• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    混合攻擊下時(shí)變信息物理系統(tǒng)的有限時(shí)域H∞控制

    2020-04-11 13:52:16黎善斌胥布工
    控制理論與應(yīng)用 2020年2期
    關(guān)鍵詞:華南理工大學(xué)時(shí)變工程學(xué)院

    劉 珊,黎善斌,胥布工

    (華南理工大學(xué)自動(dòng)化科學(xué)與工程學(xué)院,廣東廣州 510640)

    1 Introduction

    In recent years,the rapid developments of calculation,control,communications and network technology,have expanded the way of the generic in interconnection between all things,greatly extended the information in time and space,and changed the organization evolutionary approach of physical systems,which have given birth to the cyber-physical system[1].Among many advantages and benefits that cyber-physical system(CPS)can provide,one of them is the integration of the physical system and cyber system which can create value,but at the same time,there are some related challenges and risks,one of which is security[2].

    Security has always been an important consideration for CPS,which can be defined as the ability to ensure the communication between different components and prevent unauthorized server access[3].In a CPS,the protection of data and communication is difficult,so security is a complex and challenging task,this is because of the combined architecture of data,communications,process,and communication channel.The security problems of CPS in power grid systems,smart transportation systems,medical systems,water treatment system and other areas have received considerable attention in some literatures,and the security analysis and research of CPS under adversarial attacks has become a hot topic[4–6].

    Among various target objects which adversary could attack,the communication channel is the most common object.This is because the communication channel which transmits measurement or control data is usually connected via hard-wired or wireless networks,and the attacker can conduct DoS attacks through the networks to make the data packet dropouts[7–8].A lot of recent researches have focused on the DoS attacks[9–12].With the energy constraint of the jammer and the existence of attack detection device,the jammer can not always successfully cause the packet dropouts of the communication channels[13–14].Thus some researches have presented that the sensor data packet will be dropped randomly during the DoS attack period with a certain probability,and can be modeled by independent and identically distributed(i.i.d.)Bernoulli variables[15–18].The research in[16]considers the optimal control feedback controller that minimizes a given objective function subject to safety and power constraints for a class of denial-of-service(DoS)attack models.In[17],the authors focus on the optimal control and scheduling problem for linear networked control systems under DoS attacks,which can jam the communication channel between the remote sensors and the controller.To solve the problem,a zero-sum static game of complete information is first utilised to investigate the optimal strategies for both the trigger and the attacker.Besides the communication channel,the sensor and actuator are also the common objects which adversary could attack.For example,false data injection(FDI)attacks can inject false information into sensors or actuators,and cause the measurement or control data destroyed[19–23].Mo et al.consider the case that the attacker can design his actions to inject error information into the sensor without being detected,and study the effect of false data injection attacks on state estimation[19].The authors in[23]consider the scenario that a continuous-time,linear time-invariant(LTI)system withMinputs andPoutputs are controlled and measured by vulnerable actuators and sensors,respectively.A new notion of controllability and observability for CPSs under actuator attacks and sensor attacks has been introduced to analyse safety performance.Since many commercial devices are readily available for adversary to conduct these attacks,similarly,many attack strategies have been mentioned in some papers,we can know these attacks are already serious threats for the CPS[24–25].

    In practical engineering applications,for example,complex system process,intelligent robot control and the aerospace industry,the time-varying phenomenon of controlled system is common,whether the parameter of the system is time-varying or the structure is timevarying.Thus,more and more attention has been paid to it by researchers from different perspectives.Some of the previous researches have focused on the H∞control/filtering problem for time-varying system[26–27],and several kinds of approaches have been used for solving this problem,including the game theoretical approach[27–28],the differential/difference linear matrix inequality(DLMI)and recursive linear matrix inequality(RLMI)approach[29–32],and the backward recursive Riccati difference equation approach[26,33–34].On the other hand,the control objects sometimes are required to be completed in a limited time,such as missile interception,satellite orbit,etc..In addition,if the system is under attacks,the adversary can’t always successfully launch attacks with the same attack strategy due to the energy constraint of attacker or the existence of defense strategy.Therefore,considering these actual cases,the secure control problem for the time-varying system under attacks in a given finite-horizon has practical research significance,and to our best knowledge,it has not been properly researched so far,then to shorten this gap,this problem will be researched in this paper.

    Based on the above discussion,we focus on the security problem of CPS under hybrid attacks,including DoS attacks on the sensor communication channel,and FDI attacks on the sensors and actuators.Assuming that the attacks period is given,the DoS attacks can be described by the Bernoulli distributed white sequences with known probability as the previous researches[15,17],and the FDI attacks signals injected in the sensors and actuators are unknown but norm bounded[35–36].It has the theoretical and actual meaning to research the impact from these attacks on the performance of timevarying system in a finite horizon.Therefore,we target at designing a output feedback controller by using the stochastic analysis techniques,some sufficient conditions are established to guarantee the H∞performance in a finite-horizon for the addressed system by using backward recursive Riccati difference equation approach.The main contribution of this paper is mainly as following three points:i)both the DoS attacks and FDI attacks are considered in the output feedback controller design for the time-varying system which has multiple sensors and multiple actuators;ii)a sufficient condition is given for the controller design which makes H∞performance from the attacks signals to controlled output satisfied;iii)a suboptimal controller design algorithm is proposed by solving double backward recursive RDEs.

    The contents of the paper are as follows.In Section 2,the mathematical models of the CPS under hybrid attacks are described,and main control objective is presented.Then the main results are given in Section 3.At last,numerical simulation and conclusion are given to demonstrate the validity and applicability of the proposed approach in Section 4 and Section 5,respectively.

    Notations:We use a fairly standard notation in this paper.denote,respectively,thendimensional Euclidean space and set of alln×mreal matrices.denotes the set of integers(positive integers,negative integers).The notationXY(X >Y),whereXandYare real symmetric matrices,means thatX ?Yis positive semi-definite(positive definite).E{x}and E{x|y}will,respectively,denote the expectation of the stochastic variablexand expectation ofxconditional ony.0 represents the zero matrix of compatible dimensions.Then-dimensional identity matrix is denoted asInor simplyI,if no confusion is caused.The shorthand diag{·}stands for a block-diagonal matrix.∥A∥refers to the norm of a matrixAdefined byMTrepresents the transpose ofM.

    2 Problem formulation

    Consider a discrete time-varying linear CPS model with multiple sensors and multiple actuators shown in Fig.1.The output signal transmission is implemented between the sensors and remote controllers via network channels,which can be jammed by the DoS attacks;meanwhile,there arenysensors andnuactuators which can be injected in unknown random attack signals by the FDI attacker.

    Fig.1 The structure of CPS with hybrid attacks

    The plant is a discrete time-varying system defined in the finite horizonk ∈[0,N]of the form wherei ∈{1,2,···,nu}represents theith actuator,j ∈{1,2,···,ny}represents thejth sensor,is the state vector,is the control signal input to theith actuator,is the attack signal injected into theith actuator which belonging tol2[0,N],is the controlled output,yj,k ∈is the output of thejth sensor,is the attack signal injected into thejth sensor which belonging tol2[0,N]andandCj,k ∈are known real-valued time-varying matrices.

    Remark 1Some previous researches have presented the model of sensor attacks and actuator attacks for linear time-invariant system,and assumed that the attack signals have bounded energy in a finite-horizon[23,35].Inspired by these works,the time-varying CPS model subject to FDI attacks in sensors and actuators is given in(1),and the attack signalswi,kandaj,kare priori-unknown and energy bounded.If the attack signalwi,k=0,it means that theith actuator is not attacked;otherwise,theith actuator is successfully attacked by adversary,the output of theith actuator is false.Similarly,the attack on the sensor can affect the accuracy of the measured output data[37].The FDI attacks are unpredictable,and the attack signals can destroy the performance of the system,so that the influence of attack signals on the controlled output is worth studying.

    Considering there are random DoS attacks occurring between the sensors and controllers on the S–C network channels,then the measured output model with S–C packet dropout can be expressed as

    Remark 2Similar to the setup in some previous research[16,18,38],the occurrence of packet dropouts caused by the DoS attacks is stochastic and its probability is known.Then the stochastic variableαkis Bernoulli distributed with white sequence taking the values of 0 and 1,whose expected valueis known constant which means that each packet exchange attempt faces an attack with a fixed probability.If the communication channel between thejth sensor to controller is jammed by the DoS attack,then the output data packet will be dropped.

    The controller can be expressed as

    Then the closed-loop system by substituting(2)and(3)into(1)as follows:

    The main problem addressed in this paper is described as follows.

    Problem 1For the given finite time horizon[0,N],positive scalarγ,positive definite matrixWand initial statex0,we aim to design appropriate controller parametersKi,k(i ∈{1,2,···,nu})such that,the closed-loop system(4)satisfies the following H∞performance requirement:

    Remark 3The problem which requires H∞performance gain from disturbance signal to controlled output less than a given constant has been researched in previous works[16,18,39].Based on these works,if the injected signalswandaare disturbance signals,the H∞performance requirement(5)can also be regard as that from disturbance signal to controlled output in a finite horizon.

    3 Main results

    Lemma 1LetU,VandWbe known nonzero matrices with appropriate dimensions.The solutionXto

    Lemma 2Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exists a family of non-negative definite matricesPk(0kN,with the final conditionPN+1=0)and a set of real-valued matricesKksatisfying the following backward recursive RDE:

    So far,we have conducted the H∞performance analysis in terms of the solvability of a backward Riccati equation in Lemma 2.In the next stage,let us propose an approach for computing the suboptimal controller parametersKi,k(i ∈{1,2,···,nu})in each step under the worst situation,i.e.On this condition,we rewrite the closed-loop system(4)as follows:

    whereQk0 andRi,k >0(i ∈{1,2,···,nu})are the known weighting matrices.

    Problem 2By employing the worst-case FDI attack,we aim to provide a design scheme of the controller parametersKkto minimize the linear quadratic performance functionJ2as described below:

    subject to Problem 1 and system dynamics(7).

    Then we will solve the Problem 2 by giving the following theorem.

    Theorem 1Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exist two families of non-negative definite matricesPk,Sk(0kN)and a set of real-valued matricesKksatisfying(6)and the following backward recursive RDE:

    ProofFirstly,it follows from Lemma 2 that,if there exist solutionsPkandKkto(6),(11)and(12)so that the system(4)achieves the pre-specified H∞performance(5).On this condition,the worstcase attack signal can be expressed asξk==By employing the worst-case attack,the closed-loop system(4)can be written as(7),then the cost functionJ2can be described by completing the square with respect to

    For the purpose of minimizing the cost function(8),the controller parametersKkcan be selected in each iteration backward as follows:

    It follows from Lemma 1 that(13)is the solution of the optimization problem(15).The proof is complete.

    QED.

    However,we can see from the above theorem that it is difficult to get theKkfrom(13).Then in order to obtain the controller parametersKkdirectly and simplify the calculation process,the following theorem is given.

    Theorem 2Given the attack attenuation levelγ >0 and the positive matrixW.For any nonzeroξk,the closed-loop system(4)satisfies the H∞performance requirement(5)for any nonzero attack signalξk,if there exist the positive scalarhk,two families of nonnegative definite matricesPk,Sk(0kN)and a set of real-valued matricesKksatisfying the following two backward recursive RDEs:

    ProofDefinewherehk >0 is introduced to provide more flexibility in the controller design.Then denotethe closed-loop system can be described as

    It follows from Theorem 1 that if there exist solutions{(hk,Pk,Qk,Kk)}0?k?Nsatisfying the backward recursive RDEs(16)with(17)–(18),then the system satisfies

    If the condition(20)is satisfied,we can get

    which implies that the H∞performance constraint(5)is satisfied.Then for the purpose of minimizing the cost function(9),the suboptimal controller parametersKkcan be selected in each iteration backward as follows:

    which equal to calculate

    It follows from Lemma 1 that(19)is the solution of the optimization problem(25).The proof is complete.

    QED.

    Noticing that the controller parametersKkare involved in the proposed double RDEs,by means of Theorem 2,the finite-horizon H∞controller design algorithm is proposed as follows.

    Algorithm 1finite-horizon H∞controller design:

    Given:N,QN+1,γ,W,Qk,Rk;

    Output:Kk,Pk,Sk,

    wherej ∈{1,2,···,ny},k ∈{0,1,···,N}.

    Steps of algorithm:

    1)Initializek=N,SN+1=QN+1,PN+1=0;

    2)Select the appropriate valuehk,computeandΛ22,k+1>0,then the controller parametersKkcan be solved by(19),and go to the next step,else jump to Step 7);

    3)If the condition(20)is satisfied,go to the next step,else return to Step 2);

    4)Solve the backward RDEs(16)to getPkandSk;

    5)Ifk0,setk=k?1,and go back to Step 2),else turn to the next step;

    6)If the conditionP0<γ2Wis satisfied,this algorithm is feasible,and output the results,else go to Step 7);

    7)This algorithm is infeasible.

    Remark 4In this paper,the finite-horizon H∞controller is designed for a time-varying system with multiple actuators and multiple sensors under FDI attacks and DoS attacks by solving double backward recursive RDEs.Note that Lemma 2 and Theorem 1 are proved mainly by the completing the square method which leads to very little conservatism,and Theorem 2 is given to obtain the controller parametersKkdirectly and simplify the calculation process,which also provides more flexibility in the controller design.We can see from Algorithm 1 that,there are several factors that can increase the complexity of controller design,including the time-varying system parameters,the prescribed attack attenuation levelγ,the selected scalarhk,and the probabilities of packet dropouts from sensors to controllers caused by DoS attacks.Therefore,the comprehensive influence of these factors will determine the control effect,and in actual implementation of the Algorithm 1,in order to obtain the better control effect,in the case that the system parameters and the probabilities of packet dropouts are known,we will adjust the scalarhkappropriately to get a smaller prescribed attack attenuation levelγ.

    4 Numerical simulation

    In this section,we aim to demonstrate the effectiveness of the proposed problem and algorithm.

    Consider a discrete-time time-varying system with the following system parameters:

    Let the FDI attack signals be

    Case 1Assuming that the probability parameters are given asthe H∞attack attenuation levelγ=0.6,the positive definite matrixW=0.8I,the time horizonN=100,the performance weighting matricesQk=I,R1,k=1,R2,k=0.8 andR3,k=1,and the selected scalarhk=1.Using Algorithm 1,we can obtain the controller gain results as shown in Table 1.The controlled outputs of closed-loop system and open-loop system are shown in Fig.2,respectively,and the measured outputs under hybrid attacks and without attacks are shown in Fig.3,respectively.

    Table 1 The controller gain results

    Fig.2 The controlled outputs of system

    Fig.3 The measured outputs of system

    Then we consider the case that the controller parametersKkare not optimal to minimize the linear quadratic performance functionJ2as we presented in Problem 2 and the other given conditions are the same as those given above,thus the controllers we obtained are common H∞performance controllers,which can be obtained by solving Problem 1.We can compare the results of permitted minimumγand the linear quadratic performance functionJ2in different cases,which are shown in Table 2,and the results comparison of controlled outputs are shown in Fig.4.

    Table 2 The results comparison

    Fig.4 The controlled outputs with different algorithms

    From the above numerical results and simulated figures,we can see that the controller design by Algorithm 1 is effective.

    Case 2Assuming that the positive definite matrixW,the time horizonN,and the LQR performance weighting matrices are the same with them in Case 1.The probability parametercan change from 0.9 to 0.8,the scalarhkcan be selected as 1,1.1 and 1.2.The permitted minimumγresults are shown in Table 2.

    Table 3 The permitted minimum γ

    We can see from the above table that the permitted minimumγis related to the probability parameters and the scalarhk,that is to say,for the same scalarhk,if the probability parameters get smaller,it means that packet dropout probabilities get larger,then the permitted minimumγwill get larger;for the same packet dropout probabilities,if the scalarhkget larger,the permitted minimumγcould get larger or smaller.Then for the same packet dropout probabilities,we should select proper scalarhk,which can make the permitted minimumγget smaller.

    5 Conclusions

    This paper has presented the H∞performance control problem and given the design approach of controller for the security of time-varying CPS under hybrid attacks.The model of occurring two types of cyber attacks is presented,and the H∞performance requirement which represents the impact of attack signals on the controlled output in a finite-horizon is proposed.Based on the attack model and control objective,the suboptimal controller is designed to reduce the performance loss which the injected attack signals caused.Through theoretical research and simulation example,the approach we proposed can solve the control problem,reduce the performance loss,and increase security of CPS under hybrid attacks.

    Appendix:

    ProofBy defining then taking the mathematical expectation(A1),and applying the completing squares method results in

    which means the pre-specified H∞performance requirement(5)is satisfied.The proof is complete. QED.

    猜你喜歡
    華南理工大學(xué)時(shí)變工程學(xué)院
    福建工程學(xué)院
    福建工程學(xué)院
    福建工程學(xué)院
    本期作者
    世界建筑(2018年5期)2018-05-25 09:51:38
    福建工程學(xué)院
    當(dāng)機(jī)器人遇上人工智能——記華南理工大學(xué)自動(dòng)化科學(xué)與工程學(xué)院副教授張智軍
    基于時(shí)變Copula的股票市場(chǎng)相關(guān)性分析
    煙氣輪機(jī)復(fù)合故障時(shí)變退化特征提取
    焦唯、王琪斐美術(shù)作品
    王雁、謝盼盼藝術(shù)作品
    欧美最新免费一区二区三区| 久久久久久久精品精品| 午夜福利在线观看免费完整高清在| 男女边摸边吃奶| 日日撸夜夜添| 精品卡一卡二卡四卡免费| 久久精品久久久久久久性| 国产成人精品一,二区| 看十八女毛片水多多多| 日韩精品有码人妻一区| 毛片一级片免费看久久久久| 三上悠亚av全集在线观看 | 日本午夜av视频| 欧美另类一区| 在线免费观看不下载黄p国产| 观看免费一级毛片| 中文字幕人妻丝袜制服| 亚洲美女视频黄频| 色视频在线一区二区三区| 精品人妻熟女av久视频| 国产av一区二区精品久久| 欧美成人精品欧美一级黄| 赤兔流量卡办理| 国产成人精品无人区| 日韩制服骚丝袜av| 丰满少妇做爰视频| 精品人妻一区二区三区麻豆| 国产熟女欧美一区二区| 久久久久久伊人网av| 日本爱情动作片www.在线观看| 国产日韩欧美视频二区| 男人添女人高潮全过程视频| 日韩欧美 国产精品| 亚洲综合色惰| 好男人视频免费观看在线| 乱系列少妇在线播放| 久久久久久久亚洲中文字幕| 免费观看av网站的网址| 在线观看三级黄色| 麻豆成人午夜福利视频| 成人午夜精彩视频在线观看| 亚洲精品视频女| 一级a做视频免费观看| 国内精品宾馆在线| 日韩精品免费视频一区二区三区 | 亚洲图色成人| 欧美区成人在线视频| 国产欧美日韩综合在线一区二区 | 精品一品国产午夜福利视频| 日韩av在线免费看完整版不卡| 大码成人一级视频| 精品人妻熟女av久视频| 熟女av电影| 亚洲av国产av综合av卡| 狂野欧美激情性xxxx在线观看| 曰老女人黄片| 亚洲人成网站在线观看播放| 免费高清在线观看视频在线观看| 久久人人爽av亚洲精品天堂| 婷婷色av中文字幕| 国产成人freesex在线| 中文欧美无线码| 国产亚洲最大av| 国产老妇伦熟女老妇高清| 久久久a久久爽久久v久久| av有码第一页| 亚洲av男天堂| 在线 av 中文字幕| 人妻 亚洲 视频| 日韩欧美 国产精品| 国产成人精品婷婷| 黄色视频在线播放观看不卡| 人人妻人人看人人澡| 日韩人妻高清精品专区| 激情五月婷婷亚洲| 欧美3d第一页| 少妇高潮的动态图| 最近最新中文字幕免费大全7| 一区二区三区免费毛片| 亚洲第一av免费看| 在线看a的网站| 国产成人精品婷婷| 免费在线观看成人毛片| 免费大片黄手机在线观看| 国产真实伦视频高清在线观看| 在线观看美女被高潮喷水网站| 色视频www国产| 国产成人一区二区在线| 日韩伦理黄色片| 久久 成人 亚洲| 久久久久久久国产电影| 亚洲电影在线观看av| 亚洲自偷自拍三级| 最近的中文字幕免费完整| 亚洲人成网站在线观看播放| 亚洲精品日韩av片在线观看| av国产久精品久网站免费入址| 极品少妇高潮喷水抽搐| 欧美精品一区二区大全| 搡老乐熟女国产| 国产乱来视频区| 久久久久久久久久成人| 亚洲伊人久久精品综合| 亚洲四区av| 黄色欧美视频在线观看| 国产亚洲5aaaaa淫片| 成人18禁高潮啪啪吃奶动态图 | 极品教师在线视频| 久久久久久久久久人人人人人人| xxx大片免费视频| 下体分泌物呈黄色| 精品少妇黑人巨大在线播放| 草草在线视频免费看| 99久久综合免费| 久久久久久久久久久丰满| 国产精品一区二区在线观看99| 国产一区二区在线观看av| 18禁在线无遮挡免费观看视频| 97在线人人人人妻| 国内少妇人妻偷人精品xxx网站| 夫妻午夜视频| 国产精品久久久久久精品古装| 亚洲久久久国产精品| 99视频精品全部免费 在线| 少妇被粗大猛烈的视频| 天美传媒精品一区二区| 亚洲精品成人av观看孕妇| 亚洲欧美成人精品一区二区| av福利片在线| 国产亚洲精品久久久com| 久久久久久久亚洲中文字幕| 免费高清在线观看视频在线观看| 卡戴珊不雅视频在线播放| 丝瓜视频免费看黄片| 老司机影院毛片| 免费不卡的大黄色大毛片视频在线观看| 日本欧美国产在线视频| 日日摸夜夜添夜夜添av毛片| 精品久久久久久电影网| 亚洲国产精品成人久久小说| 伊人久久精品亚洲午夜| 丰满人妻一区二区三区视频av| 色婷婷久久久亚洲欧美| 人妻一区二区av| 观看av在线不卡| 国产免费视频播放在线视频| 青春草视频在线免费观看| 亚洲激情五月婷婷啪啪| 国产成人免费无遮挡视频| 精品亚洲乱码少妇综合久久| 在线观看av片永久免费下载| 91久久精品国产一区二区成人| 精品亚洲乱码少妇综合久久| 亚洲精品自拍成人| 美女内射精品一级片tv| 亚洲丝袜综合中文字幕| 99热国产这里只有精品6| 91精品伊人久久大香线蕉| 久久精品国产a三级三级三级| av.在线天堂| 一边亲一边摸免费视频| 免费看日本二区| 人人妻人人澡人人爽人人夜夜| 爱豆传媒免费全集在线观看| 国产视频内射| 国产av精品麻豆| 国产国拍精品亚洲av在线观看| 在线免费观看不下载黄p国产| 一个人看视频在线观看www免费| 极品人妻少妇av视频| 久久国产亚洲av麻豆专区| 亚洲精品一区蜜桃| 婷婷色麻豆天堂久久| 精品少妇久久久久久888优播| 亚洲不卡免费看| 在线看a的网站| 国产高清国产精品国产三级| 国产深夜福利视频在线观看| av.在线天堂| 久久久精品94久久精品| 久久精品国产鲁丝片午夜精品| 国产精品久久久久久久电影| 丰满迷人的少妇在线观看| 黑人巨大精品欧美一区二区蜜桃 | 欧美激情国产日韩精品一区| 国内揄拍国产精品人妻在线| 国产精品熟女久久久久浪| 亚洲精华国产精华液的使用体验| 少妇人妻久久综合中文| 亚洲四区av| 中文字幕av电影在线播放| 中文精品一卡2卡3卡4更新| 亚洲人与动物交配视频| 亚洲成人一二三区av| 国产亚洲一区二区精品| 蜜桃久久精品国产亚洲av| 久久鲁丝午夜福利片| 国产精品无大码| 免费大片18禁| 国产精品国产三级国产专区5o| 日韩一区二区视频免费看| www.av在线官网国产| 欧美日韩在线观看h| 一级二级三级毛片免费看| 国产日韩欧美视频二区| 午夜免费男女啪啪视频观看| 欧美精品人与动牲交sv欧美| 精品久久久久久电影网| 国产国拍精品亚洲av在线观看| 美女xxoo啪啪120秒动态图| videossex国产| 久久久国产欧美日韩av| 纵有疾风起免费观看全集完整版| 中国三级夫妇交换| 卡戴珊不雅视频在线播放| 一级黄片播放器| 久久狼人影院| 国产高清不卡午夜福利| 久久精品久久久久久噜噜老黄| 国产黄片视频在线免费观看| 国产精品久久久久久久久免| 免费看光身美女| 69精品国产乱码久久久| 一区二区三区四区激情视频| 极品教师在线视频| 欧美日本中文国产一区发布| 亚洲欧美精品专区久久| 精品少妇久久久久久888优播| 亚洲精品456在线播放app| 国产在线视频一区二区| 久久精品久久久久久噜噜老黄| 啦啦啦中文免费视频观看日本| 色婷婷久久久亚洲欧美| 内射极品少妇av片p| 日韩大片免费观看网站| 亚洲av不卡在线观看| 纵有疾风起免费观看全集完整版| 丰满少妇做爰视频| 国产精品99久久久久久久久| 国产亚洲午夜精品一区二区久久| 一个人免费看片子| 精品久久久久久久久亚洲| 国产老妇伦熟女老妇高清| 岛国毛片在线播放| 视频中文字幕在线观看| 亚洲三级黄色毛片| 色婷婷av一区二区三区视频| 91精品国产九色| 两个人的视频大全免费| 最近手机中文字幕大全| 内射极品少妇av片p| 免费久久久久久久精品成人欧美视频 | 国产免费又黄又爽又色| 日本wwww免费看| 免费黄色在线免费观看| 在线看a的网站| 卡戴珊不雅视频在线播放| 人人妻人人看人人澡| av免费在线看不卡| 如何舔出高潮| 亚洲精品久久久久久婷婷小说| 亚洲精品国产av成人精品| 精品人妻熟女毛片av久久网站| 日韩av免费高清视频| 99久久人妻综合| 中文欧美无线码| av女优亚洲男人天堂| 免费av不卡在线播放| 18禁在线播放成人免费| 免费看不卡的av| 久久久久视频综合| 老熟女久久久| 亚洲一区二区三区欧美精品| 丝袜脚勾引网站| 99精国产麻豆久久婷婷| 国产免费视频播放在线视频| 91精品一卡2卡3卡4卡| 十分钟在线观看高清视频www | 美女大奶头黄色视频| 啦啦啦视频在线资源免费观看| 国产精品国产av在线观看| 一级毛片 在线播放| 亚洲精品中文字幕在线视频 | 99九九在线精品视频 | 亚洲精品国产av成人精品| 亚洲国产日韩一区二区| 视频中文字幕在线观看| 日日摸夜夜添夜夜添av毛片| 久久ye,这里只有精品| 精品久久久噜噜| 国产一区二区在线观看av| 男人狂女人下面高潮的视频| 日产精品乱码卡一卡2卡三| 国产精品嫩草影院av在线观看| 久久女婷五月综合色啪小说| 国产免费视频播放在线视频| 久久久久国产网址| 观看美女的网站| 99久久精品一区二区三区| 欧美另类一区| 91成人精品电影| 少妇被粗大猛烈的视频| 在线观看www视频免费| 日韩欧美 国产精品| 最近手机中文字幕大全| 国产黄片美女视频| 91精品伊人久久大香线蕉| 99re6热这里在线精品视频| a级毛片免费高清观看在线播放| 国产高清三级在线| 精品久久久久久电影网| 久久精品国产鲁丝片午夜精品| 精华霜和精华液先用哪个| 五月天丁香电影| 内射极品少妇av片p| 国产精品无大码| 日韩一区二区视频免费看| 亚洲精品日韩av片在线观看| 色婷婷av一区二区三区视频| 久久精品国产亚洲网站| 99国产精品免费福利视频| 成人毛片60女人毛片免费| 午夜久久久在线观看| 亚洲精品日本国产第一区| 国产中年淑女户外野战色| 免费人成在线观看视频色| 永久免费av网站大全| 丰满乱子伦码专区| 建设人人有责人人尽责人人享有的| 日日摸夜夜添夜夜添av毛片| av免费观看日本| 美女内射精品一级片tv| 涩涩av久久男人的天堂| 成人亚洲欧美一区二区av| 亚洲欧美成人综合另类久久久| 18禁在线无遮挡免费观看视频| 亚洲国产精品国产精品| 精品国产露脸久久av麻豆| 国产国拍精品亚洲av在线观看| 91精品国产九色| 插逼视频在线观看| 国产视频首页在线观看| 欧美 日韩 精品 国产| 亚洲av日韩在线播放| 美女xxoo啪啪120秒动态图| 精品亚洲成a人片在线观看| 国产精品成人在线| 男人和女人高潮做爰伦理| 九草在线视频观看| 男女国产视频网站| av黄色大香蕉| 国产精品成人在线| 成年人午夜在线观看视频| 伊人久久精品亚洲午夜| 国产男女内射视频| 久久精品国产a三级三级三级| 亚洲精品乱码久久久久久按摩| 成人无遮挡网站| 在线精品无人区一区二区三| 黑人高潮一二区| 在线亚洲精品国产二区图片欧美 | 欧美区成人在线视频| 亚洲av电影在线观看一区二区三区| 精品亚洲成国产av| 亚洲熟女精品中文字幕| 国产精品嫩草影院av在线观看| 国产在线视频一区二区| 九色成人免费人妻av| 亚洲人成网站在线播| 男女边摸边吃奶| 插阴视频在线观看视频| 亚洲无线观看免费| 自拍欧美九色日韩亚洲蝌蚪91 | 日本色播在线视频| 亚洲欧美中文字幕日韩二区| 久久久久久久久久人人人人人人| 国产日韩一区二区三区精品不卡 | 国产一级毛片在线| 久久99一区二区三区| 高清不卡的av网站| 久久久欧美国产精品| 最近最新中文字幕免费大全7| 国产精品久久久久久久久免| 亚洲av欧美aⅴ国产| 国产成人a∨麻豆精品| 亚洲精华国产精华液的使用体验| 亚洲av.av天堂| 国产无遮挡羞羞视频在线观看| 亚洲av日韩在线播放| 毛片一级片免费看久久久久| av视频免费观看在线观看| 久久久久久伊人网av| 99热这里只有是精品在线观看| 欧美区成人在线视频| 天美传媒精品一区二区| 中文字幕久久专区| 色婷婷av一区二区三区视频| 性色av一级| 永久免费av网站大全| 99久久综合免费| 国产毛片在线视频| 九色成人免费人妻av| 亚洲不卡免费看| 如日韩欧美国产精品一区二区三区 | 国产精品一区二区三区四区免费观看| 国产一区亚洲一区在线观看| 亚洲人成网站在线播| 国产亚洲5aaaaa淫片| 一本久久精品| 亚洲久久久国产精品| 国产男女内射视频| 久久精品国产鲁丝片午夜精品| 黄片无遮挡物在线观看| 男人爽女人下面视频在线观看| 亚洲经典国产精华液单| 亚洲欧洲日产国产| 日日啪夜夜爽| av免费观看日本| 韩国av在线不卡| 两个人的视频大全免费| 亚洲,一卡二卡三卡| 亚洲精华国产精华液的使用体验| 午夜久久久在线观看| 国产一区有黄有色的免费视频| 日韩制服骚丝袜av| 国产精品伦人一区二区| 亚洲精品自拍成人| 春色校园在线视频观看| www.av在线官网国产| av天堂久久9| 久久狼人影院| 中文资源天堂在线| 亚洲精品,欧美精品| 亚洲婷婷狠狠爱综合网| 一本—道久久a久久精品蜜桃钙片| 校园人妻丝袜中文字幕| 日韩视频在线欧美| 精品久久久久久电影网| 国产视频内射| 人妻夜夜爽99麻豆av| 精品少妇内射三级| 赤兔流量卡办理| 日韩av不卡免费在线播放| 国产黄片视频在线免费观看| 青春草视频在线免费观看| 少妇人妻久久综合中文| 日本欧美国产在线视频| 精品一品国产午夜福利视频| 99久久精品热视频| 高清欧美精品videossex| 午夜影院在线不卡| 国内揄拍国产精品人妻在线| 国产视频内射| 欧美精品一区二区大全| 人妻人人澡人人爽人人| 日韩,欧美,国产一区二区三区| 国产精品三级大全| 精品久久久噜噜| 色吧在线观看| 内地一区二区视频在线| 深夜a级毛片| 免费在线观看成人毛片| 国内少妇人妻偷人精品xxx网站| 亚洲四区av| 色网站视频免费| 毛片一级片免费看久久久久| 国产精品99久久久久久久久| 一级毛片电影观看| 在线观看一区二区三区激情| 久久久久久久久大av| 亚洲精品456在线播放app| 欧美三级亚洲精品| 亚洲成人手机| 久久鲁丝午夜福利片| 久久人人爽av亚洲精品天堂| 久久久精品免费免费高清| 亚洲一级一片aⅴ在线观看| 蜜桃久久精品国产亚洲av| 久久国产乱子免费精品| 国产日韩欧美视频二区| 天天操日日干夜夜撸| 在现免费观看毛片| 99视频精品全部免费 在线| 大片免费播放器 马上看| 女性生殖器流出的白浆| 视频中文字幕在线观看| 午夜免费男女啪啪视频观看| 九色成人免费人妻av| 久久国产精品男人的天堂亚洲 | 最近2019中文字幕mv第一页| 我的老师免费观看完整版| 亚洲欧美清纯卡通| h日本视频在线播放| 校园人妻丝袜中文字幕| 亚洲无线观看免费| 噜噜噜噜噜久久久久久91| 国产又色又爽无遮挡免| 中文精品一卡2卡3卡4更新| 日日啪夜夜爽| 亚洲国产av新网站| 晚上一个人看的免费电影| 少妇人妻一区二区三区视频| 国产69精品久久久久777片| 亚洲精品日韩在线中文字幕| 国产美女午夜福利| 人妻夜夜爽99麻豆av| 欧美 亚洲 国产 日韩一| 九九在线视频观看精品| 午夜91福利影院| 欧美区成人在线视频| 六月丁香七月| 日韩熟女老妇一区二区性免费视频| 亚洲色图综合在线观看| 日韩,欧美,国产一区二区三区| 人人妻人人添人人爽欧美一区卜| 国产成人一区二区在线| 成人漫画全彩无遮挡| 尾随美女入室| 成人漫画全彩无遮挡| 国产精品不卡视频一区二区| 狂野欧美激情性xxxx在线观看| 久久毛片免费看一区二区三区| 有码 亚洲区| av在线老鸭窝| 免费不卡的大黄色大毛片视频在线观看| 十八禁高潮呻吟视频 | 狠狠精品人妻久久久久久综合| 自拍偷自拍亚洲精品老妇| a级毛色黄片| 2022亚洲国产成人精品| 韩国av在线不卡| 只有这里有精品99| 欧美3d第一页| 69精品国产乱码久久久| 如何舔出高潮| 国产熟女午夜一区二区三区 | 自线自在国产av| 菩萨蛮人人尽说江南好唐韦庄| 久久精品国产a三级三级三级| 久久久久精品久久久久真实原创| 亚洲精品国产av蜜桃| 亚洲怡红院男人天堂| 亚洲av在线观看美女高潮| 亚洲av.av天堂| 观看免费一级毛片| 亚洲自偷自拍三级| 精品久久久噜噜| 一级片'在线观看视频| 久久这里有精品视频免费| 多毛熟女@视频| 欧美高清成人免费视频www| 成人18禁高潮啪啪吃奶动态图 | 黑人巨大精品欧美一区二区蜜桃 | 日韩成人伦理影院| 在线观看国产h片| 亚洲久久久国产精品| 久久 成人 亚洲| 欧美最新免费一区二区三区| av国产久精品久网站免费入址| av天堂中文字幕网| 高清欧美精品videossex| 高清黄色对白视频在线免费看 | 国内少妇人妻偷人精品xxx网站| 少妇 在线观看| 2022亚洲国产成人精品| 性色av一级| 久久国产乱子免费精品| 亚洲人成网站在线播| 国产一区二区在线观看av| 日本91视频免费播放| 国产欧美另类精品又又久久亚洲欧美| 秋霞伦理黄片| 色视频在线一区二区三区| 天堂俺去俺来也www色官网| 中文精品一卡2卡3卡4更新| 三级国产精品片| 欧美bdsm另类| 免费黄频网站在线观看国产| 午夜激情久久久久久久| 久久这里有精品视频免费| 在线观看国产h片| 九草在线视频观看| 亚洲va在线va天堂va国产| 永久免费av网站大全| 99热全是精品| 国产熟女午夜一区二区三区 | 韩国av在线不卡| 一区二区三区精品91| 在线亚洲精品国产二区图片欧美 | 一级a做视频免费观看| 国产毛片在线视频| 啦啦啦视频在线资源免费观看| 国产av精品麻豆| 国产 精品1| 国产精品成人在线| 国产欧美日韩一区二区三区在线 | 成人国产麻豆网| 欧美精品高潮呻吟av久久| 97在线视频观看| 免费看光身美女| 亚洲综合精品二区| 日韩av在线免费看完整版不卡| 免费看日本二区| 十分钟在线观看高清视频www | 2022亚洲国产成人精品| 极品教师在线视频| 美女国产视频在线观看| h视频一区二区三区| 午夜免费鲁丝| 国产av码专区亚洲av| 国产淫片久久久久久久久| 中文欧美无线码| 亚洲av在线观看美女高潮| xxx大片免费视频| 午夜福利,免费看|