• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer

    2021-10-23 02:21:40VanNhanVoHungTranandChakchaiSoIn
    IEEE/CAA Journal of Automatica Sinica 2021年11期

    Van Nhan Vo,Hung Tran,and Chakchai So-In,

    Abstract—In this paper,the detection capabilities and system performance of an energy harvesting (EH)Internet of Things(IoT)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper (UE)are investigated.The communication protocol is divided into two phases.In the first phase,a UAV relay (UR)cooperates with a friendly UAV jammer (UJ)to detect the UE,and the UR and UJ harvest energy from a power beacon(PB).In the second phase,a ground base station (GBS)sends a confidential signal to the UR using non-orthogonal multiple access(NOMA);the UR then uses its harvested energy to forward this confidential signal to IoT destinations (IDs)using the decode-andforward (DF)technique.Simultaneously,the UJ uses its harvested energy to emit an artificial signal to combat the detected UE.A closed-form expression for the probability of detecting the UE(the detection probability,DP)is derived to analyze the detection performance.Furthermore,the intercept probability (IP)and throughput of the considered IoT architecture are determined.Accordingly,we identify the optimal altitudes for the UR and UJ to enhance the system and secrecy performance.Monte Carlo simulations are employed to verify our approach.

    I.INTRODUCTION

    CURRENTLY,the Internet of Things (IoT)is emerging as a powerful technological paradigm in which a massive number of devices are interconnected with the aim of collecting and transmitting data for different purposes in various application scenarios (e.g.,smart cities,smart factories,and smart agriculture)[1]–[3].In parallel with the IoT revolution,unmanned aerial vehicles (UAVs)are considered promising solutions for numerous applications,such as aerial monitoring,photography,precision agriculture,traffic control,telecommunications,and especially search and rescue [4].Low-altitude UAVs,in particular,have attracted a massive amount of research attention in the context of safe and secure communications due to their mobility,elevated positions,and relatively low cost,which make them an easy and inexpensive way to access a variety of areas for surveillance [5],[6].

    Accordingly,UAVs can contribute to overcoming the limitations of the terrestrial infrastructure of an IoT system.Specifically,the incorporation of UAVs into an IoT system can allow such a system to bypass obstacles that may block direct communication between a transmitter and a receiver(e.g.,forests,mountains,or high buildings)[7]–[9].For example,Motlaghet al.discussed the potential uses of UAVs in IoT architectures for applications such as service delivery,pollution mitigation,farming,and rescue operations due to their high mobility [7].Mozaffariet al.presented a comprehensive survey of the uses of UAV communications.The authors indicated that UAVs can serve as wireless relays to improve the connectivity and coverage of ground wireless devices and,in particular,can be utilized in surveillance scenarios,which represent a key use case for IoT technology[8].

    Nevertheless,although UAVs can boost the throughput and reach of a communication network,this approach has two limitations.First,a UAV has a finite energy storage capacity,which imposes resource limitations.A UAV needs to intermittently dissociate from the system for battery charging or replacement,which may be very expensive and difficult[10].Thus,to prolong the lifetime of UAVs,energy harvesting (EH)has become a promising approach for supplying energy for information transmission [11]–[13].For example,Jiet al.proposed a system model with EH at two UAV relays (URs),in which the URs transmitted signals via power splitting using the energy obtained via EH [11].Yinet al.focused on a cellular network with an energy-constrained UR and concluded that EH for the UR could improve the uplink rates achieved via cooperative communication from the UR to users [12].

    Second,if a UAV acts as an attacker (e.g.,a UAV eavesdropper (UE)),then the network boundary will be breached,and data resources will be compromised [6],[13].For example,Sunet al.reported that a UAV can be exploited to steal confidential data and even perform jamming to reduce the quality of legitimate links,potentially presenting greater challenges than conventional terrestrial eavesdroppers [13].In particular,the work reported in [14] studied the secrecy performance of terrestrial wireless communications in the presence of a UE.The authors investigated the achievable ergodic and average outage secrecy rates for a transmitterreceiver pair on the ground in the presence of an aerial eavesdropper flying along a random spatial trajectory using a smooth turn (ST)mobility model.Furthermore,Tanget al.investigated the secrecy performance of a ground link in the presence of a UE by deriving the secure connection probability [6].Here,the authors assumed that the position and channel state information (CSI)were well known.However,this assumption is strong because an adversarial UE will attempt to hide to facilitate its attacks against a legitimate system.

    Therefore,such a system needs a means of detecting and reacting to ongoing attacks,which is referred to as an active intrusion detection system (A-IDS)[15].The operation of an A-IDS is divided into two steps:first,UE intrusion detection is performed,and then,once an intrusion is detected,a mitigation approach (e.g.,a friendly UAV jammer (UJ))is deployed to minimize the undesirable effects of the ongoing attack.For UAV detection,Nguyenet al.proposed a technique for localizing a UAV and its controller by means of a cost-effective passive tracking system.Based on the radio frequency (RF)signals emitted by a UAV and its controller,a new solution for identifying their angles and locations was presented [16].In that work,techniques for detecting the appearance of a UAV were proposed.However,the question of how to combine such a detection technique with a means of ensuring secure communications in the presence of the detected eavesdroppers was not investigated.

    For combating eavesdropping attacks,there is great interest in the ability to transmit an adversarial signal against a UE using a UJ [6],[17].For example,Wanget al.claimed that a UJ offers a means to cooperatively improve security by transmitting artificial noise [17].More specifically,the authors of [18] considered a UAV equipped with an air-toground friendly jammer to support secure communications between a valid transmitter-receiver pair for unknown eavesdropper locations.To ensure the system’s reliability and stability,the effects of the UAV’s jamming power and its three-dimensional (3D)spatial deployment on the outage probability (OP)of the legitimate receiver and the intercept probability (IP)of the eavesdropper were analyzed.In addition,Tanget al.investigated the secrecy performance of a legitimate ground link being monitored by UEs within a finite spatial area.A UJ was employed to improve the security of the ground communication.The authors concluded that a maximum increase of 75% in the secure connection probability could be achieved using a UJ [6].

    Based on the above survey of the literature,it can be anticipated that cooperation between a UR and a UJ can significantly improve the system and secrecy performance of an IoT system.However,to the best of our knowledge,no existing work has investigated an A-IDS that relies on such cooperation to identify and interfere with a UE in 3D space.The primary contributions of this paper are summarized as follows:

    1)We propose a secure communication protocol with two phases:a detection phase and a communication phase.For the detection phase,we propose a system of two cooperating UAVs,a UR and a UJ,for identifying a UE in 3D space;this system is a form of A-IDS.In the communication phase,a ground base station (GBS)transmits a confidential signal to the IoT destinations (IDs)with the assistance of an EH UR to improve the system performance;furthermore,an EH UJ is utilized to enhance the secrecy performance once a UE has been detected.

    2)We derive a closed-form expression for the detection probability (DP)to analyze the performance of UE detection.Furthermore,closed-form expressions for the throughput and IP are obtained to evaluate the system and secrecy performance.

    3)We investigate the trade-off between throughput and secrecy performance.Then,an algorithm is proposed for determining the optimal altitudes of the UR and UJ to improve the system and secrecy performance.

    II.RELATED WORk

    In this section,recent works on UAV detection and UJs are briefly surveyed.

    Because of the danger posed by unknown UAVs,there is a need to investigate related methods of robust detection,tracking,and interruption [16],[19].For example,Ezumaet al.investigated the problem of detecting and classifying UAVs in the presence of wireless interference signals using RF fingerprints.The investigated system included a passive RF surveillance mechanism based on listening to the signals transmitted between a UAV and its controller.The classification performance was evaluated in terms of the classification accuracy [19].

    However,the localization of a detected UAV for the purpose of estimating the distance between the legitimate system and the UAV was not considered.To address this shortcoming,Nguyenet al.proposed a system consisting of two stations for determining the locations of an unknown UAV and its controller.The authors analyzed an RF-based signal to determine whether a peak in the incoming RF signal strength in a given direction corresponded to a drone or its controller and utilized triangulation to estimate their locations[16].However,evaluation of the DP was not considered.Furthermore,the two stations were both located on the ground,making detection difficult for an unknown UAV flying at a high altitude.

    To improve the secrecy performance of a communication system,a UJ emitting a jamming signal against an attacker can be employed as a potential solution [6],[17],[18],[20].For example,Wanget al.presented an overview of recent research efforts on secure communications involving a UAV in the physical layer.The authors focused on the architectures of the reviewed secure transmission schemes in regard to the different roles of UAVs,including the possibility of using a UJ to enhance the secrecy performance by exploiting the characteristics of UAVs [17].

    More specifically,Zhouet al.investigated a system that includes a legitimate transmitter and receiver that are being monitored by an eavesdropper at an unknown location.Furthermore,a UAV equipped with an air-to-ground friendly jammer was employed to assist in secure communication.The authors examined the effects of the power of the UJ and its 3D spatial deployment on the system performance in terms of the OP of the legitimate receiver to evaluate the enhancement in reliability.In addition,the secrecy performance in terms of the IP of the eavesdropper was assessed to evaluate the system security [18].

    Liet al.considered physical-layer security for UAV-ground communications.The system model consisted of a UAV serving as the GBS to transmit confidential signals to a legitimate ground user,along with multiple unknown eavesdroppers on the ground.To improve the secrecy performance of the considered system,a UJ can be employed to transmit jamming signals to confuse the eavesdroppers.The authors concluded that the secrecy performance of the proposed system with a UJ can be significantly improved compared to that of the system without a UJ [20].However,in these two papers,the eavesdroppers remained on the ground,making them easier to detect than UEs.

    To extend the scope of possible eavesdroppers,Tanget al.investigated the secrecy performance of a ground link with random deployment of noncolluding UEs,with a UJ placed near the UEs to send a jamming signal.The secure connection probability was investigated to analyze the secrecy performance.Furthermore,the impacts of the jamming power and location of the UJ were considered.The optimal combination of jamming position and power to achieve the optimal secrecy performance was derived [6].However,the researchers assumed a scenario with perfect CSI for the UEs.This assumption is strong because of the unknown locations of the UEs.

    No previous publication has investigated the trade-off between the DP for a UE and the throughput with imperfect CSI to achieve a certain security constraint for an EH IoT system.Thus,in this paper,we focus on this issue and examine the system and security performance of such an IoT system.

    III.SYSTEM MODEL AND COMMUNICATION PROTOCOL

    In this section,we introduce the system model,channel assumptions,communication protocol,and scheduling schemes.

    A.System Model

    Fig.1.An illustration of an IoT architecture with a GBS S,a power beacon(PB)B,an UJ J,a UR R,and multiple IDs D being monitored by a UE E.

    We consider the multiple-input single-output (MISO)IoT architecture shown in Fig.1 [21].Here,we assume that the considered model is applied in a mountain or forest area where the prevalence of Wi-Fi and Bluetooth signals is low.This is a practical assumption for scenarios at borders where surveillance activities are often conducted.In particular,we address a practical scenario [4],[13] in which a GBS needs to send information to multiple IDs.Due to the presence of obstacles (e.g.,mountains,forests,or buildings)and the distances involved,a UR is utilized to help the GBS forward the information to the IDs using non-orthogonal multiple access(NOMA).The IDs are randomly divided into multiple orthogonal pairs,and NOMA is implemented between each pair[22],[23].Without loss of generality,it is assumed that theqth ID (Dq)andn-th ID (Dn)are paired to perform NOMA transmission,whereDqis located farther from the UR thanDnis,i.e.,.

    Furthermore,an unknown UAV (referred to as a UE)that attempts to join the legitimate system with the intent of stealing information is also considered [13].To identify the UE,a UAV (referred to as a UJ)is deployed.This UAV serves two purposes:first,cooperating with the UR to serve as a form of A-IDS for identifying the UE,and second,combating this enemy by emitting artificial noise signals to improve the security of the confidential signals.In addition,due to the limited energy resources of the UR and UJ,a PB is employed that transmits a dedicated RF signal to provide the energy needed for the legitimate UAVs to communicate with multiple IDs [24].

    Note that the IDs are each equipped with a single antenna due to their size and capability limitations,while each component of the A-IDS (i.e.,the UR and UJ)has multiple omnidirectional antennas for detecting the presence of UE signals and a mechanically agile antenna for identifying the direction of the UE [16].Furthermore,the UE is also equipped with multiple antennas to easily steal confidential signals [13],while the PB has multiple antennas to enhance the EH performance at the legitimate UAVs [25].The main notations employed to describe the system model are listed in Table I.

    B.Channel Assumptions

    In this subsection,two types of channels for UAV communications are introduced:a ground-to-air or air-toground channel and an air-to-air channel.Without loss of generality,all channels are assumed to be mutually independent [6],[20] and are described using the notation defined in Table I.

    TABLE I NOTATIONS

    1)Air-to-Air Channel:Adopting the method of [26],the path loss of an air-to-air channel in units of dB is formulated as

    wherea∈{RE,JE},da∈{dRE,dJE},and ηaand ?aare the path-loss exponent and the path loss at a chosen reference point,respectively,of the air-to-air link.Furthermore,because there are no obstacles in the sky,the air-to-air channel is described by the Friis free-space transmission formula [6],i.e.,ηa=2 and ?a=10log10(4πf/c)2,wherec=3×108m/s andfis the carrier frequency.Thus,the model for the absolute value of the air-to-air path loss is expressed as

    2)Ground-to-Air Channel:Similarly,the path loss of a ground-to-air channel in units of dB is given as

    whereb∈{S R,S J,BR,RD},db∈{dSR,dSJ,dBR,dRD},and ηband ?bare the path-loss exponent and the path loss at a chosen reference point,respectively,of the ground-to-air link.Furthermore,the model for the absolute value of the groundto-air path loss is expressed as

    where μb=.According to [9],[20],a ground-to-air channel is more likely to be dominated by either line-of-sight(LoS)or non-line-of-sight (NLoS)conditions depending on the environment (e.g.,rural,urban,or dense urban).Thus,ηb=2,and the quantity μbis formulated as [26]

    whereθis the UAV elevation angle with respect to either the GBS or ID,i.e.,θ ∈{θBR,θRDq,θRDn};φandψare constants that depend on the environment (rural,urban,or dense urban)[27];and ωLoSand ωNLoSare environment-and frequencydependent parameters that represent the excess path losses of LoS and NLoS links,respectively,as a result of shadow fading [27].This model can be applied to the channels between the GBS and the UR,between the UR and the IDs,between the PB and the UR,and between the PB and the UJ.

    Furthermore,due to the unknown nature of the UE,imperfect CSI is considered for the UE-UR and UE-UJ links,i.e.,,and,andare the channel coefficients estimated by using the MMSEs forgER,gRE,gEJ,andgJE,respectively,andeER,eRE,eEJ,eJE~CN(0,?e),with?ebeing the correctness of the channel estimation and CN(0,?e)being a scalar complex Gaussian distribution with zero mean and variance ?e[28]–[31].In addition,we assume that the ground-to-air,air-to-ground,and air-to-air channel gains are modeled as the gains of Nakagami-mfading channels with a fading severity parametermXY[2],i.e.,the channel gains are random variables (RVs)distributed following a gamma distribution.Thus,the PDF and CDF of the channel gaingXYare formulated as [32]

    wheregXYis an RV with a mean value ofand Γ(·)is the gamma function.

    C.Communication Protocol

    We propose a communication protocol that consists of two phases,as follows:

    1)In practice,the UE will need to exchange some messages,either with its controller or with other outside devices.This means that the UE in this case is a semipassive device that occasionally sends a signal to its controller,and thus,it can be detected.It should be noted that the case in which other interferences exist is not considered in the scope of this paper,and our system model is applicable to scenarios such as mountain or forest areas,with a low prevalence of Wi-Fi and Bluetooth signals [33].Therefore,in the first phase αT,i.e.,the detection and EH phase,each legitimate device switches its listening status to“on”at a selected omnidirectional antenna with the purpose of detecting a signal from a UE.Thus,the UR and UJ attempt to identify whether a UE signal is present [33].We consider the case in which a UE is detected,which means that the UR and UJ each receive the signal from the UE as follows:

    where θRand θJare obtained as previously described and.By solving these equations,the UR-to-UE and UJ-to-UE distances are obtained.Furthermore,the signal-to-noise ratios (SNRs)for decoding the unique signal from the UE at the UR and UJ are formulated as follows [18]:

    Notably,we consider the case in which the energy resources of the legitimate UAVs are limited [12],[34].Thus,to prolong their lifetimes,the UR and UJ must harvest energy from the PB via wireless power transfer (WPT),i.e.,the amounts of energy harvested by the UR and UJ in the first phase αTcan be formulated as [24],[35]

    Note that from the UE activity model,if αTand βTdenote the detection time for the first phase and the communication time for the second phase,respectively,within the frame durationT(as shown in Fig.3),then the a posteriori probabilities can be expressed as [39]

    Fig.2.Localizing the UE.

    Fig.3.The proposed communication protocol with time splitting in EH for detection,EH,and information processing.

    2)In the second phase βT,i.e.,the communication phase,the cooperative communication process is divided into two subphases that occupy equal parts of the remaining time duration,i.e.,with lengths of βT/2 [40].

    i)In the first subphase,the GBS transmits a superimposed mixed signalxS=to the UR using transmit antenna selection (TAS)[21],wherexqandxnare the signals to be received byDq(far ID)andDn(near ID),respectively,and ?qand ?nare power allocation coefficients that satisfy the conditions ?q+?n=1 and ?q>?n[23].Therefore,the signal received at the?-th antenna of the UR in the first subphase is expressed as [37],[41]

    Next,R?subtracts the message for the far ID to obtain that for the near ID.Here,it is assumed that by adopting the successive interference cancellation (SIC)method proposed in[29],[42],R?can successfully decodexq.Thus,the SINR atR?for detectingxnfrom the GBS can be formulated as

    ii)In the second subphase,to improve the throughput,the UR applies the decode-and-forward (DF)technique to decode the superimposed signal [21] and chooses 1 antenna for forwarding this signal to the IDs using the energy harvested in the first subphase,PR=ER/βT/2 [21].Furthermore,due to the broadcast nature of the signal,the UE can steal the superimposed signal from the UR.Thus,the UJ is utilized to combat the UE (identified in the detection phase)by emitting a jamming signalxJ.Here,the legitimate devices initially synchronize with each other by generating and indexing the same set of Gaussian pseudorandom jamming signals [43].Thus,the IDs can disregard the interference signal,while the UE receives both the confidential signal and the jamming signal.Accordingly,the received signals at theσ-th ID and the UE can be expressed as

    Similarly,the UE uses the NOMA technique to detectxqandxn.Therefore,the received SINRs atEκfor decodingxqandxnare expressed as

    where PJ=EJ/βT/2.

    IV.OpTIMAL ALTITUDE OF THE UJ FOR DETECTING A UE

    In this section,the probability of UE detection is analyzed.This metric is defined as the probability that the UR or UJ successfully decodes the unique signal from the UE in the first phase.Specifically,by combining the a posteriori probabilities of detection with the maximal capacity received atR?andJv,which should be greater than the target rate,the DP can be expressed as follows:

    where Pr{·} is a probability function,δDis the target rate,and the channel capacities fromEκtoand fromEκtoJvare defined as

    whereWis the bandwidth.It should be noted that the UR and UJ each need to choose the best antenna for receiving the UE’s signal to enhance the DP,i.e.,

    Lemma 1:The DP for the UE is expressed as follows:

    where ?ERand ?EJare defined as follows:

    The proof is given in Appendix A.

    V.SYSTEM PERFORMANCE ANALYSIS

    A.Throughput

    Communication transmission may be interrupted if the endto-end SINR that is achieved for an ID is below a certain outage threshold.Therefore,the OP of an ID can be defined in terms of an outage threshold,,as follows:

    where the channel capacities fromSmtoR?and fromR?toDσare defined as

    Here,the antennas of the GBS and UR that are selected in the first subphase are chosen to improve the system performance based on the best GBS-to-UR channel gain,as follows:

    Moreover,to ensure that all IDs can receive their confidential messages,the antenna of the UR that is selected in the second subphase is chosen to maximize the channel gain from the UR to the farthest user,i.e.,

    Lemma 2:The OP of theq-th andn-th ID is expressed as

    The proof is given in Appendix B.

    Based on lemma 2,the throughput of theσ-th ID is formulated as follows [44]:

    B.IPs for xq and xn

    To analyze the leakage of confidential packets,the IP is investigated.This metric is the probability that the channel capacity at the UE is larger than a certain positive threshold,,and can be expressed as [18]

    Furthermore,to improve the IP,the UE chooses the best antenna to steal the UR’s signal,i.e.,

    Lemma 3:The IP at the UE for stealing the message intended for the σ-th ID is expressed as

    The proof is given in Appendix C.

    C.Strategy for Enhancing the Security and System Performance of an IoT System in the Presence of a UE

    Remark 1:The models of the path losses from the GBS to the UR and from the UR to the IDs are functions of the altitudehRin the form of the angles of elevation θBR,θRDq,and θRDn,as shown in (5).IncreasinghRwill make the corresponding ground-to-air and air-to-ground links closer to LoS links but will also increase the path losses.Thus,there may exist an optimal altitude of the UR to achieve the best throughput [26].Furthermore,the DP for a UE is small when the altitude of the UJ is low due to the long distance from the UJ to the UE.Thus,the value of the function D in (34)will be increased if the UJ flies higher.However,if the altitude of the UJ is too high,the function D will begin to decrease again,i.e.,there exists an optimal altitude for the UJ such that the DP for the UE reaches a maximum value.Therefore,to enhance the security and system performance,we first determine the optimal altitude of the UR to achieve the best system performance because the throughput is not a function of the altitudehJ.Then,the optimal altitude of the UJ is determined.However,it is challenging to derive closed-form expressions for these two optimal points because of the complexity of the objective function.Therefore,we propose an algorithm for determining the specific altitudes of the UJ and UR that will yield the maximum D and T,respectively.We substitute various altitudes of UJ and UR into (34)and (46)until the best D and T,respectively,are achieved.These two optimal points are then output,as shown in Algorithm 1,with a time complexity ofO(length(hR)n2)+O(length(hJ)n2).

    Remark 2:Based on the communication protocol,we predict that as the detection time (i.e.,the EH time)increases,the DP for a UE will increase,while the throughput will decrease.Thus,there is a trade-off between the detection performance and the throughput.However,as the detection time increases,the transmission power at the UR will also increase because a larger amount of energy is harvested.The throughput decreases when the EH time of the UR is too long because the remaining time for transmission is insufficient for achieving the expected throughput.Thus,an optimal detection time can be chosen to resolve this trade-off and achieve the best system performance.Similar to the case of Algorithm 1,it is impossible to obtain a closed-form expression for the optimal α due to the exponential function.Thus,various detection times are substituted into (46)until the best T is achieved,and the optimal result is then output,as shown in Algorithm 2,with a time complexity ofO(length(α)n2).

    VI.NUMERICAL RESULTS

    In this section,numerical results are presented to analyze the probability of UE detection,the IP,and the throughput for the considered IoT architecture.In particular,we consider the impacts of the UAVs’ altitudes,the EH time (α),the correctness of channel estimation (?e),and the number of GBS antennas (M)on the DP for the UE (D)as well as the IP(I(σ))and throughput (T(σ),in bits/sec/Hz)for theσ-th ID.

    Unless otherwise stated,we investigate the considered system with the following system parameters,which are used for both analysis and simulation [26],[29],[42].We set the carrier frequency tofc=2 GHz,the angles to θR=30?and θJ=50?,the fading parameters tomSR=mRE=mJE==2,and the EH efficiency coefficient to δ=0.8.The EH time fraction is chosen as α ∈(0,1),ρB,ρS,ρE∈[0,50](dB),andhR,hJ∈[0,50].The coordinates of the UR,UJ,and PB areR(5,15,hR),J(40,50,hJ),andB(5,5,0),respectively.The system bandwidth isW=100 MHz;the detection threshold is δD=1;the thresholds of the IDs for successfully decodingxqandxnare=1 and=2,respectively;and the intercept thresholds for stealingxqandxnare=1 and,respectively.The number of antennas of the PB isH=2,and the numbers of antennas of the GBS,UR,UJ,and UE are chosen asM,A,V,K∈{1,2,3}.Furthermore,we investigate the case in which the IoT architecture operates in an urban environment with parameters of φ=9.6177,ψ=0.1581,ωLoS=1,and ωNLoS=20 [45].

    As shown in Figs.4–12,the theoretical results agree with the results of the Monte Carlo simulations,thus verifying the accuracy of our analysis.To investigate the impacts of various important parameters on the system and secrecy performance,we select three parameters in particular:the altitudes of the UAVs,the detection time,and the power allocation level.More generally,we analyze the optimal altitudes of the UR and UJ in reference to Figs.4–6,and the trade-off between the detection time and the communication time is discussed in reference to Figs.7–9.Finally,the variations in the DP,IP,and throughput with different transmit SNRs are investigated based on Figs.10–12.

    Fig.4.The effects of the UR’s altitude and the channel estimation correctness on the throughput.

    Fig.5.The effects of the UJ’s altitude and the UR’s altitude on the DP.

    Fig.6.The effects of the UJ’s altitude and the channel estimation correctness on the DP.

    Fig.7.The effects of the detection time and channel estimation correctness on the DP.

    Fig.8.The effects of the detection time and channel estimation correctness on the IP.

    Figs.4–6 show how the altitudes of the UAVs affect the throughputs ofDqandDnand the DP for the UE with different values of the channel estimation correctness when the numbers of antennas areM=2 for the GBS,A=2 for the UR,V=2 for the UJ,andK=2 for the UE.Several observations can be made.First,in Fig.4,whenhRis small,the throughput is low because when the altitude of the UR is low,obstacles are densely present,i.e.,the probability of NLoS conditions is high,which leads to low throughput.The throughput increases when the UR flies higher.However,once the UR flies above a certain moderate altitudehR=20,the throughput will again decrease,which is reasonable because a higher altitude also leads to greater path loss.Furthermore,the throughputs ofDqandDnunder the NOMA scheme outperform those under the orthogonal multiple access(OMA)scheme because the UR sends information only to eitherDqorDnin time blockTin the OMA scheme,while the UR simultaneously sends information to bothDqandDnin the NOMA scheme [46].Therefore,the channel capacities ofDqandDnunder the NOMA scheme are higher than those under the OMA scheme.This observation also applies for the remaining simulations.

    Fig.9.The effects of the detection time and channel estimation correctness on the throughput.

    Fig.10.The effects of the transmit SNRs and the numbers of antennas of the UR and UJ on the DP.

    Second,Fig.5 shows the effects ofhJandhRon the DP when the coordinates are set toDq(20,25,0) andDn(10,15,0).The DP is better with a higherhRbecause when the UR is closer to the UE,the DP for the UE will improve.However,a higherhRalso leads to lower throughput (refer to Fig.6).Thus,there is a trade-off between throughput and secrecy performance.Therefore,based on a moderate altitudehR,Fig.6 shows the optimal power for maximizing the DP at a moderatehJ.Similar to Fig.4,either an excessively low or excessively high altitude of the UJ leads to a small probability of detecting the UE because of the high path loss.These results are consistent with Remark 1.Therefore,by using Algorithm 1 to determine the optimal altitudeshRandhJ,the system and secrecy performance can be improved.

    Fig.11.The effects of the transmit SNRs and the numbers of antennas of the GBS and UR on the throughput.

    Fig.12.The effects of the transmit SNRs and the numbers of antennas of the UE on the IP.

    Third,the throughput of and DP for the UE become less desirable as the channel estimation correctness ?eincreases in both Figs.4 and 6.The main reason is that the channel estimation correctness essentially acts as a source of interference.Correspondingly,a larger ?eyields lower SINRs at the UR and IDs,leading to low throughput and a low DP.This observation also applies to Figs.7–9.

    Figs.7–9 illustrate the DP,IP,and throughput versus the detection time withM=A=V=K=2.First,Figs.7 and 8 show that a higherαleads to a higher DP and a lower IP.As the detection time increases,the UR and UJ have more time to detect the UE,which causes the DP to increase.Simultaneously,the time available for data stealing decreases,which leads to a reduction in the IP.

    Second,Fig.9 shows that an increase inαinitially leads to higher throughput;however,once the throughput reaches an optimal value corresponding to a certain detection time(α=0.3),this metric will begin to decrease.This behavior occurs because a longer detection time means that the duration for EH is also increased.With an increasing EH duration,the transmit power at the UR increases,which leads to a higher throughput;however,when the EH time is excessive,the time available for data exchange is too short.As a result,the considered system ultimately has low throughput because the IDs cannot successfully detect their messages.This finding is consistent with Remark 2.Thus,Algorithm 2 can be applied to achieve the optimal throughput for the IDs.

    Third,the user throughput of then-th ID is observed to be better than that of theq-th ID in Fig.9.This result can be explained by the fact that the far user suffers a larger path loss than the near user.Fourth,similar to the third observation,the IP ofDqis higher than that ofDn.These two observations also apply for Figs.11 and 12.

    Figs.10–12 depict the DP,throughput,and IP as functions of the transmit SNRs of the UE and PB for different numbers of antennas of the GBS,UR,and UE.Several observations can be made.First,the DP,throughput,and IP increase as the transmit SNRs of the UE and PB increase.Second,the throughput initially increases and then remains at a stable level with an increasing SNR because the UR applies the DF relaying technique,i.e.,the end-to-end SINR atDσis the minimum of the SINR at the UR and that atDσ.Thus,as the SNR increases,the EH at the UR increases,which leads to a higher SINR at theσ-th ID.Once the SINR atDσis higher than that at the UR,the end-to-end SINR atDσis simply calculated as the SINR at the UR,i.e.,the SNR of the PB does not impact the throughput.Third,with increases inMandA,the DP improves for anyVandK.Furthermore,the throughput for transmission significantly increases as the number of antennas of the UJ increases for anyKandV.More antennas enable greater diversity gain,which leads to a higher DP and higher throughput.Similarly,the IP increases with a greater number of antennas on the UE forA=2 andM=2.This result indicates that legitimate relaying transmissions are more vulnerable to eavesdropping with a larger number of antennas on the UE.

    VII.CONCLUSIONS

    This paper has investigated the detection,secrecy,and system performance (i.e.,the DP,IP,and throughput,respectively)of an EH IoT architecture using a proposed form of A-IDS in the presence of an unknown UE.The proposed AIDS includes two components,namely,a UR and a UJ,which cooperate to detect the presence of the UE.The UR applies WPT and the DF technique to send information to the IDs,while the UJ emits artificial noise to support the confidentiality of this communication.Accordingly,a closedform expression for the DP for the UE has been derived.Furthermore,closed-form expressions for the information leakage probability in terms of the IP and the message throughput for a pair of IDs have been obtained.Based on the DP and throughput,an algorithm has also been proposed for determining the optimal altitudes of the UR and UJ to achieve the best throughput subject to a secrecy constraint.The theoretical analyses of the DP for the UE,the IP,and the throughput have been validated against the results of Monte Carlo simulations.The numerical results show that the proposed EH IoT architecture can not only detect an unknown UAV but also achieve satisfactory system performance given secrecy constraints.In our future work,we will investigate a model that utilizes artificial intelligence for UE detection in the presence of other sources of interference for application in broader scenarios.

    APPENDIX A PROOF OF LEMMA 1

    In accordance with the characteristics of probability,the UE DP can be rewritten as

    Furthermore,due to the independence of the RVs,(51)can be expressed as

    where χD=?1.By substituting (12),(13),(32),and(33)into (52),we obtain the expression for D given in (53),where ρE=PE/N0.

    Based on the CDF defined in (7),the UE DP is derived as shown in (34). ■

    APPENDIX B PROOF OF LEMMA 2

    By substituting (21),(22),(25),and (26)into (37),the OPs ofDqandDncan be rewritten as shown in (54)and (55),respectively,where?1.Due to the independence of the RVs and based on the properties of probability,the functions (54)and (55)can be formulated as

    with ?q>χO?n;otherwise,O(q)=0.Next,by adopting the CDF defined in (7),the OPs ofDqandDnare derived as shown in (42),where,andare defined as

    APPENDIX C PROOF OF LEMMA 3

    Similar to Appendix B,by substituting (21),(27),and (28)into (47)and performing some mathematical manipulations,we obtain the probabilities I(q) and I(n),as shown in (62)and(63),whereand ρJ=.In addition,the probabilitycan be obtained by using the same approach applied to obtain (42)as follows:

    with ?q>χI?n;otherwise,.Here,andare defined as

    By considering the properties of probability and applying[47,(1.111)],the probabilitiesandcan be rewritten as shown in (67),with ?q>χI?n;otherwise,.In this expression,are defined as

    We use [47,(3.381.4)] to solve the integral to obtain I(q),as shown in (50). ■

    亚洲av电影不卡..在线观看| 人人妻人人澡欧美一区二区| 国产精品三级大全| 久久九九热精品免费| 久久草成人影院| 国产精品人妻久久久久久| 亚洲中文字幕一区二区三区有码在线看| www日本黄色视频网| 久久久久久大精品| 一本一本综合久久| 国产成人啪精品午夜网站| 亚洲,欧美,日韩| 嫩草影视91久久| 日本精品一区二区三区蜜桃| 欧美xxxx黑人xx丫x性爽| 特大巨黑吊av在线直播| 成人高潮视频无遮挡免费网站| 国产精品久久久久久亚洲av鲁大| 亚洲熟妇熟女久久| 国产精品美女特级片免费视频播放器| 窝窝影院91人妻| 国产极品精品免费视频能看的| 久久婷婷人人爽人人干人人爱| 狠狠狠狠99中文字幕| 一级a爱片免费观看的视频| 久久精品影院6| 亚洲欧美清纯卡通| 老女人水多毛片| h日本视频在线播放| 亚洲精品日韩av片在线观看| 制服丝袜大香蕉在线| 在线免费观看不下载黄p国产 | 免费在线观看日本一区| 每晚都被弄得嗷嗷叫到高潮| 九九久久精品国产亚洲av麻豆| 成人午夜高清在线视频| 在线播放国产精品三级| 亚洲电影在线观看av| 九九久久精品国产亚洲av麻豆| 色播亚洲综合网| 免费在线观看亚洲国产| 国产精品人妻久久久久久| 日韩人妻高清精品专区| 亚洲自偷自拍三级| 成年人黄色毛片网站| 高清在线国产一区| 成年版毛片免费区| 国产欧美日韩一区二区三| 老鸭窝网址在线观看| 国产成人欧美在线观看| 亚洲国产日韩欧美精品在线观看| 亚洲 国产 在线| 国产精品三级大全| 成年免费大片在线观看| 看十八女毛片水多多多| 国产精品一及| 欧美色视频一区免费| 成人美女网站在线观看视频| ponron亚洲| 床上黄色一级片| 99在线视频只有这里精品首页| 久久国产精品人妻蜜桃| 欧美三级亚洲精品| 琪琪午夜伦伦电影理论片6080| 国产人妻一区二区三区在| 国产色婷婷99| 成人av一区二区三区在线看| 乱人视频在线观看| 欧美3d第一页| 免费无遮挡裸体视频| 亚洲精品成人久久久久久| 嫩草影院新地址| 夜夜夜夜夜久久久久| a级一级毛片免费在线观看| 欧美日韩黄片免| 色吧在线观看| 可以在线观看的亚洲视频| 淫妇啪啪啪对白视频| av福利片在线观看| 国产伦精品一区二区三区视频9| 免费人成视频x8x8入口观看| 久久人妻av系列| 日本黄色视频三级网站网址| 亚洲av免费在线观看| 午夜精品在线福利| 亚洲成av人片在线播放无| 神马国产精品三级电影在线观看| 日本a在线网址| 国产精品久久久久久久久免 | 在线免费观看的www视频| 国模一区二区三区四区视频| 久久久久精品国产欧美久久久| 亚洲经典国产精华液单 | 久久国产精品人妻蜜桃| 两个人的视频大全免费| 亚洲内射少妇av| 成人性生交大片免费视频hd| 日韩国内少妇激情av| 丁香欧美五月| 91久久精品国产一区二区成人| 亚洲av电影不卡..在线观看| 麻豆成人av在线观看| 国产91精品成人一区二区三区| 国产精华一区二区三区| 亚洲在线观看片| 一区二区三区激情视频| 久久久久久久久大av| 欧美成人一区二区免费高清观看| 国产欧美日韩精品一区二区| 2021天堂中文幕一二区在线观| 久久精品夜夜夜夜夜久久蜜豆| 亚洲av熟女| 简卡轻食公司| 成人一区二区视频在线观看| 久久国产乱子伦精品免费另类| 最近中文字幕高清免费大全6 | 又黄又爽又刺激的免费视频.| 久久精品91蜜桃| 哪里可以看免费的av片| 久久久国产成人精品二区| 在线十欧美十亚洲十日本专区| 午夜a级毛片| 日韩高清综合在线| 午夜精品一区二区三区免费看| 国产爱豆传媒在线观看| 日韩欧美免费精品| 99久久成人亚洲精品观看| 亚洲中文字幕一区二区三区有码在线看| 国产一区二区在线av高清观看| 18禁黄网站禁片午夜丰满| 在线观看舔阴道视频| 久久国产乱子免费精品| 美女cb高潮喷水在线观看| 免费人成在线观看视频色| 亚洲精品在线观看二区| 欧美zozozo另类| 亚洲天堂国产精品一区在线| 成人毛片a级毛片在线播放| 综合色av麻豆| 在线播放国产精品三级| 亚洲精品亚洲一区二区| 亚洲精品影视一区二区三区av| 老女人水多毛片| 午夜福利高清视频| 成人午夜高清在线视频| av专区在线播放| 日本与韩国留学比较| 久久久久久久精品吃奶| 九色国产91popny在线| 在线观看av片永久免费下载| 女人十人毛片免费观看3o分钟| 99久久成人亚洲精品观看| 国产免费一级a男人的天堂| 久久精品综合一区二区三区| 免费黄网站久久成人精品 | 中文字幕精品亚洲无线码一区| 伊人久久精品亚洲午夜| 长腿黑丝高跟| 一卡2卡三卡四卡精品乱码亚洲| 日本 欧美在线| 午夜精品一区二区三区免费看| 此物有八面人人有两片| 99国产精品一区二区蜜桃av| 啦啦啦韩国在线观看视频| av在线观看视频网站免费| 成人午夜高清在线视频| 看片在线看免费视频| 深夜a级毛片| 中亚洲国语对白在线视频| 夜夜躁狠狠躁天天躁| 午夜福利在线在线| 亚洲五月婷婷丁香| 18+在线观看网站| 亚洲国产精品999在线| 欧美成人一区二区免费高清观看| 韩国av一区二区三区四区| 精品久久久久久久久亚洲 | 国产色爽女视频免费观看| 大型黄色视频在线免费观看| 国产精品久久视频播放| 99久久99久久久精品蜜桃| 中文字幕人成人乱码亚洲影| 日韩亚洲欧美综合| 国产精品一区二区三区四区免费观看 | 日韩大尺度精品在线看网址| 久久精品久久久久久噜噜老黄 | 久久久精品大字幕| 久久国产乱子免费精品| 午夜福利视频1000在线观看| 亚洲最大成人中文| 波多野结衣高清作品| 日本黄色片子视频| 在线观看免费视频日本深夜| 淫秽高清视频在线观看| 尤物成人国产欧美一区二区三区| 好男人电影高清在线观看| 亚洲国产精品成人综合色| 淫妇啪啪啪对白视频| 无遮挡黄片免费观看| 99riav亚洲国产免费| 免费一级毛片在线播放高清视频| 亚洲美女视频黄频| 97超级碰碰碰精品色视频在线观看| av天堂中文字幕网| 制服丝袜大香蕉在线| 国产aⅴ精品一区二区三区波| 久久精品人妻少妇| 成人无遮挡网站| 成人精品一区二区免费| 宅男免费午夜| 欧美成人免费av一区二区三区| 日韩中文字幕欧美一区二区| 免费看美女性在线毛片视频| 国产 一区 欧美 日韩| 国产精品久久久久久亚洲av鲁大| 久久九九热精品免费| 欧美激情国产日韩精品一区| 麻豆国产97在线/欧美| 中出人妻视频一区二区| 久久欧美精品欧美久久欧美| 十八禁人妻一区二区| 91九色精品人成在线观看| 丰满的人妻完整版| 一级av片app| 国产极品精品免费视频能看的| 一个人免费在线观看电影| 国产在线精品亚洲第一网站| 色噜噜av男人的天堂激情| 日韩亚洲欧美综合| 小说图片视频综合网站| 欧美性感艳星| 免费一级毛片在线播放高清视频| 99热只有精品国产| 校园春色视频在线观看| ponron亚洲| 日本 欧美在线| 99久久99久久久精品蜜桃| 宅男免费午夜| 99热这里只有精品一区| 午夜福利在线在线| av女优亚洲男人天堂| 白带黄色成豆腐渣| 超碰av人人做人人爽久久| 国产在线精品亚洲第一网站| 99久久精品热视频| 亚洲一区高清亚洲精品| 久久欧美精品欧美久久欧美| 亚洲国产色片| 全区人妻精品视频| 男女视频在线观看网站免费| 一本综合久久免费| 欧美性猛交黑人性爽| 国产av一区在线观看免费| 人人妻,人人澡人人爽秒播| 男插女下体视频免费在线播放| 国产免费男女视频| 亚洲狠狠婷婷综合久久图片| 成人美女网站在线观看视频| 国产精品久久久久久精品电影| 国产69精品久久久久777片| 999久久久精品免费观看国产| 最近中文字幕高清免费大全6 | 亚洲欧美日韩东京热| 国产av不卡久久| 欧美高清性xxxxhd video| 又粗又爽又猛毛片免费看| a在线观看视频网站| 搞女人的毛片| 噜噜噜噜噜久久久久久91| 十八禁国产超污无遮挡网站| 男女做爰动态图高潮gif福利片| 精品无人区乱码1区二区| 久久精品91蜜桃| 欧美在线一区亚洲| 在线十欧美十亚洲十日本专区| 亚洲av日韩精品久久久久久密| 尤物成人国产欧美一区二区三区| 午夜福利欧美成人| 国产成人欧美在线观看| 自拍偷自拍亚洲精品老妇| 日韩亚洲欧美综合| 成年女人看的毛片在线观看| 欧美zozozo另类| 在线观看舔阴道视频| 久久人人爽人人爽人人片va | 国产真实伦视频高清在线观看 | 国产欧美日韩精品一区二区| 精品午夜福利在线看| 亚洲不卡免费看| 村上凉子中文字幕在线| 成人av在线播放网站| 一级黄色大片毛片| 成人午夜高清在线视频| 国产精品乱码一区二三区的特点| 免费观看人在逋| 真人做人爱边吃奶动态| 一二三四社区在线视频社区8| 日韩欧美在线二视频| 深夜a级毛片| 狂野欧美白嫩少妇大欣赏| 久久精品91蜜桃| 日本 欧美在线| 欧美绝顶高潮抽搐喷水| 黄色视频,在线免费观看| 怎么达到女性高潮| 美女高潮喷水抽搐中文字幕| 国产大屁股一区二区在线视频| 亚洲国产精品999在线| 99热6这里只有精品| 日本黄大片高清| 精品久久久久久久末码| 老熟妇乱子伦视频在线观看| 国产黄色小视频在线观看| 国产在线男女| 久久久久久国产a免费观看| 国产高清三级在线| 亚州av有码| 别揉我奶头 嗯啊视频| 国产午夜精品久久久久久一区二区三区 | 久久精品国产亚洲av天美| 深夜a级毛片| 午夜激情欧美在线| 亚洲精品亚洲一区二区| 精品无人区乱码1区二区| 一进一出抽搐gif免费好疼| 18禁裸乳无遮挡免费网站照片| 欧美精品啪啪一区二区三区| 嫩草影院新地址| 欧美日韩国产亚洲二区| 制服丝袜大香蕉在线| 亚洲午夜理论影院| 噜噜噜噜噜久久久久久91| 国产伦精品一区二区三区四那| 亚洲熟妇中文字幕五十中出| 99精品在免费线老司机午夜| 我的女老师完整版在线观看| 老女人水多毛片| www.色视频.com| 午夜福利成人在线免费观看| 国内揄拍国产精品人妻在线| 国产v大片淫在线免费观看| 色在线成人网| 国产日本99.免费观看| 又粗又爽又猛毛片免费看| 国产人妻一区二区三区在| 国产一区二区三区视频了| 性色avwww在线观看| 波野结衣二区三区在线| 午夜福利在线观看吧| 国产毛片a区久久久久| 在线观看美女被高潮喷水网站 | 国产精品一区二区三区四区久久| 久久人妻av系列| 欧美午夜高清在线| 国产又黄又爽又无遮挡在线| 国产成年人精品一区二区| 真实男女啪啪啪动态图| 深夜精品福利| 怎么达到女性高潮| 国产成人福利小说| 国产激情偷乱视频一区二区| 久久久久久久午夜电影| 中文字幕av在线有码专区| 亚洲精品粉嫩美女一区| 麻豆一二三区av精品| 国产黄a三级三级三级人| 天堂网av新在线| 97超视频在线观看视频| 免费观看精品视频网站| 久久精品综合一区二区三区| 在线播放无遮挡| 亚洲最大成人av| 在线国产一区二区在线| av在线天堂中文字幕| 搡老熟女国产l中国老女人| av在线天堂中文字幕| 搡老熟女国产l中国老女人| av在线天堂中文字幕| 搡老熟女国产l中国老女人| 俄罗斯特黄特色一大片| 亚洲欧美日韩东京热| 日日干狠狠操夜夜爽| 亚洲国产精品合色在线| 亚洲精品影视一区二区三区av| 国产乱人伦免费视频| 国产精品久久久久久人妻精品电影| 激情在线观看视频在线高清| 午夜福利在线观看吧| 女同久久另类99精品国产91| 毛片女人毛片| 成人av一区二区三区在线看| 一级黄片播放器| 免费看a级黄色片| 亚洲成a人片在线一区二区| 欧美日本亚洲视频在线播放| 老司机福利观看| 一区福利在线观看| 日韩欧美国产在线观看| 亚洲熟妇中文字幕五十中出| 少妇的逼水好多| 综合色av麻豆| 国产探花极品一区二区| 免费人成视频x8x8入口观看| 久久香蕉精品热| 午夜免费激情av| 亚洲精品在线美女| 亚洲国产色片| 亚洲精品一区av在线观看| 久久99热6这里只有精品| 国产真实伦视频高清在线观看 | 婷婷亚洲欧美| 俺也久久电影网| 亚洲中文字幕一区二区三区有码在线看| 久久久色成人| 91午夜精品亚洲一区二区三区 | 国产亚洲精品综合一区在线观看| 一级毛片久久久久久久久女| 黄色配什么色好看| 一区二区三区免费毛片| 熟女电影av网| 午夜精品在线福利| 两个人的视频大全免费| 少妇人妻精品综合一区二区 | 99国产综合亚洲精品| 午夜视频国产福利| 一个人免费在线观看电影| 成人国产综合亚洲| 最后的刺客免费高清国语| 国产精品久久久久久久电影| 99精品久久久久人妻精品| 大型黄色视频在线免费观看| 男人狂女人下面高潮的视频| 国产高清激情床上av| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | a在线观看视频网站| 久久国产精品影院| 18美女黄网站色大片免费观看| 成人特级黄色片久久久久久久| 给我免费播放毛片高清在线观看| 成人av一区二区三区在线看| 99热这里只有是精品在线观看 | 亚洲在线观看片| 成年女人永久免费观看视频| 亚洲,欧美,日韩| 欧美在线一区亚洲| 亚洲第一区二区三区不卡| 精品人妻熟女av久视频| 2021天堂中文幕一二区在线观| 欧美成人免费av一区二区三区| 久久99热这里只有精品18| 十八禁国产超污无遮挡网站| 欧美性猛交黑人性爽| 国产免费男女视频| 最后的刺客免费高清国语| 1000部很黄的大片| 亚洲一区高清亚洲精品| 丰满的人妻完整版| 日日摸夜夜添夜夜添小说| 亚洲狠狠婷婷综合久久图片| 亚洲av五月六月丁香网| 男人和女人高潮做爰伦理| 大型黄色视频在线免费观看| 亚洲第一欧美日韩一区二区三区| 色吧在线观看| 亚洲中文日韩欧美视频| 久久久久久久精品吃奶| 亚洲中文字幕一区二区三区有码在线看| 亚洲人与动物交配视频| 3wmmmm亚洲av在线观看| 99热这里只有是精品50| 嫩草影院精品99| 国内精品一区二区在线观看| 青草久久国产| 日韩欧美国产一区二区入口| 特大巨黑吊av在线直播| 欧美黑人欧美精品刺激| 久久久久久久久中文| 日本a在线网址| 久久香蕉精品热| 日韩 亚洲 欧美在线| 日韩欧美精品v在线| 在线播放国产精品三级| 国产一区二区亚洲精品在线观看| 亚洲欧美日韩东京热| 久久久久九九精品影院| 国产三级中文精品| 99久国产av精品| 久久中文看片网| 中文字幕高清在线视频| 岛国在线免费视频观看| 国产一级毛片七仙女欲春2| 亚洲人与动物交配视频| 男人舔女人下体高潮全视频| 啦啦啦观看免费观看视频高清| 亚洲av电影在线进入| 黄色配什么色好看| 日韩亚洲欧美综合| 日本与韩国留学比较| 在线播放国产精品三级| 亚洲精品粉嫩美女一区| 国内精品一区二区在线观看| 亚洲五月婷婷丁香| 一进一出抽搐gif免费好疼| 一级av片app| 他把我摸到了高潮在线观看| 精品久久久久久久人妻蜜臀av| 一区二区三区四区激情视频 | 亚洲最大成人av| 免费大片18禁| 在线a可以看的网站| 麻豆成人午夜福利视频| 精品久久久久久久久亚洲 | 日韩中文字幕欧美一区二区| 99久久精品国产亚洲精品| 久久婷婷人人爽人人干人人爱| 久久人妻av系列| 乱人视频在线观看| 精品不卡国产一区二区三区| 热99re8久久精品国产| av欧美777| 窝窝影院91人妻| 欧美成人性av电影在线观看| 国产精品一区二区性色av| 国产成人欧美在线观看| 精品午夜福利在线看| 国产精品99久久久久久久久| 日本一二三区视频观看| 国产野战对白在线观看| 国产大屁股一区二区在线视频| 亚洲av电影在线进入| av福利片在线观看| 免费在线观看亚洲国产| 国产欧美日韩一区二区三| 国产精品人妻久久久久久| 色精品久久人妻99蜜桃| 波多野结衣高清无吗| www.熟女人妻精品国产| 中文字幕熟女人妻在线| 久久香蕉精品热| 亚洲成人久久爱视频| 国产一区二区在线观看日韩| 窝窝影院91人妻| 91久久精品国产一区二区成人| 99久久久亚洲精品蜜臀av| 婷婷丁香在线五月| 亚洲内射少妇av| 婷婷亚洲欧美| 国产精品美女特级片免费视频播放器| 久久精品夜夜夜夜夜久久蜜豆| 国产av麻豆久久久久久久| 亚洲国产精品成人综合色| 日韩免费av在线播放| 内地一区二区视频在线| 欧美性猛交黑人性爽| 在线观看66精品国产| 久久久久性生活片| 在线免费观看的www视频| 欧美+日韩+精品| 久久性视频一级片| 一级a爱片免费观看的视频| 啦啦啦观看免费观看视频高清| 成人午夜高清在线视频| 久久久久久九九精品二区国产| 校园春色视频在线观看| 久久精品综合一区二区三区| 久久国产精品影院| 桃色一区二区三区在线观看| 免费电影在线观看免费观看| 亚洲,欧美,日韩| 好男人在线观看高清免费视频| 国产一区二区在线观看日韩| 精品久久久久久久人妻蜜臀av| 一区二区三区免费毛片| 自拍偷自拍亚洲精品老妇| 久久久久久久亚洲中文字幕 | 亚洲第一区二区三区不卡| 蜜桃亚洲精品一区二区三区| 国产欧美日韩精品亚洲av| 伦理电影大哥的女人| 99热6这里只有精品| 黄片小视频在线播放| 国产成+人综合+亚洲专区| 亚洲av免费高清在线观看| 婷婷色综合大香蕉| 免费一级毛片在线播放高清视频| 一区二区三区免费毛片| 色在线成人网| 99精品在免费线老司机午夜| 最近最新免费中文字幕在线| 精品人妻1区二区| 亚洲av成人精品一区久久| 亚洲av熟女| 男人舔奶头视频| 国产色爽女视频免费观看| 岛国在线免费视频观看| 精品一区二区三区人妻视频| 亚洲一区高清亚洲精品| 丰满人妻一区二区三区视频av| 搡老熟女国产l中国老女人| 午夜老司机福利剧场| 欧美+亚洲+日韩+国产| 国产久久久一区二区三区| 国产一区二区亚洲精品在线观看| 亚洲av二区三区四区| 一进一出抽搐动态| 亚洲片人在线观看| 赤兔流量卡办理| 中亚洲国语对白在线视频| 日韩精品青青久久久久久| 色尼玛亚洲综合影院| 综合色av麻豆| 亚洲成人免费电影在线观看| 色视频www国产| 亚州av有码| 久久精品国产亚洲av涩爱 |