• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers

    2024-02-29 08:24:00HuangHailongMohsenEskandariAndreySavkinWeiNi
    Defence Technology 2024年1期

    Huang Hailong , Mohsen Eskandari , Andrey V.Savkin , Wei Ni

    a The Department of Aeronautical and Aviation Engineering, The Hong Kong Polytechnic University, Hong Kong, China

    b School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, 2052, Australia

    c Data61, CSIRO, Australia

    Keywords: Unmanned aerial systems (UASs)Unmanned aerial vehicle (UAV)Communication security Eaves-dropping Reconfigurable intelligent surfaces (RIS)Autonomous navigation and placement Path planning Model predictive control

    ABSTRACT We consider a scenario where an unmanned aerial vehicle (UAV), a typical unmanned aerial system(UAS), transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs)help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV, subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control (MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.

    1.Introduction

    Unmanned aerial systems(UASs)originated from military usage have been widely used for strikes and battlefield intelligence due to their ability to reduce the risk to humans [1,2].A great effort has been put into the research on how to avoid the detection by ground detection systems with sensors such as radars and minimizing the probability of being shot down by ground-to-air missiles so that the UAVs can complete their missions in battlefields [3-5].Simultaneously, defense technologies to efficiently and effectively fight against UASs have also been developed [6,7].

    In recent years,unmanned aerial vehicles(UAVs),a typical set of UASs, also known as drones, have found various applications in civilian domains, such as moving target tracking, surveillance,parcel delivery, etc.[8-11].Among various applications, the fundamental problems relevant to UAVs include the coordination,planning,and control of UAVs.When multiple UAVs collaboratively conduct some mission, such as surveillance, the high-level UAV resource allocation determines the performance of the UAV team[12].With an assigned task, a UAV needs to plan the path to reach the target position and conduct the mission.To this end,optimally planning the path with the objective of minimizing energy consumption or time cost is a hot topic[11].Having the reference path,the low-level control of the UAV so that it can precisely track the reference is required[13].This short paper shares some similarities with using UAVs to track moving targets [8-10,14], and the problem of interest falls into the category of path planning.However,rather than keeping following a moving target with a circle-like trajectory, this paper aims to provide secure wireless communication service to a moving target.Some other aspects of the UAV communication security against eavesdropping were addressed in Refs.[15,16].

    In typical wireless communication environments, radio signals may encounter multiple objects,such as buildings,which produce signal copies due to reflection, refraction, and scattering.These copies may arrive at the receiver with different magnitudes,phases,and delays, and distort the transmitted signal.To prevent this adverse effect, researchers have developed various paradigms by exploiting the randomness of the propagation environment, such as spatial modulation [17], spatial scattering modulation [18], and media-based modulation [19].Recently, a new technology, reconfigurable intelligent surface (RIS), has increasingly attracted attention.An RIS comprises many reconfigurable elements that adjust the reflection,refraction,and scattering characteristics of the incident signals by inducing the manageable phase shifts of the elements without complex decoding, encoding, and radio frequency processing operations [20].

    RISs bring an additional dimension to communication systems,and there is emerging literature investigating communication systems involving RISs for the purpose of improving communication quality and security.The paper [21] studies a system with a ground transmitter(with no line-of-sight(LoS)to the UAV),a UAV receiver, and an RIS (serving as a relay).An optimization problem that plans the UAV trajectory and configures the RIS’s reflection is studied.The paper [22] adds a receiver node to the above system.Then, both the RIS and the UAV act as relays.The authors analyze the outage probability,average bit-error rate and average capacity,and investigate the optimal UAV position for performance optimization.Mobile RISs have also been considered.The paper [23]studies a system with a set of ground transmitters,a UAV-mounted RIS,and a receiver that has no LoS to the transmitters.The altitude of the UAV, the communication schedule,and the configuration of the RIS are optimized to minimize the age of information.On top of[23], the paper [24] considers an eavesdropper deployed near the receiver, and optimizes the communication schedule,the transmit power, the configuration of the RIS and the UAV trajectory to maximize the secure energy efficiency.The paper [25] further considers the case with multiple receivers and eavesdroppers.To maximize the sum secrecy rate of the legitimate receivers, a deep reinforcement learning method is presented to design the active beamforming at the UAV,the passive beamforming at the RIS,and the UAV’s trajectory.

    For the extension of wireless communication coverage, the paper [26] maximizes the worst-case signal-to-noise ratio over the locations in the considered area by designing the transmit beamforming, the position of the UAV and an RIS configuration.Moreover, the use of software-controlled RISs has been proposed to increase the reliability of vehicle-to-everything (V2X) communications[27].In particular,the paper[28]evaluates the performance of an RIS-assisted vehicular communication system with interfering vehicles operating in the same frequency spectrum under both finite and infinite block length codes.

    Different from the aforementioned publications, we consider a communication system with a UAV, some RISs, and some ground targets such as ground vehicles.The scenario of interest is that in a certain period, only one target should receive some confidential data from the UAV.In this period,the other targets are considered potential eavesdroppers.We consider that some friendly RISs deployed in the surrounding environment help to secure the UAVtarget communication and improve the energy efficiency of the UAV.The rationale of such a setting is explained as follows.To avoid being eavesdropped, a direct idea is to increase the path loss from the UAV to the eavesdroppers while maintaining that from the UAV to the target.Since the path loss directly relates to the physical distance,navigating the UAV to be close to the target while far away from the eavesdroppers can achieve the objective[29].So,without the assistance of RISs, the UAV needs to make much effort in the movement to avoid being eavesdropped on.In contrast, since RISs can reflect the wireless signals,we can configure RISs in a way such that the overall achievable rates at the target are enhanced while that at the eavesdroppers is reduced.Having this one more dimension is promising to enhance the solution space of the UAV movement, which can enhance the energy efficiency of the UAV.We formulate a new optimization problem to minimize the energy consumption of the UAV, subject to the mobility constraint of the UAV and that the achievable secrecy rate at the intended target is above a given threshold.We then propose an online method to solve the problem, which jointly optimizes the motion of the UAV and the configurations of the RISs following the framework of model predictive control(MPC)[30].The UAV predicts the states of the target and the potential eavesdroppers for a certain future horizon and then determines its motion and the RISs’ configurations.The RISs are configured to increase the achievable data rate at the target or decrease the eavesdropping rate of any potential eavesdropper.Simulation results show that the proposed method outperforms the strategies that only optimize the UAV’s trajectory or RISs’ configurations.

    Compared to the existing work, the main contributions of this paper are summarized as follows.We formulate a new optimization problem that deals with the scenario where multiple RISs assist the secure communication between a UAV and a moving target in the presence of eavesdroppers.We propose an MPC-based strategy to configure the RISs and plan the UAV trajectory.Extensive computerbased simulations evaluate the performance of the proposed method.

    The rest of the paper is organized as follows.Section 2 formally states the problem of interest.Section 3 presents the proposed method for optimizing the UAV’s motion and the RISs’ configurations.Section 4 presents computer-based simulation results to evaluate the proposed method.Finally, Section 5 briefly concludes the paper.

    2.Problem statement

    Consider that a UAV transmits data to a target while avoiding the data being overheard by the other potential eavesdroppers; see Fig.1.There is a set of RISs installed on the buildings along the road to facilitate UAV-target communication.In this section, we first describe the system models and then formally state the problem of interest.

    Letp(τ): = [x(τ),y(τ),z(τ)] denote the UAV’s Cartesian coordinates at time τ.The UAV follows the below kinematics model[31]:

    wherev(τ)∈Ris the linear speed,a(τ)∈R3is the heading,andu(τ)∈R3adjusts the heading of the UAV.Here,p(τ) anda(τ) are the states of the UAV, andv(τ) andu(τ) are the control inputs.Moreover, the control inputs satisfy the following constraints:

    Fig.1.Illustration of the considered scenario.

    whereUmaxandVmaxare given constants, and (·,·) is the inner product of two vectors.The last constraint in Eq.(2)guarantees that the vectorsa(τ) and u(τ) are always orthogonal.The model described by Eqs.(1)and (2)has been widely used to describe the motion of UAVs and mobile robots satisfying the nonholonomic constraint;see Ref.[31]and the references therein.Additionally,at any time,the UAV must keep its altitude within an allowed range:

    whereZminandZmaxare given constants.Typically,Zminis larger than the heights of buildings for collision avoidance.

    We consider the following model to approximate the energyconsuming powerq(τ) of the UAV [32]:

    whereq0is a constant accounting for a fixed energy consumption power independent of the control inputs, and κ1and κ2are given constants.It is worth pointing out that the approach proposed in this paper is not limited to this model and can apply to any other energy consumption model.

    Let pt(τ)=[xt(τ),yt(τ),zt(τ)]∈R3,pe(τ)=[xe(τ),ye(τ),ze(τ)]∈R3andpr= [xr,yr,zr] ∈R3denote the coordinates of the target, the eavesdroppern(n=1,…,N)and RISm(m=1,…,M),respectively.Here,NandMare the numbers of eavesdroppers and RISs,respectively.If eavesdroppernis stationary,pe(τ)≡pe.The RISs are stationary as they are fixed to buildings.Let nm ∈R3(||nm|| = 1)denote the normal vector of RIS m, andkru(τ),krt(τ),kre(τ) ∈R3denote the vectors from the RISmto the UAV, the target, and eavesdroppern,respectively.For instance,kru(τ)=p(τ)-pr(τ).We say the UAV(or the target,or eavesdropper n)is on the active side of RIS m if(nm,kru(τ))>0(or(nm,krt(τ))>0,or(nm,kre(τ))>0);in other words, the RIS can contribute constructively (or destructively) to the transmissions from the UAV to the target (or eavesdropper).

    We consider that the UAV,the target and the eavesdroppers all have a single antenna,and each RIS has a uniform linear array ofLreflecting elements that can shift the phases of the incident signals before reflecting the signals.The phase shifter matrix of RISmis denoted by, where∈[0,2π),l=1,...,L,are the control inputs of RISmthat can be adjusted remotely by the RIS controllers based on the instruction of the UAV.Suppose that the UAV-target link, the UAV-eavesdropper link, and the UAV-RIS link are dominated by the LoS channels,and follow the free-space path loss model.In contrast, the RIStarget link and the RIS-eavesdropper link follow Rayleigh channel fading because of blockages.The target (or an eavesdropper) can receive two sets of signals.The first set is the direct signal from the UAV, and the second set consists of those reflected by the RISs.At time τ, the overall channel gains at the target receiver and the potential eavesdroppern,denoted byg0(τ)andgn(τ),respectively,are expressed as Ref.[21].

    where the superscriptHstands for conjugate transpose,andI0(τ)is the subset of RISs of which both the UAV and the target are on the active side.Likewise,In(τ) is the subset of RISs of which both the UAV and eavesdroppernare on the active side.Moreover,hut,hun,hum,hmt, andhmnare the channel coefficients of the UAV-target,UAV-eavesdropper, UAV-RIS, RIS-target, and RIS-eavesdropper links, respectively, given by

    By Shannon’s formula, the achievable rates at the target and eavesdropper n are given by

    where P is the transmit power of the UAV,σ2 is the noise power at the ground target and the eavesdroppers,and.To secure the communication between the UAV and the target, we require that the secrecy rate S(τ),which is defined as the gap between the target and the largest achievable rate of the eavesdroppers,is no smaller than a given constant γ:

    problem Statement.Considering a mission time period[0,T],we plan the movement of the UAV and the configurations of the RISs,so that the energy consumption of the UAV is minimized and the communication between the UAV and the target is secured.This problem is formulated as follows:

    subject to Eqs.(1)-(3), and (10).In this problem, the UAV’s trajectory, together with the configurations of RISs are the control variables, and the security is regarded as a hard constraint in the trajectory designing phase.

    This problem is challenging since constraint Eq.(10) is nonconvex in both the UAV position p(τ) and the RISs’ phase-shifts Φ1(τ), ..., ΦM(τ).In the next section, we propose a method to approximately yet efficiently solve this problem.

    3.Proposed solution

    We observe that the objective Eq.(11) and constraints Eqs.(1)and (2) only containu(τ) andv(τ), while these variables are coupled with Φ1(τ),...,ΦM(τ) in constraint (10).From constraint(10),we understand that:1)an RIS inI0(τ)should shift its elements’phases so that the reflected signals received by the target are added constructively to the direct signal from the UAV,and 2)an RIS in(τ)should shift its elements’ phases so that the reflected signals received by eavesdropper n are added destructively to the direct signal from the UAV.Moreover,u(τ) andv(τ) are coupled in the magnitudes of the received signals, which are embedded indut(τ),dun(τ)anddum(τ)by the UAV’s positionp(τ).Thus,the UAV should be close to the target(to boost the direct signal strength received at the target) and stay away from the eavesdroppers (to reduce the direct signal strength received at the eavesdroppers).These observations motivate us to design the configurations of the RISs and the UAV’s movement alternately.

    3.1.Configurations of the RISs

    Givenp(τ),pt(τ),pe(τ),…,pe(τ),andpr,…,pr,we can obtain the setsI0(τ),I1(τ),…,In(τ).If RIS m only belongs toI0(τ),we configure the elements of RISmsuch that the reflected signal received at the target aligns with the direct signal from the UAV in phase, i.e.,

    wherel=1,…,L.The phase of thelth element of RISmis given by

    Similarly, if RISmonly belongs toIn(τ), we have

    wherel=1,…,L.Eq.(14)aligns the phase of the reflected signal to the opposite phase of the direct signal received at eavesdroppern.Due to the attenuation, the reflected signals are typically much weaker than the direct signal.

    If RISmbelongs to two or more ofI0(τ),I1(τ),…,IN(τ),it may be impossible to find a solution satisfying different requirements,because we have more equations than variables;or in other words,the problem is over-determined.For example,we consider that RISmbelongs to bothI0(τ) andIn(τ).We come up with several strategies to configure the elements of the RISs.The first strategy is that we follow Eq.(13) so that the reflected signal helps improve the signal received at the target.The second strategy is that we follow Eq.(14)so that the reflected signal helps reduce the signal received at eavesdroppern.The third strategy looks for a balanced solution.To this end, we construct two equations for the considered example:

    In general, if RISmbelongs to more than one of the setsI0(τ),I1(τ), …,IN(τ), we have more equations than variables.In other words, the problem is under-determined.Thus, it may be impossible to find an exact solution.In this case,we can obtain a balanced solution by applying the least squares method.We can select the solution among the individual solutions and the balanced solution that makes the maximum contribution toS(τ).

    We summarize the RIS configuration procedure in Algorithm 1.We determine the RISs’ phase shifts in sequence.I0,I1, …,Inare initialized as empty sets.First,RIS 1 is assigned to the suitable sets amongI0,I1,…,INif both the UAV and the target or eavesdroppernare on the active side of the RIS.Then,we determine the individual solutions and/or the balanced solution.We evaluate the value ofSin Eq.(10)for each candidate under the currentI0,I1,…,IN,and take the candidate that maximizesS.Then, we proceed with the next RIS,given the phase shifts of the preceding RISs.Therefore,we only determine the phase shifts of one RIS in each round.Since each RIS can belong to at most(N+1)of the setsI0,I1,…,INwhile there areMRISs, the worst-case computational complexity of Algorithm 1 isO(MN).

    Algorithm 1

    3.2.Design of the UAV’s motion

    Now, we design the UAV’s movement by determining the control inputsuandv.We assume thatuandvonly take the predefined candidates in the following sets

    Considering constraint Eq.(2),we have||ui||≤Umax(i=1,…,|U|)and 0 ≤vj≤Vmax(j=1,…,|V|).Note that the setUis defined in the UAV body fixed frame,and any candidate ofUlocated within a disk of radiusUmaxcentered atp(τ)and perpendicular to a(τ);see Fig.2.Therefore, these control inputs satisfy constraint Eq.(2).

    Fig.2.Candidates of the input u(τ).

    Let δ be a given constant representing a small time slot.We assume that the control inputsuandvare updated at the instants 0,δ,2δ,…and remain unchanged during a slot time δ.Moreover,we assume that at the current time instant τ0, the positions of the target and the eavesdroppers are predictable1Though the position estimation and prediction is an interesting problem itself,it is out of the scope of this paper.for the futureKtime slots [τ0,τ0+Kδ], where τ0= 0,δ, 2δ, …,Kis a given integer, and.The problem of interest becomes

    subject to Eqs.(1)-(3), and (10).Different from Eq.(11), the objective function Eq.(16) only evaluates the energy consumption of the UAV for a predictable future period of time.

    Our approach to solving problem Eq.(16)subject to Eqs.(1)-(3)and (10), consists of the following two steps:

    · Step 1:Shift and rotate thestandardtree(defined subsequently)withp(τ0) anda(τ0) to obtain a new tree.

    · Step 2:Select the control sequence(i.e.,Ksets of control inputs at time instants τ0,τ0+δ,…,τ0+(K-1)δ)that minimizes Eq.(16) while satisfying constraints Eqs.(3) and (10).

    InStep 1, the standard tree refers to the full tree rooted at the origin of the coordinate frame and pointing to the positiveX-axis.There are|U|·|V|possible control inputs at any instant,and we have(|U|·|V|)Kcontrol sequences in the tree.The standard tree can be constructed in advance and stored at the UAV.Then,at instant τ0,a new tree describing the UAV’s movement in the futureKslots can be quickly obtained.InStep 2, we need to ensure that a control sequence is feasible.For this purpose,we evaluate the nodes in the tree.If a node fails to satisfy Eq.(3)or Eq.(10),the node and its child nodes are removed.To verify the constraint Eq.(10), the RISs are configured by Algorithm 1.Then, from the feasible control sequences, we can find the one that minimizes Eq.(16).Since many nodes may be discarded, the practical computational complexity can be much smaller than the worst-caseO(MN|U|K|V|K).At each instant τ0= 0,δ, 2δ, …, the UAV executes the above steps and applies the control inputs to the instant τ0+ δ.This method follows the framework of model predictive control(MPC)[30],which is an effective method to control a process while satisfying a given set of constraints.

    Remark III.1.The presented approach is centralized.Specifically,the UAV has access to configure the RISs,and a real-time connection between the UAV-RISs is required.In the presented approach, the eavesdroppers’ channel state information is known.For external eavesdroppers,the location and the channel state information may not be known.To secure the UAV-target communication in the latter case,a possible solution is to configure the RISs that have the UAV and the target both on the active side according to Eq.(13)and configure other RISs so that the reflected signals are in the null space of the equivalent channel[33].The latter has the chance to interfere with external eavesdroppers.Also,in many practical scenarios, some approximate estimates of the eavesdropper’s achievable rate and other parameters can be known to the UAV.For example, the UAV can potentially utilize radar sensing techniques to locate the potential eavesdroppers and accordingly estimate the achievable rates at the eavesdroppers.

    4.Simulation results

    We construct some urban-like environments with RISs attached to buildings and several stationary eavesdroppers,see Figs.3(a)and 4(a).The tallest building is 45 m.Each RIS hasL=64 configurable elements.Other system parameters areP= 20 dBm, α = -10 dB,κ = 2.5, σ2= -80 dBm, λ = 10-2 m,λ,Zmax= 100 m,Zmin=50 m,γ=2.5 bps/Hz,V={4,8}m/s,κ1=κ2=10,andU={(0,0, 0), (0,1, 0), (0, 0,1), (0, -1, 0), (0, 0, -1)}.

    We consider three baselines for comparison.The first one follows[32]and optimizes the trajectory of the UAV only,denoted by“Trajectory, no RIS”.The UAV’s trajectories in the considered cases are shown in Figs.3(b) and 4(b), respectively.The second one adopts a trajectory the same as the target’s, denoted by “No trajectory,RIS”.The third one adopts the same trajectory as the second baseline without configuring the RISs,denoted by“No trajectory,no RIS”.

    From Figs.3(d) and 4(d), we can see the proposed method and the “Trajectory, No RIS” baseline consume relatively lower energy thanks to the optimization of the UAV’s trajectory.For the second and third benchmarks, the energy consumption depends on the target’s trajectory, which is not controllable.From Figs.3(c) and 4(c), we can see that only the developed method, i.e., “Trajectory,RIS”, achieves the instantaneous secrecy rate requirement (i.e.,above γ).The“No trajectory,RIS”baseline comes after,but there are some instants at which the instantaneous secrecy rate falls below γ.

    Fig.3.Case 1: (a) The UAV’s trajectory by the proposed method; (b) The UAV’s trajectory obtained by the first baseline; (c) Secrecy rate; (d) Energy consumption power.

    These case studies demonstrate the effectiveness of the developed method.Moreover, looking at Fig.3(c) (or Fig.4(c)), we find that configuring RISs is more likely to obtain a high secrecy rate than optimizing the UAV’s trajectory.The main reason is that the latter mostly helps large-scale components of the propagation channels,while the former helps to align the phases of the received signals.

    5.Conclusions

    In this paper,we considered a communication system involving the new RIS technology.We investigated the problem of securing the UAV-target communication assisted by RISs in the presence of eavesdroppers.We formulated an optimization problem to minimize the UAV’s energy consumption while satisfying the secrecy rate requirement.We developed an MPC-based online method to plan the UAV’s 3D trajectory and configure the RISs.Via simulations,we found that optimizing RISs’configurations is promising to achieve better performance than optimizing the UAV’s trajectory.Analytical study of such a performance gap is our future research direction.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Acknowledgements

    This work received funding from the Australian Government,via grant AUSMURIB000001 associated with ONR MURI Grant N00014-19-1-2571.

    精华霜和精华液先用哪个| 国产美女午夜福利| 国产在视频线在精品| 日韩欧美 国产精品| 国产精品久久久久久人妻精品电影| 18+在线观看网站| 国产欧美日韩精品亚洲av| 国产色爽女视频免费观看| 91麻豆精品激情在线观看国产| 国产av一区在线观看免费| 日韩欧美一区二区三区在线观看| 国产单亲对白刺激| 精品人妻视频免费看| 久久99热6这里只有精品| 国产av在哪里看| 亚洲成a人片在线一区二区| 嫩草影视91久久| 99热6这里只有精品| 亚洲精品亚洲一区二区| 午夜精品久久久久久毛片777| 人妻夜夜爽99麻豆av| 久9热在线精品视频| 欧美日韩黄片免| 午夜免费激情av| 欧美日韩综合久久久久久 | 别揉我奶头~嗯~啊~动态视频| av在线蜜桃| bbb黄色大片| 精品人妻1区二区| 97超级碰碰碰精品色视频在线观看| 又爽又黄无遮挡网站| 日韩中文字幕欧美一区二区| 制服丝袜大香蕉在线| 好看av亚洲va欧美ⅴa在| 色尼玛亚洲综合影院| 久久久久精品国产欧美久久久| 啦啦啦韩国在线观看视频| 男女之事视频高清在线观看| 热99在线观看视频| 麻豆成人av在线观看| 亚洲av五月六月丁香网| 国产黄色小视频在线观看| 看十八女毛片水多多多| 国模一区二区三区四区视频| 色av中文字幕| 中文字幕av成人在线电影| 桃红色精品国产亚洲av| 日本免费一区二区三区高清不卡| 日本成人三级电影网站| 91字幕亚洲| 亚洲成av人片在线播放无| 国产v大片淫在线免费观看| 亚洲激情在线av| 真人做人爱边吃奶动态| 亚洲无线在线观看| 欧美激情久久久久久爽电影| 在现免费观看毛片| 午夜福利在线在线| 国产精品久久久久久久久免 | 亚洲av五月六月丁香网| 少妇裸体淫交视频免费看高清| 精品久久久久久成人av| 午夜福利在线在线| 直男gayav资源| 色哟哟·www| 久久精品国产亚洲av涩爱 | 亚洲综合色惰| 看免费av毛片| 亚洲av免费在线观看| 午夜日韩欧美国产| 精品久久久久久久末码| 亚洲精品亚洲一区二区| 国产精品永久免费网站| 久久久久久久午夜电影| 99久久精品一区二区三区| 成人特级av手机在线观看| 欧美潮喷喷水| 免费av毛片视频| 日韩大尺度精品在线看网址| 美女cb高潮喷水在线观看| 能在线免费观看的黄片| 美女大奶头视频| 又爽又黄a免费视频| 五月玫瑰六月丁香| 精品久久久久久久人妻蜜臀av| 99国产精品一区二区蜜桃av| 国产午夜福利久久久久久| 男人狂女人下面高潮的视频| 国产精品久久久久久精品电影| 日日摸夜夜添夜夜添小说| 嫩草影院入口| 欧美在线黄色| 一卡2卡三卡四卡精品乱码亚洲| 亚洲自偷自拍三级| 欧美高清成人免费视频www| 99riav亚洲国产免费| 99国产极品粉嫩在线观看| 91麻豆av在线| 久久人人爽人人爽人人片va | 91在线观看av| 高清毛片免费观看视频网站| 精品久久久久久,| 国产高清三级在线| 最近中文字幕高清免费大全6 | 51国产日韩欧美| 久久精品夜夜夜夜夜久久蜜豆| 国产激情偷乱视频一区二区| 女人十人毛片免费观看3o分钟| 一区福利在线观看| 高清毛片免费观看视频网站| 97碰自拍视频| 久久精品国产亚洲av天美| 久久人人爽人人爽人人片va | 一进一出抽搐gif免费好疼| 国产av一区在线观看免费| 性色av乱码一区二区三区2| 精品一区二区三区人妻视频| 亚洲精品乱码久久久v下载方式| 韩国av一区二区三区四区| 亚洲精品一卡2卡三卡4卡5卡| h日本视频在线播放| 美女cb高潮喷水在线观看| 最新中文字幕久久久久| 精品国产亚洲在线| 国产爱豆传媒在线观看| 脱女人内裤的视频| 99久国产av精品| 真人一进一出gif抽搐免费| 97热精品久久久久久| 久久精品国产自在天天线| 久久久久国产精品人妻aⅴ院| 欧美3d第一页| 亚洲狠狠婷婷综合久久图片| 老熟妇仑乱视频hdxx| 啦啦啦韩国在线观看视频| 亚洲成av人片免费观看| av在线观看视频网站免费| 成熟少妇高潮喷水视频| 51午夜福利影视在线观看| 精品乱码久久久久久99久播| 成人午夜高清在线视频| 国产v大片淫在线免费观看| 亚洲午夜理论影院| 久久久久久九九精品二区国产| 亚洲av.av天堂| 亚洲最大成人手机在线| 欧美另类亚洲清纯唯美| 欧美激情久久久久久爽电影| 亚洲精品日韩av片在线观看| 久久久精品欧美日韩精品| 亚洲美女视频黄频| 性色av乱码一区二区三区2| 91麻豆av在线| 少妇的逼水好多| 成人av一区二区三区在线看| 88av欧美| 亚洲精品影视一区二区三区av| 亚洲av电影不卡..在线观看| 国产aⅴ精品一区二区三区波| 一本精品99久久精品77| 脱女人内裤的视频| 精品不卡国产一区二区三区| 久久99热这里只有精品18| 免费看美女性在线毛片视频| 十八禁人妻一区二区| 51国产日韩欧美| 国产欧美日韩精品一区二区| 欧美区成人在线视频| 午夜a级毛片| 有码 亚洲区| 最近最新免费中文字幕在线| 国产aⅴ精品一区二区三区波| 波多野结衣巨乳人妻| 欧美三级亚洲精品| 他把我摸到了高潮在线观看| 亚洲欧美日韩卡通动漫| 欧美丝袜亚洲另类 | 观看免费一级毛片| 精品国产亚洲在线| 99久久精品热视频| 亚洲最大成人手机在线| 亚洲第一电影网av| 精品久久久久久久久久久久久| 波野结衣二区三区在线| 久久精品久久久久久噜噜老黄 | 小说图片视频综合网站| 久久久成人免费电影| 丝袜美腿在线中文| 免费看日本二区| 成年女人毛片免费观看观看9| 无人区码免费观看不卡| 亚洲成a人片在线一区二区| 精品国内亚洲2022精品成人| 99久久精品一区二区三区| 国产精品亚洲一级av第二区| 国产男靠女视频免费网站| 国产精品爽爽va在线观看网站| 热99re8久久精品国产| 日本一本二区三区精品| 最近中文字幕高清免费大全6 | 国语自产精品视频在线第100页| 男人舔女人下体高潮全视频| 日日干狠狠操夜夜爽| 国内精品久久久久久久电影| 精品国内亚洲2022精品成人| 99riav亚洲国产免费| 久久久国产成人免费| 国产大屁股一区二区在线视频| 欧美精品啪啪一区二区三区| 国产野战对白在线观看| www.色视频.com| 国产高清视频在线观看网站| 日本a在线网址| 一进一出抽搐动态| 亚洲三级黄色毛片| 午夜福利在线观看免费完整高清在 | 好男人电影高清在线观看| 亚洲乱码一区二区免费版| 久久中文看片网| 久久九九热精品免费| 麻豆国产av国片精品| 一本一本综合久久| 天堂影院成人在线观看| 欧美区成人在线视频| 十八禁网站免费在线| 一个人观看的视频www高清免费观看| 免费观看的影片在线观看| 亚洲精品久久国产高清桃花| 非洲黑人性xxxx精品又粗又长| 夜夜躁狠狠躁天天躁| 1000部很黄的大片| 88av欧美| 桃红色精品国产亚洲av| 国产69精品久久久久777片| 午夜精品久久久久久毛片777| 欧美日韩亚洲国产一区二区在线观看| 亚洲av中文字字幕乱码综合| 欧美日韩黄片免| 九色成人免费人妻av| 美女xxoo啪啪120秒动态图 | 99久久99久久久精品蜜桃| 日韩国内少妇激情av| 精品久久久久久久久亚洲 | 午夜福利视频1000在线观看| 国产成人a区在线观看| 国产午夜福利久久久久久| 我的女老师完整版在线观看| 久久久久九九精品影院| 天堂网av新在线| 亚洲美女黄片视频| 亚洲aⅴ乱码一区二区在线播放| 精品99又大又爽又粗少妇毛片 | 国产大屁股一区二区在线视频| 成人欧美大片| 国产爱豆传媒在线观看| 欧美一区二区亚洲| 亚洲一区高清亚洲精品| 国产高清三级在线| 国产精品综合久久久久久久免费| 床上黄色一级片| 99热6这里只有精品| 欧美激情国产日韩精品一区| eeuss影院久久| 久久久久九九精品影院| 99久久精品一区二区三区| 亚洲欧美日韩无卡精品| 亚洲av第一区精品v没综合| 最近在线观看免费完整版| 亚洲成av人片在线播放无| h日本视频在线播放| 免费电影在线观看免费观看| 可以在线观看的亚洲视频| 亚洲无线观看免费| av在线观看视频网站免费| 久久6这里有精品| 久久精品国产亚洲av天美| 国产午夜福利久久久久久| 我要看日韩黄色一级片| 国产精品久久电影中文字幕| 午夜福利在线观看免费完整高清在 | 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 老熟妇乱子伦视频在线观看| www日本黄色视频网| 男女视频在线观看网站免费| 又黄又爽又刺激的免费视频.| 国内少妇人妻偷人精品xxx网站| 久久久精品欧美日韩精品| 性欧美人与动物交配| 十八禁国产超污无遮挡网站| 成人特级黄色片久久久久久久| 国产久久久一区二区三区| 国产高清三级在线| 深夜a级毛片| www.www免费av| 欧美乱色亚洲激情| 国产精品一区二区三区四区久久| 欧美xxxx性猛交bbbb| 特级一级黄色大片| 我的女老师完整版在线观看| 无人区码免费观看不卡| 亚洲欧美日韩东京热| 国产欧美日韩一区二区三| 在线免费观看不下载黄p国产 | 一个人看的www免费观看视频| 国产精品,欧美在线| 久久午夜亚洲精品久久| 国产精品不卡视频一区二区 | 亚洲不卡免费看| 欧美一区二区精品小视频在线| av视频在线观看入口| 亚洲在线观看片| 亚洲专区中文字幕在线| 99riav亚洲国产免费| 国产成+人综合+亚洲专区| 久久久久久久久久黄片| 中亚洲国语对白在线视频| 欧美高清性xxxxhd video| 亚洲经典国产精华液单 | 51国产日韩欧美| 99国产精品一区二区三区| 国产精品av视频在线免费观看| 国产69精品久久久久777片| 757午夜福利合集在线观看| 国产一区二区在线av高清观看| 校园春色视频在线观看| 精品一区二区三区人妻视频| a级毛片a级免费在线| 成年人黄色毛片网站| 色综合婷婷激情| 男女做爰动态图高潮gif福利片| 高清毛片免费观看视频网站| 日韩欧美国产在线观看| 99视频精品全部免费 在线| 宅男免费午夜| 午夜激情福利司机影院| 变态另类成人亚洲欧美熟女| 欧美一区二区国产精品久久精品| 成人亚洲精品av一区二区| 亚洲av五月六月丁香网| 亚洲熟妇熟女久久| 人妻久久中文字幕网| 欧美一区二区精品小视频在线| 波多野结衣高清作品| 欧美3d第一页| 国产成人a区在线观看| 婷婷精品国产亚洲av在线| 啪啪无遮挡十八禁网站| 99久久精品一区二区三区| 国产免费av片在线观看野外av| 美女cb高潮喷水在线观看| 国产在线精品亚洲第一网站| 一级a爱片免费观看的视频| 熟女人妻精品中文字幕| 看十八女毛片水多多多| 国产精品三级大全| 校园春色视频在线观看| 日韩欧美 国产精品| 日韩av在线大香蕉| 丁香六月欧美| 久久精品夜夜夜夜夜久久蜜豆| 久久午夜福利片| 中文在线观看免费www的网站| 动漫黄色视频在线观看| 午夜福利免费观看在线| 日本三级黄在线观看| 中文字幕av成人在线电影| 嫩草影院入口| 国产精品人妻久久久久久| 91麻豆精品激情在线观看国产| 欧美黑人巨大hd| 久久人妻av系列| 亚洲欧美日韩无卡精品| 日韩有码中文字幕| 黄色配什么色好看| 一级毛片久久久久久久久女| 成人鲁丝片一二三区免费| 午夜福利在线观看免费完整高清在 | 成人毛片a级毛片在线播放| 69人妻影院| 直男gayav资源| 日韩欧美精品v在线| 国产精品嫩草影院av在线观看 | 国产精品一区二区性色av| 免费观看的影片在线观看| 午夜福利在线观看免费完整高清在 | 伦理电影大哥的女人| 欧美成人性av电影在线观看| 欧美不卡视频在线免费观看| 欧美激情在线99| 国产黄片美女视频| 欧美成人一区二区免费高清观看| 午夜两性在线视频| 国产真实乱freesex| 91字幕亚洲| 老司机午夜十八禁免费视频| 欧美日本亚洲视频在线播放| 欧美极品一区二区三区四区| 亚洲激情在线av| 日本一本二区三区精品| 女生性感内裤真人,穿戴方法视频| 免费在线观看日本一区| 国产一区二区亚洲精品在线观看| 久久久久久久久中文| 国产精品自产拍在线观看55亚洲| 国产免费男女视频| 99国产精品一区二区蜜桃av| 久久香蕉精品热| a在线观看视频网站| 欧美日韩黄片免| 欧美日韩福利视频一区二区| 亚洲精品在线观看二区| 婷婷丁香在线五月| 久久精品国产清高在天天线| 亚洲在线自拍视频| 国产精品三级大全| 丁香六月欧美| 国产精品一区二区三区四区久久| 丰满人妻熟妇乱又伦精品不卡| 国产中年淑女户外野战色| 啦啦啦韩国在线观看视频| 午夜a级毛片| 国产美女午夜福利| 欧美最新免费一区二区三区 | 国产精品女同一区二区软件 | 91在线观看av| 长腿黑丝高跟| 亚洲av成人精品一区久久| 香蕉av资源在线| 国产日本99.免费观看| 色在线成人网| 久久精品国产亚洲av天美| 久久中文看片网| 99精品在免费线老司机午夜| 欧美一区二区亚洲| 亚洲精品一卡2卡三卡4卡5卡| 夜夜爽天天搞| 特级一级黄色大片| 综合色av麻豆| 乱码一卡2卡4卡精品| 午夜a级毛片| 亚洲成人久久爱视频| 小说图片视频综合网站| 日韩av在线大香蕉| 国产亚洲精品综合一区在线观看| 成人三级黄色视频| 男人和女人高潮做爰伦理| 亚洲精品在线美女| 久久久久国内视频| 久久久久国产精品人妻aⅴ院| 黄色配什么色好看| 国产成年人精品一区二区| 中出人妻视频一区二区| 波多野结衣高清无吗| 日韩有码中文字幕| 亚洲第一区二区三区不卡| 69av精品久久久久久| 成人高潮视频无遮挡免费网站| 色综合站精品国产| 国模一区二区三区四区视频| 亚洲av一区综合| 亚洲自偷自拍三级| 观看美女的网站| 午夜激情福利司机影院| 国产伦人伦偷精品视频| 美女cb高潮喷水在线观看| 天堂影院成人在线观看| 亚洲国产精品合色在线| 黄片小视频在线播放| 黄色视频,在线免费观看| 亚洲第一欧美日韩一区二区三区| 99久久99久久久精品蜜桃| 日韩免费av在线播放| 人人妻,人人澡人人爽秒播| 嫩草影院新地址| 精品无人区乱码1区二区| 日本熟妇午夜| 黄色女人牲交| 国产成人av教育| 99精品在免费线老司机午夜| av天堂在线播放| 午夜福利在线观看吧| 99精品在免费线老司机午夜| 久久国产乱子免费精品| 69av精品久久久久久| 国内精品久久久久精免费| 亚洲乱码一区二区免费版| 久久6这里有精品| 国产大屁股一区二区在线视频| 久久人人精品亚洲av| 免费在线观看亚洲国产| 精品人妻1区二区| 日本黄色片子视频| 最好的美女福利视频网| 日本撒尿小便嘘嘘汇集6| 一进一出抽搐gif免费好疼| 亚洲成人久久爱视频| 日本免费一区二区三区高清不卡| 熟女人妻精品中文字幕| 日韩精品青青久久久久久| 亚洲国产色片| 精品人妻偷拍中文字幕| 亚洲人与动物交配视频| 99国产极品粉嫩在线观看| 国产视频内射| 日韩成人在线观看一区二区三区| 亚洲一区高清亚洲精品| 麻豆久久精品国产亚洲av| 亚洲av第一区精品v没综合| 国产探花在线观看一区二区| 日韩欧美精品v在线| 精品一区二区三区视频在线| 91狼人影院| 欧美精品啪啪一区二区三区| 亚洲国产精品sss在线观看| 18美女黄网站色大片免费观看| 天堂av国产一区二区熟女人妻| 深夜a级毛片| 十八禁人妻一区二区| 日日摸夜夜添夜夜添av毛片 | 国内精品久久久久精免费| 亚洲国产精品999在线| 麻豆国产av国片精品| 人妻制服诱惑在线中文字幕| 九色成人免费人妻av| www.熟女人妻精品国产| 久久国产乱子免费精品| 青草久久国产| 欧美激情久久久久久爽电影| 久久久精品欧美日韩精品| 欧美色欧美亚洲另类二区| 99久久99久久久精品蜜桃| 国产精品三级大全| 久久人妻av系列| 精品久久久久久久久亚洲 | 成人无遮挡网站| 好看av亚洲va欧美ⅴa在| 欧美黑人欧美精品刺激| 内地一区二区视频在线| 少妇人妻一区二区三区视频| 一进一出抽搐动态| 精品一区二区三区视频在线观看免费| 中国美女看黄片| 日本熟妇午夜| 国产一区二区激情短视频| 99热精品在线国产| 黄片小视频在线播放| 中文在线观看免费www的网站| 亚洲片人在线观看| 欧美另类亚洲清纯唯美| 精品人妻1区二区| 亚洲一区高清亚洲精品| 五月伊人婷婷丁香| 成人亚洲精品av一区二区| 国产蜜桃级精品一区二区三区| 十八禁国产超污无遮挡网站| 美女高潮喷水抽搐中文字幕| 日韩大尺度精品在线看网址| 亚洲18禁久久av| 人妻丰满熟妇av一区二区三区| www.999成人在线观看| 国产欧美日韩精品一区二区| 丰满乱子伦码专区| 亚洲无线观看免费| 69av精品久久久久久| 亚洲国产高清在线一区二区三| 久99久视频精品免费| 国产精品久久久久久亚洲av鲁大| 欧美日韩国产亚洲二区| 88av欧美| 精品久久久久久久人妻蜜臀av| 我要看日韩黄色一级片| 一个人看视频在线观看www免费| 丝袜美腿在线中文| 又紧又爽又黄一区二区| 日本 欧美在线| 国产精品98久久久久久宅男小说| 亚洲精品影视一区二区三区av| 熟妇人妻久久中文字幕3abv| 最近中文字幕高清免费大全6 | 级片在线观看| 美女高潮喷水抽搐中文字幕| 日日夜夜操网爽| 女生性感内裤真人,穿戴方法视频| 成人精品一区二区免费| 欧美日韩乱码在线| 99久久九九国产精品国产免费| 免费搜索国产男女视频| 国产精品1区2区在线观看.| 午夜福利在线观看吧| 动漫黄色视频在线观看| 亚洲欧美日韩高清专用| 国产精品久久久久久亚洲av鲁大| 欧美黄色淫秽网站| 亚洲美女视频黄频| 观看免费一级毛片| 亚洲熟妇熟女久久| 亚洲国产日韩欧美精品在线观看| 午夜亚洲福利在线播放| 国内精品一区二区在线观看| 色精品久久人妻99蜜桃| 1000部很黄的大片| 热99re8久久精品国产| 午夜福利18| 成熟少妇高潮喷水视频| 91麻豆精品激情在线观看国产| 啦啦啦观看免费观看视频高清| 久久久久久大精品| 人妻制服诱惑在线中文字幕| 97热精品久久久久久| 不卡一级毛片| 午夜激情福利司机影院| av欧美777| av在线老鸭窝| 90打野战视频偷拍视频| 看十八女毛片水多多多|