• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy-Efficient Trajectory Planning for UAV-Aided Secure Communication

    2018-06-07 05:22:20QianWangZhiChenHangLi
    China Communications 2018年5期

    Qian Wang, Zhi Chen*, Hang Li

    National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China,Chengdu 611731, China

    I. INTRODUCTION

    Wireless communication is often vulnerable to signal interception due to the openness of the wireless transmission medium. As an information-theoretic approach for achieving perfect secrecy at the physical layer, physical layer security dose not rely on upper-layer encryptions in comparison to the traditional secretkey-based approach. This property makes physical layer security very attractive since key distribution and management may lead to security vulnerability in wireless systems. After Wyner’s seminal work [1], physical layer security has been studied for decades; notable works include the extension to Gaussian channels in [2], and the extension to broadcast channels with confidential messages in [3].

    Thanks to the continuous development of autonomous or semi-autonomous vehicles,such as unmanned aerial vehicles (UAVs),the aerial communication platform has been recognized as a promising complement to the existing terrestrial wireless network. Relative projects are operated by many companies,e.g., Google [4] and Facebook [5]. The flexi-ble deployment of the UAV and the high line of sight (LOS) probability of the air-to-ground link make the UAV-aided aerial platform greatly applicable in many situations. A typical use case of UAV-aided wireless communications is UAV-aided ubiquitous coverage[6], where the UAV is employed to provide seamless coverage within the serving area. An example scenario is the rapid service recovery after terrestrial infrastructure damage. Another main application of UAV-aided wireless communications is UAV-aided mobile relaying[7], a technique adjusting the relay’s location adaptively based on the changing communication environment.

    However, a variety of interesting challenges arise with the advent of UAV-aided wireless communications. In particular, to maintain the UAV aloft and support its mobility, a vast amount of energy is required, whereas the onboard energy is limited. Consequently, network operators should make great efforts to reduce the UAV’s energy consumption while satisfying the communication performance requirement. In [8], the authors acquired the propulsion energy consumption of the fixedwing UAV as a function of the UAV’s velocity and acceleration, based on which the communication throughput and the UAV’s propulsion energy consumption can be jointly considered.UAV-aided wireless communications offer new possibilities and opportunities for security enhancement. Recent works [9], [10] dealt with the secrecy rate maximization (SRM)problem in the UAV-aided network, where the high mobility of the UAV can be exploited to provide secrecy enhancement. However,this favorable prospect comes at the price of energy expenditure on UAV flying. This fact motivates us to jointly consider the secrecy performance and the UAV’s energy consumption.

    In this paper, our research interest lies on the secrecy energy efficiency of the UAV-aided wireless communication. Specifically, we consider a three-node communication system including a legitimate receiver, an eavesdropper, and an aerial source aided by the fixedwing UAV, wherein we optimize the UAV’s trajectory in order to strike a tradeoff between the secrecy throughput and the UAV’s energy consumption. Given the fact that the radiation and signal processing energy consumption on the UAV is usually negligible compared to the UAV’s propulsion energy, the secrecy energy efficiency is defined as the secrecy information bits per unit propulsion energy consumption.Unfortunately, the resulting secrecy energy efficiency maximization (SEEM) problem is a large-scale nonconvex problem, and thus is intractable to solve.

    The main contribution of this paper is to provide an efficient algorithm for the SEEM problem. Although the SEEM problem has an inherently complex problem structure, we show that sequential convex programming(SCP), together with Dinkelbach’s approach,can be applied to deal with it. Our proposed algorithm tackles the SEEM problem by solving convex problems in an iterative fashion.Besides the tractability, the proposed algorithm has a theoretically provable guarantee on the Karush-Kuhn-Tucker (KKT) point convergence of its solution. The numerical results validate the efficacy of our proposed algorithm in enhancing the system’s secrecy performance with acceptable energy consumption.

    To gain new insights and provide benchmarks, we also study the unconstrained UAV trajectory for secrecy rate maximization(SRM), whose optimal solution is derived in closed form. Despite the impracticality of implementing the unconstrained SRM design in the fixed-wing UAV system, it is highly applicable in the rotary-wing UAV-employed case.

    II. SYSTEM MODEL AND PROBLEM STATEMENT

    Consider a wireless communication system consisting of an aerial source, a terrestrial destination (Bob), and a terrestrial eavesdropper(Eve), as schematically shown in figure 1. Unlike the conventional three-node wiretap channel, our system employs a fixed-wing UAV as an aerial source of sufficiently high mobility.The considered setup could be related to the military scenario, wherein the UAV acts as a relay connecting the command center with the front line. Also, the considered system could correspond to the service recovery scenario in cellular networks, after nature disaster destroys the backhaul links of the isolated base station.

    Assume that the UAV flies at a constant altitude H within a finite time horizon T. In practice, H may be related to the minimum altitude where the UAV does not need frequent ascending and descending in order to avoid mountains or buildings. The time horizon T is discretized into N time slots, i.e., T=Nδt,where δtdenotes the slot length. The UAV’s location is assumed to be approximately invariable during each slot with δtchosen to be sufficiently small. Without loss of generality, a three-dimensional (3D) Cartesian coordinate system is considered, with Bob and Eve placed on the ground with coordinates (0,0,0) and (xE,0,0), respectively, while the UAV’s coordinate at slot n is represented as (x[ n ], y[ n], H), with x[ n] and y[ n] being the UAV’s x- and y-coordinates at slot n, respectively. In view of practicality, factors such as pre-mission/post-mission trajectories and launching/landing coordinates decide the initial and final UAV coordinates and velocities.Thus, the UAV in our scenario has predetermined initial and final coordinates represented as (x0, y0, H) and (xF, yF, H), respectively, and prearranged initial and final velocities being v0and vF, respectively. For ease of subsequent description, denote q[n ]?[x[ n ],y[ n ]]T,as the UAV coordinate projected on the horizontal plane at slot n. In the same manner, letbe the projected coordinates of Eve, and the initial and final UAV locations, respectively. The slot length is sufficiently small, as mentioned before, so that the UAV’s acceleration vector can be viewed as approximately invariant during every slot. As a result, we have the following formulas, i.e.,

    where v[n] and a[n] denote the UAV’s velocity and acceleration vectors at slot n, respectively.

    Let hub[n ] and hue[n] represent the channel gains of the UAV-Bob link and the UAV-Eve link at the n th time slot, respectively. Analogous to [7], the air-to-ground channels follow the free-space path loss model:

    with

    and

    being the distances of the UAV-Bob link and the UAV-Eve link at slot n, respectively, and β0denoting the reference channel power at distance d0=1 meter.

    Consider a constant transmit power P at the UAV, which could be relevant to the maximum value allowed by the authority regulations. Now, defineas the

    Fig. 1. Secure wireless communication between a UAV-aided source and a terrestrial destination in the presence of a terrestrial eavesdropper.

    reference received signal-to-noise ratio (SNR),where δ2denotes the noise power. All channel coefficients are assumed to be available,including those for Eve. This is possible in scenarios where Eve is a network user, while it is not authorized as far as the message for Bob is concerned. Based on the above setup, an achievable secrecy rate can be written as [11]

    in which

    The total energy consumption of the UAV is made up of the communication-relevant energy and the propulsion energy. Due to the fact that the energy consumed on communication is extremely small compared to the propulsion energy [12], our work focuses on the latter,which is expressed as (3) (cf. [8]) at the bottom of page 53, where m is the mass of the UAV, g is the gravitational acceleration, and c1and c2are constant parameters depending on factors such as the aircraft’s weight and the air density. It should be mentioned that the rotary-wing UAV works in a different manner to the fixed-wing UAV [13]. Accordingly, the considered energy model (3) only applies to the fixed-wing case.

    This work is interested in the design criterion of {q[ n]}, {a[ n]} and {v[ n]}, under a SEEM formulation, i.e.,

    where E ({v[ n ],a[ n]}) and Rs({q[n]}) are given in (3) and (4), respectively,Vmaxand Vmindenote the maximum and minimum speeds, respectively, and amaxrepresents the maximum acceleration.

    III. A TRACTABLE APPROACH TO THE SEEM PROBLEM

    The nonconvexity of Rs({q[n ]}), E ({v[ n ],a[ n]}),and (5f) suggests that the SEEM problem (5)is a nonconvex problem. Accordingly, our aim is to seek a suboptimal solution for SEEM.We begin by considering an upper bound of E ({v[ n ],a[ n ]}), i.e.,

    whereis a constant since the initial and final UAV velocities are predetermined in (5c). Then, the energy efficiencyis lower-bounded by, based upon which we obtain an approximated SEEM problem, i.e.,

    In the sequel, we will propose an iterative algorithm, by invoking sequential convex programming (SCP), to search for a Karush-Kuhn-Tucker (KKT) point of the approximated SEEM problem (7). Its basic idea is to successively construct subproblems at successive iteration points.

    To simplify the objective, problem (7) is equivalently reformulated as

    where {τn,∈n} are slack variables. It can be verified by contradiction that the optimal solution of problem (8) must satisfy all constraints in (8e) and (8f) with equality, thus problem (8)is an equivalent transformation of problem (7).

    Before proceeding further, we define η(v[n ])=||v[n ]||2and ξ(q[ n ])=| |q[ n] ? qE||2for notational convenience and present the following lemma.

    L e m m a 1: F o r a n y {q[ n]} a n d{v[ n]}, Rb({q[n]}), η(v[ n]), and ξ(q[ n]) can be lower-bounded by

    and

    respectively, where {q0[n ]} and {v0[n ]} can be any feasible UAV trajectory and UAV speeds,and

    Proof: See Appendix VII-A for a detailed proof.

    Invoking Lemma 1, we reformulate problem (8) by approximating Rb({q[n ]}),||v[ n]||2,and ||q[n] ?qE||2in (8a), (8e), and (8f) with their lower boundsand ξlb(q[ n]), respectively. The resulting approximated SEEM problem is written as

    For the convenience of subsequent description, let us denote the numerator and denominator in the objective function of problem (10)as f({q[ n],∈n}) and g ({v [n ],a[ n],τn}), respectively.

    One can easily obtain the fact that?f({q[ n],∈n}), g ({v[ n ],a[ n],τn}), and all the constraints in (10) are convex. Thus, problem(10) can be conveniently solved by employing fractional programming methods, e.g., the standard Dinkelbach’s algorithm [14]. Dinkelbach’s procedure can be deemed as a method to identify a root of the equation F(λ)=0,wherein F()λ is given by

    With a given parameter λ, problem (11) is convex so that its optimal solution can be obtained by exploiting a general purpose convex optimization technique, like the interior-point method [15]. The upshot of the Dinkelbach’s procedure is that one can optimally solve problem (10) by iteratively solving problem(11) with updating λ.

    Our proposed approach for the SEEM problem is summarized in Algorithm 1, which has two levels. The outer level (level 1) is related to the iteration of the SCP algorithm. The inner level (level 2) corresponds to the iteration of the Dinkelbach’s method. One can see that the basic merit of the proposed algorithm lies in the tractability, which only requires solving convex optimization problems. As an additional merit, Algorithm 1 has theoretically provable convergence:

    Theorem 1: Algorithm 1 is guaranteed to converge to a KKT point of the approximated SEEM problem (7).

    Proof: The proof of Theorem 1 is relegated to Appendix VII-B.

    ?

    IV. SECRECY RATE MAXIMIZATION WITH UNCONSTRAINED TRAJECTORY

    In this section, we investigate the secrecy rate maximization (SRM) problem, without considering the constraints on the UAV trajectory,i.e., (5b)-(5f), so as to draw new insights.

    In the absence of constraints on the UAV trajectory, one can immediately derive the fact that the UAV trajectory for SRM should be a fixed point (xs,ys,H), i.e., the location corresponding to the best secure transmission channel. Now, we are interested in designingfor SRM, i.e.,

    A major challenge in solving problem (12)lies in the coupling of xsand ys. Thankfully,we can prove that the optimal ysshould be 0(cf. Lemma 3). As a benefit of this, the optimal solution of problem (12) can be obtained in closed form, which is presented in the following lemma.

    Lemma 2: The x- and y-coordinates of the optimal UAV location for SRM are given by

    whereand

    Proof: See Appendix VII-C for a detailed proof.

    It should be pointed out that we ignore the case xE=0, due to the fact that Bob and Eve cannot be located at the same place in view of practicality.

    Remark 1: It is impossible for a fixed-wing UAV to stay stationary in the air, thus the SRM design is evidently energy inefficient. Nevertheless, the SRM design is highly applicable in situations where the UAV has rotary-wings such that the energy consumption for hovering at a stationary point is endurable, especially with a short service time and adequate power supply from battery or wireless power transfer.

    V. NUMERICAL RESULTS

    In this section, numerical results are given to show the performance of the proposed design.Overall simulation settings are as follows:The communication bandwidth and the noise power spectrum density are B=1MHz and N0= ?170dBm/Hz, respectively. The UAV’s transmission power is P=10dBm, and the reference channel power is β0= ?50dB. Accordingly, the reference SNR at distance d0=1 m is γ0=70dB. Moreover, we set c1=9.26× 10?4and c2=2250. The flying altitude of the UAV is fixed at H=100 m and the UAV’s service time is set to be T=200 s. The x-coordinate of Eve is assumed to be xE=?200 m.

    5.1 Case 1: unconstrained trajectory design

    In this case, we consider the trajectory optimization problem in the absence of constraints (5b)-(5f), i.e., the UAV is assumed to have no restrictions including speed and acceleration limits, and predetermined initial and final coordinates and velocities. Based on our setup, the optimal UAV trajectory for SRM should be hovering at the fixed location(41.1415m,0,100m), which we will refer to as the SRM hovering point in the remaining part of this paper. The unconstrained SEEM design can be derived through utilizing a similar SCP approach as the one presented in Algorithm 1.In figure 2 we plot the obtained unconstrained UAV trajectory projected onto the horizontal plane for SEEM. As one can see, the UAV flies around the SRM hovering point to achieve high-security communication, while following a trajectory made up of “8”-shape paths to maintain acceptable power consumption.

    5.2 Case 2: constrained trajectory design

    In this case, the trajectory optimization problem with constraints is considered.

    We set the initial and final locations to be q0=[0,1000]Tand qF=[1000,0]T, respectively. The initial and final velocities are set as v0=vF=30(qF? q0)/||qF?q0||. Next, let the maximum and minimum UAV speeds be Vmax=100 m/s and Vmin=3 m/s, respectively.The maximum acceleration speed is assumed to be amax=5 m/s2. In figure 3 we plot the constrained UAV trajectory projected onto the horizontal plane for SEEM and that for SRM.Here, we should mention that the constrained UAV trajectory for SRM can be obtained by invoking a similar SCP approach as that in Algorithm 1. From the figure, we can see that for both SEEM and SRM, the UAV flies from the initial location to places around the SRM hovering point to achieve good secrecy transmission. In contrast to the SEEM design, the SRM design allows drastic changes in the UAV’s heading direction, which are energy-consuming, in exchange of high-security communication. As expected, the SEEM design expresses more tolerance towards inferior channels so as to strike a tradeoff between the secure transmission and the power consumption.

    Table I provides the system performance for SEEM and SRM with constrained and unconstrained trajectory designs. As a benchmark, the performance of the heuristic straight flight from q0to qFwith fixed velocity is also presented in table I. From the table, one can easily see that compared to the heuristic straight flight, the SEEM design obtained by our proposed algorithm experiences lower power consumption and higher secrecy rate at the same time, even with practical constraints.Table I also shows that compared to the SRM design, the SEEM design could strike a sig-nificantly better secrecy rate-power consumption tradeoff. These observations demonstrate that our proposed algorithm can improve the secrecy energy efficiency significantly.

    Fig. 2. Unconstrained UAV trajectory for SEEM. The triangle, diamond, and star represent Bob, Eve and the SRM hovering point, respectively.

    Fig. 3. Constrained UAV trajectories for SEEM and SRM, respectively. The diamond, square, circle, and star denote Eve, initial and final locations, and the SRM hovering point, respectively.

    Table I. performance comparison for various designs.

    VI. CONCLUSION

    In this paper, we investigated the SEEM problem in a UAV-aided network. Specifically, we optimized the UAV trajectory to maximize the secrecy information bits per unit propulsion energy consumption. The SEEM problem is challenging due to its inherently complex structure. As a compromise, an efficient iterative algorithm based on SCP and Dinkelbach’s method was proposed to seek a suboptimal solution for SEEM. The proposed algorithm is proved to have KKT point convergence. Additionally, the optimal unconstrained trajectory for SRM is derived in closed form, which is energy inefficient with the fixed-wing UAV,while applicable with the rotary-wing UAV.

    VII. APPENDIX

    7.1 The proof of Lemma 1

    One can easily verify thatwith some constant γ> 0 and A, is convex for w>?A. Thus, the first-order Taylor series expansion of h( w) at any feasible point w0> ?A is a lower bound of h( w), i.e.,

    (9a) follows from (14) by letting γ=γ0,A=H2,w0=||q0[n ]||2, and w=||q[n]||2. (9b) and (9c) can be obtained in a similar manner: since both||v[ n]||2and ||q[n] ?qE||2are convex functions,their respective lower bounds ηlb(v[ n]) and ξlb(q[ n]) can be derived by exploiting first-order Taylor series expansions.

    7.2 The proof of Theorem 1

    To begin with, one can obtain the gradients of Rb({q[n ]}) and Rblb({q[n ]}) with respect to q[n],which are:

    and

    respectively. The gradients of η(v[ n]) and ηlb(v[ n]) with regard to v[n] can be derived as

    and

    respectively. Moreover, the gradients of ξ(q[ n]) and ξlb(q[ n]) with respect to q[n] are

    and

    respectively. It is easy to see that with q[n] = q0[n] and v[n ] = v0[n ],? n,we have the following equations:

    and

    In addition, one can easily obtain the fact that when q[n]= q0[n] and v[n ] = v0[n ],? n,all the inequalities in (9a)-(9c) hold with equality.Based on the above facts, Theorem 1 can be immediately derived according to [16, Proposition 3].

    7.3 The proof of Lemma 2

    To acquire the optimal solution of (12), denoted by, we will need the following lemma:

    Lemma 3: The y-coordinate of the optimal UAV location for SRM, i.e.,, should be zero.

    Proof: To begin with, we have

    where

    and

    Suppose that a1≥ a4holds at point. One can easily find another solutionsatisfyingand attain a larger objective, which is a contradiction. This concludes that a4>a1.Due to the fact that

    and

    it is easy to obtain that a1a2> a3a4. Now, we have

    wherein the equality holds iff ys=0. This thus completes the proof.

    According to Lemma 3, problem (12) can be equally written as

    w h e r eBy setting the first-order derivative of U( xs)to zero, the closed-form optimal solution of problem (12), as shown in Lemma 2, can be derived.

    ACKNOWLEDGMENT

    This work was supported in part by the National Natural Science Foundation of China under Grant 61631004 and 61571089.

    [1] A. D. Wyner, “The wire-tap channel,” Bell Syst.Tech. J., vol. 54, no. 8, Oct. 1975, pp. 1355–1387.

    [2] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan- nel,” IEEE Trans. Inf.Theory, vol. 24, no. 4, Jul. 1978, pp. 451–456.

    [3] I. Csiszár and J. K?rner, “Broadcast channels with confidential mes- sages,” IEEE Trans. Inf. Theory,vol. 24, no. 3, May 1978, pp. 339–348.

    [4] S. Katikala, “Google project loon,” InSight: Rivier Academic Journal, vol. 10, no. 2, 2014.

    [5] Y. Zeng and R. Zhang and T. J. Lim, “Connecting the world from the sky,” Facebook, Technical Report, 2014.

    [6] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with un- manned aerial vehicles:Opportunities and challenges,” IEEE Commun.Mag., vol. 54, no. 5, May 2016, pp. 36–42.

    [7] Y. Zeng and R. Zhang and T. J. Lim, “Throughput maximization for UAV-enabled mobile relaying systems,” IEEE Trans. Commun., vol. 64, no. 12,pp. 4983–4996, Dec. 2016.

    [8] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with trajectory optimization,”IEEE Trans. Wireless Commun., vol. 16, no. 6,Jun. 2017, pp. 3747-3760.

    [9] Q. Wang, Z. Chen, W. Mei, and J. Fang, “Improving physical layer security using UAV-enabled mobile relaying,” IEEE Wireless Commun. Lett.,vol. 6, no. 3, Jun. 2017, pp. 310–313.

    [10] G. Zhang, Q. Wu, M. Cui, and R. Zhang, “Securing UAV communi- cations via trajectory optimization,” Proc. IEEE Global Communications Conference, Singapore, Dec. 2017, pp. 1–6.

    [11] T. Liu and S. Shamai (Shitz), “A note on the secrecy capacity of the multi-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6,Jun. 2009, pp. 2547–2553.

    [12] C. D. Franco and G. Buttazzo, “Energy-aware coverage path planning of UAVs,” Proc. IEEE Int.Conf. Auto. Robot Syst. Compet., Apr. 2015, pp.111–117.

    [13] A. Filippone, Flight Performance of Fixed and Rotary Wing Aircraft. Washington, DC: USA:AIAA, 2006.

    [14] J.-P. Crouzeix and J. A. Ferland, “Algorithms for generalized fractional programming,” Math.Programm., vol. 52, no. 1, 1991, pp. 191–207.

    [15] S. Boyd, EE364b convex optimization II. Course Notes, available online at http://www.stanford.edu/class/ee364b.

    [16] A. Zappone, E. Bjornson, L. Sanguinetti, and E. Jorswieck, “Achieving global optimality for energy efficiency maximization in wireless networks,” Available online at https://arxiv.org/abs/1602.02923.

    亚洲一区高清亚洲精品| 日韩精品有码人妻一区| 国产色婷婷99| 国产大屁股一区二区在线视频| 大又大粗又爽又黄少妇毛片口| 看黄色毛片网站| 免费一级毛片在线播放高清视频| 亚洲人成网站在线观看播放| 国语自产精品视频在线第100页| 一卡2卡三卡四卡精品乱码亚洲| 午夜福利成人在线免费观看| 中文字幕人妻熟人妻熟丝袜美| 成人综合一区亚洲| 免费无遮挡裸体视频| 人人妻人人澡人人爽人人夜夜 | 日韩欧美免费精品| 久久久久久久午夜电影| av在线播放精品| 99久久精品国产国产毛片| 亚洲成人久久爱视频| 国产精品久久久久久久久免| 波多野结衣巨乳人妻| 黄色一级大片看看| 午夜福利在线观看免费完整高清在 | 国产伦一二天堂av在线观看| 在线天堂最新版资源| 日日啪夜夜撸| 一区福利在线观看| 国产成人福利小说| 91在线精品国自产拍蜜月| 嫩草影院新地址| 男女视频在线观看网站免费| 国产麻豆成人av免费视频| 精品久久久噜噜| 99视频精品全部免费 在线| 久久精品夜夜夜夜夜久久蜜豆| 国产精品女同一区二区软件| 可以在线观看的亚洲视频| 久久久久久久亚洲中文字幕| 悠悠久久av| 成人国产麻豆网| 黄色视频,在线免费观看| 国产真实乱freesex| 欧美另类亚洲清纯唯美| 少妇高潮的动态图| 国产三级中文精品| 亚洲一级一片aⅴ在线观看| 成人漫画全彩无遮挡| 午夜激情欧美在线| 欧美国产日韩亚洲一区| 欧美日韩一区二区视频在线观看视频在线 | 精品国产三级普通话版| 欧美在线一区亚洲| 美女高潮的动态| 在线国产一区二区在线| 一区二区三区高清视频在线| 国产高潮美女av| 精品乱码久久久久久99久播| 亚洲五月天丁香| 欧美高清性xxxxhd video| 国产精品野战在线观看| 国产黄片美女视频| 国产不卡一卡二| 色哟哟·www| 变态另类丝袜制服| 日韩高清综合在线| 日韩大尺度精品在线看网址| 看十八女毛片水多多多| 丰满人妻一区二区三区视频av| 欧美性感艳星| 啦啦啦啦在线视频资源| 国产精品野战在线观看| 一级a爱片免费观看的视频| 天堂√8在线中文| 久久精品夜夜夜夜夜久久蜜豆| 精品免费久久久久久久清纯| 国产片特级美女逼逼视频| 中文字幕久久专区| 全区人妻精品视频| 亚洲欧美成人综合另类久久久 | 日韩国内少妇激情av| 夜夜看夜夜爽夜夜摸| 国产精品一及| 国产精品久久视频播放| 免费看日本二区| 国产精品乱码一区二三区的特点| 22中文网久久字幕| 国产成人91sexporn| a级毛片a级免费在线| 高清毛片免费观看视频网站| 亚洲丝袜综合中文字幕| 亚洲第一区二区三区不卡| 黄片wwwwww| or卡值多少钱| 欧美色视频一区免费| 精品久久久久久久久久免费视频| 99久久久亚洲精品蜜臀av| 欧美三级亚洲精品| 菩萨蛮人人尽说江南好唐韦庄 | av福利片在线观看| 成人高潮视频无遮挡免费网站| 看非洲黑人一级黄片| 成人特级av手机在线观看| 秋霞在线观看毛片| 看片在线看免费视频| 色综合色国产| 五月伊人婷婷丁香| 岛国在线免费视频观看| 精品久久久久久成人av| 国产精品亚洲美女久久久| 成人三级黄色视频| 综合色av麻豆| 女生性感内裤真人,穿戴方法视频| 国产麻豆成人av免费视频| 日本一本二区三区精品| 久久精品人妻少妇| 精品乱码久久久久久99久播| 国产人妻一区二区三区在| 成人美女网站在线观看视频| 国语自产精品视频在线第100页| avwww免费| a级毛片a级免费在线| 国产精品伦人一区二区| 精品久久久久久久人妻蜜臀av| 天天一区二区日本电影三级| 日本色播在线视频| 听说在线观看完整版免费高清| 成人鲁丝片一二三区免费| 成人精品一区二区免费| 五月伊人婷婷丁香| 少妇猛男粗大的猛烈进出视频 | 国产精品女同一区二区软件| 亚洲成人久久爱视频| 中文字幕久久专区| eeuss影院久久| 国产精品人妻久久久影院| 国产真实乱freesex| 国产av一区在线观看免费| 成年女人看的毛片在线观看| 亚洲av免费在线观看| 亚洲人与动物交配视频| 日韩一区二区视频免费看| 日产精品乱码卡一卡2卡三| 免费高清视频大片| av女优亚洲男人天堂| 亚洲无线观看免费| 成人毛片a级毛片在线播放| or卡值多少钱| 日韩 亚洲 欧美在线| 男女那种视频在线观看| 日本与韩国留学比较| 亚洲国产欧美人成| 一卡2卡三卡四卡精品乱码亚洲| 国产午夜精品论理片| 永久网站在线| 十八禁网站免费在线| 亚洲精品久久国产高清桃花| 日韩欧美在线乱码| 亚洲自拍偷在线| 91久久精品国产一区二区成人| 麻豆精品久久久久久蜜桃| 国产在线精品亚洲第一网站| 免费看a级黄色片| 国产精品日韩av在线免费观看| 久久99热6这里只有精品| 中文资源天堂在线| 丰满人妻一区二区三区视频av| 插阴视频在线观看视频| 国产精品久久电影中文字幕| 寂寞人妻少妇视频99o| 久久久久久伊人网av| 国内精品宾馆在线| 免费人成在线观看视频色| av在线观看视频网站免费| 狂野欧美激情性xxxx在线观看| 久久九九热精品免费| 一级毛片aaaaaa免费看小| 悠悠久久av| 校园人妻丝袜中文字幕| 一卡2卡三卡四卡精品乱码亚洲| 精品一区二区三区视频在线观看免费| 免费高清视频大片| 午夜免费激情av| 成人精品一区二区免费| 欧美一区二区精品小视频在线| 免费大片18禁| 美女cb高潮喷水在线观看| 中文字幕精品亚洲无线码一区| 中文在线观看免费www的网站| 欧美日韩国产亚洲二区| 国产 一区精品| 99久久无色码亚洲精品果冻| 国产又黄又爽又无遮挡在线| 村上凉子中文字幕在线| 狠狠狠狠99中文字幕| 国产精品嫩草影院av在线观看| 欧美最黄视频在线播放免费| 色在线成人网| 日本免费a在线| 一级av片app| 免费av观看视频| 久久精品夜夜夜夜夜久久蜜豆| 夜夜爽天天搞| 真人做人爱边吃奶动态| 蜜臀久久99精品久久宅男| 男女视频在线观看网站免费| 精品一区二区三区av网在线观看| 亚洲精品成人久久久久久| 最近中文字幕高清免费大全6| 99riav亚洲国产免费| av黄色大香蕉| 久久久久国产网址| 婷婷六月久久综合丁香| 成年女人毛片免费观看观看9| 黄色配什么色好看| 欧美性猛交黑人性爽| 狂野欧美白嫩少妇大欣赏| 波野结衣二区三区在线| 99久久中文字幕三级久久日本| 一级黄片播放器| 18+在线观看网站| av国产免费在线观看| 午夜亚洲福利在线播放| 校园春色视频在线观看| 久久精品91蜜桃| 深夜精品福利| 久久精品国产亚洲网站| 又黄又爽又免费观看的视频| 亚洲精品粉嫩美女一区| 亚洲欧美中文字幕日韩二区| 欧美激情久久久久久爽电影| 香蕉av资源在线| 久久久久性生活片| 欧美人与善性xxx| 精品乱码久久久久久99久播| 午夜激情福利司机影院| 少妇高潮的动态图| 久久中文看片网| 亚洲高清免费不卡视频| 午夜日韩欧美国产| eeuss影院久久| 一进一出抽搐动态| 欧美激情久久久久久爽电影| 亚洲18禁久久av| 在线免费十八禁| 国产精品人妻久久久久久| 色综合亚洲欧美另类图片| 最后的刺客免费高清国语| 欧美日韩国产亚洲二区| 男女做爰动态图高潮gif福利片| 51国产日韩欧美| 欧美日本视频| 久久精品影院6| 午夜激情福利司机影院| 欧美日韩国产亚洲二区| 亚洲av成人av| 国产精品美女特级片免费视频播放器| 成人特级黄色片久久久久久久| 天堂动漫精品| 中文字幕人妻熟人妻熟丝袜美| 日本黄大片高清| 久久6这里有精品| 直男gayav资源| av中文乱码字幕在线| 校园人妻丝袜中文字幕| 亚洲欧美成人精品一区二区| av国产免费在线观看| 日日干狠狠操夜夜爽| 内地一区二区视频在线| 人妻丰满熟妇av一区二区三区| 欧美bdsm另类| 亚洲四区av| 黄色一级大片看看| 变态另类丝袜制服| 啦啦啦观看免费观看视频高清| 日本免费一区二区三区高清不卡| 日韩高清综合在线| 午夜视频国产福利| 大香蕉久久网| 国产黄a三级三级三级人| 亚洲图色成人| 人妻夜夜爽99麻豆av| 99久久无色码亚洲精品果冻| 少妇的逼水好多| 丰满人妻一区二区三区视频av| 精品人妻熟女av久视频| 日韩一区二区视频免费看| 我的女老师完整版在线观看| 99久久精品国产国产毛片| 伦理电影大哥的女人| 国产私拍福利视频在线观看| 国产久久久一区二区三区| 插逼视频在线观看| 女人十人毛片免费观看3o分钟| 亚洲在线观看片| 欧美bdsm另类| 一本一本综合久久| 黄色日韩在线| 国产一区二区激情短视频| 日韩欧美国产在线观看| 欧美又色又爽又黄视频| 免费搜索国产男女视频| 可以在线观看毛片的网站| 精品乱码久久久久久99久播| 成人鲁丝片一二三区免费| 亚洲激情五月婷婷啪啪| 91久久精品国产一区二区成人| 国产精品亚洲美女久久久| 久久中文看片网| 亚洲精品乱码久久久v下载方式| 三级国产精品欧美在线观看| 亚洲av熟女| 成人美女网站在线观看视频| 色吧在线观看| 夜夜夜夜夜久久久久| 国产爱豆传媒在线观看| 少妇裸体淫交视频免费看高清| 亚洲中文日韩欧美视频| 无遮挡黄片免费观看| 99国产精品一区二区蜜桃av| 色综合色国产| 亚洲精品色激情综合| 中国美女看黄片| 又爽又黄a免费视频| 婷婷精品国产亚洲av在线| 亚洲国产精品成人久久小说 | 亚洲人成网站在线播放欧美日韩| or卡值多少钱| 免费一级毛片在线播放高清视频| 久久久成人免费电影| 如何舔出高潮| 日韩一本色道免费dvd| 一本一本综合久久| 国产毛片a区久久久久| 嫩草影院新地址| 淫妇啪啪啪对白视频| 精品乱码久久久久久99久播| 91精品国产九色| 亚洲自拍偷在线| 男插女下体视频免费在线播放| 在线观看66精品国产| 淫秽高清视频在线观看| 中文资源天堂在线| 国产精品一区二区三区四区久久| 中文在线观看免费www的网站| 亚洲精品日韩在线中文字幕 | 午夜老司机福利剧场| 人妻制服诱惑在线中文字幕| 国产男人的电影天堂91| 男女那种视频在线观看| 看非洲黑人一级黄片| 精品午夜福利视频在线观看一区| 天天躁夜夜躁狠狠久久av| 1024手机看黄色片| 日韩国内少妇激情av| 我要搜黄色片| 大又大粗又爽又黄少妇毛片口| 国产精品一区二区三区四区久久| 蜜桃久久精品国产亚洲av| 在线观看一区二区三区| 在现免费观看毛片| 在线天堂最新版资源| 97热精品久久久久久| 国产精品不卡视频一区二区| 色综合站精品国产| 老女人水多毛片| 丰满的人妻完整版| 麻豆av噜噜一区二区三区| 婷婷精品国产亚洲av在线| 高清毛片免费观看视频网站| 不卡一级毛片| 少妇猛男粗大的猛烈进出视频 | 欧美日本视频| 在线观看美女被高潮喷水网站| 国产在线精品亚洲第一网站| 亚洲自偷自拍三级| 亚洲av电影不卡..在线观看| 久久精品久久久久久噜噜老黄 | 日本熟妇午夜| 菩萨蛮人人尽说江南好唐韦庄 | 国产午夜精品久久久久久一区二区三区 | 在线免费十八禁| 欧美三级亚洲精品| 天美传媒精品一区二区| 一个人看视频在线观看www免费| 在线免费观看的www视频| 国产大屁股一区二区在线视频| 国产一区二区三区av在线 | 色尼玛亚洲综合影院| 少妇被粗大猛烈的视频| 国产精品美女特级片免费视频播放器| 日日啪夜夜撸| 91精品国产九色| 日本与韩国留学比较| 成人二区视频| 午夜福利高清视频| 最新在线观看一区二区三区| 国产三级在线视频| 国产精品精品国产色婷婷| 成人欧美大片| 欧美又色又爽又黄视频| 亚洲欧美中文字幕日韩二区| 九九在线视频观看精品| 99riav亚洲国产免费| 成人精品一区二区免费| 日韩欧美免费精品| 熟妇人妻久久中文字幕3abv| 欧美性猛交╳xxx乱大交人| 搞女人的毛片| 嫩草影院精品99| 欧美激情国产日韩精品一区| a级毛片免费高清观看在线播放| 亚洲中文日韩欧美视频| 天堂√8在线中文| 波多野结衣巨乳人妻| 一级a爱片免费观看的视频| 国产视频内射| 日韩国内少妇激情av| 国产黄色小视频在线观看| 亚洲人成网站在线播| 亚洲精品亚洲一区二区| 最后的刺客免费高清国语| 亚洲欧美精品自产自拍| 亚洲精品影视一区二区三区av| 国产高清不卡午夜福利| 乱人视频在线观看| 欧美极品一区二区三区四区| 日本五十路高清| 一本久久中文字幕| 日韩精品中文字幕看吧| 在线观看美女被高潮喷水网站| 亚洲国产精品合色在线| 国产精品精品国产色婷婷| 在线播放无遮挡| 最近中文字幕高清免费大全6| 午夜免费男女啪啪视频观看 | 又爽又黄a免费视频| 久久久久久久久久黄片| 成熟少妇高潮喷水视频| 香蕉av资源在线| 久久久国产成人精品二区| 国产 一区精品| 精品欧美国产一区二区三| 黄色日韩在线| 久久午夜亚洲精品久久| 国产亚洲精品久久久久久毛片| 亚洲四区av| 在线a可以看的网站| 日本一二三区视频观看| 两性午夜刺激爽爽歪歪视频在线观看| 欧美成人a在线观看| 熟女电影av网| 亚洲va在线va天堂va国产| 一区二区三区高清视频在线| 在现免费观看毛片| 亚洲乱码一区二区免费版| 亚洲成人久久爱视频| 成人毛片a级毛片在线播放| a级毛色黄片| 久久热精品热| 成熟少妇高潮喷水视频| 日韩欧美精品免费久久| 欧美+日韩+精品| 久久韩国三级中文字幕| 亚洲中文字幕日韩| 国产一区二区在线观看日韩| 国产大屁股一区二区在线视频| 午夜影院日韩av| 亚洲国产精品久久男人天堂| 日韩三级伦理在线观看| 亚洲在线观看片| 激情 狠狠 欧美| 麻豆成人午夜福利视频| 国产高清视频在线播放一区| 亚洲精品456在线播放app| 日韩制服骚丝袜av| 精品日产1卡2卡| 久久人人精品亚洲av| 日韩 亚洲 欧美在线| 搡老熟女国产l中国老女人| 日韩中字成人| 色视频www国产| 最好的美女福利视频网| 欧美成人一区二区免费高清观看| 成年版毛片免费区| 简卡轻食公司| 3wmmmm亚洲av在线观看| 国产又黄又爽又无遮挡在线| 亚洲av免费在线观看| 91在线观看av| 亚洲婷婷狠狠爱综合网| 免费av不卡在线播放| 日韩亚洲欧美综合| 欧美日韩一区二区视频在线观看视频在线 | 久久久久久久久中文| 国产一级毛片七仙女欲春2| 午夜激情欧美在线| 男女做爰动态图高潮gif福利片| 久久久国产成人精品二区| 亚洲av.av天堂| 日日摸夜夜添夜夜添小说| 亚洲av成人av| 伊人久久精品亚洲午夜| 俺也久久电影网| 99视频精品全部免费 在线| 三级毛片av免费| ponron亚洲| 干丝袜人妻中文字幕| 国产爱豆传媒在线观看| 国产中年淑女户外野战色| 男女下面进入的视频免费午夜| 亚洲成a人片在线一区二区| 精品一区二区免费观看| 久久久欧美国产精品| 综合色av麻豆| 一级黄色大片毛片| 一个人观看的视频www高清免费观看| 免费在线观看影片大全网站| 99热6这里只有精品| 嫩草影视91久久| 蜜桃久久精品国产亚洲av| 久久亚洲精品不卡| 亚洲人成网站在线播| 久久精品国产清高在天天线| 卡戴珊不雅视频在线播放| 成人高潮视频无遮挡免费网站| 日韩av在线大香蕉| 悠悠久久av| 免费看日本二区| 色噜噜av男人的天堂激情| 又黄又爽又刺激的免费视频.| 午夜a级毛片| 国产精品野战在线观看| av卡一久久| 欧美最新免费一区二区三区| 一级黄片播放器| 婷婷六月久久综合丁香| 最近最新中文字幕大全电影3| 成人漫画全彩无遮挡| 亚洲精华国产精华液的使用体验 | 黄色配什么色好看| 久久午夜亚洲精品久久| 日韩中字成人| 人妻久久中文字幕网| 亚州av有码| 99热精品在线国产| 香蕉av资源在线| 淫妇啪啪啪对白视频| 午夜福利高清视频| 国产精品av视频在线免费观看| 别揉我奶头~嗯~啊~动态视频| 国产亚洲精品久久久com| 在线观看av片永久免费下载| 国产精品嫩草影院av在线观看| 国内少妇人妻偷人精品xxx网站| 亚洲五月天丁香| 欧美日韩综合久久久久久| 日日干狠狠操夜夜爽| 国语自产精品视频在线第100页| 日本a在线网址| 婷婷精品国产亚洲av| 国产一区二区激情短视频| 国产精品人妻久久久久久| 久久久久久久久久黄片| 色尼玛亚洲综合影院| 久久精品国产自在天天线| 色视频www国产| 麻豆久久精品国产亚洲av| 五月玫瑰六月丁香| 欧美极品一区二区三区四区| 日本五十路高清| 成人二区视频| 成年版毛片免费区| 日本精品一区二区三区蜜桃| 老司机福利观看| 国产男靠女视频免费网站| 91精品国产九色| 午夜福利18| 内地一区二区视频在线| 亚洲美女黄片视频| 亚洲欧美精品综合久久99| 国产蜜桃级精品一区二区三区| 一级av片app| 香蕉av资源在线| 亚洲国产精品国产精品| 99热只有精品国产| 亚洲精品456在线播放app| 亚洲美女视频黄频| av卡一久久| 欧美+日韩+精品| 三级国产精品欧美在线观看| 久久人人爽人人爽人人片va| 可以在线观看的亚洲视频| 色在线成人网| 亚洲国产精品国产精品| 精品午夜福利在线看| 日本三级黄在线观看| 久久中文看片网| 久久精品国产鲁丝片午夜精品| 亚洲自偷自拍三级| 在线播放国产精品三级| 十八禁网站免费在线| 久久精品国产亚洲av天美| 我的女老师完整版在线观看| 校园春色视频在线观看| 我的女老师完整版在线观看| 99热这里只有精品一区| 国产精品国产三级国产av玫瑰| 少妇熟女欧美另类| 亚洲乱码一区二区免费版| 国产日本99.免费观看| 一a级毛片在线观看| 最新在线观看一区二区三区| 亚洲欧美成人综合另类久久久 | 日本成人三级电影网站|