• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Physical Layer Security with Its Applications in 5G Networks: A Review

    2017-04-10 02:39:39LiSunQingheDu
    China Communications 2017年12期

    Li Sun*, Qinghe Du

    1 Department of Information and Communications Engineering, Xi’an Jiaotong University, Xi’an 710049, China

    2 The State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China

    3 National Simulation Education Center for Communications and Information Systems, Xi’an 710049, China

    I. INTRODUCTION

    With the continuous growth of the demands for ubiquitous information exchange, the increasing popularity of smart devices, the rapid development of mobile Internet, and the deep integration of information technology into industrial applications, 5G network is expected to support massive user connections and exponentially increasing wireless services, which makes the information security issue unprecedentedly important.

    Current network transmission security technologies rely heavily on the cryptographic approaches at the upper layer of the protocol stack, which is not suitable for future 5G networks. The main reasons are threefold. First,5G is a large-scale heterogeneous network(HetNet) with multiple levels and weakly-structured architectures, which makes it extremely difficult to distribute and manage the secret keys. Second, 5G network is expected to support differentiated scenarios and diverse wireless services. Different types of services have totally different security requirements. For example, online payment calls for a much higher security level than the ordinary web browsing service does. However, encryption-based methods can only provide “binary”security levels. That is, information is fully protected if the secret key can be securely exchanged and fully intercepted otherwise. Thus,service-oriented and user-centric security guarantee cannot be achieved. Third, 5G needs to support Internet-of-Things (IoT) applications featured by machine-type communications (MTC), where the massive MTC devices are short of power, storage, and computing capabilities, and complicated encryption/decryption algorithms or protocols cannot be applied.

    This article presents a comprehensive review of the state-of-theart PLS techniques,and discusses their applications in 5G networks.

    Unlike the conventional upper-layer security methods, physical layer security (PLS)takes advantages of the intrinsic characteristics of wireless channels, such as noise, interference, and fading, to degrade the received signal qualities at the malicious users, and realize keyless secure transmission via signal design and signal processing approaches. Compared with the cryptographic methods, PLS has the following technical advantages. First, PLS does not depend on encryption/decryption operations, thus avoiding the difficulty of distribution and management of secret keys in Het-Nets. Second, by using PLS approaches, adaptive signal design and resource allocation can be implemented based on the varying channel conditions, thereby providing flexible security levels. Third, PLS often requires relatively simple signal processing operations, which translates into minor additional overheads. The comparisons between PLS and cryptographic techniques are illustrated in figure 1.

    In addition to the aforementioned technical advantages, PLS techniques match the features of 5G networks well. The employment of massive MIMO in 5G greatly enriches the spatial resolution of wireless channels, and offers additional spatial resources to combat eavesdropping. The adoption of high-frequency communications in 5G brings in abundant spectra and provides favorable conditions for wideband secure transmissions. Moreover,the application of multi-cell cooperation techniques makes it possible to implement the cooperative secrecy ideas. Therefore, PLS is a promising security provisioning solution for 5G networks.

    Fig. 1 The comparison between PLS and cryptographic techniques

    This article presents a comprehensive review of PLS and its applications in 5G networks. Sect. II briefly describes the principle of PLS by referring the main results in information-theoretical security. Sect. III summarizes the recent advances in PLS research. In Sect. IV, we point out the major drawbacks in current PLS studies, and identify the challenges for PLS protocol design toward 5G networks. Sect. V highlights some promising PLS solutions that might be suitable for 5G networks. Finally, Sect. VI concludes this article and figures out several further research directions.

    II. PRINCIPLES OF PHYSICAL LAYER SECURITY

    The key idea of PLS is to exploit the intrinsic characteristics of wireless channels, such as noise, fading, and interference, to secure the communications. The research in this area can be traced back to Shannon’s pioneering work on secret communications [1], where the concept of perfect secrecy was established. In [1],Shannon considered a system model where the source-destination pair communicates over a noiseless channel, and an eavesdropper overhears the signals sent over the channel. This system is said to be in perfect secrecy if the following condition is satisfied:

    where H(M) and H(M|X) are the entropy of the message M and the conditional entropy of M conditioned on eavesdropper’s observation X,respectively. Intuitively, (1) implies that eavesdropper’s uncertainty about the message does not decrease after intercepting the transmitted codeword, or equivalently, the information leakage is zero. Perfect secrecy guarantees that eavesdropper’s optimal attack is to guess the message M at random and there is no algorithm that can extract any information about M from X. To achieve perfect secrecy, the codeword X should be independent of the messages M. In practice, this can be satisfied by using a one-time pad approach, for which each secret-key bit is XORed with each message bit to produce the transmitted codeword X.

    Although the one-time pad scheme can achieve perfect secrecy, the requirement is disappointing that one secret-key bit is needed for one message bit. This result stems from the absence of noise at the physical layer in the model. Unlike Shannon’s work, Wyner proposed a degraded wiretap channel model(DWTC) in [2]. The DWTC models a system in which a sender (Alice) tries to communicate with a legitimate receiver (Bob) over a noisy channel, while an eavesdropper (Eve) observes a degraded version of the signal obtained by the legitimate receiver. Alice encodes its confidential message M into an n-length codeword Xnwith rate R, while Bob and Eve try to extract the source information by decoding their received codewords Ynand Zn, respectively.Rate R, defined as the secrecy rate, is said to be achievable if

    and

    hold. In (2) and (3), M? denotes the estimate of M at Bob, and I(M;Zn) represents the mutual information between M and Zn. These two conditions, termed as reliability condition and security condition respectively, guarantee that the decoding error probability at the legitimate receiver can be arbitrarily small while no source information can be obtained by the eavesdropper, as long as the codeword length tends to infinity. The maximum of the achievable secrecy rate is defined as secrecy capacity, which characterizes the rate limit for secure transmission in noisy channels. For DWTC,the secrecy capacity can be expressed as

    where pXis the probabilistic distribution of the encoder input at Alice. (4) indicates that, the secrecy capacity is at least as large as the difference between the legitimate channel capacity and the eavesdropper’s channel capacity.The inequality in (4) can be strict for Gaussian wiretap channel, yielding the secrecy capacity formula for Gaussian wiretap channel to be

    The secrecy capacity expression for Gaussian wiretap channel implies that, secure communication is possible if and only if the legitimate receiver has a better channel quality than the eavesdropper does. Physical layer security techniques harness the intrinsic randomness at the physical layer to create the “physical advantage”, i.e., the required better quality, of the legitimate link compared to the eavesdropping link. The intrinsic randomness, mainly includes noise, multipath fading, and interference, is a resource that abounds in the wireless medium. In the next section, we will review the major physical-layer security approaches proposed in literature to show how to exploit these types of “randomness” for enhanced security.

    III. REVIEW OF MAJOR PHYSICALLAYER SECURITY APPROACHES

    3.1 Artificial noise injection

    Based on secrecy capacity theory, a positive secrecy rate can be achieved if the legitimate user has a certain form of physical advantage in terms of the channel quality compared to the malicious users. Artificial noise (AN)injection is an effective means to realize this purpose. The principle of this approach is to simultaneously send the information-bearing signal and the AN using a multi-antenna transmitter. The AN and the information-bearing signal are injected into the null-space and the column space of the legitimate user’s channel matrix, respectively. In this manner, the artificial noise only deteriorates the eavesdropper but has little detrimental impact on the legitimate receiver.

    Ref. [3] is the seminal work in AN injection scheme design. Afterwards, this method has been applied to various scenarios, taking into account the practical limitations of real-world systems. [4] discussed the optimal power allocation between the artificial noise and the useful signal, where both colluding and non-colluding cases were considered. [5]compared performances of the AN injection method and the artificial fast fading method under different antenna configurations at the eavesdropper, and proposed an improved hybrid scheme. [6] combined the AN injection approach with opportunistic relay selection,and analyzed the security-reliability tradeoff of the system. Common to the works [4]-[6]is that they all assumed perfect channel state information (CSI) is available at the transmitter, which is hard to satisfy in practice. To address this issue, [7] investigated the AN-aided beamforming design with limited feedback,where the coding rate and the power ratio of AN can be adjusted according to the channel feedback. [8] studied the AN-aided secure transmission in multiuser systems, and pointed out that from the secrecy perspective, it is more advantageous to increase the AN power than to increase the information-bearing signal power when the CSI error is large.

    3.2 Anti-eavesdropping signal design

    Unlike the AN injection approach, the anti-eavesdropping signal design technique attempts to align multiple users’ signals at the eavesdropper such that the decoding difficulty is significantly increased and information security can thus be guaranteed [9]. In [10],the authors borrowed the idea of interference alignment (IA) to develop a signal alignment method for Gaussian MAC wiretap channel.By using the proposed approach, the transmitted signals from multiple users align in a low-dimensional subspace of the signal space.Since all the signals align in the same direction, it is difficult for the eavesdropper to distinguish each user’s signal. [11] proposed an ergodic secrecy alignment strategy (ESA) for fading MAC wiretap channel. The key idea of ESA is to repeat data transmission within two slots such that an orthogonal MAC channel is created for legitimate users, while a scalar MAC channel is observed by the eavesdropper.

    While the aforementioned works [10] and[11] focused on anti-eavesdropping signal design for MAC channels, there are also some papers dedicating to the secrecy-enhancing signal design in cooperative relay channels.[12] designed the precoder matrix for twoway relay channel, by using which the two sources’ signals align in the same subspace at the untrusted relay. In [13], we devised a constellation rotation aided secure transmission scheme for two-way untrusted relay systems.By rotating the signal constellations with an appropriate angle, every complex constellation point can be represented by it real component.Then, each terminal user transmits the information-bearing signal and the artificial noise in two orthogonal dimensions of the signal space. As a result, the artificial noise and the useful signal from different users align to the same direction at the untrusted relay, which significantly degrades the SINR at the relay and prevents information leakage. Meanwhile,the received signal and AN lie in orthogonal dimensions at the terminal users, and hence the signal detection at the legitimate users will not be affected.

    3.3 Secure beamforming/precoding

    Secure bemforming/precoding belongs to spatial-domain anti-eavesdropping techniques.This approach optimizes the spatial distribution properties of the transmit signals in order to enlarge the difference between the legitimate user’s channel quality and the eavesdropper’s channel quality. [14] presented the beamforming vector design that can maximize the secrecy rate of MISOME channel. In [15],a linear precoding strategy was proposed for MIMOME channel, and a numerical method was developed as well to solve for the optimal precoder. [16] proposed a channel-inversion precoding method that can maximize the sum secrecy rate under imperfect CSI. In [17], the joint information beamforming and jamming beamforming was devised to guarantee both transmit security and receive security for a full-duplex base station.

    All of the works [14]-[17] only exploit the spatial beamforming or precoding to combat eavesdropping. By combining secure beamforming and AN injection, the system secrecy performance can be further enhanced. [18]proposed a transmit beamforming solution that is robust to the channel estimation errors. The proposed method first allocates power to the useful signal component to satisfy the target SINR of the desired user, and then uses the remaining power to send the artificial noise to worsen the detection performance of the eavesdropper. [19] discussed the impact of channel quantization on the secure beamforming design. The authors pointed out that the quantization for the beamforming vector and that for the AN vector should be performed separately to lower the interference to the legitimate receiver. To be more specific, the beamforming vector should be chosen such that the beamforming gain can be maximized;while the objective of the AN vector design is to minimize the information leakage. [20]studied the secure transmission capability for multiuser systems with curious users, where limited feedback is assumed. The major conclusions of [20] are twofold. First, in high SNR regime, if the CSI is quantized to a fixed number of bits, the system secrecy rate will not increase with the transmit power, and may even decrease when the transmit power exceeds a certain threshold. Second, in order to guarantee that the loss in secrecy rate is below a certain given value compared to the perfect CSI case, the number of CSI quantization bits should be an increasing function of the transmit power and the number of transmit antennas. While the aforementioned papers[14]-[20] are merely concerned about the se-curity aspect of the system, [21] considered simultaneous transfer of secret message and energy using zero-forcing based precoding techniques, and demonstrated the trade-off between the achievable secrecy rate and the transferred energy.

    3.4 Cooperation based secure transmission techniques

    Wireless network is essentially a multi-user system, for which the network security performance can be greatly enhanced by enlisting the cooperation among nodes. Cooperation based secure transmission techniques can be generally divided into three categories, namely cooperative jamming, relay selection, and cooperative secrecy enhancement.

    Cooperative jamming (CJ) utilizes multiple relay nodes to generate artificial noises in a distributed manner to realize information security, which is essentially a distributed beamforming technique. [22] designed CJ schemes for both amplify-and-forward (AF) and decode-and-forward (DF) systems. In the proposed schemes, all relay nodes independently send the weighted artificial noises to degrade the received signal quality at the eavesdropper,while the source transmits its message simultaneously. [23] investigated a nulling based CJ strategy, and devised the optimal structure of the artificial noise signal under global CSI.

    Relay selection (RS) techniques enhance transmission secrecy via the selection of relay nodes and (or) friendly jammers. [24] proposed to select two relay nodes to perform message forwarding and artificial-noise injection, respectively, and adaptively switch the cooperation modes to minimize the secrecy outage probability. [25] developed a joint relay-jammer selection policy to maximize the achievable secrecy rate, and presented a low-complexity power allocation strategy.Common to [24] and [25] is that both of them assume the relay nodes are trustworthy, and the eavesdroppers are external nodes in addition to the legitimate entities. However, in some scenarios, the relay nodes, while operating with the designated protocol and offering help to the source-destination pair, are untrusted, from which the source information has to be kept secret. The PLS protocol design for untrusted relaying systems is a hot research topic recently. Yener et al. indicated that a positive secrecy rate can be achieved if cooperative jamming technique is applied [26].[27] proposed a cooperation-mode switching scheme and analyzed the achievable secrecy outage probability. [28] combined the relay assignment and link adaptation, resulting in both secure and spectrally-efficient transmissions.[29] developed an opportunistic relay selection protocol for untrusted relaying systems, and analyzed the scaling law of the secrecy rate.The main drawback of the scheme in [29] is that only the broadcast phase of the two-phase cooperative transmission can be secured. To address this issue, [30] further developed a cooperative mechanism based on alternate jamming and relay selection.

    In both CJ and RS, the relay node acts only as a helper, which offers secrecy-embedded relaying services to legitimate transceivers. In contrast, in the cooperative secrecy enhancement (CSE) schemes, several users cooperate with each other to harvest a mutual benefit.In [31], the authors proved that two users that do not trust with each other can enlarge the achievable secrecy rate region by negotiating the signal power and AN power. [32] was concerned about a device-to-device (D2D) communications scenario, for which the authors proposed to utilize the signal generated by the D2D device as interference to degrade the reception performance of the eavesdropper overhearing the cellular user’s transmission. As a reward, D2D users can obtain the opportunity to reuse the cellular spectrum, thereby improving its transmission performance. Recently,[33] devised a cooperative privacy preserving scheme for the downlink transmission in multiuser relay systems. The key idea of this scheme is to exploit the cooperation among untrusted users to improve their secrecy rates simultaneously.

    3.5 Power control and resource allocation

    Security-oriented power control and resource allocation techniques adjust the transmitter parameters based on the instantaneous CSI such that the received SNR at the legitimate user can be improved or kept as a constant,while that at the eavesdropper varies randomly over time. In this manner, the difference in channel qualities between the legitimate link and eavesdropping link can be enlarged. [34]proved that power control based on water filling can achieve the secrecy capacity in wiretap channels. [35] applied the on-off policy to realize power control, which maximizes the system throughput subject the secrecy outage constraint. In [36], the secure transmission issue for OFDMA downlink was investigated,for which it was revealed that, to guarantee the user’s data confidentiality, the allocated power does not only depend the channel gain of the served user, but also relies on the maximum of the channel gains among all other users. In practical systems, perfect CSI of the legitimate channel is not available at the transmitter side due to feedback delay or channel estimation error. To address this issue, [37] exploited useful knowledge contained in outdated CSI to decide whether to transmit or not. [38] further developed a versatile strategy to increase the secrecy throughput of on-off secure transmission in the case that only stale CSI is available.

    IV. DRAWBACKS OF THE EXISTING PLS TECHNIQUES AND CHALLENGES FOR 5G TRANSMISSION SECURITY

    From the above discussions we can find that,the research on PLS has generated a large body of literature, with the topics ranging from information-theoretical studies to practical scheme design. However, it is still challenging to develop innovative PLS transmission theory and methods that well match the unique features of 5G networks. The majority of the existing PLS solutions have the following drawbacks that prohibit their applications to 5G networks.

    First, most of the existing PLS schemes realize security via the exploitation of noise,fading, and interference. In other words, theyonly take advantages of the characteristics of wireless channels (i.e., link-level properties) but under-appreciate the significance of characteristics of wireless networks (i.e.,network-level properties) in security enhancement. 5G is a multi-level multi-user system,for which the network behavior does not only depend on the properties of the individual links, but also highly relates to the interaction among users and sub-networks. To be more specific, feedback, cooperation, competition,and cognition exist widely in the future 5G networks [39]. Yet, it is still unclear how to translate these mechanisms into an anti-eavesdropping resource, and the research on the impact of these network-level features upon PLS protocol design has just started [40].

    Table I Summary of the major physical layer security approaches in literature

    Second, the PLS techniques developed so far mainly focus on the optimization of the secrecy rate or secrecy outage performance of the system. However, 5G is expected to support various application scenarios and diverse wireless services. Different types of services have totally different quality-of-service (QoS)requirements, which implies that the PLS protocols should jointly consider various aspects of user demands, including reliability, delay,throughput, and secrecy as well. It is impossible to provide a comprehensive QoS guarantee for users by simply optimizing the secrecy rate or secrecy outage performance.

    Third, the existing PLS solutions often unilaterally pursue the system performance optimization without taking into account the limitations in the available resources of practical devices. In particular, additional power is consumed to implement the AN injection method;multi-antenna configuration is required at the transmitter for secure beamforming/precoding schemes; dedicated nodes have to be deployed in the networks to send jamming signals for CJ approach. 5G network will support IoT applications featured by MTC communications,for which the devices have very simple functionalities and very limited power, storage,and processing capabilities. Therefore, most of the existing PLS solutions cannot be directly applied in IoT communications.

    In summary, the unique features of 5G networks, 5G services, and 5G devices pose significant challenges to PLS protocol design.In the next section, we highlight several newly developed PLS solutions that address the 5G transmission security issue.

    V. PROMISING PHYSICAL-LAYER SECURITY SOLUTIONS TOWARD 5G NETWORKS

    ITU has identified three typical application scenarios for 5G, namely Enhanced Mobile Broadband, Ultra-Reliable and Low-Latency Communications, and Massive Machine Type Communications. In the following, we would like to introduce three PLS solutions that are dedicated to these scenarios, respectively.

    5.1 Constellation-rotation based signal design for enhanced secrecy in D2D communications

    As a promising paradigm to support the proximity-aware services such as media sharing,online gaming, and social networking, D2D communications has been recognized as a candidate solution for enhanced mobile broadband applications. There are two major transmission modes for D2D communications: 1) Underlay mode where the transmit power of D2D terminals are constrained to cause minimal interference to cellular links; 2) Overlay mode where D2D terminals act as relays to assist the cellular communications in exchange for transmission opportunities. The overlay mode, also known as the cooperative D2D transmission mode, seems to be more appealing because it’s a win-win policy that motivates the operators to be willing to accept the deployment of D2D. A typical cooperative D2D system model is shown in figure 2. For this system, each cooperative period is composed of two phases.During the 1stphase, D2, BS, and CU transmit their signals to D1, respectively. During the 2ndphase, D1transmits the received signals together with its own information-bearing signal to all the other terminals.

    There are two technical challenges for the cooperative D2D communications. First, every terminal has to detect its desired signal while being interfered with by the signals intended for other nodes, which incurs an evitable error floor and deteriorates the detection performance. Second, every node can access the data transmitted from any other node, which yields information leakage among users and violates users’ secrecy requirements.

    To killing these two birds with one stone,we developed a constellation-rotation aided scheme to realize both interference avoidance and secrecy protection [41]. Our key idea is to rotate the signal constellations. As is exhibited in figure 3, the constellations employed at all terminals are first rotated by an appropriate angle such that a one-to-one mapping is established between the rotated constellation point and its real or imaginary part. Then, every transmitter projects the rotated constellation onto the real or imaginary axis, and transmits the resulting one-dimensional signal. During the 1stphase, BS and CU deliver their information using the real component, while D2sends its information with the imaginary component.Similarly, during the 2ndphase, D1uses the real and imaginary part of the complex signal as two orthogonal channels to broadcast its received signal and its own information-bearing signal, respectively. With the proposed design,the signal detection for intended messages at all terminals are free of interference, thus perfectly eliminating the error floor in symbol error rate. Meanwhile, the non-intended messages are aligned in the same direction at each node, thereby increasing the difficulty of decoding these messages and preventing information leakage. Moreover, by optimizing the value of the constellation rotation angle, an error floor can be created for the detection of the non-intended messages, and the transmission secrecy is further improved. Readers that are interested in this method can find more details in [41].

    Fig. 2 Cooperative D2D system model

    Fig. 3 The illustration of constellation rotation

    5.2 Fine-grained security level characterization and statistical security guarantee for delaysensitive services

    In ultra-reliable and low-latency communication scenarios such as vehicular networking and industrial automation systems, services are typically delay sensitive, which makes the traditional PLS methodology (targeted at secrecy capacity maximization or secrecy outage minimization) inefficient. First, the secrecy outage probability (SOP) dictates the probability with which the achievable secrecy rate is lower than the target transmission rate. To satisfy a predefined SOP requirement, the transmission rate of the legitimate user has to be kept at a very low level, resulting in an intolerable delay. Second, secrecy capacity (SC) gives the maximum rate below which the legitimate receiver can successfully decode, while the eavesdropper cannot obtain any information from the received signal. From the practical perspective, however, it is not always necessary to guarantee this “perfect” security. If Eve does not accumulate the sufficient amount of data within the delay bound, it cannot extract useful information, and essential security threat is not really caused. This motivates us to establish a statistical model towards finegrained security level characterization, and design adaptive resource allocation schemes to realize statistical security guarantee for delay-sensitive services [42].

    Fig. 4 Model for fine-grained security level

    Our proposed model is depicted in figure 4, where Alice attempts to send data to Bob,and Eve tries to capture Alice’s information from its observation. The accumulation and expiration of the eavesdropped data at Eve,which reflects the delay-sensitive characteristics of the transmissions, can be described by the queuing model depicted in the right-lower corner of figure 4. The arrival process of the queue is the amount of eavesdropped data,which is a time-varying process. The departure process (i.e., the dropping process) characterizes the expiration of the data. In practical systems, the timeout threshold is typically set as a constant for all effective data of a service. Therefore, we can assume the departure process of effective data to be constant-rate process. Eve’s eavesdropped data which is still effective corresponds to the data staying in the queue. Based on the above model, security requirement can be described by the queuelength bound Qth. If queue length is beyond the bound, the eavesdropper has accumulated sufficient amount of data to decipher users’information, and vice versa. Then, the security level of legitimate users can be characterized by the violation probability of the security requirement. Based on the service nature we require to satisfy Pr{Q>Qth}≤δ, i.e., the probability with which Eve’s queue length exceeds the secure threshold Qthneeds to be smaller than or equal to a small d . As long as this condition is satisfied, we claim that the user’s security is assured. Because this model characterizes security levels based on the statistical features, we term it as statistical security model.

    Having built the above model, we can design the framework for statistical security based resource allocation and QoS guarantee,which is shown in figure 5. In this figure, security QoS is characterized by the aforementioned statistical security metric, delay QoS is described by delay-bound violation probability, sustainable traffic load is characterized by effective capacity, and reliability requirement is described by bit error rate (BER) and drop rate. This framework enables the decoupling of diverse QoS functions, whose optimization is conducted by a joint PHY controller including data pre-drop, adaptive rate control, adaptive modulation, and coding.

    Fig. 5 Framework for statistical security based resource allocation and QoS guarantee

    The above design provides a new architecture for secure transmission toward 5G.On one hand, it can effectively describe finegrained QoS requirements of terminal users;on the other hand, it comprehensively integrates diversified requirements on security,delay, sustainable traffic load, and reliability,and provides a unified framework for flexible tradeoff.

    5.3 Fountain Coding Aided Security Enhancement for IoT Applications

    In IoT applications, the low-power machine-type devices often have very stringent constraints on communication resources and processing capabilities. Thus, PLS schemes toward IoT applications should provide the anti-eavesdropping capacity while keeping a very low implementation complexity. Motivated by this, we proposed a security enhancement framework based on fountain coding,which will be elaborated on in detail in what follows:

    Fountain code (FC) was first proposed to realize reliable communications without retransmission [43]. In FC-aided data transmissions, the source file is first divided into K packets. Then, a potentially infinite number of FC packets are generated, each of which is the XOR of distinct source packets chosen randomly. The transmitter sprays these coded packets at the destination continuously.Once the receiver has correctly received N packets, where N is slightly larger than K, the source file can be recovered and the transmission terminates. This characteristic of FC can be exploited to realize wireless security.Specifically, by using FCs, the transmission link between legitimate transceivers can be secured if the legitimate receiver successfully accumulates the N coded packets before the eavesdropper does. In other words, the source information is not leaked as long as the destination obtains the required N packets first,even though some packets may be obtained by the eavesdropper.

    With the above ideas in mind, we developed a series of FC-aided anti-eavesdropping strategies. In [44], an adaptive power allocation policy was developed based on truncated channel inversion. By using this approach, the received SNR at the legitimate receiver can be kept as a constant, while that at the eavesdropper varies randomly with time. As a result, the equivalent channel condition of the eavesdropping link is severely degraded, which makes it extremely difficult for the eavesdropper to accumulate the required number of FC packets.The scheme in [44] requires the availability of the instantaneous CSI at the transmitter, which is hard to satisfy in practical IoT applications.To combat this barrier, [45] investigated the construction of fountain code for enhanced secrecy. A set called decoding set is maintained at the transmitter, which contains all source packets that have already been decoded by the receiver. Upon the completion of each slot transmission, the legitimate receiver feedbacks a single bit to notify the transmitter about the decoding status of the current FC packet (success or failure). With this feedback information, the transmitter updates the decoding set,and constructs the new FC packet by XORing all source packets in the decoding set with an un-decoded source packet chosen randomly.As long as the current transmission does not fail, the legitimate receiver can recover a new source packet from the received FC packet.However, for the eavesdropper, no source packets can be recovered once any packet in the decoding set is not successfully decoded.Consequently, information leakage is avoided according to the principle of FC-based transmissions.

    The FC-aided secure transmission technique can also be extended to cooperative relaying systems where the eavesdropper attempts to extract the source information during both the broadcast phase and the relaying phase. For this scenario, a cooperative jamming method can be integrated into the FC-aided transmission framework. Interested readers can refer to[46] for more information.

    VI. CONCLUSIONS AND FUTURE WORKS

    This article presented a comprehensive review of the PLS technique with its applications in future 5G networks. We fist briefly introduced the security requirements of 5G, based on which we analyzed the advantages of PLS technique and its suitability to 5G systems.Then, we gave a detailed description of the principles of PLS and the state-of-the-art PLS techniques. Afterwards, the main drawbacks of the existing PLS solutions were discussed and the challenges faced by 5G transmission security were pointed out. Finally, we identified several promising PLS solutions towards the diverse application scenarios of 5G networks.

    Although the fundamental research of physical layer security has generated fruitful outcomes, it is still challenging to design PLS schemes to satisfy the 5G security requirements. Some interesting topics that are worthy of further investigations are listed as follows:

    1) Cross-layer security techniques. The existing PLS strategies realize transmission secrecy by exploiting the characteristics of wireless channels at the physical layer; on the other hand, the cryptographic approaches use encryption/decryption operations at upper layers to secure communications. By combining these two and introducing the cross-layer optimization techniques, the system secrecy performance can be further enhanced.

    2) Content-aware physical-layer security scheme design. The PLS approaches developed so far only focus on the security of the“signals”, while ignoring the diverse characteristics of data content carried by the signals.Thus, it is difficult to realize the optimized configuration of the anti-eavesdropping resources. In 5G networks, multimedia services will be the dominant service type. Therefore,it is interesting to develop content-aware PLS solutions to realize unequal secrecy protection.

    3) Physical layer security approaches for combating active attacks. Current studies on PLS are primarily concerned about how to combat eavesdropping attacks of the malicious users. Yet, in future 5G networks, there also exist many forms of active attacks in addition to eavesdropping, such as jamming attack or pilot spoofing attack. It would be a non-trivial work to develop PLS solutions to combat active attacks. Some preliminary results on this subject can be found in [47], [48], and references therein.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Natural Science Foundation of China under Grants No. 61671369 and 61431011, the National Science and Technology Major Project of China under Grant No. 2016ZX03001012-004, the Open Research Fund of the State Key Laboratory of Integrated Services Networks,Xidian University, under Grant No. ISN18-02,and the Fundamental Research Funds for the Central Universities of China.

    [1] SHANNON C E. Communication theory of secrecy systems [J]. Bell System Technical Journal,1949, 28(4): 656-715.

    [2] WYNER A D. Wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.

    [3] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.

    [4] ZHOU Xiangyun, MCKAY M R. Secure transmission with artificial noise over fading channels:achievable rate and power allocation [J]. IEEE Transactions on Vehicular Technology, 2010,59(8): 3831-3842.

    [5] WANG Huiming, ZHENG Tongxing, XIA Xianggen. Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading [J]. IEEE Transactions on Wireless Communications, 2015, 14(1): 94-106.

    [6] DING Xiaojin, SONG Tiecheng, ZOU Yulong, et al. Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection [J]. IEEE Transactions on Vehicular Technology, 2017, 66(5): 3930-3941.

    [7] ZHANG Xi, MCKAY M R, ZHOU Xiangyun, et al. Artificial-noise-aided secure multi-antenna transmission with limited feedback [J]. IEEE Transactions on Wireless Communications,2015, 14(5): 2742-2754.

    [8] LI Na, TAO Xiaofeng, WU Huici, et al. Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: ergodic secrecy sum rate and optimal power allocation[J]. IEEE Transactions on Vehicular Technology,2016, 65(9): 7036-7050.

    [9] ZHAO Nan, YU F R, LI Ming, et al. Physical layer security issues in interference-alignment-based wireless networks [J]. IEEE Communications Magazine, 2016, 54(8): 162-168.

    [10] TEKIN E, YENER A. Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading [C]// Proceedings of the 45thAnnual Allerton Conference on Communications,Control, and Computing: Sep. 26-28, 2007, Allerton House, Illinois, USA: 856-863.

    [11] BASSILY R, ULUKUS S. Ergodic secret alignment[J]. IEEE Transactions on Information Theory,2012, 58(3): 1594-1611.

    [12] MO Jianhua, TAO Meixia, LIU Yuan, et al. Secure beamforming for MIMO two-way communications with an untrusted relay [J]. IEEE Transactions on Signal Processing, 2014, 62(9): 2185-2199.

    [13] XU Hongbin, SUN Li, REN Pinyi, et al. Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach[J]. IEEE Communications Letters, 2015, 19(12):2270-2273.

    [14] KHISTI A, WORNELL G. Secure transmission with multiple antennas – I: The MISOME wiretap channels [J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.

    [15] KHISTI A, WORNELL G. Secure transmission with multiple antennas – II: The MIMOME wiretap channels [J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.

    [16] GERACI G, COUILLET R, YUAN Jinhong, et al.Secrecy sum-rates with regularized channel inversion precoding under imperfect CSI at the transmitter [C] // Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP): May 26-31, 2013,Vancouver, Canada: 1-4.

    [17] ZHU Fengchao, GAO Feifei, YAO Minli, et al.Joint information- and jamming-beamforming for physical layer security with full duplex base station [J]. IEEE Transactions on Signal Processing, 2014, 62(24): 6391-6401.

    [18] MUKHERJEE A, SWINDLEHURST A L. Robust beamfoming for security in MIMO wiretap channels with imperfect CSI [J]. IEEE Transactions on Signal Processing, 2011, 59(1): 351-361.

    [19] LIN C H, TSAI S H, LIN Y P. On quantization for masked beamforming secrecy systems [J]. IEEE Transactions on Wireless Communications,2015, 14(10): 5616-5628.

    [20] LI Na, TAO Xiaofeng, XU Jin. Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback [J]. IEEE Communications Letters, 2014, 18(6): 969-972.

    [21] ZHU Fengchao, GAO Feifei, YAO Minli. Zero-forcing beamforming for physical layer security of energy harvesting wireless communications [J]. EURASIP Journal on Wireless Communications and Networking, 2015, 2015(58):1-9.

    [22] DONG Lun, HAN Zhu, PETROPULU A P, et al.Improving wireless physical layer security via cooperative relays [J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.

    [23] LUO Shuangyu, LI Jiangyuan, PETROPULU A P.Uncoordinated cooperative jamming for secret communications [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(7): 1081-1090.

    [24] KRIKIDIS I, THOMPSON J S, MCLAUGHLIN S.Relay selection for secure cooperative networks with jamming [J]. IEEE Transactions on Wireless Communications, 2009, 8(10): 5003-5011.

    [25] GUO Haiyan, YANG Zhen, ZHANG Linghua, et al. Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks [J]. IEEE Transactions on Communications, 2017, 65(5): 2180-2193.

    [26] HE Xiang, YENER A. Cooperation with an untrusted relay: a secrecy perspective [J]. IEEE Transactions on Information Theory, 2010,56(8): 3807-3827.

    [27] JU M, HWANG K S. Opportunistic transmission of nonregenerative network with untrusted relay [J]. IEEE Transactions on Vehicular Technology, 2015, 64(6): 2703-2709.

    [28] KHODAKARAMI H, LAHOUTI F. Link adaptation with untrusted relay assignment: design and performance analysis [J]. IEEE Transactions on Communications, 2013, 61(12): 4874-4883.

    [29] SUN Li, ZHANG Taiyi, LI Yubo, et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes [J]. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801-3807.

    [30] SUN Li, REN Pinyi, DU Qinghe, et al. Security-aware relaying scheme for cooperative networks with untrusted relay nodes [J]. IEEE Communications Letters, 2015, 19(3): 463-466.

    [31] ZHU Jingge, MO Jianhua, TAO Meixia. Cooperative secret communication with artificial noise in symmetric interference channel [J]. IEEE Communications Letters, 2010, 14(4): 885-887.

    [32] MA Chuan, LIU Jiaqi, TIAN Xiaohua, et al. Interference exploitation in D2D-enabled cellular networks: a secrecy perspective [J]. IEEE Transactions on Communications, 2015, 63(1): 292-242.

    [33] XU Hongbin, SUN Li, REN Pinyi, et al. Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks [J].IEEE Transactions on Information Forensics and Security, 2017, 12(4): 825-839.

    [34] GOPALA P K, LAI Lifeng, GAMAL H E. On the secrecy capacity of fading channels [J]. IEEE Transactions on Information Theory, 2008, 54(10):4687-4698.

    [35] HE Biao, ZHOU Xiangyun. Secure on-off transmission design with channel estimation errors[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 1923-1936.

    [36] WANG Xiaowei, TAO Meixia, MO Jianhua, et al. Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 693-702.

    [37] HU Jianwei, YANG Weiwei, YANG Nan, et al.On-off-based secure transmission design with outdated channel state information [J]. IEEE Transactions on Vehicular Technology, 2016,65(8): 6075-6088.

    [38] HU Jianwei, YANG Nan, ZHOU Xiangyun, et al.A versatile secure transmission strategy in the presence of outdated CSI [J]. IEEE Transactions on Vehicular Technology, 2016, 65(12): 10084-10090.

    [39] LI Xiangming, JIANG Tao, CUI Shuguang, et al.Cooperative communications based on rateless network coding in distributed MIMO systems[J]. IEEE Wireless Communications, 2010, 17(3):60-67.

    [40] TANG Xiao, REN Pinyi, HAN Zhu. Distributed power optimization for security-aware multi-channel full-duplex communications: a variational inequality framework [J]. IEEE Transactions on Communications, 2017, 65(9): 4065-4079

    [41] SUN Li, DU Qinghe, REN Pinyi, et al. Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation [J]. IEEE Transactions on Vehicular Technology, 2016, 65(10): 8767-8774.

    [42] DU Qinghe, SUN Li, REN Pinyi, et al. Statistical security model and power adaptation over wireless fading channels [C] // Proceedings of the International Conference on Wireless Communications & Signal Processing (WCSP): Oct.15-17, 2015, Nanjing, China: 1-6.

    [43] MACKAY D. Fountain codes. IEE Proceedings:Communications, 2005, 152(6): 1062-1068.

    [44] NIU Hao, IWAI M, SEZAKI, K, et al. Exploiting fountain codes for secure wireless delivery [J].IEEE Communications Letters, 2014, 18(5): 777-780.

    [45] LI Wanyu, DU Qinghe, SUN Li, et al. Security enhanced via dynamic fountain code design for wireless delivery [C] // Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC): Apr. 3-6, 2016, Doha, Qatar: 1-6.

    [46] SUN Li, REN Pinyi, DU Qinghe, et al. Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks [J]. IEEE Transactions on Industrial Informatics, 2016, 12(1): 291-300.

    [47] TANG Xiao, REN Pinyi, WANG Yichen, et al.Combating full-duplex active eavesdropper: a hierarchical game perspective [J]. IEEE Transactions on Communications, 2017, 65(3): 1379-1395.

    [48] LI Lingxiang, PETROPULU A P, A. CHEN Zhi.MIMO secret communications against an active eavesdropper [J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10): 2387-2401.

    99久久人妻综合| 国产 一区精品| 久久久久久久亚洲中文字幕| 国产成人精品久久二区二区91 | 午夜久久久在线观看| 久久久久久久久久久久大奶| 国产一区有黄有色的免费视频| 侵犯人妻中文字幕一二三四区| 亚洲色图综合在线观看| 亚洲国产欧美在线一区| 欧美精品一区二区免费开放| 高清黄色对白视频在线免费看| 欧美最新免费一区二区三区| 亚洲av电影在线进入| 亚洲国产看品久久| 最近的中文字幕免费完整| 久久 成人 亚洲| 亚洲一级一片aⅴ在线观看| 91午夜精品亚洲一区二区三区| 岛国毛片在线播放| h视频一区二区三区| 日韩视频在线欧美| 久久国内精品自在自线图片| 啦啦啦中文免费视频观看日本| 91精品国产国语对白视频| 国产精品人妻久久久影院| 亚洲人成电影观看| 两性夫妻黄色片| 中文字幕另类日韩欧美亚洲嫩草| 制服丝袜香蕉在线| 叶爱在线成人免费视频播放| 国产伦理片在线播放av一区| 午夜福利一区二区在线看| 国产乱人偷精品视频| 丝瓜视频免费看黄片| 久久久精品区二区三区| 97人妻天天添夜夜摸| 色婷婷久久久亚洲欧美| 免费日韩欧美在线观看| 超碰成人久久| 美国免费a级毛片| 人妻 亚洲 视频| 亚洲图色成人| 久久久久久免费高清国产稀缺| 亚洲,一卡二卡三卡| 一级毛片 在线播放| 婷婷色综合大香蕉| 交换朋友夫妻互换小说| 欧美激情极品国产一区二区三区| 久久亚洲国产成人精品v| 亚洲欧美色中文字幕在线| 99久久人妻综合| 午夜福利视频在线观看免费| 久久精品国产鲁丝片午夜精品| 国产乱来视频区| 国产精品免费视频内射| 亚洲欧美精品综合一区二区三区 | 亚洲国产欧美网| 午夜免费鲁丝| 有码 亚洲区| 午夜激情久久久久久久| 亚洲美女视频黄频| 亚洲熟女精品中文字幕| 在线观看免费日韩欧美大片| 边亲边吃奶的免费视频| 亚洲中文av在线| 99国产精品免费福利视频| 另类亚洲欧美激情| 美女午夜性视频免费| 伊人久久国产一区二区| 亚洲av综合色区一区| 国产精品99久久99久久久不卡 | 丰满迷人的少妇在线观看| 国产一区亚洲一区在线观看| 久久这里只有精品19| 国产极品粉嫩免费观看在线| 搡女人真爽免费视频火全软件| 香蕉国产在线看| 一区二区三区精品91| 波多野结衣一区麻豆| 亚洲美女黄色视频免费看| 亚洲精品,欧美精品| 日韩av在线免费看完整版不卡| 国产福利在线免费观看视频| 你懂的网址亚洲精品在线观看| 国产在线免费精品| 在线天堂最新版资源| 精品视频人人做人人爽| 一级爰片在线观看| 99久久人妻综合| 天天躁夜夜躁狠狠躁躁| 久久久久久免费高清国产稀缺| 人妻系列 视频| 亚洲欧美一区二区三区国产| 在现免费观看毛片| 天天躁日日躁夜夜躁夜夜| 99久久精品国产国产毛片| 午夜福利影视在线免费观看| 男男h啪啪无遮挡| 啦啦啦在线免费观看视频4| 一区二区三区四区激情视频| 黄片播放在线免费| 国产高清国产精品国产三级| 高清av免费在线| 黑人猛操日本美女一级片| 精品一区在线观看国产| 黑人猛操日本美女一级片| 爱豆传媒免费全集在线观看| 一边亲一边摸免费视频| 一区二区av电影网| 男人操女人黄网站| av免费观看日本| av网站免费在线观看视频| 精品一区在线观看国产| 狠狠精品人妻久久久久久综合| 久久精品夜色国产| 三级国产精品片| 亚洲成人一二三区av| 精品亚洲乱码少妇综合久久| 久久久久久久国产电影| 精品少妇一区二区三区视频日本电影 | 婷婷色综合www| 国产日韩欧美视频二区| 亚洲精品国产av蜜桃| 熟妇人妻不卡中文字幕| 久久精品国产亚洲av天美| 国产欧美日韩一区二区三区在线| 香蕉精品网在线| 老熟女久久久| 久久久久久人人人人人| 精品亚洲乱码少妇综合久久| 成年女人在线观看亚洲视频| 熟女av电影| 久久鲁丝午夜福利片| 老司机影院毛片| 最近最新中文字幕大全免费视频 | 女性被躁到高潮视频| 一本大道久久a久久精品| av不卡在线播放| 免费在线观看视频国产中文字幕亚洲 | 在线天堂最新版资源| 99国产综合亚洲精品| 99国产精品免费福利视频| 免费在线观看完整版高清| 成年女人在线观看亚洲视频| 午夜影院在线不卡| 美女中出高潮动态图| 久久精品熟女亚洲av麻豆精品| 国产xxxxx性猛交| 日韩视频在线欧美| 久久狼人影院| 少妇精品久久久久久久| 在线观看一区二区三区激情| 丁香六月天网| 国产成人精品一,二区| 巨乳人妻的诱惑在线观看| 99re6热这里在线精品视频| 亚洲中文av在线| 欧美精品人与动牲交sv欧美| 亚洲精品久久久久久婷婷小说| 少妇人妻 视频| √禁漫天堂资源中文www| 亚洲国产精品一区三区| 精品久久久精品久久久| 一边摸一边做爽爽视频免费| 新久久久久国产一级毛片| 欧美激情 高清一区二区三区| 少妇的逼水好多| www日本在线高清视频| 亚洲欧美中文字幕日韩二区| 国产无遮挡羞羞视频在线观看| 老熟女久久久| 日本欧美视频一区| 欧美人与善性xxx| 男女免费视频国产| 超色免费av| 一区二区av电影网| 人人妻人人添人人爽欧美一区卜| 咕卡用的链子| 欧美 亚洲 国产 日韩一| 五月天丁香电影| 久久久久国产精品人妻一区二区| 欧美成人精品欧美一级黄| 国产爽快片一区二区三区| 韩国精品一区二区三区| 秋霞伦理黄片| 午夜福利,免费看| 亚洲在久久综合| 亚洲av欧美aⅴ国产| 国产精品成人在线| 成人国产av品久久久| 多毛熟女@视频| 日日爽夜夜爽网站| 最近2019中文字幕mv第一页| 国产精品久久久久久久久免| 一级爰片在线观看| 国产精品.久久久| 岛国毛片在线播放| 岛国毛片在线播放| 免费女性裸体啪啪无遮挡网站| 亚洲一区二区三区欧美精品| 成人国产麻豆网| 丰满迷人的少妇在线观看| 热re99久久国产66热| 国产乱来视频区| 极品少妇高潮喷水抽搐| h视频一区二区三区| 国产在线视频一区二区| 夫妻性生交免费视频一级片| 国产成人精品久久二区二区91 | 国产亚洲精品第一综合不卡| 日韩精品免费视频一区二区三区| 欧美+日韩+精品| 国产成人精品久久二区二区91 | 青春草视频在线免费观看| 一区二区日韩欧美中文字幕| 免费在线观看完整版高清| 成人亚洲欧美一区二区av| 国产精品 国内视频| 只有这里有精品99| 日韩制服骚丝袜av| 欧美中文综合在线视频| 国产成人av激情在线播放| 99九九在线精品视频| 水蜜桃什么品种好| 麻豆精品久久久久久蜜桃| av不卡在线播放| 一级黄片播放器| 免费少妇av软件| 另类精品久久| 欧美日韩亚洲高清精品| 建设人人有责人人尽责人人享有的| 午夜福利视频在线观看免费| 亚洲经典国产精华液单| 丝袜人妻中文字幕| 亚洲av.av天堂| 久久午夜综合久久蜜桃| 婷婷色综合www| 丝袜脚勾引网站| 国产日韩欧美亚洲二区| 亚洲精品美女久久久久99蜜臀 | 天天躁日日躁夜夜躁夜夜| 国产精品久久久久久久久免| 亚洲精华国产精华液的使用体验| 天堂中文最新版在线下载| 波多野结衣一区麻豆| 久久久精品94久久精品| 男男h啪啪无遮挡| 久热久热在线精品观看| 免费看不卡的av| 满18在线观看网站| 久久久久精品久久久久真实原创| 亚洲色图综合在线观看| 最近的中文字幕免费完整| 国产精品麻豆人妻色哟哟久久| 黄色一级大片看看| 男人操女人黄网站| 激情五月婷婷亚洲| 99久久精品国产国产毛片| 女人被躁到高潮嗷嗷叫费观| 国产毛片在线视频| 免费人妻精品一区二区三区视频| 国产男人的电影天堂91| 日本爱情动作片www.在线观看| 五月天丁香电影| 另类精品久久| 久久久久久人妻| 日韩精品免费视频一区二区三区| 熟女电影av网| 国产精品一国产av| 久久人人爽av亚洲精品天堂| 男女边吃奶边做爰视频| 男女国产视频网站| 国产精品熟女久久久久浪| 自线自在国产av| 伦精品一区二区三区| 日韩av在线免费看完整版不卡| 一边亲一边摸免费视频| 久久99热这里只频精品6学生| 日韩制服丝袜自拍偷拍| 欧美xxⅹ黑人| 搡老乐熟女国产| 亚洲国产欧美日韩在线播放| 久久av网站| a级毛片在线看网站| 日本vs欧美在线观看视频| 国产日韩一区二区三区精品不卡| 精品久久久精品久久久| 久久精品久久久久久久性| 亚洲国产看品久久| 久久女婷五月综合色啪小说| 国产极品天堂在线| 一级片'在线观看视频| 色播在线永久视频| 久久精品久久久久久久性| 美女中出高潮动态图| 国产男女超爽视频在线观看| 亚洲精品视频女| 中文字幕色久视频| 久久国产亚洲av麻豆专区| 99热全是精品| 久久久a久久爽久久v久久| 亚洲久久久国产精品| 伊人亚洲综合成人网| 日本vs欧美在线观看视频| 91在线精品国自产拍蜜月| 亚洲五月色婷婷综合| 欧美精品高潮呻吟av久久| 亚洲精品aⅴ在线观看| 精品午夜福利在线看| 国产精品免费视频内射| 欧美老熟妇乱子伦牲交| 成人毛片60女人毛片免费| 一级毛片 在线播放| 黄色毛片三级朝国网站| 超碰97精品在线观看| 一区二区日韩欧美中文字幕| 国产熟女欧美一区二区| 国产国语露脸激情在线看| 人人澡人人妻人| 精品少妇一区二区三区视频日本电影 | 狠狠婷婷综合久久久久久88av| 观看av在线不卡| 亚洲,一卡二卡三卡| 黄色 视频免费看| 欧美黄色片欧美黄色片| 亚洲人成电影观看| 国产视频首页在线观看| 一区二区三区激情视频| 久久av网站| 欧美精品一区二区免费开放| 9色porny在线观看| 日韩一区二区三区影片| 精品亚洲成国产av| 日韩,欧美,国产一区二区三区| 一区在线观看完整版| 黄色怎么调成土黄色| 欧美亚洲日本最大视频资源| 国产精品二区激情视频| 一区在线观看完整版| 日日爽夜夜爽网站| 老汉色∧v一级毛片| 老汉色av国产亚洲站长工具| 欧美日韩一级在线毛片| 国产成人免费无遮挡视频| 乱人伦中国视频| 亚洲av电影在线进入| 亚洲av.av天堂| 国产精品嫩草影院av在线观看| 男女无遮挡免费网站观看| 免费不卡的大黄色大毛片视频在线观看| 国产1区2区3区精品| 亚洲国产成人一精品久久久| 亚洲在久久综合| 成人黄色视频免费在线看| 午夜免费鲁丝| 在线观看www视频免费| 黄片小视频在线播放| 两性夫妻黄色片| 在线观看美女被高潮喷水网站| 国产精品国产三级国产专区5o| 国产午夜精品一二区理论片| 精品人妻偷拍中文字幕| 国产精品欧美亚洲77777| 午夜激情av网站| 80岁老熟妇乱子伦牲交| 男女边摸边吃奶| 男女国产视频网站| 韩国av在线不卡| 少妇的逼水好多| 亚洲精品久久久久久婷婷小说| 国产视频首页在线观看| 国产精品国产三级国产专区5o| 1024香蕉在线观看| 一区二区三区精品91| 久久久久久久精品精品| 丝袜在线中文字幕| 五月开心婷婷网| 亚洲伊人久久精品综合| 亚洲精品国产av成人精品| 男人添女人高潮全过程视频| 国产女主播在线喷水免费视频网站| 国产男女内射视频| 在线免费观看不下载黄p国产| 久久久精品免费免费高清| 国产精品 国内视频| 国产精品一区二区在线不卡| 天堂俺去俺来也www色官网| 91精品三级在线观看| 26uuu在线亚洲综合色| 久久午夜福利片| 久久久a久久爽久久v久久| 纵有疾风起免费观看全集完整版| 性色avwww在线观看| 国产xxxxx性猛交| 一级,二级,三级黄色视频| 亚洲情色 制服丝袜| 亚洲美女搞黄在线观看| 国产熟女欧美一区二区| 2018国产大陆天天弄谢| 亚洲欧美日韩另类电影网站| 国产伦理片在线播放av一区| 日本色播在线视频| 91精品伊人久久大香线蕉| tube8黄色片| 天天躁夜夜躁狠狠久久av| 国产高清国产精品国产三级| 女人被躁到高潮嗷嗷叫费观| 香蕉丝袜av| 亚洲精品av麻豆狂野| 亚洲欧美成人精品一区二区| 亚洲国产欧美在线一区| 精品亚洲成国产av| 精品久久久久久电影网| 三上悠亚av全集在线观看| 两性夫妻黄色片| 三级国产精品片| 天天躁夜夜躁狠狠久久av| 女性被躁到高潮视频| 美女脱内裤让男人舔精品视频| 国产成人a∨麻豆精品| 黄色配什么色好看| 亚洲av电影在线观看一区二区三区| 亚洲第一av免费看| 26uuu在线亚洲综合色| 欧美成人精品欧美一级黄| 国产精品一国产av| 国产精品一二三区在线看| freevideosex欧美| 亚洲欧美中文字幕日韩二区| 午夜福利在线观看免费完整高清在| 国产精品三级大全| 亚洲国产看品久久| 女人精品久久久久毛片| 狠狠精品人妻久久久久久综合| 国产精品 国内视频| 久久国产亚洲av麻豆专区| 国产亚洲精品第一综合不卡| 两性夫妻黄色片| www日本在线高清视频| 在线天堂最新版资源| 亚洲国产欧美网| 精品少妇黑人巨大在线播放| 人人妻人人澡人人看| 男人爽女人下面视频在线观看| 久久久久久久久久久免费av| 大码成人一级视频| 国产日韩欧美亚洲二区| 精品国产乱码久久久久久男人| 亚洲精品av麻豆狂野| 欧美+日韩+精品| 国产亚洲最大av| 亚洲国产看品久久| 美女国产视频在线观看| 国产精品一二三区在线看| 久久ye,这里只有精品| 久久午夜福利片| 黄片小视频在线播放| 2022亚洲国产成人精品| 国产成人a∨麻豆精品| 精品国产一区二区三区四区第35| 久久99蜜桃精品久久| 最近手机中文字幕大全| 午夜福利,免费看| 七月丁香在线播放| 一级黄片播放器| 99精国产麻豆久久婷婷| 亚洲精品国产色婷婷电影| 精品99又大又爽又粗少妇毛片| 亚洲精品aⅴ在线观看| 国产av国产精品国产| 国产又爽黄色视频| 波多野结衣一区麻豆| av女优亚洲男人天堂| www.av在线官网国产| 欧美少妇被猛烈插入视频| 国产深夜福利视频在线观看| 一级片免费观看大全| 午夜福利影视在线免费观看| 人人妻人人爽人人添夜夜欢视频| 久久久久久伊人网av| 国产日韩欧美视频二区| 美女脱内裤让男人舔精品视频| 美女xxoo啪啪120秒动态图| 久久国产精品男人的天堂亚洲| 一本色道久久久久久精品综合| 精品99又大又爽又粗少妇毛片| 哪个播放器可以免费观看大片| 最近手机中文字幕大全| 国产白丝娇喘喷水9色精品| 久久热在线av| 在线观看免费视频网站a站| 美女国产视频在线观看| 欧美成人午夜免费资源| 香蕉国产在线看| 久久人人爽人人片av| 精品福利永久在线观看| videossex国产| 久久久国产精品麻豆| 校园人妻丝袜中文字幕| kizo精华| 国产视频首页在线观看| 日本欧美视频一区| av片东京热男人的天堂| 热99国产精品久久久久久7| 少妇被粗大的猛进出69影院| 日韩大片免费观看网站| 熟妇人妻不卡中文字幕| 最新的欧美精品一区二区| 精品国产国语对白av| av在线老鸭窝| av在线观看视频网站免费| 中文乱码字字幕精品一区二区三区| 国产不卡av网站在线观看| 日本wwww免费看| 男人舔女人的私密视频| 国产精品成人在线| www日本在线高清视频| 90打野战视频偷拍视频| 免费观看性生交大片5| 国产精品国产av在线观看| 免费久久久久久久精品成人欧美视频| 极品少妇高潮喷水抽搐| av福利片在线| 黄色 视频免费看| 亚洲精品自拍成人| 水蜜桃什么品种好| 欧美精品人与动牲交sv欧美| 丝袜脚勾引网站| 国产成人精品久久二区二区91 | 国产精品无大码| 免费看av在线观看网站| 中文欧美无线码| 国产精品99久久99久久久不卡 | 精品久久蜜臀av无| 日日啪夜夜爽| 日韩制服骚丝袜av| 久久久精品区二区三区| 国产精品国产三级专区第一集| 国产 精品1| 久久99一区二区三区| 丰满少妇做爰视频| av有码第一页| av在线播放精品| 久久久久精品人妻al黑| 精品第一国产精品| 人妻 亚洲 视频| av网站在线播放免费| 久久久国产欧美日韩av| 亚洲av.av天堂| 亚洲少妇的诱惑av| 久久久精品国产亚洲av高清涩受| 久久久久久人人人人人| 成人手机av| 韩国高清视频一区二区三区| 日韩av在线免费看完整版不卡| 中文乱码字字幕精品一区二区三区| 日本免费在线观看一区| 国产精品久久久久成人av| 免费观看在线日韩| 2021少妇久久久久久久久久久| 国产男女超爽视频在线观看| 中文字幕av电影在线播放| 大香蕉久久网| 国产成人a∨麻豆精品| 女人久久www免费人成看片| 国产精品久久久久久av不卡| 亚洲经典国产精华液单| av电影中文网址| 欧美精品人与动牲交sv欧美| 欧美日韩精品网址| 大话2 男鬼变身卡| 一本大道久久a久久精品| 美女脱内裤让男人舔精品视频| 国产免费一区二区三区四区乱码| 色94色欧美一区二区| 亚洲成人手机| 90打野战视频偷拍视频| av卡一久久| 成人亚洲精品一区在线观看| 精品国产国语对白av| 久久人妻熟女aⅴ| 色婷婷久久久亚洲欧美| 午夜福利在线观看免费完整高清在| 美国免费a级毛片| 最近中文字幕2019免费版| 人妻人人澡人人爽人人| 你懂的网址亚洲精品在线观看| 欧美人与性动交α欧美软件| 国产女主播在线喷水免费视频网站| 最近2019中文字幕mv第一页| 免费高清在线观看视频在线观看| 老汉色∧v一级毛片| 亚洲美女黄色视频免费看| 黄色 视频免费看| 性少妇av在线| 精品国产一区二区三区四区第35| 日韩av免费高清视频| 久久毛片免费看一区二区三区| 丰满迷人的少妇在线观看| 不卡视频在线观看欧美| 日日爽夜夜爽网站| 国产男女超爽视频在线观看| 2021少妇久久久久久久久久久| 高清黄色对白视频在线免费看| 亚洲欧美一区二区三区国产| 成人手机av| 亚洲伊人色综图| 欧美少妇被猛烈插入视频| 国产毛片在线视频| 久久精品久久精品一区二区三区| 女性生殖器流出的白浆| 好男人视频免费观看在线| 99精国产麻豆久久婷婷| 又黄又粗又硬又大视频|