• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario

    2024-03-11 06:27:46NingYangHengWangJingmingHuBangningZhangDaoxingGuoYuanLiu
    China Communications 2024年2期

    Ning Yang,Heng Wang,Jingming Hu,Bangning Zhang,Daoxing Guo,Yuan Liu

    College of Communications Engineering,Army Engineering University,Nanjing 210007,China

    Abstract: In this paper,the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence.Given the cost of monitoring,the mobility of low-orbit satellites,and the directional nature of their signals,traditional monitoring methods are no longer suitable,especially in the case of multiple power level.Mobile crowdsensing (MCS),as a new technology,can make full use of idle resources to complete a variety of perceptual tasks.However,traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks.Therefore,we replace the original centralized server with a blockchain-based distributed service provider to enable its security.Therefore,in this work,we propose a blockchain-based MCS framework,in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system.Then,under certain false alarm probability,we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios,respectively.Finally,a Bad out of Good(BooG)detector is proposed to ease the computational pressure on the blockchain nodes.Simulation results show the effectiveness of the proposed framework.

    Keywords: blockchain;hypothesis test;mobile crowdsensing;satellite communication;spectrum sharing

    I.INTRODUCTION

    1.1 Background and Motivation

    With the development of satellite communication technology,people turn their attention to satellite to solve the problem of the shortage of terrestrial spectrum[1-5].However,with the increase of the number of satellites and their terminals,the spectrum deficit on the satellite is becoming more and more serious,which makes the inter-satellite and satellite-terrestrial spectrum coexistence more prominent[6,7].Satelliteground spectrum sharing mostly refers to the opportunistic access of terrestrial devices to the satellite spectrum by sensing the satellite spectrum without affecting the normal operation of satellite receivers.Similarly,inter-satellite spectrum sharing means that the secondary satellite can access the spectrum of the primary satellite by sensing the spectrum of the primary satellite without affecting the normal operation of the primary satellite earth station.In particular,in the scenario of inter-satellite spectrum sharing [8],it is considered that secondary satellites may break the order of spectrum use to obtain higher benefits under selfish drive,malicious attack or equipment failure[9].From the perspective of selfish drive,the abnormal spectrum behavior of secondary satellites is caused by the higher transmission power.Specifically,when the secondary satellite detects the working primary satellite,the selfish secondary satellite breaks through the prescribed transmit power constraint in order to obtain a higher transmission rate and transmits the signal to its ground base station with a higher power.In this way,although the earth stations of the secondary satellite reap higher transmission benefits,the earth stations of the primary satellite will suffer unacceptable interference in return.At this time,because the secondary satellites are selfish,the efficiency of the whole inter-satellite spectrum sharing network will decline sharply,which is not conducive to the spectrum sharing between satellites.In addition,when the secondary satellite detects the primary satellite in a working state,the malicious secondary satellite will operate at a power level lower than the established transmit power in order to prevent other satellites from sharing the spectrum of the primary satellite.It is worth noting that although this action does not interfere with the primary satellite’s earth station,this covert action results in a significant reduction in the transmission rate of the secondary satellite.In this case,the time for the secondary satellite to transmit certain content will be extended,which will affect the detection ability of other secondary satellites that want to access the spectrum of the primary satellite,and then prevent other satellites from sharing the spectrum of the primary satellite.Therefore,the efficiency of the whole inter-satellite spectrum sharing network will also be weakened by this covert behavior.

    Table 1.List of main abbreviations.

    As an emerging technology that can outsource tasks that would normally be difficult to perform independently to a group of mobile workers (MWs) at a reasonable price for higher return [10],MCS is widely used in perceptual data acquisition tasks[11].Therefore,it can be used to detect abnormal spectrum behavior.However,as shown in Figure 1,traditional MCS rely heavily on a centralized server and is subject to a single point of failure attack (SPoF)[12].Once the central server is compromised,all the perceptual data will be exposed,which is unacceptable for SR and MWs [13].This is because if abnormal usage behavior will not be detected in time,MWs’ private information will be exposed at this time.Therefore,inspired by the above observations,in the scenario of inter-satellite spectrum sharing,how to safely and effectively detect abnormal spectrum behavior through MCS to further promote inter-satellite spectrum coexistence is an urgent problem to be solved,which has not been well studied at present and is the focus of this paper.

    Figure 1.The traditional MCS framework in which service provider is only one server.

    1.2 Related Works

    With the advance of the space-air-ground integrated network (SAGIN),the high frequency band of satellite is considered to be an effective way to solve the shortage of spectrum resources.As a result,there is a lot of work focusing on how to properly share the spectrum of satellite.However,on the basis of reasonable use of satellite spectrum,there are still some secondary users who intentionally or unintentionally violate the spectrum order out of interest or malicious drive,thus destroying the inter-satellite or satelliteterrestrial spectrum coexistence.Therefore,in order to solve the above problems,there are some studies in this phase focused on how to detect these abnormal frequency behavior.

    In [14],by using the high-order moment of the received signal to estimate the power of the hidden signal,the author realized whether there is unauthorized transmission in the cognitive satellite communication network,in which the unauthorized signal was taken as the decision variable.In[15],the generalized likelihood ratio test and the maximum a posteriori estimate were used to calculate the transmitted power of the ground users to detect the interference constraint violation problem in the satellite-ground fusion network.By using multiple hypothesis testing and maximum posterior criterion,the authors deduced the decision threshold of illegal user access detection to realize the detection of illegal user access in the satellite-ground spectrum sharing system[16].Our previous work also focused on the detection of abnormal frequency usage behavior in satellite-ground spectrum sharing system through hypothesis testing theory [17].In the intersatellite spectrum sharing scenario,in order to mitigate the interference received by GEO,an adaptive power allocation scheme was designed to maximize the throughput of LEO while keeping the maximum interference to GEO below the tolerable interference temperature of GEO[18].It is worth noting that most of the above studies only consider the detection problem of abnormal frequency usage by ground users in the satellite-ground spectrum sharing system,but ignore that with the increase of the number of satellites,the inter-satellite spectrum sharing system will also face this problem.To make matters worse,the above detection relies heavily on the deployed monitoring network,so because of the beam and wide range of satellite signals,the monitoring network infrastructure is difficult to apply to the inter-satellite spectrum sharing system when the ground is monitoring the satellite.

    Because of the wide existence and flexible mobility of MWs,MCS is often used in the detection of abnormal frequency spectrum,which is expected to detect abnormal frequency behavior in the intersatellite spectrum sharing system.The existing research mainly focuses on the detection of anomaly spectrum through MCS framework.For the detection of spectral intrusion,the authors solved the problem of selecting heterogeneous sensors on the region of interest and fusion to improve the detection performance of spectral intrusion at an acceptable cost range[19].For spectrum misuse in dynamic spectrum access scenarios,the authors proposed embedding spectrum license in physical layer,using forward error correction(FEC)coding for spectrum license,and constellation design to realize spectrum misuse detection in which simulation results showed that the proposed scheme can detect spectrum misuse correctly and quickly[20].Similarly,the authors proposed an abnormal frequency detection framework based on crowdsourcing in the dynamic spectrum sharing scenario,which not only has good detection performance for abnormal frequency,but also can effectively locate the source of abnormal frequency [21].At the same time,in order to solve the problem of wireless spectrum anomaly detection,an active detection framework was proposed,in which the detection performance of unsupervised anomaly spectrum was improved by defining the anomaly as an outlier and introducing user feedback [22].In addition,in order to detect spectrum sensing data falsification (SSDF) attacks,the authors proposed a machine learning (ML) framework,which aimed to detect the spectrum anomalies generated by SSDF attacks by using the behavioral fingerprint of devices [23].In order to protect sensor privacy while detecting SSDF attacks,the authors proposed a spectrum sensor intrusion detection system for federal learning(FL),which considers unsupervised ML and system call-based fingerprint,and experimental results demonstrate the effectiveness of the proposed system for SSDF detection[24].In order to improve the timeliness and security performance of MCS system,the authors applied mean-field game and EIGamal encryption to optimize the age of information and protect the privacy of the system,respectively[25].

    It is worth noting that the above studies of MCS for spectrum detecting are only limited to the ground spectrum sharing scenario,and have not been used in the inter-satellite spectrum sharing scenario at this stage.In addition,the above MCS detection frameworks rely heavily on a centralized server,which is vulnerable to single point of failure attacks.If blockchain is introduced into the MCS framework,with its decentralization,transparency and traceability,the MCS framework will be more secure and robust[26,27].In general,to the best of authors’knowledge,there is few research on the detection of abnormal frequency behavior in the inter-satellite spectrum sharing scenario.Therefore,it is urgent to construct an abnormal frequency behavior detection framework to safely and effectively detect the abnormal frequency behavior in the inter-satellite spectrum sharing scenario.

    1.3 Contributions

    Inspired by the above observations,this paper intends to integrate blockchain on MCS for the safe and effective detection of abnormal frequency usage behavior in satellite spectrum sharing system.Specifically,the contribution of this paper can be summarized as:

    ? In order to enable MCS framework with security attributes,we propose a blockchain-based MCS framework and give its detailed operation flow.

    ? In order to solve the problem of abnormal frequency behavior detection in satellite spectrum sharing system,we propose a detection framework based on mixed hypothesis testing,and derive a closed expression for abnormal spectrum behavior identification,where false alarm probability is taken as constraint condition to maximize detection probability as optimization criterion to achieve abnormal frequency behavior detection under single and multiple power level scenarios,respectively.

    ? In order to verify the effectiveness of the proposed scheme,we carry out simulation verification under different parameters,and the results show that the proposed scheme can prevent potential security problems under the condition of realizing abnormal frequency behavior.

    The rest of the paper is arranged as follows.In Section II,the proposed framework is summarized and the optimization problems aiming at maximizing detection probability are formulated.In Section III,the proposed optimization problems are solved under single power level and multi-power level,respectively,and the simplified version of the detector is derived in detail.In Section IV,the proposed detection scheme is verified through simulation under several parameters configurations.Section V concludes this paper upon the analysis from Section IV.

    II.SYSTEM MODEL AND PROBLEM FORMULATION

    2.1 System Overview

    As shown in Figure 2,this subsection introduces a blockchain-based MCS spectrum detecting framework for satellite spectrum sharing scenario,which consists of four roles: service requester,service provider,blockchain node,and MWs.The detailed description is as follows:

    Figure 2.The proposed MCS framework based on blockchain for spectrum detectiion.

    ? Service requester: Any individual,company,organization,or operator with a perceived need can be considered a service requester.Typically,it outsources some perception tasks related to execution time and location to MWs for perception,transmission,and analysis.In this paper,since the scenario considered is a spectrum sharing scenario between satellites,the service requester is a satellite earth station,which is worried about interference from other satellites who share its spectrum.However,due to the high mobility of the satellite sharing its spectrum and the directional nature of its signals,it is difficult to monitor its signals on its own.Therefore,it chooses to send the sensing task to the service provider,so as to obtain the transmission power of the relevant satellite,so as to judge whether there is abnormal frequency behavior.

    ? Blockchain nodes:In the proposed framework,all blockchain nodes together form a service provider to form a trusted third party[28]in the MCS monitoring framework.They are not only responsible for maintaining the operation of the entire blockchain system,but also need to contribute certain storage and computing resources to complete the processing of perception data,so as to correctly determine whether the monitored satellite has abnormal frequency behavior.In addition,they run a consensus mechanism based on detecting ability to make sure the accuracy of the detection,in which blockchain nodes broadcast their global decision to figure out the one who shows the most accuracy detection will generate the next block.

    ? Service provider: As shown in the Figure 1,traditional MCS systems rely heavily on a centralized server,so they are vulnerable to single point of failure attacks and other security risks.Therefore,in the proposed framework,a large number of blockchain nodes constitute a distributed service provider.In addition,it is responsible for compiling perceptual data processing algorithms into smart contracts for fast and secure execution.

    ? MWs: All smart devices with sensing and data transmission capabilities,such as UAVs,road side units,vehicles,and smart watches,can be considered MWs,who are responsible for collecting data in specific time,space,and frequency domains and passing the collected perceptual data back to the service provider.

    In addition,the implementation of the proposed framework mainly involves the following steps:

    1.Identity registration: The SP and all MWs need to call the identity registration function at the blockchain node for identity registration,so as to obtain legal identity information.

    2.Pay the deposit: The SR needs to pay a deposit to the SP based on the duration of the perceived task and the contribution of the participant.

    3.Release tasks: Upon receipt of a deposit from the SR,SP will notify SR of task release.At this point,the satellite earth station releases the monitoring task to the SP.

    4.Assign tasks:SP will assign the perceptual task to MWs in the corresponding area according to the execution location and time of the task.

    5.Data upload: After the perceptual data collection is completed,MWs send back the collected data to SP.

    6.Data evaluation: The blockchain node will evaluate the perception data based on the compiled smart contract to obtain the corresponding evaluation results.

    7.Evaluation forward: The blockchain node will report the resulting evaluation results to the SR,i.e.,the satellite earth station,which will judge whether the secondary satellite has abnormal frequency behavior according to the evaluation results.

    8.Residual payment: SR will pay the final payment to SP based on the reported evaluation results.

    9.Reward distribution: SP will allocate incentives based on MWs and their own contributions.Noted that this paper focuses on the detection of abnormal spectrum usage,so only Step 5-7 are needed to pay attention to in the rest of this paper.

    2.2 Problem Formulation

    As shown in Figure 3,this paper considers the problem of satellite anomaly detection in the inter-satellite spectrum sharing system,in which LEO satellite is secondary user and geosynchronous satellite is primary user.First,the secondary satellite reports the frequency requirement to the satellite earth station of the main satellite,and then the satellite earth station sends the corresponding spectrum resources and the formulated frequency rules to the secondary satellite.At the same time,the satellite earth station shares the frequency information of the secondary satellite,including the allocated channel and transmitting power,to SP to help it complete the frequency behavior detecting of the secondary satellite.SP then distributes the monitoring tasks to MWs in the corresponding area.All MWs monitor a certain time slot of the allocated channel and uploads the sensing data to the blockchain node;Finally,according to the perception data reported by MWs,the blockchain node runs the corresponding smart contract,analyzes the perception data,and feedbacks the frequency behavior detection results of the secondary satellite to SR.

    Figure 3.The inter-satellite spectrum sharing model.

    Therefore,the normal frequency usage state of the secondary satellite can be modeled as[15]:

    whereN0andN1indicate that the detected channel is not occupied by secondary satellite or is occupied by secondary satellite withl-level transmitting poweris the m-thsampled signal of MWi,is Gaussian white noise.si(m)is the sampling of the transmitted signal,which is widely modeled as an independent uniformly distributed random process with zero mean and unit variance,i.e,si(m)~N(0,1) [29].h0,iandh1,iare the channel gains from the primary and secondary satellites to the MWi[15],respectively,which can be expressed as

    whereh0,i(θ0,i) represents the antenna gain of the satellite at the direction ofθ0,k,withd0,kas the distance between the satellite and the MWi,with propagation factorAgas gaseous absorption andAcas cloud or fog attenuation [15].Agcan be further given byAg=Ao+Aw=0.182fN′′(f),whereAoandAware the specific attenuations due to water vapor and dry air,respectively,andN′′(f)is the imaginary part of the frequency-dependent complex refractivity.What’s more,the specific attenuation within a cloud or fogAccan be represented asAc=KlC,withKl=0.89f/[ε′′(1+η)]as the specific attenuation coefficientη=(2+ε′)/ε′′,ε′andε′′denote the imaginary part and real part of the dielectric permittivityεof waterCrepresents liquid water density in the cloud or fog.

    It is worth noting that in most of the literature,the allowable transmission power level is 1,that is,L=1;But in practical applications,for example,referring to standards such as IEEE 802.11[30],secondary satellites are likely to have more than one transmit power level,i.e.L >1.Therefore,the normal spectrum usage needs to consider a variety of frequency usage states,which makes the detection of abnormal frequency usage more complicated.In this paper,we define the transmission power deviation from the predetermined level as an abnormal frequency behavior,which can be modeled as

    whereParepresents the abnormal transmission power level of the secondary satellite,andrepresentsN0.In this case,we can measure it by the difference betweenPaandTherefore,in order to detect the abnormal frequency behavior of secondary satellites,we model the detection problem as a binary hypothesis testing problem[31]:

    where the original hypothesisO0contains all the normal frequency statesN0,N1,...,NLof the secondary satellite,and the alternative hypothesisO1is equivalent toA.Therefore,it can be seen from(3) that the normal transmission power levelPnof the secondary satellite contains a variety of caseswhile the abnormal frequencyPais distributed among the normal cases but does not belong toPn.

    Therefore,all hypothesis tests in (4) are mixed hypothesis tests.However,most of the current detection algorithms are only aimed at simple binary hypothesis testing,and few studies focus on hybrid hypothesis testing.In addition,the above problem also includes the secondary satellite’s diverse normal power levels and unknown abnormal power levels,which greatly increases the detection difficulty.Therefore,the present method cannot be directly applied to the above problems.Therefore,it is necessary to design a suitable and effective detection algorithm for the above problems to correctly detect the abnormal frequency behavior of secondary satellites,so as to promote the spectrum coexistence between satellite systems.

    However,in the process of detecting abnormal frequency behavior of secondary satellite,false detection consists of false alarm probability and missed detection probability.Specifically,for the false alarm probability,the MCS detection framework wrongly determines that the secondary satellite has abnormal frequency behavior,which will cause it to suffer undeserved punishment.On the contrary,for the probability of missing detection,the MCS detection framework misses the detection of the abnormal frequency behavior of the secondary satellite and allows it to continue to use the abnormal spectrum.Therefore,it is necessary to design the corresponding detection algorithm to reduce the probability of these two kinds of compromise.

    WhenL=1,we first consider the anomaly frequency behavior detection of the single power stage of the secondary satellite,i.e.,the satellite is either not working or working at transmit powerTherefore,(4)can be reexpressed as

    Considering that there may be a large difference between normal and abnormal transmission power of secondary satellites,two false alarm constraints,α0andα1,need to be considered.Therefore,forL=1,the detection of abnormal frequency behavior can be modeled as the following optimization problem

    Where,Pr(O1|O1)represents the detection probability of secondary satellite abnormal frequency behavior,and Pr(O1|O0) represents the false alarm probability of secondary satellite.In this way,(5) can be equivalent converted into the following three primary hypothesis testing problem

    Where Pr(H2|Hj),j ∈0,1,2 represents the probability of being judged asHjwhen the actual state of the monitored channel isH2.

    WhenL >1,different from the heterogeneous false alarm constraint of(6),we choose the Neyman-Pearson criterion to maximize the detection probability Pr(O1|O1) under the constraint of false alarm probability Pr(O1|O0).Specifically,the optimization problem can be expressed as follows

    III.ALGORITHM DESIGN

    3.1 Single Power Level Detection

    The Lagrange multiplier method is usually used to solve constrained optimization problems[32].Therefore,in order to maximize the detection probability of abnormal frequency behavior of secondary satellites under heterogeneous false alarm constraints,we have

    where y represents the set of perceived data of MWs in a given time slot,andCis the detection threshold.In this way,in order to maximize the detection probability Pr(H2|H2),we have

    where y satisfies y∈C.And we can get

    However,because the working status and the transmission power of the secondary satellite are unknown,is difficult to obtain directly.Therefore,we consider to characterize the truth value by using the maximum likelihood estimateThen(12)can be further written as

    where,parameterλimeets the requirement thatλj=and is decided by false alarm constraint.In addition,due to the presence of secondary satellite abnormal frequency signals in the sampled signal,We useRto represent the decision domain of the abnormal frequency behavior for the test statisticT,which can be expressed as

    Therefore,according to the data reported by a single MW,the local judgment of the abnormal frequency behavior of the secondary satellite can be expressed as

    SinceTis the sum of squares ofNindependent standard normally distributed variables,it followsT=Therefore,the conditional probability can be obtained by the following equation

    According to the above equation,we assume that

    By taking the derivative of the above equation with respect toT,and vice versa.At this point,there must exist anη2satisfyingsuch thatg0(η2)+g1(η2)=1.In other words,whenT >η2,T ∈R.Similarly,in the intervalsatisfies>0 andSo,there may be partial decision domain in intervalwhich is highly related to SNROverall,the decision domain of this part is composed of the following cases:

    ? When SNR is large,the heterogeneous false alarm constraintsα0andα1reach a maximum.By solvingwe can obtain three solutionsη0,η1,η2satisfyingIn this case,the decision domain satisfiesR=[η0,η1]∪[η2,∞).

    ? When SNR is small,only one solutionη2 can be obtained by solving formulasatisfyingTherefore,local decision domain can be

    After the SP makes a local decision about a single MW,it is considered to make a global decision [33-35] about whether the abnormal frequency usage behavior of the secondary satellite occurs through the decision criterionL/K,i.e,

    Where,di ∈{0,1}represents the local decision of thei-thMW andLis the global decision threshold.

    Similar to the decision criterion for local decisions,the decision criterion for global decisions can be expressed as

    whereβ0andβ1are global false alarm probability constraints,0<β0≤α0,0<β1≤α1.βj,j ∈{0,1}denotes the global false alarm constraint and satisfiesβj ≤ αj,j ∈ {0,1}.It is worth noting that since the distance between MWs is much smaller than the distance between MWs and secondary satellite.Therefore,in order to simplify the solution of the global decision,it is assumed that each MW has the same sensing ability,and we have

    Therefore,(20) shows that as the decision threshold increases,the false alarm also increases as well as the detection probability.Therefore,according to the decision criterion,the optimal decision threshold should minimize the false alarm constraint to maximize the detection probability.By solving (20),the decision threshold can be expressed asL ≥Lj,j={0,1},where denotes the minimum value that satisfies the corresponding false alarm probability.Finally,the optimal decision threshold isLopt=max(Lj),j ∈{0,1}.According to Algorithm 1,the detection of abnormal spectrum usage at single power level can be accomplished.

    3.2 Multiple Power Level Detection

    Multiple power level detection refers to the detection when the secondary satellite operates atLdifferent levels of power.For the optimization problem in Eq.(9),we use the likelihood ratio test to maximize its detection probability,which is derived as follows

    wherep(y|Pa)andrepresent the probability density function under abnormal and normal frequency behavior,respectively,when perception data is y.represents the conditional probability of the target channel when secondary satellite normally use the spectrum,andλBrepresents the decision threshold determined by the false alarm constraintαin(9).denotes the set of the normal power levels.

    The variablePris introduced into the above formula to represent any transmitting power,in which case the conditional probabilitiesp(y|Pa)andcan be expressed as

    Obviously,the conditional probabilitiesp(y|Pa)andcan be brought into (21),and a perfect energy detector can be found when the abnormal frequency information is known.However,the abnormal frequency behavior informationp(Pa|O1) is usually unknown,which makes the above detector unavailable.

    Therefore,in order to solve the problem of detecting the abnormal frequency behavior of the secondary satellite whenp(Pa|O1)is unknown,we intend to obtain the generalized likelihood ratio detector for unknown behavior by obtaining the maximum likelihood estimate of the unknown parameterPa,which can be obtained by

    Then,by inserting ?Painto(21),the generalized likelihood ratio can be expressed as

    For ease of expression,defining the functionwith respect to the test statisticTand the normal power,satisfyingTherefore,the detector can be reexpressed as

    Obviously,the above formula can complete the abnormal frequency behavior detection of secondary satellites in the case of multiple power levels,that is,the optimal solution in(9)is obtained.However,under the blockchain-based MCS detection framework,the computation to solve the optimization problem is run on the blockchain node,which aggravates the computational pressure on the blockchain node.Therefore,it is necessary to simplify the generalized likelihood ratio detector.

    3.2.1 The BooG Detector

    Therefore,a Bad out of Good detector is designed in this paper.Its design principle is to first select the most likely normal power level of the secondary satellite,and then determine whether there is an abnormal frequency behavior.The details are as follows:

    First,we apply the maximum a posteriori criterion to find the most likely transmit power from the normal power levels of the secondary satellite:

    Then,the generalized likelihood ratio detector in(21)can then be further written as

    By simplifying the above equation,we have

    Finally,the BooG detector can be denoted as:

    3.2.2 Threshold Setting

    To facilitate the analysis of the detector’s decision domain,the BooG detector can be further written as

    where,for any decision domainRn,it satisfies

    wherei,j ∈{0,1,...,N},i=j.

    For the decision domainRn,it is important to note that

    ? When the secondary satellite is in operation,its transmitting powerPr >0;In this case,the variance of MWs’perception data is greater than;Therefore,

    Because the test statisticTfollows the Chi-square distribution,sothe detection probability of the anomaly with frequency behavior can be expressed as

    Similarly,the false alarm probability can be denoted as

    For the BooG detector,we have the following analysis:

    ? According to the Theorem of large numbers,approaches 1 whenM →∞;

    ? In order to distinguish each power level of the secondary satellite more accurately,it is necessary to design the spacing between them reasonably.Thus,between any two adjacent extreme points,i.e.,Dl=the BooG detector can be approximately expressed as

    For the decision domain between extreme value points,we have

    Theorem 1.The intersection between Dl and decision domain can be denoted asif and only if the following equation is satisfied.

    where

    where

    Therefore,we have

    where,x0is the smaller solution toλM,and x1is the larger solution toProof.See Appendix.

    According to above analysis,if the condition in(36)is not satisfied in the intervalDl,there is no intersection between intervalDland the decision domain.Therefore,when the abnormal spectrum behavior occurs in this interval,it is hard to be detected correctly,which will be verified in the simulations part.

    IV.SIMULATION RESULTS AND ANALYSIS

    In this section,we verify the effectiveness of the proposed framework through numerical simulation.MWs are randomly distributed within a radius of 3Km with the secondary satellite earth station as the center of the circle.Unless otherwise stated,key simulation parameters are shown as Table 2[4].

    Table 2.Key simulation parameters.

    As shown in Figure 5 and Figure 6,the influence of secondary satellite height and transmit power deviation on detection performance is given.At a single power level,detection performance increases with the increase of transmit power deviation.This is because the variance of the perceived data of MWs also deviates more and more under normal and abnormal conditions,which leads to improved detection performance.In addition,the lower the altitude of the satellite,the more the perception data of the MW reflects its true state,its detection performance increases.Comparing Figure 5 and Figure 6,it can be seen that the framework proposed in this paper can improve the detection probability of abnormal frequency behavior of secondary satellite,which reflects the superiority of data fusion at SP.In addition,the consensus mechanism based on detection ability further guarantees the detection effect of SP.

    Figure 5.The influence of satellite height and transmit power on the local detection performance.

    Figure 6.The influence of satellite height and transmit power on the global detection performance.

    As shown in Figure 7,the relationship between detection performance and detection threshold under different false alarm constraints at a single power level is given.It can be concluded that there is a compromise relationship between detection performance and detection threshold,that is,the stronger the false alarm constraint,the smaller the global decision threshold,and the stronger the detection performance.Because the number of workers involved in the detection is limited,the global decision threshold basically does not change apparently under some false alarm constraints.

    Figure 7.The relationship between detection performance and detection threshold under different false alarm constraints.

    As shown in Figure 8,the best detection performance comparison of different detectors under different transmitting power of secondary satellite is given according to the consensus mechanism based on detection ability,where the GLR detector is defined as the baseline.The normal transmitting power of the secondary satellite is defined asIt can be seen that,first of all,for all detectors,in most cases,the greater the gap between the transmitting power of the secondary satellite and the normal power level of the corresponding interval,the better the detection performance.However,when the ratio of the transmitting power of the secondary satellite falls to (5.7),the GLR detector shows the opposite trend,which corresponds exactly to the situation inTheorem 1.That is to say,in this case,the intersection between the decision field andDlis empty or nearly empty.Second,as the secondary satellite baseline transmission power increases,so does the performance of all detectors,because the difference between the different normal transmission powers also becomes larger.Finally,for the two detectors given,the detection performance of the BooG detector is basically behind that of the GLR detector,because the BooG detector only considers the maximum posterior probability to estimate the most likely normal transmission power,thus losing part of the detection performance.However,in the interval(5,7),because the BooG detector estimates the most likely normal transmit power by the maximum posterior probability,F(T)is sharper,resulting in better performance in the interval(5,7).

    Figure 8.The performance comparison of different detectors under different transmitted power.

    As shown in Figure 9,the influence of false alarm constraints on different detectors under different transmitting power is given.It can be seen that,first of all,with the increase of false probability,the detection performance of both detectors increases,this is because the false alarm probability itself is positively correlated with the detection performance.Second,in most cases,the detection performance of GLR is better than that of BooG,because in order to simplify GLR,the BooGie detector only considers the most likely normal transmission power through the maximum posterior probability,so part of the detection performance is sacrificed.However,in the interval (5.7),that is,Pa=6,the intersection of the GLR detector’s decision domain andDlcan be approximated as the empty set.

    Figure 9.The influence of false alarm constraints on different detectors under different transmitting power.

    As shown in Figure 10,the performance of the forking probability at different MW sizes as well as block sizes is given.It can be seen that for the same block size,the fork probability increases as the MW size increases.Moreover,as the block size increases,the bifurcation probability also increases.Therefore,as long as a certain block size is guaranteed,the network scale of MWs can be increased to improve the detection performance of the MCS framework.

    Figure 10.The influence of K on forking probability.

    V.CONCLUSION

    In this paper,a blockchain-based MCS detection framework is developed to detect the abnormal frequency behavior in the inter-satellite spectrum sharing system.First,we explain in detail how the framework can monitor the abnormal frequency behavior in the spectrum sharing system between satellites.Secondly,under the constraint of false alarm probability,we propose an anomaly frequency detection algorithm based on mixed hypothesis testing to maximize the detection probability in single power level and multi-power level scenarios.Then,in order to reduce the computing pressure of blockchain nodes,a BooG detector is proposed.Simulation results show that the proposed framework can effectively detect abnormal frequency behavior in inter-satellite spectrum sharing scenario.

    VI.APPENDIX

    Proof.Defining the functiong(x)=xe1-x,we find thatx=1 is the maximum value point ofg(x).Therefore,when it comes tosimilar conclusion can be obtained that whenreaches its maximum value andIn addition,when the functionreaches its minimum value.At this time,we can get

    Therefore,there are two relationships between intervalDland the decision domain.

    91大片在线观看| 色老头精品视频在线观看| 国产爱豆传媒在线观看 | 日本 av在线| 国产精品日韩av在线免费观看| av超薄肉色丝袜交足视频| 午夜激情福利司机影院| 中文字幕高清在线视频| 国产精品亚洲一级av第二区| 一进一出好大好爽视频| www.www免费av| 精品欧美一区二区三区在线| 中文资源天堂在线| 日韩精品青青久久久久久| 亚洲久久久国产精品| 午夜福利在线观看吧| 91麻豆av在线| 国产精品乱码一区二三区的特点| 人人妻人人澡欧美一区二区| 国内毛片毛片毛片毛片毛片| 99久久综合精品五月天人人| 国产免费男女视频| 日韩 欧美 亚洲 中文字幕| 免费看美女性在线毛片视频| 两人在一起打扑克的视频| 99精品在免费线老司机午夜| 亚洲精品在线美女| 天堂√8在线中文| 在线观看免费日韩欧美大片| 中文字幕久久专区| 大型黄色视频在线免费观看| 国产精品精品国产色婷婷| 可以在线观看的亚洲视频| 黄色a级毛片大全视频| 亚洲人成网站在线播放欧美日韩| 国产精品二区激情视频| av福利片在线| 亚洲av片天天在线观看| 91成人精品电影| 成在线人永久免费视频| 亚洲第一欧美日韩一区二区三区| 欧美激情久久久久久爽电影| 久久国产精品男人的天堂亚洲| 天天添夜夜摸| 特大巨黑吊av在线直播 | 日韩高清综合在线| 精品久久久久久久久久免费视频| 国产午夜福利久久久久久| 国产一卡二卡三卡精品| 好男人在线观看高清免费视频 | 亚洲av电影在线进入| 亚洲人成电影免费在线| 男男h啪啪无遮挡| 男人舔女人的私密视频| 亚洲九九香蕉| 国产成人啪精品午夜网站| 日韩精品中文字幕看吧| 日韩 欧美 亚洲 中文字幕| 国产成人精品久久二区二区91| 午夜激情福利司机影院| 中文资源天堂在线| 亚洲欧美日韩无卡精品| 满18在线观看网站| 国产高清videossex| 变态另类成人亚洲欧美熟女| 天堂动漫精品| 一进一出抽搐动态| 热re99久久国产66热| 欧美+亚洲+日韩+国产| 亚洲av电影在线进入| 亚洲成a人片在线一区二区| 91在线观看av| 亚洲真实伦在线观看| 亚洲性夜色夜夜综合| 99久久精品国产亚洲精品| 99久久99久久久精品蜜桃| 国产av在哪里看| 国产精品精品国产色婷婷| 亚洲一区高清亚洲精品| 欧美精品亚洲一区二区| 精品国产美女av久久久久小说| 视频在线观看一区二区三区| 午夜免费鲁丝| 欧美+亚洲+日韩+国产| 露出奶头的视频| 精品无人区乱码1区二区| 午夜日韩欧美国产| 99re在线观看精品视频| a在线观看视频网站| 观看免费一级毛片| 精品人妻1区二区| 丝袜美腿诱惑在线| 伦理电影免费视频| 91成年电影在线观看| 黄色片一级片一级黄色片| 国产成人精品久久二区二区免费| 亚洲美女黄片视频| 免费看十八禁软件| 男女那种视频在线观看| 亚洲一区二区三区色噜噜| 黄片小视频在线播放| 成人手机av| 免费在线观看日本一区| 久久久久亚洲av毛片大全| 叶爱在线成人免费视频播放| 亚洲第一电影网av| 亚洲专区中文字幕在线| 久久精品国产亚洲av高清一级| 亚洲av电影不卡..在线观看| 亚洲成人久久性| 成人免费观看视频高清| 十分钟在线观看高清视频www| 欧美性长视频在线观看| 男女下面进入的视频免费午夜 | 少妇熟女aⅴ在线视频| 久久亚洲精品不卡| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲自偷自拍图片 自拍| www日本黄色视频网| a级毛片在线看网站| 两个人看的免费小视频| 国产男靠女视频免费网站| 国产亚洲精品久久久久5区| 精品午夜福利视频在线观看一区| 亚洲电影在线观看av| 99在线人妻在线中文字幕| 国产麻豆成人av免费视频| 国产精品亚洲美女久久久| www日本黄色视频网| 视频在线观看一区二区三区| 国产激情欧美一区二区| 在线视频色国产色| 老鸭窝网址在线观看| 男女那种视频在线观看| 亚洲真实伦在线观看| 亚洲aⅴ乱码一区二区在线播放 | 12—13女人毛片做爰片一| or卡值多少钱| 成人18禁在线播放| 亚洲专区中文字幕在线| 欧美黑人巨大hd| 91老司机精品| 日本五十路高清| 亚洲七黄色美女视频| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品在线美女| 国产精品自产拍在线观看55亚洲| 国产激情久久老熟女| 亚洲熟女毛片儿| 变态另类丝袜制服| 国产v大片淫在线免费观看| 婷婷精品国产亚洲av| 在线免费观看的www视频| 欧美日韩福利视频一区二区| 又黄又爽又免费观看的视频| 亚洲av成人av| 在线av久久热| 精品国产超薄肉色丝袜足j| videosex国产| 色尼玛亚洲综合影院| 不卡一级毛片| av在线天堂中文字幕| 特大巨黑吊av在线直播 | 非洲黑人性xxxx精品又粗又长| 熟妇人妻久久中文字幕3abv| 99精品欧美一区二区三区四区| 国产国语露脸激情在线看| 熟妇人妻久久中文字幕3abv| 免费高清视频大片| 亚洲成国产人片在线观看| 一边摸一边做爽爽视频免费| 亚洲无线在线观看| 国产成人啪精品午夜网站| 精品国产亚洲在线| 成人亚洲精品一区在线观看| 久久伊人香网站| 亚洲成人久久性| 国产伦人伦偷精品视频| 黑人欧美特级aaaaaa片| 久久久国产欧美日韩av| 嫁个100分男人电影在线观看| 看片在线看免费视频| 美女午夜性视频免费| 桃红色精品国产亚洲av| 在线十欧美十亚洲十日本专区| 亚洲第一青青草原| 精品午夜福利视频在线观看一区| 久久精品人妻少妇| 一边摸一边抽搐一进一小说| 国产亚洲精品一区二区www| 欧美黑人精品巨大| 成年免费大片在线观看| 少妇粗大呻吟视频| 久久久久国内视频| 在线十欧美十亚洲十日本专区| 88av欧美| 国产成人一区二区三区免费视频网站| 午夜免费激情av| 自线自在国产av| av视频在线观看入口| 国内久久婷婷六月综合欲色啪| 国产99白浆流出| 国产精品av久久久久免费| 中文字幕最新亚洲高清| 亚洲国产精品999在线| 大香蕉久久成人网| 欧美不卡视频在线免费观看 | 俺也久久电影网| 99久久99久久久精品蜜桃| 久久精品aⅴ一区二区三区四区| 好男人在线观看高清免费视频 | 禁无遮挡网站| 777久久人妻少妇嫩草av网站| 国产亚洲欧美在线一区二区| 成人18禁高潮啪啪吃奶动态图| 亚洲av成人不卡在线观看播放网| 又大又爽又粗| www日本在线高清视频| 啦啦啦 在线观看视频| 99久久综合精品五月天人人| 精品人妻1区二区| 十八禁网站免费在线| 国产亚洲欧美98| 在线观看www视频免费| 香蕉丝袜av| 国产高清videossex| 国产av在哪里看| 亚洲五月婷婷丁香| 国产精品一区二区精品视频观看| 女性生殖器流出的白浆| 亚洲专区字幕在线| 免费av毛片视频| 国产97色在线日韩免费| 老司机靠b影院| 日日干狠狠操夜夜爽| 日韩大尺度精品在线看网址| 黄色女人牲交| 免费看日本二区| 亚洲一区二区三区色噜噜| 国产成人精品久久二区二区91| xxx96com| 国产又色又爽无遮挡免费看| 日韩有码中文字幕| 久久精品91蜜桃| 久久中文字幕一级| 成人精品一区二区免费| 久久99热这里只有精品18| 久久这里只有精品19| 一级a爱视频在线免费观看| 极品教师在线免费播放| 一级毛片精品| 亚洲av成人av| 级片在线观看| 色在线成人网| 黄色片一级片一级黄色片| 国产精品亚洲一级av第二区| 夜夜爽天天搞| 国产精品国产高清国产av| 女性生殖器流出的白浆| 欧美最黄视频在线播放免费| 深夜精品福利| 最新美女视频免费是黄的| 久久国产乱子伦精品免费另类| 国产av又大| 欧美精品亚洲一区二区| 91av网站免费观看| 亚洲av片天天在线观看| 国产一区二区激情短视频| 久久久久精品国产欧美久久久| 天天躁狠狠躁夜夜躁狠狠躁| 热99re8久久精品国产| 在线观看免费视频日本深夜| 中亚洲国语对白在线视频| 中文字幕精品免费在线观看视频| 嫩草影院精品99| 欧美久久黑人一区二区| 一区二区日韩欧美中文字幕| 99久久综合精品五月天人人| 国产成人系列免费观看| 亚洲人成电影免费在线| 悠悠久久av| 麻豆av在线久日| 国产精品亚洲美女久久久| 亚洲精品粉嫩美女一区| 夜夜躁狠狠躁天天躁| 国内揄拍国产精品人妻在线 | 少妇粗大呻吟视频| 青草久久国产| 亚洲人成网站在线播放欧美日韩| 视频在线观看一区二区三区| 一二三四在线观看免费中文在| 国产黄色小视频在线观看| 国产激情偷乱视频一区二区| 深夜精品福利| 精品一区二区三区av网在线观看| 丰满的人妻完整版| √禁漫天堂资源中文www| 色在线成人网| 欧美丝袜亚洲另类 | 精品不卡国产一区二区三区| 老鸭窝网址在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 午夜a级毛片| 夜夜夜夜夜久久久久| 12—13女人毛片做爰片一| 久久久久九九精品影院| 午夜两性在线视频| 黄片大片在线免费观看| 亚洲电影在线观看av| 国产精品 国内视频| 超碰成人久久| 国产伦人伦偷精品视频| 中文字幕精品免费在线观看视频| 制服丝袜大香蕉在线| 国产激情偷乱视频一区二区| 女性生殖器流出的白浆| 男男h啪啪无遮挡| 国产av不卡久久| 欧美久久黑人一区二区| 国产成年人精品一区二区| svipshipincom国产片| 国产男靠女视频免费网站| 别揉我奶头~嗯~啊~动态视频| 午夜两性在线视频| 99riav亚洲国产免费| 欧美性长视频在线观看| 日日干狠狠操夜夜爽| 国产成+人综合+亚洲专区| 欧美性猛交黑人性爽| 啦啦啦观看免费观看视频高清| 久久天堂一区二区三区四区| 国产又黄又爽又无遮挡在线| 国产又色又爽无遮挡免费看| 欧美中文综合在线视频| 日本 av在线| 成人亚洲精品av一区二区| 丁香欧美五月| 91麻豆av在线| 国内揄拍国产精品人妻在线 | 女人高潮潮喷娇喘18禁视频| 中文字幕精品亚洲无线码一区 | 久久久久九九精品影院| 精品国产超薄肉色丝袜足j| 十八禁人妻一区二区| 国产黄片美女视频| 免费看十八禁软件| 亚洲熟女毛片儿| 日韩大码丰满熟妇| 亚洲中文字幕日韩| 久久性视频一级片| 亚洲成人久久性| 麻豆国产av国片精品| 色哟哟哟哟哟哟| 禁无遮挡网站| 少妇粗大呻吟视频| 人人妻人人澡人人看| 日本免费一区二区三区高清不卡| 久久久精品国产亚洲av高清涩受| 亚洲真实伦在线观看| xxxwww97欧美| 久久久国产欧美日韩av| 精品午夜福利视频在线观看一区| 日本 av在线| 欧美中文综合在线视频| 香蕉av资源在线| 日韩欧美国产在线观看| 日本精品一区二区三区蜜桃| 可以在线观看毛片的网站| 哪里可以看免费的av片| 啦啦啦韩国在线观看视频| 1024手机看黄色片| 国产成人精品久久二区二区免费| 欧美性猛交╳xxx乱大交人| 最新美女视频免费是黄的| 91成人精品电影| 日本撒尿小便嘘嘘汇集6| av中文乱码字幕在线| 非洲黑人性xxxx精品又粗又长| 波多野结衣高清无吗| 午夜老司机福利片| 国产精品影院久久| 国产亚洲欧美98| 精品久久久久久,| 可以免费在线观看a视频的电影网站| 亚洲国产毛片av蜜桃av| 校园春色视频在线观看| 午夜免费观看网址| 黄片播放在线免费| 99精品欧美一区二区三区四区| 50天的宝宝边吃奶边哭怎么回事| 久久久久久国产a免费观看| 波多野结衣巨乳人妻| 国产三级黄色录像| 精品卡一卡二卡四卡免费| 一个人免费在线观看的高清视频| 欧美 亚洲 国产 日韩一| 亚洲av第一区精品v没综合| 亚洲一区中文字幕在线| 亚洲人成电影免费在线| 国产男靠女视频免费网站| 欧美中文日本在线观看视频| 亚洲精品久久成人aⅴ小说| 久久伊人香网站| 91麻豆精品激情在线观看国产| 男女那种视频在线观看| 波多野结衣高清作品| 中文字幕久久专区| 久久久精品欧美日韩精品| 在线观看舔阴道视频| 搡老妇女老女人老熟妇| 国产精品免费视频内射| 制服诱惑二区| 黄色 视频免费看| 操出白浆在线播放| 久久人人精品亚洲av| 精品午夜福利视频在线观看一区| 精品国产美女av久久久久小说| 精品第一国产精品| 国产av不卡久久| 亚洲中文日韩欧美视频| 亚洲精品中文字幕一二三四区| 欧美激情久久久久久爽电影| 嫁个100分男人电影在线观看| 久久婷婷成人综合色麻豆| 欧美日韩福利视频一区二区| 亚洲真实伦在线观看| 婷婷丁香在线五月| 国产私拍福利视频在线观看| 成人一区二区视频在线观看| 国产一区二区三区在线臀色熟女| 亚洲av成人一区二区三| 日本免费a在线| 亚洲色图av天堂| 1024视频免费在线观看| 麻豆久久精品国产亚洲av| 免费在线观看黄色视频的| 亚洲精品在线观看二区| 欧美另类亚洲清纯唯美| 久久天堂一区二区三区四区| 一级毛片精品| 男女之事视频高清在线观看| 国产精品亚洲一级av第二区| 亚洲成人久久爱视频| 亚洲美女黄片视频| 在线播放国产精品三级| www.999成人在线观看| 看黄色毛片网站| 性色av乱码一区二区三区2| 曰老女人黄片| 亚洲成av人片免费观看| 97碰自拍视频| 老司机福利观看| 宅男免费午夜| 国产成人精品久久二区二区免费| av视频在线观看入口| 国产精品亚洲一级av第二区| 18禁美女被吸乳视频| 一区二区三区国产精品乱码| 日本免费a在线| 亚洲欧美精品综合一区二区三区| 麻豆成人午夜福利视频| 日韩成人在线观看一区二区三区| 99热这里只有精品一区 | 亚洲中文字幕一区二区三区有码在线看 | 亚洲久久久国产精品| 色综合婷婷激情| 成人午夜高清在线视频 | 国产成人av教育| 亚洲美女黄片视频| 亚洲欧洲精品一区二区精品久久久| 哪里可以看免费的av片| 搞女人的毛片| 这个男人来自地球电影免费观看| 欧美一区二区精品小视频在线| 日韩一卡2卡3卡4卡2021年| 一a级毛片在线观看| 成人18禁高潮啪啪吃奶动态图| 久久久久久久午夜电影| 在线十欧美十亚洲十日本专区| 18禁裸乳无遮挡免费网站照片 | 桃红色精品国产亚洲av| 神马国产精品三级电影在线观看 | 婷婷精品国产亚洲av| 1024手机看黄色片| 无遮挡黄片免费观看| 级片在线观看| 一个人免费在线观看的高清视频| 777久久人妻少妇嫩草av网站| 国产亚洲av嫩草精品影院| 欧美又色又爽又黄视频| svipshipincom国产片| 变态另类丝袜制服| 少妇熟女aⅴ在线视频| 久久性视频一级片| 91成人精品电影| 久久久久精品国产欧美久久久| 国产一区二区激情短视频| 欧美国产精品va在线观看不卡| 高清毛片免费观看视频网站| 欧美+亚洲+日韩+国产| 欧美另类亚洲清纯唯美| 国产黄a三级三级三级人| 欧美性长视频在线观看| 国产av又大| 久久国产乱子伦精品免费另类| 级片在线观看| 成在线人永久免费视频| 国产亚洲av高清不卡| 国产极品粉嫩免费观看在线| 欧美成狂野欧美在线观看| 久久久久久人人人人人| 精品午夜福利视频在线观看一区| 亚洲国产欧洲综合997久久, | 色精品久久人妻99蜜桃| 成人国产一区最新在线观看| 日本在线视频免费播放| 亚洲无线在线观看| 一级a爱视频在线免费观看| 国产极品粉嫩免费观看在线| 亚洲精品久久成人aⅴ小说| 国产精品电影一区二区三区| 亚洲七黄色美女视频| 亚洲一区二区三区色噜噜| 久久精品国产99精品国产亚洲性色| 免费av毛片视频| 亚洲国产欧美网| 免费看十八禁软件| 婷婷精品国产亚洲av在线| 精品久久久久久久久久久久久 | 精品久久久久久久久久免费视频| 91av网站免费观看| 亚洲 欧美 日韩 在线 免费| 久久精品国产99精品国产亚洲性色| 免费在线观看完整版高清| 国产成+人综合+亚洲专区| 久久性视频一级片| 美女大奶头视频| 高潮久久久久久久久久久不卡| 男女之事视频高清在线观看| 黄色 视频免费看| 成熟少妇高潮喷水视频| АⅤ资源中文在线天堂| 国产精品国产高清国产av| 可以在线观看的亚洲视频| 久久精品aⅴ一区二区三区四区| 他把我摸到了高潮在线观看| 99精品在免费线老司机午夜| 啪啪无遮挡十八禁网站| 日本免费一区二区三区高清不卡| 国产精品 欧美亚洲| 一个人免费在线观看的高清视频| 国产精品亚洲一级av第二区| 久久久久久亚洲精品国产蜜桃av| 欧美黄色片欧美黄色片| 成人永久免费在线观看视频| 1024手机看黄色片| 在线观看一区二区三区| 中文字幕高清在线视频| a在线观看视频网站| 亚洲成人精品中文字幕电影| 亚洲人成网站高清观看| 黄频高清免费视频| 亚洲成人久久性| www.精华液| videosex国产| 一边摸一边做爽爽视频免费| 国产精品亚洲av一区麻豆| 日韩欧美三级三区| 国产免费男女视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲片人在线观看| 亚洲午夜理论影院| 亚洲成av人片免费观看| 久久狼人影院| 真人做人爱边吃奶动态| 免费看十八禁软件| 精品久久久久久,| 亚洲 欧美一区二区三区| 69av精品久久久久久| 精品电影一区二区在线| 亚洲第一电影网av| 一个人免费在线观看的高清视频| 欧美国产精品va在线观看不卡| 亚洲精品久久国产高清桃花| 好男人电影高清在线观看| 亚洲第一电影网av| a级毛片a级免费在线| 亚洲国产精品合色在线| 国产精华一区二区三区| 波多野结衣av一区二区av| 夜夜躁狠狠躁天天躁| 夜夜爽天天搞| 2021天堂中文幕一二区在线观 | 久久人妻福利社区极品人妻图片| 动漫黄色视频在线观看| 美女扒开内裤让男人捅视频| 亚洲av日韩精品久久久久久密| 中文亚洲av片在线观看爽| 国产v大片淫在线免费观看| 19禁男女啪啪无遮挡网站| 黑人巨大精品欧美一区二区mp4| 少妇的丰满在线观看| 亚洲熟妇熟女久久| 精品不卡国产一区二区三区| 国产v大片淫在线免费观看| 欧美性猛交黑人性爽| 亚洲精品在线美女| 亚洲男人的天堂狠狠| 精品久久久久久久毛片微露脸| 欧美日韩黄片免| 美女扒开内裤让男人捅视频| 亚洲性夜色夜夜综合| 12—13女人毛片做爰片一| 天堂影院成人在线观看| 国产高清有码在线观看视频 |