• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data encryption based on a 9D complex chaotic system with quaternion for smart grid

    2023-02-20 13:14:24FangfangZhang張芳芳ZheHuang黃哲LeiKou寇磊YangLi李揚(yáng)MaoyongCao曹茂永andFengyingMa馬鳳英
    Chinese Physics B 2023年1期
    關(guān)鍵詞:李揚(yáng)

    Fangfang Zhang(張芳芳), Zhe Huang(黃哲), Lei Kou(寇磊),Yang Li(李揚(yáng)), Maoyong Cao(曹茂永), and Fengying Ma(馬鳳英)

    1School of Information and Automation Engineering,Qilu University of Technology(Shandong Academy of Sciences),Jinan 250353,China

    2Institute of Oceanographic Instrumentation,Qilu University of Technology(Shandong Academy of Sciences),Qingdao 266000,China

    3School of Electrical Engineering,Northeast Electric Power University,Jilin 132000,China

    Keywords: 9-dimensional complex chaotic system,data encryption,quaternion,smart grid,real-time

    1. Introduction

    Because a power system requires real-time transmission of data communication,most security applications in the computer network cannot be implemented in the power system.[1]In the smart grid, most of the critical real-time data is transmitted on the network in plain text,and real-time data encryption is not involved in real-time control. The important data is still in the form of plain text, which poses major safety hazards to the safe and stable operation of the power system.[2,3]The safe operation of power equipment is directly effected by the function of remote adjusting, remote control and remote measure in the smart grid. Especially, when the power information network is maliciously attacked,it results in data loss,tampering and seriously threatens the normal operation of the power information network and then affects the power physical network.[4,5]Finally, the malicious attack causes a chain reaction in the power network. In extreme cases, the malicious attack propagate alternately between the power information network and power physical network. Therefore,the safe and stable operation of the power grid cannot be guaranteed.For example,once the power information network is attacked and the monitor data is tampered with abnormal data. It may cause the power equipment to shut down and bring huge economic losses. For purpose of preventing malicious attackers from sending false abnormal monitor data, it is inevitable to prevent data leakage.

    In addition, when encountering the suspected abnormal monitor data,it is crucial to confirm the condition of the equipment as soon as possible. The maintenance personnel should take photos of the equipment and send them to the control center. Timely reporting of the power equipment status can effectively improve the operation efficiency of the smart grid.Due to data information security,the report is forced to delay.Therefore, it is of great practical significance to study an encryption algorithm that takes into account both confidentiality and real time.

    A deterministic aperiodic model was proposed by Lorenz who is a meteorologist at MIT. He was convinced that chaos[6,7]is a science that uses fractal geometry to analyze and study the nonlinear dynamics shown in phenomenons such as the butterfly effect. Grassber designed a method to reconstruct the dynamic system. It makes the chaos enter the practical application stage by introducing the Lyapunov exponent. By the end of the 20th century, chaos theory began to integrate with other subjects, such as chaotic secure communication,[8,9]chaotic cryptography,[10,11]and chaotic economics. The chaotic signal, which has inherent randomness, ergodicity and sensitivity to initial conditions, is generated by a deterministic system. These characteristics are very similar to the diffusion and scrambling properties in the Shannon classical model. Therefore, chaos theory has a wide application prospect in the field of information security.

    The dynamic behavior of high-dimensional complex chaotic systems is more complicated than real chaotic systems. The real part and the imaginary part are independent in complex-valued chaotic systems,which improves the ergodicity of the chaotic system. Hence, high-dimensional complex chaotic systems can overcome the disadvantages of short period, uneven distribution of chaotic sequences and small key space. These belong to the low-dimensional chaotic system.

    The basic mathematical concept of quaternion[12,13]was proposed by the famous mathematician Hamilton in 1843. He introduced a function called the complex plane function and obtained a four-dimensional space. The quaternion can be regarded as an extension of a simple complex number. The plural number is mainly composed of a real part and an international unitias an imaginary number. In the same way,quaternion can also be regarded to be composed of a real part and three imaginary unitsi,j,andk.

    Many researchers have developed a great number of encryption schemes for the smart grid. In February 2016, Liuet al.[14]proposed a lightweight authenticated communication scheme for the smart grid, which ensures a secure two-way communication between the smart meters and the neighborhood gateway. In June 2017, Saxena and Grijalva[15]proposed a novel scheme based on dynamic secrets and encryption with secret keys. The scheme generates a series of dynamic secrets over the communication network, which are used to generate secret keys for data encryption. In June 2019,Gope and Sikdar[16]proposed a lightweight and privacyfriendly masking-based spatial data aggregation scheme for secure forecasting of power demand in smart grids. In March 2020, Songet al.[17]designed a dynamic membership data aggregation scheme by the homomorphic encryption and IDbased signature. It reduces the complexity on a new user’s joining and an old user’s quitting. In May 2021, Qianet al.[18]proposed a lightweightt-times homomorphic encryption scheme,which can reduce the computational cost of smart devices further and resist quantum attacks.

    Although scholars have proposed good encryption schemes for smart grid, there still exist two problems to be solved:

    (1)There is no discussion on image transmission encryption for smart grid. Compared with traditional text information,digital image contains more data.

    (2)The encryption and decryption time are not discussed.

    In order to overcome the above shortcomings,a new complex chaotic system with quaternion is proposed in this paper.This new chaotic system is 9-dimensional and has good encryption performances. The novelty and contributions of this paper are summarized as follows:

    (i) A novel complex chaotic system with quaternion is proposed. The dynamic characteristics are discussed. At the same time,there are a few studies on the chaotic system with quaternion.

    (ii)In order to ensure real-time transmission in the smart grid,an encryption algorithm based on the novel chaotic system is proposed. The image and the check code, which are encryted by the encryption algorithm,can be sent in time.

    (iii)Moreover,it can also protect information from being tampered. The control center can identify the correct information and will not be misled to turn off the equipment for no reason. Therefore,economic losses are avoided.

    The specific content is arranged as follows:The dynamics characteristics of the proposed chaotic system are discussed in Section 2. An encryption algorithm is expounded and compared with other algorithms by the usage of some security performances in Section 3. In Section 4,the proposed encryption scheme is verified with data and images in the smart grid,and the security analysis is provided. The main work of this paper is summarized in Section 5.

    Fig.1. The smart grid applications.

    2. Complex chaotic system with quaternion

    The mathematical expression of complex Chen chaotic system[19]is

    wherea,bare positive constants; andx1,x2,x3are independent variables.

    Then the mathematical expression of the quaternion is given as follows:

    whereui(i=1,2,...,9)are independent variables;andi,j,kare imaginary units.

    System(1)is extended to the quaternion field,and substitute Eq.(2)into Eq.(1). Finally we can separate the real part from the imaginary part and obtain

    wherea,b,care positive constants.Next,the dynamic characteristics of the system are intuitively analyzed from the chaos attractor,bifurcation diagram,0–1 test,and complexity analysis.

    2.1. Chaos attractor

    Seta=27,b=23,c=1. For initial conditions(0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1,0.1),the phase portraits of attractor are depicted in Fig.2.

    Lyapunov exponent[18]is a numerical characteristic representing the average exponential divergence rate of adjacent trajectories in phase space. It is an important index to analyze the dynamic characteristics. Only when there are positive, negative values and zero, the system is chaotic.The Lyapunov exponents of system (3) are LE1=2.028,LE2=1.913, LE3=1.863, LE4=1.502, LE5=0.000, LE6=-0.316, LE7=-5.380, LE8=-5.524, LE9=-5.809. The corresponding Lyapunov exponents are depicted in Fig.3.The Lyapunov exponent of the proposed 9-dimensionol system is(+,+,+,+,0,-,-,-,-). Therefore,the system is chaotic.

    Fig.2. Phase portraits of system(3):(a)x1-x5,(b)x1-x9,(c)x5-x9,(d)x1-x5-x9.

    Fig.3. The Lyapunov exponent spectrum of system(3).

    2.2. Bifurcation diagram

    With different values of system parameters,the dynamic motion state of the system will change. This phenomenon is called bifurcation.[19]When there is only one point in the bifurcation diagram,it shows that the system is in a steady state within this parameter range.

    Fig.4. The bifurcation of system(3).

    On the contrary,when there are countless points in the bifurcation diagram, it means that the system is chaotic within this parameter range. Therefore,the bifurcation diagram varying with parameters can be used to analyze the performance characteristics of the system. The bifurcation diagram of variablex1varying with parameterαis shown in Fig.4. According to Fig.4,the system ceaselessly branches between diverse states with the change ofα,and the system comes to a chaotic state lastly.

    2.3. The 0–1 test

    By calculating the transformation variables of the sequences(n)andp(n),the system state is judged. This method is called 0–1 test.

    wherec ∈(0,π),x(j)(j=1,2,...,N)is the test sequence.

    Next,we verify the trajectory ofp(n)–s(n). If the trajectory shows the Brownian motion,the test sequence is chaotic.The “0–1 test” diagram of system (3) is shown in Fig. 5. It can be seen that the system (3) shows the Brownian motion.Therefore,it is chaotic.

    Fig.5. The 0–1 test diagram.

    2.4. Complexity analysis

    The Shannon entropy (SE) algorithm and the chromatogram (C0) algorithm are used to verify and analyze the complexity of chaotic systems when the two parameters change. The SE algorithm obtains the spectral entropy from the Shannon entropy algorithm. TheC0algorithm divides the sequence into regular and irregular parts.Then it calculates the proportion of irregular parts in the whole sequence. The chromatogram of parameterαvarying with parametercis shown in Fig.6. The darker the color is,the higher the complexity is.

    Through the above indexes, the dynamic characteristics of the system (3) are analyzed. Whena=1/7,b=2/7 andc=1,the system(3)has complex dynamic behavior,inherent randomness and unpredictability. Then it can generate pseudo random sequences required by the proposed algorithm.

    Fig.6. The chromatogram of x1 sequence: (a) SE algorithm, (b) C0 algorithm.

    3. The encryption algorithm and its comparison

    Generally speaking, encrypted data will not be partially selected to ensure the integrity of data. However, when the equipment network breaks down, in order to ensure the realtime reporting of fault data, we can select partial sensitive or important information as the encryption region to decrease the encryption time.

    It is of great importance to protect the sensitive information in the image,such as faces or devices. There is no need to keep the rest of the background area of the image confidential.Therefore, partial areas are only encrypted to ensure the real time.

    In Section 2, the dynamic characteristics of chaotic system (3) are analyzed. The quasi random sequence with good pseudorandomness, low correlation and high complexity is generated by the chaotic system (3). Taking the pseudorandom sequence as the key sequence can ensure the security of encryption.

    The flow chart of the proposed encryption algorithm is shown in Fig.7.

    Fig.7. The flow chart of image encryption algorithm.

    Fig.8. The flow chart of experimental results.

    The steps of the image encryption algorithm are as follows:

    Step 1Partially select image.Separate the image channel and change it into R,G and B channels. Then fill the remaining part in zero pixel value.

    Step 2Select the gray value of each channel and its combination as the key. Then the image is divided into 4×4 subblocks. Call it A1.

    Step 3Randomly select six sequences from the system (3). Then name them asA,X,Y,H,V,Msequences.Change theAsequence into a matrix of the same image size.It is divided into 4×4 subblocks. Name it as A2.

    Step 4Encode A1 and A2 using the DNA coding scheme. The coding rule is determined by theXandYsequences,respectively. Name them B1 and B2.

    Step 5Encode B1 and B2 using the DNA computing scheme. The computing scheme is determined by theHsequence. Call it C1.

    Step 6Decoding C1 using the DNA coding scheme. Replace the row and column. The row and column replacement orders are determined byVandMsequences,respectively. Finally,the zero filling part is removed.

    Seta=27,b=23,c=1 in system (3) and initial condition is the pixel average value of original image. In this encryption algorithm, the “Lena” image is an encrypted object.Select the area to be encrypted in the Lena image.The selected area should correspond to sensitive information that can identify an individual,such as a face. The rest is not encrypted.

    The encryption process is depicted in Fig. 8, where Fig. 8(a) is the original image, Fig. 8(b) is the encrypted image,Fig.8(c)is the decrypted image,and Fig.8(d)is the partial image. The original features and information are masked in Fig.8(e).

    3.1. Reconstruction quality analysis

    In order to measure the distortion of the decrypted image,structural similarity(SSIM)is introduced. SSIM contains three independent components:luminance,contrast and structure. The SSIM can be expressed as follows:

    wherekXandkYare the mean of imagesXandY;nXandnYare the variance of imagesXandY;nXYis the covariance of imagesXandY.D1andD2are two constants with small value when the denominator is up to zero;D3=D1/2.U(X,Y) is the luminance,O(X,Y) denotes contrast,T(X,Y) represents structure. The SSIM of Figs.8(a)and 8(c)is 1 by calculation.

    Next,subtract the pixel value of the original image from each pixel value of the decrypted image. The result of this calculation is zero, which indicates that the image pixel value is restored to normal.

    3.2. Correlation coefficient

    In the horizontal,vertical and diagonal directions,the adjacent pixel values of plaintext and ciphertext images are randomly selected. Calculate the correlation coefficient between two adjacent pixels.The numerical range of correlation coefficient of adjacent pixels is[-1,1].If the value is close to 1,the adjacent pixels are strong related. Contrarily,the adjacent pixels are weak related.The formula of the correlation coefficientruvbetweenuiandviis given as follows:

    whereEindicates the average pixel value,Dand Cov represent the variance and the covariance of pixels,respectively;ruvis the correlation coefficient;Nis the number of pixels;ui,vi(i=1,...,N) are pixels. As listed in Tables 1 and 2, though compared with other algorithms,the confidentiality is slightly inferior,this algorithm has an advantage in shortening the encryption and decryption time.

    Table 1. Adjacent pixels and time comparison.

    Table 2. Encryption and decryption time.

    3.3. Histogram

    The frequency of all gray values can be intuitively seen from the histogram. The pixel distributions of each pixel level can be seen in Figs.9(a)–9(c)with the histograms of the plaintext image. Figures 9(d)–9(f)are the histograms of the ciphertext image. The pixel distribution of the plaintext image is uneven. After encryption, the histogram of ciphertext image is almost uniform and is quietly different from those of the plaintext image. The results verify that the proposed encryption algorithm is resistant to statistical attacks.

    Fig.9. Histograms:(a)R channel in plain image,(b)G channel in plain image,(c)B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

    3.4. Information entropy

    As a quantitative standard,information entropy is the relative complexity of the image information. The image information entropy with average gray value distribution is relatively close to 8. The formula ofFis given as follows:

    whereTis the maximum gray value 255,ande(xi)is the gray value probability. As shown in Table 3, the information entropy of the proposed algorithm is slightly smaller,but the encryption time is greatly shortened. This means that this algorithm can effectively shorten the encryption time.

    Table 3. The information entropy.

    4. The encryption scheme in the smart grid

    4.1. Image encryption

    Two actual pictures of the distribution network are selected as the encryption objects. Their sizes are,respectively,256×256 and 512×512. Call them image 1 and image 2.

    Fig.10. The flow chart of experimental results.

    Select the area to be encrypted in image 1 and image 2. The selected area should correspond to sensitive information that can identify the physical status of equipments.Therefore,the central area containing distribution network equipments is selected.

    Fig.11. The flow chart of experimental results.

    The encryption process of image 1 is shown in Fig. 10,where Fig. 10(a) is the original image 1, Fig. 10(b) is the encrypted image 1, Fig. 10(c) is the decrypted image 1, and Fig.10(d)is the partial image 1. The original features and information are masked in Fig.10(e). Figure 11 shows the same encryption process of image 2.

    Then,the encrypted image is analyzed by the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality.

    4.1.1. Histogram

    According to Figs.12 and 13,the histogram after encryption is evenly distributed,which can effectively resist statistical attacks.

    Fig.13. Histograms of the original image 2 and the encrypted image 2: (a) R channel in plain image, (b) G channel in plain image, (c) B channel in plain image,(d)R channel in cipher image,(e)G channel in cipher image,(f)B channel in cipher image.

    4.1.2. Correlation coefficient

    According to Tables 4 and 5, the strong correlation between the pixels of the original image after a short time of encryption is weakened.

    Table 4. Adjacent pixels comparison.

    Table 5. Encryption and decryption time.

    4.1.3. Information entropy

    According to Table 6, the information entropy of encrypted images with a short encryption time is close to the maximum. It means that this encryption algorithm takes into account both confidentiality and real time.

    Table 6. The information entropy of image.

    4.1.4. Sensitivity of key

    Under the initial conditions(0.10002, 0.10002, 0.10002,0.10002, 0.10002, 0.10002, 0.10002, 0.10002, 0.10002), the values of other parameters in system (3) remain unchanged.The generated sequences are used to decrypt the cipher images 1 and 2. According to Fig. 14, these sequences fail to decrypt the cipher images 1 and 2. The proposed encryption algorithm is sensitive to the key.

    Fig.14. The decryption results of wrong key: (a)the decryption results of cipher image 1,(b)the decryption results of cipher image 2.

    4.1.5. Reconstruction quality analysis

    According to Table 7, the reconstruction qualities of images 1 and 2 are excellent.

    From the correlation coefficient, histogram, information entropy,sensitivity of key and reconstruction quality,the proposed encryption algorithm has good confidentiality and real time in the image transmission of the smart grid.

    Table 7. Reconstruction quality analysis.

    4.2. Data encryption

    Modbus protocol is adopted in the process of transmitting monitor data. The composition of Modbus protocol is as follows:

    Fig.15. The message frame composition in modbus RTU mode.

    Fig.16. The flow chart of the data encryption algorithm.

    The cyclic redundant check(CRC)code is calculated by the transmitting device and placed at the end of the transmitted information frame. The receiving device recalculates the CRC of the received information and compares whether the calculated CRC is consistent with the received CRC. If they are inconsistent,it is considered that the data is abnormal. Therefore, CRC is selected for encryption in this paper. The flow chart of the data encryption algorithm is shown in Fig.16.This encryption step is similar to the above image encryption step.

    Next, the randomness of the sequence is analyzed by the NIST test. It is a recognized standard in the encryption field that can be used to evaluate the performance of pseudo-random sequences. Most scholars convince that it is a very common and effective method to test pseudo-random sequences. For convenience’s sake, 10000000 real numbers,generated by system (3), are converted to binary sequences.Adopt them directly as the experimental data of the NIST test suit. If every single item in the NIST test exceeds 0.01(maximum is 1), it indicates that this test is passed. At the same time, the larger the value is, the stronger the random characteristic of the test sequence is.

    As shown in Table 8, the chaotic sequence generated by system(3)has good random performance and can effectively cover up the information of encrypted data.

    Table 8. NIST test.

    5. Conclusion

    A new 9D complex chaotic system with quaternion is proposed in this paper. Firstly, it is derived from the complex Chen system and quaternion. The expansion of variables from real field to complex field is realized. Secondly,to analyze the performances of the new chaotic system,Lyapunov exponent,phase diagrams, bifurcation diagram, 0–1 test and complexity are introduced. Finally,with the DNA code,an encryption algorithm is proposed based on system (3). The transmitted images and data are encrypted in the verification experiments.

    To analyze the image encryption,we have introduced the histogram,correlation coefficient,information entropy,sensitivity of key and reconstruction quality. The data encryption is analyzed by the NIST test. The experimental results show that the proposed algorithm improves the real-time performance on the basis of confidentiality. It can be applied to the smart grid.

    Acknowledgements

    Project supported by the International Collaborative Research Project of Qilu University of Technology (Grant No. QLUTGJHZ2018020), the Project of Youth Innovation and Technology Support Plan for Colleges and Universities in Shandong Province, China (Grant No. 2021KJ025), the Major Scientific and Technological Innovation Projects of Shandong Province,China(Grant Nos.2019JZZY010731 and 2020CXGC010901).

    猜你喜歡
    李揚(yáng)
    Data-driven modeling of a four-dimensional stochastic projectile system
    十七樓限定期之戀
    中外文摘(2022年8期)2022-05-17 09:13:36
    十七樓限定期之戀
    女友(2022年2期)2022-02-16 09:10:08
    李揚(yáng)縝治療外傷致危急重癥驗(yàn)案1則
    李揚(yáng)的小白駒(短篇小說)
    湘江文藝(2021年6期)2021-06-10 12:26:50
    喜糖禮盒包裝設(shè)計(jì)
    墨菲定律
    金山(2020年6期)2020-07-09 06:18:58
    就當(dāng)扶貧戶
    送信
    抓什么別抓小偷
    故事林(2010年8期)2010-05-14 17:29:35
    一进一出抽搐gif免费好疼| 老鸭窝网址在线观看| 怎么达到女性高潮| 国产又色又爽无遮挡免费看| 日本在线视频免费播放| 久久久国产欧美日韩av| 午夜激情福利司机影院| 亚洲真实伦在线观看| 精品久久蜜臀av无| 国产野战对白在线观看| 草草在线视频免费看| 制服丝袜大香蕉在线| 亚洲国产精品合色在线| 美女午夜性视频免费| 99久久无色码亚洲精品果冻| av免费在线观看网站| 国模一区二区三区四区视频 | 禁无遮挡网站| 国产精品影院久久| 欧美丝袜亚洲另类 | 国产精品日韩av在线免费观看| 大型av网站在线播放| 无人区码免费观看不卡| 麻豆一二三区av精品| 成人特级黄色片久久久久久久| 村上凉子中文字幕在线| 亚洲性夜色夜夜综合| 后天国语完整版免费观看| 日本三级黄在线观看| 熟妇人妻久久中文字幕3abv| 成人国产一区最新在线观看| 国产三级黄色录像| 国产成人av教育| 淫妇啪啪啪对白视频| 亚洲一区中文字幕在线| 午夜福利18| 女生性感内裤真人,穿戴方法视频| 1024视频免费在线观看| 精品久久久久久久久久久久久| 一本大道久久a久久精品| 一进一出抽搐gif免费好疼| 国产91精品成人一区二区三区| 国产成人精品久久二区二区91| 中文字幕精品亚洲无线码一区| 高潮久久久久久久久久久不卡| 变态另类成人亚洲欧美熟女| 国内揄拍国产精品人妻在线| 亚洲黑人精品在线| 色尼玛亚洲综合影院| 超碰成人久久| 18禁黄网站禁片免费观看直播| videosex国产| 精品无人区乱码1区二区| 一级毛片女人18水好多| 黄色 视频免费看| 1024香蕉在线观看| 这个男人来自地球电影免费观看| 久久久久精品国产欧美久久久| 亚洲最大成人中文| 国产野战对白在线观看| 亚洲精品中文字幕一二三四区| 免费在线观看亚洲国产| 女人爽到高潮嗷嗷叫在线视频| 欧美一区二区精品小视频在线| 波多野结衣高清作品| 久久久久九九精品影院| 亚洲人成网站高清观看| 不卡一级毛片| 亚洲激情在线av| 啪啪无遮挡十八禁网站| 欧美一级毛片孕妇| 老司机在亚洲福利影院| 在线永久观看黄色视频| 久久性视频一级片| 可以在线观看毛片的网站| 日本黄色视频三级网站网址| 亚洲18禁久久av| 国产精华一区二区三区| 成人一区二区视频在线观看| 97碰自拍视频| 九九热线精品视视频播放| 欧美人与性动交α欧美精品济南到| 亚洲天堂国产精品一区在线| 久久精品91蜜桃| 1024香蕉在线观看| 别揉我奶头~嗯~啊~动态视频| 精品一区二区三区av网在线观看| 悠悠久久av| www.999成人在线观看| 成人手机av| 久久人妻av系列| 国产亚洲av高清不卡| 国产高清激情床上av| 人成视频在线观看免费观看| 久久热在线av| 国产精品综合久久久久久久免费| 91成年电影在线观看| x7x7x7水蜜桃| 亚洲一区中文字幕在线| 丰满人妻一区二区三区视频av | 一级a爱片免费观看的视频| 俄罗斯特黄特色一大片| 国产精品久久电影中文字幕| 国产视频一区二区在线看| 两个人免费观看高清视频| 夜夜爽天天搞| 日本一本二区三区精品| 天天躁夜夜躁狠狠躁躁| 免费看美女性在线毛片视频| 国产精品 欧美亚洲| 777久久人妻少妇嫩草av网站| 男人舔女人下体高潮全视频| 十八禁人妻一区二区| 日韩欧美国产在线观看| 悠悠久久av| 亚洲熟妇中文字幕五十中出| 在线看三级毛片| 欧美日韩国产亚洲二区| 亚洲片人在线观看| 夜夜爽天天搞| 亚洲人成电影免费在线| 国产成人精品久久二区二区91| 又黄又爽又免费观看的视频| 亚洲天堂国产精品一区在线| 中文在线观看免费www的网站 | 男人舔女人的私密视频| 人人妻,人人澡人人爽秒播| 91av网站免费观看| 午夜福利高清视频| 婷婷精品国产亚洲av| 精品高清国产在线一区| 怎么达到女性高潮| 欧美最黄视频在线播放免费| 窝窝影院91人妻| 精品午夜福利视频在线观看一区| 两人在一起打扑克的视频| 制服诱惑二区| 亚洲五月婷婷丁香| 麻豆国产av国片精品| 在线观看午夜福利视频| 91国产中文字幕| 制服人妻中文乱码| 999久久久精品免费观看国产| 久久99热这里只有精品18| 欧美成人性av电影在线观看| 国产久久久一区二区三区| 一边摸一边做爽爽视频免费| 美女高潮喷水抽搐中文字幕| xxxwww97欧美| 色老头精品视频在线观看| 久久精品国产亚洲av香蕉五月| 日本 欧美在线| 观看免费一级毛片| 天天躁夜夜躁狠狠躁躁| 搡老妇女老女人老熟妇| 一本精品99久久精品77| 欧美+亚洲+日韩+国产| 淫秽高清视频在线观看| 人妻久久中文字幕网| 亚洲国产精品合色在线| 亚洲精品美女久久久久99蜜臀| 麻豆成人午夜福利视频| 日韩国内少妇激情av| 一级a爱片免费观看的视频| 亚洲国产欧美一区二区综合| 黄色毛片三级朝国网站| 国产一区二区在线观看日韩 | 国产精品野战在线观看| 国产成+人综合+亚洲专区| 欧美日韩精品网址| 中文字幕av在线有码专区| 欧美日本视频| www日本在线高清视频| 女同久久另类99精品国产91| 免费看a级黄色片| 久久久国产欧美日韩av| 国产精品久久久人人做人人爽| 男女床上黄色一级片免费看| 日本 av在线| 国产私拍福利视频在线观看| 日韩欧美三级三区| 九色成人免费人妻av| 99国产综合亚洲精品| 亚洲av第一区精品v没综合| 欧美zozozo另类| 亚洲色图 男人天堂 中文字幕| 欧美日韩福利视频一区二区| 黄色丝袜av网址大全| 一本综合久久免费| 一进一出抽搐gif免费好疼| 国产爱豆传媒在线观看 | 国产精品影院久久| 成在线人永久免费视频| 1024手机看黄色片| 精品一区二区三区四区五区乱码| 欧美一级a爱片免费观看看 | 黄片大片在线免费观看| 精品午夜福利视频在线观看一区| 99国产精品一区二区三区| 久久人人精品亚洲av| АⅤ资源中文在线天堂| 亚洲色图 男人天堂 中文字幕| 国产69精品久久久久777片 | 日本熟妇午夜| 男人舔女人下体高潮全视频| 性色av乱码一区二区三区2| 久久精品国产99精品国产亚洲性色| 亚洲专区字幕在线| 神马国产精品三级电影在线观看 | 国内精品久久久久精免费| 全区人妻精品视频| 99精品欧美一区二区三区四区| 一级作爱视频免费观看| 国产成人av激情在线播放| 久久国产精品影院| 亚洲熟妇中文字幕五十中出| 很黄的视频免费| 99国产精品99久久久久| 亚洲精品在线观看二区| 国产精品av久久久久免费| 非洲黑人性xxxx精品又粗又长| 日日摸夜夜添夜夜添小说| 999久久久国产精品视频| 成在线人永久免费视频| 精品午夜福利视频在线观看一区| 日韩精品中文字幕看吧| 国产精品av视频在线免费观看| 中国美女看黄片| 黑人欧美特级aaaaaa片| 国产v大片淫在线免费观看| www.熟女人妻精品国产| 91在线观看av| 亚洲精品在线观看二区| 亚洲狠狠婷婷综合久久图片| 国产麻豆成人av免费视频| xxx96com| 久久国产精品影院| 美女高潮喷水抽搐中文字幕| 真人一进一出gif抽搐免费| 欧美日韩亚洲国产一区二区在线观看| 国产精品乱码一区二三区的特点| 18禁黄网站禁片免费观看直播| a级毛片在线看网站| 麻豆成人午夜福利视频| 国产在线精品亚洲第一网站| 国产高清视频在线播放一区| 床上黄色一级片| 桃红色精品国产亚洲av| 级片在线观看| 久久香蕉精品热| 黄片小视频在线播放| 12—13女人毛片做爰片一| 婷婷亚洲欧美| 最好的美女福利视频网| 露出奶头的视频| 欧美黄色片欧美黄色片| 亚洲成人中文字幕在线播放| 香蕉丝袜av| 最新在线观看一区二区三区| 国产伦一二天堂av在线观看| 美女午夜性视频免费| 亚洲国产精品成人综合色| 久久伊人香网站| 日本成人三级电影网站| 欧美黑人欧美精品刺激| 中文字幕精品亚洲无线码一区| 亚洲自偷自拍图片 自拍| 91麻豆精品激情在线观看国产| 日韩高清综合在线| 黑人欧美特级aaaaaa片| 757午夜福利合集在线观看| 欧美黄色淫秽网站| 99热这里只有是精品50| 在线观看66精品国产| 亚洲av成人不卡在线观看播放网| 亚洲国产看品久久| 99国产综合亚洲精品| 国产麻豆成人av免费视频| 一级毛片女人18水好多| 黄色成人免费大全| 亚洲成人中文字幕在线播放| 少妇裸体淫交视频免费看高清 | 午夜老司机福利片| 午夜精品一区二区三区免费看| 国产精品99久久99久久久不卡| 欧美日本亚洲视频在线播放| 免费看美女性在线毛片视频| 国产亚洲欧美98| 看黄色毛片网站| 色综合亚洲欧美另类图片| 国产成人欧美在线观看| 日韩精品青青久久久久久| 黄片大片在线免费观看| 在线a可以看的网站| 性色av乱码一区二区三区2| 看片在线看免费视频| 精品乱码久久久久久99久播| 国产高清videossex| 国产在线观看jvid| 国产亚洲欧美98| 老熟妇仑乱视频hdxx| av超薄肉色丝袜交足视频| 看黄色毛片网站| 美女高潮喷水抽搐中文字幕| 天堂影院成人在线观看| 在线视频色国产色| e午夜精品久久久久久久| 一区二区三区高清视频在线| 后天国语完整版免费观看| 国产精品免费视频内射| 国产成人精品久久二区二区91| 欧美日本视频| 久久久精品欧美日韩精品| 一级毛片女人18水好多| 国产高清视频在线观看网站| 久久久久久久久免费视频了| 国产精品久久久久久精品电影| 亚洲欧美精品综合久久99| 神马国产精品三级电影在线观看 | 亚洲美女黄片视频| 两人在一起打扑克的视频| 一进一出抽搐gif免费好疼| 桃红色精品国产亚洲av| 国产亚洲av高清不卡| 舔av片在线| 老司机福利观看| 一区二区三区国产精品乱码| 国产片内射在线| 国产黄片美女视频| 国产私拍福利视频在线观看| 亚洲五月婷婷丁香| 日本在线视频免费播放| 色老头精品视频在线观看| 亚洲精品久久成人aⅴ小说| 国产精品久久久久久人妻精品电影| 欧美极品一区二区三区四区| 国内精品一区二区在线观看| 一级a爱片免费观看的视频| 99国产精品一区二区蜜桃av| av片东京热男人的天堂| 久久精品亚洲精品国产色婷小说| 国产精品久久久av美女十八| 天天添夜夜摸| 国产区一区二久久| 搡老熟女国产l中国老女人| 午夜a级毛片| 欧美乱妇无乱码| 91在线观看av| 日韩 欧美 亚洲 中文字幕| www.www免费av| 脱女人内裤的视频| 国产三级在线视频| 亚洲精华国产精华精| 国产精品久久电影中文字幕| 一本综合久久免费| 久久99热这里只有精品18| 久久久久久久精品吃奶| 50天的宝宝边吃奶边哭怎么回事| 午夜福利高清视频| 丝袜美腿诱惑在线| 亚洲精品国产一区二区精华液| 国产一级毛片七仙女欲春2| 久久精品影院6| 国产视频内射| 女同久久另类99精品国产91| 十八禁网站免费在线| 亚洲成人久久爱视频| 成人永久免费在线观看视频| 人妻夜夜爽99麻豆av| 亚洲精品久久国产高清桃花| 三级男女做爰猛烈吃奶摸视频| 久久亚洲真实| 黑人巨大精品欧美一区二区mp4| 欧美黑人巨大hd| 欧美不卡视频在线免费观看 | 亚洲精品av麻豆狂野| 哪里可以看免费的av片| 日日摸夜夜添夜夜添小说| 日本 av在线| 亚洲人成电影免费在线| 麻豆成人av在线观看| 欧美性猛交黑人性爽| 一卡2卡三卡四卡精品乱码亚洲| 免费在线观看影片大全网站| 人成视频在线观看免费观看| 午夜日韩欧美国产| 在线免费观看的www视频| 最新在线观看一区二区三区| 国产一区二区三区视频了| av在线天堂中文字幕| 精品久久久久久久久久久久久| 午夜福利在线在线| 真人一进一出gif抽搐免费| 99精品在免费线老司机午夜| 不卡一级毛片| 人妻夜夜爽99麻豆av| 精品不卡国产一区二区三区| 国产免费av片在线观看野外av| 国产熟女午夜一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 国产成人精品久久二区二区91| 日韩欧美国产在线观看| 亚洲精品中文字幕在线视频| 免费搜索国产男女视频| 韩国av一区二区三区四区| 亚洲成人国产一区在线观看| x7x7x7水蜜桃| 国产高清视频在线播放一区| 午夜精品在线福利| av福利片在线观看| 欧美zozozo另类| 日本熟妇午夜| 亚洲狠狠婷婷综合久久图片| 人妻久久中文字幕网| 97碰自拍视频| 1024视频免费在线观看| 激情在线观看视频在线高清| 国产精品精品国产色婷婷| 国产成人av激情在线播放| 一区福利在线观看| 最近在线观看免费完整版| 国产伦在线观看视频一区| 久久精品国产清高在天天线| 在线看三级毛片| 激情在线观看视频在线高清| 欧美一区二区国产精品久久精品 | 免费一级毛片在线播放高清视频| 啦啦啦免费观看视频1| 久久亚洲真实| 搡老熟女国产l中国老女人| 亚洲男人天堂网一区| www国产在线视频色| 黄色 视频免费看| 亚洲国产欧美一区二区综合| 中文字幕久久专区| 男人舔女人下体高潮全视频| 禁无遮挡网站| 日本成人三级电影网站| 久久人妻福利社区极品人妻图片| 夜夜躁狠狠躁天天躁| 久久精品aⅴ一区二区三区四区| 又爽又黄无遮挡网站| 三级男女做爰猛烈吃奶摸视频| 制服丝袜大香蕉在线| 午夜日韩欧美国产| 床上黄色一级片| 九色国产91popny在线| 久久精品夜夜夜夜夜久久蜜豆 | 欧美乱码精品一区二区三区| 亚洲精品美女久久久久99蜜臀| 蜜桃久久精品国产亚洲av| 女人高潮潮喷娇喘18禁视频| 国产精品久久视频播放| 女人爽到高潮嗷嗷叫在线视频| or卡值多少钱| 老熟妇乱子伦视频在线观看| 成年人黄色毛片网站| 男人舔奶头视频| 亚洲第一欧美日韩一区二区三区| 91麻豆精品激情在线观看国产| 啦啦啦韩国在线观看视频| 91成年电影在线观看| 亚洲欧美日韩东京热| 久久精品91无色码中文字幕| 久久久久久人人人人人| www国产在线视频色| 久久99热这里只有精品18| √禁漫天堂资源中文www| 村上凉子中文字幕在线| 最近在线观看免费完整版| 国产黄片美女视频| 99国产综合亚洲精品| 两个人看的免费小视频| av在线播放免费不卡| 老司机午夜十八禁免费视频| 国产精品综合久久久久久久免费| 男插女下体视频免费在线播放| 国语自产精品视频在线第100页| 精品国产乱码久久久久久男人| 日韩欧美在线乱码| 欧美一区二区国产精品久久精品 | 老汉色∧v一级毛片| 禁无遮挡网站| 熟女电影av网| 久久天躁狠狠躁夜夜2o2o| 日本熟妇午夜| 18禁美女被吸乳视频| 韩国av一区二区三区四区| 91成年电影在线观看| 国产精品野战在线观看| 亚洲熟妇熟女久久| 精品国内亚洲2022精品成人| 欧美黑人欧美精品刺激| 亚洲在线自拍视频| 丰满人妻一区二区三区视频av | 18禁裸乳无遮挡免费网站照片| 手机成人av网站| 国产精品久久久久久人妻精品电影| 岛国在线观看网站| 久久人妻福利社区极品人妻图片| 女人爽到高潮嗷嗷叫在线视频| 变态另类丝袜制服| 99久久精品国产亚洲精品| 嫩草影视91久久| 成人av在线播放网站| 午夜两性在线视频| 男人的好看免费观看在线视频 | 亚洲精华国产精华精| 免费无遮挡裸体视频| 亚洲av熟女| 成人国产综合亚洲| 大型av网站在线播放| www日本在线高清视频| 一个人观看的视频www高清免费观看 | 国产高清视频在线观看网站| 亚洲av成人精品一区久久| 岛国视频午夜一区免费看| 国产在线精品亚洲第一网站| 精品乱码久久久久久99久播| svipshipincom国产片| 色噜噜av男人的天堂激情| 夜夜躁狠狠躁天天躁| 制服丝袜大香蕉在线| 夜夜看夜夜爽夜夜摸| 国产视频内射| 久久中文看片网| 欧美乱码精品一区二区三区| 99riav亚洲国产免费| www.自偷自拍.com| www.熟女人妻精品国产| 99在线人妻在线中文字幕| 天堂av国产一区二区熟女人妻 | 成人av一区二区三区在线看| 日本免费a在线| 国产aⅴ精品一区二区三区波| 亚洲av美国av| 日日摸夜夜添夜夜添小说| 国产欧美日韩一区二区三| 可以免费在线观看a视频的电影网站| 国产精品久久久av美女十八| www国产在线视频色| 亚洲国产精品999在线| 精品久久久久久成人av| 亚洲成人精品中文字幕电影| 可以免费在线观看a视频的电影网站| 中文字幕人成人乱码亚洲影| 欧美乱妇无乱码| 欧美日韩黄片免| 亚洲成av人片免费观看| 欧美 亚洲 国产 日韩一| 国产一区二区三区在线臀色熟女| 99热这里只有是精品50| 国产又色又爽无遮挡免费看| 级片在线观看| 精品乱码久久久久久99久播| 国产激情欧美一区二区| 久久精品影院6| 亚洲国产日韩欧美精品在线观看 | 精品久久久久久久人妻蜜臀av| 亚洲精品国产精品久久久不卡| 精品国内亚洲2022精品成人| 哪里可以看免费的av片| 久久 成人 亚洲| 国产精品精品国产色婷婷| 99久久99久久久精品蜜桃| 国产一区二区三区在线臀色熟女| 在线国产一区二区在线| 极品教师在线免费播放| 99国产精品一区二区三区| 老鸭窝网址在线观看| 亚洲精品在线美女| 别揉我奶头~嗯~啊~动态视频| 午夜福利在线在线| 欧美一级毛片孕妇| 免费av毛片视频| 国产精品电影一区二区三区| 欧美性猛交╳xxx乱大交人| 757午夜福利合集在线观看| 亚洲精品久久国产高清桃花| 不卡一级毛片| 久久久精品国产亚洲av高清涩受| 国产三级在线视频| 精品日产1卡2卡| 久久亚洲精品不卡| 两个人看的免费小视频| av有码第一页| 久久久久免费精品人妻一区二区| 欧美zozozo另类| 亚洲 欧美 日韩 在线 免费| 欧美人与性动交α欧美精品济南到| 精品久久久久久,| 可以在线观看毛片的网站| 中国美女看黄片| 日韩欧美精品v在线| 丁香六月欧美| 久久久久九九精品影院| 99re在线观看精品视频| 国产亚洲精品综合一区在线观看 | av天堂在线播放| 50天的宝宝边吃奶边哭怎么回事| 免费搜索国产男女视频| 2021天堂中文幕一二区在线观| 欧美一级a爱片免费观看看 | 18禁观看日本| 制服人妻中文乱码| 欧美zozozo另类| 国产av在哪里看| 国产99久久九九免费精品| 久久精品成人免费网站| 一级a爱片免费观看的视频| 中文字幕av在线有码专区| 亚洲成av人片免费观看| 草草在线视频免费看| 熟妇人妻久久中文字幕3abv|