• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cyber Attack Protection and Control of Microgrids

    2018-05-02 07:11:29MdMasudRanaLiLiandStevenSu
    IEEE/CAA Journal of Automatica Sinica 2018年2期

    Md Masud Rana,Li Li,and Steven W.Su

    I.INTRODUCTION

    THE smart grid can provide an efficient way of supplying and consuming energy by providing two-way energy flow and communication[1].It can integrate multiple renewable distributed energy resources(DERs)which are environment friendly,has low green house emission and is effective to alleviate transmission power losses.The associated connectivity and advanced information/communication infrastructure make the smart grid susceptible to cyber attacks[1],[2].Statistics in the energy sector show that more than 150 cyber attacks happened in 2013 and 79 in 2014[1].As a result,the power outage cost is about$80 billion per year in the USA.Usually,the utility operators amortize it by increasing the energy tariff,which is unfortunately transferred to consumer expenses[3].The renewable microgrid incorporating DERs can be a potential solution,but it needs to be properly monitored as its generation pattern depends on the weather and surrounding conditions.One of the smart grid features is that it can integrate multiple microgrids and monitor them using reliable communication networks.

    Since the generation pattern of a microgrid varies on the time-place basis so its operating condition should be closely monitored.Therefore,the microgrid state estimation is an important function in the smart grid energy management system(EMS).As shown in Fig.1 the system state estimation is an essential task for the monitoring and control of the power network.In order to monitor the grid information,the utility company has deployed a set of sensors around the smart grid.The communication infrastructure is used to send grid information from sensors to the EMS.The accurately estimated states can also be used in other functions of EMS such as contingency analysis,bad data detection,energy theft detection,stability analysis,and optimal power dispatch[4].

    However,it is not economical or even infeasible to measure all states,so the state estimation is also a key task in this regard[5].More importantly,cyber attacks can cause major social,economical and technical problems such as blackouts in power systems,tampering of smart meters reading and changing the forecasted load pro files[3].These types of catastrophic phenomena are much easier to be committed in microgrids,so they create much more serious problems in the smart grid compared with the traditional grid[6].Therefore,the system state estimation under cyber attacks for smart grids has drawn significant interests in the energy industry and signal processing based information and communication societies.

    Many studies have been carried out to investigate the cyber attacks in smart grid state estimations.To begin with,most of the state estimation methods use the weighted least squared(WLS)technique under cyber attacks[7]-[9].Chi-Square detector is also used to detect those attacks.Even though this approach is easy to be implemented for nonlinear systems,it is computationally intensive and it cannot eliminate the attacks properly[5],[7].To this end,the WLS basedl1optimization method is explored in[4].Furthermore,a new detection scheme to detect the false data injection attack is proposed in[2].It employs a Kullback-Leibler method to calculate the distance between the probability distributions derived from the observation variations.A sequential detection of false data injection in smart grids is investigated in[2].It adopts a centralized detector based on the generalized likelihood ratio and cumulative sum algorithm.Note that this detector usually depends on the parametric inferences so is inapplicable to the nonparametric inferences[10].A semide finite programming based AC power system state estimation is proposed in[11].Thereafter,a Kalman filter(KF)based microgrid energy theft detection algorithm is presented in[3].

    Fig.1. Flow of electricity and information between different sections of smart grid[3].

    A lot of efforts have been devoted towards the power system state estimation under the condition of unreliable communication channels.Generally,the attackers have limited attacking energy to jam the channel in order to achieve the desired goals[12].So,the sensor data scheduling for state estimation with energy constraints is studied in[13].In this research,the sensor has to decide whether to send its data to a remote estimator or not based on its energy and estimation error covariance matrix.This idea is further extended in[14],where both the sensor and attacker have energy constraints for sending information.The considered attack is on the communication channel between a sensor and a remote estimator.Basically,the sensor aims to minimize the average estimation error covariance matrix,while attackers try to maximize it.So,an iterative game theory is used to solve the optimization problem.Due to the motivation of unknown attacking patterns,authors in[12],[15]investigated how the attacker can design the attacking policy so the estimation performance can be deteriorated.Then the average estimation error covariance based optimal scheduling strategy is proposed to avoid such kind of attacks.

    Many feedback control algorithms have been proposed to regulate the system.The linear quadratic Gaussian(LQG)based detecting techniques for cyber integrity attacks on the sensors of a control system is proposed in[12],[16].It shows that the residual error based chi-squared detection technique is not suitable when the attacker does not know the system dynamics.Based on this analysis,they consider the cyber attack model as an i.i.d(independent,identically distributed)Gaussian distribution,and then the LQG objective function is modified.At the end,they developed a sufficient condition to detect the false alarm probability and proposed an optimization algorithm to minimize it.In[17],a new strategy is recommended for designing a communication and control infrastructure in a distribution system based on the virtual microgrid concept.It is shown in[18],[19]that designing a state feedback control framework for a general case of polynomial discrete-time system is quite challenging because the solution is non-convex.Thus,the convex optimization based controller design has gained growing interest in the research community.

    The key contributions of this paper are summarized as follows:

    1)A microgrid incorporating multiple distributed energy resources(DERs)is modeled as a discrete time linear statespace equation considering the uncertainty and cyber attack in the measurement.

    2)A recursive systematic convolutional(RSC)code is proposed to mitigate the impairments and introduce redundancy in the system states.The log maximum a posterior is adopted to recover the state information which is affected by random noises and cyber attacks.

    3)After estimating the system states,a feedback control strategy for voltage regulation of the microgrid is proposed based on semide finite programming.This proposed control scheme acts as a precursor in terms of network stability and the operation of DERs.

    The remainder of this paper is organized as follows.A microgrid system model is presented in Section II.The observation model and cyber attack process are described in Section III.Moreover,the KF based dynamic state estimation is described in Section IV.The proposed control technique is derived in Section V,followed by the simulation results and discussions in Section VI.Finally,the paper is wrapped up with conclusions and future work in Section VII.

    Notations:Bold face lower and upper case letters are used to represent vectors and matrices,respectively;x′denotes the transpose ofx,E(·)denotes the expectation operator andIis the identity matrix.

    II.MICROGRID SYSTEM MODEL

    The consideredNmicro-sources in this study are connected to the main grid.For simplicity,we assume thatN=4 solar panels are connected through the IEEE-4 bus test feeder as shown in Fig.2[20],[21].Here,the input voltages are denoted byvp=(vp1vp2vp3vp4)′,wherevpiis theith DER input voltage.The four micro-sources are connected to the power network at the corresponding points of common coupling(PCCs)whose voltages are denoted byvs=(v1v2v3v4)′,whereviis theith point of common coupling(PCC)voltage.

    Now by applying Laplace transformation,the nodal voltage equation can be obtained:

    Fig.2. Micro-sources are connected to the power network[21].

    whereLc=diag{Lc1,Lc2,Lc3,Lc4}andY(s)is the admittance matrix of the entire power network incorporating four micro-sources[21].Now we can convert the transfer function form into the linear state-space model[21].The discrete-time linear dynamic system can be derived as follows:

    wherex(k)=vs-vrefis the PCC state voltage deviation,vrefis the PCC reference voltage,u(k)=vp-vprefis the DER control input deviation,vprefis the reference control effort,nd(k)is the zero mean process noise whose covariance matrix isQn,the state matrixAd=I+AΔtand input matrixBd=BΔtwith

    and Δtis the discretization parameter.For discretizing a continuous-time system into a discrete-time system,there are several techniques available in the literature such as traditional approximation method,delta operator and shift operator[22]-[25].Similar to[22],[25],this paper adopts the traditional approximation method ignoring discretization errors.In the following section,the observation model and attack process is explored.

    III.OBSERVATION MODEL ANDCYBER ATTACK

    The measurements of the microgrid states are obtained by a set of sensors and can be modeled as follows:

    wherez(k)is the measurements,Cis the measurement matrix andw(k)is the zero mean sensor measurement noise whose covariance matrix isRw.Generally,the objective of attackers is to insert false data into the observations as follows:

    wherea(k)is the false data inserted by the attacker[1]-[3].The attackers have complete access to the system infrastructure so that they can hijack,record and manipulate data according to their best interest.In this paper,the cyber attack pattern is similar to those illustrated in[1],[2],[26].Fig.3 shows the observation model and cyber attack process in the context of smart grid state estimations.

    Fig.3.Observation model with cyber attack in the microgrid.

    To secure the system states,in the signal processing research community,the channel code is used.Motivated by the convolutional coding concept[27],[28],the microgrid statespace and observation models are regarded as the outer code.Then,the standard uniform quantizer performs quantization to get the sequence of bitsb(k).b(k)is encoded by RSC channel code which is regarded as the inner code.The main reason for using RSC code is to mitigate impairments and introduce redundancy in the system to protect the grid information.Generally speaking,RSC code is characterized by three parameters:the codeword lengthn,the message lengthl,and the constraint lengthm,i.e.,(n,l,m).The quantityl/nrefers to the code rate which indicates the amount of parity bits added to the data stream.The constraint length speci fiesm-1 memory elements which represents the number of bits in the encoder memory that affects the RSC generation output bits.If the constraint lengthmincreases,the encoding process intrinsically needs a longer time to execute the logical operations.Other advantages of the RSC code compared with the convolutional and turbo encoder include its reduced computation complexity,systematic output features and no error floor[29].From this point of view,this paper considers a(2,1,3)RSC code and(1 0 1,1 1 1)code generator polynomial in the feedback process.According to the RSC features,the code rate is 1/2 and there are two memories in the RSC process.As shown in Fig.4,this RSC code produces two outputs and can convert an entire data stream into one single codeword[30].The codeword is then passed through the binary phase shift keying(BPSK)to obtains(k).s(k)is passed through the additive white Gaussian noisy(AWGN)channel.To illustrate,Fig.4 shows the proposed cyber attack protection procedure in the context of smart grids.

    Fig.4. An illustration of the cyber attack protection in smart grids.

    IV.PROPOSED FRAMEWORK FOR CYBER ATTACK MINIMIZATION IN SMART GRIDS

    The proposed framework uses the KF to estimate the system states in the context of smart grids.The KF operates recursively on observation information to produce the optimal state estimation.Generally,the forecasted system state estimate is expressed as follows[31]:

    where?x(k-1)is the estimated state of the last step.Then the forecasted error covariance matrix is given by:

    whereP(k-1)is the estimated error covariance matrix of the last step.The observation innovation residuald(k)is given by:

    whereyrd(k)is the dequantized and demodulated output bit sequence.The Kalman gain matrix can be written as:

    The updated state estimation is given by:

    Finally,the updated estimated error covariance matrixP(k)is expressed as follows:

    After estimating the system state,the proposed control strategy is applied for regulating the microgrid states as shown in the next section.

    V.PROPOSED OPTIMAL FEEDBACK CONTROLLER

    In the simulation section,it has been shown that the proposed method is able to well estimate the system states.So,here we assume the microgrid state information is available.In order to regulate the microgrid states,define the following feedback control law[32]-[34]:

    by minimizing the following cost function:

    whereE(·)denotes the expectation operator andFis the state feedback gain matrix,QzandRzare positive-de finite state weighting matrix and control weighting matrix.

    Then the closed loop system is:By using(14)and standard trace operator(m′Dn=tr[Dnm′]),(15)can be expressed as:

    Then(18)can be written as follows:

    Now one can consider the following inequality,

    Now one can introduce a new variableH=FPand rewrite the(20)as follows:

    Now according to the Schur’s complement,(21)can be transformed into the following form:

    From(17),FandPcan be found by minimising the following expression:

    Based on theH=FP,(23)can be transformed as follows:

    According to the Schur’s complement,we can rewrite(25)as follows:

    Then we can formulate the proposed optimization problem as follows[30]:

    Finally,the feedback gain matrix is computed as:

    The proposed convex problem can be solved effectively and efficiently using a number of available softwares such as YALMIP[35].

    VI.PERFORMANCE EVALUATION

    In this section,we evaluate the performance of the proposed approaches under cyber attacks in smart grids.An overall system level diagram for system state estimation and control is illustrated in Fig.5.After sensing and quantizing the system states,RSC code is proposed to add redundancy into the data stream in a controlled manner to give the Log-MAP decoder to correct errors at EMS.Once the estimated system states are obtained,a semide finite programming based optimal feedback controller is proposed to regulate the system states[30].The simulation is performed using the microgrid connected to IEEE 4-bus distribution feeder.The simulation parameters are summarized in Table I.

    The mean squared error(MSE)versus signal-to-noise ratio(SNR)is presented in Fig.6.It can be observed that the proposed method provides significant performance improvement compared with the existing method[1].The reason is that the RSC code is used to protect the system from cyber attacks and noises by adding redundancy in the system states.It can also protect the state information from the unreliable lossy communication networks.Furthermore,the Log-MAP decoding can also facilitate the accurate extraction of the system state.For better visualization of the cyber attack,the states versus time step are illustrated in Figs.7-10.It can be observed and expected that the cyber attack still affects the system states seriously when the existing method is used to estimate system states[1].In other words,there is a significant fluctuation due to the random noises and cyber attacks.Interestingly,the proposed RSC based cyber attack protection technique can tolerate the system impairments by introducing redundancy and protection in the system states.As a result,the proposed method can estimate microgrid states accurately even if there are cyber attacks and noises.

    Fig.5. System level diagram for system state estimation and control.

    TABLE IPARAMETERS FOR THE SIMULATION

    Fig.6.MSE versus SNR performance comparison using microgrid.

    Fig.7. State trajectory of Δv1and its estimate.

    Fig.8. State trajectory of Δv2and its estimate.

    Fig.9. State trajectory of Δv3and its estimate.

    Fig.10.State trajectory of Δv4and its estimate.

    Fig.11.Controlling the states trajectory.

    Fig.12.Control input trajectory.

    Unfortunately,it is noticed that the actual PCC state deviations increase dramatically(Figs.7-10),which is very dangerous in terms of network stability and microgrid operation.Thus,it is necessary to apply a suitable control technique,so that the PCC voltage deviations are driven to zero.After applying the proposed control method to the microgrid connected to the IEEE 4-bus distribution system,it can be seen from Figs.11 and 12 that the proposed controller is able to keep the voltage deviations to zero by the timek=200,which acts as a precursor in terms of network stability and proper operation of microgrids.Besides,the corresponding control input of each DER is shown in Fig.12,which implies that it requires a small amount of control input.

    VII.CONCLUSION

    This paper proposes a cyber attack minimization based dynamic state estimation technique and feedback control algorithm in smart grids.An RSC coded cyber attack protection technique is proposed to add redundancy in the system states.Then a Log-MAP decoding can assist to extract the system states from the received signal which is polluted by random noises and cyber attacks.In order to regulate the voltage deviation,this study proposes a semide finite programming based optimal feedback control method.The effectiveness of the developed approaches is verified by numerical simulations.These findings can help to design the future smart control center under cyber attacks.Consequently,it is encouraged to use an environmentally friendly renewable microgrid and the utility operator can monitor and control the power network properly.In the future work,packet losses and delay will be investigated in terms of system performance.

    [1]D.B.Rawat and C.Bajracharya,“Detection of false data injection attacks in smart grid communication systems,”IEEE Signal Process.Lett.,vol.22,no.10,pp.1652-1656,Oct.2015.

    [2]S.Li,Y.Y.lmaz,and X.D.Wang,“Quickest detection of false data injection attack in wide-area smart grids,”IEEE Trans.Smart Grid,vol.6,no.6,pp.2725-2735,Nov.2015.

    [3]M.Esmalifalak,G.Shi,Z.Han,and L.Y.Song,“Bad data injection attack and defense in electricity market using game theory study,”IEEE Trans.Smart Grid,vol.4,no.1,pp.160-169,Mar.2013.

    [4]K.C.Sou,H.Sandberg,and K.H.Johansson,“On the exact solution to a smart grid cyber-security analysis problem,”IEEE Trans.Smart Grid,vol.4,no.2,pp.856-865,Jun.2013.

    [5]M.Esmalifalak,H.Nguyen,R.Zheng,and Z.Han,“Stealth false data injection using independent component analysis in smart grid,”inProc.Int.Conf.Smart Grid Communications,Brussels,Belgium,2011,pp.244-248.

    [6]S.A.Salinas,and P.Li,“Privacy-preserving energy theft detection in microgrids:A state estimation approach,”IEEE Trans.Power Syst.,vol.31,no.2,pp.883-894,Mar.2016.

    [7]G.Hug and J.A.Giampapa,“Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks,”IEEE Trans.Smart Grid,vol.3,no.3,pp.1362-1370,Sep.2012.

    [8]A.Alimardani,F.Therrien,D.Atanackovic,J.Jatskevich,and E.Vaahedi,“Distribution system state estimation based on nonsynchronized smart meters,”IEEE Trans.Smart Grid,vol.6,no.6,pp.2919-2928,Nov.2015.

    [9]S.Meliopoulos,R.K.Huang,E.Polymeneas,and G.Cokkinides,“Distributed dynamic state estimation:Fundamental building block for the smart grid,”inProc.Power&Energy Society General Meeting,Denver,CO,USA,2015,pp.1-6.

    [10]C.J.Gu,P.Jirutitijaroen,and M.Motani,“Detecting false data injection attacks in AC state estimation,”IEEE Trans.Smart Grid,vol.6,no.5,pp.2476-2483,Sep.2015.

    [11]Y.Weng,Q.Li,R.Negi,and M.Ilic′,“Distributed algorithm for SDP state estimation,”inProc.IEEE PES Innovative Smart Grid Technologies,Washington,DC,USA,2013,pp.1-6.

    [12]H.Zhang,P.Cheng,L.Shi,and J.M.Chen,“Optimal denial-ofservice attack scheduling with energy constraint,”IEEE Trans.Automat.Control,vol.60,no.11,pp.3023-3028,Nov.2015.

    [13]L.Shi,P.Cheng,and J.M.Chen,“Sensor data scheduling for optimal state estimation with communication energy constraint,”Automatica,vol.47,no.8,pp.1693-1698,Aug.2011.

    [14]Y.Z.Li,L.Shi,P.Cheng,J.M.Chen,and D.E.Quevedo,“Jamming attacks on remote state estimation in cyber-physical systems:A gametheoretic approach,”IEEE Trans.Automat.Control,vol.60,no.10,pp.2831-2836,Oct.2015.

    [15]H.Zhang,P.Cheng,L.Shi,and J.M.Chen,“Optimal dos attack policy against remote state estimation,”inProc.52nd Annu.Conf.Decision and Control,Firenze,Italy,2013,pp.5444-5449.

    [16]Y.L.Mo,R.Chabukswar,and B.Sinopoli,“Detecting integrity attacks on SCADA systems,”IEEE Trans.Control Syst.Technol.,vol.22,no.4,pp.1396-1407,Jul.2014.

    [17]S.A.Are fifar,A.R.I.Mohamed,T.El-Fouly,“Optimized multiple microgrid-based clustering of active distribution systems considering communication and control requirements,”IEEE Trans.Ind.Electron.,vol.62,no.2,pp.711-723,Feb.2015.

    [18]S.Saat,S.K.Nguang,J.Wu,and G.B.Zeng,“Disturbance attenuation for a class of uncertain polynomial discrete-time systems:An integrator approach,”inProc.12th Int.Conf.Control Automation Robotics&Vision,Guangzhou,China,2012,pp.787-792.

    [19]N.Azman,S.Saat,and S.K.Nguang,“Nonlinear observer design with integrator for a class of polynomial discrete-time systems,”inProc.Int.Conf.Computer,Communications,and Control Technology,Kuching,Malaysia,2015,pp.422-426.

    [20]H.J.Li,F.X.Li,Y.Xu,D.T.Rizy,and J.D.Kueck,“Adaptive voltage control with distributed energy resources:Algorithm,theoretical analysis,simulation,and field test verification,”IEEE Trans.Power Syst.,vol.25,no.3,pp.1638-1647,Aug.2010.

    [21]H.S.Li,L.F.Lai,and H.V.Poor,“Multicast routing for decentralized

    control of cyber physical systems with an application in smart grid,”IEEE J.Sel.Areas Commun.,vol.30,no.6,pp.1097-1107,Jul.2012.

    [22]E.Ghahremani and I.Kamwa,“Online state estimation of a synchronous generator using unscented Kalman filter from phasor measurements units,”IEEE Trans.Energy Conv.,vol.26,no.4,pp.1099-1108,Dec.2011.

    [23]D.Buchstaller,E.C.Kerrigan,and G.A.Constantinides,“Sampling and controlling faster than the computational delay,”IET Control Theory Appl.,vol.6,no.8,pp.1071-1079,May2012.

    [24]H.J.Yang,Y.Q.Xia,P.Shi,and M.Y.Fu,“A novel delta operator Kalman filter design and convergence analysis,”IEEE Trans.Circ.Syst.I:Reg.Pap.,vol.58,no.10,pp.2458-2468,Oct.2011.

    [25]T.J.Sui,K.Y.You,M.Y.Fu,and D.Marelli,“Stability of MMSE state estimators over lossy networks using linear coding,”Automatica,vol.51,pp.167-174,Jan.2015.

    [26]S.Ntalampiras,“Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling,”IEEE Trans.Ind.Inf.,vol.11,no.1,pp.104-111,Feb.2015.

    [27]Y.Jing,A Practical Guide to Error-Control Coding Using MATLAB.Boston,London,UK:Artech House,2010.

    [28]S.P.Gong,H.S.Li,L.F.Lai,and R.C.Qiu,“Decoding the‘nature encoded’messages for distributed energy generation control in microgrid,”inProc.IEEE Int.Conf.Communications,Kyoto,Japan,2011,pp.1-5.

    [29]C.Vlaˇdeanu and S.El Assad,Nonlinear Digital Encoders for Data Communications.New York,USA:John Wiley&Sons,2014.

    [30]M.M.Rana,L.Li,and S.W.Su,“Cyber attack protection and control in microgrids using channel code and semide finite programming,”inProc.Power and Energy Society General Meeting,Boston,MA,USA,2016,pp.1-5.

    [31]D.Simon,Optimal State Estimation:Kalman,H In finity,and Nonlinear Approaches.New Jersey,USA:John Wiley&Sons,2006.

    [32]A.K.Singh,R.Singh,and B.C.Pal,“Stability analysis of networked control in smart grids,”IEEE Trans.Smart Grid,vol.6,no.1,pp.381-390,Jan.2015.

    [33]C.Olalla,R.Leyva,A.El Aroudi,and I.Queinnec,“Robust LQR control for PWM converters:An LMI approach,”IEEE Trans.Ind.Electron.,vol.56,no.7,pp.2548-2558,Jul.2009.

    [34]M.Fardad and M.R.Jovanovic′,“On the design of optimal structured and sparse feedback gains via sequential convex programming,”inProc.American Control Conf.,2014,Portland,OR,USA,pp.2426-2431.

    [35]J.Lo¨fberg,“YALMIP:A toolbox for modeling and optimization in MATLAB,”inProc.IEEE Int.Symp.Computer Aided Control Systems Design,Taipei,China,2004,pp.284-289.

    国产日韩一区二区三区精品不卡| www国产在线视频色| 欧美日韩一级在线毛片| 中出人妻视频一区二区| 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区三区| 亚洲一区二区三区色噜噜| 中文字幕人成人乱码亚洲影| 久久精品国产亚洲av高清一级| 国产色视频综合| 欧美色欧美亚洲另类二区 | 国产av在哪里看| 国产主播在线观看一区二区| 黄频高清免费视频| 后天国语完整版免费观看| 久久久国产成人精品二区| 亚洲 欧美一区二区三区| www日本在线高清视频| 99久久99久久久精品蜜桃| 久久久久久久久中文| 国产精品综合久久久久久久免费 | 超碰成人久久| 一级毛片高清免费大全| 国产亚洲精品久久久久久毛片| 国产男靠女视频免费网站| 亚洲国产欧美日韩在线播放| 国产蜜桃级精品一区二区三区| av中文乱码字幕在线| 午夜福利高清视频| 国产蜜桃级精品一区二区三区| 黄色a级毛片大全视频| 精品欧美一区二区三区在线| 国产精品 国内视频| 久久精品国产综合久久久| 一区在线观看完整版| 18禁黄网站禁片午夜丰满| 首页视频小说图片口味搜索| 老司机午夜福利在线观看视频| 夜夜夜夜夜久久久久| 免费在线观看黄色视频的| 精品日产1卡2卡| 国产亚洲欧美精品永久| 国产精品 国内视频| 一本久久中文字幕| 日韩一卡2卡3卡4卡2021年| av片东京热男人的天堂| 十八禁人妻一区二区| 成人免费观看视频高清| 久久中文字幕一级| 精品日产1卡2卡| 欧美 亚洲 国产 日韩一| 久久久久亚洲av毛片大全| 午夜免费观看网址| 欧美久久黑人一区二区| 国产高清视频在线播放一区| 777久久人妻少妇嫩草av网站| 国产精品综合久久久久久久免费 | 99久久久亚洲精品蜜臀av| 精品一区二区三区视频在线观看免费| 人人妻,人人澡人人爽秒播| 在线永久观看黄色视频| 国产欧美日韩精品亚洲av| 久久久国产精品麻豆| 亚洲成人精品中文字幕电影| 亚洲五月色婷婷综合| 亚洲国产高清在线一区二区三 | 国产1区2区3区精品| 精品日产1卡2卡| 午夜福利在线观看吧| 国产精品久久视频播放| 最近最新免费中文字幕在线| 欧美老熟妇乱子伦牲交| 夜夜躁狠狠躁天天躁| 777久久人妻少妇嫩草av网站| 在线观看免费视频网站a站| 欧美成人性av电影在线观看| 婷婷丁香在线五月| 国产熟女xx| 国产野战对白在线观看| 国产av精品麻豆| 黄色片一级片一级黄色片| 亚洲色图综合在线观看| 999久久久国产精品视频| 亚洲av美国av| 性色av乱码一区二区三区2| 夜夜夜夜夜久久久久| 欧美乱码精品一区二区三区| 91成人精品电影| 国产一区在线观看成人免费| 亚洲精品国产区一区二| 久久国产亚洲av麻豆专区| 日韩av在线大香蕉| 日本 av在线| 日本黄色视频三级网站网址| 欧美激情 高清一区二区三区| 日韩高清综合在线| 9色porny在线观看| 午夜视频精品福利| 视频区欧美日本亚洲| 精品国产一区二区久久| 一本大道久久a久久精品| 久久久久亚洲av毛片大全| 久久人妻福利社区极品人妻图片| 久久久久国产一级毛片高清牌| 亚洲专区字幕在线| 久久人人精品亚洲av| 久久婷婷成人综合色麻豆| 午夜影院日韩av| 亚洲性夜色夜夜综合| 久久久久九九精品影院| 两个人看的免费小视频| 男人舔女人的私密视频| 俄罗斯特黄特色一大片| 久久久久国产一级毛片高清牌| 中文字幕久久专区| 12—13女人毛片做爰片一| 一区二区日韩欧美中文字幕| a级毛片在线看网站| 日本三级黄在线观看| 亚洲国产欧美网| av中文乱码字幕在线| 欧美激情高清一区二区三区| 精品日产1卡2卡| 又紧又爽又黄一区二区| 免费高清视频大片| 亚洲一区高清亚洲精品| 亚洲精品一卡2卡三卡4卡5卡| 亚洲美女黄片视频| 欧美成人一区二区免费高清观看 | 岛国视频午夜一区免费看| 嫩草影院精品99| 亚洲中文av在线| 国产亚洲欧美在线一区二区| 黄频高清免费视频| 很黄的视频免费| 精品国产一区二区久久| 丰满人妻熟妇乱又伦精品不卡| 99久久99久久久精品蜜桃| 午夜精品国产一区二区电影| 90打野战视频偷拍视频| 非洲黑人性xxxx精品又粗又长| 女人爽到高潮嗷嗷叫在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久国内视频| 咕卡用的链子| 久久中文看片网| 99香蕉大伊视频| 色综合婷婷激情| 丁香欧美五月| 在线观看免费日韩欧美大片| 精品国产国语对白av| 美女大奶头视频| 亚洲av日韩精品久久久久久密| 两人在一起打扑克的视频| 免费在线观看视频国产中文字幕亚洲| 99精品欧美一区二区三区四区| 在线观看免费午夜福利视频| 中文字幕精品免费在线观看视频| 18禁国产床啪视频网站| 两人在一起打扑克的视频| 亚洲自偷自拍图片 自拍| 欧美日本亚洲视频在线播放| 18美女黄网站色大片免费观看| 免费久久久久久久精品成人欧美视频| 亚洲精品在线美女| 美女大奶头视频| 国产一区二区三区综合在线观看| 最新在线观看一区二区三区| 99久久99久久久精品蜜桃| 欧美+亚洲+日韩+国产| 亚洲精品国产精品久久久不卡| 亚洲成av人片免费观看| 亚洲av片天天在线观看| 国产又爽黄色视频| 久久午夜亚洲精品久久| 好看av亚洲va欧美ⅴa在| 波多野结衣av一区二区av| 性色av乱码一区二区三区2| 高清黄色对白视频在线免费看| 一进一出抽搐动态| 亚洲专区字幕在线| 久久精品国产清高在天天线| 1024视频免费在线观看| 国产激情欧美一区二区| 久久国产精品影院| 成人国产综合亚洲| 欧美日韩亚洲综合一区二区三区_| 波多野结衣高清无吗| 久热爱精品视频在线9| 亚洲情色 制服丝袜| 国产97色在线日韩免费| 美女 人体艺术 gogo| 成人国语在线视频| 成人18禁高潮啪啪吃奶动态图| 99久久99久久久精品蜜桃| 午夜福利18| 啪啪无遮挡十八禁网站| 九色国产91popny在线| 精品卡一卡二卡四卡免费| 一区二区三区高清视频在线| 国产伦人伦偷精品视频| 国产人伦9x9x在线观看| 国产精品综合久久久久久久免费 | 久久精品成人免费网站| 淫妇啪啪啪对白视频| 12—13女人毛片做爰片一| 欧美日韩中文字幕国产精品一区二区三区 | 午夜福利一区二区在线看| 视频在线观看一区二区三区| 91大片在线观看| 好男人电影高清在线观看| 成人免费观看视频高清| 黄色丝袜av网址大全| 精品国产亚洲在线| 久久中文看片网| 久久九九热精品免费| 成人欧美大片| 男人舔女人下体高潮全视频| 国产色视频综合| 成人精品一区二区免费| 国产欧美日韩一区二区三| 亚洲国产欧美一区二区综合| av天堂久久9| 身体一侧抽搐| 90打野战视频偷拍视频| 中文字幕色久视频| 一本大道久久a久久精品| 亚洲av成人不卡在线观看播放网| 一个人观看的视频www高清免费观看 | 欧美亚洲日本最大视频资源| 国内毛片毛片毛片毛片毛片| 亚洲欧洲精品一区二区精品久久久| 夜夜看夜夜爽夜夜摸| 十八禁网站免费在线| 久久这里只有精品19| 精品卡一卡二卡四卡免费| 此物有八面人人有两片| 一区二区三区激情视频| 国产91精品成人一区二区三区| 99精品久久久久人妻精品| 9191精品国产免费久久| 国产亚洲精品第一综合不卡| 日韩大码丰满熟妇| 中文字幕av电影在线播放| 一进一出抽搐gif免费好疼| 精品乱码久久久久久99久播| 夜夜夜夜夜久久久久| 国产亚洲精品久久久久久毛片| www.999成人在线观看| 非洲黑人性xxxx精品又粗又长| 精品久久久精品久久久| 亚洲伊人色综图| 日韩视频一区二区在线观看| 精品日产1卡2卡| 国内精品久久久久久久电影| 超碰成人久久| 欧美在线黄色| 国产精品久久久久久人妻精品电影| 美女扒开内裤让男人捅视频| 亚洲av片天天在线观看| 欧美+亚洲+日韩+国产| 88av欧美| 久久久久久久久久久久大奶| 亚洲精品国产一区二区精华液| av免费在线观看网站| 天天躁狠狠躁夜夜躁狠狠躁| 三级毛片av免费| 少妇 在线观看| 久久人妻福利社区极品人妻图片| 中文字幕高清在线视频| 午夜福利,免费看| 女人精品久久久久毛片| 纯流量卡能插随身wifi吗| 一个人观看的视频www高清免费观看 | 免费一级毛片在线播放高清视频 | 亚洲精品av麻豆狂野| 国产主播在线观看一区二区| 亚洲欧美精品综合久久99| 12—13女人毛片做爰片一| 亚洲国产欧美一区二区综合| www日本在线高清视频| 成人免费观看视频高清| 国产99久久九九免费精品| 久热这里只有精品99| 欧美丝袜亚洲另类 | 亚洲成国产人片在线观看| 欧美亚洲日本最大视频资源| 黄片大片在线免费观看| 欧美激情久久久久久爽电影 | 成人国产综合亚洲| 久久中文字幕人妻熟女| 看免费av毛片| 亚洲男人天堂网一区| 中文字幕色久视频| av中文乱码字幕在线| 午夜精品在线福利| 国产精品1区2区在线观看.| 久久中文字幕人妻熟女| 色播在线永久视频| 露出奶头的视频| 欧美久久黑人一区二区| 亚洲成人国产一区在线观看| 黄色丝袜av网址大全| 日本欧美视频一区| 欧美丝袜亚洲另类 | 多毛熟女@视频| av电影中文网址| 欧美黑人精品巨大| 精品无人区乱码1区二区| 黄色成人免费大全| 18禁美女被吸乳视频| 国内精品久久久久精免费| 欧美黑人精品巨大| 成人三级做爰电影| 美女大奶头视频| 99久久国产精品久久久| 97碰自拍视频| 18禁黄网站禁片午夜丰满| 黄网站色视频无遮挡免费观看| 两个人视频免费观看高清| 国产1区2区3区精品| 亚洲第一青青草原| 多毛熟女@视频| 亚洲国产精品999在线| 一级作爱视频免费观看| 亚洲三区欧美一区| 欧美日韩乱码在线| av电影中文网址| 久久久久久国产a免费观看| 国产在线精品亚洲第一网站| 99热只有精品国产| 国产精品 欧美亚洲| 天天躁狠狠躁夜夜躁狠狠躁| 桃色一区二区三区在线观看| 自线自在国产av| 两性夫妻黄色片| 国产精品免费视频内射| av网站免费在线观看视频| 咕卡用的链子| videosex国产| 日日摸夜夜添夜夜添小说| 国产私拍福利视频在线观看| 成年女人毛片免费观看观看9| 此物有八面人人有两片| 老司机午夜十八禁免费视频| 韩国精品一区二区三区| 两性夫妻黄色片| 又紧又爽又黄一区二区| 日本 欧美在线| 亚洲国产欧美网| 久久精品影院6| 久久影院123| 国产又色又爽无遮挡免费看| 亚洲男人的天堂狠狠| 波多野结衣av一区二区av| 欧美色欧美亚洲另类二区 | 十分钟在线观看高清视频www| 亚洲av成人不卡在线观看播放网| 夜夜夜夜夜久久久久| 神马国产精品三级电影在线观看 | 久久性视频一级片| 不卡一级毛片| 一区二区三区精品91| 国产精品1区2区在线观看.| 免费搜索国产男女视频| 亚洲午夜精品一区,二区,三区| 亚洲av第一区精品v没综合| 女人爽到高潮嗷嗷叫在线视频| 一个人免费在线观看的高清视频| 咕卡用的链子| 午夜亚洲福利在线播放| 欧美绝顶高潮抽搐喷水| 日韩视频一区二区在线观看| 久久影院123| 美国免费a级毛片| 一卡2卡三卡四卡精品乱码亚洲| 亚洲va日本ⅴa欧美va伊人久久| 丰满的人妻完整版| 免费看美女性在线毛片视频| 高清在线国产一区| 国产午夜福利久久久久久| 岛国视频午夜一区免费看| 国产精华一区二区三区| 99精品在免费线老司机午夜| 亚洲午夜理论影院| 午夜福利18| 如日韩欧美国产精品一区二区三区| 国产亚洲精品一区二区www| 免费在线观看完整版高清| 首页视频小说图片口味搜索| 亚洲人成网站在线播放欧美日韩| 精品久久久久久久毛片微露脸| 亚洲国产中文字幕在线视频| 亚洲成人久久性| 高清黄色对白视频在线免费看| 日日夜夜操网爽| 男人舔女人下体高潮全视频| 国内精品久久久久久久电影| 亚洲国产高清在线一区二区三 | 亚洲成人免费电影在线观看| 午夜亚洲福利在线播放| 欧美精品啪啪一区二区三区| 母亲3免费完整高清在线观看| 国产精品国产高清国产av| 亚洲精品中文字幕一二三四区| 日韩国内少妇激情av| 最近最新中文字幕大全免费视频| 97人妻天天添夜夜摸| 电影成人av| 少妇 在线观看| 18禁裸乳无遮挡免费网站照片 | 日韩欧美国产一区二区入口| 亚洲欧美激情综合另类| 国产成人系列免费观看| 欧美日韩亚洲国产一区二区在线观看| 日韩精品免费视频一区二区三区| 精品久久久久久成人av| 国产蜜桃级精品一区二区三区| 国产高清videossex| 久久天堂一区二区三区四区| 高潮久久久久久久久久久不卡| 88av欧美| 看片在线看免费视频| 久久精品人人爽人人爽视色| 女人爽到高潮嗷嗷叫在线视频| 国产伦人伦偷精品视频| 一边摸一边抽搐一进一出视频| cao死你这个sao货| 一边摸一边抽搐一进一出视频| 亚洲黑人精品在线| 国产精品1区2区在线观看.| 日韩高清综合在线| 亚洲一区二区三区色噜噜| 好男人在线观看高清免费视频 | 久久久久久国产a免费观看| 91精品国产国语对白视频| 成人免费观看视频高清| 亚洲国产欧美网| 国产av精品麻豆| 一本大道久久a久久精品| 午夜久久久在线观看| 亚洲欧美精品综合久久99| 妹子高潮喷水视频| 久久午夜亚洲精品久久| 亚洲专区中文字幕在线| 国产精品秋霞免费鲁丝片| 欧美+亚洲+日韩+国产| 亚洲欧美激情综合另类| 午夜福利18| 亚洲avbb在线观看| 欧美黄色片欧美黄色片| 成人精品一区二区免费| 久久人妻熟女aⅴ| 又黄又爽又免费观看的视频| a级毛片在线看网站| 欧美日韩黄片免| x7x7x7水蜜桃| 亚洲国产看品久久| 两个人看的免费小视频| 嫩草影院精品99| 美女国产高潮福利片在线看| 日韩高清综合在线| 欧美+亚洲+日韩+国产| 亚洲第一欧美日韩一区二区三区| 他把我摸到了高潮在线观看| 丁香六月欧美| 日本免费a在线| 午夜激情av网站| 亚洲色图 男人天堂 中文字幕| 亚洲伊人色综图| 欧美日韩亚洲国产一区二区在线观看| 99精品欧美一区二区三区四区| 午夜日韩欧美国产| 两个人视频免费观看高清| 少妇 在线观看| 精品熟女少妇八av免费久了| 国产成人系列免费观看| 久久人妻av系列| 90打野战视频偷拍视频| 成年版毛片免费区| 99在线视频只有这里精品首页| 国产精品久久久久久亚洲av鲁大| 午夜成年电影在线免费观看| www.999成人在线观看| 亚洲国产日韩欧美精品在线观看 | 级片在线观看| 90打野战视频偷拍视频| 777久久人妻少妇嫩草av网站| 波多野结衣一区麻豆| 国产精品久久久久久亚洲av鲁大| 日本三级黄在线观看| АⅤ资源中文在线天堂| 欧美乱色亚洲激情| 一边摸一边抽搐一进一小说| 亚洲av成人不卡在线观看播放网| 日韩欧美在线二视频| 91精品三级在线观看| 国产伦一二天堂av在线观看| 久久久久九九精品影院| 亚洲精品一区av在线观看| 亚洲第一电影网av| 午夜福利免费观看在线| 欧美国产精品va在线观看不卡| 18禁裸乳无遮挡免费网站照片 | 久久狼人影院| 人妻丰满熟妇av一区二区三区| 免费观看人在逋| 亚洲成人免费电影在线观看| 精品无人区乱码1区二区| 久久狼人影院| 日日爽夜夜爽网站| 久久人妻熟女aⅴ| 国产午夜福利久久久久久| 欧美日韩福利视频一区二区| 91成人精品电影| 久久午夜综合久久蜜桃| 久久久久久久久免费视频了| www.www免费av| 国产精品 欧美亚洲| 男女下面进入的视频免费午夜 | 亚洲第一青青草原| 看黄色毛片网站| 久久精品影院6| www日本在线高清视频| 在线永久观看黄色视频| 久久国产亚洲av麻豆专区| 天天躁夜夜躁狠狠躁躁| 国产麻豆69| 亚洲电影在线观看av| 桃色一区二区三区在线观看| 亚洲,欧美精品.| 两人在一起打扑克的视频| 宅男免费午夜| 亚洲专区字幕在线| 嫁个100分男人电影在线观看| 亚洲五月色婷婷综合| aaaaa片日本免费| 在线永久观看黄色视频| 欧美中文综合在线视频| 亚洲第一青青草原| 在线av久久热| 亚洲国产看品久久| a在线观看视频网站| 亚洲一区二区三区不卡视频| 男女下面进入的视频免费午夜 | 怎么达到女性高潮| 成人亚洲精品一区在线观看| 亚洲精品国产色婷婷电影| 国产精品免费一区二区三区在线| 可以免费在线观看a视频的电影网站| 亚洲熟女毛片儿| 久久中文字幕人妻熟女| 18禁黄网站禁片午夜丰满| 男人舔女人的私密视频| 久久久久九九精品影院| 一二三四在线观看免费中文在| 亚洲人成77777在线视频| 99国产精品99久久久久| 亚洲自拍偷在线| 一级作爱视频免费观看| 国产99久久九九免费精品| 亚洲成人精品中文字幕电影| 国产成人欧美在线观看| 一区二区三区高清视频在线| 国产一区二区激情短视频| 一卡2卡三卡四卡精品乱码亚洲| 在线观看一区二区三区| a在线观看视频网站| 韩国av一区二区三区四区| 免费女性裸体啪啪无遮挡网站| 人妻丰满熟妇av一区二区三区| 久久香蕉国产精品| √禁漫天堂资源中文www| 日本免费一区二区三区高清不卡 | 久久久精品国产亚洲av高清涩受| 欧美日本亚洲视频在线播放| 一区在线观看完整版| 国产精品久久久久久亚洲av鲁大| 这个男人来自地球电影免费观看| 精品国产超薄肉色丝袜足j| 亚洲国产欧美一区二区综合| 亚洲精品在线美女| 丝袜人妻中文字幕| 黄色 视频免费看| 这个男人来自地球电影免费观看| 桃色一区二区三区在线观看| 麻豆成人av在线观看| 亚洲av第一区精品v没综合| 亚洲欧美日韩另类电影网站| 成人手机av| 国产精品亚洲一级av第二区| 欧美乱妇无乱码| 老司机深夜福利视频在线观看| 男女下面插进去视频免费观看| 手机成人av网站| 午夜激情av网站| 亚洲av成人av| 高潮久久久久久久久久久不卡| 琪琪午夜伦伦电影理论片6080| 又黄又粗又硬又大视频| 大型av网站在线播放| 一二三四在线观看免费中文在| 真人一进一出gif抽搐免费| 午夜免费成人在线视频| 狂野欧美激情性xxxx| 一级a爱片免费观看的视频| 熟女少妇亚洲综合色aaa.| 99热只有精品国产| 国产亚洲精品综合一区在线观看 | xxx96com| 嫩草影院精品99| av免费在线观看网站| 国产成人精品在线电影| 欧美大码av| 日韩视频一区二区在线观看|