• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    混合攻擊下時(shí)變信息物理系統(tǒng)的有限時(shí)域H∞控制

    2020-04-11 13:52:16黎善斌胥布工
    控制理論與應(yīng)用 2020年2期
    關(guān)鍵詞:華南理工大學(xué)時(shí)變工程學(xué)院

    劉 珊,黎善斌,胥布工

    (華南理工大學(xué)自動(dòng)化科學(xué)與工程學(xué)院,廣東廣州 510640)

    1 Introduction

    In recent years,the rapid developments of calculation,control,communications and network technology,have expanded the way of the generic in interconnection between all things,greatly extended the information in time and space,and changed the organization evolutionary approach of physical systems,which have given birth to the cyber-physical system[1].Among many advantages and benefits that cyber-physical system(CPS)can provide,one of them is the integration of the physical system and cyber system which can create value,but at the same time,there are some related challenges and risks,one of which is security[2].

    Security has always been an important consideration for CPS,which can be defined as the ability to ensure the communication between different components and prevent unauthorized server access[3].In a CPS,the protection of data and communication is difficult,so security is a complex and challenging task,this is because of the combined architecture of data,communications,process,and communication channel.The security problems of CPS in power grid systems,smart transportation systems,medical systems,water treatment system and other areas have received considerable attention in some literatures,and the security analysis and research of CPS under adversarial attacks has become a hot topic[4–6].

    Among various target objects which adversary could attack,the communication channel is the most common object.This is because the communication channel which transmits measurement or control data is usually connected via hard-wired or wireless networks,and the attacker can conduct DoS attacks through the networks to make the data packet dropouts[7–8].A lot of recent researches have focused on the DoS attacks[9–12].With the energy constraint of the jammer and the existence of attack detection device,the jammer can not always successfully cause the packet dropouts of the communication channels[13–14].Thus some researches have presented that the sensor data packet will be dropped randomly during the DoS attack period with a certain probability,and can be modeled by independent and identically distributed(i.i.d.)Bernoulli variables[15–18].The research in[16]considers the optimal control feedback controller that minimizes a given objective function subject to safety and power constraints for a class of denial-of-service(DoS)attack models.In[17],the authors focus on the optimal control and scheduling problem for linear networked control systems under DoS attacks,which can jam the communication channel between the remote sensors and the controller.To solve the problem,a zero-sum static game of complete information is first utilised to investigate the optimal strategies for both the trigger and the attacker.Besides the communication channel,the sensor and actuator are also the common objects which adversary could attack.For example,false data injection(FDI)attacks can inject false information into sensors or actuators,and cause the measurement or control data destroyed[19–23].Mo et al.consider the case that the attacker can design his actions to inject error information into the sensor without being detected,and study the effect of false data injection attacks on state estimation[19].The authors in[23]consider the scenario that a continuous-time,linear time-invariant(LTI)system withMinputs andPoutputs are controlled and measured by vulnerable actuators and sensors,respectively.A new notion of controllability and observability for CPSs under actuator attacks and sensor attacks has been introduced to analyse safety performance.Since many commercial devices are readily available for adversary to conduct these attacks,similarly,many attack strategies have been mentioned in some papers,we can know these attacks are already serious threats for the CPS[24–25].

    In practical engineering applications,for example,complex system process,intelligent robot control and the aerospace industry,the time-varying phenomenon of controlled system is common,whether the parameter of the system is time-varying or the structure is timevarying.Thus,more and more attention has been paid to it by researchers from different perspectives.Some of the previous researches have focused on the H∞control/filtering problem for time-varying system[26–27],and several kinds of approaches have been used for solving this problem,including the game theoretical approach[27–28],the differential/difference linear matrix inequality(DLMI)and recursive linear matrix inequality(RLMI)approach[29–32],and the backward recursive Riccati difference equation approach[26,33–34].On the other hand,the control objects sometimes are required to be completed in a limited time,such as missile interception,satellite orbit,etc..In addition,if the system is under attacks,the adversary can’t always successfully launch attacks with the same attack strategy due to the energy constraint of attacker or the existence of defense strategy.Therefore,considering these actual cases,the secure control problem for the time-varying system under attacks in a given finite-horizon has practical research significance,and to our best knowledge,it has not been properly researched so far,then to shorten this gap,this problem will be researched in this paper.

    Based on the above discussion,we focus on the security problem of CPS under hybrid attacks,including DoS attacks on the sensor communication channel,and FDI attacks on the sensors and actuators.Assuming that the attacks period is given,the DoS attacks can be described by the Bernoulli distributed white sequences with known probability as the previous researches[15,17],and the FDI attacks signals injected in the sensors and actuators are unknown but norm bounded[35–36].It has the theoretical and actual meaning to research the impact from these attacks on the performance of timevarying system in a finite horizon.Therefore,we target at designing a output feedback controller by using the stochastic analysis techniques,some sufficient conditions are established to guarantee the H∞performance in a finite-horizon for the addressed system by using backward recursive Riccati difference equation approach.The main contribution of this paper is mainly as following three points:i)both the DoS attacks and FDI attacks are considered in the output feedback controller design for the time-varying system which has multiple sensors and multiple actuators;ii)a sufficient condition is given for the controller design which makes H∞performance from the attacks signals to controlled output satisfied;iii)a suboptimal controller design algorithm is proposed by solving double backward recursive RDEs.

    The contents of the paper are as follows.In Section 2,the mathematical models of the CPS under hybrid attacks are described,and main control objective is presented.Then the main results are given in Section 3.At last,numerical simulation and conclusion are given to demonstrate the validity and applicability of the proposed approach in Section 4 and Section 5,respectively.

    Notations:We use a fairly standard notation in this paper.denote,respectively,thendimensional Euclidean space and set of alln×mreal matrices.denotes the set of integers(positive integers,negative integers).The notationXY(X >Y),whereXandYare real symmetric matrices,means thatX ?Yis positive semi-definite(positive definite).E{x}and E{x|y}will,respectively,denote the expectation of the stochastic variablexand expectation ofxconditional ony.0 represents the zero matrix of compatible dimensions.Then-dimensional identity matrix is denoted asInor simplyI,if no confusion is caused.The shorthand diag{·}stands for a block-diagonal matrix.∥A∥refers to the norm of a matrixAdefined byMTrepresents the transpose ofM.

    2 Problem formulation

    Consider a discrete time-varying linear CPS model with multiple sensors and multiple actuators shown in Fig.1.The output signal transmission is implemented between the sensors and remote controllers via network channels,which can be jammed by the DoS attacks;meanwhile,there arenysensors andnuactuators which can be injected in unknown random attack signals by the FDI attacker.

    Fig.1 The structure of CPS with hybrid attacks

    The plant is a discrete time-varying system defined in the finite horizonk ∈[0,N]of the form wherei ∈{1,2,···,nu}represents theith actuator,j ∈{1,2,···,ny}represents thejth sensor,is the state vector,is the control signal input to theith actuator,is the attack signal injected into theith actuator which belonging tol2[0,N],is the controlled output,yj,k ∈is the output of thejth sensor,is the attack signal injected into thejth sensor which belonging tol2[0,N]andandCj,k ∈are known real-valued time-varying matrices.

    Remark 1Some previous researches have presented the model of sensor attacks and actuator attacks for linear time-invariant system,and assumed that the attack signals have bounded energy in a finite-horizon[23,35].Inspired by these works,the time-varying CPS model subject to FDI attacks in sensors and actuators is given in(1),and the attack signalswi,kandaj,kare priori-unknown and energy bounded.If the attack signalwi,k=0,it means that theith actuator is not attacked;otherwise,theith actuator is successfully attacked by adversary,the output of theith actuator is false.Similarly,the attack on the sensor can affect the accuracy of the measured output data[37].The FDI attacks are unpredictable,and the attack signals can destroy the performance of the system,so that the influence of attack signals on the controlled output is worth studying.

    Considering there are random DoS attacks occurring between the sensors and controllers on the S–C network channels,then the measured output model with S–C packet dropout can be expressed as

    Remark 2Similar to the setup in some previous research[16,18,38],the occurrence of packet dropouts caused by the DoS attacks is stochastic and its probability is known.Then the stochastic variableαkis Bernoulli distributed with white sequence taking the values of 0 and 1,whose expected valueis known constant which means that each packet exchange attempt faces an attack with a fixed probability.If the communication channel between thejth sensor to controller is jammed by the DoS attack,then the output data packet will be dropped.

    The controller can be expressed as

    Then the closed-loop system by substituting(2)and(3)into(1)as follows:

    The main problem addressed in this paper is described as follows.

    Problem 1For the given finite time horizon[0,N],positive scalarγ,positive definite matrixWand initial statex0,we aim to design appropriate controller parametersKi,k(i ∈{1,2,···,nu})such that,the closed-loop system(4)satisfies the following H∞performance requirement:

    Remark 3The problem which requires H∞performance gain from disturbance signal to controlled output less than a given constant has been researched in previous works[16,18,39].Based on these works,if the injected signalswandaare disturbance signals,the H∞performance requirement(5)can also be regard as that from disturbance signal to controlled output in a finite horizon.

    3 Main results

    Lemma 1LetU,VandWbe known nonzero matrices with appropriate dimensions.The solutionXto

    Lemma 2Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exists a family of non-negative definite matricesPk(0kN,with the final conditionPN+1=0)and a set of real-valued matricesKksatisfying the following backward recursive RDE:

    So far,we have conducted the H∞performance analysis in terms of the solvability of a backward Riccati equation in Lemma 2.In the next stage,let us propose an approach for computing the suboptimal controller parametersKi,k(i ∈{1,2,···,nu})in each step under the worst situation,i.e.On this condition,we rewrite the closed-loop system(4)as follows:

    whereQk0 andRi,k >0(i ∈{1,2,···,nu})are the known weighting matrices.

    Problem 2By employing the worst-case FDI attack,we aim to provide a design scheme of the controller parametersKkto minimize the linear quadratic performance functionJ2as described below:

    subject to Problem 1 and system dynamics(7).

    Then we will solve the Problem 2 by giving the following theorem.

    Theorem 1Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exist two families of non-negative definite matricesPk,Sk(0kN)and a set of real-valued matricesKksatisfying(6)and the following backward recursive RDE:

    ProofFirstly,it follows from Lemma 2 that,if there exist solutionsPkandKkto(6),(11)and(12)so that the system(4)achieves the pre-specified H∞performance(5).On this condition,the worstcase attack signal can be expressed asξk==By employing the worst-case attack,the closed-loop system(4)can be written as(7),then the cost functionJ2can be described by completing the square with respect to

    For the purpose of minimizing the cost function(8),the controller parametersKkcan be selected in each iteration backward as follows:

    It follows from Lemma 1 that(13)is the solution of the optimization problem(15).The proof is complete.

    QED.

    However,we can see from the above theorem that it is difficult to get theKkfrom(13).Then in order to obtain the controller parametersKkdirectly and simplify the calculation process,the following theorem is given.

    Theorem 2Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exist the positive scalarhk,two families of nonnegative definite matricesPk,Sk(0kN)and a set of real-valued matricesKksatisfying the following two backward recursive RDEs:

    ProofDefinewherehk >0 is introduced to provide more flexibility in the controller design.Then denotethe closed-loop system can be described as

    It follows from Theorem 1 that if there exist solutions{(hk,Pk,Qk,Kk)}0?k?Nsatisfying the backward recursive RDEs(16)with(17)–(18),then the system satisfies

    If the condition(20)is satisfied,we can get

    which implies that the H∞performance constraint(5)is satisfied.Then for the purpose of minimizing the cost function(9),the suboptimal controller parametersKkcan be selected in each iteration backward as follows:

    which equal to calculate

    It follows from Lemma 1 that(19)is the solution of the optimization problem(25).The proof is complete.

    QED.

    Noticing that the controller parametersKkare involved in the proposed double RDEs,by means of Theorem 2,the finite-horizon H∞controller design algorithm is proposed as follows.

    Algorithm 1finite-horizon H∞controller design:

    Given:N,QN+1,γ,W,Qk,Rk;

    Output:Kk,Pk,Sk,

    wherej ∈{1,2,···,ny},k ∈{0,1,···,N}.

    Steps of algorithm:

    1)Initializek=N,SN+1=QN+1,PN+1=0;

    2)Select the appropriate valuehk,computeandΛ22,k+1>0,then the controller parametersKkcan be solved by(19),and go to the next step,else jump to Step 7);

    3)If the condition(20)is satisfied,go to the next step,else return to Step 2);

    4)Solve the backward RDEs(16)to getPkandSk;

    5)Ifk0,setk=k?1,and go back to Step 2),else turn to the next step;

    6)If the conditionP0<γ2Wis satisfied,this algorithm is feasible,and output the results,else go to Step 7);

    7)This algorithm is infeasible.

    Remark 4In this paper,the finite-horizon H∞controller is designed for a time-varying system with multiple actuators and multiple sensors under FDI attacks and DoS attacks by solving double backward recursive RDEs.Note that Lemma 2 and Theorem 1 are proved mainly by the completing the square method which leads to very little conservatism,and Theorem 2 is given to obtain the controller parametersKkdirectly and simplify the calculation process,which also provides more flexibility in the controller design.We can see from Algorithm 1 that,there are several factors that can increase the complexity of controller design,including the time-varying system parameters,the prescribed attack attenuation levelγ,the selected scalarhk,and the probabilities of packet dropouts from sensors to controllers caused by DoS attacks.Therefore,the comprehensive influence of these factors will determine the control effect,and in actual implementation of the Algorithm 1,in order to obtain the better control effect,in the case that the system parameters and the probabilities of packet dropouts are known,we will adjust the scalarhkappropriately to get a smaller prescribed attack attenuation levelγ.

    4 Numerical simulation

    In this section,we aim to demonstrate the effectiveness of the proposed problem and algorithm.

    Consider a discrete-time time-varying system with the following system parameters:

    Let the FDI attack signals be

    Case 1Assuming that the probability parameters are given asthe H∞attack attenuation levelγ=0.6,the positive definite matrixW=0.8I,the time horizonN=100,the performance weighting matricesQk=I,R1,k=1,R2,k=0.8 andR3,k=1,and the selected scalarhk=1.Using Algorithm 1,we can obtain the controller gain results as shown in Table 1.The controlled outputs of closed-loop system and open-loop system are shown in Fig.2,respectively,and the measured outputs under hybrid attacks and without attacks are shown in Fig.3,respectively.

    Table 1 The controller gain results

    Fig.2 The controlled outputs of system

    Fig.3 The measured outputs of system

    Then we consider the case that the controller parametersKkare not optimal to minimize the linear quadratic performance functionJ2as we presented in Problem 2 and the other given conditions are the same as those given above,thus the controllers we obtained are common H∞performance controllers,which can be obtained by solving Problem 1.We can compare the results of permitted minimumγand the linear quadratic performance functionJ2in different cases,which are shown in Table 2,and the results comparison of controlled outputs are shown in Fig.4.

    Table 2 The results comparison

    Fig.4 The controlled outputs with different algorithms

    From the above numerical results and simulated figures,we can see that the controller design by Algorithm 1 is effective.

    Case 2Assuming that the positive definite matrixW,the time horizonN,and the LQR performance weighting matrices are the same with them in Case 1.The probability parametercan change from 0.9 to 0.8,the scalarhkcan be selected as 1,1.1 and 1.2.The permitted minimumγresults are shown in Table 2.

    Table 3 The permitted minimum γ

    We can see from the above table that the permitted minimumγis related to the probability parameters and the scalarhk,that is to say,for the same scalarhk,if the probability parameters get smaller,it means that packet dropout probabilities get larger,then the permitted minimumγwill get larger;for the same packet dropout probabilities,if the scalarhkget larger,the permitted minimumγcould get larger or smaller.Then for the same packet dropout probabilities,we should select proper scalarhk,which can make the permitted minimumγget smaller.

    5 Conclusions

    This paper has presented the H∞performance control problem and given the design approach of controller for the security of time-varying CPS under hybrid attacks.The model of occurring two types of cyber attacks is presented,and the H∞performance requirement which represents the impact of attack signals on the controlled output in a finite-horizon is proposed.Based on the attack model and control objective,the suboptimal controller is designed to reduce the performance loss which the injected attack signals caused.Through theoretical research and simulation example,the approach we proposed can solve the control problem,reduce the performance loss,and increase security of CPS under hybrid attacks.

    Appendix:

    ProofBy defining then taking the mathematical expectation(A1),and applying the completing squares method results in

    which means the pre-specified H∞performance requirement(5)is satisfied.The proof is complete. QED.

    猜你喜歡
    華南理工大學(xué)時(shí)變工程學(xué)院
    福建工程學(xué)院
    福建工程學(xué)院
    福建工程學(xué)院
    本期作者
    世界建筑(2018年5期)2018-05-25 09:51:38
    福建工程學(xué)院
    當(dāng)機(jī)器人遇上人工智能——記華南理工大學(xué)自動(dòng)化科學(xué)與工程學(xué)院副教授張智軍
    基于時(shí)變Copula的股票市場(chǎng)相關(guān)性分析
    煙氣輪機(jī)復(fù)合故障時(shí)變退化特征提取
    焦唯、王琪斐美術(shù)作品
    王雁、謝盼盼藝術(shù)作品
    神马国产精品三级电影在线观看| 欧美高清成人免费视频www| 国产蜜桃级精品一区二区三区| 国产亚洲精品av在线| 精品日产1卡2卡| 久久午夜亚洲精品久久| 亚洲18禁久久av| 日韩欧美三级三区| 午夜福利欧美成人| 久久欧美精品欧美久久欧美| 亚洲自拍偷在线| 久久天堂一区二区三区四区| 欧美午夜高清在线| 黄色女人牲交| 午夜免费成人在线视频| 亚洲一区二区三区色噜噜| 每晚都被弄得嗷嗷叫到高潮| 此物有八面人人有两片| 精品久久久久久,| 少妇丰满av| 丰满的人妻完整版| 久久国产乱子伦精品免费另类| 久久亚洲精品不卡| 床上黄色一级片| 亚洲五月婷婷丁香| 成人18禁在线播放| 亚洲色图av天堂| 五月伊人婷婷丁香| 夜夜爽天天搞| 国产综合懂色| 亚洲电影在线观看av| 国产蜜桃级精品一区二区三区| 亚洲黑人精品在线| www.熟女人妻精品国产| 动漫黄色视频在线观看| 亚洲av成人av| 一级作爱视频免费观看| 人人妻人人看人人澡| 每晚都被弄得嗷嗷叫到高潮| 亚洲国产欧美人成| 一级作爱视频免费观看| 欧美日本视频| 欧美日本亚洲视频在线播放| 成人午夜高清在线视频| 黄色丝袜av网址大全| 亚洲精品一卡2卡三卡4卡5卡| avwww免费| 69av精品久久久久久| 99久久综合精品五月天人人| or卡值多少钱| 熟女人妻精品中文字幕| 韩国av一区二区三区四区| 一区二区三区高清视频在线| 国产精品爽爽va在线观看网站| 18禁黄网站禁片午夜丰满| 窝窝影院91人妻| 欧美一区二区精品小视频在线| 19禁男女啪啪无遮挡网站| 一本一本综合久久| 日日夜夜操网爽| 悠悠久久av| 亚洲精品美女久久av网站| 亚洲成av人片免费观看| 日日夜夜操网爽| 久久久久久人人人人人| 亚洲性夜色夜夜综合| 在线免费观看不下载黄p国产 | 日韩 欧美 亚洲 中文字幕| 狠狠狠狠99中文字幕| 91麻豆av在线| 亚洲色图av天堂| 草草在线视频免费看| 免费人成视频x8x8入口观看| 午夜久久久久精精品| 99视频精品全部免费 在线 | 亚洲一区二区三区不卡视频| 在线视频色国产色| 久久精品91无色码中文字幕| 一级毛片女人18水好多| 日本与韩国留学比较| 香蕉丝袜av| 欧美3d第一页| 欧美不卡视频在线免费观看| 黄片小视频在线播放| 免费观看的影片在线观看| 天堂影院成人在线观看| 日韩中文字幕欧美一区二区| 亚洲中文av在线| 亚洲成人久久爱视频| 亚洲中文日韩欧美视频| 啦啦啦免费观看视频1| 国产高清有码在线观看视频| 国产精品 欧美亚洲| av福利片在线观看| 色吧在线观看| 国产成人aa在线观看| 人人妻人人看人人澡| 免费看a级黄色片| 日本免费a在线| 亚洲欧美精品综合久久99| 99国产精品一区二区三区| 午夜a级毛片| 久久久久国内视频| 精品一区二区三区av网在线观看| 国产精品影院久久| 香蕉丝袜av| 欧美日韩亚洲国产一区二区在线观看| 免费av不卡在线播放| 在线免费观看的www视频| 成年人黄色毛片网站| 国产av麻豆久久久久久久| 婷婷精品国产亚洲av在线| 国产伦人伦偷精品视频| 精品午夜福利视频在线观看一区| 亚洲 欧美一区二区三区| 天堂√8在线中文| 精品国产三级普通话版| 久久香蕉国产精品| 亚洲五月婷婷丁香| 国产成人一区二区三区免费视频网站| 免费在线观看日本一区| 熟女电影av网| 黄片小视频在线播放| 国产高清有码在线观看视频| 一级作爱视频免费观看| 校园春色视频在线观看| 又黄又粗又硬又大视频| 免费看a级黄色片| 午夜免费观看网址| 欧美一区二区国产精品久久精品| 一个人观看的视频www高清免费观看 | 日韩中文字幕欧美一区二区| 成年版毛片免费区| 国产午夜福利久久久久久| 国产av在哪里看| 久久这里只有精品中国| 男女床上黄色一级片免费看| 欧美zozozo另类| 热99re8久久精品国产| 亚洲国产精品久久男人天堂| 亚洲成人免费电影在线观看| 欧美性猛交黑人性爽| 成人鲁丝片一二三区免费| 亚洲午夜精品一区,二区,三区| 国产精品久久久久久精品电影| 日本一二三区视频观看| 一本综合久久免费| 日韩欧美三级三区| 免费看日本二区| 亚洲专区国产一区二区| 嫩草影院精品99| 又爽又黄无遮挡网站| 精品福利观看| 麻豆国产97在线/欧美| 日本黄色片子视频| 婷婷精品国产亚洲av| 波多野结衣高清作品| 国内精品久久久久久久电影| 国产黄片美女视频| 老汉色av国产亚洲站长工具| 精品99又大又爽又粗少妇毛片 | 欧美日韩福利视频一区二区| 久久久久国产精品人妻aⅴ院| 一进一出好大好爽视频| 女警被强在线播放| 国产亚洲av高清不卡| 亚洲18禁久久av| 欧美zozozo另类| 禁无遮挡网站| 99久久久亚洲精品蜜臀av| 午夜影院日韩av| 久久精品综合一区二区三区| 久久午夜亚洲精品久久| 成人精品一区二区免费| av在线天堂中文字幕| 精品国产美女av久久久久小说| 淫秽高清视频在线观看| 亚洲精品久久国产高清桃花| 国产 一区 欧美 日韩| 国产毛片a区久久久久| 国产主播在线观看一区二区| 亚洲精华国产精华精| 人妻久久中文字幕网| 老司机在亚洲福利影院| 免费看a级黄色片| 免费看美女性在线毛片视频| 国产精品亚洲av一区麻豆| 国产精品国产高清国产av| 精品国产三级普通话版| 午夜免费激情av| 免费在线观看日本一区| 999精品在线视频| 国产av不卡久久| 久久久久性生活片| 国产激情偷乱视频一区二区| 亚洲 国产 在线| 亚洲,欧美精品.| 18美女黄网站色大片免费观看| 亚洲人成伊人成综合网2020| 无限看片的www在线观看| 免费看a级黄色片| 国产一区二区三区在线臀色熟女| 夜夜夜夜夜久久久久| 一本精品99久久精品77| 两性午夜刺激爽爽歪歪视频在线观看| 国内精品美女久久久久久| 最新中文字幕久久久久 | 国产精华一区二区三区| 亚洲男人的天堂狠狠| 不卡一级毛片| a级毛片在线看网站| 一级毛片高清免费大全| 99热只有精品国产| 精品久久久久久成人av| 999久久久国产精品视频| 国产成人精品久久二区二区91| 国内精品久久久久精免费| 亚洲成人精品中文字幕电影| 欧美日韩一级在线毛片| 亚洲av五月六月丁香网| 偷拍熟女少妇极品色| 日韩欧美国产在线观看| 国产三级在线视频| 制服丝袜大香蕉在线| 久久久国产欧美日韩av| 97人妻精品一区二区三区麻豆| 久久香蕉国产精品| 免费大片18禁| 非洲黑人性xxxx精品又粗又长| 欧美日韩亚洲国产一区二区在线观看| 午夜日韩欧美国产| 国产极品精品免费视频能看的| 女生性感内裤真人,穿戴方法视频| 精品一区二区三区四区五区乱码| 一本综合久久免费| 国产不卡一卡二| 国产高清视频在线观看网站| 叶爱在线成人免费视频播放| 国产亚洲精品久久久com| 91麻豆av在线| 99国产精品99久久久久| 1000部很黄的大片| 国产av不卡久久| 久99久视频精品免费| 在线国产一区二区在线| av中文乱码字幕在线| 免费观看人在逋| 色视频www国产| 久久久久国产精品人妻aⅴ院| 热99在线观看视频| 国产精品 国内视频| 国产v大片淫在线免费观看| 亚洲 欧美一区二区三区| 老汉色∧v一级毛片| 国产91精品成人一区二区三区| 91在线精品国自产拍蜜月 | 中文字幕精品亚洲无线码一区| 99久久精品一区二区三区| 亚洲美女视频黄频| 国产亚洲欧美98| 午夜福利在线观看免费完整高清在 | 精品国产亚洲在线| 中国美女看黄片| 搡老熟女国产l中国老女人| 中文字幕人妻丝袜一区二区| 一本精品99久久精品77| 久久精品国产亚洲av香蕉五月| av片东京热男人的天堂| 久久香蕉精品热| a级毛片a级免费在线| 天堂影院成人在线观看| 男女做爰动态图高潮gif福利片| 欧美色视频一区免费| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品自产拍在线观看55亚洲| 小蜜桃在线观看免费完整版高清| 亚洲精品美女久久久久99蜜臀| 亚洲精品乱码久久久v下载方式 | 午夜亚洲福利在线播放| 国产亚洲精品av在线| 免费高清视频大片| 最近最新中文字幕大全电影3| 日韩 欧美 亚洲 中文字幕| 非洲黑人性xxxx精品又粗又长| 精品一区二区三区视频在线观看免费| 一边摸一边抽搐一进一小说| 免费无遮挡裸体视频| 国产精品av久久久久免费| 中文字幕久久专区| 日韩欧美三级三区| 国产aⅴ精品一区二区三区波| 国产精品久久久av美女十八| 午夜激情福利司机影院| 国产精品综合久久久久久久免费| 好男人在线观看高清免费视频| 婷婷精品国产亚洲av| 日本免费a在线| 久久久久久久久中文| www.999成人在线观看| 精品久久久久久久久久久久久| 巨乳人妻的诱惑在线观看| 在线看三级毛片| 国产精品综合久久久久久久免费| 麻豆成人午夜福利视频| 亚洲精品在线美女| 国产精品女同一区二区软件 | 麻豆成人av在线观看| 亚洲中文字幕日韩| 国产精品精品国产色婷婷| 91麻豆av在线| 免费av不卡在线播放| 免费高清视频大片| 亚洲欧美日韩高清专用| 久久精品国产综合久久久| 午夜福利在线在线| 亚洲欧美一区二区三区黑人| 蜜桃久久精品国产亚洲av| 国产一区二区三区视频了| 成年女人永久免费观看视频| 丁香六月欧美| 亚洲av日韩精品久久久久久密| 高潮久久久久久久久久久不卡| 久久久成人免费电影| 欧美极品一区二区三区四区| 美女免费视频网站| 精品久久蜜臀av无| 97人妻精品一区二区三区麻豆| 99久久精品国产亚洲精品| 91字幕亚洲| 俺也久久电影网| 国产精品99久久99久久久不卡| 亚洲精品中文字幕一二三四区| 韩国av一区二区三区四区| 日韩三级视频一区二区三区| 看免费av毛片| 国产亚洲欧美在线一区二区| 美女被艹到高潮喷水动态| 波多野结衣高清作品| 中文在线观看免费www的网站| 日本 av在线| 色综合欧美亚洲国产小说| 亚洲国产精品999在线| aaaaa片日本免费| 999久久久国产精品视频| 精品一区二区三区视频在线 | 日韩欧美一区二区三区在线观看| 亚洲国产中文字幕在线视频| 久久亚洲精品不卡| svipshipincom国产片| 色噜噜av男人的天堂激情| 中出人妻视频一区二区| 亚洲国产看品久久| 亚洲精品乱码久久久v下载方式 | 在线观看午夜福利视频| 夜夜看夜夜爽夜夜摸| a在线观看视频网站| 久久国产精品影院| 黄片大片在线免费观看| 又紧又爽又黄一区二区| 国产精华一区二区三区| 悠悠久久av| 午夜精品在线福利| 国产一级毛片七仙女欲春2| 给我免费播放毛片高清在线观看| 精品一区二区三区视频在线观看免费| 久9热在线精品视频| 每晚都被弄得嗷嗷叫到高潮| 黄色片一级片一级黄色片| 91字幕亚洲| 一进一出抽搐动态| 免费看a级黄色片| 亚洲成a人片在线一区二区| 国产av在哪里看| 桃色一区二区三区在线观看| 成人三级黄色视频| 成人亚洲精品av一区二区| 中文字幕人成人乱码亚洲影| 成人18禁在线播放| 岛国视频午夜一区免费看| 国产高清三级在线| 亚洲av免费在线观看| 九色国产91popny在线| 99热只有精品国产| 窝窝影院91人妻| 女生性感内裤真人,穿戴方法视频| 国产精品野战在线观看| 黄色视频,在线免费观看| 亚洲无线观看免费| 亚洲精品中文字幕一二三四区| 亚洲最大成人中文| 69av精品久久久久久| 网址你懂的国产日韩在线| 中亚洲国语对白在线视频| 变态另类成人亚洲欧美熟女| 午夜免费激情av| 午夜福利在线观看免费完整高清在 | 国产伦精品一区二区三区视频9 | 中文字幕av在线有码专区| 精品乱码久久久久久99久播| 亚洲欧美日韩高清在线视频| 琪琪午夜伦伦电影理论片6080| 看黄色毛片网站| 国产精品精品国产色婷婷| 久久精品亚洲精品国产色婷小说| 日韩av在线大香蕉| 亚洲中文字幕日韩| 精品熟女少妇八av免费久了| 亚洲精品一区av在线观看| 国产成人欧美在线观看| 久久亚洲精品不卡| 日本一本二区三区精品| 国产亚洲欧美在线一区二区| 亚洲一区二区三区不卡视频| 亚洲国产精品成人综合色| 黄色成人免费大全| 欧美成狂野欧美在线观看| 两个人的视频大全免费| 99久久精品国产亚洲精品| 成人三级黄色视频| 高清在线国产一区| 国产av不卡久久| 看黄色毛片网站| 国内毛片毛片毛片毛片毛片| 老司机深夜福利视频在线观看| 亚洲aⅴ乱码一区二区在线播放| av福利片在线观看| 精品欧美国产一区二区三| 18禁观看日本| 狂野欧美激情性xxxx| 午夜a级毛片| 观看免费一级毛片| 亚洲av日韩精品久久久久久密| 中文资源天堂在线| 一个人观看的视频www高清免费观看 | 黄色女人牲交| 一级毛片女人18水好多| 国产精品精品国产色婷婷| 天天一区二区日本电影三级| 在线观看午夜福利视频| 全区人妻精品视频| 欧美日韩一级在线毛片| 亚洲自拍偷在线| 法律面前人人平等表现在哪些方面| 久久天堂一区二区三区四区| 国产欧美日韩精品一区二区| 我要搜黄色片| 国语自产精品视频在线第100页| 18禁裸乳无遮挡免费网站照片| 身体一侧抽搐| 成年免费大片在线观看| 久久精品国产亚洲av香蕉五月| 99精品在免费线老司机午夜| 久9热在线精品视频| 成人av一区二区三区在线看| 最新在线观看一区二区三区| 日韩人妻高清精品专区| 成年人黄色毛片网站| 在线观看免费视频日本深夜| 精品免费久久久久久久清纯| 国产伦一二天堂av在线观看| 久久久久久大精品| 一级毛片女人18水好多| 国产精品一及| svipshipincom国产片| 亚洲美女视频黄频| 亚洲人成网站高清观看| 亚洲中文av在线| 亚洲人成网站高清观看| 他把我摸到了高潮在线观看| 天堂网av新在线| 亚洲精品粉嫩美女一区| 亚洲欧美日韩高清在线视频| 国产精品一区二区三区四区久久| 亚洲av成人一区二区三| 欧美成人性av电影在线观看| 精品一区二区三区视频在线观看免费| 亚洲欧美激情综合另类| 一区福利在线观看| 精品一区二区三区av网在线观看| 国产精品精品国产色婷婷| 成年版毛片免费区| 好男人在线观看高清免费视频| www.自偷自拍.com| 亚洲欧美精品综合久久99| 午夜免费观看网址| 成人精品一区二区免费| av视频在线观看入口| 全区人妻精品视频| 很黄的视频免费| 亚洲片人在线观看| 免费在线观看日本一区| 91av网站免费观看| 国产亚洲av高清不卡| 可以在线观看的亚洲视频| 成人三级黄色视频| 国产 一区 欧美 日韩| АⅤ资源中文在线天堂| 特级一级黄色大片| 俺也久久电影网| 国产精品久久久久久亚洲av鲁大| 国产精品久久电影中文字幕| 床上黄色一级片| 亚洲va日本ⅴa欧美va伊人久久| 黄片大片在线免费观看| 精品人妻1区二区| 欧美国产日韩亚洲一区| 亚洲中文av在线| 色老头精品视频在线观看| 欧美乱妇无乱码| 久久人人精品亚洲av| 亚洲精品乱码久久久v下载方式 | 国内毛片毛片毛片毛片毛片| 中文亚洲av片在线观看爽| 免费在线观看亚洲国产| 草草在线视频免费看| 国产精品野战在线观看| 久久久久久久精品吃奶| 免费在线观看影片大全网站| 99久久综合精品五月天人人| 一二三四社区在线视频社区8| 特级一级黄色大片| 青草久久国产| 少妇人妻一区二区三区视频| 精品一区二区三区av网在线观看| 观看美女的网站| 精品国产亚洲在线| 首页视频小说图片口味搜索| 精品乱码久久久久久99久播| 久久精品亚洲精品国产色婷小说| 禁无遮挡网站| 91av网一区二区| 午夜精品一区二区三区免费看| 偷拍熟女少妇极品色| 国产精品久久久久久久电影 | 国产亚洲精品av在线| 中国美女看黄片| 99国产极品粉嫩在线观看| 国内久久婷婷六月综合欲色啪| 欧美性猛交黑人性爽| 国产精品1区2区在线观看.| 国产精品美女特级片免费视频播放器 | 后天国语完整版免费观看| 成人三级黄色视频| 午夜精品一区二区三区免费看| 性色av乱码一区二区三区2| 国产精品久久久久久久电影 | 日韩国内少妇激情av| 亚洲色图 男人天堂 中文字幕| 18禁黄网站禁片免费观看直播| 怎么达到女性高潮| 欧美在线一区亚洲| 国产乱人视频| 国产av一区在线观看免费| 嫩草影院精品99| 亚洲人成网站在线播放欧美日韩| 美女高潮的动态| 国产高清视频在线观看网站| 岛国在线观看网站| 国产美女午夜福利| 在线永久观看黄色视频| 久久久久免费精品人妻一区二区| 给我免费播放毛片高清在线观看| 18禁黄网站禁片免费观看直播| 国产精品电影一区二区三区| 国产精品久久久久久人妻精品电影| 日韩人妻高清精品专区| 99久久成人亚洲精品观看| 国产精品精品国产色婷婷| 日本黄色视频三级网站网址| 99久国产av精品| 亚洲精品国产精品久久久不卡| 国产精品98久久久久久宅男小说| 在线看三级毛片| 岛国视频午夜一区免费看| 亚洲va日本ⅴa欧美va伊人久久| 别揉我奶头~嗯~啊~动态视频| 一a级毛片在线观看| 小蜜桃在线观看免费完整版高清| 又大又爽又粗| 日韩成人在线观看一区二区三区| 日韩大尺度精品在线看网址| 欧美在线一区亚洲| 波多野结衣高清无吗| 九色国产91popny在线| 亚洲七黄色美女视频| 国产乱人视频| 国产又黄又爽又无遮挡在线| 国内毛片毛片毛片毛片毛片| 免费在线观看影片大全网站| 久久伊人香网站| 国产精品女同一区二区软件 | 久久久国产成人精品二区| 老汉色av国产亚洲站长工具| 黄色日韩在线| 亚洲一区高清亚洲精品| 日韩三级视频一区二区三区| 国产黄片美女视频| 日本黄色片子视频| 日韩三级视频一区二区三区| 在线a可以看的网站| 桃色一区二区三区在线观看| 久久精品影院6| 国产精品1区2区在线观看.| 国产97色在线日韩免费| 亚洲精品美女久久av网站| av福利片在线观看| 国产成人欧美在线观看| 亚洲国产欧美人成| 夜夜看夜夜爽夜夜摸| 欧美日韩亚洲国产一区二区在线观看| or卡值多少钱| 三级国产精品欧美在线观看 | 深夜精品福利| 欧美不卡视频在线免费观看| 日本撒尿小便嘘嘘汇集6|