• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Zonotopic-Based Watermarking Design to Detect Replay Attacks

    2022-10-29 03:30:36CarlosTrapielloandVicenPuig
    IEEE/CAA Journal of Automatica Sinica 2022年11期

    Carlos Trapiello and Vicen? Puig

    Abstract—This paper suggests the use of zonotopes for the design of watermark signals. The proposed approach exploits the recent analogy found between stochastic and zonotopic-based estimators to propose a deterministic counterpart to current approaches that study the replay attack in the context of stationary Gaussian processes. In this regard, the zonotopic analogous case where the control loop is closed based on the estimates of a zonotopic Kalman filter (ZKF) is analyzed. This formulation allows to propose a new performance metric that is related to the Frobenius norm of the prediction zonotope. Hence, the steadystate operation of the system can be related with the size of the minimal Robust Positive Invariant set of the estimation error.Furthermore, analogous expressions concerning the impact that a zonotopic/Gaussian watermark signal has on the system operation are derived. Finally, a novel zonotopically bounded watermark signal that ensures the attack detection by causing the residual vector to exit the healthy residual set during the replay phase of the attack is introduced. The proposed approach is illustrated in simulation using a quadruple-tank process.

    I. INTRODUCTION

    DURING the last decade, the interest aroused by cybersecurity aspects of networked control systems (NCSs) has experienced an exponential growth, currently representing one of the main trends in NCSs [1]. Some of the factors that support this increasing interest are: the potential risks to human lives as well as significant economic losses as a consequence of successful attacks; an ever-growing list of registered attacks, including famous cases like the Stuxnet malware [2];the identification of possible threats and vulnerabilities on NCSs [3]–[5]; the characterization stealthy attack policies which exploit the limitations of traditional monitoring algorithms [6], etc. Consequently, all of the above has motivated an exhaustive analysis on secure control and state estimation techniques for the case where a malicious adversary is capable of attacking either the physical components of the system or the communication network that is used to close the control loop [7], [8].

    In particular, in the present paper the focus is on the detection of replay attacks from a model-based perspective (i.e.,testing the compatibility of measurements with the model of the underlying physical process), thus working under the premise that classical information security detection techniques, like timestamp, can be bypassed by an attacker. On this subject, note that an effective detection is required for deploying replay attack resilient control schemes [9], [10].Otherwise, regarding model-based detection techniques: in the pioneering work [11], the authors not only model and analyze the effect of replay attacks in the framework of stationary Gaussian processes, but also propose the injection of an exogenous signal into the control loop in order to improve the detectability of the attack. From this moment on, the design of these exogenous signals, which are denoted with the termphysical watermarking[12], has been intensively studied until becoming a well-adopted technique for the detection of replay attacks [13].

    Related Work:The watermarking approaches that have been proposed in the automatic control literature can be broadly classified depending on whether they are injected in the control loop in an additive or multiplicative way. On the one hand, multiplicative watermarking schemes employ a bank of filters, placed on the plant side of the communications network, in order to watermark the sensor outputs, while the original data are reconstructed by a watermarking remover placed on the controller side [14], [15]. These schemes allow to address the closed-loop performance degradation induced by the watermark signal. However, multiplicative schemes may lose their effectiveness if the attacker is able to replace the real data before the addition of the watermark signal.

    On the other hand, in additive watermarking schemes an exogenous signal is injected from the controller side at the cost of inducing some closed-loop performance degradation.In this regard, in [11], [12], an additive Gaussian signal is injected in the control loop for increasing the attack detection rate of a statistical detector. A similar watermarking scheme has been also analyzed in [16]. In [17], a Gaussian signal is injected in a combined algorithm that deals with online watermarking design and unknown system parameters identification. Furthermore, in [18], a periodical injection of a Gaussian signal is proposed for detecting discontinuous replay attacks. A stochastic game approach is proposed in [19] in order to derive an optimal control policy that switches between a control-cost optimal (but nonsecure) and watermarked (but cost-suboptimal) controllers. Moreover, in [20], a dynamic watermarking method is proposed for detecting replay attacks in linear-quadratic Gaussian (LQG) systems.

    At this point, it must be highlighted that the additive schemes presented above have addressed the physical watermarking design problem from a stochastic point of view and,in particular, within the context of stationary Gaussian processes. Nevertheless, as remarked in [21], despite the characterization of uncertainties through Gaussian probability distributions is often well suited to deal with measurement noises,this description may fail to model disturbances that arise from some of lack of knowledge about deterministic behaviors and which may do not have any other stationary behavior than that of remaining within some specified bounds. Hence, in the remaining of the paper the physical watermarking design problem will be addressed from a set-based (or normbounded) paradigm [22]. These set-based techniques have proven their effectiveness in fault diagnosis and tolerant control schemes [23]. Besides, they have been recently used in order to achieve a secure state estimation in systems under bounded attacks [24], [25] and to characterize the replay attack detectability using set invariance notions [26].

    Approaching the system monitoring under a set-based paradigm allows to infer in a deterministic way if the system is being attacked by testing online whether or not a residual signal belongs to a set coherent with the healthy operation of the system. Nonetheless, this unambiguous assessment poses two central challenges in the design of active attack detection schemes: i) The proposed watermarking scheme should be able to force the residual signal out of its healthy residual set whenever the system is under attack while minimizing the performance loss induced in the system operation; ii) A coherent metric to assess the performance degradation induced by a bounded watermark signal should be developed.

    In order to address the latter point, zonotopic sets will be used mainly motivated by the results presented in [27], where the notion of covariation matrix of a zonotope is introduced for proposing an optimal robust state observer. Furthermore,by minimizing the weighted Frobenius norm (F-norm) of the prediction zonotope, analogous expressions are obtained regarding the optimal design of a zonotope-based observer and the standard stochastic Kalman filter (uncertainties modeled as Gaussian random variables). Consequently, in this paper, the above analogy is further exploited by analyzing the optimal control law that minimizes a cost function that takes into account the weightedF-norm of the bounding zonotope computed by a zonotopic Kalman filter (ZKF).

    It must be pointed out that optimal control has been thoroughly studied under different uncertainty paradigms, namely:deterministicoptimal control [28], where uncertainty can only take one value;stochasticoptimal control [28]–[31], where uncertainty is defined as a function of a probability space;minimaxcontrol [32]–[34], where uncertainty is confined within a given set. In this regard, notice that, whereas minimax control is defined in a worst case basis, the proposed approach is based on the bounding zonotopeF-norm which,for linear-quadratic control problems, returns expressions similar to those obtained if the problem is formulated under Gaussian uncertainties. Consequently, when it comes to the active attack detection in linear systems, through this novel framework the same optimality patterns are obtained regardless of whether the detection is approached under a set-based or stochastic paradigm, what may lead to future detection schemes that merge the mutually exclusive benefits of both approaches [21].

    Contributions:The contributions of this paper are as follows. First, a linear-quadratic regulator (LQR) controller that operates based on the estimates of a ZKF is proposed. It is proven that this control scheme minimizes a new cost function that considers the weightedF-norm of the system states,in what can be seen as the zonotopic counterpart of the expected value of a quadratic cost function in an LQG scheme. Furthermore, for the infinite horizon control problem,the Frobenius radius of the minimum robust positive invariant set (mRPI) of the estimation error is given by the solution of the Riccati algebraic equation.

    Second, the new zonotope-based cost function is used to evaluate the impact that a zonotopically bounded watermark signal has on the steady-state operation of the system. Analogous expressions to the performance loss induced by an exogenous Gaussian signal in an LQG system are obtained.

    Third and finally, a zonotopically bounded watermark signal that minimizes the new cost function is proposed. This detection scheme injects a known signal in the system inputs,while filtering its effect through the estimations generated using the output data. Since the replay phase of the attack entails that the known signal is no longer observable, then the estimation error generates a new residual signal that is destabilized whenever the output data are being replayed back.Some preliminary results have been presented in the conference paper [35].

    The remainder of the paper is organized as follows: Section II introduces some preliminary concepts whereas Section III presents the problem statement. Then, in Section IV the optimal finite/infinite horizon control problem based on the estimates of a ZKF is analyzed. Section V analyzes the impact of a bounded watermark signal on the previous optimal control loop. Besides, in Section VI a new guaranteed replay attack detection scheme is introduced while in Section VII the proposed results are validated in simulation using a well-known control benchmark based on a four-tank system. Finally, in Section VIII the main conclusions are drawn.

    II. NOTATION, BASIC DEFINITIONS AND PROPERTIES

    A. Notation

    B. Basic Definitions and Properties

    A. System Description

    B. Zonotopic KF

    IV. LINEAR-QUADRATIC ZONOTOPIC CONTROL

    In this section, the optimal control problem for the case in which the feedback loop is closed using the estimates generated by a ZKF is analyzed. Note that, under this paradigm, at each time instantkthe real state of the system is known to be confined within a zonotope. In this regard, the following performance criterion is introduced in order to assess the system operation.

    Below, the finite and infinite horizon control problems under the performance metric in Definition 6 are analyzed.

    A. Finite Horizon Control

    which operates based on the center of the ZKF estimator.

    In order differentiate (15) from the stochastic LQG control,in the sequel the zonotopic version will be denoted as linearquadratic zonotopic (LQZ) control. For this case, from (13)and (14) it follows that the optimal value of the cost function is:

    B. Infinite Horizon Control

    Since many control systems operate for long periods of time, the remainder of the paper will focus on a system whose control law is obtained by solving the infinite horizon problem formulated as

    V. REPLAY ATTACK DETECTABILITY

    In this section, the case where a malicious attacker can access the communications layer and record/replay the data sent through the sensors-to-controller link is analyzed. In order to characterize the effect of the attack, the following time windows are defined:

    1) Record Window:Output data are assumed to be recorded forKREC={k∈N :k∈[k0,k0+l-1]}, wherel∈N denotes the size of the record window.

    A. Anomaly Detector

    B. Attack Detectability

    Fig. 1 shows the overall control/attack/watermarking scheme under consideration. Regarding the control scheme:the control loop is closed remotely by means of an optimal controller (Section IV) that operates based on the estimates of a ZKF (Section III-B). The estimates of the ZKF are used by a set-based anomaly detector (Section V-A). Additionally, Fig. 1 depicts an attacker that may be able to spoof the data sent through the sensors-to-controller link as well as to inject an exogenous signaluˉkinto the system inputs. On the other hand,the blue dashed box shows the interaction of an additive watermark signal (Section VI) with the control loop.

    Fig. 1. Overall scheme – Replay attack (red); Watermark generator (blue).

    C. Performance Loss Induced By A Zonotopically-Bounded Watermark Signal

    VI. ZONOTOPICALLY BOUNDED WATERMARK SIGNAL DESIGN

    A. Design of an Extended State Estimator

    B. Watermarked System Stability

    C. Attack Detection

    VII. NUMERICAL EXAMPLE

    The quadruple-tank system [47] is a well-known benchmark used to evaluate control and supervision strategies, and it is also employed to evaluate cyber-attack detection techniques in [5], [7]. The nonlinear dynamics of the system are described as follows:

    TABLE I QUADRUPLE TANK PROCESS PARAMETERS

    At this point, it must be highlighted that the eigenvalues of matrixA-G*C-BL*are {-0.1739,0.4005,0.9513±0.0278i},that is, it is asymptotically stable, and thus there is no guarantee that the replay attack can be detected (cf. (28)). In other words, in the remainder of this section, Assumption 3 concerning the attack undetectability prevails thus motivating the injection of a watermark signal in the control loop.

    A. Performance Assessment

    B. Watermark Signal Design

    In order to design a watermark signal like the one presented in Section VI, the tuning matrixMmust be defined. In this regard, the following matrixMis introduced:

    TABLE II ZONOTOPIC RPI APPROXIMATIONS OF THE MRPI SET

    C. Attack Simulation

    Fig. 2. Temporal evolution of the watermark signal.

    On the other hand, Fig. 3 shows the effect caused on the system outputs by the injection of the watermark signal. It can be seen how the performance of the system is hardly degraded before the replay phase and how after the start of this phase the effect of the increasing watermark signal becomes more evident. It should be highlighted that since the control loop is affected by the data replay, the stability of the plant after the attack detection, atk=737, is due solely to the fact that the open-loop system is stable.

    Fig. 3. Temporal evolution of the system outputs.

    The mean times (tm) required in the simulations to monitor the operation of the system online are1Laptop (Intel i7 1.8 GHz, 16 GB RAM) running Windows 10; optimization using Cplex 12.8 [48].

    Fig. 4. Performance loss vs mean detection time.

    VIII. CONCLUSIONS

    This paper has investigated the use of zonotopes for the design of watermark signals. The proposed approach has exploited the recent analogy found between stochastic and deterministic fields in the context of optimal state estimation,and extended it to optimal control. By means of this analogy,the system performance can be assessed and its steady-state operation may be related with the size of the mPRI set of the estimation error. Furthermore, similar expressions regarding the impact of a Gaussian watermark signal on the performance of an LQG system and the impact of a zonotopically bounded signal on the weightedF-norm of the states have been obtained. These analogous optimal patterns, motivate further studies in the attack detection for systems which are simultaneously subject to bounded disturbances and Gaussian noise, thus merging the usually mutually exclusive benefits granted by set-based techniques and stochastic techniques.Moreover, some unresolved issues, like the effect of the reduction operator in the convergence of the Riccati difference equations, appear as appealing problems that clearly deserve an in-depth study. Other future research directions include: the extension of the zonotopic framework to more complex attack policies like, for example, stealthy attacks; the consideration of input and state constraints; the adaptation of the watermarking method to distributed monitoring architectures, thus addressing the scalability to large-scale systems;and the consideration of continuous time systems.

    APPENDIX B PROOF OF THEOREM 2

    APPENDIX C COMPUTING AN INITIAL ZONOTOPIC RPI SET

    中文字幕亚洲精品专区| 亚洲av在线观看美女高潮| 热99久久久久精品小说推荐| 制服丝袜香蕉在线| 欧美精品国产亚洲| av不卡在线播放| 伊人久久国产一区二区| 成年人免费黄色播放视频| 日韩av不卡免费在线播放| 成年女人毛片免费观看观看9 | 制服诱惑二区| 国产成人av激情在线播放| 午夜激情av网站| 亚洲第一av免费看| 欧美日韩一区二区视频在线观看视频在线| 国产一区亚洲一区在线观看| 曰老女人黄片| 男女无遮挡免费网站观看| 免费观看在线日韩| 欧美日韩亚洲国产一区二区在线观看 | 久久亚洲国产成人精品v| 大话2 男鬼变身卡| 国产精品三级大全| 少妇 在线观看| 国产又爽黄色视频| 电影成人av| 精品午夜福利在线看| 人妻人人澡人人爽人人| 亚洲国产毛片av蜜桃av| 亚洲一码二码三码区别大吗| 多毛熟女@视频| 国产片特级美女逼逼视频| 国产野战对白在线观看| 国产成人精品久久久久久| 国产精品亚洲av一区麻豆 | 国产成人免费无遮挡视频| 久久人人爽av亚洲精品天堂| 一本—道久久a久久精品蜜桃钙片| 一级片'在线观看视频| 久久久国产一区二区| 91在线精品国自产拍蜜月| 一区二区三区乱码不卡18| 欧美日韩精品网址| 免费观看无遮挡的男女| 亚洲国产欧美网| 妹子高潮喷水视频| 国产一级毛片在线| 亚洲图色成人| 新久久久久国产一级毛片| videossex国产| 欧美人与性动交α欧美软件| 欧美精品亚洲一区二区| 人妻系列 视频| 精品人妻一区二区三区麻豆| av视频免费观看在线观看| 十八禁网站网址无遮挡| 最近中文字幕2019免费版| 男女边摸边吃奶| 久久精品国产自在天天线| 精品久久蜜臀av无| 国产精品女同一区二区软件| videossex国产| 性色av一级| 亚洲三级黄色毛片| 亚洲欧美成人精品一区二区| h视频一区二区三区| 久久久久久久国产电影| 在线观看一区二区三区激情| 人人妻人人爽人人添夜夜欢视频| 伦理电影大哥的女人| 久久久国产精品麻豆| 十八禁网站网址无遮挡| 亚洲中文av在线| 日韩av不卡免费在线播放| 精品一区二区三区四区五区乱码 | 日韩制服丝袜自拍偷拍| av视频免费观看在线观看| 国产精品一区二区在线观看99| 精品人妻偷拍中文字幕| 99热国产这里只有精品6| 激情五月婷婷亚洲| 日韩免费高清中文字幕av| 丝袜在线中文字幕| 秋霞伦理黄片| 欧美亚洲 丝袜 人妻 在线| 国产日韩一区二区三区精品不卡| 天天躁夜夜躁狠狠躁躁| 黑丝袜美女国产一区| 七月丁香在线播放| a 毛片基地| 成人午夜精彩视频在线观看| 制服诱惑二区| 国产在视频线精品| kizo精华| 少妇人妻 视频| 精品卡一卡二卡四卡免费| 伊人久久国产一区二区| 午夜福利网站1000一区二区三区| www.熟女人妻精品国产| 中文字幕亚洲精品专区| 国产av码专区亚洲av| 少妇的丰满在线观看| 亚洲精品日本国产第一区| 午夜福利乱码中文字幕| av免费观看日本| 国产精品久久久久久av不卡| 精品视频人人做人人爽| 视频在线观看一区二区三区| 啦啦啦视频在线资源免费观看| 黑人巨大精品欧美一区二区蜜桃| 电影成人av| 9色porny在线观看| 高清在线视频一区二区三区| 亚洲av日韩在线播放| 多毛熟女@视频| 欧美日韩精品网址| 亚洲国产精品999| 免费观看a级毛片全部| 久久国产亚洲av麻豆专区| 99久久人妻综合| 在线天堂最新版资源| 国产成人精品婷婷| 国产精品久久久久久精品古装| 国产一区二区激情短视频 | 午夜福利一区二区在线看| 成人手机av| 亚洲色图综合在线观看| 国产精品麻豆人妻色哟哟久久| 最近最新中文字幕大全免费视频 | av又黄又爽大尺度在线免费看| 亚洲国产精品成人久久小说| 成年人免费黄色播放视频| 日韩一卡2卡3卡4卡2021年| 中文字幕精品免费在线观看视频| 亚洲第一青青草原| 亚洲综合色惰| 曰老女人黄片| 在线精品无人区一区二区三| 日韩三级伦理在线观看| 国产精品久久久久久精品古装| 亚洲经典国产精华液单| 黑人猛操日本美女一级片| 老汉色∧v一级毛片| 亚洲成色77777| 亚洲国产欧美在线一区| 欧美亚洲日本最大视频资源| 99国产综合亚洲精品| 一边亲一边摸免费视频| 欧美成人精品欧美一级黄| 黑丝袜美女国产一区| 有码 亚洲区| 一区二区三区激情视频| 天堂中文最新版在线下载| 男女边吃奶边做爰视频| 国产在线一区二区三区精| 最近最新中文字幕大全免费视频 | 亚洲欧洲日产国产| 精品99又大又爽又粗少妇毛片| 精品国产乱码久久久久久男人| 免费久久久久久久精品成人欧美视频| 三级国产精品片| 大香蕉久久网| 国产精品 欧美亚洲| 老汉色∧v一级毛片| 欧美日韩综合久久久久久| 国产亚洲欧美精品永久| 三上悠亚av全集在线观看| 熟女电影av网| 亚洲情色 制服丝袜| 乱人伦中国视频| 男的添女的下面高潮视频| 天美传媒精品一区二区| 久久国产精品男人的天堂亚洲| 亚洲精品久久久久久婷婷小说| 一二三四中文在线观看免费高清| 考比视频在线观看| 久久久久久伊人网av| 欧美精品亚洲一区二区| 国产精品av久久久久免费| 亚洲内射少妇av| 亚洲国产欧美日韩在线播放| 伊人亚洲综合成人网| 日本爱情动作片www.在线观看| 老女人水多毛片| 日韩一本色道免费dvd| 久久精品久久精品一区二区三区| 男女无遮挡免费网站观看| 亚洲熟女精品中文字幕| 黄色视频在线播放观看不卡| 老司机影院毛片| www.熟女人妻精品国产| 国产精品麻豆人妻色哟哟久久| 大香蕉久久成人网| 国产老妇伦熟女老妇高清| 久久精品国产亚洲av涩爱| 美女国产视频在线观看| 欧美亚洲日本最大视频资源| 国产精品 国内视频| 啦啦啦中文免费视频观看日本| 国产成人精品一,二区| 欧美亚洲 丝袜 人妻 在线| 久久午夜福利片| 精品人妻在线不人妻| 中文字幕人妻熟女乱码| 狂野欧美激情性bbbbbb| 欧美日韩一区二区视频在线观看视频在线| 黄片播放在线免费| 久久久国产欧美日韩av| 两性夫妻黄色片| 一本大道久久a久久精品| 午夜福利,免费看| 中国三级夫妇交换| 18禁动态无遮挡网站| 国产免费福利视频在线观看| av国产精品久久久久影院| 国产免费又黄又爽又色| 精品一区二区三区四区五区乱码 | 黑人欧美特级aaaaaa片| 精品一区二区三卡| 国产麻豆69| 亚洲精品成人av观看孕妇| 亚洲经典国产精华液单| 欧美日韩视频高清一区二区三区二| 国产亚洲精品第一综合不卡| 欧美日韩精品成人综合77777| 五月天丁香电影| 久久久久国产网址| 亚洲国产精品一区三区| 成年女人在线观看亚洲视频| 桃花免费在线播放| 久久久久久久大尺度免费视频| 在线看a的网站| 亚洲,一卡二卡三卡| 一区福利在线观看| 精品久久蜜臀av无| 极品少妇高潮喷水抽搐| 26uuu在线亚洲综合色| 九色亚洲精品在线播放| 久久人妻熟女aⅴ| 亚洲 欧美一区二区三区| 国产成人精品一,二区| 五月伊人婷婷丁香| 欧美成人午夜精品| 天天操日日干夜夜撸| 啦啦啦中文免费视频观看日本| 午夜福利乱码中文字幕| 十分钟在线观看高清视频www| 精品国产超薄肉色丝袜足j| 黄频高清免费视频| 欧美日韩国产mv在线观看视频| 欧美老熟妇乱子伦牲交| 日韩av免费高清视频| www.自偷自拍.com| av免费观看日本| 九色亚洲精品在线播放| 成人毛片60女人毛片免费| 美女福利国产在线| 99国产精品免费福利视频| 久久久国产一区二区| 久久精品国产亚洲av天美| 最新的欧美精品一区二区| 婷婷色综合www| 九草在线视频观看| 久久久久久久精品精品| 国产精品不卡视频一区二区| 一级片'在线观看视频| 丝瓜视频免费看黄片| 久久99精品国语久久久| 国产国语露脸激情在线看| 国产老妇伦熟女老妇高清| 波野结衣二区三区在线| 午夜福利视频精品| 欧美激情极品国产一区二区三区| 两个人看的免费小视频| 成人午夜精彩视频在线观看| 日韩av免费高清视频| 亚洲少妇的诱惑av| 少妇人妻 视频| 激情视频va一区二区三区| 国产免费福利视频在线观看| 春色校园在线视频观看| 色网站视频免费| 色视频在线一区二区三区| 午夜福利一区二区在线看| 爱豆传媒免费全集在线观看| 欧美成人午夜免费资源| 日韩精品有码人妻一区| 在线亚洲精品国产二区图片欧美| 亚洲精品久久久久久婷婷小说| 又黄又粗又硬又大视频| 免费高清在线观看日韩| 91精品国产国语对白视频| kizo精华| 丰满乱子伦码专区| 成年女人在线观看亚洲视频| 大片电影免费在线观看免费| 天天躁狠狠躁夜夜躁狠狠躁| 中国三级夫妇交换| 丁香六月天网| 国产欧美日韩综合在线一区二区| 如何舔出高潮| 美女主播在线视频| 久热久热在线精品观看| 欧美日韩视频精品一区| 婷婷成人精品国产| 国产一区二区三区av在线| 亚洲精品第二区| 寂寞人妻少妇视频99o| 好男人视频免费观看在线| 久久精品国产亚洲av涩爱| 精品一区在线观看国产| 欧美变态另类bdsm刘玥| 欧美精品国产亚洲| 久久狼人影院| 中文精品一卡2卡3卡4更新| 亚洲av在线观看美女高潮| 亚洲色图 男人天堂 中文字幕| 秋霞在线观看毛片| 国产精品国产三级专区第一集| 久久久久网色| 亚洲国产精品一区二区三区在线| 欧美国产精品va在线观看不卡| 国产精品一区二区在线观看99| 最近中文字幕高清免费大全6| kizo精华| 美女xxoo啪啪120秒动态图| 日韩欧美一区视频在线观看| 免费久久久久久久精品成人欧美视频| 久久婷婷青草| 一级毛片电影观看| 亚洲精华国产精华液的使用体验| 在线观看国产h片| 午夜福利乱码中文字幕| 2018国产大陆天天弄谢| 午夜福利乱码中文字幕| 欧美国产精品一级二级三级| 午夜免费男女啪啪视频观看| 欧美精品av麻豆av| 国产毛片在线视频| xxxhd国产人妻xxx| 欧美人与善性xxx| 久久热在线av| 亚洲,欧美,日韩| 亚洲国产精品一区三区| 99re6热这里在线精品视频| 搡老乐熟女国产| 80岁老熟妇乱子伦牲交| 国产高清国产精品国产三级| 少妇被粗大的猛进出69影院| av一本久久久久| 久久精品aⅴ一区二区三区四区 | 丝袜喷水一区| 国产一区亚洲一区在线观看| 青春草视频在线免费观看| 亚洲综合色网址| 波多野结衣av一区二区av| 美女国产视频在线观看| 亚洲国产毛片av蜜桃av| 2018国产大陆天天弄谢| 另类亚洲欧美激情| 在线观看国产h片| 亚洲欧美成人精品一区二区| 青青草视频在线视频观看| 熟女av电影| 国产日韩一区二区三区精品不卡| 国产精品二区激情视频| av国产精品久久久久影院| 久久鲁丝午夜福利片| 黄色怎么调成土黄色| 91精品三级在线观看| 我的亚洲天堂| 在线天堂中文资源库| 国产av国产精品国产| 国产欧美亚洲国产| 9191精品国产免费久久| 美女脱内裤让男人舔精品视频| 性色avwww在线观看| 叶爱在线成人免费视频播放| 免费日韩欧美在线观看| 亚洲精品aⅴ在线观看| 成年人午夜在线观看视频| 国产免费福利视频在线观看| 国产精品99久久99久久久不卡 | 伦理电影免费视频| 国产精品二区激情视频| 黄色毛片三级朝国网站| 人体艺术视频欧美日本| 亚洲av免费高清在线观看| 制服丝袜香蕉在线| 一级a爱视频在线免费观看| 久久久亚洲精品成人影院| 狂野欧美激情性bbbbbb| 91国产中文字幕| 麻豆精品久久久久久蜜桃| 青草久久国产| 国产精品蜜桃在线观看| 少妇人妻 视频| 女人高潮潮喷娇喘18禁视频| 久久久久国产一级毛片高清牌| 美女中出高潮动态图| 免费久久久久久久精品成人欧美视频| 日韩在线高清观看一区二区三区| 在线观看美女被高潮喷水网站| 日韩,欧美,国产一区二区三区| 亚洲精品久久午夜乱码| 国产精品.久久久| 男男h啪啪无遮挡| 国产av精品麻豆| 亚洲欧美清纯卡通| 精品人妻偷拍中文字幕| 免费看av在线观看网站| 久久久精品国产亚洲av高清涩受| 国产一区有黄有色的免费视频| 一本色道久久久久久精品综合| 精品一区二区三卡| 国产精品一区二区在线不卡| 黄色配什么色好看| 日韩欧美精品免费久久| 大话2 男鬼变身卡| 麻豆乱淫一区二区| 69精品国产乱码久久久| 国产亚洲精品第一综合不卡| 有码 亚洲区| a级片在线免费高清观看视频| 国产成人av激情在线播放| 岛国毛片在线播放| 一级毛片我不卡| 亚洲欧美一区二区三区黑人 | 欧美日韩精品成人综合77777| www.自偷自拍.com| 大码成人一级视频| 国产又色又爽无遮挡免| 免费观看性生交大片5| 国产成人精品在线电影| 欧美人与性动交α欧美软件| 亚洲精品自拍成人| 亚洲国产成人一精品久久久| 七月丁香在线播放| 国产av一区二区精品久久| 久久综合国产亚洲精品| 国产成人精品在线电影| 成年人午夜在线观看视频| 18在线观看网站| 欧美成人精品欧美一级黄| 国产麻豆69| 国产免费又黄又爽又色| 国产一区二区 视频在线| 欧美激情极品国产一区二区三区| 一本久久精品| 精品人妻偷拍中文字幕| 如何舔出高潮| 各种免费的搞黄视频| 午夜福利一区二区在线看| 我的亚洲天堂| 叶爱在线成人免费视频播放| 亚洲欧美精品综合一区二区三区 | 久久精品夜色国产| 日本色播在线视频| 午夜福利视频在线观看免费| 欧美少妇被猛烈插入视频| 久久精品国产亚洲av涩爱| 王馨瑶露胸无遮挡在线观看| 欧美精品人与动牲交sv欧美| 国产成人欧美| 成人国产av品久久久| av有码第一页| 老司机亚洲免费影院| 亚洲激情五月婷婷啪啪| 国产欧美日韩一区二区三区在线| 久久久久久免费高清国产稀缺| 久久99蜜桃精品久久| 亚洲国产成人一精品久久久| 日韩中文字幕视频在线看片| 蜜桃在线观看..| 国产成人免费无遮挡视频| 日本-黄色视频高清免费观看| 777久久人妻少妇嫩草av网站| 国产精品成人在线| 国产在线一区二区三区精| 一边亲一边摸免费视频| 捣出白浆h1v1| 免费在线观看视频国产中文字幕亚洲 | 观看美女的网站| 国产白丝娇喘喷水9色精品| 色婷婷久久久亚洲欧美| 制服诱惑二区| 少妇精品久久久久久久| 成人漫画全彩无遮挡| 久久久久久久久久久免费av| 人妻少妇偷人精品九色| 五月伊人婷婷丁香| 国产xxxxx性猛交| 久久人人爽av亚洲精品天堂| 国产av码专区亚洲av| 亚洲欧美日韩另类电影网站| 亚洲av成人精品一二三区| 国产xxxxx性猛交| 青青草视频在线视频观看| 欧美日韩综合久久久久久| 最近2019中文字幕mv第一页| 人人妻人人澡人人看| 日韩电影二区| 久久青草综合色| 成年美女黄网站色视频大全免费| 青春草国产在线视频| 久久这里只有精品19| 亚洲国产看品久久| 一区二区三区四区激情视频| 国产福利在线免费观看视频| 婷婷色av中文字幕| 国产精品人妻久久久影院| 午夜福利,免费看| 一级毛片我不卡| 1024视频免费在线观看| av线在线观看网站| √禁漫天堂资源中文www| 在线天堂中文资源库| 在现免费观看毛片| av免费观看日本| 国产日韩欧美在线精品| 亚洲精品久久午夜乱码| 高清黄色对白视频在线免费看| 蜜桃国产av成人99| 中文精品一卡2卡3卡4更新| 亚洲精品美女久久久久99蜜臀 | 在线观看免费高清a一片| 成人毛片60女人毛片免费| 黄色 视频免费看| 在线观看三级黄色| 看免费成人av毛片| 美女国产高潮福利片在线看| 99热国产这里只有精品6| 在线观看免费视频网站a站| 国精品久久久久久国模美| 亚洲精品aⅴ在线观看| 久久久久久人人人人人| 啦啦啦在线观看免费高清www| 捣出白浆h1v1| 国产精品久久久久久精品电影小说| 少妇被粗大猛烈的视频| 久热这里只有精品99| 精品少妇内射三级| 一级,二级,三级黄色视频| 久久精品国产亚洲av天美| 一级毛片电影观看| 国产av精品麻豆| 国产精品一二三区在线看| 一本—道久久a久久精品蜜桃钙片| 人人妻人人爽人人添夜夜欢视频| av不卡在线播放| 国产熟女午夜一区二区三区| 国产色婷婷99| 高清不卡的av网站| 男女边摸边吃奶| 高清在线视频一区二区三区| 黑人欧美特级aaaaaa片| 久久精品国产亚洲av高清一级| 国产一级毛片在线| 国产精品免费大片| 久久精品人人爽人人爽视色| 少妇熟女欧美另类| 99久久中文字幕三级久久日本| 深夜精品福利| 中文乱码字字幕精品一区二区三区| 99热国产这里只有精品6| 国产av一区二区精品久久| 午夜91福利影院| 亚洲精品,欧美精品| 在线观看一区二区三区激情| 啦啦啦在线免费观看视频4| 天天躁夜夜躁狠狠久久av| 国产乱人偷精品视频| 亚洲国产精品一区三区| 大话2 男鬼变身卡| 久久人人97超碰香蕉20202| 国产精品欧美亚洲77777| 亚洲人成77777在线视频| 国产精品国产三级国产专区5o| 成人国产av品久久久| 亚洲一区二区三区欧美精品| videos熟女内射| 久久久久久久精品精品| 母亲3免费完整高清在线观看 | 男人操女人黄网站| 午夜免费观看性视频| 咕卡用的链子| 街头女战士在线观看网站| 亚洲国产看品久久| 丝袜美足系列| 在线观看免费日韩欧美大片| 精品一区二区三卡| 精品卡一卡二卡四卡免费| 久久精品亚洲av国产电影网| 亚洲欧美色中文字幕在线| 一二三四中文在线观看免费高清| 国产黄色免费在线视频| 国产成人精品一,二区| 在线观看免费高清a一片| 久久99精品国语久久久| 青春草视频在线免费观看| 国产免费一区二区三区四区乱码| 欧美精品一区二区免费开放| 日韩电影二区| 欧美日韩国产mv在线观看视频| 制服诱惑二区| 80岁老熟妇乱子伦牲交| 我要看黄色一级片免费的| 又大又黄又爽视频免费| 免费在线观看完整版高清| av不卡在线播放| 亚洲美女视频黄频| 免费在线观看完整版高清| 久久久久精品性色| 99久久中文字幕三级久久日本| 黄色配什么色好看|