• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security information factor based airborne radar RF stealth

    2015-12-23 10:08:51

    1.College of Electronic and Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Electronics,Electrical Engineering and Computer Science,Queen’s University Belfast,Belfast BT7 1NN,UK

    Security information factor based airborne radar RF stealth

    FeiWang1,2,*,MathiniSellathurai2,Weigang Liu2,and Jiangjiang Zhou1

    1.College of Electronic and Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Electronics,Electrical Engineering and Computer Science,Queen’s University Belfast,Belfast BT7 1NN,UK

    Radar radio frequency(RF)stealth is very important in electronic war(EW),and waveform design and selection.Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors,such as Schleher interception factor, which makes it dif fi cult to evaluate radar RF stealth technologies ifinterceptor parameters are unknown.In communication,security capacity has been presented to describe the possible ability to communicate in complete security.Since the essentialofthe security capacity is to have the interceptor getnone valued information from the emitter,this paper is proposed to study security information factors taking advantage of mutual information to evaluate radar RF stealth undersome conditions.Through analyzing mutual information obtained by the radar and the interceptor,this paper de fi nes the security information factor with and withoutcooperative jamming.Furthermore,this paper deduces the ratio of the match fi lter to the match incoherent fi lter and discuss mutualinformation received by the interceptor.Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.

    mutualinformation,radar signal,stealth.

    1.Introduction

    The stealth technology is used to avoid being detected by a variety of detection devices.As radar cross section(RCS) and acoustic stealth are against active radar and passive acoustic detection,radar radio frequency(RF)stealth is againstpassive radar detection[1,2].Radar RF stealth not only depends on transmitpower,butalso relies on realparameters of the passive radar detector which is probably driven by economics and operationalfactors.

    To survive the more and more serious challenge of advanced interceptors,many complicated low probability interception(LPI)signals are presented[3-5].However,the quick appearance of high performance interceptors has made many LPI signals unfashionable.For example,the channelized receiver could improve the sensitivity to about 20 dB by dividing the instantaneous frequency bandwidth of 2 GHz into a great number of narrow channels of 10 MHz.In any practicalscenario,the common wide band radarsignalhas no valuable advantage when itis facing the instantaneous channelized receiver even though the channelized receiver needs to put data from adjacent channels togetherif they are from a single radarsignal.On the other hand,the super heterodyne receiver is a high gain narrowband interceptor which is suitable for emitter identi fi cation,and often used to search for speci fi c radar type.With enormous parallel processors,the matched incoherentreceivercould yield abouta sensitivity of 10 d B on the channelized receiver,which would carry out matched fi ltering in a number of channels to combat a number of potential threats simultaneously[6].

    Evaluation ofradar RF stealth has drawn much attention for several decades[7].The basic standard is to compare the maximum detection range of the radar and the interceptor,which is the principle of the intercept factor.If the radar signal detection range is larger than that of the interceptor,we tend to think that the radar signal has good RF stealth performance.Wu and Dishman studied signal power stealth performance in the special battle scenario, which relied on the average radius of beam-forming technology[8,9].And Fancey proposed a complicated metrication through comparing peak values,bandwidth and shrewdness of a great many LPI signals,which depended on the prior experience knowledge of the RF stealth strategy[10].

    The information theory is the base stone of communication and radar.In communication,security capacity only considers the channel information without any relation with hardware and software technologies[11].Similarly,we propose a security information factor coming from mutualinformation to describe radar RF stealth without knowing the detail of the interceptor.Bell established the relationship between mutualinformation and radarsig-nals using the differential entropy theory[12],which has been generally applied to radar waveform design[13-15]. To develop Bell’s theory,under different conditions,such as in incoherent pulses,coherent pulses and cooperative jamming states,we presenta security information factor to evaluate radar RF stealth through comparing mutualinformation got by the radar and the interceptor,respectively. Meanwhile,we analyze mutualinformation loss of the interceptor with the match incoherent fi lter.

    The rest of the paper is organized as follows.Section 2 introduces mutualinformation and presents security information factors with and withoutcooperative jamming,and deduces the ratio of the match fi lter to the match incoherent fi lter.Section 3 illustrates our opinions with numerical simulations.

    2.Security information factor for radar RF stealth

    The system modelto be discussed is shown in Fig.1,where the targetand the interceptor are all within the radar main beam.The co-operatormain beam points to the interceptor and its leakage power is neglected.

    Fig.1 Classicalcooperative jamming scene for radar RF stealth

    We de fi ne the Fourier transform(FT)of radar transmission signal x(t)by X(f)and the target RCS byσf,the radarreceive signalby y(t)and the interceptorreceive signal by z(t).We next discuss mutual information between (i)radar transmission antennas and receiver antennas;(ii) radartransmission antennas and interceptorantennas,with and withoutco-operatorjamming.

    With Bell’s information theory,we have the following assumptions:

    Assumption 1The noise is additive Gaussian white noise.

    Assumption 2

    where xk(t)are random variables with zero mean and Gaussian distribution.Frequency components of xk(t)are con fi ned to Fk=[fk,fk+Δf],and FT of xk(t)is approximately constant.xk(t)and xj(t)are uncorrelated if k/=j.Itis the same for y(t)and z(t).x(t),y(t)and z(t) use the same sampling interval.

    Assumption 3Allantenna loss and path loss are negligible,and only the noise fl ooris considered.Radarreceiver and interceptor receiver noises are expressed as nr(t)and ni(t)respectively,and they have the same properties of Assumption 1.

    According to the mutual information equation,mutual information of xk(t)and zk(t)is

    where h denotes entropy.Since the variance of xk(t)and

    Because the conditional probability density function f[zk(t)|xk(t)]=f[nik(t)],we have

    Then,the mutualinformation in(1)can be formulated as

    Δf is the length of the frequency bin.Hence,of each sample is expressed as:

    where Tris the signal duration time.Similarly,the noise power would be

    where Tiis the process time ofthe interceptor.Substituting (6)and(7)into(4)yields

    For there are 2Δf Tistatistically independentsamples, then,

    If the antenna gain is taken into consideration,mutual information Iintbetween radartransmission antennas and interceptor antennas is over the frequency bandωi,thatis,

    Similarly,we have mutualinformation Irecbetween the radartransmission antenna and the receiverantenna as

    where Wrand Wiare effective bandwidths of the radar receiver and the interceptor respectively,pnnr(f)and Pnni(f)are radar receiver and interceptornoise power,Trand Tiare effective process time of the radar receiver and the interceptor,Gtis the radar transmission gain,Gris the radarreceiver gain,Gtiis the gain from the radartransmitter to the interceptor,Giis the interceptor antenna gain, Lr(Rri)is the attenuation from the radar to the interceptor and Lr(2Rr)is the attenuation from the radar emitter to the targetand then to the radar receiver.Equations(10) and(11)represent mutual information at the antenna port without any signal processing procedure.Meanwhile,as post-processing cannot increase mutual information with the data processing inequality principle,(10)and(11)are the maximum mutual information obtained by the interceptor and the radar receiver in fullidealconditions while Wr=Wi.

    From(10)and(11),it is easy to take some Trand Wrto make(11)larger than(10),which shows thatthe larger the time bandwidth product,the more the mutualinformation.Traditional fi ghter pulse Doppler radar usually transmits many short pulses whose widths are often from 1μs to 3μs,to get the information gain and measure the target speed.As the fi ghteris a greatthreat,the warning interceptoris always designed to pay attention to this type ofsignal so thatwe could assume that Tr≈Tiand Wr≈Wi.

    What’s more,in a modern battle fi eld,an electronic jammeris indispensable to keep the fi ghterin radar RF stealth. With Tr=Tiand Wr=Wi,if there is cooperative jamming,we could modify(10)and(11)as

    where Pnncis the cooperative jamming power,Gcrand Gciare the antenna gain from the co-operator to the radar receiver and the interceptor.Gicis the antenna gain from the interceptor to the co-operator.Lc(Rci)is the cooperative path loss to the interceptor and Lc(Rct+Rr)is the pass loss to targetplus targetto the radar receiver.

    Now,we have expressions from(10)to(13)to express the maximum mutual information of radar transmission antennas and receiver antennas,radar transmission antennas and interceptorantennas,with and withoutco-operator jamming.We de fi ne security information factor Isas

    whereρrandρirepresent the minimum mutual information needed by the radar receiver and the interceptor to trigger their following signal processing procedure.And ρrΔ=TrWrln(1+SNRr/Wr),ifρr=ρi,we could rewrite(14)as which is similar to the de fi nition of security capacity in communication.The difference is that(15)takes radartask ρrinto consideration because the radarmust fi nish the task in limited time.And Is≥1 means that radar RF is in a completely safe state while fi nishing the task.In communication,if the security capacity is greater than zero,then there is a maximum transmission rate for the current scenario.Meanwhile,an eavesdroppercannotgetthe information more than the source entropy.Similarly,under specifi ed airborne radar detection probability and false alarm probability,if Is≥1,then in the current scenario,with powercontrolorlarge bandwidth waveform design,the detection probability ofthe interceptorcould be less than 0.5. If the limit of the detection probability of the interceptor can be relaxed,(15)may also be relaxed.

    In a realscenario,the radar receivercould obtain mutual information presented in(10)and(13)through the match fi lter and the interceptor has less opportunity to have a match fi lterprocess.So we would discuss the mutualinformation loss resulted from the match incoherent fi lter pro-cess and then modify Iint.

    For the match incoherent fi lter,we assume that the frequency spectrum of zk(t)intercepted by the interceptor is

    where zk(t),xk(t)and nik(t)are de fi ned in(1),(2)and (3).The output of the match incoherent fi lter of the frequency bin fkwould be

    Then,the signalto noise ratio(SNR)of(17)is

    As the output SNR of the match fi lter of frequency bin fkis|X(fk)|2/|Ni(fk)|2,we could modify(10)and(12) from the match fi lter to the match incoherent fi lter,which become

    Usually,the radar receiver could accumulate target information through the incoherentintegration of echoes of multiple pulses,but the interceptor has little chance to accumulate radar RF information because itshould fi rstly tell if any two pulses are from the same radar.That is,if the radar transmits Npincoherent pulses,the radar receiver could improve targetinformation by accumulating Npmutualinformation and the interceptor never can.Then,with Npincoherentpulses shown in Fig.2(a),we could rewrite (15)as

    Fig.2 Accumulation gain of incoherent and coherent pulse train

    Fig.2(b)also shows the equivalent pulse of coherent pulse train[16],and A=|X(f)|so thatwe could rewrite (11),(13)and(21)as

    This paper just pays attention to discussing the security information factor on ideal antennas with match fi lters or incoherent match fi lters.And the information loss caused by signal processing arithmetic will be studied in the future.

    3.Numericalsimulations

    With(10)to(15),(19)to(24),we would discuss radar RF stealth with changing parameters,such as bandwidths, match fi lters,coherent integration and co-operative jamming power.

    (i)We de fi ne typicalradar parameters as follows:

    Antenna gain:Gt=Gr=Gti=30 dB;required detection SNR:SNRr=101.5,ρrΔ=TrWrln(1+ SNRr/Wr);pulse width:Tr=1μs;number of pulses: Np={64 1 024 2 048 4 096};bandwidth:Wr= {1 10 100 200}MHz;noise fl oor:Pnnr(f)= Wr·10?17.4 W.

    (ii)We de fi ne typicalinterceptor parameters as follows:

    Antenna gain:0-60 dB;instantfrequency bandwidth:

    WIF=2 GHz;noise fl oor:Pnni(f)=WIF·103· 10?17.4W;effective bandwidth:Wi≤200 MHz;process pulse width:Tr=Ti=1μs.

    (iii)Other parameters are de fi ned as follows:

    Target RCS:σf=1 m2,Gcr=0 dB,Gci=10 dB, Gic=-30 dB,Δf=1 MHz.Lcand Lrhave the same attenuation and the attenuation factor is 0.012 6 dB/km when the carrier frequency is 10 GHz.

    In simulation fi gures,the common terms‘suboptimal’and‘optimal’represent the interceptors taking the match incoherent fi lter and the match fi lter,respectively.Vertical coordinate of Fig.3 to Fig.6 is the value of Is.

    In Fig.3,with(10),(11),(15)and(19),we set Np=1 and the interceptor gain as 0 dB,which are common in some radar warning receiver.The target and the interceptorare atthe same place.Both the radarand the interceptor have the same effective bandwidth.Fig.3 shows thatradar RF could be stealth in alldistances if the radar only offers the minimum information required by the radar receiver. This is because the sensitivity of the interceptor is lower than that of the radar by 30 dB,and the receive antenna gain of the interceptor is also lower than that of the radar by 30 dB.

    Fig.3 Radar RF security information factor when Np=1 and interceptor gain is 0 dB

    In Fig.4,with(10),(11),(19),(21),(22)and(24),we set Np=64 and the interceptor gain as 60 dB,which are common in some electronic signalintelligence system. Both the radar and the interceptor have the same effective bandwidth.The target is at 80 km and the interceptor is gradually away from 80 km to 500 km.Fig.4 shows that a large bandwidth is not always bene fi cialif the interceptor has the same effective processor bandwidth.The left graphics of Fig.3 are from(21)and the rightfrom(24).

    Fig.4 Security information factor when Np=64 and interceptor gain is 60 dB

    In Fig.5,the target and interceptor parameters are the same as in Fig.4.Fig.5 shows that incoherent integration ofnarrow band pulses is an available method to realize radar RF stealth.

    Fig.5 Security information factor with different incoherent integration lengths of the interceptor

    In Fig.6,with(10),(11),(19),(21),(22)and(24),we setthe interceptorgain as 60 dBand its effective bandwidth as 20 MHz,which are common in some super heterodyne receiver.The targetand interceptor distances are the same as those in Fig.4(a).Fig.6 shows that radar RF stealth contributed by large bandwidths depends on the processor bandwidth of the interceptor.

    Fig.6 Security information factor with fixed interceptor bandwidth

    Fig.7 shows cooperative jamming power Pnncto full ideal interceptor with(20),(22)and(23)when the target is at80 km and the interceptor is gradually away from 100 km to 520 km.As Gcr=0 dB,Rci=Rri,and other parameters are the same as those in Fig.4(a),cooperative jamming is abouta constantfor differentsignal bandwidths.This fi gure also shows that the narrow bandwidth signalis better if the radar is facing the bestinterceptor.

    Fig.7 Cooperative jamming power for signalstealth

    From Fig.3 to Fig.7,we could get some important information:

    (i)Radar power control is the fi rst key for radar RF stealth.All fi gures from Fig.3 to Fig.7 have radar power controlled.

    (ii)Coherent integration of the pulse train has greater gain than thatof incoherentintegration,as Fig.5 shows.

    (iii)Using wideband radar to cope with the narrow interceptoris feasible,as Fig.6 shows.

    (iv)Using wideband radar to cope with the intelligent wideband interceptor should be prudent,as Fig.4 shows. An alternative way to cope with the wideband interceptor could be with cooperative jamming,as Fig.7 shows.

    (v)A feasible approach for RF stealth is to make thebandwidth of electronic support measurement as large as possible while let the bandwidth of radar signal bandwidth be as smallas possible.For example,radar may emit agile hopping narrowband coherentpulse signals while the hopping range of the carrier frequency should be as large as possible.

    (vi)Taking an interference waveform which is orthogonal to the radar signal.The narrower the bandwidth of the interference waveform,the less energy emitted by the jammer.The interference waveform also should be designed with the same carrier frequency and the same band as the radarsignal.

    4.Conclusions

    With the proposed security information factor,this paper shows thata large radarbandwidth sometimesmay be awkward if the intelligentinterceptorhas enough bandwidth to cope with radar RF signals.Strictly radar power control and mutualinformation integration of large sums ofpulses mightbe two ofthe bestways for radar RF stealth with low cost.And cooperative jamming is also a feasible method to cope with specialexpensive intelligentinterceptors.

    [1]Y.D.Shirman,V.M.Orlenko,S.V.Seleznev.Passive detection of the stealth signals.Proc.of the 1st European Radar Conference,2004:321-324.

    [2]N.C.Beaulieu,W.L.Hopkins,P.J.McLane.Interception of frequency-hopped spread-spectrum signals.IEEE Journal on Selected Areas in Communications,1990,8(5):853-870.

    [3]D.Li,J.Hong,B.Wang.Improving anti-detection/interception performance for wireless sensor network based on timereversaltechnology.Proc.ofthe 5th International Conference on Wireless Communications,Networking and Mobile Computing,2009:4554-4557.

    [4]Z.Li,X.G.Xia.A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception.IEEE Trans.on Wireless Communications,2009,8(7):3372-3379.

    [5]Z.Gao,X.Wang,N.Kataoka,et al.Stealth transmission of time-domain spectral phase encoded OCDMA signal over WDM network.IEEE Photonics Technology Letters,2010, 22(13):993-995.

    [6]A.G.Stove.Radarand ESM:the currentstate ofthe LPIbattle. Proc.of the 1st EMRS DTC Technical Conference Edinburgh Thales Airborne Systems,2004.

    [7]D.Lynch.Introduction to RF stealth.Raleigh,NC:Scitech Publishing Inc,2004.

    [8]P.H.Wu.On sensitivity analysisoflow probability ofintercept (LPI)capability.Proc.of the IEEE Military Communications Conference,2005:2889-2895.

    [9]J.F.Dishman,E.R.Beadle.SEVR:an LPD metric for a 3-D battle space.Proc.of the IEEE Military Communications Conference,2007:1-5.

    [10]C.Fancey,C.M.Alabaster.The metrication oflow probability of intercept waveforms.Proc.of the International Waveform Diversity and Design Conference,2010:58-62.

    [11]S.Vasudevan,D.Goeckel,D.F.Towsley.Security-capacity trade-off in large wireless networks using keyless secrecy. Proc.ofthe 11th ACM International Symposium on Mobile ad HOC Networking and Computing,2010:21-30.

    [12]M.R.Bell.Information theory and radar waveform design. IEEE Trans.on Information Theory,1993,39(5):1578-1597. [13]Y.Yang,R.S.Blum.MIMO radar waveform design based on mutual information and minimum mean-square error estimation.IEEE Trans.on Aerospace and Electronic Systems,2007, 43(1):330-343.

    [14]S.Sen,A.Nehorai.OFDM MIMO radar with mutualinformation waveform design for low-grazing angle tracking. IEEE Trans.on SignalProcessing,2010,58(6):3152-3162.

    [15]X.Song,P.Willett,S.Zhou,etal.The MIMO radar and jammer games.IEEE Trans.on Signal Processing,2012,99(1): 687-690.

    [16]M.A.Richards.Fundamentals of radar signal processing. Mumbai:Tata McGraw-Hill Education,2005.

    Biographies

    Fei Wang was born in 1976.He received his B.S. degree in power engineering from Hohai University,Nanjing,China,in 1998.He received his M.S. degree and Ph.D degree in signal processing from Jilin University,Changchun,China,in 2003 and 2006,respectively.His research interests include fundamental signal processing and airborne radar signalprocessing.

    E-mail:wangxiaoxian@nuaa.edu.cn

    MathiniSellathurai was born in 1973.She received her Licentiate degree from Royal Institute of Technology(KTH),Stockholm,Sweden in 1997 and Ph.D.degree from McMaster University,Hamilton, Canada in 2001.Herresearch interests include array and adaptive signal processing applied to radar and wireless communications.

    E-mail:M.Sellathurai@hw.ac.uk

    Weigang Liu was born in 1985.He received his B.S.degree in engineering from Wuhan University of Technology,Wuhan,China,in 2008,and M.S. degree in engineering from Chongqing University, Chongqing,China,in 2011.He is currently working toward his Ph.D degree in the Institute of Digital Communication(IDCOM),University of Edinburgh,Edinburgh,UK.His research interests include cooperative communication,convex optimization,stochastic geometry,and physicallayer security in wireless communications.

    E-mail:W.Liu@ed.ac.uk

    Jianjiang Zhou was born in 1962.He received his B.S.degree in radar engineering from Aeronautics College of Nanjing in 1985,and M.S.and Ph.D. degrees in communication and information system from Nanjing University of Aeronautics,Nanjing in 1988 and 2001.He is a professor in the Departmentof Electronic Engineering,Nanjing University of Aeronautics and Astronautics.His research interests include radar signal processing and radar automatic target recognition.

    E-mail:zjjee@nuaa.edu.cn

    10.1109/JSEE.2015.00031

    Manuscriptreceived October 27,2013.

    *Corresponding author.

    This work was supported by the National Natural Science Foundation of China(61371170)and the Priority Academic Program Development of Jiangsu Higher Education Institutions.

    日韩大码丰满熟妇| 又黄又爽又免费观看的视频| 国产亚洲av高清不卡| 涩涩av久久男人的天堂| 成人亚洲精品一区在线观看| 两性夫妻黄色片| 亚洲av电影不卡..在线观看| 午夜激情av网站| 美女免费视频网站| 免费看美女性在线毛片视频| 午夜老司机福利片| 日日爽夜夜爽网站| 12—13女人毛片做爰片一| 国产精品免费一区二区三区在线| 夜夜爽天天搞| 亚洲第一电影网av| 亚洲人成网站在线播放欧美日韩| 在线观看一区二区三区| 久久久久久久久久久久大奶| 欧美国产日韩亚洲一区| 精品少妇一区二区三区视频日本电影| 1024香蕉在线观看| 成年人黄色毛片网站| 国产片内射在线| 欧美性长视频在线观看| 国产不卡一卡二| 免费女性裸体啪啪无遮挡网站| 在线观看日韩欧美| 一级毛片高清免费大全| 波多野结衣高清无吗| 亚洲精品美女久久av网站| 国产成人影院久久av| 国产精品久久电影中文字幕| 欧美日韩精品网址| 在线观看一区二区三区| 满18在线观看网站| svipshipincom国产片| 手机成人av网站| 丁香欧美五月| 啪啪无遮挡十八禁网站| 久久午夜综合久久蜜桃| 欧美亚洲日本最大视频资源| av有码第一页| 国产麻豆成人av免费视频| 中文字幕久久专区| 亚洲 国产 在线| 黄色视频不卡| 好男人在线观看高清免费视频 | 亚洲情色 制服丝袜| 国产精品免费视频内射| 国产蜜桃级精品一区二区三区| 国产精品久久久久久人妻精品电影| 久久精品国产99精品国产亚洲性色 | 欧美成人午夜精品| 99精品欧美一区二区三区四区| 18禁裸乳无遮挡免费网站照片 | 国产激情欧美一区二区| 黑人巨大精品欧美一区二区蜜桃| 久久中文字幕一级| www.精华液| 一边摸一边抽搐一进一出视频| 搡老岳熟女国产| 一夜夜www| 老司机午夜福利在线观看视频| 国产精品亚洲美女久久久| 亚洲少妇的诱惑av| 两个人视频免费观看高清| 大码成人一级视频| 少妇 在线观看| 国产av一区二区精品久久| a级毛片在线看网站| 午夜久久久在线观看| 老熟妇乱子伦视频在线观看| 91麻豆精品激情在线观看国产| 这个男人来自地球电影免费观看| 高潮久久久久久久久久久不卡| 妹子高潮喷水视频| 女性生殖器流出的白浆| 国产精品亚洲av一区麻豆| 欧美乱色亚洲激情| 欧美黑人精品巨大| 丝袜人妻中文字幕| 国产精品野战在线观看| 婷婷精品国产亚洲av在线| 国产av精品麻豆| 国产97色在线日韩免费| 免费无遮挡裸体视频| 日韩精品免费视频一区二区三区| 午夜福利视频1000在线观看 | 久久中文字幕人妻熟女| 久久久久久亚洲精品国产蜜桃av| 亚洲av五月六月丁香网| 99在线人妻在线中文字幕| 麻豆国产av国片精品| 日日爽夜夜爽网站| 久久国产精品男人的天堂亚洲| 日日干狠狠操夜夜爽| 国产亚洲欧美精品永久| 亚洲欧美激情在线| 长腿黑丝高跟| 日韩av在线大香蕉| 亚洲第一电影网av| 国产欧美日韩一区二区三区在线| а√天堂www在线а√下载| 欧美另类亚洲清纯唯美| 在线观看www视频免费| 天堂动漫精品| 亚洲欧美激情综合另类| 黄色成人免费大全| 国产欧美日韩精品亚洲av| 日韩有码中文字幕| 在线十欧美十亚洲十日本专区| 国产主播在线观看一区二区| 桃红色精品国产亚洲av| 国产成人精品久久二区二区免费| 亚洲国产毛片av蜜桃av| 18禁裸乳无遮挡免费网站照片 | netflix在线观看网站| 久久人人精品亚洲av| 日本a在线网址| 午夜久久久在线观看| 中文亚洲av片在线观看爽| 88av欧美| 欧美黄色淫秽网站| 亚洲国产高清在线一区二区三 | 欧美日韩亚洲综合一区二区三区_| 久久精品国产99精品国产亚洲性色 | 国产在线观看jvid| 亚洲精品久久国产高清桃花| 一级毛片高清免费大全| 婷婷六月久久综合丁香| a在线观看视频网站| 99精品在免费线老司机午夜| 精品人妻1区二区| 男女下面插进去视频免费观看| 久久久久精品国产欧美久久久| 妹子高潮喷水视频| 精品免费久久久久久久清纯| 国产片内射在线| 每晚都被弄得嗷嗷叫到高潮| 精品国产乱码久久久久久男人| 精品午夜福利视频在线观看一区| 国产亚洲av高清不卡| 日韩三级视频一区二区三区| 免费在线观看亚洲国产| 国产亚洲精品久久久久久毛片| 免费高清视频大片| 成人亚洲精品av一区二区| 黑人巨大精品欧美一区二区mp4| 免费高清视频大片| 欧美一级毛片孕妇| 亚洲国产高清在线一区二区三 | 男女下面插进去视频免费观看| 九色国产91popny在线| 国产成人欧美| 一个人免费在线观看的高清视频| 欧美国产日韩亚洲一区| ponron亚洲| 中文字幕另类日韩欧美亚洲嫩草| 淫妇啪啪啪对白视频| 欧美+亚洲+日韩+国产| 国内毛片毛片毛片毛片毛片| xxx96com| 99re在线观看精品视频| tocl精华| 岛国在线观看网站| 国产一区二区在线av高清观看| 成人国语在线视频| 亚洲国产欧美日韩在线播放| 国产精品久久久久久人妻精品电影| 黄色a级毛片大全视频| 乱人伦中国视频| 最近最新中文字幕大全免费视频| 波多野结衣巨乳人妻| 免费少妇av软件| 一本久久中文字幕| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美激情久久久久久爽电影 | 欧美乱码精品一区二区三区| 岛国视频午夜一区免费看| 日本撒尿小便嘘嘘汇集6| 国产精品99久久99久久久不卡| 国产一区二区三区综合在线观看| 国产精品 欧美亚洲| 老司机靠b影院| 少妇裸体淫交视频免费看高清 | a在线观看视频网站| 国产1区2区3区精品| 国产精品久久久av美女十八| 国产熟女午夜一区二区三区| 777久久人妻少妇嫩草av网站| 国产黄a三级三级三级人| 欧美丝袜亚洲另类 | 久久久久九九精品影院| 精品国产国语对白av| 在线观看一区二区三区| 极品人妻少妇av视频| 欧美日韩精品网址| 极品教师在线免费播放| 99精品在免费线老司机午夜| 一进一出好大好爽视频| 亚洲成国产人片在线观看| 亚洲熟女毛片儿| 90打野战视频偷拍视频| 淫妇啪啪啪对白视频| 欧美av亚洲av综合av国产av| 99香蕉大伊视频| 搞女人的毛片| 成人免费观看视频高清| 亚洲情色 制服丝袜| 久久国产乱子伦精品免费另类| 高清毛片免费观看视频网站| 精品久久久精品久久久| 在线天堂中文资源库| 国产成人欧美在线观看| 999精品在线视频| 狠狠狠狠99中文字幕| 国内精品久久久久精免费| 久久久国产欧美日韩av| 18禁黄网站禁片午夜丰满| 久久久久国产精品人妻aⅴ院| 欧美日本中文国产一区发布| 国产精品永久免费网站| 国产在线观看jvid| x7x7x7水蜜桃| 一区二区三区高清视频在线| 久久精品91无色码中文字幕| 成人永久免费在线观看视频| 99在线人妻在线中文字幕| 一卡2卡三卡四卡精品乱码亚洲| 久久久久久人人人人人| 禁无遮挡网站| 一级a爱视频在线免费观看| 琪琪午夜伦伦电影理论片6080| www.精华液| 国产精品久久久久久亚洲av鲁大| 好男人在线观看高清免费视频 | 亚洲片人在线观看| 免费不卡黄色视频| 国产午夜福利久久久久久| 性色av乱码一区二区三区2| 一级a爱视频在线免费观看| 免费高清视频大片| 国产av一区在线观看免费| 女人高潮潮喷娇喘18禁视频| 亚洲一卡2卡3卡4卡5卡精品中文| 一级黄色大片毛片| 亚洲精品中文字幕一二三四区| 成人欧美大片| 亚洲,欧美精品.| 大码成人一级视频| 亚洲精品一区av在线观看| 黄片大片在线免费观看| 一二三四在线观看免费中文在| 91成年电影在线观看| 亚洲第一电影网av| 日韩精品免费视频一区二区三区| 国产单亲对白刺激| 国产精品久久久久久亚洲av鲁大| 中文字幕人妻熟女乱码| 国产一区二区三区视频了| 69av精品久久久久久| 丝袜美足系列| 国产精品日韩av在线免费观看 | 国产一区二区激情短视频| 法律面前人人平等表现在哪些方面| 人人妻,人人澡人人爽秒播| 给我免费播放毛片高清在线观看| 色婷婷久久久亚洲欧美| 大陆偷拍与自拍| 看免费av毛片| 1024香蕉在线观看| 色尼玛亚洲综合影院| 久久国产乱子伦精品免费另类| 别揉我奶头~嗯~啊~动态视频| 欧美日韩精品网址| 欧美成人性av电影在线观看| 搞女人的毛片| 日韩欧美免费精品| 丝袜美足系列| 欧美日韩中文字幕国产精品一区二区三区 | 欧美日韩精品网址| 狠狠狠狠99中文字幕| 色播在线永久视频| 国产精品免费一区二区三区在线| 操出白浆在线播放| 又黄又粗又硬又大视频| 美女午夜性视频免费| 亚洲人成77777在线视频| 男人的好看免费观看在线视频 | 俄罗斯特黄特色一大片| 人人妻人人澡人人看| 久久久久久久久中文| 亚洲少妇的诱惑av| 一夜夜www| 国产精品永久免费网站| 精品国产亚洲在线| 亚洲精品美女久久av网站| 国产精品美女特级片免费视频播放器 | 国产成人免费无遮挡视频| www.自偷自拍.com| 亚洲av第一区精品v没综合| 亚洲精品国产色婷婷电影| 午夜精品国产一区二区电影| 亚洲精品中文字幕一二三四区| 国产高清videossex| 精品国产超薄肉色丝袜足j| 精品人妻在线不人妻| 啪啪无遮挡十八禁网站| 淫妇啪啪啪对白视频| 老汉色∧v一级毛片| 久久久久久国产a免费观看| aaaaa片日本免费| 国产亚洲精品综合一区在线观看 | 久久久久久久久免费视频了| 欧美日韩黄片免| 女性生殖器流出的白浆| 热99re8久久精品国产| 亚洲国产精品合色在线| 亚洲av美国av| 正在播放国产对白刺激| 国产精品久久久久久精品电影 | 757午夜福利合集在线观看| 午夜福利免费观看在线| 午夜日韩欧美国产| 久久久久久大精品| 看黄色毛片网站| 99国产精品免费福利视频| 亚洲欧洲精品一区二区精品久久久| 久久人人精品亚洲av| 精品无人区乱码1区二区| 成人av一区二区三区在线看| 欧美人与性动交α欧美精品济南到| 精品不卡国产一区二区三区| 一级片免费观看大全| 日韩精品中文字幕看吧| 久久中文字幕一级| 一本大道久久a久久精品| 嫩草影院精品99| 91精品国产国语对白视频| 欧美黑人欧美精品刺激| 精品国产乱子伦一区二区三区| 日韩欧美三级三区| 我的亚洲天堂| 91精品三级在线观看| 最新美女视频免费是黄的| 精品国产美女av久久久久小说| 成熟少妇高潮喷水视频| 久久亚洲精品不卡| 伦理电影免费视频| 在线免费观看的www视频| 国产人伦9x9x在线观看| 午夜福利,免费看| 成人18禁高潮啪啪吃奶动态图| 亚洲激情在线av| 黄色丝袜av网址大全| 久久亚洲精品不卡| 国产亚洲欧美精品永久| 久久婷婷人人爽人人干人人爱 | 在线天堂中文资源库| svipshipincom国产片| 在线观看免费视频网站a站| 色av中文字幕| 国产av一区二区精品久久| 日本三级黄在线观看| 男女下面进入的视频免费午夜 | 国产人伦9x9x在线观看| 亚洲男人天堂网一区| 久久人妻av系列| av欧美777| 国产激情久久老熟女| 日本 av在线| 法律面前人人平等表现在哪些方面| av在线播放免费不卡| 亚洲avbb在线观看| 精品人妻在线不人妻| 色尼玛亚洲综合影院| 国产免费av片在线观看野外av| 久久伊人香网站| 久久亚洲精品不卡| av天堂久久9| 1024香蕉在线观看| 中文字幕久久专区| 久久精品人人爽人人爽视色| 美国免费a级毛片| 日韩欧美免费精品| 美女国产高潮福利片在线看| 麻豆av在线久日| 亚洲欧美日韩另类电影网站| 嫁个100分男人电影在线观看| 亚洲成人免费电影在线观看| 亚洲成av人片免费观看| 精品电影一区二区在线| 精品无人区乱码1区二区| 精品人妻1区二区| e午夜精品久久久久久久| 男女午夜视频在线观看| 成人亚洲精品av一区二区| 国产高清激情床上av| 丰满人妻熟妇乱又伦精品不卡| 精品国产美女av久久久久小说| 制服人妻中文乱码| 久久久水蜜桃国产精品网| 日韩大尺度精品在线看网址 | 国产精品乱码一区二三区的特点 | 国产成人欧美在线观看| 在线观看免费视频网站a站| 高清在线国产一区| 天堂动漫精品| 热re99久久国产66热| 国产av精品麻豆| 超碰成人久久| 麻豆av在线久日| av电影中文网址| 露出奶头的视频| 国产成+人综合+亚洲专区| 日日干狠狠操夜夜爽| 午夜激情av网站| www.www免费av| 亚洲中文字幕一区二区三区有码在线看 | 又黄又粗又硬又大视频| 国产精品久久久久久人妻精品电影| 一二三四在线观看免费中文在| www.www免费av| 亚洲中文字幕一区二区三区有码在线看 | 岛国在线观看网站| 99riav亚洲国产免费| 不卡一级毛片| 老司机午夜十八禁免费视频| 久久国产精品男人的天堂亚洲| 亚洲国产精品久久男人天堂| 男女床上黄色一级片免费看| 久久国产亚洲av麻豆专区| 日韩视频一区二区在线观看| 国产精品乱码一区二三区的特点 | 一进一出抽搐gif免费好疼| 国产精品美女特级片免费视频播放器 | 18美女黄网站色大片免费观看| 国产一卡二卡三卡精品| 亚洲情色 制服丝袜| 国产三级黄色录像| 无限看片的www在线观看| 亚洲欧美一区二区三区黑人| 又紧又爽又黄一区二区| 后天国语完整版免费观看| 18禁观看日本| 中出人妻视频一区二区| 国产精品久久久人人做人人爽| 91老司机精品| 久久久精品欧美日韩精品| 搞女人的毛片| 丝袜人妻中文字幕| 大型黄色视频在线免费观看| 亚洲成国产人片在线观看| 日韩欧美一区视频在线观看| 亚洲欧美日韩高清在线视频| 午夜福利免费观看在线| 在线十欧美十亚洲十日本专区| 18美女黄网站色大片免费观看| 身体一侧抽搐| 欧美丝袜亚洲另类 | 国产日韩一区二区三区精品不卡| 啦啦啦 在线观看视频| 色综合婷婷激情| 亚洲七黄色美女视频| 精品少妇一区二区三区视频日本电影| 亚洲人成电影免费在线| 午夜福利18| 成人18禁在线播放| 国产一区二区在线av高清观看| 91九色精品人成在线观看| 两个人视频免费观看高清| 日韩中文字幕欧美一区二区| 操出白浆在线播放| 久久国产精品男人的天堂亚洲| 国产人伦9x9x在线观看| 女生性感内裤真人,穿戴方法视频| 亚洲午夜理论影院| 国产精品 国内视频| 身体一侧抽搐| 久久久国产成人精品二区| 在线永久观看黄色视频| 亚洲 欧美一区二区三区| 亚洲九九香蕉| 国产亚洲av高清不卡| 可以在线观看的亚洲视频| 久久国产乱子伦精品免费另类| 高清在线国产一区| 成人免费观看视频高清| 欧美不卡视频在线免费观看 | 久久亚洲真实| 少妇粗大呻吟视频| 亚洲欧美精品综合久久99| 国产私拍福利视频在线观看| 亚洲精品av麻豆狂野| 一夜夜www| 亚洲中文字幕日韩| 热99re8久久精品国产| 精品国产一区二区三区四区第35| 欧美一级a爱片免费观看看 | 十八禁网站免费在线| 国产亚洲精品一区二区www| 久久天躁狠狠躁夜夜2o2o| 一区二区三区高清视频在线| 色综合欧美亚洲国产小说| 丰满的人妻完整版| 色播在线永久视频| 色精品久久人妻99蜜桃| 18禁观看日本| 欧美中文综合在线视频| 久久香蕉国产精品| 欧美精品啪啪一区二区三区| 男人操女人黄网站| 免费少妇av软件| 人人澡人人妻人| 国产精品av久久久久免费| 女同久久另类99精品国产91| 国内精品久久久久久久电影| av视频免费观看在线观看| 91精品国产国语对白视频| 亚洲aⅴ乱码一区二区在线播放 | 久热爱精品视频在线9| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美在线黄色| 脱女人内裤的视频| 久久久久久久精品吃奶| 纯流量卡能插随身wifi吗| 午夜福利成人在线免费观看| 日韩三级视频一区二区三区| 国产精品国产高清国产av| 一级作爱视频免费观看| 丁香欧美五月| 国产99久久九九免费精品| 亚洲欧美一区二区三区黑人| 免费在线观看影片大全网站| 国产单亲对白刺激| 十八禁网站免费在线| 亚洲最大成人中文| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜福利欧美成人| 99精品在免费线老司机午夜| 亚洲aⅴ乱码一区二区在线播放 | 亚洲三区欧美一区| 成人国语在线视频| 十八禁网站免费在线| 少妇熟女aⅴ在线视频| 欧美色视频一区免费| 美女午夜性视频免费| 亚洲色图综合在线观看| 免费搜索国产男女视频| 欧美+亚洲+日韩+国产| 丰满人妻熟妇乱又伦精品不卡| 国产成人精品在线电影| 国产视频一区二区在线看| 桃色一区二区三区在线观看| 亚洲av美国av| 在线十欧美十亚洲十日本专区| 久9热在线精品视频| 国产精品香港三级国产av潘金莲| 看片在线看免费视频| 免费搜索国产男女视频| www.自偷自拍.com| 久久午夜综合久久蜜桃| 制服丝袜大香蕉在线| 欧美亚洲日本最大视频资源| 一卡2卡三卡四卡精品乱码亚洲| 美女高潮到喷水免费观看| 手机成人av网站| 热99re8久久精品国产| 91麻豆精品激情在线观看国产| 美国免费a级毛片| 如日韩欧美国产精品一区二区三区| 亚洲自拍偷在线| 人妻丰满熟妇av一区二区三区| а√天堂www在线а√下载| 午夜视频精品福利| 欧美另类亚洲清纯唯美| 淫秽高清视频在线观看| 久久香蕉精品热| 国产97色在线日韩免费| 免费高清视频大片| 欧美精品亚洲一区二区| 97超级碰碰碰精品色视频在线观看| 岛国视频午夜一区免费看| 岛国在线观看网站| 精品国产一区二区久久| 欧美午夜高清在线| 免费在线观看视频国产中文字幕亚洲| 别揉我奶头~嗯~啊~动态视频| 久久婷婷人人爽人人干人人爱 | 色精品久久人妻99蜜桃| 国产亚洲精品第一综合不卡| 中文字幕久久专区| 中亚洲国语对白在线视频| 99国产极品粉嫩在线观看| 淫妇啪啪啪对白视频| 免费人成视频x8x8入口观看| av天堂在线播放| 亚洲欧美日韩高清在线视频| 久久久久久久久久久久大奶| 最好的美女福利视频网| 精品一区二区三区av网在线观看| 日韩av在线大香蕉| 人人妻人人澡欧美一区二区 | 黄色视频,在线免费观看| 身体一侧抽搐| svipshipincom国产片| 成人av一区二区三区在线看| 亚洲第一电影网av| 搡老妇女老女人老熟妇| 亚洲 国产 在线| 国产精品一区二区免费欧美| 免费人成视频x8x8入口观看| 亚洲精品一区av在线观看| 亚洲 欧美一区二区三区|