• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security information factor based airborne radar RF stealth

    2015-12-23 10:08:51

    1.College of Electronic and Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Electronics,Electrical Engineering and Computer Science,Queen’s University Belfast,Belfast BT7 1NN,UK

    Security information factor based airborne radar RF stealth

    FeiWang1,2,*,MathiniSellathurai2,Weigang Liu2,and Jiangjiang Zhou1

    1.College of Electronic and Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Electronics,Electrical Engineering and Computer Science,Queen’s University Belfast,Belfast BT7 1NN,UK

    Radar radio frequency(RF)stealth is very important in electronic war(EW),and waveform design and selection.Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors,such as Schleher interception factor, which makes it dif fi cult to evaluate radar RF stealth technologies ifinterceptor parameters are unknown.In communication,security capacity has been presented to describe the possible ability to communicate in complete security.Since the essentialofthe security capacity is to have the interceptor getnone valued information from the emitter,this paper is proposed to study security information factors taking advantage of mutual information to evaluate radar RF stealth undersome conditions.Through analyzing mutual information obtained by the radar and the interceptor,this paper de fi nes the security information factor with and withoutcooperative jamming.Furthermore,this paper deduces the ratio of the match fi lter to the match incoherent fi lter and discuss mutualinformation received by the interceptor.Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.

    mutualinformation,radar signal,stealth.

    1.Introduction

    The stealth technology is used to avoid being detected by a variety of detection devices.As radar cross section(RCS) and acoustic stealth are against active radar and passive acoustic detection,radar radio frequency(RF)stealth is againstpassive radar detection[1,2].Radar RF stealth not only depends on transmitpower,butalso relies on realparameters of the passive radar detector which is probably driven by economics and operationalfactors.

    To survive the more and more serious challenge of advanced interceptors,many complicated low probability interception(LPI)signals are presented[3-5].However,the quick appearance of high performance interceptors has made many LPI signals unfashionable.For example,the channelized receiver could improve the sensitivity to about 20 dB by dividing the instantaneous frequency bandwidth of 2 GHz into a great number of narrow channels of 10 MHz.In any practicalscenario,the common wide band radarsignalhas no valuable advantage when itis facing the instantaneous channelized receiver even though the channelized receiver needs to put data from adjacent channels togetherif they are from a single radarsignal.On the other hand,the super heterodyne receiver is a high gain narrowband interceptor which is suitable for emitter identi fi cation,and often used to search for speci fi c radar type.With enormous parallel processors,the matched incoherentreceivercould yield abouta sensitivity of 10 d B on the channelized receiver,which would carry out matched fi ltering in a number of channels to combat a number of potential threats simultaneously[6].

    Evaluation ofradar RF stealth has drawn much attention for several decades[7].The basic standard is to compare the maximum detection range of the radar and the interceptor,which is the principle of the intercept factor.If the radar signal detection range is larger than that of the interceptor,we tend to think that the radar signal has good RF stealth performance.Wu and Dishman studied signal power stealth performance in the special battle scenario, which relied on the average radius of beam-forming technology[8,9].And Fancey proposed a complicated metrication through comparing peak values,bandwidth and shrewdness of a great many LPI signals,which depended on the prior experience knowledge of the RF stealth strategy[10].

    The information theory is the base stone of communication and radar.In communication,security capacity only considers the channel information without any relation with hardware and software technologies[11].Similarly,we propose a security information factor coming from mutualinformation to describe radar RF stealth without knowing the detail of the interceptor.Bell established the relationship between mutualinformation and radarsig-nals using the differential entropy theory[12],which has been generally applied to radar waveform design[13-15]. To develop Bell’s theory,under different conditions,such as in incoherent pulses,coherent pulses and cooperative jamming states,we presenta security information factor to evaluate radar RF stealth through comparing mutualinformation got by the radar and the interceptor,respectively. Meanwhile,we analyze mutualinformation loss of the interceptor with the match incoherent fi lter.

    The rest of the paper is organized as follows.Section 2 introduces mutualinformation and presents security information factors with and withoutcooperative jamming,and deduces the ratio of the match fi lter to the match incoherent fi lter.Section 3 illustrates our opinions with numerical simulations.

    2.Security information factor for radar RF stealth

    The system modelto be discussed is shown in Fig.1,where the targetand the interceptor are all within the radar main beam.The co-operatormain beam points to the interceptor and its leakage power is neglected.

    Fig.1 Classicalcooperative jamming scene for radar RF stealth

    We de fi ne the Fourier transform(FT)of radar transmission signal x(t)by X(f)and the target RCS byσf,the radarreceive signalby y(t)and the interceptorreceive signal by z(t).We next discuss mutual information between (i)radar transmission antennas and receiver antennas;(ii) radartransmission antennas and interceptorantennas,with and withoutco-operatorjamming.

    With Bell’s information theory,we have the following assumptions:

    Assumption 1The noise is additive Gaussian white noise.

    Assumption 2

    where xk(t)are random variables with zero mean and Gaussian distribution.Frequency components of xk(t)are con fi ned to Fk=[fk,fk+Δf],and FT of xk(t)is approximately constant.xk(t)and xj(t)are uncorrelated if k/=j.Itis the same for y(t)and z(t).x(t),y(t)and z(t) use the same sampling interval.

    Assumption 3Allantenna loss and path loss are negligible,and only the noise fl ooris considered.Radarreceiver and interceptor receiver noises are expressed as nr(t)and ni(t)respectively,and they have the same properties of Assumption 1.

    According to the mutual information equation,mutual information of xk(t)and zk(t)is

    where h denotes entropy.Since the variance of xk(t)and

    Because the conditional probability density function f[zk(t)|xk(t)]=f[nik(t)],we have

    Then,the mutualinformation in(1)can be formulated as

    Δf is the length of the frequency bin.Hence,of each sample is expressed as:

    where Tris the signal duration time.Similarly,the noise power would be

    where Tiis the process time ofthe interceptor.Substituting (6)and(7)into(4)yields

    For there are 2Δf Tistatistically independentsamples, then,

    If the antenna gain is taken into consideration,mutual information Iintbetween radartransmission antennas and interceptor antennas is over the frequency bandωi,thatis,

    Similarly,we have mutualinformation Irecbetween the radartransmission antenna and the receiverantenna as

    where Wrand Wiare effective bandwidths of the radar receiver and the interceptor respectively,pnnr(f)and Pnni(f)are radar receiver and interceptornoise power,Trand Tiare effective process time of the radar receiver and the interceptor,Gtis the radar transmission gain,Gris the radarreceiver gain,Gtiis the gain from the radartransmitter to the interceptor,Giis the interceptor antenna gain, Lr(Rri)is the attenuation from the radar to the interceptor and Lr(2Rr)is the attenuation from the radar emitter to the targetand then to the radar receiver.Equations(10) and(11)represent mutual information at the antenna port without any signal processing procedure.Meanwhile,as post-processing cannot increase mutual information with the data processing inequality principle,(10)and(11)are the maximum mutual information obtained by the interceptor and the radar receiver in fullidealconditions while Wr=Wi.

    From(10)and(11),it is easy to take some Trand Wrto make(11)larger than(10),which shows thatthe larger the time bandwidth product,the more the mutualinformation.Traditional fi ghter pulse Doppler radar usually transmits many short pulses whose widths are often from 1μs to 3μs,to get the information gain and measure the target speed.As the fi ghteris a greatthreat,the warning interceptoris always designed to pay attention to this type ofsignal so thatwe could assume that Tr≈Tiand Wr≈Wi.

    What’s more,in a modern battle fi eld,an electronic jammeris indispensable to keep the fi ghterin radar RF stealth. With Tr=Tiand Wr=Wi,if there is cooperative jamming,we could modify(10)and(11)as

    where Pnncis the cooperative jamming power,Gcrand Gciare the antenna gain from the co-operator to the radar receiver and the interceptor.Gicis the antenna gain from the interceptor to the co-operator.Lc(Rci)is the cooperative path loss to the interceptor and Lc(Rct+Rr)is the pass loss to targetplus targetto the radar receiver.

    Now,we have expressions from(10)to(13)to express the maximum mutual information of radar transmission antennas and receiver antennas,radar transmission antennas and interceptorantennas,with and withoutco-operator jamming.We de fi ne security information factor Isas

    whereρrandρirepresent the minimum mutual information needed by the radar receiver and the interceptor to trigger their following signal processing procedure.And ρrΔ=TrWrln(1+SNRr/Wr),ifρr=ρi,we could rewrite(14)as which is similar to the de fi nition of security capacity in communication.The difference is that(15)takes radartask ρrinto consideration because the radarmust fi nish the task in limited time.And Is≥1 means that radar RF is in a completely safe state while fi nishing the task.In communication,if the security capacity is greater than zero,then there is a maximum transmission rate for the current scenario.Meanwhile,an eavesdroppercannotgetthe information more than the source entropy.Similarly,under specifi ed airborne radar detection probability and false alarm probability,if Is≥1,then in the current scenario,with powercontrolorlarge bandwidth waveform design,the detection probability ofthe interceptorcould be less than 0.5. If the limit of the detection probability of the interceptor can be relaxed,(15)may also be relaxed.

    In a realscenario,the radar receivercould obtain mutual information presented in(10)and(13)through the match fi lter and the interceptor has less opportunity to have a match fi lterprocess.So we would discuss the mutualinformation loss resulted from the match incoherent fi lter pro-cess and then modify Iint.

    For the match incoherent fi lter,we assume that the frequency spectrum of zk(t)intercepted by the interceptor is

    where zk(t),xk(t)and nik(t)are de fi ned in(1),(2)and (3).The output of the match incoherent fi lter of the frequency bin fkwould be

    Then,the signalto noise ratio(SNR)of(17)is

    As the output SNR of the match fi lter of frequency bin fkis|X(fk)|2/|Ni(fk)|2,we could modify(10)and(12) from the match fi lter to the match incoherent fi lter,which become

    Usually,the radar receiver could accumulate target information through the incoherentintegration of echoes of multiple pulses,but the interceptor has little chance to accumulate radar RF information because itshould fi rstly tell if any two pulses are from the same radar.That is,if the radar transmits Npincoherent pulses,the radar receiver could improve targetinformation by accumulating Npmutualinformation and the interceptor never can.Then,with Npincoherentpulses shown in Fig.2(a),we could rewrite (15)as

    Fig.2 Accumulation gain of incoherent and coherent pulse train

    Fig.2(b)also shows the equivalent pulse of coherent pulse train[16],and A=|X(f)|so thatwe could rewrite (11),(13)and(21)as

    This paper just pays attention to discussing the security information factor on ideal antennas with match fi lters or incoherent match fi lters.And the information loss caused by signal processing arithmetic will be studied in the future.

    3.Numericalsimulations

    With(10)to(15),(19)to(24),we would discuss radar RF stealth with changing parameters,such as bandwidths, match fi lters,coherent integration and co-operative jamming power.

    (i)We de fi ne typicalradar parameters as follows:

    Antenna gain:Gt=Gr=Gti=30 dB;required detection SNR:SNRr=101.5,ρrΔ=TrWrln(1+ SNRr/Wr);pulse width:Tr=1μs;number of pulses: Np={64 1 024 2 048 4 096};bandwidth:Wr= {1 10 100 200}MHz;noise fl oor:Pnnr(f)= Wr·10?17.4 W.

    (ii)We de fi ne typicalinterceptor parameters as follows:

    Antenna gain:0-60 dB;instantfrequency bandwidth:

    WIF=2 GHz;noise fl oor:Pnni(f)=WIF·103· 10?17.4W;effective bandwidth:Wi≤200 MHz;process pulse width:Tr=Ti=1μs.

    (iii)Other parameters are de fi ned as follows:

    Target RCS:σf=1 m2,Gcr=0 dB,Gci=10 dB, Gic=-30 dB,Δf=1 MHz.Lcand Lrhave the same attenuation and the attenuation factor is 0.012 6 dB/km when the carrier frequency is 10 GHz.

    In simulation fi gures,the common terms‘suboptimal’and‘optimal’represent the interceptors taking the match incoherent fi lter and the match fi lter,respectively.Vertical coordinate of Fig.3 to Fig.6 is the value of Is.

    In Fig.3,with(10),(11),(15)and(19),we set Np=1 and the interceptor gain as 0 dB,which are common in some radar warning receiver.The target and the interceptorare atthe same place.Both the radarand the interceptor have the same effective bandwidth.Fig.3 shows thatradar RF could be stealth in alldistances if the radar only offers the minimum information required by the radar receiver. This is because the sensitivity of the interceptor is lower than that of the radar by 30 dB,and the receive antenna gain of the interceptor is also lower than that of the radar by 30 dB.

    Fig.3 Radar RF security information factor when Np=1 and interceptor gain is 0 dB

    In Fig.4,with(10),(11),(19),(21),(22)and(24),we set Np=64 and the interceptor gain as 60 dB,which are common in some electronic signalintelligence system. Both the radar and the interceptor have the same effective bandwidth.The target is at 80 km and the interceptor is gradually away from 80 km to 500 km.Fig.4 shows that a large bandwidth is not always bene fi cialif the interceptor has the same effective processor bandwidth.The left graphics of Fig.3 are from(21)and the rightfrom(24).

    Fig.4 Security information factor when Np=64 and interceptor gain is 60 dB

    In Fig.5,the target and interceptor parameters are the same as in Fig.4.Fig.5 shows that incoherent integration ofnarrow band pulses is an available method to realize radar RF stealth.

    Fig.5 Security information factor with different incoherent integration lengths of the interceptor

    In Fig.6,with(10),(11),(19),(21),(22)and(24),we setthe interceptorgain as 60 dBand its effective bandwidth as 20 MHz,which are common in some super heterodyne receiver.The targetand interceptor distances are the same as those in Fig.4(a).Fig.6 shows that radar RF stealth contributed by large bandwidths depends on the processor bandwidth of the interceptor.

    Fig.6 Security information factor with fixed interceptor bandwidth

    Fig.7 shows cooperative jamming power Pnncto full ideal interceptor with(20),(22)and(23)when the target is at80 km and the interceptor is gradually away from 100 km to 520 km.As Gcr=0 dB,Rci=Rri,and other parameters are the same as those in Fig.4(a),cooperative jamming is abouta constantfor differentsignal bandwidths.This fi gure also shows that the narrow bandwidth signalis better if the radar is facing the bestinterceptor.

    Fig.7 Cooperative jamming power for signalstealth

    From Fig.3 to Fig.7,we could get some important information:

    (i)Radar power control is the fi rst key for radar RF stealth.All fi gures from Fig.3 to Fig.7 have radar power controlled.

    (ii)Coherent integration of the pulse train has greater gain than thatof incoherentintegration,as Fig.5 shows.

    (iii)Using wideband radar to cope with the narrow interceptoris feasible,as Fig.6 shows.

    (iv)Using wideband radar to cope with the intelligent wideband interceptor should be prudent,as Fig.4 shows. An alternative way to cope with the wideband interceptor could be with cooperative jamming,as Fig.7 shows.

    (v)A feasible approach for RF stealth is to make thebandwidth of electronic support measurement as large as possible while let the bandwidth of radar signal bandwidth be as smallas possible.For example,radar may emit agile hopping narrowband coherentpulse signals while the hopping range of the carrier frequency should be as large as possible.

    (vi)Taking an interference waveform which is orthogonal to the radar signal.The narrower the bandwidth of the interference waveform,the less energy emitted by the jammer.The interference waveform also should be designed with the same carrier frequency and the same band as the radarsignal.

    4.Conclusions

    With the proposed security information factor,this paper shows thata large radarbandwidth sometimesmay be awkward if the intelligentinterceptorhas enough bandwidth to cope with radar RF signals.Strictly radar power control and mutualinformation integration of large sums ofpulses mightbe two ofthe bestways for radar RF stealth with low cost.And cooperative jamming is also a feasible method to cope with specialexpensive intelligentinterceptors.

    [1]Y.D.Shirman,V.M.Orlenko,S.V.Seleznev.Passive detection of the stealth signals.Proc.of the 1st European Radar Conference,2004:321-324.

    [2]N.C.Beaulieu,W.L.Hopkins,P.J.McLane.Interception of frequency-hopped spread-spectrum signals.IEEE Journal on Selected Areas in Communications,1990,8(5):853-870.

    [3]D.Li,J.Hong,B.Wang.Improving anti-detection/interception performance for wireless sensor network based on timereversaltechnology.Proc.ofthe 5th International Conference on Wireless Communications,Networking and Mobile Computing,2009:4554-4557.

    [4]Z.Li,X.G.Xia.A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception.IEEE Trans.on Wireless Communications,2009,8(7):3372-3379.

    [5]Z.Gao,X.Wang,N.Kataoka,et al.Stealth transmission of time-domain spectral phase encoded OCDMA signal over WDM network.IEEE Photonics Technology Letters,2010, 22(13):993-995.

    [6]A.G.Stove.Radarand ESM:the currentstate ofthe LPIbattle. Proc.of the 1st EMRS DTC Technical Conference Edinburgh Thales Airborne Systems,2004.

    [7]D.Lynch.Introduction to RF stealth.Raleigh,NC:Scitech Publishing Inc,2004.

    [8]P.H.Wu.On sensitivity analysisoflow probability ofintercept (LPI)capability.Proc.of the IEEE Military Communications Conference,2005:2889-2895.

    [9]J.F.Dishman,E.R.Beadle.SEVR:an LPD metric for a 3-D battle space.Proc.of the IEEE Military Communications Conference,2007:1-5.

    [10]C.Fancey,C.M.Alabaster.The metrication oflow probability of intercept waveforms.Proc.of the International Waveform Diversity and Design Conference,2010:58-62.

    [11]S.Vasudevan,D.Goeckel,D.F.Towsley.Security-capacity trade-off in large wireless networks using keyless secrecy. Proc.ofthe 11th ACM International Symposium on Mobile ad HOC Networking and Computing,2010:21-30.

    [12]M.R.Bell.Information theory and radar waveform design. IEEE Trans.on Information Theory,1993,39(5):1578-1597. [13]Y.Yang,R.S.Blum.MIMO radar waveform design based on mutual information and minimum mean-square error estimation.IEEE Trans.on Aerospace and Electronic Systems,2007, 43(1):330-343.

    [14]S.Sen,A.Nehorai.OFDM MIMO radar with mutualinformation waveform design for low-grazing angle tracking. IEEE Trans.on SignalProcessing,2010,58(6):3152-3162.

    [15]X.Song,P.Willett,S.Zhou,etal.The MIMO radar and jammer games.IEEE Trans.on Signal Processing,2012,99(1): 687-690.

    [16]M.A.Richards.Fundamentals of radar signal processing. Mumbai:Tata McGraw-Hill Education,2005.

    Biographies

    Fei Wang was born in 1976.He received his B.S. degree in power engineering from Hohai University,Nanjing,China,in 1998.He received his M.S. degree and Ph.D degree in signal processing from Jilin University,Changchun,China,in 2003 and 2006,respectively.His research interests include fundamental signal processing and airborne radar signalprocessing.

    E-mail:wangxiaoxian@nuaa.edu.cn

    MathiniSellathurai was born in 1973.She received her Licentiate degree from Royal Institute of Technology(KTH),Stockholm,Sweden in 1997 and Ph.D.degree from McMaster University,Hamilton, Canada in 2001.Herresearch interests include array and adaptive signal processing applied to radar and wireless communications.

    E-mail:M.Sellathurai@hw.ac.uk

    Weigang Liu was born in 1985.He received his B.S.degree in engineering from Wuhan University of Technology,Wuhan,China,in 2008,and M.S. degree in engineering from Chongqing University, Chongqing,China,in 2011.He is currently working toward his Ph.D degree in the Institute of Digital Communication(IDCOM),University of Edinburgh,Edinburgh,UK.His research interests include cooperative communication,convex optimization,stochastic geometry,and physicallayer security in wireless communications.

    E-mail:W.Liu@ed.ac.uk

    Jianjiang Zhou was born in 1962.He received his B.S.degree in radar engineering from Aeronautics College of Nanjing in 1985,and M.S.and Ph.D. degrees in communication and information system from Nanjing University of Aeronautics,Nanjing in 1988 and 2001.He is a professor in the Departmentof Electronic Engineering,Nanjing University of Aeronautics and Astronautics.His research interests include radar signal processing and radar automatic target recognition.

    E-mail:zjjee@nuaa.edu.cn

    10.1109/JSEE.2015.00031

    Manuscriptreceived October 27,2013.

    *Corresponding author.

    This work was supported by the National Natural Science Foundation of China(61371170)and the Priority Academic Program Development of Jiangsu Higher Education Institutions.

    国产三级黄色录像| 热99久久久久精品小说推荐| 男人舔女人的私密视频| 成年人午夜在线观看视频| 午夜激情久久久久久久| 最新的欧美精品一区二区| 看免费成人av毛片| 亚洲国产看品久久| 丝瓜视频免费看黄片| 老司机在亚洲福利影院| 亚洲国产中文字幕在线视频| 欧美日韩福利视频一区二区| 人成视频在线观看免费观看| 亚洲成av片中文字幕在线观看| 亚洲少妇的诱惑av| 秋霞在线观看毛片| av电影中文网址| 在线观看免费高清a一片| 精品一区二区三区av网在线观看 | 免费观看a级毛片全部| 欧美日韩成人在线一区二区| 国产男女超爽视频在线观看| 久久鲁丝午夜福利片| 精品一区二区三卡| 老司机靠b影院| 热re99久久精品国产66热6| 欧美性长视频在线观看| 一本大道久久a久久精品| 女人爽到高潮嗷嗷叫在线视频| 亚洲成人手机| netflix在线观看网站| 9色porny在线观看| 在线av久久热| 大码成人一级视频| 日本wwww免费看| 免费高清在线观看视频在线观看| 视频在线观看一区二区三区| 永久免费av网站大全| 国产成人精品久久二区二区91| 欧美xxⅹ黑人| 久久精品国产亚洲av高清一级| 久久女婷五月综合色啪小说| 婷婷色麻豆天堂久久| 日本a在线网址| 19禁男女啪啪无遮挡网站| 99re6热这里在线精品视频| 赤兔流量卡办理| 1024香蕉在线观看| 美女高潮到喷水免费观看| 日本黄色日本黄色录像| 精品视频人人做人人爽| 精品亚洲成国产av| 午夜免费成人在线视频| 飞空精品影院首页| 亚洲成人免费电影在线观看 | 人人妻人人澡人人爽人人夜夜| 国产在线视频一区二区| 亚洲久久久国产精品| 成年人免费黄色播放视频| 免费少妇av软件| 国产欧美日韩一区二区三区在线| 老司机亚洲免费影院| 精品少妇久久久久久888优播| 久久影院123| 丰满迷人的少妇在线观看| 欧美久久黑人一区二区| 黄片播放在线免费| 国产一区二区 视频在线| 中国国产av一级| 久久久精品94久久精品| 又粗又硬又长又爽又黄的视频| 首页视频小说图片口味搜索 | 久久国产精品影院| 一级毛片女人18水好多 | 亚洲国产精品国产精品| 韩国高清视频一区二区三区| 国产精品99久久99久久久不卡| 一边摸一边做爽爽视频免费| 每晚都被弄得嗷嗷叫到高潮| 女人高潮潮喷娇喘18禁视频| 日韩欧美一区视频在线观看| 欧美人与善性xxx| 天天添夜夜摸| av视频免费观看在线观看| 亚洲第一av免费看| 男女午夜视频在线观看| 十八禁高潮呻吟视频| 丝瓜视频免费看黄片| 男人舔女人的私密视频| 午夜精品国产一区二区电影| 少妇粗大呻吟视频| 热re99久久精品国产66热6| 老司机靠b影院| 亚洲国产av新网站| 日韩一卡2卡3卡4卡2021年| 极品人妻少妇av视频| 啦啦啦在线观看免费高清www| 男女国产视频网站| 丰满迷人的少妇在线观看| 精品国产乱码久久久久久小说| 国产成人精品久久久久久| 人妻一区二区av| 亚洲伊人色综图| 涩涩av久久男人的天堂| 在线观看人妻少妇| 搡老岳熟女国产| 一二三四社区在线视频社区8| 你懂的网址亚洲精品在线观看| 亚洲色图 男人天堂 中文字幕| 极品人妻少妇av视频| 国产一区亚洲一区在线观看| 女人精品久久久久毛片| e午夜精品久久久久久久| 99精品久久久久人妻精品| 成年人黄色毛片网站| 这个男人来自地球电影免费观看| 中文字幕人妻熟女乱码| 极品人妻少妇av视频| 成年女人毛片免费观看观看9 | 高清黄色对白视频在线免费看| 99国产精品一区二区蜜桃av | 中文字幕色久视频| 国产男女内射视频| 人人澡人人妻人| 脱女人内裤的视频| 一本大道久久a久久精品| 一级黄片播放器| 一二三四在线观看免费中文在| 亚洲第一av免费看| 欧美激情 高清一区二区三区| 夫妻性生交免费视频一级片| 一级片免费观看大全| 99热国产这里只有精品6| 精品亚洲成国产av| 亚洲国产看品久久| 99国产精品免费福利视频| 国产伦人伦偷精品视频| 麻豆av在线久日| 交换朋友夫妻互换小说| 亚洲欧美一区二区三区黑人| 国产有黄有色有爽视频| 90打野战视频偷拍视频| 老司机影院毛片| 黄色一级大片看看| 国产不卡av网站在线观看| 捣出白浆h1v1| 亚洲九九香蕉| 亚洲激情五月婷婷啪啪| 男人操女人黄网站| a级毛片在线看网站| 久久免费观看电影| 亚洲一区二区三区欧美精品| 亚洲色图 男人天堂 中文字幕| 日韩大码丰满熟妇| 少妇人妻久久综合中文| 成人黄色视频免费在线看| 国产精品成人在线| 后天国语完整版免费观看| 久9热在线精品视频| 成人国语在线视频| 各种免费的搞黄视频| 亚洲精品国产一区二区精华液| 日本猛色少妇xxxxx猛交久久| 激情五月婷婷亚洲| 国产片内射在线| 50天的宝宝边吃奶边哭怎么回事| av国产精品久久久久影院| 中文字幕高清在线视频| 亚洲国产最新在线播放| 夜夜骑夜夜射夜夜干| 国产精品久久久久久精品电影小说| 亚洲一区中文字幕在线| 久热爱精品视频在线9| 国产精品一二三区在线看| 悠悠久久av| 亚洲少妇的诱惑av| 巨乳人妻的诱惑在线观看| 精品一品国产午夜福利视频| 久久毛片免费看一区二区三区| 一本一本久久a久久精品综合妖精| 久久国产精品大桥未久av| av有码第一页| 色网站视频免费| av网站免费在线观看视频| 汤姆久久久久久久影院中文字幕| 亚洲av国产av综合av卡| 国产极品粉嫩免费观看在线| 免费在线观看日本一区| 国产精品久久久久久精品古装| avwww免费| 久久久久精品人妻al黑| av网站免费在线观看视频| 日韩中文字幕视频在线看片| 国产成人免费无遮挡视频| 一本大道久久a久久精品| 国产精品99久久99久久久不卡| 国产精品免费视频内射| 欧美成人精品欧美一级黄| 免费少妇av软件| 国产精品麻豆人妻色哟哟久久| 亚洲国产毛片av蜜桃av| 国产精品久久久人人做人人爽| 欧美激情极品国产一区二区三区| 香蕉丝袜av| 母亲3免费完整高清在线观看| 国产精品一国产av| 菩萨蛮人人尽说江南好唐韦庄| 免费不卡黄色视频| 精品第一国产精品| 亚洲自偷自拍图片 自拍| 精品国产超薄肉色丝袜足j| 亚洲专区中文字幕在线| 亚洲精品一二三| 中文字幕人妻丝袜一区二区| 成在线人永久免费视频| 国产精品偷伦视频观看了| 菩萨蛮人人尽说江南好唐韦庄| 在线av久久热| 欧美大码av| 99九九在线精品视频| a 毛片基地| av天堂在线播放| 国产伦理片在线播放av一区| 最近最新中文字幕大全免费视频 | 一本综合久久免费| 一二三四在线观看免费中文在| 亚洲五月色婷婷综合| 午夜视频精品福利| 午夜福利视频在线观看免费| av欧美777| 99国产精品免费福利视频| 大陆偷拍与自拍| 国产麻豆69| 黄色怎么调成土黄色| 日本欧美国产在线视频| 美女视频免费永久观看网站| 午夜影院在线不卡| 久久亚洲精品不卡| 亚洲精品美女久久久久99蜜臀 | 亚洲成国产人片在线观看| 国产精品免费大片| 一本大道久久a久久精品| 韩国精品一区二区三区| 黄色视频不卡| 日韩人妻精品一区2区三区| 青草久久国产| 99香蕉大伊视频| 成人国语在线视频| av一本久久久久| 看免费av毛片| 在线 av 中文字幕| 亚洲国产成人一精品久久久| 五月开心婷婷网| 国产麻豆69| 不卡av一区二区三区| 97在线人人人人妻| 视频区欧美日本亚洲| 99热网站在线观看| 精品高清国产在线一区| 天天躁夜夜躁狠狠躁躁| a级片在线免费高清观看视频| 欧美日韩亚洲综合一区二区三区_| 日本av免费视频播放| 久久影院123| 精品福利观看| 无遮挡黄片免费观看| 视频区欧美日本亚洲| 国产精品一国产av| 中文字幕最新亚洲高清| 曰老女人黄片| 丁香六月天网| 波野结衣二区三区在线| 婷婷色综合大香蕉| 人人澡人人妻人| 日韩一区二区三区影片| 两个人免费观看高清视频| 永久免费av网站大全| 各种免费的搞黄视频| 一区二区三区乱码不卡18| 纯流量卡能插随身wifi吗| 欧美黑人欧美精品刺激| 国产成人影院久久av| 欧美另类一区| 下体分泌物呈黄色| 巨乳人妻的诱惑在线观看| 一级毛片黄色毛片免费观看视频| 国产精品秋霞免费鲁丝片| 亚洲成人手机| 18禁观看日本| 日韩,欧美,国产一区二区三区| 丝袜人妻中文字幕| 欧美另类一区| 国产精品99久久99久久久不卡| 日韩电影二区| 交换朋友夫妻互换小说| 国产成人啪精品午夜网站| 日韩中文字幕欧美一区二区 | 欧美中文综合在线视频| 男人爽女人下面视频在线观看| 国产精品麻豆人妻色哟哟久久| 国产熟女欧美一区二区| 少妇人妻 视频| 91精品国产国语对白视频| 天天躁夜夜躁狠狠躁躁| 女人久久www免费人成看片| 成人黄色视频免费在线看| 我的亚洲天堂| 妹子高潮喷水视频| 国产精品二区激情视频| 国产精品偷伦视频观看了| 国精品久久久久久国模美| 久久人人爽人人片av| 免费看不卡的av| 亚洲人成电影观看| 久久影院123| 建设人人有责人人尽责人人享有的| 蜜桃在线观看..| 国产精品国产三级专区第一集| 欧美另类一区| 精品少妇一区二区三区视频日本电影| 国产又色又爽无遮挡免| 麻豆av在线久日| 亚洲欧洲精品一区二区精品久久久| 久久久久国产精品人妻一区二区| 国产av一区二区精品久久| 这个男人来自地球电影免费观看| 青春草亚洲视频在线观看| 天堂俺去俺来也www色官网| 高清视频免费观看一区二区| 麻豆国产av国片精品| 精品少妇内射三级| 男女午夜视频在线观看| 中文字幕另类日韩欧美亚洲嫩草| 大码成人一级视频| 国产黄色视频一区二区在线观看| 91麻豆精品激情在线观看国产 | 在线精品无人区一区二区三| 久久精品亚洲av国产电影网| 50天的宝宝边吃奶边哭怎么回事| 久久久久久人人人人人| 国产亚洲欧美在线一区二区| 免费不卡黄色视频| www日本在线高清视频| 午夜福利一区二区在线看| 嫁个100分男人电影在线观看 | 精品少妇黑人巨大在线播放| 99精品久久久久人妻精品| 丝袜美足系列| 国产免费又黄又爽又色| 亚洲一区二区三区欧美精品| 久久国产精品人妻蜜桃| 黄色 视频免费看| 大香蕉久久网| 国产成人免费观看mmmm| 在现免费观看毛片| 80岁老熟妇乱子伦牲交| 亚洲人成电影观看| 欧美久久黑人一区二区| 老司机靠b影院| 亚洲成色77777| 少妇的丰满在线观看| 亚洲国产精品成人久久小说| 久久毛片免费看一区二区三区| 香蕉国产在线看| 久久青草综合色| 国产在线一区二区三区精| 性色av乱码一区二区三区2| √禁漫天堂资源中文www| www.自偷自拍.com| 午夜福利视频精品| 在线亚洲精品国产二区图片欧美| 天天添夜夜摸| 婷婷色综合大香蕉| 欧美国产精品一级二级三级| 丰满少妇做爰视频| 亚洲精品在线美女| 亚洲国产看品久久| 久久国产精品大桥未久av| 久久九九热精品免费| 免费久久久久久久精品成人欧美视频| 国产成人免费无遮挡视频| 日韩一区二区三区影片| 日韩精品免费视频一区二区三区| 亚洲人成77777在线视频| 如日韩欧美国产精品一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 一级黄片播放器| kizo精华| 日本av免费视频播放| 国产成人免费观看mmmm| 日本av手机在线免费观看| 欧美性长视频在线观看| 久久久久久久大尺度免费视频| 女人久久www免费人成看片| 国产麻豆69| 天天躁日日躁夜夜躁夜夜| 亚洲成人免费av在线播放| 中文字幕人妻丝袜制服| 可以免费在线观看a视频的电影网站| 又黄又粗又硬又大视频| 精品一区二区三卡| 日韩人妻精品一区2区三区| 国产高清国产精品国产三级| 日韩中文字幕欧美一区二区 | 欧美少妇被猛烈插入视频| 亚洲欧美日韩另类电影网站| 亚洲男人天堂网一区| 精品熟女少妇八av免费久了| 丝袜美足系列| 亚洲精品一区蜜桃| 天堂中文最新版在线下载| 成人三级做爰电影| 一二三四在线观看免费中文在| 亚洲成av片中文字幕在线观看| 亚洲人成电影免费在线| 国产免费一区二区三区四区乱码| 老司机影院成人| 精品一品国产午夜福利视频| 91国产中文字幕| 精品卡一卡二卡四卡免费| 国产免费又黄又爽又色| 十八禁人妻一区二区| 真人做人爱边吃奶动态| 国产精品麻豆人妻色哟哟久久| 日韩一本色道免费dvd| 校园人妻丝袜中文字幕| av线在线观看网站| 大话2 男鬼变身卡| 国产人伦9x9x在线观看| 亚洲国产欧美日韩在线播放| 天天添夜夜摸| 美女扒开内裤让男人捅视频| 韩国高清视频一区二区三区| 女性生殖器流出的白浆| 各种免费的搞黄视频| 中文字幕亚洲精品专区| 欧美日韩亚洲综合一区二区三区_| 伦理电影免费视频| 飞空精品影院首页| 精品国产乱码久久久久久男人| 午夜久久久在线观看| 亚洲av综合色区一区| 日韩熟女老妇一区二区性免费视频| 18禁裸乳无遮挡动漫免费视频| 日韩 亚洲 欧美在线| 国产欧美日韩精品亚洲av| av片东京热男人的天堂| 亚洲国产精品成人久久小说| 人妻一区二区av| 日韩一卡2卡3卡4卡2021年| a 毛片基地| 亚洲精品美女久久av网站| 在线av久久热| 麻豆乱淫一区二区| 午夜福利免费观看在线| 亚洲综合色网址| 免费看av在线观看网站| 亚洲九九香蕉| av国产精品久久久久影院| 国产又色又爽无遮挡免| 国产麻豆69| 九色亚洲精品在线播放| 美女视频免费永久观看网站| 国产一区二区激情短视频 | 各种免费的搞黄视频| 国产亚洲一区二区精品| 最近中文字幕2019免费版| 欧美精品av麻豆av| 亚洲av成人不卡在线观看播放网 | 亚洲精品自拍成人| 99国产精品99久久久久| 国产又色又爽无遮挡免| 精品一区二区三区四区五区乱码 | 成人午夜精彩视频在线观看| 18禁黄网站禁片午夜丰满| 精品福利观看| 女性生殖器流出的白浆| 久久久久精品国产欧美久久久 | 在线亚洲精品国产二区图片欧美| 91国产中文字幕| 国产日韩欧美视频二区| 久久精品国产亚洲av涩爱| 成人国语在线视频| 亚洲熟女毛片儿| 成在线人永久免费视频| 一级毛片电影观看| 亚洲人成网站在线观看播放| 欧美日韩视频精品一区| 中文字幕精品免费在线观看视频| kizo精华| 国产成人免费观看mmmm| 欧美成人午夜精品| 天天添夜夜摸| 制服人妻中文乱码| 亚洲少妇的诱惑av| 这个男人来自地球电影免费观看| 丝袜美足系列| 免费看不卡的av| 亚洲国产av新网站| 水蜜桃什么品种好| 久久久国产精品麻豆| 日本猛色少妇xxxxx猛交久久| 午夜视频精品福利| 高清黄色对白视频在线免费看| 黄片播放在线免费| 亚洲国产毛片av蜜桃av| 大香蕉久久成人网| 亚洲精品国产av成人精品| 另类亚洲欧美激情| 免费在线观看黄色视频的| 超碰成人久久| 午夜福利,免费看| 亚洲国产av影院在线观看| 欧美日韩av久久| 久久鲁丝午夜福利片| 成年女人毛片免费观看观看9 | 性少妇av在线| 狂野欧美激情性bbbbbb| 五月开心婷婷网| 黑人欧美特级aaaaaa片| 日本欧美视频一区| 性少妇av在线| 国产欧美日韩一区二区三区在线| 国产一区二区三区av在线| 国产亚洲一区二区精品| 欧美日韩成人在线一区二区| 国产黄色视频一区二区在线观看| 日韩av不卡免费在线播放| 午夜日韩欧美国产| 青春草视频在线免费观看| 免费观看a级毛片全部| 欧美精品啪啪一区二区三区 | av电影中文网址| 欧美黄色片欧美黄色片| 久久久久久亚洲精品国产蜜桃av| 国产精品免费视频内射| 波野结衣二区三区在线| 久久综合国产亚洲精品| 涩涩av久久男人的天堂| 国产精品一国产av| www日本在线高清视频| www.av在线官网国产| 一边亲一边摸免费视频| 黑人巨大精品欧美一区二区蜜桃| 国产精品 国内视频| 黄色毛片三级朝国网站| 日韩欧美一区视频在线观看| 久久久精品国产亚洲av高清涩受| 欧美日韩精品网址| 性高湖久久久久久久久免费观看| √禁漫天堂资源中文www| 成人国产一区最新在线观看 | 一本综合久久免费| 国产伦理片在线播放av一区| 免费av中文字幕在线| 亚洲欧美色中文字幕在线| 精品一区二区三区四区五区乱码 | 久久毛片免费看一区二区三区| 可以免费在线观看a视频的电影网站| 99久久人妻综合| 欧美日韩一级在线毛片| 激情视频va一区二区三区| 亚洲黑人精品在线| 免费在线观看视频国产中文字幕亚洲 | 久久久久国产精品人妻一区二区| 天堂中文最新版在线下载| 高清欧美精品videossex| 久久国产精品大桥未久av| 丝袜美足系列| 欧美激情极品国产一区二区三区| 国产精品一区二区免费欧美 | 日韩电影二区| 少妇的丰满在线观看| 老熟女久久久| 99热国产这里只有精品6| 国产成人欧美| 国产精品偷伦视频观看了| 国产黄色视频一区二区在线观看| 最近最新中文字幕大全免费视频 | 国产免费现黄频在线看| av国产精品久久久久影院| 欧美人与善性xxx| 精品一区二区三区av网在线观看 | 一区二区av电影网| 亚洲 国产 在线| 亚洲欧洲国产日韩| 国产爽快片一区二区三区| 操出白浆在线播放| 好男人电影高清在线观看| 99精品久久久久人妻精品| 999精品在线视频| 欧美成狂野欧美在线观看| 国产亚洲一区二区精品| 日韩av不卡免费在线播放| 曰老女人黄片| 天天操日日干夜夜撸| 亚洲午夜精品一区,二区,三区| 99国产精品一区二区蜜桃av | 中文字幕精品免费在线观看视频| 99精国产麻豆久久婷婷| 欧美日韩国产mv在线观看视频| 国产精品一区二区在线观看99| 啦啦啦在线免费观看视频4| 看免费成人av毛片| 午夜福利视频精品| 成在线人永久免费视频| 欧美性长视频在线观看| 99国产精品一区二区蜜桃av | 午夜视频精品福利| bbb黄色大片| 十八禁高潮呻吟视频| 国产成人欧美在线观看 | 国产精品二区激情视频| av国产精品久久久久影院| 国产成人精品在线电影|