• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things*

    2023-03-04 15:03:52XinyaoWANGXuyanBAOYuzhenHUANGZhongZHENGZesongFEI

    Xinyao WANG ,Xuyan BAO ,Yuzhen HUANG ,Zhong ZHENG ,Zesong FEI

    1School of Information and Electronics,Beijing Institute of Technology,Beijing 100081,China

    2China Academy of Information and Communications Technology,Beijing 100191,China

    3Academy of Military Sciences of PLA,Beijing 100091,China

    Abstract:In this paper,physical layer security techniques are investigated for cooperative multi-input multi-output(C-MIMO),which operates as an underlaid cognitive radio system that coexists with a primary user (PU).The underlaid secrecy paradigm is enabled by improving the secrecy rate towards the C-MIMO receiver and reducing the interference towards the PU.Such a communication model is especially suitable for implementing Industrial Internet of Things (IIoT) systems in the unlicensed spectrum,which can trade offspectral efficiency and information secrecy.To this end,we propose an eigenspace-adaptive precoding(EAP)method and formulate the secrecy rate optimization problem,which is subject to both the single device power constraint and the interference power constraint.This precoder design is enabled by decomposing the original optimization problem into eigenspace selection and power allocation sub-problems.Herein,the eigenvectors are adaptively selected by the transmitter according to the channel conditions of the underlaid users and the PUs.In addition,a simplified EAP method is proposed for large-dimensional C-MIMO transmission,exploiting the additional spatial degree of freedom for a low-complexity secrecy precoder design.Numerical results show that by transmitting signal and artificial noise in the properly selected eigenspace,C-MIMO can eliminate the secrecy outage and outperforms the fixed eigenspace precoding methods.Moreover,the proposed simplified EAP method for the large-dimensional C-MIMO can significantly improve the secrecy rate.

    Key words: Cognitive radio network;Physical layer security;Cooperative multi-input multi-output (C-MIMO);Eigenspace-adaptive precoding;Difference convex programming

    1 Introduction

    1.1 Background

    The Industrial Internet of Things (IIoT) is one of the most important applications of beyond 5thgeneration/6thgeneration (B5G/6G) mobile communication technology (Chettri and Bera,2020;Nguyen et al.,2022).It supports critical data harvesting from machinery sensors as well as control signaling delivery to actuators for the smart factory(Ho?ej?í et al.,2020;Hussain et al.,2020).As an example,high-definition real-time video transmission in the IIoT provides a wide range of sensing capabilities for the smart factory,including physical-space security surveillance (Borges and Izquierdo,2010),vision-based quality inspection(Akhyar et al.,2019),and high-precision video-based localization (Chen et al.,2017).In these cases,high-volume videos need to be transmitted from the sensors to the collector,which requires high-speed and secure communication links to guarantee video quality and industrial information security.In addition to the rigorous confidentiality requirement,one of the major issues that have limited massive deployments of IIoT systems is the high cost of acquiring or leasing the spectrum license.

    To acquire the operation spectrum with reduced cost,the unlicensed spectrum has been introduced to IIoT systems,opportunistically exploiting airtime among other spectrum users (Hampel et al.,2019;Lu et al.,2019).Traditionally,there exist two sharing mechanisms in the unlicensed spectrum,i.e.,the listen-before-talk (LBT) mode and the underlying cognitive radio (CR) mode.LBT is contentionbased spectrum access and is not suitable for delaysensitive IIoT applications.Although the underlying CR mode avoids the delay due to spectrum contention,it requires IIoT devices to restrict the radiated interference power towards the primary users(PUs).

    To address both the information security and the interference mitigation issues,we resort to the cooperative multi-input multi-output(C-MIMO)transmission technique for underlaid IIoT systems.As shown in Fig.1,several IIoT sensors inside the factory building form a cooperative cluster and jointly transmit to the remote data collector.The transmissions are subject to secrecy constraints that prevent eavesdroppers outside the building from intercepting confidential messages,and also to the interference constraint that avoids excessive interference toward PUs.

    Fig.1 Diagram of the underlaid secrecy C-MIMO with the location-constrained multiple eavesdroppers in an IIoT scenario (C-MIMO: cooperative multi-input multi-output;IIoT: Industrial Internet of Things)

    1.2 Related works

    Physical layer security (PLS) techniques guarantee information security from an informationtheoretic perspective,where the wireless transmission is between the legitimate transmitter (Alice)and receiver(Bob),but overheard by the eavesdropper(Eve).PLS is a classical model,where communication security is realized by proper coset coding at Alice,so that the mutual information between Alice and Eve is zero (Wyner,1975).With this secrecy constraint,the limited information rate between Alice and Bob is represented by the secrecy capacity,which is given by the difference between the Shannon rates of wireless channels from Alice to Bob and from Alice to Eve(Csiszar and K?rner,1978).To this end,Alice has to obtain the knowledge of both channels to adapt its coding scheme and coding rate.Therefore,the knowledge of channel state information (CSI) is crucial in designing secrecy transmissions.However,in realistic systems,a covert eavesdropper behaves as a receiver and does not transmit any signal.Alice cannot obtain the realizations of the eavesdropping channel by measuring the transmission from Eve.

    To guarantee perfect secrecy with partial or no channel knowledge of Eve,artificial noise (AN) injection by Alice has been considered(Goel and Negi,2008;Zhou and McKay,2010;Zhu Y et al.,2013).With AN injection,the total transmit power is split between the confidential signal and the AN,and AN is transmitted in the null-space of the channel between Alice and Bob.He and Yener(2014)presented codebook construction and the related secrecy rate,where the signal and AN were superimposed in the same vector space.In Goel and Negi (2008),Zhou and McKay(2010),Zhu Y et al.(2013),and He and Yener (2014),the lower bound of the secrecy rate was obtained by ignoring the thermal noise at Eve,which is equivalent to the case in which Eve can be anywhere in the network.In some communication scenarios,this is an overly conservative assumption that leads to a pessimistic estimation of the secrecy rate.Although information security can be guaranteed by deducing the previously referenced lower bound of the achievable secrecy rate,it sacrifices the efficiency of scarce spectrum resources in the IIoT scenario.In Zhang et al.(2013),Zheng TX et al.(2015),and Deng et al.(2016),a certain secrecy outage probability was allowed to improve the information rate at the expense of the compromised secrecy constraint.In Wang et al.(2016),the secrecy rate was evaluated for a large distributed antenna system,where Alice was composed of distributed antennas and Eve had a single fixed location known a priori.Therein,the secrecy rate maximization was recast into a max-min problem using results from the random matrix theory and solved by the iterative block coordinate descent algorithm.However,the adopted asymptotic analysis was valid only when the number of antennas at Alice,Bob,and Eve approached infinity.

    In Sibomana et al.(2015),Zhu FC and Yao(2016),and Hu et al.(2018),PLS techniques were investigated for CR systems,assuming a pair of PU transceivers and a pair of secondary user transceivers coexisting with a malicious eavesdropper.Therein,the transmitters sent their own confidential messages to intended receivers in case of being overheard by eavesdroppers,and kept the mutual interference below a tolerable threshold.To this end,different interference metrics were chosen as the subjection for this secrecy rate optimization problem,e.g.,the outage probability constraint for the PUs (Sibomana et al.,2015),interference power constraint for the PUs (Hu et al.,2018),and lower-bound signal-tointerference-plus-noise ratio (SINR) constraint for the PUs along with the upper-bound SINR constraint for eavesdroppers (Zhu FC and Yao,2016).In addition,prior knowledge of CSI is crucial for PLS technology.In Pei et al.(2010),the underlaid secrecy rate for a multi-input single-output singleeavesdropper (MISOSE) wiretap channel was deduced assuming that perfect CSI of all users was known at Alice.The worst-case secrecy rate for a multi-input multi-output multi-eavesdropper(MIMOME)wiretap channel,assuming that perfect CSI of all users was known at Alice,was derived in Fang et al.(2016) and Hu et al.(2018).Previous works have focused mainly on the secrecy capacity under the perfect assumption of the eavesdropping channels,which would lead to an optimistic estimation of the secrecy rate and cause an information leakage issue in practical IIoT systems.

    1.3 Our contributions

    Due to the passive nature of the eavesdropping devices,only partial or no channel knowledge can be harnessed to design and optimize the considered secrecy communications of the underlaid CR systems.Specifically,a novel PLS optimization framework is investigated assuming the constrained eavesdropper’s location,which potentially improves the achieved secrecy rate while leveraging the practical location constraint.To further disrupt the information received at Eve,the confidential signal and AN are jointly precoded in the eigenspace of the channel matrix and randomly superimposed at Eve,while satisfying the interference constraint at the PU.Our main contributions are summarized as follows:

    1.We consider a realistic underlaid secrecy CR system,where the C-MIMO transceivers coexist with a PU and the eavesdroppers can appear at multiple possible locations in the network.This is useful to relax the “anywhere Eve” assumption adopted in other works(Goel and Negi,2008;Zhou and McKay,2010;Zhu Y et al.,2013;He and Yener,2014),and the considered framework can take into account the practical constraints of the system topology.Specifically,if there exists an area around Alice guaranteed to be free of an eavesdropper,the signal and AN can be optimized assuming that Eve is outside the eavesdropper-free region and is located at an arbitrary finite number of sampled locations.

    2.We propose an eigenspace-adaptive precoding (EAP) method for the underlaid C-MIMO system by jointly designing the signal and the AN.The signal and the AN are adaptively transmitted in the eigenspace of the main channel or the null-space of the interference channel according to the interference power constraint at the PU and the CSI of the legitimate channel.Depending on the selected eigenspace,the secrecy rate maximization is re-formulated as two canonical difference convex (CDC) problems,which are then solved by an iterative outer approximation algorithm,where the required average mutual information between Alice and Eve is given by closedform approximation.

    3.To adapt to the low-powered and massively populated device scenario,we simplify the EAP method by adopting uniform power allocation.Specifically,when the null-space AN injection is considered,the original power allocation problem is simplified into a two-variable optimization problem.It is solved by an iterative power allocation algorithm from Lin et al.(2013),which achieves almost the same performance as a brute-force search with much lower complexity.When the null-space of the PU’s channel is considered,the orthogonal subspace projection method is adopted to improve the information rate of the legitimate channel by aligning the sub-null-space of the PU channel with the eigenspace of the main channel,which is also solved by the iterative power allocation algorithm.

    2 System model

    As shown in Fig.2,we consider a secondary C-MIMO system betweenKclustered transmit nodes and a receive node,where the transmit cluster has a head node at the center and the cluster radius isr.The transmit cluster is referred to as Alice and the receiver is referred to as Bob,where each transmit node is equipped with a single antenna and the receive node is equipped withNBantennas.The distance between the head of Alice and Bob is denoted byb0.The secret messages from the transmit cluster can be intercepted by Eve,which is equipped withNEantenna elements(NE≥1)and is located outside a predefined eavesdropper-free region.In addition,we assume that a PU (PU refers to the PU receiver mentioned in the introduction,that is,the receiver of the primary user) equipped withNPreceive antennas at a distance ofp0from the head of Alice can overhear the underlaid transmissions,which is regarded as an unnecessary interference toward the PU.

    Fig.2 Mathematical model of a C-MIMO underlaid CR system with a location-restricted region for Eve around transmitters (C-MIMO: cooperative multiinput multi-output;CR: cognitive radio).The possible locations of Eve are along the contour of the region

    The transmit head node is responsible for precoding the information and conveys the encoded signals to the transmit cluster members.Similar to Zheng Z and Haas (2017),we assume that the necessary cooperation signaling is perfectly exchanged among transmitters without delay.The fundamental limit of the information rate between the transmit cluster and the receiver is given by the Shannon rate of the distributed MIMO channel(Ozgur et al.,2013).In addition,we focus on the physical layer security of the communication between Alice and Bob,while we assume that the security of the intracluster cooperation within Alice can be guaranteed relatively easily.This is because the communication links have a shorter range and therefore could provide higher channel capacity.

    2.1 Channel model

    Consider a transmit vectorx=[x1,x2,...,xK]T,wherexk(k=1,2,...,K) denotes the transmitted symbol from thekthtransmit node of Alice.The receive vectors of Bob,PU,and Eve at theithlocation are denoted asy=[y1,y2,...,yNB]T,u=respectively,whereyn,un,andzi,ndenote the receive symbols at thenthreceive antenna of Bob,PU,and theithEve,respectively.The vectorsy,u,andziare expressed as

    whereLis the number of possible locations of Eve.The matrix entryHn,kon thenthrow andkthcolumn ofHdenotes the channel coefficient between thekthtransmitter and thenthreceiver,i.e.,similarly,As the antenna elements at Bob are co-located,the legitimate channel between Alice and Bob can be written as

    whereLdenotes the fast fading coefficients,modeled as an independent and identically distributed(i.i.d.) standard complex Gaussian random matrix,i.e.,L~CN(0,I).TheK × Kdiagonal matrixΩ=diag(ω1,ω2,...,ωK)denotes the average channel gains with thekthdiagonal entry being

    wherebkdenotes the distance between thekthtransmitter of Alice and Bob,αis the path-loss exponent,andcpis the path loss at the unit distance.Similarly,the channel between Alice and Eve at theithlocation can be written as

    whereWi~CN(0,I).TheK×Kdiagonal matrixΣi=diag(σi,1,σi,2,...,σi,K) denotes the average channel gains with thekthdiagonal entry being

    whereei,kdenotes the distance between thekthtransmitter and theithEve.The channel matrix between Alice and the PU is represented as

    whereMis a standard complex Gaussian random matrix and the diagonal matrixΘ=diag(θ1,θ2,...,θK) denotes the average channel gains with thekthdiagonal entry being

    wherepkdenotes the distance between thekthtransmitter and the PU.In addition,cpandαare assumed to be the same as those of Eve’s channel.The additive noisesnB,nP,andnEat Bob,PU,and Eve are modeled as i.i.d.complex Gaussian vectors with normalized power,i.e.,nB~CN(0,),nP~CN(0,),andnE~I(xiàn)n this study,we assume thatH,Fi,andGall follow block fading processes.In addition,the instantaneous CSI ofHis known by Alice and Bob,while the instantaneous CSI ofGis known by Alice and the PU.However,only the statistical CSI ofFi,depending on the number of receive antennas at Eve and the location of Eve,could be acquired by Alice by evaluating the worst-case scenario;i.e.,NEis set to the maximum number of antennas allowed at Eve and Eve’s locations are along the contour of the eavesdropper-free region,as shown in Fig.2.

    2.2 Signal model with artificial noise injection

    The wiretap channel (Eqs.(1)–(3)) with multiple possible locations of Eve can be modeled as the compound wiretap channel(Bloch and Laneman,2013).With CSI available at the receivers,the following secrecy rate is achievable:

    where [x]+=xforx ≥0 and 0 otherwise.We denoteI(a;b1,b2)as the mutual information between the random variableaand the random variablesb1,b2.The outer optimization in Eq.(10) is taken overp(x),the probability distribution ofx.By following similar arguments in Lin et al.(2013),the mutual informationI(x;zi,Fi)is calculated as

    where the first equality is due to the chain rule of mutual information,and the second equality is obtained because the block fading channelFiis independent ofx.

    To achieve rate maximization through optimizing the probability distributionp(x) is still an open problem for generic MIMO wiretap channels.To proceed,we adopt the widely used Gaussian signaling applied in other works (Goel and Negi,2008;Zhou and McKay,2010;Zhang et al.,2013;Zhu Y et al.,2013;He and Yener,2014;Zheng TX et al.,2015;Wang et al.,2016),wherexis a multivariate Gaussian vector.In addition,to obscure the information reception by Eve,AN is injected by Alice along with the information symbols.The transmitted symbolxis the sum of the precoded information and AN,i.e.,

    wheres~CN(0,IK) anda~CN(0,IK) are the information symbols and AN,respectively.The nonnegative diagonal matrixΨx0 (x ∈{s,a}) denotes the power allocation,where thekthdiagonal elementψx,k ≥0 is the power allocated to thekthtransmit antenna.Moreover,to reflect the lowpower characteristic of the considered IIoT scene,we set 0≤≤Γs(k=1,2,...,K),whereΨp=VsΨsV?s +VaΨaV?a (?denotes the conjugate transpose operation for a matrix)andΓsdenotes the maximum transmit power of a single antenna.The spatial precoding matrixVx(x ∈{s,a}) maps the symbols to the transmit antennas.To improve the worst-case secrecy rate under the constraint of the total power at Alice and the interference power at the PU,we design the transmit signal to be able to flexibly choose the underlying eigenspace according to the problem constraints,i.e.,the EAP method,where the precoder is selected from the following two sets of eigenvectors:

    1.Eigenspace precodingVH

    LetVs=Va=VHand the columns ofVHare the right singular vectors of the main channelH;i.e.,Hhas the singular value decompositionH=Note that the null-space AN injection in other works (Goel and Negi,2008;Zhou and McKay,2010;Zhang et al.,2013;Zhu Y et al.,2013;Zheng TX et al.,2015)can be viewed as a special case of Eq.(12),whereVsandVaare chosen as the orthogonal sub-spaces ofVH,i.e.,=0.Therefore,the precoder structure(Eq.(12))is more general than the null-space AN injection,which can be realized by Eq.(12)by properly setting the power allocation variablesψx,k=0.

    2.Null-space precodingVG

    To avoid the interference toward the PU,the signal and AN can be precoded in the null-space of the interference channelG,i.e.,Vs=Va=VG,whereGVG=0.The columns ofVGcan be selected as the right singular vectors of the interference channel corresponding to the zero singular values.Note that this precoding scheme further requires that the number of transmitters be larger than the number of antennas at the PU,i.e.,K ≥NP.

    Accordingly,following the above two eigenvector precoding schemes,the transmit signal of the proposed EAP can be written as

    whererdenotes the number of zero singular values of the interference channelG.According to Eq.(13),we can improve the secrecy rate of the underlaid secrecy CR system by jointly optimizing the power allocation vectors and the eigenspace selector.The eigenspace selection will be specifically discussed in Section 3.2.

    2.3 Problem formulation

    According to Eq.(10),the secrecy rate under a pair of fixedΨsandΨacan be explicitly written as

    whereRBandRE,iare the information rates of the main and theitheavesdropping channel,respectively.As the main channel (Eq.(1)) and the eavesdropping channel(Eq.(3))are Gaussian MIMO channels,these information rates with AN injection follow the well-known MIMO channel capacity in Chiurtu et al.(2001)as

    By denotingXas a multi-column selection matrix andYas aK ×Kpositive semi-definite Hermitian matrix,the information rate of Bob(fB)and that of Eve (fE,i)are separately defined as

    To balance the underlaid secrecy rate and the interference at the PU,the objective function is designed to maximize the worst-case secrecy rate in the underlaid communication system while subject to both the total power constraint at Alice and the interference power constraint at the PU.We optimize the worst-case underlaid secrecy rate by jointly optimizing the power allocation vectors of information symbols and AN,and the eigenspace selector of the precoder,i.e.,{S,Ψs,Ψa}.Accordingly,the optimization problem in our proposed underlaid secrecy CR network can be written as

    whereΨp=and tr(·) denotes the trace of a matrix.Constraint (20b) is due to the maximum transmit powerΓsof a single antenna imposed by Alice,and constraint(20c)is due to the fact that the maximum interference received at the PU should be below a given thresholdΓI.

    Compared with Eq.(10),the secrecy rate(Eq.(20))is suboptimal due to the Gaussian signaling and the specific precoder structure (Eq.(13)).However,optimization problem (20) can be solved relatively easily and the numerical results in Section 6 will show that substantial secrecy rates can still be achieved.In the next section,we present an approximate closed-form expression for the average ratesRE,iand the optimization framework to solve problem(20).

    3 Secrecy rate maximization under eigenspace-adaptive precoding

    3.1 Approximation of the ergodic information rate for eavesdropping channels

    In the literature,the functionfE(Ψ) is the ergodic capacity of Rayleigh MIMO channels with transmitter-side correlationT=Note that we ignore the subindexiwhenever it is clear from the context.The expression offE(Ψ) (e.g.,Eq.(123) in Simon et al.(2006)) depends on the eigenvalues ofT.For a matrix with arbitrary dimension,there does not exist a closed-form expression of its eigenvalues,so one must resort to numerical and iterative routines.WhenfE(·) is used in optimization problem (20),the relevant algorithm typically starts from an initial valueT0and approaches the optimal solution via a sequence of iterations,sayingT1,T2,...,Ta.Therefore,one must calculate all the eigenvalues ofT0,T1,...,Ta,which requires prohibitively more computational resources.

    To address this issue,we approximate the information rate between Alice and Eve as

    Here,Zis a diagonal matrix,Φis a random unitary matrix,and each instance ofΦis drawn uniformly and randomly from the Haar measure (Sternberg,1995).The expectation in Eq.(22)is taken over bothWandΦ.ComparingwithfE(·) in Eq.(19),we replace the unitary matrixwith a random Haar unitary matrixΦ,and apply Jensen’s inequality.

    Fig.3 compares the approximate mutual informationbetween Alice and theithEve calculated in Eq.(21) with the exact mutual informationRE,iin Eq.(17) withK=N=4 andM=2,using randomly chosen power allocationsΨsandΨa.The locations of transmitters are as shown in Fig.2 and the location of theithEve is set to(ei,0).By increasing the cluster radiusr,the radial distances of the transmitters are proportionally increased.We generate 104realizations of the precoding matrixVH,and plot one standard deviation above and below the expectation ofRE,iaveraged overVH.Fig.3 shows that approximation (21) tends to over-estimate the exact rateRE,i,which is favorable in the context of secrecy communications because it prevents setting a code rate higher than the achievable rate obtained by Eq.(20).Additionally,because the legitimate channel given by Eq.(4) and the PU channel given by Eq.(8)have the same formulation,the numerical simulations of the exact rateRE,iby using the precoderVGare therefore identical to those ofRE,iby using the precodingVH,if these two channels have the same configuration.Therefore,we omit the comparison betweenRE,iachieved by theVGprecoding and

    Fig.3 Comparison of approximation (21) with Eq.(17) using randomly generated power allocations Ψs and Ψa

    3.2 Eigenspace-adaptive precoding architecture and the decomposed problem formulation

    According to Eq.(22),the information rate of the wiretap channel is approximated by substituting the channel eigenspace vectorVxby a random unitary matrixΦ;thus,the precodersVHandVGcan achieve the same approximated information rate at the eavesdroppers.Accordingly,substitutingRE,iin Eq.(15) by Eq.(21),it is observed that the secrecy rateRsof the C-MIMO system achieved by precodersVHandVGcan be simply analyzed by only comparing theRBachieved by theVHandVGprecoding methods.

    Inspired by the observations above,we propose an EAP architecture,in which the original optimization problem (20) is decomposed into two sub-problems,i.e.,the optimization of eigenspace selectorSand the optimization of the power allocation vectors{Ψs,Ψa}.First,we solve theSoptimizing sub-problem by fixingΨsandΨa.Herein,Ψa=0 andΨs=Ψwfare given,whereΨwfis the solution of the water-filling power allocation algorithm by optimizingΨsinRBonly,i.e.,Ψwf=arg maxΨs0RB(S,Ψs,0),subject to tr(Ψs)≤Γs.Therefore,theS-optimizing sub-problem can be written as

    4 Difference convex program and iterative outer approximation method

    The first term is independent of the indexiand can be pulled out of the maximization in Eq.(39),thus becoming

    As maximization and summation of a finite number of functions are convex-preserving,bothp(x)(·) andq(x)(·) are convex.Next,we introduce the auxiliary variablestandssuch that

    wheret ≤0 andsis real.Inequality (44) can be rewritten as the following system of inequalities:

    Comparing inequality (43) with Eq.(40),instead of maximizingdirectly,we can alternatively minimize the auxiliary variablet.Combining the inequality constraints(45)with the power constraint in inequality (32b) and the interference constraint in inequality (32c),while assuming eigenspace precoderVH,the secrecy rate maximization (32),withreplaced by its approximationis equivalent to the CDC program(Horst and Tuy,1996)given as follows:

    On the other hand,using the null-space precoderVG,the secrecy rate optimization problem becomes

    where the tuplew={Ψa,Ψs,s,t}and we denotetw ≡t.

    Both problems (46) and (47) can be solved by the iterative outer approximation method (Horst and Tuy,1996),as collectively outlined in Algorithm 1.For notational convenience,we denote the setsH(x)={w:h(x)(w)≤0},G(x)={w:g(x)(w)≥0},and?G(x)={w:g(x)(w)=0}as the boundary ofG(x).The boundary?G(x)can be determined by linear interpolation between an inner pointx(x ∈G(x)) and an outer pointv(vG(x)),whereg(x)(x)>0,g(x)(v)<0,andtv <min{tw:w ∈H(x)∩G(x)}.An example of such an outer pointvcan be found by settingΨs=Ψwf,Ψa=0,and

    Denoteπ(x)=vx+(1-v)v(0<v <1)as the intersection point between the line segment [x,v] and the boundary?G(x),i.e.,g(x)(π(x))=0.Becauseg(x)(·) is convex,π(x) can be uniquely obtained by an univariate convex minimization min{v:π(x)∈G(x)}.In the initialization of Algorithm 1,the inner pointw0can be determined by running an algorithm to solve the convex maximization problem max{g(x)(x) :x ∈H(x)}until a feasible pointx0is found,if it exists.We then set the initial statew0=π(x0).

    Because the monomialt ≤0 andg(x)(w)≥0(Horst and Tuy,1996,Lemma X.2),the CDC problems(46)and(47)are stable in the sense of Def.X.1 in Horst and Tuy(1996).Therefore,the convergence of Algorithm 1 can be easily guaranteed(Horst and Tuy,1996,Prop.X.3).Note that Algorithm 1 may require infinite iterations to converge to the global optimal solution.Therefore,a relaxation parameter∈≥0 is introduced (line 5),which provides a tradeoffbetween optimality and complexity.Specifically,∈=0 corresponds to the global optimal solution of problem(46)or(47).

    In addition,we present the computational complexity analysis of the presented iterative outer approximation method.The complexity is composed of two parts,i.e.,the complexity of solving the subproblem(line 4)and the complexity of acquiring the optimal interpolation factorv(line 6).Because the sub-problem (line 4) has been verified to be convex,it is solved using the inner point method (IPM) in the CVX toolbox.According to the arithmetic complexity of the linear programming by IPM shown in Ben-Tal and Nemirovski (2001),the complexity of the power allocation sub-problem (line 4) is scaled asO((3K+6)3/2(2K+2)2),whereKis the number of transmitting nodes of Alice.Similarly,the complexity of solving the optimal interpolation subproblem(line 6)isO((m+n)3/2n2)withn=1 andm=1,which can be neglected.We denoteTas the number of iterations of Algorithm 1 under the relaxation parameter∈.Therefore,while retaining only the highest-order term,the overall complexity of solving this CDC problem can be scaled asO(T K3.5).

    5 Underlaid secure precoding for the large-dimensional C-MIMO system

    As we all know,the large number of connections is one of the crucial characteristics of IIoT.However,the complexity of the proposed EAP method exponentially increases with the increase of the transmit nodes,which is not adaptive to the large-dimensional scenario.Therefore,we further consider designing a simplified version of the EAP method for the largedimensional underlaid C-MIMO system by adopting uniform power allocation,where the precoder is selected from the two sets of eigenvectors:

    1.Null-space AN injection precoding

    Therefore,optimization problem (32) can be reformulated as

    Therefore,optimization problem (38) can be reformulated as

    Although we have simplified optimization problems (32) and (38) by adopting the fixed precoding and uniform power allocation method,it is observed that optimization problems (51) and (55) are still non-convex stochastic ones,for which it is difficult to determine an optimal analytical solution.Instead,we adopt an iterative power allocation algorithm from Lin et al.(2013),which achieves almost the same performance as brute-force search with much lower complexity.

    6 Numerical results

    In this section,we study the achievable average secrecy rate of the C-MIMO system under both the single antenna power constraint and the interference power constraint toward the PU.A guaranteed minimum distancee0is introduced between Alice’s head node and any possible location of Eve.To simplify this system,let all the possible locations of Eve be evenly placed on a circle with radiuse0centered at the transmit head node;i.e.,in Eq.(7) we sete1,1=e1,2=···=eL,1=e0.We first simulate the EAP method in a scenario where the legitimate channel does not have the null-space(case 1),i.e.,K=4,NB=4,NE=2,andNP=2.Then we assume that the legitimate channel has the orthogonal null-space(case 2),i.e.,K=4,NB=2,NE=2,andNP=2.In cases 1 and 2,the single antenna power constraint isΓs=23 dBm.Additionally,the performance of the low-powered and large-dimensional C-MIMO system is evaluated (case 3),i.e.,K=64,NB=4,NE=2,andNP=2.In case 3,the single antenna power constraint isΓs=13 dBm.

    Fig.4 shows the average secrecy rate of the CMIMO system achieved by theVH,VG,and EAP methods with the AN injection in case 1 whene0=10 m,r=3 m.It is observed that the proposed EAP method outperforms both theVHandVGmethods.Specifically,when the interference constraint dominates the problem,e.g.,ΓI=-25 dBm,the EAP method can improve the secrecy rate by about 0.25 nats/(s·Hz)compared to theVHmethod.Meanwhile,when the single antenna power constraintΓsdominates the problem,e.g.,Γs=23 dBm andΓI=-15 dBm,the EAP method can improve the secrecy rate by about 1.2 nats/(s·Hz) compared to theVGmethod.Therefore,the proposed EAP method can adaptively choose an eigenspace that achieves a better secrecy rate than theVHandVGmethods.

    Fig.4 Average secrecy rate of the C-MIMO system via the VH, VG,and EAP schemes with AN injection under different interference power constraints ΓI when K=4, NB=4, NE=2, NP=2, r=3 m, e0=10 m,and Γs=23 dBm (AN: artificial noise;C-MIMO: cooperative multi-input multi-output;EAP:eigenspaceadaptive precoding)

    Fig.5 shows the cumulative distribution functions (CDFs) of the secrecy rates of the C-MIMO system via the EAP method in case 1 whenr=3 m ande0=10 m.The interference power constraint isΓI=-25,-20,and-15 dBm.Results show that the EAP method can eliminate the secrecy outage under different interference constraints,and that the gain benefits from the AN injection are limited when the interference power is rigorously constrained.Additionally,the fluctuation caused by random propagation fading increases with the relaxation of the interference power constraint.

    Fig.5 CDFs of the C-MIMO system secrecy rate via EAP when K=4, NB=4, NE=2, NP=2, r=3 m,e0=10 m,and Γs=23 dBm (CDFs: cumulative distribution functions;C-MIMO: cooperative multi-input multi-output;EAP: eigenspace-adaptive precoding)

    Fig.6 shows the CDFs of the secrecy rates via the EAP method in case 1 whenr=3 m,ΓI=-15 dBm,ande0=6,8,and 10 m.Results show that with the increase ofe0,the secrecy rate increases and the performance gain of AN gradually decreases.Moreover,the EAP method with AN injection can fully eliminate the secrecy outage even when the eavesdroppers are distributed on a circle around the transmit cluster with a radius ofe0=6 m.

    Fig.6 CDFs of the C-MIMO system secrecy rate via EAP when K=4, NB=4, NE=2, NP=2, r=3 m,Γs=23 dBm,and ΓI=-15 dBm (CDFs: cumulative distribution functions;C-MIMO: cooperative multi-input multi-output;EAP: eigenspace-adaptive precoding)

    Fig.7 shows the CDFs of the secrecy rates via the EAP method in case 1 whene0=10 m,ΓI=-15 dBm andr=1,3,and 5 m.Results indicate that the EAP method can eliminate the secrecy outage even whenr=1 m;i.e.,the cooperative nodes are densely packed together.To further clarify the effect of the distributed node topology and Eve’s distribution on the secrecy rate,Fig.8 shows the average secrecy rates under different configurations ofrande0,showing that the secrecy rate increases with the increase of the cluster radiusr.Furthermore,it is observed that AN injection achieves the maximum gain atr=5 m ande0=8 m,which demonstrates that AN injection can achieve better secrecy gain when the eavesdropper is closer to the distributed nodes.

    Fig.7 CDFs of the C-MIMO system secrecy rate via EAP when K=4, NB=4, NE=2, NP=2, e0=10 m,Γs=23 dBm,and ΓI=-15 dBm (CDFs: cumulative distribution functions;C-MIMO: cooperative multi-input multi-output;EAP: eigenspace-adaptive precoding)

    Fig.8 Average secrecy rate of the C-MIMO system via EAP under different distributed radius r and different eavesdropper-free region e0,when K=4, NB=4, NE=2, NP=2, Γs=23 dBm,and ΓI=-15 dBm (C-MIMO: cooperative multi-input multi-output;EAP: eigenspace-adaptive precoding)

    Fig.9 shows the average secrecy rates via theVH,VG,EAP,and generalized AN-aided precoding(Lin et al.,2013) methods in case 2.In Lin et al.(2013),assuming that the perfect CSI of the legitimate channel and only the statistics of the eavesdropper’s channel are known at the transmitter,the optimal structure of the precoding is derived.Therein,the power of AN is divided into two parts;one is injected into the same eigenspace as the signal and the other is uniformly injected into the null-space of the legitimate channelH.Results show that the proposed EAP method outperforms the other methods when the interference power constraint dominates the problem and achieves almost the same performance as the optimally structured AN-aided precoding method(Lin et al.,2013)when the single antenna power constraint dominates the problem.

    Fig.9 Average secrecy rate of C-MIMO system via different AN-aided precoding methods when K=4,NB=2, NE=2, NP=2, r=3 m, e0=10 m, Γs=23 dBm,and ΓI=-15 dBm (AN: artificial noise;C-MIMO: cooperative multi-input multi-output)

    Fig.10 shows the average secrecy rates via theand EAP methods in case 3,i.e.,the low-powered and large-dimensional C-MIMO system.Therein,the single antenna power constraint is set toΓs=13 dBm and the interference constraintΓIis set from-15 to-5 dBm.Results indicate that the large-dimensional C-MIMO can significantly increase the secrecy rate in this underlaid CR system.Similarly,the proposed simplified EAP method for the large-dimensional C-MIMO system can adapt to the more superior eigenspace and achieve a better secrecy rate than both themethods.

    Fig.10 Average secrecy rate of the large-dimensional C-MIMO system via , ,and the simplifeid EAP methods when K=64, NB=4, NE=2, NP=2,r=3 m, e0=10 m,and Γs=13 dBm (C-MIMO: cooperative multi-input multi-output;EAP: eigenspaceadaptive precoding)

    7 Conclusions

    EAP together with AN-assisted secrecy transmission is considered for a C-MIMO system coexisting with a PU.The design of underlaid secrecy communications exploits the geographical location constraint of the eavesdropper as well as the eigenspace of the channels.Specifically,the eigenvectors are adaptively selected by the transmitter according to the channel conditions.Also,a simplified EAP method is proposed for the large-dimensional C-MIMO system.Numerical results show that the proposed EAP method outperforms the fixed eigenvector precoding method.Moreover,EAP can eliminate the secrecy outage even when the eavesdroppers are located closer to the transmitter.In addition,the simplified EAP method for large-dimensional CMIMO transmission can significantly improve the secrecy rate with low complexity.

    Contributors

    Xinyao WANG and Zhong ZHENG designed the research.Xuyan BAO and Yuzhen HUANG processed the data.Xinyao WANG and Zhong ZHENG drafted the paper.Zesong FEI helped organize the paper.Xuyan BAO,Yuzhen HUANG,and Zesong FEI revised and finalized the paper.

    Compliance with ethics guidelines

    Xinyao WANG,Xuyan BAO,Yuzhen HUANG,Zhong ZHENG,and Zesong FEI declare that they have no conflict of interest.

    Data availability

    The data that support the findings of this study are available from the corresponding author upon reasonable request.

    成人午夜高清在线视频 | 91麻豆精品激情在线观看国产| 久久久精品欧美日韩精品| 免费看十八禁软件| 可以免费在线观看a视频的电影网站| 国产又黄又爽又无遮挡在线| 欧美日韩精品网址| 一a级毛片在线观看| 成在线人永久免费视频| 在线av久久热| 久久精品国产综合久久久| 国产成人欧美| 日韩三级视频一区二区三区| 后天国语完整版免费观看| 国产精品 欧美亚洲| 日韩欧美国产在线观看| 色综合站精品国产| 欧美日本亚洲视频在线播放| 亚洲真实伦在线观看| 91成人精品电影| 日韩国内少妇激情av| 精品国内亚洲2022精品成人| 国产亚洲av嫩草精品影院| 国产精华一区二区三区| 在线观看日韩欧美| cao死你这个sao货| 精品国产乱码久久久久久男人| 免费女性裸体啪啪无遮挡网站| 一夜夜www| 亚洲黑人精品在线| 男人操女人黄网站| 非洲黑人性xxxx精品又粗又长| 精品一区二区三区四区五区乱码| 成年人黄色毛片网站| 女警被强在线播放| e午夜精品久久久久久久| 精品欧美一区二区三区在线| 黑人欧美特级aaaaaa片| 一本综合久久免费| 日韩国内少妇激情av| 精品卡一卡二卡四卡免费| 国产99久久九九免费精品| 制服人妻中文乱码| 人人澡人人妻人| 亚洲精品av麻豆狂野| 中文字幕精品免费在线观看视频| 亚洲专区字幕在线| 变态另类成人亚洲欧美熟女| 夜夜看夜夜爽夜夜摸| 999精品在线视频| 最好的美女福利视频网| 丰满的人妻完整版| 1024香蕉在线观看| 成人手机av| 久久国产精品人妻蜜桃| 每晚都被弄得嗷嗷叫到高潮| 久久久久久久午夜电影| 国产视频内射| 色老头精品视频在线观看| 国产av在哪里看| 亚洲人成77777在线视频| 人人妻人人澡人人看| 国产激情欧美一区二区| 亚洲精品在线观看二区| 欧美日韩亚洲综合一区二区三区_| 99热6这里只有精品| 在线国产一区二区在线| 国产真人三级小视频在线观看| 欧美激情高清一区二区三区| www.精华液| 亚洲av五月六月丁香网| 国产欧美日韩一区二区三| 18美女黄网站色大片免费观看| www.熟女人妻精品国产| 亚洲三区欧美一区| 亚洲成av片中文字幕在线观看| 俄罗斯特黄特色一大片| 午夜福利18| 国产精品野战在线观看| 亚洲欧洲精品一区二区精品久久久| 欧美成人免费av一区二区三区| 欧美久久黑人一区二区| 波多野结衣巨乳人妻| 美国免费a级毛片| 国语自产精品视频在线第100页| 亚洲中文字幕日韩| 人人妻人人澡欧美一区二区| 一a级毛片在线观看| 国产av不卡久久| 午夜亚洲福利在线播放| 久久久久九九精品影院| 国产熟女午夜一区二区三区| 首页视频小说图片口味搜索| 观看免费一级毛片| 精品一区二区三区视频在线观看免费| 亚洲中文av在线| 无人区码免费观看不卡| www日本在线高清视频| 午夜福利欧美成人| a级毛片在线看网站| 精品一区二区三区av网在线观看| www日本在线高清视频| 亚洲片人在线观看| 欧美色视频一区免费| 可以在线观看毛片的网站| 国内少妇人妻偷人精品xxx网站 | 国产在线观看jvid| 高清毛片免费观看视频网站| 亚洲中文日韩欧美视频| 国产不卡一卡二| 免费人成视频x8x8入口观看| 黄色a级毛片大全视频| 欧美一区二区精品小视频在线| 亚洲中文av在线| xxxwww97欧美| 少妇 在线观看| 免费电影在线观看免费观看| 日本一区二区免费在线视频| 757午夜福利合集在线观看| 久久99热这里只有精品18| 又大又爽又粗| 亚洲av中文字字幕乱码综合 | 一卡2卡三卡四卡精品乱码亚洲| 亚洲最大成人中文| 在线免费观看的www视频| 一本一本综合久久| 9191精品国产免费久久| 久久婷婷人人爽人人干人人爱| 在线观看午夜福利视频| 色播在线永久视频| 国产蜜桃级精品一区二区三区| 丝袜人妻中文字幕| 精品久久久久久久人妻蜜臀av| 亚洲全国av大片| 久久人妻福利社区极品人妻图片| 国产亚洲欧美精品永久| 国产精品99久久99久久久不卡| 色在线成人网| 欧美黑人精品巨大| 男女那种视频在线观看| 一本大道久久a久久精品| 国产精品1区2区在线观看.| 午夜视频精品福利| 国产av一区二区精品久久| 国产亚洲精品久久久久5区| av福利片在线| 精品久久久久久成人av| 夜夜躁狠狠躁天天躁| 一级毛片女人18水好多| 亚洲av五月六月丁香网| 人人妻人人澡欧美一区二区| 波多野结衣高清作品| av视频在线观看入口| 可以在线观看的亚洲视频| 日韩欧美国产在线观看| 好看av亚洲va欧美ⅴa在| 亚洲成人免费电影在线观看| 国产真人三级小视频在线观看| 午夜福利在线观看吧| 高潮久久久久久久久久久不卡| 自线自在国产av| 黄频高清免费视频| 看免费av毛片| 村上凉子中文字幕在线| 桃红色精品国产亚洲av| 亚洲国产日韩欧美精品在线观看 | 亚洲人成伊人成综合网2020| 变态另类成人亚洲欧美熟女| 日韩三级视频一区二区三区| 国产成人啪精品午夜网站| 欧美日韩黄片免| 成人亚洲精品一区在线观看| www.熟女人妻精品国产| 亚洲精品一区av在线观看| av视频在线观看入口| 国产精品一区二区免费欧美| 国产在线观看jvid| 欧美日韩福利视频一区二区| 熟妇人妻久久中文字幕3abv| 99精品欧美一区二区三区四区| 国产成人一区二区三区免费视频网站| 777久久人妻少妇嫩草av网站| 深夜精品福利| 欧美一级毛片孕妇| 亚洲 国产 在线| 叶爱在线成人免费视频播放| 国产亚洲欧美98| 亚洲欧洲精品一区二区精品久久久| 给我免费播放毛片高清在线观看| 亚洲欧美激情综合另类| 制服人妻中文乱码| 亚洲av五月六月丁香网| 中文资源天堂在线| 国产精品电影一区二区三区| 日韩中文字幕欧美一区二区| 国产高清激情床上av| 中文字幕另类日韩欧美亚洲嫩草| 免费在线观看亚洲国产| 丁香六月欧美| 亚洲成人久久性| 日韩三级视频一区二区三区| 久久久久国内视频| 99久久综合精品五月天人人| 韩国av一区二区三区四区| 每晚都被弄得嗷嗷叫到高潮| 亚洲,欧美精品.| 国产精品 国内视频| 美女扒开内裤让男人捅视频| 欧美乱色亚洲激情| 日韩欧美国产一区二区入口| 99在线人妻在线中文字幕| 亚洲五月婷婷丁香| 亚洲国产精品久久男人天堂| 亚洲专区字幕在线| 午夜福利18| 久久中文字幕人妻熟女| e午夜精品久久久久久久| 91在线观看av| 免费看a级黄色片| 中文字幕另类日韩欧美亚洲嫩草| 97超级碰碰碰精品色视频在线观看| 又黄又爽又免费观看的视频| 变态另类丝袜制服| 老司机福利观看| 99久久久亚洲精品蜜臀av| 亚洲欧美一区二区三区黑人| 国产精品野战在线观看| 88av欧美| 国产久久久一区二区三区| 脱女人内裤的视频| 在线视频色国产色| 国产成人一区二区三区免费视频网站| 欧美日韩黄片免| av视频在线观看入口| 成人欧美大片| 国产蜜桃级精品一区二区三区| 午夜激情福利司机影院| 日本黄色视频三级网站网址| 人成视频在线观看免费观看| 欧美乱码精品一区二区三区| 久久香蕉国产精品| 精品久久久久久久久久免费视频| 欧美黑人精品巨大| 91麻豆av在线| 伊人久久大香线蕉亚洲五| 一边摸一边抽搐一进一小说| 不卡av一区二区三区| 亚洲熟妇中文字幕五十中出| 正在播放国产对白刺激| 美女免费视频网站| aaaaa片日本免费| 日本黄色视频三级网站网址| 日本免费a在线| 中文字幕久久专区| 午夜免费观看网址| √禁漫天堂资源中文www| 日韩精品青青久久久久久| 叶爱在线成人免费视频播放| 成年人黄色毛片网站| 日韩三级视频一区二区三区| 国产精华一区二区三区| 人妻久久中文字幕网| 国产伦在线观看视频一区| 国产成人系列免费观看| 亚洲国产精品成人综合色| 中出人妻视频一区二区| 亚洲va日本ⅴa欧美va伊人久久| 亚洲自拍偷在线| 丝袜美腿诱惑在线| 性欧美人与动物交配| 少妇熟女aⅴ在线视频| av欧美777| 18美女黄网站色大片免费观看| 正在播放国产对白刺激| 精品国产亚洲在线| 久久精品影院6| 日韩一卡2卡3卡4卡2021年| 夜夜看夜夜爽夜夜摸| 久久久久久大精品| 美女扒开内裤让男人捅视频| 欧美av亚洲av综合av国产av| 国产精品美女特级片免费视频播放器 | 亚洲美女黄片视频| 午夜免费成人在线视频| 午夜福利18| 国产精品久久视频播放| 成人亚洲精品av一区二区| 亚洲午夜理论影院| 色在线成人网| 亚洲黑人精品在线| 91字幕亚洲| www.熟女人妻精品国产| 欧美日韩瑟瑟在线播放| 国产av一区二区精品久久| 禁无遮挡网站| 精品第一国产精品| 亚洲av成人不卡在线观看播放网| 51午夜福利影视在线观看| 美女扒开内裤让男人捅视频| 九色国产91popny在线| 亚洲成人久久性| 91字幕亚洲| 国产成人精品久久二区二区91| 亚洲国产精品久久男人天堂| 亚洲精品国产区一区二| 国产三级黄色录像| 亚洲黑人精品在线| 99精品在免费线老司机午夜| 婷婷精品国产亚洲av| 一进一出好大好爽视频| 久久久久久人人人人人| a级毛片a级免费在线| 国产成人啪精品午夜网站| 一区二区三区激情视频| 黑人欧美特级aaaaaa片| 国产三级在线视频| 欧美性猛交黑人性爽| 精品久久蜜臀av无| 国产精品亚洲美女久久久| 日韩欧美 国产精品| 欧美日韩亚洲综合一区二区三区_| 少妇裸体淫交视频免费看高清 | 黄色视频,在线免费观看| 午夜久久久在线观看| 最新美女视频免费是黄的| 在线观看66精品国产| 国产精品二区激情视频| 久9热在线精品视频| 欧美乱色亚洲激情| 亚洲国产精品合色在线| 国产一卡二卡三卡精品| 国产熟女午夜一区二区三区| 日日夜夜操网爽| 三级毛片av免费| 亚洲国产精品合色在线| 亚洲久久久国产精品| aaaaa片日本免费| 人人澡人人妻人| 午夜福利18| 欧美日韩乱码在线| a在线观看视频网站| 波多野结衣巨乳人妻| 欧美在线黄色| 国产欧美日韩一区二区三| 国产麻豆成人av免费视频| 看黄色毛片网站| 婷婷精品国产亚洲av在线| 久久精品91无色码中文字幕| 伦理电影免费视频| 欧美日韩黄片免| 欧美在线一区亚洲| 欧美成人免费av一区二区三区| 久久久久久免费高清国产稀缺| 少妇被粗大的猛进出69影院| 亚洲国产精品成人综合色| 国产激情偷乱视频一区二区| 国产精品电影一区二区三区| av在线播放免费不卡| 久久精品国产亚洲av高清一级| 日韩大尺度精品在线看网址| 国产v大片淫在线免费观看| 精品一区二区三区视频在线观看免费| 久久人人精品亚洲av| 国产成人影院久久av| 久久中文字幕人妻熟女| 中文字幕最新亚洲高清| 午夜福利在线在线| 久久久精品欧美日韩精品| 色av中文字幕| 国产午夜福利久久久久久| 69av精品久久久久久| 免费观看精品视频网站| 亚洲专区国产一区二区| 久久久久久大精品| 成人18禁在线播放| 亚洲av日韩精品久久久久久密| 色播亚洲综合网| 国产精品久久久久久人妻精品电影| 国产99久久九九免费精品| 国产av一区二区精品久久| 国产精品自产拍在线观看55亚洲| 亚洲国产精品久久男人天堂| 一区二区三区高清视频在线| 日韩av在线大香蕉| 亚洲精品国产一区二区精华液| 国产乱人伦免费视频| 琪琪午夜伦伦电影理论片6080| 美女 人体艺术 gogo| 一级黄色大片毛片| 久久香蕉精品热| 亚洲av第一区精品v没综合| 亚洲精品av麻豆狂野| 中文资源天堂在线| 久久精品影院6| 欧美另类亚洲清纯唯美| 97碰自拍视频| 久久中文看片网| 一级作爱视频免费观看| 变态另类成人亚洲欧美熟女| 国产一区二区三区在线臀色熟女| 精品久久久久久成人av| 日本一区二区免费在线视频| 国产视频一区二区在线看| 天天添夜夜摸| 男女之事视频高清在线观看| 欧美最黄视频在线播放免费| 欧美黑人精品巨大| 久久久久国产一级毛片高清牌| netflix在线观看网站| 男人舔奶头视频| 日韩有码中文字幕| 熟妇人妻久久中文字幕3abv| 老汉色av国产亚洲站长工具| av视频在线观看入口| 精品免费久久久久久久清纯| 成人一区二区视频在线观看| 亚洲av片天天在线观看| 18禁国产床啪视频网站| 国产成人一区二区三区免费视频网站| 一级a爱视频在线免费观看| 亚洲精品一区av在线观看| 成年人黄色毛片网站| 午夜激情av网站| 亚洲精品国产精品久久久不卡| 国产人伦9x9x在线观看| 免费看a级黄色片| 午夜精品久久久久久毛片777| 日本一本二区三区精品| 男女下面进入的视频免费午夜 | 成人18禁高潮啪啪吃奶动态图| 啦啦啦免费观看视频1| 精品国产乱码久久久久久男人| 久久 成人 亚洲| 无遮挡黄片免费观看| bbb黄色大片| 国产精品99久久99久久久不卡| 国产av一区二区精品久久| 精品午夜福利视频在线观看一区| 成人国产综合亚洲| 日韩欧美免费精品| 美国免费a级毛片| 国产成人系列免费观看| 免费在线观看成人毛片| 成人三级做爰电影| 国产av在哪里看| 无人区码免费观看不卡| 校园春色视频在线观看| 91国产中文字幕| 久久热在线av| 国产高清视频在线播放一区| 黄片大片在线免费观看| 亚洲色图av天堂| 91av网站免费观看| 波多野结衣巨乳人妻| 久久久水蜜桃国产精品网| 久久午夜综合久久蜜桃| 久久精品91蜜桃| 视频在线观看一区二区三区| 老司机在亚洲福利影院| 日韩精品免费视频一区二区三区| 可以免费在线观看a视频的电影网站| 神马国产精品三级电影在线观看 | 久久久久九九精品影院| 欧美日本视频| 亚洲熟妇熟女久久| 亚洲avbb在线观看| 美女大奶头视频| 亚洲国产欧美一区二区综合| 岛国在线观看网站| 国产精品爽爽va在线观看网站 | 一区二区三区激情视频| 久久久国产精品麻豆| 免费在线观看日本一区| 夜夜看夜夜爽夜夜摸| 久久久久国内视频| 亚洲五月色婷婷综合| 精品久久久久久久毛片微露脸| 日日摸夜夜添夜夜添小说| www.999成人在线观看| 国产精品亚洲av一区麻豆| 国产片内射在线| 国产主播在线观看一区二区| 校园春色视频在线观看| 中文字幕人成人乱码亚洲影| 午夜精品久久久久久毛片777| 欧美日韩黄片免| 男人的好看免费观看在线视频 | 精品高清国产在线一区| 久久精品影院6| 亚洲欧美激情综合另类| 国产男靠女视频免费网站| 国产真实乱freesex| 国产午夜福利久久久久久| 欧美日本亚洲视频在线播放| 女警被强在线播放| 好男人电影高清在线观看| 一本久久中文字幕| 日本成人三级电影网站| av在线天堂中文字幕| 久久久久久久久中文| 男人舔女人的私密视频| 麻豆成人午夜福利视频| 国产成人欧美| 真人一进一出gif抽搐免费| 国产精品电影一区二区三区| 美女高潮到喷水免费观看| 午夜久久久久精精品| 国产精品免费一区二区三区在线| 人妻久久中文字幕网| 韩国精品一区二区三区| x7x7x7水蜜桃| 免费看a级黄色片| 无人区码免费观看不卡| 午夜免费成人在线视频| 日本撒尿小便嘘嘘汇集6| 9191精品国产免费久久| 久久中文字幕人妻熟女| 又黄又粗又硬又大视频| 岛国视频午夜一区免费看| 久久热在线av| 美女大奶头视频| 精品日产1卡2卡| avwww免费| 成人18禁在线播放| 又黄又爽又免费观看的视频| 亚洲黑人精品在线| 亚洲va日本ⅴa欧美va伊人久久| 日日干狠狠操夜夜爽| 亚洲无线在线观看| 好看av亚洲va欧美ⅴa在| 欧美日韩乱码在线| 欧美成人免费av一区二区三区| 男女下面进入的视频免费午夜 | 老司机在亚洲福利影院| 久久精品成人免费网站| 亚洲 欧美一区二区三区| 国产精品一区二区三区四区久久 | 夜夜看夜夜爽夜夜摸| 99精品久久久久人妻精品| 国产亚洲精品综合一区在线观看 | a在线观看视频网站| 日本黄色视频三级网站网址| 制服丝袜大香蕉在线| 亚洲午夜精品一区,二区,三区| 亚洲黑人精品在线| 夜夜看夜夜爽夜夜摸| 欧美色视频一区免费| 国产精品98久久久久久宅男小说| 久久久久国内视频| 亚洲精品国产区一区二| 别揉我奶头~嗯~啊~动态视频| 嫩草影视91久久| 成人国语在线视频| 日本成人三级电影网站| 后天国语完整版免费观看| 久久欧美精品欧美久久欧美| 国产成人欧美在线观看| 97人妻精品一区二区三区麻豆 | 在线观看免费视频日本深夜| 巨乳人妻的诱惑在线观看| 高清在线国产一区| 男女床上黄色一级片免费看| 亚洲色图 男人天堂 中文字幕| 好男人电影高清在线观看| 欧美丝袜亚洲另类 | videosex国产| 男男h啪啪无遮挡| 性色av乱码一区二区三区2| 成人国产综合亚洲| 黄片大片在线免费观看| 久久伊人香网站| 一区福利在线观看| 淫妇啪啪啪对白视频| 90打野战视频偷拍视频| 熟女少妇亚洲综合色aaa.| 在线免费观看的www视频| 免费一级毛片在线播放高清视频| 免费看美女性在线毛片视频| 国产亚洲精品综合一区在线观看 | 18禁美女被吸乳视频| 老司机在亚洲福利影院| 91国产中文字幕| www.自偷自拍.com| 桃红色精品国产亚洲av| 黄色成人免费大全| 高清毛片免费观看视频网站| 亚洲欧美精品综合一区二区三区| 成年人黄色毛片网站| 亚洲电影在线观看av| 国产精品自产拍在线观看55亚洲| 日韩精品中文字幕看吧| 91国产中文字幕| 午夜福利在线在线| 国产成人啪精品午夜网站| www.999成人在线观看| 两个人看的免费小视频| 久久久久久大精品| 欧美不卡视频在线免费观看 | 巨乳人妻的诱惑在线观看| 亚洲欧洲精品一区二区精品久久久| 一二三四社区在线视频社区8| av电影中文网址| 国产成人精品久久二区二区91| 日韩国内少妇激情av| 18禁裸乳无遮挡免费网站照片 | 99国产综合亚洲精品| 免费在线观看视频国产中文字幕亚洲| 18美女黄网站色大片免费观看| 国产精品综合久久久久久久免费| 欧美丝袜亚洲另类 | 好男人电影高清在线观看| 热99re8久久精品国产| 久久精品aⅴ一区二区三区四区| 久久人妻av系列| 岛国视频午夜一区免费看|