• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Physical Safety and Cyber Security Analysis of Multi-Agent Systems:A Survey of Recent Advances

    2021-04-22 03:54:26DanZhangIEEESeniorMemberGangFengIEEEFellowYangShiIEEEFellowandDiptiSrinivasanIEEEFellow
    IEEE/CAA Journal of Automatica Sinica 2021年2期

    Dan Zhang, IEEE Senior Member, Gang Feng, IEEE Fellow, Yang Shi, IEEE Fellow, and Dipti Srinivasan, IEEE Fellow

    Abstract—Multi-agent systems (MASs) are typically composed of multiple smart entities with independent sensing,communication, computing, and decision-making capabilities.Nowadays, MASs have a wide range of applications in smart grids, smart manufacturing, sensor networks, and intelligent transportation systems. Control of the MASs are often coordinated through information interaction among agents,which is one of the most important factors affecting coordination and cooperation performance. However, unexpected physical faults and cyber attacks on a single agent may spread to other agents via information interaction very quickly, and thus could lead to severe degradation of the whole system performance and even destruction of MASs. This paper is concerned with the safety/security analysis and synthesis of MASs arising from physical faults and cyber attacks, and our goal is to present a comprehensive survey on recent results on fault estimation,detection, diagnosis and fault-tolerant control of MASs, and cyber attack detection and secure control of MASs subject to two typical cyber attacks. Finally, the paper concludes with some potential future research topics on the security issues of MASs.

    I. INTRODUCTION

    WITH rapid development of perception, communication, and computation technologies, distributed cooperative control of multi-agent systems (MASs) has received great attention from scholars in different disciplines due to their wide applications in large-scale process industries,multi-robot systems, intelligent transportation systems, sensor networks, smart grids, and internet systems [1]–[5]. In the field of intelligent transportation systems, as shown in Fig.1,the distributed control framework of networked autonomous vehicles can provide new solutions for the safety and efficiency of transportation systems, and help solve practical problems such as traffic accidents, road congestion, energy conservation, and environmental protection [6]. Compared with traditional single-agent systems, multi-agent systems are more scalable and upgradeable while improving task execution efficiency and robustness due to its inherent ability to learn and make autonomous decisions cooperatively.

    Fig.1. The coordinated vehicles in transportation systems.

    The analysis and synthesis of MASs have been extensively studied in a variety of disciplines including computer science,control engineering, electrical engineering, and civil engineering. Existing survey articles present discussions on communication mechanism of MASs [7], [8], consensus protocol of MASs [9], and communication constraints of MASs [10]. Survey works on MASs in the context of computer sciences are also found in [11]–[14]. However, none of these articles concentrate on the issue of securities of MASs though such a kind of networked systems are fragile to physical faults and cyber attacks [15]. It has been recently revealed in [16] that a small fault or cyber attack on an agent can degrade the performance and even paralyze the whole system. What shall we do when some agents are misbehaving,wait, abandon, or adjust [17]? In [18], the issues of access control and trust/reputation of MASs were addressed for the security of MASs. In [19], fault-tolerant control methods of MASs were surveyed, and the attention was focused on topology reconfiguration methods. Nevertheless, there have been a large volume of works on physical safety and cyber security analysis and synthesis in literature recently, where the issues of fault estimation, detection and diagnosis, faulttolerant control, attack detection, and secure consensus were investigated. These studies provide some systematic perspectives and methodologies for improving security of MASs effectively.

    In this paper, we provide a comprehensive overview of recent advances in the physical safety and cyber security issues of MASs, where the actuator and sensor faults will be discussed in the physical safety analysis part, and the deny-ofservice (DoS) attack and Deception attack will be addressed in the cyber security section. The paper is organized as follows.Section II introduces salient results on the fault estimation of MASs, along with some key analysis methods. Section III addresses fault detection and diagnosis of MASs. Section IV discusses fault-tolerant control of MASs. Section V is concerned with representative cyber attacks in MASs and corresponding attack detection schemes. Section VI presents some recent results on secure control of MASs. Finally,Section VII concludes the article with some potential future research topics. The structure of this paper is depicted in Fig.2.The major differences between the relevant survey papers[18], [19] and our paper are summarized as follows:

    1) Reference [18] is concerned with the access control and reputation of MASs. Instead we focus on the cyber security and physical safety of MASs and deal with the safety and security control problem.

    2) In [19], the fault-tolerant control methods of MASs are surveyed with its attention focused on the topology reconfiguration methods. In contrary, we start with the physical threat and conduct a review on recent results on fault estimation,fault detection, and fault-tolerant control of MASs; Then, we pay attention to the cyber threat issue, and analyze recent advances on two typical attacks, DoS attack and Deception attack.

    3) A more systematic and broader overview on the safety and security of MASs is given, aiming to provide a comprehensive survey on this emerging and challenging research direction.

    II. FAULT ESTIMATION OF MASS

    In the past decades, there has been an increasing demand on safety and reliability of MASs, as a single fault on the sensor or actuator could lead to a significant performance degradation on the whole system and even the failure of the whole system. In [20], the performance of a group of unmmaned autonomous vehicles (UAVs) that are subject to different types of actuator faults was investigated, and it was shown that a consensus can still be achieved if a fault of the partial loss of effectiveness occurs in one actuator of an agent,but the transient performance could be degraded dramatically.The consensus would fail to be achieved when actuators are in complete loss of effectiveness. A good fault estimation scheme is capable of providing the timely and precise information of any faults within the system being monitored.Then the effective defense mechanism can be triggered to eliminate the effect of the fault to the system. In this section,we address the fault estimation problem, but only focus on the model-based fault estimation of MASs. The readers are referred to [21]–[23] for model-free ones. A detailed categorization of physical threats in the study of fault estimation of MASs is given in Table I.

    TABLE I CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULT ESTIMATION OF MASS

    A. Homogeneous MASs

    Online fault estimation of MASs is challenging due to the complex interactions among of MASs. Consider a homogeneous MAS with N agents, and each agent is modeled by the following linear system:matrices. In [24], the following system was introduced:

    It is worth pointing out that the local fault in the i -th agent cannot be estimated by its neighbors in the aforementioned results as only the local state and fault were augmented for estimation. Recently, the distributed fault estimator design for a class of Lipschitz nonlinear MASs was investigated in [32],where a new augmented state vector including the local state fault and the neighboring state fault was constructed. The designed observer therein is capable of providing a good estimation of faults both in local agent and its neighbors. The common limitation is still the computational burden when the augmentation technique is used.

    B. Heterogenous MASs

    It is worth pointing out that all the above studies [24]–[32],[34]–[36] focused on homogeneous MASs. In reality, most of multi-agent systems have different agent dynamics, see,trucks, buses and cars in transportation systems. Therefore,distributed fault estimation of heterogeneous MASs has received increasing attention. For a class of linear discretetime heterogeneous linear MASs, a distributed l1-norm-based optimization method was introduced to estimate the state and fault simultaneously in [33]. It was shown that if and only if the number of faulty agents is smaller than the half of number of agents and the following optimization problem:

    III. FAULT DETECTION AND DIAGNOSIS

    Compared with fault estimation, traditional fault detection and diagnosis is less demanding as it only seeks to trigger an alarm signal when a fault is detected in the system (and then isolate the fault). It has been extensively adopted in many real systems such as power systems [38], mechatronic systems[39], chemical systems [40], etc. We now address the fault detection and diagnosis issue of MASs, and present some recent results in this area. A detailed categorization of physical threats in the study of fault detection and diagnosis of MASs is given in Table II.

    TABLE II CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULT DETECTION AND DIAGNOSIS OF MASS

    A. Homogenous MASs

    Distributed fault detection for a network of second-order linear MASs was studied in [41], where a bank of unknown input observers (UIOs) were designed to detect the fault by regarding the fault as an unknown input. The faulty agent was removed from the network when it was detected by comparing the residual evaluation function with a threshold. The approach presented in [41] was feasible only if a single additive fault was present. Based on the analysis results in[41], distributed fault detection of a networked dynamical system with multiple faults was investigated in [46], where the minimum amount of information required by an agent to detect the faults was revealed. The distributed unknown input observer was also designed in [42] for a class of discrete-time high-order systems. The reduced-order unknown input observer was also applied to the high-order MASs as in [43].It must be pointed out that the matching condition is a direct restriction of those observers, e.g., rank(CE)=rank(E),where C is the output matrix, and E is the weighting matrix of the unknown disturbance.

    In [47], distributed fault detection for general high-order linear MASs was discussed, where the relative output information was used to construct the observer. In [44], the interval observer was proposed for a class of discrete-time MASs such that the lower and upper bounds of state observation were obtained, see the following interval observer designed for the i-th agent:

    Note that most of the above works only address the fault diagnosis including fault estimation, detection, and isolation of physical faults in MASs, the design of control protocols is yet to be further investigated. In the following section, the issue of fault-tolerant control is discussed.

    IV. FAULT-TOLERANT CONTROL

    The main role of fault-tolerant control is to trigger an adjustment control mechanism to deal with the faults when they are detected. Sometimes, the fault-tolerant controller is designed on the basis of the precise fault estimation information. Recent studies on this topic are summarized in this section. A detailed categorization of physical threats in the study of fault-tolerant control of MASs is given in Table III.

    TABLE III CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULTTOLERANT CONTROL OF MASS

    V. CYBER ATTACK DETECTION OF MASS

    We have made a comprehensive survey on physical fault estimation, detection, isolation, and fault-tolerant control of MASs in the previous sections. All those results deal with the physical threats in MASs. With recent development of information technology, the communication networks of MASs are exposed to the general public, with a great risk of being attacked by adversaries. In this article, we only focus on two typical attacks: the deny-of-service (DoS) attack and the Deception attack. A DoS attacker can exhaust the network or system resources of the target agent, causing the service of MASs to be temporarily interrupted, stopped, or crashed. On the other hand, wrong decision may be made when some false data are injected into sensors or actuators. In this case, the man-made fault could occur. The attack detection for networked systems has received increasing attention in past few years as in [71]–[73]. In this section, we focus our attention on the attack detection problem of MASs. A detailed categorization of cyber threats in the study of cyber attack detection of MASs is given in Table IV.

    TABLE IV CATEGORIZATION OF CYBER THREATS IN THE STUDY OF CYBER ATTACK DETECTION OF MASS

    A. Homogeneous MASs

    In [78], the DoS attack detection problem was considered for a network of vehicle systems, and an augmented system including the vehicle state (position, velocity) and controller state was proposed as follows:

    where di(t) is the relative distance between vehicles, vi(t) is the velocity of the i-th vehicle, and ai(t) is the acceleration signal of the i-th vehicle. τ is the unknown delay introduced to describe the duration time that the communication network was occupied by an illegal user. In order to estimate τ, the following sliding mode observer was designed:

    VI. SECURE CONSENSUS OF MASS

    The secure consensus control problem of MASs has been investigated in parallel with the attack detection problem in previous years. The salient results are collected and presented in this section. A detailed categorization of cyber threats in the study of secure consensus of MASs is given in Table V.

    TABLE V A CONCRETE CATEGORIZATION OF CYBER THREATS IN THE STUDY OF SECURE CONSENSUS OF MASS

    A. Homogeneous MASs

    Some other researchers studied the DoS effect on MASs from the Markovian jumping system point of view. For example, the secure consensus of linear MASs with random attack was studied in [90], where the attack was driven by a Markov process. A state feedback secure consensus protocol consisting of two controllers was proposed for different time intervals, where one controller was designed for the MAS subject to attacks and the other one was designed for the normal MAS without attacks, i.e.,

    where λ(t) is a switching signal obeying the Markov transition process. α and β are the coupling strengths for the MASs without attack and with attack, respectively. K and H are the two controller gains that were determined based on the solution of an algebraic Riccati equation and an algebraic Riccati inequality, respectively, i.e., K=R?1BTP and H=T?1BTS with

    where δ>0 is any given scalar, and P,R,S, and T are positive definite matrices.

    The similar analysis method was later extended to the observer-based control protocol in [91]. However, the attack distribution information must be known a prior for consensus protocol design, which may not be an easy task due to the fact that the adversaries would try to hide their attack strategies.On the other hand, the adversaries may inject some false data into the packet to mislead the agent as the price of launching the DoS attack may be very high. Now, we pay our attention to the case of Deception attack. The recent advances are summarized in the following.

    B. Heterogeneous MASs

    The secure output consensus of heterogeneous MASs with aperiodic sampling and DoS attack was studied in our earlier work [92], where the input-hold mechanism was adopted when DoS attack occurs. In our work [102], both of the communication channels of agent-satellite and agent-agent were broken when attack occurs. By introducing a piece-wise signal to describe the nonuniform sampling phenomenon, a stochastic variable to characterize the occurrence of the attack and the time-delay term to model the attack duration, a stochastic switched-time delay system was derived that is capable of modeling the MASs subject to nonuniform sampling and random DoS attack. With the help of Lyapunov stability theory, some sufficient conditions were proposed such that the output consensus error system was guaranteed to be exponentially stable in the mean-square sense and achieved a prescribed H∞performance level. Some matrix manipulation techniques were also introduced to derive the controller gain matrices. Note that the secure control protocol design was based on the precise attack probability, which is a limitation in reality. Recently, a new switched system approach was proposed for the secure consensus of heterogeneous MASs with DoS attack in [93], where a piecewise switching signal indicating different attack duration was proposed to characterize the attack strategy variation, i.e., the local position signal can be modeled as

    where d(k)∈{0,1,2,...,N} is a switching signal indicating the different attack durations. The similar modeling method was also adopted for the communication interaction of agent i and its neighbors. In this case, the attack probability is not involved in the system modeling and analysis. A major limitation is that the adversary could jam all the communication channels, while in reality the adversary may only have the ability to jam a few channels as the system size is usually large.

    Recently, the Markovian jumping system approach was proposed to model the partially unknown and uncertain attack in secure consensus of heterogenous MASs in [103], where the agents are communicating with each other periodically when there is no attack. A nonuniform sampled-data system was introduced when the attack occurs, the attack duration and probability are transformed into the number of sampling periods and transition probability of Markovian jumping system, respectively by assuming that the attack strategy follows a Markov chain as in [90].

    As for the Deception attacks, the research on secure consensus of heterogeneous MASs is yet to be reported.Compared with the results on secure consensus of homogeneous systems, the regulator equation [104] is usually necessary to derive the consensus protocols, see, e.g., [92],[93], [103].

    VII. CONCLUSIONS AND FUTURE WORK

    We have presented an overview of recent advances on the physical safety and cyber security issues of MASs in this paper. In particular, we have presented the results on physical fault estimation, detection and diagnosis, fault-tolerant control, cyber attack detection, and secure control under two typical kinds of attacks: the DoS attack and the Deception attack. Although many significant results have been reported on the security issue of MASs from various perspectives, the increasing complex security situation and higher security demand have brought many new challenges to the protection of MASs. Some potential research directions are recommended as follows.

    A. Consensus With Sophisticated Attacks

    In most of existing works, usually only one attack phenomenon is studied, i.e., the DoS attack and the Deception attack were usually investigated separately. A sole attack behavior may be easier to be detected and eliminated by a well designed detection system. In order to avoid being detected, the adversary would try to launch more sophisticated attacks such as a combination of the DoS attacks, Deception attacks, Replay attacks [105], Stealth attack [106] etc. In this scenario, how can we design the secure consensus protocol?The main challenge is that it is usually hard to precisely capture the dynamic behavior of adversaries precisely.Furthermore, with the rapid development of artificial intelligence, some well designed attacks may have the learning ability to evolve and mutate to avoid being detected[107]. Modeling of such a sophisticated attack is a difficult task [108]. This may be one of the potential reasons that very few works on secure consensus of heterogeneous MASs with Deception attack have been reported, not to mention a more sophisticated attack. A possible method to deal with those sophisticated attacks is from the game-theory perspective,which has been shown to be effective in dealing with the attacks in smart grids [109], [110]. Note that it is possible to design a perfect defense system only when the attacker’s dynamic behavior can be predicted and modeled accurately.Thus, the security analysis of MASs subject to more sophisticated attacks deserves further research attention as it is the first stage to deal with attacks.

    B. Consensus With Physical and Cyber Securities

    A successful working MAS relies on healthy components and a secure communication environment. However, most of current attention has only focused on the physical safety or cyber security individually, instead of both simultaneously.With the development of network and communication technologies, the boundaries between the physical world and the cyber world have been blurred. Furthermore, the adversaries may exploit security vulnerabilities to gain control over some of the sensors and actuators, MASs may crash quickly when they are subject to physical and cyber threats at the same time [111]. Therefore, a collaborative defense strategy must be established from both the physical and cyber levels to better protect MASs, which could be a second potential research direction. However, it is a challenging task,because we have not fully understood the physical world, let alone the cyber world. A possible method to deal with unknown physical and cyber securities is to use the current advanced artificial intelligence technology by collecting the large amount of running data; see the recent survey papers[112], [113].

    C. Finite-Time Attack Detection and Secure Consensus

    The MASs are safety-critical systems that should be designed with time-efficient attack detection and defense. In other words, malicious attack signals should be detected in a timely manner. However, most of current researchers only focused on whether malicious attack signals can be detected or not, with very little attention being paid on how fast malicious signals can be detected. The survey paper [9] has presented a few interesting results on finite-time consensus of MASs, which may be helpful to provide a new insight for development of time-efficient defense approaches for MASs with desirable detection speed and performance. To the best of our knowledge, such a kind of finite-time malicious signal detection and secure consensus is still not solved yet, which could be a good research direction in this area.

    D. Real Testbed Design and System-Level Application

    In most existing works, only theoretical results are reported with some simulations. For example, a simulation study was performed for the protection of power system in [114]. These results are still far away from real applications. Designing a real testbed to verify the effectiveness of existing theoretical results is an urgent task as this is the first step in developing practical techniques to protect actual systems. Note that some testbeds have been designed for industrial cyber-physical systems, see the water distribution testbed [115], power generation station testbed [116], the teleoperation system [96],etc. But, the development of the system testbeds is still very limited and the focus is only paid on detecting the attack without designing any defense mechanism. It should also be a challenge when the physical threats and cyber threats are simultaneously considered in the design of testbeds and defense strategies, which could be a fourth potential research direction.

    欧美激情国产日韩精品一区| 一个人看的www免费观看视频| 亚洲av电影不卡..在线观看| 成人性生交大片免费视频hd| 亚洲一区高清亚洲精品| 免费看日本二区| 国产大屁股一区二区在线视频| 日韩欧美国产在线观看| 啦啦啦观看免费观看视频高清| 又黄又爽又刺激的免费视频.| 成人一区二区视频在线观看| 色5月婷婷丁香| 尾随美女入室| 亚洲中文字幕一区二区三区有码在线看| 日韩欧美 国产精品| 日日啪夜夜撸| 精品久久久久久久久亚洲 | 91在线精品国自产拍蜜月| 亚洲av第一区精品v没综合| 国产精品女同一区二区软件 | 欧美+日韩+精品| 在线a可以看的网站| 国产黄片美女视频| 看十八女毛片水多多多| 最新在线观看一区二区三区| a级毛片a级免费在线| 亚洲av日韩精品久久久久久密| videossex国产| 麻豆精品久久久久久蜜桃| 成人亚洲精品av一区二区| 久久国产精品人妻蜜桃| 欧美日本视频| 欧美绝顶高潮抽搐喷水| 国产亚洲精品久久久久久毛片| 男女啪啪激烈高潮av片| 大型黄色视频在线免费观看| 国产高清不卡午夜福利| 欧美日韩综合久久久久久 | 日本色播在线视频| 丰满人妻一区二区三区视频av| 高清日韩中文字幕在线| 国产精品免费一区二区三区在线| 久久久久久久久久黄片| 国产一区二区三区在线臀色熟女| 女人十人毛片免费观看3o分钟| 国产精品嫩草影院av在线观看 | 国产精品电影一区二区三区| 看片在线看免费视频| 高清视频免费观看一区二区| 五月开心婷婷网| 人妻一区二区av| 少妇精品久久久久久久| av在线老鸭窝| 97在线人人人人妻| av在线app专区| 欧美成人午夜免费资源| 性色av一级| 韩国av在线不卡| 亚洲国产精品国产精品| av线在线观看网站| 日本一二三区视频观看| 91精品伊人久久大香线蕉| 日本一二三区视频观看| 最近手机中文字幕大全| 毛片女人毛片| 国产精品一区www在线观看| 国产视频内射| 尤物成人国产欧美一区二区三区| 欧美3d第一页| 亚洲国产成人一精品久久久| 亚洲精品456在线播放app| 中文字幕亚洲精品专区| 国产精品伦人一区二区| 老女人水多毛片| 国产色婷婷99| 国产成人a区在线观看| 不卡视频在线观看欧美| 国产男女超爽视频在线观看| 色网站视频免费| 亚洲精品,欧美精品| 99久久精品热视频| 97在线视频观看| 最近中文字幕高清免费大全6| 国产精品嫩草影院av在线观看| 免费在线观看成人毛片| 婷婷色av中文字幕| 亚洲av在线观看美女高潮| 免费人成在线观看视频色| 国产精品一区二区在线观看99| 久久99精品国语久久久| 日本wwww免费看| 亚洲精品色激情综合| 国产视频首页在线观看| 一本久久精品| 免费在线观看成人毛片| 国产一区有黄有色的免费视频| 国产探花极品一区二区| 亚洲成人av在线免费| 在线看a的网站| 久久99精品国语久久久| 美女国产视频在线观看| 国产男人的电影天堂91| 亚洲国产精品一区三区| 美女内射精品一级片tv| 青春草国产在线视频| 中文字幕亚洲精品专区| 午夜免费观看性视频| 国产伦理片在线播放av一区| 91久久精品电影网| 亚洲伊人久久精品综合| 舔av片在线| 热99国产精品久久久久久7| 国产人妻一区二区三区在| 18禁动态无遮挡网站| 免费黄频网站在线观看国产| 91精品一卡2卡3卡4卡| 一个人看的www免费观看视频| 夫妻性生交免费视频一级片| 在线看a的网站| 日韩制服骚丝袜av| 亚洲精品国产成人久久av| 91精品伊人久久大香线蕉| 青春草国产在线视频| 午夜免费观看性视频| 亚洲欧美日韩东京热| 99精国产麻豆久久婷婷| 国产亚洲5aaaaa淫片| 国产伦精品一区二区三区视频9| 日韩欧美一区视频在线观看 | 黄色视频在线播放观看不卡| 两个人的视频大全免费| 欧美97在线视频| 亚洲中文av在线| 欧美激情国产日韩精品一区| 久久这里有精品视频免费| 日本黄色片子视频| 毛片女人毛片| 中国国产av一级| 街头女战士在线观看网站| 久久毛片免费看一区二区三区| 老女人水多毛片| 久久久久久久久久久丰满| 国产伦精品一区二区三区四那| 欧美日本视频| 久久久久久久久久人人人人人人| av.在线天堂| av福利片在线观看| 日日啪夜夜撸| www.色视频.com| 欧美国产精品一级二级三级 | 成人18禁高潮啪啪吃奶动态图 | 久久久精品免费免费高清| 亚洲av二区三区四区| 这个男人来自地球电影免费观看 | 日本av手机在线免费观看| 99久久精品国产国产毛片| 性色av一级| 黄色欧美视频在线观看| 国产伦在线观看视频一区| 国产熟女欧美一区二区| 自拍偷自拍亚洲精品老妇| 欧美日韩精品成人综合77777| 夫妻午夜视频| 久久久色成人| 晚上一个人看的免费电影| 亚洲第一av免费看| 国产成人精品福利久久| 国产精品福利在线免费观看| 国产成人免费观看mmmm| 噜噜噜噜噜久久久久久91| 免费观看的影片在线观看| 欧美3d第一页| 亚洲精华国产精华液的使用体验| 精品国产一区二区三区久久久樱花 | 简卡轻食公司| 欧美极品一区二区三区四区| 欧美97在线视频| h日本视频在线播放| 国产精品久久久久久久电影| 精品久久久久久久久亚洲| 亚洲av福利一区| 性色avwww在线观看| 久久久久久人妻| 亚洲性久久影院| 国产有黄有色有爽视频| 久久精品久久久久久噜噜老黄| 欧美日韩视频高清一区二区三区二| 97精品久久久久久久久久精品| 亚洲精品乱码久久久v下载方式| 欧美日本视频| 免费观看a级毛片全部| 亚洲国产欧美人成| 一区二区三区免费毛片| 欧美 日韩 精品 国产| 亚洲欧美日韩东京热| 美女主播在线视频| 亚洲aⅴ乱码一区二区在线播放| 下体分泌物呈黄色| 极品少妇高潮喷水抽搐| 国产探花极品一区二区| 国产精品无大码| 成人18禁高潮啪啪吃奶动态图 | 99久久人妻综合| 色综合色国产| 亚洲精品乱码久久久久久按摩| 高清av免费在线| 欧美日韩国产mv在线观看视频 | 国产高潮美女av| 久久精品人妻少妇| 日产精品乱码卡一卡2卡三| xxx大片免费视频| 欧美zozozo另类| 成人无遮挡网站| 男人爽女人下面视频在线观看| 日韩一区二区三区影片| 国产人妻一区二区三区在| 国产精品久久久久久精品古装| 一级av片app| 国产大屁股一区二区在线视频| 另类亚洲欧美激情| 国产免费一级a男人的天堂| 最黄视频免费看| 伦理电影免费视频| 亚洲国产色片| 色婷婷久久久亚洲欧美| 国语对白做爰xxxⅹ性视频网站| 下体分泌物呈黄色| 亚洲国产色片| 国产亚洲一区二区精品| 亚洲成人一二三区av| 久久精品国产亚洲网站| 国产精品久久久久久精品古装| 狠狠精品人妻久久久久久综合| 亚洲国产成人一精品久久久| 精品亚洲成a人片在线观看 | 日韩国内少妇激情av| 久久精品国产亚洲av涩爱| 国产又色又爽无遮挡免| 黄色日韩在线| 国产真实伦视频高清在线观看| 亚洲av福利一区| 高清欧美精品videossex| 又爽又黄a免费视频| 欧美+日韩+精品| 午夜福利在线在线| 亚洲精品国产色婷婷电影| 下体分泌物呈黄色| 大又大粗又爽又黄少妇毛片口| 欧美日韩一区二区视频在线观看视频在线| 少妇人妻 视频| 97热精品久久久久久| 直男gayav资源| 国产男女超爽视频在线观看| 色综合色国产| 中文字幕制服av| 伦理电影大哥的女人| 99久久中文字幕三级久久日本| 欧美日韩国产mv在线观看视频 | 你懂的网址亚洲精品在线观看| 久久99热这里只有精品18| 毛片一级片免费看久久久久| 国产乱人偷精品视频| 久久国产精品大桥未久av | 国产精品人妻久久久影院| 色婷婷久久久亚洲欧美| 黄色欧美视频在线观看| 欧美最新免费一区二区三区| 国产精品无大码| av国产精品久久久久影院| 亚洲av不卡在线观看| 亚洲国产日韩一区二区| 久久99热这里只有精品18| 插阴视频在线观看视频| 中文字幕人妻熟人妻熟丝袜美| 男女免费视频国产| 成人影院久久| a级毛色黄片| 99国产精品免费福利视频| 少妇被粗大猛烈的视频| 黄色怎么调成土黄色| 国产精品久久久久久精品古装| 亚洲最大成人中文| 久久99热这里只有精品18| 国语对白做爰xxxⅹ性视频网站| 国产精品麻豆人妻色哟哟久久| av在线蜜桃| 我要看日韩黄色一级片| 欧美97在线视频| 在线观看一区二区三区| 麻豆精品久久久久久蜜桃| 成人毛片60女人毛片免费| 欧美日韩国产mv在线观看视频 | 美女福利国产在线 | 一级片'在线观看视频| 亚洲精品国产av蜜桃| 亚洲欧美精品自产自拍| 卡戴珊不雅视频在线播放| 另类亚洲欧美激情| 少妇的逼好多水| 国产爽快片一区二区三区| 亚洲精品日韩在线中文字幕| 99久国产av精品国产电影| 日本黄色日本黄色录像| 噜噜噜噜噜久久久久久91| 又黄又爽又刺激的免费视频.| 日韩伦理黄色片| 欧美成人一区二区免费高清观看| 丝袜喷水一区| 亚洲欧洲国产日韩| 国产黄色视频一区二区在线观看| 97超碰精品成人国产| 97超视频在线观看视频| 国产一级毛片在线| 亚洲一区二区三区欧美精品| 免费大片18禁| 欧美极品一区二区三区四区| 久热这里只有精品99| 老师上课跳d突然被开到最大视频| 欧美xxⅹ黑人| 777米奇影视久久| 最近2019中文字幕mv第一页| 国产精品人妻久久久久久| 国产永久视频网站| 久久6这里有精品| 国产精品麻豆人妻色哟哟久久| 国产黄频视频在线观看| 精品少妇久久久久久888优播| 大片免费播放器 马上看| av专区在线播放| 国产真实伦视频高清在线观看| 欧美成人一区二区免费高清观看| 午夜精品国产一区二区电影| 国产av精品麻豆| 日本wwww免费看| 美女福利国产在线 | 秋霞在线观看毛片| 不卡视频在线观看欧美| 视频区图区小说| 日本一二三区视频观看| 80岁老熟妇乱子伦牲交| 国产黄频视频在线观看| 久久6这里有精品| 久久精品国产亚洲av天美| 成人毛片60女人毛片免费| 一级毛片电影观看| 亚洲国产成人一精品久久久| 国产av码专区亚洲av| 精品一区在线观看国产| 熟妇人妻不卡中文字幕| 成人亚洲欧美一区二区av| 国产亚洲欧美精品永久| 免费黄色在线免费观看| 亚洲精品自拍成人| 少妇裸体淫交视频免费看高清| 亚洲人成网站在线播| 纵有疾风起免费观看全集完整版| 天美传媒精品一区二区| 亚洲美女搞黄在线观看| 国产av码专区亚洲av| 高清av免费在线| 特大巨黑吊av在线直播| 亚洲美女黄色视频免费看| 欧美成人a在线观看| 亚洲丝袜综合中文字幕| 国产熟女欧美一区二区| 久久久久久久久久久免费av| 七月丁香在线播放| 国产视频内射| 你懂的网址亚洲精品在线观看| 一级a做视频免费观看| 麻豆乱淫一区二区| 99精国产麻豆久久婷婷| 在线观看美女被高潮喷水网站| 老师上课跳d突然被开到最大视频| 黄片无遮挡物在线观看| 我要看黄色一级片免费的| kizo精华| 少妇人妻 视频| 男人和女人高潮做爰伦理| 亚洲精品一二三| 久久精品国产自在天天线| 我要看黄色一级片免费的| 欧美+日韩+精品| 又粗又硬又长又爽又黄的视频| 成年免费大片在线观看| 五月开心婷婷网| 18禁裸乳无遮挡动漫免费视频| 国产中年淑女户外野战色| h日本视频在线播放| 精品久久国产蜜桃| 国产91av在线免费观看| 我的老师免费观看完整版| 观看美女的网站| 国产成人a区在线观看| 亚洲国产av新网站| 一级av片app| 婷婷色麻豆天堂久久| 亚洲成人手机| 小蜜桃在线观看免费完整版高清| 一区二区av电影网| 99热这里只有是精品在线观看| 最近中文字幕2019免费版| 欧美日韩视频高清一区二区三区二| 亚洲国产精品国产精品| 黄片无遮挡物在线观看| 五月天丁香电影| a级一级毛片免费在线观看| 欧美日韩在线观看h| 王馨瑶露胸无遮挡在线观看| 久久毛片免费看一区二区三区| 日韩在线高清观看一区二区三区| 亚洲天堂av无毛| 久久久久网色| 人妻制服诱惑在线中文字幕| www.色视频.com| 欧美日韩亚洲高清精品| 国产精品不卡视频一区二区| 亚洲欧美成人综合另类久久久| 日韩一区二区三区影片| 成人毛片60女人毛片免费| 久久韩国三级中文字幕| 亚洲国产精品999| 久久人人爽人人爽人人片va| 国产精品久久久久久精品古装| 亚洲中文av在线| 夫妻午夜视频| 精品亚洲成a人片在线观看 | 毛片一级片免费看久久久久| 亚洲最大成人中文| 日韩强制内射视频| 老师上课跳d突然被开到最大视频| 少妇人妻一区二区三区视频| 日韩欧美精品免费久久| 亚洲久久久国产精品| 九色成人免费人妻av| 国产深夜福利视频在线观看| 久久久午夜欧美精品| 毛片女人毛片| 看十八女毛片水多多多| 18禁在线播放成人免费| 少妇的逼水好多| 国产精品人妻久久久影院| 欧美3d第一页| 亚洲激情五月婷婷啪啪| 久久国内精品自在自线图片| 少妇高潮的动态图| 校园人妻丝袜中文字幕| 91精品一卡2卡3卡4卡| 日本猛色少妇xxxxx猛交久久| 久久久久久久亚洲中文字幕| 日韩不卡一区二区三区视频在线| 特大巨黑吊av在线直播| 黄片wwwwww| 亚洲人成网站在线播| 精华霜和精华液先用哪个| 黄色视频在线播放观看不卡| 国产一区二区三区综合在线观看 | 国产精品av视频在线免费观看| 性色av一级| 午夜福利在线在线| 国产精品99久久99久久久不卡 | 久久99热这里只频精品6学生| 国产午夜精品一二区理论片| 看十八女毛片水多多多| 免费av不卡在线播放| 欧美日韩视频高清一区二区三区二| 熟女av电影| 亚洲精品国产色婷婷电影| 亚洲人成网站在线观看播放| 亚洲精品国产色婷婷电影| 18+在线观看网站| 噜噜噜噜噜久久久久久91| 久久毛片免费看一区二区三区| a级毛片免费高清观看在线播放| 免费少妇av软件| 国产男人的电影天堂91| 亚洲美女搞黄在线观看| 一区在线观看完整版| 国产国拍精品亚洲av在线观看| 欧美97在线视频| 亚洲怡红院男人天堂| 国产乱人偷精品视频| 亚洲怡红院男人天堂| 免费黄网站久久成人精品| 国产精品秋霞免费鲁丝片| 在线亚洲精品国产二区图片欧美 | 国产无遮挡羞羞视频在线观看| 三级国产精品欧美在线观看| 91久久精品国产一区二区成人| 内射极品少妇av片p| 成人漫画全彩无遮挡| 久热这里只有精品99| 一级a做视频免费观看| 精品视频人人做人人爽| 欧美精品国产亚洲| 国产高清三级在线| 色吧在线观看| av黄色大香蕉| 深夜a级毛片| 国产精品国产三级国产专区5o| 亚洲精品视频女| 51国产日韩欧美| 高清黄色对白视频在线免费看 | 成年人午夜在线观看视频| 永久网站在线| 久久国内精品自在自线图片| 欧美三级亚洲精品| 国产精品熟女久久久久浪| 身体一侧抽搐| 久久久久网色| 中文天堂在线官网| 狂野欧美白嫩少妇大欣赏| 亚洲精品自拍成人| 99热6这里只有精品| 国产亚洲5aaaaa淫片| 建设人人有责人人尽责人人享有的 | 亚洲av中文字字幕乱码综合| 夫妻午夜视频| 免费看不卡的av| 丰满迷人的少妇在线观看| 伦精品一区二区三区| 青青草视频在线视频观看| 十八禁网站网址无遮挡 | 99久国产av精品国产电影| av在线蜜桃| 美女视频免费永久观看网站| 在线观看三级黄色| 十八禁网站网址无遮挡 | 男人添女人高潮全过程视频| 啦啦啦中文免费视频观看日本| av.在线天堂| 国产69精品久久久久777片| 色婷婷av一区二区三区视频| 亚洲人成网站在线观看播放| videossex国产| 午夜福利在线在线| 国产大屁股一区二区在线视频| 在线观看国产h片| 黄色日韩在线| 51国产日韩欧美| 亚洲国产av新网站| 亚洲精华国产精华液的使用体验| 最后的刺客免费高清国语| 国产极品天堂在线| 最近最新中文字幕大全电影3| 欧美性感艳星| 成年美女黄网站色视频大全免费 | 少妇人妻精品综合一区二区| 精品一区二区免费观看| 熟女av电影| 我要看黄色一级片免费的| 精品人妻视频免费看| av在线老鸭窝| 91在线精品国自产拍蜜月| 国产高潮美女av| 免费黄网站久久成人精品| 精品一区在线观看国产| 美女脱内裤让男人舔精品视频| 国产视频内射| 精品午夜福利在线看| 免费大片黄手机在线观看| 中文乱码字字幕精品一区二区三区| 成人黄色视频免费在线看| 成人美女网站在线观看视频| 黄色怎么调成土黄色| 纵有疾风起免费观看全集完整版| 熟妇人妻不卡中文字幕| 噜噜噜噜噜久久久久久91| 国产精品久久久久久久电影| 久热久热在线精品观看| 国产国拍精品亚洲av在线观看| 看十八女毛片水多多多| 一级黄片播放器| 亚洲av.av天堂| 国产精品99久久久久久久久| 18禁裸乳无遮挡免费网站照片| 国产午夜精品久久久久久一区二区三区| 成人美女网站在线观看视频| 啦啦啦视频在线资源免费观看| 日韩av在线免费看完整版不卡| 涩涩av久久男人的天堂| 久久久久久久精品精品| 交换朋友夫妻互换小说| 精品亚洲乱码少妇综合久久| 欧美日韩视频高清一区二区三区二| 1000部很黄的大片| 老熟女久久久| 一级毛片久久久久久久久女| 日本黄大片高清| 内地一区二区视频在线| 男女国产视频网站| av.在线天堂| 欧美极品一区二区三区四区| 国产精品爽爽va在线观看网站| 精品国产露脸久久av麻豆| 国产精品久久久久久精品古装| 精品久久久久久久久av| 99精国产麻豆久久婷婷| 蜜桃亚洲精品一区二区三区| 亚洲内射少妇av| 亚洲成人av在线免费| 99热这里只有是精品在线观看| 啦啦啦在线观看免费高清www| 成人亚洲精品一区在线观看 | 永久免费av网站大全| 久久久久久久久久久丰满| 观看美女的网站| 中文字幕av成人在线电影| 高清在线视频一区二区三区| 久久综合国产亚洲精品| 久久久久久九九精品二区国产| 久久久久久久久久久丰满| 黄色怎么调成土黄色| 久久久亚洲精品成人影院| 国产日韩欧美亚洲二区|