• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    一種網(wǎng)絡(luò)攻擊下網(wǎng)聯(lián)自動(dòng)車的改進(jìn)換道模型

    2023-01-08 03:03:52吳新開張少偉賀曉征王斯奮
    關(guān)鍵詞:實(shí)驗(yàn)模型

    吳新開,何 山,張少偉,賀曉征,王斯奮

    (1.北京航空航天大學(xué)交通科學(xué)與工程學(xué)院 北京 100191;2.Department of Civil and Environmental Engineering,Rensselaer Polytechnic Institute,Troy,NY 12180,United States)

    Connected automated vehicles(CAVs),which integrate vehicle-to-vehicle(V2V)communication and autonomous vehicles(AV)technologies,are expected to greatly improve traffic safety and efficiency[1-2].Through wireless communication,CAVs can share and exchange information such as velocity,position,acceleration,and road conditions[3].However,due to open wireless communication,CAVs are vulnerable to various kinds of attacks,such asman-in-the-middle attack,impersonation attack,forging attack,replay attack,andSybil attack[4-5].These cyberattacks have shown severe risks to CAV traffic.To prevent these risks,a fundamental task is to research the impacts of cyberattacks on CAVs'driving behaviors[6-7].

    Lopezet al.[8]developed attack models as functions of tampered traffic control settings(e.g.,green time raios,cycle length,retaining ratios)with outputs equivalent to mobility impacts on the traffic network.Fenget al.[9]investigated the vulnerability of traffic control systems in a connected environment and summarized four attack surfaces,including signal controllers,vehicle detectors,roadside units,and onboard units.Khanet al.[10]developed a conceptual system dynamics(SD)model to analyze cybersecurity in the complex,uncertain deployment of CAVs.The SD model consists of six critical avenues and maps their respective parameters that either trigger or mitigate cyber-attacks in the operation of CAVs using a systematic theoretical approach.Maglaraset al.[11]present main threats to critical infrastructures along with protective measures that one nation can take,and which are classified according to legal,technical,organizational,capacity building,and cooperation aspects.Donget al.[12]designed an evaluation framework for cyberattacks on CAVs,and analyzed the impact of cyberattacks on vehicles and the transportation system.Liet al.[13]investigated the influence of slight cyber-attacks on the longitudinal safety of CAVs,and considered the communicated position and speed data from preceding CAVs under attacks.Huet al.[14]proposed a method to detect cyberattacks by cross-checking Signal Phase and Timing(SPaT)information and connected vehicle trajectories data.

    However,the existing work aims to investigate the impact of cyberattacks on CF behaviors.To the best of our knowledge,only a few previous studies have considered the impact of cyberattacks on LC behaviors.For instance,Khattaket al.[15]utilized an infrastructure-based communication platform consisting of cooperative adaptive cruise control and lane control to perform cyber risk assessments of CAVs.Kashyapet al.[16]found that the malicious vehicles may perform subtle speed and/or lane changes and modeled the mix of malicious and normal vehicles in the traffic system by using the Lighthill-Whitham-Richards(LWR)model.The authors aimed to use Gaussian Processes to detect the presence of such malicious vehicles in such a mixed traffic scenario.Zhaoet al.[17]used the default lanechanging algorithm in Simulation of Urban Mobility(SUMO)and presented the traffic behavior under cyberattacks.

    Although these studies present the influence of cyberattacks on LC behaviors using simulation experiments,they have not developed new lanechanging model with cyberattacks.In this research,we aim to construct an improved LC model associated with cyberattacks,through which we could better understand how the cyberattacks impact the LC maneuver and how to quantify this impact.The detailed description will be presented in the following sections.

    This study improves a classic LC model,i.e.,MOBIL(Minimizing Overall Braking Induced by Lane changes)model[18]to describe the lane-changing behavior.In the proposed ELC(Extended Lane Change)model,an improved IDM(Intelligent Driver Model),a most widely used CF model[19],is adopted to derive neighbor vehicles' accelerations based on their own and their nearest leaders’velocities and positions when the LC happens.Numerical simulations are conducted to verify the effectiveness of our proposed ELC models and illustrate the impact of cyberattacks including velocity,position and acceleration attacks on LC behaviors.

    The main contributions are described as below.(i)Cyberattacks on vehicles are formulized and integrated into the classical LC and CF models.(ii)The extended LC model and the improved IDM are used to describe the process of LC in two lanes.(iii)Various cyberattacks are classified into three types,i.e.,velocity,position and acceleration attacks,and numerical simulations illustrate the changes of malicious attacks on vehicles'LC movements.

    1 An extended lane-changing model for CAVs under cyberattacks

    1.1 Lane-changing model

    In general,a LC process consists of three phases,i.e.,before,during,and after the lane change[20].In the phases of before and after the lane change,vehicles follow the CF rules.A lso,before the lane change,the subject vehicle requires to consider neighbor vehicles'dynam ical parameters such as velocity,space gap,and acceleration.If the LC condition is satisfied,then the subject vehicle performs a lane change.This section presents how to derive an extended lane-changing(ELC)model w ith cyberattacks.

    To describe CAVs'LC behaviors under cyberattacks,we adopt the MOBIL model,which has many advantages[21-22]compared to other LC models.The most evident one is that MOBIL uses acceleration as amodel control variable,which allows perfect integration w ith other CF models to simulate both CF and LC behaviors at a m icroscopic level.A lso,MOBIL integrates the LC demand generation and the feasibility judgment,which can better describe CAVs'LC behaviors.

    In this study,the MOBIL LC model is implemented to model a two-lane highway traffic.A simple diagram of a lane change on two-lane traffic is first provided in Fig.1.As shown in the figure,the subject vehicle,indexed asm,plans to change to its neighbor lane.Before the LC,its nearest preceding and follow ing vehicles are indexed asm-1 andm+1,respectively.The neighbor vehicles on the LC target lane are indicated bynandn-1,respectively.When the LC condition is satisfied,the subject vehiclemw ill change its current lane to the neighbor target lane,as shown by the virtual vehicle in Fig.1.A fter the lane change,the subject vehiclemfollow s its new preceding vehiclen-1 based on the CF theory.M eanwhile,the new follower of the subject vehicle turns to be vehiclen.

    Fig.1 A typical lane-changing scene

    The MOBIL model has a comprehensive consideration of both LC safety and gain.Therefore,itneeds tomeet the follow ing two essentialconditions:

    (1)The safety criterion:This condition aims to ensure the safety after the LC,i.e.both the accelerations of the subject vehiclemand its new follower vehiclenneed to fit the follow ing conditions:

    (2)The incentive condition:This criterion is used to decide whether a lane change improves the local traffic status.The incentive criterion is formalized asbelow:

    whereamindicates the acceleration of vehiclemon the current lane,pdenotes the politeness factor,indicates the predicated acceleration of vehiclem+1 after the subject vehiclemchanges the lane,andΔathis the LC threshold.The politeness factorpcan be interpreted as the degree of altruism,which is a variable that determ ines the impact of nearby vehicles on the LC decision of the subject vehicle.It can vary fromp=0 for completely selfish lane-changers top>1 for altruistic drivers who do not change lane if LC would deteriorate the traffic situation considering these followers.Furthermore,p>0 represents considering the benefitsofother vehicles.

    1.2 Car-follow ing model

    There are two different car-follow ing models,linear and the other nonlinearmodel,to demonstrate the CAVs'follow ing behaviors.Car-follow ingmodels are used to formulate vehicle interactions and uncover CAV platoon dynam ics.Linear car-follow ing models include Pipes model,Helly's model,and Gazis-Herman-Rothery model.Nonlinear car-follow ing models include Newell's model,optimal velocity model,and intelligent driver model(IDM).The critical difference between these two types of carfollow ing models is that the nonlinearmodels capture a nonlinear relationship w ith deviation from the desired space gap and the relative velocity.

    Compared to the linear car-follow ing model,the nonlinear car-following is more suitable for describing the real traffic flow due to its nonlinearity and sophistication in capturing complex vehicle dynamics.This research adopts the IDM due to its advantages as follows.First,the IDM is a multi-regime model,which presents a greater realism than other nonlinear models when characterizing the congested traffic flow[2].Second,the IDM ensures collision-free vehicle movements,which would not cause unrealistic acceleration/deceleration shown in some linear car following models[23].The formulation of this model is expressed as follows[19]:

    whereamindicates the acceleration of vehiclem;v0indicates the desired velocity in free flow;s* indicates the desired safe gap;s0denotes the space gap in completely stopped traffic;sm=xm-1-xm-lis the space gap between the preceding vehiclem-1 and vehiclen;lis the length of vehicle;xmis the position of the vehiclem;vmis the velocity of vehiclem;and Δvm=vm-vm-1is the relative velocity between vehiclemand its preceding vehiclem-1.In addition,Tis the desired time gap between successive vehicles;andaandbindicate the vehicle's maximum acceleration and deceleration,respectively.Note if all vehicles travel uniformly,i.e.,each vehicle's acceleration is equal to zero,each vehicle keeps the same velocity and space gap between consecutive vehicles.

    In a normal CAV environment,each vehicle can receive dynamic information such as velocity,position,and acceleration from the surrounding vehicles.Vehicles' information will be accurately sent to the target vehicle on time.However,when an attack happens,the information transmission between vehicles could be interrupted,delayed,lost,or even falsified.Then,the vehicle's LC and CF behaviors can also be influenced.Note that this study only the V2V communication.

    1.3 Cyberattacks

    Muchresearchhasdemonstratedthat cyberattacks have an impact on the effective use of vehicles[24].If without any influence of cyberattacks,vehicle dynamics information,including speed,acceleration,headway,etc.,will be accurate and timely disseminated to other vehicles.The cyberattacks can be classified into three main categories:DoS attacks,replay attacks and false data injection attacks.When an attack such as spoofing,replay,and impersonation occurs,the information transmission among vehicles could be interrupted and/or falsified.A detailed description of these attacks is listed below[25-26].

    (1)Spoofing attack:An adversary can compromise a vehicle and send fake messages such as fake location,velocity,and acceleration.For instance,GPS is responsible for delivering the realtime location message to the surrounding vehicles.When the spoofing attack happens,the spoofed GPS can send a fake location to the subject vehicle by releasing a strong-power signal from the GPS satellite simulator.

    (2)Replay attack:An attacker captures the packets and replays them at a later time to disguise that they were sent by the true sender.Thus,the repeated message,which is sent after a while,could be accepted as a new message.Mathematically,the position,velocity,and position of vehicle may be unchanged during the attacking period.

    (3)Impersonation attacks:In vehicular networks,an attacker could impersonate a roadside infrastructure or vehicle to trick others by applying their authentication details.For example,an attacker might impersonate an emergency vehicle,which would give them a higher priority within the vehicular network and result in less congestion.The position,velocity,and position of vehicle can be altered.

    The above cyberattacks could affect vehicles'behaviors in their own manners.Essentially,all these attacks can release bogus messages which falsify the vehicle's dynamic information such as velocity,position,and acceleration.Hence,for simplicity,this research considers all these attacks asbogusattacks[25].

    1.4 Extended LC model with cyberattacks

    To describe CAVs' dynamic traffic behaviors under cyberattack,we present the following two representative attacking cases.In the first case,we assume that the velocity and/or the position of the preceding vehiclem-1 of the subject vehiclemis attacked,and vehiclem-1 sends falsified velocity and/or position messages to the subject vehiclem.Then the subject vehicle's acceleration will be influenced.In this case,the influenced acceleration in MOBIL needs to be updated by the following extended IDM model:

    whereβandγare the weight parameters to describe the impacts of cyberattacks on velocity and position of the subject vehicle’s nearest leader,respectively.Ifβ≠0 orγ≠0,Eq.(4)means that the velocity or the position of vehiclem-1 is attacked.Ifβ=γ=0,Eq.(4)is transformed to the classical IDM model.

    In the second case,we assume that the acceleration of the following vehiclenafter LC of the subject vehiclemis falsified.In this situation,the weighting parametersα,δare introduced to capture the change of acceleration influenced by attacks.An improved incentive criterion in the MOBIL model under cyberattacks can be formulated below:

    whereαandδare the weighting parameters to describe the impacts of cyberattacks on the new follower vehiclenafter LC and the old follower vehiclem+1 before LC.Here,αandδhave clear physical meanings.Ifα=δ=1,it indicates the CAV is moving without cyberattacks.Whileα≠1 and/orδ≠1,it denotes the CAV is influenced by cyberattacks.Specifically,ifα>1(δ>1),it represents that the subject vehicle receives overestimated acceleration messages of the following vehicle after(or before)LC;and ifα<1(δ<1),it represents that the subject vehicle receives an underestimated acceleration message from the following vehicle after(or before)LC.

    Overall,these falsified messages could cause the vehicle to make the wrong decision,leading to potential collisions.To fully capture these impacts,based on above Eqs.(1),(4)and(5),we can derive an ELC model,i.e.,an improved MOBIL model,as described in the following equation:

    Note that Eq.(6)essentially integrates the CF IDM model and the LC MOBIL model for the CAVs under attacks.The following section will verify the effectiveness of our proposed model.

    2 Numerical Simulation

    This section presents a series of simulations to verify the effectiveness of the proposed ELC model and illustrate the impact of cyberattacks on vehicles'LC behaviors.In this study,we use Python to show the change in vehicles' behaviors under cyberattacks.We select a two-lane highway whose length is long enough to conduct our simulation.The total simulation time is 30 s,and each sampling time is 0.01 s.For the convenience of investigation,we put forward the following assumptions(see Fig.2):(i)12 CAVs are grouped as two platoons and are traveling on a straight two-lane highway;(ii)Without LC,each vehicle updates its dynamical parameters based on the IDM model and adopts a simple predecessor-following communication protocol,i.e.,one vehicle only receives beacon messages from its directly preceding vehicle;and(iii)The subject vehicle(3rdvehicle)changes to the neighbor lane based on the proposed ELC Eq.(6).

    Fig.2 Numerical simulation scenarios

    To illustrate the impact of cyberattacks on the vehicle's lateral behaviors,we design five scenarios:without attacks,velocity attack,position attack,velocity and position attacks,and acceleration attack.

    In all scenarios,each vehicle's initial space headway in the platoon is 35m,and the initialvelocity is set as 14m·s-1.As shown in Fig.2,the velocity of the first vehicle(i.e.,vehicle 1)in the current lane(i.e.,lane A)remains unchanged at 14 m·s-1,and the first vehicle(i.e.,vehicle 2)in the target lane(i.e.,lane B)is 18m·s-1.Other vehicles in the platoon obey the IDM to follow their preceding vehicles.The initial values of all parameters for simulation are presented in Tab.1.

    Tab.1 Simu lation parameters

    (1)W ithout cyberattacks

    As a reference,F(xiàn)ig.3 shows the changes in the dynamic parameters of the platoon w ithout cyberattacks.When the LC model does notmeet the safety constraint and the incentive condition,there isno LC.

    Fig.3 Plots of position,velocity,acceleration,and space headway without attacks

    Before the LC,each vehicle is traveling uniform ly in the current lane.We can see that the 3rdvehicle changes its lane at 6.23 s according to the classical MOBIL model.At this time,the 3rdvehicle's velocity is 14.44 m·s-1,and the 4thvehicle's velocity is 17.63 m·s-1.As shown in this figure,after the LC,the follow ing vehicles of the 3rdvehicle in lane A(e.g.,5thand 7thvehicles)accelerates to shrink the space headway.Meanwhile,the following vehicles of the 3rdvehicle in lane B(e.g.,4thand 6thvehicles)have to decelerate to keep the safe space headway.

    (2)Velocity attacks

    Fig.4 and Fig.5 show the dynamic parameters of the platoon when the 1stvehicle's velocity is underestimated(β=0.9)and overestimated(β=1.1),respectively.It can be seen that the 3rdvehicle plans to change its lane at 4.87 s and 7.80 s,respectively.According to the extended IDM model Eq.(4),when the 1stvehicle's velocity is underestimated,the 3rdvehicle is forced to slow down to achieve safe space headway.Based on Eq.(2),the incentive value in the MOBIL model turns large.Hence,the subject vehicle(i.e.,3rdvehicle)will change to the neighbor lane in advance.Compared with Fig.3,under underestimated velocity attack,the LC time is advanced by 1.36 s.

    Fig.4 Plots of position,velocity,acceleration,and space headway under underestimated velocity attacks when β=0.9

    Fig.5 shows the impact of an overdamped velocity attack on the LC of the subject vehicle.If the released messages of the 1stvehicle's velocity are falsified and amplified,the subject vehicle(i.e.,3rdvehicle)who receives the falsified messages has to accelerate to keep the same velocity as the first vehicle.Based on Eq.(2),the incentive value in the MOBIL model turns small.In this case,the LC time is delayed by 1.57 s.It should be noted that the real velocity of the first vehicle does not change.It is not difficult to imagine that this attack could lead to a potential collision.

    Fig.5 Plots of position,velocity,acceleration,and space headway under overestimated velocity attacks when β=1.1

    (3)Position attacks

    Fig.6 and Fig.7 show changes in the dynamic parameters of the platoon when the space headway between the 1stvehicle and the 3rdvehicle is underestimated and overestimated,respectively.It can be seen that the 3rdvehicle chooses to change lanes at 5.76 s and 6.67 s,respectively.Intuitively,when the space headway is underestimated,the 3rdvehicle has to decrease its velocity to keep a safe space headway.The smaller acceleration of the subject vehicle leads to a larger incentive value based on Eq.(2).Hence,based on the MOBIL model,the subject vehicle should change its lane in advance.As shown in Fig.6,the LC time is advanced by 0.47 s.By contrast,when the space headway is overestimated,the 3rdvehicle accelerates to shorten the space headway.Based on Eq.(2),the larger acceleration of the subject vehicle leads to a smaller incentive value.Hence,based on the MOBIL model,the LC time of the subject vehicle should be postponed.As shown in Fig.7,the lane-changing time is delayed by 0.44 s.

    Fig.6 Plots of position,velocity,acceleration,and space headway under underestimated position attacks when γ=0.9

    Fig.7 Plots of position,velocity,acceleration,and space headway under overestimated position attacks when γ=1.1

    (4)Velocity and position attacks

    In this case,we discuss the effects of modification of both velocity and position on LC behaviors.Fig.8 and Fig.9 show that changes in position,velocity,acceleration,and space headway of the vehicle platoon under velocity and position attacks.The 3rdvehicle changes lanes at 4.42 s and 8.20 s,respectively.It can be seen that when the velocity and headway are both underestimated by 10%,i.e.,β=γ=0.9,the LC time will be greatly advanced by 1.81 s.Underestimated velocity and space headway lead to an increase in the incentive value of lane-changing.Thus the 3rdvehicle changes its lane quickly.When the velocity and headway are both overestimated by 10%,i.e.,β=γ=1.1,the 3rdvehicle first increases its velocity to follow the 1stvehicle and reduce the space headway,resulting in a decrease in the incentive value of LC based on Eq.(2).Hence,the LC time is put off.In this case,the LC time is delayed by 1.97 s.Compared with the velocity or position attacks,the influence of both velocity and position is much severer.

    Fig.8 Plots of position,velocity,acceleration,and space headway under underestimated velocity and position when β=γ=0.9

    Fig.9 Plots of position,velocity,acceleration,and space headway under overestimated velocity and position when β=γ=1.1

    (5)Acceleration attack

    To be consistent with the proposed ELC model,we assume that the accelerations of the new follower after LC(the 6thvehicle)and the old follower before LC(the 5thvehicle)are falsified.In detail,F(xiàn)ig.10 and Fig.11 show the changes in the dynamics parameters of the platoon when the acceleration is underestimated(i.e.,α=δ=0.5)and overestimated(i.e.,α=δ=1.5),respectively.These figures show that the 3rdvehicle changes its lane at 6.21 s and 6.25 s,respectively.In fact,the new or old followers cannot influence the subject vehicle's longitudinal behaviors but the lateral LC behaviors based on the MOBIL model.Compared with no attack scenarios scenario,whether underestimated or overestimated acceleration attacks could result in a slight change in LC time.The reason is that the politeness factor(p=0.1)in Eq.(6)weakens the influence of the accelerations of the new and old followers.Hence,acceleration attacks only lead to slight time changes.

    Fig.10 Plots of position,velocity,acceleration,and space headway under underestimated acceleration attacks when α=δ=0.5

    Fig.11 Plots of position,velocity,acceleration,and space headway under overestimated acceleration attacks when α=δ=1.5

    The above five simulation experiments show that falsification of acceleration,velocity,and position will cause abnormal LC behavior,such as LC time in advance or delay and vehicles' oscillation amplitudes.These results demonstrated that cyberattacks could influence traffic efficiency and cause potential rear-end collisions.

    3 Conclusions

    With the advent of intelligent and connected technology,the impacts of cyberattacks on vehicles have drawn many scholars' attention.This research focuses on modeling LC behaviors under cyberattacks.To this end,based on the MOBIL and IDM models,this study proposes an extended LC(ELC)model with cyberattacks to describe the LC decision-making behavior.Through the numerical simulation,we found that cyberattacks could imperil the LC maneuvers and different attacks are able to result in different consequences such as LC time in advance or delay,and even potential rear-end collisions.

    By studying the lane-changing behavior of connected vehicles under cyberattacks,the impact of cyberattacks on vehicle lane-changing behaviors is revealed.Attackers can attack with different parameters on vehicles according to different attack purposes and real-time traffic conditions to accomplish specific attack goals,such as causing collisions and increasing traffic congestion.

    The research in this paper allows us to have a deeper understanding of the impact mechanism of cyberattacks,so that we can actively defend against attacks.By analyzing the manifestations and results of cyberattacks,the detection and defense of cyberattacks can be completed in time,so as to avoid personal and property hazards.

    In actual vehicle applications,relevant algorithms can be installed to detect the dynamic information of the own vehicle and other vehicles,so as to quickly and timely find abnormal dynamic updates and communication information.At the same time,the detection method can also be used in combination with other cyberattacks detection methods to improve the detection rate of cyberattacks,and provide response strategies in time.

    Vehicles have multiple strategies to defend against cyberattacks.In addition to cryptographic methods,communication information can also be verified by methods such as multi-sensor data fusion.At this time,the attacker needs more sophisticated attack strategies,such as performing compound attacks and attacking acceleration,speed,and position information at the same time,which also puts forward higher requirements for vehicle information security protection.

    There are several directions for future study.First,it is expected that this research could help counter the detrimental effects caused by cyberattacks.By understanding the impacts on traffic dynamics caused by different cyberattacks,some possible traffic control,and management strategies could be developed and applied to resolve these impacts.Second,in this study,for the convenience of analysis,we just adopt two lane framework in our simulation studies,the framework will be extended to a multi-lane with thousands of vehicles.Third,it will be interesting to explore to assess the impact on more parameters like traffic flow,safety etc.At last,security work against malicious attacks such as detection of cyberattacks,privacy-preserving scheme between V2X and human driver intervention,etc.will be investigated in nearly future.

    作者貢獻(xiàn)聲明:

    吳新開:構(gòu)建框架,起草論文;

    何山:調(diào)研文獻(xiàn),提出模型;

    張少偉:調(diào)試參數(shù),設(shè)計(jì)實(shí)驗(yàn);

    賀曉征:實(shí)驗(yàn)仿真,驗(yàn)證模型;

    王斯奮:評(píng)閱論文,提供指導(dǎo)。

    猜你喜歡
    實(shí)驗(yàn)模型
    一半模型
    記一次有趣的實(shí)驗(yàn)
    微型實(shí)驗(yàn)里看“燃燒”
    重要模型『一線三等角』
    重尾非線性自回歸模型自加權(quán)M-估計(jì)的漸近分布
    做個(gè)怪怪長(zhǎng)實(shí)驗(yàn)
    3D打印中的模型分割與打包
    NO與NO2相互轉(zhuǎn)化實(shí)驗(yàn)的改進(jìn)
    實(shí)踐十號(hào)上的19項(xiàng)實(shí)驗(yàn)
    太空探索(2016年5期)2016-07-12 15:17:55
    FLUKA幾何模型到CAD幾何模型轉(zhuǎn)換方法初步研究
    又粗又硬又长又爽又黄的视频| 亚洲成人手机| 丰满饥渴人妻一区二区三| 亚洲国产欧美一区二区综合| 少妇的丰满在线观看| 脱女人内裤的视频| 欧美亚洲日本最大视频资源| 91精品三级在线观看| 久久精品人人爽人人爽视色| 久久这里只有精品19| 国产高清videossex| av不卡在线播放| 丝瓜视频免费看黄片| kizo精华| 国产精品偷伦视频观看了| 高清av免费在线| 美国免费a级毛片| 91字幕亚洲| 亚洲精品美女久久久久99蜜臀 | 啦啦啦啦在线视频资源| 亚洲成人国产一区在线观看 | 国产一级毛片在线| 亚洲久久久国产精品| 色精品久久人妻99蜜桃| 国产人伦9x9x在线观看| 国产亚洲一区二区精品| 十八禁网站网址无遮挡| 麻豆av在线久日| 大片电影免费在线观看免费| 亚洲专区国产一区二区| 亚洲国产精品999| 久久久久久久久久久久大奶| 精品一区在线观看国产| 黄网站色视频无遮挡免费观看| 80岁老熟妇乱子伦牲交| 一区二区三区精品91| 欧美精品av麻豆av| 五月天丁香电影| 日本91视频免费播放| 久久女婷五月综合色啪小说| 首页视频小说图片口味搜索 | 久久免费观看电影| 国产日韩一区二区三区精品不卡| 亚洲中文字幕日韩| 午夜福利,免费看| 久久久亚洲精品成人影院| 日韩av免费高清视频| 91九色精品人成在线观看| 久久精品国产a三级三级三级| 岛国毛片在线播放| 午夜老司机福利片| 一本综合久久免费| 久久狼人影院| 欧美亚洲 丝袜 人妻 在线| 日韩av免费高清视频| 久久精品亚洲熟妇少妇任你| 午夜免费观看性视频| 久久精品国产亚洲av高清一级| 99久久精品国产亚洲精品| 丝袜美足系列| 人人妻,人人澡人人爽秒播 | 久久精品久久精品一区二区三区| 另类精品久久| 亚洲成色77777| 人人妻人人澡人人看| 免费一级毛片在线播放高清视频 | 天天躁日日躁夜夜躁夜夜| 亚洲精品一区蜜桃| 你懂的网址亚洲精品在线观看| 亚洲免费av在线视频| 亚洲欧美一区二区三区久久| 精品亚洲成国产av| 久久国产精品大桥未久av| 免费在线观看黄色视频的| 久久精品久久精品一区二区三区| 女人高潮潮喷娇喘18禁视频| 男女免费视频国产| 午夜激情久久久久久久| 天堂俺去俺来也www色官网| 亚洲第一青青草原| 又大又黄又爽视频免费| 咕卡用的链子| 亚洲国产看品久久| 青草久久国产| 91精品国产国语对白视频| 国产爽快片一区二区三区| 中文字幕人妻丝袜一区二区| av福利片在线| 欧美人与性动交α欧美软件| 国产av一区二区精品久久| 美女大奶头黄色视频| 一级毛片电影观看| 婷婷成人精品国产| 成人免费观看视频高清| 爱豆传媒免费全集在线观看| 国产精品免费视频内射| 19禁男女啪啪无遮挡网站| 18禁黄网站禁片午夜丰满| 中文字幕高清在线视频| 巨乳人妻的诱惑在线观看| 亚洲av日韩在线播放| 熟女少妇亚洲综合色aaa.| 97人妻天天添夜夜摸| 久久毛片免费看一区二区三区| 婷婷色麻豆天堂久久| 欧美日韩视频高清一区二区三区二| 国产精品久久久久久精品古装| 老汉色av国产亚洲站长工具| 欧美黄色淫秽网站| 一级黄色大片毛片| 黄色视频不卡| 最新在线观看一区二区三区 | av有码第一页| 日本av免费视频播放| 日本一区二区免费在线视频| 啦啦啦在线观看免费高清www| 亚洲欧美清纯卡通| 久久毛片免费看一区二区三区| 青草久久国产| 亚洲精品国产av成人精品| 涩涩av久久男人的天堂| 亚洲av日韩在线播放| 男女国产视频网站| 成年av动漫网址| 国产熟女欧美一区二区| 丰满人妻熟妇乱又伦精品不卡| 久久人人爽人人片av| 精品少妇黑人巨大在线播放| 午夜老司机福利片| 国产精品一区二区精品视频观看| 老汉色av国产亚洲站长工具| 一本—道久久a久久精品蜜桃钙片| 欧美精品啪啪一区二区三区 | 亚洲欧美一区二区三区久久| 午夜福利一区二区在线看| 亚洲精品久久久久久婷婷小说| 青青草视频在线视频观看| 每晚都被弄得嗷嗷叫到高潮| 天堂中文最新版在线下载| 男女高潮啪啪啪动态图| 男人舔女人的私密视频| 伊人亚洲综合成人网| 青春草亚洲视频在线观看| 欧美 日韩 精品 国产| 亚洲人成77777在线视频| 少妇的丰满在线观看| 黄色视频在线播放观看不卡| av有码第一页| 国产精品 欧美亚洲| 国产亚洲一区二区精品| 免费观看av网站的网址| 91老司机精品| 午夜影院在线不卡| 国产熟女午夜一区二区三区| 一本大道久久a久久精品| 亚洲精品久久成人aⅴ小说| 久久九九热精品免费| 精品卡一卡二卡四卡免费| 亚洲伊人色综图| 性色av乱码一区二区三区2| 欧美国产精品一级二级三级| av线在线观看网站| 免费高清在线观看视频在线观看| 久久精品国产综合久久久| 久久精品熟女亚洲av麻豆精品| 嫁个100分男人电影在线观看 | 亚洲欧美一区二区三区黑人| 国产亚洲午夜精品一区二区久久| 成人国产一区最新在线观看 | 啦啦啦啦在线视频资源| 亚洲七黄色美女视频| 久久影院123| 亚洲av综合色区一区| 国产av精品麻豆| 国产精品 欧美亚洲| 欧美成人精品欧美一级黄| 久久中文字幕一级| 我的亚洲天堂| 欧美97在线视频| 青草久久国产| 亚洲国产精品成人久久小说| 美女高潮到喷水免费观看| 少妇的丰满在线观看| 麻豆乱淫一区二区| 一级毛片黄色毛片免费观看视频| 黄片播放在线免费| 久久狼人影院| 日本vs欧美在线观看视频| 97精品久久久久久久久久精品| 成年人免费黄色播放视频| 精品久久蜜臀av无| 国产爽快片一区二区三区| 99国产精品一区二区蜜桃av | 大陆偷拍与自拍| 国产精品三级大全| 精品人妻1区二区| 一级片免费观看大全| 亚洲欧美日韩高清在线视频 | 久久国产精品影院| 99国产综合亚洲精品| 丰满人妻熟妇乱又伦精品不卡| 国产爽快片一区二区三区| cao死你这个sao货| 亚洲国产欧美网| 一区二区日韩欧美中文字幕| 操出白浆在线播放| 手机成人av网站| 大香蕉久久网| 黑人欧美特级aaaaaa片| 精品国产一区二区三区四区第35| 老司机午夜十八禁免费视频| 久久久久久免费高清国产稀缺| 欧美日韩亚洲综合一区二区三区_| 欧美少妇被猛烈插入视频| 亚洲 国产 在线| 亚洲国产欧美一区二区综合| 亚洲自偷自拍图片 自拍| 中文字幕人妻丝袜一区二区| 免费av中文字幕在线| 亚洲av成人不卡在线观看播放网 | 欧美大码av| 女人高潮潮喷娇喘18禁视频| 欧美日韩一级在线毛片| 建设人人有责人人尽责人人享有的| 国产男女超爽视频在线观看| 高潮久久久久久久久久久不卡| 天天躁狠狠躁夜夜躁狠狠躁| 日韩伦理黄色片| 欧美精品亚洲一区二区| 精品国产乱码久久久久久男人| 9色porny在线观看| 精品一品国产午夜福利视频| 成人国产av品久久久| 精品少妇久久久久久888优播| 日韩视频在线欧美| 亚洲国产av新网站| 婷婷成人精品国产| 久久精品成人免费网站| 亚洲精品日本国产第一区| 看免费成人av毛片| 久久国产精品人妻蜜桃| 男女午夜视频在线观看| 欧美日韩福利视频一区二区| 国产精品一二三区在线看| 久久人妻福利社区极品人妻图片 | 最近中文字幕2019免费版| 亚洲av电影在线观看一区二区三区| 波多野结衣av一区二区av| 亚洲天堂av无毛| 曰老女人黄片| 一级毛片黄色毛片免费观看视频| 精品少妇内射三级| 欧美激情极品国产一区二区三区| 丰满迷人的少妇在线观看| 国产日韩欧美在线精品| e午夜精品久久久久久久| 久久久精品区二区三区| 亚洲精品日韩在线中文字幕| 美女国产高潮福利片在线看| 五月开心婷婷网| 欧美另类一区| 在线观看免费视频网站a站| 精品国产一区二区久久| 黄色 视频免费看| 老鸭窝网址在线观看| 精品久久久精品久久久| 成人亚洲精品一区在线观看| 精品少妇久久久久久888优播| 久久亚洲精品不卡| 成人国语在线视频| 纯流量卡能插随身wifi吗| 最新的欧美精品一区二区| 日本欧美国产在线视频| 丝袜美腿诱惑在线| av国产久精品久网站免费入址| 久久亚洲国产成人精品v| 亚洲国产欧美在线一区| 国产野战对白在线观看| 黄色片一级片一级黄色片| 亚洲三区欧美一区| 人成视频在线观看免费观看| 我要看黄色一级片免费的| av有码第一页| 日日夜夜操网爽| 赤兔流量卡办理| 国产成人欧美在线观看 | 一级毛片黄色毛片免费观看视频| 91精品伊人久久大香线蕉| 国产成人一区二区在线| 久久热在线av| 宅男免费午夜| 搡老乐熟女国产| 在线观看一区二区三区激情| 亚洲av男天堂| 国产亚洲av高清不卡| 国产一区二区三区综合在线观看| 欧美久久黑人一区二区| 赤兔流量卡办理| 精品欧美一区二区三区在线| 亚洲图色成人| 久久免费观看电影| 一区二区三区乱码不卡18| 人人妻人人爽人人添夜夜欢视频| 亚洲国产av影院在线观看| 欧美精品亚洲一区二区| 电影成人av| 亚洲精品国产av成人精品| videosex国产| 人人妻人人添人人爽欧美一区卜| 久久亚洲国产成人精品v| 国产成人啪精品午夜网站| av在线老鸭窝| 各种免费的搞黄视频| 老熟女久久久| 久久这里只有精品19| 国产一级毛片在线| 久9热在线精品视频| 久久国产精品影院| 亚洲av国产av综合av卡| 国产亚洲av高清不卡| 男的添女的下面高潮视频| 婷婷色综合www| 久久久国产精品麻豆| 亚洲精品久久午夜乱码| 一二三四社区在线视频社区8| www.熟女人妻精品国产| 另类亚洲欧美激情| 久久久精品94久久精品| 午夜福利一区二区在线看| 高清av免费在线| 欧美av亚洲av综合av国产av| 狂野欧美激情性xxxx| videos熟女内射| 日本一区二区免费在线视频| 嫩草影视91久久| 欧美日韩一级在线毛片| 久久久久久久国产电影| 视频区图区小说| 亚洲精品中文字幕在线视频| 免费观看a级毛片全部| 精品国产超薄肉色丝袜足j| 丝袜人妻中文字幕| 建设人人有责人人尽责人人享有的| 日韩av在线免费看完整版不卡| 在线 av 中文字幕| cao死你这个sao货| 亚洲欧美一区二区三区国产| 国产黄色免费在线视频| 国产精品一二三区在线看| 视频在线观看一区二区三区| 亚洲成人免费电影在线观看 | 好男人电影高清在线观看| 婷婷色综合大香蕉| 天天躁夜夜躁狠狠躁躁| 一区二区av电影网| 精品人妻一区二区三区麻豆| 国产成人免费观看mmmm| 国产成人系列免费观看| 一边亲一边摸免费视频| 成年动漫av网址| 熟女少妇亚洲综合色aaa.| 日韩 欧美 亚洲 中文字幕| 久久久久视频综合| 亚洲国产看品久久| 国产精品欧美亚洲77777| 美女午夜性视频免费| 国产一区亚洲一区在线观看| 精品国产一区二区三区四区第35| √禁漫天堂资源中文www| 精品一品国产午夜福利视频| 伦理电影免费视频| 国产成人一区二区在线| 久久青草综合色| 精品人妻熟女毛片av久久网站| 91老司机精品| 黄色一级大片看看| 大片免费播放器 马上看| 国产成人精品在线电影| 婷婷色综合www| 少妇裸体淫交视频免费看高清 | 久久精品亚洲熟妇少妇任你| 天天操日日干夜夜撸| 男人爽女人下面视频在线观看| 国产成人精品久久久久久| 在现免费观看毛片| 男的添女的下面高潮视频| 黄色视频在线播放观看不卡| 汤姆久久久久久久影院中文字幕| 精品国产超薄肉色丝袜足j| 如日韩欧美国产精品一区二区三区| 天堂俺去俺来也www色官网| 青草久久国产| 纯流量卡能插随身wifi吗| 日本一区二区免费在线视频| 涩涩av久久男人的天堂| 大片电影免费在线观看免费| 国产又色又爽无遮挡免| 欧美日韩视频高清一区二区三区二| 亚洲久久久国产精品| 久久青草综合色| 国产亚洲欧美在线一区二区| av电影中文网址| 成年美女黄网站色视频大全免费| 下体分泌物呈黄色| 欧美日韩成人在线一区二区| 丝袜在线中文字幕| 亚洲国产av影院在线观看| 国产野战对白在线观看| 熟女少妇亚洲综合色aaa.| 80岁老熟妇乱子伦牲交| 欧美日韩视频高清一区二区三区二| 亚洲精品美女久久久久99蜜臀 | 亚洲国产精品一区二区三区在线| 一边摸一边抽搐一进一出视频| 亚洲欧美精品自产自拍| 国产精品一区二区精品视频观看| 亚洲五月婷婷丁香| 亚洲国产成人一精品久久久| 性少妇av在线| 久久狼人影院| 亚洲国产精品一区三区| 黄色视频不卡| 午夜福利影视在线免费观看| 美女大奶头黄色视频| 国产亚洲av高清不卡| 国产一区二区三区av在线| 三上悠亚av全集在线观看| 菩萨蛮人人尽说江南好唐韦庄| 国产亚洲精品第一综合不卡| 国产精品免费大片| 国产伦理片在线播放av一区| 91精品国产国语对白视频| 99国产综合亚洲精品| 老司机亚洲免费影院| 日韩av不卡免费在线播放| 999精品在线视频| 香蕉丝袜av| 国产老妇伦熟女老妇高清| 日韩av不卡免费在线播放| 久久久精品区二区三区| 亚洲av成人精品一二三区| 波多野结衣av一区二区av| 久久久久国产一级毛片高清牌| 精品一品国产午夜福利视频| 人人澡人人妻人| av有码第一页| 久久精品亚洲熟妇少妇任你| 国产黄色免费在线视频| 午夜精品国产一区二区电影| 七月丁香在线播放| avwww免费| 国产高清国产精品国产三级| 国产一区二区激情短视频 | 一个人免费看片子| 男女国产视频网站| www.av在线官网国产| 国产成人a∨麻豆精品| 中文字幕另类日韩欧美亚洲嫩草| 丝袜脚勾引网站| 欧美日韩成人在线一区二区| 嫩草影视91久久| 国产一区亚洲一区在线观看| 18禁国产床啪视频网站| 中文字幕av电影在线播放| 国产男女超爽视频在线观看| 丝袜脚勾引网站| 中文欧美无线码| 国产精品秋霞免费鲁丝片| 女人高潮潮喷娇喘18禁视频| av网站在线播放免费| av视频免费观看在线观看| 校园人妻丝袜中文字幕| 亚洲av日韩精品久久久久久密 | 国产一卡二卡三卡精品| 免费久久久久久久精品成人欧美视频| 成人午夜精彩视频在线观看| 精品少妇久久久久久888优播| 国产av精品麻豆| 97人妻天天添夜夜摸| 欧美日韩视频精品一区| 无遮挡黄片免费观看| www.熟女人妻精品国产| 亚洲中文av在线| 老司机亚洲免费影院| 免费人妻精品一区二区三区视频| 国产在线一区二区三区精| 熟女少妇亚洲综合色aaa.| 亚洲,欧美,日韩| 丰满少妇做爰视频| 久久精品成人免费网站| 丝瓜视频免费看黄片| 2018国产大陆天天弄谢| 99国产精品免费福利视频| 丰满少妇做爰视频| 婷婷色麻豆天堂久久| 自线自在国产av| 2018国产大陆天天弄谢| 欧美日本中文国产一区发布| 一本大道久久a久久精品| 又大又爽又粗| av线在线观看网站| svipshipincom国产片| 久久鲁丝午夜福利片| 超碰成人久久| 国产一区二区三区av在线| 精品亚洲成国产av| 丰满迷人的少妇在线观看| 天天添夜夜摸| 国产精品免费视频内射| 亚洲av成人精品一二三区| 成年动漫av网址| 国产99久久九九免费精品| 狠狠婷婷综合久久久久久88av| 亚洲欧美日韩另类电影网站| 精品一区二区三区四区五区乱码 | 一本色道久久久久久精品综合| 国产不卡av网站在线观看| 亚洲成人手机| 美女大奶头黄色视频| 中文字幕制服av| 可以免费在线观看a视频的电影网站| 18禁国产床啪视频网站| 女人爽到高潮嗷嗷叫在线视频| 亚洲一区二区三区欧美精品| 人人妻,人人澡人人爽秒播 | 亚洲国产看品久久| 日日夜夜操网爽| 国产成人精品久久二区二区91| 美女视频免费永久观看网站| 国产精品人妻久久久影院| 中文字幕人妻丝袜一区二区| 免费在线观看视频国产中文字幕亚洲 | 少妇被粗大的猛进出69影院| 日日摸夜夜添夜夜爱| 男女免费视频国产| 少妇粗大呻吟视频| xxx大片免费视频| 高清视频免费观看一区二区| 又黄又粗又硬又大视频| 国产一区二区三区av在线| 国产精品久久久av美女十八| 一级毛片女人18水好多 | 另类精品久久| 狂野欧美激情性xxxx| 欧美人与善性xxx| 一本大道久久a久久精品| 成年人黄色毛片网站| 搡老岳熟女国产| 50天的宝宝边吃奶边哭怎么回事| 狠狠婷婷综合久久久久久88av| 妹子高潮喷水视频| 91麻豆av在线| 黄色一级大片看看| 亚洲精品一卡2卡三卡4卡5卡 | 国产精品免费大片| 久久精品人人爽人人爽视色| 亚洲五月色婷婷综合| 国产成人免费观看mmmm| 亚洲,欧美,日韩| www日本在线高清视频| 亚洲天堂av无毛| 精品视频人人做人人爽| 国产成人a∨麻豆精品| 亚洲一区二区三区欧美精品| av在线app专区| 国产一区二区 视频在线| 51午夜福利影视在线观看| 少妇粗大呻吟视频| 国产精品欧美亚洲77777| 夫妻性生交免费视频一级片| 韩国高清视频一区二区三区| 亚洲国产欧美在线一区| 五月开心婷婷网| 亚洲欧美日韩另类电影网站| 欧美黄色淫秽网站| 亚洲精品美女久久av网站| a 毛片基地| 国产一区二区在线观看av| 欧美激情 高清一区二区三区| 欧美人与性动交α欧美软件| 99精品久久久久人妻精品| av视频免费观看在线观看| 精品久久久精品久久久| 欧美日韩视频精品一区| 午夜福利乱码中文字幕| 9191精品国产免费久久| 久久九九热精品免费| 男女无遮挡免费网站观看| 国产成人精品久久二区二区免费| 国产精品国产三级专区第一集| 在线观看一区二区三区激情| 久久 成人 亚洲| 婷婷色麻豆天堂久久| 国产一区有黄有色的免费视频| 日日夜夜操网爽| 视频在线观看一区二区三区| av在线老鸭窝| 黄色毛片三级朝国网站| 18在线观看网站| 国产又爽黄色视频| 国产1区2区3区精品| 免费看十八禁软件| 日本91视频免费播放| 国精品久久久久久国模美| 亚洲av国产av综合av卡| 国产日韩欧美在线精品| 男男h啪啪无遮挡| 国产黄频视频在线观看| 国产真人三级小视频在线观看| 精品少妇内射三级| 中文欧美无线码| 久久精品aⅴ一区二区三区四区| 人妻人人澡人人爽人人| 欧美日韩一级在线毛片| 亚洲成人国产一区在线观看 |