• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust H∞state estimation for a class of complex networks with dynamic event-triggered scheme against hybrid attacks

    2022-02-24 09:39:16YahanDeng鄧雅瀚ZhongkaiMo莫中凱andHongqianLu陸宏謙
    Chinese Physics B 2022年2期

    Yahan Deng(鄧雅瀚), Zhongkai Mo(莫中凱), and Hongqian Lu(陸宏謙)

    School of Intelligent Systems Engineering,Guangxi City Vocational University,Chongzuo 532200,China

    We investigate the dynamic event-triggered state estimation for uncertain complex networks with hybrid delays suffering from both deception attacks and denial-of-service attacks.Firstly, the effects of time-varying delays and finitedistributed delays are considered during data transmission between nodes.Secondly, a dynamic event-triggered scheme(ETS)is introduced to reduce the frequency of data transmission between sensors and estimators.Thirdly,by considering the discussed plant, dynamic ETS, state estimator, and hybrid attacks into a unified framework, this framework is transferred into a novel dynamical model.Furthermore,with the help of Lyapunov stability theory and linear matrix inequality techniques, sufficient condition to ensure that the system is exponentially stable and satisfies H∞performance constraints is obtained,and the design algorithm for estimator gains is given.Finally,two numerical examples verify the effectiveness of the proposed method.

    Keywords: dynamic event-triggered scheme,hybrid attacks,complex networks,state estimation

    1.Introduction

    Complex networks (CNs) can be seen as a class of generalized mathematical models abstracted from certain actual complex systems and introduced as an important tool in related cross-disciplines.A CN model can describe a large number of complex systems that exist in practice,and it usually consists of nodes,edges and topologies.[1]Nodes are used to represent different individuals in an actual system.The relationship between individuals is represented by edges, and the dynamic structure of the network is influenced by the topology.[2]Neural systems,computer networks, power networks,social relationship networks,and transportation systems are typical CNs,for example, in a nervous system, each nerve cell connected by nerve fibers can be regarded as a node,and a nervous system can be regarded as a CN.[3]Due to many advantages of CNs,they have been widely used in fields such as the Internet,sociology, communication security and image processing.[4]In recent years, research on complex networks has become a hot topic in theory and practice,for example,synchronization,consensus and state estimation.[5,6,8–11]Specifically, the authors of Ref.[9] proposed synchronization approach for delay CNs with nonlinearity and deception attacks.Based on an event-triggered scheme(ETS),the authors of Ref.[10]discussed the state estimation problem for nonlinearly coupled CNs with finite-distributed delays and discrete delay.Considering incomplete measurements and uncertain inner-coupling,a design method ofH∞state estimator was proposed for discrete CNs in Ref.[11].In this paper, we discuss the state estimation problem of complex networks with respect to both network security and resource constraint.

    Generally, for the traditional data transmission strategy,the measurement signal of the estimator is updated with equal cycles.[12]Due to the limited network bandwidth resources,how to ensure the system has a certain performance,while effectively reducing the waste of network resources has been one of the key issues for networked systems.[13,14]Among many data transmission scheduling schemes, the event-triggered scheme stands out.[15]The core idea of ETS is to determine whether the current packet can meet the preset triggering conditions, and if so, the packet will be transmitted to the remote destination through the communication network.[16]As the problem of networked systems becomes more complex,more and more improved ETSs are proposed for reaping superior results, such as dynamic ETS,[17]adaptive ETS,[18]selftriggered scheme,[19]distributed ETS,[20]and hybrid ETS.[21]Specifically,a dynamic event-driven state estimation issue was investigated in Ref.[22] for discrete CNs with probabilistic sensor saturation.By utilizing an adaptive ETS,an state estimation problem was conducted for fractional-order CNs with probabilistic nonlinearities against cyber attacks in Ref.[23].In this paper, the design scheme of dynamic event-driven estimator is discussed in order to reduce the frequency of data exchange between sensors and estimators.

    The application of networked systems has brought us a lot of convenience, but in the open network environment, the system faces security issues that cannot be ignored.[24]In recent years, malicious attacks against the networked systems of government agencies and enterprises have been increasing.For examples, on January 10, 2021, the Central Bank of New Zealand’s third-party hosting provider suffered a cyber attack that resulted in a data breach;on January 15,2021,the Scottish Environment Protection Agency disclosed a ransom attack that caused a serious network outage and theft of some data.[25]Based on the above-mentioned attaches, many security strategies for defending against cyber attacks[denialof-service (DoS) attacks, deception attacks, replay attacks,etc.] have been proposed.[26–28]Specifically, the authors of Ref.[29] proposed an improved recursive filtering algorithm for a class of CNs with state saturation and deception attacks.In Ref.[30],the problem of partial-nodes-based state estimation was studied for a class of uncertain CNs against deception attacks.Given that the impact of deception and DoS attacks on complex networks will be considered in this paper.The characteristics of the attacks are as follows: Deception attacks replace real data in a communication network by fake data.DoS attacks prevent the transmission of data in a communication network to a remote destination in order to destabilize the system.Note that the hybrid attacks mentioned subsequently in this paper refer to the attack model consisting of the deception attacks and the DoS attacks.

    Currently, many scholars have studied the security of complex networks from the perspective of state estimation.However, the literature related to state estimation of complex networks under cyber attacks and network resource constraints is very limited,which is the main motivation of this paper.The other two motivations are as follows: on the one hand,the introduction of dynamic event triggering scheme to avoid bandwidth resource redundancy under high sampling frequency;on the other hand,the development of appropriate security strategies to deal with potential threats in an open network environment.Based on the above three points, this paper aims to meet the system performance requirements while improving the utilization of network resources and effectively resisting cyber attacks.

    In this paper,the problem of security state estimation for a class of uncertain CNs with mixed delays and hybrid attacks is studied with the help of a dynamic ETS.To avoid the transmission of redundant data in the communication network, a dynamic ETS is introduced to reduce the need for estimators to perform unnecessary updates of measurement information.Also,a class of complex networks under cyber attacks and dynamic ETS is modeled as a dynamic system by considering unknown deception attacks and DoS attacks in the communication network.Then,sufficient conditions to ensure that this system is stable and satisfies theH∞performance constraint are obtained by using Lyapunov stability theory and linear matrix inequality(LMI).Based on the above stability criterion,a dynamic event-triggered estimator is designed to estimate the plant state.Finally,the validity of the designed dynamic eventtriggered estimator is verified by two examples.The main contributions of this paper are as follows:

    A novel dynamics model is developed to describe the delay phenomenon among nodes, data transmission scheduling strategies and hybrid attack behaviors in CNs.

    Considering the complexity of physical networks, the form of cyber attacks is extended from the universal single attack to the hybrid attacks consisting of many different attack behaviors.

    Two sets of Bernoulli random variables are utilized to depict the random occurrence sequences of deception attacks and DoS attacks,respectively.

    Based on the above dynamics model,uncertainties in the system parameters are further considered and robust stability analysis is also developed.

    Notations: Rn×mmeansn×mreal matrix; Rndenotesn-dimensional Euclidean space;A> 0 (A≥0) implies positive definite (positive semi-definite) symmetric matrix; E {A} represents mathematical expectation of random variableA; colN{Xi} and diagN{Yi} stand for the blockcolumn matrix col{X1,X2,...,XN}and the block-diagonal matrix col{Y1,Y2,...,YN},respectively.

    2.Preliminaries

    Consider the following CNs withNcoupled nodes:

    wherexi(k)∈Rn,yi(k)∈Rmandzi(k)∈Rrare,respectively,the state vector, the ideal measurement output and the output to be estimated of thei-th node; η(k) is the discrete timevarying delay and satisfies ηm≤η(k)≤ηM;is the finite-distributed delay and satisfies 10(i/=j)but not all zero,and the diagonal element is expressed bywii=.Ai,Bi,Di,EiandMiare known matrices.ΔAi(k), ΔBi(k), ΔDi(k) and ΔΓ(k) are the perturbed matrices,which are expressed as

    whereNi,Mai,Mbi,Mdi,NΓandMΓare known matrices.F(k)is a uncertain matrix and satisfiesFT(k)F(k)≤I.

    Fig.1.The systematic structure.

    It is well known that the limited network bandwidth is insufficient to support the transmission of high frequency sampled signals in communication networks.For this reason,we need to introduce a suitable data transmission scheduling scheme to reduce the amount of data transmission in the communication network.In addition for open network environments,we have to take into account the potential risk of cyber attacks.Specifically, the main work of this paper is devoted to study a co-design method for robust state estimation and dynamic event-triggered schemes against hybrid attacks.In Eq.(1),the uncertain complex networks with time-varying delay and finite-distributed delay are given.As shown in Fig.1,we model the dynamic event-triggered scheme,hybrid attacks as well as the system under consideration uniformly,and transform them into an estimation error dynamic model.Details are as follows:

    Firstly,without dynamic event-triggered scheme and hybrid attacks, the ideal measurement output can be expressed asyi(k)=Cixi(k).Secondly, we introduce a dynamic eventtriggered scheme in the communication network between sensors and estimators.For each node, the next release instantof thei-th node(1

    where πiand σiare given constants,and ξi(k)=yi(k)?;is the last released data-packet.Moreover,φi(k)is a dynamic function and satisfies

    where 0<τi<1,and φi(0)is a given initial condition.

    For ξi(k)=yi(k)?,the measurement output applied to the above scheme can be represented as

    Then, since an open network environment may be exposed to multiple potential security risks, we discuss the impact of two types of cyber attacks on the complex networks.As a result,the data-packet transmitted to the estimator under the hybrid attacks can be expressed as

    where αi(k) and βi(k) are Bernoulli distributed white sequences.

    Assumption 1The nonlinear functionf(xi(k)) represents the deception attack signal and satisfies the following condition:

    withFbeing a real constant matrix.

    Assumption 2αi(k)and βi(k)satisfy the following statistical properties:

    From this,we have

    Remark 1In Eq.(6),andf(xi(k)) are introduced to model the transmission data under hybrid cyber attacks.When αi(k)=0 and βi(k)=0,the data transmission in the communication network is normal.When αi(k)=1 and βi(k)=0,the real data is replaced by false signal from deception attack.When αi(k)=0 and βi(k)=1,DoS attacks block all data transmission in the communication network.

    Remark 2If∈(0,1)and∈(0,1),data transmission in the communication network is affected by both types of cyber attacks.The Bernoulli distributed white sequence used to describe the occurrence or non-occurrence of different cyber attacks is unlikely to be identical.DoS attack and deception attack may occur alternately or simultaneously.The DoS attack is characterized by preventing any data from being transmitted through the communication network to its destination,and the false signal generated by the deception attack is no exception.Therefore, we default the DoS attack to enjoy priority in the actual numerical simulation,that is,the deception attack is not considered when both types of cyber attacks are released at the same time.

    Construct the following state estimator for nodei:

    Denote thatei(k)=xi(k)?,and.

    For natational convenience,we further denote

    Then, through Kronecker product,in Eqs.(1) and (10) can be rewritten as.From Eqs.(1)–(10),we obtain

    By setting ζ(k)=,we obtain the following augmented system:

    where

    For convenience of follow-on work,we require some necessary processing of Eq.(12)according to Assumption 2,and Eq.(12)can be rewritten as

    where

    Lemma 1For a real constant ρi>0, and matrixR>0,the following inequality holds:

    The following definition will play an important role in the stability analysis of dynamic system(12)and the design of the corresponding estimator(10).

    Definition 1[10]For real constants ?a>0 and 0<<1,dynamic system(12)withw(k)=0 is said to be exponentially mean-square stable(EMSS),so that

    3.Main results

    In this section,we design the estimator gain for a class of complex networks under the premise of ensuring the stability of the augmented system.First,we give a sufficient condition to ensure that the system is exponentially mean-square stable and that theH∞performance constraint is satisfied.Then,based on the above theorem,a design method for the estimator gain is given.The main content of this section will be presented as the following theorems.

    Theorem 1Given,γ,τi,πi,σi(i=1,2,...,N),and the estimator gainL, system (12) is EMSS, and satisfies theH∞performance constraint for all nonzero ω(k),if there exist matricesP>0,Q>0,R>0,and scalar δ1>0,the following LMI will hold:

    where

    ProofChoose the following Lyapunov functional candidate:

    where

    Taking the difference and mathematical expectation ofV(k)along the system(12)yields

    Taking consideration of triggering condition(3)and nonlinear constraint(7),the following inequalities hold:

    Then,it follows from Lemma 1 that

    where Σμ=.Notice that the following zero equality holds:

    Denote

    where C,F,M,Λ3,Λ4,Λ5,Π1,Π2,Π3and Π4are defined in Eq.(15).

    Under the zero initial condition,we can obtain the following inequality by summing both sides of Eq.(26)from 0 toTand lettingT→∞:

    which implies that theH∞performance constraint is ensured.Then,with the help of Schur complement,we can obtain

    From Definition 1 and Eq.(27), when LMI (14) holds,augmented system(12)is EMSS and satisfiesH∞performance constraint.This completes the proof.

    Next,a design method of the desired estimator in form of Eq.(10)for the augmented system(12)can be presented in the following theorem.

    Theorem 2Given,,γ,τi,πi,σi(i=1,2,...,N),the estimator in form of Eq.(10) for the augmented system (12)can be designed if there exist matricesP=diag{P1,P2}>0(P1=diagN{P1i},P2=diagN{P2i}),Q>0,R>0, and scalar δ1>0,ε >0,such that the following LMI holds:

    where

    and Ξ is defined in Eq.(15).Moreover,the designed estimator gains can be obtained by

    ProofRecalling Eq.(14),one has

    where

    Then,it follows from the S-procedure Lemma:

    Through the Schur complement Lemma, Eq.(34) can be rewritten as

    ConsideringP2L=X, we can obtain that Eq.(35) is equivalent to Eq.(29).This completes the proof.

    4.Examples and simulations

    In this section, two numerical examples are provided to verify the effectiveness of the proposed design scheme.

    Example 1Consider CNs(1)withN=3, and the relevant parameters as follows:

    The noise signal and the deception attack signal are chosen as ω(k) = 0.2cos(k)e?0.1kandf(y(k)) =?tanh(0.18y(k)), respectively.Set other parameters to ηm=2, ηM=4,h=0.1,d=3, μs=2?(s+1),F=0.18, πi=0.2,σi=0.5, τi=0.7,i=0.2,i=0.2 and γi=2(i=1,2,3).Then, the estimator gain matrices can be obtained by Theorem 2:

    In simulation, the initial conditions of CNs and internal dynamic variable of dynamic event-triggered scheme(DETS)are assumed thatxi(0) =[0.1 ?0.1]T, and φi(0) = 0 (i=1,2,3).

    Fig.2.Output estimation error of node 1.

    Fig.3.Output estimation error of node 2.

    For nodei(i= 1,2,3), the estimation errorsare shown in Figs.2–4; the occurrence of the deception attacks and the DoS attacks are illustrated in Figs.5 and 6.

    Fig.4.Output estimation error of node 3.

    Fig.5.Occurrence of the deception attacks.

    Fig.6.Occurrence of the DoS attacks.

    Fig.7.Output estimation errors of node 1,node 2,and node 3.

    Fig.8.Dynamic event-triggered release instants and intervals in node 1.

    Fig.9.Dynamic event-triggered release instants and intervals in node 2.

    Example 2Consider that CNs (1) are composed of 3 nodes with

    Other parameters are set as the same as in Example 1.Next,the gains of the designed estimator are given by Theorem 2:

    Fig.10.Dynamic event-triggered release instants and intervals in node 3.

    Simulation time isT=20 s,and sampling period selectsh=0.1 s.For nodei(i=1,2,3),the estimation errorsare shown in Fig.7.The dynamic event-triggered release instants and intervals in nodes 1, 2, and 3 are shown in Figs.8–10.The average period,maximum release interval,and transmission rate by DETS and time-triggered scheme are listed in Table 1.According to Table 1,it is easily found that the results simulated by DETS are better than those of the time-triggered scheme.From Figs.8–10 and Table 1, with the help of the dynamic event-triggered scheme(DETS),a higher communication efficiency is obtained against the hybrid attacks while ensuring the desired system performance,which shows the effectiveness of the proposed method.

    Table 1.The average period,maximum release interval and transmission rate for different schemes in the examples.

    5.Conclusion

    In summary, the problem of robustH∞state estimation for a class of uncertain CNs with mixed delays and hybrid attacks has been studied by introducing a dynamic ETS.The hybrid attacks have been modeled with the help of two sets of Bernoulli random variables.A dynamic ETS has been introduced to improve the utilization of network resources.A structural framework containing CNs,dynamic ETS,state estimators, and hybrid attacks has been developed.The stability criterion for dynamic systems of this framework has been obtained.A dynamic event-triggered estimator has been designed for CNs under hybrid attacks.Finally, two examples have been given to illustrate the effectiveness of the proposed method.In the future,the problem of synchronization and pinning control for CNs under cyber attacks will be investigated.

    国产 一区 欧美 日韩| 午夜免费鲁丝| 午夜福利影视在线免费观看| 美女视频免费永久观看网站| 日韩欧美一区视频在线观看 | 内射极品少妇av片p| 午夜福利高清视频| 97超视频在线观看视频| 国产成人a∨麻豆精品| 少妇熟女欧美另类| 小蜜桃在线观看免费完整版高清| 天堂中文最新版在线下载| 日韩伦理黄色片| 18禁在线播放成人免费| 国产乱来视频区| 一级毛片aaaaaa免费看小| 欧美区成人在线视频| 男女下面进入的视频免费午夜| 一级二级三级毛片免费看| 国产精品久久久久久精品电影小说 | 久久这里有精品视频免费| 插逼视频在线观看| 久久99热这里只有精品18| 一区二区三区四区激情视频| 欧美极品一区二区三区四区| 亚洲成色77777| 国产 一区精品| 久久久久人妻精品一区果冻| 免费黄色在线免费观看| 老师上课跳d突然被开到最大视频| 国产日韩欧美在线精品| 纯流量卡能插随身wifi吗| 香蕉精品网在线| 亚洲欧美一区二区三区国产| 国产成人aa在线观看| 亚洲人与动物交配视频| 日韩电影二区| 天天躁夜夜躁狠狠久久av| 我的女老师完整版在线观看| 国模一区二区三区四区视频| 最近最新中文字幕大全电影3| 国产白丝娇喘喷水9色精品| 精品久久久久久久久亚洲| 免费大片18禁| 美女视频免费永久观看网站| 女性生殖器流出的白浆| 99久久精品热视频| 18禁在线无遮挡免费观看视频| 中文字幕免费在线视频6| 亚洲在久久综合| 自拍偷自拍亚洲精品老妇| 欧美另类一区| 国产视频内射| 99国产精品免费福利视频| 欧美亚洲 丝袜 人妻 在线| 国产亚洲最大av| 国产美女午夜福利| 亚洲成人一二三区av| 99热6这里只有精品| 2021少妇久久久久久久久久久| 一级二级三级毛片免费看| 久久青草综合色| 女人十人毛片免费观看3o分钟| 国产伦精品一区二区三区视频9| 插逼视频在线观看| 女人久久www免费人成看片| 五月开心婷婷网| 亚洲电影在线观看av| 岛国毛片在线播放| 国产精品一区二区在线观看99| 国产精品99久久久久久久久| 国产伦在线观看视频一区| 日韩一区二区视频免费看| 蜜桃在线观看..| 欧美老熟妇乱子伦牲交| 免费看光身美女| 99re6热这里在线精品视频| 国产精品国产av在线观看| 99国产精品免费福利视频| 欧美区成人在线视频| 三级国产精品欧美在线观看| 肉色欧美久久久久久久蜜桃| 久久女婷五月综合色啪小说| 最近中文字幕2019免费版| 2022亚洲国产成人精品| 精品国产三级普通话版| 美女国产视频在线观看| 一级片'在线观看视频| 国国产精品蜜臀av免费| 国产精品一区二区在线不卡| 欧美3d第一页| 女性生殖器流出的白浆| 777米奇影视久久| 久久久色成人| 91精品一卡2卡3卡4卡| 久久久午夜欧美精品| 国产精品三级大全| 热re99久久精品国产66热6| 国产伦在线观看视频一区| 少妇人妻一区二区三区视频| 男男h啪啪无遮挡| 精品亚洲乱码少妇综合久久| 成人毛片60女人毛片免费| 高清av免费在线| 男人爽女人下面视频在线观看| 欧美97在线视频| 午夜福利网站1000一区二区三区| 久久人人爽av亚洲精品天堂 | 久久久午夜欧美精品| 欧美性感艳星| 蜜桃久久精品国产亚洲av| 久久久久久久久久久免费av| 亚州av有码| 久久韩国三级中文字幕| 国语对白做爰xxxⅹ性视频网站| 色网站视频免费| 日本-黄色视频高清免费观看| 国产女主播在线喷水免费视频网站| 成人国产麻豆网| 人人妻人人添人人爽欧美一区卜 | 美女cb高潮喷水在线观看| 国产人妻一区二区三区在| 免费看av在线观看网站| 国产老妇伦熟女老妇高清| 亚洲av免费高清在线观看| 乱系列少妇在线播放| 天堂俺去俺来也www色官网| 亚洲精品456在线播放app| 久久久久久久国产电影| 国产乱人偷精品视频| 观看免费一级毛片| 欧美变态另类bdsm刘玥| 免费大片黄手机在线观看| 成年美女黄网站色视频大全免费 | 久久精品久久久久久噜噜老黄| 毛片一级片免费看久久久久| 久久久久久久久久久丰满| 国产 一区 欧美 日韩| 天堂8中文在线网| av免费在线看不卡| 国产精品爽爽va在线观看网站| 国产视频首页在线观看| 乱系列少妇在线播放| 亚洲无线观看免费| 亚洲av成人精品一二三区| 婷婷色综合www| 秋霞伦理黄片| 视频区图区小说| 一本久久精品| 蜜桃在线观看..| 日韩伦理黄色片| 毛片女人毛片| 色5月婷婷丁香| 26uuu在线亚洲综合色| 午夜老司机福利剧场| 国产色婷婷99| av国产免费在线观看| 王馨瑶露胸无遮挡在线观看| 久久这里有精品视频免费| 欧美精品一区二区免费开放| 毛片女人毛片| 久久久久国产网址| 国产国拍精品亚洲av在线观看| 亚洲欧美日韩另类电影网站 | 亚洲av成人精品一二三区| 一本一本综合久久| 国产伦理片在线播放av一区| 久久精品久久久久久噜噜老黄| 久久国内精品自在自线图片| 中文资源天堂在线| 日韩大片免费观看网站| 热re99久久精品国产66热6| 欧美最新免费一区二区三区| 丰满乱子伦码专区| 新久久久久国产一级毛片| 国产高潮美女av| 欧美一区二区亚洲| 丝袜喷水一区| 91aial.com中文字幕在线观看| 国模一区二区三区四区视频| 国产午夜精品一二区理论片| 97超视频在线观看视频| 韩国av在线不卡| 国产欧美亚洲国产| 色哟哟·www| 国产精品久久久久久精品古装| 夫妻性生交免费视频一级片| 久久影院123| 亚洲人成网站在线播| 永久网站在线| 美女xxoo啪啪120秒动态图| 内地一区二区视频在线| 三级国产精品欧美在线观看| 国产av国产精品国产| 观看免费一级毛片| 婷婷色综合大香蕉| 亚洲欧美中文字幕日韩二区| 亚洲经典国产精华液单| av一本久久久久| 中文字幕免费在线视频6| 纵有疾风起免费观看全集完整版| 久久 成人 亚洲| 久久国产精品男人的天堂亚洲 | 一级黄片播放器| 日韩一区二区三区影片| 有码 亚洲区| 一区二区三区四区激情视频| 在线免费十八禁| 国产深夜福利视频在线观看| 人妻制服诱惑在线中文字幕| 精品国产三级普通话版| 最近中文字幕高清免费大全6| 婷婷色av中文字幕| 91狼人影院| 欧美日韩在线观看h| 国产亚洲午夜精品一区二区久久| 国语对白做爰xxxⅹ性视频网站| 老师上课跳d突然被开到最大视频| 亚洲国产高清在线一区二区三| 大码成人一级视频| 成年人午夜在线观看视频| 久久久精品免费免费高清| 在线观看av片永久免费下载| 一级二级三级毛片免费看| 欧美xxxx性猛交bbbb| 亚洲国产精品999| 亚洲精品,欧美精品| 免费大片18禁| 熟妇人妻不卡中文字幕| 波野结衣二区三区在线| 亚洲欧美日韩无卡精品| 九色成人免费人妻av| 亚洲精品日本国产第一区| 国产亚洲av片在线观看秒播厂| 黄色一级大片看看| 尾随美女入室| 男女免费视频国产| 又大又黄又爽视频免费| 亚洲av电影在线观看一区二区三区| 中文字幕精品免费在线观看视频 | 欧美xxxx性猛交bbbb| 久久久久久久久久久丰满| 免费看光身美女| 成人毛片a级毛片在线播放| 一区在线观看完整版| 女人十人毛片免费观看3o分钟| 国产成人精品一,二区| 国产真实伦视频高清在线观看| 最近手机中文字幕大全| 少妇高潮的动态图| 国产精品精品国产色婷婷| 少妇精品久久久久久久| 亚洲美女黄色视频免费看| 亚洲欧美日韩卡通动漫| 国产精品久久久久久精品古装| 尾随美女入室| 久久久亚洲精品成人影院| 2018国产大陆天天弄谢| 日本欧美国产在线视频| 麻豆成人av视频| av又黄又爽大尺度在线免费看| 美女视频免费永久观看网站| 国产精品国产三级专区第一集| 亚洲va在线va天堂va国产| 欧美人与善性xxx| 国产精品免费大片| 免费少妇av软件| 精品国产三级普通话版| 啦啦啦啦在线视频资源| 久久热精品热| 国产免费一区二区三区四区乱码| 亚洲欧美日韩东京热| 国产精品国产三级国产av玫瑰| 极品教师在线视频| av在线观看视频网站免费| 国产精品熟女久久久久浪| 黄色配什么色好看| 欧美一区二区亚洲| 欧美日本视频| 国产国拍精品亚洲av在线观看| 丝瓜视频免费看黄片| 亚洲真实伦在线观看| 女性被躁到高潮视频| 人人妻人人爽人人添夜夜欢视频 | 午夜激情久久久久久久| 王馨瑶露胸无遮挡在线观看| 美女中出高潮动态图| 一区二区三区精品91| 观看美女的网站| 少妇人妻精品综合一区二区| 中国美白少妇内射xxxbb| 日本av免费视频播放| 麻豆成人午夜福利视频| 日本黄大片高清| 午夜福利视频精品| 免费看光身美女| 噜噜噜噜噜久久久久久91| 免费少妇av软件| 菩萨蛮人人尽说江南好唐韦庄| 干丝袜人妻中文字幕| 亚洲激情五月婷婷啪啪| 国产精品久久久久久精品电影小说 | 国产精品一及| 新久久久久国产一级毛片| 久久精品国产自在天天线| 韩国av在线不卡| 91久久精品电影网| 在现免费观看毛片| 国产精品一区二区性色av| 丰满少妇做爰视频| 久久女婷五月综合色啪小说| 国产精品久久久久久av不卡| www.av在线官网国产| 深爱激情五月婷婷| 国产精品不卡视频一区二区| 亚洲精品国产色婷婷电影| 精品久久久噜噜| av免费在线看不卡| 国产亚洲av片在线观看秒播厂| 亚洲欧美成人综合另类久久久| 久久精品久久久久久久性| 亚洲精品日韩在线中文字幕| 国产高清有码在线观看视频| 国产色婷婷99| 2018国产大陆天天弄谢| 精品一品国产午夜福利视频| 2018国产大陆天天弄谢| 国产 一区 欧美 日韩| 男女下面进入的视频免费午夜| 干丝袜人妻中文字幕| 免费高清在线观看视频在线观看| 少妇 在线观看| 男女免费视频国产| 麻豆成人午夜福利视频| 国产爱豆传媒在线观看| 欧美xxxx性猛交bbbb| 国产精品久久久久久久电影| 中文字幕精品免费在线观看视频 | 五月天丁香电影| 欧美日韩一区二区视频在线观看视频在线| 欧美日韩国产mv在线观看视频 | 久久久久精品性色| 22中文网久久字幕| 啦啦啦中文免费视频观看日本| 国产无遮挡羞羞视频在线观看| 国产无遮挡羞羞视频在线观看| 熟女av电影| xxx大片免费视频| 亚洲精品成人av观看孕妇| 亚洲最大成人中文| 在线观看三级黄色| 韩国高清视频一区二区三区| 看十八女毛片水多多多| 亚洲内射少妇av| 国产69精品久久久久777片| 久久鲁丝午夜福利片| freevideosex欧美| 欧美成人a在线观看| 丝袜喷水一区| 亚洲精品自拍成人| 一级毛片久久久久久久久女| 久久精品久久久久久久性| 久久人妻熟女aⅴ| 国产精品国产三级国产av玫瑰| 秋霞在线观看毛片| 亚洲最大成人中文| 午夜激情久久久久久久| 99热这里只有是精品在线观看| 高清视频免费观看一区二区| 亚洲国产精品专区欧美| 国产片特级美女逼逼视频| 亚洲成人av在线免费| 天天躁日日操中文字幕| 熟女电影av网| 国产老妇伦熟女老妇高清| av在线蜜桃| 日本欧美国产在线视频| 男女免费视频国产| 亚洲人与动物交配视频| 日本与韩国留学比较| 最近2019中文字幕mv第一页| 亚洲精品,欧美精品| 久久精品国产亚洲网站| 亚洲精品日韩av片在线观看| 欧美日韩亚洲高清精品| 成人国产麻豆网| 亚洲av在线观看美女高潮| 日本vs欧美在线观看视频 | 亚洲精品一二三| 搡老乐熟女国产| 人人妻人人看人人澡| 黑人猛操日本美女一级片| 国产伦精品一区二区三区四那| 欧美少妇被猛烈插入视频| 午夜免费观看性视频| av一本久久久久| 日日摸夜夜添夜夜添av毛片| 亚洲,一卡二卡三卡| 久久久久久久久久久免费av| 最近手机中文字幕大全| 亚洲av欧美aⅴ国产| 最近的中文字幕免费完整| 国产精品国产三级专区第一集| 天堂俺去俺来也www色官网| 亚洲美女黄色视频免费看| 极品教师在线视频| 少妇人妻久久综合中文| 日韩视频在线欧美| 搡老乐熟女国产| 国产精品99久久久久久久久| 国产精品久久久久久av不卡| 久久人妻熟女aⅴ| 亚洲国产精品成人久久小说| 国产亚洲5aaaaa淫片| 成年免费大片在线观看| 在线观看一区二区三区| 97在线人人人人妻| 国产亚洲91精品色在线| 赤兔流量卡办理| 18禁在线播放成人免费| 成人免费观看视频高清| 99久久精品国产国产毛片| 亚洲欧美精品自产自拍| 一级黄片播放器| 亚洲欧美日韩无卡精品| 亚洲国产精品国产精品| 亚洲自偷自拍三级| 蜜桃在线观看..| 视频中文字幕在线观看| 免费av不卡在线播放| 婷婷色综合www| 日韩欧美 国产精品| 韩国av在线不卡| 一区在线观看完整版| 丝瓜视频免费看黄片| 亚洲一级一片aⅴ在线观看| 国产淫语在线视频| 久久影院123| 黄色配什么色好看| 美女cb高潮喷水在线观看| 欧美精品一区二区大全| 国产乱来视频区| 婷婷色综合大香蕉| 观看免费一级毛片| 欧美少妇被猛烈插入视频| 久久久久久久久久成人| 国产精品久久久久久av不卡| 国产精品一区二区性色av| 在线免费观看不下载黄p国产| 国产精品无大码| 国产久久久一区二区三区| 国产v大片淫在线免费观看| 一区在线观看完整版| 久久精品国产亚洲av天美| 国产精品一及| 赤兔流量卡办理| 久久99热这里只频精品6学生| 老司机影院毛片| 18禁裸乳无遮挡免费网站照片| 永久免费av网站大全| 青春草国产在线视频| 美女主播在线视频| 久久久a久久爽久久v久久| 欧美国产精品一级二级三级 | 亚洲精品日韩av片在线观看| 新久久久久国产一级毛片| 亚洲内射少妇av| 国产毛片在线视频| 久久韩国三级中文字幕| 成人毛片60女人毛片免费| a级毛色黄片| 精品国产三级普通话版| 男女无遮挡免费网站观看| 欧美性感艳星| 欧美日韩综合久久久久久| av女优亚洲男人天堂| 亚洲欧美精品专区久久| 亚洲图色成人| 国产亚洲午夜精品一区二区久久| 亚洲最大成人中文| 欧美成人一区二区免费高清观看| 精品人妻偷拍中文字幕| 在线亚洲精品国产二区图片欧美 | 免费人妻精品一区二区三区视频| 亚洲精品成人av观看孕妇| 欧美三级亚洲精品| av网站免费在线观看视频| 一级毛片我不卡| 成人免费观看视频高清| 偷拍熟女少妇极品色| 18+在线观看网站| 大片电影免费在线观看免费| 亚洲国产毛片av蜜桃av| 亚洲伊人久久精品综合| 久久久久久人妻| 亚洲丝袜综合中文字幕| 国产精品人妻久久久影院| av在线app专区| 成人国产av品久久久| 美女cb高潮喷水在线观看| 国产精品久久久久久久电影| 18禁在线无遮挡免费观看视频| 免费看光身美女| 成人漫画全彩无遮挡| 国产午夜精品一二区理论片| 欧美少妇被猛烈插入视频| 亚洲精华国产精华液的使用体验| 高清不卡的av网站| 制服丝袜香蕉在线| 亚洲av综合色区一区| www.色视频.com| 午夜视频国产福利| 亚洲成人手机| 国产免费福利视频在线观看| 热99国产精品久久久久久7| 久久久久国产网址| 亚洲国产精品一区三区| 亚洲欧美成人精品一区二区| 亚洲精品国产色婷婷电影| 联通29元200g的流量卡| 日本vs欧美在线观看视频 | a级毛色黄片| 男女边摸边吃奶| 午夜精品国产一区二区电影| 国产成人免费观看mmmm| 国产日韩欧美在线精品| 亚洲欧洲日产国产| 麻豆成人av视频| 美女cb高潮喷水在线观看| 一区二区三区精品91| 涩涩av久久男人的天堂| 国产精品爽爽va在线观看网站| 久久女婷五月综合色啪小说| 亚洲精品第二区| 亚洲伊人久久精品综合| 在线播放无遮挡| 性色avwww在线观看| 免费高清在线观看视频在线观看| 国产日韩欧美亚洲二区| 欧美性感艳星| 天堂中文最新版在线下载| 婷婷色av中文字幕| 欧美精品国产亚洲| 黄色一级大片看看| 水蜜桃什么品种好| 最新中文字幕久久久久| 精品一品国产午夜福利视频| 国产免费视频播放在线视频| 日韩一本色道免费dvd| 国产深夜福利视频在线观看| 日韩强制内射视频| 熟女电影av网| 亚洲av综合色区一区| 777米奇影视久久| 欧美高清成人免费视频www| 我要看日韩黄色一级片| 熟女av电影| 天美传媒精品一区二区| 国产在线视频一区二区| 久久韩国三级中文字幕| 日本免费在线观看一区| 日韩一区二区三区影片| 爱豆传媒免费全集在线观看| 亚洲欧美日韩东京热| 亚洲国产色片| 国产精品av视频在线免费观看| 久久久精品免费免费高清| 久久午夜福利片| 国产精品偷伦视频观看了| 亚洲人成网站高清观看| 天美传媒精品一区二区| 欧美精品一区二区大全| 亚洲图色成人| 一级二级三级毛片免费看| 成年美女黄网站色视频大全免费 | 久久久久国产精品人妻一区二区| 少妇人妻 视频| 97超碰精品成人国产| 日韩欧美精品免费久久| 国产午夜精品久久久久久一区二区三区| 国产欧美日韩一区二区三区在线 | 亚洲熟女精品中文字幕| 精品一品国产午夜福利视频| 好男人视频免费观看在线| 国产精品偷伦视频观看了| 熟妇人妻不卡中文字幕| 国产精品秋霞免费鲁丝片| 中文字幕久久专区| 卡戴珊不雅视频在线播放| 精品人妻偷拍中文字幕| 极品少妇高潮喷水抽搐| 亚洲精品久久午夜乱码| 1000部很黄的大片| 亚洲图色成人| 青青草视频在线视频观看| 天堂中文最新版在线下载| 久久久久久久大尺度免费视频| 有码 亚洲区| 美女脱内裤让男人舔精品视频| 成人二区视频| 国国产精品蜜臀av免费| 熟女电影av网| 在线亚洲精品国产二区图片欧美 | 国产一区亚洲一区在线观看| 亚洲欧美日韩东京热| 久久精品夜色国产| 爱豆传媒免费全集在线观看| 国产精品一区二区三区四区免费观看| 久久人人爽人人片av| 在线观看三级黄色| 人人妻人人澡人人爽人人夜夜| 韩国高清视频一区二区三区| 2018国产大陆天天弄谢| 国产av精品麻豆| 国产精品蜜桃在线观看|