• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems

    2023-10-26 13:14:10BorjaBordelnchezRamAlcarriaandTomRobles
    Computers Materials&Continua 2023年9期

    Borja Bordel Sánchez ,Ramón Alcarria and Tomás Robles

    1Information Technologies Department,Universidad Politécnica de Madrid,Madrid,28031,Spain

    2Geospatial Information Department,Universidad Politécnica de Madrid,Madrid,28031,Spain

    ABSTRACT Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a new non-linear generalized model to describe Cyber-Physical Systems.This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and random effects in the physical and computational worlds.Besides,the digitalization stage in hardware devices is represented too.Attackers and most critical sparse sensor attacks are described through a stochastic process.The reconstruction and protection mechanisms are based on a weighted stochastic model.Error probability in data samples is estimated through different indicators commonly employed in non-linear dynamics (such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.An experimental validation based on simulation tools and real deployments is also carried out.Both,the new technology performance and scalability are studied.Results prove that the proposed solution protects Cyber-Physical Systems against up to 92% of attacks and perturbations,with a computational delay below 2.5 s.The proposed model shows a linear complexity,as recursive or iterative structures are not employed,just algebraic and probabilistic functions.In conclusion,the new model and reconstruction mechanism can protect successfully Cyber-Physical Systems against sparse sensor attacks,even in dense or pervasive deployments and scenarios.

    KEYWORDS Cyber-physical systems;sparse sensor attack;non-linear models;stochastic models;security

    1 Introduction

    Cyber-Physical Systems(CPS)are seamless integrations of physical and computational processes[1].Many different architectures and approaches to support these unions have been reported,from schemes based on the control theory [2] to feedback loops in computational systems [3].But all proposed CPS implementations include a sensing platform to monitor the evolution of the physical world[1].That platform is dense,including thousands of networked sensor nodes capable of capturing information through several different physical parameters [4].Those data must be injected into computational processes,to ensure that the cybernetic and physical worlds evolve together in a feedback control loop[5].

    Therefore,precise information about physical processes is essential to ensure that the loop is convergent and follows the expected evolution [6].However,it is hardly possible to obtain precise information in real applications [4].Many random effects have an impact on the behavior of CPS,such as noise,transmission errors,measurement,digitalization,and discretization processes[4].In that way,information finally injected into computational processes is not the raw or authentic information acquired from the physical world,but a non-deterministic transformation of it.And this transformed information prevents the CPS from integrating the computational and physical processes with the expected synchronicity and showing the required behavior[7].

    Furthermore,as Cyber-Physical Systems are used in more scenarios and applications,including critical infrastructures,they are more exposed to new risks.Eventual and unexpected cyberattacks are the main ones.Although innovative attack strategies have been reported to exploit specific vulnerabilities of CPS [8],nowadays the greatest risks for CPS are still associated with classic cyberattacks such as the Sparse Sensor Attack(SSA).In the SSA[9],attackers introduce false information and/or cause delays in the sensing platform monitoring the physical world at a low level,so the CPS behavior is altered or denied.It is the most common attack in control solutions,and new uncertainty about the physical information injected into the computational processes is to be handled.

    In this context,reconstruction mechanisms to recover the original and real information extracted from the physical world are essential[10].The state of any CPS may be described as a multidimensional vector,where each position represents a physical parameter.By establishing the analytical law that describes the trajectory of all those state variables in the phase space,the transformed information received may be corrected through a theoretically predicted CPS state [11].However,in the general case,all physical parameters are not independent,but they are interrelated through complex physical laws[12].The appearance of complex non-linear laws,together with the need for stochastic terms to describe random effects such as sparse sensor cyberattacks,turns quite difficult to find a general highprecision model.Thus,traditional reconstruction schemes are based on some basic assumptions,so the mathematical expressions describing the evolution of CPS are easier to manipulate and implement[13].

    Our work is motivated by limitations and vulnerabilities caused by these simple assumptions,which make CPS weaker against cyberattacks than other state-of-the-art technological systems.Namely:

    ? First,Cyber-Physical Systems are assumed to evolve according to a linear law.

    ? Second,all terms are considered deterministic,including noise and attacking signals.

    ? Third,all physical variables are assumed to be fully independent of each other.

    ? And fourth,physical processes are assumed to be discrete,so digitalization and transmission processes do not have to be explicitly considered.Although those linear deterministic models present important advantages(for example,they can be manipulated to find analytical expressions for the detection and identification of SSA),their applicability is very limited[14].

    ? Only closed CPS based on a reduced number of physical variables with a smooth and invariant behavior(such as the temperature in a climatized space)are governed and can be secured and protected by such a simple model.

    Therefore,more complex and general models are required to protect and mitigate SSA in multidimensional CPS with a continuous-time non-linear behavior.In this paper,we address this challenge.

    Three innovative contributions are introduced in this paper:

    ? A complex non-linear model to describe the CPS behavior in a general situation.

    ? New signals and models for SSA and digitalization processes.

    ? The third and final contribution is an innovative reconstruction scheme.

    The proposed model describes the behavior of CPS using unknown generic functions,which are developed as Taylor series.This model also includes stochastic terms to represent physical,transmission,and measurement noises.Besides,SS attacks are described as a new signal whose value follows a probabilistic behavior according to a given discrete random variable.Physical processes are represented by continuous-time signals that are discretized using an event-based scheme.The resulting multidimensional model injects discrete data into computational processes,but is too complex to generate analytic expressions to mitigate SSA in CPS.Finally,the proposed reconstruction scheme is supported by a weighted stochastic model where the error probability is estimated through different indicators commonly employed to describe non-linear dynamics (such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.

    The rest of the paper is organized as follows.Section 2 analyzes the state-of-the-art on cyberattacks and countermeasures in CPS.Section 3 describes the proposed solution,including the mathematical model to describe the behavior of the CPS and the reconstruction and protection scheme to mitigate SSA.Finally,Section 4 describes the experimental validation and the results obtained.Section 5 concludes the paper.

    2 Related Works

    Cyber-Physical Systems are one of the most promising technological revolutions nowadays.They are expected to govern all production,domestic,and critical digital systems.Due to this relevance,many authors have investigated how to protect CPS against various well-known and innovative attacks.In general,we can distinguish two different protection approaches:those based on control theory and those supported by Information Technologies(IT).

    IT protection mechanisms for CPS are usually data processing and filtering modules to remove and correct malicious or corrupted data packets.Stochastic techniques and models [4],advanced filtering algorithms such as the Kalman filter [15],hardware-enabled algorithms such as parameter estimation[16],and pattern recognition techniques to identify unusual information[17]are the most common technologies.As well as game-theory and other common technologies for CPS protection,such as honeypots [18] or Software-Defined Networks [19].However,a limited number of works supporting this vision may be found,as information theory techniques are high-level and agnostic concerning the underlying hardware platform[20].And the most critical cyber risks in CPS nowadays are associated with sensor and actuator nodes[8].Different authors have identified new attack vectors and strategies [8],so feedback loops in CPS can be used to magnify cyberattacks starting in a single hardware node and spreading throughout the entire system.Furthermore,these IT protection technologies are computationally heavy and require long processing times,so they are not effective against fast cyberattacks.Other low-level lightweight techniques are required.

    Physical infrastructure protection is,then,a priority in CPS.And most works on CPS security employ control theory to design new hardware protection schemes.Globally,all these technologies follow the same strategy[21]:they estimate or predict a secure future state for the physical platform and/or control loop,which is used to mitigate different types of attacks.Although this paradigm could fully protect CPS [22],it is very difficult to implement in practice and the reported implementation presents different weaknesses.Techniques may be local(or decentralized),distributed,or centralized.

    Decentralized state estimation techniques are handled by independent sensing nodes.They are sparse as individual sensors have very limited information and actuation capabilities,so the achieved protection level is poor.Continuous bidimensional linear models are employed to detect perturbations and attacks (typically Denial of Service attacks) and modify the behavior of nodes by,for example,increasing their computational resources [23].The objective is to guarantee the local stability of the control loops by mitigating all perturbances [21].In contrast,other decentralized CPS protection schemes use variance-based strategies (also known as ‘secure control’[14]).This approach is more general and can be applied against a generic cyberattack.Using discrete bidimensional models,tuned filters and tuned control loops can be varied to reduce system errors,even while a cyberattack is running [24].However,even if local control loops can operate normally,with variance-based techniques the global system is handling corrupted data,and that impacts the later global behavior.Some authors have shown that global system protection requires cooperation and information sharing among all agents[21].Distributed techniques fill this gap.

    Distributed secure state estimation is useful against systemic attacks such as Byzantine attacks[25].System states are deducted through an optimization process where linear models represent the sensors’outputs and graphs [26],Markov chains [27],binary decision trees [28],and other mathematical paradigms (such as the Lipschitz continuity) [29] are used to represent the interconnections and transmissions among nodes.Custom quasi-linear models for specific applications,such as seriesparallel systems,have been also reported [30,31].However,these protection mechanisms are passive and cannot deploy countermeasures to mitigate the impact of cyberattacks.Then,they must be complemented with specific controllers[32,33]to apply active protection policies on the CPS.Anyway,the final performance of distributed protection techniques is highly dependent on the number of trusted nodes,not affected by the attack[21,34].Furthermore,linear and quasi-linear models cannot represent the output of most complex sensing platforms [35].Thus,reported schemes can only be applied to a reduced number of application scenarios,excluding critical risks such as massive or viral attacks and common nonlinear algorithms.

    On the other hand,recently distributed artificial intelligent solutions,such as federated learning[36],Support Vector Machines[37],feature selection[38]or eXplainable Artificial Intelligence(XAI)[39],have also been applied to CPS securitization and intrusion detection.But performance must be enhanced through additional techniques such as reinforcement learning[40].Intelligent solutions must be designed for very specific attacks,as they are usually focused on Denial-of-Service attacks.Although the final results are promising,the balance between cost and performance is still worse than the one observed in other distributed techniques,and they are preferred to be used for privacy preservation[41].

    The main disadvantage of distributed protection mechanisms is the increase in system congestion,due to the large number of transmissions required to run the distributed algorithms.On the contrary,centralized approaches may handle global stability and attacks(as distributed techniques)but with a lower system overload.Most reported works follow this paradigm.

    Centralized control is usual in CPS,as it is the traditional approach in legacy Supervisory Control And Data Acquisition(SCADA)systems.Different kinds of multi-dimensional models are employed to represent the state of every single node on the platform.These models can be analytically manipulated to define protection algorithms based on Orthogonal-Triangular(QR)decomposition[42]or Linear–Quadratic (LQ) control [43],mitigating the impact of attacks.Models can be deterministic[44] or include some stochastic terms to represent noises [45].Besides,continuous [44] and discrete[46] models may be found.However,most of these models are linear and only consider the selfmaintained evolution of the node output and the measurement errors(in line with traditional control theory models).While other relevant effects,such as the digitalization process or the transmission protocols,are not considered,although they can be relevant.On the other hand,nonlinear models are very rare[47]and they are only developed for specific use cases.This centralized approach is successful against false information attacks(also known as sparse sensor attacks or deception attacks[14]),as it handles a full picture of the CPS.However,current models are very limited,and analytical protection algorithms have a reduced impact in real applications.

    Table 1 summarizes the main current approaches and their associated open challenges.

    Table 1:State-of-the-art

    In this paper,we address this challenge,with a continuous-time generic multidimensional nonlinear model,and a protection policy based on probabilistic decision-making schemes.

    3 Proposed Scheme

    The proposed solution includes two different phases.First,a multidimensional stochastic model is employed to estimate or predict the future state of the CPS.Later,the obtained secure state estimation is compared to the real state produced by the physical platform.Both values are compared using a probabilistic model,where several indicators are considered.The system state may be replaced or corrected using the predicted secure state if the decision-making algorithm indicates the information is false(corrupted or caused by an SSA).This section describes in detail the entire scheme.Section 3.1 introduces the stochastic model,while Section 3.2 presents the decision-making and protection algorithms.

    3.1 Secure State Estimation.Model Description

    A CPS is supported by a dense sensing platform includingNdifferent sensor nodesnm.These nodes monitor and control a catalogue ofPdifferent physical variablesxi(t)(1).Each variable is monitored inKidifferent geographical locations(2),so every node controls a different physical variable in a different location(3).If any nodenmmonitors more than one variable,we are analyzing it as two independent nodes located in the same geographical position.

    The information to be finally injected into the computational processes(or system state)is a set ofMdiscrete state variablesyj[k],related to the physical variables through a vector unknown function,S(·),named as“system function”(4).This system function integrates five different processes:(i)the physical world’s evolution,(ii) the transduction phase,(iii) the measurement scheme,(iv) the data transmission,and(v)the final processing stage.

    The physical world(i)is considered a closed autonomous system,with no external intervention,so the future evolution of the physical variables is only determined by the past values of those same variables (5).The function relating the past and future values of the physical variablesis unknown and,in the general case,non-linear.For clarity,we are using vectorto represent the full ordered collection of physical variables(6).Although it is unknown,vector functionF(·)could be developed as Taylor’s series.

    Finally,it is necessary to estimate the value for meanμttand varianceσtt,so error in the proposed model may be properly handled.In general,errors are bigger as values for the meanμtand varianceσtgo up.Then,a superior limit is a good approximation for both parameters(23),which may be easily calculated considering the reproducibility of the Gaussian random variables.In order to get the final values for the meanμttand varianceσttit is enough to apply the same reproducibility law a second time(24).

    Finally,as every sensor nodenmhas a different functionTm,the whole CPS is represented by a set ofNdifferent Eq.(27),which can be represented in one vector expression(28).

    The third subprocess to be represented in our model is the measurement scheme (iii).This,basically,is a digitalization scheme,developed internally by sensor nodes(see Fig.1).Discrete signalare obtained through an ideal sampling scheme(29),where electrical signals are multiplied by a Dirac comb or impulse trainwith periodTm(30).This periodTmis different for each sensor nodenm.

    Figure 1:Ideal sampling scheme

    In this digitalization process only the quantification noiseis relevant.This noise,as the digitalization scheme is invariant in time,is also time-invariant,and characterized by a uniform random variable(31).

    whereΔmis the quantification step,fixed for every nodenm.

    The fourth process to be represented is the data transmission(iv).In general,hardware platforms in CPS are low-energy,and they sleep most of the time.Being event-based,they only activate the transmission subsystem when an event is detected in the physical world.We are defining functionφm[k]as event-triggering function (32).This function takes as value the unit in the discrete time instant a new event must be generated.Its value is zero otherwise.Functionu(·)is the Heaviside step function,keis the last time instant where an event took place,andemis a parameter,different for each nodenm.If signalchanges its value more thanemunits,a new event is triggered.

    Data transmission is,once again,an open process,so it is vulnerable to attacks.Denial-of-Service(DoS)attacks in this case.But SSA too(as the transduction phase).Bernoulli distributionΓbrepresents the probability of a DoS attack to be running.Parameterbis equal to the unit if an attack is being performed,or zero if not(33).The attack probabilityρbvaries with time(asΓbis a stochastic process).The estimation scheme for this probability is part of the attack detection algorithm(see Section 3.2).Similarly,Bernoulli distributionΓcrepresents the probability of a SSA to be running at the data transmission stage(34).

    All parameters and their meaning are equivalent to distributionsΓaandΓb.

    Then,the final analytical model to describe the behavior of CPS includes five different Eq.(40).All parameters and coefficients are known(or may be estimated)butλr,αrandβrwhich must be calculated.The value for those parameters is obtained from an initial calibration process and an optimization algorithm based on the minimization of the Mean Square Error(MSE).

    3.2 Reconstruction and Protection Mechanisms

    The proposed model (see Section 3.1) considers seven sources of perturbations.On the one hand,errors may be caused by four different phenomena:erratic behaviors in the physical variables,electrical noises,quantification noise,and transmission perturbations.And,on the other hand,three different potential attacks affect CPS in the general case:SSA at the transduction phase,and SSA and Denial-of-Service attacks at the transmission phase.Fig.2 represents the proposed reconstruction and protection mechanisms.

    Figure 2:Protection and reconstruction mechanism

    As a novelty,the proposed reconstruction and protection mechanism evaluates all these potential perturbations to build a global stochastic process (contrary to traditional deterministic models).This stochastic process B[p,k](41)is discrete.pis a discrete variable representing the four possible situations a CPS state may achieve: unperturbed (p=0),noisy (p=1),SSA-attacked (p=2) and DoS-attacked(p=3).Whilekis a variable representing the discrete time.Similarly,we can defineMstochastic sub-processes Bj[p,k]for each one of theMstate variablesyjconsidered in the CPS.

    Figure 3:Stop-band filtering for autocorrelation calculation

    Using these five indicators,we can now estimate the probability distribution of the stochastic process B[p,k].Mathematical models for all this probability distribution are a genuine contribution of this work.The unperturbed state(p=0)is only probable when the probabilityμpdfis very high(close to the unit),and distancesμFouandμrtare very low.Any other value is indicating a noisy state(p=1),which is still probable even for smaller values of probabilityμpdfand bigger values of distancesμFouandμrt.But noisy states require a low value for autocorrelationμauto be probable (on the contrary,the CPS may be under a cyberattack).Because of this sensitivity,exponential and power laws are the most adequate ones to represent the probability of the unperturbed stateγ0[k](63),while linear evolutions and slower exponential laws fit the more tolerant behavior of the probability lawγ1[k] of the noisy state(64).

    On the other hand,SSA-attacked state(p=2)is characterized by very a low probabilityμpdfbut very high distancesμFouandμrt.As well as a relevant non-null value in the aggregated autocorrelationμauand the aggregated first order forward differencesμdiff.On the contrary,DoS-attacked states(p=3)are usually associated to moderate values for the probabilityμpdf(states are delayed but not manipulated)while still very high distancesμFouandμrt(as they are delayed,states are not coherent with the historical series).The aggregated autocorrelationμauand the aggregated first order forward differencesμdifftend also to be quite reduced.Following a similar philosophy to employed before,we can define the evolution laws for the probabilitiesγ2[k](65)andγ3[k](66).

    In an equivalent manner we may calculate the probability distribution for all stochastic subprocesses Bj[p,k](67)

    Figure 4:Reconstruction and protection algorithm

    Sizes for parametersRunandRrare actually very important and sensible.Large values for those sizes avoid most spurious numerical and transitory effects,but they reduce the precision and sensitivity of the protection and reconstruction algorithm to detect short-term attacks and high-frequency noises.While reduced values for parametersRunandRrbehave exactly the opposite.The balance cannot be generalized and therefore must be found for every specific application.

    4 Experimental Validation

    To validate the proposed mechanisms for the protection of Cyber-Physical Systems against Sparse Sensor and Denial of Service attacks,an experimental validation was conducted.Section 4.1 describes the experimental methodology,while Section 4.2 presents the obtained results.

    4.1 Experimental Methodology and Environment

    The experiments were based on an emulated industrial scenario with real hardware devices(microcontrollers).The experimental works were divided into two different phases.First,we focused on analyzing the precision and attack detection capacity of the proposed technology.The second phase focused on studying the performance and scalability of the proposed model and the reconstruction and protection mechanism.

    For all the experiments,the proposed CPS was supported by a collection of ESP-32 microcontrollers.Its number is variable depending on the experiment.ESP-32 microcontrollers are low-cost System-on-Chip provided with Wireless Fidelity (WiFi) and Bluetooth capabilities.It is based on a Tensilica Xtensa LX6 processor,and it includes several peripheral interfaces(Universal Asynchronous Receiver-Transmitter-UART-,Pulse Width Modulation-PWM-,Serial Peripheral Interface-SPI-,etc.),so it can handle a large catalog of different sensors.In our experiments,each ESP-32 node was provided with two sensors,monitoring four physical variables in total.The first sensor was a CCS811 sensor to monitor air quality.It can provide two different variables:carbon dioxide equivalent(eCO2)and organic volatile compounds concentration (TVOC).The second sensor is a DTH-11 device,which generates measurements for the environmental humidity and temperature.The measurement periodicity is variable and depends on the experiment.

    All these sensors employed a WiFi connection to send all the collected information to a cloud server,located within the same building.Hypertext Transfer Protocol(HTTP)messages and Representational State Transfer(REST)interfaces were employed to support these communications.The server was a Linux-based machine (Ubuntu 18.04 LTS) with the following hardware characteristics: Dell R540 Rack 2U,96 GB RAM,two processors Intel Xeon Silver 4114 2.2G,HD 2 TB SATA 7,2K rpm.In this server,both the proposed model and the reconstruction and protection algorithm were hosted and executed.A Node.js server was deployed to collect all data from the sensor nodes and send them to the computational process executing our proposal.A supervisory process was continuously evaluating the evolution and performance of the proposed algorithms and model.The acquired information was employed to carry out a statistical analysis using the MATLAB 2022a software,to validate our hypotheses.All experiments were repeated twelve times to remove possible spurious effects.The results for every measurement are obtained as the average of all these individual twelve realizations.

    In the first phase,we performed two different experiments.The first experiment was aimed at analyzing the precision of the proposed model (Section 3.1) by comparing (using the Mean Square Error metric) the information received by the computational processes in the real CPS deployment and the samples predicted by the proposed model.Data were collected for 24 h,and the relative(percentage) Mean Square Error was calculated for all the acquired samples.The experiment was repeated for different values of parametersRP,RT,andRF,which control the complexity of the proposed model.In this experimental phase,these three parameters are considered to have the same value.

    The second experiment in this first phase was aimed at analyzing the probability of the proposed reconstruction and protection algorithm to successfully detect the real situation that occurs in the CPS.Some additional ESP32 nodes were deployed to increment the electrical noise in the environment and/or perform Sparse Sensor and Denial of Service attacks.Different situations were generated,with a duration of ten minutes.It was monitored if the proposed algorithm was able to identify them properly.The second experiment had a duration of 24 h too.Results were processed to generate a confusion matrix representing the algorithm’s behavior.The experiment was repeated for different values ofRun,andRrparameters.During these experiments,both parameters had the same value.

    In the second experimental phase,we evaluated the performance and scalability.We measured the computational time needed for the proposed model and the reconstruction and protection algorithm to obtain a final and stable output.The first experiment focused on the mathematical model.The calculation time was analyzed for different values of parametersRP,RT,andRF(all three had the same value)and different quantities of state variables(M).To allow this experiment,the number of sensor nodes in the CPS was increased with each realization.Each configuration was operating for 24 h.The result was obtained as the average of all measurements collected.

    Finally,the second experiment in this second phase evaluated the computational time required by the reconstruction and protection algorithm.The experiment was repeated for different values ofRun,andRrparameters.During these experiments,both parameters had the same value.Different quantities of state variables(M)were also considered.Each configuration was operating for 24 h.The result was obtained as the average of all collected measurements.

    4.2 Results

    To evaluate the behavior of the proposed technology,first,we analyze the precision of our model(Section 3.1),comparing the predicted future CPS states and the actual state finally achieved.Fig.5 shows the results.As can be seen,the evolution is exponential,as expected from the error in the Taylor series,as the number of terms increases.In general,all configurations show good behavior,although models with only two terms introduce an error of 12%(which may be too high for some applications).The minimum error(2%)may be achieved for models with more than 12 terms.This error is caused by the truncation of the Taylor series,so they can be numerically computed.But,as a counterpart,the resulting finite series does not perfectly represent the original function and we are introducing a numerical error.

    Other limitations in the proposed model (such as the numerical precision of the underlying hardware platform) are also affecting,so,only by increasing the number of terms in Taylor’s series cannot reduce the global error as much as desired.But for a very large catalog of applications,an error of 2%is acceptable and can be tolerated.Even,for those scenarios where computationally lightweight solutions are preferred,schemes with four or five terms generate an error of around 6%,which is a standard error for mass non-critical applications.In common applications,errors below 10%can be handled.From these results,we can conclude that the proposed model represents with good precision the physical processes in CPS.

    Similarly,we need to analyze the capacity of the proposed reconstruction algorithm to successfully detect the real situation that is happening in the CPS.Fig.6 shows the results of this experiment.For all possible situations,three regions are identified.First,for low values ofRunandRrparameters(below 20),transitory effects are dominant,indicators do not capture properly the CPS behavior,and sensitivity(rate of situation correctly classified)decreases.Random natural variations may be relevant when very short periods are analyzed.To focus on global tendencies,larger collections of data samples are needed.In that way,later,in the central region,RunandRrparameters present good enough values(between 20 and 60),and the proposed algorithm works with a very satisfactory behavior(sensitivity is between 91% and 98%).In this region,short-time transitory effects are not dominant because larger time series are employed in the reconstruction mechanism,and global tendencies are easily detected.But when the values forRunandRrparameters increase beyond a certain limit (60 samples in this case),real fluctuations effects and high-frequency perturbations are ignored when they are aggregated in a large operation.Then,sensitivity decreases.In this region,even natural fluctuations and changes are not significant compared to long-term tendencies.Relevant changes are ignored,because we are integrating too many samples in the same series,and calculation algorithms do not have enough sensitivity.

    Figure 6:Precision of the proposed reconstruction and protection

    In conclusion,RunandRrparameters must be balanced:small values cause instabilities,while too big values generate a loss of sensitivity.Values between 20 and 60 are the most appropriate region,as shown above(Fig.5).

    On the other hand,the proposed algorithm does not show the same sensitivity when detecting the different situations in a CPS.In general,situations whose probability is calculated using functions with a higher growth rate (such as the exponential) are more sensitive to the quality of indicators representing the CPS (first return maps,STFT,etc.) and then more sensible to the value ofRunandRrparameters.This is because small changes in the exponents may generate big variations in the final function.Values must be selected very carefully and according to previous observations.For example,the probability for the SSA-attacked situation is only supported by an exponential function,so it is the one with the most relevant fluctuations.The noisy situation,which includes a linear term,is much flatter.That means SSA-attacked situations are much more difficult to detect,and probably a heuristic calibration process is required in real deployments and scenarios.

    Anyway,the sensitivity of the proposed algorithm(in balanced values ofRunandRrparameters)is very satisfactory.Noisy situations are detected on 98% of the occasions,while unperturbed and SSA-attacked situations are correctly identified on 92% of the times.The DoS-attacked situation is the one with the worst behavior,but its sensitivity is just slightly lower:91%.With these results,we can conclude that the proposed algorithm can reconstruct and protect Cyber-Physical Systems against attacks and perturbations.

    To go deeper into the analysis of these data,we present the complete confusion matrix(Table 2)for the configurationRun=Rr=40.

    Table 2:Confusion matrix for the configuration Run=Rr=40

    As can be seen,most errors when identifying the situation in the CPS are false detections of the noisy situation.Probably,that is caused by the linear term in its probability function,which does not reduce its value as much as the exponential function.If this sensitivity needs to be improved,that linear term should be enriched with new indicators and functions.

    It is also important to evaluate the performance and scalability of the proposed solution to identify its limitations.Fig.7 shows the computational time required for the proposed model to operate.

    Figure 7:Computational delay and scalability(mathematical model)

    As can be seen,the evolution of the computational delay is linear.This is because our model consists of additions and multiplications,without loops or recursive problems.Besides,each new state variable is independent of the others,so the increase is linear.This facilitates the employment of this protection and reconstruction solution in future dense and pervasive scenarios,where up to ten million sensors per square kilometer could be deployed.

    Moreover,the delay is always in the range of milliseconds.Additions and multiplications are performed very efficiently on modern computers,and they require a short time to perform millions of operations.In this case,even for a CPS that includes 100 devices (i.e.,400 state variables) and very complex models (with almost 20 terms in the Taylor series),the computational time required to operate the model is below 100 milliseconds(70 milliseconds,to be precise).Considering the most usual Cyber-Physical Systems capture information from the environment every few seconds,this delay is satisfactory.

    Finally,the same scalability and performance analysis must be applied to the reconstruction and protection algorithm.Fig.8 shows the results.Here,again,the evolution is almost linear,because all the proposed computational procedures do not require any loop or recursive processing.In this case,for the largest deployment(one hundred devices)and a typical value forRunandRrparameters,the delay is above one second.This may be slightly above the acceptable maximum for certain critical realtime applications.For smaller deployments and the same configuration,the delay is below one second(between 100 and 600 milliseconds).But even delays above one second are acceptable in mass noncritical applications,where data are acquired every few seconds.Due to linear evolution,scalability is guaranteed(even in future scenarios)as consumed resources grow at the same rate as the number of sensor nodes in the physical platform.

    Figure 8:Computational delay and scalability(reconstruction and protection algorithm)

    In conclusion,considering the limitations that may arise in critical real-time applications,the performance of the proposed reconstruction and protection mechanism is satisfactory.

    5 Conclusions and Future Works

    This paper presents a new stochastic model to represent the behavior of Cyber-Physical Systems precisely.This model includes unknown multivariate discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and random effects in the physical and computational worlds.As a novelty,in this model,engineered processes such as the digitalization stage are represented too.Additionally,and contrary to the commonly employed deterministic attackers,in this new model attackers are described through a stochastic process.Standard error sources are estimated through different indicators and non-linear techniques(such as the Fourier transform,first-return maps,or the probability density function).Finally,the reconstruction mechanism consists of a weighted stochastic model combining all error sources.The actual reconstructed value is generated as the output from a decision algorithm.

    Experimental results show that the precision of the proposed model is above 90%,with a residual error between 6% and 2% for the most common configurations.Additionally,the sensitivity of the proposed reconstruction and protection algorithm is up to 92%.Considering all this,the proposed solution is a valid security scheme for CPS.

    Future works will analyze new indicators and probability functions to improve the sensitivity,especially in noisy situation.In addition,the solution will be deployed in real industrial scenarios with legacy systems,to study the impact of second-order effects such as reduced connectivity or human accidents and manipulations.

    Acknowledgement:The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers,which have improved the presentation.

    Funding Statement:This work is supported by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design: Borja Bordel;data collection: Ramón Alcarria,Borja Bordel;analysis and interpretation of results:Ramón Alcarria,Tomás Robles;draft manuscript preparation:Borja Bordel,Tomás Robles.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Data sharing is not applicable to this article as no new data were created or analyzed in this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    十八禁网站网址无遮挡| 最近最新中文字幕免费大全7| 成人18禁高潮啪啪吃奶动态图| 中文乱码字字幕精品一区二区三区| 天天躁夜夜躁狠狠躁躁| 久久这里有精品视频免费| 欧美最新免费一区二区三区| 只有这里有精品99| 国产亚洲午夜精品一区二区久久| 性色avwww在线观看| 蜜桃国产av成人99| 国产午夜精品一二区理论片| 熟女电影av网| 搡女人真爽免费视频火全软件| 日韩av免费高清视频| av电影中文网址| 熟妇人妻不卡中文字幕| 免费看光身美女| 国产极品天堂在线| 91久久精品国产一区二区三区| 曰老女人黄片| 国产又爽黄色视频| 国产精品久久久久久久电影| 国产一区二区在线观看av| 久久97久久精品| 蜜桃国产av成人99| 99re6热这里在线精品视频| 汤姆久久久久久久影院中文字幕| 国产男人的电影天堂91| 亚洲综合精品二区| 内地一区二区视频在线| 黄色一级大片看看| 观看av在线不卡| 综合色丁香网| 另类精品久久| 亚洲,欧美精品.| 亚洲一区二区三区欧美精品| 国国产精品蜜臀av免费| 黄色视频在线播放观看不卡| 男人添女人高潮全过程视频| 亚洲欧美一区二区三区黑人 | 爱豆传媒免费全集在线观看| 欧美日韩国产mv在线观看视频| 亚洲美女搞黄在线观看| 亚洲中文av在线| 国产极品粉嫩免费观看在线| av国产精品久久久久影院| 婷婷成人精品国产| 91精品三级在线观看| 国产精品成人在线| 成人漫画全彩无遮挡| 久久精品夜色国产| 少妇的逼水好多| 久久免费观看电影| 国产精品欧美亚洲77777| 国产精品一区www在线观看| 亚洲国产看品久久| 欧美精品一区二区大全| 久久久国产一区二区| 在线 av 中文字幕| 国产淫语在线视频| 中文天堂在线官网| 少妇的逼好多水| a级毛片黄视频| 国产淫语在线视频| 日韩人妻精品一区2区三区| 国产亚洲午夜精品一区二区久久| 九色亚洲精品在线播放| 热99久久久久精品小说推荐| 欧美精品人与动牲交sv欧美| 国产黄频视频在线观看| 男女高潮啪啪啪动态图| 丰满少妇做爰视频| 在线观看www视频免费| 亚洲久久久国产精品| 日本色播在线视频| av国产精品久久久久影院| 三上悠亚av全集在线观看| 黄色配什么色好看| 搡女人真爽免费视频火全软件| 大片免费播放器 马上看| 精品人妻一区二区三区麻豆| 在线天堂最新版资源| 黑人高潮一二区| 在现免费观看毛片| 久久狼人影院| 汤姆久久久久久久影院中文字幕| 狂野欧美激情性xxxx在线观看| 青春草国产在线视频| 午夜福利,免费看| 日本色播在线视频| 91精品伊人久久大香线蕉| 99久久人妻综合| 波野结衣二区三区在线| av片东京热男人的天堂| 大香蕉97超碰在线| 青春草视频在线免费观看| 亚洲伊人久久精品综合| 91精品国产国语对白视频| 韩国精品一区二区三区 | 亚洲欧美中文字幕日韩二区| 午夜免费观看性视频| 亚洲精品视频女| 免费大片18禁| 国产精品蜜桃在线观看| 久久久国产精品麻豆| 久久久久久伊人网av| 日本欧美国产在线视频| 精品一品国产午夜福利视频| 丝袜人妻中文字幕| 综合色丁香网| 老熟女久久久| 狠狠婷婷综合久久久久久88av| 亚洲综合色网址| 97人妻天天添夜夜摸| 亚洲精华国产精华液的使用体验| 如日韩欧美国产精品一区二区三区| 久久97久久精品| 伊人久久国产一区二区| 久久人妻熟女aⅴ| 国国产精品蜜臀av免费| 国产无遮挡羞羞视频在线观看| 五月开心婷婷网| 中国三级夫妇交换| 曰老女人黄片| 尾随美女入室| 亚洲欧美成人综合另类久久久| 一级毛片我不卡| 久久国产精品男人的天堂亚洲 | 久久久久久久大尺度免费视频| 女性生殖器流出的白浆| 十分钟在线观看高清视频www| 国产老妇伦熟女老妇高清| 久久毛片免费看一区二区三区| 亚洲精品,欧美精品| 亚洲欧美日韩卡通动漫| 精品人妻一区二区三区麻豆| 边亲边吃奶的免费视频| 欧美性感艳星| 18禁观看日本| 欧美日韩一区二区视频在线观看视频在线| √禁漫天堂资源中文www| 在线观看www视频免费| 90打野战视频偷拍视频| 亚洲国产欧美在线一区| 秋霞在线观看毛片| 九草在线视频观看| 国产一区亚洲一区在线观看| 一二三四在线观看免费中文在 | 国产视频首页在线观看| 欧美日韩亚洲高清精品| 国产av码专区亚洲av| 日韩av免费高清视频| 久久久精品区二区三区| 国产男女超爽视频在线观看| 久久久久久久久久人人人人人人| www.色视频.com| 亚洲一级一片aⅴ在线观看| 夫妻午夜视频| 有码 亚洲区| √禁漫天堂资源中文www| 亚洲av电影在线观看一区二区三区| 黄色毛片三级朝国网站| 国产有黄有色有爽视频| 五月伊人婷婷丁香| 一级a做视频免费观看| 毛片一级片免费看久久久久| 欧美丝袜亚洲另类| 国产成人午夜福利电影在线观看| 国产成人精品久久久久久| 一级毛片 在线播放| 久久影院123| 亚洲高清免费不卡视频| 精品卡一卡二卡四卡免费| 久久青草综合色| av电影中文网址| 97在线人人人人妻| 在线天堂中文资源库| 久久99一区二区三区| 草草在线视频免费看| 国产激情久久老熟女| 精品一区二区三区视频在线| 国产高清三级在线| 久久鲁丝午夜福利片| 在线观看免费日韩欧美大片| 免费久久久久久久精品成人欧美视频 | 国产精品 国内视频| 国产精品国产三级国产av玫瑰| 亚洲,一卡二卡三卡| 99热这里只有是精品在线观看| 精品人妻在线不人妻| 成年美女黄网站色视频大全免费| 香蕉国产在线看| 午夜久久久在线观看| 国产精品久久久久成人av| 乱人伦中国视频| 成人免费观看视频高清| 只有这里有精品99| 视频中文字幕在线观看| 国产精品久久久久久久久免| 亚洲久久久国产精品| 最新的欧美精品一区二区| 2018国产大陆天天弄谢| 午夜福利视频精品| 999精品在线视频| 久久狼人影院| 久久国产精品男人的天堂亚洲 | 99热国产这里只有精品6| 夫妻午夜视频| 亚洲av免费高清在线观看| 欧美成人精品欧美一级黄| 青春草视频在线免费观看| 国产白丝娇喘喷水9色精品| 制服诱惑二区| 自拍欧美九色日韩亚洲蝌蚪91| 中文字幕精品免费在线观看视频 | 精品国产一区二区久久| 日本av手机在线免费观看| 亚洲精品日本国产第一区| 国产又爽黄色视频| 香蕉丝袜av| 日日撸夜夜添| 18禁在线无遮挡免费观看视频| 18禁动态无遮挡网站| 久久鲁丝午夜福利片| 国产极品天堂在线| 久久99热这里只频精品6学生| 香蕉精品网在线| 免费大片黄手机在线观看| 国产一区二区三区av在线| 国产精品三级大全| 亚洲,一卡二卡三卡| 少妇 在线观看| 国产亚洲精品第一综合不卡 | 午夜激情久久久久久久| 99久久综合免费| 女的被弄到高潮叫床怎么办| 国产午夜精品一二区理论片| 成人毛片a级毛片在线播放| 自拍欧美九色日韩亚洲蝌蚪91| 欧美 亚洲 国产 日韩一| 乱人伦中国视频| 深夜精品福利| 大陆偷拍与自拍| 街头女战士在线观看网站| 亚洲内射少妇av| 女性被躁到高潮视频| 午夜免费观看性视频| 久久99一区二区三区| 成人国语在线视频| 热re99久久国产66热| 国产无遮挡羞羞视频在线观看| 不卡视频在线观看欧美| 中文字幕人妻熟女乱码| 欧美日韩视频高清一区二区三区二| 一区二区三区乱码不卡18| 久久人人爽人人片av| 99久久人妻综合| 国产免费现黄频在线看| 亚洲天堂av无毛| 亚洲国产精品一区三区| 丝袜在线中文字幕| 成人亚洲精品一区在线观看| 两性夫妻黄色片 | 亚洲欧洲精品一区二区精品久久久 | 一级毛片 在线播放| 亚洲欧洲日产国产| av不卡在线播放| 巨乳人妻的诱惑在线观看| 母亲3免费完整高清在线观看 | 成年人免费黄色播放视频| 精品少妇黑人巨大在线播放| a级毛片在线看网站| 一级毛片电影观看| 26uuu在线亚洲综合色| 久久人人爽av亚洲精品天堂| 美女国产高潮福利片在线看| 午夜影院在线不卡| 国产免费一级a男人的天堂| 啦啦啦在线观看免费高清www| 最近的中文字幕免费完整| 欧美人与善性xxx| 国产国语露脸激情在线看| 热re99久久国产66热| 国产69精品久久久久777片| 巨乳人妻的诱惑在线观看| 黄色一级大片看看| 波多野结衣一区麻豆| 亚洲精品久久午夜乱码| 天堂俺去俺来也www色官网| 欧美人与善性xxx| 亚洲欧美成人综合另类久久久| 国语对白做爰xxxⅹ性视频网站| av在线app专区| 在线天堂最新版资源| 人人妻人人澡人人看| 综合色丁香网| 97人妻天天添夜夜摸| 在线观看免费视频网站a站| 国产精品偷伦视频观看了| 一区二区三区四区激情视频| 麻豆精品久久久久久蜜桃| 久久精品国产亚洲av涩爱| 99香蕉大伊视频| 亚洲色图综合在线观看| 97在线人人人人妻| 纵有疾风起免费观看全集完整版| 亚洲国产精品一区三区| 国产成人aa在线观看| 亚洲图色成人| 国产毛片在线视频| 亚洲精品自拍成人| 精品久久蜜臀av无| av不卡在线播放| 国产色婷婷99| 边亲边吃奶的免费视频| 观看美女的网站| 日韩一区二区视频免费看| www.色视频.com| 97精品久久久久久久久久精品| 国产一区二区三区综合在线观看 | 2018国产大陆天天弄谢| 2021少妇久久久久久久久久久| 韩国精品一区二区三区 | 丰满迷人的少妇在线观看| 国产精品国产三级国产专区5o| 亚洲,欧美,日韩| 欧美日韩视频精品一区| 日日摸夜夜添夜夜爱| 亚洲图色成人| 免费观看av网站的网址| 国产片内射在线| 韩国精品一区二区三区 | 国产乱人偷精品视频| 69精品国产乱码久久久| 9热在线视频观看99| 欧美日本中文国产一区发布| 国产国语露脸激情在线看| 久久精品国产综合久久久 | 天天躁夜夜躁狠狠久久av| 亚洲内射少妇av| 97精品久久久久久久久久精品| 99re6热这里在线精品视频| 国产精品国产三级国产av玫瑰| 亚洲国产精品成人久久小说| 亚洲,欧美精品.| 日韩中字成人| 一区二区三区乱码不卡18| 在线观看免费视频网站a站| 制服诱惑二区| 欧美日韩国产mv在线观看视频| 日韩在线高清观看一区二区三区| 丰满乱子伦码专区| 两个人免费观看高清视频| 精品久久蜜臀av无| 中文字幕亚洲精品专区| 国产成人精品无人区| 日本爱情动作片www.在线观看| 国产精品蜜桃在线观看| 亚洲国产日韩一区二区| 一区二区三区精品91| 久久99热这里只频精品6学生| 女人被躁到高潮嗷嗷叫费观| 久久人妻熟女aⅴ| 欧美另类一区| 亚洲国产成人一精品久久久| 全区人妻精品视频| 制服人妻中文乱码| 久久精品国产鲁丝片午夜精品| 久久免费观看电影| av国产精品久久久久影院| 精品亚洲乱码少妇综合久久| av在线观看视频网站免费| av不卡在线播放| 国产白丝娇喘喷水9色精品| 一二三四中文在线观看免费高清| 成人免费观看视频高清| 久久久久人妻精品一区果冻| 夜夜爽夜夜爽视频| 视频区图区小说| 少妇熟女欧美另类| 成人亚洲精品一区在线观看| 国产国语露脸激情在线看| 亚洲国产最新在线播放| 精品国产一区二区三区四区第35| 亚洲精品久久久久久婷婷小说| 美女xxoo啪啪120秒动态图| 亚洲伊人色综图| 中文欧美无线码| 亚洲精品国产av成人精品| 熟女av电影| 一级毛片 在线播放| 国产日韩欧美视频二区| 亚洲成色77777| 成人18禁高潮啪啪吃奶动态图| 国产成人精品一,二区| 久久精品久久久久久噜噜老黄| 97精品久久久久久久久久精品| 国产欧美亚洲国产| 国产亚洲最大av| 韩国精品一区二区三区 | 91久久精品国产一区二区三区| 内地一区二区视频在线| 免费女性裸体啪啪无遮挡网站| 成人影院久久| 久久久国产欧美日韩av| 18在线观看网站| 日本欧美国产在线视频| 色5月婷婷丁香| 成人18禁高潮啪啪吃奶动态图| 久久久久久久久久成人| 亚洲欧美日韩卡通动漫| 国产不卡av网站在线观看| av又黄又爽大尺度在线免费看| 成人二区视频| 欧美日韩一区二区视频在线观看视频在线| 色哟哟·www| 男女边摸边吃奶| 黄片播放在线免费| 国产在线一区二区三区精| 满18在线观看网站| 高清不卡的av网站| 国产又色又爽无遮挡免| 中文字幕人妻熟女乱码| 亚洲国产精品成人久久小说| 亚洲中文av在线| 制服人妻中文乱码| 一区二区日韩欧美中文字幕 | 欧美成人精品欧美一级黄| 日韩不卡一区二区三区视频在线| 日本91视频免费播放| 亚洲综合色网址| 国产精品国产av在线观看| 制服人妻中文乱码| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久人妻熟女aⅴ| 9色porny在线观看| 亚洲第一av免费看| 最新的欧美精品一区二区| 性色avwww在线观看| 色5月婷婷丁香| 大片电影免费在线观看免费| 国产成人欧美| 欧美精品一区二区大全| 最后的刺客免费高清国语| 亚洲精品美女久久久久99蜜臀 | 国精品久久久久久国模美| 天天影视国产精品| 成人国产麻豆网| 婷婷色av中文字幕| 国产福利在线免费观看视频| 国产精品久久久久久av不卡| 午夜福利视频在线观看免费| 欧美日韩成人在线一区二区| 亚洲精品国产av成人精品| 久久久精品免费免费高清| 亚洲av成人精品一二三区| 人妻系列 视频| 精品少妇内射三级| 91精品三级在线观看| 91精品国产国语对白视频| 欧美日韩一区二区视频在线观看视频在线| 97人妻天天添夜夜摸| 街头女战士在线观看网站| 九九爱精品视频在线观看| 美女主播在线视频| 建设人人有责人人尽责人人享有的| 成年美女黄网站色视频大全免费| av国产精品久久久久影院| 午夜免费男女啪啪视频观看| 亚洲国产精品专区欧美| 99热6这里只有精品| 久久久久久久久久成人| 亚洲国产欧美在线一区| 亚洲美女搞黄在线观看| 欧美亚洲 丝袜 人妻 在线| 王馨瑶露胸无遮挡在线观看| a级片在线免费高清观看视频| 各种免费的搞黄视频| 国产av一区二区精品久久| xxxhd国产人妻xxx| 免费观看在线日韩| 天堂俺去俺来也www色官网| 亚洲欧洲国产日韩| 国产深夜福利视频在线观看| 日韩不卡一区二区三区视频在线| 美女视频免费永久观看网站| 边亲边吃奶的免费视频| 男男h啪啪无遮挡| av视频免费观看在线观看| 菩萨蛮人人尽说江南好唐韦庄| 国产黄色视频一区二区在线观看| 性高湖久久久久久久久免费观看| 国产精品人妻久久久影院| 久热久热在线精品观看| 伊人亚洲综合成人网| 另类精品久久| 十分钟在线观看高清视频www| av视频免费观看在线观看| 在线观看国产h片| 蜜桃在线观看..| av一本久久久久| 亚洲人成网站在线观看播放| 99久久中文字幕三级久久日本| 久久久精品区二区三区| 久久人妻熟女aⅴ| 综合色丁香网| 国产不卡av网站在线观看| 亚洲国产欧美在线一区| 老熟女久久久| 五月伊人婷婷丁香| 亚洲精品456在线播放app| 免费在线观看黄色视频的| 成人综合一区亚洲| 一边亲一边摸免费视频| 在线观看一区二区三区激情| 国产精品国产三级国产av玫瑰| 国产欧美日韩一区二区三区在线| 亚洲精品视频女| 国产老妇伦熟女老妇高清| 熟女电影av网| av卡一久久| 久久久久精品人妻al黑| 国产亚洲最大av| 秋霞伦理黄片| 777米奇影视久久| 日韩视频在线欧美| 草草在线视频免费看| 欧美丝袜亚洲另类| 黄片无遮挡物在线观看| 如何舔出高潮| 欧美精品国产亚洲| 岛国毛片在线播放| 美女国产高潮福利片在线看| 看非洲黑人一级黄片| 成年女人在线观看亚洲视频| 中文字幕av电影在线播放| 午夜福利网站1000一区二区三区| 纯流量卡能插随身wifi吗| 亚洲内射少妇av| 国产一区二区激情短视频 | 熟妇人妻不卡中文字幕| 2018国产大陆天天弄谢| a级片在线免费高清观看视频| 综合色丁香网| 国产成人精品福利久久| 亚洲精品av麻豆狂野| 免费大片黄手机在线观看| 国产综合精华液| 国产精品国产av在线观看| xxx大片免费视频| 久久精品国产亚洲av天美| 日本午夜av视频| 天天躁夜夜躁狠狠躁躁| 日韩中字成人| 黄网站色视频无遮挡免费观看| 大香蕉久久成人网| 成人二区视频| 国产成人精品婷婷| 久久久久久久久久久免费av| 久久人人爽人人片av| 99久久中文字幕三级久久日本| 深夜精品福利| 精品少妇内射三级| 午夜福利在线观看免费完整高清在| 丝袜脚勾引网站| 日韩av不卡免费在线播放| 少妇人妻精品综合一区二区| 日韩一本色道免费dvd| 9热在线视频观看99| 你懂的网址亚洲精品在线观看| 毛片一级片免费看久久久久| 看免费成人av毛片| 国产成人免费无遮挡视频| 国产成人精品在线电影| 王馨瑶露胸无遮挡在线观看| 免费高清在线观看日韩| 又黄又粗又硬又大视频| 中文天堂在线官网| 成人二区视频| 有码 亚洲区| 久久久久久久久久人人人人人人| 侵犯人妻中文字幕一二三四区| 如日韩欧美国产精品一区二区三区| 国产深夜福利视频在线观看| 亚洲成国产人片在线观看| 欧美成人午夜免费资源| 日韩制服骚丝袜av| 国产亚洲av片在线观看秒播厂| 少妇人妻 视频| 男女午夜视频在线观看 | 少妇熟女欧美另类| 黄片无遮挡物在线观看| 国产成人欧美| 免费播放大片免费观看视频在线观看| av黄色大香蕉| 国产精品欧美亚洲77777| 亚洲国产日韩一区二区| 97精品久久久久久久久久精品| 最近最新中文字幕免费大全7| 国产又色又爽无遮挡免| 免费观看性生交大片5| 日本免费在线观看一区| 国产 精品1| 国产黄色免费在线视频| 久久99热6这里只有精品| 一区在线观看完整版| 国产欧美日韩一区二区三区在线| 免费在线观看黄色视频的| 伊人久久国产一区二区| 又粗又硬又长又爽又黄的视频| 国产xxxxx性猛交| 成人影院久久| 国产精品.久久久| 国产精品熟女久久久久浪|