• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantization and Event-Triggered Policy Design for Encrypted Networked Control

    2024-04-15 09:37:06YongxiaShiandEhsanNekouei
    IEEE/CAA Journal of Automatica Sinica 2024年4期

    Yongxia Shi and Ehsan Nekouei

    Abstract—This paper proposes a novel event-driven encrypted control framework for linear networked control systems (NCSs),which relies on two modified uniform quantization policies, the Paillier cryptosystem, and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem, both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods, where only the quantization of a single value, e.g., the control input or the system state, is considered.To handle this issue, static and dynamic quantization policies are presented, which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then, the quantized system state is encrypted and sent to the controller when the triggering condition, specified by a state-based event-triggered strategy, is satisfied.By doing so, not only the security and confidentiality of data transmitted over the communication network are protected, but also the ciphertext expansion phenomenon can be relieved.Additionally, by tactfully designing the quantization sensitivities and triggering error, the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally, a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.

    I.INTRODUCTION

    A. Motivation

    NETWORKED control systems (NCSs) are ever-present in our societies by enabling critical systems and services such as intelligent transportation and smart grid systems.NCSs heavily rely on information and communication technologies for their operations [1].However, the widespread usage of communication networks and untrusted computing entities, e.g., cloud-based controllers, makes NCSs more vulnerable to cyber-attacks [2].For example, an adversary with access to sensor measurements of an NCS can easily extract sensitive information about the system.Therefore, it is crucial to address the security vulnerabilities of NCSs.

    The homomorphic encryption (HE) technique [3] provides a promising solution for the security of NCSs as it permits computations using encrypted sensor measurements without access to the actual measurements.Using HE, the sensor measurements of an NCS can be shared with untrusted computing entities over communication networks.In this case, even if the transmitted data, including sensor signals and control input,are eavesdropped by a malicious adversary, their actual values still remain unknown to the adversary.

    However, the common HE cryptosystems, such as ElGammal, Rivest-Shamir-Adleman (RSA), and Paillier, can only encrypt positive integers.Thus, any data required for computing the control law in an NCS must be quantized before encryption.However, quantization results in strong nonlinearity in the system, yielding system performance degradation and even instability.Moreover, HE methods suffer from ciphertext expansion, which undoubtedly increases the size of data transmitted over communication networks.Cyphertext expansion is a great challenge for NCSs due to their inherent resource limitations in terms of computation, communication,and storage [4].For instance, the high data rate requirement of HE cryptosystems might result in heavy channel congestion,thereby resulting in delays and packet dropouts.

    B. Contributions

    In this paper, we develop quantization and event-triggered policies to address the quantization and ciphertext expansion challenges of HE-based encrypted NCSs.The main contributions are three-fold:

    1) A novel dynamic quantization policy with a state-dependent sensitivity is presented.Different from traditional uniform quantizers with fixed sensitivity, which only ensure that the system state converges to a neighborhood of the equilibrium, the proposed quantization policy ensures asymptotic convergence of the system state.Besides, unlike uniform quantizers with time-varying sensitivity, the proposed dynamic quantization policy does not require an extra time sequence to update the sensitivity, which circumvents potential conflicts between sensitivity updating and triggering communication.

    2) By defining a quantization-related measurement error, the adverse effect of quantization errors is implicitly considered in the event-triggered strategy, which contributes to a rigorous analysis of the inter-event time interval.Moreover, an adjustable factor is introduced into the triggering condition,ensuring the validation and availability of the event-triggered strategy.

    3) An event-driven encrypted control framework is proposed using the Paillier cryptosystem, modified static and dynamic quantization policies, and the quantization-related event-triggered strategy.The strong nonlinearities caused by quantization and event triggering, including two coupled errors, are tactfully compensated by selecting proper parameters.It is shown that under the proposed event-triggered encrypted controller, the closed-loop system is secure and asymptotically stable.

    C. Related Work

    HE-based encrypted control of NCSs has been studied in[5]–[10].A pioneering encrypted control scheme was proposed in [5] to enhance the security of NCSs, based on multiplicative HE of RSA and EIGamal.Different problems related to HE-based encrypted control of NCSs have been studied in the literature, e.g., quantizer design and stability analysis [6],[7], observer-based encryption[8], and overflow/underflow of encrypted data [10].In particular, the quantizer design problem was first addressed in [6] and then was extended in [7], in which a stability-guaranteed dynamic ElGamal cryptosystem was developed.Furthermore, using the additively HE method,an encrypted distributed state observer was presented in [8], to enhance the privacy of the measurement data and estimated state.Kimet al.[9] provided a practice implementation over homomorphically encrypted data in an infinite time horizon using a dynamic feedback controller.To eliminate the overflow/underflow issue due to encryption, a secure and private control approach was proposed in [10], wherein the controller is reset periodically.

    The event-triggered control (ETC) method has been widely used to address the security of capacity-limited NCSs, such as faulty accommodation [11], anti-DoS attacks, deception attacks, sparse attacks [12]–[14], and privacy-preserving control [15].Moreover, the ETC scheme with quantized measurements has been extensively studied, especially using a uniform quantizer [16]–[19].For instance, by combining uniform quantization and the ETC strategy, the leader-following consensus problems for linear and Lipschitz nonlinear multiagent systems were addressed in [17].Taking external disturbances into account, two high-gain control laws with quantized relative states were designed in [18] to ensure the bounded consensus using event-triggered quantized communication protocols.Xuet al.[19] studied a unified distributed control method for linear networked systems with various quantizers, where the uniform quantization effect was analyzed in detail.However, due to the fixed quantization sensitivity in [16]–[19], only uniformly ultimately bounded stability of the system was ensured even without the external disturbance.

    What’s more, although a few researchers have studied event-based secure control issue of NCSs (like [11]–[15]), it is still rare to use encrypted networked control with the HE and ETC method, as it is in its infancy stage.Kishida [20] proposed a Paillier-type encrypted control scheme for the NCS using a uniform quantizer with a time-varying quantization sensitivity.Then, the proposed encrypted control law was extended to an event-triggered communication case.Later, the same event-triggered encrypted control problem was addressed in [21] using the ElGamal cryptosystem.Nevertheless,it should be pointed out that several deficiencies still exist in the existing event-based secure control schemes of NCSs, e.g.,potential conflicts between the quantizer and event-trigger updating and the nonzero phenomenon of the measurement error at the triggering time instant.

    Inspired by the aforementioned discussions, we develop a novel event-driven encrypted control framework for NCSs,including two modified uniform quantization policies, the Paillier cryptosystem, and an event-triggered strategy.Remarkably, to construct the HE-based encrypted control law,we need to quantize the system state and the control gain simultaneously.If two uniform quantizers (e.g., [16]–[19]) are directly used to quantize them, the control performance of closed-loop system will be severely deteriorated due to strong nonlinearities stemming from coupled quantization errors.In particular, such an adverse impact on the system performance would be further aggravated in the triggering communication scenario.Therefore, these research results in [16]–[19] can not be directly applicable to the HE-based encrypted control framework.To address this challenge, we propose static and dynamic quantization policies for the control gain and system states, respectively.By carefully selecting the quantization sensitivities, the proposed quantization policies not only achieve the desired integer conversions, but also guarantee the asymptotic convergence of the quantized system state to the equilibrium.On the other hand, in contrast to the time-varying quantization policy in [20], our dynamic quantization policy does not require additional time instances to update the quantizer’s sensitivity.This is particularly important for practical implementations as it avoids potential conflicts between triggering communications and sensitivity updating.Additionally, we use the quantized system state to define the measurement error in the event-triggered strategy, which ensures the measurement error can be set to zero when specific events occur.Different from the event-triggered policy in [20], [21],the adverse effects caused by quantization errors are implicitly considered in the triggering condition, and a more rigorous analysis of the inter-event time interval is provided in our work.

    D. Organization

    The rest of this paper is organized as follows.Section II provides the preliminary technical background and formulates the encrypted control problem.Section III discusses the event-driven encrypted control algorithm, including the design of quantization and event-trigger policies.The simulation results are provided in Section IV.Finally, concluding remarks are given in Section V.

    E. Notations

    Let R, Z, and Z+be sets of the real numbers, integers, and non-negative integers, respectively.Denote Rnand Rn×mas sets of then-dimension column vector andn×mreal matrix.Let Z+n:={z∈Z:0 ≤z

    II.PRELIMINARIES AND PROBLEM FORMULATION

    In this section, we first revisit the Paillier cryptosystem and the uniform quantizer.Then, the encrypted networked control problem is formulated.

    A. Paillier Cryptosystem

    The Paillier encryption includes three steps, i.e., key generation (Gen), encryption (Enc), and decryption (Dec).The detailed operations are as follows [20]:

    1)Gen

    a) Choose two large prime numberspandqrandomly such that gcd(pq,(p-1)(q-1)) = 1, where gcd(a,b) stands for the greatest common divisor of any positive integersaandb;

    b) Generate the public key (N,g), whereN=pqandg∈is a random integer;

    c) Generate the private key (λ,μ), whereλ=lcm(p-1,q-1), μ=λ-1modN, lcm(a,b) is the least common multiple of any positive integersaandb, and mod is the modulo operation.

    2)Enc

    a) Select randomr∈Z?N:={x∈Z+N|gcd(x,N)=1};

    b) Given a plaintext messagem∈Z+N, construct its ciphertext asc=Enc(m)=gm·rNmodN2.

    3) Dec

    B. Uniform Quantizer

    Since the data related to the practical NCSs, such as the sensor measurements and control gain, are usually real numbers,they must be quantized before encryption.For any real numberx∈R , a uniform quantizerqu(x):R →Z is defined as [22]

    Similarly, the quantization error of vectorv(i.e.,v?=v-?qu(v) ) and the quantization error of matrixS(i.e.,S? =S-?qu(S)) can be upper bounded as

    C. Problem Formulation

    Consider the linear networked control system

    wheret∈Z+is the time index,x(t)∈Rnis the system state,u(t)∈Rmdenotes the control input,A∈Rn×nandB∈Rn×mare the constant matrices.If the matrix pair (A,B) is controllable,the system (6) can be stabilized by implementing the statefeedback control law

    whereK∈Rm×nis the control gain matrix.As illustrated in Fig.1, the control input signal (7) is computed by a networked controller according to the state measurements.A malicious adversary can directly obtain sensitive state measurements by eavesdropping the communication channels.Moreover, the controller may be implemented using an untrusted computing entity, e.g., a cloud-based controller.Since valuable information can be inferred from the state measurements or the control input signal, the security and privacy of the system may be compromised.Hence, this paper focuses on the secure control problem of NCSs, stated as Problem 1.

    Fig.1.The NCSs subject to possible eavesdropping attacks.

    Problem 1: Develop an encrypted control framework for the linear networked system (6), including a static quantization policy for the control gainKand a state-based dynamic quantization policy for the system statex(t), and an event-triggered policy to achieve the following objectives:

    1) Ensuring the asymptotic stability of the closed-loop system;

    2) Preserving the security of the data shared through the communication network;

    3) Reducing data transmissions over the communication network between the plant and the controller.

    Lemma 2[23]: Consider the linear networked system (6)with the state-feedback control law (7).If the matrix pair(A,B)is controllable, for any given symmetric and positivedefinite matrixQ∈Rn×n, there existsP=PT∈Rn×n>0 satisfying

    Assumption 1: For the networked control system (6) with state-feedback control law (7), (A,B) is controllable.

    Remark 1: Given that the Paillier cryptosystem only operates positive integers, all data used for computing the networked control law necessitate integer conversions.Hence,the purpose of employing uniform quantizers in this paper is to map the real-valued system state and control gain into proper integer values.Although the uniform quantizer itself distorts the original signal, protecting data only through quantization seems impracticable as the variation trend of the original signal remains unchanged after quantization.Thus, the security enhancement of the NCS still relies on the usage of the Paillier cryptosystem.

    III.MAIN RESULTS

    In this section, a novel encrypted networked control framework is proposed, as shown in Fig.2.First, we design the static and dynamic quantization policies to quantize the control gainKand the system statex(t), respectively.Remarkably, the main purpose of the quantization is to convert the real-valued control gain and system state into integers since only integers can be encrypted in the Paillier cryptosystem.Then, a state-based event-triggered strategy is developed for scheduling the transmission of the quantized system state before encryption.Based on this, an encrypted networked controller is constructed.Finally, the inter-event time interval under the proposed event-triggered policy is analyzed.The detailed design and analysis procedures are introduced below.

    Fig.2.The proposed encrypted networked control scheme, where (E (u+) is the encrypted control law computed by the networked controller, u + is the decrypted result of E (u+) , and u (t) is actual control command executed on the actuator.

    A. Quantization Policy Design

    1)Quantization for the Control Gain Matrix

    Based on the description in Section II,Kis the control gain matrix in (7) and satisfies (8).Letqu(K) be a uniform quantizer ofKwith the sensitivity ?K>0.Then, the static quantization policy for the uniform quantizerqu(K) is designed such that ?Ksatisfies

    wherePandQare positive-define matrices in (8).

    which directly implies

    In summary, as long as ?Kis determined by (9), it is straightforward to infer from (13) that the linear networked system (6) is asymptotic stable.

    Additionally, based on Theorem 1, there exists symmetric positive-define matricesPˉ andQˉ such that

    which is a discrete Lyapunov equation and will be used in the design of the quantization policy for the system state.

    2)Quantization for the System State

    Letqu(x) denote a uniform quantizer of the system statexwith the sensitivity ?x>0.Then, the state-dependent dynamic quantization policy is designed such that

    with

    Fig.3.Comparison of quantization errors.

    B. Event-Triggered Strategy

    where inf(·) is the infimum operation, the initial triggering instant ist1=0, andF(t) is the triggering function given by

    with an adjustable factor

    where ε>0 is a position constant.Note that the proposed event-triggered strategy (22) is Zeno-free, thus it is executable.The detailed analysis of the inter-event time interval of (22) is provided in the later part of this section.

    C. Encrypted Control Law

    The detailed implementation of the proposed encrypted control scheme is summarized in Algorithm 1, where Dp(·) is the Paillier-based decryption operation.

    Algorithm 1 The Implementation of the Proposed Encrypted Control Scheme With Static and Dynamic Quantizers and the Event-Triggered Policy p,q,g,rk,K,Q, ˉQ, ˉQx Initialize: choose Ensure:1: /*Parameter computation*/2: Compute P according to (8)3: /*Static quantization*/?K u(t)4: Select so that (9) holds qu(K) ˉK 5: Compute andˉP 6: Compute according to (14)7: /*Dynamic quantization*/8: Compute σ and select such that (15) holds qu(x)?x 9: ObtainˉPx 10: Compute according to (21)11: /*Event trigger*/12: Compute β based on (24)t=tk+i,i=1,...13: for do F(t)14: Calculate using (23)F(t)≥0 15: if then 16: Determine by (22)tk=tk+1 tk+1 17:18:e(t)=0 19: Update 20: end if 21: end for 22: /*Encryption*/qu(K) rk qu(x(tk))23: Encrypt using a random positive integer qu(x(tk))24: Encrypt using Paillier encryption Erk(qu(K)) EP(qu(x(tk)))25: Transmit and to the controller node 26: /*Controller*/E(u+)27: Compute the encrypted controller as per (25)E(u+)28: Transmit to the plant node 30: Compute 29: /*Decryption*/u+ = -Dp(Drk(E(u+)))= -Drk(Erk(qu(K))qu(x(tk))) =-qu(K)qu(x(tk))31: /*Scaling*/u(t)=-ˉKˉx(tk)32: Obtain and implement

    Theorem 3: Consider the linear networked system (6) and suppose that there is no saturation occurrence in the uniform quantizer.Implementing the encrypted control law (25) with the event-triggered strategy (22) following Algorithm 1, the control objectives stated in Problem 1 are achieved.

    Proof: Benefiting from the homomorphic property of Paillier encryption, we haveu(t)=?K?xu+.Thus, the actual control commandu(t) executed on the actuator is represented by

    Therefore, the linear networked system (6) now becomes

    Therefore, the closed-loop control system under the proposed encrypted control scheme is asymptotically stable.Moreover, under the event-triggered policy, the system state is encrypted and transmitted only when the specific triggering condition is fulfilled, which contributes to communication load reduction.Furthermore, the data security during network transmissions is clarified by Remark 2.■

    Remark 2: According to Fig.2 and Algorithm 1, all data transmitted over the communication network, i.e., the system state, control gain, and control input signal, have been encrypted before transmission.Since the private key is exclusively known by the plant, no sensitive information, particularly the system state and controller signal, can be leaked even in the presence of network eavesdroppers and malicious adversities, which ensures the security and confidentiality of data shared through the communication channel.

    Remark 3: Considering the design process of the encrypted networked control scheme, we present the static, dynamic quantization policies, the event-triggered strategy, and the encrypted control law successively.Combining the proof of each theorem, it is easily observed that Theorem 2 is obtained based on the premise of a discrete Lyapunov equation (14)generated from Theorem 1.Similarly, the discrete Lyapunov equation (21) generated by Theorem 2 is used to construct the event-triggered strategy (22), which drives the encrypted control law (25).Hence, Theorem 1 is a prerequisite for Theorem 2,and Theorem 2 is a prerequisite for Theorem 3.

    D. Inter-Event Time Interval Analysis

    IV.SIMULATION EXAMPLE

    In this section, the encrypted control of an inverted pendulum cart system shown in Fig.4 is considered as an example to validate the efficiency of the proposed event-driven encrypted control framework.The motion equation of the inverted pendulum cart system is described by [25]

    Fig.4.The schematic of an inverted pendulum cart system.

    A. Effectiveness Verification

    Figs.5 and 6 show the state trajectories and the actual control commands for the encrypted control law (25) (denoted as“w/ encryption”) and unencrypted control law (7) (denoted as“w/o encryption”), respectively.These two figures confirm that the asymptotic stability and control performance of the encrypted control system are similar to those of the unencrypted control system.The triggering release instants and the inter-event triggering intervals under the proposed event-triggered strategy (22) are plotted in Fig.7, where the triggering number, minimum, and maximum triggering intervals, are 165, 2 and 15, respectively.

    Fig.5.State trajectories under the encrypted and unencrypted control systems.

    Fig.6.Control command under the encrypted and unencrypted control systems.

    Fig.7.The triggering instant and inter-event interval.

    Fig.8.Comparison of the energy consumption between the encrypted and unencrypted control systems.

    Fig.9.Comparison of the communication size between the encrypted and unencrypted control systems.

    Fig.8 depicts the energy consumption of the encrypted and unencrypted control systems.In Fig.9, we show the communication size for the unencrypted control system (denoted as“w/o encryption”), the proposed event-driven encrypted control system (denoted as “w/ encryption”), and the encrypted control system without an event-triggered policy (denoted as“w/ encryption w/o trigger”).The unencrypted control system only requires 4-byte to communicate each variable or parameter, while the Paillier encryption scheme requires 8-byte to communicate each variable.In this case, the sizes of data transmitted over the communication network under the proposed encrypted control law (25) and unencrypted control law(7) are 6616 bytes and 20 016 bytes, respectively.Without consideration of the event-triggered policy (“w/ encryption w/o trigger”), the system requires 40 016 bytes to transmit the encrypted data.Therefore, the total size of data transmitted over the communication network is significantly reduced under the proposed event-triggered encrypted control scheme.Moreover, combining Fig.8 with Fig.9, the proposed encrypted control scheme increases the energy consumption by nearly 3.34%, while reducing the communication size by 66.95%compared with those under the unencrypted control law, which indicates it is still resource-efficient.

    The encrypted system states and control law are depicted in Figs.10 and 11, respectively.As can be seen, there is no correlation exists between the original/actual data (Figs.5 and 6)and the encrypted data (Figs.10 and 11).Therefore, the sensitive state measurements and the control input signal transmitted over the communication network are well protected.

    Fig.10.The encrypted system states of the system.

    Fig.11.The encrypted control law of the system.

    B. Comparison With the Existing Method

    It is worth noting that [20] addressed the same event-triggered encrypted control problem of NCSs as our work.Specifically, the Paillier cryptosystem, uniform quantizer, and eventtriggered control method were utilized to construct the encrypted controller.Hence, the encrypted control scheme in[20] is simulated as a comparative example, named “The compared method”.To ensure a fair comparison, the system parameters and control-related matrices remain unchanged with subsection A.However, in order to maintain the scaling factor ? ∈(0,1) as specified in [20], the saturation value of the uniform quantizer for the system state is increased to 50 000.Due to space limitations, we have omitted the encrypted system states and control law.

    Fig.12 shows the state trajectories under these two encrypted control schemes.It is evident from Fig.12 that both schemes ensure the asymptotic stability of the system.However, the proposed method in this paper exhibits a better transient control performance, contributing to smoother control command and less energy consumption, as depicted in Fig.13.In Fig.14, the updating time instant and interval of the timevarying quantizer in [20] are plotted, with a total of 89 updates.It is important to note that the event-triggered condition in [20] heavily relies on a parameter Θ used in the timevarying quantizer, and the triggering error can not be reset to zero at every triggering instant.In our simulation setting, we have Θ ≈400.In this case, the event-triggered condition in[20] can be always satisfied.As a result, although the updating number of the time-varying quantizer is reduced, it results in a large number of triggering instances, which implies that the size of data transmitted over the communication work in[20] amounts to 40 016 bytes.Overall, in contrast to the encrypted control scheme in [20], the encrypted control scheme proposed in this paper reduces the energy consumption by 7 8.39% and reduces communication size by 8 3.47%.

    Fig.12.State trajectories under two encrypted control schemes.

    V.CONCLUSION

    In this paper, a novel event-driven encrypted control framework of NCSs was proposed using semi-homomorphic encryption.By designing the quantization policies with the static and dynamic sensitivities, the bounded quantization error inherent in the traditional fixed-sensitivity uniform quantizer was tactfully compensated, contributing to the system state’s asymptotic convergence.Moreover, an event-triggered strategy was developed to reduce the communication consumption of NCSs and relieve ciphertext expansion.With the aid of static/dynamic quantization policies, event-triggered strategy, and Paillier encryption, the asymptotic stability and the data security of NCSs are ensured simultaneously.Finally,the validity of the proposed encrypted control framework was investigated through a numerical example of motion control of an inverted pendulum cart system.Future work will focus on the secure control problem of NCSs subject to more practical constraints, such as parameter uncertainties and exogenous disturbances.

    Fig.13.Comparisons of control command and energy under two encrypted control schemes.

    Fig.14.The updating instant and updating interval of time-varying quantizer in [20].

    又爽又黄无遮挡网站| 国产精品电影一区二区三区| 成人亚洲精品av一区二区| 欧美中文日本在线观看视频| 日韩欧美在线二视频| 法律面前人人平等表现在哪些方面| 久久久国产成人精品二区| 在线播放国产精品三级| 欧美乱码精品一区二区三区| 国产精品1区2区在线观看.| 国产精品一区二区精品视频观看| 国产蜜桃级精品一区二区三区| 亚洲精品中文字幕一二三四区| 国产日本99.免费观看| 久久久精品大字幕| 国产蜜桃级精品一区二区三区| 日本精品一区二区三区蜜桃| 一个人免费在线观看电影 | av在线天堂中文字幕| 男插女下体视频免费在线播放| a在线观看视频网站| 日本撒尿小便嘘嘘汇集6| 国产区一区二久久| 精品第一国产精品| 757午夜福利合集在线观看| 一区二区三区高清视频在线| 欧美在线黄色| 欧美黑人欧美精品刺激| 搡老妇女老女人老熟妇| tocl精华| 国产成人av教育| 1024手机看黄色片| 老司机午夜十八禁免费视频| 国产视频内射| 精品久久久久久成人av| 精品一区二区三区av网在线观看| 色综合婷婷激情| 欧美日韩瑟瑟在线播放| 国产午夜福利久久久久久| 国产精品久久久久久亚洲av鲁大| 99re在线观看精品视频| 美女高潮喷水抽搐中文字幕| 变态另类丝袜制服| 精品国产乱码久久久久久男人| cao死你这个sao货| 国产欧美日韩一区二区精品| www国产在线视频色| 看片在线看免费视频| 久久久久国产精品人妻aⅴ院| 久久久久久九九精品二区国产 | 一级毛片高清免费大全| 亚洲美女黄片视频| 两个人视频免费观看高清| 欧美中文日本在线观看视频| 老司机深夜福利视频在线观看| 欧美日本亚洲视频在线播放| 欧美zozozo另类| 成熟少妇高潮喷水视频| 欧美成人午夜精品| 美女高潮喷水抽搐中文字幕| 亚洲人与动物交配视频| 又黄又粗又硬又大视频| 国产高清激情床上av| 日韩av在线大香蕉| 亚洲天堂国产精品一区在线| 欧美日韩黄片免| 亚洲av成人av| 国产av又大| 亚洲欧美日韩高清在线视频| 亚洲精品在线观看二区| 99国产精品一区二区蜜桃av| 成熟少妇高潮喷水视频| 动漫黄色视频在线观看| 日韩三级视频一区二区三区| 欧美日韩福利视频一区二区| 亚洲国产日韩欧美精品在线观看 | 老司机靠b影院| 久久精品影院6| 午夜精品久久久久久毛片777| 欧美一级a爱片免费观看看 | 国产精品永久免费网站| 久久久久久免费高清国产稀缺| 天堂动漫精品| 在线看三级毛片| 在线观看舔阴道视频| 最好的美女福利视频网| 久久精品国产亚洲av高清一级| 欧美日韩亚洲国产一区二区在线观看| 妹子高潮喷水视频| 床上黄色一级片| 午夜老司机福利片| 色老头精品视频在线观看| avwww免费| 精品久久久久久久末码| 亚洲欧美日韩高清在线视频| 人人妻人人澡欧美一区二区| 亚洲av熟女| 国产片内射在线| 亚洲 欧美 日韩 在线 免费| 欧美日韩中文字幕国产精品一区二区三区| 成年女人毛片免费观看观看9| 在线十欧美十亚洲十日本专区| 欧美日本亚洲视频在线播放| 国产精品九九99| 亚洲狠狠婷婷综合久久图片| 搡老熟女国产l中国老女人| 啦啦啦韩国在线观看视频| 亚洲中文字幕一区二区三区有码在线看 | 久9热在线精品视频| 国产片内射在线| 欧美精品啪啪一区二区三区| 在线观看www视频免费| av国产免费在线观看| 制服丝袜大香蕉在线| 一进一出抽搐动态| 欧洲精品卡2卡3卡4卡5卡区| 超碰成人久久| 伊人久久大香线蕉亚洲五| 国产蜜桃级精品一区二区三区| videosex国产| 免费搜索国产男女视频| 青草久久国产| 婷婷丁香在线五月| 国产激情偷乱视频一区二区| 国产黄片美女视频| 免费看a级黄色片| 国产欧美日韩精品亚洲av| 99国产精品一区二区蜜桃av| 亚洲人成伊人成综合网2020| 国产又黄又爽又无遮挡在线| 免费在线观看视频国产中文字幕亚洲| 成年女人毛片免费观看观看9| 啦啦啦观看免费观看视频高清| 亚洲精品一卡2卡三卡4卡5卡| 在线免费观看的www视频| 国产真实乱freesex| 黑人操中国人逼视频| av在线播放免费不卡| 俺也久久电影网| 国产av麻豆久久久久久久| 午夜福利18| 免费看美女性在线毛片视频| 很黄的视频免费| 一卡2卡三卡四卡精品乱码亚洲| 91老司机精品| 亚洲av五月六月丁香网| 久久精品91蜜桃| 国产精品久久久久久亚洲av鲁大| 久久这里只有精品中国| 久久久国产精品麻豆| 在线观看免费日韩欧美大片| 欧美另类亚洲清纯唯美| 国产亚洲精品综合一区在线观看 | 1024视频免费在线观看| 免费看日本二区| 成人精品一区二区免费| 精品一区二区三区视频在线观看免费| 亚洲欧美日韩无卡精品| 女生性感内裤真人,穿戴方法视频| 中国美女看黄片| 熟女少妇亚洲综合色aaa.| 香蕉久久夜色| 日韩欧美国产一区二区入口| 亚洲片人在线观看| 国产1区2区3区精品| 色老头精品视频在线观看| av中文乱码字幕在线| 美女高潮喷水抽搐中文字幕| 真人一进一出gif抽搐免费| 亚洲第一电影网av| 亚洲色图av天堂| 日本 av在线| 亚洲国产欧美一区二区综合| 国产激情久久老熟女| 免费一级毛片在线播放高清视频| 老熟妇乱子伦视频在线观看| 国产亚洲精品第一综合不卡| 九色成人免费人妻av| 在线观看免费日韩欧美大片| 国产片内射在线| 老熟妇乱子伦视频在线观看| 欧美av亚洲av综合av国产av| 国产精品日韩av在线免费观看| 亚洲一卡2卡3卡4卡5卡精品中文| 国产高清videossex| 亚洲午夜精品一区,二区,三区| 国产成人系列免费观看| 51午夜福利影视在线观看| 久久久久国产一级毛片高清牌| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲片人在线观看| 一进一出抽搐动态| 成人特级黄色片久久久久久久| 九九热线精品视视频播放| 一卡2卡三卡四卡精品乱码亚洲| 身体一侧抽搐| 一级片免费观看大全| 亚洲 欧美一区二区三区| 国产在线观看jvid| 日本一区二区免费在线视频| 亚洲成人免费电影在线观看| 国产一区二区在线av高清观看| 男插女下体视频免费在线播放| 久久久久久久午夜电影| 国模一区二区三区四区视频 | 18禁黄网站禁片午夜丰满| 真人做人爱边吃奶动态| 人妻夜夜爽99麻豆av| 五月玫瑰六月丁香| 久久午夜亚洲精品久久| 午夜成年电影在线免费观看| 白带黄色成豆腐渣| 两个人免费观看高清视频| 日韩av在线大香蕉| 黄色丝袜av网址大全| 亚洲午夜精品一区,二区,三区| 日韩欧美 国产精品| 精品乱码久久久久久99久播| 亚洲精品久久国产高清桃花| 国产人伦9x9x在线观看| 在线观看免费视频日本深夜| 国产蜜桃级精品一区二区三区| 18美女黄网站色大片免费观看| 久久精品国产99精品国产亚洲性色| 国产激情偷乱视频一区二区| 亚洲精品在线观看二区| 国产精品日韩av在线免费观看| 在线观看日韩欧美| 国产av麻豆久久久久久久| 日韩免费av在线播放| 91成年电影在线观看| 99久久国产精品久久久| 99久久99久久久精品蜜桃| 午夜免费成人在线视频| 淫秽高清视频在线观看| 国产真实乱freesex| 免费一级毛片在线播放高清视频| 天天躁夜夜躁狠狠躁躁| videosex国产| 国产成人欧美在线观看| 色老头精品视频在线观看| 欧美午夜高清在线| 国产欧美日韩一区二区精品| 免费无遮挡裸体视频| 欧美日韩中文字幕国产精品一区二区三区| 国产精品一区二区免费欧美| 午夜福利欧美成人| 成年免费大片在线观看| 天天躁夜夜躁狠狠躁躁| 真人一进一出gif抽搐免费| 国产精品国产高清国产av| 亚洲国产欧美人成| 脱女人内裤的视频| 欧美黑人精品巨大| 特大巨黑吊av在线直播| 在线视频色国产色| 国内精品久久久久久久电影| 身体一侧抽搐| 中国美女看黄片| 亚洲自偷自拍图片 自拍| 麻豆国产97在线/欧美 | 两性午夜刺激爽爽歪歪视频在线观看 | 美女 人体艺术 gogo| 小说图片视频综合网站| 黄频高清免费视频| 一本综合久久免费| 成在线人永久免费视频| 色综合婷婷激情| 国产高清视频在线观看网站| 日韩欧美国产在线观看| 黄色女人牲交| 蜜桃久久精品国产亚洲av| 国产三级在线视频| 99热6这里只有精品| 日本黄色视频三级网站网址| 麻豆av在线久日| 久久精品亚洲精品国产色婷小说| 麻豆国产97在线/欧美 | 18禁国产床啪视频网站| 亚洲第一电影网av| 久久精品国产亚洲av香蕉五月| 欧美丝袜亚洲另类 | 亚洲精品粉嫩美女一区| 久久久精品大字幕| 啦啦啦免费观看视频1| 久久性视频一级片| 亚洲天堂国产精品一区在线| 黄色片一级片一级黄色片| 亚洲av片天天在线观看| 男人舔女人的私密视频| 香蕉丝袜av| 国产区一区二久久| 超碰成人久久| 亚洲,欧美精品.| 久久久国产成人免费| 午夜日韩欧美国产| 搡老岳熟女国产| 久久久久国内视频| 日日夜夜操网爽| 无遮挡黄片免费观看| 色精品久久人妻99蜜桃| 国产av麻豆久久久久久久| 天天躁狠狠躁夜夜躁狠狠躁| 午夜福利在线观看吧| 精品国内亚洲2022精品成人| 男女午夜视频在线观看| 夜夜爽天天搞| 亚洲 欧美一区二区三区| 国产亚洲精品第一综合不卡| 18美女黄网站色大片免费观看| 丁香六月欧美| 国产一区二区在线观看日韩 | 搞女人的毛片| 久久这里只有精品中国| 亚洲成人久久爱视频| 色老头精品视频在线观看| 日韩欧美免费精品| 久久精品亚洲精品国产色婷小说| 91av网站免费观看| 久久精品亚洲精品国产色婷小说| 91av网站免费观看| 日韩国内少妇激情av| or卡值多少钱| 好看av亚洲va欧美ⅴa在| 亚洲无线在线观看| 中文字幕av在线有码专区| 亚洲国产欧洲综合997久久,| 久久国产精品人妻蜜桃| 欧美黄色片欧美黄色片| 黑人欧美特级aaaaaa片| 日韩欧美三级三区| 50天的宝宝边吃奶边哭怎么回事| 美女高潮喷水抽搐中文字幕| 午夜精品一区二区三区免费看| 18禁国产床啪视频网站| 欧美久久黑人一区二区| 精品乱码久久久久久99久播| 精品午夜福利视频在线观看一区| 在线观看www视频免费| 久久国产精品影院| 国产真人三级小视频在线观看| 男插女下体视频免费在线播放| 看片在线看免费视频| 在线视频色国产色| 亚洲成av人片免费观看| 黑人操中国人逼视频| 国产野战对白在线观看| 久久久国产欧美日韩av| 精品久久久久久久末码| 久久精品国产99精品国产亚洲性色| 在线观看66精品国产| 色综合站精品国产| 精品第一国产精品| 少妇人妻一区二区三区视频| 麻豆成人午夜福利视频| 国产精品1区2区在线观看.| 俄罗斯特黄特色一大片| 欧美一级a爱片免费观看看 | 1024视频免费在线观看| 无限看片的www在线观看| 日韩欧美三级三区| aaaaa片日本免费| 欧美日韩黄片免| 18美女黄网站色大片免费观看| 无限看片的www在线观看| 国产一区二区激情短视频| 成人18禁高潮啪啪吃奶动态图| 国产亚洲精品第一综合不卡| 18美女黄网站色大片免费观看| 国产1区2区3区精品| 美女免费视频网站| 后天国语完整版免费观看| 国产免费男女视频| 国产av不卡久久| 熟女少妇亚洲综合色aaa.| 日韩免费av在线播放| 日本三级黄在线观看| ponron亚洲| 久久天躁狠狠躁夜夜2o2o| 在线国产一区二区在线| 国产精品久久久久久精品电影| 午夜激情福利司机影院| 变态另类成人亚洲欧美熟女| 黄色视频,在线免费观看| 精品国产乱子伦一区二区三区| 久久中文看片网| 亚洲第一电影网av| 一级a爱片免费观看的视频| 久久香蕉激情| 韩国av一区二区三区四区| netflix在线观看网站| 一区福利在线观看| 国产av又大| 久久精品亚洲精品国产色婷小说| 久久婷婷人人爽人人干人人爱| 免费在线观看成人毛片| 亚洲精品一卡2卡三卡4卡5卡| 国产精品爽爽va在线观看网站| 一本精品99久久精品77| 成人三级黄色视频| 热99re8久久精品国产| 中文亚洲av片在线观看爽| 国产高清有码在线观看视频 | 亚洲精品一卡2卡三卡4卡5卡| 最近视频中文字幕2019在线8| 亚洲天堂国产精品一区在线| 国产成人系列免费观看| 免费在线观看黄色视频的| 一级黄色大片毛片| 国产黄色小视频在线观看| 亚洲欧美精品综合一区二区三区| 久久久国产精品麻豆| 伦理电影免费视频| 国产野战对白在线观看| 国产熟女午夜一区二区三区| 亚洲电影在线观看av| 欧美色视频一区免费| 久久久久久人人人人人| xxxwww97欧美| 一区福利在线观看| 淫妇啪啪啪对白视频| 女生性感内裤真人,穿戴方法视频| 在线国产一区二区在线| 狠狠狠狠99中文字幕| 一进一出好大好爽视频| 欧美一级毛片孕妇| 久久天堂一区二区三区四区| 日韩大尺度精品在线看网址| av有码第一页| 欧美绝顶高潮抽搐喷水| 久久精品成人免费网站| 12—13女人毛片做爰片一| 中文字幕精品亚洲无线码一区| 亚洲真实伦在线观看| 免费看日本二区| 草草在线视频免费看| 久久午夜综合久久蜜桃| 久久久久久国产a免费观看| 搡老熟女国产l中国老女人| 成人午夜高清在线视频| 动漫黄色视频在线观看| 很黄的视频免费| 美女免费视频网站| 制服人妻中文乱码| 久久久久久大精品| 婷婷亚洲欧美| 给我免费播放毛片高清在线观看| 神马国产精品三级电影在线观看 | 亚洲成人国产一区在线观看| 欧美最黄视频在线播放免费| 国产精品av久久久久免费| 亚洲一区中文字幕在线| 在线观看午夜福利视频| 日韩免费av在线播放| 欧美丝袜亚洲另类 | 日本 欧美在线| 亚洲国产高清在线一区二区三| 操出白浆在线播放| 一级a爱片免费观看的视频| 黄色丝袜av网址大全| 天堂√8在线中文| 91九色精品人成在线观看| 亚洲aⅴ乱码一区二区在线播放 | 成年免费大片在线观看| 久久99热这里只有精品18| 人妻丰满熟妇av一区二区三区| 亚洲狠狠婷婷综合久久图片| 国语自产精品视频在线第100页| 国产精华一区二区三区| 精品电影一区二区在线| 成人三级做爰电影| 五月玫瑰六月丁香| 欧美日韩国产亚洲二区| 这个男人来自地球电影免费观看| 91字幕亚洲| 精品久久蜜臀av无| 99热只有精品国产| 韩国av一区二区三区四区| 99久久无色码亚洲精品果冻| 999精品在线视频| e午夜精品久久久久久久| 国产精品av视频在线免费观看| 一级毛片女人18水好多| 黄频高清免费视频| 精品国产亚洲在线| 最新在线观看一区二区三区| 欧美午夜高清在线| 色综合婷婷激情| 人成视频在线观看免费观看| 亚洲成人久久性| 国产单亲对白刺激| 丰满人妻一区二区三区视频av | 国产区一区二久久| 国产欧美日韩一区二区三| 国产精品电影一区二区三区| 日日干狠狠操夜夜爽| 精品国产超薄肉色丝袜足j| 日本撒尿小便嘘嘘汇集6| 久久精品aⅴ一区二区三区四区| 日韩大尺度精品在线看网址| 一夜夜www| 久久精品91蜜桃| 97超级碰碰碰精品色视频在线观看| 日韩欧美精品v在线| 亚洲免费av在线视频| 亚洲专区字幕在线| 又粗又爽又猛毛片免费看| 香蕉国产在线看| 欧美三级亚洲精品| 日本一二三区视频观看| 久久精品91蜜桃| 香蕉国产在线看| 老熟妇仑乱视频hdxx| 制服诱惑二区| ponron亚洲| 免费在线观看亚洲国产| 国产野战对白在线观看| 少妇的丰满在线观看| 男女午夜视频在线观看| 久久久国产成人精品二区| www日本黄色视频网| 99热这里只有精品一区 | 亚洲欧美日韩高清在线视频| 天堂√8在线中文| 看片在线看免费视频| 一个人免费在线观看的高清视频| 制服人妻中文乱码| 亚洲熟妇中文字幕五十中出| 看片在线看免费视频| 最近视频中文字幕2019在线8| 波多野结衣巨乳人妻| 亚洲狠狠婷婷综合久久图片| 久久久久免费精品人妻一区二区| 国产精品精品国产色婷婷| 搡老熟女国产l中国老女人| 国内毛片毛片毛片毛片毛片| 国产午夜精品论理片| 亚洲欧美一区二区三区黑人| 久久精品亚洲精品国产色婷小说| 51午夜福利影视在线观看| 黄频高清免费视频| 欧美丝袜亚洲另类 | 久久热在线av| 天堂动漫精品| 免费观看精品视频网站| 啪啪无遮挡十八禁网站| 天堂影院成人在线观看| 久久久久久久久久黄片| 亚洲欧美日韩高清在线视频| 国产午夜精品久久久久久| 麻豆一二三区av精品| 亚洲精品粉嫩美女一区| 看片在线看免费视频| 国产一区二区在线av高清观看| 黑人操中国人逼视频| 少妇裸体淫交视频免费看高清 | 久久人人精品亚洲av| 老司机午夜福利在线观看视频| 亚洲美女视频黄频| 制服人妻中文乱码| 国产三级黄色录像| 真人做人爱边吃奶动态| 99国产综合亚洲精品| 成人国产综合亚洲| 母亲3免费完整高清在线观看| 一区二区三区激情视频| 国产真实乱freesex| av天堂在线播放| 可以在线观看的亚洲视频| 欧美+亚洲+日韩+国产| 最新在线观看一区二区三区| 搡老岳熟女国产| 日韩欧美在线二视频| 国内揄拍国产精品人妻在线| 一区福利在线观看| 久久久久性生活片| 欧美乱码精品一区二区三区| 欧美成人性av电影在线观看| 中文亚洲av片在线观看爽| 非洲黑人性xxxx精品又粗又长| 男人舔女人下体高潮全视频| 亚洲欧美日韩高清在线视频| 久久精品综合一区二区三区| 不卡av一区二区三区| 日韩高清综合在线| 久久精品人妻少妇| 精品日产1卡2卡| 99热只有精品国产| 天堂av国产一区二区熟女人妻 | 国产成人一区二区三区免费视频网站| www日本黄色视频网| 国产精品一区二区免费欧美| 精品久久久久久久毛片微露脸| 午夜激情av网站| 亚洲人成电影免费在线| 国产精品久久久av美女十八| 男女那种视频在线观看| av在线天堂中文字幕| 亚洲国产精品合色在线| 青草久久国产| 久久久久久人人人人人| 又爽又黄无遮挡网站| 国产精品一及| 国产亚洲精品综合一区在线观看 | 免费在线观看视频国产中文字幕亚洲| 免费看十八禁软件| 欧美成人午夜精品| aaaaa片日本免费| 午夜免费观看网址| 日韩欧美在线乱码| 亚洲黑人精品在线| 悠悠久久av| 欧美日韩亚洲国产一区二区在线观看| 亚洲熟妇中文字幕五十中出| 免费在线观看视频国产中文字幕亚洲|