• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reputation-Based Cooperative Spectrum Sensing Algorithm for Mobile Cognitive Radio Networks

    2017-05-08 11:32:16XinyuWangMinJiaQingGuoXuemaiGuGuangyuZhang
    China Communications 2017年1期

    Xinyu Wang, Min Jia, Qing Guo*, Xuemai Gu, Guangyu Zhang

    1 Communication Research Center, Harbin Institute of Technology, Harbin 150080, China

    2 Research Center of Satellite, Harbin Institute of Technology, Harbin 150080, China

    * The corresponding author, email: qguo@hit.edu.cn

    I.INTRODUCTION

    Cognitive radio (CR) is able to mitigate the spectrum scarcity problem by using opportunistically licensed spectrum bands in dynamic spectrum access networks [1].Thus, spectrum sensing is the essential to CR [2].Spectrum sensing has attracted considerable attentions and a variety of sensing schemes have been proposed [3-6].Spectrum sensing consists of single-node sensing and multi-node cooperative sensing.But the detection performance of the former is largely affected by hidden terminal problem, channel fading effects and multipath effects [7].Thus, studies on the latter are more significant.However the latter is easily attacked by malicious users (MUs).

    Final decisions made by the fusion center(FC) can be significantly affected by the fake detected results uploaded by malicious users.In view of this, existing solutions aiming to remove malicious users were introduced in [8-10].Basically speaking, the core idea of those algorithms was to introduce a variable called trust value.A secondary user’s trust value was decreased if its local detected results deviated from common readings beyond a certain threshold.And it would cause the consequence that it was identified as a malicious user.Then its negative effects on the final decision would be weaken.Conventional trust-value-based algorithms (CTAs) in this paper represent a type of algorithms with characteristics described above.However, those CTAs had the following limitation.They failed to consider the mobility of secondary users.Nevertheless, mobility was an essential feature of mobile communications networks.To be specific, those CTAs failed to consider the location diversity of the cognitive radio network (CRN) and thus always overly punished those minority reliable users(RUs) in extremely bad or good locations and even when they moved out of those locations later on, its contribution to the final decision was still limited because of its low trust value,causing the detection performances to decrease greatly.Thus, the CTAs were not able to be directly applied to mobile CRNs.So far, studies on malicious attacks in mobile CRNs are rather limited.We find the following several relevant papers.The algorithm in [11] must detect many times to achieve the requested accuracy causing interference to the primary user.Reference[12] assumed that the primary user’s (PU’s)communication range was limited within a sub-region of the CRN.Thus, its application scenarios were different from our algorithm.And it was lacking for theoretical derivations,which meant it did not theoretically prove their algorithm’s effectiveness.A trusted collaborative spectrum sensing for mobile CRNs(TCSS) was proposed in [13] aiming at mobile secondary users (SUs).In TCSS, trust value was computed based on Dempster-Shafer (DS) Theory.However, because of the limitation of the particular D-S iteration formula those authors had selected, trust values were not accurate enough to remove malicious users according to our analysis and simulated results in Section IV.

    In this paper, the authors proposed a reputation-based cooperative spectrum sensing algorithm for mobile CRNs to resist malicious attacks.

    In this paper, a reputation-based cooperative spectrum sensing algorithm (RCSS) is proposed to identify and remove malicious attacks in mobile CRNs, which consists of two main parts, updating reputation scores to remove malicious users and data fusion in the fusion center to improve detection performance further.Also, we propose the idea of “slide window” to enhance the stability of our algorithm.When calculating the common reading of each cell, the average of detected results in it needs to be computed.Thus the bigger the total number of results involved, the more accurate the obtained common reading will reflect the true channel conditions of this cell.The idea of “slide window” means during each spectrum sensing, we not just process detected data in the current sensing slot, but all data of the latest several slots to increase the amount of data involved and thus enhance the accuracy and reliability of our algorithm.Then, we verify the effectiveness of our malicious user removing method and the superiority of the data fusion rule at a theoretical derivation level.Finally, the simulation results are presented to verify that the detection performance of RCSS is significantly better than that of CTA and TCSS.

    The major contributions of this paper are:

    ? Taking into consideration both the mobility of secondary users and local channel differences, we propose a reputation-based cooperative spectrum sensing algorithm consisting of two main parts, identifying malicious users and data fusion.

    ? We propose an idea of “slide window” to increase the number of detected results during each iteration to enhance our algorithm’s stability and accuracy.

    ? We study the detection performance of our proposed algorithm and verify its effectiveness at a theoretical derivation level.

    ? We conduct simulations to evaluate our algorithm and compare its detection performance with other algorithms, finding that in CRNs with 60 mobile SUs, among which, 18 are MUs, our solution has an improvement of detection probability by 0.97-dB and 3.57-dB when false alarm probability is 0.1, compared with CTA and TCSS, respectively.

    II.SYSTEM MODEL

    2.1 Cognitive radio network model

    In real-world scenarios, some areas have better channel conditions, i.e.larger signal-to-noise ratios (SNRs), and others have worse because of shadow fading, path loss and multi-path effects in the entire large-sized area of interest.CTAs tend to overly punish those minority RUs who move into locations with extremely good or bad channel conditions and even mistakenly remove them.Thus conventional trustvalue-based algorithms can no longer apply in mobile CRNs.Aiming this challenge, we adequately consider location channel differences.We divide the whole large-sized area of interest into several cells.Then as to SUs moving into the same cell, they are close geographically and thus close path-loss.Meanwhile,their surroundings are similar and thus shadow fading and multi-path effects are alike.So compared with SUs in different cells, SUs in the same cell have much more similar channel conditions and much closer detected results.Then it is reasonable to say in our considered scenario, the channel condition differences in one cell are little while those in different cells are large.Since the location diversity of the CRN is considered in our algorithm, the SNR cannot be too low.Then our algorithm identifies MUs by finding detected results in each cell which are relatively far from most results in the particular cell and then decreasing their reputation scores.Even if an SU move into a cell with extremely good or bad channel conditions, only if that SU is reliable, its detected results would still be consistent with other detected results of SUs in that specific cell.This is the reason why we divide the whole area into cells and also how we overcome the mentioned drawback of CTAs.

    To be specific, in this paper we divide the whole area of interest intoLequal-sized square cells as shown in Fig.1 and each cell is assigned with a unique cell number.Assume that all cells have similar noise level.The CRN consists of a static PU, an FC andNmobile SUs includingMMUs andRRUs.Assume thatsamples are used to perform energy detection (ED) in one detection period at each SU.Detected energy values by the SUs are forwarded to the FC along with the cell numbers of the cells they currently belong to.Then the sensing problem can be formulated as a binary hypothesis test to detect the presenceor absenceof PU, which means, the FC decodes and combines the detected results from all SUs to firstly removes MUs, then assigns each SU with an appropriate weighting coefficient, makes a final decision between the two hypotheses, and finally broadcasts it to all SUs.

    Here we take Fig.1 as an example, but actually our algorithm can apply when it is divided into cells in any size or with any number according to required accuracy.The whole area can be divided according to field detection results to put areas with similar channel conditions into one common cell; or divided by experience and for example, dense building areas in CNRs should constitute a cell.

    2.2 Signal propagation

    Fig.1 The CRN model with a static PU and several mobile SUs

    2.3 Sensing model

    We assume SUs sense the spectrum periodically slot by slot through performing ED since its simple design and efficiency.And assume that the PU’s state remains unchanged within one detection interval.Then the received signalat theith SUwhich is in cellduring thekth detection under the two hypotheses is given by

    wherenrepresents the sampling index; the channel responseis closely related with the location ofwhile moving but is considered to be constant within each detection interval;denotes the transmitted signal of the PU;is additive white Gaussian noise with zero-mean and varianceThen, the detected signal power,by is

    In an ideal world, single-node spectrum sensing is able to meet requirements of CR.However in a real sensing environment, there are lots of problems, such as hidden terminal problem, channel fading effects and multi-path effects [7], causing bad detection performance of single-node sensing.Multi-node cooperative sensing can reduce those limitations of single-node sensing.We choose soft-decision cooperative sensing for it having better detection performance than hard-decision.In soft-decision cooperative sensing system,firstly SUs send their own local energy detection resultsto the FC.Then, the FC decides proper weighting coefficientsaccording to a certain soft-decision data fusion rule, such as equal gain combining (EGC), maximal ratio combining (MRC) and so on.Finally, the FC calculates the following weighted objective function [16]

    2.4 Malicious attack model

    Here we choose the following malicious attack model.All MUs send random cell numbers to the FC no matter which cells they belong to during current sensing slots.And they send detected results after doubling them underor halving them under.

    III.ALGORITHM DESCRIPTIONS

    3.1 Malicious user identifying process

    Our idea of identifying MUs is to calculate each cell’s common reading first, namely the average of detected results in that cell, and then consider results with larger disparities from the average value to be unreliable.Next, we decrease those unreliable results’corresponding SUs’ reputation scores and finally regard SUs with less reputation scores than the preset thresholdas MUs and remove them.Two functions need to be defined: the distance functionto describe the disparity between the detected result of userduring thekth sensing slot and the common reading of(the cellbelonging to during thekth slot); the reputation score increment functionto update’s reputation score.

    whereavgandstdmean computing the average value and the standard deviation, respectively.There are two requirements for reputation score increment functionin our algorithm: whenis relatively small,its correspondingshould be a positive number to ensure RUs’ reputation scores would increase; whenis large,should be negative to make sure that reputation scores of MUs would decrease until removed.And largermeans that the corresponding detected results are less reliable, so the absolute value of the negativeshould be larger to punish them to a larger extent.In fact, there are more than one functions meeting these requirements.Generally speaking, we choose increment functions by experience in our assumed scenario.And the function shown in (8) is suited to our system.We compute each SU’s reputation score incrementaccording to(7) and (8) and then update its reputation score according toon the condition of the assumption of its maximum valueand minimum valueNext, we shall present the foundation and principle of removing MUs in our algorithm from the perspective of statistics.

    According to section 2.3, under the hypothesis ofthe mathematical expectation of the detected results of an RU isAnd the mathematical expectation of an MU isUnder the hypothesis ofthe expectations of an RU and an MU are respectivelyandis the probability density function(PDF) ofIn the same cell,is the same to RUs and MUs, so we only need to compare their numerators, i.e.

    Normally, there are more RUs than MUs in CRNs.Thus according to (10), the absolute differences between the common readings,and detected results of an RU are smaller than those of an MU in the same cell.So distance functions of RUs are smaller and thus their increment functions calculated from(8) are positive, which means their reputation scores will increase; distance functions of MUs are larger and their increment functions are negative, which means their reputation scores will decrease.Whenis less than the preset thresholdwill be removed.

    If the total number of SUs is small or the CRN is divided into too many cells, there will be limited detected data in each cell.In our algorithm,is used to describe the common reading of cellso the less involved detected data when calculatingeach time, the more inaccurately the computed common reading will reflect the real channel conditions of that particular cell.To cope with this problem, we propose an idea of “slide window”.We regardllatest detected results of all SUs as a whole as shown in Fig.2.Each grid represents all detected results sent to the FC during the corresponding sensing slot.Consider all detected results of latestlslots as a whole during each data processing.According to all data in the “slide window”, the FC updates SUs’ reputation scores, removes MUs and calculates weighting coefficients during data fusion.Introducinglis to increase the total number of detected data used when computingeach time, to raise the statistical sample number, and to finally enhance our algorithm’s accuracy and reliability.

    We next will introduce the concrete steps of our MUs removing process based on the idea of “slide window”.After thekth sensing slot,we get the detected result setY, which consists of data sent to the FC during thekth sensing slot and detected results transmitted during the former (l-1) sensing slots:Consider thoseenergy values fromNSUs afterlslots inYas energy values fromSUs after one slot and then substitute them into (7) and (8) to computedistance functions andreputation score increment functions corresponding to each element inY, respectively.Theincrement functions make up the set:

    Then calculateui’s reputation score incrementaccording to (11) and (12).

    Fig.2 Slide window

    3.2 Data fusion rule

    Currently, an overwhelming majority of soft decision data fusion rules need some prior information during calculate weighting coefficients.However, prior information,such like SNR, is not easy to obtain in mobile CRNs since it changes all the time as SUs move.Thus, conventional data fusion rules which require the values of SNRs are no longer able to apply in mobile CRNs in our algorithm.Thus we adopt a soft decision data fusion rule aiming at mobile SUs.It is also the second part of our algorithm.It calculates the weighting coefficients with detected results sent to the FC within the “slide window”.We assign cells with better channel conditions with larger weighting coefficientsas shown in (13), since detected results from those cells with better channel conditions, i.e.larger SNRs, tend to be larger in our scenario.Weighting coefficients for detected results of RUs within the “slide window”,are obtained according to weighting coefficients of cells,which are worked out by (13).Then weighting coefficientsneed to be normalized as in (14) to adapt to the fixed preset thresholdwhich means the sum of the squares of them is 1.So weighting coefficients of arbitrary SUs won’t be so large, leading to play an decisive role in final decisions.Equation (15) shows how to calculate the weighted objective functionof our method.The FC considers PU to be active ifis larger than thresholdor otherwise, to be idle.

    becomes an equation.So

    which means

    According to (22), the weighted objective function of our data fusion method is no less than that of EGC, i.e.

    In mobile CRNs, the detection probabilityand the false alarm probabilityof RCSS are:

    where

    3.3 Algorithm descriptions

    In order to make this algorithm easy to understand, the notations in this paper are as follows.

    Above all, we conclude RCSS as Table II.

    IV.SIMULATION RESULTS

    We use MATLAB to simulate the system.In this section, the detection performance of RCSS is compared with CTA and TCSS.Here CTA specifically refers to the algorithm same with RCSS except that it does not divide the entire area into cells to ensure the comparability.It also has the characteristics described in Section I.In this way, the comparison will demonstrate strongly that dividing the entire area into cells is an effective method to overcome the above-mentioned drawback of conventional algorithms.Assume that the whole area is asquare area, whose closest location is 2000m away from the PU.The noise signal power is 300mW and the PU transmitted signal power is 1W.andare respectively from 0 to 2 and 2dB to 6dB.We assumeandby experience.

    According to IEEE 802.22 [17], the sensing duration (1ms-10ms) is quite small, and thus we assume the locations of SUs keep unchanged during each sensing.Spectrum evacuation should be within 2 seconds by the SUs when the PU becomes active.Therefore,time between two adjacent sensing slot is small(<=2s), it would be unrealistic if we consider a mobility model with sudden and uncorrelated changes in speed and direction during each sensing slot.In our model, their values are correlated to the previous one to avoid unrealistic patterns.To be specific, we assume that the initial velocityand acceleration of all SUs isThe speed and direction change every 5s.To be specific, the direction changes randomly every time.We assume that the SUs never pause and they sense after every 1s.

    Figs.3, 4 and 5 compare the detection performances of RCSS, TCSS and CTA in terms of receiver operating characteristics (ROC),respectively (N=60,M=15 or 18,l=12;N=48,M=12 or 15,l=15;N=52 or 60,M=14,l=14).The values ofls are assumed by experience.From those three figures, we get the following conclusions.(1) For constantN, largerMbrings worse detection performance for all three algorithms according to Figs.3 and 4.As to RCSS, the largerMis, the more fake detected results will be sent to the FC during every sensing slot.Then the computed common reading in each cell,would no longer reflect the real channel conditions,causingandinaccurate.Thus, the FC cannot remove MUs thoroughly and even remove some reliable ones mistakenly.So the largerMis, the poorer the performance will be.(2) According to Figs.3 and 4, as to the three algorithms, keeping the percentage ofconstant, asNincreases, the performance improves, since larger space diversity gains are obtained.As to RCSS, that’s because whenNis small, the statistical computedgenerally can’t reflect real conditions as accurately as largerN, since simple size for statistics is smaller, and thus MUs cannot be distinguished accurately causing the performance poor.(3) According to Fig.5, for constantM, largerNbrings better detection performance for all three algorithms since largerNbrings larger.(4) The detection performance of RCSS is significantly better than that of TCSS and CTA in mobile CRNs with various number of SUs (N), which means on condition that the false alarm probability is constant, our algorithm has larger detection probability.For example, in Fig.3 when SUs are mobile, our algorithm has an improvement of primary user detection probability by 0.97-dB and 3.57-dB when false alarm probability is 0.1 (N=60,M=18), in comparison to CTA and TCSS, respectively.Next, we will analyze the reasons of (4) in details.

    Fig.3 Comparison of ROC curves of three algorithms when N=60, M=15 or 18

    Fig.4 Comparison of ROC curves of three algorithms when N=48, M=12 or 15

    Fig.5 Comparison of ROC curves of three algorithms when N=52 or 60, M=14

    Compare with RCSS, CTA does not have the two following processes: the usage of“slide window” and dividing the whole area into cells.The lack of “slide window” makes the number of statistical sample data involved in each calculation become less and thus CTA is not as accurate and reliable as RCSS.The lack of dividing into cells leads to the following drawback.In terms of data fusion, the absence of dividing is equivalent to executing cell dividing (L=1) but assigning cells with equal weighting coefficients.And the derivation in section 3.2 proves that CTA’s lack of dividing the entire area makes its detection probability smaller compared with RCSS on condition that the false alarm probability remains unchanged.Next, we explain why TCSS whose MU removing principle is based on D-S theory cannot identify MUs accurately.TCSS also assigns SUs with trust values.According to [13], the particular chosen D-S iteration formula leads to the fact that all trust values will finally increase until larger than the MU detection threshold no matter what the detected results actually are.Then no matter an SU is malicious or not, it would finally be identified to be reliable after a certain period of time.And that is why we argue that TCSS cannot distinguish MUs accurately.

    V.CONCLUSION

    In this paper, we have proposed a reputation-based cooperative spectrum sensing algorithm for mobile CRNs to resist malicious attacks.By dividing the entire area of interest into cells, removing MUs based on their updated reputation scores and then providing larger weighting coefficients for detected results from cells with better channel conditions,our algorithm was able to accurately remove MUs in a mobile CRN and obtain great detection performance.The simulated results showed that in mobile scenarios, the detection performance of our algorithm was significantly better than that of CTA and TCSS no matter whether the number of SUs was more or less.

    ACKNOWLEDGEMENT

    This work was supported by National Natural Science Foundation of China under Grant No.61671183, the Open Research Fund of State Key Laboratory of Space-Ground Integrated Information Technology under Grant No.2015_SGIIT_KFJJ_TX_02, major consulting projects of Chinese Academy of Engineering under Grant No.2016-ZD-05-07.

    [1] L.Berlemann, S.Mangold, “Cognitive Radio and Dynamic Spectrum Access”, Hoboken:John Wiley & Sons, Inc., pp.1-5, 2009.

    [2] M.Song, C.Xin, Y.Zhao,et al, “Dynamic Spectrum Access: From Cognitive Radio to Network Radio”,IEEE Wireless Communications, vol.19,no.1, pp.23-29, February, 2012.

    [3] M.Yang, Y.Li, X.Liu, et al, “Cyclostationary Feature Detection Based Spectrum Sensing Algorithm under Complicated Electromagnetic Environment in Cognitive Radio Networks”, China Communications, vol.12, no.9, pp.35-44,September, 2015.

    [4] B.Mughal, S.Hussain, A.Ghafoor, “Cooperative Subcarrier Sensing Using Antenna Diversity Based Weighted Virtual Sub Clustering”, China Communications, vol.13, no.10, pp.44-57, October, 2016.

    [5] X.Zhang, F.Gao, R.Chai, et al, “Matched Filter Based Spectrum Sensing When Primary User Has Multiple Power Levels”, China Communications, vol.12, no.2, pp.21-31, February, 2015.

    [6] X.Wu, X.Han, F.Labeau, ”High Capacity Spectrum Sensing Framework Based on Relay Cooperation”, China Communications, vol.13, no.8,pp.117-126, August, 2016.

    [7] F.F.Digham, M.-S.Alouini, M.K.Simon, “On the Energy Detection of Unknown Signals over Fading Channels”,IEEE Transactions on Communications, vol.55, no.1, pp.21-24, January, 2007.

    [8] S.Bhattacharjee, S.Debroy, M.Chatterjee, “Trust Computation Through Anomaly Monitoring in Distributed Cognitive Radio Networks”,Proceedings of 2011 International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp.593-597, September 11-14,2011, Toronto, ON.

    [9] A.G.Fragkiadakis, E.Z.Tragos, I.G.Askoxylakis,“A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks”,IEEE Communications Surveys & Tutorials, vol.15,no.1, pp.428-445, January, 2012.

    [10] M.Jia, X.Wang, Q.Guo,et al, “A Novel Multi-Bit Decision Adaptive Cooperative Spectrum Sensing Algorithm Based on Trust Valuations in Cognitive OFDM System”,Proceedings of 2014 Vehicular Technology Conference (VTC Fall), pp.1-5, September 14-17, 2014, Vancouver, Canada.

    [11] K.Arshad, K.Moessner, “Mobility Driven Energy Detection Based Spectrum Sensing Framework of a Cognitive Radio”,Proceedings of 2010 Second UK-India-IDRC International Workshop on Cognitive Wireless Systems (UKIWCWS), pp.1-5,December 13-14, 2010, New Delhi, India.

    [12] M.F.Amjad, B.Aslam, C.C.Zou, ”Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks”,Proceedings of the 2013 IEEE Military Communications Conference (MILCOM), pp.951-956, November 18-20,2013, San Diego, CA.

    [13] S.Jana, K.Zeng, W.Cheng,et al, “Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks”,IEEE Transactions On Information Forensics and Security, vol.8, no.9,pp.1497-1507, July, 2013.

    [14] A.F.Molisch, “Wireless Communications (Second Edition)”, Hoboken:John Wiley & Sons, Inc.,2011.

    [15] M.L.Benitez, F.Casadevall, “Improved Energy Detection Spectrum Sensing for Cognitive Radio”,IET Communications, vol.6, no.8, pp.785-796, July, 2012.

    [16] H.Mu, J.K.Tugnait, “Joint Soft-Decision Cooperative Spectrum Sensing and Power Control in Multiband Cognitive Radios”,IEEE Transactions On Signal Processing, vol.60, no.10, pp.5334-5346, June, 2012.

    [17] WRAN WG on Broadband Wireless Access Standards, IEEE 802.22.Available: www.ieee802.22.org/22.

    亚洲av成人精品一二三区| 成人高潮视频无遮挡免费网站| 99热这里只有精品一区| 久久久久久久国产电影| 蜜桃久久精品国产亚洲av| 女人被狂操c到高潮| 精品一区二区三区视频在线| 最后的刺客免费高清国语| 观看美女的网站| 亚洲成人中文字幕在线播放| 波野结衣二区三区在线| 中文在线观看免费www的网站| 免费观看精品视频网站| 亚洲,欧美,日韩| av专区在线播放| 久久人人爽人人片av| 国产成人免费观看mmmm| 国产伦一二天堂av在线观看| 午夜爱爱视频在线播放| 日本色播在线视频| 久久亚洲国产成人精品v| 午夜精品在线福利| 精品午夜福利在线看| 国产国拍精品亚洲av在线观看| 男女边吃奶边做爰视频| or卡值多少钱| 91在线精品国自产拍蜜月| 欧美一区二区国产精品久久精品| 国产精品日韩av在线免费观看| 亚洲av福利一区| 久久久成人免费电影| 日本-黄色视频高清免费观看| 我的老师免费观看完整版| 成人鲁丝片一二三区免费| 国产一区二区在线av高清观看| 国产成人精品久久久久久| 免费看av在线观看网站| 国产久久久一区二区三区| 联通29元200g的流量卡| 久久鲁丝午夜福利片| 三级国产精品欧美在线观看| av免费观看日本| 久久人人爽人人爽人人片va| 国产一区二区三区av在线| 国产午夜精品久久久久久一区二区三区| 日韩视频在线欧美| 狠狠狠狠99中文字幕| 色综合亚洲欧美另类图片| 女人久久www免费人成看片 | 免费无遮挡裸体视频| 非洲黑人性xxxx精品又粗又长| 国产成人福利小说| 国产亚洲午夜精品一区二区久久 | 18禁在线播放成人免费| 日韩欧美精品v在线| 精品久久久久久成人av| 日日摸夜夜添夜夜爱| 亚洲欧美日韩无卡精品| 国产精品无大码| 91久久精品国产一区二区三区| 国产一区亚洲一区在线观看| 久久久久久国产a免费观看| 乱人视频在线观看| 久久6这里有精品| 插阴视频在线观看视频| 国产成人aa在线观看| 亚洲欧美一区二区三区国产| 国产黄色视频一区二区在线观看 | 国产三级中文精品| eeuss影院久久| 欧美不卡视频在线免费观看| 国产乱人偷精品视频| av在线蜜桃| 欧美日本亚洲视频在线播放| 免费播放大片免费观看视频在线观看 | 女人被狂操c到高潮| 久久精品国产鲁丝片午夜精品| 真实男女啪啪啪动态图| 国产一区有黄有色的免费视频 | 久久精品国产99精品国产亚洲性色| 国产精品国产三级国产专区5o | 免费观看人在逋| 性色avwww在线观看| 建设人人有责人人尽责人人享有的 | 精品欧美国产一区二区三| 亚洲国产成人一精品久久久| 91精品一卡2卡3卡4卡| 国产高清不卡午夜福利| 91av网一区二区| 精品午夜福利在线看| 69av精品久久久久久| 干丝袜人妻中文字幕| 成人午夜精彩视频在线观看| av天堂中文字幕网| 国产一区二区在线观看日韩| 97在线视频观看| 国产精品久久视频播放| 亚洲av一区综合| 日韩成人伦理影院| 久久久久久久久中文| 中文字幕久久专区| 日日摸夜夜添夜夜添av毛片| 伦精品一区二区三区| 一个人看的www免费观看视频| 人人妻人人澡人人爽人人夜夜 | 免费看av在线观看网站| 免费黄网站久久成人精品| 99久国产av精品| 99久久成人亚洲精品观看| 老师上课跳d突然被开到最大视频| 男女那种视频在线观看| 久久精品国产鲁丝片午夜精品| 中文字幕亚洲精品专区| 丝袜喷水一区| 亚洲性久久影院| 美女脱内裤让男人舔精品视频| 免费看a级黄色片| 久久亚洲精品不卡| 97在线视频观看| 一级二级三级毛片免费看| 国产精品爽爽va在线观看网站| 亚洲av成人av| 国产高清国产精品国产三级 | 久久久久网色| 免费看日本二区| 国产探花在线观看一区二区| 国产在线男女| 亚洲欧美成人精品一区二区| 国产精品国产高清国产av| 国产黄片美女视频| 国产亚洲5aaaaa淫片| 亚洲av男天堂| 国产精品日韩av在线免费观看| 国产黄色小视频在线观看| 午夜福利在线观看吧| 久久精品夜色国产| 麻豆乱淫一区二区| av线在线观看网站| 一级爰片在线观看| 久久久精品大字幕| 大香蕉久久网| 在线观看av片永久免费下载| 国产精品av视频在线免费观看| 久久99精品国语久久久| 麻豆久久精品国产亚洲av| 三级男女做爰猛烈吃奶摸视频| 久久99蜜桃精品久久| 日韩成人av中文字幕在线观看| 国产精品国产三级国产专区5o | 我要搜黄色片| 国产精华一区二区三区| 夜夜爽夜夜爽视频| 麻豆成人av视频| 国产探花极品一区二区| 高清在线视频一区二区三区 | 亚洲国产精品sss在线观看| 国产一区二区在线av高清观看| 99久久无色码亚洲精品果冻| 久久久久久久午夜电影| eeuss影院久久| 国产亚洲91精品色在线| 两个人视频免费观看高清| 天美传媒精品一区二区| 国产精品嫩草影院av在线观看| 欧美成人免费av一区二区三区| 中国美白少妇内射xxxbb| 九九在线视频观看精品| 国产精品福利在线免费观看| 国产亚洲91精品色在线| 丰满少妇做爰视频| 国产精品永久免费网站| 亚洲精品,欧美精品| 国产精品久久久久久av不卡| 18+在线观看网站| www日本黄色视频网| 一本久久精品| 国产精品不卡视频一区二区| 少妇被粗大猛烈的视频| 99久久精品国产国产毛片| 联通29元200g的流量卡| 搡女人真爽免费视频火全软件| 亚洲欧美日韩高清专用| 色综合色国产| АⅤ资源中文在线天堂| 99热这里只有是精品在线观看| 成年版毛片免费区| 色综合站精品国产| 观看免费一级毛片| 国产精品国产三级专区第一集| 精品久久久久久久末码| 国产欧美日韩精品一区二区| 26uuu在线亚洲综合色| 好男人在线观看高清免费视频| av在线亚洲专区| 亚洲av男天堂| 99热这里只有是精品在线观看| 国产高清不卡午夜福利| 久久99热这里只频精品6学生 | 少妇被粗大猛烈的视频| 国产精品嫩草影院av在线观看| 国产精品99久久久久久久久| 国产精品三级大全| av在线老鸭窝| 免费播放大片免费观看视频在线观看 | 别揉我奶头 嗯啊视频| 国产乱人视频| av国产久精品久网站免费入址| 久久精品熟女亚洲av麻豆精品 | 免费不卡的大黄色大毛片视频在线观看 | 免费看av在线观看网站| ponron亚洲| 色播亚洲综合网| 免费一级毛片在线播放高清视频| www.色视频.com| 久久精品夜色国产| 一级黄色大片毛片| 国产高清国产精品国产三级 | 丰满乱子伦码专区| av在线老鸭窝| 久久这里只有精品中国| 国产一级毛片在线| 日产精品乱码卡一卡2卡三| 日韩欧美精品免费久久| 成人高潮视频无遮挡免费网站| 天堂√8在线中文| 国产91av在线免费观看| 国产精品无大码| 久久久久网色| .国产精品久久| 国产高清国产精品国产三级 | 亚洲精品国产成人久久av| 色尼玛亚洲综合影院| 神马国产精品三级电影在线观看| 老司机影院成人| 伊人久久精品亚洲午夜| 成年女人永久免费观看视频| 国产成人a区在线观看| 日韩中字成人| 美女高潮的动态| 日本黄色视频三级网站网址| 国产成人a∨麻豆精品| 午夜视频国产福利| 国产精品一区二区三区四区久久| 精品人妻一区二区三区麻豆| 久久精品久久久久久噜噜老黄 | 成人三级黄色视频| 少妇人妻精品综合一区二区| av在线蜜桃| 国产成人a∨麻豆精品| kizo精华| 一级毛片电影观看 | 色噜噜av男人的天堂激情| 水蜜桃什么品种好| 寂寞人妻少妇视频99o| 99国产精品一区二区蜜桃av| 麻豆成人av视频| 变态另类丝袜制服| 天堂网av新在线| 免费播放大片免费观看视频在线观看 | 麻豆一二三区av精品| 亚洲av男天堂| 亚洲av电影不卡..在线观看| 国产精品无大码| 久99久视频精品免费| 精品国产一区二区三区久久久樱花 | 婷婷色av中文字幕| 日产精品乱码卡一卡2卡三| 国产精品熟女久久久久浪| 少妇高潮的动态图| 天美传媒精品一区二区| 国产伦在线观看视频一区| 国产欧美另类精品又又久久亚洲欧美| 中文字幕免费在线视频6| 欧美又色又爽又黄视频| 国产美女午夜福利| 成人亚洲欧美一区二区av| 国产黄色小视频在线观看| 精品久久久久久久人妻蜜臀av| 国产成人91sexporn| 如何舔出高潮| 国产 一区精品| 亚洲人与动物交配视频| 22中文网久久字幕| 亚洲国产精品成人久久小说| 午夜福利在线观看免费完整高清在| 欧美激情在线99| av在线亚洲专区| 亚洲国产欧美人成| 国产欧美日韩精品一区二区| 变态另类丝袜制服| 99热精品在线国产| 天堂√8在线中文| 乱码一卡2卡4卡精品| 国产一区二区在线观看日韩| 国产精品蜜桃在线观看| 亚洲精品日韩av片在线观看| 韩国高清视频一区二区三区| 神马国产精品三级电影在线观看| 热99re8久久精品国产| 寂寞人妻少妇视频99o| 一区二区三区免费毛片| 国产黄片美女视频| 天天躁日日操中文字幕| 国语自产精品视频在线第100页| 日韩成人av中文字幕在线观看| 亚洲国产日韩欧美精品在线观看| 国产亚洲最大av| 午夜精品一区二区三区免费看| 在线观看一区二区三区| 成年av动漫网址| 神马国产精品三级电影在线观看| 精品无人区乱码1区二区| 久久精品91蜜桃| av国产久精品久网站免费入址| 黄色一级大片看看| 色播亚洲综合网| 不卡视频在线观看欧美| 一级二级三级毛片免费看| 少妇的逼水好多| 欧美精品国产亚洲| 亚洲三级黄色毛片| 日本猛色少妇xxxxx猛交久久| 乱码一卡2卡4卡精品| 久久这里只有精品中国| 亚洲国产精品国产精品| 成人国产麻豆网| 国产v大片淫在线免费观看| 久久99精品国语久久久| 啦啦啦啦在线视频资源| 亚洲真实伦在线观看| 亚洲人与动物交配视频| 婷婷色麻豆天堂久久 | 精品久久久久久久久亚洲| 麻豆乱淫一区二区| 亚洲欧美精品专区久久| 免费看日本二区| 亚洲自拍偷在线| 三级国产精品片| 精品人妻偷拍中文字幕| 午夜激情欧美在线| av在线观看视频网站免费| 最近的中文字幕免费完整| 国产爱豆传媒在线观看| 少妇人妻精品综合一区二区| 久久99精品国语久久久| 成人二区视频| 久久精品国产自在天天线| 国产一级毛片在线| 久久精品久久久久久噜噜老黄 | 精品午夜福利在线看| av在线老鸭窝| 天堂√8在线中文| 久久久精品大字幕| 日本猛色少妇xxxxx猛交久久| 精品国内亚洲2022精品成人| 97在线视频观看| a级一级毛片免费在线观看| 国产一区二区在线av高清观看| 国产探花在线观看一区二区| 97在线视频观看| 看片在线看免费视频| 有码 亚洲区| av专区在线播放| 国产一区二区在线av高清观看| 国产探花在线观看一区二区| 久久精品综合一区二区三区| 亚洲精华国产精华液的使用体验| 深爱激情五月婷婷| 黄色配什么色好看| av国产久精品久网站免费入址| 三级男女做爰猛烈吃奶摸视频| 一区二区三区免费毛片| 久久精品91蜜桃| 亚洲四区av| 人妻夜夜爽99麻豆av| 国产老妇伦熟女老妇高清| 身体一侧抽搐| 欧美色视频一区免费| 亚洲精品aⅴ在线观看| 1024手机看黄色片| 天天躁夜夜躁狠狠久久av| 成人av在线播放网站| 天天躁夜夜躁狠狠久久av| 最近的中文字幕免费完整| 波多野结衣高清无吗| 99热6这里只有精品| 蜜臀久久99精品久久宅男| 日本黄色片子视频| 亚洲成人精品中文字幕电影| 欧美成人精品欧美一级黄| 少妇被粗大猛烈的视频| av黄色大香蕉| АⅤ资源中文在线天堂| kizo精华| 两个人视频免费观看高清| 伦理电影大哥的女人| 免费观看性生交大片5| 色综合色国产| 男人的好看免费观看在线视频| 国产午夜福利久久久久久| 精品欧美国产一区二区三| 亚洲精品aⅴ在线观看| 国产美女午夜福利| 亚洲成人精品中文字幕电影| 免费黄网站久久成人精品| 99热网站在线观看| 精品久久久噜噜| 色哟哟·www| 小蜜桃在线观看免费完整版高清| 少妇裸体淫交视频免费看高清| 久久精品国产亚洲av涩爱| 69av精品久久久久久| av天堂中文字幕网| 1024手机看黄色片| 2022亚洲国产成人精品| 中文字幕制服av| 亚洲伊人久久精品综合 | 成人国产麻豆网| av黄色大香蕉| 床上黄色一级片| 小蜜桃在线观看免费完整版高清| 观看美女的网站| 成年版毛片免费区| 一本一本综合久久| 午夜福利在线在线| 亚洲国产成人一精品久久久| 99久久中文字幕三级久久日本| 国产日韩欧美在线精品| 国产精品爽爽va在线观看网站| 亚洲,欧美,日韩| 免费搜索国产男女视频| 精品熟女少妇av免费看| 99热6这里只有精品| 亚洲国产精品sss在线观看| 九九爱精品视频在线观看| 丰满人妻一区二区三区视频av| 国产探花在线观看一区二区| 18禁在线播放成人免费| 国产精品一区二区在线观看99 | 人妻系列 视频| 亚洲精品成人久久久久久| 在线播放国产精品三级| 一边亲一边摸免费视频| 欧美+日韩+精品| 卡戴珊不雅视频在线播放| 亚洲中文字幕日韩| 熟女人妻精品中文字幕| 亚洲精品日韩av片在线观看| 国产成人freesex在线| 日日摸夜夜添夜夜爱| 国产av码专区亚洲av| 精品一区二区三区视频在线| 亚洲欧美精品专区久久| 国产乱人偷精品视频| АⅤ资源中文在线天堂| 熟妇人妻久久中文字幕3abv| 一区二区三区免费毛片| ponron亚洲| 婷婷色av中文字幕| 色吧在线观看| 人人妻人人看人人澡| 日本免费a在线| av福利片在线观看| 亚洲欧美中文字幕日韩二区| 精品人妻视频免费看| 亚洲国产精品久久男人天堂| 99在线人妻在线中文字幕| 日韩成人伦理影院| 国产成人a∨麻豆精品| 大话2 男鬼变身卡| 欧美3d第一页| 高清日韩中文字幕在线| 人人妻人人看人人澡| 成人午夜高清在线视频| 寂寞人妻少妇视频99o| 麻豆乱淫一区二区| 99久久精品热视频| 国产伦精品一区二区三区四那| 超碰av人人做人人爽久久| av天堂中文字幕网| 亚洲人与动物交配视频| 最新中文字幕久久久久| 成人美女网站在线观看视频| 超碰av人人做人人爽久久| 国产高清不卡午夜福利| 午夜激情欧美在线| 亚洲欧美成人综合另类久久久 | 免费观看人在逋| 色网站视频免费| 能在线免费观看的黄片| 五月伊人婷婷丁香| 午夜精品一区二区三区免费看| 一级二级三级毛片免费看| 人人妻人人澡人人爽人人夜夜 | 如何舔出高潮| 免费av毛片视频| 国产又黄又爽又无遮挡在线| 高清日韩中文字幕在线| av黄色大香蕉| 久久这里只有精品中国| 亚洲av不卡在线观看| av国产免费在线观看| 欧美一级a爱片免费观看看| 亚洲精品色激情综合| 国产成人a区在线观看| 免费不卡的大黄色大毛片视频在线观看 | 国产免费视频播放在线视频 | 国产亚洲精品av在线| 看非洲黑人一级黄片| 久久久久久久国产电影| av免费观看日本| 国产在线一区二区三区精 | 亚洲综合精品二区| 中文亚洲av片在线观看爽| 一级毛片我不卡| 夫妻性生交免费视频一级片| 最后的刺客免费高清国语| 欧美日韩一区二区视频在线观看视频在线 | 欧美另类亚洲清纯唯美| 日本午夜av视频| 国产视频内射| 日韩人妻高清精品专区| 国产真实乱freesex| 日韩欧美 国产精品| 久久久久网色| 成人毛片a级毛片在线播放| 国产黄色视频一区二区在线观看 | 最近2019中文字幕mv第一页| 亚洲精品,欧美精品| 久热久热在线精品观看| av国产免费在线观看| 蜜桃久久精品国产亚洲av| 菩萨蛮人人尽说江南好唐韦庄 | 日本黄大片高清| 成人av在线播放网站| 男人舔奶头视频| 欧美丝袜亚洲另类| 中文欧美无线码| 极品教师在线视频| 看非洲黑人一级黄片| av线在线观看网站| 在线免费观看的www视频| 欧美97在线视频| 97在线视频观看| 欧美人与善性xxx| 91在线精品国自产拍蜜月| 国产白丝娇喘喷水9色精品| 97热精品久久久久久| 亚洲在线观看片| 又粗又爽又猛毛片免费看| 国产一区亚洲一区在线观看| 日韩欧美在线乱码| 69人妻影院| 国产成人freesex在线| 一边摸一边抽搐一进一小说| 成人毛片60女人毛片免费| 精品无人区乱码1区二区| 免费观看a级毛片全部| 久久精品国产亚洲av天美| 日韩大片免费观看网站 | 国产在线一区二区三区精 | 又爽又黄无遮挡网站| 日本wwww免费看| 99热精品在线国产| 免费大片18禁| 大香蕉久久网| 欧美成人一区二区免费高清观看| 国产女主播在线喷水免费视频网站 | 美女国产视频在线观看| 国产 一区 欧美 日韩| 久久精品影院6| 色5月婷婷丁香| 国产成人a∨麻豆精品| 成人毛片60女人毛片免费| 麻豆精品久久久久久蜜桃| 久久精品国产自在天天线| 老女人水多毛片| 亚洲欧洲日产国产| 国产午夜精品论理片| 一个人观看的视频www高清免费观看| 欧美日韩一区二区视频在线观看视频在线 | 欧美97在线视频| 我要看日韩黄色一级片| 亚洲最大成人中文| 久久久久九九精品影院| 国产女主播在线喷水免费视频网站 | 淫秽高清视频在线观看| 亚洲在久久综合| 欧美激情在线99| 日韩,欧美,国产一区二区三区 | 午夜福利在线观看免费完整高清在| 少妇人妻精品综合一区二区| 日本色播在线视频| 高清毛片免费看| 国产黄a三级三级三级人| 高清视频免费观看一区二区 | 99在线视频只有这里精品首页| 欧美又色又爽又黄视频| 国产v大片淫在线免费观看| 免费电影在线观看免费观看| 久久这里有精品视频免费| 亚洲欧美日韩卡通动漫| 国产精品一区二区性色av| 久久精品国产99精品国产亚洲性色| eeuss影院久久| 国产日韩欧美在线精品| 91久久精品国产一区二区三区| 不卡视频在线观看欧美| 性色avwww在线观看| 久久热精品热| 亚洲欧美精品综合久久99| 国产私拍福利视频在线观看| 精品久久久久久久人妻蜜臀av| 免费观看性生交大片5| 成年女人看的毛片在线观看|