• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems

    2021-12-16 07:52:04ImtisalQadeerandMuhammadKhurramEhsan
    Computers Materials&Continua 2021年5期

    Imtisal Qadeer and Muhammad Khurram Ehsan

    1Ind.Reseacher,Neckarstra?e 244,PLZ:70190,Stuttgart,Germany

    2Zelle Solutions,Office#FF-37,Saima Square,Gulshan-e-Iqbal,Block-10A,Karachi,Pakistan

    3Faculty of Engineering,Bahria University,Lahore Campus,Lahore,Pakistan

    Abstract:To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation (PLKG) tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square (TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibilityof higher informationreuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validatedby observing the relation between signalto-noise ratio (SNR) and the correlation coefficient of the corresponding channel measurements between communicating parties.

    Keywords:Channel measurements;physical layer key generation;channel reciprocity;Internet of things;deconvolution

    1 Introduction

    Next generation of wireless systems specifically 5G,introduces a platform for better exploitation of Internet of Things (IoTs).IoTs do not only require the heterogeneity of the operating devices [1,2],better energy consumption [3]and secure communication are also the major concerns in such wireless systems [4-6].According to some statistical studies such as [7],there will be more than 30 billion devices wirelessly connected to Internet and also with each other too.This colossal network of devices will evidently require some efficient wireless security measures.One of the promising methods for such wireless security is called Physical Layer Key Generation(PLKG) [8-10].The Wire-tap channel model is the first method to prove that secrecy can be obtained by exploiting physical layer properties [11].This method overcomes the discrepancies in initial cryptographic methods such as,exponential operations and computationally bounded security [12].This approach is then used by the authors in [13,14]to design PLKG technique.One of the key benefits of PLKG is to use information theoretic-security for creating cryptographic keys [15,16].The principle model of PLKG includes two legitimate nodes Alice and Bob which need to communicate privately and a third node,Eve,who wants to eavesdrop the communication between Alice and Bob.The legitimate nodes send probe signals to each other in order to learn the channel properties.The data in these signals is known beforehand to both nodes and the variation in the data due to channel profile is learned by exchanging such signals.These channel measurements are used to generate a private key.The intrinsic part of this model is to hide these measurements from Eve.The working of PLKG model is based on following fundamental properties i.e.,channel reciprocity [17,18],temporal and spatial variation.PLKG assumes a reciprocal channel between Alice and Bob which makes it highly probable that the private key generated at both ends will be similar.The temporal channel variation means that the changes in the channel properties (due to change in ambient temperature,objects in line-of-sight (LOS),noise and interference etc.) can be exploited to ensure the randomness of the private key.This means that each newly generated private key,between Alice and Bob,would be random and different [19].The spatial variation makes sure Eve should be at safe distance from either of Alice or Bob.If position of Eve is not close to Alice and Bob,it would experience a different channel and the measurements will be different as well.The required distance is estimated by Jake’s model asλ/2,whereλis the transmission wavelength.Typically,there is no hard bound for the safe distance and it can vary from case to case [20].

    The architecture of PLKG is divided into different blocks which collectively work to produce a private key as shown in Fig.1,a detailed description about this architecture is provided in [21].At first,Alice and Bob send pilot signals to each other.These signals are used to acquire channel state information (CSI) or receive signal strength (RSS) of the channel within channel measurement block.Pre-processing block deals with enhancing the reciprocity between Alice and Bob and de-correlating their respective measurement sequences.The processed signal is then passed to quantization block and converted from signal to binary digits,often the resulting binary stream is referred to as pre-key.Afterwards,information reconciliation block is used to reconcile the pre-key among Alice and Bob by using the cascade protocol or the LDPC codes.Privacy amplification block increases the diversity of the reconciled key and it is carried out by using hash functions [22,23].The focus of this work is on the pre-processing block.Previously,methods like Savitsky Golay filtering along with Walsh,Haar or other similar transform were used for pre-processing [24].However,these methods lack in certain aspects.The first drawback was the overhead computation required to compensate increased redundancy while enhancing the reciprocity (in the form of de-correlation).Secondly,the recursive nature of reciprocity enhancement,as each measurement has to be processed individually.Thirdly,it fails to address hardware differences such as,front-end attenuation,antenna gain mismatch etc.The incapability of previous reciprocity enhancement model (pre-processing) to cater hardware differences,leads to the further investigation for improving reciprocity.Assuming that the front-end hardware brings imperfection [25],we consider the channel between communicating parties as the effective channel comprising of two parts.First is the true channel which remains same because of being reciprocal.Whereas second is the filter imperfections which vary along the nature of filters.

    Figure 1:PLKG architecture

    According to [26],relative calibration can be used to nullify the effect of filter imperfections.There are several advantages of using relative calibration,e.g.,the calibration is executed by signal processing measures and takes place entirely in signal space.Moreover,the relative calibration is easy to be implemented and flexible to be used as it does not require any specific hardware arrangements,especially for dissimilar front-ends of the communicating stations.This is really beneficial when dissimilar front ends are used for the communicating stations.

    The researchers have implemented relative calibration in terms of channel coefficients which are obtained in both time and frequency domains.From literature we have discovered that schemes like Channel Gain Compliment (CGC) [27]with focus on frequency response of channel coefficients and exploit the randomness between adjacent frequency sub-carriers at each time instant.The non-reciprocity element in the calibration process is also computed.Furthermore,the hardware differences can be compensated by complementing this non-reciprocity element in each frequency sub-carrier.An extension to CGC is devised in [28]which is referred as a novel transform to mitigate hardware-differences namely,log-domain differential (LDD) transform.The authors claimed that it is a real-time transform which does not require the learning of channel imperfections.In this paper,time domain relative calibration is performed using deconvolution based on Toeplitz and circulant structures.

    The contributions of this paper are included as following:

    ? In order to ensure channel reciprocity,the relative calibration is implemented using state of art deconvolution techniques including the Total Least Square (TLS) and the Structured Total Least Square (STLS).

    ? Circulant deconvolution technique is proposed as an alternative to the existing techniques and is hypothesized as better performing than the TLS and the STLS.

    ? The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.

    ? The simulation results of the proposed method also validate that secure communication is possible by adapting the circulant deconvolution within wireless systems having ultra-low latency including 5G and IoTs systems due to its less computational cost.

    The paper is organized as follows.Section 2 discusses the system model in hand.Section 3 describes the method of performing the relative calibration.The deconvolution using circulant structure has been introduced in Section 4.Section 5 provides the simulation results.Finally,conclusions are discussed in Section 6.Vectors and matrices are denoted using boldfaced characters.In this paper,andare the error and the estimated values of x,respectively.The ‘*’represents the convolution.Parameters indexed by roman characters A and B are associated with the communicating nodes Alice and Bob,respectively.

    2 System Model

    It is assumed that two nodes A and B referring to Alice and Bob,respectively,need to communicate over a wireless Time Division Duplex (TDD) channel within time duration shorter than channel coherence time.The system model is shown in Fig.2 which is comprised of cascaded linear filters for both the paths A to B and B to A.The linear filters are consisted oftA,tB,rAandrBas output and input filters respectively,whereas C represents the true channel.The input and output filters are introduced to model as front-end hardware differences [26]which results in the non-reciprocity i.e.,tA/=tBandrA/=rB.WhilenAandnBare assumed to be Additive White Gaussian Noise (AWGN) whereas G and H represent the forward and reverse effective channels including the imperfections introduced by the front-end filters,respectively.In the system model,tA,tB,rAandrBare considered time-invariant filters.The reason is that the front-ends vary slower than the channel as discussed in [26].The forward and reverse chains of the system in Fig.2 can be expressed as convolution of cascaded linear filters

    where G(t,τ) is the forward and H(t,τ) is the reverse effective channel.The relation between these cascaded chains has been derived in [26]and expressed as

    where P(τ) is the non-reciprocity element and is modeled as the filter imperfections,which of course is the function of delay only.However,in reality,the filter imperfections are produced by the finite length filters,which can be modeled asτ.If we assume that only one-time instant is considered,then the Eq.(2) can be simplified as

    Figure 2:System model

    where,g represents vector that contains channel coefficients from forward effective channel,H represents a square matrix of a specific structure covering the channel coefficients of the reverse effective channel and p is a vector that represents the calibration metric.p contains the nonreciprocity part of the channel and that is why it is first learned and then used to rectify erroneous channel measurements as shown in Fig.3.

    Figure 3:Relative calibration phases.(a) Training phase which uses calibration learning algorithms to obtain (b) implementation phase which uses for compensating the imperfections

    3 Relative Calibration through Deconvolution Techniques

    To compensate the time-invariant filter imperfection,relative calibration can be performed using the deconvolution techniques.In this section,the deconvolution is performed using the TLS and the STLS as discussed in Subsection 3.1 and Subsection 3.2.

    3.1 Deconvolution by TLS

    Let us assume that the forward and reverse channel coefficients at kth channel measurement are real,finite-valued and defined asandwherehki∈RL′,and j ∈{1,...,L}.Here L′,L are the filter lengths and to ensure that the Toeplitz matrix is a square matrix,L′has to have an odd value.Thus,a relation between L and L′can be formulated as L=(L′+1)/2.The calibration vector is defined asp?[pl,...,pL]T∈RL.The matrix H in (3) is a square matrix of the Toeplitz structure [26].The kth measurement is represented asHk.

    It is assumed thathkandgkare affected only by the estimation errors,where the estimated calibration vector p can be obtained using singular value decomposition (SVD) method [29].

    3.2 Deconvolution by STLS

    For a more realistic approach to address the problem of deconvolution,we assume that both gkand hkare noisy (denoted with a tilde).This modifies the problem given in Eq.(3) as:

    Eq.(5) includesαkandβkare the error correction terms forandrespectively.The error correction terms are also structured in the case of STLS which is not the case with TLS and it improves the optimization process.To maintain the symmetry of the equation,αkis transformed into the Toeplitz matrix as well which is denoted asEk.

    As the noise is Gaussian i.i.d (independent and identically distributed),Eq.(5) can be solved by using Maximum Likelihood (ML) method [30].The Gauss-Newton method [31]is chosen for the ML implementation.In addition,ML optimizes the parameter vector p by minimizing the vector (αTk αk+βTk βk) in an iterative process.The process of ML is an exhaustive search as it requires much more time than TLS method which is an oversimplified approach.Although STLS is a slower process than TLS,the quality of the p from STLS is far better than TLS,which in turn gives improved calibration.Until now,we have considered a single channel measurement.The assumption can be extended to multiple channel measurements by concatenating successive kth measurements ofandrespectively.A comprehensive equation considering all channel measurements can be given as:

    andk=1,...,Kdenotes the number of training probes.Ecandmatrices have dimensions[(L′?L+ 1)×K(L′?L+ 1)].Again,Ecis a Toeplitz matrix ofαwhich is given byα?[26].Similarly,is a single vector that denotes the error correction terms for concatenated[26].Eq.(7) is subjected to the input of the constraint optimization algorithm and an optimizedis estimated.The matrix or vector with subscript “c” is generated within the algorithm.

    Relative calibration is performed in two step fashion as depicted in Fig.3.The details of which are given as following:

    3.2.1 Training Phase

    In this phase,Alice and Bob learn the channel imperfections by sending pilot signals to each other.The channel coefficients from Alice to Bob and Bob to Alice are storedin and,respectively,depending upon the coefficients’nature.Since calibration is performed on Alice side in our case,has been sent from Bob to Alice.By doing so,the method of deconvolution can be applied to estimateusing any of the above-mentioned methods.

    3.2.2 Implementation Phase

    In this phase,Eq.(3) is then used to obtain estimated forward channel measurementsby convolving the estimatedwith H.

    4 Deconvolution Using Circulant Structure

    The limitations of TLS and STLS depend mainly on the structure of H which is Toeplitz,as shown in Eq.(3).However,we can manipulate the performance by using different structure for H.The circulant matrix can be an effective candidate instead Toeplitz matrix.The circulant matrix is defined as a modified Toeplitz matrix which is created by rotating each column or row by one element relative to preceding row or column.In our case,we have rotated a column vector to generate the circulant matrix.The comparison between the circulant matrix and Toeplitz matrix is as following:

    4.1 Advantages of Circulant over Toeplitz

    In the case of Eq.(3),the number of elements in the matrix H is of great importance.We have to infer the calibration vector p by using channel coefficients from g and H.For calculating more accurate value of p,the number of channel coefficients should be higher in number.Since the circulant matrix is created by using only one vector,a large matrix can be created by using same number of channel coefficients compared to the Toeplitz matrix.Generally,a Toeplitz is defined by two vectors one for row and one for column,the channel coefficient vector h has to split in two further in order to fulfill the condition of being a Toeplitz matrix.

    Let us assume we have a vector s=[a,b,c,d,e]and this has to be transformed into both Toeplitz and circulant matrices.

    The vectors results in 3×3 and 5×5 matrices as shown in Eq.(8).If every element of this vector is considered as one unit of information then Fig.4 illustrates how many times an information can be re-used in both types.It clearly shows us that maximum information of circulant is nearly double of what the Toeplitz can achieve (For example displayed in Eq.(8) as the recurring underlined “c”).This gives an edge to circulant over Toeplitz structure.A redundant matrix can increase complexity for circulant structure compared to Toeplitz structure.This happens only if we use SVD for the deconvolution of both,however the results would definitely be better in circulant because of the higher information-reuse.Instead,if Toeplitz structure is used in STLS deconvolution,its complexity also increases because of exhaustive iterations required for MLE execution.Thus,a comparison between the circulant structure using SVD for deconvolution and Toeplitz structure using STLS for deconvolution can be considered fair for the same vector s.

    Figure 4:Comparison of the Toeplitz and the circulant matrices’re-use factor

    4.2 Deconvolution

    Recalling Eq.(3) for the deconvolution through circulant,the forward and reverse channel coefficients can now be given asandwhereas the calibration vector is defined asp?[p1,...,pL]T∈RL.Note that contrary to Toeplitz,all vectors here are equal in length.This provides the basis for more information re-use.The circulant matrix created byhkwould then be:

    While using circulant transformation for H in Eq.(3),the calibration vector p can be easily estimated by using SVD and referred as.This makes it very efficient and less complex to implement.In simple words,circulant deconvolution can be deemed as a scheme that is as efficient as STLS and as simple as TLS.It breaks the trade-off need between STLS and TLS.

    5 Simulation

    The linear model in Fig.2 is simulated in this section and results are presented for the validation.The simulation environment used here is devised by characterizing the theoretical equations and system model in MATLAB.Fig.5 shows a prototypical model which is used for simulation purpose.The motivation behind using this is to simplify our original model given the fact that filter imperfections can also be monitored by using single filter per chain.

    Figure 5:The simplified model for simulation environment

    The parameters used for the simulation are shown in Tab.1.Given the maximum length of the filter is N=30,where N=L 0 in the case of Toeplitz (STLS) and N=L in the case of circulant.

    Table 1:The simulation parameters

    In general,the filter responses can be complicated but to keep our assumption simple,tAandtBare modeled as sin(θ) and sin(2θ) respectively,whereθ∈[0,2π].The channel C is modeled as Rayleigh distributed fading channel.Contrary to [26],only absolute value of channel coefficients is utilized.The performance of the system is evaluated by comparing the correlation between H and g relative to H and.Each simulation has been run for 100 observations and averaged out for a steady response.Fig.6a shows the SNR versus correlation graph which contrasts the correlation of channel estimates before calibration and after calibration over a wide-range of SNR.Negligible correlation exists in extremely low SNR regions showing the limitation of relative calibration schemes.The reason for this limitation is the noise dominance in the channel coefficient values which does not allow calibration to work properly.However,after a certain SNR,the correlation between channel coefficients of either station becomes visible and it keeps improving from then on.This improvement is visualized in Fig.6b for STLS and circulant deconvolution schemes.Fig.6b is a measure of percentage improvement in correlation at any given SNR value.

    It can be observed that the circulant performs slightly better in low SNR regions and achieves maximum at 0 dB.The decrease in percentage for both methods in Fig.6b attributes to the improvement of uncalibrated curve in the positive SNR regions,shown in Fig.6a.Since there is slight chance for an enhancement,the relative percentage in Fig.6b decreases and saturates to a single value.The saturation at 10% shows the maximum possible increment which is clearly visible in Fig.6a.We can observe that the correlation is increasing from 0.88 to 0.98 on 30 dB SNR which translates to 10% increment.Another difference between the two methods is their execution time in terms of the training phase of calibration.The time of training phase is imperceivable to the user or the system in general.Less time it takes to determine the calibration,better would be the system performance.That is why it is an important factor for Physical Security (PHYSEC) systems.Although the execution time of any method greatly depends upon the processing speed of the system and chosen simulation parameters,the comparison between STLS and circulant deconvolution methods is performed by keeping all those factors constant.Fig.7 depicts such a contrast and is a rather logical comparison then an exact relation between the two methods.As mentioned earlier,an average of 100 observations are taken for each method and their execution times in seconds are recorded by means of MATLAB’s clock command.It is evident that the circulant deconvolution utilizes nearly quarter of the time to provide almost same level of performance as STLS deconvolution,hence it can be regarded as more efficient scheme in terms of relative calibration.

    Figure 6:Comparison of STLS and Circulant (a) SNR vs. correlation coefficient graph which shows the effect of calibration on the system (b) shows the percentage improvement in the system performance at different SNR

    Figure 7:A comparison of average execution time of deconvolution through STLS and Circulant methods

    6 Conclusion

    The deployment of relative calibration has introduced as an enhancement in terms of reciprocity in the PLKG architecture which has a major influence in securing communication between nodes.The deconvolution method is proposed in order to implement the relative calibration with less computational cost in comparison to the state-of-the-art methods.Existing deconvolution methods like TLS and STLS are implemented and discussed for comparative purpose.STLS being more efficient than TLS in terms of quality,is used to perform deconvolution however due to its higher computational cost as a trade-off to quality,the circulant deconvolution is proposed as an alternate solution.In this context,a comprehensive comparison between the two methods is also presented,highlighting the reasons and motivation to use circulant deconvolution.It is to be concluded that the circulant deconvolution replicates the performance of STLS even with less computational cost.The simulation results of the proposed method also validate that secure communication is possible by adapting the circulant deconvolution within wireless systems having ultra-low latency including 5G and IoTs systems due to its less computational cost.The proposed circulant deconvolution is recommended as a better scheme in comparison to the state-of-the-art techniques and this is clearly validated by the simulation results.As an immediate succession,the relative calibration is to be implemented over complete PLKG chain and its effect on the created keys should be observed in real time scenarios.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.Although APC is to be funded by author’s institute under predefined standard policy.

    宅男免费午夜| 国产在线精品亚洲第一网站| 日日摸夜夜添夜夜添小说| 在线十欧美十亚洲十日本专区| 91字幕亚洲| 免费av毛片视频| 一个人免费在线观看电影| 最近在线观看免费完整版| 蜜桃亚洲精品一区二区三区| 午夜免费男女啪啪视频观看 | 国产美女午夜福利| 亚洲不卡免费看| 国产精品亚洲美女久久久| 精品电影一区二区在线| 国产国拍精品亚洲av在线观看 | 内射极品少妇av片p| 此物有八面人人有两片| 午夜福利免费观看在线| 热99re8久久精品国产| 国产精品一区二区三区四区免费观看 | 日日夜夜操网爽| 99视频精品全部免费 在线| 18禁黄网站禁片免费观看直播| 一个人免费在线观看的高清视频| 午夜激情欧美在线| 一区二区三区国产精品乱码| 亚洲av成人不卡在线观看播放网| or卡值多少钱| 欧美黄色淫秽网站| 国产亚洲精品av在线| 精品人妻偷拍中文字幕| 亚洲国产欧美人成| 在线观看免费午夜福利视频| 欧美最黄视频在线播放免费| 亚洲成人久久性| 美女高潮喷水抽搐中文字幕| 好男人在线观看高清免费视频| 制服人妻中文乱码| 三级男女做爰猛烈吃奶摸视频| 国产不卡一卡二| 午夜亚洲福利在线播放| 99久国产av精品| 一本综合久久免费| 亚洲成人中文字幕在线播放| 一夜夜www| 亚洲成a人片在线一区二区| 真人做人爱边吃奶动态| 最新美女视频免费是黄的| 久久国产乱子伦精品免费另类| 欧美成狂野欧美在线观看| 亚洲av第一区精品v没综合| 国产精品久久久久久精品电影| 久久精品国产亚洲av香蕉五月| 丁香欧美五月| 动漫黄色视频在线观看| 身体一侧抽搐| 一区二区三区国产精品乱码| 午夜日韩欧美国产| 99久久精品一区二区三区| 成人一区二区视频在线观看| 欧美最黄视频在线播放免费| 一本综合久久免费| 熟妇人妻久久中文字幕3abv| 亚洲人成网站在线播放欧美日韩| 午夜两性在线视频| 最好的美女福利视频网| 九九久久精品国产亚洲av麻豆| 麻豆国产97在线/欧美| 两个人视频免费观看高清| 久久久久性生活片| 人妻久久中文字幕网| 窝窝影院91人妻| 韩国av一区二区三区四区| 人人妻人人看人人澡| 特级一级黄色大片| 亚洲精品一卡2卡三卡4卡5卡| 国产亚洲精品久久久久久毛片| 日本成人三级电影网站| 激情在线观看视频在线高清| 国产午夜福利久久久久久| 成人av一区二区三区在线看| 成人特级黄色片久久久久久久| 免费在线观看影片大全网站| 欧美+亚洲+日韩+国产| 欧美黑人欧美精品刺激| 精品一区二区三区视频在线 | 欧美bdsm另类| 国产一区二区亚洲精品在线观看| 亚洲黑人精品在线| 丰满人妻熟妇乱又伦精品不卡| 丰满人妻熟妇乱又伦精品不卡| 国产精品1区2区在线观看.| 男女下面进入的视频免费午夜| 69人妻影院| 少妇的丰满在线观看| 欧美+日韩+精品| 人人妻,人人澡人人爽秒播| 久久精品综合一区二区三区| 免费在线观看成人毛片| 757午夜福利合集在线观看| 日韩成人在线观看一区二区三区| 亚洲五月天丁香| 国产久久久一区二区三区| 亚洲色图av天堂| 一a级毛片在线观看| 亚洲欧美日韩卡通动漫| 欧洲精品卡2卡3卡4卡5卡区| 成年女人看的毛片在线观看| 一二三四社区在线视频社区8| 久久久色成人| 真人一进一出gif抽搐免费| 亚洲五月婷婷丁香| 99久久精品一区二区三区| 国产三级中文精品| 日本免费a在线| 国产亚洲欧美98| 国产亚洲精品av在线| 亚洲美女黄片视频| 老鸭窝网址在线观看| 精品人妻一区二区三区麻豆 | 欧美zozozo另类| 色视频www国产| 国产av麻豆久久久久久久| 91字幕亚洲| 美女大奶头视频| 色综合亚洲欧美另类图片| www.999成人在线观看| 我要搜黄色片| 给我免费播放毛片高清在线观看| 日本黄色片子视频| 黑人欧美特级aaaaaa片| 天堂影院成人在线观看| 99精品在免费线老司机午夜| 国产精品一区二区三区四区免费观看 | 国产激情欧美一区二区| 久久国产精品影院| 国产精品综合久久久久久久免费| 久久亚洲精品不卡| 国产精品免费一区二区三区在线| 国产精品精品国产色婷婷| 色播亚洲综合网| 中亚洲国语对白在线视频| 欧美成人a在线观看| 欧美色视频一区免费| 色综合欧美亚洲国产小说| 看免费av毛片| 又紧又爽又黄一区二区| 亚洲精品美女久久久久99蜜臀| 麻豆成人午夜福利视频| 麻豆一二三区av精品| 国内少妇人妻偷人精品xxx网站| 亚洲18禁久久av| 久久九九热精品免费| 亚洲欧美日韩高清在线视频| 三级国产精品欧美在线观看| 丁香欧美五月| 免费高清视频大片| 午夜福利在线在线| 最好的美女福利视频网| 天堂动漫精品| 久久6这里有精品| 三级毛片av免费| 99热这里只有是精品50| 又紧又爽又黄一区二区| 亚洲欧美日韩无卡精品| 琪琪午夜伦伦电影理论片6080| 亚洲黑人精品在线| 国产v大片淫在线免费观看| 免费观看精品视频网站| 黄色日韩在线| 日韩欧美国产一区二区入口| 欧美黑人欧美精品刺激| e午夜精品久久久久久久| 又黄又爽又免费观看的视频| 九色成人免费人妻av| 亚洲成a人片在线一区二区| 手机成人av网站| 国产精品免费一区二区三区在线| 久久草成人影院| 三级男女做爰猛烈吃奶摸视频| 亚洲精品粉嫩美女一区| 亚洲精品456在线播放app | 亚洲中文日韩欧美视频| 搡老岳熟女国产| 一区二区三区免费毛片| 午夜精品一区二区三区免费看| ponron亚洲| 叶爱在线成人免费视频播放| 男女那种视频在线观看| 97碰自拍视频| 男人的好看免费观看在线视频| 日韩欧美在线乱码| 国产91精品成人一区二区三区| bbb黄色大片| 99国产精品一区二区三区| 久久精品国产清高在天天线| 两人在一起打扑克的视频| 精品福利观看| 偷拍熟女少妇极品色| 制服人妻中文乱码| 久久久久亚洲av毛片大全| 亚洲aⅴ乱码一区二区在线播放| 国产色婷婷99| 国产不卡一卡二| 麻豆国产av国片精品| 好看av亚洲va欧美ⅴa在| 国内揄拍国产精品人妻在线| x7x7x7水蜜桃| 国产精品1区2区在线观看.| 亚洲国产欧美人成| 观看免费一级毛片| 午夜a级毛片| 在线观看日韩欧美| 女同久久另类99精品国产91| 国产黄色小视频在线观看| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 丁香欧美五月| 国产精品美女特级片免费视频播放器| www日本在线高清视频| 亚洲熟妇中文字幕五十中出| 国产精品久久电影中文字幕| 人人妻人人澡欧美一区二区| 99在线视频只有这里精品首页| 久久精品亚洲精品国产色婷小说| 床上黄色一级片| 人妻久久中文字幕网| 一进一出抽搐gif免费好疼| 欧美zozozo另类| 丁香六月欧美| 美女黄网站色视频| 亚洲久久久久久中文字幕| 日韩免费av在线播放| 久久亚洲真实| 两性午夜刺激爽爽歪歪视频在线观看| 综合色av麻豆| 久久人妻av系列| 日本与韩国留学比较| 日韩高清综合在线| 国产精品国产高清国产av| 亚洲精品日韩av片在线观看 | 国内精品一区二区在线观看| 国产一区二区亚洲精品在线观看| 最新美女视频免费是黄的| 久久人人精品亚洲av| 午夜老司机福利剧场| 欧美乱码精品一区二区三区| 少妇的逼好多水| 色视频www国产| 成年女人看的毛片在线观看| 99久久无色码亚洲精品果冻| 9191精品国产免费久久| 久久精品影院6| 欧美极品一区二区三区四区| 男女午夜视频在线观看| 国产淫片久久久久久久久 | 动漫黄色视频在线观看| 最近最新免费中文字幕在线| 亚洲国产精品合色在线| 国产三级黄色录像| 国产精品一区二区免费欧美| 亚洲片人在线观看| 首页视频小说图片口味搜索| 大型黄色视频在线免费观看| 给我免费播放毛片高清在线观看| 小说图片视频综合网站| av视频在线观看入口| 一级毛片高清免费大全| 亚洲精品美女久久久久99蜜臀| 99热这里只有精品一区| 色在线成人网| 久久久久性生活片| 久久精品人妻少妇| tocl精华| 亚洲精品在线美女| 午夜福利在线观看吧| 一本综合久久免费| 嫩草影院精品99| 淫妇啪啪啪对白视频| 日本 av在线| 在线免费观看不下载黄p国产 | 婷婷精品国产亚洲av| 欧美性猛交╳xxx乱大交人| 国产精品一区二区免费欧美| 草草在线视频免费看| 给我免费播放毛片高清在线观看| 在线观看免费视频日本深夜| 一个人观看的视频www高清免费观看| 欧美高清成人免费视频www| 18禁国产床啪视频网站| 蜜桃久久精品国产亚洲av| 人人妻,人人澡人人爽秒播| 青草久久国产| 九九在线视频观看精品| 69av精品久久久久久| 色综合婷婷激情| 宅男免费午夜| 在线播放国产精品三级| 丁香欧美五月| 国产97色在线日韩免费| 日韩欧美 国产精品| 亚洲五月天丁香| 亚洲一区二区三区不卡视频| 中文字幕熟女人妻在线| 窝窝影院91人妻| 国产私拍福利视频在线观看| 亚洲男人的天堂狠狠| av天堂在线播放| 母亲3免费完整高清在线观看| 中文字幕人妻熟人妻熟丝袜美 | 超碰av人人做人人爽久久 | 日日夜夜操网爽| 欧美一区二区精品小视频在线| 欧美一区二区国产精品久久精品| 男人和女人高潮做爰伦理| 欧美大码av| 一进一出抽搐gif免费好疼| 叶爱在线成人免费视频播放| 欧美另类亚洲清纯唯美| 国产精品99久久99久久久不卡| 亚洲,欧美精品.| 别揉我奶头~嗯~啊~动态视频| 国产激情欧美一区二区| 国产三级在线视频| 亚洲国产精品成人综合色| 午夜久久久久精精品| 一区二区三区高清视频在线| 欧美成人性av电影在线观看| 亚洲欧美日韩东京热| 欧美一区二区亚洲| 欧美乱码精品一区二区三区| 免费大片18禁| 一本综合久久免费| 国产黄色小视频在线观看| 国产熟女xx| 淫秽高清视频在线观看| 亚洲中文日韩欧美视频| 久久久久久国产a免费观看| 免费在线观看日本一区| 少妇的逼好多水| 夜夜躁狠狠躁天天躁| 精品乱码久久久久久99久播| 99热这里只有是精品50| 十八禁网站免费在线| 国产在线精品亚洲第一网站| 亚洲精品美女久久久久99蜜臀| 国产色爽女视频免费观看| 国产精品一及| 国产成人a区在线观看| 日韩欧美三级三区| 淫妇啪啪啪对白视频| 丰满人妻一区二区三区视频av | 村上凉子中文字幕在线| 国产69精品久久久久777片| 嫩草影视91久久| 狂野欧美白嫩少妇大欣赏| 国内少妇人妻偷人精品xxx网站| 麻豆国产av国片精品| 日本黄大片高清| 日本一二三区视频观看| 国产免费一级a男人的天堂| 精品欧美国产一区二区三| 中文亚洲av片在线观看爽| 亚洲精品影视一区二区三区av| 国产乱人伦免费视频| 亚洲欧美日韩卡通动漫| 一个人看的www免费观看视频| 午夜亚洲福利在线播放| 国产毛片a区久久久久| 亚洲七黄色美女视频| 欧美乱色亚洲激情| 最近最新中文字幕大全免费视频| 亚洲av二区三区四区| 日韩av在线大香蕉| 网址你懂的国产日韩在线| 91久久精品国产一区二区成人 | 我要搜黄色片| 在线十欧美十亚洲十日本专区| 日本a在线网址| 欧美激情久久久久久爽电影| 国产精品久久视频播放| 国产精品亚洲一级av第二区| tocl精华| 99久久久亚洲精品蜜臀av| 真人一进一出gif抽搐免费| 1000部很黄的大片| 青草久久国产| 麻豆成人av在线观看| 超碰av人人做人人爽久久 | 少妇高潮的动态图| 色精品久久人妻99蜜桃| 免费无遮挡裸体视频| 亚洲精华国产精华精| 亚洲欧美日韩东京热| 久久久久久久精品吃奶| 757午夜福利合集在线观看| 国产一区二区在线av高清观看| 欧美最黄视频在线播放免费| 一二三四社区在线视频社区8| 亚洲在线观看片| 久久精品国产清高在天天线| 老司机福利观看| 国产精品av视频在线免费观看| 欧美黄色淫秽网站| 五月伊人婷婷丁香| 最新在线观看一区二区三区| 国产免费一级a男人的天堂| 一级作爱视频免费观看| 动漫黄色视频在线观看| 久久精品夜夜夜夜夜久久蜜豆| av女优亚洲男人天堂| 久久精品人妻少妇| 少妇的丰满在线观看| 日韩精品青青久久久久久| 桃色一区二区三区在线观看| 身体一侧抽搐| 亚洲人与动物交配视频| 99久久久亚洲精品蜜臀av| 午夜免费激情av| 亚洲中文字幕日韩| 中国美女看黄片| 国产99白浆流出| 在线观看午夜福利视频| 午夜福利在线观看免费完整高清在 | 亚洲欧美日韩卡通动漫| 国产探花极品一区二区| 老鸭窝网址在线观看| 天天一区二区日本电影三级| 一边摸一边抽搐一进一小说| 亚洲精品一卡2卡三卡4卡5卡| 欧美在线一区亚洲| 一区二区三区激情视频| 午夜福利在线观看吧| 国产极品精品免费视频能看的| 中亚洲国语对白在线视频| 国产探花极品一区二区| 18美女黄网站色大片免费观看| 又黄又爽又免费观看的视频| 国产精华一区二区三区| 国产99白浆流出| 免费看十八禁软件| 老熟妇仑乱视频hdxx| 亚洲五月婷婷丁香| 97碰自拍视频| 欧美日韩亚洲国产一区二区在线观看| 少妇人妻一区二区三区视频| av黄色大香蕉| 哪里可以看免费的av片| netflix在线观看网站| 久久精品影院6| 国产色婷婷99| 国产精品精品国产色婷婷| 国产aⅴ精品一区二区三区波| 日本与韩国留学比较| 亚洲人成伊人成综合网2020| 国产精品98久久久久久宅男小说| 亚洲aⅴ乱码一区二区在线播放| netflix在线观看网站| 成人午夜高清在线视频| 成年版毛片免费区| 禁无遮挡网站| 国产午夜福利久久久久久| 国产成人av教育| 在线天堂最新版资源| 男人的好看免费观看在线视频| 日本免费一区二区三区高清不卡| 熟女人妻精品中文字幕| 在线观看66精品国产| 免费搜索国产男女视频| www日本在线高清视频| 午夜免费成人在线视频| 桃红色精品国产亚洲av| 一卡2卡三卡四卡精品乱码亚洲| 麻豆久久精品国产亚洲av| 嫩草影院入口| 好看av亚洲va欧美ⅴa在| 欧美午夜高清在线| 日本撒尿小便嘘嘘汇集6| 少妇高潮的动态图| 男女床上黄色一级片免费看| 亚洲国产精品久久男人天堂| 12—13女人毛片做爰片一| 欧美在线一区亚洲| 99热这里只有是精品50| 亚洲人成网站在线播放欧美日韩| 欧美性猛交╳xxx乱大交人| 国产综合懂色| 男女下面进入的视频免费午夜| 精品欧美国产一区二区三| 色老头精品视频在线观看| 亚洲av熟女| 成人国产综合亚洲| 国产淫片久久久久久久久 | 亚洲av二区三区四区| 好男人在线观看高清免费视频| 国产高潮美女av| www国产在线视频色| 亚洲国产精品sss在线观看| 国产成人欧美在线观看| 高清日韩中文字幕在线| 人妻丰满熟妇av一区二区三区| 精品久久久久久久毛片微露脸| 国产亚洲精品一区二区www| 欧美一区二区亚洲| 精品一区二区三区av网在线观看| 波多野结衣高清作品| 国产欧美日韩精品一区二区| 丰满乱子伦码专区| 黄色日韩在线| 午夜免费激情av| 精品人妻1区二区| 桃色一区二区三区在线观看| 香蕉av资源在线| 男女那种视频在线观看| 香蕉丝袜av| 国产精品一区二区三区四区免费观看 | 国产美女午夜福利| 在线观看一区二区三区| 丰满人妻熟妇乱又伦精品不卡| 国产精品三级大全| 99久久99久久久精品蜜桃| 91久久精品国产一区二区成人 | 免费大片18禁| 99视频精品全部免费 在线| 国产亚洲av嫩草精品影院| 日韩欧美国产一区二区入口| 日本在线视频免费播放| 日本精品一区二区三区蜜桃| 一个人看视频在线观看www免费 | 精品一区二区三区视频在线观看免费| 精品无人区乱码1区二区| 国产精品影院久久| 国产在视频线在精品| 一二三四社区在线视频社区8| 免费看光身美女| 国产伦人伦偷精品视频| 一级黄色大片毛片| 日本撒尿小便嘘嘘汇集6| 欧美在线黄色| av专区在线播放| 成人午夜高清在线视频| 又紧又爽又黄一区二区| 日本撒尿小便嘘嘘汇集6| 亚洲精品成人久久久久久| 国产成人av激情在线播放| 90打野战视频偷拍视频| 欧美区成人在线视频| 久久久久性生活片| avwww免费| 亚洲中文日韩欧美视频| 日韩欧美免费精品| 久久精品91蜜桃| 亚洲人与动物交配视频| 国产精品久久久久久精品电影| 国产精品电影一区二区三区| 老鸭窝网址在线观看| 精品一区二区三区视频在线观看免费| 老司机午夜福利在线观看视频| 久久精品人妻少妇| 久久久久精品国产欧美久久久| 中文字幕人妻丝袜一区二区| 国产免费男女视频| 最近最新免费中文字幕在线| 亚洲精品一区av在线观看| 一卡2卡三卡四卡精品乱码亚洲| 国产一区二区亚洲精品在线观看| 久久精品国产综合久久久| 亚洲五月婷婷丁香| 久久欧美精品欧美久久欧美| 级片在线观看| 国产一区二区激情短视频| av天堂中文字幕网| 1024手机看黄色片| 久久精品夜夜夜夜夜久久蜜豆| 国产色爽女视频免费观看| 亚洲av第一区精品v没综合| 看免费av毛片| 日日干狠狠操夜夜爽| 一级黄色大片毛片| 性欧美人与动物交配| 一区福利在线观看| netflix在线观看网站| 亚洲黑人精品在线| 精品人妻1区二区| 欧美日韩亚洲国产一区二区在线观看| АⅤ资源中文在线天堂| 国产免费男女视频| 操出白浆在线播放| 国产精品久久久久久亚洲av鲁大| 99久久精品国产亚洲精品| 最新中文字幕久久久久| 日本一本二区三区精品| 偷拍熟女少妇极品色| 亚洲色图av天堂| 中文字幕精品亚洲无线码一区| 久久精品人妻少妇| 丰满人妻熟妇乱又伦精品不卡| 一区福利在线观看| 欧美乱码精品一区二区三区| 日本免费a在线| 亚洲电影在线观看av| 一卡2卡三卡四卡精品乱码亚洲| 99精品欧美一区二区三区四区| 亚洲av五月六月丁香网| 日韩亚洲欧美综合| 久久婷婷人人爽人人干人人爱| 啦啦啦韩国在线观看视频| 男女视频在线观看网站免费| 精品电影一区二区在线| 最新美女视频免费是黄的| 乱人视频在线观看| 亚洲成人久久性| 亚洲欧美精品综合久久99| 欧美性猛交黑人性爽| 久久精品国产亚洲av涩爱 | av在线天堂中文字幕|