• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems

    2021-07-26 07:23:14YueZhaoZeChenChunjieZhouYuChuTianandYuanqingQin
    IEEE/CAA Journal of Automatica Sinica 2021年8期

    Yue Zhao, Ze Chen, Chunjie Zhou, Yu-Chu Tian,, and Yuanqing Qin

    Abstract—Secure control against cyber attacks becomes increasingly significant in cyber-physical systems (CPSs). False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals. For quantified false data injection attacks, this paper establishes an effective defense framework from the energy conversion perspective. Then, we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks. The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection. Moreover, with the L2disturbance attenuation technique,theburdenof control systemdesignissimplified because there is no need to design an attack observer. In addition,this secure control method is simple to implement because it avoids complicated mathematical operations. The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.

    I. INTRODUCTION

    RECENTLY, cyber attacks against cyber-physical systems(CPSs) have increasingly occured. Due to the existence of such attacks, CPSs usually exhibit strong nonlinear characteristics. The inherent nonlinear nature of the attacked CPSs has motivated the research of nonlinear control methods in security control. Existing investigations have delved into the nonlinear control of CPSs include adaptive control [1], [2],sliding mode control [3] and model predictive control [4]–[6].

    Existing nonlinear control methods against cyber attacks have been studied mostly from the perspective of signal processing. These nonlinear control methods show some disadvantages. For example, the design of adaptive control methods is usually complicated. When the control system has non-parametric uncertainties, its robustness is greatly affected by model errors. As another example, the application of sliding mode control methods not only shows a chattering phenomenon, but also is restricted by the relative order of the system. Furthermore, the backstepping control method is easy to cause the dimensional expansion of the system. The model predictive control method demands a large amount of calculation. As a result, the control time is difficult to guarantee. Because attacks are unpredictable, time-varying,and complex, these high-gain control methods have limited ability to deal with attacks.

    The design of adaptive secure controller in [7] counteracts denial-of-service (DoS) attacks as well as external disturbances. They offset the impact of unknown attacks on the system in real time. However, the selection of adaptive parameters is a difficult task as attacks are changeable. The study reported in [8] uses an backstepping secure controller to deal with attacks. However, this controller is only designed for second-order systems. Its applications to high-order systems are difficult because it will cause dimensional expansion problems. The work in [9] investigates discretetime cyber-physical systems under actuator and sensor attacks.As attacks are unknown, it adopts an observer-based control scheme to stabilize attacked systems. But the design of the additional attack observer complicates control system design.The reports in [10]–[13] consider a model predictive control algorithms to handle attacks for discrete-time systems. They solve an optimization problem with some constraints expressed by linear matrix inequalities. However, the optimization process is computationally expensive, increasing the complexity of the control problem.

    In the fields of science and engineering, it is generally believed that the change in various physical quantities in dynamic systems reflect a change in energy (absorption,conversion, and consumption). For example, the change in current flowing through an inductor reflects the change in magnetic field energy. Therefore, the physical quantity of the system can be controlled through the control of the system energy. The passivity of the system is the energy change property of the system. Passivity-based control [14]–[16] is an inherently nonlinear control method because of its good physical interpretation and global convergence characteristics.With an intuitive physical concept, this nonlinear control method provides a physical explanation for control behavior[17], [18]. It not only ensures the stability of the system but also improves the dynamic performance of the system through the method of damping injection [19]–[21]. Compared with other nonlinear control methods based on signal processing,the passive-based control method does not need to solve the high-gain feedback control law. Thus, it is computationally simpler, implying that it is easier to implement in engineering.

    However, a CPS under passivity-based control has weak stability when it is attacked. When false data injection attacks[22], [23] occur, the control commands and/or sensor outputs are maliciously increased or reduced. Eventually, the system energy will be maliciously changed, causing system instability. There are two main ways to increase the stability of the system: 1) Use the observer [24], [25] to observe, and compensate for, the attack, and 2) Use theL2disturbance attenuation method [26], [27] to suppress the impact of the attack on the system to a certain level. Due to the unpredictability of attacks, the existing disturbance observer may fail when observing unknown attacks. The design of the attack observer will increase the cost and difficulty of the control system design. Therefore, this paper combines the Hamiltonian system theory and theL2disturbance attenuation control technology. Adopting the passivity-based method of interconnection and damping configuration, we design a passivity-based robust controller from the port controlled Hamiltonian with dissipation (PCHD) model to improve the control quality.

    Overall, this paper makes the following two main contributions to the security of CPSs under false data injection attacks:

    1) A defense framework is proposed from the perspective of energy conversion; and

    2) With theL2gain disturbance attenuation technology, a passivity-based robust controller from the port controlled Hamiltonian model is designed to stabilize the attacked CPSs.

    The remainder of this paper is organized as follows:Section II describes our defense framework based on energy conversion. This is followed by our deign of a passivity-based robust controller in Section III. Section IV gives experimental results. Finally, Section V concludes the paper.

    Notations:R , Rn, and Rm×nstand for real space,ndimensional real space, andm×nreal matrices, respectively.||·|| means the 1-norm of a vector or matrix.Imrepresents anm-order unit matrix. diag(x1,...,xm) denotes a diagonal matrix.ATmeans the transpose of a vector or matrixA.

    II. DEFENSE FRAMEwORk BASED ON ENERGY CONVERSION

    In this section, we describe a defense framework from the perspective of energy conversion. The framework is based on system transformation.

    A. System Model Conversion for Energy Control

    For an arbitraryn- inputn-output affine nonlinear system:

    wherex∈Rnis a system state vector,u∈Rnrepresents control input vector,y∈Rndenotes sensor output vector,f(x)∈Rnandh(x)∈Rnare function vectors, andg(x)∈Rn×nis a function matrix.

    Almost all existing studies carry out secure control from the perspective of signal processing, with their defense framework based on system (1). However, this article designs a defense framework from the perspective of energy conversion. For energy control, system (1) is transformed into the following port controlled Hamiltonian with passivity (PCHD) form:

    B. Description of Attacks

    Typical attacks include denial-of-service attacks [28], [29],false data injection attacks [30], [31] replay attacks [32], [33],zero-dynamic attacks [34], and covert attacks [35], [36]. The false data injection attacks are simple to implement and can arbitrarily destroy a system. Therefore, there are many related literatures researching security control issues under false data injection attacks, such as in [37]–[39].

    The false data injection attack models in the literature are usually complicated because intelligent attackers are usually in conjunction with system models. Therefore, the attackers need to adopt system identification methods [40]–[42] to obtain the system model. This process is very complicated,which limits the application of these attack models. In addition, no matter how smart the attack models are, their ultimate effect on the system is reflected in the malicious change of control commands and/or sensor outputs.

    Therefore, this article dispenses with the application of these complex false data injection attack models. It finds a new way of false data injection attacks to attribute the impact of the attack on the system to the malicious increase or decrease of control commands and/or sensor outputs. This new way of exploits is simple to design and easy to implement for increasing or reducing control commands and/or sensor outputs. Ultimately, it can purposefully compromise the system. The exploit strategies are shown as follows:

    C. System Under Actuator and Sensor Attacks

    When attacks and external disturbances occur, system (2) is transformed into

    III. DESIGN OF PASSIVITY-BASED RObUST CONTROLLER

    A. Energy Shaping and Damping Injection

    In order to configure the energy of system (5), and construct the energy function of the closed-loop system, in this subsection, we assume that there is no uncertainty occur.Then, system (5) becomes

    The interconnection and damping assignment passivity based control (IDA-PBC) method is used to feedback stabilize system (6). Then, the closed-loop system (6) becomes

    B. Design of Passivity-Based Robust Controller

    When attacks, disturbances, and conversion errors occur,system (6) becomes the form of system (5). Under feedback control lawu=α(x), system (6) can be stabilized in the neighborhood of equilibrium pointx*. However, when attacks occur, system (5) has weak stability under controlleru=α(x).Therefore, we design a passivity-based robust controller (14)to stabilize the attacked system (5).

    Under controller (14), system (5) becomes

    The next goal is to design the control law β(x) for system(15). For this purpose, the true or estimated values ofg1(x)ω1andg2(x)ω2need to be available. The fact is that these two uncertain terms are unknown. Thus, disturbance observers need to be designed to estimate their values. To simplify the control system design, this paper uses theL2disturbance attenuation technique to suppressg1(x)ω1andg2(x)ω2within a certain level. This idea has been used in the disturbance attenuation problem of nonlinear systems [43]–[45].

    For system (15), define the penalty signal as

    Proof:The proof of Theorem 2 is given in Appendix B. ■

    Remark 2:Combining (12) and (18), controller (14)becomes the form of controller (19). Under controller (19),system (5) is stable in the presence of attacks.

    Remark 3:The secure control method proposed in this paper has the following advantages:

    1) It has a good physical interpretation and global convergence characteristics. Meanwhile, it avoids complicated mathematical operations. Moreover, as there is no need to design an attack observer, it simplifies the burden of control system design;

    2) It drives the system states to converge to the origin by promptly adjusting the system energy changes in the presence of attacks; and

    3) It ensures the dynamic performance of the system by adjusting the amount of damping injection.

    IV. NUMERICAL SIMULATIONS

    In this section, numerical simulations are conducted to demonstrate the performance of the proposed controller for CPSs under cyber attacks.

    A. Descriptions of An Example

    We consider a control system of an interior permanent magnet synchronous motor (IPMSM), as shown in Fig. 1. The controller proposed in this paper is applied to the current loop.

    Fig. 1. A control system for a interior permanent magnet synchronous motor.

    B. Design of Existing Controllers

    When attacks and disturbances occur, system (21) is transformed into

    When attacks and external disturbances occur, system (29)becomes

    The parameters of controllers (23)–(25) and (42) are tabulated in Table I.

    TABLE I PARAMETERS OF CONTROLLERS

    D. Design of Thirteen Case Studies and Four Control Strategies

    Thirteen cases are designed to validate the effectiveness of the proposed controller, as shown in Table II.

    TABLEII TEN CASES OF ATTACkSaui AND ayi (i =1,2)

    For comparative performance analysis, four control strategies are designed for system (20), as shown in Table III.Control strategies 1, 2, and 3 are existing control strategies.Control strategy 4 comes from our control strategy.

    TABLE III FOUR CONTROL STRATEGIES

    E. Five Case Studies With Positively Decreased ui and yi

    In this subsection, numerical experiments are implemented when the control commandsuiand sensor outputsyiare decreased since actuator attackauiand sensor attackayiare increased reversely.

    1) Case 1:In this case, no attack signal is implemented. The simulation results are shown in Fig. 2.

    Fig. 2. Case 1 without attack (a ui=0, a yi=0, d =10 N·m).

    2) Case 2:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 5 0% between 0.4 s and 0.6 s. Our simulation results are shown in Fig. 3.

    Fig. 3. Case 2 (a ui=-0.5 , a yi=-0.5, d =10 N·m, 0.4 s–0.6 s).

    3) Case 3:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 7 0% between 0.4 s and 0.6 s. The simulation results are depicted in Fig. 4.

    4) Case 4:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 9 0% between 0.4 s and 0.6 s. The results are illustrated in Fig. 5.

    5) Case 5:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 1 00% between 0.4 s and 0.6 s. The results are illustrated in Fig. 6.

    Fig. 4. Case 3 (a ui=-0.7 , a yi=-0.7, d =10 N·m, 0.4 s–0.6 s).

    Fig. 5. Case 4 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–0.6 s).

    Fig. 6. Case 5 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–0.6 s).

    Fig. 7. Case 6 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–1.4 s).

    Fig. 8. Case 7 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    Fig. 9. Case 8 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–1.4 s).

    As shown in Figs. 2 and 3, when there is no attack or in face of a weak attack, the motor works well under all of the four controllers. Under Cases 3 and 5, Figs. 4–6 indicate that the control performance of controller (23), (24), and (25) has declined during 0.4 s to 0.6 s, however, our controller (42) can always work normally.

    F. Four Case Studies With Different Values of Attack Duration

    In this subsection, in contrast to Cases 4 and 5, some experiments are carried out under the same attack intensity but different attack duration.

    1) Case 6:In this case,u1,u2,y1, andy2of system (20) are reduced by 9 0% between 0.4 s and 1.4 s. The simulation results are shown in Fig. 7.

    2) Case 7:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 90% between 0.4 s and 2.4 s. The simulation results are depicted in Fig. 8.

    3) Case 8:In this case,u1,u2,y1, andy2of system (20) are reduced by 100% between 0.4 s and 1.4 s. The simulation results are shown in Fig. 9.

    4) Case 9:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 1 00% between 0.4 s and 2.4 s. The simulation results are depicted in Fig. 10.

    Fig. 10. Case 9 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–2.4 s).

    For Cases 4–9, during the period that the system is attacked,Figs. 5–10 show that as the attack duration increases, the time when the control performance of controllers (23)–(25) are reduced has also been extended. However, our controller (42)still works well even if the attack duration is extended.

    G. Two Case Studies With Reversely Increased ui andyi

    As the attack intensityaui,ayicontinue to increase reversely, the direction of the control commandsuiand sensor outputsyiwill change from positive to negative. In this subsection, some experiments on this situation will be tested.

    1) Case 10:In this case,u1,u2,y1, andy2of system (20) are reduced by 2 00% between 0.4 s and 0.6 s. The simulation results are shown in Fig. 11.

    Fig. 11. Case 10 (a ui=-2 , a yi=-2, d =10 N·m, 0.4 s–0.6 s).

    2) Case 11:Both actuator commandsu1andu2, and sensor outputsy1,y2of system (20) are reduced 500% between 0.4 s and 0.6 s. The simulation results are shown in Fig. 12.

    Fig. 12. Case 11 (a ui=-5 , a yi=-5, d =10 N·m, 0.4 s–0.6 s).

    Under Case 10, Fig. 11 shows that when control commands and sensor outputs are reversed, the control performance of controllers (23)–(25) has failed. On the contrary, our controller (42) is still resilient to attack. Under Case 11, Fig. 12 shows that when control commands and sensor outputs are more severely reversed, our controller has also failed.

    H. Two Case Studies With Positively Increased ui and yi

    In this subsection, some experiments are implemented on the situation where the control commandsuiand sensor outputsyiare increased since actuator attackauiand sensor attackayiare increased positively.

    1) Case 12:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are increased 200% between 0.4 s and 0.6 s. The results are shown in Fig. 13.

    2) Case 13:In this case, both actuator commandsu1andu2,and sensor outputsy1andy2of system (20) are increased 500%. The simulation results are shown in Fig. 14.

    Under Cases 12 and 13, Figs. 13 and 14 show that when the control commands and sensor outputs are positively increased by attacker, the control performance of all of the four controllers can remain normally.

    I. Verification of Our Method Under Different Speed References

    In this subsection, some experiments are implemented on the working situation where the speed reference is changed.Working situation 1 is implemented under attack in Case 4,and working situation 2 is implemented under attack in Case 7.

    Fig. 13. Case 12 (a ui=2 , a yi=2, d =10 N·m, 0.4 s–0.6 s).

    Fig. 14. Case 13 (a ui=5 , a yi=5, d =10 N·m, 0.4 s–0.6 s).

    1) Working Situation 1 Under Case 4:In this case, the speed reference is set as –500 rad/s and the motor will start reversely. The simulation results are shown in Fig. 15.

    Fig. 15. Working situation 1 under Case 4 with attack ( ,, , 0.4 s–0.6 s).

    aui=-0.9ayi=-0.9d=10 N·m

    2) Working Situation 2 Under Case 7:In this case, the speed reference is set as 500 rad/s at the beginning, and then is changed to –1000 rad/s at 0.4 s, and is finally reverted to 500 rad/s at 1 s. The motor will start positively, then will decelerate in reverse at 0.4 s, and then start to accelerate positively at 1 s. The simulation results are shown in Fig. 16.

    The above two cases study secure control under different working situations. As shown in Figs. 15 and 16, when attacks occur, the performance of controllers (23)–(25) will decline.In comparison, the performance of our controller (42) is resilient to attacks under different working situations.

    J. Verification of Our Method Under Different Friction Coefficients

    Consider some working situations in which the friction coefficient of the motor is increased (The initial friction coefficient of the motor is set as 0 N ·m·s). Working situation 1 is implemented under attack in Case 4, and working situation 2 is implemented under attack in Case 7.

    Fig. 16. Working situation 2 under Case 4 with attack (a ui=-0.9,ayi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    1) Working Situation 1 Under Case 4:In this case, the friction coefficient of the motor is set to 1.8 N·m·s. The simulation results are shown in Fig. 17.

    Fig. 17. Working situation 1 under Case 7 with attack ( ,, , 0.4 s–0.6 s).

    aui=-0.9ayi=-0.9d=10 N·m

    Fig. 18. Working situation 2 under Case 7 with attack ( aui=-0.9,ayi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    In the above two cases, we study secure control when the friction coefficient of the motor is increased. As shown in Figs. 17 and 18, when attacks occur and the friction coefficient of the motor is increased, the control performance of controllers (23)–(25) will fail, and the control performance of our controller (42) will decline during the attack.

    V. CONCLUSIONS

    In this paper, we have studied secure control for CPSs under quantified actuator and sensor attacks, which can maliciously increase or reduce control commands and sensor outputs. For attacked CPSs, we have proposed a defense scheme from the perspective of energy conversion. Then, a passivity-based robust controller has been designed to stabilize the attacked system. The effectiveness of our method has been verified through an industrial CPS. In the future, we will study two secure control problems: 1) when the direction of control commands and sensor outputs are reversed due to attacks; and 2) the saturation of actuator and sensor outputs caused by attacks.

    APPENDIX A PROOF OF THEOREM 1

    99久久国产精品久久久| 国产1区2区3区精品| 欧美乱色亚洲激情| 男人舔奶头视频| 美女高潮喷水抽搐中文字幕| 精品久久久久久久末码| 美女扒开内裤让男人捅视频| 成人永久免费在线观看视频| 亚洲av成人不卡在线观看播放网| 国产精品爽爽va在线观看网站 | 又黄又粗又硬又大视频| 欧美三级亚洲精品| 国产主播在线观看一区二区| 亚洲五月天丁香| www国产在线视频色| 亚洲av片天天在线观看| 18禁观看日本| 国产亚洲欧美在线一区二区| 久9热在线精品视频| 最新美女视频免费是黄的| 欧美不卡视频在线免费观看 | 国产伦人伦偷精品视频| 狂野欧美激情性xxxx| 国产亚洲精品av在线| 国产精品综合久久久久久久免费| 草草在线视频免费看| 黄频高清免费视频| 欧美成人免费av一区二区三区| 91九色精品人成在线观看| 在线观看www视频免费| 国内揄拍国产精品人妻在线 | 色播在线永久视频| 丝袜在线中文字幕| 免费电影在线观看免费观看| 色精品久久人妻99蜜桃| 欧美久久黑人一区二区| 欧美成人午夜精品| 丰满的人妻完整版| 大香蕉久久成人网| 免费观看精品视频网站| 99久久久亚洲精品蜜臀av| 黄片小视频在线播放| 国产精品 国内视频| 婷婷丁香在线五月| 国产精品99久久99久久久不卡| 国产又爽黄色视频| 亚洲精品中文字幕一二三四区| 十分钟在线观看高清视频www| 中文字幕高清在线视频| 精品人妻1区二区| 亚洲av日韩精品久久久久久密| 中文字幕人妻熟女乱码| 午夜日韩欧美国产| 欧美+亚洲+日韩+国产| 国产一区二区激情短视频| 1024手机看黄色片| 热re99久久国产66热| 一区二区三区高清视频在线| 国产av不卡久久| 香蕉国产在线看| 九色国产91popny在线| 精品不卡国产一区二区三区| 天堂动漫精品| 黄色片一级片一级黄色片| 窝窝影院91人妻| 不卡一级毛片| 露出奶头的视频| 国产成人av教育| 看片在线看免费视频| 久久久久久人人人人人| 国产精品自产拍在线观看55亚洲| 日韩一卡2卡3卡4卡2021年| 精品高清国产在线一区| 97人妻精品一区二区三区麻豆 | 99国产精品99久久久久| 91成人精品电影| 国产精品自产拍在线观看55亚洲| 成人亚洲精品av一区二区| 在线十欧美十亚洲十日本专区| 国产精品久久久av美女十八| 色精品久久人妻99蜜桃| 夜夜躁狠狠躁天天躁| 12—13女人毛片做爰片一| 在线天堂中文资源库| 后天国语完整版免费观看| 国产成人av激情在线播放| 国产一级毛片七仙女欲春2 | 久久久久国产精品人妻aⅴ院| 国产成人系列免费观看| 欧美成人一区二区免费高清观看 | 少妇的丰满在线观看| 欧美绝顶高潮抽搐喷水| 中文字幕人成人乱码亚洲影| 日韩高清综合在线| 丁香六月欧美| 最好的美女福利视频网| 91av网站免费观看| 久久久久精品国产欧美久久久| 变态另类成人亚洲欧美熟女| 亚洲熟妇中文字幕五十中出| 免费在线观看亚洲国产| 激情在线观看视频在线高清| 在线免费观看的www视频| 青草久久国产| 中文资源天堂在线| 国内揄拍国产精品人妻在线 | 岛国在线观看网站| 免费在线观看完整版高清| 麻豆国产av国片精品| 久久 成人 亚洲| 韩国精品一区二区三区| 久久久久久久精品吃奶| 我的亚洲天堂| 国产亚洲精品第一综合不卡| 最近最新中文字幕大全免费视频| 午夜久久久久精精品| 亚洲国产高清在线一区二区三 | 午夜久久久久精精品| 亚洲中文字幕一区二区三区有码在线看 | 真人做人爱边吃奶动态| 久久国产精品男人的天堂亚洲| 夜夜爽天天搞| 精品一区二区三区av网在线观看| 久久人人精品亚洲av| 国产成人精品无人区| 可以免费在线观看a视频的电影网站| www国产在线视频色| 国产亚洲精品第一综合不卡| 国产高清视频在线播放一区| 国产av在哪里看| 国产午夜精品久久久久久| 男人的好看免费观看在线视频 | 精品日产1卡2卡| 黄色毛片三级朝国网站| 999久久久精品免费观看国产| 在线视频色国产色| 啦啦啦 在线观看视频| 久久性视频一级片| 精品熟女少妇八av免费久了| 成年免费大片在线观看| www.精华液| 国产亚洲精品av在线| 婷婷精品国产亚洲av在线| 久久精品影院6| 久久久久国内视频| 欧美一级毛片孕妇| 亚洲午夜理论影院| 国产黄片美女视频| 韩国精品一区二区三区| 国产免费av片在线观看野外av| 亚洲欧美一区二区三区黑人| 好男人在线观看高清免费视频 | 黄色成人免费大全| 亚洲电影在线观看av| 哪里可以看免费的av片| 狠狠狠狠99中文字幕| 后天国语完整版免费观看| 成人18禁高潮啪啪吃奶动态图| 曰老女人黄片| 999久久久国产精品视频| 日韩欧美一区二区三区在线观看| 国产高清有码在线观看视频 | 女性生殖器流出的白浆| 禁无遮挡网站| 欧美久久黑人一区二区| 国产黄片美女视频| 国产亚洲精品第一综合不卡| 精品久久久久久,| 黄色视频不卡| 国产麻豆成人av免费视频| 国产激情久久老熟女| 国产激情偷乱视频一区二区| 免费无遮挡裸体视频| 最好的美女福利视频网| 国产精品av久久久久免费| 国产av又大| 熟女少妇亚洲综合色aaa.| 国产成人精品久久二区二区免费| 大型黄色视频在线免费观看| 国产91精品成人一区二区三区| а√天堂www在线а√下载| 精品一区二区三区四区五区乱码| 国产精品永久免费网站| 熟妇人妻久久中文字幕3abv| 男人舔女人的私密视频| 视频区欧美日本亚洲| 男人的好看免费观看在线视频 | 女警被强在线播放| 日本三级黄在线观看| 777久久人妻少妇嫩草av网站| 丝袜在线中文字幕| 97人妻精品一区二区三区麻豆 | 操出白浆在线播放| 成人18禁在线播放| 亚洲中文日韩欧美视频| 免费无遮挡裸体视频| 亚洲国产毛片av蜜桃av| 午夜亚洲福利在线播放| 国产精品美女特级片免费视频播放器 | 手机成人av网站| 婷婷亚洲欧美| 一区福利在线观看| 免费高清在线观看日韩| 亚洲精品久久国产高清桃花| 国产高清videossex| 亚洲国产欧美网| 精品一区二区三区视频在线观看免费| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲国产精品sss在线观看| 天堂√8在线中文| 成人手机av| 国产久久久一区二区三区| 精品久久久久久久人妻蜜臀av| 女同久久另类99精品国产91| 日韩欧美 国产精品| 91麻豆精品激情在线观看国产| 国产亚洲欧美在线一区二区| 欧美人与性动交α欧美精品济南到| 午夜日韩欧美国产| 18禁观看日本| 国产精品二区激情视频| 制服丝袜大香蕉在线| 亚洲成国产人片在线观看| 精品一区二区三区av网在线观看| 中文亚洲av片在线观看爽| 欧美黄色片欧美黄色片| 最近最新中文字幕大全免费视频| 好男人在线观看高清免费视频 | 午夜福利一区二区在线看| 91国产中文字幕| 成人18禁高潮啪啪吃奶动态图| 亚洲成人免费电影在线观看| 国产精品二区激情视频| 禁无遮挡网站| 精品一区二区三区四区五区乱码| 男女那种视频在线观看| 一进一出抽搐gif免费好疼| 国产在线观看jvid| 19禁男女啪啪无遮挡网站| 国产黄色小视频在线观看| 99热6这里只有精品| 欧美中文综合在线视频| 国产精品国产高清国产av| 国产精品影院久久| 一个人免费在线观看的高清视频| 日本一区二区免费在线视频| 男女那种视频在线观看| 在线观看免费视频日本深夜| 午夜福利欧美成人| 亚洲av成人av| 亚洲色图 男人天堂 中文字幕| 午夜成年电影在线免费观看| 欧美日本视频| 夜夜看夜夜爽夜夜摸| 国产三级黄色录像| 久久性视频一级片| 日日夜夜操网爽| 老司机靠b影院| 嫩草影院精品99| 中文字幕人妻熟女乱码| 黑人欧美特级aaaaaa片| 超碰成人久久| 亚洲国产毛片av蜜桃av| 久久精品国产亚洲av高清一级| 狂野欧美激情性xxxx| 激情在线观看视频在线高清| 日韩欧美一区视频在线观看| 久久中文字幕人妻熟女| 99精品久久久久人妻精品| 美国免费a级毛片| 巨乳人妻的诱惑在线观看| 亚洲av日韩精品久久久久久密| 97超级碰碰碰精品色视频在线观看| 又黄又粗又硬又大视频| 97碰自拍视频| 淫秽高清视频在线观看| 成人三级做爰电影| 又紧又爽又黄一区二区| 亚洲中文av在线| 精品日产1卡2卡| 国产亚洲精品久久久久久毛片| 亚洲男人天堂网一区| 久久精品影院6| 99精品久久久久人妻精品| 真人做人爱边吃奶动态| 国内揄拍国产精品人妻在线 | 成年免费大片在线观看| 亚洲精品一卡2卡三卡4卡5卡| 嫩草影视91久久| 国产精品自产拍在线观看55亚洲| 国内久久婷婷六月综合欲色啪| 亚洲精品一卡2卡三卡4卡5卡| 亚洲男人天堂网一区| 国内精品久久久久久久电影| 91九色精品人成在线观看| 侵犯人妻中文字幕一二三四区| 在线观看一区二区三区| 亚洲五月天丁香| 国产亚洲精品综合一区在线观看 | 国产成人系列免费观看| 又大又爽又粗| 老司机午夜福利在线观看视频| 757午夜福利合集在线观看| 18禁国产床啪视频网站| 女警被强在线播放| 757午夜福利合集在线观看| www.999成人在线观看| 国内精品久久久久久久电影| 日日摸夜夜添夜夜添小说| 亚洲成人精品中文字幕电影| 日本 欧美在线| 三级毛片av免费| 曰老女人黄片| 91成人精品电影| 国内毛片毛片毛片毛片毛片| 老司机午夜福利在线观看视频| 欧美乱码精品一区二区三区| 99国产极品粉嫩在线观看| 制服丝袜大香蕉在线| 欧美中文综合在线视频| 嫩草影视91久久| 18禁美女被吸乳视频| 国产精品久久电影中文字幕| 熟女电影av网| 亚洲精品美女久久av网站| 亚洲成人久久爱视频| 在线十欧美十亚洲十日本专区| 亚洲 国产 在线| 亚洲专区中文字幕在线| 午夜a级毛片| 禁无遮挡网站| 久久久久国产精品人妻aⅴ院| 久久精品夜夜夜夜夜久久蜜豆 | 欧美亚洲日本最大视频资源| 国产精品久久久av美女十八| 丝袜美腿诱惑在线| 制服诱惑二区| 色尼玛亚洲综合影院| 999精品在线视频| 免费观看人在逋| 亚洲国产中文字幕在线视频| 亚洲中文字幕一区二区三区有码在线看 | 欧美成人免费av一区二区三区| 身体一侧抽搐| 欧美日韩乱码在线| 日韩有码中文字幕| 波多野结衣巨乳人妻| 村上凉子中文字幕在线| 免费观看人在逋| 成熟少妇高潮喷水视频| 精品国产乱子伦一区二区三区| 日韩欧美国产一区二区入口| 香蕉丝袜av| 国产成人啪精品午夜网站| 自线自在国产av| a级毛片a级免费在线| 日本在线视频免费播放| 婷婷精品国产亚洲av在线| 18禁裸乳无遮挡免费网站照片 | 免费无遮挡裸体视频| 1024香蕉在线观看| 中出人妻视频一区二区| 日韩免费av在线播放| 国产精品 国内视频| 国产亚洲精品一区二区www| 国产蜜桃级精品一区二区三区| 国产97色在线日韩免费| 久久久久久人人人人人| 一边摸一边抽搐一进一小说| 国产亚洲精品一区二区www| 精华霜和精华液先用哪个| 99riav亚洲国产免费| 91大片在线观看| 亚洲精品在线观看二区| 俺也久久电影网| 精品福利观看| 精品免费久久久久久久清纯| 高潮久久久久久久久久久不卡| 一a级毛片在线观看| 国产区一区二久久| 观看免费一级毛片| 丁香欧美五月| 色播亚洲综合网| 国产激情欧美一区二区| 久久人人精品亚洲av| 免费在线观看黄色视频的| 精品福利观看| 听说在线观看完整版免费高清| 国产精品 欧美亚洲| 美女免费视频网站| 在线观看日韩欧美| 9191精品国产免费久久| 久久久久久久久久黄片| 精品一区二区三区四区五区乱码| 久久久久国产精品人妻aⅴ院| 男女做爰动态图高潮gif福利片| 国产熟女午夜一区二区三区| 成年版毛片免费区| 日本精品一区二区三区蜜桃| 国产精品永久免费网站| 亚洲精品在线观看二区| 一区二区三区精品91| 色老头精品视频在线观看| 露出奶头的视频| 久久青草综合色| 欧美在线黄色| 中亚洲国语对白在线视频| 国产1区2区3区精品| 黄色女人牲交| 可以免费在线观看a视频的电影网站| 免费无遮挡裸体视频| 中文字幕人妻丝袜一区二区| 亚洲男人的天堂狠狠| 亚洲全国av大片| 高清毛片免费观看视频网站| 亚洲自偷自拍图片 自拍| 国产私拍福利视频在线观看| tocl精华| 午夜激情av网站| 国产伦人伦偷精品视频| 国产激情偷乱视频一区二区| 国产一卡二卡三卡精品| 精品日产1卡2卡| 国产一区二区三区视频了| 亚洲五月天丁香| 成人永久免费在线观看视频| 国产成年人精品一区二区| www.精华液| 午夜福利欧美成人| 国产成人av教育| 麻豆成人av在线观看| 淫秽高清视频在线观看| xxx96com| 免费av毛片视频| 亚洲欧美精品综合久久99| 成人av一区二区三区在线看| 18美女黄网站色大片免费观看| 看黄色毛片网站| 亚洲国产欧洲综合997久久, | 精品电影一区二区在线| 精品国产乱码久久久久久男人| av超薄肉色丝袜交足视频| 窝窝影院91人妻| 久久久精品欧美日韩精品| 免费在线观看视频国产中文字幕亚洲| 久久精品91无色码中文字幕| 免费在线观看影片大全网站| 久久这里只有精品19| 亚洲国产精品999在线| 国产成人啪精品午夜网站| 久久中文看片网| 亚洲精品av麻豆狂野| 丝袜美腿诱惑在线| av免费在线观看网站| 久久久色成人| 自拍偷自拍亚洲精品老妇| 成人亚洲精品av一区二区| 国产精品一及| 精品久久久久久久人妻蜜臀av| 免费观看人在逋| 黄色日韩在线| 在线免费十八禁| 国产三级在线视频| 直男gayav资源| 五月玫瑰六月丁香| 尾随美女入室| 久久韩国三级中文字幕| 精品一区二区三区人妻视频| 久久人人爽人人片av| 日韩中字成人| 国产综合懂色| 国产精品爽爽va在线观看网站| 不卡视频在线观看欧美| 美女内射精品一级片tv| ponron亚洲| 国产精品伦人一区二区| 国产精品,欧美在线| 欧美最黄视频在线播放免费| av在线天堂中文字幕| 精品福利观看| 简卡轻食公司| 亚洲国产精品sss在线观看| 亚洲国产精品国产精品| 成年女人永久免费观看视频| 亚洲国产精品合色在线| 亚洲av免费高清在线观看| 99国产极品粉嫩在线观看| 精品99又大又爽又粗少妇毛片| 亚洲av美国av| 日韩欧美在线乱码| 69av精品久久久久久| 永久网站在线| aaaaa片日本免费| 亚洲欧美成人综合另类久久久 | 亚洲图色成人| 国产精品日韩av在线免费观看| 伊人久久精品亚洲午夜| 久久久久九九精品影院| 日本五十路高清| 日本在线视频免费播放| 国产一区二区亚洲精品在线观看| 黄色一级大片看看| 99在线视频只有这里精品首页| 午夜影院日韩av| 久久久久精品国产欧美久久久| 女生性感内裤真人,穿戴方法视频| 欧美绝顶高潮抽搐喷水| 99久久精品国产国产毛片| 日本五十路高清| 久久久久久久久久久丰满| 天堂√8在线中文| 内射极品少妇av片p| 男人的好看免费观看在线视频| 午夜福利在线在线| 在线播放国产精品三级| or卡值多少钱| 小说图片视频综合网站| 在线看三级毛片| 丰满的人妻完整版| 免费av观看视频| 嫩草影院入口| 日韩精品青青久久久久久| 国产精品久久电影中文字幕| 国产精品三级大全| 国产精品一区二区三区四区免费观看 | 看黄色毛片网站| 欧美性感艳星| 搞女人的毛片| 亚洲国产欧洲综合997久久,| 变态另类丝袜制服| 少妇的逼水好多| 69人妻影院| 一级黄色大片毛片| 亚洲欧美日韩高清专用| 亚洲精品在线观看二区| 国产v大片淫在线免费观看| 国产一区二区在线观看日韩| 成人亚洲精品av一区二区| 亚洲欧美成人综合另类久久久 | 欧美精品国产亚洲| 97超碰精品成人国产| 一区二区三区四区激情视频 | 亚洲成人精品中文字幕电影| 亚洲不卡免费看| 亚洲国产欧洲综合997久久,| 小蜜桃在线观看免费完整版高清| 国产精品女同一区二区软件| 亚洲色图av天堂| 亚洲精品久久国产高清桃花| 国内精品美女久久久久久| 国产精品美女特级片免费视频播放器| 亚洲精品亚洲一区二区| 久久精品国产亚洲网站| 国产三级在线视频| 国产69精品久久久久777片| 亚洲美女黄片视频| 国产单亲对白刺激| 久久精品久久久久久噜噜老黄 | 久久久午夜欧美精品| 97超级碰碰碰精品色视频在线观看| 婷婷精品国产亚洲av在线| 国产视频内射| 亚洲国产精品合色在线| 国产精品国产三级国产av玫瑰| 亚洲人成网站高清观看| 亚洲无线在线观看| 久久久久国产网址| 国产精华一区二区三区| 三级男女做爰猛烈吃奶摸视频| 99久国产av精品国产电影| 麻豆久久精品国产亚洲av| 国产中年淑女户外野战色| 亚洲精品成人久久久久久| 一本精品99久久精品77| 精品久久久久久久久av| 欧美激情国产日韩精品一区| 一个人观看的视频www高清免费观看| 你懂的网址亚洲精品在线观看 | 又粗又爽又猛毛片免费看| 欧美成人精品欧美一级黄| 99久久精品热视频| 大又大粗又爽又黄少妇毛片口| 中国国产av一级| .国产精品久久| 在线免费十八禁| 美女大奶头视频| 级片在线观看| 久久久久久国产a免费观看| 国内精品一区二区在线观看| 男人的好看免费观看在线视频| 99国产极品粉嫩在线观看| 亚洲久久久久久中文字幕| 丰满人妻一区二区三区视频av| 成人美女网站在线观看视频| 国产国拍精品亚洲av在线观看| 亚洲成av人片在线播放无| 亚洲五月天丁香| 天天躁夜夜躁狠狠久久av| 国产91av在线免费观看| 长腿黑丝高跟| 久久久久久久久久成人| 免费搜索国产男女视频| 人妻夜夜爽99麻豆av| 久久人人爽人人片av| 亚洲欧美成人综合另类久久久 | 91久久精品国产一区二区三区| 日韩国内少妇激情av| 一进一出抽搐动态| 国产精品免费一区二区三区在线| 亚洲欧美日韩东京热| 国产精品一区www在线观看| 色综合亚洲欧美另类图片| 国产探花极品一区二区| 久久精品夜色国产| 日韩三级伦理在线观看|