• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robustness analysis metrics for worldwide airport network:A comprehensive study

    2017-11-20 12:06:41SunXiaoqianVolkerGollnickSebastianWanelt
    CHINESE JOURNAL OF AERONAUTICS 2017年2期

    Sun Xiaoqian,Volker Gollnick,Sebastian Wanelt,*

    aSchool of Electronic and Information Engineering,Beihang University,100083 Beijing,China

    bBeijing Key Laboratory for Network-based Cooperative ATM,Beijing 100083,China

    cBeijing Laboratory for General Aviation Technology,Beijing 100083,China

    dInstitute of Air Transportation Systems,German Aerospace Center,Blohmstrasse 18,21079 Hamburg,Germany

    Robustness analysis metrics for worldwide airport network:A comprehensive study

    Sun Xiaoqiana,b,c,Volker Gollnickd,Sebastian Wandelta,b,c,*

    aSchool of Electronic and Information Engineering,Beihang University,100083 Beijing,China

    bBeijing Key Laboratory for Network-based Cooperative ATM,Beijing 100083,China

    cBeijing Laboratory for General Aviation Technology,Beijing 100083,China

    dInstitute of Air Transportation Systems,German Aerospace Center,Blohmstrasse 18,21079 Hamburg,Germany

    Air transportation systems resilience;Airport network;Attacking strategy;Robustness measure

    Robustness of transportation networks is one of the major challenges of the 21st century.This paper investigates the resilience of global air transportation from a complex network point of view,with focus on attacking strategies in the airport network,i.e.,to remove airports from the system and see what could affect the air traffic system from a passenger’s perspective.Specifically,we identify commonalities and differences between several robustness measures and attacking strategies,proposing a novel notion of functional robustness:unaffected passengers with rerouting.We apply twelve attacking strategies to the worldwide airport network with three weights,and evaluate three robustness measures.We find that degree and Bonacich based attacks harm passenger weighted network most.Our evaluation is geared toward a unified view on air transportation network attack and serves as a foundation on how to develop effective mitigation strategies.

    1.Introduction

    Air transportation is one critical network infrastructure for a nation and it is becoming extremely important for public policy considerations.Disruptions of air transportation systems,either due to extreme weather conditions or terrorist attacks,can lead to huge economic losses.The eruption of Eyjafjallajoekull volcano in 2010 caused airline losses of approximately 1.7 billion US dollars and more than 10 million passengers were affected.1An overnight snowstorm on March 12,2013 disrupted the transport across northwestern Europe;in particular,Frankfurt airport was closed and airlines canceled about 700 flights.In order to avoid such high socio-economic costs,it is extremely critical to assess the robustness of air transportation systems against natural or intentional disruptions.

    Complex network theory2provides powerful tools to understand the structures and dynamics of air transportation systems.Airport networks have often been analyzed,where nodes are airports and links exist between two airports if there are flight connections.3–7Several research focused on how delay is propagated in airport networks.8–10Based on fuzzy soft sets,Ref.11evaluated the airport importance and network efficiency with US and China’s airport networks as case studies,and the vulnerability of these two networks was also compared.Ref.12showed that the vast majority of all Intra-European passengers travel direct and the directness of the overall system increased from 2002 to 2012.Ref.13studied the robustness of USairport network,using attacking strategies based on betweenness,closeness,hyperlink induced topic search(HITS),and degree,with giant component as robustness measure.Ref.14studied the resilience of European air transport network against random flight failures,based on a multiplex network formalism,where the set of flights for each airline is considered as an interdependent network.Robustness of Australian network,based on degree,betweenness,strength,and random attacks,with giant component and network reachability robustness measures was investigated.15The worldwide airport network was studied under random attacks as well as degree and betweenness-based attacks with the shortest average path length and giant component as robustness measures.16

    In air transportation networks,random failures correspond to the closure of an airport(node failure)or the cancellation of a flight(link failure)randomly,while targeted attacks correspond to the closure of an airport or the cancellation of a flight based on certain criteria.For instance,Beijing Capital International Airport(PEK)has the largest number of passengers(77531486)in 2013 in the whole world(Data source:http://www.airdi.net).Such hub nodes are critical for the structure of air transportation and they are inherently priorities for targeted attacks.One might think that airline routes are impermanent and links come and go all the time,and therefore robustness analysis is less important for this type of network than for other types of network with a more static structure,e.g.,electricity or road networks.However,it is a long process to establish a new route for an airline.Before setting up a new route,the airline network planning department needs to spend considerable amount of time to analyze the profitability of the new route.17Several factors need to be considered,for instance,market demand forecasting18,19,competitor analysis20,21,aircraft capacity planning,and passenger spill model.22,23Ultimately,the reason for studying the resilience of the system resides in the time frame associated with an attack to an airport.It is true that,if a route is closed(for instance because of adverse weather),alternative solutions can be found fast.Nevertheless,an attack to an airport may have long-term important consequences as in the recent case of 2016 Brussels bombings.It is thus important to prevent such attacks.In this research,we perform a systematic robustness analysis for the worldwide airport network against random failures and targeted attacks,with focus on several attacking strategies and robustness measures.

    Several research on the robustness of the worldwide airport network has been conducted in the past years.Lordan et al.presented a methodology for the detection of critical airports in the worldwide airport network,and the network robustness was measured by the size of giant component.24The airports are isolated based on several node selection criteria,and especially a novel criterion,Bonacich power centrality,has been tested.Wei et al.introduced the flight route addition/deletion problem and compared three different methods to optimize the robustness of the airport network,with algebraic connectivity as the robustness measure;the Virgin America network was used as a case study with the link failure probability as weight.25Wang et al.compared the behavior of two real networks and two synthetic networks under degree based attacks using the size of giant component.26Louzada et al.proposed to reroute a series of flights within certain distances of original destination airports in order to improve the robustness of the worldwide airport network under degree targeted attacks,where robustness is measured by an estimation of the number of stranded passengers in the giant component.27Verma et al.analyzed the resilience of the worldwide airport network and revealed that it is a redundant and resilient network for long distance air travel,otherwise it breaks down completely due to removal of short insignificant connections.28Woolley-Meza et al. investigated the eruption of Eyjafjallajoekull volcano,September 11th terrorist attacks,and geographical disruptions in the worldwide airport network;effective distance was used to quantify the impact of disasters on the network.29Wuellner et al.analyzed the individual structures of seven US largest passenger airline networks and examined the networks’resilience to random/degree/betweenness targeted node deletion.30Lordan et al.also analyzed the robustness of three major airline/alliances route networks.31,32Wei et al.also studied the optimization of the robustness of the airport network,with algebraic connectivity as the robustness measure.33,34The effective distance is based on the idea that a small fraction of traffic is effectively equivalent to a large distance,and vice versa.35The size of giant component and travel cost in the giant component were used to quantify the network performance under various deletion processes.Moreover,the design of a robust hub network has also been studied.36Kotegawa et al.measured the robustness of airline service route network topology under random and targeted disruptions.37Closely related works are summarized in terms of robustness measures,attacking strategies,and network weights in Table 1.

    In this research,which was motivated by the work of Ref.38,we extract data from the Sabre Airport Data Intelligence(ADI)(http://www.airdi.net)to build the worldwide airport network,and an excerpt is shown in Fig.1.Each node is one airport,and the size of a node is proportional to its degree,which is weighted by the number of passengers.In this figure,we only show the links which have more than 100,000 passengers travelling per year.Note that spherical links are not always drawn as the shortest connection,but go through the center of the projected map.We consider the network as directed and weighted;two different weights are used for this study:geographical distances and the number of passengers travelling between two airports.Given a consistent view on the worldwide airport network,the goal of this research is to make clear,through comparison,which attacking strategy harms the network most and which robustness measure is more appropriate for the network under disruptions.

    We are interested in the robustness of air transportation systems under disruption from the function point of view38–41:transferring passengers from their origins to destinations.We use unaffected passengers with rerouting as a baseline measure from the passenger stakeholder’s perspective:if an airport is closed due to convective weather or intentional human disruptions,how many passengers can still make their journeys?We compare ourbaselinemetric to threeother robustness measures:the size of giant component,algebraic connectivity,and survived links.Formal definitions of these robustness measures can be found in Section 2.3.We consider twelve different attacking strategies:targeted attacks based on six network metrics(degree,betweenness,closeness,eigenvector,Bonacich,and damage)in descending and ascending order.

    In our research,we only consider the robustness of the worldwide airport network as single mode transportation,i.e.,passengers are not allowed to take any alternative transportation means,such as buses or trains.We think that it is necessary to understand this single mode case first.Another important reason for this hypothesis is that working with the world network,alternative transportation means are not usually available.For instance,if a passenger has to go from Europe to China and the flight is canceled,a bus is not really an option in this case.Previous research on the robustness of airport networks mainly focused on topological robustness measures,for instance,the size of giant component and algebraic connectivity.Furthermore,a multitude of attacking strategies were proposed based on different network metrics.Given a consistent view on the worldwide airport network(related work techniques were evaluated on largely different datasets),our research aims at presenting an overview of the state-of-theart in single mode air transportation robustness and provides the starting point for future research on the robustness of multi-modal air transportation.

    This paper is organized as follows.Section 2 presents our methodology to assess the robustness of air transportation systems,and German airport network is used as a small running network example to explain our methodology.In Section 3,we present the results of robustness analysis for the whole worldwide airport network.Finally,conclusions are drawn in Section 4.

    Table 1 Summary of related works and proposed approach on robustness of worldwide airport network.

    Fig.1 Worldwide airport network in 2013.

    2.Methodology

    In this section,we describe how airport networks can be attacked.We formally define the notation of weighted networks and the attack on weighted networks in Section 2.1.In Section 2.2,we present several attacking strategies in our attack model.We define a set of appropriate robustness measures in Section 2.3.In each section,we use the German airport network as a running example,since it is helpful to explain our methodology using an example based on a smaller network.We report on our evaluation for the worldwide airport network in Section 3.

    2.1.Attacks on airport networks

    One can distinguish two types of passenger weights:number of passengers from direct flights and number of passengers from flight intentions(OD pairs).The first type is considered from the physical network point of view:the number of passengers travelling between any two airports;passengers with multiple intermediate stops are counted for each connecting airport separately.The latter type is considered from the function point of view:the number of passengers travelling between origin/destination airports;passengers with multiple intermediate stops are not counted for the connecting airports.

    If an airport is closed down,all direct flight connections from/to this airport are directly affected.However,the conclusion that all these passengers will not travel anymore is wrong.In Fig.3,we show a simple example for the German airport network:a passenger travels from HAM to STR,via two connecting airports FRA and MUC.Although this example might look unrealistic,since Lufthansa offers a direct flight from HAM to STR,six passengers booked this kind of travel with Lufthansa in January 2013.We suppose that MUC closes down because of an attack,and then one will conclude from direct flight passenger data that six passengers cannot travel from FRA to MUC and six more passengers cannot travel from MUC to STR.This conclusion is misleading for two reasons.First,the passengers can still travel from HAM to STR(via another direct flight,FRA,or any other scheduled airport connection).Second,if one really wants to assume that these passengers cannot travel anymore,one also needs to remove the six passengers for the flight from HAM to FRA.

    Fig.2 German airport network in January 2013.

    Therefore,in this paper we use the number of passengers from direct flights as the link weight,while we use the unaffected number of passengers from origin-destination pairs as a baseline measure for the robustness of the worldwide airport network.With flight intentions,the unaffected passenger problem boils down to the question whether two airports are still connected via another scheduled flight.

    Fig.3 One example of an origin-destination pair with passengers travelling through two connecting airports.

    In order to design an attack on a network,one can follow different strategies.A very simple strategy is a so-called random attack,where the sequence of removed nodes is chosen randomly.The effectiveness of such an attack(measured in the degradation of the network performance,see below)is usually rather low on average.One heuristic is to select the sequence of removed nodes based on certain network metrics.We discuss such attacks in Section 2.2.

    Intuitively,one can distinguish two types of attacks in a network:strong attacks and weak attacks.Strong attacks refer to attacking important nodes first,while weak attacks refer to attacking unimportant nodes first.Strong attacks often require more knowledge about the targeted network:not only concerning topological properties,but also the traffic.

    2.2.Attacking strategies

    In addition to attacking a network randomly,attacks can also be based on the values of network metrics.In the following,we briefly review six chosen standard network metrics.

    (1)Weighted degree.The degree of a node u is the sum of all weights for the incoming and outgoing links of u.

    (4)Eigenvector centrality.It is the eigenvector of the largest eigenvalue of the adjacency matrix.This metric measures the influence of a node in the network.Nodes with high eigenvector centrality also connect to other nodes which have high eigenvector centrality.

    Each of these metrics can be exploited as a strategy for attacking a network by either removing nodes in the order of descending metric values or ascending metric values.A common practice is,for instance,to attack nodes in decreasing order of degree.The intuition is that nodes with a high degree-often called hubs-are important for the network structure and therefore the removal of high-degree nodes harms the network most.In our study,we provide a complete picture of possibleattacks:randomattacks,strongattacks(descendingvalues of metrics),and weak attacks(ascending values of metrics).

    Table 2 shows the top 10 ranked nodes in the German airport network based on the descending order of the six network metrics.Two different weights are used:geographical distances between two airports and the number of passengers travelling between two airports.All of the metric orders yield a different ranking.Therefore,it is interesting to further investigate which attacking strategy harms the network most.

    ?

    2.3.Robustness measures

    In this section,we use the unaffected passengers with rerouting as a baseline measure for the robustness of air transportation systems.Further,we introduce another robustness measure:survived links.For the purpose of comparison,we also briefly review two existing robustness measures:giant component48and algebraic connectivity.49

    The unaffected passengers with rerouting(UPR)captures how many passengers still can travel when an airport is closed,with the reallocation of the passengers taken into account;this is denoted as dynamic robustness in Ref.50Note that our analysis focuses on the connectivity of the airports:passengers between certain OD pairs can still make their trips as long as the OD airports are connected via other airports from the original schedule.

    The survived links(SL)is the number of remaining connections between airports after an attack on the network.

    Fig.4 Number of passengers versus revenue in worldwide airport network in 2013.

    We generated 1000 complete random attacks for the German airport network.For each of these attacks,we computed the attack traces:robustness measures compared to the percentage of removed nodes during an attack.The results are shown in Fig.5(a).

    In order to visualize the commonalities of these random attacks,e.g.data points which occur frequently and independently of the chosen attack,we show the two-dimensional kernel density estimation for the percentage of removed nodes against the robustness measures in Fig.5(b).White areas indicate infrequent/unused points and darker areas represent commonalities.We draw the following conclusions:

    (1)UPR is the baseline for the robustness measure.It calculates the percentage of passengers who can still travel after an attack took place.The attack traces are widespread.While some attacks are very successful(if important nodes are removed early),under other attacks the network keeps robust(with robustness of 80%)even if 50%of the nodes are removed.The two-dimensional kernel density of UPR shows the commonalities among random attack traces,which can be summarized as follows:(1)if only a few nodes are removed,the network remains robust(dark area in the top-left of the chart)and(2)if more than 60–70%of the nodes are removed,the network’s robustness is very low(dark area in the bottom-right of the chart).Intuitively,this is correct,since for the range between(say 1–70%),the random attacks do not have anything else in common.

    Fig.5 Comparison of robustness measures for 1000 random attacks on German airport network.

    (2)GC-robustness curves are either on or closely below the diagonal line.For most of the time,each attack can reduce the size of giant component of a network by one or zero,depending on whether the removed node was in the giant component before.Note that there are some cases that an attack can reduce the size of giant component more than one.We consider a network composed of two communities and connected by a central node.If that central node is deleted,the size of giant component would be greatly reduced.Since the size of giant component cannot be larger than the number of remaining nodes,the upper-right triangle of the attack trace area is unused.The two-dimensional kernel density suggests that for GC most of the random attacks have very similar properties(black diagonal).This conclusion contradicts the observation from UPR.

    (3)A robustness measure should be monotonically descending.However,AC-robustness is increasing with the number of removed nodes.This shows that AC is inappropriate,if node removal is taken into account.AC was originally proposed as an edge-based robustness measure,where the number of nodes remains unchanged.In our attack scenario,AC yields unusable results.Therefore we will disregard AC below.The other three measures are monotonically descending.

    (4)SL robustness curves are quite similar to UPR robustness curves.Compared to GC,SL also(1)allows to represent attack traces above the diagonal line and(2)does not(wrongly)suggestvery strong commonalities between random attacks.

    3.Results

    When a network is attacked,it is open how to select the order in which the nodes should be removed.48In this study,we apply twelve different attacking strategies to the worldwide airport network with three different weights(unweighted,distance weighted and passenger weighted):removing nodes based on six network metrics(degree,betweenness,closeness,eigenvector,Bonacich and damage)in descending and ascending order separately.We use three robustness measures to detect the decrease of the network performance caused by these attacks.In total we have 108 attacking scenarios(3 weights,12 attacking strategies and 3 robustness measures).We are interested to find out which attacking strategy harms the network most.We introduce the database in Section 3.1.Section 3.2 presents the results of several attacking strategies to the worldwide airport network with different robustness measures.

    3.1.Database

    For the application and analysis of the metrics,recent data from 2013 ADI was obtained.53The OD Market Section in ADI provides the details of the passenger itineraries:the total number of passengers and the total revenue between the origin and destination airports.For each OD pair,up to three connecting airports are recorded.

    From this database,we select the origin and destination airports with at least 72 passengers travelling per year(i.e.,6 passengers travelling per month).Note that there is no standard threshold for the number of passengers or the number of flights between two airports when the airport network is constructed.For instance,Lehner selected the links with at least 600 flights per year(50 flights per month)in the European airport network.38Kotegawa et al.selected the links with at least 365 flights per year(i.e.,airports are required to have an average of at least one operation per day)in the U.S.airport network.54In this study,to our best knowledge,our threshold(72 passengers travelling per year)has the finest granularity.

    We consider the worldwide airport network as directed and weighted;three different weights are used:unweighted,geographical distances,and the number of passengers travelling between two airports.In total,there are 3885 nodes and 228,080 links.The unweighted worldwide airport network has an average path length of 2.946 and an average clustering coefficient of 0.645.These values are comparable with the worldwide airport network constructed in Ref.24:average path length 3.94 and an average clustering coefficient 0.64.On average,there are 11845 passengers per airport connection.The minimum number of passengers is 73 and the maximum is 4418200(CJU:Jeju International Airport,South Korea-GMP:Gimpo International Airport,South Korea).The median number of passengers is 592 and standard deviation is 61986.

    The average values of the six metrics in the worldwide airport network with three different weights are presented in Table 3.Each of these metrics is exploited as a strategy to attack the network.

    3.2.System analysis of robustness for worldwide airport network

    We perform system analysis of the robustness for the worldwideairportnetwork withthreedifferentweights(unweighted,distance weighted and passenger weighted)measured by UPR,GC and SL under attacks,respectively.The comparison of different attacking strategies is presented in Section 3.2.1,while the computational efficiency is compared in Section 3.2.2.

    Table 3 Average values of six metrics in worldwide airport network using different weights with 3885 nodes and 228080 links.

    3.2.1.Comparison of attacking strategies

    Intuitively,one is more interested in strong attacks(descending order of metric values),since they are more harmful to the network than weak attacks(ascending order of metric values).Fig.6 presents the robustness measures(UPR,GC and SL)in the passenger weighted worldwide airport network under strong attacks.When UPR is used as the robustness measure,attacks based on Bonacich power centrality and degree are equally most harmful to the network.Bonacich power centrality is better for the initial phase of an attack(up to 7%of removed nodes)and degree is slightly better when more than 7%of the nodes are removed.With comparable attacking effectiveness,the computation of degree is 1–2 orders of magnitude faster than the computation of Bonacich.Since the computation time is often the bottle-neck for large-scale networks,degree is a very good candidate for an effective and lightweight attacking strategy,especially in the case of interactive attacks on large-scale networks.

    On the other hand,the attack based on closeness is least harmful to the network.One explanation is that closeness of a node is the reciprocal of the sum of the shortest path distances from this node to all other nodes in the network,and since we use the number of passengers as link weight in the shortest path calculation,the closeness metric might become less meaningful.Regarding GC and SL,Bonacich power centrality is slightly better than degree,while eigenvector is the worst attacking strategy.

    Note that there may be no ‘best” robustness measure or‘best” attacking strategy,and results may depend on the objective of a study.The objective of our study is to evaluate the robustness of air transportation systems from passengers’perspective,and we propose to use the unaffected passengers with rerouting as a baseline measure.In opposition to graphtheoretic metrics,this measure directly expresses the impact of airport failure on the traffic-not on(theoretical)properties of the graph.

    In order to further investigate the correlation between UPR and other robustness measures,Fig.7 plots the robustness values of UPR against SL and GC for all six network metrics.The dashed diagonal grey line represents perfect correlation;the red line shows the dependency between pairs of robustness measures.The overlapping of the two curves indicates strong similarity between two robustness measures.We can observe that UPR and GC are least similar;SL is closer to the diagonal line and it is more similar to UPR than GC.

    Table 4 presents the most successful targeted attacks based on node degree,where the first 40 attacked nodes(out of 3885 nodes,less than 1.1%)are listed.These attacks reduce the robustness of the network from 100%down to 50%,i.e.,50%of the passengers cannot travel any more although rerouting is enabled.The first attacked node is PEK,and PEK has the highest weighted degree in the passenger weighted worldwide airport network.Among 3885 airports,when we use the attacking strategy based on weighted degree,one only needs to attack 11 nodes(out of 3885 nodes,less than 0.3%),and then the performance of the network can be degraded to 80%.Especially,there are 7 Asian airports among these 11 attacked nodes.This shows the importance of Asia for the functioning of global air transportation systems.

    Fig.6 Cross-comparison among three robustness measures(UPR,GC and SL)in passenger weighted worldwide airport network with targeted attacks based on descending order of six network metrics.

    Fig.7 UPR versus robustness measures(GC and SL)in worldwide airport network with number of passengers as weight.

    3.2.2.Comparison of computational efficiency

    During our experiments,we noticed that the computation time of attacking strategies was rather different ranging from seconds,minutes to hours.Our initial hypothesis was that longer computation time might generate more effective attacking results.Therefore,we compare the computational efficiency of different attacking strategies and robustness measures.The run time for computing the attacking strategies is shown in Fig.8,while the run time for evaluating the robustness measures is shown in Fig.9.Note that different scales(seconds,minutes and hours)are used for measuring run time.Computing degree and eigenvector takes only a few seconds,while computing betweenness,closeness and Bonacich takes up to several minutes.The run time for SL is less than 0.2 s.The slowest attacking strategy(computation-wise)is damage,which takes up to three complete days when applied to the initial worldwide network.

    In our 108 attacking scenarios,damage did not provide an effective attacking performance,although it took the longest time to compute.We think this counter-intuitive finding should draw more attention.Especially in the context of interactive simulations with larger networks,e.g.,what happens in case of any change to the network(node/link addition/deletion25),the computational time required for finding interesting(harming)attacks becomes more important.

    On the other hand,calculating UPR is the most timeconsuming operation.For the initial network,it takes 3–4 s to evaluate the robustness.The more nodes are removed,the much time is spent on the rerouting process(up to ten seconds).Only when few nodes are left,the rerouting process speeds up recognizably and the run time decreases.Evaluating GC takes three seconds for the initial network and the run timeis decreased when more nodes are removed(because less nodes have to be analyzed for finding the giant component).The fastest robustness measure is SL,which is 1–2 orders of magnitude faster than the other two measures.This is an interesting property in the case of interactive attacks in future research.

    Table 4 Description of the most successful targeted attack based on node degree to worldwide airport network with number of passengers as weight.

    Fig.8 Run time for computing attacking strategies regarding six network metrics.

    Fig.9 Run time for three different robustness measures when partial attacks are executed on worldwide network.

    4.Conclusions

    The safety and reliability of complex air transportation systems are vital for the society.In this study,we performed system analysis for the robustness of air transportation systems,with unaffected passengers with rerouting as a baseline measure.Given the most complete dataset available,we identify commonalities and differences between several robustness measures and attacking strategies for the worldwide airport network.The contributions of the paper are as follows:

    (1)We applied twelve different attacking strategies(degree,betweenness,closeness,eigenvector,Bonacich and damage in ascending and descending order)to the worldwide airport network with three different weights(unweighted,distance and passenger)and evaluated three different robustness measures(UPR,GC and SL).All experiments were evaluated on the same dataset and give a consistent view on attacking airport networks.In total,we investigated 108 attacking scenarios.

    (2)We find that GC is a rather bad robustness measure,since(1)it cannot represent weak attacks appropriately,and (2)it overestimates robustness for very strong attacks.SL is an alternative which solves(1),and reduces the effects of(2)).Furthermore,SL is 1–2 orders of magnitude faster to compute than GC,which is an interesting property in the case of interactive attacks.

    (3)The attacking strategies:degree and Bonacich are the best methods for attacking the worldwide airport network with passenger weights using UPR.Bonacich is better for the initial phase of an attack(up to 7%of removed nodes)and degree is slightly better when more than 7%of the nodes are removed.With comparable attacking effectiveness,the computation of degree is 1–2 orders of magnitude faster than the computation of Bonacich.Since the computation time is often the bottle-neck for large-scale networks,degree is a very good candidate for an effective and lightweight attacking strategy,especially in the case of interactive attacks on large-scale networks.Furthermore,closeness is the worst strategy for the robustness measure UPR.For GC/SL,Bonacich is slightly better than degree.Eigenvector is the worst attacking strategy.In our experiments,damage took the longest time to compute,but did not provide effective attacking performance.

    (4)Our analysis shows that knowledge of an attacker significantly influences the effectiveness of attacking strategies.When the attacker is aware of the number of passengers travelling on routes(passenger-weighted network),the attack is more successful than that conducted by less informed attacker(unweighted or distanceweighted network).

    (5)We analyze the computational resources required for each attacking technique on the same airport network.While these resources are often neglected in related work,we show that the time to compute an attack is sometimes orders of magnitude faster/slower,while providing similar results.Given that many graph problems are not efficiently solvable,i.e.solutions do not scale up with the size of the graph,we advocate the use of simple,yet efficient attacking strategies for future robustness analysis of air transportation networks.41In particular,running interactive robustness analysis on large networks is only feasible with short response time,if the attacking strategies can be computed efficiently.

    In this study,we analyzed the robustness of the worldwide airport network under node random failure and targeted attacks with several attacking strategies and robustness measures.Our research provides a unified view on attacking air transportation networks and serves as a starting point to further explore effective mitigation strategies to defend against disruptions.55,56

    In the following,we discuss some limitations of our initial study,which can be addressed in future work.(1)While our research focused on static attack generators,in practice,attacks can also have a dynamic nature.Thus,future work should take into account the iterative calculation of metric values:after each single-node attack to a network,the network metric is recomputed for the remaining nodes and the node with the highest/lowest value is removed next,since it was shown that this recalculation of metrics can be more effective than the pre-computation of a static attack.48(2)One assumption of our study is that intentional failures in airports can happen all over the world,which is impossible to coordinate in practice,if many airports have to be affected.Therefore,future research could investigate other attacking scenarios,where local regions are affected,instead of widely distributed nodes.(3)Similarly,we neglect the effect of regional airport system,where multiple airports serve the same metropolitan regions.We did not consider the case of multi-modal transportation in a sense that passengers could connect to other airports by other means of transportation,e.g.,using train or bus connections.We would like to address this problem in future work.(4)Furthermore,our analysis relied on the connectivity of the airports:passengers between certain OD pairs can still make their trips as long as the OD airports are connected via other airports from the original schedule.Capacity constraints should be taken into account in future work.(5)Rerouting passengers after a global air transport failure assumes that all passengers still want to travel.Experiences with past terrorist attacks indicate that the passengers often cancel their travel plans.Analyzing and modeling such psychological effects can further help to understand and improve the robustness of the network.

    Acknowledgements

    This study was supported by the National Natural Science Foundation of China(Nos.61650110516,61601013 and 61521091).The authors would like to thank Sabre Airport Data Intelligence(ADI)and German Aerospace Center(DLR)for providing the data in this study.The authors would like to particularly acknowledge Klaus Luetjens and Niclas Dzikus for providing us with the way to download the data from ADI.The authors also thank Stephan Lehner for the initial discussion on robustness in air transportation systems.

    1.Wilkinson SM,Dunn S,Ma S.The vulnerability of the European air traffic network to spatial hazards.Nat Hazards2012;60(3):1027–36.

    2.Newman M.Networks-an Introduction.Oxford:Oxford University Press;2010.

    3.Sun XQ,Wandelt S,Linke F.Temporal evolution analysis of the European air transportation system air navigation route network and airport network.Transportmetrica B2015;3(2):153–68.

    4.Zanin M,Lillo F.Modelling the air transport with complex networks:a short review.Eur Phys J Special Top2013;215(1):5–21.

    5.Sun XQ,Wandelt S.Network similarity analysis of air navigation route systems.Transport Res E-Log2014;70:416–34.

    6.Wandelt S,Sun XQ.Evolution of the international air transportation country network from 2002 to 2013.Transport Res ELog2015;82:55–78.

    7.Cong W,Hu M,Dong B,Wang Y,Feng C.Empirical analysis of airport network and critical airports.Chin J Aeronaut2016;29(2):512–9.

    8.Fleurquin P,Ramasco J,Eguiluz V.Data-driven modeling of systemic delay propagation under severe meteorological conditions.Tenth USA/Europe air traffic management research and development seminar;2013.p.1–10.

    9.Baumgarten P,Malina R,Lange A.The impact of hubbing concentration on flight delays within airline networks:An empirical analysis of the(US)domestic market.Transport Res E-Log2014;66(1):103–14.

    10.Zou B,Hansen M.Flight delay impact on airfare and flight frequency:A comprehensive assessment.Transport Res E-Log2014;69(3):54–74.

    11.Li S,Xu X.Vulnerability analysis for airport networks based on fuzzy soft sets:from the structural and functional perspective.Chin J Aeronaut2015;28(3):780–8.

    12.Lehner S,Koelker K,Luetjens K.Evaluating temporal integration of European air transport.29th Congress of the international council of the aeronautical sciences(ICAS);2014 Sep 7–12;St.Petersburg,Russia.2014.p.1–10.

    13.Yang Y,Li Z,Chen Y,Zhang X,Wang S.Improving the robustness of complex networks with preserving community structure.PLoS One2015;10(2):e0116551.

    14.Cardillo A,Zanin M,Gomez-Gardenes J,Romance M,Garcia del Amo AJ,Boccaletti S.Modelling the multi-layer nature of the European air transport network:resilience and passengers rescheduling under random failures.Eur Phys J Special Top2013;215(1):23–33.

    15.Hossain M,Alam S,Rees T,Abbass H.Australian airport network robustness analysis:a complex network approach.Australasian Transport Research Forum;2013.p.1–10.

    16.Frohn R.Robustness in the air transportation network.Amsterdam:University of Amsterdam;2012.

    17.Fan TPC,Tan ATL,Geng X.Rapid capacity expansions and failure:a trap for new airline entrants?Transport Res E-Log2014;61(1):176–91.

    18.Airbus.Global market forecast;Toulouse:Airbus Press Room;2014.

    19.Boeing.Current market outlook;Chicago:Boeing;2014.

    20.Adler N,Smilowitz K.Hub-and-spoke network alliances and mergers:price-location competition in the airline industry.Transport Res B-Meth2007;41(4):394–409.

    21.Adler N.Hub-spoke network choice under competition with an application in a hub-and-spoke network.Transport Sci2005;39(1):58–72.

    22.Hsiao CY,Hansen M.A passenger demand model for air transportation in a hub-and-spoke network.Transport Res ELog2011;47(6):1112–25.

    23.Wang DD,Klabjan D,Shebalov S.Attractiveness-based airline network models with emmbedded spill and recapture.J Airline Airport Manage2014;4(1):1–25.

    24.Lordan O,Sallan JM,Simo P,Gonzalez-Prieto D.Robustness of the air transport network.Transport Res E-Log2014;68:155–63.

    25.Wei P,Chen L,Sun D.Algebraic connectivity maximization of an air transportation network.Transport Res E-Log2014;61:13–27.

    26.Wang H,Huang J,Xu X,Xiao Y.Damage attack on complex networks.Physica A2014;408(408):134–48.

    27.Louzada V,Arajo N,Verma T,Daolio F,Hermann H,Tomassini M.Critical cooperation range to improve spatial network robustness.Plos One 2015;10(3):e0118635.

    28.Verma T,Arau′jo NA,Herrmann HJ.Revealinig the structure of the world airline network.Sci Rep2014;4:5638.

    29.Woolley-Meza O,Grady D,Thiemann C,Bagrow JP,Brockmann D.Eyjafjallajo¨kull and 9/11:the impact of large-scale disasters on worldwide mobility.PLoS One2013;8(8):e69829.

    30.Wuellner DR,Roy S,D’Souza RM.Resilience and rewriting of the passenger airline networks in the United States.Phys Rev E2010;82(5):056101.

    31.Lordan O,Sallan JM,Simo P,Gonzalez-Prieto D.Robustness of airline alliance route networks.Commun Nonlinear Sci Numer Simul2015;22(1):587–95.

    32.Lordan O,Sallan JM,Escorihuela N,Gonzalez-Prieto D.Robustness of airline route networks.Physica A2016;445:18–26.

    33.Wei P,Spiers G,Sun D.Algebraic connectivity maximization for air transportation networks.IEEE Trans Intell Transp Syst2014;15(2):685–98.

    34.Wei P,Sun D.Weighted algebraic connectivity:an application to airport transportation network.WorldCongress2011;18(1):13864–9.

    35.Brockmann D,Helbing D.The hidden geometry of complex,network-driven contagion phenomena.Science2013;342(6164):1337–42.

    36.Shahabi M,Unnikrishnan A.Robust hub network design problem.Transport Res E-Log2014;70(C):356–73.

    37.Kotegawa T,Fry D,DeLaurentis D,Puchaty E.Impact of serve network topology on air transportation efficiency.Transp Res Pt C-Emerg Technol2014;40(1):231–50.

    38.Lehner S.Complex networks IV.Berlin,Heidelberg:Springer;2013.

    39.Criado R,Romance M.Handbook of optimization in complex networks,springeroptimizationanditsapplications.New York:Springer;2012.p.3–36.

    40.Lehner S,Gollnick V.Function-structure interdependence of passenger air transportation:Application of a systemic approach.14th AIAA Aviation Technology,Integration,and Operations Conference;2014 June 16–20,Atlanta,USA.Reston:AIAA;2014.

    41.Wandelt S,Sun XQ,Cao XB.Computationally efficient attack design for robustness analysis of air transportation networks.Transportmetrica A2015;11(10):939–66.

    42.Freeman LC.Centrality in social networks conceptual clarification.Soc Networks1978;1(3):215–39.

    43.Brandes U,Fleischer D.Centrality measures based on current flow.Lecture Notes Comput Sci2005;3404:533–44.

    44.Bonacich P.Power and centrality:a family of measures.Am J Soc1987;92(5):1170–82.

    45.Rodan S.Choosing the b parameter when using the Bonacich power measure.J Soc Struct2011;12(4):1–23.

    46.Bonacich P,Rodan S.Comment&response on choosing the ‘b’.J Soc Struct2011;12:1–11.

    47.Latora V,Marchiori M.Vulnerability and protection of critical infrastructures.Phys Rev E2015;71:015103R.

    48.Holme P,Kim BJ,Yoon CN,Han SK.Attack vulnerability of complex networks.Phys Rev E2002;65(2):056109.

    49.Jamakovic A,Van Mieghem P.On the robustness of complex networks by using the algebraic connectivity.NETWORKING 2008 Ad Hoc and sensor networks,wireless networks,next generation internet;2008.p.183–94.

    50.Lordan O,Sallan JM,Simo P.Study of the topology and robustness of airline route networks from the complex network approach:a survey and research agenda.J Transp Geogr2014;37:112–20.

    51.Janson S,Knuth DE,Luczak T,Pittel B.The birth of the giant component.Random Struct Algorithms1993;4(3):231–358.

    52.Fiedler M.Algebraic connectivity of graphs.Czech Math J1973;23(2):298–305.

    53.www.airdi.net.Airport data intelligence(ADI)[Internet].Texas:Sarbre;2013.[cited 2016 June 13].Available from:http://www.airdi.net.

    54.Kotegawa T,DeLaurentis D,Noonan K,Post J.Impact of commercial airline network evolution on the U.S.air transportation system.Ninth USA/Europe air traffic management research and development seminar;2011.

    55.Arnold H,Masad D,Pagani GA,Schmidt J,Stepanova E.Complex networks V.Berlin,Heidelberg:Springer;2014.

    56.Caschili S,Reggiani A,Medda F.Resilience and vulnerability of spatial economic networks.Netw Spat Econ2015;15(2):1–6.

    14 June 2016;revised 9 September 2016;accepted 24 November 2016

    Available online 16 February 2017

    *Corresponding author at:School of Electronic and Information Engineering,Beihang University,100191 Beijing,China.

    E-mail address:wandelt@buaa.edu.cn(S.Wandelt).

    Peer review under responsibility of Editorial Committee of CJA.

    欧美色视频一区免费| 男人和女人高潮做爰伦理| 青春草国产在线视频| 中文字幕久久专区| 亚洲电影在线观看av| 久久精品夜夜夜夜夜久久蜜豆| 一级毛片电影观看 | 99久久人妻综合| 亚洲最大成人中文| 久久久久精品久久久久真实原创| 视频中文字幕在线观看| 韩国av在线不卡| 久久久a久久爽久久v久久| 国产精品一区二区在线观看99 | 美女黄网站色视频| 国产精品熟女久久久久浪| 又爽又黄a免费视频| 国产精品一区二区三区四区免费观看| 99久久中文字幕三级久久日本| 少妇裸体淫交视频免费看高清| 国产黄色视频一区二区在线观看 | 乱人视频在线观看| 亚洲人与动物交配视频| av专区在线播放| 亚洲av日韩在线播放| av免费在线看不卡| 久久国内精品自在自线图片| 亚洲三级黄色毛片| 麻豆久久精品国产亚洲av| 日日撸夜夜添| 亚洲欧美清纯卡通| 一级爰片在线观看| 国产女主播在线喷水免费视频网站 | 亚洲欧美精品自产自拍| 精品久久国产蜜桃| 韩国高清视频一区二区三区| 色5月婷婷丁香| 日韩精品青青久久久久久| 亚洲国产欧美人成| 亚洲一区高清亚洲精品| 色综合色国产| 日韩制服骚丝袜av| 亚洲高清免费不卡视频| 国产精品麻豆人妻色哟哟久久 | 99久久中文字幕三级久久日本| 日韩欧美精品免费久久| 中文字幕久久专区| 只有这里有精品99| 日本av手机在线免费观看| 日本黄色片子视频| 成人高潮视频无遮挡免费网站| 少妇人妻一区二区三区视频| 免费搜索国产男女视频| 高清毛片免费看| 亚洲色图av天堂| 成人国产麻豆网| 99久久无色码亚洲精品果冻| 午夜久久久久精精品| 欧美日韩综合久久久久久| 日本wwww免费看| av视频在线观看入口| 亚洲精品456在线播放app| 亚洲,欧美,日韩| 美女大奶头视频| 午夜亚洲福利在线播放| 免费黄网站久久成人精品| 亚洲色图av天堂| 国产精品av视频在线免费观看| 一二三四中文在线观看免费高清| av在线老鸭窝| 国产三级中文精品| 免费观看人在逋| 久久精品国产99精品国产亚洲性色| 色5月婷婷丁香| 国产 一区精品| 国产黄片视频在线免费观看| videos熟女内射| 熟女电影av网| 日韩强制内射视频| 中文字幕免费在线视频6| 看十八女毛片水多多多| 国产国拍精品亚洲av在线观看| 精品一区二区三区视频在线| 麻豆成人av视频| 91av网一区二区| 一边亲一边摸免费视频| 亚洲婷婷狠狠爱综合网| 大香蕉97超碰在线| 菩萨蛮人人尽说江南好唐韦庄 | 久久久亚洲精品成人影院| 国产国拍精品亚洲av在线观看| 偷拍熟女少妇极品色| 久久久久性生活片| 可以在线观看毛片的网站| 久久久久久久久久久免费av| www日本黄色视频网| 国国产精品蜜臀av免费| 最后的刺客免费高清国语| 啦啦啦啦在线视频资源| 欧美激情国产日韩精品一区| 国产极品天堂在线| 七月丁香在线播放| 免费大片18禁| 2021少妇久久久久久久久久久| 亚洲av电影不卡..在线观看| 亚洲欧美日韩东京热| 纵有疾风起免费观看全集完整版 | 麻豆久久精品国产亚洲av| 亚洲精品乱码久久久久久按摩| 精品国产三级普通话版| 久久久久久大精品| 亚洲va在线va天堂va国产| 桃色一区二区三区在线观看| 夜夜爽夜夜爽视频| 女人久久www免费人成看片 | 免费在线观看成人毛片| 久久久a久久爽久久v久久| 大香蕉久久网| 亚洲国产精品sss在线观看| 一级毛片电影观看 | 久久久久久久久中文| 天堂中文最新版在线下载 | 亚洲成人av在线免费| 亚洲18禁久久av| 日韩 亚洲 欧美在线| 国产亚洲精品av在线| 精华霜和精华液先用哪个| 18禁在线无遮挡免费观看视频| 十八禁国产超污无遮挡网站| 国产av在哪里看| 嫩草影院新地址| 精品久久久久久久久久久久久| 夜夜看夜夜爽夜夜摸| 精品午夜福利在线看| 国产麻豆成人av免费视频| 亚洲av中文字字幕乱码综合| 伦理电影大哥的女人| 亚洲国产精品专区欧美| 亚洲va在线va天堂va国产| 欧美成人精品欧美一级黄| av天堂中文字幕网| 国产视频首页在线观看| 又爽又黄a免费视频| 亚洲精品aⅴ在线观看| 最近视频中文字幕2019在线8| 免费看日本二区| 黄色日韩在线| 男女国产视频网站| 老司机福利观看| 在线a可以看的网站| 99在线人妻在线中文字幕| 麻豆乱淫一区二区| 国产精品1区2区在线观看.| 中文精品一卡2卡3卡4更新| 午夜激情欧美在线| 日韩成人伦理影院| 免费电影在线观看免费观看| 国产69精品久久久久777片| 久久久久久久久久久免费av| 国产亚洲最大av| 午夜精品国产一区二区电影 | 成人综合一区亚洲| 国产一区二区在线观看日韩| 亚洲欧美一区二区三区国产| 国产老妇女一区| 成年女人永久免费观看视频| 亚洲国产成人一精品久久久| 22中文网久久字幕| 六月丁香七月| 尾随美女入室| 日韩大片免费观看网站 | 日本黄大片高清| 国产精品久久久久久精品电影| 国产成人a∨麻豆精品| 晚上一个人看的免费电影| 欧美激情国产日韩精品一区| 黄片wwwwww| 我要搜黄色片| 亚洲av不卡在线观看| 国产精品国产高清国产av| 黄片wwwwww| 亚洲国产精品成人综合色| 国产精品蜜桃在线观看| 伦精品一区二区三区| 永久免费av网站大全| 国产精品av视频在线免费观看| 免费观看性生交大片5| 啦啦啦啦在线视频资源| 亚洲国产日韩欧美精品在线观看| 日韩精品青青久久久久久| 久久久久久国产a免费观看| 久久久久网色| 成人美女网站在线观看视频| 夜夜看夜夜爽夜夜摸| 国产成人免费观看mmmm| 亚洲精品影视一区二区三区av| 久久久久久久国产电影| 一个人看的www免费观看视频| 国产成年人精品一区二区| 久久人人爽人人片av| 人人妻人人澡人人爽人人夜夜 | 日日干狠狠操夜夜爽| 老女人水多毛片| 午夜福利在线在线| 观看美女的网站| 国内精品宾馆在线| 国产精品爽爽va在线观看网站| 六月丁香七月| 亚洲图色成人| 欧美三级亚洲精品| 色吧在线观看| 最后的刺客免费高清国语| 国产亚洲av片在线观看秒播厂 | 中文字幕免费在线视频6| 不卡视频在线观看欧美| 1000部很黄的大片| 日韩三级伦理在线观看| av卡一久久| 精品人妻一区二区三区麻豆| 欧美日韩综合久久久久久| 亚洲av.av天堂| 亚洲综合精品二区| 中文字幕人妻熟人妻熟丝袜美| 一级黄色大片毛片| 免费播放大片免费观看视频在线观看 | 视频中文字幕在线观看| 国产精品蜜桃在线观看| 亚洲经典国产精华液单| 高清av免费在线| 午夜精品国产一区二区电影 | 亚洲欧美成人精品一区二区| 天堂√8在线中文| 老司机福利观看| 国内少妇人妻偷人精品xxx网站| 欧美成人a在线观看| kizo精华| 亚洲国产欧美人成| 国产免费又黄又爽又色| 国产不卡一卡二| 日韩 亚洲 欧美在线| 成人亚洲欧美一区二区av| 美女xxoo啪啪120秒动态图| 久久人妻av系列| 97人妻精品一区二区三区麻豆| 亚洲国产色片| 亚洲成色77777| 国产精品爽爽va在线观看网站| 老师上课跳d突然被开到最大视频| 欧美日本亚洲视频在线播放| 亚洲欧美一区二区三区国产| 人妻夜夜爽99麻豆av| 狠狠狠狠99中文字幕| 久久精品熟女亚洲av麻豆精品 | 国产精品三级大全| 乱码一卡2卡4卡精品| 一区二区三区高清视频在线| 亚洲精品国产成人久久av| 国产人妻一区二区三区在| 国产亚洲精品av在线| 亚洲成人中文字幕在线播放| 免费黄色在线免费观看| 精品国产一区二区三区久久久樱花 | 最近中文字幕2019免费版| 亚洲国产精品专区欧美| 国产精品美女特级片免费视频播放器| 国产激情偷乱视频一区二区| 久久99蜜桃精品久久| 美女xxoo啪啪120秒动态图| 如何舔出高潮| 女人久久www免费人成看片 | 国产成人精品久久久久久| 少妇的逼好多水| 三级国产精品片| 黄色配什么色好看| 久久这里只有精品中国| 禁无遮挡网站| 日韩一区二区视频免费看| 国产av在哪里看| 99久久无色码亚洲精品果冻| 最近最新中文字幕大全电影3| 亚洲国产高清在线一区二区三| 欧美精品国产亚洲| 中文字幕制服av| 蜜臀久久99精品久久宅男| 亚洲av免费高清在线观看| 亚洲色图av天堂| 亚洲av一区综合| 欧美变态另类bdsm刘玥| 国产成年人精品一区二区| 久久精品国产亚洲av天美| 欧美日韩在线观看h| 国产黄色视频一区二区在线观看 | 国产视频内射| 久久久亚洲精品成人影院| 国产亚洲av嫩草精品影院| 国产精品一区二区在线观看99 | 国内精品宾馆在线| 日本黄色视频三级网站网址| 亚洲综合精品二区| 最近中文字幕2019免费版| 亚洲欧美日韩卡通动漫| 伦精品一区二区三区| 成人特级av手机在线观看| 一级爰片在线观看| 亚洲自偷自拍三级| 国产日韩欧美在线精品| 亚洲精品色激情综合| 18禁动态无遮挡网站| 国产极品天堂在线| 日韩一区二区三区影片| 亚洲精品久久久久久婷婷小说 | 亚洲中文字幕日韩| 一本久久精品| 在线天堂最新版资源| 六月丁香七月| 在线观看66精品国产| 两个人视频免费观看高清| 91精品一卡2卡3卡4卡| 麻豆国产97在线/欧美| 国产一区有黄有色的免费视频 | 国产一区二区亚洲精品在线观看| 久久久精品大字幕| 国产高清视频在线观看网站| 亚洲人成网站高清观看| 91av网一区二区| 毛片一级片免费看久久久久| 成年av动漫网址| 老司机影院毛片| 日本猛色少妇xxxxx猛交久久| 韩国高清视频一区二区三区| 村上凉子中文字幕在线| 韩国高清视频一区二区三区| 自拍偷自拍亚洲精品老妇| 欧美xxxx性猛交bbbb| 1000部很黄的大片| 乱系列少妇在线播放| 国产精品一区二区性色av| 日本一二三区视频观看| 国产免费福利视频在线观看| 亚洲国产色片| 男女啪啪激烈高潮av片| 久久人人爽人人片av| 日韩一本色道免费dvd| 好男人在线观看高清免费视频| 插逼视频在线观看| 毛片女人毛片| 国产高潮美女av| 99在线视频只有这里精品首页| 日本-黄色视频高清免费观看| 午夜老司机福利剧场| 波野结衣二区三区在线| 亚洲va在线va天堂va国产| 成人亚洲欧美一区二区av| 亚洲五月天丁香| 欧美不卡视频在线免费观看| 六月丁香七月| 美女脱内裤让男人舔精品视频| 国模一区二区三区四区视频| 波野结衣二区三区在线| 午夜免费激情av| 九九在线视频观看精品| 亚洲va在线va天堂va国产| 插逼视频在线观看| 国产精品熟女久久久久浪| 午夜福利在线观看免费完整高清在| 亚洲综合精品二区| 麻豆久久精品国产亚洲av| 老司机影院成人| 麻豆久久精品国产亚洲av| 国产精品嫩草影院av在线观看| 国内精品美女久久久久久| 精品欧美国产一区二区三| 身体一侧抽搐| 人妻少妇偷人精品九色| 汤姆久久久久久久影院中文字幕 | 亚洲美女搞黄在线观看| www.色视频.com| 级片在线观看| 亚洲国产欧洲综合997久久,| av专区在线播放| 亚洲国产欧美人成| av在线亚洲专区| 超碰av人人做人人爽久久| 亚洲在久久综合| 国产高清有码在线观看视频| 看十八女毛片水多多多| 亚洲欧美清纯卡通| 一区二区三区高清视频在线| 麻豆乱淫一区二区| 哪个播放器可以免费观看大片| 欧美成人精品欧美一级黄| 看非洲黑人一级黄片| 中文字幕免费在线视频6| 草草在线视频免费看| 99久久人妻综合| 亚洲av男天堂| 成人综合一区亚洲| 国产亚洲最大av| 91狼人影院| 在线观看美女被高潮喷水网站| 一个人看视频在线观看www免费| av视频在线观看入口| 看十八女毛片水多多多| 国产精华一区二区三区| 国产爱豆传媒在线观看| 久久精品久久久久久久性| 成人三级黄色视频| 直男gayav资源| 国产私拍福利视频在线观看| 亚洲三级黄色毛片| 我要看日韩黄色一级片| 欧美激情久久久久久爽电影| 国语对白做爰xxxⅹ性视频网站| 永久网站在线| 热99re8久久精品国产| 免费看a级黄色片| 免费看日本二区| 男女下面进入的视频免费午夜| 欧美成人午夜免费资源| 国产欧美另类精品又又久久亚洲欧美| 久久精品熟女亚洲av麻豆精品 | 男女边吃奶边做爰视频| 高清毛片免费看| 日本色播在线视频| 亚洲国产精品成人久久小说| 亚洲中文字幕日韩| 欧美成人a在线观看| 亚洲欧美日韩东京热| 18禁在线播放成人免费| 国产精品电影一区二区三区| 97超视频在线观看视频| 国产av一区在线观看免费| av播播在线观看一区| 午夜免费激情av| 久久久久久久久久久免费av| 我要看日韩黄色一级片| 国产精品电影一区二区三区| 99久久精品热视频| 亚洲一区高清亚洲精品| 人妻夜夜爽99麻豆av| 97热精品久久久久久| www.av在线官网国产| 偷拍熟女少妇极品色| 看片在线看免费视频| 国产成年人精品一区二区| 亚洲国产精品国产精品| 97人妻精品一区二区三区麻豆| 久久久久性生活片| 日韩欧美 国产精品| 18禁裸乳无遮挡免费网站照片| av在线播放精品| 天堂av国产一区二区熟女人妻| 美女黄网站色视频| 直男gayav资源| 日韩精品有码人妻一区| 国产精品伦人一区二区| 2022亚洲国产成人精品| 国产精品一区www在线观看| 人体艺术视频欧美日本| 精品一区二区三区视频在线| 中文欧美无线码| 亚洲图色成人| 有码 亚洲区| 麻豆成人av视频| 亚洲婷婷狠狠爱综合网| 男的添女的下面高潮视频| 日韩一区二区三区影片| 婷婷六月久久综合丁香| 亚洲丝袜综合中文字幕| 最近中文字幕高清免费大全6| 欧美最新免费一区二区三区| 简卡轻食公司| 哪个播放器可以免费观看大片| av黄色大香蕉| 欧美性猛交黑人性爽| 欧美日本视频| 综合色av麻豆| 一级毛片aaaaaa免费看小| 97超视频在线观看视频| 午夜精品国产一区二区电影 | 国产老妇伦熟女老妇高清| 国产真实乱freesex| 日韩av不卡免费在线播放| 国产v大片淫在线免费观看| 国产精品一及| 中文字幕av在线有码专区| 最近中文字幕高清免费大全6| 国产av码专区亚洲av| 热99re8久久精品国产| 少妇被粗大猛烈的视频| 夜夜爽夜夜爽视频| 日韩成人av中文字幕在线观看| 国产老妇女一区| 最近2019中文字幕mv第一页| 久久久久精品久久久久真实原创| 大又大粗又爽又黄少妇毛片口| 免费看美女性在线毛片视频| 在线观看66精品国产| 水蜜桃什么品种好| 亚洲精品成人久久久久久| 国产一区有黄有色的免费视频 | 国模一区二区三区四区视频| 亚洲激情五月婷婷啪啪| 亚洲久久久久久中文字幕| АⅤ资源中文在线天堂| 国产成人freesex在线| 久久久久九九精品影院| 亚洲精品日韩在线中文字幕| 99久久人妻综合| 国国产精品蜜臀av免费| 亚洲色图av天堂| 国产精品一区www在线观看| 欧美日韩精品成人综合77777| 国产成人精品一,二区| 国产精品女同一区二区软件| 在线天堂最新版资源| 麻豆乱淫一区二区| 国产成人免费观看mmmm| 日韩成人伦理影院| 久久久久九九精品影院| 久久99蜜桃精品久久| 老女人水多毛片| 听说在线观看完整版免费高清| 国语自产精品视频在线第100页| 老司机影院成人| 亚洲精品日韩av片在线观看| 夜夜爽夜夜爽视频| 一区二区三区四区激情视频| 精品熟女少妇av免费看| 超碰97精品在线观看| 日韩欧美三级三区| 麻豆成人av视频| 国产亚洲av嫩草精品影院| 91aial.com中文字幕在线观看| 级片在线观看| 久久综合国产亚洲精品| 亚洲中文字幕一区二区三区有码在线看| 成人鲁丝片一二三区免费| 免费不卡的大黄色大毛片视频在线观看 | 亚洲最大成人中文| 国产淫片久久久久久久久| eeuss影院久久| 啦啦啦韩国在线观看视频| 最近中文字幕高清免费大全6| 国产精品一区二区性色av| 晚上一个人看的免费电影| 变态另类丝袜制服| 九草在线视频观看| 日韩 亚洲 欧美在线| 九九久久精品国产亚洲av麻豆| 亚洲人成网站在线观看播放| 亚洲精品影视一区二区三区av| 亚洲av中文av极速乱| 99久久成人亚洲精品观看| 亚洲av电影在线观看一区二区三区 | 国产在线一区二区三区精 | 青春草视频在线免费观看| 岛国在线免费视频观看| 精品人妻偷拍中文字幕| 高清在线视频一区二区三区 | 国产探花在线观看一区二区| 国产免费视频播放在线视频 | 欧美性猛交╳xxx乱大交人| 中文亚洲av片在线观看爽| 日本黄色片子视频| 亚洲熟妇中文字幕五十中出| 欧美不卡视频在线免费观看| 午夜激情欧美在线| 国产精品一及| 两性午夜刺激爽爽歪歪视频在线观看| 久久久色成人| 热99在线观看视频| 人人妻人人看人人澡| 国产在视频线精品| 日本午夜av视频| 成人欧美大片| 欧美xxxx黑人xx丫x性爽| 只有这里有精品99| 国产色婷婷99| 亚洲精品影视一区二区三区av| 亚洲真实伦在线观看| 久久久久久久亚洲中文字幕| 嫩草影院新地址| 精品人妻偷拍中文字幕| 精品人妻一区二区三区麻豆| 日本免费a在线| 国产精品综合久久久久久久免费| 直男gayav资源| 青青草视频在线视频观看| 寂寞人妻少妇视频99o| 中文字幕制服av| 淫秽高清视频在线观看| 亚洲第一区二区三区不卡| 欧美极品一区二区三区四区| 欧美一区二区国产精品久久精品| 熟女电影av网| 女的被弄到高潮叫床怎么办| 淫秽高清视频在线观看| 午夜福利在线观看免费完整高清在| 中文字幕亚洲精品专区| 欧美性猛交黑人性爽| 欧美三级亚洲精品| 中文字幕免费在线视频6| 我要看日韩黄色一级片| 身体一侧抽搐| 国产精品永久免费网站| 一个人免费在线观看电影| 欧美一区二区精品小视频在线| 天堂影院成人在线观看| 精品免费久久久久久久清纯| 亚洲精品自拍成人| 男女那种视频在线观看| 欧美激情在线99| 只有这里有精品99| 免费人成在线观看视频色|