• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics

    2020-09-02 03:59:04NingWangandXiaojianLiMemberIEEE
    IEEE/CAA Journal of Automatica Sinica 2020年5期

    Ning Wang and Xiaojian Li, Member, IEEE

    Abstract—This paper investigates the secure synchronization control problem for a class of cyber-physical systems (CPSs) with unknown system matrices and intermittent denial-of-service(DoS) attacks. For the attack free case, an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization, and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation (ARE). For considering the attack cases, it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices. In order to overcome this difficulty, a matrix polynomial replacement method is given and it is shown that, the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold. Finally, two examples are given to illustrate the effectiveness of the proposed approaches.

    I. Introduction

    CYBER-PHYSICAL systems (CPSs) combine physical processes, computational resources, with communication capability [1], which have been studied intensively for their various fields of applications, such as power grid systems in[2], multi-agent systems in [3]–[6] and smart networked systems in [7], [8]. However, CPSs embedded networked control technique are more vulnerable on account of cyber attacks. Therefore, the security of CPSs has recently attracted extensive concern in control field, such as secure state estimation under sparse attacks in [9], [10], secure control and distributed filtering under deception attacks in [11], [12], the resilient control for systems under replay attacks in [13] and the effects of denial-of-service (DoS) attacks on systems in[14]–[19].

    DoS attacks, a kind of common attacks in CPSs, attempt to render some or all components of a control system inaccessible by preventing the information transmission.Some existing studies referred to DoS attacks have been published. For example, the stability analysis for a networked system in the presence of DoS attacks, which is on assumptions about the limited DoS attacks frequency and duration, is given in [14]. In [15]–[19], some resilient control methods for CPSs under DoS attacks, which is used to maximize frequency and duration of DoS attacks under the condition that the close-loop stability is not destroyed [15], are introduced. In order to improve the resilience ability of a system under DoS attacks, the state estimation problem is proposed in [20]–[22]. While, the above results are all for a single system.

    Recently, based on the studies for a single system, the secure synchronization problem of complex networked systems, which results from that the synchronization behavior relying on the information of other nodes will be affected when DoS attacks successfully break down the information transmission channels, has triggered considerable attentions[23]–[26]. For example, for complex dynamical networks(CDNs) under recoverable attacks destroying the network topology, the authors in [24] introduced the attack frequency and the average recovering time to study the secure synchronization problem. In the presence of DoS attacks interrupting the communication channels of each agent in[25], [26], some sufficient conditions about achieving secure consensus of multi-agent systems are derived by using the Lyapunov function approach. However, it should be pointed that the exact system dynamic matrices are required to be known to analyze the stability of a networked system in[14]–[22] or to solve the secure synchronization control problem in [23]–[26].

    In fact, in the absence of DoS attacks, the synchronization problem for the complex networked systems with unknown dynamics has been investigated. To solve optimal synchronization problems of multi-agent systems, a Qlearning method and a model-free off-policy reinforcement learning approach are developed in [27], [28], respectively.Besides, for CDNs of which the couplings are involved in node dynamic equations, the optimal synchronization control problem has been explored in our previous works [29], [30].Nevertheless, the above results [27]–[30] about the complex networked systems with unknown dynamics were all based on the assumption that the networks were attack free. For the case that the CDNs are with unknown dynamics, how to design the secure synchronization control strategy and further to characterize the frequency and duration of DoS attacks under which the stability of synchronization errors is not destroyed, are challenging. Therefore, it is highly desired to study those problems, which motivates the current research.

    In this paper, the secure synchronization control problem is considered for a class of CDNs with unknown dynamics in the presence of intermittent DoS attacks. The main contributions of this paper are summarized as follows.

    1) For the attack cases, the stability analysis of synchronization errors cannot be directly carried out by using the existing Lyapunov function approach due to the presence of unknown system matrices. To overcome this difficulty, a matrix polynomial replacement method is proposed in the paper. More specifically, the unknown system matrices involved in the Lyapunov function are replaced with the known control gain matrices derived by iteratively solving an algebraic Riccati equation (ARE). And based on the replacement method, the decay rates about sleeping and active intervals of DoS attacks are further computed by solving a set of linear matrix inequalities.

    2) According to the obtained decay rates and using the switching technique, the upper bounds of the frequency and duration of DoS attacks, under which the CDNs with unknown dynamics achieve secure synchronization, are given in terms of inequalities.

    This paper is organized as follows. In Section II, some necessary concepts about the graph theory and the attack model are presented. An optimal synchronization control protocol is proposed in Section III. Stability analysis of secure synchronization is given in Section IV. In Section V, two examples of the CDNs are provided. Conclusion is given in Section VI.

    II. Preliminaries and Problem Formulation

    A. Graph Theory

    A directed graph (digraph) G=(V,E) contains a set V=1,2,...,N of vertices and a set E=1,2,...,M of arcs (i,j)leading from the initial vertex i to the terminal vertex j. Each arc (i,j)∈E is associated with a real-valued weight with lij>0, while the ith node and the jth node have no connection with lij=0. Assumed that there is no self loop in the graph.Furthermore, define the Laplacian matrix of a digraph as

    More detailed concepts on the digraph were shown in [31].

    B. System Description

    Consider the CDNs model with N linear nodes given as

    where xi∈Rnand ui∈Rmare the state and the controlled input, respectively. A ∈Rn×nis an unknown matrix and Bi∈Rn×nis the constant invertible matrix. lijare known coupling weights, and Γi∈Rmis the known inner connecting matrix of the ith node.

    Assume the dynamic equation of the leader has the following form

    where z0∈Rnis the leader’s state. The leader can be regarded as a command generator, which generates the desired target trajectory.

    Assumption 1: (A,Bi) is controllable.

    C. Denial-of-Service Attack

    In practice, the state information ximeasured by using sensors is sent to controllers via networked channels. As a kind of common attacks in CPSs, DoS attacks compromise certain or all transmission channels of a control system (see Fig.1), which leads to the unavailability of transmitted information.

    Fig.1. Framework of the CDNs under DoS attacks.

    Due to the energy constraint of adversaries [32], [33], DoS attacks need to terminate attack activities and shift to a sleep period to supply its energy for next attack. That is to say, one adversary launches DoS attacks discontinuously. As mentioned in [14] and [19], {zs}s∈N+ represents the time instant when the sth DoS attack is active. Then

    means the time interval of the sth DoS attack with a length ds∈R+. Thus, for given t>τ, define that

    which denote, during each interval [τ,t], the sets of time instants when the communication is denied or allowed,respectively. Moreover, |Ξ(τ,t)| and |Λ(τ,t)| represent the total lengths of DoS attacks being active and sleeping during the interval [τ,t].

    for k ∈N. Thus, the state information received by controllers is considered as

    with i=0,1,2,...,N. And the information received by actuators is given as

    Similar to [14], there are two assumptions for DoS attacks.Assumption 2 (DoS frequency): There exist constants η ≥0 and τD>0 such that for all t,τ ∈R+

    Assumption 3 (DoS Duration): There exists constant T ≥1 such that for all t,τ ∈R+

    Assumption 2 is inspired by the concept of average dwell time [14] to specify the number of DoS attacks occurring on the interval [τ,t] and Assumption 3 is used to describe the length of the interval over which communication is interrupted. From [14] and [16], it is known that those two assumptions are common for reflecting the constraint energy of DoS attacks.

    Now, the considered problem in this paper is presented as follows.

    Problem 1: The main objective of this paper is to design a secure synchronization control law for the system (1) with unknown system matrices, such that the synchronization errors are asymptotically convergent for both attack-free and attack cases.

    III. The Optimal Synchronization Controller Design Without Attacks

    A. The Optimal Synchronization Control Law

    By using (1) and (2), define the synchronization error eifor the ith node as

    Then the synchronization problem is described as

    The dynamic equation of the synchronization error eihas the following form

    Besides, similar to [30], define the performance function for the ith node (11), which involves the couplings information

    where Qi∈Rn×nand Ri∈Rn×nare symmetric positive weight matrices.

    Theorem 1: For the error dynamics of CDNs (11) with the quadratic performance index (12), a control protocol is an optimal one if and only if it has the following form

    where Piis a symmetric positive matrix and satisfies the following ARE

    Proof: First, one gives the necessity proof of Theorem 1.Based on (12), define the Hamiltonian function for (11) as

    where Piis obtained by solving the ARE (14). According to(17) and the canonical equation shown in [29], one gets the ARE

    Using (16) and (17), it yields the control law (13).Therefore, the necessity is proven.

    The proof process of sufficiency for Theorem 1, which is divided into two steps, is given as follows.

    Step 1: It is necessary to prove that the control law (13)ensures the asymptotical stability of the synchronization errors. That is to say

    According to ARE (14), (19) is rewritten as

    Step 2: Consider the following equation:

    Based on the ARE (14) and the condition (18), the performance index Jiis rewritten as

    B. The Optimal Synchronization Controller Design With Unknown Dynamics

    Consider the optimal controller with the following form

    where

    When all system dynamics are accurately known, the feedback gain Kiis determined by solving the ARE (14).Since (14) is nonlinear in Pi, the solution Picannot be obtained from (14) directly. To overcome this difficulty, an algorithm has been developed in [35] by solving (25)iteratively

    According to (26)–(28), one has the following equation:

    Remark 1: The feedback gain Kiis obtained under the attack free case, and the proposed iterative policy method requires that all the information of states xi, control inputs uiand couplings ωiare available.

    IV. Synchronization Errors of Stability Analysis With Intermittent DoS Attacks

    As shown in [14], there may be a time interval elapsing from the time zs+dsto the time zs+ds+vsat which the state information is successfully sampled and transmitted. And the time interval vs(shown in Fig.2) satisfies

    Fig.2. An example of DoS attacks.

    with ??representing the upper bound on the inter-sampling rate in [14]. Thus the time interval [τ,t) is composed of the following two sub-intervals:

    where Vs=[zs,zs+ds+vs). Specially, for all τ,t ∈R≥0,

    Next, by using the Lyapunov function method and switching technique, the stability of the error systems (11)under DoS attacks will be discussed.

    Note that, to analyze the stability of synchronization errors,the system dynamic matrices are required to be known in[23]–[26]. However, such a requirement cannot be satisfied in this paper, and then these existing methods are no longer applicable. To overcome this difficulty, a matrix polynomial replacement method is proposed based on the ARE (37) and the iterative learning results Piaand Ki. The details are shown as follows.

    Divide the process of stability analysis into two steps.

    By resorting to ARE (37) and the iterative learning results Piaand Kiin (37), one has

    with αi>0. That is to say,

    Therefore, the convergence rate αiof the system (11) can be computed by (41). Before applying the optimal control gain Kito system (1), the matrix Piaand the feedback gain matrix Kiin ARE (37) have been obtained by iteratively solving (30).

    where its derivative satisfies

    with the exponential divergence rates βi>0. That is

    Based on Assumption 4, one has

    which yields the following inequality

    Combining the above analysis results (41) and (47) of the piecewise Lyapunov functions (36) and (42), respectively, the stability of closed-loop system, which switches between stable and unstable subsystems, is established by using the switching technique. The conditions on the frequency and duration of DoS attacks, under which the secure synchronization can be guaranteed, are shown in Theorem 2.

    Theorem 2: For system (11), suppose Assumptions 1–4 hold. Given any positive definite symmetric matrices Riand Qiwith i=1,2,...,N, if there exist positive constants θisuch that the following two inequalities hold

    where αiand βisatisfy (41) and (47), respectively, andμi=max{λmax(Pia)/λmin(Pib),λmax(Pib)/λmin(Pia)}. Then, the optimal control laws (13) ensure that the synchronization errors are convergent under DoS attacks.

    Proof: Consider any time interval [zs,zs+1) that Vibis activated in [zs,zs+ds+vs) and Viais activated in[zs+ds+vs,zs+1). By comparison lemma in [37], one gives

    Similar to [26], there are the following two cases:

    Case 1: If t ∈[zs,zs+ds), n(t0,t)=s ,

    Thus, for ?t ≥t0,

    According to Assumptions 2 and 3, and inequalities (34)and (35), it yields that

    From (48) and (49), it is known that δi>0. Thus the synchronization errors ei, i=1,2,...,N, are convergent exponentially, which implies that limt→∞ei(t)=0.■

    Remark 2: DoS attacks compromise certain or all transmission channels, which is also introduced in [15], [16],[19] and [26]. The case that all transmission channels are interrupted when DoS attacks occur is considered in Theorem 2. This case can also be found in [23] and [26].

    V. Simulation Example

    In this section, two complex dynamical network examples are taken to verify the effectiveness of above methods.

    Example 1: Similar to [7], consider a spring-connected multi-vehicle system (shown in Fig.3) composed of an isolated leader and four slave vehicles. The springs are regarded as the interconnection between two vehicles. In fact,the ith vehicle is modeled as

    Fig.3. Spring-connected multi-vehicle system with four slave vehicles.

    with B=I2, Γ1=0.9I2, Γ2=0.7I2, Γ3=0.9I2, Γ4=I2, Γ5=2I2. Suppose the initial values e1=[?6,?6]T, e2=[?5,?5]T,e3=[?4,?4]T, e4=[?2,?6]Tand e5=[?5,?3]T. Then choose the weighting matrices Q5=12I2.

    Fig.9. Graph structure for the CDNs.

    Similar to Example 1, the simulation process is divided into two steps.

    Step 1: Use the policy iteration method to obtain the solutions Piaand Ki. The initial controller gain is chosen as

    Besides, the other parameters are assumed to be the same as those in Example 1. By utilizing the PI method, the optimal solutions Piaand Kiwith i=1,2,3,4,5 are obtained after 4 iterations. They are given as

    Step 2: Stability analysis of secure synchronization

    According to the analysis results (41) and (47), suppose that the DoS attacks with τD=2 and T =1.2 occur during time interval (0,20), which satisfying the conditions in (48) and(49) in Theorem 2.

    VI. Conclusion

    This paper investigates the secure synchronization control problem for CPSs subject to intermittent DoS attacks. The

    Fig.10. Synchronization errors of nodes 1–5 with unknown system matrix A for the DoS attacks case.

    Fig.11. Control laws of nodes 1–5 with unknown system matrix A for the DoS attacks case.

    considered CPSs are modeled as a class of CDNs with unknown dynamics. First, to deal with the state couplings, a distributed optimal controller is proposed based on our previous works [29]. And the optimal feedback gain matrix is learned by iteratively solving the ARE. Especially, based on the ARE and the iteratively learning results, the decay rates for each node about sleeping and active intervals of DoS attacks, are determined by solving a set of linear matrix inequalities. Moreover, by using the switching technique and the obtained decay rates, the upper bounds of the DoS attacks frequency and duration, under which the synchronization for all nodes is still achieved, have been proposed. Finally, the simulations of two examples verify the effectiveness of the proposed methods.

    欧美xxxx黑人xx丫x性爽| 亚洲精品在线观看二区| 日韩中字成人| 99热全是精品| 国产精品爽爽va在线观看网站| 美女黄网站色视频| 九九热线精品视视频播放| 精品午夜福利在线看| 久久婷婷人人爽人人干人人爱| 亚洲av.av天堂| 婷婷精品国产亚洲av在线| 99久久久亚洲精品蜜臀av| 国产视频一区二区在线看| 全区人妻精品视频| 国产亚洲精品av在线| 国产亚洲精品av在线| 赤兔流量卡办理| 久久精品国产亚洲av涩爱 | 欧美3d第一页| 精品99又大又爽又粗少妇毛片| 男女那种视频在线观看| 亚洲国产精品国产精品| 成人美女网站在线观看视频| 看黄色毛片网站| 久久久久国产网址| 成年女人看的毛片在线观看| 日韩精品青青久久久久久| 一a级毛片在线观看| 黑人高潮一二区| 麻豆国产97在线/欧美| 春色校园在线视频观看| 成年av动漫网址| 中文字幕久久专区| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲精品日韩av片在线观看| 毛片一级片免费看久久久久| 国产aⅴ精品一区二区三区波| 亚洲av五月六月丁香网| 久久精品久久久久久噜噜老黄 | 亚洲熟妇熟女久久| 午夜激情福利司机影院| 国产精品电影一区二区三区| 一进一出抽搐gif免费好疼| 亚洲自偷自拍三级| 国产麻豆成人av免费视频| 欧美潮喷喷水| 老熟妇仑乱视频hdxx| 国产国拍精品亚洲av在线观看| 久久久色成人| 国语自产精品视频在线第100页| 亚洲欧美日韩无卡精品| 综合色丁香网| 男人狂女人下面高潮的视频| h日本视频在线播放| 婷婷六月久久综合丁香| 毛片一级片免费看久久久久| 久久久久久久亚洲中文字幕| 久久热精品热| 国国产精品蜜臀av免费| 午夜激情福利司机影院| 国内精品一区二区在线观看| av免费在线看不卡| 在线免费十八禁| 可以在线观看毛片的网站| 免费在线观看影片大全网站| 激情 狠狠 欧美| 麻豆精品久久久久久蜜桃| 97超碰精品成人国产| 此物有八面人人有两片| 精品免费久久久久久久清纯| 亚洲精品乱码久久久v下载方式| 黄色一级大片看看| 99热网站在线观看| 在现免费观看毛片| 美女被艹到高潮喷水动态| 成人毛片a级毛片在线播放| 国产av不卡久久| 亚洲国产精品成人久久小说 | 国产爱豆传媒在线观看| 狂野欧美激情性xxxx在线观看| 在现免费观看毛片| 精品日产1卡2卡| 久久草成人影院| 99热精品在线国产| 国产精品不卡视频一区二区| 色5月婷婷丁香| 黄色一级大片看看| 日韩一本色道免费dvd| 最新中文字幕久久久久| 日日撸夜夜添| 俄罗斯特黄特色一大片| 亚洲国产精品成人久久小说 | 亚洲不卡免费看| 少妇的逼水好多| 一个人看的www免费观看视频| 国产乱人视频| 亚洲综合色惰| 我要搜黄色片| 一进一出抽搐动态| 乱码一卡2卡4卡精品| 一个人看视频在线观看www免费| 成人高潮视频无遮挡免费网站| 亚洲欧美日韩高清专用| 国产69精品久久久久777片| 色尼玛亚洲综合影院| 啦啦啦韩国在线观看视频| 成人欧美大片| 特级一级黄色大片| 国产精品乱码一区二三区的特点| 精品一区二区三区视频在线观看免费| 色哟哟哟哟哟哟| 成人av一区二区三区在线看| 免费看a级黄色片| 国产精品,欧美在线| 麻豆国产97在线/欧美| 久久久久国内视频| 乱系列少妇在线播放| 色尼玛亚洲综合影院| 91在线观看av| 九九在线视频观看精品| 日本色播在线视频| 国产一区二区在线av高清观看| 毛片一级片免费看久久久久| 99热6这里只有精品| 久久久久精品国产欧美久久久| 国产伦在线观看视频一区| 亚洲一区二区三区色噜噜| 看非洲黑人一级黄片| 欧美精品国产亚洲| 亚洲av第一区精品v没综合| 亚洲一区高清亚洲精品| 婷婷亚洲欧美| 在线免费观看的www视频| 欧美色视频一区免费| 少妇的逼水好多| 91av网一区二区| 欧美成人a在线观看| 国产成人a区在线观看| 久久热精品热| 日本爱情动作片www.在线观看 | 国产精品福利在线免费观看| 一本久久中文字幕| 欧美+日韩+精品| 国产高清激情床上av| 亚洲最大成人手机在线| 伊人久久精品亚洲午夜| 五月玫瑰六月丁香| 蜜桃亚洲精品一区二区三区| 国产成人精品久久久久久| 欧美一区二区国产精品久久精品| 久久精品国产亚洲av天美| 国产成人精品久久久久久| 激情 狠狠 欧美| 精品久久久久久成人av| 又粗又爽又猛毛片免费看| 观看美女的网站| 日本在线视频免费播放| 日韩av不卡免费在线播放| 男女之事视频高清在线观看| 乱码一卡2卡4卡精品| 男女啪啪激烈高潮av片| 亚洲高清免费不卡视频| 精品国内亚洲2022精品成人| 成人国产麻豆网| 午夜精品在线福利| 国产精品一区二区三区四区免费观看 | 免费看美女性在线毛片视频| 99久国产av精品| 成人精品一区二区免费| 国产高清激情床上av| 观看美女的网站| 国产单亲对白刺激| 1000部很黄的大片| 色播亚洲综合网| 日韩成人伦理影院| 久久久久久久久大av| 能在线免费观看的黄片| h日本视频在线播放| 久久精品国产清高在天天线| 夜夜夜夜夜久久久久| 亚洲经典国产精华液单| 综合色av麻豆| 久久久久久久久久久丰满| 国产精品久久久久久久电影| а√天堂www在线а√下载| 老师上课跳d突然被开到最大视频| 91午夜精品亚洲一区二区三区| 69人妻影院| 国产大屁股一区二区在线视频| 日本免费一区二区三区高清不卡| 日日摸夜夜添夜夜爱| 午夜精品一区二区三区免费看| 欧美日本亚洲视频在线播放| 久久久久九九精品影院| 黄色一级大片看看| 一级毛片电影观看 | 99国产精品一区二区蜜桃av| 久久久久久久久中文| 精品久久久久久久久亚洲| 亚洲四区av| 91狼人影院| 国产私拍福利视频在线观看| 老司机福利观看| 悠悠久久av| 日日摸夜夜添夜夜爱| 99热精品在线国产| 欧美bdsm另类| 乱系列少妇在线播放| 国产精品一区二区三区四区免费观看 | 成熟少妇高潮喷水视频| 欧美日韩综合久久久久久| 色综合亚洲欧美另类图片| 欧美+日韩+精品| 国产精品乱码一区二三区的特点| av天堂在线播放| 狂野欧美激情性xxxx在线观看| 高清毛片免费观看视频网站| 特大巨黑吊av在线直播| 中文资源天堂在线| 日韩人妻高清精品专区| АⅤ资源中文在线天堂| 免费观看的影片在线观看| 成人美女网站在线观看视频| av在线蜜桃| 国产精品免费一区二区三区在线| 日韩高清综合在线| 欧美高清性xxxxhd video| 熟妇人妻久久中文字幕3abv| 九九在线视频观看精品| 在线免费观看的www视频| 日本欧美国产在线视频| 黄色欧美视频在线观看| 亚洲精品亚洲一区二区| 久久九九热精品免费| 人妻制服诱惑在线中文字幕| 淫秽高清视频在线观看| 久久久精品大字幕| 九九久久精品国产亚洲av麻豆| 51国产日韩欧美| 一级黄色大片毛片| 一区二区三区四区激情视频 | 又黄又爽又免费观看的视频| 国产精品爽爽va在线观看网站| 乱码一卡2卡4卡精品| 少妇人妻一区二区三区视频| 美女 人体艺术 gogo| 国产高清不卡午夜福利| 日本免费a在线| 亚洲欧美日韩高清在线视频| 日日撸夜夜添| 特大巨黑吊av在线直播| 亚洲欧美日韩无卡精品| 久久精品国产亚洲网站| 天天躁夜夜躁狠狠久久av| 中国美女看黄片| 欧美+日韩+精品| 亚洲内射少妇av| 久久精品国产亚洲av天美| 午夜影院日韩av| 99在线视频只有这里精品首页| 亚洲最大成人中文| 欧美性感艳星| 美女被艹到高潮喷水动态| 色综合亚洲欧美另类图片| 免费看av在线观看网站| 蜜臀久久99精品久久宅男| 99久国产av精品国产电影| 国产毛片a区久久久久| 成人特级av手机在线观看| 日韩欧美国产在线观看| 男女做爰动态图高潮gif福利片| 成年免费大片在线观看| 亚洲精品日韩在线中文字幕 | 黄色欧美视频在线观看| 日韩欧美三级三区| 天堂影院成人在线观看| 男女做爰动态图高潮gif福利片| 国产69精品久久久久777片| 成人毛片a级毛片在线播放| 在线观看午夜福利视频| av天堂中文字幕网| 男女视频在线观看网站免费| 内射极品少妇av片p| 97在线视频观看| 久久久久久久亚洲中文字幕| 色吧在线观看| 久久久久久久久久久丰满| 亚洲精品日韩av片在线观看| 欧美中文日本在线观看视频| 色在线成人网| 免费在线观看成人毛片| 久久久午夜欧美精品| 99久国产av精品国产电影| 亚洲经典国产精华液单| 毛片一级片免费看久久久久| 亚洲色图av天堂| 国产精品精品国产色婷婷| 免费人成在线观看视频色| 精品乱码久久久久久99久播| 99久久成人亚洲精品观看| 3wmmmm亚洲av在线观看| 人妻久久中文字幕网| 国产av在哪里看| 国产精品美女特级片免费视频播放器| 91久久精品电影网| 乱系列少妇在线播放| 亚洲欧美精品自产自拍| 亚洲av免费高清在线观看| 免费av不卡在线播放| 两个人视频免费观看高清| 久久久久免费精品人妻一区二区| 99九九线精品视频在线观看视频| 欧美日本视频| 床上黄色一级片| 真实男女啪啪啪动态图| 亚洲一级一片aⅴ在线观看| 精品99又大又爽又粗少妇毛片| 亚洲欧美日韩无卡精品| 国产精品伦人一区二区| 亚洲国产精品sss在线观看| 麻豆乱淫一区二区| 最好的美女福利视频网| 亚洲一区高清亚洲精品| 精品人妻视频免费看| 亚洲国产色片| 白带黄色成豆腐渣| 国产欧美日韩精品亚洲av| 亚洲自偷自拍三级| 日本精品一区二区三区蜜桃| 欧美中文日本在线观看视频| 国产极品精品免费视频能看的| 国产一区二区激情短视频| 免费一级毛片在线播放高清视频| 国产高清视频在线播放一区| 日韩av在线大香蕉| 国产高清三级在线| 97碰自拍视频| 99国产精品一区二区蜜桃av| 天堂网av新在线| 自拍偷自拍亚洲精品老妇| 六月丁香七月| 日韩大尺度精品在线看网址| 色在线成人网| 欧美色视频一区免费| 大香蕉久久网| 女生性感内裤真人,穿戴方法视频| 亚洲不卡免费看| 国产精品久久久久久亚洲av鲁大| 69人妻影院| av黄色大香蕉| ponron亚洲| 岛国在线免费视频观看| 国产色爽女视频免费观看| 日韩av不卡免费在线播放| 久久6这里有精品| 免费观看精品视频网站| 2021天堂中文幕一二区在线观| 夜夜爽天天搞| 亚洲精华国产精华液的使用体验 | 国产精品福利在线免费观看| 一本久久中文字幕| 免费观看精品视频网站| 赤兔流量卡办理| 欧美另类亚洲清纯唯美| 国产精品福利在线免费观看| 最近的中文字幕免费完整| 身体一侧抽搐| 高清毛片免费观看视频网站| 97超碰精品成人国产| 91麻豆精品激情在线观看国产| 国产69精品久久久久777片| 午夜福利在线观看免费完整高清在 | 最好的美女福利视频网| 男插女下体视频免费在线播放| 亚洲欧美日韩东京热| 99九九线精品视频在线观看视频| 日韩一区二区视频免费看| 欧美bdsm另类| 51国产日韩欧美| 又爽又黄a免费视频| 国产高清不卡午夜福利| а√天堂www在线а√下载| 一进一出抽搐动态| 中文字幕免费在线视频6| 又粗又爽又猛毛片免费看| 一级毛片我不卡| 国语自产精品视频在线第100页| 欧美一区二区亚洲| 成人美女网站在线观看视频| 看非洲黑人一级黄片| 在线免费观看不下载黄p国产| av专区在线播放| 赤兔流量卡办理| 最好的美女福利视频网| 夜夜爽天天搞| 国产精品电影一区二区三区| avwww免费| 99热全是精品| 国产成人精品久久久久久| 日韩av在线大香蕉| 少妇的逼水好多| 国产精品久久久久久精品电影| 成年免费大片在线观看| 人妻夜夜爽99麻豆av| 精品久久久久久久末码| 一个人看视频在线观看www免费| 久久精品综合一区二区三区| 日本三级黄在线观看| 国产乱人视频| 69av精品久久久久久| 99久久精品一区二区三区| 久久精品久久久久久噜噜老黄 | 精品人妻偷拍中文字幕| 久久午夜福利片| 国产成人一区二区在线| 在线免费观看的www视频| 午夜精品国产一区二区电影 | 欧洲精品卡2卡3卡4卡5卡区| 人人妻,人人澡人人爽秒播| 一本久久中文字幕| 黄色一级大片看看| 18禁在线播放成人免费| 国产精品野战在线观看| 亚州av有码| 欧洲精品卡2卡3卡4卡5卡区| 午夜福利在线观看免费完整高清在 | 能在线免费观看的黄片| 日本熟妇午夜| 精品久久久久久久久av| 级片在线观看| 久久精品夜夜夜夜夜久久蜜豆| 中出人妻视频一区二区| 亚洲精品亚洲一区二区| 最近在线观看免费完整版| 看十八女毛片水多多多| 日本爱情动作片www.在线观看 | 欧美日韩乱码在线| 联通29元200g的流量卡| 国产成人91sexporn| 国产精品一二三区在线看| 熟女电影av网| 两个人视频免费观看高清| 久久久久久久久中文| 国产精品国产三级国产av玫瑰| 最新在线观看一区二区三区| 欧美一区二区精品小视频在线| 成人无遮挡网站| 亚洲最大成人中文| 噜噜噜噜噜久久久久久91| 亚洲欧美日韩高清在线视频| 成人国产麻豆网| 久久精品夜夜夜夜夜久久蜜豆| 久久久久久大精品| 欧美日韩国产亚洲二区| 欧美xxxx黑人xx丫x性爽| 免费观看在线日韩| 好男人在线观看高清免费视频| 亚洲精品亚洲一区二区| 成熟少妇高潮喷水视频| 亚州av有码| 人人妻人人看人人澡| 嫩草影院新地址| 女同久久另类99精品国产91| 成人性生交大片免费视频hd| 国产 一区精品| 又爽又黄a免费视频| 亚洲熟妇熟女久久| 精品少妇黑人巨大在线播放 | 国产欧美日韩精品亚洲av| 欧美高清成人免费视频www| 18禁在线播放成人免费| 三级男女做爰猛烈吃奶摸视频| 99在线视频只有这里精品首页| 久久欧美精品欧美久久欧美| 蜜桃久久精品国产亚洲av| 亚洲18禁久久av| 亚洲精华国产精华液的使用体验 | 色av中文字幕| 天堂动漫精品| 成人永久免费在线观看视频| videossex国产| 成人毛片a级毛片在线播放| 最新在线观看一区二区三区| 日日撸夜夜添| 97超碰精品成人国产| 久久韩国三级中文字幕| 两个人的视频大全免费| 男人狂女人下面高潮的视频| 美女黄网站色视频| 日韩成人伦理影院| 日韩欧美精品免费久久| 国产精品久久久久久亚洲av鲁大| 亚洲不卡免费看| 亚洲内射少妇av| 熟妇人妻久久中文字幕3abv| 免费观看的影片在线观看| 亚洲精品在线观看二区| 欧美国产日韩亚洲一区| 一级毛片电影观看 | 九九爱精品视频在线观看| 免费高清视频大片| 伊人久久精品亚洲午夜| 国产亚洲精品久久久com| 亚洲av中文av极速乱| 免费黄网站久久成人精品| 国产av不卡久久| 国产探花极品一区二区| 日本欧美国产在线视频| 无遮挡黄片免费观看| 日韩欧美国产在线观看| 激情 狠狠 欧美| 国产高清不卡午夜福利| 99热全是精品| 久久久久久久久大av| 久久久欧美国产精品| 嫩草影院入口| 97碰自拍视频| 久久久久精品国产欧美久久久| 久久久精品94久久精品| 亚洲精品一卡2卡三卡4卡5卡| 久99久视频精品免费| 国产不卡一卡二| 99热精品在线国产| 欧美激情在线99| 国产高清视频在线播放一区| 一卡2卡三卡四卡精品乱码亚洲| 国产亚洲91精品色在线| 久久久久国产网址| 午夜爱爱视频在线播放| 国内揄拍国产精品人妻在线| 成人欧美大片| 毛片一级片免费看久久久久| 国产三级中文精品| 国产av一区在线观看免费| 日韩强制内射视频| 国产精品亚洲一级av第二区| 国产精品一二三区在线看| 99久久中文字幕三级久久日本| 欧美日本视频| 禁无遮挡网站| 美女大奶头视频| 中文字幕久久专区| 欧美在线一区亚洲| 男女啪啪激烈高潮av片| 亚洲国产精品国产精品| 成人漫画全彩无遮挡| 全区人妻精品视频| 一级av片app| 亚洲熟妇中文字幕五十中出| 又黄又爽又免费观看的视频| 可以在线观看的亚洲视频| 一区福利在线观看| 波多野结衣巨乳人妻| 国产精品久久视频播放| 久久欧美精品欧美久久欧美| 国产大屁股一区二区在线视频| 深爱激情五月婷婷| 不卡一级毛片| 校园春色视频在线观看| 亚洲无线在线观看| 国产熟女欧美一区二区| 久久精品国产99精品国产亚洲性色| 日本精品一区二区三区蜜桃| 又黄又爽又免费观看的视频| 国产麻豆成人av免费视频| www.色视频.com| 日韩在线高清观看一区二区三区| 最近手机中文字幕大全| 国产一区二区三区av在线 | 老熟妇仑乱视频hdxx| 亚洲不卡免费看| 嫩草影院精品99| 日本-黄色视频高清免费观看| 成人鲁丝片一二三区免费| 亚洲av成人av| 婷婷精品国产亚洲av| 免费在线观看成人毛片| 亚洲av免费在线观看| 人妻制服诱惑在线中文字幕| 国产黄色视频一区二区在线观看 | 一级a爱片免费观看的视频| 午夜精品一区二区三区免费看| 丝袜美腿在线中文| 日韩精品青青久久久久久| 一本精品99久久精品77| 亚洲av第一区精品v没综合| 国内少妇人妻偷人精品xxx网站| 亚洲国产精品国产精品| 综合色丁香网| 成人av一区二区三区在线看| 久久久久久久久久久丰满| 超碰av人人做人人爽久久| 免费在线观看影片大全网站| 久久精品国产亚洲av天美| 国产精品女同一区二区软件| 12—13女人毛片做爰片一| 亚洲不卡免费看| 久久综合国产亚洲精品| 国产高潮美女av| 久久久久精品国产欧美久久久| 一个人免费在线观看电影| 日韩人妻高清精品专区| 久久人妻av系列| 岛国在线免费视频观看| 国产精品久久久久久亚洲av鲁大| 精品一区二区三区av网在线观看| 免费搜索国产男女视频| av天堂在线播放| 免费观看精品视频网站| 一边摸一边抽搐一进一小说| av国产免费在线观看| 国产精品人妻久久久久久| 男插女下体视频免费在线播放| 在线观看一区二区三区| 搡老熟女国产l中国老女人|