熟妇乱又伦精品不卡| 热re99久久国产66热| 亚洲五月色婷婷综合| 啦啦啦免费观看视频1| 国产欧美日韩一区二区三| 草草在线视频免费看| avwww免费| ponron亚洲| 国产极品粉嫩免费观看在线| 国产精品美女特级片免费视频播放器 | 亚洲自拍偷在线| 丰满人妻熟妇乱又伦精品不卡| 一区二区三区高清视频在线| 国产精品1区2区在线观看.| 夜夜看夜夜爽夜夜摸| 欧美又色又爽又黄视频| 一a级毛片在线观看| 亚洲激情在线av| 嫩草影院精品99| 这个男人来自地球电影免费观看| 美女 人体艺术 gogo| 久久草成人影院| 99精品在免费线老司机午夜| 一级毛片精品| 午夜激情av网站| 国产又色又爽无遮挡免费看| 欧美日韩中文字幕国产精品一区二区三区| 少妇裸体淫交视频免费看高清 | 亚洲色图 男人天堂 中文字幕| 久久精品91无色码中文字幕| 日韩精品中文字幕看吧| 不卡av一区二区三区| 欧美精品啪啪一区二区三区| 国产高清视频在线播放一区| 日韩欧美国产一区二区入口| 好看av亚洲va欧美ⅴa在| 看片在线看免费视频| 欧美一区二区精品小视频在线| 在线免费观看的www视频| 最近最新免费中文字幕在线| av片东京热男人的天堂| 日本一本二区三区精品| 757午夜福利合集在线观看| 亚洲国产精品999在线| 美女高潮到喷水免费观看| 大型av网站在线播放| 制服诱惑二区| 亚洲一区高清亚洲精品| 国内久久婷婷六月综合欲色啪| 欧美 亚洲 国产 日韩一| 白带黄色成豆腐渣| 国产精品综合久久久久久久免费| 精品一区二区三区视频在线观看免费| 女同久久另类99精品国产91| 亚洲精品一区av在线观看| 国产蜜桃级精品一区二区三区| 午夜亚洲福利在线播放| 99久久国产精品久久久| 国产aⅴ精品一区二区三区波| 成人永久免费在线观看视频| 欧美亚洲日本最大视频资源| 国产又色又爽无遮挡免费看| 黄频高清免费视频| 欧美人与性动交α欧美精品济南到| 精品久久久久久久久久久久久 | 又紧又爽又黄一区二区| 一a级毛片在线观看| 18禁美女被吸乳视频| 亚洲免费av在线视频| 脱女人内裤的视频| 国产99白浆流出| 亚洲第一av免费看| 国产伦人伦偷精品视频| 国产欧美日韩一区二区精品| 欧美久久黑人一区二区| 亚洲最大成人中文| 欧美成人午夜精品| 久久久久久亚洲精品国产蜜桃av| 国产97色在线日韩免费| 女人被狂操c到高潮| 一本精品99久久精品77| 少妇熟女aⅴ在线视频| 麻豆久久精品国产亚洲av| 亚洲真实伦在线观看| 色哟哟哟哟哟哟| 日本a在线网址| av片东京热男人的天堂| 好看av亚洲va欧美ⅴa在| 国产在线观看jvid| 亚洲国产精品成人综合色| 亚洲男人的天堂狠狠| 人人妻人人看人人澡| 亚洲国产欧美日韩在线播放| 亚洲男人天堂网一区| 俺也久久电影网| 最新美女视频免费是黄的| 国产乱人伦免费视频| 国产在线观看jvid| 搡老妇女老女人老熟妇| 亚洲人成伊人成综合网2020| 一区二区三区国产精品乱码| 午夜视频精品福利| 婷婷六月久久综合丁香| 香蕉丝袜av| tocl精华| 免费在线观看亚洲国产| 亚洲av中文字字幕乱码综合 | 精品乱码久久久久久99久播| 欧美成人性av电影在线观看| 国产成人欧美在线观看| 欧美最黄视频在线播放免费| 欧美日韩瑟瑟在线播放| 久久久久久免费高清国产稀缺| 亚洲第一av免费看| 黄频高清免费视频| xxxwww97欧美| 亚洲 欧美一区二区三区| 久热爱精品视频在线9| 一区福利在线观看| 99国产精品一区二区蜜桃av| 精品一区二区三区四区五区乱码| 一本精品99久久精品77| 熟女电影av网| 久久亚洲精品不卡| 久久亚洲真实| 50天的宝宝边吃奶边哭怎么回事| 大型黄色视频在线免费观看| 国产精品av久久久久免费| 国产成人欧美在线观看| 亚洲专区字幕在线| 国产男靠女视频免费网站| АⅤ资源中文在线天堂| 免费在线观看视频国产中文字幕亚洲| 欧美最黄视频在线播放免费| 亚洲av片天天在线观看| 色哟哟哟哟哟哟| 99精品欧美一区二区三区四区| 欧美成人一区二区免费高清观看 | 999精品在线视频| 深夜精品福利| 夜夜爽天天搞| 精品日产1卡2卡| 国内精品久久久久精免费| 亚洲熟女毛片儿| 亚洲精品色激情综合| 精品久久久久久久毛片微露脸| 色精品久久人妻99蜜桃| 中文字幕人妻丝袜一区二区| 精品人妻1区二区| 久久狼人影院| 俄罗斯特黄特色一大片| 午夜精品在线福利| 午夜久久久在线观看| 激情在线观看视频在线高清| 自线自在国产av| 欧美黑人精品巨大| 日韩视频一区二区在线观看| 久久香蕉激情| 我的亚洲天堂| 亚洲av成人不卡在线观看播放网| 国产精品一区二区三区四区久久 | 热99re8久久精品国产| 中文字幕av电影在线播放| 亚洲一区二区三区色噜噜| 99精品欧美一区二区三区四区| 丝袜人妻中文字幕| 国产又黄又爽又无遮挡在线| 亚洲电影在线观看av| 亚洲人成77777在线视频| 级片在线观看| 欧美av亚洲av综合av国产av| 亚洲人成电影免费在线| 在线观看66精品国产| 亚洲av日韩精品久久久久久密| 熟女少妇亚洲综合色aaa.| 久久久久久九九精品二区国产 | 色av中文字幕| 欧美又色又爽又黄视频| tocl精华| 在线观看免费视频日本深夜| 日本a在线网址| 国产激情偷乱视频一区二区| 亚洲男人天堂网一区| 久久草成人影院| 黄色 视频免费看| 人成视频在线观看免费观看| 亚洲专区字幕在线| 变态另类丝袜制服| 国产精品一区二区免费欧美| 亚洲片人在线观看| 国产单亲对白刺激| 最好的美女福利视频网| 精品熟女少妇八av免费久了| 久久精品91蜜桃| 一夜夜www| 亚洲 欧美一区二区三区| 久久亚洲精品不卡| 亚洲成a人片在线一区二区| 亚洲精品中文字幕在线视频| 精品久久久久久久末码| 女性被躁到高潮视频| videosex国产| 成人一区二区视频在线观看| 国产精品,欧美在线| 精品久久蜜臀av无| 女人高潮潮喷娇喘18禁视频| 女警被强在线播放| 丝袜在线中文字幕| 禁无遮挡网站| 日韩中文字幕欧美一区二区| 99久久无色码亚洲精品果冻| 欧美国产精品va在线观看不卡| 国产精品日韩av在线免费观看| 成人18禁在线播放| 久热这里只有精品99| 国产97色在线日韩免费| 日韩免费av在线播放| 亚洲五月天丁香| 在线国产一区二区在线| 欧美性猛交黑人性爽| 两个人看的免费小视频| 少妇被粗大的猛进出69影院| svipshipincom国产片| 国产av在哪里看| 成年人黄色毛片网站| 精品福利观看| 亚洲精品中文字幕一二三四区| 久久青草综合色| 国产精品,欧美在线| 欧美另类亚洲清纯唯美| 美女大奶头视频| 美女 人体艺术 gogo| 亚洲中文字幕一区二区三区有码在线看 | 精品电影一区二区在线| 欧美成人一区二区免费高清观看 | 两性夫妻黄色片| 两性午夜刺激爽爽歪歪视频在线观看 | ponron亚洲| 久久久久久久精品吃奶| 国产成+人综合+亚洲专区| 国产成年人精品一区二区| 日韩欧美在线二视频| 波多野结衣高清无吗| 1024视频免费在线观看| 女性被躁到高潮视频| 国产av不卡久久| 欧美中文综合在线视频| 亚洲国产毛片av蜜桃av| 99热6这里只有精品| 日本黄色视频三级网站网址| 母亲3免费完整高清在线观看| 国产亚洲精品av在线| 91麻豆精品激情在线观看国产| 制服丝袜大香蕉在线| 久久青草综合色| 亚洲av美国av| 国产在线精品亚洲第一网站| 国产精品二区激情视频| www.精华液| 午夜影院日韩av| 99在线视频只有这里精品首页| 久热爱精品视频在线9| av视频在线观看入口| 免费观看精品视频网站| 精品乱码久久久久久99久播| 久久人妻av系列| 国产成人系列免费观看| 国内精品久久久久久久电影| 亚洲国产欧美日韩在线播放| 两性夫妻黄色片| 在线观看66精品国产| cao死你这个sao货| 亚洲自偷自拍图片 自拍| 欧美日韩中文字幕国产精品一区二区三区| 精品一区二区三区av网在线观看| 丰满的人妻完整版| 色av中文字幕| 美女大奶头视频| 无人区码免费观看不卡| ponron亚洲| 久久久久九九精品影院| 国产精品98久久久久久宅男小说| 狠狠狠狠99中文字幕| 99国产精品99久久久久| 国产av不卡久久| 日韩欧美国产在线观看| 国产精品香港三级国产av潘金莲| 精品午夜福利视频在线观看一区| 欧美av亚洲av综合av国产av| xxxwww97欧美| 国产av在哪里看| 99在线视频只有这里精品首页| 国产精品一区二区精品视频观看| 大型av网站在线播放| 欧美乱码精品一区二区三区| 国产精品九九99| 两个人看的免费小视频| 香蕉av资源在线| 成熟少妇高潮喷水视频| 亚洲国产看品久久| 亚洲国产精品久久男人天堂| 丰满的人妻完整版| 淫妇啪啪啪对白视频| 日韩欧美三级三区| 我的亚洲天堂| 欧美激情极品国产一区二区三区| 成人精品一区二区免费| 久久中文字幕一级| 天天一区二区日本电影三级| 老鸭窝网址在线观看| 激情在线观看视频在线高清| 最近最新免费中文字幕在线| 久久精品91蜜桃| 国产精华一区二区三区| 久久久久久人人人人人| bbb黄色大片| 欧美+亚洲+日韩+国产| 国产麻豆成人av免费视频| 好男人电影高清在线观看| 18禁黄网站禁片午夜丰满| 大型黄色视频在线免费观看| 国产97色在线日韩免费| 村上凉子中文字幕在线| 一级作爱视频免费观看| 又黄又爽又免费观看的视频| 亚洲av美国av| 99在线视频只有这里精品首页| 国产精品野战在线观看| 久久欧美精品欧美久久欧美| 午夜福利在线观看吧| 黄色毛片三级朝国网站| 亚洲第一av免费看| 亚洲一卡2卡3卡4卡5卡精品中文| 日本熟妇午夜| 黄色视频不卡| 国内久久婷婷六月综合欲色啪| 婷婷精品国产亚洲av在线| tocl精华| 老司机在亚洲福利影院| 国产精品爽爽va在线观看网站 | 免费在线观看影片大全网站| 精品久久久久久久末码| 国产成人啪精品午夜网站| 天天躁夜夜躁狠狠躁躁| 亚洲五月婷婷丁香| 美女国产高潮福利片在线看| 99热只有精品国产| 久久久国产成人免费| 国产精品亚洲美女久久久| 天堂√8在线中文| 久久精品国产99精品国产亚洲性色| 曰老女人黄片| 国产不卡一卡二| 免费在线观看黄色视频的| 在线国产一区二区在线| 韩国精品一区二区三区| 国产亚洲av嫩草精品影院| 又黄又爽又免费观看的视频| 久久久国产精品麻豆| 国产成人av激情在线播放| 欧美不卡视频在线免费观看 | www.自偷自拍.com| 精品欧美国产一区二区三| 日韩欧美国产在线观看| 亚洲精品久久成人aⅴ小说| 亚洲国产欧美一区二区综合| 日韩大尺度精品在线看网址| 日本精品一区二区三区蜜桃| 老司机福利观看| av片东京热男人的天堂| 日日爽夜夜爽网站| 一进一出好大好爽视频| 免费看日本二区| 伊人久久大香线蕉亚洲五| 一区二区三区精品91| 欧美激情久久久久久爽电影| 嫩草影院精品99| 99精品在免费线老司机午夜| 久久精品国产清高在天天线| 亚洲成国产人片在线观看| 欧美一区二区精品小视频在线| a在线观看视频网站| 国产乱人伦免费视频| 色精品久久人妻99蜜桃| 色哟哟哟哟哟哟| 国产成人av教育| 亚洲成人精品中文字幕电影| 高清在线国产一区| 长腿黑丝高跟| 搡老熟女国产l中国老女人| 亚洲国产精品成人综合色| 一边摸一边做爽爽视频免费| 亚洲人成电影免费在线| 搡老岳熟女国产| www.熟女人妻精品国产| 国产精品九九99| 国产精品亚洲美女久久久| 免费人成视频x8x8入口观看| 麻豆久久精品国产亚洲av| 久久久精品国产亚洲av高清涩受| 国产又爽黄色视频| 可以免费在线观看a视频的电影网站| 18禁观看日本| 欧美亚洲日本最大视频资源| 国产精品九九99| 天堂影院成人在线观看| www.自偷自拍.com| 精品熟女少妇八av免费久了| 免费无遮挡裸体视频| 亚洲性夜色夜夜综合| 午夜免费鲁丝| 国产欧美日韩一区二区三| 一卡2卡三卡四卡精品乱码亚洲| 波多野结衣av一区二区av| www.999成人在线观看| 国产高清videossex| 啦啦啦免费观看视频1| 国产亚洲欧美98| 18禁观看日本| 午夜精品久久久久久毛片777| 国产成人欧美| 国产精华一区二区三区| 日本成人三级电影网站| 久久亚洲真实| 欧美日韩瑟瑟在线播放| 国产成人精品无人区| 欧美国产精品va在线观看不卡| 欧美性猛交黑人性爽| 国产99久久九九免费精品| 亚洲av成人av| 一级毛片女人18水好多| 亚洲男人天堂网一区| 成人18禁高潮啪啪吃奶动态图| 日韩欧美三级三区| 欧美日本视频| 1024视频免费在线观看| 大型黄色视频在线免费观看| 欧美中文综合在线视频| 变态另类丝袜制服| 美女国产高潮福利片在线看| 国产av又大| 亚洲国产毛片av蜜桃av| 久久人妻av系列| 久久久精品欧美日韩精品| 一二三四在线观看免费中文在| 99精品久久久久人妻精品| 国产高清视频在线播放一区| 精品熟女少妇八av免费久了| 亚洲全国av大片| 2021天堂中文幕一二区在线观 | 天堂影院成人在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品久久久久久精品电影 | 久久亚洲精品不卡| 日本三级黄在线观看| 精品国产美女av久久久久小说| 午夜久久久在线观看| 成人国产一区最新在线观看| 制服诱惑二区| 亚洲专区国产一区二区| 高清毛片免费观看视频网站| 国语自产精品视频在线第100页| 桃红色精品国产亚洲av| 又黄又爽又免费观看的视频| 亚洲五月天丁香| 一级a爱视频在线免费观看| 色精品久久人妻99蜜桃| 女同久久另类99精品国产91| 91国产中文字幕| 国内少妇人妻偷人精品xxx网站 | 无限看片的www在线观看| 啦啦啦 在线观看视频| 欧美最黄视频在线播放免费| 99热只有精品国产| 亚洲中文日韩欧美视频| 国内毛片毛片毛片毛片毛片| 757午夜福利合集在线观看| 国产精品av久久久久免费| 精品卡一卡二卡四卡免费| 国产精品九九99| 韩国av一区二区三区四区| а√天堂www在线а√下载| 不卡av一区二区三区| 欧美zozozo另类| 免费看美女性在线毛片视频| 亚洲欧美精品综合久久99| 亚洲色图av天堂| 一夜夜www| 少妇熟女aⅴ在线视频| 免费女性裸体啪啪无遮挡网站| 日日爽夜夜爽网站| videosex国产| 精品卡一卡二卡四卡免费| 极品教师在线免费播放| 亚洲av片天天在线观看| 久久精品国产清高在天天线| 狂野欧美激情性xxxx| 色在线成人网| 无人区码免费观看不卡| 手机成人av网站| 免费观看人在逋| 亚洲一区中文字幕在线| 一个人免费在线观看的高清视频| 成人18禁高潮啪啪吃奶动态图| 免费在线观看完整版高清| 看免费av毛片| 淫秽高清视频在线观看| 亚洲一区二区三区不卡视频| 亚洲欧美一区二区三区黑人| 国产黄片美女视频| 一本一本综合久久| 伊人久久大香线蕉亚洲五| e午夜精品久久久久久久| 午夜影院日韩av| 成人三级做爰电影| 日韩 欧美 亚洲 中文字幕| 中文字幕最新亚洲高清| 国产精品二区激情视频| 91老司机精品| 欧美日韩乱码在线| 免费在线观看影片大全网站| 欧美国产日韩亚洲一区| 国产精品精品国产色婷婷| 黄网站色视频无遮挡免费观看| 欧美一级毛片孕妇| 亚洲中文av在线| 黑人巨大精品欧美一区二区mp4| 国产97色在线日韩免费| 亚洲久久久国产精品| 欧美精品亚洲一区二区| 99热6这里只有精品|