• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Space/Air Covert Communications: Potentials,Scenarios,and Key Technologies

    2024-04-01 02:07:52MaoHaobinLiuYanmingZhuLipengMaoTianqiXiaoZhenyuZhangRuiHanZhuXiaXianggen
    China Communications 2024年3期

    Mao Haobin ,Liu Yanming ,Zhu Lipeng ,Mao Tianqi ,Xiao Zhenyu,* ,Zhang Rui,3 ,Han Zhu,Xia Xianggen

    1 School of Electronic and Information Engineering,Beihang University,Beijing 100191,China

    2 Department of Electrical and Computer Engineering,National University of Singapore,Singapore 117583,Singapore

    3 School of Science and Engineering,Shenzhen Research Institute of Big Data,the Chinese University of Hong Kong,Shenzhen,Guangdong 518172,China

    4 Department of Electrical and Computer Engineering,University of Houston,Houston,TX 77004,USA

    5 Department of Computer Science and Engineering,Kyung Hee University,Seoul,South Korea,446-701

    6 Department of Electrical and Computer Engineering,University of Delaware,Newark,DE 19716,USA

    Abstract: Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity.However,the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data.Emerging covert communications provides a promising solution to achieve robust communication security.Aiming at facilitating the practical implementation of covert communications in space/air networks,we present a tutorial overview of its potentials,scenarios,and key technologies.Specifically,first,the commonly used covertness constraint model,covert performance metrics,and potential application scenarios are briefly introduced.Then,several efficient methods that introduce uncertainty into the covert system are thoroughly summarized,followed by several critical enabling technologies,including joint resource allocation and deployment/trajectory design,multi-antenna and beamforming techniques,reconfigurable intelligent surface (RIS),and artificial intelligence algorithms.Finally,we highlight some open issues for future investigation.

    Keywords: artificial intelligence (AI);sixth generation (6G);space-air-ground integrated networks (SAGINs);space/air covert communications

    I.INTRODUCTION

    Space/air communications are recognized as a critical enabling technology for the future sixth generation(6G)mobile networks by providing broad coverage and seamless connectivity,which has been widely used in various applications,including disaster relief,maritime communications,and military reconnaissance [1-6].However,for space/air communication systems,the transmission of exploded private or confidential data is very vulnerable to security threats,such as eavesdropping,monitoring,and jamming,due to the inherently open and broadcasting nature of wireless signal propagation environment [7,8].In addition,the three-dimensional (3D) ubiquitous coverage of space/air communications makes it possible for adversaries to shelter themselves in complex geographical areas with difficulty to eradicate,which inevitably imposes severe security issues.Moreover,the mobility characteristics of space/air platforms,such as unmanned aerial vehicles(UAVs)and satellites,and the complex heterogeneous channels impact the network security performance in different ways.Therefore,the information security of space/air communication networks has become a serious concern,and consequently there is an urgent demand for effective methods that can guarantee high performance and secure transmission.

    Traditionally,secure communication is mainly achieved by cryptographic techniques,working at the upper layer,where the same secret key is shared between two communication nodes so that the unauthorized nodes cannot decode the transmitted information accurately [8].However,the transmission delay between the space/air platforms and ground users is generally large due to the long signal propagation distance,especially for satellite communications.The implementation of cryptographic authentication schemes further increases the computing process delay [9],which violates the low latency requirements for future communications.Besides,the cryptographic security scheme suffers from high risk of being decrypted by malicious adversaries due to their increasing computational processing capabilities and speed [10].Different from the above approach,the lightweight physical layer security technology has emerged as an alternative security mechanism to guarantee secure transmission from the perspective of information theory [8],which has been widely investigated in space/air communications[11-13].Specifically,implementing physical layer security techniques achieves the maximization of the performance gap between the legitimate channel and the eavesdropping channel,thus enabling the minimization of the information leakage to the eavesdroppers.However,the above two methods encounter great difficulities to achieve complete communication security.The ultimate objective of secure communication is not only protecting the transmitted message content from eavesdropping but also preventing the legal transmission behavior from adversary detection [14].In certain scenarios,such as military applications,hiding the wireless transmission from detection is crucial since the exposure of the existence of transmission may provoke the enemy to locate,monitor,or even attack the signal source.Fortunately,the emerging covert communication technology,also known aslow detection probability communication,is promising to overcome this challenge by ensuring that the probability of transmission being detected is lower than an arbitrarily small value,thus achieving a more robust level of security.

    A prototypical scenario for covert communications is that a transmitter(Alice)can convey information to its desired users(Bob)without being detected by a malicious adversary(Willie).The fundamental theory of covert communications reveals that at mostObits information can be transmitted covertly and reliably from a transmitter to a receiver innchannel uses over additive white Gaussian noise channel[15].Additionally,the authors in[16]analyzed the optimality of Gaussian signaling to achieve covert communications with an upper bound on the Kullback-Leibler(KL) divergenceD(p1||p0) as the covertness constraint,which also establishes a foundation for subsequent researches.Note that most existing works on covert communications concentrate on terrestrial networks.For instance,the authors in [17] maximized the system covertness under the constraint of outage probability via cooperative jamming by a full-duplex receiver.The authors in [18] developed an alternative algorithm to jointly optimize the transmit power and active beamforming of RIS to maximize the covert rate.The research on space/air covert communications is still in its infancy,while covert satellite communications has rarely been studied.There is a necessity to explore the mechanism of generic technologies as well as the unique features,such as the space/air unique environment of signal propagation and the mobility of space/air platforms,on the covert communication system performance and design to ensure the covertness attributes of future space/air communication systems.

    Several tutorial and survey papers have been published on covert communications.The early exploration of covert communications was carried out in[19],where steganography working at the application layer and spread spectrum approach working at the physical layer were briefly reviewed.The fundamental limits and the guideline for jammer aided covert communications were also provided.In[20],the difference between covert communications and physical layer security,key challenges for the design of covert systems,and future research directions were thoroughly investigated.In[7],several basic concepts of secure communications,typical application scenarios of UAV-assisted covert communication networks,and some challenging problems and future research directions were introduced and discussed.In [21],a comprehensive survey on covert communications was conducted,where radio frequency based techniques,steganography based techniques,corresponding challenges,and open research issues were presented.The authors in[10]focused on the potentials and candidate methods for uncertainty design in UAV relay assisted covert networks,where the promising research directions were highlighted.

    Different from the aforementioned works [7,10,19-21],we concentrate on the radio-frequency-based(RF-based)covert communications in space/air specified networks.To the best of our knowledge,this paper is the first overview of key candidate technologies and open problems of space/air covert communications.In this paper,considering the unique characteristics of space/air communications,we first introduce the covertness constraint model,performance metrics,and typical application scenarios in space/air covert communications in Section II.Then,we provide a brief summary of commonly adopted methods that introduce uncertainty into covert system design in Section III,which is followed by key candidate technologies to guarantee system covertness and improve communication performance in Section IV.Finally,we highlight the open problems worthy of future research in Section V.

    II.BASICS AND TYPICAL SCENARIOS

    In this section,we first present the basic covert constraint model in space/air covert communications.Then,a brief summary of key performance indicators for space/air covert communications is provided.Finally,we discuss several typical scenarios of space/air covert communications.

    2.1 Covert Constraint Model

    In space/air covert communications,Willie carries out the detection behavior to make a decision on whether Alice is transmitting signals by conducting binary hypothesis testing.The two generic hypotheses are modeled as follows:

    whereiis the channel use index,i.e.,i=1,2,..,L,andLis the maximum channel uses.yw[i] andxa[i]are the received signals of Willie and the transmitted signals of Alice,respectively.nw[i] is the additive white Gaussian noise at the receiver.pais the transmit power of Alice andgawis the channel gain between Willie and Alice.Moreover,H0andH1correspond to the null hypothesis that Alice keeps silent and the alternative hypothesis that Alice is transmitting signals,respectively.

    In general,Willie identifies the binary hypotheses by using a radiometer to measure the received signal power[22].In other words,Willie makes decisionD0advocating hypothesisH0if the average received signal power is lower than a predefined detection threshold.Otherwise,decisionD1in favor of hypothesisH1is made.Thus,there may occur two types of wrong decisions,namelyfalse alarmandmiss detection,due to the uncertainty of the received signal power or the inaccurate detection threshold value.To measure the detection performance of Willie,several practical indicators in existing works,also known as the covert constraint models,are summarized in the following.

    ?Detection error probability: Define the false alarm probability and the miss detection probability as PFA=Pr{D1|H0}and PMD=Pr{D0|H1},respectively.Then,the detection error probability is defined as the sum of the false alarm probability and the miss detection probability,i.e.,ξ=PFA+PMD,which is the most commonly used for covertness measurement[23-25].Note that the minimum of the total detection error probabilityξ*can be calculated mathematically according to the known distributions of uncertain variables in certain cases,such as the scenarios of cooperative jamming.Hence,the covert constraint model can be expressed asξ*≥1-ε,whereεis a predetermined small number arbitrarily close to zero and can be set manually according to the covertness requirement.

    ?Variational distance: In the cases where only the probability distribution of Willie’s channel observations can be obtained,the optimal detection error probability at Willie is given byξ*=1-VT(p0,p1)[15,26,27],wherep0andp1denote the probability distributions of the received signal under hypothesesH0andH1,respectively.VT(p0,p1)=‖p0-p1‖1is the total variational distance betweenp0andp1,where‖.‖1denotes theL1norm.Hence,in this situation,the covert constraint can be formulated asVT(p0,p1)≤ε.

    ?Relative entropy: When the maximum channel uses number is finite,the detection error probability usually involves the lower incomplete Gamma functions,making it more challenging to carry out further communication performance analysis[28].Moreover,the generally intractable computation of the variational distance results in its inconvenient application in real scenarios [16,29].Therefore,by exploiting the Pinsker’s inequality[15],the relative entropy(also known as the KL divergence) can be obtained as the upper bound on variational distance,which simplifies the analytical calculation of the covertness constraint.In other words,we have

    Then,the constraint of covertness is transformed toD(p0‖p1)≤2ε2orD(p1‖p0)≤2ε2.Although the covert communication system under the two constraints has been widely investigated,their strictness on covertness requirement are quite different in different covert communication systems.For example,D(p1‖p0)≤2ε2is stricter as the covertness constraint thanD(p0‖p1)≤2ε2in the Gaussian signaling system so thatD(p1‖p0)≤2ε2achieves lower mutual information[16].

    2.2 Performance Metrics

    Similar to SAGINs,the performance metrics of space/air covert communications include the signal-tointerference-plus-noise ratio(SINR),system throughput,coverage probability,energy efficiency,handover rate,and etc.In the following,we provide the definitions of several commonly-used or potential performance metrics for space/air covert communication systems.

    ?SINRmeasures the strength of the desired signal to the unwanted interference and environment noise.We consider a scenario whereMspace/air transmitters are exploited to serveNground users.Assume that one user is only served by one transmitter.Hence,the SINR of the communication link between transmittermand usernis calculated as

    wheregm,norgj,nis the channel gain between transmittermorjand usern.Pm,nis the allocated transmit power to usernby transmitterm,andPm,iandPj,nare similarly defined.Wandn0are the total system bandwidth and the noise power spectral density,respectively.

    ?System throughputdecipts the communication capacity of the space/air covert communication system.Adopting the Gaussian signal model,the instantaneous data rate of usernserved by transmittermcan be calculated as

    in bits/s [30].The expected data rate over random channel realizations is given by

    where E[·] denotes the expectation operation.Thus,the system throughput can be calculated as

    ?Coverage probabilityis defined as the probability that the received SINR is higher than a predetermined threshold [31].For a target SINR thresholdγ*,the coverage probability of usernserved by transmittermcan be expressed as

    Denote the set of the users covered by transmittermasNm.To measure the capability to provide communication service for ground users of a specific transmitter,thenumber of served userscalculated by|Nm|=1{γm,n ≥γ*}can be used for the performance analysis,where 1(·) denotes the indicator function determining the value is 0 or 1.Moreover,the3D coverage densitycan be further defined to evaluate the coverage ability in space/air covert communications[1],i.e.,,whereVmis the volume of the covered region of a satellite,UAV,or airborne.

    ?Energy efficiencydemonstrates the number of information bits that can be successfully transmitted with unit energy consumption.Considering the characteristics of space/air platforms,the power consumption mainly composes of the kinetics-related energy consumptionPkin,the communication-related energy consumptionPcom,and the on-board circuit power consumptionPcir[30,32,33].Hence,the energy efficiency of transmittermis given by

    Generally,Pciris neglected in existing works due to its relatively small value compared toPkinandPcom.Apart from the per-transmitter energy efficiency,the network energy efficiency can be similarly defined as the ratio of the system throughput to the total energy consumption.

    ?Handover rate,defined as the ratio of the handover number to the time period,i.e.,

    represents the frequency at which a user handovers from one transmitter to another[34].On one hand,the handover occurs between the same type of transmitters,such as satellites,which provides different service durations and communication rates.On the other hand,necessary handover exists among the heterogeneous access networks.Although a few studies related to the handover methods in SAGINs have emerged[34-36],adaptive and efficient handover algorithms under covertness constraint are still worthy of further investigation.

    2.3 Typical Scenarios

    The applications of space/air covert communications facilitate the high-level secure data transmission in the upcoming era of the Internet of Everything.Figure 1 illustrates several typical scenarios classified by different roles of the transmitters in space/air covert communication systems,with the details given as follows.

    Figure 1(a) describes the scenario where space/air platforms serve as base stations to provide full covert access to the ground users without backhaul links,which is potential in military operations within the marine,mountain,or desert areas [2].In this case,the proper selection and handover of accessing networks to balance security and quality of experience is significant for the confidential information transmission.To this end,intelligent handover decision-making methods,such as deep reinforcement learning,can be exploited to improve the overall covert communication performance in space-air integrated covert networks.Besides,the channel inverse power control technology can be exploited to maintain the received signal power at legitimate ground users as a constant value,and conversely make the received signal power at wardens vary randomly due to the channel fading[37].

    Figure 1(b) decipts the scenario where the secret data are reliably transmitted with the help of relays,which is promising in the case that the direct Line-of-Sight (LoS) links between the space/air platforms and the ground users are unavailable due to the strong shadowing and obstacles.Although the relaying architecture expands the hiding coverage,the twophase transmission poses an even more serious security threat.In such a context,relay selection arises as a key and challenging issue to increase the covert communication rate.Especially for multi-hop relaying systems,data transmission route scheduling should also be subject to covert constraints.In this case,joint routing and communication optimization can provide a good balance between system covertness and data rates,but this remains a challenge.

    Figure 1(c) shows the scene when space/air platforms act as users to perform specific confidential tasks without being detected by the adversaries [7],such as space-air-ground joint swarm warfare.During the task execution process,space/air platforms should keep the connection to the control nodes via wireless links.However,once the secret transmission behavior is detected by the enemy,legitimate platforms will undergo the risk of being attacked and the mission will be terminated.Therefore,the covert transmission between the nodes for performing tasks and controlling is also a critical issue.To enhance the system covertness,proactive random location variations created by the mobile characteristics of space/air platforms can be utilized to introduce uncertainty into the received signal power at wardens.In addition,probabilistic transmission strategy can also be adopted to mislead wardens to make wrong decisions.

    Figure 1(d) describes a potential scenario where space/air platforms are employed as the wardens to achieve high detection performance.Benefiting from their high mobility and large detection distance,mobile space/air platforms can adjust the detection threshold value and change their positions dynamically according to the received signal strength.The repeated process of detection or adjustment of mobile wardens enables a more accurate determination on whether Alice is transmitting,which makes the legal transmission more vulnerable to exposure compared to traditional terrestrial static wardens.However,most existing studies related to space/air covert communication neglect this kind of scenario,which yet urgently requires further and in-depth consideration to provide more robust protection for covert data transmission.

    Figure 1(e) presents an efficient covert application where a cooperative space/air-based jammer is utilized to generate artificial noise to increase the randomness in the received power of the wardens,which has been widely investigated in existing secure communication works [11,25,38].Note that the interference caused by the jamming significantly deteriorates the system throughput when it cannot be well eliminated,so the power of the friendly jamming should be carefully optimized to keep a good balance between covertness and communication performance.In addition,the energy efficiency of the jamming signals is also a topic worth thorough discussions.

    III.SYSTEM DESIGN

    The core idea of covert communications is to hide the transmission behavior from wardens by introducing uncertainty to their received power [22].In this section,we review several efficient solutions for communication covertness,including noise uncertainty,cooperative jamming,imperfect channel state information,location variations,and unknown transmission time.Note that these typical solutions can be utilized alone or combined to enhance the system covertness in the application scenarios mentioned in the last section.

    3.1 Noise Uncertainty

    The lack of exact knowledge of the background noise power is considered as noise certainty.Generally,the background noise composes of thermal noise,quantization noise,and imperfect filters noise,etc [39,40],which is influenced by the weather and temperature in the space/air environment,and the varying electronic component tolerances.Therefore,the random characteristic of the environmental noise power can be exploited to introduce confusion to the detection decision-making process,which can be practically exploited in the potential scenarios shown in Figure 1 to guarantee the random received power at wardens.Specifically,the commonly-used noise uncertainty models fall into two categories,one of which is the bounded model where the actual noise power in dB follows a uniform distribution within a finite interval,and the other is the unbounded model[39].

    To measure the performance of noise uncertainty in covert system design,we consider a scenario where a UAV serves five ground users with a warden to detect the transmission.The maximum speed of UAV is 50 m/s and the flying altitude of UAV is set as 100 m.The maximum transmit power of UAV is 100 mW.The user association,UAV transmit power,and trajectory are jointly optimized with block coordinate descent technique [41].Meanwhile,a heuristic method that associates user based on received signal strength with the UAV flying directly from the departure position to the destination position is employed for performance comparison.The results in Figure 2 reveal that larger noise uncertainty brings more benefits on minimum user achievable rate,while the covert performance is limited to the constrained communication resource when the noise uncertainty is sufficiently large.

    Figure 2.Performance of the minimum user achievable rate versus variance of the noise uncertainty for different allowed correct detection probabilities ε.

    3.2 Cooperative Jamming

    In addition to the natural noise uncertainty,as shown in Figure 1(e),artificial noise with random transmit power can be intentionally emitted by a cooperative space/air-based jammer to jam the wardens so that the uncertainty of their received signal power can be efficiently increased [42].Although the jamming signals degrade the detection performance of wardens,the communication performance deteriorates as well.Fortunately,different from the uncontrollable random noise,the jamming power can be optimally adjusted to mitigate the interference as much as possible while guaranteeing the system covertness.Along with the optimizations of the positions of the space/air-based jammers,the stealth and quality of the transmissions can be further improved.The existing research works in open literature usually assume that the instantaneous jamming power is a random variable that follows uniform distribution within the interval from zero to the peak transmit power[25,38].

    3.3 Imperfect Channel State Information

    The wireless channel state is vulnerable to environmental conditions and the small-scale fading can result in random channel coefficients,which is promising to mislead the wardens into setting wrong detection threshold and making wrong decisions about their received power [22,43].Therefore,channel estimation techniques are necessarily required to acquire accurate channel state information from the point of warden’s view.However,the characteristics of high delay and fast fading of space/air signal propagation environments lead to the difficulty and challenges of accurate channel acquisition [44].Thus,imperfect channel state information becomes a practical solution to covert system design.Particularly,the channel uncertainty is widely modeled as zero-mean circularly symmetric complex Gaussian random variables[43-45]to further analyze the wrong detection probability of the warden.

    3.4 Location Variations

    Random variations of locations of space/air transmitters can lead to random received signal power at wardens,which can be naturally leveraged to mislead wardens to make wrong decisions on transmission behavior detection [22,46] with non-optimal detection threshold.Especially in air communications scenarios,the characteristics of high flexibility and controllable mobility of aerial platforms[30],such as UAVs,can be fully exploited to enhance the location variations and further improve the system covertness.Note that the location variations between two consecutive time slots must satisfy the maximum velocity constraints of the aerial platforms.In contrast,the exact periodic high-speed motion locations of communication satellites can be tracked in real-time through the broadcast ephemeris[9],which poses more serious threats to covert transmission.Apart from the above active location variations,the location estimation errors due to radar or camera positioning also entail similar uncertainty effects.For instance,the authors in[24] and [41] modeled the location estimation errors as Gaussian random variables,based on which the detection error probability is analyzed theoretically.

    3.5 Unknown Transmission Time

    With the rapid development of satellite communication technologies,full-time and full-region communication services are readily realized.However,the private data transmission duration is practically much shorter than a full day and the pre-arranged time of transmission between two communication nodes is likely to be unknown to the wardens.The authors in[14]have shown that Alice can secretly pre-arrange a choice of a single time slot out of multiple time slots to achieve reliable communications while leveraging the ineffectiveness of wardens’ detector.However,most of existing works assume that wardens are aware of the time slot in which Alice is possible to transmit.Probabilistic transmission not only brings uncertainty to wardens’ received power,but also offers the potential to improve the system energy efficiency,which still deserves future extensive investigations.

    IV.KEY CANDIDATE TECHNOLOGIES

    Although the covert constraints limit the transmission quality to some extent,the communication performance can be enhanced with other techniques,such as resource allocation.To facilitate the practical implementation,in this section,we investigate several key candidate technologies for balancing covert constraints and data rate in space/air covert networks,with the technical barriers and potentials briefly discussed.

    4.1 JointResourceAllocationandDeployment/TrajectoryDesign

    On one hand,the system covertness can be significantly improved by reasonable wireless resource allocation.On the other hand,with the increasing number of deployed space/air platforms sharing limited communication resources,the resultant inter-beam or cochannel interference degrades the overall communication performance greatly[47].Therefore,careful radio resource allocation strategies are desired for maintaining system covertness and increasing user data rates.

    The communication resource is usually multidimensional,and the resources in different domains actually interact with each other.In the time domain,the existing works mainly concern the transmission time slot assignment in time division multiple access(TDMA)systems.The proper selection of transmission slots demonstrates benefits for improving the link quality and enhancing covertness.Besides,as mentioned in Section III,the random time schedule is also vital for covert data transmission.In the frequency domain,high spectrum-efficiency frequency reuse schemes are urgently needed to address the spectrum scarcity issue in future networks.To this end,cognitive radio (CR) techniques can be utilized as an effective method to improve the system capacity by allowing unauthorized users to opportunistically exploit the licensed spectrum [3].In addition,the transmit power control is also a critical issue in terms of communication performance and covertness.Effective power control schemes call for a good tradeoff between the communication rate and the probability of being detected.Generally,the power control subproblem can be separated from the original multi-dimensional communication resource optimization problem,which can be solved by exploiting water filling method or heuristic approaches including the particle swarm optimization and genetic algorithm,and so on [23].In addition,the transmit power optimization subproblem can also be converted to a convex problem by exploiting the successive convex approximation(SCA)techniques and a suboptimal solution can be obtained by solving the approximated convex problem[24,25,41].

    Different space/air platforms ranging from low to high altitude have different maneuvering properties,which offers an additional optimization degree of freedom to achieve high covertness and communication quality.To be more specific,in the space domain,satellites usually operate in fixed orbits and have fixed trajectories.In the air domain,airships and balloons are capable of remaining almost stationary in the air for a long period.The former can be controlled manually using electronic propellers and motors,and the latter depends mainly on the wind to deploy[6].Aircrafts generally travel on a specific route for a fixed period of time.Different from these types of platforms,the aerial platforms at low altitudes,such as UAVs,provide more flexible 3D mobility to improve the covert transmission performance and have attracted tremendous academic attention.However,the deployment or trajectories,and communication variables are usually highly-coupled and require joint optimization [30],which results in the exponential growth of computational complexity.Moreover,the highspeed movement of the aerial platforms contributes to the dynamic 3D network architecture and the timevarying interference,which facilitates real-time communication resource allocation.Therefore,several optimization approaches,including convex optimization,heuristic search methods,matching theory,and artificial intelligence based methods,can be promisingly exploited to carry out the network optimizations[1].

    To demonstrate the benefits of joint optimization of resource allocation and deployment on covert transmission,we conduct a simulation where three UAV base stations are employed to serve several randomly distributed ground users assisted by a cooperative UAV-mounted jammer and two independent wardens attempt to detect the downlink transmission,as illustrated in Figure 3.The allowed flying altitude of the UAVs ranges from 200 m to 500 m.The maximum transmit power of both UAV base stations and UAVmounted jammer is set as 100 mW.In the simulation,we employ block coordinate descent based iterative algorithm to jointly optimize the user association,bandwidth allocation,UAV 3D positions,and transmit power to maximize the minimum user rate[48].Meanwhile,a heuristic method that associates users based on the K-means clustering method with each UAV base station positioned at the center of each cluster and the fixed altitude of 350 m is used for performance comparison.As can be observed,the performance of the proposed scheme labeled as‘Optimal’is distinctly better than that of the heuristic solutions in Figure 4.

    Figure 3.Illustration of the joint resource allocation and multi-UAV deployment.

    Figure 4.Performance of the minimum user rate versus variance of the allowed correct detection probability for different numbers of Bob.

    At present,joint resource allocation and deployment/trajectory design have attracted tremendous academic attention.For instance,in [41],the authors jointly optimized the time slot allocation,UAV trajectory,and transmit power to achieve a high covert data rate while considering the location uncertainty of the warden.In order to maximize the effective throughput,the authors in [49] optimized the block length,transmit power,and the UAV relay location jointly under the two-phase covertness requirements.However,there is a scarcity of literature related to space covert communications.The authors in[50]proposed a penalty based SCA algorithm to maximize the minimum average covert rate via joint optimization of sensor association and the full-duplex UAV relay’s transmit power and trajectory.The authors in [51] optimized the RIS beamforming and the transmit power of Alice to improve the satellite covert signal quality under the constraints of limited onboard resources.

    4.2 Multi-Antenna and Beamforming Enabled Space/Air Covert Communications

    With the explosive growth in the variety of privacy data,such as color photographs and high-definition videos during military reconnaissance tasks,the demand for high data transmission rates is increasing.However,the conventional congested sub-6 GHz bands are now unsatisfactory for supporting future wireless covert communications [52].The trend of shifting communication to higher frequency bands is becoming acceleratively evident.Thanks to the shorter wavelength in the higher frequency bands,the equipment of large-scale antennas (also known as multiantennas)in a small area turns to be cost-effective for the size and weight limited space/air platforms.Combined with beamforming,the multi-antenna technologies not only provide more degrees of freedom to further improve the system throughput but also increase the covertness due to the narrow directional beams[53].Therefore,the multi-antenna and beamforming techniques are emerging as promising technology for space/air covert communications.

    Generally,beamforming is achieved by properly adjusting the phases and amplitudes of the antenna weights to form desired radiation patterns.The beamforming architectures can be classified into three categories according to the multi-antenna hardware structure,namely analog beamforming,digital beamforming,and hybrid beamforming [1].For the analog beamforming,only one radio-frequency chain is required to connect to all antenna elements and only the phases of signals on antennas can be controlled by phase shifting.Compared to analog beamforming,digital beamforming achieves higher performance with digital signal processing techniques,but it also brings high hardware cost and energy consumption due to the independent RF chain connected to each antenna element [54].The hybrid beamforming integrates the advantages of the analog beamforming and digital beamforming to achieve a tradeoff between the beamforming performance,power consumption,and hardware complexity,where a small number of RF chains connect to a large number of antenna elements.Due to the practical constraints of power budget on space/air-based platforms,the analog beamforming architecture and the hybrid beamforming architecture may be much preferable for covert transmissions[55].

    Some multi-antenna and beamforming related covert communication studies have emerged.For instance,the authors in[56]investigated a multi-antenna relay assisted covert communication scenario,where relay beamforming and power allocation are optimized in sequence to maximize the transmission rate.The authors in[10]exploited a multi-antenna jammer with zero-force beamforming techniques to achieve the maximization of covert transmission rate between the legitimate ground transmitter and the UAV receiver.The authors in [23] considered a jammeraided multi-antenna UAV covert communication system,where the transmit power and jamming power were jointly optimized to maximize the user rate.Considering both the single data stream and multiple data streams,the authors in[57]maximized the achievable covert rate by joint optimization of the transmit power and analog beamforming.

    Although these exisiting works have shone a light on multi-antenna and beamforming enabled covert communications,there still exist some other critical beamforming related technologies to call for thorough consideration.For instance,the exact locations of wardens and users are practically assumed to be unknown to Alice,which results in the difficulty of beam alignment.One possible scheme is to sweep the beam to enable opportunistic communication to users,while this scanning process may cause more suspicion form wardens.The authors in [58] optimized the number of beams,transmit power,and UAV flight altitude to maximize the throughput by exploiting beam sweeping techniques,where a warden and a user were randomly located in a line coverage area.Besides,the beamforming technique can be exploited in highly dynamic space/air covert mesh networks to further improve the system performance.However,on one hand,the imprecise beam direction can bring strong interference to other data stream transmission link which deteriorates the communication quality [59].On the other hand,the deflected beams can easily cause power leakage to wardens.Therefore,the real-time beam alignment becomes critical issue worth special consideration under this kind of scenario.In addition,the beam handover mechanisms under covert constraints deserves of future further research,especially for space-based covert wireless networks.

    4.3 RIS Assisted Space/Air Covert Communications

    RIS is a planar surface of electromagnetic material composed of massive programmable reflecting elements.The electromagnetic properties including the amplitude and phase of each reflecting element can be actively adjusted by a smart RIS controller so that the incident signal can be strengthened and arbitrarily steered to the desired direction.Integrating RIS as relays into space/air covert communication scenarios,the received signal quality at a legitimate user can be enhanced and the signal strength at illegal wardens can be weakened.Besides,different from the conventional active transmission schemes,RIS requires no additional RF chains [60],which avoids high energy consumption and hardware cost.Thus,it is ideal for equipment on strictly resource-constrained space/air based platforms to assist covert data transmission.

    As depicted in Figure 5,RIS units can be conveniently deployed on spatial,aerial,or terrestrial platforms to enhance the space/air covert performance.First,the long transmission distance between the spatial transmitters and aerial or terrestrial users usually contributes to large path loss.The direct links between the satellites and user terminals in dense urban environments are possible to be blocked by various obstacles.Combined with the passive beamforming techniques,the RIS mounted on satellites constitutes a potential candidate to overcome the drawbacks of signal attenuation and blockage.Besides,satellite relay networks are becoming a promising architecture for cross-layer covert transmission due to less emission power between two communication nodes,whose implementation is yet hindered due to the limited onboard processing capabilities.Benefiting from the high efficiency and low processing overhead,the RIS placed on satellites can efficiently address such issues.Second,thanks to the appealing agility of aerial platforms,RIS can be mounted horizontally on the top and the bottom of aerial platforms,or even implemented as a coating layer on the sides of aerial platforms,which can help achieve 3D full-space,smart,and flexible reflection in the sky [61,62].Explicitly,on one hand,the adoption of RIS techniques on aerial platforms enhances the directionality of covert transmission and expands the hiding range.On the other hand,the mobile properties of aerial platforms can be exploited to further improve covert performance.Therefore,the joint optimization of passive phase shifting of RIS and the deployment or trajectory of aerial platforms attracts much research attention.In [25],the transmit power,trajectory of the aerial RIS relay and the UAV jammer,passive beamforming,and user association were jointly optimized to maximize the covert energy efficiency.The authors in[63]alternatively optimized the transmit power,RIS phase shift,and the trajectory of UAV-RIS to maximize the covert energy efficiency.In [64],a UAV equipped with a RIS acted as a relay between two nodes,and the power control,passive beamforming,and positioning were jointly designed to maximize the covert rate.Third,different from the aerial or satellite-mounted RIS,only half-space reflection can be realized by the RIS mounted on terrestrial building facades,but similar aforementioned metrics can also be achieved.The authors in [51] investigated the application of terrestrial RIS in satellite covert communication systems,where the benefits of RIS in terms of increasing the minimum achievable rate were demonstrated.

    Figure 5.RIS assisted space/air covert communications.

    At present,a greater amount of effort has been dedicated to aerial or terrestrial RIS aided stealthy transmission.Nevertheless,the practical analysis and optimization of RIS assisted satellite covert communications remain to be explored.Furthermore,the inherent uncertainty in the phase shift of the RIS can be exploited as an effective solution in the space/air covert communication system design [65],which enables the intentional confusion and degradation of detection performance at the wardens.However,it has usually been neglected in most available studies.

    4.4 Intelligent Space/Air Covert Communications

    Generally,existing studies derived and analyzed the optimal detection performance from the perspective of the wardens.However,some unexpected factors,including the uncertainty of the location of the wardens,the inexact channel state information,and the latency of static detection,result in the unavailability of the unactual system covertness to the legitimate user or network designers,which may contribute to the inaccurate covert performance or even the unachievable covert transmission in practical scenarios.Moreover,the future space/air covert communication networks composed of various devices at space/air/ground layers.The heterogeneous resource,self-organized architecture,and time-varying environments pose great challenges to covert communication design and optimization by the traditional model-based method.To some extent,intelligent algorithms assisted space/air covert communications is a promising technique to achieve covertness in real applications.

    Artificial intelligence technologies employ computers or machines to mimic human thinking for problemsolving and decision-making,which encompass several research aspects such as machine learning and bio-inspired algorithms[66],and so on.Artificial intelligence empowered covert communication can harvest many benefits due to the powerful self-adaptation and learning capabilities.For instance,the deterministic channel model is the essential foundation for covert transmission establishment and performance evaluation,especially in multi-antenna covert systems.Owing to the significant advancements of machine learning,the acquisition of the channel state information from the surroundings of a radio link becomes possible.With the growing computing ability,machine learning methods can be employed on legitimate space/air platforms to obtain better channel state information,which will help signal shelter and further facilitate a practical covert transmission scheme.In addition,a more perfect channel estimation is also vital for the surveillance of wardens.Note that some works on public wireless networks,e.g.[67-69],can suggest a way for the application of machine learning for channel estimation in covert communications.

    Additionally,due to the generally unavailable closed-form optimal detection threshold and intractable formulated optimization problems,it is challenging to obtain practical and high-performance solutions by conventional approaches,such as convex optimization.Benefiting from the superior interaction with unknown environments,as a critical subfield of machine learning,deep reinforcement learning(DRL)embracing the advantages of deep learning can overcome this challenge to achieve a satisfactory solution.In[70],a DRL method was developed to jointly optimize the UAV trajectory and the transmission time slot to shorten the task duration.The authors in [71] developed model-free DRL-based algorithm to optimize a UAV’s trajectory and transmit power to maximize the user average effective covert throughput.The authors in[72]proposed a distributed DRL algorithm to jointly optimize the trajectory and jamming power of the UAV,transmit power of devices,and bandwidth resources to balance the security level and training cost.With the implementation of DRL in space/air covert communication,the negative effects of the uncertainty of the network environment can be eliminated and actual covert performance can be practically achieved.

    Furthermore,with the increasing complexity of the real-world space/air covert optimization problems,the bio-inspired algorithms are also envisioned as a candidate technology to obtain efficient solutions,which contains genetic algorithms,particle swarm optimization,ant colony optimization,and so on.For instance,the authors in[23]employed a particle swarm optimization based algorithm to optimize the transmit power to avoid the transmission detected by wardens and achieve high data rates.Nevertheless,the performance of the obtained solution by biologically inspired algorithms can not be guaranteed generally,which yields much attention to the improvement of the algorithm performance in the future.

    V.OPEN PROBLEMS

    Despite a few studies on covert communications,there are still many critical open problems that require indepth investigation for potential application scenarios shown in Figure 1.In this section,we prospect several future research directions in order to shed light on future opportunities.

    5.1 Energy-Aware Space/Air Covert Communications

    The system performance of space/air covert communication is limited not only by the strict covertness constraints and propagation environment,but also by the energy of the space/air platforms.These increasingly advanced and intelligent platforms may consist of a variety of sensors,which will inevitably lead to more energy consumption.Meanwhile,the trend toward miniaturization of platforms,such as UAVs and satellites,further limits energy consumption.In practice,since obtaining a higher covert rate inevitably requires higher transmit power,it is necessary to strike a balance between covert rate and power consumption.The covert energy efficiency issue was investigated in [63],where yet the kinetics-related energy consumption was not considered.Although[25]took the propulsion power consumption into consideration,the task operation duration was not optimized,which is vital in energy constrained communication system.Therefore,in order to improve the resource utilization rate and operation efficiency of platforms,energyaware space/air covert communications requires further thorough study.

    5.2 mmWave/THz Based Space/Air Covert Communications

    As the wireless communication techniques evolve from conventional microwave bands to millimeter wave (mmWave) and terahertz (THz) bands [73-75],the transmissions become highly directional,which is beneficial to covert communications.Besides,operating over the mmWave/THz bands increases the transmission data rates given much more available bandwidths and enables small-size transceivers due to the shorter wavelengths,which is beneficial to the space/air platforms in case of limited installation dimension.However,the channel model and propagation characteristics of mmWave/THz based space/air communications significantly differ from those of terrestrial RF communications.Thus,existing lowfrquency covert communication designs cannot be straightforwardly applied.Since directional communication is sensitive to movements,it may be difficult to perform real-time channel estimation or beam tracking.The authors in [25] examined the covert transmission performance over line-of-sight dominant THz frequenices while considering both largescale attenuation and absorption losses.However,mmWave/THz based space/air covert communications is still in its infancy,which needs more research efforts,especially considering the unique properties of the mmWave/THz channel and transceivers.

    5.3 NOMA/RSMA Enabled Space/Air Covert Transmission

    Improving spectral efficiency is a necessary measure to meet the ubiquitous connectivity requirements,and thus non-orthgonal multiple access(NOMA)technology is a potential solution.On one hand,NOMA allows multiple(covert and public)users to achieve access in the same spectral resource.On the other hand,transmissions of the public users can provide natural masking for covert user transmissions.Specifically,a public user can act as a friendly jammer with random transmitting power to mask the transmission of the covert user.The authors in[76]formulated a signomial programming problem to maximize the covert SINR by joint optimization of the flight height and transmit power of UAV with NOMA.However,the NOMA covert communication in satellite networks still remains vacant.In addition,rate-splitting multiple access (RSMA) as a bridge between orthgonal multiple access(OMA)and NOMA has received increasing attention in recent years,especially in satellite communications.The authors in [77] first investigated covert communications for RSMA,which,however,focused on terrestrial networks.The space/air covert communications assisted by RSMA is still blank and needs further exploration.

    5.4 Cross Layer Design for Space/Air Covert Communications

    With the increasing requirement for heterogeneous data traffic,cross layer covert transmission in spaceair-ground integrated networks is promising to guarantee the communication effieciency and security.In this case,the resource allocation in the physical and media access control layers and the routing in the network layer deserve joint design,while the two issues are highly coupled and the problem is challenging to solve [1,78].In addition,due to the highly dynamic network topology caused by the mobility of space/air platforms,the routing path is real-time changing and the communication resource is also time-varying.To guarantee the system covertness and enhance the communication performance,performing real-time cross layer design to manage the resources and update the routing paths is appealing and necessary.However,the current research concentrates on point-to-point covert communication and neglects multi-hop multiflow covert transmissions in SAGINs,which deserve dedicated efforts for further investigation.

    5.5 Covert Scheme Against High-Performance Wardens

    The existing works on covert communications mostly consider a single staic warden in the network,while there may be multiple dynamic heterogeneous wardens distributed in different regions of the SAGINs.In particular,the location information of wardens is difficult to obtain,and space/air wardens may move to different positions,which pose great challenges to guarantee considerable covert performance.Besides,different active and passive wardens may cooperate to minimize the overall detection error probability and further generate interference to deteriorate the covert system performance.Therefore,some auxiliary approaches,such as injecting jamming signals,are required to bring more uncertainty and ensure robust covert communication performance in the complex SAGINs.

    VI.CONCLUSION

    Integrating space/air networks with covert communications can yield considerable benefits for the highlevel security of confidential information privacy.In this paper,we provided a tutorial on space/air covert communications.First,we introduced the basics of covert communications,including the covert constraint model and covert performance metrics.Whereafter the typical application scenarios of space/air communication were also demonstrated.Then,several generic approaches for covert communication system design were summarized.Subsequently,we discussed several key enabling technologies for space/air covert communications in detail.Finally,several promising open problems were presented for space/air covert networks so as to inspire further investigation on these topics.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Natural Science Foundation of China (NSFC) under grant numbers U22A2007 and 62171010,and the Beijing Natural Science Foundation under grant number L212003.

    黄色a级毛片大全视频| 国产又色又爽无遮挡免费看| 黄片播放在线免费| 中文字幕另类日韩欧美亚洲嫩草| or卡值多少钱| 亚洲av日韩精品久久久久久密| 国产成年人精品一区二区| 精品乱码久久久久久99久播| 国产精品九九99| 日韩精品免费视频一区二区三区| 日本免费一区二区三区高清不卡 | 久久天躁狠狠躁夜夜2o2o| 国产成人欧美在线观看| 黑人操中国人逼视频| 久久婷婷成人综合色麻豆| 1024香蕉在线观看| 欧美成狂野欧美在线观看| 日韩欧美在线二视频| 欧美性长视频在线观看| 日本五十路高清| 女性生殖器流出的白浆| 亚洲精品久久国产高清桃花| 黄色丝袜av网址大全| 曰老女人黄片| 在线观看一区二区三区| 视频在线观看一区二区三区| 老司机福利观看| 91在线观看av| 成人三级黄色视频| 啪啪无遮挡十八禁网站| svipshipincom国产片| 国产精品国产高清国产av| 搡老岳熟女国产| 欧美激情高清一区二区三区| 国产单亲对白刺激| 亚洲一区中文字幕在线| 丰满的人妻完整版| 久久久久久久久久久久大奶| 大码成人一级视频| 亚洲av成人一区二区三| 神马国产精品三级电影在线观看 | 久久婷婷人人爽人人干人人爱 | 国产亚洲av高清不卡| 在线观看一区二区三区| 国产精品久久视频播放| 国产在线精品亚洲第一网站| 一区二区三区激情视频| 99在线人妻在线中文字幕| 国产精品久久视频播放| 精品一区二区三区四区五区乱码| 看免费av毛片| 搞女人的毛片| 人人妻人人澡欧美一区二区 | 亚洲国产精品合色在线| 欧美av亚洲av综合av国产av| 国内毛片毛片毛片毛片毛片| 中文字幕色久视频| 欧美不卡视频在线免费观看 | 亚洲三区欧美一区| 国产欧美日韩精品亚洲av| tocl精华| 麻豆一二三区av精品| 亚洲专区中文字幕在线| 中文字幕另类日韩欧美亚洲嫩草| 啦啦啦观看免费观看视频高清 | 一区在线观看完整版| 日韩欧美国产在线观看| 国产成人欧美| 国产一区二区在线av高清观看| 两性夫妻黄色片| 精品第一国产精品| 中文亚洲av片在线观看爽| 国产蜜桃级精品一区二区三区| 亚洲av熟女| 国产亚洲欧美精品永久| 久久久久久久精品吃奶| 最新美女视频免费是黄的| 国产视频一区二区在线看| 久久中文看片网| 欧美乱妇无乱码| 人妻丰满熟妇av一区二区三区| 日本黄色视频三级网站网址| 久久久水蜜桃国产精品网| 亚洲精品久久国产高清桃花| 国产激情久久老熟女| 国产区一区二久久| 亚洲第一青青草原| 中文字幕人妻丝袜一区二区| 90打野战视频偷拍视频| 国产一区二区在线av高清观看| 黄色视频,在线免费观看| 满18在线观看网站| 久久中文字幕人妻熟女| 亚洲av日韩精品久久久久久密| 中文字幕av电影在线播放| 久久久久精品国产欧美久久久| 黄色 视频免费看| 久久香蕉国产精品| 他把我摸到了高潮在线观看| 免费在线观看影片大全网站| 老司机靠b影院| 亚洲电影在线观看av| 国语自产精品视频在线第100页| 久久人妻av系列| 黄色毛片三级朝国网站| 看片在线看免费视频| 亚洲欧美日韩高清在线视频| 中出人妻视频一区二区| 热99re8久久精品国产| 青草久久国产| 亚洲黑人精品在线| 叶爱在线成人免费视频播放| 国产黄a三级三级三级人| 日韩三级视频一区二区三区| 久热这里只有精品99| 美女大奶头视频| 欧美+亚洲+日韩+国产| 国产一级毛片七仙女欲春2 | 国产亚洲av嫩草精品影院| 一夜夜www| 久久人妻福利社区极品人妻图片| 一二三四社区在线视频社区8| 美女免费视频网站| 日韩精品青青久久久久久| 老司机靠b影院| 亚洲精品一卡2卡三卡4卡5卡| 热re99久久国产66热| 成人18禁高潮啪啪吃奶动态图| 欧美黄色淫秽网站| x7x7x7水蜜桃| 免费在线观看亚洲国产| 国产精品亚洲av一区麻豆| 99久久综合精品五月天人人| 自拍欧美九色日韩亚洲蝌蚪91| 国产成人一区二区三区免费视频网站| 18美女黄网站色大片免费观看| 国产精品自产拍在线观看55亚洲| 免费在线观看完整版高清| 一级a爱片免费观看的视频| 精品久久久久久,| 亚洲国产毛片av蜜桃av| 免费少妇av软件| 国产野战对白在线观看| 嫩草影视91久久| 国产三级在线视频| 亚洲少妇的诱惑av| 欧美一区二区精品小视频在线| 国产亚洲精品久久久久久毛片| 欧美乱色亚洲激情| 老司机靠b影院| 国产又色又爽无遮挡免费看| 88av欧美| 一个人免费在线观看的高清视频| 99在线人妻在线中文字幕| 亚洲av第一区精品v没综合| 桃红色精品国产亚洲av| 成人国语在线视频| 国产成人av教育| 99国产极品粉嫩在线观看| 欧美激情 高清一区二区三区| 国产成人精品在线电影| 18禁裸乳无遮挡免费网站照片 | 91成年电影在线观看| 亚洲国产欧美一区二区综合| 欧美黄色淫秽网站| 一级毛片高清免费大全| 夜夜看夜夜爽夜夜摸| 男人舔女人下体高潮全视频| av在线天堂中文字幕| 久久午夜亚洲精品久久| 亚洲人成电影观看| www国产在线视频色| 亚洲第一欧美日韩一区二区三区| 制服人妻中文乱码| 亚洲精品中文字幕在线视频| 成在线人永久免费视频| 高清在线国产一区| 日韩成人在线观看一区二区三区| 1024视频免费在线观看| 精品一区二区三区av网在线观看| 99国产极品粉嫩在线观看| av超薄肉色丝袜交足视频| 精品国产乱子伦一区二区三区| 一区二区三区高清视频在线| 啪啪无遮挡十八禁网站| 韩国av一区二区三区四区| 国产主播在线观看一区二区| 精品国产一区二区久久| 成年版毛片免费区| 日韩视频一区二区在线观看| 最新美女视频免费是黄的| 人人妻,人人澡人人爽秒播| 一个人观看的视频www高清免费观看 | 无人区码免费观看不卡| 亚洲欧美精品综合一区二区三区| 亚洲男人天堂网一区| 十分钟在线观看高清视频www| 曰老女人黄片| 欧美日韩中文字幕国产精品一区二区三区 | 日日夜夜操网爽| 丁香欧美五月| 国产极品粉嫩免费观看在线| 国产精品国产高清国产av| www.999成人在线观看| 国产区一区二久久| 午夜精品国产一区二区电影| 黄频高清免费视频| 免费一级毛片在线播放高清视频 | 两个人免费观看高清视频| 色精品久久人妻99蜜桃| 欧美乱码精品一区二区三区| 人人妻人人爽人人添夜夜欢视频| 午夜福利在线观看吧| 多毛熟女@视频| 成人永久免费在线观看视频| 精品久久久久久久久久免费视频| www日本在线高清视频| 日韩中文字幕欧美一区二区| 999久久久国产精品视频| 日本五十路高清| 国产高清激情床上av| 国产一区二区在线av高清观看| 国产精品免费一区二区三区在线| 亚洲国产精品999在线| 亚洲国产毛片av蜜桃av| 巨乳人妻的诱惑在线观看| 久久天堂一区二区三区四区| 极品教师在线免费播放| 一本久久中文字幕| 久久草成人影院| 丝袜在线中文字幕| 国产日韩一区二区三区精品不卡| 精品国产乱子伦一区二区三区| 中文字幕高清在线视频| 国产精品亚洲美女久久久| 欧美日韩精品网址| 色哟哟哟哟哟哟| 神马国产精品三级电影在线观看 | 久久精品国产亚洲av高清一级| 免费看a级黄色片| 国产又色又爽无遮挡免费看| 99热只有精品国产| 国产精品自产拍在线观看55亚洲| 少妇裸体淫交视频免费看高清 | 久久久国产精品麻豆| 琪琪午夜伦伦电影理论片6080| 亚洲精品国产精品久久久不卡| 亚洲中文av在线| 免费看美女性在线毛片视频| 久久精品91无色码中文字幕| 在线观看免费午夜福利视频| www国产在线视频色| 九色国产91popny在线| 久久久久久久久中文| 一级a爱视频在线免费观看| 不卡一级毛片| 操美女的视频在线观看| 色综合欧美亚洲国产小说| 成人欧美大片| 日韩精品中文字幕看吧| 男人舔女人的私密视频| 此物有八面人人有两片| 久久亚洲精品不卡| av有码第一页| 国产亚洲精品久久久久5区| 午夜福利视频1000在线观看 | 日日爽夜夜爽网站| 窝窝影院91人妻| 国产精品98久久久久久宅男小说| 国产成人欧美| 无遮挡黄片免费观看| 久久久久久久午夜电影| 男人的好看免费观看在线视频 | 欧美日本亚洲视频在线播放| videosex国产| 精品欧美国产一区二区三| 窝窝影院91人妻| 久久人人精品亚洲av| 亚洲九九香蕉| 麻豆av在线久日| 欧美成人免费av一区二区三区| 999久久久精品免费观看国产| 多毛熟女@视频| 9191精品国产免费久久| 夜夜看夜夜爽夜夜摸| 91精品三级在线观看| 电影成人av| 啦啦啦观看免费观看视频高清 | 大香蕉久久成人网| www.熟女人妻精品国产| 亚洲va日本ⅴa欧美va伊人久久| 麻豆久久精品国产亚洲av| 亚洲精品美女久久久久99蜜臀| 欧美乱妇无乱码| 色综合婷婷激情| 村上凉子中文字幕在线| 男女之事视频高清在线观看| 在线播放国产精品三级| 999精品在线视频| 国产一区二区三区综合在线观看| 久99久视频精品免费| 欧美日韩瑟瑟在线播放| 黄片小视频在线播放| 欧美黄色片欧美黄色片| 无人区码免费观看不卡| 欧美激情久久久久久爽电影 | 精品日产1卡2卡| 欧美成人午夜精品| 99热只有精品国产| 精品一区二区三区四区五区乱码| 国语自产精品视频在线第100页| 亚洲久久久国产精品| 欧美人与性动交α欧美精品济南到| 亚洲一区中文字幕在线| 满18在线观看网站| 亚洲自偷自拍图片 自拍| 亚洲狠狠婷婷综合久久图片| 精品卡一卡二卡四卡免费| 深夜精品福利| 国产精品永久免费网站| 欧美在线黄色| 精品日产1卡2卡| 亚洲国产精品sss在线观看| 欧美色欧美亚洲另类二区 | 国产欧美日韩综合在线一区二区| 国产熟女xx| 在线永久观看黄色视频| 99精品久久久久人妻精品| 国产精品乱码一区二三区的特点 | 美女国产高潮福利片在线看| 黄频高清免费视频| 欧美精品啪啪一区二区三区| 国产成人精品久久二区二区91| 国产1区2区3区精品| 国产男靠女视频免费网站| 电影成人av| 欧美日本视频| 日韩三级视频一区二区三区| 日日爽夜夜爽网站| 99在线人妻在线中文字幕| 亚洲欧洲精品一区二区精品久久久| 日韩精品青青久久久久久| 国产精品久久视频播放| 黄色毛片三级朝国网站| 最好的美女福利视频网| 国产精品 国内视频| 国产一区二区三区综合在线观看| 国产精品,欧美在线| 中文字幕人妻熟女乱码| 一本综合久久免费| 91麻豆精品激情在线观看国产| 精品欧美国产一区二区三| 纯流量卡能插随身wifi吗| 国产精品爽爽va在线观看网站 | 久久人人精品亚洲av| 精品乱码久久久久久99久播| 国产国语露脸激情在线看| 好看av亚洲va欧美ⅴa在| 日韩 欧美 亚洲 中文字幕| av福利片在线| 12—13女人毛片做爰片一| tocl精华| 999久久久国产精品视频| 亚洲成av人片免费观看| 中文字幕精品免费在线观看视频| av视频免费观看在线观看| 老熟妇仑乱视频hdxx| 亚洲欧美一区二区三区黑人| 制服人妻中文乱码| 人人妻,人人澡人人爽秒播| 中国美女看黄片| 亚洲av片天天在线观看| 91麻豆精品激情在线观看国产| 久久久精品国产亚洲av高清涩受| 久久精品亚洲熟妇少妇任你| 国产精品二区激情视频| 精品欧美一区二区三区在线| 亚洲精品国产区一区二| 亚洲欧美一区二区三区黑人| 一级毛片女人18水好多| 日韩 欧美 亚洲 中文字幕| bbb黄色大片| 久久香蕉精品热| 黄频高清免费视频| 一级毛片精品| 日韩欧美一区二区三区在线观看| 精品国产一区二区三区四区第35| 亚洲人成电影观看| 免费在线观看视频国产中文字幕亚洲| 精品乱码久久久久久99久播| 欧美一级毛片孕妇| 亚洲 国产 在线| 精品欧美国产一区二区三| 老司机靠b影院| 亚洲人成电影免费在线| 人人妻,人人澡人人爽秒播| 桃色一区二区三区在线观看| 中文字幕人成人乱码亚洲影| 天堂影院成人在线观看| 国产一区二区三区综合在线观看| 国产精品电影一区二区三区| 国产精品自产拍在线观看55亚洲| 成人永久免费在线观看视频| 免费搜索国产男女视频| 亚洲 欧美 日韩 在线 免费| bbb黄色大片| 亚洲精品一区av在线观看| www国产在线视频色| 男人舔女人下体高潮全视频| 最近最新中文字幕大全电影3 | 亚洲国产精品999在线| 亚洲av电影不卡..在线观看| 国产精品久久久久久精品电影 | 亚洲成人免费电影在线观看| 欧美人与性动交α欧美精品济南到| 欧美亚洲日本最大视频资源| 操出白浆在线播放| 久久久国产欧美日韩av| 老司机福利观看| av视频免费观看在线观看| 丰满人妻熟妇乱又伦精品不卡| 久久精品国产亚洲av香蕉五月| 精品久久久久久成人av| 亚洲成人国产一区在线观看| 精品久久久久久久久久免费视频| 国产欧美日韩精品亚洲av| 国产精品一区二区在线不卡| 99热只有精品国产| 国产1区2区3区精品| 久久久久久久午夜电影| 免费在线观看视频国产中文字幕亚洲| 大型av网站在线播放| 少妇 在线观看| 制服诱惑二区| 国产精品综合久久久久久久免费 | 日本黄色视频三级网站网址| 18禁黄网站禁片午夜丰满| 最好的美女福利视频网| www.精华液| 日韩欧美三级三区| 一级毛片高清免费大全| 侵犯人妻中文字幕一二三四区| 久久精品91无色码中文字幕| 亚洲国产欧美日韩在线播放| x7x7x7水蜜桃| 精品一品国产午夜福利视频| 最近最新中文字幕大全电影3 | 成在线人永久免费视频| 亚洲色图av天堂| 丝袜人妻中文字幕| 免费在线观看影片大全网站| 最新在线观看一区二区三区| 日本 av在线| 黄色a级毛片大全视频| 91成年电影在线观看| 亚洲va日本ⅴa欧美va伊人久久| 欧美在线一区亚洲| 久久久久久免费高清国产稀缺| 真人一进一出gif抽搐免费| 亚洲 国产 在线| 亚洲第一欧美日韩一区二区三区| 男人舔女人下体高潮全视频| 淫妇啪啪啪对白视频| or卡值多少钱| 97人妻天天添夜夜摸| 日韩大码丰满熟妇| 韩国精品一区二区三区| 亚洲男人的天堂狠狠| 久久精品国产清高在天天线| 亚洲中文日韩欧美视频| 亚洲专区中文字幕在线| 精品久久蜜臀av无| 99精品久久久久人妻精品| 咕卡用的链子| 欧美黑人欧美精品刺激| 国产av一区在线观看免费| 国产不卡一卡二| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品在线观看二区| 人人妻人人澡人人看| 精品不卡国产一区二区三区| 夜夜爽天天搞| 手机成人av网站| 搡老岳熟女国产| 老司机午夜福利在线观看视频| 国产高清视频在线播放一区| 男人操女人黄网站| 亚洲专区国产一区二区| videosex国产| 欧美日韩亚洲综合一区二区三区_| 欧美另类亚洲清纯唯美| 久久人人精品亚洲av| 国产亚洲欧美98| 自线自在国产av| 一区二区三区精品91| 精品国产亚洲在线| 亚洲精品久久国产高清桃花| 黄色成人免费大全| 老鸭窝网址在线观看| 日韩精品中文字幕看吧| 国产高清有码在线观看视频 | 午夜影院日韩av| 极品人妻少妇av视频| 一进一出抽搐gif免费好疼| 在线观看免费午夜福利视频| 韩国精品一区二区三区| 三级毛片av免费| 嫩草影视91久久| 国内精品久久久久久久电影| 精品人妻1区二区| 99在线视频只有这里精品首页| 亚洲一区高清亚洲精品| 午夜影院日韩av| 婷婷丁香在线五月| 日韩成人在线观看一区二区三区| 非洲黑人性xxxx精品又粗又长| 亚洲精品国产区一区二| 国产精华一区二区三区| 精品国产亚洲在线| 成人手机av| 中文亚洲av片在线观看爽| 亚洲五月婷婷丁香| 亚洲精品在线美女| 香蕉国产在线看| 国产成人欧美| 后天国语完整版免费观看| 成人av一区二区三区在线看| 人人妻人人澡人人看| 午夜视频精品福利| 欧美日韩一级在线毛片| 黄片小视频在线播放| 日韩大尺度精品在线看网址 | 欧美丝袜亚洲另类 | 久久草成人影院| 最好的美女福利视频网| 欧美黄色淫秽网站| 丁香欧美五月| 午夜久久久在线观看| 丁香欧美五月| 国产成人啪精品午夜网站| 欧美午夜高清在线| 亚洲在线自拍视频| 老汉色av国产亚洲站长工具| 脱女人内裤的视频| 免费高清在线观看日韩| 精品久久久精品久久久| 中文字幕另类日韩欧美亚洲嫩草| 啦啦啦观看免费观看视频高清 | 黄片播放在线免费| 国产91精品成人一区二区三区| e午夜精品久久久久久久| 精品人妻1区二区| 国产精品亚洲av一区麻豆| 久久国产乱子伦精品免费另类| av片东京热男人的天堂| 午夜免费成人在线视频| 少妇的丰满在线观看| 欧美av亚洲av综合av国产av| 狂野欧美激情性xxxx| 中文字幕人成人乱码亚洲影| 成人18禁在线播放| 岛国视频午夜一区免费看| 我的亚洲天堂| 国产精品日韩av在线免费观看 | 美女高潮到喷水免费观看| 中文字幕av电影在线播放| 国产精品日韩av在线免费观看 | 亚洲狠狠婷婷综合久久图片| 免费在线观看视频国产中文字幕亚洲| 午夜亚洲福利在线播放| 欧美日韩精品网址| 欧美乱妇无乱码| 神马国产精品三级电影在线观看 | 天堂动漫精品| 麻豆一二三区av精品| 免费女性裸体啪啪无遮挡网站| 又黄又粗又硬又大视频| 国产成人精品无人区| 国产精品一区二区精品视频观看| 18美女黄网站色大片免费观看| 久热爱精品视频在线9| 如日韩欧美国产精品一区二区三区| 国产午夜福利久久久久久| bbb黄色大片| 久久国产精品男人的天堂亚洲| 亚洲第一欧美日韩一区二区三区| 亚洲国产看品久久| 国产成人啪精品午夜网站| 免费在线观看完整版高清| 91老司机精品| 91成年电影在线观看| 色婷婷久久久亚洲欧美| 亚洲人成电影观看| 精品电影一区二区在线| 女人被狂操c到高潮| 日韩欧美一区二区三区在线观看| 久久热在线av| 99国产精品免费福利视频| 成人欧美大片| 免费女性裸体啪啪无遮挡网站| 日韩精品中文字幕看吧| 十八禁人妻一区二区| 午夜福利高清视频| 欧美丝袜亚洲另类 | 午夜福利欧美成人| 级片在线观看| av有码第一页| 美国免费a级毛片| 满18在线观看网站| 亚洲专区国产一区二区| 国产亚洲av嫩草精品影院| 999久久久国产精品视频| 狂野欧美激情性xxxx| 国产91精品成人一区二区三区| 人妻丰满熟妇av一区二区三区|