• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks

    2023-03-12 09:00:56ZekeWuKefengGuoRuiLiuandShibinZhu

    Zeke Wu,Kefeng Guo,Rui Liu and Shibin Zhu

    1School of Space Information,Space Engineering University,Beijing,101416,China

    2College of Electronic and Information Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing,210016,China

    ABSTRACT In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition, the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts, this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance.

    KEYWORDS Covert communication; the integrated HAPS terrestrial network; constant power auxiliary node; artificial noise(AN);effective covert communication rate

    1 Introduction

    The Internet of Things (IoT) is an information carrier based on the Internet and traditional telecommunication networks, which allows all ordinary physical objects that can be independently addressed to form an interconnected network.Nowadays, because the demand for large-scale IoT can not be satisfied by the fifth generation(5G)terrestrial mobile communication,the sixth generation (6G) terrestrial mobile communication development is becoming the general trend.Moreover,over recent years, high altitude platform station (HAPS) has been considered a critical part of the next-generation wireless communication networks for its high altitude, large capacity, flexible communication services, lower communication delay, and smaller terrestrial receiving antenna [1].Without loss of generality, HAPS can be regarded as a “pseudo satellite,” which is viewed as a supplement or substitute for satellites in many scenes [2].In addition, as an exemplary network architecture for future communications, the integrated HAPS terrestrial network has momentous practical significance,which can overcome obstacles and geographical constraints flexibly,compared with the integrated satellite-terrestrial network(ISTN)[3,4].Karabulut Kurt et al.[5]provided a vision and framework for the HAPS networks of the future,including highlighting the unrealized potential of HAPS systems and elaborating on their unique ability to serve metropolitan areas.Liu et al.[6]studied the performance of non-orthogonal multiple access (NOMA)-based integrated satelliteterrestrial relay network(ISTRN)in the presence of multiple primary users(PUs)under a spectrum sharing environment.Shuai et al.[7] investigated the performance of NOMA-based integrated satellite-HAPS-terrestrial networks with transmit antenna selection(TAS)in the presence of imperfect channel state information (CSI) and successive interference cancelation (SIC).Furthermore, the performance of the NOMA-based overlay cognitive integrated satellite-terrestrial relay network with secondary network selection was investigated by Liu et al.[8].The combined effects of channel estimation errors and hardware impairments on the secrecy performance of cognitive integrated satellite-terrestrial relay networks were researched by Guo et al.[9].Moreover,Guo et al.[10]studied the performance of the reconfigurable intelligent surface-assisted integrated satellite-unmanned aerial vehicle (UAV)-terrestrial networks with hardware impairments and interference in the presence of an unavailable direct link.Gao et al.[11] optimized the deployment of an aerial reconfigurable intelligent surface (ARIS) to assist the HAPS down-link transmission when the direct link was blocked.Pace et al.[12]investigated optimal routing issues in a multilayered terrestrial-HAPS-satellite network.The massive access for a satellite-aerial-terrestrial network (SATN) was investigated by Huang et al.[13], where a HAPS was deployed as a relay to assist the uplink transmission from terrestrial user equipment(UE)to satellite.

    However, the openness of wireless communication and the broad coverage of the HAPS beam will lead to a series of security problems,such as channel monitoring,information eavesdropping,and malicious interruption.Generally,many traditional security policies focus on preventing the extraction of information, such as coding encryption or physical layer security technology using information theory.Popovic et al.[14]analyzed and compared the security features of network architectures based on HAPS and satellites by proposing a security comparison method for network architectures that were based on airborne infrastructure.A new selective encryption and decryption framework based on the start code for high-efficiency video coding was proposed by Lee et al.[15].On the other hand, Guo et al.[16] investigated the impacts of joint relay selection and user scheduling scheme on the physical layer security for a hybrid satellite-terrestrial relay system.Yerrapragada et al.[17]analyzed new schemes for securing applications at low latency by extending physical layer security(PLS)algorithms to beyond-5G/6G systems and designed protocols that advanced a specific form of PLS.The PLS performance of a wireless communication link through a large reflecting surface(LRS)with phase errors was analyzed by Vega Sanchez et al.[18].Zhang et al.[19]developed a novel layered physical layer security model to secure multiple messages simultaneously.

    Nevertheless, preventing transmission from being perceived is considered a more direct and effective measure.Compared with the above means,covert communication has more advantages than other security policies,which can prevent transmission content and behavior from being detected by non-cooperative eavesdroppers to solve the problem of information security fundamentally.Based on this, many scientists and engineers have focused on the research of covert communication.Covert communication was first cited in military communications by Prescott et al.[20].Recently, the restriction theory of information transmission was being studied deeply by Bash et al.[21,22].It was proved that to meet the demands of covert communication in the AWGN channel,the transmission power of the transmitter decreased with the increase of codeword length, resulting in a near-zero effective covert communication rate on both sides of legal communication which is meaningless[23].Nevertheless,in the actual wireless communication environment,there are many interference signals which can be used to interfere with the eavesdropper’s communication signal[24].Namely,widespread interference can be used to hide the transmission of information.The interference was firstly proposed to be utilized to realize a positive covert communication by Li et al.[25].Topal et al.[26]provided a physical layer supported defense mechanism against traffic analysis attacks by exploring the covert communication capability of digital modulation schemes.Covert communication between a pair of legitimate transmitter-receiver against a watchful warden over slow fading channels was studied by Zheng et al.[27].Yang et al.[28]considered covert communications having uncertainty about the noise variance in fading channels where an eavesdropper used a radio-meter detector to detect the legitimate signal.Furthermore,Gao et al.[29]studied the performance of covert communication under a scenario consisting of a source-destination pair, a passive warden, and multiple relays.The requirement of information freshness in covert communications was considered for the first time by Wang et al.[30].Su et al.[31]investigated the covert communication performance in relay networks with relay selection.Zhang et al.[32]considered a covert mmWave communication system,where legitimate partiesAliceandBobadopted a beam training approach for directional link establishment.A new framework for jointly characterizing the covertness and timeliness of short-packet communications was developed by Yang et al.[33], in which a new metric named covert age of information (CAoI) was first proposed and derived.Channel uncertainty was exploited to achieve covert communication in relay networks by Wang et al.[34],in which a transmitter sent messages to the legitimate receiver with the help of a relay,and the eavesdroppers wanted to detect the existence of the transmission.

    Inspired by the works mentioned above, this article considers an integrated HAPS terrestrial network with one constant power auxiliary node,a terrestrial eavesdropper,a HAPS as the transmitter,and a terrestrial user as the receiver.Moreover,all nodes are equipped with a single omnidirectional antenna and operate in half-duplex mode.Specifically,the significant contributions of this paper are summarized below:

    1.Firstly,considering the single-user scenario,a novel integrated HAPS terrestrial covert communication network structure is established,and a constant power auxiliary node assists the covert communication between HAPS and the user.

    2.Secondly,considering the actual situation of signal transmission,such as rainfall attenuation and free path loss,the statistical characteristics of the channel are given.In addition,the covert constraints on universal significance are derived.

    3.Thirdly,based on the above,the closed expression of outage probability(OP)under this covert communication network is deduced to obtain more in-depth insights and laws.Furthermore,the index to measure the covert performance named effective covert communication rate is given.

    4.Finally,the numerical simulation results are given further to analyze key parameters’impact on system covert performance.Moreover,the observation results are analyzed in detail.

    2 System Model and Problem Formulation

    As shown in Fig.1, an integrated HAPS terrestrial network is established, which consists of a HAPSA(Alice), a terrestrial userB(Bob), an auxiliary nodeC(Cora)near theA, and a terrestrial eavesdropperE(Eavesdropper).AliceandBobare legal communication parties, andAliceis a transmitter that wants to transmit information to the receiverBoband must be unknown to theEavesdropper.In general,Eavesdropperknows the location ofAliceand tends to detect its transmission behavior.Besides,Corais the jammer deployed byAliceandBob,which constantly emits a constant power of artificial noise (AN).Due to the persistent interference signal in the environment, it is assumed thatEavesdropperknows the existence ofCora.Moreover, all nodes are equipped with a single omnidirectional antenna and work in half-duplex mode.

    Figure 1:System model

    2.1 Channel Model

    In order to get close to realistic transmission scenarios,the impacts of rain attenuation,free space loss,and antenna gain are considered in this system.Thus,the channel coefficient betweeni-thnode andj-thnode is given by

    wheregijis the random channel coefficient of Shadowed-Rician(SR)fading,is the rain attenuation coefficient which undergoes lognormal random distribution,ωijrepresents the free space loss coefficient which is decided by carrier frequency and the distance,ξijdenotes the antenna gain ofi-thnode whileψijis the antenna gain atj-thnode,(ij∈{ae,ce,ab,cb}).

    In Fig.1,all nodes are equipped with a single omnidirectional antenna and work in half-duplex mode.For specific analysis, it is assumed that there are discrete-time channels withNtime slots between each node, and each time slot hasntransmission symbol period or channel uses, which is expressed as the Fig.2.

    Figure 2:N time slot discrete channel

    Moreover,we assume that the channels within the system experience standard SR fading,which means that the channel gain of each time slot remains unchanged but varies independently from onetime slot to another.Based on the above,it can be considered that thehijis modeled by quasi-stationary SR fading, which is a complex Gaussian random variable with 1.Meanwhile, only a downlink time slot is considered in the subsequent analysis of covert communication performance.Finally, it is assumed that the time slots between the nodes are strictly synchronized, and the prior probability ofAliceperforming covert information transmission in each time slot is equal, which is 0.5.

    Besides,following the general assumptions in covert communication theory[22],we assume thatAliceandBobshare a long enough key in advance so thatBobknows the transmission strategy ofAlice,butEavesdropperknows nothing about it.

    2.2 Signal Model

    Regarding a given maximum correct detection probabilityηofEavesdropper,there is a constraint on the average signal-to-noise ratio(SNR)ofAliceandCora.The information transmission process needs to be analyzed first to investigate the constraint relationship between them.And the received signal at userBobcan be given by

    wherek= 1,2,...,nis the symbol subscript in one time slot,αdenotes the path loss coefficient,hij (ij∈{ae,ce,ab,cb})represents the channel fading coefficient,Dijis the node spacing,xaandxcdenotes the complex transmission signal ofAliceandCora,nbis the complex Gaussian white noise received byBobwithnb(k)~PaandPcdenote the transmission power ofAliceandCora,respectively.H1represents Alice sends valid signals to Bob andH0is the opposite.

    Similarly,the received signal ofEavesdroppercan be given by

    whereneis the complex Gaussian white noise received byEavesdropper,andne(k)~

    2.3 Problem Formulation

    In our model, only a single auxiliary node is considered, and the energy detection method is adopted byEavesdropper, which has been proved as the best method in quasi-stationary fading channel[25].

    TheEavesdropperadopts the energy detection method to probe and judge whetherAliceis transmitting the information.Namely,when the average power of theEavesdropper’sreceived signal is larger than the preset energy detection threshold,EavesdropperconsidersAlice, andBobare transmitting signals to each other,and when the average power of theEavesdropper’sreceived signal is less than the preset energy detection threshold,Eavesdropperconsiders that there is no information transmission betweenAliceandBob,which is given by

    Therefore,the error detection ofEavesdroppercan be divided into two categories as

    wherePfais the false alarm probability andPmdis the missed detection probability.

    On the above foundation,the requirements of covert communication can be expressed as

    Furthermore, since the probability density functions of |hae|2and |hce|2are continuous and convergent,whenηis given,the following formulas can be satisfied,which is given by

    where1χn2stands for the noncentralchi-squaredistribution with degrees of freedomn, while2χn2stands for thechi-squaredistribution with degrees of freedomn.

    According to the weak law of large numbers and some mathematical steps,whenσc2≤andnis large enough,we can obtain

    whereλ1<σc2+σe2-θandθis a constant greater than zero.

    Proof.See Appendix A.

    whereλ2>σa2+σc2+σe2+θ.

    By means of(9)and(10),whennis large enough,we can derive

    Moreover,the sufficient conditions of(11)can be expressed as

    whereBCrepresents the complement of setB.

    With the help of(12)and in the light of the different fading conditions involved,we can obtain

    Proof.See Appendix B.

    Then,the following formula can be obtained as

    where Z is the set represents all the conditions in(12)hold together,andθ=according to formula(14).

    Hence,the average error detection ofEavesdroppercan be expressed as

    In conclusion,Aliceis able to meet the requirements of covert communication in(6)by controlling own transmit power,and due to the above formula(7),the covert constraint relationship betweenandis given by

    3 Performance Analysis

    In this section, the statistical properties of SR fading are provided.On this basis, the exact expression of OP for the covert communication in this integrated HAPS terrestrial network is obtained.Besides,we derive the closed-form expression of the effective covert communication rate to measure the system’s covert communication performance.

    3.1 Statistical Properties of Channels

    Firstly,the probability distribution function(PDF)and cumulative distribution function(CDF)of SR fading are obtained.From[35],the PDF ofgijis given by

    Under the situation thatmijis an integer,with the utilizing of[36],1F1(mij;1;δijx)is represented as

    According to(18)and(19),the PDF ofgabcan be re-written as

    3.2 OP

    OP can well evaluate the performance of the system, and in this paper we define the OP as the probability of the instantaneous capacity for any node lower than its excepted capacity.WhenAlicecommunicates withBoblegally,the SNR of the received signal atBobcan be given by

    Assuming that the default coding rate ofAliceisthe OP of transmission betweenAliceandBobwhich is given by

    whereCab=log2(1+γb).

    By substituting(21)into(22),we can obtain the OP as

    whereγth=2?Rab-1.

    Furthermore,the final expression of OP can be derived as

    where

    3.3 Effective Covert Communication Rate

    Effective covert communication rate is also a momentous and more intuitive index in the covert communication system, defined as the average ratio of practical transmission information to the transmission time from transmitter to the receiver under all fading conditions.Finally, the effective covert communication rateRabcan be expressed as

    Furthermore,the final expression of the effective covert communication rate is given by

    4 Numerical Results

    In this section,the critical constraint relationship of average SNR between the transmitting node and the auxiliary node, and the effective covert communication rate of the considered system are proved through MC simulations.In general,we setDab

    -α=Dcb-α=1 and it is assumed thathabandhcbown the same fading condition.In addition,we assume that a certain covert constraint is maintained in different fading channels.The SR fading channel parameters[38]are given by

    · Frequent heavy shadowing(FHS):

    mij=1,bij=0.063,Ωij=0.0007;

    · Average shadowing(AS):

    mij=5,bij=0.251,Ωij=0.279;

    · Infrequent light shadowing(ILS):

    mij=10,bij=0.158,Ωij=1.29.

    Figure 3:Covert constraint of

    Fig.4 depicts the relationship betweenandRabwith setting=20dB.It can be observed thatRabfirst increases and then degrades with the rise of.It is because there is an optimalwhich can be adjusted to obtain the maximum effective covert communication rate.Moreover,a largerηor the more serious fading conditions,which means more loose covert constraints or natural interference,can enhance the effective covert communication rate.

    Figure 4:Rab vs.

    Figs.5 and 6 plot thatRab vs.differentincluding linear and logarithmic forms,which can show different conclusions,respectively.We set the coding rate= 0.1bit/symbol.Under the givenη,it can be found thatRabreaches a stable limit value in high average SNR regimes from Fig.5, whereγbis approximately the proportional coefficient of the average SNR.In addition,it can be observed that the rise of the maximum allowable correct detection probabilityηloses the covert constraints,and a higher effective covert communication rate can be obtained.From Fig.6,we can realize that the worse fading condition in high average SNR regimes will lead to better performance, while the rate under FHS is lower than that under AS or ILS in low average SNR regimes.Due to that,much more serious fading conditions will prominently influence the quality of legitimate transmission service in a low SNR regime.In contrast,the worse channel condition will help implement covert communication easier.

    Figure 5:Rab vs. (linear)

    Figure 6:Rab vs. (logarithm)

    5 Conclusions

    This article systematically investigated the covert constraint and effective performance of covert communication in the integrated HAPS terrestrial networks, which utilized an auxiliary node with constant power.In particular, the covert constraint relationship between the transmitting node and the auxiliary node was discussed.Furthermore, the exact expressions of OP and effective covert communication rate were derived.According to numerical results, we found that the power of the transmitting node and auxiliary node under the covert constraint had a linear relationship.Secondly,the tightening of the covert constraint caused the deterioration of the achievable effective covert communication rate.Thirdly,there was an optimal preset coding rate to obtain the maximum effective covert communication rate.In addition,we knew that it was difficult for theEavesdropperto acquire correct judgment under severe fading conditions, which means natural interference, namely, covert communication, can be realized with less interference of the auxiliary node.Similarly, it was worth noting that the worse fading condition would enhance effective performance in the high average SNR regimes.

    Acknowledgement:Thanks to all the authors for their contributions to this paper.The authors would like to thank the anonymous reviewers for their insightful suggestions that helped us improve this paper’s quality.

    Funding Statement:This work was supported by the National Science Foundation of China under Grant 62001517, in part by the Research Project of Space Engineering University under Grants 2020XXAQ01 and 2019XXAQ05,and in part by the Science and Technology Innovation Cultivation Fund of Space Engineering University.

    Conflicts of Interest:The authors declare that they have no conflicts of interest regarding the publication of this article.

    Appendix A

    Recalling the transmission model,under the condition ofH0,we can obtain

    where1χn2stands for the noncentralchi-squaredistribution with degrees of freedomn, while2χn2stands for thechi-squaredistribution with degrees of freedomn.

    Due to the weak law of large number andwe can get

    Further,for ?θ >0,there is a constantN0which is large enough that for ?n >N0,we can derive

    Moreover,for ?n >N0,we can get

    Whenthere is

    Therefore,at this time,for ?n >N0,we can obtain

    whereλ1<σc2+σe2-θandθis a constant greater than zero.

    Similarly,under the condition ofH1,(10)can be proved by us.

    Appendix B

    Based on the previous Eq.(12)in this article,we have obtained

    whereσc2=|hce|2Dce

    -αPc.

    Moreover,due to

    we can get

    Therefore,according to the scenario all we consider and the probability density distribution curve of|hce|2,We can deduce

    Namely,

    久久婷婷人人爽人人干人人爱 | 成人国产一区最新在线观看| 欧美黑人欧美精品刺激| 这个男人来自地球电影免费观看| 欧美国产日韩亚洲一区| 一级a爱视频在线免费观看| 亚洲美女黄片视频| 香蕉丝袜av| 久9热在线精品视频| 久久影院123| 国语自产精品视频在线第100页| 亚洲 国产 在线| 日本精品一区二区三区蜜桃| 国产色视频综合| 亚洲欧洲精品一区二区精品久久久| 在线十欧美十亚洲十日本专区| 国产欧美日韩一区二区三区在线| 女生性感内裤真人,穿戴方法视频| 丝袜人妻中文字幕| 九色国产91popny在线| 亚洲一区中文字幕在线| 精品一区二区三区视频在线观看免费| 欧美在线黄色| 在线免费观看的www视频| 亚洲性夜色夜夜综合| 黄色片一级片一级黄色片| 精品国产乱子伦一区二区三区| 亚洲中文字幕日韩| 国产私拍福利视频在线观看| 国产色视频综合| 国产日韩一区二区三区精品不卡| 国产一级毛片七仙女欲春2 | 欧美人与性动交α欧美精品济南到| 黑人欧美特级aaaaaa片| 亚洲精品中文字幕在线视频| 国产一区二区在线av高清观看| tocl精华| 成人精品一区二区免费| 亚洲专区中文字幕在线| 色综合站精品国产| 夜夜夜夜夜久久久久| 国产亚洲精品av在线| 波多野结衣高清无吗| 欧美激情极品国产一区二区三区| 在线观看免费午夜福利视频| 久久国产亚洲av麻豆专区| ponron亚洲| www.999成人在线观看| 两性夫妻黄色片| 两个人看的免费小视频| 日韩免费av在线播放| 亚洲熟妇熟女久久| 女警被强在线播放| 欧美乱码精品一区二区三区| 巨乳人妻的诱惑在线观看| 欧美日韩乱码在线| 人妻久久中文字幕网| 久久精品亚洲熟妇少妇任你| 99re在线观看精品视频| 视频在线观看一区二区三区| 精品一区二区三区av网在线观看| 好男人电影高清在线观看| 成人免费观看视频高清| 十分钟在线观看高清视频www| 国产精品亚洲美女久久久| 最好的美女福利视频网| 国产成人精品无人区| 性欧美人与动物交配| 午夜日韩欧美国产| 国产一区在线观看成人免费| 久久久久国内视频| 中文字幕久久专区| 一区二区三区高清视频在线| 极品教师在线免费播放| 可以免费在线观看a视频的电影网站| 久久精品亚洲精品国产色婷小说| 亚洲精品久久成人aⅴ小说| 99精品欧美一区二区三区四区| 午夜免费激情av| 午夜久久久久精精品| 国产视频一区二区在线看| 亚洲视频免费观看视频| 国产欧美日韩一区二区精品| 国产日韩一区二区三区精品不卡| 日韩欧美国产一区二区入口| 久久精品国产亚洲av高清一级| 99久久综合精品五月天人人| 国产亚洲av高清不卡| 日韩欧美一区视频在线观看| 久久久久久久久久久久大奶| 午夜成年电影在线免费观看| 免费在线观看影片大全网站| 亚洲无线在线观看| 在线av久久热| 麻豆成人av在线观看| 久久精品aⅴ一区二区三区四区| 午夜福利在线观看吧| 国产aⅴ精品一区二区三区波| 在线观看www视频免费| 亚洲精品美女久久久久99蜜臀| av福利片在线| 国产成+人综合+亚洲专区| 日韩成人在线观看一区二区三区| 亚洲五月天丁香| 正在播放国产对白刺激| 成人av一区二区三区在线看| 51午夜福利影视在线观看| 成人三级做爰电影| 亚洲精品中文字幕在线视频| 制服丝袜大香蕉在线| 色av中文字幕| 黑人巨大精品欧美一区二区mp4| 18禁国产床啪视频网站| 国内精品久久久久久久电影| 九色亚洲精品在线播放| 长腿黑丝高跟| 可以免费在线观看a视频的电影网站| 亚洲国产精品合色在线| 亚洲av美国av| 很黄的视频免费| 国产亚洲精品综合一区在线观看 | 亚洲国产高清在线一区二区三 | 狠狠狠狠99中文字幕| 欧美日韩亚洲国产一区二区在线观看| 999精品在线视频| 亚洲av日韩精品久久久久久密| 亚洲欧美激情综合另类| 在线观看66精品国产| 88av欧美| 亚洲人成伊人成综合网2020| 午夜激情av网站| 亚洲第一青青草原| 非洲黑人性xxxx精品又粗又长| 国产成+人综合+亚洲专区| 亚洲片人在线观看| 午夜福利视频1000在线观看 | 日本a在线网址| 日韩欧美在线二视频| 激情视频va一区二区三区| 国产精品九九99| 国产亚洲欧美98| 国产精品国产高清国产av| 午夜福利一区二区在线看| 91国产中文字幕| 免费一级毛片在线播放高清视频 | 国产精品一区二区在线不卡| 人人妻,人人澡人人爽秒播| 久久人妻熟女aⅴ| 亚洲第一电影网av| 欧美+亚洲+日韩+国产| 亚洲av第一区精品v没综合| 日韩欧美在线二视频| 妹子高潮喷水视频| 黑丝袜美女国产一区| 国产亚洲欧美精品永久| 一区二区三区激情视频| 老汉色av国产亚洲站长工具| 精品无人区乱码1区二区| 亚洲自偷自拍图片 自拍| 少妇粗大呻吟视频| 亚洲九九香蕉| 精品午夜福利视频在线观看一区| 亚洲va日本ⅴa欧美va伊人久久| 一区福利在线观看| 操出白浆在线播放| 久久精品亚洲精品国产色婷小说| 国产精品二区激情视频| 最新在线观看一区二区三区| 精品少妇一区二区三区视频日本电影| 国产精品二区激情视频| 欧美黄色淫秽网站| 精品一区二区三区视频在线观看免费| 精品免费久久久久久久清纯| 中文字幕久久专区| 国产在线观看jvid| 一区二区三区精品91| 91精品国产国语对白视频| 日本欧美视频一区| bbb黄色大片| 久久精品亚洲熟妇少妇任你| 亚洲精品国产精品久久久不卡| 老司机午夜福利在线观看视频| 亚洲中文字幕日韩| 欧美成人性av电影在线观看| 亚洲精品av麻豆狂野| 搡老岳熟女国产| 两性夫妻黄色片| 亚洲一区二区三区不卡视频| 99热只有精品国产| 亚洲第一欧美日韩一区二区三区| 亚洲欧美激情在线| 日本免费a在线| 中文字幕最新亚洲高清| 91成人精品电影| 又大又爽又粗| 中文字幕精品免费在线观看视频| 19禁男女啪啪无遮挡网站| 成年女人毛片免费观看观看9| 精品少妇一区二区三区视频日本电影| 国产伦人伦偷精品视频| 精品国内亚洲2022精品成人| 久久精品aⅴ一区二区三区四区| 在线观看免费午夜福利视频| 国产精品1区2区在线观看.| 19禁男女啪啪无遮挡网站| 欧美成人免费av一区二区三区| 国产99白浆流出| 少妇裸体淫交视频免费看高清 | 久9热在线精品视频| 天天一区二区日本电影三级 | 咕卡用的链子| 十八禁网站免费在线| 欧美一级毛片孕妇| 91字幕亚洲| 国产精品久久久久久人妻精品电影| 亚洲精品av麻豆狂野| 午夜a级毛片| 中文字幕人妻熟女乱码| 亚洲欧美日韩另类电影网站| 精品免费久久久久久久清纯| 午夜日韩欧美国产| 亚洲av成人av| 日本vs欧美在线观看视频| 亚洲精品一卡2卡三卡4卡5卡| av有码第一页| 亚洲情色 制服丝袜| 亚洲欧美日韩无卡精品| 无人区码免费观看不卡| 日韩中文字幕欧美一区二区| 国产精品av久久久久免费| 美女扒开内裤让男人捅视频| 午夜精品国产一区二区电影| 男人的好看免费观看在线视频 | 国产精品电影一区二区三区| 99re在线观看精品视频| 免费不卡黄色视频| 国产高清视频在线播放一区| 一本久久中文字幕| 曰老女人黄片| 久久中文字幕一级| 中文字幕高清在线视频| 91精品三级在线观看| 精品日产1卡2卡| 午夜福利高清视频| 久久午夜亚洲精品久久| 欧美成人午夜精品| 国产成人精品无人区| 久久国产亚洲av麻豆专区| 在线永久观看黄色视频| 99久久综合精品五月天人人| 欧美日本亚洲视频在线播放| 久99久视频精品免费| 欧美国产精品va在线观看不卡| 日韩三级视频一区二区三区| 在线播放国产精品三级| 国产xxxxx性猛交| 18禁黄网站禁片午夜丰满| 黑人巨大精品欧美一区二区mp4| 日韩欧美免费精品| 麻豆一二三区av精品| 宅男免费午夜| 可以免费在线观看a视频的电影网站| 免费在线观看影片大全网站| 国产亚洲av嫩草精品影院| 欧美激情久久久久久爽电影 | 激情在线观看视频在线高清| 岛国视频午夜一区免费看| 日韩有码中文字幕| 国产成+人综合+亚洲专区| 亚洲激情在线av| 好男人在线观看高清免费视频 | 好看av亚洲va欧美ⅴa在| 亚洲欧美日韩无卡精品| 黄频高清免费视频| 美女扒开内裤让男人捅视频| 少妇 在线观看| 黄色女人牲交| 高清毛片免费观看视频网站| 国产精品 欧美亚洲| 欧美精品亚洲一区二区| 国产精品久久久久久精品电影 | 欧美色视频一区免费| 黄色毛片三级朝国网站| 国产男靠女视频免费网站| 极品教师在线免费播放| 老司机午夜福利在线观看视频| 欧美绝顶高潮抽搐喷水| 日本 av在线| 91国产中文字幕| 亚洲av五月六月丁香网| 亚洲av第一区精品v没综合| 亚洲中文日韩欧美视频| 天堂动漫精品| 欧美一级a爱片免费观看看 | 亚洲精品久久成人aⅴ小说| 国产区一区二久久| 午夜免费成人在线视频| 国产极品粉嫩免费观看在线| 久久精品91蜜桃| a级毛片在线看网站| 久久精品亚洲精品国产色婷小说| 俄罗斯特黄特色一大片| 热re99久久国产66热| 日本精品一区二区三区蜜桃| 国产av一区在线观看免费| 国产成人系列免费观看| 久久这里只有精品19| 国产精品亚洲一级av第二区| 免费看十八禁软件| 侵犯人妻中文字幕一二三四区| 久久精品国产亚洲av高清一级| 精品国产国语对白av| 国产午夜精品久久久久久| 最新美女视频免费是黄的| 欧美黑人精品巨大| 午夜久久久在线观看| 亚洲国产精品sss在线观看| 国产精品秋霞免费鲁丝片| 亚洲国产欧美日韩在线播放| 成人手机av| 麻豆成人av在线观看| 色播亚洲综合网| 欧美国产精品va在线观看不卡| 国产精品av久久久久免费| 一区二区三区国产精品乱码| 一二三四社区在线视频社区8| av天堂久久9| 久久精品aⅴ一区二区三区四区| 欧美一级毛片孕妇| 午夜福利欧美成人| 亚洲欧美精品综合久久99| 最好的美女福利视频网| 成人国语在线视频| 搡老岳熟女国产| 成人国语在线视频| 欧美日本亚洲视频在线播放| 亚洲成国产人片在线观看| 乱人伦中国视频| 三级毛片av免费| 精品电影一区二区在线| 人人妻人人澡人人看| 亚洲精品中文字幕在线视频| 亚洲成av人片免费观看| 黄色 视频免费看| 91国产中文字幕| 日韩中文字幕欧美一区二区| 亚洲成av人片免费观看| 一区二区三区激情视频| 亚洲色图 男人天堂 中文字幕| 亚洲欧美激情在线| 午夜精品在线福利| 久久久久久人人人人人| 久久久精品国产亚洲av高清涩受| 亚洲 国产 在线| 国产国语露脸激情在线看| 每晚都被弄得嗷嗷叫到高潮| 欧美日韩一级在线毛片| 男人舔女人的私密视频| 在线观看日韩欧美| 好男人电影高清在线观看| 女警被强在线播放| 国产av在哪里看| 国产精品秋霞免费鲁丝片| 日韩精品青青久久久久久| 日本一区二区免费在线视频| av天堂在线播放| 国产精品秋霞免费鲁丝片| 波多野结衣高清无吗| 精品无人区乱码1区二区| 韩国精品一区二区三区| 97超级碰碰碰精品色视频在线观看| 亚洲伊人色综图| 精品国产一区二区久久| 午夜福利18| 亚洲成国产人片在线观看| 欧美av亚洲av综合av国产av| 成人三级做爰电影| 久久欧美精品欧美久久欧美| 久久久久九九精品影院| 国产精品乱码一区二三区的特点 | 黄色毛片三级朝国网站| 一a级毛片在线观看| 亚洲人成电影免费在线| 免费无遮挡裸体视频| 一个人免费在线观看的高清视频| 国产精品 欧美亚洲| 婷婷精品国产亚洲av在线| 在线观看免费日韩欧美大片| 少妇熟女aⅴ在线视频| 国产精品九九99| av天堂久久9| 亚洲第一av免费看| 国产精品美女特级片免费视频播放器 | 丝袜在线中文字幕| 欧美日韩福利视频一区二区| 伊人久久大香线蕉亚洲五| 美女 人体艺术 gogo| 久久久久亚洲av毛片大全| 国内精品久久久久久久电影| 神马国产精品三级电影在线观看 | 黄色女人牲交| e午夜精品久久久久久久| 老司机靠b影院| 18禁裸乳无遮挡免费网站照片 | 色av中文字幕| 亚洲精品在线观看二区| 欧美成狂野欧美在线观看| 欧美乱色亚洲激情| 在线天堂中文资源库| 久久伊人香网站| 免费看a级黄色片| 亚洲成av人片免费观看| 老熟妇乱子伦视频在线观看| 成人亚洲精品一区在线观看| 久久人人爽av亚洲精品天堂| 巨乳人妻的诱惑在线观看| 国产成人一区二区三区免费视频网站| 在线观看66精品国产| 51午夜福利影视在线观看| 国产亚洲精品综合一区在线观看 | 国产精品国产高清国产av| 久久久国产精品麻豆| 黄色a级毛片大全视频| 男女午夜视频在线观看| 国产精品综合久久久久久久免费 | av超薄肉色丝袜交足视频| 日韩欧美国产在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 极品人妻少妇av视频| 少妇粗大呻吟视频| 亚洲人成电影观看| 无限看片的www在线观看| 久久香蕉国产精品| 国产av一区在线观看免费| 日韩欧美国产一区二区入口| 青草久久国产| 欧美日韩精品网址| 天天添夜夜摸| 免费在线观看日本一区| 久久人人精品亚洲av| 国产亚洲av嫩草精品影院| 少妇 在线观看| 满18在线观看网站| 中文字幕精品免费在线观看视频| 狠狠狠狠99中文字幕| 亚洲欧美精品综合一区二区三区| 99在线视频只有这里精品首页| 嫩草影视91久久| 国产精品亚洲av一区麻豆| 国产又色又爽无遮挡免费看| 久久影院123| av有码第一页| 欧美 亚洲 国产 日韩一| 色精品久久人妻99蜜桃| 老熟妇仑乱视频hdxx| 两人在一起打扑克的视频| 人人妻,人人澡人人爽秒播| 可以在线观看的亚洲视频| 一级a爱视频在线免费观看| 一区二区三区激情视频| 97人妻精品一区二区三区麻豆 | 欧美激情久久久久久爽电影 | 免费久久久久久久精品成人欧美视频| 久久精品91蜜桃| 免费高清在线观看日韩| 一级毛片女人18水好多| 国产av一区二区精品久久| 精品无人区乱码1区二区| 亚洲成人久久性| 亚洲成av人片免费观看| 一级黄色大片毛片| 人成视频在线观看免费观看| 老司机深夜福利视频在线观看| 天天添夜夜摸| 中文字幕高清在线视频| 亚洲熟妇熟女久久| 我的亚洲天堂| 亚洲第一青青草原| 国产aⅴ精品一区二区三区波| 黄色女人牲交| www.精华液| 午夜福利欧美成人| 色av中文字幕| 国产又爽黄色视频| 成年女人毛片免费观看观看9| 国产精品久久久av美女十八| 中文字幕色久视频| 国产av在哪里看| 国产欧美日韩一区二区精品| 999精品在线视频| 亚洲三区欧美一区| 一区福利在线观看| 大码成人一级视频| 女人高潮潮喷娇喘18禁视频| 久久午夜亚洲精品久久| 久久精品91蜜桃| 两个人视频免费观看高清| 精品国产乱子伦一区二区三区| 国产av一区二区精品久久| 精品一区二区三区四区五区乱码| 国产精品综合久久久久久久免费 | 99久久精品国产亚洲精品| 午夜视频精品福利| 好男人在线观看高清免费视频 | av天堂在线播放| 日韩一卡2卡3卡4卡2021年| 自线自在国产av| 日韩一卡2卡3卡4卡2021年| 亚洲伊人色综图| 操美女的视频在线观看| 97碰自拍视频| 久久久精品国产亚洲av高清涩受| 男人舔女人的私密视频| 国产成人av教育| 好男人电影高清在线观看| 免费在线观看亚洲国产| 亚洲av成人不卡在线观看播放网| 国产成人av教育| 此物有八面人人有两片| 性少妇av在线| 亚洲av成人不卡在线观看播放网| 黄色片一级片一级黄色片| 999久久久国产精品视频| 日本一区二区免费在线视频| 动漫黄色视频在线观看| 又大又爽又粗| 精品一区二区三区视频在线观看免费| 麻豆av在线久日| 国产视频一区二区在线看| 在线观看免费日韩欧美大片| 国产午夜福利久久久久久| 一区在线观看完整版| 每晚都被弄得嗷嗷叫到高潮| 99精品久久久久人妻精品| 成人国产一区最新在线观看| 欧美黄色淫秽网站| 欧美av亚洲av综合av国产av| 欧美成人免费av一区二区三区| 99re在线观看精品视频| 99久久综合精品五月天人人| 美女午夜性视频免费| 欧美另类亚洲清纯唯美| av欧美777| 丰满人妻熟妇乱又伦精品不卡| 欧美午夜高清在线| √禁漫天堂资源中文www| 亚洲va日本ⅴa欧美va伊人久久| 欧美日韩亚洲综合一区二区三区_| 国产免费男女视频| 亚洲aⅴ乱码一区二区在线播放 | 男人操女人黄网站| 国产成人欧美| 操出白浆在线播放| 免费看a级黄色片| 女人被狂操c到高潮| 在线观看一区二区三区| 亚洲国产中文字幕在线视频| 国产精品久久久人人做人人爽| 天堂影院成人在线观看| 88av欧美| 久久 成人 亚洲| 嫩草影院精品99| 天天一区二区日本电影三级 | 精品卡一卡二卡四卡免费| 免费高清在线观看日韩| 不卡av一区二区三区| 夜夜爽天天搞| 激情在线观看视频在线高清| 色精品久久人妻99蜜桃| 妹子高潮喷水视频| 免费在线观看黄色视频的| 日韩精品青青久久久久久| 成年女人毛片免费观看观看9| 日本 av在线| 国产日韩一区二区三区精品不卡| 国产精品九九99| 国产精品一区二区精品视频观看| 99久久精品国产亚洲精品| 亚洲,欧美精品.| 天天一区二区日本电影三级 | 人人妻人人爽人人添夜夜欢视频| 成人18禁高潮啪啪吃奶动态图| 老汉色av国产亚洲站长工具| 日本三级黄在线观看| 黄片小视频在线播放| 久久热在线av| 久久久水蜜桃国产精品网| 午夜免费激情av| 91在线观看av| cao死你这个sao货| 国产99白浆流出| 免费在线观看亚洲国产| 亚洲国产看品久久| 久久人妻av系列| 午夜福利免费观看在线| 日韩国内少妇激情av| 视频在线观看一区二区三区| 国产高清视频在线播放一区| 国产精品亚洲av一区麻豆| 国产精品久久久人人做人人爽| 精品国内亚洲2022精品成人| 免费看美女性在线毛片视频| 九色亚洲精品在线播放| 久久香蕉激情| 国产精品久久久av美女十八| 国产精品一区二区在线不卡| 国产精品九九99| 757午夜福利合集在线观看| 大香蕉久久成人网| 乱人伦中国视频| www.精华液| 日韩三级视频一区二区三区| 久久精品亚洲精品国产色婷小说| 久久天躁狠狠躁夜夜2o2o| 一进一出抽搐gif免费好疼|