• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Evolution Toward Artificial Intelligence of Things Under 6G Ubiquitous-X

    2020-07-16 08:44:08PingZhangXiaodongXuXiaoqiQinYimingLiuNanMaandShujunHan

    Ping Zhang, Xiaodong Xu, Xiaoqi Qin, Yiming Liu, Nan Ma and Shujun Han

    (1.State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;2.National Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing 100876, China)

    Abstract: With the evolution of cellular networks, 6G is a promising technology to provide ubiquity of communications, computing, control, and consciousness (UC4) for “human-machine-thing-genie” and build a ubiquitous intelligent mobile society. Genie, which can act as the artificial intelligence assistance for 6G users, is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence. While Internet of Things (IoT) is the digital nervous system, genie acts like the brain of the overall system. Supported by 6G, IoT will step into the Artificial Intelligence of Things (AIoT) era and the AIoT networks have the abilities of intelligent perception, intelligent analysis, and intelligent control. In this paper, the concept of Ubiquitous-X is introduced, which is considered as the fundamental architecture of 6G network, and the definition and architecture of AIoT under Ubiquitous-X is also presented. Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed, including massive and intelligent connectivity, efficient computing, security, privacy, authentication, high scalability and efficiency. Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well.

    Keywords: AIoT, 6G, Ubiquitous-X, AI, MEC, blockchain, physical layer security

    1 Introduction

    With the convergence of the physical and virtual world, billions of Internet of Things (IoT) devices will be connected to share the collected information for monitoring and even reconstructing the physical world in cyber space. Meanwhile, since the development of 5G technology is moving to its final phase and the commercial deployment of 5G networks begins, it is predicted that trillions of IoT devices would be connected in the next decade[1], which enables the unprecedented proliferation of new IoT services. These emerging IoT services require end-to-end co-design of communication, control, computing, and consciousness functionalities[2-3]. However, such requirements have been largely overlooked in 5G, which is marketed to support basic IoT services, thereby making it debatable whether the current system design of 5G can support the future smart IoT applications.

    Based on 5G, 6G aims at realizing a ubiquitous communication network including human-machine-thing-genie[3-4], which will provide full-dimensional wireless coverage and integrate all functions, including sensing, communication, computing, caching, control, positioning, radar, navigation, and imaging, to support full-vertical applications. Our earlier work[5]proposed Ubiquitous-X, which is a novel network architecture for 6G network to support the integration of human-machine-thing-genie communication with the aim of realizing ubiquitous artificial intelligence (AI) services from the network core to end devices. The “X” in “Ubiquitous-X” represents the evolution from traditional mobile networks to future intelligent digital world which is full of possibilities. To support the paradigm shift from connected IoT devices to connected smart IoT devices, 6G will realize the concept of Ubiquitous-X by exploiting technologies such as AI, edge computing, end-to-end distributed security, and big data analytics[6-7]. With the merging of AI and IoT, the Artificial Intelligence of Things (AIoT) is considered as the stepping stone to build the 2030 intelligent information society[8]. By forming a highly sustainable, secure, and cost-effective networks, it enables vendors to provide intelligent services for various industry vertical markets.

    Currently, AIoT is still in its infancy, which adopts single machine intelligence[9]. To unleash the potential of AIoT services, it requires the massive deployment of IoT devices in industry applications. Without effective connections among the devices, each device would become isolated data island and the collected data cannot be fully utilized to support AIoT services[10].

    The important issues to be addressed in order to enable large-scale AIoT device deployments over 6G are as follows:

    ·What would be the new performance challenges posed by the massive deployment of diverse AIoT devices in 6G networks?

    ·How to realize efficient processing of large-scale data collected by AIoT devices?

    ·How to enhance the security and privacy of AIoT?

    ·How to customize the design of 6G network to support massive and intelligent connectivity in AIoT?

    This paper aims to answer the above questions with highlights on the main challenges and potential enabling technologies. It is worth noting that to efficiently support AIoT, it requires co-design of the enabling technologies to fully exploit the benefit of each technology through the convergence of various technologies.

    2 AIoT under 6G Ubiquitous-X

    2.1 6G Ubiquitous-X

    The combination of mobile networks, edge computing, and AI are the key enabling technologies for IoT applications through cyber-physical spaces[11]. However, with the development of information technology, mobile communication has been transformed by novel applications. Recently, the International Telecommunication Union-Telecommunication Standardization Sector (ITU-T) reported seven representative use cases for network 2030[12]. Some of the key network requirements go beyond the utmost performance of 5G. For example, human-size holographic communication requires 1Tbps bandwidth, and some industrial IoT applications require 99.999 999% availability. Bandwidth, delay, reliability, and especially capabilities in terms of intelligence are insufficient nowadays.

    To address the aforementioned challenges, “genie” was introduced to represent autonomous agents[3]. Genie exists in the virtual world which can communicate and make decisions without human involvement. It has intelligent “consciousness” and can represent feelings, intuitions, emotions, ideas, rationality, sensibility, exploration, learning, and cooperation through characterization, extension, mixing, and even compilation[5]. Therefore, communication objective of 5G “human-machine-thing” will evolve to 6G “human-machine-thing-genie.”

    Ubiquitous-X is a fundamental architecture of the 6G network and a specific carrying form of “human-machine-thing-genie”. Genie can reside on any communication and computing node or the virtual world formed around the user to enable the information exchange of all communication objects. It will definitely reshape the 6G network and solve the limitations of 5G networks, especially regarding endogenous intelligence, which is to achieve the ubiquity of communications, computing, control, and consciousness (UC4)[5]. Some key enabling techniques and challenges for Ubiquitous-X can be summarized as follows.

    2.1.1Multi-dimensionalbearingresources

    Ubiquitous-X coordinates multi-dimensional resources, namely communication (i.e., frequency, time, code, and space), computing, and caching resources. The incorporation of computing and caching functionality into communication systems enable information processing, distribution, and high-speed retrieval within the network. By utilizing multi-dimensional resources, it is possible for users to access services and information through any platform, any device, and any network. With the emerging of applications with rate requirement in the order of Tbps, such as holographic type communications (HTC) or brain-computer interactions (BCI), the frequency band should be extended from mmWave to terahertz (THz). The transmission characteristics of THz wave are quite different from the lower frequency bands. The THz signal will suffer from severe path loss and weak diffraction ability, as well as severe molecular absorption loss. Fortunately, due to the short wavelength, the application of ultra-large-scale multiple-input-multiple-output (MIMO) becomes possible, which can make full use of space resources and perform beamforming in multiple directions, thereby further improving the user’s Signal to Interference and Noise Ratio (SINR). On the flip side, it will aggravate the non-stationary characteristics of the channel. The measurement and modelling of the propagation characteristics of THz channels still need further exploration[13]. To cope with massive URLLC scenarios which merge 5G URLLC with legacy mMTC, such as the Industrial IoT scenario, the Ubiquitous-X platform should be able to support smaller scheduling time unit, non-orthogonal multiple access (NOMA) technology, and AI-based scheduling algorithms.

    2.1.2End-to-endUC4aggregation

    Intelligence will become an inherent feature of Ubiquitous-X networks, and be deployed across the core network to edge computing nodes. With the increasing demand for truly immersive user experience, the requirement of higher-dimensional perception, representation, transmission, and decision making emerges. Ubiquitous-X will orchestrate communication, computing, control, and consciousness to represent the traditional five senses, namely sight, hearing, taste, smell, and touch. It will also support the representation of human emotions, especially through the Wireless BCI to provide a fully immersive experience. The relevant factors affecting immersive services, such as brain cognition, body physiology, and gestures, as well as the new performance indicators like Quality-of-Physical-Experience (QoPE)[14]will also be considered. Meanwhile, thanks to the intelligent features of connected IoT devices, it is possible to support real-time control of physical entities to realize tactile Internet.

    2.1.3Expansionofthecommunicationdimension

    Unmanned aerial vehicles (UAVs) are widely discussed as a supplement or extension to 5G coverage in academia and industry[15]. However, due to the limitations of battery capacity and complicated interference among transmissions, the vision of ubiquitous connection cannot be fully achieved. The 6G Space-Air-Ground-Sea Integrated Communication Networks (SAGSIN) consisting of satellite systems, aerial networks, terrestrial communications, and undersea wireless communications can support truly seamless full coverage communication by dynamically and adaptively converging various types of networks enabled by all kinds of communication technologies to meet the service requirements of complex and diverse application scenarios. The geographical communication dimension of intelligent IoT devices will be greatly expanded in the 6G era.

    Different from geosynchronous satellites, Low Earth Orbit (LEO) satellites usually work 500-2 000 kilometres from above the earth. Therefore, the transmission delay is greatly reduced, which can provide a better user experience. By using Ka or Ku frequency bands, the transmission rate of a single LEO beam can reach the order of Gbps. With technological improvement, the manufacturing, launching, and maintenance costs of LEO are becoming affordable. Meanwhile, with the rapid advancement of deep-sea manned and unmanned detector, undersea wireless communication-related technologies will also be included as part of Ubiquitous-X networks[16].

    2.1.4Endogenoussecurity

    Security and privacy should be the key features of 6G networks. The endogenous security aims to improve the reliability of the networks. Ubiquitous-X’s endogenous security can be achieved both in the network layer and the physical layer. Blockchain technologies are exploited to support distributed security service, and it will be further elaborated in Section 4.2. To realize physical layer security, technologies including channel, code, power, and signal design[17]along with flexible key management mechanisms should be adopted. Note that polar code is considered as a promising channel coding method for control channel in 5G networks due to its low coding and decoding complexity. Since polar code can achieve the secrecy capacity of the wiretap channels[18], it has a good prospect in data channel coding and physical layer security in 6G.

    2.2 AIoT Architecture

    With the rapid evolution of AI and wireless infrastructure, their merging will realize the endogenous intelligence of 6G networks. Based on IoT which provides ubiquitous connectivity to various end devices, AIoT takes a step further to integrate AI with IoT, aiming at providing intelligent connectivity, efficient computing, security, and high scalability for terminal devices. AIoT will construct an intelligent ecosystem, where the massive amount of data will be sensed by end devices, stored and analysed using ubiquitous caching and computing resources at network edge via big data analytics technique to realize real-time cognition and reasoning. As the inevitable trend of the development of IoT, AIoT will become the main driver for intelligent upgrading of traditional industries.

    The development of AIoT can be envisioned as three stages: single machine intelligence, interconnection intelligence, and active intelligence. As for the stage of single machine intelligence, AIoT devices need to wait for interaction requirements initiated by users. Therefore, AIoT devices need to accurately perceive, recognize, and understand various instructions of users, such as voice and gesture and make correct decisions. Then at the stage of interconnection intelligence, AIoT devices are interconnected, adopting the mode of “one brain (cloud or central control), multiple terminals (perceptron).” At the stage of active intelligence, the AIoT system has the ability of self-learning, self-adaptability, and self-improvement. According to user’s behavior preference and surrounding environment, it works like a private secretary and actively provides suitable services without waiting for instructions. Compared with the stage of interconnection intelligence, active intelligence achieves real intelligence and automation of AIoT.

    As shown in Fig. 1, the architecture of AIoT under 6G Ubiquitous-X includes four layers, namely perception layer, network layer, processing layer, and application layer.6G Ubiquitous-X empowers AIoT devices with UC4. These AIoT devices work as the traditional five senses in the digital society and exchange feelings, intuitions, emotions, and ideas via exploration, learning, and cooperation. In this way, AIoT under 6G Ubiquitous-X supports the integration of human-machine-thing-genie communication with the aim of realizing ubiquitous AI services from the core network to AIoT devices. While AIoT could be the intelligent digital nervous system, genie acts like the brain of the overall system to give each unit entity in the four layers intelligent “consciousness”.

    The perception layer is the basement of other upper layers, where sensing-type, communication-type, processing-type, and control-type IoT devices are widely deployed. These IoT devices function like eyes, noses, ears, and skins of human to obtain information via identification, positioning, tracking, and monitoring. The network layer is the most import infrastructures of AIoT, which plays the role of a link between perception layer and processing layer. It works like human nerves and transmits perception information and signaling information over the unlicensed networks (WiFi/LoRa/Zigbee/Bluetooth) and licensed networks (2G/3G/4G/5G/6G/…/XG). Exploiting AI, big data analytics, cloud computing, multi-access edge computing (MEC), blockchain, and trusted computing, the processing layer will process the massive data generated from perception layer. It works like human brain and performs data storage, classification, security protection, and results acquisition. Other than the development of innovative supporting technologies for AIoT, the implementation of AIoT functionalities to support real-world applications ranging from smart city to smart factory is a key challenge. The implementation of AIoT can be considered as human body which carries out decisions made by human brain (the processing layer of AIoT).

    3 Challenges Moving Toward AIoT

    The exponential growth of smart IoT devices and the fast expansion of applications pose significant challenges for the evolution of AIoT, including massive and intelligent connectivity, efficient computing, security, privacy, authentication, and high scalability and efficiency. In this section, these challenges in advancing toward AIoT will be discussed in detail.

    3.1 Massive and Intelligent Connectivity

    With the development of information and communication technologies, the network scale is being immensely extended and the number of smart IoT devices keeps increasing dramatically. Massive and intelligent connectivity is the combination of mobile networks, AI, and the linking of billions of devices through the IoT. To support flexible and reliable communication, the connectivity technologies among a variety of devices have been extensively investigated for many years, including cellular technology (2G/3G/4G), bluetooth, Low Power Wide Area (LPWA), Wi-Fi, WiMAX, and Narrowband IoT (NB-IoT)[19-23]. Besides, to support the large-scale number of intelligent IoT devices on the limited bandwidth and maximize the spectrum efficiency, some promising radio access techniques, such as massive MIMO, cognitive radio (CR), beamforming, and NOMA, are widely researched in IoT[24-27]. While massive connectivity and intelligent techniques are already being exploited in 5G networks, the AIoT deployments will be much denser, more heterogeneous, and with more diverse service requirements. Taking the massive and intelligent connectivity of AIoT into consideration, there are still many challenges which are as follows.

    3.1.1Multi-radioaccesschallenges

    In dynamic network environments, the rapid and precise channel division and multiple-radio access are essential for the massive IoT connections. For example, time division duplex (TDD), orthogonal frequency-division multiplexing (OFDM), NOMA, and MIMO, which utilize the time/frequency/power/code/space domain to support multiple access to massive IoT devices, have been extensively investigated in a variety of IoT scenarios supported by WiFi, WiMAX, NB-IoT, etc. The core foundation of these multi-radio access challenges is accurate and real-time channel state information (CSI). However, in IoT, the network traffic and topology change frequently, i.e., out of all devices, only a few are active at any given moment. It is critical to explore the sparsity in the IoT device activity pattern to deal with the high-dimensional channel estimation problem. Moreover, considering the huge computational and communication overhead, it is still challenging to embrace intelligent learning algorithms in IoT connected by massive diverse devices. In summary, conventional multi-radio access methods cannot satisfy the massive and intelligent connectivity. How to intelligently manage the multi-radio access for massive connectivity is a significant challenge.

    3.1.2Radioandnetworkconfigurationchallenge

    The radio configuration usually specifies the amount of wireless resources allocated to each group of AIoT devices for accessing to network and transmitting data. Considering the connected billions of constrained AIoT devices, light-weight and automated radio configuration on distinct communication functions as well as network configuration on all layers of the network stack become urgent research areas. While the radio and network configuration are time-consuming and infeasible for the highly dynamic large-scale AIoT. Soft-defined network (SDN) and network functions virtualization (NFV) are promoted to facilitate much more flexible configuration and handle the evolution of IoT services[28-29]. However, in SDN-enabled IoT, the flow handling may bring additional network overhead and the configuration supported by the controller, which may take additional time and aggravate extra latency in end-to-end flow transactions. Then, how to make radio and network configuration more feasible and intelligent for supporting massive and intelligent connectivity is an emerging topic in the future AIoT.

    3.1.3Beamformingchallenge

    To support massive connectivity, beamforming combined with mmWave and massive MIMO technology becomes a promising solution, which can effectively improve energy efficiency. However, the traditional beamforming methods may bring high overload of mmWave in dynamic and complicated IoT communication. In order to make the mmWave and the corresponding beamforming strategy intelligent, machine learning (ML) based beamforming optimization might be a potential solution.

    In summary, 6G facilitates the deployment of massive IoT in ultra-wide areas with ultra-high density. By combining the cutting-edge AI and the linking of billions of devices of IoT, massive and intelligent connectivity are enabling transformational new capabilities in transport, entertainment, industry, public services, and so on. Therefore, to support a huge volume of low-cost, low-energy consumption devices on a network with excellent coverage, AIoT should support a huge number of connections and bring more intelligent interconnection of physical things on a massive scale.

    3.2 Efficient Computing

    With the deep integration of AI and IoT, our time has witnessed a paradigm shift from using dedicated sensors to collect data for offline processing to collective intelligence, where end devices are no longer just data collectors but also intelligent agents. However, due to the limited battery capacity and computing capability at end devices, it is hard to meet the stringent requirements of intelligence acquisition. Therefore, it is of critical importance that the ubiquitous computing resources can be fully exploited to realize the evolution from connected things to connected intelligence. As illustrated in Fig. 2, end devices could offload their computing-intensive tasks to edge server or central cloud server for fast processing.

    Fig.2 Mobile computing enabled AIoT

    3.2.1Processingofcomputationintensivetasks

    Mobile cloud computing (MCC) provides powerful computing capabilities at the cloud server to tackle the limited capabilities of end devices by offloading computation tasks to the cloud server[30]. By relieving the burden of computation at end devices, MCC decreases the manufacturing cost of end devices and extends the lifetime of end devices[31]. However, since the cloud server is located in the core network, the transmission and result feedback delay of cloud computing is in the order of tens to hundreds of milliseconds, which cannot meet the requirement of ultra-reliable and low latency communication in future 6G[32]. As predicted by Cisco[33], mobile data traffic will grow dramatically and nearly 850 ZB per year will be generated by people and machines by 2021. Therefore, the transmission and processing delay caused by network congestion at core network is a major drawback of MCC and calls for improved architecture design.

    3.2.2Highlyresponsivecomputingservice

    With the advancement in computing and storage technology, computing power at network edge (e.g., base stations, access points (APs), and end devices) has multi-fold increase during the last decade. MEC is regarded as a promising technology to cope with the drawback of long delay in cloud computing by pushing the computing service to the close proximity of end devices[34-35]. This emerging technology leverages the computation resources at massive edge devices and edge servers for task processing, thus the overhead of uploading computation tasks to the core network in MCC is avoided[36-37]. The highly responsive service provided by MEC have attracted widespread attention from both the academia and industry. It has been applied to innovative applications such as IoT, autonomous driving, and real-time big data analytics[38-39]. Particularly, in AIoT, massive devices will generate a large amount of data which calls for real-time processing to enable novel applications such as smart cities and industrial automation. With the assistance of MEC, the collected data at end devices can be offloaded to nearby edge servers or other devices with idle computing resources for fast processing.

    3.2.3Jointmulti-dimensionalresourceallocation

    To realize efficient computing service, task offloading strategy design and resource management scheme design are the key issues that need to be addressed in MEC[40]. Task offloading strategy investigates the problems of when and where to process the computation tasks, including whether or not the task should be offloaded to edge server or a nearby device for processing, and the time and order of task offloading. Considering the limited computational and communication resources, resource management schemes must be carefully designed to coordinate the task offloading among multiple devices and edge servers to achieve efficient computing. Due to the highly dynamic environment of MEC system, such as the random arrival of tasks, the time-varying wireless channels, and the stochasticity of computational resources at edge servers, the task offloading and resource management scheme design is not trivial.

    3.3 Security, Privacy, and Authentication

    Security, privacy, and authentication are critical tasks for the standardization of any mobile communications system. ITU-T security recommendations explore a set of security dimensions to provide protection against all major security threats[41], as shown in Fig. 3. The eight security dimensions cover user information, network, and applications. Their relationships with the AIoT are introduced as follows.

    ·Access control is the basic and important strategy for AIoT security. It guarantees that only authorized AIoT devices can use network resources and prevents unauthorized devices from accessing the network elements, services, stored information, and information flows.

    ·Authentication confirms identities of AIoT devices, ensures validity of their claimed identities, and provides assurance against masquerade or replay attacks.

    ·Non-repudiation requires that neither the transmitter nor the receiver can deny the transmitted information.

    ·Data confidentiality protects data from unauthorized AIoT devices disclosure and ensures that the data content cannot be understood by unauthorized AIoT devices.

    ·Data integrity guarantees the correctness or accuracy of data, and its protection from unauthorized AIoT devices creation, modification, deletion, and replication. It also provides indications of unauthorized AIoT devices activities related data.

    ·Communication security ensures that information flows only between the authorized AIoT devices and is not diverted or intercepted while in transit.

    ·Availability makes sure that there is no denial of authorized AIoT devices access to network resources, stored information or its flow, services, and applications.

    ·Privacy protects the information of AIoT devices that might be derived from the observation of their activities.

    Even though the computing power, energy capacity, and storage capabilities of AIoT have been significantly improved, the negative impact of potential possible attacks on AIoT is drastically increasing due to the insufficient enforcement of security requirements as shown in Fig. 3. For example, different from wired communication, wireless networks are open to outside intrusions and do not need physical connections. It makes the wireless-enabled AIoT devices more vulnerable to potential attacks due to the broadcast natures of wireless transmissions. In a smart factory, if confidentiality is not ensured, an adversary could discover the manufacturing process. If data are not integrity protected, an adversary could inject false data in the system, thus modifying the manufacturing process with a potential impact on safety. If availability is not guaranteed, the factory could stop all its machines in order to maintain a safe state. Moreover, due to the innate heterogeneity of AIoT system, the conventional trust and authentication mechanisms are inapplicable. The non-negligible threats to AIoT devices make security, privacy, and authentication still the major challenges for AIoT in XG. Therefore, to simplify the development of secure AIoT, it is important to comprehend the potential solutions that can provide a secure, privacy-compliant, and trustworthy-authentication mechanism for AIoT.

    Fig.3 Security dimensions defined by ITU-T

    3.4 High Scalability and Efficiency

    The unbounded increase of heterogeneous AIoT devices and the huge data they generate demand scalable and energy-efficient infrastructure for uninterrupted communication. In AIoT, ML coupled with AI can utilize these generated data to predict the network conditions and user behaviors to offer insight into which processes are redundant and time-consuming, and which tasks can be fine-tuned to enhance scalability and efficiency. The scalability of the AIoT refers to the capacity of a network or its potential to support increasing reach and number of users. It also requires the network to be able to add any device, service or function without negatively affecting the quality of existing services. Researchers have extensively investigated AI-based solutions for optimizing IoT in the context of lower communication overhead and higher energy and computational efficiency these years[42-46]. Leveraging the huge volume of data in various IoT applications, AI-based solutions could analyze and learn from the complicated network environments and then optimize the network and resource maintenance. Furthermore, using some online learning mechanisms, the learn-and-adapt network management schemes can greatly enhance AIoT user experience in terms of low service delay, high system resilience, and adaptivity[47]. However, AI-based applications are usually computationally intensive and may be unable to enhance themselves continuously and scalably from a flowing stream of massive AIoT data. Since the AIoT applications are more bandwidth-hungry, computation- intensive, and delay-intolerant, the scalability and efficiency issues are critical parts of the AIoT network optimization as well as user’s experience. The challenges in terms of high scalability and efficiency are illustrated in the following sections.

    3.4.1Routingoptimizationchallenge

    In AIoT, massive devices may collect, process, and store data and information through the network with the single or multiple hops relay. The routing mechanism is one of the key components and has significant impact on the scalability and efficiency of future AIoT for enabling effective link and communication among different devices. Generally, different AIoT services usually have distinct requirements of network resources and quality of service, and different routing solutions should be designed to handle different AIoT traffic effectively and support these varieties of AIoT applications. Adaptive routing and shortest path routing algorithms are two types of most popular routing optimization approaches. However, the high computational complexity of the adaptive routing algorithm limits its performance in current AIoT. Meanwhile, shortest path routing is a best-effort routing protocol and may result in low resource utilization. Moreover, in the ultra-dense heterogeneous AIoT, most devices are very close and multiple networks are mostly overlapping. The interference issues among these AIoT devices cannot be ignored. Thus, how to optimize routing protocols in future AIoT to enhance system performance in terms of scalability, reliability, and efficiency is still a challenge to be tackled.

    3.4.2Networkoptimizationchallenge

    It is critical to optimize AIoT to adaptively support new operations and services without negatively affecting the quality of existing services due to the diverse networking and communications protocols. Specifically, AIoT nodes and servers, which adopt heterogeneous networking technologies, convey a multitude of data types that correspond to different applications, and bring forward stringent need for flexible network architecture and intelligent network optimization solutions. This frequent data cross border may increase the difficulty of network management. Moreover, optimizing networks for the provision of AIoT services is not similar to the management of traditional cellular networks due to the different profile of AIoT traffic. As discussed in Section 3.1, AIoT data traffic is typically sporadic, so network optimization should not only handle the average throughput but also support the peaks. Then, to promote intelligent network management, it is necessary to introduce some autonomous mechanisms into the network, including planning, configuration, management, optimization, and self-repair. However, due to the limited computing and communication resources, it is still critical to predict the AIoT traffic accurately by learning the huge volume of data. Therefore, how to design new network architecture and optimize network management to support scalable and efficient AIoT are still testing.

    3.4.3Resourceoptimizationchallenge

    The huge number of AIoT devices and a variety of AIoT applications will lead to increasing demands for storage, computing, and communication resources to handle data processing. Due to the heterogeneous and resource-limited AIoT devices, resource optimization for handling different types of devices become much more demanding. Considering the stochastic and time/space-varying features of AIoT environment, real-time and accurate CSI plays a very important role in resource optimization. However, because of limited signaling resources, it may not be practical for the AIoT devices to acquire real-time CSI from a wide range of heterogeneous AIoT devices. Thus, how to learn from the heterogeneous AIoT environment and schedule the multiple types of resources adaptively and intelligently to maximize resource efficiency and increase scalability of AIoT systems are still challenges.

    To achieve high scalability and efficiency in AIoT with large-scale devices and the huge volume of data, it is imperative to develop new architecture and solution by introducing some enabling technologies, including big data analytics, MEC, ML, blockchain, etc. The future AIoT with highly sophisticated data computing and analytics capabilities can support autonomous network operation and maintenance, but there are still many challenges in those mentioned techniques to satisfy the high scalability and efficiency of future AIoT.

    4 AIoT under 6G Ubiquitous-X: Potential Enabling Technologies

    Since AIoT combining AI and IoT is currently emerging, its development course can be influenced by a lot of other promising technologies, such as MEC, blockchain, AI, and physical layer security, while AIoT may impact them as well. This section will exploit the potential benefits and interactions when these technologies are applied into AIoT.

    4.1 Multi-Access Edge Computing

    With the fast merging of AI and IoT, massive amounts of various end devices with computing capabilities will be connected to support delay-sensitive and computation-intensive applications. Mobile edge computing is envisioned as a promising technique to support these innovative applications at resource-limited end devices by providing cloud-computing capabilities at the edge of the network[48]. As networks are shifting toward heterogeneous architecture, to address the multi-access characteristics, the MEC Industry Specification Group of European Telecommunication Standard Institute (ETSI) extended the concept of mobile edge computing to multi-access edge computing.

    The MEC framework proposed by ETSI describes a hierarchical structure, which includes three levels from the bottom to the top, namely network level, mobile edge host level, and mobile edge system level[49]. In the networks level, various networks including 3GPP mobile networks, local access networks, and other external networks, are interconnected. As illustrated in Fig. 4, heterogeneous networks include LTE, WiFi, and 5G. As for mobile edge host level, by leveraging the vitalization technologies including virtual machines (VM), SDN, and NFV, the mobile edge host offers virtualization infrastructure that provides computation and storage resources. In the mobile edge system level, user equipment (UE) application can directly exploit MEC via customer facing service (CFS) portal.

    Fig.4 Illustration of multi-access edge computing scheme

    To support AIoT, innovative technology companies have released new hardware to support the realization of AI at network edge. In 2017, Microsoft proposed Azure IoT Edge, which can support certain workloads such as AI and big data analytics running on IoT edge devices via standard containers. In 2018, Google declared two products, namely Edge TPU and Cloud IoT Edge. Edge TPU is a hardware chip designed for ML model, and Cloud IoT Edge is a software stack that extends AI capability to gateways and connected devices. Nvidia developed Jestson TX2 as a powerful embedded AI computing device, which can be deployed at the edge of the network to enable edge AI. There has been extensive research on the system design and resource optimization of MEC, and the following sections will give a concise overview.

    4.1.1Computationoffloadingdesign

    Due to the limited power and computation capability at end device, it is hard to meet the service requirement of computation intensive tasks using local computing resources only. Therefore, the end devices could leverage the communication resources and the computing resources at network edge to process the tasks. The convergence of computing and communication could enhance the system capability to support large-scale end devices[50-51]. Considering the application preference, the remaining power at the end device, and the availability of communication resources and computing resources at network edge, computation offloading scheme mainly solves the problem of when and where to offload the computation tasks[52]. In single-user MEC systems, the authors in Ref. [53] investigated computation offloading schemes by exploiting the time-varying channel and helper-CPU conditions to minimize the energy consumption of devices. The authors in Ref. [54] proposed a Lyapunov optimization-based dynamic computation offloading algorithm to minimize the cost of executing tasks consisting of the execution delay and task failure. In Ref. [55], the authors jointly optimize the computational speed of device, transmission power of device, and offloading ratio to minimize the energy consumption of device and the latency of application execution. In multi-user MEC systems, the computation offloading design is more complicated due to the resource competition among multiple users. In Ref. [56], the authors designed a decentralized tit-for-tat mechanism to incentivize selfish devices to participate in fog computing in distributed wireless networks. The authors in Ref. [57] proposed an alternating direction method of multipliers (ADMM) based task offloading algorithm to minimize the total system cost of energy and the delay of task execution in fog and cloud networks with NOMA. In Ref. [58], according to the multi-armed bandit theory, the authors proposed an adaptive learning-based task offloading algorithm to minimize the average offloading delay in a distributed manner without requiring frequent state exchange. Moreover, MEC has been employed to timely reveal the status information embedded in sampled data. The authors in Ref. [59] employed a new performance metric based on Age of Information to jointly optimized task generation, computation offloading, and resource allocation to maintain the freshness of status updates obtained by executing computation tasks in MEC-enabled status update systems.

    4.1.2MECwithheterogeneouscomputationresource

    With the proliferation of new applications, the processing requirements exceed the capability of central processing unit (CPU). Graphics processing unit (GPU) has evolved to accelerate the processing of computation tasks due to its highly parallel computing capability[60]. Computing architectures are becoming hybrid systems with GPUs working in tandem with CPUs. By leveraging heterogeneous computation resource, end device can offload computation tasks to the best suited processor to achieve better performances. Therefore, how to jointly design computation task partitioning scheme and resource allocation strategy in MEC system under heterogeneous computation resource will be an attractive research direction.

    4.1.3MECwithheterogeneouscachingandcommunicationresources

    Incorporating computing and caching functionality into the communication systems can support highly scalable and efficient content retrieval. Meanwhile, the duplicate content transmissions within the systems can be significantly reduced[61]. The authors in Ref. [62] studied economically optimal mobile station (MS) association to trade off the cache-hit ratio and the ratio of MSs with satisfied quality of service (QoS) in cache-enabled heterogeneous cloud radio access networks. To address the complex and dynamic control issues, the authors in Ref. [63] proposed a federated deep reinforcement learning-based cooperative edge caching (FADE) framework for IoT with mobile edge caching. They modeled the content replacement problem as a Markov decision process (MDP) and proposed a federated learning framework based on double deep Q-network (DDQN) to reduce the performance loss, average delay, and offloading backhaul traffic. The authors in Ref. [64] studied the computation offloading method with cached data and proposed a novel cache-aware computation offloading strategy for edge-cloud computing in IoT. They formalized the cache-aware computation offloading location problem to minimize the equivalent weighted response time of all jobs with computing power and cache capacity constraints. The authors in Ref. [65] proposed a software-defined information centric-Internet of Things (IC-IoT) architecture to bring caching and computing capabilities to the IoT network. Based on the proposed IC-IoT architecture, they designed a joint resource scheduling scheme to uniformly manage the computing and caching resources. The authors in Ref. [66] proposed an AI-enabled smart edge with heterogeneous IoT architecture that combines edge computing, caching, and communication to minimize total delay and confirm the computation offloading decision.

    4.2 Blockchain

    Blockchain, which was proposed as the underlying technology of the digital cryptocurrency, has drawn widespread attention from both academia and industry. It is essentially a distributed and practically immutable ledger of transactions. Each block in a blockchain contains one or more transactions and points to the prior one[67]. As the primary purpose of a blockchain, transaction records can be securely saved and validated in an untrustworthy peer-to-peer system by applying a consensus mechanism in a decentralized manner. In addition, transactions can implement and execute the operational code saved in blockchain, enabling software services between untrustworthy devices. Since first used in cryptocurrency[68], blockchain has raised increasing interests with lots of use cases and applications. Particularly, blockchain has been envisioned as a promising solution to many problems when new technologies are integrated with AIoT.

    The general hierarchical technical structure of the blockchain is shown in Fig. 5[69]. From the bottom to the top, there are six layers, including the data layer, network layer, consensus layer, incentive layer, contract layer, and application layer.

    Fig. 5 Six-layer architecture in blockchain protocol stack

    The data layer includes the basic data structure of the blockchain. The structures of distributed ledgers are not only a chain of blocks but also have other structures like directed acyclic graph (DAG). Considering a chain of blocks, each block includes a number of transactions and is linked to the previous block, forming an ordered list of blocks. The block consists of the block header and main data. The block header specifies the metadata, including block version, the hash of previous and current blocks, timestamp, Merkle root, and other information. Explicitly, block version stores the relevant version of blockchain system and protocol. Using Hash pointer, all blocks can be linked together to form a chain based on the hash of the previous block. Merkle tree is defined as a binary search tree with its tree nodes linked to one another using hash pointers. Utilizing the hash value of the Merkle tree root in blockchain, all the recorded transactions on the current block could be checked easily and quickly. The block generation time is recorded in the timestamp. The main data of the block stores all transactions ever executed. The data type depends on the service on blockchain.

    The network layer, which is the basis of blockchain information interaction, is responsible for the consensus process and data transmission among the nodes, mainly including the P2P network and its security mechanism built on the basic network.

    The consensus layer guarantees the consistency of node data, encapsulates various consensus algorithms and the reward and punishment mechanism that drives the node’s consensus behavior. There are a lot of consensus protocols being applied in blockchain systems, which could be roughly divided into consensus protocols with proof of concept (e.g., Proof of Work (PoW) and Proof of Stake (PoS)) and Byzantine fault-tolerant replication protocols (e.g., Practical Byzantine Fault Tolerance (PBFT) and Ripple). According to the different types of blockchains, consensus protocols are selected differently.

    The incentive layer introduces economic incentive to make the nodes contribute their efforts to verify data in blockchain systems. It plays an important role in maintaining the decentralized blockchain system without any centralized authority.

    The contract layer enables programmability in blockchain systems. Various script codes, smart contracts, and other programmable codes can be utilized to enable more complex programmable transactions.

    The application layer includes relevant application scenarios and practice cases of the blockchain. These applications may revolutionize these fields and provide efficient, secure, and decentralized management and optimization.

    By leveraging blockchain, AIoT could be considerably improved from many perspectives. It could solve the single point of failure problem of the AIoT center management and control architecture, overcome the security and privacy challenges of ubiquitous sensing device data, provide solutions for data sharing and access control, and offer incentive valuable data and resources sharing, which has constructed a new type of Internet value ecology. The benefits of blockchain on AIoT are explored in the following sections.

    4.2.1Securityandprivacy

    Existing works have discussed how to apply blockchain to improve security and privacy in the IoT from different points of view[70-73]. First, blockchain nodes are decentralized and supportive to network robustness. Even if some nodes in the network are compromised by various attacks, other nodes can work normally and the data will not be lost. This feature of blockchain increases the overall network robustness compared with existing centralized and distributed data systems. Second, the transparency of blockchain can be utilized to make the data flow in the network completely open to users. This makes user’s personal data usage traceable and they are informed how their data is used. Third, the immutability of data in the blockchain will increase the reliability of activities in the network and enhance the mutual trust between users and service providers. Finally, the pseudonym of blockchain helps users in network keep their real-world identity hidden for privacy protection.

    4.2.2Dataandmodelsharing

    Sharing data and information in a safe and effective manner is still challenging for many applications in AIoT. Blockchain can protect network data from tampering, and effectively preserve the privacy for network users. Moreover, blockchain is more transparent and secure in data sharing. By better protecting the privacy for users’ data and the security of users’ application, blockchain-empowered AIoT can provide better personalized services with more add-on values.

    4.2.3Credibilityandmaliciousoperationtracing

    The application of blockchain can protect privacy and increase the credibility of network at the same time. When a node disseminates malicious messages, the public availability of blockchain means that the malicious node in the network can be traced back by using the transaction records saved in the blockchain.

    4.2.4Enhancementofdecentralizedsolutions

    Blockchain is actually a form of distributed book-keeping technology. Each node of the system runs compatible consensus mechanism or protocol and can access the transaction node that participates in the network and sends information. These nodes can interact with the adjacent nodes while cannot change any records practically. The essence of the decentralized ledger is to protect it from network attacks, which is quite helpful for storing data in a safe and decentralized way for AIoT.

    4.3 AI Technologies: Big Data Analytics and Machine Learning

    With the explosive growth of IoT applications, there are various requirements in different vertical domains include,i.e., health, transportation, smart home, smart city, agriculture, education, etc. AIoT is evolving toward highly complex systems driven by large volume of data. Recently, the rapid development and widespread application of big data analytics and ML have brought promising opportunities to reshape the network maintenance and architectures, especially with the assistance of analysis capabilities driven by the knowledge and statistical patterns hidden in massive data[74].

    4.3.1Bigdataanalytics

    Big data is one of the most important features for the future networks, where skyrocketing IoT traffic brings new requirements for the data communication, and more importantly, huge data generated by networks themselves imply a great deal of useful information to improve the network management, resource allocation, security control, etc. Considering the huge amount and various characteristics of network data, big data analytics could perform comprehensive data fusing and analyzing over the collected information, correlate various influencing factors and network status, and find out the causality and logistics behind them with the help of ever-increasing computing capacity. Big data analytics, which processes large volumes of disparate and complex data comprehensively, is widely used to improve the performance of IoT applications and enhance IoT functions in various aspects, such as intelligent healthcare systems[75], smart home[76], smart city[77], intelligent transportation systems[78], etc.

    4.3.2Machinelearning

    Machine learning (ML), which possesses powerful data processing capabilities and provides feasible solutions to a variety of problems, are widely applied in IoT scenarios[79-81]. Current IoT typically involves a large number of network elements and IoT devices. They may generate huge volume of data that can be used to analyze, learn, and train ML models to optimize the system performance. Moreover, multi-layer and multi-vendor IoT applications become highly complicated and need to be operated by more efficient solutions. Compared with conventional techniques, ML-based techniques, which train models and learn from large data sets, can substantially diminish human intervention and reduce the operation cost for handling large-scale complex IoT systems[82]. Generally, the ML techniques can be classified into four different areas, i.e., supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning (RL). Supervised learning algorithm uses labeled training dataset to construct the model while unsupervised learning uses the training dataset without labels. RL introduces reward and punishment methods to perform training models. Leveraging ML techniques, AIoT applications can support predictive analysis to ensure the requirements for resources to be accurately met and to improve the efficiency of network operation. It can also optimize network control and operation compared with other methods, especially when the network behavior is complex and involves massive parameters. Furthermore, the application of the ML in AIoT can detect malicious behavior on the networks by deploying the trained models and algorithms.

    In summary, future AIoT with highly sophisticated data computing and analysis capabilities can support autonomous network operation and maintenance. With the help of virtualization and ever-increasing computing capacity, network elements become more intelligent and quickly react to the network environment changes. Data from all network ingredients at various levels and different ramifications could be stored and analyzed to produce an optimized solution, which can cut down the operating expense (OPEX) and capital expenditure (CAPEX). More intelligent self-maintaining scripts and algorithms would be invented for resource allocation and network operation to free engineers from cumbersome manual processes. Then, the AIoT can update the network parameters autonomously during network operation. With the advent of big data analytics and ML technologies, massive intelligent IoT devices will generate huge and various data and then get much smarter and more intelligent to learn, train, and perform decisions in a better manner.

    4.4 Physical Layer Security

    As a promising complement to high-layer encryption techniques, physical layer security has received much attention in wireless communications. Without relying on the upper layer encryptions and cryptographic approaches, physical layer security has its unique built-in security mechanism based on the characteristics of wireless channel and provides a feasible idea for the realization of “one-time pad”. With the new radio technologies development in 5G, such as massive MIMO[83], mmWave[84]and NOMA[85-86], the channel spatial resolution will be greatly improved and the built-in security elements become more abundant and achievable. It significantly enhances the physical layer security technology with wireless endogenous security attributes. The basic idea of physical layer security is utilizing channel coding and signal processing techniques to transmit secret message between the source and the destination while guaranteeing confidentiality against the eavesdroppers. Based on whether there is key generation, the physical layer security is divided into two folds: information theoretic security and physical layer encryption, both of which can be effective in resolving the boundary, efficiency, and link reliability issues.

    4.4.1Informationtheoreticsecurity

    Information-theoretic security, which is associated with key-less-based physical layer security techniques, was initiated by Shannon[87]in 1949 and further strengthened by Wyner[88]in theoretical basis using information-theoretic approach in 1975. In 1978, it was extended to Gaussian channels[89]and broadcast channels[90]. Information-theoretic security exploits the differences under channel conditions and in interference environments to boost the received signal at intended receiver while degrading the received signal of unauthorized users. Early works in field of information-theoretic security were mostly measured by secrecy capacity, which is defined as the maximum achievable rate between the main channel and eavesdropper’s channel, and non-zero secrecy capacity can be achieved if the eavesdropper’s channel is a degraded version of the main channel. The metrics for information-theoretic security were later extended to secrecy outage probability, secrecy throughput, fractional-equivocation-based metrics, BER-based and PER based metrics[91]. However, due to the characteristics of time-varying random fading in wireless channels, the secrecy capacity will suffer from a significant loss especially when the main channel is in a deep fade. Hence, combined with new radio technology in 5G and 6G, artificial-noise-aided security technique, and security-oriented beamforming techniques[92]will further enhance the security performance.

    4.4.2Channel-basedsecretkeygeneration

    Channel-based secret key generation is also known as physical layer encryption, in which wireless devices exploits reciprocity and randomness of wireless fading channels to generate a shared secret key between source and destination. Combined with LDPC[93-94]and polar coding[95-96], the generated secret key is manipulated at the upper layer (i.e., bit level) or lower physical layer (i.e., symbol level) to protect the entire physical layer packet. It is lightweight without depending on additional complexity and just relies on the physical characteristics of the wireless fading channels. The passive attacker located more than half a wavelength away from the legitimate users will suffer independent fading and is unable to infer the generated secret key. A typical channel-based secret key generation scheme includes channel probing, randomness extraction, quantization, reconciliation, and privacy amplification, and is often measured by the key generation rate, the key entropy, and the key disagreement probability[91]. However, they are often limited by the unique characteristics of wireless channel, such as the channel coherence time and the channel quality. Furthermore, it is hard to measure the main channel and eavesdropper’s channel in AIoT era because the number of channel training is limited and high-rate feedback channel is forbidden to avoid signaling overhead. Therefore, it is full of challenges in designing an efficient and secure-proven key generation scheme in practice.

    5 Conclusions

    The current 5G networks mainly solves the problem of information interaction and connectivity, while the 6G will further provide "Intelligent connectivity", "Deep connectivity", "Holographic connectivity", and "Ubiquitous connectivity", which can be summarized as "everything follows your heart wherever you are". The Ubiquitous-X architecture of 6G explores more possibilities and opportunities for AIoT at application level. In 6G, AIoT is not just AI enabled IoT, but "All in IoT". Meanwhile, AIoT faces various challenges. This paper laid out some technical challenges for AIoT in 6G and presented the major potential technologies. Since AIoT under 6G network is still incipient, there are many technical challenges to be solved for its implantation. But undoubtedly, AIoT will enable the 6G network to support the intelligent society.

    PingZhang(M'07-SM'15-F'18) received his Ph.D. degree from Beijing University of Posts and Telecommunications (BUPT) in 1990. He is currently a professor at the School of Information and Communication Engineering at BUPT, the Director of the State Key Laboratory of Networking and Switching Technology,

    China, a member of IMT-2020 (5G) Experts Panel, and a member of Experts Panel for China’s 6G development. He served as the Chief Scientist of National Basic Research Program (973 Program), an expert in Information Technology Division of National High-Tech R&D Program (863 Program), and a member of Consultant Committee on International Cooperation of National Natural Science Foundation of China. His research interests mainly focus on wireless communication. He is an Academician of the Chinese Academy of Engineering (CAE).

    XiaodongXu(S'06-M'07-SM'18) received his B.S. degree in Information and Communication Engineering and Master’s degree in Communication and Information System both from Shandong University in 2001 and 2004, respectively. He received his Ph.D. degree in Circuit

    and System from Beijing University of Posts and Telecommunications(BUPT) in 2007. He is currently a professor at BUPT.

    He has coauthored nine books and more than 120 journal andconference papers. He is also the inventor or co-inventor of 39 granted patents. His research interests cover moving networks, mobile edge computing, caching, and massive machine-type communications. He is an Associate Editor ofIEEEACCESS.

    av国产久精品久网站免费入址| 成年人免费黄色播放视频 | 亚洲av免费高清在线观看| 日日撸夜夜添| 这个男人来自地球电影免费观看 | 一区二区av电影网| 制服丝袜香蕉在线| 日韩,欧美,国产一区二区三区| 欧美变态另类bdsm刘玥| 建设人人有责人人尽责人人享有的| 大片电影免费在线观看免费| 国产午夜精品久久久久久一区二区三区| 欧美精品人与动牲交sv欧美| 黄色一级大片看看| 午夜影院在线不卡| 国产老妇伦熟女老妇高清| 人人妻人人添人人爽欧美一区卜| 国产一区亚洲一区在线观看| 99久久精品热视频| 亚洲第一区二区三区不卡| 在线观看免费视频网站a站| 久久精品国产亚洲网站| av卡一久久| 国产亚洲欧美精品永久| 只有这里有精品99| 黑丝袜美女国产一区| 国产av一区二区精品久久| 91精品国产九色| 一区二区三区免费毛片| 中文精品一卡2卡3卡4更新| 国产亚洲5aaaaa淫片| 久久久久久久久久久免费av| 黄色欧美视频在线观看| 国产精品久久久久久精品古装| 美女福利国产在线| 高清av免费在线| 3wmmmm亚洲av在线观看| 日本-黄色视频高清免费观看| 天堂8中文在线网| 久久久久久久精品精品| 少妇人妻久久综合中文| 日韩人妻高清精品专区| 女人久久www免费人成看片| 日韩一区二区视频免费看| 婷婷色av中文字幕| 亚洲欧美清纯卡通| 国产高清国产精品国产三级| 国产黄色免费在线视频| 亚洲无线观看免费| 精品人妻一区二区三区麻豆| 少妇人妻精品综合一区二区| 一二三四中文在线观看免费高清| 欧美精品国产亚洲| 久久国产乱子免费精品| 寂寞人妻少妇视频99o| 免费观看av网站的网址| 亚洲av日韩在线播放| 国产精品一区二区三区四区免费观看| 亚洲国产精品国产精品| 黄色视频在线播放观看不卡| 男男h啪啪无遮挡| 免费观看性生交大片5| 免费不卡的大黄色大毛片视频在线观看| 久久99精品国语久久久| 这个男人来自地球电影免费观看 | 亚洲天堂av无毛| 一级av片app| 成年人午夜在线观看视频| 一本久久精品| 一区二区三区四区激情视频| 亚洲av福利一区| 美女主播在线视频| 日日啪夜夜撸| 高清午夜精品一区二区三区| 成人亚洲欧美一区二区av| 国产探花极品一区二区| 亚洲av在线观看美女高潮| 精品一区二区三区视频在线| 免费观看无遮挡的男女| 91久久精品国产一区二区三区| 69精品国产乱码久久久| 一级,二级,三级黄色视频| 黄色日韩在线| 中国美白少妇内射xxxbb| 欧美精品高潮呻吟av久久| 晚上一个人看的免费电影| 国产黄色视频一区二区在线观看| 王馨瑶露胸无遮挡在线观看| 亚洲av电影在线观看一区二区三区| 各种免费的搞黄视频| 观看av在线不卡| 男女边摸边吃奶| 亚洲电影在线观看av| 大香蕉久久网| 中文资源天堂在线| 日韩视频在线欧美| 十八禁高潮呻吟视频 | 国产熟女欧美一区二区| 两个人免费观看高清视频 | 五月开心婷婷网| 内射极品少妇av片p| 亚洲图色成人| 久久国产精品男人的天堂亚洲 | 国产黄色免费在线视频| 日韩熟女老妇一区二区性免费视频| 国产成人一区二区在线| 国产午夜精品一二区理论片| 国产色爽女视频免费观看| 中文字幕制服av| 免费在线观看成人毛片| 欧美xxxx性猛交bbbb| 日本午夜av视频| 亚洲真实伦在线观看| 亚洲av欧美aⅴ国产| 波野结衣二区三区在线| 色5月婷婷丁香| 18+在线观看网站| 久久这里有精品视频免费| 中文在线观看免费www的网站| 久久99热6这里只有精品| 国产美女午夜福利| 成年人午夜在线观看视频| 婷婷色综合www| 精品国产国语对白av| 日日摸夜夜添夜夜爱| 99九九线精品视频在线观看视频| 九色成人免费人妻av| 亚洲自偷自拍三级| www.色视频.com| 日韩不卡一区二区三区视频在线| 亚洲天堂av无毛| 国产午夜精品久久久久久一区二区三区| 男女边摸边吃奶| 午夜福利网站1000一区二区三区| 久久人妻熟女aⅴ| 国产av码专区亚洲av| 欧美最新免费一区二区三区| 国产成人freesex在线| 日日摸夜夜添夜夜添av毛片| 99久久精品一区二区三区| 欧美精品高潮呻吟av久久| 国产亚洲av片在线观看秒播厂| 国产精品人妻久久久久久| 欧美激情国产日韩精品一区| 伦精品一区二区三区| 午夜免费观看性视频| av视频免费观看在线观看| 一个人看视频在线观看www免费| 日本免费在线观看一区| 日日啪夜夜撸| 国产一区二区在线观看av| 有码 亚洲区| 国产精品人妻久久久影院| 大片电影免费在线观看免费| 成人特级av手机在线观看| 91精品伊人久久大香线蕉| 在现免费观看毛片| 曰老女人黄片| 亚洲国产精品成人久久小说| av不卡在线播放| 亚洲人与动物交配视频| 97精品久久久久久久久久精品| 亚洲国产成人一精品久久久| 午夜影院在线不卡| 又黄又爽又刺激的免费视频.| 在线观看人妻少妇| 一级爰片在线观看| 国产免费又黄又爽又色| 免费人成在线观看视频色| 国产淫语在线视频| 亚洲丝袜综合中文字幕| 久热这里只有精品99| 赤兔流量卡办理| 人人妻人人看人人澡| 亚洲国产精品999| 高清视频免费观看一区二区| 免费看光身美女| 成人免费观看视频高清| 亚洲av二区三区四区| 人人妻人人澡人人爽人人夜夜| 人人妻人人澡人人爽人人夜夜| 99精国产麻豆久久婷婷| 在线天堂最新版资源| 亚洲av日韩在线播放| 中文天堂在线官网| 这个男人来自地球电影免费观看 | 美女内射精品一级片tv| 一级毛片我不卡| 国产精品熟女久久久久浪| 久久久久网色| 国产精品99久久99久久久不卡 | 黄片无遮挡物在线观看| 国产精品一区二区性色av| 午夜免费男女啪啪视频观看| 久久久精品免费免费高清| 国产一区有黄有色的免费视频| 内射极品少妇av片p| 久久99一区二区三区| 精品国产一区二区久久| 18禁在线播放成人免费| 青青草视频在线视频观看| 国产日韩一区二区三区精品不卡 | 久久久亚洲精品成人影院| 亚洲精品久久久久久婷婷小说| 亚洲真实伦在线观看| 国产成人免费观看mmmm| 亚洲,欧美,日韩| 亚洲在久久综合| 纵有疾风起免费观看全集完整版| 国产极品粉嫩免费观看在线 | 日韩欧美一区视频在线观看 | 菩萨蛮人人尽说江南好唐韦庄| 日韩中文字幕视频在线看片| 成人特级av手机在线观看| 午夜免费鲁丝| 欧美日韩国产mv在线观看视频| 五月天丁香电影| 国产乱来视频区| 免费看日本二区| 中文字幕人妻熟人妻熟丝袜美| 黄色欧美视频在线观看| 国产一区二区三区综合在线观看 | 丰满迷人的少妇在线观看| 欧美 亚洲 国产 日韩一| 妹子高潮喷水视频| 日韩一区二区视频免费看| 欧美日韩综合久久久久久| 久久精品国产自在天天线| 99久久中文字幕三级久久日本| 国产一区二区在线观看日韩| 最近最新中文字幕免费大全7| 免费大片18禁| 曰老女人黄片| 国产欧美日韩一区二区三区在线 | 中文字幕制服av| 国产乱人偷精品视频| 久久婷婷青草| 日本-黄色视频高清免费观看| 亚洲精品视频女| 精品久久久久久电影网| 少妇裸体淫交视频免费看高清| av不卡在线播放| 在线免费观看不下载黄p国产| 纯流量卡能插随身wifi吗| 一个人免费看片子| 中文资源天堂在线| 精品国产一区二区三区久久久樱花| 久久热精品热| 99热国产这里只有精品6| 亚洲自偷自拍三级| 人人妻人人添人人爽欧美一区卜| 午夜福利影视在线免费观看| 97精品久久久久久久久久精品| 熟妇人妻不卡中文字幕| av专区在线播放| 黄色配什么色好看| 亚洲国产精品一区二区三区在线| 国产真实伦视频高清在线观看| 色婷婷av一区二区三区视频| 国产亚洲最大av| 99九九在线精品视频 | 你懂的网址亚洲精品在线观看| 2022亚洲国产成人精品| 亚洲美女视频黄频| 一级毛片电影观看| 亚洲婷婷狠狠爱综合网| 国产亚洲一区二区精品| 精品99又大又爽又粗少妇毛片| 亚洲无线观看免费| 两个人的视频大全免费| 国产成人免费观看mmmm| 国模一区二区三区四区视频| 中文字幕免费在线视频6| 不卡视频在线观看欧美| 久久99精品国语久久久| 一级片'在线观看视频| 黄色怎么调成土黄色| 国产免费视频播放在线视频| 天堂俺去俺来也www色官网| 大又大粗又爽又黄少妇毛片口| 全区人妻精品视频| 国产真实伦视频高清在线观看| 亚州av有码| 能在线免费看毛片的网站| 免费看av在线观看网站| 久久久a久久爽久久v久久| 国产精品不卡视频一区二区| 2022亚洲国产成人精品| 精品一区在线观看国产| 亚洲精品日本国产第一区| 自线自在国产av| 精品视频人人做人人爽| 女性生殖器流出的白浆| 男女啪啪激烈高潮av片| 色婷婷av一区二区三区视频| 久久人人爽av亚洲精品天堂| 在线 av 中文字幕| 老熟女久久久| 亚洲无线观看免费| 日本黄大片高清| 国产欧美日韩综合在线一区二区 | 亚洲,一卡二卡三卡| 午夜激情福利司机影院| 亚洲国产毛片av蜜桃av| 看免费成人av毛片| 国产黄色免费在线视频| av又黄又爽大尺度在线免费看| 一二三四中文在线观看免费高清| 亚洲人与动物交配视频| 少妇精品久久久久久久| 国产白丝娇喘喷水9色精品| 亚洲真实伦在线观看| 九色成人免费人妻av| 一级毛片我不卡| 国产欧美日韩一区二区三区在线 | 少妇被粗大猛烈的视频| 九色成人免费人妻av| 最后的刺客免费高清国语| 晚上一个人看的免费电影| 18+在线观看网站| 国产免费一级a男人的天堂| 精品一区二区免费观看| 国产高清有码在线观看视频| 久久精品国产亚洲网站| 美女中出高潮动态图| 在线看a的网站| 免费不卡的大黄色大毛片视频在线观看| 18禁在线播放成人免费| 精品一区二区三区视频在线| h视频一区二区三区| 亚洲激情五月婷婷啪啪| 91久久精品国产一区二区三区| 韩国av在线不卡| 欧美+日韩+精品| 久久精品国产自在天天线| 91久久精品国产一区二区成人| 少妇人妻精品综合一区二区| 久久久a久久爽久久v久久| 精品国产一区二区三区久久久樱花| 亚洲国产精品专区欧美| 最近手机中文字幕大全| 久久久a久久爽久久v久久| 成人亚洲精品一区在线观看| 2022亚洲国产成人精品| 国产日韩一区二区三区精品不卡 | 日本色播在线视频| 嫩草影院新地址| 亚洲精品乱码久久久v下载方式| 成人亚洲欧美一区二区av| 看非洲黑人一级黄片| 亚洲精品久久午夜乱码| 乱系列少妇在线播放| 亚洲三级黄色毛片| 黄片无遮挡物在线观看| 午夜激情久久久久久久| 视频中文字幕在线观看| 国产美女午夜福利| 亚洲三级黄色毛片| 亚洲av日韩在线播放| 亚洲自偷自拍三级| 高清欧美精品videossex| 伊人久久国产一区二区| 亚洲中文av在线| 欧美bdsm另类| 啦啦啦视频在线资源免费观看| 成人二区视频| 亚洲在久久综合| 亚洲精品日韩av片在线观看| 少妇裸体淫交视频免费看高清| 久久99热6这里只有精品| 亚洲精华国产精华液的使用体验| 交换朋友夫妻互换小说| 成人特级av手机在线观看| 亚洲婷婷狠狠爱综合网| 天堂俺去俺来也www色官网| 午夜免费男女啪啪视频观看| 午夜av观看不卡| 久久韩国三级中文字幕| 欧美精品高潮呻吟av久久| 91午夜精品亚洲一区二区三区| 9色porny在线观看| 乱人伦中国视频| 99re6热这里在线精品视频| 伦理电影大哥的女人| 亚洲精品,欧美精品| 啦啦啦视频在线资源免费观看| 十八禁高潮呻吟视频 | 国产精品免费大片| 成年人午夜在线观看视频| 亚洲丝袜综合中文字幕| 91久久精品电影网| 高清av免费在线| 人妻人人澡人人爽人人| 日韩电影二区| 免费人妻精品一区二区三区视频| 国产免费视频播放在线视频| 久久久久久久大尺度免费视频| 人人妻人人看人人澡| 国产精品偷伦视频观看了| 久久久久久久精品精品| 在线亚洲精品国产二区图片欧美 | 午夜免费观看性视频| 这个男人来自地球电影免费观看 | kizo精华| 欧美日韩视频精品一区| 亚洲欧美日韩卡通动漫| 国产深夜福利视频在线观看| av天堂中文字幕网| 国产欧美另类精品又又久久亚洲欧美| 老司机亚洲免费影院| 久久久精品免费免费高清| 免费高清在线观看视频在线观看| 视频中文字幕在线观看| 成年av动漫网址| 在线天堂最新版资源| 一边亲一边摸免费视频| 在线免费观看不下载黄p国产| 人人妻人人爽人人添夜夜欢视频 | av天堂久久9| 极品教师在线视频| 国产成人一区二区在线| 国产精品成人在线| 国产av国产精品国产| 大又大粗又爽又黄少妇毛片口| 中文欧美无线码| 高清欧美精品videossex| 日日摸夜夜添夜夜添av毛片| 人人妻人人澡人人看| 男人爽女人下面视频在线观看| 麻豆成人av视频| 国产熟女午夜一区二区三区 | av又黄又爽大尺度在线免费看| 乱系列少妇在线播放| 久久久久国产网址| 2018国产大陆天天弄谢| 欧美 日韩 精品 国产| 人体艺术视频欧美日本| 啦啦啦在线观看免费高清www| 九草在线视频观看| 黄色配什么色好看| 亚洲内射少妇av| 蜜桃久久精品国产亚洲av| 欧美精品一区二区大全| 久久精品久久精品一区二区三区| 乱人伦中国视频| 在线看a的网站| 一级毛片久久久久久久久女| 极品教师在线视频| 亚洲经典国产精华液单| 大码成人一级视频| 在线观看www视频免费| 国产有黄有色有爽视频| 2018国产大陆天天弄谢| 国产欧美日韩一区二区三区在线 | 国产日韩欧美在线精品| 美女大奶头黄色视频| 日本爱情动作片www.在线观看| av在线app专区| 亚洲av中文av极速乱| 卡戴珊不雅视频在线播放| 成人综合一区亚洲| 日本与韩国留学比较| 亚洲国产最新在线播放| 秋霞伦理黄片| 亚洲天堂av无毛| 男人和女人高潮做爰伦理| 久久av网站| 色吧在线观看| 建设人人有责人人尽责人人享有的| 人人妻人人澡人人爽人人夜夜| 有码 亚洲区| 久久久久久久国产电影| 纵有疾风起免费观看全集完整版| 综合色丁香网| 免费少妇av软件| 哪个播放器可以免费观看大片| 免费观看的影片在线观看| 亚洲国产精品999| 丰满人妻一区二区三区视频av| 国产精品国产三级国产专区5o| av福利片在线观看| 噜噜噜噜噜久久久久久91| 日日啪夜夜爽| 亚洲av国产av综合av卡| 好男人视频免费观看在线| 国产成人午夜福利电影在线观看| 国产精品秋霞免费鲁丝片| 国产黄色视频一区二区在线观看| 成人免费观看视频高清| 激情五月婷婷亚洲| 高清在线视频一区二区三区| 日产精品乱码卡一卡2卡三| 一级毛片我不卡| 麻豆成人av视频| 国产男人的电影天堂91| 中文字幕亚洲精品专区| 在线观看av片永久免费下载| 久久韩国三级中文字幕| 另类亚洲欧美激情| 七月丁香在线播放| 免费看日本二区| 男的添女的下面高潮视频| 亚洲高清免费不卡视频| 午夜福利,免费看| 日韩中文字幕视频在线看片| 亚洲av不卡在线观看| 日韩人妻高清精品专区| 亚洲欧美清纯卡通| 色94色欧美一区二区| 精品少妇久久久久久888优播| 秋霞伦理黄片| 国产精品人妻久久久影院| 久久精品国产鲁丝片午夜精品| 3wmmmm亚洲av在线观看| 国产69精品久久久久777片| 久久热精品热| 欧美日韩av久久| 大陆偷拍与自拍| 亚洲精品国产色婷婷电影| 亚洲国产毛片av蜜桃av| 日韩不卡一区二区三区视频在线| 丰满饥渴人妻一区二区三| 欧美精品一区二区大全| 一本久久精品| 大香蕉久久网| 夫妻午夜视频| 久久精品国产a三级三级三级| 日韩欧美 国产精品| 我要看黄色一级片免费的| 国产精品一区二区三区四区免费观看| 国产精品一区二区在线不卡| 高清在线视频一区二区三区| 婷婷色综合大香蕉| 啦啦啦啦在线视频资源| 2022亚洲国产成人精品| 黄色视频在线播放观看不卡| 亚洲电影在线观看av| 观看美女的网站| 久久婷婷青草| 亚洲一级一片aⅴ在线观看| 99热这里只有精品一区| 亚洲精品,欧美精品| 国产 精品1| 亚洲欧美一区二区三区黑人 | 亚洲av电影在线观看一区二区三区| 精品一区二区三卡| 女人精品久久久久毛片| 狠狠精品人妻久久久久久综合| 国产亚洲5aaaaa淫片| 国产精品一区www在线观看| 精品熟女少妇av免费看| 久久午夜福利片| 精品酒店卫生间| 9色porny在线观看| 午夜免费男女啪啪视频观看| 高清av免费在线| 在线观看一区二区三区激情| 亚洲国产精品专区欧美| 久久久久久久久久久丰满| 搡女人真爽免费视频火全软件| 婷婷色av中文字幕| av在线观看视频网站免费| 久久久久国产精品人妻一区二区| 交换朋友夫妻互换小说| 女性被躁到高潮视频| 成年美女黄网站色视频大全免费 | 久久韩国三级中文字幕| 国产在线免费精品| 美女福利国产在线| 夫妻性生交免费视频一级片| 久久6这里有精品| 日本黄色日本黄色录像| 黑人高潮一二区| 国产日韩欧美在线精品| 国产男人的电影天堂91| 亚洲丝袜综合中文字幕| 亚洲精品国产色婷婷电影| 蜜桃在线观看..| 9色porny在线观看| 尾随美女入室| 天堂8中文在线网| 国产成人一区二区在线| 亚洲情色 制服丝袜| 国产伦在线观看视频一区| 一区二区三区四区激情视频| 亚洲中文av在线| 黄色毛片三级朝国网站 | 国产亚洲欧美精品永久| 在线观看一区二区三区激情| 日本猛色少妇xxxxx猛交久久| 国产成人午夜福利电影在线观看| 久久ye,这里只有精品| 久久久欧美国产精品| 亚洲情色 制服丝袜| 免费大片黄手机在线观看| 久久6这里有精品| 少妇高潮的动态图| 亚洲欧美日韩卡通动漫| 精品人妻熟女毛片av久久网站| 精品久久国产蜜桃| 国产在线男女| 久久ye,这里只有精品| 91精品一卡2卡3卡4卡| 91久久精品国产一区二区三区| 国产又色又爽无遮挡免| 国产亚洲最大av| 中文资源天堂在线| 天堂8中文在线网| 日韩,欧美,国产一区二区三区| av国产精品久久久久影院| 国产在线视频一区二区| 免费观看无遮挡的男女| 久久女婷五月综合色啪小说| 性色avwww在线观看| 免费观看在线日韩|