• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular Networks

    2022-02-13 09:54:22ChenxiLiLeiGunHuqingWuNnChengZnLiXueminShermnShen
    Engineering 2022年10期

    Chenxi Li, Lei Gun,*, Huqing Wu, Nn Cheng, Zn Li,c,*, Xuemin (Shermn) Shen

    a State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China

    b Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada

    c Collaborative Innovation Center of Information Sensing and Understanding, Xi’an 710071, China

    Keywords:Heterogeneous cellular networks Dynamic spectrum control Transmission security Efficient data transmission

    A B S T R A C T Heterogeneous cellular networks(HCNs)are envisioned as a promising architecture to provide seamless wireless coverage and increase network capacity.However,the densified multi-tier network architecture introduces excessive intra- and cross-tier interference and makes HCNs vulnerable to eavesdropping attacks. In this article, a dynamic spectrum control (DSC)-assisted transmission scheme is proposed for HCNs to strengthen network security and increase the network capacity. Specifically, the proposed DSC-assisted transmission scheme leverages the idea of block cryptography to generate sequence families,which represent the transmission decisions,by performing iterative and orthogonal sequence transformations. Based on the sequence families, multiple users can dynamically occupy different frequency slots for data transmission simultaneously. In addition,the collision probability of the data transmission is analyzed, which results in closed-form expressions of the reliable transmission probability and the secrecy probability.Then,the upper and lower bounds of network capacity are further derived with given requirements on the reliable and secure transmission probabilities. Simulation results demonstrate that the proposed DSC-assisted scheme can outperform the benchmark scheme in terms of security performance.Finally,the impacts of key factors in the proposed DSC-assisted scheme on the network capacity and security are evaluated and discussed.

    1. Introduction

    To support the surging growth of wireless data traffic while meeting the requirements for high data rates in next-generation cellular networks, heterogeneous cellular networks (HCNs) are emerging as a promising solution to enable a significant leap in network performance [1–4]. By densely deploying hierarchical infrastructure in different tiers (i.e., macro base stations (MBSs),micro base stations (mBSs), pico base stations (BSs), femto base stations, and relays) and permitting them to transmit information simultaneously over the same spectrum band, the HCNs are capable of achieving seamless coverage and accommodating more users. Motivated by the great potential, the investigation of the HCNs has received substantial interest [5–7].

    Despite the benefits brought by HCNs,there are some challenging issues that should be further investigated. On the one hand,there are massive communication terminals coexisting in different tiers of HCNs and sharing limited spectrum resources. Therefore,unlike conventional single-tier cellular networks where data transmission is hampered mainly by malicious jamming, substantial intra- and inter-tier interference exists in HCNs, which reduces the success probability and reliability of data transmission. On the other hand,due to the open system architecture and the broadcast nature of radio propagation, confidential messages intended for authorized users are vulnerable to eavesdropping attacks.

    Recent advances in interference and eavesdropping technologies in communication networks [8–12] further exacerbate the security risks in HCNs. Based on the report of risk-based security(RBS)in the third quarter of 2019[13],there were 5183 data leakage events around the world in the first nine months of 2019. In view of the fact that wireless networks have been introduced into many fields (such as intelligent manufacturing [14], smart healthcare [15], and the Internet of Things [16,17]), the negative impact of data leakage on wireless network security has captured both industry and academia attention.When private information cannot be transmitted reliably and securely, serious consequences can occur, including property damage (e.g., disruption of industrial production chains, traffic congestion) and even personnel casualties (e.g., medical malpractice, traffic collisions).

    Therefore,it is crucial to guarantee reliable and successful data transmission in HCNs while addressing interference and eavesdropping threats.However,the design of the transmission scheme is a daunting task in HCNs for the following reasons. First, the transmission scheme design should not only address the interference and eavesdropping threats but also improve the network capacity in HCNs. Considering the limited spectrum resources,dynamic spectrum control(DSC)is required to enable more authorized users to access HCNs without causing harmful interference.Second, to improve the security performance, authorized data transmission should occupy different frequency slots during the transmission period to make it intractable for eavesdroppers to intercept the transmitted information.Furthermore,reliable transmission and secure transmission probabilities should be analyzed and provided to evaluate the performance of the transmission scheme in HCNs.

    1.1. Related work

    In the literature, there are many studies on interference management and security enhancement [18–22]. Lv et al. [18] pioneered the study of physical layer security in downlink two-tier heterogeneous networks(HetNets)and optimized the secrecy rate performance by designing a beamforming scheme. Subsequently,Wang et al.[19]considered the randomness of the spatial location of network nodes and proposed a secrecy mobile association policy based on the access threshold, which provided a basic analytical framework to evaluate the secrecy performance of HCNs. Xu et al. [20] introduced cooperative multipoint transmission (CoMP)into the construction of HetNets to enhance the secured coverage probability. Inspired by the aforementioned methods, an interference-canceled opportunistic antenna selection (IC-OAS)scheme was proposed in Ref. [21] to improve the potential of the security–reliability tradeoff of macrocells and microcells. In Ref.[22],the secrecy energy efficiency(EE)was optimized by introducing artificial noise into orthogonal frequency division multiplexing(OFDM)-based cognitive radio networks with different base stations.

    However, the aforementioned methods mainly focus on the security and interference issues of HCNs, while ignoring the everincreasing wireless network traffic that should be handled by limited spectrum resources. In fact, the scarce spectrum resources available to support wireless communications services are underutilized.Therefore,it is essential to design an effective transmission scheme to improve the spectrum utilization efficiency and increase the network capacity of HCNs.

    To mitigate spectrum scarcity in HCNs, some initiatives have been investigated in the past decade[23–26].To improve the spectrum efficiency (SE) and EE under quality-of-service (QoS) constraints in multi-tier HetNets simultaneously, Rao and Fapojuwo[23] and Al Masri and Sesay [24] verified that traffic offloading is an effective approach. However, the performance gain brought by offloading is strongly affected by intra-and inter-tier interference.Yang et al.[25]pointed out that inter-tier interference is the main bottleneck for increasing network capacity in HetNets and proposed an F-ALOHA based cognitive spectrum access scheme for macro–femto HetNets. This scheme incorporated the idea of cross-tier spectrum access to offload traffic, thereby achieving interference management and optimization of SE. In addition,another spectrum flowing scheme that can trade or lease the licensed spectrum among tiers or network nodes to minimize spectrum holes was proposed in Ref. [26].

    In summary, network capacity improvement and security enhancement have attracted substantial research interest.Although HCNs can effectively increase network capacity,the densified network architecture introduces cross-tier interference,which might further aggravate the threats to network security.The existing works focus either on network capacity improvement or transmission security enhancement in HCNs, failing to address both issues in HCNs. On the one hand, the aforementioned endeavors to cope with transmission security threats consume additional power and signal overhead, which might introduce extra interferences and hamper the network capacity performance.On the other hand,the existing approaches for increasing network capacity can effectively address the interferences in HCNs,but cannot overcome the threats of eavesdropping. To the best of our knowledge,there is no existing analysis of HCNs by jointly considering security and network performance. However, only by jointly considering the two performances together can HCNs meet the requirements of authorized users in real-world applications. This has motivated our work.In this work,we focus on the transmission scheme design in HCNs to effectively improve network capacity while guaranteeing security performance.

    1.2. Main contributions

    In this article,we propose a transmission scheme based on DSC for HCNs. By sensing the occupation status of the spectrum resources, the proposed scheme can generate a set of decisions by leveraging the idea of block cryptography and performing iterative and orthogonal operations.Based on these decisions,the data transmission can effectively occupy the idle frequency slots in each time slot. In addition, based on the analysis of the collision probability caused by multiple data packets occupying the same frequency slot in a time slot, the closed-form expressions of the reliable transmission probability(i.e.,the data packets can be completely transmitted to authorized receivers) and secrecy probability (i.e., the data packets cannot be acquired by eavesdroppers)are derived from the idea of information-theoretic security [27].Furthermore,under the constraints of reliable transmission probability and secrecy probability, the upper and lower bounds of network capacity can be determined. Therefore, by employing the DSC-assisted transmission scheme, the goal of strengthening the security and improving the network capacity of HCNs can be achieved.The main contributions of this article can be summarized as follows:

    · We propose a DSC-assisted transmission scheme, which can guide the data packets to occupy the frequency slots in each time slot by generating orthogonal sequences. By scheduling communication links in an orderly manner, the proposed scheme can effectively reduce interference and make it more intractable for eavesdroppers to intercept transmitted privacy information.

    · We theoretically analyze the collision probability of multiple data packets occupying the same frequency slot in a time slot,which provides the theoretical foundation for security and network capacity analysis in HCNs.

    · We define the reliable transmission probability and secrecy probability of the proposed transmission scheme in HCNs and derive their closed-form expressions, which provides an analytical framework for evaluating the security performance of HCNs.Based on these two probabilities,the network capacity of HCNs under security constraints can be determined.

    ·We verify that the proposed DSC-assisted scheme can outperform the conventional secure transmission scheme in terms of security performance, which can be further improved by adjusting the network parameters. In addition, the maximum number of users allowed to associate with HCNs can be adjusted according to the actual security requirements.

    The remainder of this article is organized as follows. Section 2 depicts the system model. Then, the proposed DSC-assisted transmission scheme is presented in Section 3. Based on the proposed scheme,the security analysis in HCNs(including reliable transmission probability and secrecy probability)is conducted in Section 4.In Section 5,we evaluate the network capacity.After that,the simulation results are shown in Section 6, followed by the conclusion and future work in Section 7.

    2. System model

    Based on real-world application scenarios and the existing HCNs models[28–32],a typical multi-tier HCNs scenario is considered in this work as shown in Fig.1.The HCNs consist of one MBS,multiple mBSs, several authorized users, and randomly located passive eavesdroppers. Let {BSφ| φ = (1, 2, ???, m, M)} denote the base stations in the scenario with different clocks, where m is a positive integer representing the number of mBSs and M is a symbol representing the MBS. In addition, φ?{1, 2, ???, m} represents the mBS and φ = M refers to the MBS. These base stations are equipped with multiple antennas to support the communication of multiple authorized users simultaneously. In the considered HCNs scenario,the BSMcovers the entire network to form a macrocell and can serve authorized users with a high transmission power PBS(from 5 to 40 W),where PBSis the power of the BSM.To handle the ever-growing traffic requirement and achieve seamless coverage, several BSms can be deployed within the macrocell. Different from the BSM, BSms have smaller coverage radii and form multiple microcells that do not overlap with each other thus they can only serve the authorized users within their coverage areas with a lower transmission power Pbs(from 250 mW to 2 W), where Pbsis the power of the BSm.Since it is almost impossible to accurately determine the instantaneous channel state information (CSI) of passive eavesdroppers in practice, only statistical CSI of the channels is available in our work, as assumed in many previous works [33–35]. Without loss of generality, we assume that each communication link in our constructed HCNs experiences independent flat Rayleigh fading such that the channel power gains are exponentially distributed.Specifically,the mean value of the channel power gain is |hu|2between the BSMand authorized users, |he|2between the BSMand eavesdroppers,|hmu|2between the BSmand authorized users, and |hme|2between the BSmand eavesdroppers.

    Specifically, we focus on the downlink transmission for the authorized users, where data packets are transmitted by the base stations independently over the shared transmission channel.Without loss of generality, the authorized users Uk(k = 1, 2, ???,K) can choose to associate with the BSMor BSms based on the signal-to-interference-plus-noise ratio (SINR) of downlinks in HCNs [36], where K is a positive integer representing the total number of the authorized users and k represents one of them.

    Fig. 1. Illustration of the HCNs. BSM: MBS; BSm: mBS; UM,d: the authorized user d associated with the BSM; UM,b: the authorized user b associated with the BSM; U1,a: the authorized user a associated with the BS1; U1,c: the authorized user c associated with the BS1.

    As shown in Fig.1,there are many potential threats affecting the transmission performance between base stations and users (e.g.,unfriendly jammers, uncooperative interference, and malicious eavesdropping). Specifically, unfriendly jammers existing in the service area might randomly send interference signals to occupy the transmission band,which reduces the quality of the communication link and even tamper with the transmitted information or interrupt communication.In addition,since the BSMand BSms share the same frequency band,the signals transmitted by the BSMare regarded as uncooperative interference for the authorized users in the BSms,and vice versa. Furthermore, considering the small geographical area covered by each BSm, authorized users occupying the same frequency band served by the same BSmcan interfere with each other.However,the most malicious one is the eavesdroppers,as shown in Fig.1,who can be randomly distributed and desire to intercept the privacy information transmitted by authorized users with the assistance of an energy detector(e.g.,a radiometer).

    3. DSC-assisted transmission scheme

    To cope with the aforementioned threats effectively, an effective transmission scheme for assisting asynchronous networking is proposed in this section to strengthen the security of HCNs and facilitate the realization of superior network performance.

    Without loss of generality, all authorized users transmit their data packets on a discrete-time channel with p time slots (t1, t2,???, tp),where p is a positive integer representing the total number of divided time slots, and tpis the pth time slot. We assume that the transmitted data packets of authorized users in our considered HCNs need to occupy L consecutive time slots to complete their transmissions in each transmission period, where L represents the length of the transmitted data packets.Authorized users who desire to transmit information with a large data volume may require multiple transmission periods to complete the transmission of all information. In addition, to address the contradiction between the increasing number of authorized users and the limited spectrum resources, we divide the shared transmission bandwidth into q0non-overlapping frequency slots in advance, which constitute the set of frequency slots F0={f1,f2,???,fq0},where q0is a positive integer representing the initial value of the divided frequency slots,and fq0denotes the q0th frequency slot.Note that the frequency slots in F0cannot only be used by authorized users, but also be occupied by interference signals. Furthermore, considering that passive eavesdroppers can intercept data transmission,in the designed transmission scheme,every frequency slot can only be occupied by each user no more than once during a transmission period to make it intractable for eavesdroppers to decode the transmitted information.Therefore, we propose a DSC-assisted transmission scheme as follows to enhance the security of the network we are considering.

    To tackle the negative impact of malicious interference, each base station leverages the spectrum sensing method within F0to determine the occupation status of each frequency slot in our proposed DSC-assisted transmission scheme.In recent decades,many refined spectrum sensing methods have been proposed [37–39],including spectrum sensing methods based on energy detection,eigenvalues, high-order cumulants (HOCs), and so forth. Here, we choose the HOCs-based spectrum sensing method to provide us with the occupation status of each frequency slot, since this method can extract a non-Gaussian signal from Gaussian noise even when the noise is colored and eliminate the adverse effects of noise power uncertainty in practical applications. According to the sensing results, the status of the frequency slots (P) can be expressed as P = {Pfj| j = 1, 2, ???, q0}, where j is the number of the frequency slots, the Pfjrepresents the status of the jth frequency slot and Pfj?{0,1}. If Pfj= 1, the jth frequency slot fjis already occupied, otherwise frequency slot fjcan be accessed.Finally, the base station can remove the interfered frequency slots from F0and acquire the set of available frequency slots Fswith q frequency slots, where q indicates the number of idle frequency slots. Consequently, the BSφshould select and allocate frequency slots from Fsfor the authorized users to ensure secure and reliable data transmission over a transmission period (t1–tp). The detailed procedure of determining Fsis described in Algorithm 1.

    Algorithm 1. Principles of available frequency slots.Input: Number of frequency slots q0 1. Generate a set of frequency slots F0 2. Determine the status of the entire frequency slots P={Pf1,Pf2, ???,Pfq0}, Pfj ?{0,1},by leveraging the spectrum sensing method 3. If Pfj =1, the fjth frequency slot is occupied by interference, otherwise fj is available 4. Remove the set of the occupied frequency slots FI={fj |Pfj=1} from F0 5. Update the set of frequency slots F0 and the number of frequency slots Output: The available frequency slots Fs with q frequency slots

    In the following,we propose a DSC-assisted transmission scheme that can be dynamically adjusted based on the spectrum sensing results with superior security performance.The DSC-assisted transmission scheme can generate a family of DSC sequences to represent the transmission decisions of the authorized users. With the proposed scheme,multiple authorized users can receive the data packets reliably during the same period and the possibility for passive eavesdroppers to decipher the transmission scheme is reduced,thereby achieving the goal of secure communication for authorized users. The procedures of generating the proposed DSC-assisted transmission scheme can be summarized in Algorithm 2.

    Algorithm 2. The proposed DSC-assisted transmission scheme.Input: The set of available frequency slots Fs, the number of available frequency slots q 1. For i=1, 2, ???, p 2. Generate a basic sequence family (Zφ,k) for k authorized users Zφ,k = {ziφ,k|k=1, 2, ???, K} based on the block cryptography 3. Upon applying sφ,k i =(sφ,k i-1 +zφ,k i + i)mod(q), acquire the sequence family Sφ,k={sφ,k i }4. If the frequency slots sφ,k i and sφ,w i occupied by user Uk and user Uw associated with BSφ in the ith time slot satisfies sφ,k i =sφ,w i (the authorized user w=1, 2, ???, K; w ≠k), let xφ,k i =(sφ,k i +ri)mod(q), where the orthogonal transformation factor ri=min(r|(sφ,k xφ,k i =sφ,k i +r)mod(q)≠sφ,w i ), otherwise,i 5. End for Output: The DSC sequence family Xφ,k={xφ,k; k=1, 2, ???, K}

    Based on the generated DSC sequence family Xφ,k, authorized users can occupy idle frequency slots in each time slot. It is clear that authorized users in the same microcell can access this micronetwork synchronously under the control of the mBS. Since the clocks are different in diverse microcells, the users associated with different mBSs and the MBS access the shared spectrum resources asynchronously.As shown in Fig.2,two authorized users in different communication cells (U1,aand UM,b) transmit the data packet occupying L (L ≤p ?q) consecutive time slots independently and randomly.

    4. Security analysis of data transmission in HCNs

    In this section,we conduct a theoretical analysis of the collision probability between two authorized users employing the DSCassisted transmission scheme.Based on the analysis of the collision probability, we also derive the closed-form expressions of the probability that authorized users can reliably receive the transmitted data packets and the probability that the eavesdroppers cannot acquire the transmitted data packets.

    4.1. Collision probability

    Considering that the TODs of these communication cells are different, authorized users in the MBS and mBSs might occupy the same frequency slot simultaneously, which causes a collision and introduces transmission interference. We assume that the process of data packets arriving at the shared transmission channel follows a Poisson distribution with an arrival rate (G).

    Fig. 2. Schematic diagram of the transmission scheme. fq: the qth frequency slot.

    Consequently, the probability density function (PDF) of transmitting data packets n in L time slots can be presented by fPDF(n).

    Note that the interference caused by the authorized data transmission in the HCNs is much greater than the interference power of the background noise. Therefore, the collision probability of data transmission should be analyzed since it greatly affects the data transmission performance. In our constructed HCNs, the collision probability for an authorized user refers to the probability that the authorized user occupies the same frequency slot as others in the same time slot when transmitting data packets in this network. Note that with the proposed DSC-assisted transmission scheme, authorized users served by the same base station do not collide with each other following the orthogonal sequences.Therefore, the data transmitted by the MBS can only conflict with the data transmitted by the mBS. Furthermore, considering that the coverage areas of the mBSs do not overlap with each other,an authorized user served by an mBS can only conflict with the data transmission from the MBS. In the following, we analyze the collision probability between users U1,a(associated with BS1) and UM,b(associated with the BSM) when transmitting their data packets.

    The data packet transmission processes of U1,aand UM,bthat are located in the BS1cell are shown in Fig.3.The symbols x1,ai (i=1,2,???, L) and xM,bi in Fig. 3 correspond to the frequency slots that are occupied by U1,aand UM,bat the ith time slot,respectively.Considering that the clocks of different cells are independent of each other,the data transmission start time of UM,bmight not be aligned with that of U1,a. As shown in Fig. 3, UM,bdoes not start transmitting until U1,ais about to complete the transmission task of the second time slot.We assume that there are l time slots overlapping between these two packets during the transmission period.In this case, during the data transmission period of UM,b, every time slot t (t1≤t ≤tl-1) of UM,boverlaps with two consecutive time slots of U1,a,the lth time slot of UM,bonly overlaps with the Lth time slot of U1,a,and the remaining time slots of UM,bdo not overlap with U1,a.It is worth noting that there is a special case where only the first time slot of UM,boverlaps with the last time slot of U1,a.

    Proof: Without loss of generality, if two data packets occupy different frequency slots in each time slot,they can be regarded as not colliding. Considering that data transmission in different time slots is independent of each other, the non-collision probability of two data packets transmitted by U1,aand UM,bis

    Considering that UM,bcan randomly occupy one of the available frequency slots at the rth time slot and lth time slot, (i.e.,

    Fig.3. Packet-transmission of U1,a and UM,b.l:the number of overlapping time slots between two packets in a transmission period;x1,aL :the frequency slot that is occupied by U1,a at the Lth time slot; : the frequency slot that is occupied by U1,a at the ith time slot; : the frequency slot that is occupied by UM,b at the Lth time slot; : the frequency slot that is occupied by UM,b at the ith time slot; tL and ti are the Lth and ith time slots, respectively.

    Since 0 ≤{Pj,P?j}≤1,{j,?j} = 1,2,???,q, apparently only when P1=P2=???=Pq=1/q can Pr(U1,a, UM,b) obtain its maximum value.Therefore,the maximum value of the non-collision probability is Eq. (2).

    Therefore, only when all the available frequency slots can be occupied by authorized users with equal probability, the maximum value of non-collision probability can be obtained.

    Based on the Theorem 1,we analyze the probability that n data packets can be transmitted without collision in HCNs.Theorem 2: Suppose that the authorized users in our constructed HCNs can occupy the frequency slots in Fswith equal probability 1/q. When user Uφ,τ (τ?{1, 2, ???, K}) is transmitting a data packet,there are k(k ≤K)users that might collide with Uφ,τ(when φ=M,these k authorized users served by all the mBSs,when φ=1,2,???,m, these k authorized users served by the MBS). Hence, the probability that Uφ,τ transmits a data packet without collision during the L data transmission time slots is

    Proof: Assume that the data transmission of authorized users U1,aand UM,boverlaps by l time slots. Since the process of the data packet arriving at the transmission channel follows the Poisson distribution, the probability for the authorized users transmitting the information at any time slot is equal. Accordingly, we can obtain that the probability of two data packets overlapping l time slots is

    Hence, the non-collision probability between this data packet and all other k data packets is given by Eq. (9).

    Two remarks can be derived from Theorem 2.

    Remark 1: For a fixed k,Pr(L,k,q)is a power function of the ratio L/q,and this function monotonically decreases with increasing value of L/q.

    Remark 2: For a fixed L/q,Pr(L,k,q)is an exponential function of k. In addition, since 0 < 1 - (L/q) < 1, Pr(L,k,q) decreases as k increases.

    Corollary 1: Based on Theorem 2, the collision probability between Uφ,τ and k users in other base stations can be given by

    4.2. Reliable transmission probability

    In HCNs,the interference to the transmitted information mainly comes from three aspects: background noise (N0), unauthorized malicious interference devices(Iun),and collisions between authorized users during data transmission(Ic).Therefore,the SINR of the authorized user (SINRu) can be expressed as

    where Purepresents the power received by the authorized user from the associated BS,and Ic,uis the interference from other authorized users due to transmission collision.Note that the influence of unauthorized malicious interference devices on data packets transmitted by authorized users Iun,ucan be avoided by Algorithm 1(i.e.,Iun,u= 0). Moreover, N0is characterized by a zero-mean, complex Gaussian random variable. Similarly, the SINR of the eavesdropper(SINRe) can be presented by

    where Peis the power of the data packet received by the eavesdropper,and Ic,edenotes the collisions between data packets transmitted within the observed frequency slots of the eavesdropper and other authorized transmitted data packets. The interference of unauthorized signals to the frequency slots observed by eavesdropper Iun,e= 0.

    As Wyner demonstrated in pioneering work[27],to decode the received data packet, the SINR of the authorized user should be greater than the decoding threshold(δu).We define the probability that all transmitted information can be received by authorized users as the reliable transmission probability, which can be expressed as

    where SINRu,BSis the SINR of the authorized user associated with the BSM.

    In the DSC-assisted scheme,the probability of the MBS occupying an available frequency slot(fj?Fs; j=1,2,???,q)is Pr(fj).Then,the power of desired data transmission received by the authorized user (Pu,BS) can be expressed as

    where PBSis the power of the BSM, θ is the number of authorized users associated with the BSM;g(u,BS)=|hu.fj.l|2denotes the channel gain between the BSMand the authorized user at the lth time slot,which follows an exponential distribution with parameter α2; u indicates the authorized users. In addition, the interference power caused by other authorized users occupying the same frequency slot is

    Based on Eq.(20),we can now derive the following proposition.

    where ρ refers to the number of users served by the mBSs.

    4.3. Secrecy probability

    To prevent passive eavesdroppers from decoding the information transmitted between authorized devices, the SINR of any eavesdroppers should be lower than the decoding threshold δe.

    Accordingly, we define the probability that valid information cannot be obtained by any eavesdropper as the secrecy probability,for example,

    where SINRe,BSis the SINR of the eavesdropper observing the signal transmitted by the BSM.

    Assume that eavesdroppers do not know the sequence family Xφ,k, which is also the common case for most practical systems.Therefore, each eavesdropper associates a random frequency slot to intercept the transmitted data packet. Hence, when eavesdropping on the BSMtransmission, the total power of intercepted data packets by the eavesdropper Ue(Pe)and the inter-cell interference to Ue(Ic,e) can be expressed as

    where e refers to the eavesdropper, the channel gain g(e,BS) =|he.fj.l|2between the eavesdropper and the MBS follows an exponential distribution with parameter λ2. Similarly, the channel gain g(e,bs) = |hme.fj.l|2between the eavesdropper and an mBS obeys an exponential distribution with parameter ω2.

    Substituting Eqs. (14) and (24) into Eq. (16), the SINR of eavesdropper can be rewritten as

    Proof: Proposition 2 can be verified in a similar manner as Proposition 1, so that the detailed proof is omitted here.

    For an authorized user associated with the MBS, the secrecy probability can be expressed as

    5. Network capacity analysis

    According to the analysis in Section 4,we can find that the reliable transmission probability and secrecy probability are both dependent on the number of users in the HCNs.Therefore,the upper and lower bounds on network capacity (i.e., the number of users that can be supported in the network) are derived in this section to guarantee reliable and secure data transmission probabilities.

    5.1. Network capacity of the MBS

    Assuming that Pr,minis the minimum required reliable transmission probability in HCNs, the following relationship can be obtained according to Proposition 1.

    where W is the Lambert-W function.

    As long as the number of authorized users associated with the BSMdoes not exceed the maximum capacity of this network, the data transmission can be successfully completed.

    Similarly, when the HCNs are constrained by the minimum secrecy probability (Ps,min), we can acquire the following relationship

    With the aid of the Lambert-W function, we can derive the lower bound of this macrocell network capacity in HCNs under the constraints of Ps,min.

    Therefore, the number of authorized users associated with the BSMshould exceed the lower bound of the capacity to ensure that the data packets transmitted in the BSMcannot be decrypted by the eavesdropper.

    5.2. Network capacity of the mBSs

    Similar to the analysis in Section 5.1, the network capacity of the mBSs can be obtained. The upper bound of the mBS network capacity is

    To this end, the upper and lower bounds of the number of authorized users allowed to access the network can be obtained according to the requirements of the actual application scenarios for the reliable transmission probability Pr,minand secrecy probability Ps,minof the HCNs. Therefore, by reasonably limiting the number of users accessing the network, the goal of effectively increasing the possibility of multiple users successfully transmitting data packets in the same transmission period while reducing the possibility of eavesdropping can be achieved.

    6. Numerical results

    In this section, we present simulation results to validate our theoretical analysis of the security and network capacity of HCNs.Moreover, we compare the proposed DSC-assisted transmission scheme with a benchmark scheme to demonstrate the effectiveness of the proposed scheme.

    6.1. Simulation configurations

    We consider a two-tier HCNs scenario, which consists of one MBS, and ten mBSs.Additionally, there are ten passive eavesdroppers were randomly distributed in our constructed HCNs.The powers of the MBS and the mBS are PBS= 43 decibel relative to one milliwatt (dBm)) and Pbs= 30 dBm, respectively. The parameter of average channel gain between the MBS and the authorized user is α2=5,for the channel between the MBS and the eavesdropper,it is λ2=3.Similarly,for the mBSs,the parameter of average channel gain for the authorized user is β2= 2, and for the eavesdropper is ω2= 1. In addition, the bandwidth of the shared transmission channel is set to 300 MHz. Unless otherwise specified, all of the results in this section are obtained with the above parameter settings.

    Fig. 4. Average reliable transmission and average secrecy probabilities vary with the SNR when q = 128 and L = 8. dB: decibel.

    6.2. Security performance evaluation

    (1)Different SINR thresholds δuand δe:Fig.4 shows the average reliable transmission probability and the secrecy probability with different signal-to-noise ratios(SNRs)when q and L are equal to 128 and 8, respectively. From the figure, we can find that

    · The probability of reliable transmission increases with increasing SNR, while the secrecy probability decreases approximately linearly.This phenomenon is especially obvious when the SNR is in the range from-5 to 10 decibel(dB).This demonstrates that with the assistance of our proposed DSC-assisted transmission scheme,when the communication environment improves, the possibility of reliable transmission can increase rapidly,while the possibility of eavesdroppers intercepting the information also slightly increases.

    · When the decoding thresholds δuand δeincrease from 2 to 3, the probability of reliable transmission decreases, while the secrecy probability increases.This shows that with stricter requirements on the channel conditions for successful data transmission, HCNs become more vulnerable to security threats.

    · We compare our proposed scheme with a conventional OFDM transmission method and an artificial noise-aided OFDM method [22]. The conventional OFDM transmission scheme aims to improve the resource utilization efficiency and achieve better network performance.Based on the conventional OFDM transmission scheme, the artificial noiseaided OFDM scheme introduces artificial noise to combat eavesdropping and enhance network security. We can find from the simulation results that the proposed DSC-assisted scheme can obtain the highest reliable transmission probability and secrecy probability. Furthermore, the proposed scheme does not introduce additional signal sources or require knowledge of the location of authorized users in advance. Therefore, it consumes less transmission power than the artificial noise-aided OFDM method and has a lower implementation complexity than the other two schemes.

    · The theoretical results match well with the simulation results as shown in Fig. 4, which confirms the correctness of our theoretical analysis.In the following,we use theoretical results to evaluate the impact of different parameters on the performance of the proposed scheme.

    (2)Impacts of L and q on the reliable transmission probability:Fig.5 demonstrates the influence of the time slot number L and the frequency slot number q on the average reliable transmission probability of the HCNs. The decoding threshold of the transmission link between the BSs and authorized users δuis 3.When each data transmission occupies L = 8 time slots, the reliable transmission probability increases as q increases. This is because dividing more frequency slots can effectively reduce the collision possibility among the data transmissions, leading to less co-channel interference among authorized users.In other words,it enhances the probability that the data packets can be successfully transmitted.However, when the available frequency slots number q is 128, as L increases, the reliable transmission probability decreases. The reason is that,with more time slots required for one data transmission, the collision probability increases with more co-channel interference.

    (3) Impacts of L and q on the secrecy probability: We obtain the average secrecy probability curves in Fig. 6 with δe= 3. Different from the results in Fig.5,the secrecy probability decreases with increasing SNR. Moreover, from Fig. 6, it is clear that the secrecy probability increases with a large L,when q is fixed.Once L is determined,the secrecy probability also increases as q increases.By utilizing the DSC-assisted transmission scheme,the eavesdropper has no idea which frequency slot is occupied for target data transmission in each time slot. If the eavesdropper always monitors one or several available frequency slots,it can only receive data fragments from different data packet transmissions. Since each data packet transmission occupies different frequency slots at different time slots, the eavesdropper has to successfully intercept all the data fragments to decode and obtain the entire data packet.With larger L and q, the eavesdropper needs to monitor more frequency slots for a longer time to obtain the complete data packet transmitted by the target authorized user. Therefore, with large L and q in the proposed DSC-assisted transmission scheme, it is difficult for the eavesdropper to decipher the transmitted data packets, leading to a high network security performance.

    6.3. Network capacity evaluation

    Fig.5. Average reliable transmission probability variation with SNR under different L and q when δu = 3.

    Fig.6. Average secrecy transmission probability variation with SNR under different L and q when δe = 3.

    We examine the impacts of different parameter settings on the network capacity of the proposed scheme. Fig. 7 shows the network capacity of the HCNs when L = 8,and δu=δe= 2.Fig. 7(a)shows that as the minimum required value of the reliable transmission probability increases, the upper bound of the network capacity slightly decreases. This is because when the requirement for the successful transmission of data packets becomes stricter,fewer users are allowed to access the network to reduce the collision probability between data packets transmitted over the limited spectrum resources. Fig. 7(b) reflects that as the minimum required value of secrecy probability increases, the lower bound of network capacity increases. To make it more difficult for eavesdroppers to obtain data packets in HCNs, the number of users accessing the network should increase to introduce more possibilities of frequency slot occupation at different time slots.

    We can also find from Figs. 7(a) and (b) that, with a fixed Pr,minor Ps,min, a larger q indicates that more authorized users can be allowed to access the network. Furthermore, according to our simulation, for the cases with q greater than 128, the lower bound of the network capacity falls below 0, which means that the secrecy requirements of the HCNs can always be guaranteed regardless of the number of users in the networks. The above observations allow us to conclude that with fixed requirements on reliable transmission probability and secrecy probability, the parameters of the DSC-assisted transmission scheme can be adjusted to accommodate more users for reliable and secure transmission.

    7. Conclusions and future work

    In this article, we have investigated the reliable and secure transmission problem in HCNs. Specifically, we have proposed a DSC-assisted transmission scheme to flexibly schedule the spectrum occupation for authorized data transmissions at different time slots. Moreover, we have also analyzed and derived closedform expressions of the collision probability,reliable transmission probability,secrecy probability,and network capacity.By adopting the proposed scheme,limited spectrum resources can be efficiently utilized,and the parameters of the DSC-assisted scheme(e.g.,L and q) can be flexibly adjusted to enhance network capacity while guaranteeing secure transmission.The scheme design and theoretical analysis in this work can provide useful guidance for future research on security enhancement of wireless networks. For our future work, we will introduce friendly interference sources and investigate source selection and power allocation to further improve the reliable and secure transmission probabilities.

    Fig.7. Average network capacity variation with different requirements on reliable transmission probability and secrecy probability for PBS=43 dBm,Pbs=30 dBm,L=8,and δu=δe=2.(a)The impact of the reliable transmission probability requirement on the upper bound of average network capacity with different values of q;(b)the impact of the secrecy probability requirement on the lower bound of average network capacity with different values of q.

    Acknowledgments

    This work was supported by the National Natural Science Foundation of China (61825104 and 91638204), the China Scholarship Council (CSC), the Natural Sciences and Engineering Research Council (NSERC) of Canada, and University Innovation Platform Project (2019921815KYPT009JC011).

    Compliance with ethics guidelines

    Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, and Xuemin (Sherman) Shen declare that they have no conflicts of interest or financial conflicts to disclose.

    Appendix A. Supplementary data

    Supplementary data to this article can be found online at https://doi.org/10.1016/j.eng.2021.04.019.

    免费高清视频大片| 久久精品国产99精品国产亚洲性色| 亚洲国产精品成人综合色| 午夜福利免费观看在线| 长腿黑丝高跟| 国产私拍福利视频在线观看| www日本黄色视频网| 久久人人精品亚洲av| 久久久久久九九精品二区国产| 波野结衣二区三区在线| 免费av观看视频| 人妻丰满熟妇av一区二区三区| 精品久久久久久成人av| 国产单亲对白刺激| 国内精品久久久久久久电影| 熟女人妻精品中文字幕| 日韩欧美精品免费久久 | 亚洲va日本ⅴa欧美va伊人久久| 国产欧美日韩精品一区二区| 亚洲人成网站高清观看| 精品久久久久久久久久久久久| 亚洲av电影不卡..在线观看| 久久草成人影院| 亚洲成a人片在线一区二区| 色视频www国产| 真实男女啪啪啪动态图| 成人永久免费在线观看视频| 午夜两性在线视频| 老熟妇仑乱视频hdxx| 男人舔女人下体高潮全视频| 成年女人永久免费观看视频| 免费人成视频x8x8入口观看| 亚洲国产色片| 亚洲av不卡在线观看| 人妻丰满熟妇av一区二区三区| 久久久久国产精品人妻aⅴ院| 我的老师免费观看完整版| 亚洲欧美日韩无卡精品| 国产精品免费一区二区三区在线| 欧美性猛交╳xxx乱大交人| 国产成人影院久久av| 亚洲成a人片在线一区二区| 真实男女啪啪啪动态图| 免费看光身美女| 日本黄大片高清| 美女大奶头视频| 少妇的逼好多水| 狠狠狠狠99中文字幕| 最近在线观看免费完整版| 如何舔出高潮| 国产高清三级在线| 少妇熟女aⅴ在线视频| 三级国产精品欧美在线观看| eeuss影院久久| 成年女人永久免费观看视频| 18美女黄网站色大片免费观看| 一级黄片播放器| 国产aⅴ精品一区二区三区波| 内射极品少妇av片p| 免费在线观看影片大全网站| eeuss影院久久| 亚洲无线在线观看| 欧美成人一区二区免费高清观看| xxxwww97欧美| 国产精品一区二区免费欧美| 在线十欧美十亚洲十日本专区| 一进一出抽搐gif免费好疼| 最新中文字幕久久久久| a级毛片免费高清观看在线播放| 天天躁日日操中文字幕| 中文字幕精品亚洲无线码一区| 亚洲精品乱码久久久v下载方式| 在线播放无遮挡| 欧美日韩黄片免| 亚洲成人中文字幕在线播放| 精品久久国产蜜桃| 97热精品久久久久久| 欧美一区二区精品小视频在线| 中文字幕人成人乱码亚洲影| 丰满乱子伦码专区| 日韩高清综合在线| 麻豆av噜噜一区二区三区| 怎么达到女性高潮| 欧美激情久久久久久爽电影| 男人舔奶头视频| 97超视频在线观看视频| 观看美女的网站| 国产人妻一区二区三区在| 高清在线国产一区| 欧美乱色亚洲激情| 每晚都被弄得嗷嗷叫到高潮| 国产高清激情床上av| 亚洲av电影在线进入| 禁无遮挡网站| 欧美极品一区二区三区四区| 国产亚洲精品综合一区在线观看| 日本黄色视频三级网站网址| 日韩中字成人| 国产一区二区三区在线臀色熟女| 国产亚洲av嫩草精品影院| 色综合欧美亚洲国产小说| 看片在线看免费视频| 国产精品亚洲一级av第二区| 少妇被粗大猛烈的视频| av在线天堂中文字幕| 久99久视频精品免费| 亚洲天堂国产精品一区在线| 亚洲最大成人中文| 嫩草影视91久久| 国产精品一区二区三区四区久久| 99久久无色码亚洲精品果冻| 国产精品亚洲av一区麻豆| 99久久精品一区二区三区| 国产视频一区二区在线看| 少妇丰满av| 欧美一区二区亚洲| 亚洲国产色片| 99热这里只有是精品50| 麻豆成人av在线观看| 精华霜和精华液先用哪个| or卡值多少钱| 在现免费观看毛片| 99久久成人亚洲精品观看| 天天一区二区日本电影三级| 亚洲真实伦在线观看| 麻豆国产97在线/欧美| 午夜免费激情av| 亚洲久久久久久中文字幕| 一个人看视频在线观看www免费| 久久欧美精品欧美久久欧美| 国产欧美日韩精品亚洲av| 久久久久九九精品影院| 蜜桃久久精品国产亚洲av| 少妇熟女aⅴ在线视频| 国产野战对白在线观看| 国产一区二区激情短视频| 在现免费观看毛片| 精品久久久久久久久久免费视频| 国产精品1区2区在线观看.| 成人三级黄色视频| 欧美性感艳星| 免费在线观看亚洲国产| 波多野结衣巨乳人妻| 国产免费一级a男人的天堂| 美女黄网站色视频| 中国美女看黄片| 久久伊人香网站| 白带黄色成豆腐渣| 五月伊人婷婷丁香| 深爱激情五月婷婷| 亚洲人成伊人成综合网2020| 国产精品野战在线观看| 99久久久亚洲精品蜜臀av| 亚洲,欧美精品.| 18禁裸乳无遮挡免费网站照片| 亚洲男人的天堂狠狠| 成人高潮视频无遮挡免费网站| 亚洲乱码一区二区免费版| 听说在线观看完整版免费高清| 简卡轻食公司| 国产精品野战在线观看| 国产高清视频在线播放一区| 天堂√8在线中文| 精品一区二区三区视频在线| 淫妇啪啪啪对白视频| 日本黄色视频三级网站网址| 亚洲av美国av| 中国美女看黄片| 又爽又黄a免费视频| 在线观看免费视频日本深夜| 免费av毛片视频| 最近最新免费中文字幕在线| 99热这里只有精品一区| 激情在线观看视频在线高清| 中文字幕人成人乱码亚洲影| 99国产精品一区二区蜜桃av| 99久国产av精品| 亚洲欧美日韩东京热| 国产午夜精品久久久久久一区二区三区 | 国产成人福利小说| 好男人在线观看高清免费视频| 精品一区二区三区av网在线观看| 色哟哟哟哟哟哟| 欧美精品国产亚洲| 国产淫片久久久久久久久 | 国产午夜精品久久久久久一区二区三区 | 欧美黄色淫秽网站| 欧美日韩国产亚洲二区| 丁香欧美五月| а√天堂www在线а√下载| 首页视频小说图片口味搜索| 99国产精品一区二区三区| 美女免费视频网站| а√天堂www在线а√下载| 色av中文字幕| 白带黄色成豆腐渣| 国产欧美日韩一区二区三| 欧美成人一区二区免费高清观看| 真实男女啪啪啪动态图| 精品一区二区三区人妻视频| 午夜日韩欧美国产| 国产精品影院久久| 一个人免费在线观看的高清视频| 狂野欧美白嫩少妇大欣赏| 日日摸夜夜添夜夜添小说| 男人舔奶头视频| 俄罗斯特黄特色一大片| 亚洲一区高清亚洲精品| 亚洲欧美日韩东京热| 少妇丰满av| 欧美成人一区二区免费高清观看| 一本精品99久久精品77| 动漫黄色视频在线观看| 美女高潮喷水抽搐中文字幕| 久久久色成人| 天堂av国产一区二区熟女人妻| 亚洲精品亚洲一区二区| 极品教师在线免费播放| 男人狂女人下面高潮的视频| 又黄又爽又免费观看的视频| 国产高清激情床上av| 美女cb高潮喷水在线观看| 中文字幕久久专区| 好男人电影高清在线观看| 我要看日韩黄色一级片| 性欧美人与动物交配| 免费看光身美女| 久久99热这里只有精品18| a在线观看视频网站| av在线老鸭窝| 欧美一区二区精品小视频在线| 露出奶头的视频| 亚洲一区高清亚洲精品| 人妻制服诱惑在线中文字幕| 精华霜和精华液先用哪个| 久久亚洲真实| 尤物成人国产欧美一区二区三区| 亚洲中文字幕日韩| 哪里可以看免费的av片| 非洲黑人性xxxx精品又粗又长| 国产亚洲精品综合一区在线观看| 国产精品久久久久久亚洲av鲁大| 欧美性猛交╳xxx乱大交人| 国产69精品久久久久777片| 国产免费男女视频| www日本黄色视频网| 69av精品久久久久久| www.熟女人妻精品国产| 国产一级毛片七仙女欲春2| 床上黄色一级片| 免费在线观看成人毛片| 亚洲,欧美,日韩| 男女下面进入的视频免费午夜| 免费人成视频x8x8入口观看| 九色国产91popny在线| 动漫黄色视频在线观看| 丰满乱子伦码专区| 久久草成人影院| 国产老妇女一区| 天堂√8在线中文| 精品无人区乱码1区二区| 天天一区二区日本电影三级| 国产精品av视频在线免费观看| 亚洲精品久久国产高清桃花| 99热这里只有是精品50| 久久热精品热| 日本免费a在线| 级片在线观看| 两个人的视频大全免费| 国产精品日韩av在线免费观看| 午夜激情福利司机影院| 欧美激情国产日韩精品一区| 精品国产三级普通话版| 午夜福利视频1000在线观看| 99热精品在线国产| 人人妻人人澡欧美一区二区| 老鸭窝网址在线观看| 国产大屁股一区二区在线视频| 亚洲一区二区三区色噜噜| 亚洲国产欧美人成| 亚洲人成伊人成综合网2020| 欧美激情国产日韩精品一区| 久久精品国产自在天天线| 亚洲精品影视一区二区三区av| 十八禁国产超污无遮挡网站| 老熟妇仑乱视频hdxx| 乱人视频在线观看| 老司机午夜福利在线观看视频| 老司机深夜福利视频在线观看| 国产野战对白在线观看| 97热精品久久久久久| 成人美女网站在线观看视频| 大型黄色视频在线免费观看| 日本免费a在线| 亚洲美女搞黄在线观看 | 性欧美人与动物交配| 婷婷亚洲欧美| 日韩欧美三级三区| 简卡轻食公司| 一本综合久久免费| 久久精品久久久久久噜噜老黄 | 免费观看人在逋| 日本三级黄在线观看| 精品国产亚洲在线| 国产精品爽爽va在线观看网站| 欧美3d第一页| 激情在线观看视频在线高清| 国产91精品成人一区二区三区| 精品一区二区三区视频在线| 久久久久免费精品人妻一区二区| 欧美bdsm另类| 国产成人影院久久av| 国产欧美日韩精品一区二区| 国产野战对白在线观看| 久久天躁狠狠躁夜夜2o2o| 日韩大尺度精品在线看网址| 亚洲精品在线观看二区| 99久久无色码亚洲精品果冻| 精品一区二区三区av网在线观看| 男人舔奶头视频| 女人十人毛片免费观看3o分钟| 啦啦啦观看免费观看视频高清| 国产野战对白在线观看| 免费搜索国产男女视频| 淫妇啪啪啪对白视频| 国产男靠女视频免费网站| 一个人观看的视频www高清免费观看| 国产高清三级在线| 日韩精品青青久久久久久| 最近中文字幕高清免费大全6 | 成人鲁丝片一二三区免费| 精品福利观看| 国产国拍精品亚洲av在线观看| 欧美丝袜亚洲另类 | 精品人妻1区二区| 亚洲精品影视一区二区三区av| 日日摸夜夜添夜夜添小说| 免费人成在线观看视频色| 丁香欧美五月| 亚洲成av人片免费观看| 中文资源天堂在线| 在线免费观看的www视频| 日本黄色片子视频| 在线天堂最新版资源| 偷拍熟女少妇极品色| av黄色大香蕉| 嫩草影视91久久| 99riav亚洲国产免费| 色综合婷婷激情| 国产免费av片在线观看野外av| 国产精品美女特级片免费视频播放器| 免费无遮挡裸体视频| 久久精品综合一区二区三区| 亚洲国产精品久久男人天堂| 日韩免费av在线播放| 18美女黄网站色大片免费观看| 18+在线观看网站| 黄色女人牲交| x7x7x7水蜜桃| 国产极品精品免费视频能看的| 欧美日韩乱码在线| 亚洲在线自拍视频| 搡老岳熟女国产| bbb黄色大片| 亚洲av二区三区四区| 琪琪午夜伦伦电影理论片6080| 别揉我奶头 嗯啊视频| 国产三级在线视频| 久久性视频一级片| 国产成+人综合+亚洲专区| 国产高清视频在线观看网站| 国产v大片淫在线免费观看| av在线蜜桃| 啪啪无遮挡十八禁网站| 欧美日本视频| 我的女老师完整版在线观看| 国产成人欧美在线观看| 亚洲国产高清在线一区二区三| 欧美一区二区亚洲| 十八禁国产超污无遮挡网站| 国产精品影院久久| 色精品久久人妻99蜜桃| 久久久久久久久中文| 久久精品久久久久久噜噜老黄 | 嫩草影院新地址| 淫妇啪啪啪对白视频| 精华霜和精华液先用哪个| 亚洲成av人片免费观看| 午夜日韩欧美国产| 精品国产三级普通话版| 中文字幕精品亚洲无线码一区| av福利片在线观看| 久久久精品欧美日韩精品| 丰满人妻熟妇乱又伦精品不卡| 波多野结衣高清无吗| 久久天躁狠狠躁夜夜2o2o| 久久久久久久久中文| 国产伦精品一区二区三区视频9| 国产麻豆成人av免费视频| h日本视频在线播放| 一个人免费在线观看的高清视频| 天堂影院成人在线观看| 欧美日本亚洲视频在线播放| 久久性视频一级片| 国产成+人综合+亚洲专区| 国产精品日韩av在线免费观看| 日本三级黄在线观看| 国产av在哪里看| 国产精华一区二区三区| 99国产精品一区二区三区| 国产一区二区在线av高清观看| 丰满人妻熟妇乱又伦精品不卡| 亚洲真实伦在线观看| 久久午夜亚洲精品久久| 国产毛片a区久久久久| 制服丝袜大香蕉在线| 99精品在免费线老司机午夜| 日本 av在线| 99久久精品国产亚洲精品| 国产午夜福利久久久久久| 欧美激情在线99| 搡老熟女国产l中国老女人| 国产精品一区二区三区四区久久| 亚洲av电影不卡..在线观看| 日本免费一区二区三区高清不卡| 色精品久久人妻99蜜桃| 内射极品少妇av片p| 亚洲国产欧美人成| 又爽又黄a免费视频| 3wmmmm亚洲av在线观看| x7x7x7水蜜桃| 欧美三级亚洲精品| 亚洲精品久久国产高清桃花| 757午夜福利合集在线观看| 亚洲av电影在线进入| 天堂网av新在线| 国内揄拍国产精品人妻在线| 成年免费大片在线观看| 午夜福利欧美成人| 国产亚洲欧美在线一区二区| 精品久久久久久成人av| 中文字幕av成人在线电影| 18美女黄网站色大片免费观看| 一个人看视频在线观看www免费| 亚洲国产欧洲综合997久久,| 欧美成人免费av一区二区三区| 在线观看免费视频日本深夜| 亚洲精品色激情综合| 欧美另类亚洲清纯唯美| 亚洲精品在线美女| 九九热线精品视视频播放| 亚洲在线自拍视频| 久久精品国产亚洲av香蕉五月| 女人被狂操c到高潮| 在线观看av片永久免费下载| 在线观看午夜福利视频| 国产精品乱码一区二三区的特点| 综合色av麻豆| 国产成人a区在线观看| 国产精品av视频在线免费观看| 女人被狂操c到高潮| 国产三级中文精品| 青草久久国产| 欧美最新免费一区二区三区 | 免费看日本二区| 亚洲国产色片| 精品一区二区三区视频在线观看免费| 国模一区二区三区四区视频| 欧美绝顶高潮抽搐喷水| 超碰av人人做人人爽久久| 波多野结衣巨乳人妻| 久久久久久久午夜电影| 脱女人内裤的视频| 天堂动漫精品| 久久人妻av系列| 色综合亚洲欧美另类图片| 亚洲国产精品久久男人天堂| 少妇被粗大猛烈的视频| 婷婷丁香在线五月| av国产免费在线观看| 女人被狂操c到高潮| 国产男靠女视频免费网站| 两人在一起打扑克的视频| 亚洲精品亚洲一区二区| 久99久视频精品免费| 国产乱人视频| 可以在线观看的亚洲视频| 三级国产精品欧美在线观看| 麻豆国产av国片精品| 身体一侧抽搐| 毛片女人毛片| 精品一区二区三区视频在线观看免费| 给我免费播放毛片高清在线观看| 在线a可以看的网站| 亚洲国产精品成人综合色| 婷婷亚洲欧美| 一区二区三区免费毛片| 久久国产精品影院| 久久亚洲真实| 又紧又爽又黄一区二区| 成人无遮挡网站| 一级黄色大片毛片| 一本久久中文字幕| 国产精品亚洲一级av第二区| 99riav亚洲国产免费| 成人特级黄色片久久久久久久| 欧美成狂野欧美在线观看| 永久网站在线| 1024手机看黄色片| 国产高清视频在线播放一区| 别揉我奶头~嗯~啊~动态视频| 三级国产精品欧美在线观看| 日韩有码中文字幕| 久久热精品热| 国产中年淑女户外野战色| 婷婷精品国产亚洲av在线| 久久久国产成人精品二区| 中文字幕人成人乱码亚洲影| 欧美日韩亚洲国产一区二区在线观看| 丁香欧美五月| 欧美日韩亚洲国产一区二区在线观看| 男人舔女人下体高潮全视频| 在线播放国产精品三级| 91麻豆精品激情在线观看国产| 老女人水多毛片| 色吧在线观看| 天堂网av新在线| 99在线人妻在线中文字幕| 脱女人内裤的视频| 色综合站精品国产| 国产午夜精品论理片| 天美传媒精品一区二区| 国内精品一区二区在线观看| 久久6这里有精品| 成年版毛片免费区| 97热精品久久久久久| 欧美三级亚洲精品| bbb黄色大片| 日本五十路高清| 亚洲精品456在线播放app | 国产免费av片在线观看野外av| 中文字幕人妻熟人妻熟丝袜美| 香蕉av资源在线| 精品久久久久久久久久免费视频| 国产三级黄色录像| 在线播放无遮挡| 性色av乱码一区二区三区2| 在线十欧美十亚洲十日本专区| 精品久久久久久久末码| 夜夜看夜夜爽夜夜摸| 国产淫片久久久久久久久 | 99国产精品一区二区蜜桃av| 婷婷精品国产亚洲av| 俺也久久电影网| 三级国产精品欧美在线观看| 免费在线观看成人毛片| 亚洲国产精品sss在线观看| 欧美高清性xxxxhd video| 久久精品国产清高在天天线| 亚洲欧美日韩高清在线视频| 露出奶头的视频| 99国产精品一区二区三区| 免费搜索国产男女视频| 在线天堂最新版资源| 国产人妻一区二区三区在| 国产av在哪里看| 欧美高清性xxxxhd video| 色吧在线观看| 可以在线观看毛片的网站| 亚洲性夜色夜夜综合| 国产探花极品一区二区| 久久天躁狠狠躁夜夜2o2o| 不卡一级毛片| 在线免费观看不下载黄p国产 | 欧美黑人欧美精品刺激| 在线国产一区二区在线| 国产黄色小视频在线观看| 日韩精品中文字幕看吧| 亚洲精华国产精华精| 九九在线视频观看精品| 国产欧美日韩一区二区精品| 97碰自拍视频| 久久久国产成人精品二区| 久久婷婷人人爽人人干人人爱| 国产 一区 欧美 日韩| 久久久久久国产a免费观看| 欧美激情国产日韩精品一区| 欧美成人a在线观看| 全区人妻精品视频| 免费在线观看亚洲国产| 午夜福利欧美成人| 午夜精品一区二区三区免费看| 亚洲av电影在线进入| 亚洲av二区三区四区| 好男人在线观看高清免费视频| 国产精品影院久久| 亚洲男人的天堂狠狠| 亚洲精品色激情综合| 日日摸夜夜添夜夜添av毛片 | 亚洲国产色片| 色在线成人网| 久久久久精品国产欧美久久久| 床上黄色一级片| 欧美绝顶高潮抽搐喷水| 国产精华一区二区三区| 97碰自拍视频| 亚洲avbb在线观看| 天堂动漫精品| 熟妇人妻久久中文字幕3abv| 最后的刺客免费高清国语| 国内少妇人妻偷人精品xxx网站| 亚洲精品456在线播放app | 日韩欧美免费精品| 女同久久另类99精品国产91| 一进一出抽搐动态|