• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Mobile Jammer-Aided Secure UAV Communications via Trajectory Design and Power Control

    2018-08-28 03:49:32AnLiWenjingZhang
    China Communications 2018年8期

    An Li*, Wenjing Zhang

    Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China

    Abstract: To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically,an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem,we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block tofind a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.

    Keywords: physical layer security; UAV-ground communications; mobile jammer-aided; trajectory design; power control

    I. INTRODUCTION

    Facing the highly diversified application requirements in the future wireless networks[1],UAV-aided wireless communications have attracted fast-growing interest due to their many advantages, such as flexible on-demand deployment, fully-controllable mobility, lineof-sight (LoS) aerial-ground link[2], thus increasingly being applied for multifarious substantial scenarios including UAV-aided ubiquitous coverage[3-5], mobile relaying[6,7], information dissemination or data collection[8-10], energy broadcasting[11], etc.However, the open and shared nature of wireless medium, especially the feature with the LoS links between UAVs and ground nodes makes UAV communications more prone to being intercepted by ground eavesdroppers,thus bringing to a new security challenge.

    Over the past few years, physical (PHY)layer security has emerged as an indispensable mechanism to enable secure wireless communications without relying on traditional cryptographic approaches[12]. Various PHY layer security schemes based on Multiple-Input Multiple-Output (MIMO), cooperative relaying, cooperative jamming, and/or power control techniques have been widely investigated to enhance the secrecy rate performance of wireless systems (see [13-16] and the references therein). However, all the above studies only considered the cases where all communications nodes are atfixed or quasi-static lo-cations, which cannot be directly extended to UAV-aided wireless systems.

    Recently, the authors in[17] examined the secure UAV-ground communications in the presence of a ground potential eavesdropper by exploiting the mobility of UAV. However,it is shown in[17] that the trajectories of the UAV are not along the straight lines as the best-effort heuristic trajectories, and the hovering locations of UAV are not directly over the destination, which means the legitimate channels quality is sacrificed byflying as far away as possible from the eavesdropper to prevent eavesdropping. In fact, the advantages of UAVs also offer a new opportunity to perform mobile jamming so as to further improve the secrecy rate. First, under practical constraints on the UAV’s mobility, the UAV acted as a mobile jammer can adjust dynamically its own location as close as possible to ground eavesdroppers, and proactively jam eavesdroppers with power-aware, i.e., more power is used when it is nearby eavesdroppers but away from destinations and vice versa. Second, different from the threat arising from LoS links to the security of UAV-ground communications, the feature of LoS links with less impairment by terrestrial fading and shadowing is beneficial to make jamming more effective.

    Motivated by the above studies, in this paper, we investigate a UAV-aided mobile jamming strategy to further promote the secrecy performance for UAV-ground communications. Specifically, subject to both average and peak transmit power constraints as well as the UAVs’ mobility constraints, an additional cooperative UAV is employed as a mobile jammer to transmit jamming signals to degrade the eavesdropper channel. Such a UAV-enabled mobile jammer is introduced to fly as close as possible to the eavesdropper and help the source UAV keep as close as possible to the destination, and thus enhancing the achievable secrecy rate. The achievable average secrecy rate maximization problem is addressed which jointly optimizes the trajectories and the transmit power of both source UAV and jammer UAV over afiniteflight period. To efficiently solve the non-convex secrecy rate maximization problem, an efficient iterative algorithm is proposed by employing the block coordinate descent and successive convex optimization techniques to compute the trajectories and the transmit power of both UAVs successively,thus obtaining a local optimal approximate solution. Simulation results demonstrate that the proposed joint design outperforms all benchmark schemes, especially the scheme without involving jamming in[17].

    II. SYSTEM MODEL AND PROBLEM FORMULATION

    2.1 System model

    As shown in figure 1, we consider a UAV-ground wireless communication system where a source UAV (S) above the ground communicates with a ground destination (D) in the presence of an eavesdropper (E) on the ground over a given finite flight period T in second(s). Without loss of generality, we consider a Cartesian coordinate system with D and E located on the ground with wD=(0,0) and wE=(L,0) in meter (m), respectively, which are both known to S. To improve the secrecy rate of UAV-ground communication system, a cooperative UAV (J) is employed as a friendly mobile jammer to transmit jamming signals to confuse E, and therefore protect the source transmission over T. Note that Gaussian noise, which is the same as the additive noise at D, is considered as the jamming signals.Such jamming signals are easy to implement in practical systems for more practical cooperation since not only is no knowledge a priori required to generate it but also no extra overhead is required to eliminate it. Thanks to the mobility of UAVs, the larger T is, more time in general is provided for S (J) to move closer to D (E) to achieve better link quality and at the same time to keep farther away from E(D) for causing less information leakage (excessive interference), thus achieving a higher secrecy rate.

    We assume that both UAVsfly horizontally at afixed altitude H in m and their initial/final horizontal locations, denoted byandrespectively, are pre-given depending on their launch/landing sites or pre-defined mission requirement. For ease of exposition, the UAVs’ flight period T is divided into N time slots with equal length,i.e., T=Nδt, where δtin s is chosen sufficiently small such that UAVs’ locations can be considered unchanged within each time slot[8]. Accordingly, the trajectories of both UAVs over T can be approximated by two N-length sequencesandrespectively, which satisfy the following mobility constraints:

    where D=Vδtis the maximum horizontal distance that each UAV can fly within each time slot at the maximumflight speed V in m/s.

    The actual measurement observations in[18]have shown that the UAV-ground channels are dominated mainly by the LoS links even when the UAV flies at a moderate altitude.Thus, similar to [6, 8], we assume that the UAV-ground channel quality mainly depends on the distance between UAVs and ground users. Thus, the channel power gain from UAV i, i∈{S, J} to ground user j, j∈{D,E} at time slot n follows the free-space path loss model,given by

    Fig. 1. A mobile jammer-aided UAV communication system.

    Let PS[ n ] and PJ[ n] denote respectively the transmit power of the source UAV S and the jammer UAV J in time slot n. In practice,they are usually subject to both average/peak limits over time slots, denoted byand, respectively. Therefore, the transmit power constraints can be written as

    The average secrecy rate achievable of the UAV-aided jamming strategy in bits/second/Hertz (bps/Hz) over the total N time slots is given by [19]

    2.2 Problem formulation

    Let the source UAV S’s trajectoryand the transmit power, and the jammer UAV J’s trajectoryand the transmit powerOur goal is to maximize the achievable aver-age secrecy rate in (4) by jointly optimizing both UAVs’ trajectories QSand QJ, and their respective transmit power PSand PJover all the N time slots subject to both UAVs’ mobility constraints in (1) and transmit power constraints in (3). Thus, the achievable secrecy rate maximization problem can be formulated as

    where the operation [?]+is omitted since each summation term in the objective function of(P1) must be non-negative with the optimal solution; otherwise, the value of (P1) can be always increased up to zero by setting PS[ n ]=0 without violating transmit power constraints. Although (P1) is smooth, it is still non-convex and challenging to solve. Thus,we propose an efficient iterative algorithm for (P1) which is guaranteed to converge to at least a locally optimal solution.

    III. PROPOSED SOLUTION

    In this section, we propose an efficient iterative algorithm for (P1) by applying the block coordinate descent and successive convex optimization techniques. Specifically, (P1) is divided into four subproblems to optimize both UAVs’ transmit power PSand PJas well as their trajectories QSand QJin an alternately iterative manner until the algorithm converges.

    3.1 Subproblem 1: optimizing transmit power PS

    For any given both UAVs’ trajectories QSand QJand jammer UAV’s transmit power PJ,(P1) can be expressed as

    Although (P2) is non-convex with respect to PS, its optimal solution can be obtained as shown in [19]

    where

    where λ is a non-negative parameter that ensureswhich can be found efficiently by applying the bisection search.

    3.2 Subproblem 2: optimizing transmit power PJ

    For any given source UAV’s transmit power PSand both UAVs’ trajectories QSandas

    Although (P3) is still non-convex, based on the successive convex optimization tech-nique we can obtain an efficient approximate solution by successively maximizing a lower bound of (P3) at each iteration. Letdenote the given jammer UAV’s transmit power in the k-th iteration, thefirst term in (9) is lower bounded as with thefirst-order Taylor expansion

    where

    As a result, (P3) can be approximated as the following problem

    Since thefirst term in (11) is a linear function with respect to PJ, (P4) is a convex optimization problem, which can be solved optimally by the existing optimization tools such as CVX [20].

    3.3 Subproblem 3: Optimizing Source UAV’s Trajectory QS

    One can verify that constraints (12b) and(12c) must hold with equalities at the optimal solution, since otherwise t[ n]( u[ n]) can be decreased (increased) to improve the objective value. However, (P5) is still non-convex and thus difficult to be solved optimally.Similarly, by applying successive convex optimization technique, the termis replaced by its convex lower bound while the termby its concave upper bound at a given initial point. Definea s the source UAV’s given local trajectory in the k-th iteration, then we obtain

    With (13), (P5) is approximated as

    After such approximation, the objective function of (P6) is concave and its feasible region is convex, thus it can also be optimally solved by CVX.

    3.4 Subproblem 4:Optimizing Jammer UAV’s Trajectory QJ

    After introducing slack variablesany given both UAVs’ transmit power PSand PJand source UAV’s trajectory QS, (P1) can be recast as

    Since (P8) is a convex optimization problem, it can be efficiently solved by CVX.

    3.5 Overall Algorithm

    In summary, by applying the block coordinate descent method, the overall algorithm for (P1)is obtained by jointly optimizing both UAVs’transmit power PSand PJas well as their trajectories QSand QJalternately via solving four subproblems (P2), (P4), (P6), and (P8)respectively in an iterative manner. The details of the proposed iterative algorithm for (P1) are summarized in Algorithm 1.

    Next, we consider the convergence of Algorithm 1. Letandbe defined as the objective values of (P1), (P4), (P6), and (P8)with any givenandrespectively. According to the step 3-6 of Algorithm 1, we have

    where (a),(c),(f), and (i) holds sinceare the optimal solution of problem (P2), (P4), (P6), and (P8),respectively; (b),(e), and (h) holds since problem (P4) at, (P6) at, and (P8) athave the same objective values as that of problem (P3), (P5), and (P7), respectively by using first-order Taylor expansion; (d),(g),and (j) are true since the objective value of(P1) is lower bounded by that of (P4) at,(P6) at, and (P8) at, respectively.As a result, the objective value of (P1) with the solutions by solving subproblems (P2),(P4), (P6), and (P8) is non-decreasing over iterations. Furthermore, since the optimized value of (P1) isfinite, the proposed Algorithm 1 is guaranteed to converge.

    IV. SIMULATION RESULTS

    In this section, we present simulation results to verify the performance of the proposed UAV-aided mobile jamming strategy via joint trajectory design and transmit power control for UAV-ground communication (denoted by“traj. & pow. ctrl.”). We compare the proposed strategy with the following three benchmark schemes:

    ? traj. & avg. pow.: Only both UAVs’ trajectories are optimized by solving problem(P6) and (P8) iteratively until convergence with average transmit power, i.e.,tively.

    ? pow. ctrl. & line traj.: Both UAVs’ trajectories are fixed in a heuristic best-effort manner: source UAV S (jammer UAV J)first flies towards the location above D(E) at the maximum speed, then stays stationary there (if T is sufficiently large),and finally arrives its final location in the last time slot. It is noteworthy that if there is no enough time for S (J) to reach the location above D (E), it will turn at a midway pointon the line segment betweenand the point at a height of H over, which horizontal coordinate makes the sum of distances, i.e.,equals to VT}, and thenfly towards thefinal locationat the maximum speed. Both UAVs’ transmit power is optimized by solving problem(P2) and (P4).

    Algorithm 1. Proposed iterative algorithm for problem (P1).

    ? traj. & pow. ctrl. NJ: No jammer UAV is employed as “joint traj. opt. & pow. ctrl.”in[17].

    All simulation parameters are set up ascases where UAVs have different initial and final locations, denoted as Case 1 and Case 2, are considered. In Case 1, both UAVs have the same initial/final locations, which coordinates are set asm, andm, as shown in figure 2. In Case 2, both UAVs’ initial/final locations are on the parallel line connecting D and E with the coordinates as qS0=(?500,?150)m,qSF=(700,?150)m, qJ0=(700,150)m, and qJF=(?500,150)m, respectively.

    First, for Case 1, Figure 2 exhibits the trajectories of both UVAs (S and J) of different algorithms for different period T. The locations of D, E, as well as both UAVs’ initial andfinal locations are marked with ○, ?, +, and × ,respectively. It is observed that when T=400 s, the minimum time required for S/Jflying at the maximum speed from the initial location to the final location, the trajectories of S (J)for all algorithms are identical. As T increases, the trajectories of S (J) for the proposed“traj. & pow. ctrl.” and the benchmark “traj.& avg. pow.” are still similar in an arced path,where Jflies in the opposite direction to S so as to efficiently jam the eavesdropper. This is because J tries tofly as close as possible to E in order to help S fly as close as possible to D. When T is sufficiently large, i.e., T=600 s, it is observed that for the proposed “traj. &pow. ctrl.”, Sfirstflies at the maximum speed to reach a point closer to D, then remains stationary there as long as possible, andfinally in an closer arced path to Dflies at the maximum speed towards thefinal location and reaches it in the last time slot than that for “traj. & pow.ctrl. NJ”. These stationary points closer to S strike a better balance between enhancing the legitimate channel and causing less leakage to E, thus achieving the larger maximum secrecy rate than that of “traj. & pow. ctrl. NJ”.

    Fig. 2. Trajectories of UAV-enabled S and J in case 1.

    Fig. 3. Secrecy rate versus period T in case 1.

    Figure 3 illustrates the average secrecy rates achievable as a function of period T for different algorithms. It is observed that the average secrecy rates of all algorithms monotonically increases as T gets larger. Regardless of the period T, the proposed “traj.& pow. ctrl.” outperforms the other three benchmark schemes while the benchmark “traj.& pow. ctrl. NJ” achieves the lowest secrecy rate. Such results indicates the cooperative jamming UAV is beneficial to significantly improve the achievable average secrecy rate performance of UAV-ground communications.Figure 4 shows the average secrecy rates of different algorithms versus the average jamming powerwhen=?5 dBm and 10dBm. It is observed that the secrecy rates of all algorithms except “traj. & pow. ctrl. NJ”first increase then decrease with the increase of. This is because for all algorithms except “traj. & pow. ctrl. NJ” too large jamming power will also increase the undesired interference to D, thus leading to the degrade of system secrecy performance. In particular,for the benchmark “traj. & avg. pow.” the secrecy rate sharply drops when>0dBm because the equal jamming power in each slot is employed. The proposed “traj. & pow. ctrl.”algorithm always achieves the highest secrecy rate as expected. When=?5dBm, the benchmark “pow. ctrl. & line traj.” achieves higher secrecy rate than that of the benchmark“traj. & avg. pow.”, while when=10dBm,the latter achieves higher secrecy rate than the former when<6dBm. Such results suggest that power control is more important for enhancing the achievable secrecy rate in the low S’s transmit power regime, while in the high S’s transmit power regime, trajectory design is more effective.

    In figure 5, the average secrecy rates of the proposed algorithm are plotted versus the iteration number of Algorithm 1. Comparing the converged secrecy rate with the initial secrecy rate in figure 5, it is observed that joint trajectory and transmit power optimization enhances the achievable secrecy rate of mobile jamming system. It is also shown that Algorithm 1 is quite efficient as it converges in just a few iterations regardless of the period T.

    Next, we consider Case 2. Figure 6 shows the trajectories of both UAVs by using different algorithms. Different from that in Case 1,the initial and final location of J are marked with □ and ?, respectively. It is observed that similar as the results in Case1, the trajectory of S for the proposed “traj. & pow. ctrl.” is closer to S with a closer hovering location than that for “traj. & pow. ctrl. NJ”. It can also be observed that J’s trajectory is quasi-odd symmetry with respect to S’s trajectories so as to degrade the eavesdropper’s channel as well as avoiding undesired interference to S. Besides,one can see that different from the results in Case 1, the trajectories for the proposed “traj.& pow. ctrl.” and the benchmark “traj. & avg.pow.” appear significant difference, especially when S (J) flies towards its final location.This is because for the proposed “traj. & pow.ctrl.”, S (J) is capable of deceasing the transmit power or even turn off the transmitter to avoid being eavesdropped (causing excessive interference to D) when S (J)flies along a relatively direct path towards thefinal location,while for the benchmark “traj. & avg. pow.”,since the equal power allocation is employed in each time slot, S (J) can only adjust its trajectory to be away from E (D) in order to prevent eavesdropping (interfering D), thus resulting in a longer arced path.

    Fig. 4. Secrecy rate versus average jamming power in case 1.

    Fig. 5. Convergence plot of Algorithm 1.

    With such a UAV trajectory difference,Figure 7 plots a different secrecy rate performance of all the algorithms versus the period T from that shown in figure 3. Specifically,the secrecy rate gaps between the proposed“traj. & pow. ctrl.” and the benchmark “traj. &avg. pow.” is much larger than those in Case 1. In particular, “traj. & avg. pow.” achieves a lower secrecy rate than that for “traj. & pow.ctrl. NJ” when T < 550s. This is because S (J)takes more time for a longer arced path which in turn resulting in a shorter hovering time,and do not utilize the transmit power efficiently. Such results validate that it is important and necessary to jointly optimize both UAVs’ trajectories and transmit power for UAV-ground communication with mobile jamming.

    Fig. 6. Trajectories of UAV-enabled S and J in case 2.

    Fig. 7. Secrecy rate versus period T in case 2.

    V. CONCLUSION

    In this paper, we investigate the secure UAV-ground communications with UAV-aided cooperative mobile jammer. Subject to both average and peak transmit power constraints as well as both UAVs’ mobility constraints, the average secrecy rate achievable is maximized by jointly optimizing both UAVs’ trajectories and transmit power over a given period. Based on the block coordinate descent and successive convex optimization methods, an iterative algorithm is proposed to solve the considered non-convex joint design problem. Simulation results demonstrate that the proposed UAV-aided mobile jamming strategy significantly outperforms the benchmark schemes.

    ACKNOWLEDGEMENTS

    This work was partly supported by National Natural Science Foundation of China (No.41504026, 61362009), Natural Science Foundation of Jiangxi (No.20152ACB21003),Foundation for Distinguished Young Talents Training Programme of Jiangxi(No.20171BCB23006).

    特级一级黄色大片| 露出奶头的视频| 在线a可以看的网站| 国产v大片淫在线免费观看| 少妇人妻精品综合一区二区 | 两性午夜刺激爽爽歪歪视频在线观看| 可以在线观看毛片的网站| 免费看日本二区| 国产黄色小视频在线观看| 深夜a级毛片| 女同久久另类99精品国产91| 国产伦一二天堂av在线观看| 午夜日韩欧美国产| 一卡2卡三卡四卡精品乱码亚洲| 免费黄网站久久成人精品 | 国产激情偷乱视频一区二区| 99久国产av精品| 中文字幕精品亚洲无线码一区| 91久久精品国产一区二区成人| 丰满乱子伦码专区| 国产亚洲欧美在线一区二区| 色哟哟·www| 男女做爰动态图高潮gif福利片| 亚洲成人免费电影在线观看| 看片在线看免费视频| 人妻久久中文字幕网| 毛片女人毛片| 国产精品女同一区二区软件 | 色吧在线观看| 九九久久精品国产亚洲av麻豆| 亚洲国产精品合色在线| 欧美一级a爱片免费观看看| 日本黄色片子视频| 十八禁人妻一区二区| 综合色av麻豆| 床上黄色一级片| 一进一出好大好爽视频| 97碰自拍视频| 午夜福利在线观看免费完整高清在 | ponron亚洲| 国产极品精品免费视频能看的| 亚洲人成网站在线播放欧美日韩| 看十八女毛片水多多多| 国产在线男女| 窝窝影院91人妻| 国产高清三级在线| 日韩大尺度精品在线看网址| 亚洲第一电影网av| 国产淫片久久久久久久久 | bbb黄色大片| 很黄的视频免费| 亚洲成人久久爱视频| 久久久久国内视频| 51午夜福利影视在线观看| 国产成年人精品一区二区| 国产三级在线视频| 日本免费一区二区三区高清不卡| 在线观看免费视频日本深夜| 日韩国内少妇激情av| 亚洲在线自拍视频| 99热这里只有精品一区| 日韩欧美在线二视频| 亚洲第一电影网av| 别揉我奶头 嗯啊视频| xxxwww97欧美| 一级av片app| 精品午夜福利视频在线观看一区| 简卡轻食公司| 一本久久中文字幕| 男人的好看免费观看在线视频| 日韩欧美精品免费久久 | 高清在线国产一区| 亚洲欧美日韩高清专用| 丝袜美腿在线中文| 日韩高清综合在线| 1024手机看黄色片| 老司机午夜十八禁免费视频| 精品欧美国产一区二区三| 18美女黄网站色大片免费观看| 制服丝袜大香蕉在线| 一个人免费在线观看的高清视频| 性色av乱码一区二区三区2| 国产一区二区三区在线臀色熟女| 国产欧美日韩精品亚洲av| 精品午夜福利在线看| 国产一区二区激情短视频| 欧美性猛交黑人性爽| 变态另类成人亚洲欧美熟女| 韩国av一区二区三区四区| 精品国内亚洲2022精品成人| 黄色丝袜av网址大全| 亚洲第一欧美日韩一区二区三区| 别揉我奶头~嗯~啊~动态视频| 久久亚洲真实| 欧美性感艳星| 亚洲av成人av| 亚洲激情在线av| 五月伊人婷婷丁香| 午夜福利在线在线| 一区二区三区高清视频在线| 九九在线视频观看精品| 欧美黄色淫秽网站| 日日干狠狠操夜夜爽| or卡值多少钱| 十八禁网站免费在线| 亚洲av日韩精品久久久久久密| 欧美午夜高清在线| 高清日韩中文字幕在线| 波多野结衣高清作品| 久久久久久大精品| 日本 av在线| 日本与韩国留学比较| 国产精品一区二区性色av| 亚洲专区中文字幕在线| 精品久久久久久,| 国产主播在线观看一区二区| 久久国产乱子伦精品免费另类| 中文字幕人成人乱码亚洲影| 99热只有精品国产| 嫩草影院精品99| 国产黄色小视频在线观看| 日本a在线网址| 国产成人影院久久av| 亚洲五月婷婷丁香| 久久久久国内视频| 在现免费观看毛片| 成年免费大片在线观看| 丰满人妻熟妇乱又伦精品不卡| a级一级毛片免费在线观看| 亚洲中文日韩欧美视频| 赤兔流量卡办理| 亚洲av中文字字幕乱码综合| 精品国内亚洲2022精品成人| 国产伦精品一区二区三区四那| 亚洲av中文字字幕乱码综合| 99久久99久久久精品蜜桃| 亚洲成av人片在线播放无| 国产精品不卡视频一区二区 | 97碰自拍视频| 久久亚洲精品不卡| 精品久久国产蜜桃| 国产伦人伦偷精品视频| 哪里可以看免费的av片| 最近视频中文字幕2019在线8| 午夜亚洲福利在线播放| 俄罗斯特黄特色一大片| 午夜亚洲福利在线播放| 嫩草影院新地址| 午夜福利在线观看吧| 亚洲五月天丁香| 精品免费久久久久久久清纯| 欧美成人性av电影在线观看| 男女视频在线观看网站免费| 别揉我奶头~嗯~啊~动态视频| 在线看三级毛片| 欧美另类亚洲清纯唯美| 性欧美人与动物交配| 色av中文字幕| 国产综合懂色| 中文字幕av在线有码专区| 黄色一级大片看看| 又紧又爽又黄一区二区| 中文亚洲av片在线观看爽| 国产爱豆传媒在线观看| 亚洲国产精品999在线| 免费高清视频大片| 欧美性感艳星| 免费观看人在逋| 午夜亚洲福利在线播放| 日本a在线网址| 欧美激情在线99| 嫩草影院入口| 亚洲精品久久国产高清桃花| 久久久久九九精品影院| 国产亚洲av嫩草精品影院| 久久久色成人| 18禁黄网站禁片午夜丰满| 亚洲人成伊人成综合网2020| 欧美3d第一页| 亚洲男人的天堂狠狠| 中文字幕人妻熟人妻熟丝袜美| 日韩大尺度精品在线看网址| 啦啦啦韩国在线观看视频| 在线观看舔阴道视频| 国语自产精品视频在线第100页| 老熟妇仑乱视频hdxx| 精品人妻1区二区| 国产av在哪里看| 国产男靠女视频免费网站| 最好的美女福利视频网| 亚洲自偷自拍三级| 18禁在线播放成人免费| 日本 欧美在线| 一进一出抽搐动态| 99久久成人亚洲精品观看| 91狼人影院| 熟女电影av网| 日本五十路高清| 精品久久久久久,| 国产91精品成人一区二区三区| 久久久久久国产a免费观看| 欧美zozozo另类| 午夜激情欧美在线| 成年免费大片在线观看| 精品人妻熟女av久视频| 久久午夜亚洲精品久久| 亚洲一区高清亚洲精品| 国产大屁股一区二区在线视频| 少妇的逼水好多| 亚洲经典国产精华液单 | 老鸭窝网址在线观看| 中文字幕精品亚洲无线码一区| av黄色大香蕉| 久久精品国产亚洲av涩爱 | 亚洲av五月六月丁香网| 我的老师免费观看完整版| 日本五十路高清| 久久99热这里只有精品18| 最近视频中文字幕2019在线8| 久久久国产成人免费| 真实男女啪啪啪动态图| 内射极品少妇av片p| .国产精品久久| 亚洲成人久久性| 久久精品久久久久久噜噜老黄 | 欧美色欧美亚洲另类二区| 国产在视频线在精品| 老司机深夜福利视频在线观看| 色哟哟哟哟哟哟| 男女下面进入的视频免费午夜| 十八禁网站免费在线| 欧美激情在线99| 亚洲人成电影免费在线| 欧美日韩亚洲国产一区二区在线观看| 精品久久久久久久人妻蜜臀av| 老熟妇乱子伦视频在线观看| 每晚都被弄得嗷嗷叫到高潮| 在线观看一区二区三区| 免费大片18禁| 国产精品美女特级片免费视频播放器| 内地一区二区视频在线| 九色国产91popny在线| 亚洲国产日韩欧美精品在线观看| 国产乱人伦免费视频| 精品一区二区三区人妻视频| 自拍偷自拍亚洲精品老妇| 日韩欧美一区二区三区在线观看| 99在线人妻在线中文字幕| 嫩草影院新地址| 午夜精品在线福利| 国产亚洲欧美98| 免费人成在线观看视频色| 日本成人三级电影网站| 国内精品美女久久久久久| 亚洲精品在线观看二区| 久久精品国产亚洲av香蕉五月| 淫秽高清视频在线观看| 美女cb高潮喷水在线观看| 人妻久久中文字幕网| 可以在线观看毛片的网站| 网址你懂的国产日韩在线| 此物有八面人人有两片| 久久精品影院6| 给我免费播放毛片高清在线观看| 成年免费大片在线观看| 精品午夜福利视频在线观看一区| 99久久99久久久精品蜜桃| 亚洲成人久久性| www.色视频.com| 嫩草影院入口| 国产成人aa在线观看| www.熟女人妻精品国产| 欧美乱色亚洲激情| 夜夜看夜夜爽夜夜摸| 亚洲成人精品中文字幕电影| 免费高清视频大片| 欧美成人a在线观看| 99热这里只有是精品在线观看 | 日本与韩国留学比较| 亚洲熟妇熟女久久| 欧美成人性av电影在线观看| 三级毛片av免费| 啦啦啦观看免费观看视频高清| 精品一区二区三区视频在线观看免费| 3wmmmm亚洲av在线观看| 久久久久久大精品| 51国产日韩欧美| 日本一本二区三区精品| 看黄色毛片网站| 色哟哟哟哟哟哟| 亚洲精品粉嫩美女一区| 真人一进一出gif抽搐免费| 真实男女啪啪啪动态图| 白带黄色成豆腐渣| 国产不卡一卡二| 色综合站精品国产| 精品久久久久久久末码| 一级黄片播放器| 精品久久久久久久久久免费视频| 久久精品91蜜桃| 久久这里只有精品中国| 日韩高清综合在线| 黄色丝袜av网址大全| 国产精品亚洲美女久久久| 欧美+亚洲+日韩+国产| 欧美性猛交╳xxx乱大交人| 好男人在线观看高清免费视频| 成熟少妇高潮喷水视频| 人妻制服诱惑在线中文字幕| 婷婷精品国产亚洲av在线| 有码 亚洲区| 国产成人aa在线观看| 久久久久久久久中文| 此物有八面人人有两片| 在线观看美女被高潮喷水网站 | 99久久久亚洲精品蜜臀av| 亚洲美女视频黄频| 我要搜黄色片| 久99久视频精品免费| 国产精品一区二区免费欧美| 99久久九九国产精品国产免费| av在线观看视频网站免费| 九色成人免费人妻av| 亚洲欧美清纯卡通| 色av中文字幕| 欧美+日韩+精品| 午夜福利在线在线| 亚洲国产欧美人成| 在现免费观看毛片| 丰满人妻熟妇乱又伦精品不卡| 天天一区二区日本电影三级| 婷婷精品国产亚洲av在线| 有码 亚洲区| 亚洲欧美日韩高清专用| 国产大屁股一区二区在线视频| 亚洲av五月六月丁香网| 亚洲熟妇中文字幕五十中出| 色av中文字幕| 在线观看免费视频日本深夜| 国产不卡一卡二| 一区二区三区四区激情视频 | 久久久国产成人精品二区| 看黄色毛片网站| 国产三级在线视频| 免费看美女性在线毛片视频| 桃色一区二区三区在线观看| 成人精品一区二区免费| 日韩欧美 国产精品| 丰满乱子伦码专区| 免费看日本二区| 国产精品1区2区在线观看.| avwww免费| 性插视频无遮挡在线免费观看| 亚洲人成网站在线播| 白带黄色成豆腐渣| 国产高清视频在线观看网站| 少妇人妻精品综合一区二区 | 一级av片app| 少妇高潮的动态图| 国产精品一及| 国产真实乱freesex| 99久久99久久久精品蜜桃| 色在线成人网| 日本a在线网址| 久久99热6这里只有精品| 欧美最黄视频在线播放免费| 波多野结衣高清无吗| 日日干狠狠操夜夜爽| 精品久久久久久久久久久久久| 不卡一级毛片| 一进一出好大好爽视频| 久久久久九九精品影院| 国产高清三级在线| 999久久久精品免费观看国产| 久久人人爽人人爽人人片va | 九色国产91popny在线| 国产免费一级a男人的天堂| 少妇的逼好多水| 美女 人体艺术 gogo| 国产精品99久久久久久久久| 国产三级在线视频| 在线观看美女被高潮喷水网站 | 夜夜躁狠狠躁天天躁| 国产一级毛片七仙女欲春2| 成人特级av手机在线观看| 色综合欧美亚洲国产小说| 成年版毛片免费区| 亚洲激情在线av| 亚洲最大成人手机在线| 18+在线观看网站| 国产野战对白在线观看| 69av精品久久久久久| 丰满人妻熟妇乱又伦精品不卡| 国产一区二区三区视频了| a级毛片a级免费在线| 色综合欧美亚洲国产小说| 国产精品亚洲一级av第二区| 97超视频在线观看视频| 成人av在线播放网站| 精品国内亚洲2022精品成人| 亚洲一区二区三区色噜噜| 亚洲性夜色夜夜综合| 国内久久婷婷六月综合欲色啪| 日韩欧美 国产精品| 一夜夜www| 老女人水多毛片| 欧美又色又爽又黄视频| 免费观看人在逋| 亚洲美女搞黄在线观看 | 日本 欧美在线| 国产精品一区二区免费欧美| 大型黄色视频在线免费观看| 51午夜福利影视在线观看| 色尼玛亚洲综合影院| 国产精品一区二区性色av| 免费大片18禁| 国产成人a区在线观看| 免费看a级黄色片| 久久久久国内视频| 小蜜桃在线观看免费完整版高清| 少妇人妻一区二区三区视频| 欧美成人一区二区免费高清观看| 国产色爽女视频免费观看| 人妻夜夜爽99麻豆av| 欧美日韩中文字幕国产精品一区二区三区| 久久久久性生活片| 人妻制服诱惑在线中文字幕| www.色视频.com| 1024手机看黄色片| 91在线观看av| av欧美777| 在现免费观看毛片| 91在线观看av| 国产高清激情床上av| 美女cb高潮喷水在线观看| 成人欧美大片| 亚洲美女黄片视频| 一区二区三区免费毛片| 99热精品在线国产| 欧美在线黄色| 中亚洲国语对白在线视频| 国产伦精品一区二区三区四那| 国产av一区在线观看免费| 三级国产精品欧美在线观看| 少妇裸体淫交视频免费看高清| 亚洲人成网站高清观看| 久久久久亚洲av毛片大全| 免费人成视频x8x8入口观看| 成人美女网站在线观看视频| 免费看a级黄色片| 高清毛片免费观看视频网站| 国产精品亚洲美女久久久| 天堂动漫精品| 成人亚洲精品av一区二区| 91久久精品电影网| or卡值多少钱| 麻豆av噜噜一区二区三区| 亚洲成人免费电影在线观看| 我要看日韩黄色一级片| 黄色丝袜av网址大全| 午夜免费成人在线视频| 99riav亚洲国产免费| 91狼人影院| 欧美午夜高清在线| 一级黄片播放器| 九九在线视频观看精品| 亚洲av一区综合| 99热精品在线国产| 丰满的人妻完整版| 免费看日本二区| 欧美又色又爽又黄视频| 十八禁人妻一区二区| 欧美+日韩+精品| 国产av不卡久久| 精品久久久久久久久久久久久| 97碰自拍视频| 日韩欧美精品免费久久 | 久久久成人免费电影| 午夜激情福利司机影院| 国产精品1区2区在线观看.| 亚洲最大成人av| 国产精品一区二区免费欧美| 丁香欧美五月| 成人性生交大片免费视频hd| 黄色日韩在线| 最近视频中文字幕2019在线8| 直男gayav资源| 午夜免费成人在线视频| 亚洲人成电影免费在线| 精品久久久久久久久久免费视频| 黄色日韩在线| 国产黄a三级三级三级人| 两人在一起打扑克的视频| 成年女人看的毛片在线观看| 精品免费久久久久久久清纯| 成人一区二区视频在线观看| 男女做爰动态图高潮gif福利片| 中文字幕精品亚洲无线码一区| 变态另类成人亚洲欧美熟女| 性色av乱码一区二区三区2| 观看免费一级毛片| 最新中文字幕久久久久| 亚洲成a人片在线一区二区| 夜夜看夜夜爽夜夜摸| 男女之事视频高清在线观看| av专区在线播放| 久久久久久久久大av| 免费看日本二区| 日本黄大片高清| 精品久久久久久久末码| 亚洲欧美日韩东京热| 黄色视频,在线免费观看| 国内精品久久久久精免费| 男女做爰动态图高潮gif福利片| xxxwww97欧美| 12—13女人毛片做爰片一| 日本 欧美在线| 国产成+人综合+亚洲专区| 亚洲av成人av| 尤物成人国产欧美一区二区三区| 亚洲自拍偷在线| 国产麻豆成人av免费视频| 九九在线视频观看精品| 亚洲七黄色美女视频| 少妇的逼水好多| 免费高清视频大片| 国产综合懂色| 国产蜜桃级精品一区二区三区| 首页视频小说图片口味搜索| av天堂在线播放| 亚洲人成伊人成综合网2020| 1000部很黄的大片| 18禁裸乳无遮挡免费网站照片| 国产乱人伦免费视频| 岛国在线免费视频观看| 在线播放无遮挡| 精品久久久久久久久av| 观看免费一级毛片| 国产高清激情床上av| 色综合欧美亚洲国产小说| 97人妻精品一区二区三区麻豆| 欧美色欧美亚洲另类二区| 日韩欧美国产一区二区入口| 国产麻豆成人av免费视频| 精品人妻偷拍中文字幕| 国产美女午夜福利| 国产亚洲精品久久久久久毛片| 国产伦人伦偷精品视频| 成人美女网站在线观看视频| 午夜a级毛片| 99热这里只有是精品在线观看 | 97热精品久久久久久| 在线观看66精品国产| 一区二区三区四区激情视频 | 亚洲一区二区三区不卡视频| 亚洲无线在线观看| 99精品在免费线老司机午夜| 亚洲18禁久久av| 人妻丰满熟妇av一区二区三区| 国产蜜桃级精品一区二区三区| 亚洲欧美精品综合久久99| 日韩欧美精品v在线| 首页视频小说图片口味搜索| av中文乱码字幕在线| 在线免费观看不下载黄p国产 | 全区人妻精品视频| 十八禁人妻一区二区| 国产亚洲精品久久久久久毛片| 欧美成人a在线观看| 亚洲经典国产精华液单 | 成人永久免费在线观看视频| 丰满乱子伦码专区| 免费一级毛片在线播放高清视频| 一二三四社区在线视频社区8| 久久久久久久亚洲中文字幕 | 乱码一卡2卡4卡精品| 黄片小视频在线播放| 一本精品99久久精品77| 欧美黄色片欧美黄色片| 乱码一卡2卡4卡精品| 精品乱码久久久久久99久播| 欧美极品一区二区三区四区| 亚洲乱码一区二区免费版| 首页视频小说图片口味搜索| 无遮挡黄片免费观看| x7x7x7水蜜桃| 日韩精品青青久久久久久| 毛片一级片免费看久久久久 | 免费看光身美女| 欧美成人性av电影在线观看| 国内精品一区二区在线观看| 91久久精品国产一区二区成人| 成人国产综合亚洲| 性插视频无遮挡在线免费观看| 欧美最新免费一区二区三区 | 色视频www国产| 欧美日本亚洲视频在线播放| 人妻久久中文字幕网| 色综合亚洲欧美另类图片| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | a级毛片a级免费在线| 91狼人影院| 久久亚洲真实| 国产精品亚洲一级av第二区| 日本一二三区视频观看| 动漫黄色视频在线观看| 最近在线观看免费完整版| 久久热精品热| 两人在一起打扑克的视频| 97人妻精品一区二区三区麻豆| 中文字幕免费在线视频6| 男女做爰动态图高潮gif福利片| 一本精品99久久精品77| 亚洲国产欧洲综合997久久,| 精品久久久久久久人妻蜜臀av|