• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Communication Networks in the Advanced Metering Infrastructure of Smart Grid

    2015-10-11 06:11:33FengYeandYiQian
    ZTE Communications 2015年3期

    Feng Ye and Yi Qian

    (Department of Electrical and Computer Engineering,University of Nebraska-Lincoln,Lincoln,NE 68124,USA)

    Secure Communication Networks in the Advanced Metering Infrastructure of Smart Grid

    Feng Ye and Yi Qian

    (Department of Electrical and Computer Engineering,University of Nebraska-Lincoln,Lincoln,NE 68124,USA)

    In this paper,a security protocol for the advanced metering infrastructure(AMI)in smart grid is proposed.Through the AMI,customers and the service provider achieve two-way communication.Real-time monitoring and demand response can be applied because of the information exchanged.Since the information contains much privacy of the customer,and the control messages need to be authenticated,security needs to be ensured for the communication in the AMI.Due to the complicated network structure of the AMI,the asymmetric communications,and various security requirements,existing security protocols for other networks can hardly be applied into the AMI directly.Therefore,a security protocol specifically for the AMI to meet the security requirements is proposed.Our proposed security protocol includes initial authentication,secure uplink data aggregation,secure downlink data transmission,and domain secrets update.Compared with existing researches in related areas,our proposed security protocol takes the asymmetric communications of the AMI and various security requirements in smart grid into consideration.

    smart grid;advanced metering infrastructure;network security;privacy

    1 Introduction

    I n smart grid,the communication networks have been updated to more complicated and bidirectional ones. Data transmitted more frequently over the networks in much larger quantity.Therefore,compared with the communication in traditional power grid,network security issues are more important[1]-[3].The advanced metering infrastructure(AMI)is a system that collects and analyzes data from smart meters,and giving intelligent management of various power-related applications and services based on that data. An AMI has a hierarchical network structure.It consists of home area networks(HANs),neighborhood area networks(NANs),and a wide area network(WAN).In each HAN,there is a smart meter which monitors the energy consumption of the appliances and other power line status in that household.Metering data(data that is generated by smart meters)is uploaded to the metering data management system(MDMS)at the service provider side.Based on the metering data and other monitoring data from sensors,the service provider is able to have precise real-time monitor over the power grid.Moreover,demand response[4]-[7]can be applied with timely informationexchange between the customers and the service provider.As a result of the modern control system,smart grid is more efficient and eco-friendly compared with the traditional power grid.However,in order to achieve optimal control and demand response through the AMI,the data in uplink transmissions from smart meters to the MDMS includes secret information. For example,power usage of a household is included in metering data.Those data will be collected by the MDMS and be further applied to determine the power generation and the usage of renewable energy.Nonetheless,power usage pattern may reveal lifestyle of the corresponding customers.The controlling data in downlink transmissions involve the price/tariff information.Forgery or manipulation of such information may let the demand response be astray from being efficient.

    In this paper,we propose a network security protocol for the AMI.The WAN in AMI is a high speed backhaul network,which has robust security mechanisms from fiber optic networks or ethernet.Therefore,the security issues in AMI.Thus,our focus is on the wireless portion of the AMI,including smart meters from HANs and data aggregate points(DAPs)from NANs.Specifically,the proposed network security protocol includes four parts:initial authentication,secure uplink data aggregation,secure downlink data transmission,and domain secrets update.Initial authentication is for the nodes such as smart meters and DAPs to join the AMI.Security schemes foruplink and downlink transmissions are independently designed because of the asymmetric communications.Data in the uplink is more in quantity and higher in frequency.It features a many to-one communication.Moreover,aggregated data is enough,for instance,the aggregated power consumption for the service provider.Nonetheless,confidentiality of the controlling data in downlink may not be an issue.For instance,pricing/tariff is supposed to be public for the customers.Data integrity and sender authentication are more important for such controlling data.In addition,domain secrets such as session keys,public/private keys,and other secrets need to get refreshed once in a while.In the proposed domain secret update process,the communications remain uninterrupted.

    The rest of the paper is organized as follows.In Section 2,related work is discussed.In Section 3,the studied AMI is illustrated.In Section 4,the security schemes for the AMI are proposed.In Section 5,the conclusion and the future work are given.

    2 Related Work

    Although HANs and NANs in the AMI have structures of wireless mesh networks(WMNs)[8],[9],difference can be addressed in three holds.First,each smart meter must be available and be treated equally in the network since fairness must be applied to each of the customers while traditional WMN does not emphasize availability for each wireless node let alone fairness.Second,the deployment of smart meters are fixed and in specific orders since they are deployed in each household and the houses are in fixed position in most cases,while the wireless nodes in traditional WMN are usually deployed randomly and redundantly.Third,the uplink transmission and downlink transmission in AMI are asymmetric where the uplink transmission consists of different data from each smart meter to the MDMS and the most of the downlink transmissions are in broadcast mode,while in traditional WMN,the uplink or downlink can even barely be distinguished.Our proposed network security protocol is designed to match the uniqueness of AMI.

    There are several researches for the security issues in AMI[10]-[13],however,there are very few comprehensive security protocols for AMI.In[12],the authors proposed a protocol called integrated authentication and confidentiality(IAC)which involves the initial authentication of a smart meter,and the security in both uplink and downlink transmissions.However,IAC has several problems to be addressed.1)The smart meters are not treated equally where some of them are chosen to be the backbone nodes and proceed with security protocol,while the others must go through the backbone nodes,however the backbone nodes selection does not have any security concern.2)The initial authentication process cannot prevent replay attack or even forgery if the initial request is overheard by the attacker.3)The security protocol in uplink transmission cannot handle multiple incoming data at an intermediate node. 4)Compromise of a node will at least endangers another node since they share the same secret key for message encryption. 5)The security protocol for downlink transmission is too complicated since IAC did not consider broadcast scenario as the main transmission mode for downlink.6)Once a node malfunctions in the network,IAC cannot function any longer.An improved security protocol for the AMI was proposed in[13]. However,it applied many digital signatures for uplink transmissions which may not be practical.As a preliminary work,the protocol was not comprehensive enough.For instance,some of the messages may suffer from replay attack,and domain secret update mechanism was not mentioned.In this paper,an enhanced security protocol which addresses those shortages is proposed.

    3 Advanced Metering Infrastructure

    The communication networks of the AMI have a hierarchical structure,including HANs,NANs,and WAN.This structure is shown in Fig.1.A HAN consists of several smart appliances and a smart meter(Some may suggest that a gas meter is also involved.However,for simplicity,we restrict the discussion to electricity power grid and rule out gas meters.).The sensing/ measuring of the power grid status inside households and apartments(e.g.,energy-consumption,damage to power equipment,voltage-fluctuation,etc.)is gathered by smart meters.A NAN consists of many DAPs.Each DAP covers a few smart meters. The gathered data from smart meters is uploaded to the MDMS through DAPs.The gateway of a NAN is the data concentrator,which has fast and reliable network connection to the MDMS. Such fast and reliable network is the WAN.It covers a much larger area compared with a NAN.

    Because the AMI has a complicated structure,there is no single communication technology that can perfectly fulfill all the needs in the AMI.For example,the optical fiber used in backhaul networks is reliable(0:99999 reliability)and fast(in the order of Gbps).However,it will be too expensive to use it in HAN where data is usually in the order of KB.Therefore,researchers have proposed to use different types of technologies so that communication requirements can be met while the deployment cost and the maintenance cost can be reasonably low.

    In the studied AMI as shown in Fig.2,various communication technologies are applied.A HAN is connected by local area networks,e.g.,IEEE 802.11(Wi-Fi)and/or IEEE 802.15.4(Zigbee).In a NAN,the DAPs form a wireless mesh network based on IEEE 802.11s(Wi-Fi based).Compared with Zigbee applied in HANs,Wi-Fi can achieve much higher transmission data rate.It is necessary because local NAN transmissions among DAPs introduce multi-hop wireless mesh networking and it requires higher data rate for the transmissions.Some of the DAPs are chosen as gateway DAPs which have direct communication with the concentrator.It is not necessary for the gateway DAPs to be close to the concentrator.In fact,multiple gateways need to be deployed sparsely in a NAN for its wide ranged latency requirement(3 ms to 5 min)[14],[15].If a customer has too many hops to reach a gateway,it may not be able to successfully deliver the data with most critical latency requirements.Therefore,gateway DAPs are equipped with IEEE 802.16(WiMAX)interface for longer distance transmission. Adopting WiMAX has a bonus compared with similar technology(e.g.,LTE)that it can be deployed using unlicensed band(e. g.,5:8 GHz)in order to lower the service cost by not paying license band accessing fee.However,using unlicensed bandwidth must follow certain restrictions by the FCC[16].Without loss of generality,the concentrator can be deployed in the center of the neighborhood.It is the gateway of the NAN to the wired backhaul network which connects to the MDMS(or the service provider)in a fast and reliable way.

    In the uplink of AMI,information such as energy consumption and monitoring data is transmitted from the customer side to the service provider.In the downlink of AMI,information such as control message and pricing/tariff is transmitted from the service provider to the customer.

    The data from customers(metering data)contains much privacy.For example,from the pattern of the energy consumption,it is possible to have a sketch of the lifestyle of that customer. Therefore,it is a must to provide confidentiality to metering data.In addition,integrity is also important to metering data.Manipulation of energy consumption(e.g.,energy theft)may cause loss to the service provider.More importantly,manipulated energy consumption will deviate the service provider from optimal control of the power grid,in turn will lead to unnecessary fuel waste and pollution.However,non-repudiation may not be as critical as the other two security requirements for two reasons.1)Providing non-repudiation which usually is achieved by digital signature may compromise the identity of the customer,and thus jeopardize the privacy.2)Data in the uplink is frequently transmitted by simple devices such as smart meters,DAPs,sensor nodes.They are equipped with limited computational capability.Therefore,applying public key cryptograph frequently is not practical.The monitoring data of power grid status is gathered by low profile sensors(e.g.,phasor measurement unit).Obviously,data integrity needs to be provided so that the service provider can monitor the grid correctly.However,with limited computational power and real-time transmission requirement,it is not necessary to provide confidentiality and non-repudiation to monitoring data.

    In the downlink transmission of the AMI,the service provider sends control messages to customers or some components in the power grid.Since control messages usually have real-time transmission requirement and the privacy of control message may not be very important,confidentiality is not required for control messages.Nonetheless,data integrity is critical.Nonrepudiation is supposed to be important since the control messages need to be verified from a legitimate sender(i.e.,the service provider).However,due to the low-latency requirement and limited computational power at the receiver side,it varies from case to case.Pricing/tariff is also sent from the service provider to customers in downlink transmissions.Confidentiality of such information is not needed because it is for the public.Data integrity and non-repudiation is nonetheless critical.

    4 Proposed Security Protocol for AMI

    The proposed security protocol consists of four schemes,initial authentication scheme,secure uplink transmission scheme,secure downlink transmission scheme,and domain secret update scheme.

    For simplicity,the notations of the keys used in the proposed security protocol are listed in Table 1.

    4.1 Initial Authentication

    An uninitialized node that does not function in the AMIproperly must be authenticated through the initialization process.Generally speaking,if a node is closer to the AS,it will be authenticated before the others that are further away.Therefore,before smart meters join the AMI,gateway DAPs and normal DAPs are initialized.Note that gateway DAPs are initialized before normal DAPs since they have direct communication to the concentrator.For simplicity,gateway DAPs are not specified in the rest of the discussion.

    ▼Table 1.Notations of the keys

    Let the DAPs be divided into two groups,one is active and the other is uninitialized.An active node has been authenticated by the AS to join the AMI communication and is functioning in a healthy status.An uninitialized node can be one of the four types shown in the following:

    1)A newly installed node

    2)A node which is recovered from malfunctioning status

    3)A node which is updated with new pre-shared keys

    4)A node which is reinstalled to another location.

    For example,if DAP n1wants to join the AMI,the initialization process goes through all of its active neighbors(e.g.,n2,n3and n4).As illustrated in Fig.3,n1sends requests to all of its active neighbors,which will relay the request to the AS through established secure links.After being authenticated by the AS,n1will receive different reply messages from the AS through its active neighbors.Through this initial authentication process,there are mainly three tasks accomplished,

    ·n1is authenticated to be an active node and join the AMI

    ·n2establishes secure connection to the AS through one of its active neighbors which has the shortest distance to the AS

    ·n1establishes backup secure connections to the AS through the rest of its active neighbors.

    Without loss of generality,n2is chosen to illustrate the detailed initialization process.The processes through n3and n4are similar.n1,a secure link betweenn2and the AS,and the AS are involved.Note that the nodes in the secure link do not get useful information from the process.Therefore,we focus on n1,n2,and the AS.The initialization process has three mutual authentications.One is between n1and the AS,one is between n2and the AS,and the other one is between n1and n2.The mutual authentication between n1and the AS is obvious since the legitimate nodes are allowed to join the AMI by AS and the nodes also only trust the AS.The mutual authentication between n2and the AS is to ensure n2is active and is trusted to relay the request from n1.The mutual authentication between n1and n2is to help further establish secure communications from n1to n2.Assuming that each node has a pre-shared secret key(i.e.,Kifor node ni)with the AS before initialization.Each active node has been assigned with an active secret key(i.e.,Kifor ni)mainly for uplink data encryption.This active secret key is also used to verify if this node is active or not.Similar to K2,k2is only known to n2and the AS.In order to establish a secure connection from n1to the AS,an active secret key k1must be generated by the AS and assigned to n1during the initialization process.Note that n1does not bare k1before initialization process,only K1is known to n1.

    As shown in Fig.4,the whole initialization process involves 6 messages.

    6)M6=k1,2:After exchange public keys,n1andn2can work out a way to generate a session keyk1,2for communication. Session keyk1,2is only shared betweenn1andn2.It is subject to get refreshed frequently.

    After exchanging these 6 messages,n1is fully initialized and it is able to join uplink communications throughn2.The initial authentication processes through other active neighbors are similar.The AS sends back the sameIV1,k1,PuAS,andg. In the final hand-shake,n1will send the samePu1to its active neighboring nodenxencrypted withPux.By doing so,n1shares the same public key to all of its active neighbors. Therefore,n1is able to join the uplink transmission through any of the active neighbors,in other words,both operating and backup secure communication channels are established through the initial authentication process.

    When the DAPs are initialized by the AS,the NAN is formed.Smart meters will then be initialized through active DAPs.Unlike DAPs,smart meters do not have many neighbor nodes because of two reasons.First,smart meters have limited transmission range.They are unlikely to have direct connection with more than one DAPs.Second,it is not a good idea to let smart meters communicate with each other since the data contains much privacy and smart meters are easier to get access to than DAPs.A smart meter sends an initialization request to an active DAP,and the DAP will relay the request to the AS through a secure communication link.The detailed process is similar to that shown in Fig.4 and thus is not repeated. Security Analysis:

    ·Confidentiality:Confidentiality of the authentication request is unnecessary,therefore it is not provided.Much information is transmitted in plain text.

    ·Data integrity:All the messages(except forM6)are provided a hash value for integrity check.Moreover,the input is not the original message which can be captured easily by an eavesdropper.The input is the XORed messages of the useful information,which cannot be captured or forged.Therefore,the messages in this protocol is unforgettable.Moreover,with time stamps being applied in each message,replay attack is unlikely to succeed in the process.The detailed process ofM6is not given in this protocol,because the real application may vary based on different public key schemes.With a given public key scheme,data integrity can be provided in a similar way for session keyki,j.

    ·Non-repudiation:The idolization process does not use a digital signature for sender authentication except forM5.However,secret pre-shared keys are applied for message encryption.With the sender and the receiver being the only ones that can encrypt and decrypt the message,nonrepudiation is achieved for all messages(except forM5).Non-repudiation ofM5is indeed provided by a digital signature.

    4.2 Security Protocol in Uplink Transmission

    In the uplink transmission,data from each node is aggregated in a chain topology and is finally delivered to the service provider(assuming that the AS and the service provider share the same entity).As discussed before,data confidentiality and data integrity are important security requirements for metering data since the wrong data may cause unnecessary loss of the power generation.Sender authentication or non-repudiation may be considered in certain situation if there is enough computational resources.To achieve all those requirements mentioned above,we propose the security protocol for data aggregation in uplink transmission as shown in Fig.5.Suppose in one path there are N nodes with an order of(n1,n2,…,nN).As thefirst one of the aggregation,n1mixes its raw dataD1withIV1and encrypts it withk1so that confidentiality can be achieved. H*()· is a hashed message authentication code function which provides data integrity.Different hash functions can be used for initialization process and uplink transmission,therefore wefor clearer illustration.Finally,n1encrypts the entire message with k1,2so that n2can verify that the data is from n1which is an active node.The intermediate nodes first decrypt the incoming data with the session key of the previous node.Then,they mix their raw data with the previous data.After that,they follow the same steps as the first node.

    If an intermediate node has multiple incoming nodes,it treats each of them as a separate chain and aggregates its own data to one of the incoming data while simply padding the data from the other incoming nodes to it with flags.The details are shown in Fig.6.Assumenphas two incoming nodesniand nj,andnpchooses to aggregate incoming data fromni.Then npfollows the usual steps dealing with DpandMi,p.For Mj,p,npauthenticates the sender by gettingMj,and simply flags Mjsuch that f0||||Mjf1to the originalMp,thus

    Once the AS receives the aggregated data,it starts the recovery process of the data.The AS first authenticates the incoming node by decrypting the receiving data with the pre-shared public keyPuN,AS.Before recovering the raw data,the AS needs to verify the data integrity by checking the hashed value. Since the data of each node are not further processed by nodes after it,if some of the data corrupt,the AS will simply discard them instead of wasting the whole message from that transmission path.The detailed raw data recovery process(without integrity check)is shown in Fig.7.Message,after verifying the data integrity,the AS decryptsCiand XOR the result withMi-1to recoverDN. Note thatD1is recovered by XORingIV1.If the message includes data from multiple chains,the AS extracts the message between f0and f1first and recovers the data following the same process as shown in Fig.7 without verifying the sender authentication(the decryption process withPuN,AS).

    Security Analysis:

    ·Confidentiality:The confidentiality is achieved by two steps in this protocol.For each nodeni,its raw data is mixed with the incoming data from the previous node.

    ·The first node achieves this step by mixing its data with the initial vector given by the AS.Moreover,mixed data is encrypted with the active keyki.

    ·Data integrity:The message cannot be manipulated since message integrity is verified using a hash value.The message ofniis unforgeable unless an active keykiis compromised.

    ·Non-repudiation:On one hand,since each message is en

    crypted by an active key from the corresponding node,sender authentication is provided.On the other hand,no digital signature is used in the proposed protocol for non-repudia-tion.In fact,if a message is susceptible or invalid,the service provider will simply discard it without wasting resources on it.

    4.3 Security Protocol in Downlink Transmission

    The downlink transmission involves control messages from the service provider to the nodes.Most of the control messages(e.g.,price and tariff information)are for all the smart meters in the neighborhood,where the confidentiality is not as important as that of the uplink data.Nonetheless,as discussed before,data integrity is important.Message manipulation will cause further responding in power usage and will finally result in unnecessary fuel waste due to excess power generation. Moreover,non-repudiation is critical for such control messages so that the customers can trust the sender.

    LetCBbe the control message to be broadcast.To provide message integrity,a hash value(achieved by hash function H*(·))is appended to the original message,the entire message is then signed withPuASas a digital signature to provide nonrepudiation and sender authentication.is an encryption function using public key cryptography,the encryption key isPrAS.In all,wheretis a time stamp for data freshness.At the receiver side,the original information(i.e.,CBand t)is revealed by performingis a decryption function using public key cryptography with decryption key PuAS.An integrity check will be performed to verify both the hash value and the time stamp.If the integrity check is not passed,the receiver will request a retransmission from the AS through its secure uplink transmission tunnel.This rarely happens unless the message is not legitimate.Because each node will receive multiple copies of the control message from all of its active neighbors.If one of the message is valid,then a retransmission will not be necessary. Some of the control messages(e.g.,request for update)are for a specific node(e.g.,ni).Let such control message beCi. Apparently,message integrity,nonrepudiation and sender authentication shall still be provided,moreover,confidentiality of the message is also important,therefore the message is encrypted withkisuch that.Unlike MB,broadcastingMiis a waste of resource and is unnecessary. However,sendingMithrough the corresponding uplink path may reduce the availability of the message.Therefore,we propose to send such specific control message tonithrough all of its active neighbors,as illustrated in Fig.8.

    Security Analysis:

    ·Confidentiality:For downlink broadcasting messages,confidentiality is not provided.For downlink messages to a specific node(e.g.,ni),confidentiality is provided by encrypting the message with the active key ki.

    ▲Figure 8.Example of Control messageM1ton1.

    ·Integrity:First of all,both the broadcasting and unicasting control messages are unforgeable since they signed by the AS using its private key.Secondly,any manipulated control messages will be recovered since their hash values cannot pass the data integrity check.

    ·Non-repudiation:Since each control message is signed by the AS,the control message is non-repudiable.

    4.4 Domain Secrets Update

    In order to keep the AMI secure in the long run,domain secrets need to be refreshed once in a while(e.g.,daily or even hourly).For the AS,its public and private key needs to be refreshed.After the AS generates a new pair of public/private keysit transmits the public key to all the active nodes in a broadcasting way(signed by current private key of the AS),s.t.,where t is a time stamp which keeps the freshness of the message.The update ofis for all the active nodes in the same time slot.In the meantime,separate control messages signed byPrASandwill be sent so that the downlink transmission is not interrupted.

    For an active node(e.g.,ni),its active secret keykineeds to be refreshed.To do so,the AS picks a new active secret keyforni,and sendstoni, where t is a time stamp which keeps the freshness of the message.However,it is not necessary to refresh the active secret keys for all the nodes at the same time.The AS can do a batch at a time when the network is not heavily loaded,for example,after mid night.Moreover,as mentioned before,the session key(e.g.,ki,j)between two active nodes(i.e.,niand nj)needs to be refreshed more frequently.To do so,niandnjsimply run the 6-th step from the initialization process again.

    The pre-shared key of a node is not refreshed as frequently as the other keys since it is used much less frequently.Therefore,the pre-shared key can last longer before it wears out. However,it is reasonable to refresh the pre-shared key in somecases.For example,if a DAP is compromised and recovered,or if a DAP is redeployed to another NAN,or if a house has been sold and thus its smart meter has a new owner.An on-site firmware update will be recommended in this case.A customer can also request a firmware update and then load it to his/her smart meter.Automatic update can also be achieved.For example,if DAPnineeds a pre-shared key update,the AS picks a new,and sends.It is also reasonable to encrypt this message withKiifkihas been compromised.However,if bothKiandkiare compromised,then a physical update will be inevitable.

    5 Conclusions

    In this paper,we propose a security protocol for the AMI in smart grid.In order to meet various security requirements for the asymmetric communication of the AMI,the proposed security protocol consists of initial authentication scheme,independent security schemes for uplink and downlink transmissions,and a domain secrete update scheme.The security scheme in uplink scheme provides confidentiality,data integrity to metering data and other monitoring data.The security scheme in downlink provides data integrity and non-repudiation to controlling data and pricing/tariff information.In the future work,we will extend the network security protocol so that cloud computing and various external information sources can be involved in the modern control of smart grid.

    [1]Y.Yan,Y.Qian,H.Sharif,and D.Tipper,“A survey on cyber security for smart grid communications,”IEEE Communications Surveys Tutorials,vol.14,no.4,pp.998-1010,2012.doi:10.1109/surv.2012.010912.00035.

    [2]Y.Yan,Y.Qian,H.Sharif,and D.Tipper,“A survey on smart grid communication infrastructures:Motivations,requirements and challenges,”IEEE Communications Surveys Tutorials,vol.15,no.1,pp.5-20,2013.doi:10.1109/ SURV.2012.021312.00034.

    [3]F.Ye,Y.Qian,and R.Hu,“Energy efficient self-sustaining wireless neighborhood area network design for smart grid,”IEEE Transactions on Smart Grid,vol. 6,no.1,pp.220-229,2015.doi:10.1109/TSG.2014.2344659.

    [4]J.Ma,J.Deng,L.Song,and Z.Han,“Incentive mechanism for demand side management in smart grid using auction,”IEEE Transactions on Smart Grid,vol. 5,no.3,pp.1379-1388,2014.doi:10.1109/TSG.2014.2302915.

    [5]H.Soliman and A.Leon-Garcia,“Game-theoretic demand-side management with storage devices for the future smart grid,”IEEE Transactions on Smart Grid,vol.5,no.3,pp.1475-1485,2014.

    [6]Z.Fadlullah,D.M.Quan,N.Kato,and I.Stojmenovic,“Gtes:An optimized game -theoretic demand-side management scheme for smart grid,”IEEE Systems Journal,vol.8,no.2,pp.588-597,2014.doi:10.1109/JSYST.2013.2260934.

    [7]F.Ye,Y.Qian,and R.Hu,“A real-time information based demand-side management system in smart grid,”IEEE Transactions on Parallel and Distributed Systems,no.99,pp.1,2015.

    [8]K.Ren,S.Yu,W.Lou,and Y.Zhang,“Peace:A novel privacy enhanced yet accountable security framework for metropolitan wireless mesh networks,”IEEE Transactions on Parallel and Distributed Systems,vol.21,no.2,pp.203-215,2010.

    [9]E.Witzke,J.Brenkosh,K.Green,L.Riblett,and J.Wiseman,“Encryption in mobile wireless mesh networks,”in 2012 IEEE International Carnahan Conference on Security Technology(ICCST),Boston,Massachusetts,USA,2012,pp. 251-256.

    [10]M.Thomas,I.Ali,and N.Gupta,“A secure way of exchanging the secret keys in advanced metering infrastructure,”in 2012 IEEE International Conference on Power System Technology(POWERCON),Auckland,New Zealand,Oct 2012,pp.1-7.

    [11]B.Vaidya,D.Makrakis,and H.Mouftah,“Secure multipath routing for ami network in smart grid,”in 2012 IEEE 31st International Performance Computing and Communications Conference(IPCCC),Austin,USA,Dec 2012,pp.408-415.

    [12]Y.Yan,R.Hu,S.Das,H.Sharif,and Y.Qian,“An efficient security protocol for advanced metering infrastructure in smart grid,”IEEE Network,vol.27,no. 4,pp.64-71,2013.doi:10.1109/MNET.2013.6574667.

    [13]F.Ye,Y.Qian,and R.Hu,“A security protocol for advanced metering infrastructure in smart grid,”in 2014 IEEE Global Communications Conference(GLOBECOM),Austin,USA,Dec 2014,pp.649-654.

    [14]G.Rajalingham,Q.-D.Ho,and T.Le-Ngoc,“Attainable throughput,delay and scalability for geographic routing on smart grid neighbor area networks,”in Wireless Communications and Networking Conference(WCNC 2013),Shanghai,China,2013,pp.1121-1126.

    [15]Communication Networks and Systems in Substations-Part 5:Communication Requirements for Functions and Device Models,P-IEC 61850-5ed1.0,2003.

    [16]FCC Rules for Unlicensed Wireless Equipment operating in the ISM Bands[Online].Available:http://www.afar.net/tutorials/fcc-rules

    [17]S.Burnett and S.Paine,The RSA Security's Official Guide to Cryptography,Mc-Graw-Hill,Inc.,2001.

    [18]D.Boneh and M.Franklin,“Identity-based encryption from the weil pairing,”SIAM Journal on Computing,vol.32,no.3,pp.586-615,2003.

    [19]B.Libert and J.-J.Quisquater,“The exact security of an identity based signature and its applications,”IACR Cryptology ePrint Archive,vol.2004,pp.102-104,2004.

    [20]F.Ye,Y.Qian,and R.Q.Hu.Hibass:hierarchical identity-based signature scheme for ami downlink transmission[Online].Available:http://onlinelibrary. wiley.com/doi/10.1002/sec.1217/abstract

    Manuscript received:2015-04-21

    Biographies

    Feng Yereceived his BS degree from the Department of Electronics Engineering,Shanghai Jiaotong University,Shanghai,China,in 2011.Currently he is pursuing his PhD degree at the Department of Electrical and Computer Engineering in University of Nebraska-Lincoln,NE,USA.His current research interests include smart grid communications and energy optimization,big data analytics and applications,cyber security and communication network security,wireless communications and networks.

    Yi Qian(yi.qian@unl.edu)received his PhD degree in electrical engineering from Clemson University.He is an associate professor in the Department of Electrical and Computer Engineering,University of Nebraska-Lincoln(UNL).Before joining UNL,he worked in the telecommunications industry,academia,and the government.His research interests include information assurance and network security,computer networks,mobile wireless ad-hoc and sensor networks,wireless and multimedia communications and networks,and smart grid communications.Several of his recent journal articles on wireless network design and wireless network security are among the most accessed papers in the IEEE Digital Library.

    The work was supported by the National Science Fourdation under Grant No.CNS-1423408.

    黄色女人牲交| 欧洲精品卡2卡3卡4卡5卡区| 欧美日韩国产mv在线观看视频| 成年版毛片免费区| 国产欧美日韩一区二区三区在线| 亚洲第一青青草原| 色精品久久人妻99蜜桃| 女人精品久久久久毛片| 在线国产一区二区在线| 热re99久久精品国产66热6| 人妻 亚洲 视频| 日韩视频一区二区在线观看| 在线观看免费午夜福利视频| 久久影院123| 老司机在亚洲福利影院| 亚洲第一av免费看| 国产亚洲精品久久久久5区| 国产麻豆69| 脱女人内裤的视频| 亚洲欧美精品综合一区二区三区| 亚洲第一av免费看| 精品免费久久久久久久清纯 | tube8黄色片| 国产午夜精品久久久久久| 欧美乱妇无乱码| 欧美大码av| 久热爱精品视频在线9| av在线播放免费不卡| 中文字幕人妻丝袜制服| 欧美丝袜亚洲另类 | 亚洲欧洲精品一区二区精品久久久| 久久精品亚洲熟妇少妇任你| 欧美精品高潮呻吟av久久| 日韩视频一区二区在线观看| 极品人妻少妇av视频| 国精品久久久久久国模美| 久久久精品区二区三区| 丰满的人妻完整版| 电影成人av| 一级片'在线观看视频| av电影中文网址| 久久香蕉精品热| 午夜福利欧美成人| 国产成人精品无人区| 99久久综合精品五月天人人| 欧美国产精品va在线观看不卡| 国产日韩欧美亚洲二区| 亚洲性夜色夜夜综合| 在线观看免费午夜福利视频| 免费一级毛片在线播放高清视频 | 国产精品一区二区精品视频观看| 精品一品国产午夜福利视频| 一级,二级,三级黄色视频| 欧美中文综合在线视频| 国产精品98久久久久久宅男小说| 两个人免费观看高清视频| 免费人成视频x8x8入口观看| 欧美日韩亚洲国产一区二区在线观看 | 久久婷婷成人综合色麻豆| 人人妻人人爽人人添夜夜欢视频| 成人手机av| 久久国产精品人妻蜜桃| 欧美亚洲 丝袜 人妻 在线| 欧美中文综合在线视频| 欧美精品亚洲一区二区| 丰满的人妻完整版| 黄片大片在线免费观看| 亚洲在线自拍视频| 悠悠久久av| 国产午夜精品久久久久久| 别揉我奶头~嗯~啊~动态视频| 欧美黄色淫秽网站| 国产成人啪精品午夜网站| 丰满迷人的少妇在线观看| 一级毛片精品| 国产精品电影一区二区三区 | 日韩熟女老妇一区二区性免费视频| 午夜福利在线免费观看网站| 久久中文字幕人妻熟女| 在线看a的网站| 18禁裸乳无遮挡免费网站照片 | 亚洲人成电影免费在线| 国产亚洲欧美精品永久| 亚洲av成人一区二区三| 男人舔女人的私密视频| 91精品三级在线观看| 69精品国产乱码久久久| 一区二区三区国产精品乱码| 国产野战对白在线观看| 久久精品人人爽人人爽视色| 女人精品久久久久毛片| 欧美激情久久久久久爽电影 | 欧美精品高潮呻吟av久久| 满18在线观看网站| 丰满人妻熟妇乱又伦精品不卡| 一二三四在线观看免费中文在| 18禁国产床啪视频网站| 男人操女人黄网站| 久久国产亚洲av麻豆专区| 亚洲精品在线观看二区| 俄罗斯特黄特色一大片| 久久久久国产一级毛片高清牌| 手机成人av网站| 国产精品久久久人人做人人爽| 一边摸一边抽搐一进一小说 | 久久国产精品大桥未久av| 首页视频小说图片口味搜索| a级毛片黄视频| 他把我摸到了高潮在线观看| 久久精品亚洲av国产电影网| 亚洲精品av麻豆狂野| 久久精品国产a三级三级三级| 亚洲性夜色夜夜综合| 91麻豆av在线| 一级黄色大片毛片| 一本一本久久a久久精品综合妖精| 亚洲熟女精品中文字幕| 欧美日韩国产mv在线观看视频| 在线观看一区二区三区激情| 免费看十八禁软件| 久久久久久久久免费视频了| 国产在线一区二区三区精| 香蕉丝袜av| 亚洲综合色网址| 欧美精品亚洲一区二区| 亚洲av成人av| 日本vs欧美在线观看视频| 免费在线观看视频国产中文字幕亚洲| 亚洲国产看品久久| 亚洲精品自拍成人| 精品少妇久久久久久888优播| 三上悠亚av全集在线观看| 极品教师在线免费播放| 国内久久婷婷六月综合欲色啪| 不卡一级毛片| 一个人免费在线观看的高清视频| 大片电影免费在线观看免费| 精品一区二区三区视频在线观看免费 | 国产一区在线观看成人免费| 久久精品91无色码中文字幕| 啦啦啦在线免费观看视频4| 日本五十路高清| 久久99一区二区三区| 亚洲精品国产色婷婷电影| 精品一区二区三区视频在线观看免费 | 亚洲成人国产一区在线观看| 美女 人体艺术 gogo| 两性午夜刺激爽爽歪歪视频在线观看 | 成年人免费黄色播放视频| 精品一区二区三区四区五区乱码| 色老头精品视频在线观看| 欧美激情 高清一区二区三区| 麻豆国产av国片精品| 在线观看舔阴道视频| 欧美在线黄色| 欧美日韩视频精品一区| 午夜91福利影院| 久久狼人影院| 制服诱惑二区| 美国免费a级毛片| 两个人免费观看高清视频| 一区在线观看完整版| 搡老熟女国产l中国老女人| 精品一区二区三卡| 中文欧美无线码| 欧美日韩国产mv在线观看视频| av欧美777| 成年人黄色毛片网站| 久久国产精品人妻蜜桃| 新久久久久国产一级毛片| 大型av网站在线播放| 久久国产精品人妻蜜桃| 亚洲伊人色综图| 一夜夜www| 两个人看的免费小视频| www.自偷自拍.com| 母亲3免费完整高清在线观看| xxxhd国产人妻xxx| 亚洲国产精品sss在线观看 | 女人被狂操c到高潮| 在线观看免费视频日本深夜| 女人久久www免费人成看片| 最新在线观看一区二区三区| 亚洲欧美激情在线| 叶爱在线成人免费视频播放| 成人影院久久| 精品亚洲成国产av| 99riav亚洲国产免费| 看片在线看免费视频| 国产成人系列免费观看| 青草久久国产| 又黄又爽又免费观看的视频| 深夜精品福利| 777米奇影视久久| 精品国产超薄肉色丝袜足j| 黑丝袜美女国产一区| 日韩欧美在线二视频 | 婷婷丁香在线五月| 久久婷婷成人综合色麻豆| 俄罗斯特黄特色一大片| 最新美女视频免费是黄的| 日本五十路高清| 中国美女看黄片| 亚洲av片天天在线观看| 宅男免费午夜| 精品久久蜜臀av无| 悠悠久久av| 亚洲av日韩在线播放| 亚洲欧美日韩高清在线视频| 欧美在线黄色| 黄色片一级片一级黄色片| 欧美日韩精品网址| 国产一区二区三区在线臀色熟女 | 午夜两性在线视频| 国产伦人伦偷精品视频| 欧洲精品卡2卡3卡4卡5卡区| 日韩欧美国产一区二区入口| 桃红色精品国产亚洲av| 老司机亚洲免费影院| 99精品欧美一区二区三区四区| 狂野欧美激情性xxxx| 亚洲精品中文字幕在线视频| 亚洲欧美一区二区三区黑人| 免费在线观看日本一区| 久热这里只有精品99| 免费在线观看黄色视频的| 一区二区三区国产精品乱码| 中文亚洲av片在线观看爽 | 日韩欧美国产一区二区入口| 深夜精品福利| 大香蕉久久成人网| 黄色a级毛片大全视频| 12—13女人毛片做爰片一| 人人妻人人爽人人添夜夜欢视频| 丝袜人妻中文字幕| 亚洲国产中文字幕在线视频| netflix在线观看网站| 精品电影一区二区在线| 日韩三级视频一区二区三区| 久久久久久亚洲精品国产蜜桃av| 亚洲国产欧美日韩在线播放| 国产成人精品无人区| 国产1区2区3区精品| 欧美黑人精品巨大| e午夜精品久久久久久久| 丰满饥渴人妻一区二区三| 午夜亚洲福利在线播放| 日日爽夜夜爽网站| 国产一卡二卡三卡精品| 亚洲综合色网址| 亚洲专区中文字幕在线| 欧美日韩成人在线一区二区| 女性被躁到高潮视频| 19禁男女啪啪无遮挡网站| 午夜久久久在线观看| 久久精品国产a三级三级三级| 嫁个100分男人电影在线观看| 国产精品久久久久成人av| www.999成人在线观看| www.精华液| 极品少妇高潮喷水抽搐| 欧美人与性动交α欧美精品济南到| 97人妻天天添夜夜摸| 久久中文字幕人妻熟女| 黄色毛片三级朝国网站| 亚洲,欧美精品.| 久久久久视频综合| av线在线观看网站| 成年人黄色毛片网站| 精品福利观看| а√天堂www在线а√下载 | 免费人成视频x8x8入口观看| 无限看片的www在线观看| 19禁男女啪啪无遮挡网站| 久久ye,这里只有精品| 天天影视国产精品| 老司机午夜十八禁免费视频| 一进一出抽搐gif免费好疼 | 桃红色精品国产亚洲av| 欧美不卡视频在线免费观看 | 成年女人毛片免费观看观看9 | 久久午夜亚洲精品久久| 精品少妇一区二区三区视频日本电影| 性色av乱码一区二区三区2| 久久 成人 亚洲| 午夜免费观看网址| 午夜久久久在线观看| 午夜影院日韩av| 久99久视频精品免费| 亚洲精品成人av观看孕妇| 欧美日韩乱码在线| 少妇猛男粗大的猛烈进出视频| 久久中文看片网| 国产激情久久老熟女| 亚洲成人免费av在线播放| 99热国产这里只有精品6| 亚洲三区欧美一区| 国产精品久久久久久人妻精品电影| 成人精品一区二区免费| 日本黄色日本黄色录像| 精品第一国产精品| 国产欧美日韩一区二区三| 久久草成人影院| 99国产极品粉嫩在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 丰满饥渴人妻一区二区三| 电影成人av| av不卡在线播放| 女性生殖器流出的白浆| 一级毛片女人18水好多| 18禁国产床啪视频网站| 黄色丝袜av网址大全| 国产xxxxx性猛交| 色婷婷av一区二区三区视频| 精品电影一区二区在线| 99精品久久久久人妻精品| 在线观看www视频免费| 一边摸一边抽搐一进一小说 | 男人操女人黄网站| 动漫黄色视频在线观看| 高清毛片免费观看视频网站 | 男人舔女人的私密视频| 久99久视频精品免费| 国产一区二区三区视频了| 中亚洲国语对白在线视频| 岛国在线观看网站| 久久99一区二区三区| 国产免费男女视频| 免费女性裸体啪啪无遮挡网站| 亚洲av成人一区二区三| 亚洲人成77777在线视频| 国产精品电影一区二区三区 | 无限看片的www在线观看| 国产男女超爽视频在线观看| 99久久99久久久精品蜜桃| 美女高潮到喷水免费观看| 看免费av毛片| 99在线人妻在线中文字幕 | 国产精品自产拍在线观看55亚洲 | 亚洲欧美一区二区三区黑人| 国产精品乱码一区二三区的特点 | 91成年电影在线观看| 99精品在免费线老司机午夜| 国产欧美亚洲国产| 伦理电影免费视频| 巨乳人妻的诱惑在线观看| 十分钟在线观看高清视频www| 国产在线一区二区三区精| 久久香蕉激情| 精品电影一区二区在线| 热99re8久久精品国产| 男人舔女人的私密视频| 18禁黄网站禁片午夜丰满| 老熟妇仑乱视频hdxx| 男人操女人黄网站| 老熟妇仑乱视频hdxx| 别揉我奶头~嗯~啊~动态视频| 丝袜在线中文字幕| 精品熟女少妇八av免费久了| 天天躁夜夜躁狠狠躁躁| 久久这里只有精品19| www.自偷自拍.com| 99久久精品国产亚洲精品| 嫩草影视91久久| 国产成人av教育| 韩国精品一区二区三区| 夜夜夜夜夜久久久久| 午夜精品国产一区二区电影| 国产精品美女特级片免费视频播放器 | 精品第一国产精品| 91精品三级在线观看| 人人妻人人添人人爽欧美一区卜| 啦啦啦 在线观看视频| 亚洲精品久久午夜乱码| 女性生殖器流出的白浆| 韩国av一区二区三区四区| 99国产综合亚洲精品| 搡老熟女国产l中国老女人| 国内毛片毛片毛片毛片毛片| 欧美人与性动交α欧美软件| 亚洲av日韩在线播放| 女性被躁到高潮视频| 欧美在线一区亚洲| 亚洲五月色婷婷综合| 午夜福利在线观看吧| 亚洲专区国产一区二区| 久久性视频一级片| 日韩免费av在线播放| 高清毛片免费观看视频网站 | 老司机靠b影院| 19禁男女啪啪无遮挡网站| 可以免费在线观看a视频的电影网站| 亚洲欧美日韩另类电影网站| av网站免费在线观看视频| 老司机在亚洲福利影院| 亚洲人成电影观看| 老司机靠b影院| 操出白浆在线播放| 亚洲精品在线观看二区| 精品午夜福利视频在线观看一区| 久久久精品免费免费高清| 在线播放国产精品三级| 免费在线观看完整版高清| 50天的宝宝边吃奶边哭怎么回事| 日韩熟女老妇一区二区性免费视频| 色播在线永久视频| 丝袜美腿诱惑在线| 欧美日韩瑟瑟在线播放| 又大又爽又粗| 一进一出抽搐gif免费好疼 | 天天躁日日躁夜夜躁夜夜| 中文字幕人妻丝袜制服| 97人妻天天添夜夜摸| 国产黄色免费在线视频| 黄色 视频免费看| 日本一区二区免费在线视频| 无遮挡黄片免费观看| 一级片'在线观看视频| av视频免费观看在线观看| 久久午夜综合久久蜜桃| 成年人免费黄色播放视频| 色播在线永久视频| 亚洲av日韩在线播放| av免费在线观看网站| 日韩大码丰满熟妇| ponron亚洲| aaaaa片日本免费| 亚洲成人免费av在线播放| av网站在线播放免费| 他把我摸到了高潮在线观看| 亚洲 欧美一区二区三区| 久久久国产精品麻豆| 午夜91福利影院| 最近最新中文字幕大全免费视频| 亚洲欧美激情在线| bbb黄色大片| 色在线成人网| 国产精品久久电影中文字幕 | 亚洲精品国产一区二区精华液| 久久天堂一区二区三区四区| 日日爽夜夜爽网站| 国产伦人伦偷精品视频| 国产精品1区2区在线观看. | 一区二区三区激情视频| 热99re8久久精品国产| 亚洲国产毛片av蜜桃av| 免费av中文字幕在线| 亚洲久久久国产精品| 美女福利国产在线| 久久99一区二区三区| 亚洲专区国产一区二区| 黄片大片在线免费观看| 亚洲 国产 在线| 狂野欧美激情性xxxx| 午夜福利一区二区在线看| 黄片播放在线免费| 大陆偷拍与自拍| 色婷婷久久久亚洲欧美| 一区二区三区精品91| 亚洲 国产 在线| 成年女人毛片免费观看观看9 | 亚洲综合色网址| 91麻豆精品激情在线观看国产 | 国产深夜福利视频在线观看| av网站在线播放免费| 在线免费观看的www视频| 久久国产亚洲av麻豆专区| 免费观看人在逋| 午夜激情av网站| 青草久久国产| 国产日韩欧美亚洲二区| 高清在线国产一区| 国产精品.久久久| 成人永久免费在线观看视频| 在线观看午夜福利视频| www.自偷自拍.com| 亚洲精品国产一区二区精华液| 美女高潮喷水抽搐中文字幕| 欧美乱码精品一区二区三区| 免费看十八禁软件| 欧美+亚洲+日韩+国产| 18禁裸乳无遮挡动漫免费视频| 少妇被粗大的猛进出69影院| 久久国产亚洲av麻豆专区| 亚洲欧美一区二区三区黑人| 亚洲精品在线美女| 女人精品久久久久毛片| 午夜免费观看网址| 精品国产国语对白av| 欧美在线一区亚洲| 欧美 日韩 精品 国产| 首页视频小说图片口味搜索| 欧美激情 高清一区二区三区| 国产成人精品久久二区二区免费| 母亲3免费完整高清在线观看| 老司机靠b影院| 欧美丝袜亚洲另类 | 欧美另类亚洲清纯唯美| 欧美精品高潮呻吟av久久| 色综合欧美亚洲国产小说| 国产xxxxx性猛交| 色尼玛亚洲综合影院| 人人妻人人爽人人添夜夜欢视频| 淫妇啪啪啪对白视频| 国产精品免费一区二区三区在线 | 成人国产一区最新在线观看| 久久久精品国产亚洲av高清涩受| 午夜福利视频在线观看免费| 国产区一区二久久| 人妻丰满熟妇av一区二区三区 | 欧美成狂野欧美在线观看| 老司机靠b影院| 操出白浆在线播放| 人人妻,人人澡人人爽秒播| 色婷婷av一区二区三区视频| 婷婷精品国产亚洲av在线 | 中文字幕制服av| 国产国语露脸激情在线看| 99久久人妻综合| 国产亚洲欧美98| 精品一区二区三卡| 国产人伦9x9x在线观看| www.999成人在线观看| 在线观看免费高清a一片| 视频区欧美日本亚洲| 亚洲国产欧美网| 亚洲av第一区精品v没综合| 免费日韩欧美在线观看| 亚洲av熟女| 99国产精品一区二区三区| 狠狠婷婷综合久久久久久88av| 久久精品国产综合久久久| 免费女性裸体啪啪无遮挡网站| 久热爱精品视频在线9| 日本一区二区免费在线视频| 精品人妻在线不人妻| 成人精品一区二区免费| 麻豆av在线久日| 人人妻,人人澡人人爽秒播| 欧美精品av麻豆av| 99精国产麻豆久久婷婷| 欧美日韩av久久| 99精品久久久久人妻精品| 国产精品香港三级国产av潘金莲| 免费一级毛片在线播放高清视频 | 亚洲性夜色夜夜综合| 欧美成人午夜精品| 久久久久久亚洲精品国产蜜桃av| 高清视频免费观看一区二区| 热99国产精品久久久久久7| 亚洲色图 男人天堂 中文字幕| 波多野结衣av一区二区av| 国产在线精品亚洲第一网站| 少妇裸体淫交视频免费看高清 | 日本欧美视频一区| 亚洲色图综合在线观看| 国产精品 国内视频| 男人舔女人的私密视频| 伦理电影免费视频| 国产精品av久久久久免费| 动漫黄色视频在线观看| 欧美成人免费av一区二区三区 | 久久影院123| 免费观看人在逋| 美女视频免费永久观看网站| 美女扒开内裤让男人捅视频| 91成年电影在线观看| 亚洲欧美激情在线| 最新在线观看一区二区三区| 亚洲av成人av| 97人妻天天添夜夜摸| aaaaa片日本免费| 美女高潮喷水抽搐中文字幕| 久久久久国产精品人妻aⅴ院 | 在线视频色国产色| 我的亚洲天堂| 国产精品久久久久久人妻精品电影| 日韩制服丝袜自拍偷拍| 91大片在线观看| 51午夜福利影视在线观看| 纯流量卡能插随身wifi吗| 男女高潮啪啪啪动态图| 久久人妻福利社区极品人妻图片| 丝袜在线中文字幕| 欧美中文综合在线视频| 极品教师在线免费播放| 亚洲精品国产区一区二| 一级片'在线观看视频| 色94色欧美一区二区| 国产亚洲一区二区精品| 老司机午夜福利在线观看视频| 成年人免费黄色播放视频| 亚洲专区国产一区二区| 首页视频小说图片口味搜索| 一二三四社区在线视频社区8| 97人妻天天添夜夜摸| e午夜精品久久久久久久| 久久久久精品人妻al黑| 一二三四在线观看免费中文在| 极品人妻少妇av视频| 99国产精品免费福利视频| 777久久人妻少妇嫩草av网站| 两人在一起打扑克的视频| 亚洲av成人av| 在线观看66精品国产| 可以免费在线观看a视频的电影网站| 久久香蕉国产精品| 亚洲熟女毛片儿| 国产亚洲欧美精品永久| 天天添夜夜摸| 超碰97精品在线观看| 欧美国产精品一级二级三级| 91av网站免费观看| 天天躁夜夜躁狠狠躁躁| 精品第一国产精品|