• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantum Key Distribution Network: Optimal Secret-Key- Aware Routing Method for Trust Relaying

    2018-03-13 06:25:39ChaoYangHongqiZhangJinhaiSu
    China Communications 2018年2期

    Chao Yang*, Hongqi Zhang, Jinhai Su

    Science and Technology Information Research Institute, Zhengzhou, Henan, China

    I. INTRODUCTION

    Quantum key distribution [1] (QKD) technology can provide unconditional security keys for two remote communicating partners on classical network. Through encoding and transmitting information (the secret keys needed to be distributed) by quantum state, the QKD system can establish secret keys between two partners. Because of the inherent characteristics of quantum physics, any eavesdropping on the key can be found by legitimate communication parties [2]. In addition, combined with one-time-pad (OTP) cryptographic algorithm,communicating partners can achieve unconditional security communication by QKD technology. Therefore, QKD technology is considered to be a future secure communication solution for the defense, finance, medical and other fields.

    However, there still are some limits in point-to-point QKD system. Firstly, the quantum key distribution distance is still limited to a certain distance [3], which is far from global scale. Secondly, the quantum key distribution speed is also limited and relatively low[4]. Thirdly, the point-to-point QKD system just can distribute key between two partners,which can’t meet the actual communication requirements of multi-user and networking.

    To overcome these limits, QKD network consisted of multiple point-to-point QKD system become the first choice [5]. So far, many researchers have concentrated on the research of the QKD network, and some small-scale QKD networks have been built to explore this new type network. According to the working principle within the QKD networks, these QKD networks could be divided into two categories: optical-path-switching network [6] and trust-relaying network [7]. The former used optical instruments, such as optical switching and wavelength division multiplexing, to temporary establish a quantum channel for any two users to generate keys. Two testing networks [8, 9] in Anhui, China, built by two groups from China are all examples of optical-path-switching QKD network. The latter used the secret keys generated by multiple intermediate independent point-to-point QKD system to encrypt and transmit the secret keys needed to be distributed, which can achieve secret key sharing between two long distance communicating partners. Since the shared secret keys between the communicating partners were protected and exchanged by multiple intermediate QKD system, this type network was also called “hop-by-hop” network [10].There also are many trust-relaying QKD networks have been built, such as the DARPA network [11, 12], the SECOQC network [13],and the 6-nodes high speed QKD network in Tokyo [14] and so on.

    These previous researches provide many valuable experiences for further studying and building large-scale QKD network, however,all of these previous researches seldom focused on the routing mechanism on the QKD network [15]. As a naturally arising issue when building a practical QKD network, routing problems are worth drawing much more attentions [16].

    As the secret key distribution rate of each point-to-point QKD system in QKD network is limited and relatively low, choosing an optimal path to share secret key for long distance parties is not only important to improve their communication quality but also important to improve the performance of the whole network. However, the structure of QKD network is different from the classical network, so the existing mature routing technologies used in classical network can’t be used in QKD network directly. Therefore, research on the routing mechanism of QKD network is very important to the application and development for QKD network. Q. Han, L. Yu, et.al [17] proposed a Multi-Path Search Algorithm (MPSA)for the routing search of optical-path-switching network through defining the link cost as the propagation loss of photons in the optical fiber. The OSPF protocol [18] was used to calculate the next routing hop in SECOQC network [19]. Yoshimichi Tanizawa, et.al [15]analyzed the routing problems in trust-relaying QKD network in detail and proposed a routing scheme based on OSPF protocol. The method in [15] considered the quantities of secret key associated with each link when calculating the link cost, which improved the quality assurance for the two parties’ communication.However, only considering the quantities of secret key is not enough, which will be analyzed in the following sections in detail. Li M,et.al [20] proposed a stochastic routing algorithm by considering the quantities of secret key and randomly choosing one next hop to relay secret key. This algorithm can increase the security level of key relaying in some extent, but it still cannot cover the shortages of only considering the quantities of secret key like reference [15].

    In this paper, our contributions are focused on these routing issues in trust-relaying QKD network. We analyze the affecting factors for designing a quality assurance routing method on the trust-relaying QKD network and propose a secret-key-aware routing algorithm to search the optimal routing path. The proposed routing method can forecast the residual local key quantity of each QKD link more accurately when search the routing path, and can make all the links work reasonably to achieve loading balance. Since our works are focused on the trust-relaying QKD network, theQKD networkin the rest of this paper specially refers to thetrust relaying QKD network.

    The rest of this paper is organized as follow.Section 2 establishes the QKD network model and gives out some reasonable assumptions for routing design. In section 3, the affecting factors are analyzed and the secret-key-aware routing method is also proposed. The experiments and the evaluation are shown in section 4, and the advantages and effectiveness of the method is also proved. The conclusions are given in section 5.

    II. OUTLINE OF THE QKD NETWORK

    In this section, the working principle is introduced and the structure of QKD network is analyzed at first. Then a QKD network model based on graph theory is proposed and the models of QKD nodes and QKD links are also given out latter. Simultaneously, some reasonable assumptions are made for our routing method.

    2.1 The QKD network model

    The QKD network consists of many independent point-to-point QKD systems based on the classical network, and each point-to-point QKD system continuously generate secret key for two adjacent end nodes. In QKD network,although all nodes are connected with each other in the classical network view, quantum channels just exist between some nodes and each node can only establishes neighbor relationship with the nodes directly connected by quantum channels. Figure 1 shows a topology example of 7-nodes QKD network.

    Each node has two communication channels: classical channel and quantum channel.The classical channel is a virtual link in classical network, as the dotted line shows in figure 1, and its main work is to transmit the network control information, the encrypted information and so on. The quantum channel is established by the fibers between two adjacent nodes, as the solid line shows in figure 1, and its main work is to generate secret key for each QKD system.

    Since the quantum channel is the main concerned target, the QKD network can be represented by an undirected graphG=(V,E),whereVis the vertex set which denotes all the QKD nodes, especially,viis any one of the QKD nodes inV, andEis the edge set which denotes all the QKD links in QKD network, especially,ei,jis any one of the QKD links and represents the quantum channel between nodeviand nodevj.After describing the QKD network structure, it is necessary to clear some concepts related to the QKD network preparing for our following works.

    a. Local Key

    We call the key generated by point-to-point QKD system thelocal key. In QKD network,each point-to-point QKD system always independently and continuously generates local key for the two end nodes, and the two end nodes respectively set a secret key pool, calledlocal key pool, to store the local key. The local key is the materials to establish secret key for users, so the usable local key stored in each local key pool, which is called residual local key, is very important for QKD network. We useKto denote the local key for conveniently describing in the rest paper and, especially,ki,jdenotes the local key generated by the QKD system consisted of QKD linkei,jand nodesviandvj.

    b. Global Key

    Fig. 1. Example of a QKD network.

    As we know, there may be no quantum channel and can’t generate local key for two long distance end nodes. At this time, these two end nodes can only through relaying to establish sharing key under the help of multiple intermediate nodes. The sharing key established through relaying is calledglobal key, and a certain amount of local key need to be consumed to establish it. The global key is the actually secret key used for users’ secure communications, such as voice, video and file transfer. Therefore, the global key can both exist between long distance nodes or adjacent nodes. If two adjacent nodes need global key for secure communication, the local key shared by them are token as the global key directly, otherwise, they must obtain them by the way of multiple intermediate nodes’ relaying.We useGKto denote the global key, and, especially,gks,ddenote the global key between nodevsandvd,

    c. Key Exchange

    The process for nodes obtaining global key is calledkey exchange. Assuming thatv1andv7need to obtain global keygk1,7and the selected relaying path is as the arc arrows shown in figure 1, then, the key exchange can be described as follow. The point-to-point QKD system between nodev1andv2generates local keyk1,2, and then nodev2encryptsk1,2byk24,shared withv4. Nodev2transmits the cipher-text tov4. When receiving the cipher-text,v4firstly decrypt it byk24,to obtaink1,2and encryptk1,2byk4,7. Nodev4also transmits the cipher-text tov7. When receiving the cipher-text fromv4,v7decrypts it and obtainsk1,2which is token as the global keygk1,7. All the cryptographic algorithms used during key exchange are OTP cryptographic algorithms, and all the intermedium nodes are trust in physical.

    Fig. 2. The structure of QKD node.

    d. Relaying Path

    When the global keygks,dis exchanged fromvstovd, there are many intermediate QKD linkspassed through, where the set of intermediate QKD linksps,dis calledrelaying path.

    2.2 The QKD node model

    In this paper, a node structure similar to the QBB node [21] in SECOQC network was adopted in our QKD network. Every QKD node is a computer with multi-QKD device, and it works both as an access point of application and as an intermediate relaying node. Each QKD device in a node is connected to a neighbor node by a QKD link and continuously generates local key. On the other hand, all the nodes are connected to a classical network by classical channels. The QKD node structure is shown as figure 2.

    From the view of QKD network structure,each QKD node can be seen as an aggregation of multiple QKD devices. Since the works of QKD devices are generating local key, and each QKD device corresponds to an independent local key pool, therefore, a QKD nodevican be formulated as follow.

    whereNEis the set of edges that connectviand its neighbor nodes, andSis the set of local key pools, especially,sei,jis the local key pool corresponding to the edgeei,jthat connectedviand its neighborvj, and the value ofsei,jindicates the maximum capacity of that local key pool. The maximum capacity of each pool can be different, but the couple of pools corresponding to the same QKD link must be the same.

    To get a more complete routing mechanism,we make the following simplifying assumptions for QKD nodes’ some works which is not the research focus in this paper.

    Assumption 1:Every QKD node periodically broadcasts the maximum capacity S of all the local key pools within it and the edges NE corresponding to each pool to all the other QKD nodes, and we assume that the period is τ1.

    Assumption 2:When the global key gks,d is relaying from node vi to vj,vi will directly get the local key required from the key pool sei,j.If the quantity of residual local key in sei,j is not enough, vi will regard this relaying as a failure relaying and note the source node about this failure.

    Under assumption 1, every node can get the topology of the QKD network soon, which is important to the routing mechanism. Actually,there is a queue for each local key pool in a node, but the function of the queue is mainly to solve the problem of processing speed lack in each node. Since the generation rate is related low, and we don’t want the relaying process wait too long in a node, we make the assumption 2 to guarantee the delay of key exchange within an acceptable range.

    2.3 The QKD link model

    A QKD link is an independent quantum channel and continually generates local key for the two end nodes all the time, but the local key is randomly consumed by key exchange. The generation rate is a very important parameter for a QKD link as well as the consumption rate and the quantity of residual local key corresponding to this link. So a QKD link can be formulated as follow.

    whereMis the quantity of residual local key corresponding to linkrespectively are average local key generation rate and average consumption rate ofei,j. These three parameters can be obtained by the two end nodes ofviandvj.

    Under assumption 2, only if the residual local keys of all the QKD links within the relaying pathps,dare enough to meet the relaying requirement, the key exchange can be success,which can be formulated as follow.

    where theMrequiredis the quantity of local key required for each QKD link.

    In order to improve the success rate of key exchange, we only search the relaying path within the set of QKD links that satisfies:

    whereThresholdis a threshold of residual local key for each QKD links.

    Therefore, it is very important for each QKD node to be aware of the all the residual local key in QKD network to calculate the routing path, so we make the follow assumption according to requirements proposed in[15].

    Assumption 3:The quantity of residuallocal key Mei,j,average generation rateand average consumption rateof allQKD links ei,j are broadcasts periodically to all the QKD nodes by the two end nodes of ei,j,and we assume that the period is τ2 and τ2<<τ1.

    III. THE PROPOSED ROUTING ALGORITHM

    3.1 Problem analysis

    The purpose of routing mechanism in QKD network is to find out an optimal relaying path for successful key exchange. In [15], the requirements for the routing protocol on the QKD network were proposed, and a protocol based on OSPF was proposed. Compared with OSPF routing algorithm, the only difference is that the routing algorithm used in [15] took the number of the residual local keys as an additional cost information for each link. Although the chosen relaying path is the optimum path for this key exchange round, it may not be the optimum one for the whole QKD network.The analysis is shown as follow.

    As shown in figure 3, there are two possible relaying path fromvstovd, which areThe states of all QKD links are recorded as shown in the figure.We use a certain set of keys, e.g. 1024bit, as the unit of the local key, denoted byunit, then the unit of generation rate and consumption rate can be defined asunit/s.We also assume that there are 9unitglobal keys required to be exchanged. Next, let us look into the follow two scenarios.

    Fig. 3. Example of key exchange scenarios.

    Scenario A:As shown in figure 3(a), inthe states of es,a,ea,b andec,d are the same as es,e,ee,f and eg,d respectively, and there are more residual local key of eb,c than ef,g,but the generation rate of eb,c is lower than ef,g.If the key exchangeoccurs at time t1,we can easily find that

    is the optimal path according to [15], and the state of eb,c changes to eb,c=(2,5,0)after key exchange. At time t1+1the state of eb,c is eb,c=(7,5,9),and assuming that there are another9unit global keys needed to be exchanged from node vs′to vd just right at this time. Because the residual local key of eb,c is not enough, vs′is forced to wait. However, ifvs chooseas the optimal relaying pathat t1,the local keys consumed in ef,g will resumed very soon. At t1+1,even if there are another9unit global keys needed to be exchanged from node vs′to vd,the residual local keys of ef,g will be still enough. There-fore, the relaying pathis not always theoptimal one from vs to vd in view of the whole network performance.

    Scenario B:As shown in figure 3(b), inpath pthe states of es,a,ea,b andec,d are the same as es,e,ee,f and eg,d respectively, and there are more residual local key of eb,c than ef,g,but the generation rate of eb,c is the same as ef,g.For some reasons, the maximum capacities of local key pools in vf and vg are just10unit,which means that the local key pool of ef,g is full, but the capacities of the other QKD links are large enough.Similarly, the pathis select to be theoptimal path according to [15] at t1,and the state of eb,c changes to eb,c=(2,10,0)after key exchange. At t1+1the state of eb,c will be eb,c=(12,10,9),but the state of ef,g will still be ef,g=(10,10,0).If there are another9unit global keys needed to be exchangedfrom node vs to vd at t1+1,the pathtill the optimal one according to [15]. However, since the local key pool of ef,g is full at t1,the local keys generated by ef,g from time t1to t1+1will be abandoned, which is also a waste for the whole QKD network.

    Overall, only considering the residual local key when calculates link cost is not enough to improve the performance of the whole QKD network. So a secret-key-aware routing method is proposed in this paper, which considers more factors, e.g. the generation and consumption rate of QKD link and the local key depletion index of each local key pool. Our method can improve the performance of the whole QKD network.

    3.2 Estimation of residual local key quantity for QKD link

    Because of the generating and consuming,the residual local key quantities of QKD links change all the time, which results that each QKD node is almost impossible to know the residual local key information of all the QKD links immediately. In order to estimate the change tendency of the residual local key more accurately, a dynamic model of the residual local key is proposed in this section.Since QKD nodes update the state of QKD links periodically and the period.isτ2(see assumption 3), we only need to estimate the change tendency within one period cycle.

    3.2.1 Local key generation model

    As we know, there are many factors, e.g. temperature and physical jitter of the fiber, that affect the generation rate of QKD link, so the generation rate changes all the time. If the generation rate ofei,jisμei,j(t) at timet,then the total generating quantity of local key,denoted byin an update cycle can be formulated as:

    Then the average generation rate, denoted byin an update cycle can be formulated as:

    The average generation rate reflects the generation speed ofei,jin a period time, and that is the actually usable parameter to forecast the change tendency of the residual local key.

    3.2.2 Local key consumption model

    Since the local keys required for key exchange are consumed at once when the process of global key relaying passes through a QKD linkei,j(see assumption 2), the total consuming quantity of local key ofei,j, denoted byin an update cycle can be formulated as:

    whereI(t) is an indicator function and is assignedI(t)=1 only when the process of global key relaying passes throughei,j, otherwiseI(t)=0, andR(t) is the local key quantity required for key exchange when the process of global key relaying passes throughei,j.

    Then the average consumption rate, denoted byin an update cycle can be formulated as:

    The same as average generation rate, the average consumption rate is also an important usable parameter that reflects the consumption speed ofei,jin a period time. In order to get a more accurate consumption rate, the statistical time interval can be much longer.

    3.2.3 Local key quantity dynamic model

    When the QKD network working, QKD node can obtains the recent states of all the QKD links by the update message (see assumption 3) before an update cycle starting. Since the quantity of local key is limited by the maximum capacitySei,j, the residual local key ofei,jin an update cycle can be formulated as:

    3.3 The cost of QKD link and relaying path

    The basic idea of our algorithm is to assign a cost to each link, which is an exponential function in its residual local key and then calculate the shortest path with respect to this metric.To account for the timing relationship between the local key generation and consumption, we also need to measure the effect of previously key exchange. To this end, we define the local key depletion indexλei,j(t) for each local key pool.

    The significance ofλei,j(t) lies in providing a normalized priority level for each QKD link according to the empty degree of local key pool, which can prevent wasting local key when the pool is full. As we know the more empty the local key pool is, the lower the priority level is. So from formula (10), we can find thatλei,j(t) is inversely proportional to the priority level ofei,j.

    In this paper, the cost metricassociated with each QKD link is give by:

    whereSei,jis the maximum capacity of the local key pool corresponding tois the last received average generation rate associated withei,j,λei,j(t) is the local key depletion index ofei,j, andεis an appropriately chosen constants. Althoughλei,j(t) has provided a normalized priority level for each QKD link, it is not so clearly to distinguish the priority levels of some similar QKD links since the range ofλei,j(t) is onlySo we use an exponential function to expand the distinction of priority level for each QKD link. As the larger the value ofεis, the faster the value ofελei,j(t)increases, so we can also adjust the weight of the priority level in the cost function by adjusting the value ofε. In our algorithm,the default value ofεisε=10.

    The cost associated with a relaying path can therefore be calculated as:

    Next, let us look at the link cost metric defined in formula (11), and understand intuitively why our routing algorithm has good performance:

    1) Note that the metric in formula (11) for each link is an inversely linear function of the generation rate and an exponential function of the depletion index. So it provides us with a clear guideline of how to balance the importance of residual local key and the generation rate.

    2) Consider the condition that the generation rate of each link is variable while the residual local keys for QKD links are constant and similar with each other as well as the maximum capacity of local pool. By using the cost function in formula (11), the network automatically directs the relaying path to the links with a faster generation rate, since these links with high generation rate will advertise a cheaper cost.

    3) Note that even thoughSei,jis in the numerator in formula (11), it does not imply that links with larger local key pool capacity are assigned a higher cost. The reason is thatSei,jis also embedded in the exponentialλei,j(t).

    3.4 Secret-key-aware routing algorithm

    Searching for an optimal relaying pathps,dfromvstovdin the QKD networkG=(V,E)is to find a relaying path with the cheapest cost. The purpose of our proposed algorithm can be described as follow:

    where all the links in the path must satisfies formula (4), otherwise,vdwill be marked unreachable.

    In order to improve the success rate of key exchange, our algorithm provides not only the optimal relaying path but also some sub-optimal path. The proposed routing algorithm is also based on Dijkstra algorithm [22], and it is described as follow.

    The above algorithm can be explained as follow in detail:

    Step 1:Pre-process the QKD networkGby the formula (4), cut out all the QKD links that do not satisfies formula (4), then a new networkGcuris obtained.

    Step 2: Search for the relaying path with the cheapest cost fromvitovdby Dijkstra algorithm. If successfully finding out this path,record the next hopvnextas well as the cost of the path and then go to step 3, otherwise, go to step 4.

    Step 3:Cut out the QKD link fromvitovnext, then a new networkGcur′ is obtained. Letand go back to step 2.

    Step 4:Put all the next hop tovdin costincreasing order and then the routing table is obtained.

    IV. PERFORMANCE EVALUATION

    4.1 Simulation environment

    The testing of proposed routing scheme is based on the simulation of QKD network. Figure 4 is the topology of the test QKD network.In this network, there are 55 QKD links and 25 QKD nodes including 7 source/destination nodes which can work both as source and destination node of key exchange, and all the QKD nodes are connected to the same classical network.

    Secret-key-aware routing algorithm:At each QKD nodes vi:Pre-process G, obtain Gcur;While(true)Search a cheapest cost relaying path pi,d by Dijkstra algorithm;If (pi,d exist and min ,M Thresholde pei,j> ∈ij id, ,)then record vnext and C t= ′End while Order the next hop in cost- increasing End of algorithmei,j();Else break;Cut out ei,next from Gcur, then obtain Gcur′Let G G cur cur

    In order to contrast our method with the method proposed in [15], both of these two methods are test on the same network shown in figure 4 and all the parameters as set as follow. For both of these two methods, the local key generation rate of each QKD link is randomly generated between 10kps to 20kbps and changes once per second, the maximum capacities of the local key pools associated with each QKD link are 1Mb, and the all initial quantities of local key pools are 300Kb. Perhaps the maximum capacity is a little small,but from the following simulation result, it is already suitable. We adoptτ1=30sas the information updating period of QKD nodes in our method, which is the same as the OSPF protocol. And both of these two methods adoptτ2=5s, a much higher frequency than OSPF protocol according to [15], as the state updating period of QKD links. In addition, we assume that the key exchange requests of each source/destination node are produced by a Poisson distribution and the global key quantity of each key exchange is randomly generated between 10kbit to 20kbit. And we also assume that the destination node of each key exchange is randomly set to be one of the source/destination node except the source node.

    Fig. 5. The success rate of key exchange.

    4.2 Evaluation metrics

    Before implementing the simulation, we define the two metrics to evaluate the performance of these two routing methods.

    ? The success rate of key exchange. This metric is calculated along with the network working. It is a fundamental indicator of a routing method in the sense that it represents the validity and feasibility of a routing method. The higher the value is, the more efficiently the routing method is.

    ? The residual local key and its distribution of residual local key. This metric measures the distribution of the residual local key of all QKD links. The higher the values of all the QKD links are, the more robust the routing method is. In addition, for a better routing method, the residual local key distributes more uniform and the standard deviation is much smaller.

    ? The residual local key change tendency of QKD links. This metric is an indicator of the link ability to relaying global key, and it also represents the robustness of a routing method. For a better routing method, the residual local key of most QKD links should keep increasing all the time or stead un-reducing at least.

    4.3 Results

    Based on the metrics defined above, we mainly measure the values of three aspects: (i) the success rate of key exchange, (ii) the residual local key of all the links and (iii) the change tendency of some randomly choosing links.

    4.3.1 The success rate of key exchange

    We let every source node record every key exchange and the exchange result all the time. All the records are collected together every 10s to calculate the total success rate of the network during the simulating. Then the change of the key exchange success rate for both routing methods under our simulation environment are obtained. The result is shown as the follow figure.

    Figure 5 shows that the key exchange success rates of both methods reduce gradually along with the network working. This result can be explained by the fact that the initial local key of each QKD link is consumed and the key exchange depends on the real time generating local keys gradually. We also find that the success rate of our method is always higher than [15], so we can say that our method performance better than [15] in key exchange success rate.

    4.3.2 The distribution of residual secret key After the network working smoothly, we let every QKD node record the residual local key of all the QKD links connected to this node every 10s. At the end of the simulation, the average of residual secret key can be calculated for every QKD link. The average residual secret key for all the QKD links in our simulation are shown as figure 6.

    From figure 6 we can see that the residual local key of all the QKD links distribute in various quantities for both methods. For the method in [15], the residual key quantities of many QKD links are very high and nearly full,while the rest QKD links are related very low and even less than 100Kb. On the other hand,for our method, there also are some QKD links with very high quantities of the residual key in the network edge position, but the QKD links with residual local key quantities distributing between 150Kb to 400Kb occupy the majority. This phenomenon can be observed much clearer on the statistical distribution charts of residual key, and they are shown as figure 7.

    This result can be explained as follow the fact that the participation frequency (related to the loading balance) of each QKD link is various during key exchange. Obviously, the lower the residual key quantity is, the higher the participation frequency is. So the QKD links participating in key exchange are mainly focus on some of them for the method in[15], while, for our method, all the QKD links participate in key exchange with almost equal opportunity. Therefore, we can say our method performance much better in loading balance.

    4.3.3 The residual local key change tendency of QKD links

    The best way is to record the residual local key of all the QKD links to observe the residual local key change tendency, however, that would make the result figure very complex and difficult to observe. So we just randomly choose some QKD links and record the residual local key of them to achieve that purpose. In this experiment, the QKD nodes of 8, 14 and 19 are chosen to record the residual local key for the QKD links of 17, 36 and 51 respectively every 10s. The results are shown as follow.

    Fig. 6. The average residual local key for all QKD links.

    Fig. 7. The statistical distribution of average residual local key.

    Fig. 8. The change tendency of some QKD links.

    Figure 8 shows that the residual local key quantities of all these QKD links change all the time. For the method in [15], different QKD links have different residual local key change tendency, while, for our method, the residual local key quantities of all these QKD links fluctuate upward and downward around a certain quantity respectively. This result indicates that our method can trade off the local key generation and consumption of QKD links.

    V. CONCLUSIONS

    In this paper we address the routing problem for the trust relaying QKD network. We build the QKD network model as well as the QKD node and link for easily analyzing and understanding this network. Then a secret-keyaware routing algorithm is proposed to search the optimal relaying path. In our algorithm,a dynamic model for the residual local key is proposed to forecast the residual local key quantity of each QKD link more accurately,and the cost of QKD link and relaying path are calculated according to multiple affecting factors, which ensures that our routing method has a good performance. The comparison simulation shows that our routing method can increase the success rate of key exchange, make all the QKD links participate key exchange with almost equal opportunity to achieve load balance and trade off the local key generation and consumption of each QKD link. Therefore, the proposed method can contribute to effectively improve the network overall performance. However, the secret key consumption in the proposed scheme is not analyzed quantitatively and the traffic flow requested in classical network is also not taken into consideration. We intend to research them with a quantitative measure in future work.

    [1] C.H. Bennett, G. Brassard. “Quantum Cryptography: Public Key Distribution and Coin Tossing”,Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing,pp. 175-179, Bangalore, India, 1984.

    [2] W. Ping, G. Chen, K. Pham, et al.. “Quantum key distribution for security guarantees over QoS-driven 3D satellite networks”,SPIE Defense& Security, Vol. 9085, no. 18, pp. 5450-5453,2014.

    [3] S. Wang, et al. “2 GHz Clock Quantum Key Distribution over 260 km of Standard Telecom Fiber”,Optics Letters, Vol. 37, no. 6, pp. 1008-1010, 2012.

    [4] A. J. Shields, A. R. Dixon, et al. “Gigahertz Decoy Quantum Key Distribution with 1 Mbit/s Secure Key Rate”,Optics Express, Vol. 16, no. 23, pp.18790-18797, 2008.

    [5] H. Jiajia, S. H. Sun, and L. M. Liang. “A Three-Node QKD Network Based on a Two-Way QKD System”.Chinese Physics Letters, Vol. 28, no. 4,pp. 40303-40305, 2011.

    [6] P. Toliver, R. J. Runser, T. E. Chapuran, et.al.“Experimental investigation of quantum key distribution through transparent optical switch elements”.IEEE Photonics Technology Letters,Vol. 15, no. 11, pp. 1669-1671, 2003.

    [7] N. Lütkenhausc, R. Romain, et al. “Quantum key distribution and cryptography: a survey”.Dagstuhl Seminar Proceedings, 2010.

    [8] S.Wang, W. Chen, et al. “Field test of wavelength-saving quantum key distribution network”,Optics Letters, Vol. 35, no. 14, pp. 2454-2456, 2010.

    [9] C. Z. Peng, H. Liang, J. Wang, et al. “Metropolitan all-pass and inter-city quantum communication network”.Optics Express, Vol. 18, no. 26, pp.27217-27225, 2010.

    [10] R. Alléaume, et al. “Topological optimization of quantum key distribution networks”.New Journal of Physics, Vol. 11, no. 7, pp. 075002-075027, 2009.

    [11] C. Elliott. “The DARPA Quantum Network”,arX-iv:quant-ph/0412029, 2005.

    [12] C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J.Schlafer, and H. Yeh, “Current status of the DARPA Quantum Network”,SPIE - The International Society for Optical Engineering, Vol. 5815, no. 1,pp. 138-149, March, 2005.

    [13] M. Peev, T. Lorünser, et al. “The SECOQC Quantum Key Distribution Network in Vienna”,New Journal of Physics, Vol. 11, no. 11, pp. 075001-075037 2009.

    [14] M. Fujiwara, H. Ishizuka, S. Miki, T. Yamashita, Z.Wang, et al. “Field test of quantum key distribution in the Tokyo QKD Network”,Optics Express,Vol. 19, no. 11, pp. 10387-10409, 2011.

    [15] Y. Tanizawa, R. Takahashi and A. R. Dixon. “A routing method designed for a Quantum Key Distribution network”,Eighth International Conference on Ubiquitous and Future Networks IEEE,pp.208-214 2016.

    [16] S. Rass, M. A. Sfaxi, S. Ghernaoutihlie, K. Kyamakya. “Secure Message Relay over Networks with QKD-Links”,International Conference on Quantum IEEE Computer Society, pp. 10-15,2008.

    [17] Q. Han, et al. “A novel QKD network routing algorithm based on optical-path-switching”,Journal of Information Hiding & Multimedia Signal Processing, Vol. 5, no. 1, pp. 13-19, 2014.

    [18] J. Moy, “OSPF Version 2”,RFC2328 IETF,Apr.1998.

    [19] M. Dianati, R. Alléaume, M. Gagnaire, X. Shen.“Architecture and protocols of the future European quantum key distribution network”,Security & Communication Networks, Vol. 1, no. 1,pp. 57-74, 2008.

    [20] M. Li, D. Quan, C. Zhu. “Stochastic routing in quantum cryptography communication network based on cognitive resources”,International Conference on Wireless Communications& Signal Processing IEEE, pp. 1-4, 2016.

    [21] O. Maurhart. “QKD networks based on Q3P. Applied Quantum Cryptography”,Springer Berlin Heidelberg, pp. 151-171, 2010.

    [22] E. W. Dijkstra. “A note on two problems in connexion with graphs”,Numerische Mathematik,Vol. 1, no. 1, pp. 269-271, 1959.

    亚洲精品第二区| 大香蕉97超碰在线| 97在线视频观看| 男人添女人高潮全过程视频| 国产乱来视频区| 欧美日韩av久久| 建设人人有责人人尽责人人享有的| 欧美3d第一页| 蜜桃久久精品国产亚洲av| av黄色大香蕉| 在线观看一区二区三区激情| 两个人免费观看高清视频 | 一区在线观看完整版| 国产精品秋霞免费鲁丝片| 高清av免费在线| 天堂8中文在线网| 嫩草影院入口| 熟妇人妻不卡中文字幕| 欧美区成人在线视频| 久久99蜜桃精品久久| √禁漫天堂资源中文www| 少妇猛男粗大的猛烈进出视频| 欧美3d第一页| 国产欧美亚洲国产| 亚洲精品,欧美精品| 97在线视频观看| 久久韩国三级中文字幕| 在线观看一区二区三区激情| 国产在线一区二区三区精| 久久人人爽人人片av| 亚洲精品456在线播放app| 自线自在国产av| 亚洲第一av免费看| 日韩在线高清观看一区二区三区| 久久鲁丝午夜福利片| 欧美区成人在线视频| 亚洲电影在线观看av| 亚洲精品乱码久久久久久按摩| 日韩中字成人| 日韩中文字幕视频在线看片| 色视频在线一区二区三区| 国产在视频线精品| 乱系列少妇在线播放| 亚洲国产毛片av蜜桃av| 日本黄大片高清| 我的女老师完整版在线观看| 亚洲av免费高清在线观看| 中文在线观看免费www的网站| 女性生殖器流出的白浆| 女人精品久久久久毛片| 亚洲国产色片| 国产午夜精品一二区理论片| 亚洲精品乱码久久久久久按摩| 精品久久久久久久久av| 国产乱来视频区| 国产av一区二区精品久久| av.在线天堂| 日本wwww免费看| 啦啦啦中文免费视频观看日本| 另类精品久久| 三级经典国产精品| 爱豆传媒免费全集在线观看| 亚洲欧美一区二区三区国产| 亚洲性久久影院| 国产极品天堂在线| 日本爱情动作片www.在线观看| 建设人人有责人人尽责人人享有的| 在线播放无遮挡| 亚洲精品乱码久久久久久按摩| 精品一区在线观看国产| 性色av一级| 熟女av电影| av在线观看视频网站免费| av天堂久久9| 久久人人爽人人片av| 久久久欧美国产精品| 午夜日本视频在线| av一本久久久久| a 毛片基地| 日韩欧美一区视频在线观看 | 亚洲国产最新在线播放| 精品人妻一区二区三区麻豆| 成人毛片60女人毛片免费| 自拍欧美九色日韩亚洲蝌蚪91 | 在线观看av片永久免费下载| 99九九线精品视频在线观看视频| 亚洲美女搞黄在线观看| 老司机影院毛片| 美女国产视频在线观看| 春色校园在线视频观看| 少妇被粗大的猛进出69影院 | 精品一区二区三卡| 乱码一卡2卡4卡精品| 亚洲内射少妇av| 99久久中文字幕三级久久日本| a级毛片免费高清观看在线播放| 欧美 亚洲 国产 日韩一| 久久99热6这里只有精品| 97在线人人人人妻| 国产精品不卡视频一区二区| 黑丝袜美女国产一区| 91午夜精品亚洲一区二区三区| 成人国产麻豆网| av一本久久久久| 最后的刺客免费高清国语| 日本黄色片子视频| 在线观看人妻少妇| 高清视频免费观看一区二区| 亚洲精品aⅴ在线观看| av又黄又爽大尺度在线免费看| 春色校园在线视频观看| 成人美女网站在线观看视频| 成人亚洲精品一区在线观看| 九九久久精品国产亚洲av麻豆| 一本久久精品| 日韩成人伦理影院| 26uuu在线亚洲综合色| 99九九在线精品视频 | 成人国产麻豆网| 日韩欧美精品免费久久| 国产精品国产av在线观看| 亚洲精品,欧美精品| 一二三四中文在线观看免费高清| 丝袜喷水一区| 街头女战士在线观看网站| 一区二区三区四区激情视频| 免费少妇av软件| 边亲边吃奶的免费视频| 国产成人免费无遮挡视频| 久久精品国产鲁丝片午夜精品| 永久网站在线| 久久97久久精品| 极品少妇高潮喷水抽搐| 高清黄色对白视频在线免费看 | 成人亚洲精品一区在线观看| 亚洲欧洲日产国产| 亚洲美女搞黄在线观看| 亚洲精品亚洲一区二区| 国产黄片视频在线免费观看| 99热这里只有是精品50| 国产精品无大码| 亚洲成人手机| 一级毛片aaaaaa免费看小| 日产精品乱码卡一卡2卡三| av天堂久久9| 99热6这里只有精品| 国产精品一区二区在线不卡| 日本wwww免费看| 偷拍熟女少妇极品色| 免费观看的影片在线观看| 91精品国产九色| 欧美变态另类bdsm刘玥| 交换朋友夫妻互换小说| 噜噜噜噜噜久久久久久91| 最近的中文字幕免费完整| 两个人免费观看高清视频 | 久久99精品国语久久久| 青春草亚洲视频在线观看| 国产老妇伦熟女老妇高清| 又爽又黄a免费视频| 精品熟女少妇av免费看| 美女国产视频在线观看| 99九九在线精品视频 | 国产伦精品一区二区三区视频9| 国产免费一区二区三区四区乱码| 97在线人人人人妻| 老司机影院毛片| 亚洲欧美成人综合另类久久久| 少妇猛男粗大的猛烈进出视频| 亚洲欧美一区二区三区国产| 欧美成人午夜免费资源| 精品少妇黑人巨大在线播放| 国产一区二区三区av在线| 啦啦啦在线观看免费高清www| 99久久综合免费| 高清毛片免费看| 欧美人与善性xxx| 欧美日韩综合久久久久久| 成人国产麻豆网| 国产精品女同一区二区软件| 我要看黄色一级片免费的| 日本黄色片子视频| 日本欧美视频一区| 看十八女毛片水多多多| 一区在线观看完整版| 亚洲精品久久午夜乱码| 欧美 日韩 精品 国产| 久久久久国产网址| 极品人妻少妇av视频| 一本久久精品| 国产日韩欧美在线精品| .国产精品久久| 少妇被粗大猛烈的视频| 啦啦啦视频在线资源免费观看| 国产精品伦人一区二区| 中国美白少妇内射xxxbb| 最黄视频免费看| 一级毛片我不卡| 在线观看免费视频网站a站| av在线观看视频网站免费| 久久韩国三级中文字幕| 欧美一级a爱片免费观看看| av网站免费在线观看视频| 亚洲精品国产色婷婷电影| 纯流量卡能插随身wifi吗| 在线天堂最新版资源| 丰满乱子伦码专区| 久久99热6这里只有精品| 欧美激情国产日韩精品一区| 精品久久久久久久久亚洲| 久久韩国三级中文字幕| av黄色大香蕉| 永久网站在线| 欧美另类一区| 国产69精品久久久久777片| 中文字幕久久专区| 久久女婷五月综合色啪小说| 日本vs欧美在线观看视频 | 夫妻性生交免费视频一级片| 天天躁夜夜躁狠狠久久av| 最近最新中文字幕免费大全7| 老司机亚洲免费影院| av视频免费观看在线观看| 在线观看免费日韩欧美大片 | 精品少妇久久久久久888优播| 亚洲国产精品成人久久小说| 国产91av在线免费观看| 国产白丝娇喘喷水9色精品| 久久免费观看电影| 男女边摸边吃奶| 人人澡人人妻人| a 毛片基地| 久久婷婷青草| 日韩人妻高清精品专区| 国产精品国产三级国产av玫瑰| 久久人人爽av亚洲精品天堂| 亚洲av免费高清在线观看| 日本91视频免费播放| 国产午夜精品一二区理论片| 汤姆久久久久久久影院中文字幕| 日本猛色少妇xxxxx猛交久久| 丰满少妇做爰视频| 久热久热在线精品观看| 日日摸夜夜添夜夜添av毛片| 最黄视频免费看| 99九九在线精品视频 | 男女边吃奶边做爰视频| 王馨瑶露胸无遮挡在线观看| 欧美 日韩 精品 国产| 亚洲国产毛片av蜜桃av| 人人妻人人澡人人爽人人夜夜| 日韩制服骚丝袜av| 成人影院久久| 麻豆乱淫一区二区| 国产高清三级在线| 欧美日韩一区二区视频在线观看视频在线| 欧美日韩视频精品一区| av又黄又爽大尺度在线免费看| 美女内射精品一级片tv| 国产色婷婷99| 男女啪啪激烈高潮av片| 一本色道久久久久久精品综合| 国产高清国产精品国产三级| 国产精品蜜桃在线观看| a级片在线免费高清观看视频| 女性生殖器流出的白浆| 大码成人一级视频| 国产日韩欧美视频二区| 看十八女毛片水多多多| 日韩中文字幕视频在线看片| 少妇 在线观看| 麻豆成人av视频| 国产真实伦视频高清在线观看| 欧美性感艳星| 自线自在国产av| 亚洲电影在线观看av| 成人特级av手机在线观看| 亚洲精品第二区| 人人妻人人爽人人添夜夜欢视频 | 国产一区亚洲一区在线观看| 亚洲婷婷狠狠爱综合网| 国产精品麻豆人妻色哟哟久久| 99re6热这里在线精品视频| 看非洲黑人一级黄片| 婷婷色综合www| 久久久久久久亚洲中文字幕| 亚洲欧美成人精品一区二区| 国产在线免费精品| 国产有黄有色有爽视频| 久久久亚洲精品成人影院| 亚洲精品乱久久久久久| 9色porny在线观看| 精品一区二区三区视频在线| 久久精品国产亚洲网站| 日韩欧美一区视频在线观看 | 亚洲精品成人av观看孕妇| 观看免费一级毛片| 伦理电影大哥的女人| 日本wwww免费看| 美女福利国产在线| 一级爰片在线观看| 伊人亚洲综合成人网| 免费观看性生交大片5| 18禁动态无遮挡网站| 欧美日韩一区二区视频在线观看视频在线| 美女主播在线视频| 国内精品宾馆在线| 欧美精品高潮呻吟av久久| 九草在线视频观看| 久久久久视频综合| 狂野欧美白嫩少妇大欣赏| 久久国产精品男人的天堂亚洲 | 久久国产精品男人的天堂亚洲 | av在线老鸭窝| 三级国产精品欧美在线观看| 日韩大片免费观看网站| 热99国产精品久久久久久7| 久久久国产欧美日韩av| 午夜福利在线观看免费完整高清在| 国产精品免费大片| 亚洲国产欧美日韩在线播放 | 丰满少妇做爰视频| 老熟女久久久| 免费观看在线日韩| 午夜激情久久久久久久| 免费在线观看成人毛片| 97超碰精品成人国产| 免费观看a级毛片全部| 国产综合精华液| 久久久久久久大尺度免费视频| 国产黄片美女视频| 日韩大片免费观看网站| 99久国产av精品国产电影| 一级爰片在线观看| 久久免费观看电影| 人人澡人人妻人| 高清在线视频一区二区三区| 亚洲精品,欧美精品| 一本一本综合久久| 欧美老熟妇乱子伦牲交| 最近最新中文字幕免费大全7| 日日啪夜夜爽| 看十八女毛片水多多多| 日韩强制内射视频| 九九爱精品视频在线观看| 高清午夜精品一区二区三区| 五月玫瑰六月丁香| 一级av片app| 国产精品一区二区在线观看99| 69精品国产乱码久久久| 国产国拍精品亚洲av在线观看| 久久97久久精品| 狂野欧美激情性bbbbbb| 精品少妇黑人巨大在线播放| 国产 一区精品| 亚洲国产最新在线播放| 少妇精品久久久久久久| 欧美精品一区二区大全| 久久6这里有精品| 成人综合一区亚洲| 久久国产乱子免费精品| 在现免费观看毛片| a级片在线免费高清观看视频| 九九久久精品国产亚洲av麻豆| 国产乱来视频区| 日本黄色日本黄色录像| 两个人的视频大全免费| 日韩伦理黄色片| 国产精品人妻久久久影院| 亚洲欧美日韩卡通动漫| 国产 精品1| 一个人免费看片子| 久久久午夜欧美精品| 嫩草影院新地址| 成人美女网站在线观看视频| 日韩熟女老妇一区二区性免费视频| 国产精品三级大全| 极品少妇高潮喷水抽搐| 国产黄频视频在线观看| 日本欧美国产在线视频| 午夜福利,免费看| 午夜久久久在线观看| 亚洲国产精品国产精品| 国内少妇人妻偷人精品xxx网站| 91在线精品国自产拍蜜月| 黑人巨大精品欧美一区二区蜜桃 | 狂野欧美白嫩少妇大欣赏| 久久久国产精品麻豆| 男女国产视频网站| 国产乱人偷精品视频| 亚洲精品日韩在线中文字幕| 一区二区三区免费毛片| 色5月婷婷丁香| 亚州av有码| 极品教师在线视频| 亚洲欧美一区二区三区黑人 | 少妇人妻 视频| 亚洲av免费高清在线观看| 精品少妇黑人巨大在线播放| 国产精品国产三级国产av玫瑰| 中文在线观看免费www的网站| 免费不卡的大黄色大毛片视频在线观看| 午夜影院在线不卡| 一级毛片电影观看| 内射极品少妇av片p| 免费观看无遮挡的男女| 美女脱内裤让男人舔精品视频| 高清欧美精品videossex| 日本免费在线观看一区| 五月天丁香电影| 日韩av不卡免费在线播放| a 毛片基地| freevideosex欧美| 久热久热在线精品观看| www.色视频.com| 国产一区有黄有色的免费视频| 五月玫瑰六月丁香| 免费看不卡的av| 亚洲情色 制服丝袜| 黄色配什么色好看| 国语对白做爰xxxⅹ性视频网站| 全区人妻精品视频| 一区二区三区免费毛片| 大香蕉久久网| 最近中文字幕高清免费大全6| 国产午夜精品一二区理论片| 看非洲黑人一级黄片| 久久精品夜色国产| 欧美日韩一区二区视频在线观看视频在线| 日韩成人av中文字幕在线观看| 熟女av电影| 97在线视频观看| 免费人成在线观看视频色| 性高湖久久久久久久久免费观看| 日本-黄色视频高清免费观看| 国产免费视频播放在线视频| 午夜福利,免费看| √禁漫天堂资源中文www| 热re99久久精品国产66热6| 国产免费福利视频在线观看| 少妇猛男粗大的猛烈进出视频| 久久这里有精品视频免费| 久久久久久伊人网av| 内地一区二区视频在线| 在线看a的网站| 最近手机中文字幕大全| 99视频精品全部免费 在线| 中文字幕av电影在线播放| 国产精品人妻久久久久久| 国产成人免费观看mmmm| 香蕉精品网在线| freevideosex欧美| 性色av一级| 日韩人妻高清精品专区| av女优亚洲男人天堂| 欧美三级亚洲精品| 18禁在线无遮挡免费观看视频| 欧美+日韩+精品| 国产亚洲欧美精品永久| 久久狼人影院| 免费不卡的大黄色大毛片视频在线观看| 日日啪夜夜爽| 极品人妻少妇av视频| 三上悠亚av全集在线观看 | 六月丁香七月| 岛国毛片在线播放| 日本免费在线观看一区| 人体艺术视频欧美日本| 精品国产国语对白av| 欧美日本中文国产一区发布| 一级二级三级毛片免费看| 97超碰精品成人国产| 在线观看国产h片| 国产精品不卡视频一区二区| 亚洲情色 制服丝袜| 日韩在线高清观看一区二区三区| 国产欧美另类精品又又久久亚洲欧美| 高清在线视频一区二区三区| 亚洲熟女精品中文字幕| 91精品国产九色| 日日啪夜夜撸| 人妻系列 视频| 边亲边吃奶的免费视频| 丰满少妇做爰视频| 大话2 男鬼变身卡| 国产成人aa在线观看| 精品久久久精品久久久| 性高湖久久久久久久久免费观看| 我要看日韩黄色一级片| a级一级毛片免费在线观看| 日本猛色少妇xxxxx猛交久久| 97在线人人人人妻| 国产极品天堂在线| 日韩 亚洲 欧美在线| 少妇的逼水好多| 波野结衣二区三区在线| 一区二区三区四区激情视频| 亚洲人成网站在线观看播放| 一本—道久久a久久精品蜜桃钙片| 在线亚洲精品国产二区图片欧美 | a级毛片在线看网站| av女优亚洲男人天堂| 天天操日日干夜夜撸| 国产淫片久久久久久久久| 大话2 男鬼变身卡| 女性被躁到高潮视频| 日韩熟女老妇一区二区性免费视频| 成人毛片60女人毛片免费| 国产精品嫩草影院av在线观看| 欧美三级亚洲精品| 嫩草影院入口| 久久女婷五月综合色啪小说| 黄色毛片三级朝国网站 | 免费av中文字幕在线| av专区在线播放| 国产精品国产三级国产av玫瑰| 内地一区二区视频在线| 美女主播在线视频| 美女视频免费永久观看网站| 3wmmmm亚洲av在线观看| 老熟女久久久| 精品一区二区免费观看| 亚洲精品乱码久久久v下载方式| 国内揄拍国产精品人妻在线| 一级黄片播放器| 最黄视频免费看| 久久人人爽人人片av| 久久久午夜欧美精品| 在线免费观看不下载黄p国产| 亚洲av欧美aⅴ国产| 97精品久久久久久久久久精品| 日本av免费视频播放| 成人二区视频| 国产精品秋霞免费鲁丝片| 中文字幕人妻熟人妻熟丝袜美| 国内揄拍国产精品人妻在线| 99热这里只有精品一区| 精品国产一区二区久久| av线在线观看网站| 国产一区亚洲一区在线观看| 日韩精品免费视频一区二区三区 | 久久久久久久久久久丰满| 久久久久久久久大av| 久久久久久久亚洲中文字幕| 亚洲av福利一区| 精品视频人人做人人爽| 国产一区亚洲一区在线观看| 男女无遮挡免费网站观看| 欧美少妇被猛烈插入视频| 少妇被粗大的猛进出69影院 | 精品视频人人做人人爽| 国产亚洲5aaaaa淫片| 久久97久久精品| 欧美日本中文国产一区发布| 免费观看无遮挡的男女| 免费av不卡在线播放| 99九九在线精品视频 | 国产亚洲午夜精品一区二区久久| 精品亚洲成a人片在线观看| 日韩大片免费观看网站| 国产日韩欧美在线精品| 精品久久久久久久久av| 国产成人午夜福利电影在线观看| 青春草亚洲视频在线观看| 十八禁网站网址无遮挡 | 成人免费观看视频高清| 成人无遮挡网站| 久久99一区二区三区| 午夜激情福利司机影院| 午夜av观看不卡| 免费黄网站久久成人精品| av免费在线看不卡| 日韩精品免费视频一区二区三区 | 久久久精品免费免费高清| 国产视频首页在线观看| 亚洲中文av在线| 久久人人爽人人片av| 一本—道久久a久久精品蜜桃钙片| 十八禁网站网址无遮挡 | 国产一区二区在线观看日韩| 国产在线男女| 春色校园在线视频观看| 3wmmmm亚洲av在线观看| 国产精品国产av在线观看| 春色校园在线视频观看| 少妇被粗大猛烈的视频| 国产成人午夜福利电影在线观看| 一本大道久久a久久精品| 日本午夜av视频| a级一级毛片免费在线观看| 性色avwww在线观看| 免费观看a级毛片全部| a级一级毛片免费在线观看| 最后的刺客免费高清国语| 亚洲精品日韩av片在线观看| 午夜免费观看性视频| 精品久久久精品久久久| 哪个播放器可以免费观看大片| 久热这里只有精品99| 日韩免费高清中文字幕av| 少妇被粗大猛烈的视频| 亚洲精品一二三| 国内精品宾馆在线| 免费播放大片免费观看视频在线观看| 国产成人午夜福利电影在线观看| 欧美 亚洲 国产 日韩一| 免费播放大片免费观看视频在线观看| 日韩在线高清观看一区二区三区| 在现免费观看毛片| 日韩制服骚丝袜av| 久久精品国产亚洲av涩爱| 狂野欧美白嫩少妇大欣赏| 国产精品国产三级国产av玫瑰| 精品酒店卫生间| 久久精品久久久久久久性|