• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Zonotopic-Based Watermarking Design to Detect Replay Attacks

    2022-10-29 03:30:36CarlosTrapielloandVicenPuig
    IEEE/CAA Journal of Automatica Sinica 2022年11期

    Carlos Trapiello and Vicen? Puig

    Abstract—This paper suggests the use of zonotopes for the design of watermark signals. The proposed approach exploits the recent analogy found between stochastic and zonotopic-based estimators to propose a deterministic counterpart to current approaches that study the replay attack in the context of stationary Gaussian processes. In this regard, the zonotopic analogous case where the control loop is closed based on the estimates of a zonotopic Kalman filter (ZKF) is analyzed. This formulation allows to propose a new performance metric that is related to the Frobenius norm of the prediction zonotope. Hence, the steadystate operation of the system can be related with the size of the minimal Robust Positive Invariant set of the estimation error.Furthermore, analogous expressions concerning the impact that a zonotopic/Gaussian watermark signal has on the system operation are derived. Finally, a novel zonotopically bounded watermark signal that ensures the attack detection by causing the residual vector to exit the healthy residual set during the replay phase of the attack is introduced. The proposed approach is illustrated in simulation using a quadruple-tank process.

    I. INTRODUCTION

    DURING the last decade, the interest aroused by cybersecurity aspects of networked control systems (NCSs) has experienced an exponential growth, currently representing one of the main trends in NCSs [1]. Some of the factors that support this increasing interest are: the potential risks to human lives as well as significant economic losses as a consequence of successful attacks; an ever-growing list of registered attacks, including famous cases like the Stuxnet malware [2];the identification of possible threats and vulnerabilities on NCSs [3]–[5]; the characterization stealthy attack policies which exploit the limitations of traditional monitoring algorithms [6], etc. Consequently, all of the above has motivated an exhaustive analysis on secure control and state estimation techniques for the case where a malicious adversary is capable of attacking either the physical components of the system or the communication network that is used to close the control loop [7], [8].

    In particular, in the present paper the focus is on the detection of replay attacks from a model-based perspective (i.e.,testing the compatibility of measurements with the model of the underlying physical process), thus working under the premise that classical information security detection techniques, like timestamp, can be bypassed by an attacker. On this subject, note that an effective detection is required for deploying replay attack resilient control schemes [9], [10].Otherwise, regarding model-based detection techniques: in the pioneering work [11], the authors not only model and analyze the effect of replay attacks in the framework of stationary Gaussian processes, but also propose the injection of an exogenous signal into the control loop in order to improve the detectability of the attack. From this moment on, the design of these exogenous signals, which are denoted with the termphysical watermarking[12], has been intensively studied until becoming a well-adopted technique for the detection of replay attacks [13].

    Related Work:The watermarking approaches that have been proposed in the automatic control literature can be broadly classified depending on whether they are injected in the control loop in an additive or multiplicative way. On the one hand, multiplicative watermarking schemes employ a bank of filters, placed on the plant side of the communications network, in order to watermark the sensor outputs, while the original data are reconstructed by a watermarking remover placed on the controller side [14], [15]. These schemes allow to address the closed-loop performance degradation induced by the watermark signal. However, multiplicative schemes may lose their effectiveness if the attacker is able to replace the real data before the addition of the watermark signal.

    On the other hand, in additive watermarking schemes an exogenous signal is injected from the controller side at the cost of inducing some closed-loop performance degradation.In this regard, in [11], [12], an additive Gaussian signal is injected in the control loop for increasing the attack detection rate of a statistical detector. A similar watermarking scheme has been also analyzed in [16]. In [17], a Gaussian signal is injected in a combined algorithm that deals with online watermarking design and unknown system parameters identification. Furthermore, in [18], a periodical injection of a Gaussian signal is proposed for detecting discontinuous replay attacks. A stochastic game approach is proposed in [19] in order to derive an optimal control policy that switches between a control-cost optimal (but nonsecure) and watermarked (but cost-suboptimal) controllers. Moreover, in [20], a dynamic watermarking method is proposed for detecting replay attacks in linear-quadratic Gaussian (LQG) systems.

    At this point, it must be highlighted that the additive schemes presented above have addressed the physical watermarking design problem from a stochastic point of view and,in particular, within the context of stationary Gaussian processes. Nevertheless, as remarked in [21], despite the characterization of uncertainties through Gaussian probability distributions is often well suited to deal with measurement noises,this description may fail to model disturbances that arise from some of lack of knowledge about deterministic behaviors and which may do not have any other stationary behavior than that of remaining within some specified bounds. Hence, in the remaining of the paper the physical watermarking design problem will be addressed from a set-based (or normbounded) paradigm [22]. These set-based techniques have proven their effectiveness in fault diagnosis and tolerant control schemes [23]. Besides, they have been recently used in order to achieve a secure state estimation in systems under bounded attacks [24], [25] and to characterize the replay attack detectability using set invariance notions [26].

    Approaching the system monitoring under a set-based paradigm allows to infer in a deterministic way if the system is being attacked by testing online whether or not a residual signal belongs to a set coherent with the healthy operation of the system. Nonetheless, this unambiguous assessment poses two central challenges in the design of active attack detection schemes: i) The proposed watermarking scheme should be able to force the residual signal out of its healthy residual set whenever the system is under attack while minimizing the performance loss induced in the system operation; ii) A coherent metric to assess the performance degradation induced by a bounded watermark signal should be developed.

    In order to address the latter point, zonotopic sets will be used mainly motivated by the results presented in [27], where the notion of covariation matrix of a zonotope is introduced for proposing an optimal robust state observer. Furthermore,by minimizing the weighted Frobenius norm (F-norm) of the prediction zonotope, analogous expressions are obtained regarding the optimal design of a zonotope-based observer and the standard stochastic Kalman filter (uncertainties modeled as Gaussian random variables). Consequently, in this paper, the above analogy is further exploited by analyzing the optimal control law that minimizes a cost function that takes into account the weightedF-norm of the bounding zonotope computed by a zonotopic Kalman filter (ZKF).

    It must be pointed out that optimal control has been thoroughly studied under different uncertainty paradigms, namely:deterministicoptimal control [28], where uncertainty can only take one value;stochasticoptimal control [28]–[31], where uncertainty is defined as a function of a probability space;minimaxcontrol [32]–[34], where uncertainty is confined within a given set. In this regard, notice that, whereas minimax control is defined in a worst case basis, the proposed approach is based on the bounding zonotopeF-norm which,for linear-quadratic control problems, returns expressions similar to those obtained if the problem is formulated under Gaussian uncertainties. Consequently, when it comes to the active attack detection in linear systems, through this novel framework the same optimality patterns are obtained regardless of whether the detection is approached under a set-based or stochastic paradigm, what may lead to future detection schemes that merge the mutually exclusive benefits of both approaches [21].

    Contributions:The contributions of this paper are as follows. First, a linear-quadratic regulator (LQR) controller that operates based on the estimates of a ZKF is proposed. It is proven that this control scheme minimizes a new cost function that considers the weightedF-norm of the system states,in what can be seen as the zonotopic counterpart of the expected value of a quadratic cost function in an LQG scheme. Furthermore, for the infinite horizon control problem,the Frobenius radius of the minimum robust positive invariant set (mRPI) of the estimation error is given by the solution of the Riccati algebraic equation.

    Second, the new zonotope-based cost function is used to evaluate the impact that a zonotopically bounded watermark signal has on the steady-state operation of the system. Analogous expressions to the performance loss induced by an exogenous Gaussian signal in an LQG system are obtained.

    Third and finally, a zonotopically bounded watermark signal that minimizes the new cost function is proposed. This detection scheme injects a known signal in the system inputs,while filtering its effect through the estimations generated using the output data. Since the replay phase of the attack entails that the known signal is no longer observable, then the estimation error generates a new residual signal that is destabilized whenever the output data are being replayed back.Some preliminary results have been presented in the conference paper [35].

    The remainder of the paper is organized as follows: Section II introduces some preliminary concepts whereas Section III presents the problem statement. Then, in Section IV the optimal finite/infinite horizon control problem based on the estimates of a ZKF is analyzed. Section V analyzes the impact of a bounded watermark signal on the previous optimal control loop. Besides, in Section VI a new guaranteed replay attack detection scheme is introduced while in Section VII the proposed results are validated in simulation using a well-known control benchmark based on a four-tank system. Finally, in Section VIII the main conclusions are drawn.

    II. NOTATION, BASIC DEFINITIONS AND PROPERTIES

    A. Notation

    B. Basic Definitions and Properties

    A. System Description

    B. Zonotopic KF

    IV. LINEAR-QUADRATIC ZONOTOPIC CONTROL

    In this section, the optimal control problem for the case in which the feedback loop is closed using the estimates generated by a ZKF is analyzed. Note that, under this paradigm, at each time instantkthe real state of the system is known to be confined within a zonotope. In this regard, the following performance criterion is introduced in order to assess the system operation.

    Below, the finite and infinite horizon control problems under the performance metric in Definition 6 are analyzed.

    A. Finite Horizon Control

    which operates based on the center of the ZKF estimator.

    In order differentiate (15) from the stochastic LQG control,in the sequel the zonotopic version will be denoted as linearquadratic zonotopic (LQZ) control. For this case, from (13)and (14) it follows that the optimal value of the cost function is:

    B. Infinite Horizon Control

    Since many control systems operate for long periods of time, the remainder of the paper will focus on a system whose control law is obtained by solving the infinite horizon problem formulated as

    V. REPLAY ATTACK DETECTABILITY

    In this section, the case where a malicious attacker can access the communications layer and record/replay the data sent through the sensors-to-controller link is analyzed. In order to characterize the effect of the attack, the following time windows are defined:

    1) Record Window:Output data are assumed to be recorded forKREC={k∈N :k∈[k0,k0+l-1]}, wherel∈N denotes the size of the record window.

    A. Anomaly Detector

    B. Attack Detectability

    Fig. 1 shows the overall control/attack/watermarking scheme under consideration. Regarding the control scheme:the control loop is closed remotely by means of an optimal controller (Section IV) that operates based on the estimates of a ZKF (Section III-B). The estimates of the ZKF are used by a set-based anomaly detector (Section V-A). Additionally, Fig. 1 depicts an attacker that may be able to spoof the data sent through the sensors-to-controller link as well as to inject an exogenous signaluˉkinto the system inputs. On the other hand,the blue dashed box shows the interaction of an additive watermark signal (Section VI) with the control loop.

    Fig. 1. Overall scheme – Replay attack (red); Watermark generator (blue).

    C. Performance Loss Induced By A Zonotopically-Bounded Watermark Signal

    VI. ZONOTOPICALLY BOUNDED WATERMARK SIGNAL DESIGN

    A. Design of an Extended State Estimator

    B. Watermarked System Stability

    C. Attack Detection

    VII. NUMERICAL EXAMPLE

    The quadruple-tank system [47] is a well-known benchmark used to evaluate control and supervision strategies, and it is also employed to evaluate cyber-attack detection techniques in [5], [7]. The nonlinear dynamics of the system are described as follows:

    TABLE I QUADRUPLE TANK PROCESS PARAMETERS

    At this point, it must be highlighted that the eigenvalues of matrixA-G*C-BL*are {-0.1739,0.4005,0.9513±0.0278i},that is, it is asymptotically stable, and thus there is no guarantee that the replay attack can be detected (cf. (28)). In other words, in the remainder of this section, Assumption 3 concerning the attack undetectability prevails thus motivating the injection of a watermark signal in the control loop.

    A. Performance Assessment

    B. Watermark Signal Design

    In order to design a watermark signal like the one presented in Section VI, the tuning matrixMmust be defined. In this regard, the following matrixMis introduced:

    TABLE II ZONOTOPIC RPI APPROXIMATIONS OF THE MRPI SET

    C. Attack Simulation

    Fig. 2. Temporal evolution of the watermark signal.

    On the other hand, Fig. 3 shows the effect caused on the system outputs by the injection of the watermark signal. It can be seen how the performance of the system is hardly degraded before the replay phase and how after the start of this phase the effect of the increasing watermark signal becomes more evident. It should be highlighted that since the control loop is affected by the data replay, the stability of the plant after the attack detection, atk=737, is due solely to the fact that the open-loop system is stable.

    Fig. 3. Temporal evolution of the system outputs.

    The mean times (tm) required in the simulations to monitor the operation of the system online are1Laptop (Intel i7 1.8 GHz, 16 GB RAM) running Windows 10; optimization using Cplex 12.8 [48].

    Fig. 4. Performance loss vs mean detection time.

    VIII. CONCLUSIONS

    This paper has investigated the use of zonotopes for the design of watermark signals. The proposed approach has exploited the recent analogy found between stochastic and deterministic fields in the context of optimal state estimation,and extended it to optimal control. By means of this analogy,the system performance can be assessed and its steady-state operation may be related with the size of the mPRI set of the estimation error. Furthermore, similar expressions regarding the impact of a Gaussian watermark signal on the performance of an LQG system and the impact of a zonotopically bounded signal on the weightedF-norm of the states have been obtained. These analogous optimal patterns, motivate further studies in the attack detection for systems which are simultaneously subject to bounded disturbances and Gaussian noise, thus merging the usually mutually exclusive benefits granted by set-based techniques and stochastic techniques.Moreover, some unresolved issues, like the effect of the reduction operator in the convergence of the Riccati difference equations, appear as appealing problems that clearly deserve an in-depth study. Other future research directions include: the extension of the zonotopic framework to more complex attack policies like, for example, stealthy attacks; the consideration of input and state constraints; the adaptation of the watermarking method to distributed monitoring architectures, thus addressing the scalability to large-scale systems;and the consideration of continuous time systems.

    APPENDIX B PROOF OF THEOREM 2

    APPENDIX C COMPUTING AN INITIAL ZONOTOPIC RPI SET

    最后的刺客免费高清国语| 啦啦啦韩国在线观看视频| 免费观看精品视频网站| 亚洲,欧美,日韩| 欧美精品啪啪一区二区三区| 亚洲国产日韩欧美精品在线观看| 女人被狂操c到高潮| 久久天躁狠狠躁夜夜2o2o| 国产成人影院久久av| 最后的刺客免费高清国语| 亚洲国产色片| 国产精品嫩草影院av在线观看 | 亚洲最大成人av| 精品久久久久久久久av| 变态另类丝袜制服| 综合色av麻豆| 男女之事视频高清在线观看| 国产一区二区亚洲精品在线观看| 日韩强制内射视频| 欧美zozozo另类| 国产亚洲av嫩草精品影院| aaaaa片日本免费| 亚洲男人的天堂狠狠| 一本精品99久久精品77| 国产精品不卡视频一区二区| 搞女人的毛片| 日韩欧美 国产精品| 久久久成人免费电影| 长腿黑丝高跟| 黄色视频,在线免费观看| 春色校园在线视频观看| 一级黄片播放器| 亚洲人成网站在线播| 日韩欧美在线二视频| 精品日产1卡2卡| 高清在线国产一区| 国产亚洲精品综合一区在线观看| 欧美绝顶高潮抽搐喷水| 免费av不卡在线播放| 成人毛片a级毛片在线播放| 久久亚洲精品不卡| 国产精品爽爽va在线观看网站| а√天堂www在线а√下载| 99riav亚洲国产免费| 1024手机看黄色片| 欧美中文日本在线观看视频| 国产 一区 欧美 日韩| 午夜视频国产福利| 色综合色国产| 精品人妻1区二区| 国产精品一区二区三区四区久久| 俄罗斯特黄特色一大片| 亚洲av免费高清在线观看| 久久99热6这里只有精品| 亚洲第一电影网av| 赤兔流量卡办理| 少妇高潮的动态图| 22中文网久久字幕| 国产伦精品一区二区三区视频9| 国产精品久久久久久精品电影| 亚洲内射少妇av| 亚洲aⅴ乱码一区二区在线播放| 禁无遮挡网站| 男人狂女人下面高潮的视频| 国产精品一区二区免费欧美| 亚洲三级黄色毛片| 国产精品亚洲美女久久久| 在线天堂最新版资源| 18禁黄网站禁片免费观看直播| 国产男人的电影天堂91| 俄罗斯特黄特色一大片| 真人一进一出gif抽搐免费| 免费看日本二区| 久久久久久久久中文| 国产老妇女一区| 国产午夜精品久久久久久一区二区三区 | 十八禁国产超污无遮挡网站| 大又大粗又爽又黄少妇毛片口| 欧美不卡视频在线免费观看| 22中文网久久字幕| 久久中文看片网| 超碰av人人做人人爽久久| 亚洲欧美清纯卡通| 国产精品久久久久久久久免| 尤物成人国产欧美一区二区三区| 成人精品一区二区免费| 国产精品一区二区性色av| 18禁黄网站禁片免费观看直播| 有码 亚洲区| 在线观看午夜福利视频| 国产单亲对白刺激| 国产伦精品一区二区三区四那| 国产午夜福利久久久久久| 国产伦精品一区二区三区视频9| 嫩草影院精品99| 18禁裸乳无遮挡免费网站照片| 国产69精品久久久久777片| 亚洲人成网站高清观看| 国产黄片美女视频| 成人三级黄色视频| 欧美性猛交黑人性爽| 久久九九热精品免费| 精品午夜福利视频在线观看一区| 中文字幕高清在线视频| 动漫黄色视频在线观看| 深夜a级毛片| 亚洲av日韩精品久久久久久密| 高清毛片免费观看视频网站| 成熟少妇高潮喷水视频| 国产精品99久久久久久久久| 亚洲 国产 在线| 国产私拍福利视频在线观看| 91在线精品国自产拍蜜月| 亚洲成人久久爱视频| 一本精品99久久精品77| 99久久九九国产精品国产免费| 大型黄色视频在线免费观看| 国产精品免费一区二区三区在线| 偷拍熟女少妇极品色| 中国美女看黄片| 免费在线观看成人毛片| 老师上课跳d突然被开到最大视频| 搞女人的毛片| 亚洲真实伦在线观看| 88av欧美| 日本 欧美在线| 韩国av在线不卡| 午夜精品一区二区三区免费看| 网址你懂的国产日韩在线| 亚洲成人精品中文字幕电影| 制服丝袜大香蕉在线| 非洲黑人性xxxx精品又粗又长| 国产av麻豆久久久久久久| 亚洲一区二区三区色噜噜| 88av欧美| 亚洲四区av| 色尼玛亚洲综合影院| 日韩欧美在线乱码| 国产精品一区二区性色av| 久久中文看片网| 久久天躁狠狠躁夜夜2o2o| 欧美日韩亚洲国产一区二区在线观看| 老师上课跳d突然被开到最大视频| netflix在线观看网站| 日本黄色视频三级网站网址| 精品人妻1区二区| 国产伦精品一区二区三区视频9| 有码 亚洲区| 毛片女人毛片| 精品久久久久久成人av| av在线亚洲专区| 999久久久精品免费观看国产| 亚洲综合色惰| 久久久久久久精品吃奶| 熟女人妻精品中文字幕| 国产 一区 欧美 日韩| 一个人看视频在线观看www免费| 22中文网久久字幕| 婷婷六月久久综合丁香| 我要看日韩黄色一级片| 欧美xxxx性猛交bbbb| 欧美一级a爱片免费观看看| 国语自产精品视频在线第100页| 精品久久久久久,| 国产国拍精品亚洲av在线观看| 免费观看人在逋| 韩国av在线不卡| 亚洲av中文字字幕乱码综合| 久久久久久九九精品二区国产| www日本黄色视频网| 舔av片在线| 日本欧美国产在线视频| 成年女人毛片免费观看观看9| 精品一区二区三区av网在线观看| 成人永久免费在线观看视频| 22中文网久久字幕| 国产精品一及| 成人无遮挡网站| 亚洲久久久久久中文字幕| 亚洲国产精品合色在线| 搡老岳熟女国产| 舔av片在线| 成人无遮挡网站| 色综合站精品国产| 国内精品宾馆在线| 欧美国产日韩亚洲一区| 在线播放无遮挡| 国产免费一级a男人的天堂| 九九久久精品国产亚洲av麻豆| 国产精品国产三级国产av玫瑰| 天堂动漫精品| videossex国产| 夜夜夜夜夜久久久久| 少妇的逼水好多| 悠悠久久av| АⅤ资源中文在线天堂| 国产精品一区www在线观看 | 男女做爰动态图高潮gif福利片| 欧美成人性av电影在线观看| 中文字幕精品亚洲无线码一区| 联通29元200g的流量卡| 久久久久国产精品人妻aⅴ院| 国产精品亚洲一级av第二区| 精品一区二区免费观看| 男女视频在线观看网站免费| 蜜桃久久精品国产亚洲av| 99久久九九国产精品国产免费| 国产精品无大码| 国产黄色小视频在线观看| 国产69精品久久久久777片| 日日摸夜夜添夜夜添av毛片 | 很黄的视频免费| 欧美高清成人免费视频www| 久久欧美精品欧美久久欧美| 国产国拍精品亚洲av在线观看| 好男人在线观看高清免费视频| 久久人妻av系列| 国产一区二区三区视频了| 99热只有精品国产| 能在线免费观看的黄片| 国产伦精品一区二区三区四那| 久久热精品热| 床上黄色一级片| 亚洲成人久久爱视频| 欧美高清成人免费视频www| 精品人妻偷拍中文字幕| 日韩中字成人| 久久久久久久精品吃奶| 日韩欧美在线二视频| 九九在线视频观看精品| 久久精品影院6| 乱系列少妇在线播放| 国产av一区在线观看免费| 99久久九九国产精品国产免费| 久久亚洲精品不卡| 亚洲精品影视一区二区三区av| 特大巨黑吊av在线直播| 欧美日韩瑟瑟在线播放| 黄色女人牲交| 亚洲最大成人手机在线| 美女被艹到高潮喷水动态| 波多野结衣高清无吗| 久久久精品欧美日韩精品| 精品无人区乱码1区二区| av在线亚洲专区| 91av网一区二区| 欧美成人性av电影在线观看| 中文字幕免费在线视频6| 变态另类成人亚洲欧美熟女| 美女高潮喷水抽搐中文字幕| 中国美女看黄片| 国产aⅴ精品一区二区三区波| 免费在线观看影片大全网站| 亚洲熟妇熟女久久| 99精品久久久久人妻精品| 亚洲天堂国产精品一区在线| 熟女电影av网| .国产精品久久| 国产爱豆传媒在线观看| a级毛片免费高清观看在线播放| 午夜激情欧美在线| 老司机深夜福利视频在线观看| 午夜福利欧美成人| 亚洲黑人精品在线| 亚洲精品乱码久久久v下载方式| 亚洲色图av天堂| 一进一出好大好爽视频| 日韩av在线大香蕉| 尤物成人国产欧美一区二区三区| 亚洲一区二区三区色噜噜| 色综合站精品国产| 干丝袜人妻中文字幕| 伦理电影大哥的女人| 国产不卡一卡二| www.www免费av| 亚洲不卡免费看| 一级黄色大片毛片| 少妇丰满av| 少妇猛男粗大的猛烈进出视频 | 精品不卡国产一区二区三区| 久久精品国产亚洲av香蕉五月| 少妇猛男粗大的猛烈进出视频 | 欧美bdsm另类| 欧美激情在线99| 最近最新中文字幕大全电影3| 日韩欧美 国产精品| 一个人免费在线观看电影| 久久精品国产亚洲av天美| 一区二区三区激情视频| 亚洲自偷自拍三级| 成人性生交大片免费视频hd| 欧美日韩国产亚洲二区| 一a级毛片在线观看| 国产精华一区二区三区| 免费观看精品视频网站| 日韩欧美精品v在线| 欧美xxxx黑人xx丫x性爽| 亚洲av电影不卡..在线观看| 欧美高清性xxxxhd video| 国产老妇女一区| 琪琪午夜伦伦电影理论片6080| xxxwww97欧美| 两性午夜刺激爽爽歪歪视频在线观看| 男人舔女人下体高潮全视频| 欧美成人一区二区免费高清观看| 淫妇啪啪啪对白视频| 日本五十路高清| 一区二区三区四区激情视频 | 91麻豆精品激情在线观看国产| 久久久久久久久久黄片| 日本一二三区视频观看| 欧美最黄视频在线播放免费| 精品人妻1区二区| 中国美女看黄片| 波多野结衣巨乳人妻| avwww免费| 久久国内精品自在自线图片| 搡老熟女国产l中国老女人| 国产高清激情床上av| 久久午夜亚洲精品久久| 国产伦一二天堂av在线观看| 国产高清激情床上av| 免费观看的影片在线观看| 日日摸夜夜添夜夜添av毛片 | 又爽又黄a免费视频| 又粗又爽又猛毛片免费看| 岛国在线免费视频观看| 免费观看精品视频网站| 久久精品久久久久久噜噜老黄 | 久久久久久久久中文| 99久久精品热视频| 51国产日韩欧美| 一个人看的www免费观看视频| 国产成人福利小说| 99久国产av精品| 欧美三级亚洲精品| 欧美性猛交╳xxx乱大交人| 老女人水多毛片| 国产精品福利在线免费观看| 一区二区三区免费毛片| 成人欧美大片| 男人舔奶头视频| 亚洲七黄色美女视频| 淫妇啪啪啪对白视频| 自拍偷自拍亚洲精品老妇| 欧美激情在线99| 成人精品一区二区免费| 亚洲av.av天堂| 国内精品久久久久久久电影| 小说图片视频综合网站| 国产精品日韩av在线免费观看| 中文字幕免费在线视频6| av在线蜜桃| 亚洲欧美日韩卡通动漫| 精品国内亚洲2022精品成人| 精华霜和精华液先用哪个| 精品久久久久久久末码| 欧美潮喷喷水| 亚洲国产精品sss在线观看| 在现免费观看毛片| 欧美+日韩+精品| 亚洲av免费在线观看| 免费看av在线观看网站| 女同久久另类99精品国产91| 最近视频中文字幕2019在线8| 午夜久久久久精精品| 日韩欧美国产一区二区入口| 性插视频无遮挡在线免费观看| 赤兔流量卡办理| 一进一出好大好爽视频| x7x7x7水蜜桃| 在线天堂最新版资源| 日韩欧美免费精品| 成人美女网站在线观看视频| 无遮挡黄片免费观看| 男人和女人高潮做爰伦理| 亚洲性久久影院| 88av欧美| 一卡2卡三卡四卡精品乱码亚洲| 日韩人妻高清精品专区| 欧美黑人巨大hd| 午夜日韩欧美国产| 99热网站在线观看| 久久久久性生活片| 变态另类成人亚洲欧美熟女| 噜噜噜噜噜久久久久久91| 十八禁国产超污无遮挡网站| 国产一区二区在线观看日韩| 人妻少妇偷人精品九色| 少妇熟女aⅴ在线视频| 久久久久久久久久黄片| 成年女人毛片免费观看观看9| 一进一出抽搐gif免费好疼| 国产一区二区亚洲精品在线观看| 亚洲精品乱码久久久v下载方式| 日韩欧美国产一区二区入口| 国内精品宾馆在线| 欧美日本视频| 他把我摸到了高潮在线观看| 美女 人体艺术 gogo| 熟女电影av网| 18禁在线播放成人免费| 亚洲人成网站在线播| 精品一区二区三区视频在线观看免费| 美女黄网站色视频| 久久99热6这里只有精品| 日本成人三级电影网站| 亚洲精品粉嫩美女一区| 午夜福利成人在线免费观看| 精品一区二区三区人妻视频| 欧美在线一区亚洲| 小蜜桃在线观看免费完整版高清| 国产91精品成人一区二区三区| 久99久视频精品免费| 18+在线观看网站| 九九久久精品国产亚洲av麻豆| bbb黄色大片| 又紧又爽又黄一区二区| 亚洲精品国产成人久久av| 欧美极品一区二区三区四区| 日韩欧美 国产精品| 亚洲精品久久国产高清桃花| 国产激情偷乱视频一区二区| 国产精品免费一区二区三区在线| 老司机午夜福利在线观看视频| 日本免费一区二区三区高清不卡| 春色校园在线视频观看| 日韩,欧美,国产一区二区三区 | 日韩av在线大香蕉| 亚洲av中文字字幕乱码综合| 国产精品免费一区二区三区在线| 精品99又大又爽又粗少妇毛片 | 国产精品一区www在线观看 | 色播亚洲综合网| 欧美日本视频| 国产精品三级大全| 又爽又黄a免费视频| 精品久久久久久久久亚洲 | 免费在线观看影片大全网站| 最后的刺客免费高清国语| 国产精品99久久久久久久久| 欧美一区二区国产精品久久精品| 亚洲欧美日韩高清在线视频| 久久精品久久久久久噜噜老黄 | 级片在线观看| 美女大奶头视频| 热99re8久久精品国产| 精品一区二区三区视频在线观看免费| 欧美在线一区亚洲| 日本熟妇午夜| 免费大片18禁| 日韩欧美在线乱码| 亚洲va在线va天堂va国产| 级片在线观看| 在线观看一区二区三区| 又爽又黄无遮挡网站| 日本与韩国留学比较| 99热6这里只有精品| 国产乱人视频| 午夜爱爱视频在线播放| 日本黄大片高清| 最后的刺客免费高清国语| 亚洲色图av天堂| 久久久久久久精品吃奶| 色5月婷婷丁香| 狂野欧美激情性xxxx在线观看| 国产av麻豆久久久久久久| 国产私拍福利视频在线观看| 国产久久久一区二区三区| 日韩精品有码人妻一区| 美女 人体艺术 gogo| 午夜福利在线观看免费完整高清在 | 最近视频中文字幕2019在线8| 联通29元200g的流量卡| 国产男靠女视频免费网站| 亚洲成人久久爱视频| av.在线天堂| 国内毛片毛片毛片毛片毛片| 日韩大尺度精品在线看网址| 日本 av在线| 亚洲男人的天堂狠狠| 亚洲精品日韩av片在线观看| 国产中年淑女户外野战色| 欧美日韩综合久久久久久 | 三级毛片av免费| 一进一出抽搐gif免费好疼| 麻豆国产av国片精品| 国产熟女欧美一区二区| 色播亚洲综合网| 欧美日韩瑟瑟在线播放| 超碰av人人做人人爽久久| 日日夜夜操网爽| 色哟哟·www| 窝窝影院91人妻| 亚洲国产欧美人成| 中文字幕高清在线视频| 日韩强制内射视频| 亚洲成av人片在线播放无| 噜噜噜噜噜久久久久久91| 亚洲成av人片在线播放无| 舔av片在线| 国产亚洲精品av在线| 极品教师在线免费播放| 亚洲,欧美,日韩| 亚洲七黄色美女视频| 人妻制服诱惑在线中文字幕| 亚洲av一区综合| 欧美日韩国产亚洲二区| 少妇裸体淫交视频免费看高清| 欧美激情国产日韩精品一区| 超碰av人人做人人爽久久| 两性午夜刺激爽爽歪歪视频在线观看| 一个人免费在线观看电影| 日韩,欧美,国产一区二区三区 | 色av中文字幕| 久久亚洲精品不卡| 亚洲第一电影网av| 99久久精品热视频| 日韩欧美国产在线观看| 亚洲av免费在线观看| 欧美一级a爱片免费观看看| 九色成人免费人妻av| 国产在线男女| 国产一区二区激情短视频| 日韩在线高清观看一区二区三区 | 国产精品久久久久久久久免| 黄片wwwwww| 欧洲精品卡2卡3卡4卡5卡区| 热99在线观看视频| 久久精品国产鲁丝片午夜精品 | 日韩欧美国产在线观看| 国产免费av片在线观看野外av| 亚洲图色成人| 国产蜜桃级精品一区二区三区| av黄色大香蕉| 久久久久久久久大av| 九色国产91popny在线| 国产精品人妻久久久影院| 黄色欧美视频在线观看| 国产国拍精品亚洲av在线观看| 99久久精品一区二区三区| 国产一区二区亚洲精品在线观看| 精品久久久久久久人妻蜜臀av| 欧美性猛交黑人性爽| 日韩在线高清观看一区二区三区 | 欧美3d第一页| av国产免费在线观看| 亚洲男人的天堂狠狠| 亚洲美女视频黄频| 级片在线观看| 高清日韩中文字幕在线| 久久人妻av系列| 久久人人爽人人爽人人片va| 免费在线观看日本一区| 男女边吃奶边做爰视频| 日韩欧美在线乱码| 少妇裸体淫交视频免费看高清| 日韩,欧美,国产一区二区三区 | 亚洲精品乱码久久久v下载方式| 亚洲综合色惰| 欧美一级a爱片免费观看看| 国产精品三级大全| 99精品在免费线老司机午夜| 天堂动漫精品| 美女被艹到高潮喷水动态| 精品久久国产蜜桃| 国产探花在线观看一区二区| 我的女老师完整版在线观看| 日韩欧美国产在线观看| 亚洲国产欧洲综合997久久,| 国产在线男女| 日本爱情动作片www.在线观看 | 亚洲一区二区三区色噜噜| 熟女人妻精品中文字幕| 久久人人精品亚洲av| 亚洲欧美精品综合久久99| 久久亚洲精品不卡| av黄色大香蕉| 一进一出好大好爽视频| 日韩欧美国产在线观看| 色吧在线观看| 久久国产精品人妻蜜桃| 日本精品一区二区三区蜜桃| 又黄又爽又刺激的免费视频.| 黄色女人牲交| 国产高清三级在线| 国产一区二区亚洲精品在线观看| 91狼人影院| 啪啪无遮挡十八禁网站| 全区人妻精品视频| 亚洲人与动物交配视频| 亚洲国产精品sss在线观看| 日本在线视频免费播放| 天堂动漫精品| 国产精品人妻久久久久久| 天美传媒精品一区二区| 在线a可以看的网站| 一本一本综合久久| 亚洲精品在线观看二区| 久久精品国产99精品国产亚洲性色| www日本黄色视频网| 99久久成人亚洲精品观看| 一个人观看的视频www高清免费观看| 国产精品98久久久久久宅男小说| 免费观看的影片在线观看| 在线观看av片永久免费下载| 极品教师在线视频| 99热只有精品国产| 91在线观看av| 一区二区三区四区激情视频 | 免费观看的影片在线观看| 又粗又爽又猛毛片免费看| 中文字幕免费在线视频6| 搡女人真爽免费视频火全软件 | 精品久久久久久成人av|