• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy

    2022-03-02 06:48:04JinGuoXuebinWangYanlingZhangWenchaoXueYanlongZhao
    Control Theory and Technology 2022年1期

    Jin Guo·Xuebin Wang·Yanling Zhang·Wenchao Xue·Yanlong Zhao

    Abstract With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security threats to the systems.From the perspective of system identification with binary-valued observations,we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks.The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints.The explicit expression of the optimal attack strategy is obtained.Simulation examples are presented to verify the effectiveness of the main conclusions.

    Keywords System identification·Binary-valued observations·Denial-of-service attacks·Data tampering attacks

    1 Introduction

    With the development of embedded technology, computer technology,and network communication technology,as well

    This work was supported by the National Key Research and

    Development Program of China(2018YFA0703801)and the National Natural Science Foundation of China(62173030,62033010).as the improvement of hardware system performance and data processing capabilities,cyber physical systems(CPSs)come into being to optimize system resource allocation and improve system production efficiency [1–4]. Through the communication network,CPSs exchange data between sensors and computing devices, and send the decision-making information of the computing devices to the actuators for doing the remote operation.The heavy reliance on communication networks brings new security challenges to CPSs[5–7].

    In terms of the hit effect,network attacks against the Internet fall into two main categories: denial-of-service (DoS)attacks and data tampering attacks(e.g.,false data injection attacks,and data replay attacks)[8,9].DoS attacks cause data packet loss by blocking normal network services. The data tampering attack is to change system data through data modification,data injection,and data replay,thereby use wrong data to deceive the system. Therefore, when the system is subject to DoS attacks and data tampering attacks, the loss and error of data will result in a significant degradation on the accuracy of estimation and identification.

    Random packet loss and periodic DoS attacks were modeled to investigate the output feedback control for CPS based on observer[10].The problem of event-triggered control was concerned for CPS under DoS attacks[11].The problem of resilient control of constrained continuous-time CPS subject to bounded disturbances and DoS attacks was studied[12].The research on data tampering attacks mainly focuses on replay attacks and data injection attacks. According to different communication frameworks [13], the data compression and compensation algorithms were proposed, and they attained the expected performance of the distributed Kalman fusion estimator (DKFE) and provided the conditions for ensuring the DKFE security under replay attacks.A periodic watermarking strategy was proposed to reduce the control cost based on creating a one-time attack duration model [14]. A dynamic attack model was proposed to characterize the typical data injection attack[15].About the problem of network security for distributed filtering under false data injection attacks, a protector was designed based on the online innovation information[16].Based on concepts originating from graph signal processing,a detection scheme was proposed for data injection attacks[17].

    System with quantized observations has also been studied extensively in recent years. Guo et al. [18] introduced asymptotically efficient identification algorithms for finite impulse response systems under quantized output observations and general quantized inputs. Diao et al. [19] gave a compensation method for the packet loss deviation in system identification with event-triggered binary-valued observations. To resolve the problem of saturation-constrainted observations in the drag-free control technology, Tan et al.[20]proposed an approach of designing the adaptive control law based on set-valued identification algorithms.Risuleo et al. [21] considered the identification of linear models from quantized output data and developed a variational approximation of the likelihood function. Pouliquen et al. [22]studied the identification of infinite impulse response (IIR)systems with binary-valued measurements,where the key to our approach was to recast the initial identification problem into an identification problem in the set-membership framework. Li et al. [23] gave a novel recursive learning identification approach estimate the parameters of the Wiener systems with quantized output.

    From the perspective of system identification with binaryvalued observations, this paper studies the optimal attack problem when the system is subject to both Dos attacks and data tampering attacks. Since the attack strategy is subject to energy constraints on DoS attacks,energy constraints on data tampering attacks, and constraints on the total energy,the coupling and mutual influence among these constraints significantly increase the difficulty of the optimal attack strategy problem. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints. It is interesting that the explicit expression of the optimal attack strategy is obtained.

    The rest of this paper is arranged as follows. Section 2 describes the problem of system identification under DoS attacks and data tampering attacks using binary observations. Section 3 gives the min–max optimization problem of attack strategy.Section 4 establishes the optimal solution of attack strategy.Numerical examples are presented in Sect.5 to demonstrate the main results of this paper.In Sect.6,the main results of this paper are summarized and possible future research directions are briefly discussed.

    2 Problem formulation

    Consider a single-input single-output discrete-time system:yk= G(uk;θ)+dk,wheredkis the system noise;θis the unknown parameter;ukis the system input;ykis the system output that measured by a binary sensor with the thresholdC,which can be expressed by the following indicator function:

    The system configuration is shown in Fig.1,whereskis transmittedtotheestimationcenterthroughacommunication network, but it is subject to combined attacks of DoS and data tampering.If the DoS attack occurs,the transmitted data will be lost,which can be expressed as a Bernoulli random variable:

    Fig.1 System configuration

    We assumeuk≡1. For other multi-parameter systems(such as linear finite impulse response systems and nonlinear Wiener systems),one can design periodic inputs to decouple themintoaseriesofgainsystemsforprocessing(moredetails see[24]).

    If the estimation center does not detect the network attacks,then the optimal algorithm(in the sense of Cramér–Rao lower bound)under no attack is used to estimateθ:

    Assumption 1The system noise{dk}is a sequence of i.i.d(independent identically distributed)Gaussian random variables,and the distribution function is denoted as F(·).

    3 Min-max optimization of the attack strategy

    Theorem 1Consider the system(5)under the binary measurement(1)and the joint attack(p0,p1,q0,q1)of(2)–(4).If Assumptions 1 and 2 hold,then the data packet loss rate isAccording to Theorem 1,it can be seen that the total attack energy consumptionλis a function ofp0,p1,q0,q1.To show this relationship,we also writeλasλ(p0,p1,q0,q1).

    Theorem 2Under the conditions of Theorem 1, the algorithm(6)under the joint attack (p0,p1,q0,q1) strongly converges to C-F-1(η),which is

    ProofBy Assumption 2 and (9),we know that{γk}is i.i.d.Thus,from the law of large numbers,one can get

    4 The optimality of attack strategy

    In view of Assumption 1, we know that the distribution functionF(·)increases monotonically on(-∞,+∞).Therefore,F-1(·)increases monotonically on(0,1), andζ(η)decreases monotonically on(0,1)with respect toη.According to (14), we know thatζ(η)must take the maximum or minimum value ofηwhenJ(p0,p1,q0,q1)takes

    As a consequence,(20)enlightens us to seek out the minimum and maximum ofηfor solving(15)–(19).For this,some lemmas are introduced(their proofs are given in Appendix)to discuss the minimum and maximum ofη,where the following symbols are defined

    Remark 2Theorem 4 illustrates what is the optimal attack strategy for different system parameters.This indicates that the optimal attack strategy depends on the system parameter.Intuitively, this makes sense. Only with a full understanding of the system,the attacker can apply the optimal attack to achieve the maximum hit effect. If the attacker does not know the system parameter,it can design an algorithm to estimate the parameter.Then the attack strategy can be adjusted according to the estimated value of the system parameter.As the parameter estimation converges to the true value,the attack strategy will converge to the optimal one as well.

    5 Numerical simulation

    Consider the system

    Take three sets of attack strategies:two sets of non-optimal attack strategies are(0,0.2,0.1,0.1)and(0.3,0.1,0,0.1),and the other set takes the optimal attack strategy. According to the given system parameters,we have(μ1,μ2,~F,p,

    In view of Figs.2 and 3,we can see that the data packet loss rate caused by the DoS attack converges to(9),and the data tampering rate caused by the data tampering attack converges to (10) under the joint attacks. Algorithm (6) converges toC-F-1(η)under the joint attacks in Fig.4.As can be seen from the Fig.5,the estimation error is largest by the optimal attack strategy under the joint attacks. These are consistent with the results in Theorems 1,2 and 4.

    Fig.2 The convergence of data packet loss rate

    Fig.3 The convergence of data tampering rate

    Fig.4 The convergence of Algorithm 6 under joint attacks

    Fig.5 The estimated error under joint attacks

    6 Concluding remarks

    In this paper, we study system security issues when DoS attacks and data tampering attacks coexist from the perspective of system identification with binary-valued observations.Based on the probabilistic attack model, the optimal joint attack strategy is given in the sense of absolute estimation error subject to energy constraints.According to difference attack energies, the complete attack and incomplete attack are discussed.

    Infutureresearch,theresultsofthispapercanbeexpanded to different system structures,attack models,and noise types.In addition,the defense method against the joint attack is an important and interesting research topic.

    Appendix:Proof of Lemmas

    Based on the above,Lemma 4 is proved.■

    久久热在线av| 国产人伦9x9x在线观看| 亚洲欧美激情综合另类| 中文字幕人妻熟女乱码| 久久九九热精品免费| 一区在线观看完整版| 免费久久久久久久精品成人欧美视频| 国产欧美日韩一区二区精品| 中文字幕人妻熟女乱码| 欧美黄色淫秽网站| 日韩欧美在线二视频 | 国产精品亚洲一级av第二区| 变态另类成人亚洲欧美熟女 | а√天堂www在线а√下载 | 精品高清国产在线一区| 757午夜福利合集在线观看| 色综合婷婷激情| 夫妻午夜视频| 男女高潮啪啪啪动态图| 日韩欧美在线二视频 | 老司机靠b影院| 久久人人97超碰香蕉20202| 午夜福利视频在线观看免费| 精品一品国产午夜福利视频| 热99久久久久精品小说推荐| 一二三四社区在线视频社区8| 黑丝袜美女国产一区| 久久亚洲真实| 两性夫妻黄色片| 免费在线观看亚洲国产| 久久久久视频综合| 国产精品免费大片| 国产成人av激情在线播放| 啦啦啦视频在线资源免费观看| 91九色精品人成在线观看| 一边摸一边抽搐一进一出视频| 丰满饥渴人妻一区二区三| 女人被躁到高潮嗷嗷叫费观| 亚洲少妇的诱惑av| 国产一区在线观看成人免费| 国产精品免费一区二区三区在线 | 一边摸一边抽搐一进一小说 | 免费在线观看日本一区| 免费观看精品视频网站| 国产精品电影一区二区三区 | 久热这里只有精品99| 久久精品国产清高在天天线| av有码第一页| 欧美日韩亚洲综合一区二区三区_| 亚洲五月天丁香| 欧美人与性动交α欧美精品济南到| 国产av又大| 极品人妻少妇av视频| 欧美中文综合在线视频| 怎么达到女性高潮| 欧美 亚洲 国产 日韩一| 在线观看免费视频日本深夜| 天天躁夜夜躁狠狠躁躁| 精品一区二区三卡| 99re6热这里在线精品视频| 俄罗斯特黄特色一大片| 亚洲精品自拍成人| 麻豆国产av国片精品| 欧美乱妇无乱码| 亚洲成a人片在线一区二区| svipshipincom国产片| 亚洲色图综合在线观看| 色婷婷久久久亚洲欧美| 一区二区三区激情视频| 日本五十路高清| 一进一出好大好爽视频| 成人亚洲精品一区在线观看| 国产有黄有色有爽视频| 国产成人精品无人区| 欧美色视频一区免费| 成年女人毛片免费观看观看9 | 日韩中文字幕欧美一区二区| 国产精品影院久久| 午夜免费观看网址| 国产av精品麻豆| 亚洲人成电影观看| 99热网站在线观看| 久久午夜综合久久蜜桃| 亚洲国产欧美网| 国产亚洲精品久久久久久毛片 | 免费在线观看亚洲国产| 国产精品一区二区在线不卡| 一区二区三区国产精品乱码| 亚洲欧美日韩另类电影网站| 日韩欧美国产一区二区入口| 亚洲精品一二三| 国产亚洲精品久久久久5区| 成人手机av| 久久久久国产一级毛片高清牌| 人人澡人人妻人| 超碰成人久久| 国产精品综合久久久久久久免费 | 三级毛片av免费| 久久久久精品国产欧美久久久| 色播在线永久视频| 一二三四在线观看免费中文在| 亚洲 国产 在线| 丰满的人妻完整版| 国产精品av久久久久免费| 大香蕉久久成人网| 可以免费在线观看a视频的电影网站| 国产高清视频在线播放一区| 自线自在国产av| 91成人精品电影| 宅男免费午夜| а√天堂www在线а√下载 | 悠悠久久av| 精品一区二区三卡| 成人亚洲精品一区在线观看| 桃红色精品国产亚洲av| 十分钟在线观看高清视频www| 黄色a级毛片大全视频| 色婷婷久久久亚洲欧美| www.自偷自拍.com| 深夜精品福利| 老鸭窝网址在线观看| 99热网站在线观看| 日日摸夜夜添夜夜添小说| 国产视频一区二区在线看| 免费黄频网站在线观看国产| 国产欧美亚洲国产| 最近最新免费中文字幕在线| av片东京热男人的天堂| 两个人看的免费小视频| 又黄又爽又免费观看的视频| 99国产极品粉嫩在线观看| 亚洲熟妇中文字幕五十中出 | 精品免费久久久久久久清纯 | 成人av一区二区三区在线看| 在线观看免费视频网站a站| 午夜福利在线免费观看网站| 桃红色精品国产亚洲av| 美女扒开内裤让男人捅视频| 午夜日韩欧美国产| 亚洲国产欧美日韩在线播放| 在线观看免费视频网站a站| 久久国产精品大桥未久av| 麻豆av在线久日| 狂野欧美激情性xxxx| 在线观看免费高清a一片| 亚洲中文字幕日韩| 精品一品国产午夜福利视频| 久久人妻福利社区极品人妻图片| 制服诱惑二区| 国产高清国产精品国产三级| 王馨瑶露胸无遮挡在线观看| 亚洲精品中文字幕在线视频| 午夜福利一区二区在线看| 亚洲av成人av| 大型av网站在线播放| 热99re8久久精品国产| 欧美最黄视频在线播放免费 | 天天躁日日躁夜夜躁夜夜| 婷婷成人精品国产| 久热这里只有精品99| 亚洲性夜色夜夜综合| tocl精华| 欧美大码av| 亚洲精品一卡2卡三卡4卡5卡| 精品久久久久久,| 五月开心婷婷网| 久久精品亚洲av国产电影网| 亚洲avbb在线观看| 亚洲专区字幕在线| 日韩制服丝袜自拍偷拍| 99在线人妻在线中文字幕 | 韩国av一区二区三区四区| 999精品在线视频| 久久中文看片网| a级毛片在线看网站| 自拍欧美九色日韩亚洲蝌蚪91| 好看av亚洲va欧美ⅴa在| 91字幕亚洲| 国产午夜精品久久久久久| 91国产中文字幕| 国内久久婷婷六月综合欲色啪| 在线十欧美十亚洲十日本专区| 午夜影院日韩av| 免费高清在线观看日韩| 精品熟女少妇八av免费久了| 精品第一国产精品| 日韩中文字幕欧美一区二区| 另类亚洲欧美激情| 电影成人av| 免费久久久久久久精品成人欧美视频| 两性午夜刺激爽爽歪歪视频在线观看 | 国产麻豆69| 国产1区2区3区精品| 免费在线观看影片大全网站| 美女高潮喷水抽搐中文字幕| 又大又爽又粗| 日韩欧美在线二视频 | 亚洲精华国产精华精| 亚洲avbb在线观看| www日本在线高清视频| av中文乱码字幕在线| 大陆偷拍与自拍| 久9热在线精品视频| 国产99久久九九免费精品| 水蜜桃什么品种好| 国产精品影院久久| 日韩三级视频一区二区三区| 99精品久久久久人妻精品| 两个人看的免费小视频| 久热爱精品视频在线9| 久久精品熟女亚洲av麻豆精品| 露出奶头的视频| 欧美精品一区二区免费开放| 亚洲情色 制服丝袜| 建设人人有责人人尽责人人享有的| 在线永久观看黄色视频| av超薄肉色丝袜交足视频| 亚洲avbb在线观看| 免费在线观看视频国产中文字幕亚洲| 国产在线一区二区三区精| 国产真人三级小视频在线观看| 精品久久久久久,| 午夜福利在线免费观看网站| 久久九九热精品免费| 国产人伦9x9x在线观看| 王馨瑶露胸无遮挡在线观看| 国产欧美日韩一区二区三区在线| 村上凉子中文字幕在线| 岛国毛片在线播放| 啪啪无遮挡十八禁网站| 国产亚洲欧美98| 日日摸夜夜添夜夜添小说| 国产亚洲av高清不卡| 在线永久观看黄色视频| 欧美日韩成人在线一区二区| 精品一区二区三区av网在线观看| 亚洲专区国产一区二区| 国产又色又爽无遮挡免费看| 男女免费视频国产| 国产精品免费大片| 久久香蕉精品热| 美女高潮喷水抽搐中文字幕| 午夜福利在线观看吧| 久久草成人影院| 女性被躁到高潮视频| 久久精品熟女亚洲av麻豆精品| 亚洲熟妇中文字幕五十中出 | 免费在线观看黄色视频的| 亚洲精品av麻豆狂野| 亚洲伊人色综图| 大陆偷拍与自拍| 亚洲综合色网址| 777久久人妻少妇嫩草av网站| 一进一出好大好爽视频| 久久性视频一级片| 精品国产乱子伦一区二区三区| 亚洲全国av大片| 五月开心婷婷网| 十分钟在线观看高清视频www| 亚洲自偷自拍图片 自拍| 国产野战对白在线观看| 国产亚洲精品久久久久5区| 国产亚洲欧美精品永久| 久久久久国产精品人妻aⅴ院 | 极品人妻少妇av视频| 无限看片的www在线观看| 啦啦啦免费观看视频1| 1024视频免费在线观看| 久久人人爽av亚洲精品天堂| 国产精品一区二区精品视频观看| 欧美在线黄色| 中文字幕另类日韩欧美亚洲嫩草| 涩涩av久久男人的天堂| 午夜影院日韩av| 亚洲av电影在线进入| 国产欧美日韩综合在线一区二区| 亚洲av片天天在线观看| 久久国产乱子伦精品免费另类| 最近最新中文字幕大全免费视频| 丰满人妻熟妇乱又伦精品不卡| 不卡一级毛片| 日韩视频一区二区在线观看| 老司机午夜福利在线观看视频| 精品电影一区二区在线| 十八禁人妻一区二区| 免费日韩欧美在线观看| 露出奶头的视频| 一级毛片女人18水好多| 久久精品国产亚洲av香蕉五月 | 精品国产一区二区三区四区第35| 美女 人体艺术 gogo| 黄网站色视频无遮挡免费观看| 欧美日韩乱码在线| 国产1区2区3区精品| 免费在线观看完整版高清| 久99久视频精品免费| 久久精品亚洲精品国产色婷小说| 欧美日本中文国产一区发布| 很黄的视频免费| 老熟妇乱子伦视频在线观看| 极品教师在线免费播放| 国产精品电影一区二区三区 | 精品国产国语对白av| 捣出白浆h1v1| 两个人看的免费小视频| av视频免费观看在线观看| 婷婷丁香在线五月| 国产亚洲精品第一综合不卡| 国产国语露脸激情在线看| 一区二区三区激情视频| 色精品久久人妻99蜜桃| 在线十欧美十亚洲十日本专区| 黑丝袜美女国产一区| 窝窝影院91人妻| 1024香蕉在线观看| 国产精品 欧美亚洲| 丁香欧美五月| 欧美丝袜亚洲另类 | 在线观看www视频免费| 久久久久久久久久久久大奶| 亚洲va日本ⅴa欧美va伊人久久| 国产精品自产拍在线观看55亚洲 | 久久久久久久精品吃奶| 亚洲自偷自拍图片 自拍| 老司机影院毛片| 看免费av毛片| 人妻一区二区av| 亚洲精品国产色婷婷电影| 国产又色又爽无遮挡免费看| 久久草成人影院| 男女午夜视频在线观看| bbb黄色大片| 亚洲精品中文字幕在线视频| 大香蕉久久成人网| 女同久久另类99精品国产91| 亚洲黑人精品在线| a级毛片黄视频| 亚洲七黄色美女视频| 女人爽到高潮嗷嗷叫在线视频| 欧美日韩中文字幕国产精品一区二区三区 | 免费少妇av软件| 亚洲成a人片在线一区二区| www.自偷自拍.com| 欧美日韩福利视频一区二区| 丝袜在线中文字幕| 国产精品久久视频播放| 水蜜桃什么品种好| 电影成人av| 成年版毛片免费区| 亚洲欧美一区二区三区黑人| 国产亚洲精品一区二区www | 亚洲五月色婷婷综合| 夜夜爽天天搞| 日韩免费高清中文字幕av| 黄色视频,在线免费观看| 啦啦啦视频在线资源免费观看| 亚洲熟妇熟女久久| 欧美最黄视频在线播放免费 | 亚洲精品中文字幕一二三四区| 欧美乱码精品一区二区三区| 国产精品自产拍在线观看55亚洲 | 国产精品久久视频播放| 一二三四在线观看免费中文在| 母亲3免费完整高清在线观看| 亚洲一区中文字幕在线| 亚洲国产精品一区二区三区在线| 国产精品久久久久成人av| 国内毛片毛片毛片毛片毛片| 日韩免费高清中文字幕av| 精品国产乱码久久久久久男人| 国产亚洲精品一区二区www | 亚洲三区欧美一区| 桃红色精品国产亚洲av| 久久久久久免费高清国产稀缺| 久久九九热精品免费| 国产99白浆流出| 国产精品成人在线| 老汉色∧v一级毛片| 波多野结衣一区麻豆| 悠悠久久av| 在线观看日韩欧美| 久久久久久人人人人人| 99热国产这里只有精品6| 日韩免费av在线播放| 一进一出抽搐动态| 黑人巨大精品欧美一区二区蜜桃| 日本wwww免费看| 国产在线一区二区三区精| 很黄的视频免费| 精品亚洲成a人片在线观看| 在线av久久热| 欧美av亚洲av综合av国产av| 欧美成人免费av一区二区三区 | 性少妇av在线| 91成人精品电影| 可以免费在线观看a视频的电影网站| 国产精品久久久av美女十八| 国产亚洲欧美精品永久| 国产主播在线观看一区二区| 正在播放国产对白刺激| 美女高潮喷水抽搐中文字幕| 欧美最黄视频在线播放免费 | 母亲3免费完整高清在线观看| 亚洲精品一卡2卡三卡4卡5卡| 久久精品成人免费网站| 黄网站色视频无遮挡免费观看| 午夜精品在线福利| 精品电影一区二区在线| 99热网站在线观看| 日本欧美视频一区| 黑人猛操日本美女一级片| 日韩欧美一区二区三区在线观看 | 日韩精品免费视频一区二区三区| 熟女少妇亚洲综合色aaa.| 久久精品国产亚洲av香蕉五月 | 久久国产精品大桥未久av| 国产亚洲精品一区二区www | 美女视频免费永久观看网站| 18禁黄网站禁片午夜丰满| av中文乱码字幕在线| 狂野欧美激情性xxxx| 成年动漫av网址| www.熟女人妻精品国产| 美女高潮喷水抽搐中文字幕| 丁香六月欧美| 国产精品av久久久久免费| 免费日韩欧美在线观看| 最近最新免费中文字幕在线| 久久久精品区二区三区| 久久香蕉激情| 精品人妻1区二区| 精品久久蜜臀av无| 国产免费av片在线观看野外av| 两个人看的免费小视频| 国产精品九九99| netflix在线观看网站| 久久人妻熟女aⅴ| 97人妻天天添夜夜摸| 大香蕉久久成人网| 男人舔女人的私密视频| 成年女人毛片免费观看观看9 | 1024视频免费在线观看| 欧美亚洲日本最大视频资源| x7x7x7水蜜桃| 啦啦啦免费观看视频1| 国内久久婷婷六月综合欲色啪| 午夜福利,免费看| 久久 成人 亚洲| 成在线人永久免费视频| 欧美日韩精品网址| 亚洲熟女精品中文字幕| 午夜影院日韩av| 法律面前人人平等表现在哪些方面| 欧美激情 高清一区二区三区| 人妻丰满熟妇av一区二区三区 | 成人18禁高潮啪啪吃奶动态图| 日韩三级视频一区二区三区| 国产免费男女视频| 又大又爽又粗| 久久人人97超碰香蕉20202| 最新在线观看一区二区三区| 久久久精品免费免费高清| 黄色a级毛片大全视频| 国产成人精品在线电影| 成年版毛片免费区| 免费观看a级毛片全部| 极品少妇高潮喷水抽搐| 国产精品久久电影中文字幕 | av一本久久久久| 欧美日本中文国产一区发布| 欧美人与性动交α欧美软件| 99riav亚洲国产免费| ponron亚洲| 久久精品国产99精品国产亚洲性色 | 欧美久久黑人一区二区| 午夜福利在线免费观看网站| 亚洲色图av天堂| 国产色视频综合| 婷婷精品国产亚洲av在线 | 久久久久精品人妻al黑| 亚洲欧美一区二区三区久久| 久久精品91无色码中文字幕| 欧美日韩亚洲高清精品| 首页视频小说图片口味搜索| 宅男免费午夜| 欧美日韩国产mv在线观看视频| 久久亚洲真实| 18禁观看日本| 亚洲国产中文字幕在线视频| 成年人免费黄色播放视频| 国产免费男女视频| 久久性视频一级片| 亚洲成人免费av在线播放| 欧洲精品卡2卡3卡4卡5卡区| 国产精品九九99| 老司机亚洲免费影院| 中文欧美无线码| 国产亚洲精品第一综合不卡| 搡老乐熟女国产| 一个人免费在线观看的高清视频| 欧美不卡视频在线免费观看 | 一区二区三区国产精品乱码| 亚洲黑人精品在线| 纯流量卡能插随身wifi吗| 91麻豆av在线| 天堂√8在线中文| 免费在线观看视频国产中文字幕亚洲| 在线观看免费日韩欧美大片| 村上凉子中文字幕在线| 两个人看的免费小视频| 91av网站免费观看| 精品国产超薄肉色丝袜足j| 99久久精品国产亚洲精品| 国产主播在线观看一区二区| 国产1区2区3区精品| 天天操日日干夜夜撸| 999久久久精品免费观看国产| 国产成人免费观看mmmm| 亚洲,欧美精品.| 黑人操中国人逼视频| 亚洲精华国产精华精| 成人国产一区最新在线观看| 国产精品国产高清国产av | 搡老岳熟女国产| 91老司机精品| 日本a在线网址| 超碰97精品在线观看| 久久久久视频综合| 亚洲精品美女久久久久99蜜臀| 老司机深夜福利视频在线观看| 中文欧美无线码| 99国产极品粉嫩在线观看| 夫妻午夜视频| 国产成人精品在线电影| 一边摸一边做爽爽视频免费| 国产97色在线日韩免费| 欧美黄色片欧美黄色片| 超碰成人久久| 午夜精品久久久久久毛片777| 一级a爱片免费观看的视频| 精品少妇久久久久久888优播| 免费观看人在逋| 国产一区二区三区视频了| 精品欧美一区二区三区在线| 19禁男女啪啪无遮挡网站| 老熟妇乱子伦视频在线观看| 三级毛片av免费| 精品国产美女av久久久久小说| 久久 成人 亚洲| cao死你这个sao货| 老熟妇仑乱视频hdxx| 日韩欧美在线二视频 | av免费在线观看网站| 国产麻豆69| 18禁国产床啪视频网站| 又黄又粗又硬又大视频| 久久久国产成人免费| 久久精品熟女亚洲av麻豆精品| 在线观看免费高清a一片| 午夜福利在线观看吧| 国产日韩欧美亚洲二区| 精品第一国产精品| 狠狠狠狠99中文字幕| 精品电影一区二区在线| 欧美精品av麻豆av| 欧美日韩乱码在线| 成人av一区二区三区在线看| svipshipincom国产片| 成在线人永久免费视频| 超碰97精品在线观看| 久久久国产一区二区| 久久精品人人爽人人爽视色| 亚洲成人免费电影在线观看| 精品久久蜜臀av无| 五月开心婷婷网| 少妇 在线观看| 女人精品久久久久毛片| 老汉色av国产亚洲站长工具| 美女国产高潮福利片在线看| 精品无人区乱码1区二区| 精品国产美女av久久久久小说| 一本综合久久免费| 别揉我奶头~嗯~啊~动态视频| 久久久精品免费免费高清| 精品久久久精品久久久| 欧美日韩视频精品一区| 国产高清激情床上av| 精品久久久精品久久久| 久久久国产成人免费| av视频免费观看在线观看| 成人永久免费在线观看视频| 国产精华一区二区三区| 一级a爱片免费观看的视频| 少妇猛男粗大的猛烈进出视频| 18在线观看网站| 日本欧美视频一区| 亚洲中文日韩欧美视频| 成人手机av| 久久亚洲精品不卡| 精品国产国语对白av| 后天国语完整版免费观看| 国产av一区二区精品久久| 天天躁日日躁夜夜躁夜夜| 成人黄色视频免费在线看| 亚洲片人在线观看| 亚洲欧美一区二区三区久久| 亚洲熟女精品中文字幕| 少妇被粗大的猛进出69影院| 欧美乱色亚洲激情| av福利片在线| 亚洲第一青青草原| 老熟妇乱子伦视频在线观看| 女人精品久久久久毛片| 大香蕉久久网| 天堂俺去俺来也www色官网|