• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    2024-02-19 12:03:12YingZhangWeimingNiuandLeibingYan

    Ying Zhang,Weiming Niu and Leibing Yan

    1School of Electronic Information Engineering,Henan Institute of Technology,Xinxiang,453003,China

    2Houde College,Henan Institute of Technology,Xinxiang,453003,China

    ABSTRACT

    In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shiftmatrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.

    KEYWORDS

    Mobile edge computing(MEC);unmanned aerial vehicle(UAV);intelligent reflecting surface(IRS);zero forcing(ZF)

    1 Introduction

    With the development of communication technology,security issues have received more attention[1–3].Due to the broadcast characteristics of wireless channel,the information transmitted can be easily obtained by non target users[4–6].Due to its unique advantages,namely mobility and flexibility,UAV communication plays a very important role in supporting safe communication.Where traditional base stations cannot cover,UAVs can use their flexibility to provide more effective services[7,8].

    Traditional physical layer security technologies focus on improving the confidentiality of received information [9,10],for example,by changing the coding method,using redundant information in the coding to check and interfere,or changing the amplitude and phase of the transmission signal to carry additional information[11–13].Physical layer security technology can improve the security transmission rate of information through pre-designed policies.In recent years,researchers have become more and more aware of possible eavesdroppers in communication scenarios [14–16].More and more eavesdroppers are studying physical layer security technology.At this time,the ability of the eavesdropper is limited to (1) eavesdropping channel; (2) the transmission rate of the sender.As the research on security continues to expand,eavesdroppers have more forms.

    However,the security of communication does not only include the above parts,but also the ability of eavesdroppers is evolving.In recent research,the concept of active monitoring was first proposed in [17,18],which aimed to improve the eavesdropping rate through the transmission of Gaussian noise by the eavesdropper; Huang et al.[19] further proposed that the eavesdropper can choose to send Gaussian noise to improve its eavesdropping ability.For the situation of the above intelligent eavesdroppers,a lot of research has not been carried out to counter them[20,21].

    IRS is a passive device,which can reconstruct the sender’s signal and enhance or weaken the specific user by changing the channel parameters [22,23].Because of the excellent characteristics of IRS,it has been widely used and studied in secure communication.For example,in[24],the authors proposed to use IRS to assist multi-user communication.By designing the transmission beam and IRS phase shift matrix,the minimum secrecy rate among users was improved.In [25],the authors considered that the IRS would recode the new source transmission signal,that is,the user’s receiving rate and the eavesdropper’s receiving rate could be improved at the same time,it broken through the traditional upper bound of safe rate[26,27].

    IRS assisted UAV communication also has a wide range of application scenarios.When UAV is used as air base station,IRS can be used as a ground equipment to improve the effective speed between UAV and users;When the UAV is used as a relay,the communication rate can be improved by adjusting the flight path of the UAV and the phase shift matrix of the IRS.

    In this paper,we consider using IRS assisted UAVs to promote the safe communication of ground users.The specific contributions of this paper are as follows:

    1.We consider the security in mobile edge computing.We use the IRS auxiliary computing tasks carried by UAV to unload,with the goal of reducing the system delay on the premise of ensuring safe transmission.

    2.We preset the working mode of the eavesdropper and propose to control the eavesdropper’s transmitting beam in the form of maximum ratio transmission through the joint design of the transmitting beam of the base station,the flight path of the UAV,and the phase shift matrix of the IRS.

    3.We propose an algorithm based on interior point method and alternate optimization,and propose a sub-optimal scheme based on zeroing method with low complexity.

    4.In the simulation section,we set a communication environment based on Rayleigh channel,and the positions of users and eavesdroppers are randomly set in each simulation.Simulation results show that the proposed scheme can effectively reduce the latency of mobile edge computing.

    In the second section,we establish the original optimization problem; In the third section,we first estimate the transmission strategy of the eavesdropper,and transform the original optimization problem;In the fourth section,we solve the transformed optimization problem and obtain the design scheme by using the interior point method and alternative optimization;In the fifth section,we carry out the simulation experiments,and then the sixth chapter summarizes the full text.

    2 System Model and Problem Formulation

    In this section,we first introduce the system model,then take the secrecy rate as our optimization goal,and establish the original optimization problem.

    2.1 System Model

    We consider that the system consists of one user,one proactive eavesdropper,a UAV and an IRS.As shown in Fig.1,the user and the eavesdropper are both equipped with multi-antennas.For the sake of generality,we assume that the channel between UAV and ground users is the superposition of LOS channel and NLOS channel.The IRS containsNIRS elements,each of which can be designed independently to change the channel of the IRS to the user; It is worth noting that the information transmitted by the UAV to each ground user is dual:the UAV itself will forward signals from the user;The IRS will also reflect the signal.The specific expression is proposed as follows:

    where yurefers to the signal received at UAV.huand hiuspecifically represent the direct channels from user to UAV and the reflecting link,which defined as follows:

    whereαurepresents to the proportion of LOS channels in mixed channels for the user,hu,1and hu,2respectively refer to the channel from the user to IRS and that from IRS to UAV,and G is the phase shift matrix of IRS expressed as

    The gain of the LOS channel is only related to the physical distance between users and UAV,which conforms to the general assumption that the farther the distance is,the smaller the channel gain is.The specific formula is as follows:

    Figure 1 :System model

    Similarly,the channel between the physical distance is calculated as follows:

    where (xi,yi) represents the position of UAV at time sloti,(xu,yu) represents the user position,and(xe,ye) represents the eavesdropper position.It is worth noting that the UAV can identify the exact location of users and eavesdroppers through cameras and other external devices,but the channels between users and eavesdroppers is NLOS channel,which is caused by ground shelters.

    2.2 Problem Formulation

    According to Shannon’s theorem,we can first obtain the user’s reception rate,which can be expressed as

    The eavesdropper’s eavesdropping ability can be expressed by its eavesdropping rate,which is defined as

    Here,it could be assumed that the information intercepted by the eavesdropper is redundant information used to fill in the received code,i.e.,the secrecy rate could be expressed as

    Based on the above discussion,we formulate the optimization problem as

    The first constraint indicates that the element dependencies of the IRS should satisfy the legitimacy.The second constraint restricts the transmission power of the base station in each time slot,and the total consumed power of the time slot in the entire communication cycle should also meet the constraint,which is shown in the last constraint.In addition,UAVs will also be constrained by their flight speed.

    3 Proposed Solution

    In this section,we first want to obtain the transmission strategy of the eavesdropper,that is,the relationship between the transmission vector of the eavesdropper and the optimization variables we propose(the transmission vector of the base station,the flight path of the UAV,and the dependency matrix of the IRS),and then substitute the closed expression into the original problem to realize the conversion of the equivalent problem;then,we solve the original problem by using the interior point method and alternative optimization method.

    3.1 Active Eavesdropping Strategy Acquisition

    In this section,we simulate the strategies taken by eavesdroppers.Note that we cannot directly design the strategy of the eavesdropper,because we cannot directly interfere with the strategy of the eavesdropper.However,we can potentially affect the sending strategy of the eavesdropper by changing the receiving state of the eavesdropper.

    Lemma 1:The transmission beam of the eavesdropper conforms to the following form:

    αandβare both parameters and could be obtained via the following equations:

    The eavesdropping rate is thus expressed as

    Proof.Please refer to Theorem 1 in[18].

    According to Lemma 1,it is obvious that the transmission rate of the eavesdropper depends on the received signal and the channel from the UAV to the eavesdropper.When the eavesdropper has a chance to eavesdrop successfully,it maximizes the eavesdropping rate while ensuring the transmission rate;When the eavesdropper is unable to eavesdrop,it will maximize the user’s reception rate,and then the eavesdropper will degenerate into a malicious attacker.

    By substituting the results in Lemma 1 into the original problem,we construct the following problem:

    In (18),the eavesdropper could successfully eavesdrop on this MEC network.Meanwhile,the user’s secrecy rate is 0.

    In the above two problems,we also pay attention to two different situations.The first is that we cannot prevent eavesdroppers from acquiring information.This extreme situation occurs when the channel quality of eavesdroppers is much higher than the receiving channel,and the number of IRS elements is small.Normally,this kind of situation will not happen.Because as long as the transmission beam is controlled in the null space of the eavesdropping channel,eavesdroppers can be completely avoided.Therefore,we will only discuss such cases briefly and then focus on the second case,namely maximizing the security transmission rate.

    3.2 Trajectory Design

    In this section,we focus on the trajectory design of the UAV when the IRS phase shift matrix and the transmitting beam of the base station are fixed.Let’s first transform the question into the following format:

    Note that we can solve the problem iteratively.To be specific,we first set up an initial trajectory,such as the constant speed straight flight of UAV.Then on this basis,we optimize the trajectory step by step,and the iteration method is proposed as follows:

    where

    Then the original problem could be solved by iterations.

    3.3 Beamforming Matrices Design

    In this subsection,we would like to obtain the beamforming matrix design for the base station.In specific,we set the trajectory of the UAV and the phase shift matrix of the IRS as fixed setting,and put forward the following problem:

    We introduce two variables defined as

    The power send by the user could be expressed as

    whereh[n]refers to the channel gain innth time slot.

    (27)is convex and could be solved by CVX[28].

    3.4 Phase-Shift Matrix Design

    In this section,we optimize the transmitting beam of the user.We first transform the following problem:

    In addition,the above problem is a non-convex objective function composed of coupling variables.In order to convert the molecules of the objective function into concave functions,we consider introducing relaxation variables and using the SCA method.By introducing relaxation variables,the throughput can be rewritten as

    Algorithm 3.1:Proposed algorithm

    Note that the problem (29) is still non-convex,we choose the lower bound of the optimization objective function[29].At this time,the problem can be transformed into

    In order to solve the problem (32),we use the method of first order Taylor expansion and continuous convex approximation.

    3.5 Alternate Optimization Algorithm Design

    In this subsection,we summarize the above algorithm process and propose an overall algorithm based on alternative optimization.In our algorithm,we mainly include the nesting of three subproblems.In the trajectory optimization of UAV,we use a small iterative method.After iterative convergence,it is added into the loop composed of the phase shift matrix of the IRS and the transmitting beam of the base station.

    Due to the high coupling between variables,the convergence of the algorithm is given by simulation experiments.

    4 Sub-Optimal Solution

    In this section,we propose a suboptimal solution based on the zeroing method and analyze its computational complexity expenditure,which has a lower computational cost compared with the iterative algorithm.

    4.1 Zeros-Force Method

    In this subsection,we propose a suboptimal solution to the original problem,that is,by controlling the transmitting beam of the base station and the phase shift matrix of the IRS,the eavesdropper’s receiving beam is limited to its zero space.At this point,an additional constraint needs to be added and the optimization problem needs to be rewritten as follows:

    To solve this problem,we divide the problem into two sub-problems.In the first sub-problem,we focus on the design of the transmission beam of the base station and the phase shift matrix of the IRS,and rewrite it as

    In the second sub-problem,we focus on the flight path design of UAV.It is worth noting that we only need to pay attention to its impact on the safety rate when designing the flight path of UAV.

    We finally get a simplified problem,and then we can use the interior point method to solve it by iteratively solveMiandθas in the AO-based scheme.

    Further,we obtain the following algorithm with ZF based method.

    5 Complexity Analysis

    We focus on the complexity of proposed schemes and two traditional schemes:MRT scheme and OA algorithm.As shown in Table 1,note that MRT scheme gets the minimum complexity since it has a closed-form solution.The proposed sub-optimal get less complexity than the optimal scheme.

    Table 1 : Complexity analysis

    6 Discussion

    We designed the transmission power of the base station,the flight path of the UAV,and the reflection matrix of the IRS to maximize the safety rate for scenarios with intelligent eavesdroppers.In view of the different working modes of the eavesdropper,we first analyze the rationality of the design scheme and then propose the scheme based on the interior point method and alternative optimization,as well as the sub-optimal scheme based on zero space.

    The reason why we are targeting the scene of intelligent eavesdroppers is that with the development of communication technology,especially the widespread concern about secure communication,more and more emerging technologies may also be used by criminals.We need to guard against such active eavesdroppers.

    Algorithm 4.1:Proposed algorithm

    There is still much to be learned about the confrontation of intelligent eavesdroppers.Although we only focus on some idealized scenarios in this article,we still put forward many constructive suggestions,such as adopting different strategies for the working mode of eavesdroppers and how to design a low-complexity scheme.With regard to multi-user design and more working modes of eavesdroppers,we leave the work for the future.

    7 Numerical Results

    In this section,we first list the parameters required for the simulation environment as shown in Fig.2,then simulate the results under different settings,and analyze the advantages of the proposed algorithm.

    7.1 Simulation Parameters

    In this subsection,we build the simulation environment.The UAV flies at a fixed altitude,and its starting and ending points are fixed.The air-to-ground channel is composed of NLOS and LOS channels.The ground channel is NLOS channel,and the location of users and eavesdroppers is known.The specific parameters are shown in Table 2.

    Table 2 : Simulation parameters

    Figure 2 :Simulation area

    7.2 Simulation Results

    In this section,we conducted simulation experiments on the proposed scheme,mainly including(1)the proposed scheme;(2)the proposed sub-optimal scheme;(3)the maximum rate scheme;(4)the scheme against potential eavesdroppers; (5) no IRS scheme; (6) the fixed IRS scheme.The specific results are as follows.

    We first pay attention to the convergence of the proposed algorithm,that is,the proposed iterative algorithm.As we stated earlier,the convergence of the algorithm is obtained through simulation experiments.As shown in Fig.3,the convergence rate of our proposed algorithm is slightly different at different initial points,but they all converge within 10 times.The convergence speed is equivalent to the scheme for dealing with silent listeners.However,the figure shows that the safety rate of convergence is higher than that of the comparison scheme.We will conduct more simulation experiments in the future to prove the superiority of our proposed scheme.

    Figure 3 :Convergence of the proposed algorithm

    We focus on the flightpath of the UAV in Fig.4.Since the initial point and end point of the UAV are not the same points,we limit the UAV path to a straight line.At this time,the UAV is dense at some points and sparse atother places.Specifically,when the position of the UAV can be adapted to the phase control of the IRS,its flight speed will be reduced to extend the time it stays in the dominant area.It is worth noting that the UAV cannot stay at a certain point for a long time,and hovering will consume more energy andlose the ability to face multiple users.

    Figure 4 :Trajectory of UAV

    We also focused on the impact of the number of IRS elements on the security rate in Fig.5.IRS plays a very important role in our proposed scheme.As an important indicator that directly affects the performance of IRS,the number of IRS elements deserves our further attention.Of course,the more elements of the IRS,the better.However,because there is a certain distance between the elements of the IRS,more elements may bring load pressure and security risks.We consider a reasonable range,that is when the number of IRS elements increases from 20 to 100.

    Figure 5 :Security rate vs.the number of elements of IRS

    In Fig.6,we show the curve of the secrecy rate changing with user power.When the user power increases,the security rate also increases.It is worth noting that the MRT scheme in the curve crosses the curve without IRS.This is because when the user power is low,the MRT scheme can ensure a higher transmission rate,thus achieving better security.When the user power increases,the MRT scheme is not flexible enough.Although the scheme without IRS can not gain from IRS,it can gain ga by adjusting the user’s transmitted beam.

    We show the relationship between safety rate and noise power in Fig.7.Noise power is the background white noise that cannot be avoided in the communication process.It will not only reduce the rate of legal communication but also reduce the eavesdropping ability of eavesdroppers.However,in our proposed scheme,with the increase of noise power,the decrease in secrecy rate is the smallest,which shows that our proposed scheme can still ensure a higher safety rate in a very noisy and harsh environment.

    In traditional eavesdropping scenarios,the power of the eavesdropper is not concerned,because when the eavesdropper is silent,the power of the eavesdropper cannot affect the entire communication system.However,when the eavesdropper is proactive eavesdropping,the increase of eavesdropping power will reduce the security of the system.As shown in Fig.8,with the increase in eavesdropper power,the security rate will also decrease.It is worth noting that when the power of the eavesdropper increases,it will increase the interference to the communication link,thus reducing the security rate.

    Figure 6 :Security rate vs.power of base station

    Figure 7 :Security rate vs.power of noise

    Figure 8 :Security rate vs.power of eavesdropper

    8 Conclusion

    In this paper,we designed the transmitting beam of the user,the trajectory of the UAV,and the phase shift matrix of the IRS to maximize the user’s secrecy rate.We analyzed the two working modes of the eavesdropper and potentially controlled its transmitting beam.We added the influence factor of the eavesdropper as an optimization variable into the design scheme and proposed a local optimization scheme based on the interior point method and alternative optimization.In addition,we designed a suboptimal scheme based on the zero forcing method to reduce the computational complexity.The simulation results showed that the proposed iterative scheme is superior to the suboptimal scheme and has a higher secrecy rate than the existing schemes.

    Acknowledgement: The authors wish to express their appreciation to the reviewers for their helpful suggestions which greatly improved the presentation of this paper.

    Funding Statement: This work was supported by the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212),Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005)and Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Ying Zhang;data collection:Weiming Niu;analysis and interpretation of results:Leibing Yan.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:All data is synthesized using MATLAB and the generation method is described in detail in the simulation section.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲国产精品专区欧美| 全区人妻精品视频| 亚洲美女搞黄在线观看| 性插视频无遮挡在线免费观看| 99热网站在线观看| 大话2 男鬼变身卡| 久久这里有精品视频免费| 欧美xxxx性猛交bbbb| 久久久精品94久久精品| 久久欧美精品欧美久久欧美| 欧美日本视频| 99久国产av精品| 欧美zozozo另类| 日韩大片免费观看网站 | 国产精品一区二区在线观看99 | 日日干狠狠操夜夜爽| 亚洲怡红院男人天堂| 精品国产露脸久久av麻豆 | 亚洲国产最新在线播放| 五月玫瑰六月丁香| 男女啪啪激烈高潮av片| 麻豆成人av视频| 蜜桃久久精品国产亚洲av| 久久精品国产亚洲av涩爱| 如何舔出高潮| 最后的刺客免费高清国语| 国产亚洲91精品色在线| 国产av在哪里看| 国产白丝娇喘喷水9色精品| 国产成人精品一,二区| 国产麻豆成人av免费视频| 免费观看人在逋| 婷婷六月久久综合丁香| 国产精品一区二区性色av| 在线播放无遮挡| 亚洲精品乱码久久久v下载方式| 国产精品熟女久久久久浪| 床上黄色一级片| 国产真实伦视频高清在线观看| 人人妻人人澡人人爽人人夜夜 | 国产精品久久视频播放| 97超视频在线观看视频| 亚洲精品乱码久久久久久按摩| 国产成人freesex在线| 午夜久久久久精精品| 午夜激情福利司机影院| 免费搜索国产男女视频| 国产高清视频在线观看网站| 只有这里有精品99| .国产精品久久| 麻豆一二三区av精品| 久热久热在线精品观看| 男插女下体视频免费在线播放| 久久久精品94久久精品| 免费播放大片免费观看视频在线观看 | 亚洲美女搞黄在线观看| 亚洲国产精品成人久久小说| 一个人免费在线观看电影| 亚州av有码| 亚洲欧美日韩无卡精品| 高清午夜精品一区二区三区| 国产又色又爽无遮挡免| 亚洲精品乱码久久久v下载方式| 欧美色视频一区免费| 超碰av人人做人人爽久久| 精品熟女少妇av免费看| 直男gayav资源| 春色校园在线视频观看| 欧美性猛交╳xxx乱大交人| 九九久久精品国产亚洲av麻豆| 久久久久久九九精品二区国产| 日韩,欧美,国产一区二区三区 | 精品久久久久久电影网 | 一边摸一边抽搐一进一小说| 久久久精品94久久精品| 美女国产视频在线观看| 黄片无遮挡物在线观看| 在线观看66精品国产| 18+在线观看网站| 级片在线观看| 国产精品伦人一区二区| 99在线视频只有这里精品首页| 69人妻影院| 亚洲内射少妇av| 日韩精品有码人妻一区| 日韩av不卡免费在线播放| 亚洲成色77777| 欧美日韩国产亚洲二区| 国产一区有黄有色的免费视频 | or卡值多少钱| 国产av不卡久久| 亚洲美女视频黄频| 日日啪夜夜撸| 国产精品久久久久久久电影| 国产探花极品一区二区| 欧美潮喷喷水| 国产乱人偷精品视频| 国产视频内射| 在线免费十八禁| 成人无遮挡网站| 91在线精品国自产拍蜜月| 日本猛色少妇xxxxx猛交久久| 久久精品夜夜夜夜夜久久蜜豆| 午夜福利在线在线| 免费观看在线日韩| 欧美不卡视频在线免费观看| 亚洲精华国产精华液的使用体验| 最新中文字幕久久久久| 精品国产露脸久久av麻豆 | 欧美xxxx性猛交bbbb| 午夜免费激情av| 欧美zozozo另类| 国产精品女同一区二区软件| 亚洲内射少妇av| 日本午夜av视频| 亚洲激情五月婷婷啪啪| 久久99精品国语久久久| 高清日韩中文字幕在线| 狠狠狠狠99中文字幕| 中文乱码字字幕精品一区二区三区 | 久久欧美精品欧美久久欧美| 日本黄大片高清| 久久久久久久久久久免费av| 国产成人一区二区在线| 国产在线男女| 免费黄网站久久成人精品| 啦啦啦啦在线视频资源| 最近的中文字幕免费完整| 精品欧美国产一区二区三| 一区二区三区免费毛片| 女人十人毛片免费观看3o分钟| 淫秽高清视频在线观看| 最近最新中文字幕免费大全7| 国产 一区精品| 亚洲激情五月婷婷啪啪| 亚洲精品aⅴ在线观看| 在线天堂最新版资源| 看十八女毛片水多多多| 日韩在线高清观看一区二区三区| 久久精品熟女亚洲av麻豆精品 | 狠狠狠狠99中文字幕| 国产精品女同一区二区软件| 久久久久久大精品| 国产亚洲午夜精品一区二区久久 | 久久精品国产99精品国产亚洲性色| 在线免费十八禁| 好男人在线观看高清免费视频| 日韩高清综合在线| 美女内射精品一级片tv| 国产成人a∨麻豆精品| 免费大片18禁| 国产精品女同一区二区软件| 18禁在线播放成人免费| av在线播放精品| 亚洲精品色激情综合| 亚洲国产欧美在线一区| 最近视频中文字幕2019在线8| 国模一区二区三区四区视频| 亚洲最大成人手机在线| 精品一区二区三区视频在线| 日本一二三区视频观看| 精品欧美国产一区二区三| 国产精品熟女久久久久浪| 如何舔出高潮| 男人狂女人下面高潮的视频| 桃色一区二区三区在线观看| 免费黄色在线免费观看| 乱系列少妇在线播放| 在现免费观看毛片| 2021少妇久久久久久久久久久| 免费观看的影片在线观看| 99久久精品国产国产毛片| 国产亚洲av嫩草精品影院| 亚洲四区av| av女优亚洲男人天堂| 亚洲欧美中文字幕日韩二区| 久久久久网色| 能在线免费观看的黄片| 国产成人aa在线观看| 51国产日韩欧美| 久久精品夜色国产| 午夜激情欧美在线| 国产精品国产三级国产专区5o | 一级黄色大片毛片| 中文亚洲av片在线观看爽| 国产熟女欧美一区二区| 久久精品91蜜桃| 亚洲av日韩在线播放| 22中文网久久字幕| 91av网一区二区| 听说在线观看完整版免费高清| 一个人免费在线观看电影| 校园人妻丝袜中文字幕| 亚洲高清免费不卡视频| 午夜老司机福利剧场| 久久久久九九精品影院| 亚洲四区av| 熟女人妻精品中文字幕| 狂野欧美白嫩少妇大欣赏| 秋霞在线观看毛片| 99热这里只有是精品在线观看| 亚洲一区高清亚洲精品| 国产免费福利视频在线观看| 男人舔奶头视频| av播播在线观看一区| 日韩中字成人| 日日撸夜夜添| 国产精品一区二区三区四区久久| 欧美精品国产亚洲| 久久久久久国产a免费观看| 乱人视频在线观看| 嫩草影院新地址| 一个人观看的视频www高清免费观看| av卡一久久| 久久国内精品自在自线图片| 久久久国产成人免费| 免费黄色在线免费观看| 国产一级毛片在线| 色尼玛亚洲综合影院| 丝袜喷水一区| 国产淫语在线视频| 久久亚洲国产成人精品v| 黄色一级大片看看| 亚洲成人av在线免费| 亚洲第一区二区三区不卡| 日韩人妻高清精品专区| 亚洲精品,欧美精品| 国产一区二区在线观看日韩| 在线观看一区二区三区| 在线免费观看的www视频| 我要看日韩黄色一级片| 日本免费a在线| 国产精品久久久久久av不卡| 国产片特级美女逼逼视频| 久热久热在线精品观看| 亚洲三级黄色毛片| 欧美日本视频| 亚洲中文字幕日韩| av播播在线观看一区| 美女黄网站色视频| 国产精品精品国产色婷婷| 一本久久精品| 超碰97精品在线观看| 国产免费又黄又爽又色| 波野结衣二区三区在线| 亚洲自拍偷在线| 久久人人爽人人爽人人片va| 亚洲国产欧洲综合997久久,| 禁无遮挡网站| 亚洲精品乱码久久久v下载方式| 国产老妇女一区| 中文欧美无线码| 热99在线观看视频| 美女黄网站色视频| 最近视频中文字幕2019在线8| 久久韩国三级中文字幕| 亚洲国产色片| 国产精品久久久久久久久免| 久久久a久久爽久久v久久| 国产精品不卡视频一区二区| 亚洲经典国产精华液单| 日本免费一区二区三区高清不卡| 亚洲国产精品sss在线观看| 丰满人妻一区二区三区视频av| 久久久精品94久久精品| 亚洲国产精品成人综合色| 国产老妇伦熟女老妇高清| 国产精品久久久久久久久免| 久久久久久久亚洲中文字幕| 国产伦一二天堂av在线观看| 在线a可以看的网站| 2022亚洲国产成人精品| 国产一区二区在线观看日韩| 欧美精品国产亚洲| 亚洲av熟女| 精品一区二区三区视频在线| 极品教师在线视频| 亚洲在线观看片| 国产精品99久久久久久久久| 欧美三级亚洲精品| 成人三级黄色视频| 爱豆传媒免费全集在线观看| 视频中文字幕在线观看| 国产在视频线精品| 久久久国产成人精品二区| 午夜精品一区二区三区免费看| 国产精品乱码一区二三区的特点| 身体一侧抽搐| 在线观看一区二区三区| 国产一区二区亚洲精品在线观看| 国产成人a∨麻豆精品| 国产乱人偷精品视频| 国产女主播在线喷水免费视频网站 | 欧美变态另类bdsm刘玥| 看免费成人av毛片| 22中文网久久字幕| 国产精品国产三级国产av玫瑰| 观看美女的网站| 成人av在线播放网站| 日韩视频在线欧美| 夫妻性生交免费视频一级片| 少妇人妻一区二区三区视频| 色哟哟·www| 一本久久精品| 欧美成人午夜免费资源| 大香蕉久久网| 91aial.com中文字幕在线观看| 久久久久久久午夜电影| 男人和女人高潮做爰伦理| 国产精品久久电影中文字幕| 中国美白少妇内射xxxbb| 亚洲精品自拍成人| 国产男人的电影天堂91| 国模一区二区三区四区视频| 波野结衣二区三区在线| 国产 一区精品| 一级二级三级毛片免费看| 国产乱来视频区| 99久久成人亚洲精品观看| 国产激情偷乱视频一区二区| 精品不卡国产一区二区三区| 亚洲精品日韩av片在线观看| 美女黄网站色视频| 卡戴珊不雅视频在线播放| 亚洲欧美一区二区三区国产| 丝袜喷水一区| 两性午夜刺激爽爽歪歪视频在线观看| 汤姆久久久久久久影院中文字幕 | 精品少妇黑人巨大在线播放 | 一个人免费在线观看电影| 国产真实乱freesex| 亚洲图色成人| 日韩在线高清观看一区二区三区| 成年女人看的毛片在线观看| 日韩中字成人| or卡值多少钱| 大香蕉97超碰在线| 蜜桃久久精品国产亚洲av| 日日摸夜夜添夜夜添av毛片| 日韩精品青青久久久久久| 国产一区二区亚洲精品在线观看| 欧美成人精品欧美一级黄| 波野结衣二区三区在线| 亚洲av福利一区| 麻豆成人午夜福利视频| 国产成人精品一,二区| 国产高潮美女av| 亚洲国产欧美人成| 国产麻豆成人av免费视频| 不卡视频在线观看欧美| 日日啪夜夜撸| 精品久久国产蜜桃| 一区二区三区乱码不卡18| 91精品国产九色| 国产成人午夜福利电影在线观看| 两个人的视频大全免费| 国产男人的电影天堂91| 精品欧美国产一区二区三| 亚洲人成网站高清观看| 亚洲精品久久久久久婷婷小说 | av黄色大香蕉| 亚洲成人中文字幕在线播放| 国产黄色视频一区二区在线观看 | 观看美女的网站| 国产乱人偷精品视频| 国产午夜福利久久久久久| 超碰av人人做人人爽久久| 国产成人aa在线观看| 国产免费男女视频| 亚洲欧洲国产日韩| 性色avwww在线观看| 成年免费大片在线观看| 国产色爽女视频免费观看| 日韩av在线免费看完整版不卡| 色播亚洲综合网| 99热这里只有精品一区| 22中文网久久字幕| 99在线人妻在线中文字幕| 中国国产av一级| 免费黄色在线免费观看| 成人av在线播放网站| 久久这里有精品视频免费| 深夜a级毛片| 亚洲欧洲日产国产| 69av精品久久久久久| 成年免费大片在线观看| 大又大粗又爽又黄少妇毛片口| 国产乱人视频| 色哟哟·www| 美女高潮的动态| 成年女人看的毛片在线观看| 麻豆国产97在线/欧美| 国产69精品久久久久777片| 久久这里有精品视频免费| 日韩精品青青久久久久久| 欧美性猛交╳xxx乱大交人| 成年免费大片在线观看| 国产精品乱码一区二三区的特点| 神马国产精品三级电影在线观看| 男女边吃奶边做爰视频| 99久国产av精品国产电影| 亚洲国产精品国产精品| 小说图片视频综合网站| 91久久精品国产一区二区三区| 色视频www国产| 日韩成人伦理影院| av在线蜜桃| 国产成人福利小说| 亚洲国产色片| .国产精品久久| 国产精品一及| 99久国产av精品国产电影| 最近最新中文字幕大全电影3| 三级经典国产精品| 亚洲内射少妇av| 精品一区二区三区视频在线| 中文在线观看免费www的网站| 人体艺术视频欧美日本| 中文字幕熟女人妻在线| 免费一级毛片在线播放高清视频| 菩萨蛮人人尽说江南好唐韦庄 | 国产精品一区二区在线观看99 | 少妇的逼好多水| videos熟女内射| 自拍偷自拍亚洲精品老妇| 三级毛片av免费| 永久网站在线| 丰满少妇做爰视频| 国内精品一区二区在线观看| 欧美性猛交黑人性爽| 丝袜喷水一区| 精品久久久久久久久亚洲| 好男人在线观看高清免费视频| 精品国产一区二区三区久久久樱花 | 欧美变态另类bdsm刘玥| 婷婷六月久久综合丁香| 一级av片app| 自拍偷自拍亚洲精品老妇| 亚洲五月天丁香| 欧美成人精品欧美一级黄| 亚洲激情五月婷婷啪啪| 亚洲av免费高清在线观看| 国产一区亚洲一区在线观看| 能在线免费观看的黄片| 精品国产一区二区三区久久久樱花 | 国产成人午夜福利电影在线观看| 久久久久久伊人网av| 麻豆乱淫一区二区| 全区人妻精品视频| 99九九线精品视频在线观看视频| 蜜桃久久精品国产亚洲av| 蜜臀久久99精品久久宅男| 国产高清有码在线观看视频| 成年av动漫网址| 成年女人看的毛片在线观看| 男女国产视频网站| 成人亚洲精品av一区二区| 国产老妇女一区| 久久精品影院6| 日韩亚洲欧美综合| 国产成人freesex在线| 99久久精品热视频| 久久国内精品自在自线图片| 欧美一级a爱片免费观看看| 久久久久久九九精品二区国产| 中文字幕熟女人妻在线| 亚洲国产成人一精品久久久| 色网站视频免费| 国产男人的电影天堂91| 免费黄色在线免费观看| 国产高清三级在线| 看免费成人av毛片| 国产成年人精品一区二区| 午夜精品国产一区二区电影 | 国产成人福利小说| 午夜福利成人在线免费观看| 国产精品一区二区性色av| 一个人免费在线观看电影| 十八禁国产超污无遮挡网站| 免费看a级黄色片| 午夜福利在线观看吧| 亚洲av中文字字幕乱码综合| 亚洲av成人精品一二三区| 久久国内精品自在自线图片| 久久久久免费精品人妻一区二区| 国产精品av视频在线免费观看| 水蜜桃什么品种好| 大香蕉久久网| 国产视频首页在线观看| 亚洲美女搞黄在线观看| 男的添女的下面高潮视频| 淫秽高清视频在线观看| 国产久久久一区二区三区| 午夜福利高清视频| 国产免费视频播放在线视频 | 国产精品电影一区二区三区| 九九久久精品国产亚洲av麻豆| 国产在线一区二区三区精 | 亚洲va在线va天堂va国产| 夫妻性生交免费视频一级片| 久久综合国产亚洲精品| 久久这里有精品视频免费| av又黄又爽大尺度在线免费看 | 欧美日韩国产亚洲二区| 国产国拍精品亚洲av在线观看| 午夜精品一区二区三区免费看| 91久久精品电影网| 精品一区二区三区视频在线| 边亲边吃奶的免费视频| 国产美女午夜福利| 久久久午夜欧美精品| 久久99热6这里只有精品| 人人妻人人澡欧美一区二区| 啦啦啦啦在线视频资源| 国产亚洲5aaaaa淫片| 欧美3d第一页| 哪个播放器可以免费观看大片| 亚洲av不卡在线观看| 亚洲美女视频黄频| 午夜久久久久精精品| 国产一区亚洲一区在线观看| 免费观看精品视频网站| 亚洲精品成人久久久久久| 一卡2卡三卡四卡精品乱码亚洲| 精品国产三级普通话版| 亚洲天堂国产精品一区在线| 亚洲精品乱久久久久久| 又爽又黄a免费视频| 精品国产三级普通话版| 啦啦啦啦在线视频资源| 国产 一区精品| 亚洲国产成人一精品久久久| 午夜a级毛片| 99久久成人亚洲精品观看| 国产成人免费观看mmmm| 十八禁国产超污无遮挡网站| 爱豆传媒免费全集在线观看| 天堂网av新在线| 变态另类丝袜制服| 波多野结衣巨乳人妻| 亚洲最大成人av| av在线亚洲专区| 最近中文字幕高清免费大全6| 色综合色国产| 国产精品久久久久久av不卡| 色网站视频免费| 一本一本综合久久| 国产精品综合久久久久久久免费| 热99re8久久精品国产| 欧美日本亚洲视频在线播放| 一级av片app| 免费播放大片免费观看视频在线观看 | 久久久国产成人精品二区| 日本午夜av视频| 国产av一区在线观看免费| 色吧在线观看| 国产色爽女视频免费观看| 听说在线观看完整版免费高清| 在线天堂最新版资源| 麻豆av噜噜一区二区三区| 亚洲精品色激情综合| 日韩,欧美,国产一区二区三区 | 亚洲精品日韩av片在线观看| 免费观看精品视频网站| 色播亚洲综合网| 午夜日本视频在线| 观看免费一级毛片| 国产黄片视频在线免费观看| 国产高潮美女av| 久久精品国产亚洲av天美| 久久久精品欧美日韩精品| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品,欧美精品| 国产精品永久免费网站| 偷拍熟女少妇极品色| 亚洲欧美精品自产自拍| 免费看日本二区| 一边亲一边摸免费视频| 国产白丝娇喘喷水9色精品| 非洲黑人性xxxx精品又粗又长| av免费在线看不卡| 不卡视频在线观看欧美| 99久国产av精品国产电影| 国产一区二区在线观看日韩| 小蜜桃在线观看免费完整版高清| 欧美成人一区二区免费高清观看| 汤姆久久久久久久影院中文字幕 | 国产日韩欧美在线精品| 最近中文字幕高清免费大全6| 久久久久久九九精品二区国产| 国产在线一区二区三区精 | 亚洲三级黄色毛片| 性插视频无遮挡在线免费观看| av在线观看视频网站免费| av黄色大香蕉| 超碰av人人做人人爽久久| 国产高潮美女av| 亚洲国产精品国产精品| 在线观看美女被高潮喷水网站| 日韩欧美 国产精品| av视频在线观看入口| 日韩欧美 国产精品| 尤物成人国产欧美一区二区三区| 免费观看人在逋| 国产爱豆传媒在线观看| 乱码一卡2卡4卡精品| 搡老妇女老女人老熟妇| 日韩av不卡免费在线播放| av在线老鸭窝| 岛国在线免费视频观看| 国产三级中文精品| 最近最新中文字幕大全电影3| 亚洲欧美日韩卡通动漫| 成年女人看的毛片在线观看| 免费黄网站久久成人精品|