• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical system s

    2018-04-04 03:48:56QinxueLIBugongXUShanbinLIYongguiLIUDelongCUI
    Control Theory and Technology 2018年1期

    Qinxue LI,Bugong XU ,Shanbin LI,Yonggui LIU ,Delong CUI

    1.School of Automation Science and Engineering,South China University of Technology,Guangzhou Guang dong 510640,China;

    2.College of Computer and Electronic Inform ation,Guangdong University of Petrochemical Technology,Maoming Guangdong 525000,China

    1 Introduction

    The design of estimation and control algorithm s or strategies for cyber physical system s(CPS),which is resilient against malicious attacks is a new and hard work in recent years.Many researchers focus on designing the more resilient estimators and controllers[1–4]or attack-detection and identification technology[5,6]to reduce dam age from the attacks,but few researchers pay attention to reconstruction of the transmitted data from the sensors to estimators or from controllers to actuators,which is incomplete data after attacks.

    In general,the measurements from sensors are very important for state estimator and vulnerable to cyber attacks,which can be processed in two ways.The first w ay is that polluted(or corrupted)measurements are all received by state estimator,then anti-attack state estimators are designed elaborately.For example,state recovery technology is achieved by l1/lrdecoder[2],attack reconstruction[7,8]or state reconstruction[9,10],which is similar to the error correction and thus relevant techniques,such as signal separation,fault-tolerant or noise-tolerant state estimator,but all of these researches mentioned above must need the known model of state equation.Inspired by the idea of data reconstruction,we pay attention to the measurement reconstruction under the unknown model of state equation after discarding the polluted measurements.Therefore,discarding the polluted data is the second processing way for measurements,which is similar to remove outliers of data and lends to less and less clean measurements used by state estimator.With the reduction of clean measurements,large estimating errors or failures of the general anti-noise state estimator(such as Kalman,weighted least squares)will appear,hence the measurement reconstruction is necessary to be considered.

    In the case of unknown model of state equation,we focus on the reconstruction of measurements under cyber attacks,which is different from the idea of state reconstruction or resilient state estimator before.If the exchanged or transmitted measurements are reconstructed accurately under the cyber attacks,the design of secure state estimator is not the most important,which is a new idea to solve the security problem under malicious attacks for CPS(for instance,modern power system,namely smart grid[11]).In other words,we do not design the anti-attack state estimator but focus on reconstructing the enough measurements from the incomplete(or residual)clean measurements,including the triggering time of the reconstruction and high precision reconstruction method.Inspired by[12],the indirect and direct methods of state estimation are developed based on compressive sensing(CS),which reduce the burden of communication and data processing.Instead,the CS is draw n to restore the measurements from in complete but clean measurements under the cyber attacks scenario.

    It is very important to design the dictionary matrix for optimal sparse representation for measurements and the measurement matrix of CS.There are three main ways to obtain the dictionary matrix in CS[12–14].The first way is the traditional transformation basis,such as discrete wavelet trans form(DWT)basis[12],which is simple and fast but depends on whether or not the characteristics of the signal are consistent with the characteristics of the basis vectors.The second way is joint dictionary,in which vectors come from different classes of basis[13],whose effect is better than the first one but still not the best sparse representation.Finally,improved sparsity can be achieved by choosing the dictionary for the signals adaptively,that is,dictionary learning[14].For the design of measurement matrix,the Gauss or Bernoulli random matrices are usually proposed[12,15],which have a good effect in the field of image reconstruction before.In this paper several improvements have been done for the CS under the cyber attacks to CPS.

    The approaches and contributions of the paper are summarized as follows:

    ?For the polluted measurements under malicious attacks,the observability analysis is used to decide the time to trigger the reconstruction and the damage level from attacks.The reconstruction of measurements can be triggered as long as the damage level of the attacks makes the system losing observability,which can reduce computational burden.

    ?With unknown model of state equation,the improved CS is applied in reconstruction of measurements against deception attacks for CPS.In particular,the dictionary learning by K-singular value decomposition(KSVD)is proposed to form the over-completed dictionary matrix for the power measurements of power system,which never been adopted before in this field.

    ?Since the irregularity of residual measurements,instead of the traditional Gauss or Bernoulli random matrix,a kind of sampling matrix is designed as the measurement matrix of CS for specific CPS,such as power system,which improves the effect of reconstruction.

    ?A new state estimation strategy against the cyber attacks based on linear model is introduced in this paper,which can improve the resilience of system and is meaningful and different idea from the design of the resilient estimator with the known model of the state equation.

    As the typical CPS,security of the smart grid under malicious attacks is widely concerned.Therefore,we apply our proposed reconstruction method on smart grid(modern power system).The rest of this paper is organized as follow s.In Section 2,the general state estimation Model of power system(Section 2.1)and Gaussian Markov Random Field associated with attack detection and identification(Section 2.2)are introduced,and stealthy deception attacks strategy is described in Section 2.3.The attack detection and identification technology is presented in Section 3.1,which not only can detect the stealthy deception attacks but also identify the attacked nodes of system.Section 3.2 introduce observability analysis,which can decide the time to do the reconstruction and the dam age level from attacks.The reconstruction process of measurements is proposed in Section 3.3,including the design of over-completed dictionary and measurement matrix,in addition,recovery strategy is also chosen.The whole state estimation strategy is summarized in Section 3.4.Finally,in Section 4,qualitative and quantitative analyses of simulation experiments are completed on 6-bus power system to show the effect of our proposed method,and conclusion is seen in Section 5.

    Notation0nmeans a null vector of dimension n,and Indenotes that I is the identity matrix and n is the state dimension.b1∝b2denotes that b1is proportional to b2.For a vector ·,‖·‖0denotes the number of nonzero elements for this vector.‖·‖1and ‖·‖2denotes the 1-norm and 2-norm of the vector ·,respectively.∩ is used to denote the union set.Finally,diag{b3}denotes that the vector b3are diagonal elements of a matrix.

    2 Preliminaries and problem formulation

    The proposed overall framework in this paper is displayed in Fig.1.The parts in the dashed-line box of Fig.1 are our main works,which are also the proposed state estimation strategy and have a great contribution to improve the resilience of the strategy under cyber attacks.

    The state estimation strategy is applied to the power system in this paper,which is a major component of energy management systems(EMS)and relies on the supervisory control and data acquisition(SCADA).This is a process about optimal estimation for the power system state using noisy data from power meters and system para meters on the state estimation model.However,the measurements are collected by SCADA via remote terminal units(RTU),which is prone to the cyber attacks.We consider the stealthy deception attacks that consist of a set of com promised power meters whose readings are altered by the intelligent attacker,which lead to the polluted power measurements of nodes.The general state estimation model of the system and stealthy deception attack strategy is elaborated as follow s,respectively.In addition,the know ledge of a Gaussian Markov random field is introduced,which is the foundation for attack detection and identification method.

    Fig.1 The proposed overall framework.

    2.1 General system model

    The nonlinear measurement model of power system for state estimation(SE)is show n in(1),whose relationship between measurements and states in detail can be found in[16].

    where the state x=(θT,VT)Tdenote the phase angles and magnitudes of the bus voltage,the measurements z∈Rm,and e~N(0,R)is the measurement noise.

    To test the method proposed in this paper,a DC approximation model for the measurement equations(1)is adopted.Specifically,the DC model is obtained by assuming that all branch resistances and shunt elements are neglected.In addition,the bus voltage magnitudes are already known and all equal to 1 p.u.[16,17].With linear correlation between the measurements z and the state x(voltage phase angles θ in this paper),the DC model is given by

    1)If zk=Pij,then

    2)If zk=Pi,then

    w here the voltage phase angles x=θ∈Rn,H is the m easurem ent Jacobian m atrix.Pijis real power flow on line i?j.Piis real power injection at bus i.Niis the set of buses connected to bus i,and Xijdenote that the reactance of branch between nodes i and j.

    2.2 Gaussian Markov random field

    A Gaussian Markov random field(GMRF)[18]is a family whose factor is a finite-dimensional random vector following a Gaussian distribution according to a given graph G=(V,E),with V={1,2,...,n}.The vector of Gaussian random variables X=[x1,x2,...,xn]is considered,where each node i∈V is associated with a scalar Gaussian random variable xi.A probability density function of a GMRF can be parameterized as follows on G:

    w here J is the potential or information matrix,which is a positive-definite symmetric matrix.The sparsity pattern of J corresponds to that of the graph G.More precisely,

    and the vector h is a vertex potential vector.In general,graph G=(V,E)is known as the Markov graph(graphical model)underlying the joint probability distribution fX(x),where the node set V represents random variable set{xi}(voltage phase angle θiin this paper)and the edge set E is defined in order to satisfy the local Markov property.Σ represents covariance matrix for voltage phase angles.

    2.3 Stealthy deception attacks

    It assumes that the attacker can obtain the know ledge of the bus-branch model,and the goal of the attacker is to deceive the traditional bad data detection(BDD)(such as the largest normalized residual,LNR)and state estimator(SE)(such as the weighted least square)[19].The measurements are polluted as follows:

    where za∈Rmis the polluted measurements and a∈Rmis the attack vector.(7)assumes that a is independent of the measurement z in the network.However,(7)is not enough,the cost of attacks is always hoped to be lower.Therefore,the stealthy deception attack a with the minimum cost can be formulated by solving the problem

    Rem ark 1It is noted that the stealth of the(7)in power system have been proved in[20].Based on the(7)and the(8),the attacks should have some functions.First,the attack strategy is designed to ensure that the SE algorithm still converges under attacks.Second,the attacker hopes the estimated measurementis equal to the actual polluted measurementsuch that,which is more stringent for the practical nonlinear power system s,since the stealthy deception attacks is built on DC approximation model.Therefore,the limitations of this linear attack strategy mentioned in[19]should be considered,including varying model matrix H that is acquired by the attacker and saturation limits,which make sure the attack strategy(7)is optimal and stealth under the traditional BDD(LNR)and SE(WLS)for a practical nonlinear system.Therefore,the stealthy deception attacks are coordinated attacks,which need corrupt a set of measurements but not just the target measurements[19].

    Since the attacker is intelligent,we need m ore effective attack detection and identification technologies and state estimation strategies to resist the stealthy deception attacks,which is important for the subsequent supervisory control.

    3 Methodology

    3.1 Attack detection and identification

    The voltage phase angles(θ)in DC model can form a GMRF and argue that their Markov graph is dictated by the structure of pow er grid[18].Therefore,the conditional covariance test CM IT is introduced to learn the structure of the power grid.It should be noted that since the CMIT for structure learning of phase angle data is robust against measurement noise(see[18],Section IIIA),the measurement noise e can be ignored.From(2)and(5),we get

    where xais the vector of phase angles when the system is under attacks.H?1denotes the pseudo-inverse of matrix H.since a is independent on the measurement z,we have the covariance matrix as follows:

    When the attack occurs,the attacker tends to insert non-constant vectors a during some samples,since constant attack vectors could not follow the measurements in change during some samples to satisfy(7),which can be easily detected.Thus Σ(a,a)≠ 0 and

    It is showed that the Markov graph of the voltage angles θ is consistent with the power grid graph under no attack circum stances,but changes once the power grid has been attacked on(11)and(12).Hencea discrepancy between the calculated Markov graph under attacks and learned Markov graph under no attacks should trigger the attack alarm.The attack detection method can detect the stealthy deception attacks in Section 2.3,which is elaborated in[18].

    Moreover,the correlation anomaly metric[21]is used to identify the attacked nodes.As soon as the attack is detected,the anomaly score for each node is computed through differences between the attacked information matrix and the information matrix corresponding to the current topology of the power grid.The nodes with highest anomaly scores are announced as the nodes under attacks.This attack identification technology has been proved to be valid for stealthy deception attacks in Section 2.3[18].

    3.2 Observability analysis

    From the(8),it is easy to see that the attack vector is always sparse.Therefore,discarding few polluted measurements and isolating the attacked parts after attack detection and identification are feasible.However,less and less clean measurements could lend to large estimating errors or failures of the general anti-noise state estimator,which is the time to trigger the reconstruction of measurements.

    This section,the observability analysis of the CPS is used to decide the time to trigger the reconstruction and the damage level from attacks,which is based on orthogonal transformation algorithm,including checking observability,identifying critical measurements,determining observable/unobservable islands.Variable descriptions of observability analysis are shown in Table1.

    Table 1 Variable description about observability analysis.

    The algorithm[22]is presented as follow s:

    Step 1(Initialization) Set matrix W=In,vector U=0n.

    Fori=1:m(m is the dimension of the measurements).

    Step 2Calculate the dot productsj=1,...,n,namely,the dot products of the i throw of matrix H by the j th column of matrix W.

    Step 3If the first no n null valuecorresponding to a null element in position p on vector U is found,which indicate that the column p of Wis pivot,and then the p th component of vector U should be replaced by i.Else there is no such colum n,append i to vector V and vector Tito matrix S and go to Step 5.

    Step 4Update the matrix W.If j=p,W(:,p)=W(:,k=1,...,n.

    Step 5If i=m,end.Otherwise,i=i+1 and jumps to Step 2.

    End

    Step 6If Ucontain sonly one zero element,the state is observable;otherwise,it is not.

    3.3 Reconstruction of measurements

    Reconstruction of measurements is the foundation for state estimation,which can be achieved by CS in the paper.Through the learning of the measurement data under no attacks,the over-completed dictionary is formed to provide prior information for possible triggered reconstruction at any time.There are three steps in the reconstruction process,including design of the over completed dictionary(dictionary learning is proposed),compressive observation(how to design the measurement matrix in CS)and recovery of in completed data(power flow measurements z),where the first two steps are coding procedure and the last step is decoding procedure.The problem can be formulated as follows:recover s from know ledge of

    w here y∈Rm1(m1?m)are residual measurements data.Ψ is m1× m measurement matrix,and Φ is sparse transformation basis or dictionary matrix.As significant coefficient,s contains the representation sparse coefficients of the signal z(z=Φs)that must be a K-sparse vector(K<m1?m).A=ΨΦ is a sensing matrix.It is quite intuitive to recover s from know ledge of y by solving

    However,the fact is that there is certain error in the solution to(14),hence the optimization problem can be rep laced by a simple approximate solution:

    whereεis a very small constant.It should be pointed out that the algorithm s(14)and(15)are NP-hard,therefore,the l0norm is often substituted by the closest convex norm,namely the l1norm[23].Here the problem is equivalent to a much simpler linear programming problem.The measurement signals can be reconstructed by solving the following problem:

    In fact,(16)is equivalent to basis pursuit de-noising(BPDN)[24].In addition,regularized orthogonal matching pursuit(ROMP)[25],sparsity adaptive matching pursuit(SAMP)[26],basis pursuit(BP)and iterative thresholding(IS)[27]are adopted by researchers to completed the reconstruction.

    3.3.1 Design of over-completed dictionary

    From the described above,it is easy to find that the Ψ and Φ have key roles in the whole reconstruction process,especially Φ.Designing or choosing the Φ for optimal sparse representation for data,which is sim ilar to(14)and(15).In other words,the data must be sparse in some transform basis vectors.

    Rem ark 2The design of the dictionary for optimal sparse representation for data is extremely critical.The traditional transformation basis depends on whether or not the characteristics of the signal are consistent with the characteristics of the single basis vector,hence it has great limitation,such as discrete wavelet transform(DWT)basis[12],discrete cosine transform(DCT)[28]and so on.The joint dictionary includes different classes of basis[13],whose effect is better than the single basis but still has the similar problem with the traditional transformation basis.Therefore,im proved sparse representation in dictionary learning is formed adaptively according to the specific characteristics of signal,which has no limitations and is more suitable.

    In this paper,the dictionary learning on K-SVD algorithm is used to obtain the over-completed dictionary,which is generalization of the K-means clustering pro-cess.To better fit the data,the method alternates between sparse coding of the examples based on the current dictionary and a process of updating the dictionary atom s,completing not only the update of the dictionary but the update of the sparse representations,which render convergence[14].The K-SVD algorithm is adaptive and can work with any pursuit methods(e.g.,matching pursuit or basis pursuit).

    Assume that Φ ∈ Rm×Kdenote over-completed dictionary after training.z∈Rmand s∈RKis training samples and corresponding sparse representation coefficient vector.are M sets of training data samples.are M sets of coefficient vector.Thus the dictionary learning process can be represented as an optimization problem:

    where Tmaxis the maximum value of the number of nonzero entries in si.The dictionary learning process is described as follows:

    1)Initialization:there are two ways to initialization dictionary.First one is initialized by giving a traditional transformation basis dictionary(such as the DWT dictionary).The other one is initialized by the training sam p les them selves.

    2)Sparse coding:use any pursuit algorithm(such as BP)to compute the representation vectorsifor each ziby approximating the solution of

    3)Dictionary update:update dictionary Φ after fixed vector si.Denote vector ?kas k th column of Φ.The decomposition form of the sample sets can be expressed as

    Note that ωkis pointing to examples{zi}that use the atom ?k.Define Ωkas M × |ωk|matrix with ones on the(ωk(i),i)th entries and zeros elsewhere.Then there have the definitions as follows:

    where Ekandis shrinkage result by discarding of the zero entries,respectively.indicate a selection of error columns that correspond to examples who use the atom ?k.Thenis decomposed by SVD render thatwhere U and V are two mutually orthogonal matrices and Δ is diagonal matrix:

    Note that σi(i=1,2,...,r)is all nonzero singular value of,and r is the rank of the matrix.

    If Δ(1,1)is the maximum singular value of Δ,and then the atom ?kshould be rep laced by the first column of U.The coefficient vectoris updated by the first column of V multiplied by Δ(1,1),until the update of the atom ?kis finished.If the convergence condition is satisfied or to the maximum number of iterations that indicate a new over-completed dictionary will been done,otherwise go to Step 2).

    3.3.2 Designing measurement matrix and recovery strategy

    Due to the irregularity of in complete measurements or residual measurements,we can not select the traditional Gauss or Bernoulli random matrix as measurement matrix,which are widely used in image processing.In this paper,the sampling matrix Ψ(m1× m)is used as the measurement matrix,which is an under determined matrix.m1?m implies residual character of the measurements.We define that Z is the set of the residual measurements,C is the set of the complete measurements,which is our reconstruction target.i denote that the number of the residual measurements in Z,and j is the position number of the residual measurements in C.We have the sampling matrix Ψ as follows:

    To restore or reconstruct the measurements,the matrix A should meet the following restricted isometry property(RIP)[23]:

    Definition 1(Restricted isometry constant(RIC))For any K-sparse vector s and δk∈ (0,1),A has the RIP of order k such that

    It is noted that the RIC δ is always adopted in stead of the RIP,which is the sm allest value of the δk.

    In order to test the effect of our over-completed dictionary,recovery strategy should not contains only one recovery algorithm.As the last step of the reconstruction,the recovery algorithm in the paper are adopted including several algorithm s,such as BP,BPDN,ROMP,SAMP and iterative soft thresholding(IST),which can prove the universality of the method proposed.Note that the BP,BPDN,ROMP,SAMP and IST have been widely used in the field of image processing,which can be seen in[24–27,29].

    3.4 State estimation strategy

    The w hole state estimation strategy around in the dashed-line box of Fig.1 is presented as follow s:

    Algorithm flow(whole state estimation strategy)

    1)Receive the measurements and attack information(whether or not the nodes are attacked and the set of attacked nodes)from the attack detector(attack detection and identification).

    2)The observability analysis is run according to the measurements.

    3)If the system is observable,the Gauss-New ton’s method[16]is adopted in state estimator,otherwise,the measurements should be reconstructed by our proposed in Section 3.3:First,the over-completed dictionary can be formed by dictionary learning on K-SVD,namely,matrix Φ is obtained.Second,the measurement matrix Ψ is designed according to the actual situation,for instance,the information of attacked nodes.Third,the optimal s?is obtained by solving the problem(16)by the IST,since the effect of IST on data recovery is verified to be the best among the five recovery algorithms in simulation experiments.Finally,the z?can be calculated by(17).

    It should be noted that the whole state estimation strategy is a general solution,although our proposed state estimation strategy is based on linear model.

    4 Simulation experiments

    The IEEE 6-bus power system[30]is considered to investigate the effect of the proposed method,which includes 3 generators,6 buses,8 transmission lines.The measurement configuration of a6-bus powersy stem are shown in Fig.2.If there is no attacks,7 power flow measurements({P12,P14,P24,P25,P36,P45,P56})are transmitted to state estimator.However,owing to the stealthy deception attacks,some of measurements could be discarded after attack detection and identification,the residual measurements are called incomplete measurements,which need be restored to 7 original power flow measurements to ensure precision of SE.Sinceat tack detection and identification in Section 3.1 has been proved to detect the attacks in Section2.3 and identify the attacked nodes successfully in[18],we pay main attention to the reconstruction method of measurements in this paper.

    Fig.2 Measurement configuration of a 6-bus power system.

    Two cases in simulation experiments are considered,which are shown in Table2.Define η =m1/m×100%,which indicate the damage level from attacks,where m1denotes the number of available clean measurements(some measurements could have been discarded as soon as possible once corresponding nod es are attacked nodes that should be isolated),m is 7 that denotes maxim um number of measurements(assume that there is no packet loss and delay).In case 1,there are 4 available clean measurements(U={P14,P36,P45,P56}),which lead the system to be unobservable,where the observability analysis method in Section3.2 is em ployed.With less available measurements,the system also loses observability in case 2.Hence the proposed reconstruction method in Section 3.3 should be used to restore the measurements for cases 1 and 2.

    Table 2 Available measurements and observability in detail for cases.

    4.1 Simulation experiment analysis in a highly coherent dictionary

    As mentioned in Section 3.3.1,the over-completed dictionary(OcD)can be initialized by giving a traditional transformation basis dictionary(such as the DST or the joint dictionary)or the training samples themselves.Through experiments,we find that different initialization methods influence the coherence of the atoms of the dictionary and the effects of reconstruction directly.At first,the training samples are adopted as the initial dictionary,which is better theoretically but lend to a highly coherent dictionary in this application scenario.

    4.1.1 Simulation experiment analysis for over-completed dictionary

    In the reconstruction process,the effect of OcD proposed in this paper and the joint dictionary(JD)are com pared.In the JD,many sparse bases(discrete cosine transform(DCT),discrete sine transform(DST),discrete Fourier transform(DFT),discrete wavelet transform(DWT),discrete Hartley transform(DHT),discrete Wtrans form(DWT))are em braced as far as possible to improve sparse representation,where the orthogonal matching pursuit(OMP)is em ployed to select optimal sparse basis to form the final JD.Fur therm ore,the BP and BPDN,ROMP,SAMP,IST are all introduced to display the reconstruction results at last sampling time in Fig.3 when m1=2(case 2),where “Original”are the 7 original power flow measurements that the reconstruction process wants to fit.

    From Fig.3,we observe that reconstruction effect under OcD proposed in this paper(Fig.3(b))is obviously better than the effect under the JD(Fig.3(a)),whatever how many sparse bases are embraced in the JD.That is because the dictionary learning proposed in this paper is flexible and adaptive in essence and is not formed by the fixed property sparse bases,which bring the optimal performance.Especially in the case 2,only 29%available clean measurements are left,the five recovery algorithm s still restore the measurements well(Fig.3(b)).

    where zjandis reconstruction targeted values and reconstruction values of measurements,respectively.

    Fig.3(a)The reconstruction of measurement values on JD;and(b)The reconstruction of measurement values on OcD proposed in this paper,when m1=2(number of the remaining measurements).

    In order to give a full exhibition for the superiority of OcD,the integrated normalized absolute error(INAE)is introduced for the quantitative analysis.

    Only one sampling time is not enough,hence Fig.4 disp lay the INAE of reconstruction on JD(Fig.4(a))and OcD(Fig.4(b))at 10 sampling times respectively,when m1=2.The maximum of INAE of reconstruction on JD is about 1.37 in Fig.4(a)for ROMP and SAMP at 10th sampling time,while the maximum of INAE of reconstruction on OcD is about 0.15 in Fig.4(b)for BPDN at 10th sampling time.The maximum in Fig.4(a))is more than 9 times as much as the maxim um in Fig.4(b).

    In addition,the exact quantitative analysis(mean value of INAE for 10 sampling times)for reconstruction process is shown in Table3 for both cases1 and 2.Either in case 1 or case 2,the mean values of INAE on OcD(Mean-INAE-OcD)are all more Lower than the mean values of INAE on JD(Mean-INAE-JD)by five recovery algorithm s,where the mean values of INAE on OcD by IST are lowest among the five recovery algorithm s both in cases1 and 2.In other words,the effect of IST on OcD for data recovery can be verified to be the best among the five recovery algorithm s in Table3.Therefore,from Fig.4 and Table3,the superiority of OcD proposed in this paper is reflected further.

    Fig.4(a)The INAE of reconstruction on JD at 10 sampling times;and(b)The INAE of reconstruction on OcD at 10 sampling times,when m1=2(number of the available clean measurements).

    Table 3 Quantitative analysis(mean value of INAE for 10 sampling times)for reconstruction process.

    4.1.2 Simulation experiment analysis for measurement matrix

    In order to choose the most suitable measurement matrix for the reconstruction process in this paper and verify our theoretical analysis results,the influence of the chosen measurement matrix on the reconstruction of measurements by IST under the OcD is shown in Fig.5.Three kinds of measurement matrices are compared,including the traditional Gauss random matrix,Bernoulli random matrix and the sampling matrix proposed in this paper.It is noted that the first two kinds of measurement matrix are widely applied to image processing,but under this reconstruction scenario,the proposed sampling matrix can fit reconstruction targeted values perfectly,which is m ore suitable than the two traditional measurement matrixes in Fig.5.

    Fig.5 The influence of the chosen measurement matrix on the reconstruction of measurements by IST under the OcD.

    Finally,significance of reconstruction for measurements is displayed in Fig.6 through the results of the error of state estimator for voltage phase angle(Va).The maximal error of state estimator for Va(?)under no reconstruction is about 11.78 at the 6th sampling time,while the corresponding maximal error under reconstruction by our method in this paper is only 0.5848 at the 7th sampling time.In summary,the proposed reconstruction method for measurements and state estimation strategy improve the accuracy of state estimation under the malicious intelligence attacks extremely.

    Fig.6(a)Error of state estimator for Va(?)under no reconstruction;and(b)Error of state estimator for Va(?)under reconstruction by our proposed method in this paper,when m1=2.

    Rem ark 3From the analysis results above,the measurements are reconstructed well by the method proposed,especially by the IST.In other words,state estimation strategy on reconstruction of the measurements is more resilient to the intelligence attacks,which has certain self-recovery capability when received measurements are polluted by malicious attackers.However,the RIC value of the IST is maximum value among the five recovery algorithm s,whose performance is the best one.What is the reason for this result?From[31]and[32],there are two kinds of recovery algorithms,that are the greedy algorithm s(such as OMP and BP)and the convex optimization algorithms(such as IST),where the effects of the greedy algorithm s largely depend on the lowly coherent atoms of the dictionary,while the convex optimization algorithms maybe not,instead,the convex optimization algorithm s maybe have perfect performance on the highly coherent dictionary,like the IST in this paper,which can reconstruct the power flow measurements beyond the RIP constraint.In the next section,the simply simulation experiments analysis on lower coherent dictionary are completed for comparison.

    4.2 Simulation experiment analysis in a lower coherent dictionary

    In this section,the OcD is initialized by giving a traditional transformation basis(such as the DST mentioned before),the RIC value of BP,BPDN,ROMP,SAMP and IST are 0.1297,0.5899,?0.6043,?0.6043 and 0.1297,which show the success rate of reconstruction of BP and IST are the possible highest.The INAE of reconstruction on JD and OcD(initialized by the DST)at 10 sampling times are shown in Fig.7.

    The good perform an ce of the proposed method is also proved from Fig.7,although there are some different effects for the five recovery algorithms.

    Fig.7 (a)The INAE of reconstruction on JD at 10 sampling times;and(b)The INAE of reconstruction on OcD at 10 sampling times,when m1=2(number of the available clean measurements).

    5 Conclusions

    In this paper,the resilience of state estimation strategy in cyber physical systems under intelligent stealthy deception attacks is studied.We do not focus on design of the state estimator but on reconstruction of the residual measurements with the unknown model of state equation.The dictionary learning by K-SVD is introduced to form the over-completed dictionary for the measurements.Furthermore,different from CS in image processing,a special sampling matrix is designed as the measurement matrix to improve the performance of reconstruction.Simulation experiments of two cases for 6-bus power system show that not only the proposed over-completed dictionary(OcD)is more flexible and adaptive than the joint dictionary but also effect of the designed measurement matrix on the reconstruction of measurements by IST under the OcD is much better than that of traditional Gauss and Bernoulli random matrix.In addition,the results of qualitative and quantitative analyses indicate that the measurements are re-stored very well on our proposed method by five general recovery algorithm s,even when 29%available measurements are left.The proposed method in this paper p lay a key role in the whole state estimation strategy.In a word,from a new perspective,the resilience of state estimation strategy is improved.

    In the future,the distributed reconstruction method of state estimation strategy for large scale CPSs will be focused on.In addition,there are some unsolved problem in the paper will be studied,such as reconstruction conditions for IST on highly coherent dictionary except for RIP,which indicates that there are more or less differences between theory and application.

    [1]S.Z.Yong,M.Q.Foo,E.Frazzoli.Robust and resilient estimation for cyber-physical systems under adversarial attacks.Proceedings of the American Control Conference,Boston:IEEE,2016:308–315.

    [2]H.Fawzi,P.Tabuada,S.Diggavi.Secure estimation and control for cyber-physical systems under adversarial attacks.IEEE Transactions on Automatic Control,2014,59(6):1454–1467.

    [3]Y.Yuan,F.Sun,H.Liu.Resilient control of cyber-physical systems against intelligent attacker:a hierarchal stackelberg game approach.International Journal of System s Science,2016,47(9):2067–2077.

    [4]A.Teixeira,I.Sham es,H.Sandberg,et al.A secure control fram ework for resource-lim ited adversaries.Autom atica,2015,51:135–148.

    [5]F.Pasqualetti,F.Dorfler,F.Bullo.Attack detection and identification in cyber-physical systems.IEEE Transactions on Automatic Control,2013,58(11):2715–2729.

    [6]Y.Mo,S.Weerakkody,B.Sinopoli.Physical authentication of control system s:Designing watermarked control inputs to detect counterfeit sensor outputs.IEEE Control System s Magazine,2015,35(1):93–109.

    [7]Q.Hu,D.Fooladivanda,Y.H.Chang,et al.Secure state estimation for nonlinear power systems under cyber attacks.Proceedings of the American Control Conference,Seattle:IEEE,2016:2779–2784.

    [8]W.Ao,Y.Song,C.Wen.Adaptive cyber-physical system attack detection and reconstruction with application to power systems.IET Control Theory and Applications,2016,10(12):1458–1468.

    [9]Y.H.Chang,Q.Hu,C.J.Tomlin.Secure estimation based Kalm an filter for cyber-physical systems against adversarial attacks.arXiv.2015:arXiv:1512.03853[cs.SY].

    [10]Y.Shoukry,P.Tabuada.Event-triggered state observers for sparse sensor noise/attacks.IEEE Transactions on Automatic Control,2016,61(8):2079–2091.

    [11]G.Wu,J.Sun,J.Chen.A survey on the security of cyber-physical system s.Control Theory and Technology,2016,14(1):2–10.

    [12]S.M.S.Alam,B.Natarajan,A.Pahwa.Distribution grid state estimation from com pressed measurements.IEEE Transactions on Sm art Grid,2014,5(4):1631–1642.

    [13]M.Elad.Sparse and Redundant Representations:From Theory to Applications in Signal and Im age Processing.New York:Springer,2010.

    [14]M.Aharon,M.Elad,A.Bruckstein.K-SVD:An algorithm for designing over complete dictionaries for sparse representation.IEEE Transactions on Signal Processing,2006,54(11):4311–4322.

    [15]V.Pudi,A.Chattopadhyay,T.Srikanthan.Modified projected Land weber method for compressive-sensing reconstruction of images with non-orthogonal matrices.International Symposium on Integrated Circuits(ISIC).Singapore:IEEE,2016:1–4.

    [16]A.Abur,A.G.Exposito.Pow er System State Estimation:Theory and Implementation.New York:CRC Press,2004.

    [17]A.Minot,N.Li.A fully distributed state estimation using matrix splitting methods.Proceedings of the American Control Conference,Chicago:IEEE,2015:2488–2493.

    [18]H.Sedghi,E.Jonckheere.Statistical structure learning to ensure data integrity in smartgrid.IEEE Transactions on Smart Grid,2015,6(4):1924–1933.

    [19]A.Teixeira,G.Dán,H.Sandberg,et al.A cyber security study of a SCADA energy management system:Stealthy deception attacks on the state estimator.IFAC Proceedings Volumes,2011,44(1):11271–11277.

    [20]Y.Liu,P.Ning,M.K.Reiter.False data injection attacks against state estimation in electric power grids.ACM Transactions on Information and System Security,2011,14(1):DOI 10.1145/1952982.1952995.

    [21]T.Idé,A.C.Lozano,N.Abe,et al.Proximity-based anomaly detection using sparse structure learning.Proceedings of the SIAM international Conference on Data Mining.Sparks:SIAM,2009:97–108.

    [22]E.Castillo,A.J.Conejo,R.E.Pruneda,et al.Observability analysis in state estimation:A unified numerical approach.IEEE Transactions on Power System s,2006,21(2):877–886.

    [23]Y.C.Eldar,G.Kutyniok(eds.).Com pressed Sensing:Theory and Applications.New York:Cambridge University Press,2012.

    [24]P.R.Gill,A.Wang,A.Molnar.The in-crow d algorithm for fast basis pursuit denoising.IEEE Transactions on Signal Processing,2011,59(10):4595–4605.

    [25]J.Wang,B.Shim.On the recovery limit of sparse signals using orthogonal matching pursuit.IEEE Transactions on Signal Processing,2012,60(9):4973–4976.

    [26]T.T.Do,L.Gan,N.Nguyen,et al.Sparsity adaptive matching pursuit algorithm for practical com pressed sensing.The 42nd Asilomar Conference on Signals,System s and Com puters.Pacific Grove:IEEE,2008:581–587.

    [27]T.Blum ensath,M.E.Davies.Iterative thresholding for sparse approximations.Journal of Fourier Analysis and Applications,2008,14(5/6):629–654.

    [28]T.H.Kim,R.M.Narayanan.Compressive sensing based image reconstruction for synthetic aperture radar using discrete cosine transform and noiselets.2015 38th International Conference on Telecommunications and Signal Processing(TSP).Prague:IEEE,2015:582–586.

    [29]J.M.Bioucas-Dias,M.A.T.Figueiredo.A new TwIST:Two-step iterative shrinkage/thresholding algorithms for image restoration.IEEE Transactions on Image Processing,2007,16(12):2992–3004.

    [30]R.D.Zimmerman,C.E.Murillo-Sánchez,R.J.Thom as.MATPOWER:Steady-state operations,planning,and analysis tools for power systems research and education.IEEE Transactions on Power System s,2011,26(1):12–19.

    [31]H.Zhao,X.Ni.Redundant dictionaries of com pressed sensing and an application algorithm of iterative soft threshold.Journal of Circuits and System s,2013,18(1):59–64.

    [32]A.Huang.Sparse Recovery Algorithms Based on Sensing Directionary.Ph.D.dissertation.Chengdu:University of Electronic Science and Technology of China,2011.

    久久久久久久久久久久大奶| 91成人精品电影| 黄色 视频免费看| 亚洲图色成人| 啦啦啦在线观看免费高清www| 欧美日韩福利视频一区二区| 日韩不卡一区二区三区视频在线| 国产精品亚洲av一区麻豆 | 久久精品久久精品一区二区三区| 啦啦啦视频在线资源免费观看| 欧美中文综合在线视频| 久久久久视频综合| 久久99精品国语久久久| 99香蕉大伊视频| 美女午夜性视频免费| 在线观看人妻少妇| 日本欧美视频一区| 午夜福利一区二区在线看| 日韩精品免费视频一区二区三区| 国产在线视频一区二区| 欧美激情高清一区二区三区 | 嫩草影院入口| 超碰成人久久| 亚洲精品国产av蜜桃| 女的被弄到高潮叫床怎么办| 亚洲第一av免费看| 久久狼人影院| 国产成人精品福利久久| 免费女性裸体啪啪无遮挡网站| 国产精品久久久人人做人人爽| 国产欧美亚洲国产| 大话2 男鬼变身卡| 成人黄色视频免费在线看| 一本—道久久a久久精品蜜桃钙片| √禁漫天堂资源中文www| 美女扒开内裤让男人捅视频| 国产成人欧美在线观看 | 国产精品免费大片| 看十八女毛片水多多多| 九九爱精品视频在线观看| 国产免费视频播放在线视频| 99热国产这里只有精品6| 午夜福利免费观看在线| 久久久久久免费高清国产稀缺| 青青草视频在线视频观看| 亚洲av中文av极速乱| 国产成人一区二区在线| 熟妇人妻不卡中文字幕| 超碰成人久久| 毛片一级片免费看久久久久| 十分钟在线观看高清视频www| 亚洲成色77777| 国产乱人偷精品视频| 老司机亚洲免费影院| 一区在线观看完整版| 女人高潮潮喷娇喘18禁视频| 啦啦啦在线免费观看视频4| xxx大片免费视频| 久久久久人妻精品一区果冻| 亚洲精品日本国产第一区| 99香蕉大伊视频| 波多野结衣一区麻豆| 一区二区三区精品91| 亚洲第一区二区三区不卡| 午夜福利视频精品| 爱豆传媒免费全集在线观看| 婷婷色综合大香蕉| 啦啦啦在线观看免费高清www| 啦啦啦视频在线资源免费观看| 免费黄色在线免费观看| 999久久久国产精品视频| 黄色 视频免费看| 亚洲精品一区蜜桃| 国产午夜精品一二区理论片| 国产免费福利视频在线观看| av网站免费在线观看视频| 看十八女毛片水多多多| 免费看不卡的av| 亚洲成av片中文字幕在线观看| 19禁男女啪啪无遮挡网站| 久久女婷五月综合色啪小说| 午夜福利网站1000一区二区三区| 香蕉国产在线看| av福利片在线| 街头女战士在线观看网站| av福利片在线| 视频在线观看一区二区三区| 天天躁夜夜躁狠狠久久av| av片东京热男人的天堂| 女人爽到高潮嗷嗷叫在线视频| 午夜福利视频在线观看免费| 老鸭窝网址在线观看| 激情五月婷婷亚洲| 国产日韩欧美视频二区| 亚洲久久久国产精品| 看非洲黑人一级黄片| 丁香六月欧美| 亚洲少妇的诱惑av| 国产免费福利视频在线观看| 欧美久久黑人一区二区| 国产无遮挡羞羞视频在线观看| 91精品三级在线观看| 男人操女人黄网站| 啦啦啦在线免费观看视频4| 黑人巨大精品欧美一区二区蜜桃| 狠狠婷婷综合久久久久久88av| 国产精品亚洲av一区麻豆 | 老汉色av国产亚洲站长工具| 久久久久精品久久久久真实原创| 夜夜骑夜夜射夜夜干| 一级爰片在线观看| 美女大奶头黄色视频| 久久久久精品国产欧美久久久 | 免费观看人在逋| 国产成人免费观看mmmm| 国语对白做爰xxxⅹ性视频网站| 无遮挡黄片免费观看| 亚洲七黄色美女视频| 久久久久国产一级毛片高清牌| 亚洲婷婷狠狠爱综合网| 久久久久久人人人人人| 黄色一级大片看看| 少妇人妻 视频| 女人爽到高潮嗷嗷叫在线视频| 国产xxxxx性猛交| 精品免费久久久久久久清纯 | 亚洲色图综合在线观看| 韩国精品一区二区三区| 国产成人精品在线电影| 精品久久久久久电影网| 国产99久久九九免费精品| 18禁动态无遮挡网站| 国产一区二区激情短视频 | 如日韩欧美国产精品一区二区三区| 国产一区二区 视频在线| 性色av一级| 亚洲久久久国产精品| 少妇被粗大猛烈的视频| 欧美乱码精品一区二区三区| 国产精品国产av在线观看| 亚洲色图 男人天堂 中文字幕| 91精品国产国语对白视频| 日韩制服丝袜自拍偷拍| 免费观看人在逋| 国产精品欧美亚洲77777| 亚洲五月色婷婷综合| 黄片小视频在线播放| 如日韩欧美国产精品一区二区三区| 啦啦啦中文免费视频观看日本| 精品人妻一区二区三区麻豆| 只有这里有精品99| 亚洲成人手机| 国产午夜精品一二区理论片| 成人国产麻豆网| 夜夜骑夜夜射夜夜干| av视频免费观看在线观看| 久久99精品国语久久久| 少妇猛男粗大的猛烈进出视频| 人人妻,人人澡人人爽秒播 | 人成视频在线观看免费观看| 国产精品欧美亚洲77777| 国产乱来视频区| 捣出白浆h1v1| 亚洲免费av在线视频| 老司机影院成人| 亚洲人成网站在线观看播放| 国产精品一国产av| 好男人视频免费观看在线| 国产在线一区二区三区精| 午夜福利在线免费观看网站| 国产一区亚洲一区在线观看| 亚洲三区欧美一区| 黄色视频不卡| 亚洲欧美成人综合另类久久久| 欧美乱码精品一区二区三区| 亚洲国产精品999| 久久久精品国产亚洲av高清涩受| 丝袜脚勾引网站| 深夜精品福利| 久久久国产一区二区| 日韩中文字幕欧美一区二区 | 精品国产乱码久久久久久小说| av电影中文网址| 亚洲视频免费观看视频| 人人妻人人澡人人看| www日本在线高清视频| 人妻一区二区av| 国产成人免费观看mmmm| 欧美成人午夜精品| 欧美最新免费一区二区三区| 国产日韩一区二区三区精品不卡| 亚洲精品一区蜜桃| 这个男人来自地球电影免费观看 | 国产成人精品无人区| 国产精品女同一区二区软件| 巨乳人妻的诱惑在线观看| 最新的欧美精品一区二区| 啦啦啦视频在线资源免费观看| 免费黄频网站在线观看国产| av在线观看视频网站免费| 久久 成人 亚洲| 一个人免费看片子| 只有这里有精品99| 久久国产亚洲av麻豆专区| 91成人精品电影| 亚洲av国产av综合av卡| 嫩草影院入口| 免费在线观看完整版高清| 菩萨蛮人人尽说江南好唐韦庄| 女性被躁到高潮视频| 蜜桃在线观看..| 99热国产这里只有精品6| 不卡av一区二区三区| 亚洲精品一二三| 少妇被粗大猛烈的视频| 亚洲一区中文字幕在线| 日本黄色日本黄色录像| 日本猛色少妇xxxxx猛交久久| 国产欧美日韩一区二区三区在线| 亚洲一码二码三码区别大吗| 欧美乱码精品一区二区三区| 亚洲成人国产一区在线观看 | 亚洲成人手机| 熟女av电影| 久久精品久久久久久噜噜老黄| 黄色视频在线播放观看不卡| 中文字幕人妻丝袜制服| 亚洲精品国产色婷婷电影| 九九爱精品视频在线观看| av网站免费在线观看视频| 丁香六月欧美| 欧美激情 高清一区二区三区| 日本vs欧美在线观看视频| 97精品久久久久久久久久精品| 伦理电影大哥的女人| 在线观看三级黄色| 免费看av在线观看网站| 午夜福利网站1000一区二区三区| 一本久久精品| 尾随美女入室| 一级毛片电影观看| 亚洲成人免费av在线播放| 丝袜人妻中文字幕| 在线观看免费高清a一片| 久久精品aⅴ一区二区三区四区| 婷婷色综合大香蕉| 日本欧美国产在线视频| 19禁男女啪啪无遮挡网站| 午夜激情久久久久久久| 精品国产超薄肉色丝袜足j| 免费女性裸体啪啪无遮挡网站| 中国国产av一级| 国产亚洲精品第一综合不卡| 黑人巨大精品欧美一区二区蜜桃| 精品国产乱码久久久久久男人| 国产片内射在线| 国产深夜福利视频在线观看| 久久天躁狠狠躁夜夜2o2o | 日日啪夜夜爽| 日本av免费视频播放| av国产久精品久网站免费入址| 亚洲人成网站在线观看播放| 成人国语在线视频| 亚洲精品国产区一区二| 男女免费视频国产| 卡戴珊不雅视频在线播放| 久久婷婷青草| 国产一区亚洲一区在线观看| 十八禁高潮呻吟视频| 国产黄频视频在线观看| 在现免费观看毛片| 久久久国产精品麻豆| 成人影院久久| 在线观看免费视频网站a站| 日日撸夜夜添| 免费看av在线观看网站| 亚洲国产精品一区二区三区在线| 亚洲国产欧美网| 国产成人午夜福利电影在线观看| 最近最新中文字幕免费大全7| 999精品在线视频| av网站免费在线观看视频| 国语对白做爰xxxⅹ性视频网站| 不卡视频在线观看欧美| svipshipincom国产片| av在线app专区| 国产 一区精品| 亚洲五月色婷婷综合| 天堂中文最新版在线下载| 国产精品女同一区二区软件| 亚洲视频免费观看视频| 777米奇影视久久| 亚洲国产成人一精品久久久| 国产精品无大码| 国产精品嫩草影院av在线观看| 在线天堂中文资源库| 国产精品三级大全| av在线app专区| 国产欧美日韩综合在线一区二区| 亚洲国产成人一精品久久久| 婷婷色综合大香蕉| 久久久久国产精品人妻一区二区| 夫妻性生交免费视频一级片| 美女福利国产在线| 99国产精品免费福利视频| 大片电影免费在线观看免费| 精品亚洲成a人片在线观看| 欧美人与性动交α欧美精品济南到| 久热爱精品视频在线9| 国产伦人伦偷精品视频| 亚洲欧美一区二区三区久久| 久久精品人人爽人人爽视色| 日日摸夜夜添夜夜爱| 欧美黄色片欧美黄色片| svipshipincom国产片| 久久国产精品男人的天堂亚洲| 操出白浆在线播放| 婷婷成人精品国产| 亚洲精品久久久久久婷婷小说| a 毛片基地| 香蕉丝袜av| 亚洲,一卡二卡三卡| 亚洲成人国产一区在线观看 | 丝袜脚勾引网站| 久久精品国产亚洲av高清一级| 一级毛片我不卡| 美女高潮到喷水免费观看| 丰满迷人的少妇在线观看| 精品一品国产午夜福利视频| 日韩av免费高清视频| 少妇精品久久久久久久| 亚洲伊人久久精品综合| 女的被弄到高潮叫床怎么办| 99热国产这里只有精品6| 精品国产超薄肉色丝袜足j| 国产女主播在线喷水免费视频网站| 又黄又粗又硬又大视频| 夫妻性生交免费视频一级片| 精品久久久精品久久久| 人体艺术视频欧美日本| 伦理电影免费视频| 成人午夜精彩视频在线观看| 国产成人啪精品午夜网站| av线在线观看网站| 欧美日韩一区二区视频在线观看视频在线| 亚洲av成人精品一二三区| 国产99久久九九免费精品| 999精品在线视频| 亚洲av电影在线进入| 一级毛片 在线播放| 一本大道久久a久久精品| 欧美97在线视频| 麻豆av在线久日| 国产片内射在线| 涩涩av久久男人的天堂| 男女边摸边吃奶| 国产av国产精品国产| 亚洲精品久久成人aⅴ小说| 人人妻人人澡人人看| 最近2019中文字幕mv第一页| 看免费成人av毛片| 中国三级夫妇交换| 亚洲av综合色区一区| 成年美女黄网站色视频大全免费| 成人漫画全彩无遮挡| 中文字幕制服av| 色精品久久人妻99蜜桃| 亚洲情色 制服丝袜| 18禁动态无遮挡网站| 在线天堂最新版资源| 亚洲av福利一区| 九色亚洲精品在线播放| 亚洲在久久综合| 亚洲av男天堂| 欧美亚洲日本最大视频资源| 婷婷色麻豆天堂久久| 99久国产av精品国产电影| 在线天堂最新版资源| 一本大道久久a久久精品| 免费女性裸体啪啪无遮挡网站| 国产精品久久久久成人av| 国产av精品麻豆| 嫩草影院入口| 免费女性裸体啪啪无遮挡网站| 免费在线观看视频国产中文字幕亚洲 | 在线观看免费午夜福利视频| 国产亚洲一区二区精品| 亚洲精品自拍成人| 亚洲欧美一区二区三区国产| 久久精品亚洲av国产电影网| 黄色 视频免费看| 亚洲色图 男人天堂 中文字幕| 婷婷成人精品国产| 欧美日韩视频精品一区| 国产亚洲一区二区精品| 黄片无遮挡物在线观看| 777久久人妻少妇嫩草av网站| 伊人亚洲综合成人网| 久久精品亚洲熟妇少妇任你| 国产精品久久久久久人妻精品电影 | 国产成人系列免费观看| 中文字幕色久视频| 国产成人系列免费观看| 久久这里只有精品19| 九九爱精品视频在线观看| 日本一区二区免费在线视频| 午夜精品国产一区二区电影| 久久久精品国产亚洲av高清涩受| 国产日韩欧美亚洲二区| 桃花免费在线播放| 国产精品香港三级国产av潘金莲 | av不卡在线播放| 欧美激情极品国产一区二区三区| 青春草亚洲视频在线观看| 日日啪夜夜爽| 午夜老司机福利片| 午夜精品国产一区二区电影| 亚洲美女黄色视频免费看| 成年人午夜在线观看视频| 自拍欧美九色日韩亚洲蝌蚪91| 国产深夜福利视频在线观看| 亚洲伊人久久精品综合| 亚洲国产毛片av蜜桃av| 色吧在线观看| 搡老岳熟女国产| 久久久精品国产亚洲av高清涩受| 精品亚洲乱码少妇综合久久| 日韩一卡2卡3卡4卡2021年| 新久久久久国产一级毛片| 又大又黄又爽视频免费| av线在线观看网站| 777米奇影视久久| 考比视频在线观看| 国产精品一区二区在线不卡| 久久久久精品人妻al黑| 国产成人av激情在线播放| 91老司机精品| 国产午夜精品一二区理论片| 人人澡人人妻人| 女性生殖器流出的白浆| netflix在线观看网站| 51午夜福利影视在线观看| a级毛片黄视频| 丝袜人妻中文字幕| 美女视频免费永久观看网站| 少妇人妻 视频| 国产成人系列免费观看| 国产精品 欧美亚洲| 亚洲成人国产一区在线观看 | 亚洲国产成人一精品久久久| 色婷婷av一区二区三区视频| 精品国产一区二区三区四区第35| 多毛熟女@视频| 99re6热这里在线精品视频| 日日爽夜夜爽网站| 人体艺术视频欧美日本| 亚洲国产精品成人久久小说| 午夜日本视频在线| 欧美成人精品欧美一级黄| 日本wwww免费看| 在线观看人妻少妇| svipshipincom国产片| 中文字幕人妻丝袜一区二区 | 国产免费福利视频在线观看| 97精品久久久久久久久久精品| 日本色播在线视频| 国产深夜福利视频在线观看| 在线观看三级黄色| 成年动漫av网址| √禁漫天堂资源中文www| 精品一品国产午夜福利视频| 国产男人的电影天堂91| 在线观看一区二区三区激情| 18禁裸乳无遮挡动漫免费视频| 最近的中文字幕免费完整| 在线观看一区二区三区激情| 一本—道久久a久久精品蜜桃钙片| av在线老鸭窝| 色吧在线观看| 国产亚洲av片在线观看秒播厂| 亚洲国产av新网站| 极品少妇高潮喷水抽搐| 久久久久精品久久久久真实原创| www.自偷自拍.com| 青草久久国产| 日韩一区二区三区影片| 国产精品无大码| 女的被弄到高潮叫床怎么办| 欧美日韩成人在线一区二区| 日韩一区二区三区影片| 国产黄频视频在线观看| 欧美亚洲日本最大视频资源| 一区在线观看完整版| 亚洲国产成人一精品久久久| 赤兔流量卡办理| bbb黄色大片| av线在线观看网站| 免费不卡黄色视频| 巨乳人妻的诱惑在线观看| 国产亚洲午夜精品一区二区久久| 国产成人午夜福利电影在线观看| 久久热在线av| 99re6热这里在线精品视频| 亚洲情色 制服丝袜| 不卡视频在线观看欧美| 卡戴珊不雅视频在线播放| 国产高清不卡午夜福利| 丝袜美足系列| 欧美激情极品国产一区二区三区| 少妇猛男粗大的猛烈进出视频| 国产一区二区激情短视频 | 另类亚洲欧美激情| 免费久久久久久久精品成人欧美视频| 精品亚洲乱码少妇综合久久| 极品人妻少妇av视频| 极品少妇高潮喷水抽搐| av片东京热男人的天堂| 高清在线视频一区二区三区| 亚洲av成人精品一二三区| 欧美日韩亚洲高清精品| 午夜av观看不卡| 国产精品蜜桃在线观看| 制服诱惑二区| 老司机深夜福利视频在线观看 | 青春草国产在线视频| 国产精品国产三级专区第一集| 亚洲欧美一区二区三区国产| 久久99一区二区三区| 亚洲四区av| 亚洲七黄色美女视频| 国产精品嫩草影院av在线观看| 在线天堂最新版资源| 久久精品国产综合久久久| 亚洲成人av在线免费| 色播在线永久视频| 看十八女毛片水多多多| 久久97久久精品| 不卡视频在线观看欧美| 天堂8中文在线网| 99re6热这里在线精品视频| 久久热在线av| 考比视频在线观看| svipshipincom国产片| 久久狼人影院| 爱豆传媒免费全集在线观看| 免费黄网站久久成人精品| 男的添女的下面高潮视频| 亚洲一区中文字幕在线| 日韩人妻精品一区2区三区| 免费日韩欧美在线观看| 欧美激情高清一区二区三区 | 欧美最新免费一区二区三区| 亚洲 欧美一区二区三区| 亚洲在久久综合| 看免费av毛片| 成年人免费黄色播放视频| 久久韩国三级中文字幕| 久久久国产精品麻豆| 久久精品国产综合久久久| 亚洲av电影在线进入| 天天躁日日躁夜夜躁夜夜| 欧美日韩一区二区视频在线观看视频在线| 久久国产亚洲av麻豆专区| 波野结衣二区三区在线| 亚洲精品国产av成人精品| 欧美日韩一区二区视频在线观看视频在线| 一本久久精品| 大陆偷拍与自拍| 啦啦啦中文免费视频观看日本| 大香蕉久久网| 嫩草影院入口| 国产伦人伦偷精品视频| 国产精品熟女久久久久浪| 欧美日韩一区二区视频在线观看视频在线| 我要看黄色一级片免费的| 国产成人精品福利久久| 嫩草影院入口| 亚洲av欧美aⅴ国产| 国产精品久久久久久精品电影小说| 色精品久久人妻99蜜桃| 热re99久久精品国产66热6| 亚洲伊人久久精品综合| 性色av一级| 精品久久久久久电影网| 亚洲精品久久成人aⅴ小说| 精品国产一区二区久久| 侵犯人妻中文字幕一二三四区| 日韩一本色道免费dvd| 中文乱码字字幕精品一区二区三区| 欧美日韩成人在线一区二区| www.自偷自拍.com| 欧美日韩亚洲国产一区二区在线观看 | 亚洲欧美精品自产自拍| 午夜福利网站1000一区二区三区| 少妇猛男粗大的猛烈进出视频| 51午夜福利影视在线观看| 美女国产高潮福利片在线看| 久久免费观看电影| 免费看av在线观看网站| 久久久久精品久久久久真实原创| 久久久国产欧美日韩av| 亚洲成国产人片在线观看| 80岁老熟妇乱子伦牲交| 亚洲 欧美一区二区三区| 一级,二级,三级黄色视频| 国产亚洲av片在线观看秒播厂| 久久青草综合色| 母亲3免费完整高清在线观看| 亚洲av在线观看美女高潮| 色视频在线一区二区三区| 一级片免费观看大全| 国产亚洲av片在线观看秒播厂| 国产日韩一区二区三区精品不卡| 满18在线观看网站| 人人妻,人人澡人人爽秒播 |