• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure Beamforming Design for SWIPT in Cooperative D2D Communications

    2017-05-08 11:31:14LiJiangChengQinXixiZhangHuiTian
    China Communications 2017年1期

    Li Jiang, Cheng Qin, Xixi Zhang, Hui Tian

    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, and Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory, Beijing, 100876, China.

    * The corresponding author, email: tianhui@bupt.edu.cn

    I.INTRODUCTION

    1.1 Motivation

    With the emergence of Internet of Things,billions of devices will be connected and managed by wireless networks [1]-[3].The vast proliferation of mobile devices which is mainly attributed to the explosive growth of mobile data traffics requirements, such as multimedia traffics.The very large number of devices with the huge network traffics has increased the need for higher data rates and capacity.Cooperative communication has been considered as one of the key technologies in the next generation wireless networks, in which network nodes help each other in relaying information to realize spatial diversity advantages and promise significant performance gains in terms of link reliability, spectral efficiency,system capacity and transmission range [4].Comparing with fixed terminal relaying which involves the deployment of low-power base stations (BS) to assist the communication between the source and the destination, the device relaying can realize the full potential of cooperation [5].Device relaying makes it possible for devices, including a cell phone or any other portable wireless device with cellular connectivity, to function as transmission relays for each other [6].For example, when a device is in a congested area or in a poor coverage area, this device can communicate with its destination via the cooperation of relays,which are another devices between the source device and the destination.Furthermore, the relay can also transmits its own information during the cooperation in order to further enhance the spectral efficiency [7].

    In cooperative device-to-device (D2D)communications, the wireless devices are often powered by batteries with limited energy.The lifetime of the wireless devices remains the bottleneck in the provision of ubiquitous wireless communication services.If a device is an energy constrained node, it is difficult for this device to cooperate with the other device.Thus the battery energy should be consumed efficiently.In [8], an energy-efficient multimedia transmission scheme was proposed to optimize energy efficiency by exploiting user behavior.In [9], a user social pattern (USP)-based spectral efficiency and energy efficiency enhancement scheme was proposed for a HetNet of the LTE-A system.A macro-assisted data-only carrier for future 5G networks from green prospective was proposed in [10].

    Recently, there has been an upsurge of research interests in radio frequency (RF)energy harvesting technique, which is the capability of covering the received RF signals into electricity.This technique is a promising approach to prolong the battery life of the battery equipped wireless devices and improve the network performance [11].Furthermore,RF energy harvesting technique facilitates the possibility of simultaneous wireless information and power transfer (SWIPT), in which the RF signals are in the dual use for delivering energy as well as for transporting information concurrently [25].In this paper, we consider a new cooperative D2D communications scenario, i.e., a cooperative D2D communications with SWIPT, in which a D2D transmitter assists a cellular downlink transmission by acting as an half-duplex (HD) relay between the BS and the cellular user.In return, the D2D transmitter is allowed to directly communicate with the desired D2D receiver by using the cellular users’ spectrum.At the same time,there exists multiple idle D2D users which need to harvest energy from the D2D transmitter’s signal and store the harvested energy for future use .However, the idle D2D users may decode the cellular message instead of harvesting energy, which results in cellular message security problem.In practice, the security of the cellular message need to be guaranteed since the cellular users are spectrum owner.Therefore, in addition to meeting the energy harvesting requirements of the idle D2D users,the cooperative D2D communication system with SWIPT should be optimally designed to guarantee the cellular message security in the presence of potential eavesdropping of the idle D2D users.

    1.2 Related works

    1) Energy harvesting in cooperative D2D communications:In conventional wireless networks, the wireless devices are powered by batteries.Finite network lifetime due to battery depletion becomes a fundamental bottleneck that limits the performance of energy-constrained networks, e.g., wireless sensor networks.Alternatively, energy harvesting technologies have received much interest in wireless networks [12], [13], where wireless devices are enabled to harvest energy from renewable energy sources, such as thermal,vibration, solar, acoustic, wind, and ambient RF signal to prolong the battery life of the battery equipped wireless devices.Wireless communication with energy harvesting in D2D networks have been considered in [14]-[16].In [14], cognitive and energy harvesting-based D2D communication in cellular networks was modeled and analyzed.The cognitive D2D transmitters harvest energy from ambient interference and use one of the channels allocated to cellular users to communicate with the corresponding receivers.The stochastic geometry was used to evaluate the performance of the proposed communication system model with general path loss exponent in terms of outage probability for D2D and cellular users.The results showed that energy harvesting can be a reliable alternative to power cognitive D2D transmitters while achieving acceptable performance.In [15], a D2D communication provided energy harvesting heterogeneous cellular network (D2D-EHHN) was proposed,where user equipment relay harvest energy from an access point and use the harvested energy for D2D communication.A framework for the design and analysis of D2D-EHHN by introducing the energy harvesting region and modeling the status of harvested energy using Markov chain was developed.The analysis result showed that having a high energy harvesting efficiency enhances the performance of D2D-EHHN.By considering downlink resource reuse and energy harvesting, the goal of [16] was to maximize the sum-rate of the D2D links, without degrading the quality of service (QoS) requirement of the cellular users.Based on the results of Lagrangian constrained optimization, joint resource block and power allocation algorithms for D2D links was proposed, when there is non-causal and causal knowledge of the energy harvesting profiles at the D2D transmitters.

    2) Security transmission in cooperative D2D communications:Physical layer security has been proved to be an effective method to provide secure communications by exploiting the characteristics of wireless channels, such as fading, noise and interference [17].To make physical layer security viable, it needs that the legitimate user’s channel condition to be better than that the eavesdroppers’.However, it may not be always possible in practice.Current studies use the transmit beamforming of multi-antenna transmission to concentrate the transmit signal over the direction of the legitimate user while reducing signal leakage to the eavesdroppers at the same time [18].Secure beamforming schemes have been widely designed in multiple-input multiple-output(MIMO) broadcasting channel [19], MIMO relay channel [20] and MIMO OFDM channel[21].The efficiency of secure beamforming depends on how much the transmitter knows the eavesdroppers’ channel state information(CSI).For a case that the transmitter cannot obtain the full CSI of eavesdropper channel,paper [22] designed robust secure beamforming scheme.In addition, the notion of using artificial noise (AN) to enhance physical layer security has also received much attention in recent years, in which artificially generated noise is added into the transmit signal so as to interfere the eavesdroppers deliberately[23].In the SWIPT system, information and energy are carried by the same RF signal.The information is recovered at the information receivers and the electromagnetic energy is harvested and converted into electric energy at the energy receiver.However, the energy receivers may decode the signal instead of harvesting energy, which results in information leakage.Therefore, in addition to meeting the energy harvesting requirements of the energy receivers, the SWIPT system should be optimally designed to guarantee the information security in the presence of potential eavesdropping of the energy receivers.Yet,the SWIPT technology raises a demand for redesign of existing wireless networks due to the imposed new security challenge.The secure communication in SWIPT systems has been studied in different contexts.In[24], the physical layer security problem was addressed in a multiuser multiple-input single-output (MISO) SWIPT system, where one multi-antenna transmitter sends information and energy simultaneously to an information receiver (IR) and multiple energy receivers(ERs).In [25], the secure communication of MISO downlink system with SWIPT and in the presence of passive eavesdroppers and potential eavesdroppers was considered.The resource allocation algorithm formulation took into account artificial noise and energy signal generation for protecting the transmitted information against both considered types of eavesdroppers when imperfect CSI of the potential eavesdroppers and no CSI of the passive eavesdroppers are available at the transmitter.Besides, the problem formulation also took into account different QoS requirements.In[26], the secure relay beamforming scheme for SWIPT in nonregenerative relay networks was studied.A constrained concave convex procedure (CCCP)-based iterative algorithm was proposed, where the secrecy rate is maximized and the relay transmit power and energy harvesting constraints are satisfied.In [27], secure D2D communication in energy harvesting large-scale cognitive cellular networks was investigated, where the energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communications with the corresponding receivers using the spectrum of the primary base stations.A power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission were introduced.

    However, our scenario differs from these previous studies in that the device transmitter performs double roles as a relay and a transmitter.Specifically, the D2D transmitter sends its own message to a D2D receiver while relaying the cellular downlink message to a cellular user.The D2D pair is considered as the MISO link [28], [29].The main contributions of our paper are as follows.

    1.3 Contributions

    ? We consider a new security problem in the cooperative D2D communication with SWIPT, whereKidle D2D users exist to harvest energy from the received signal.However, the idle D2D users can be malicious and decode the cellular downlink massage without permission.

    ? We aim to achieve the secure cellular message transmission and guarantee the minimum required amounts of energy simultaneously transferred to the idle D2D users by designing the optimal forwarding beamformingand the transmitting beamformingat the D2D transmitter.

    ? We formulate the optimization problem to maximize the desired D2D user data rate subject to a secrecy rate constraint of the cellular user and individual harvested energy constraints of the idle D2D users.The formulated optimal problem is non-convex.A semi-definite programming relaxation(SDR) approach is adopted to obtain the optimal solution.Furthermore, we propose two suboptimal secure beamforming scheme with low computational complexity.Simulation results demonstrate the efficiency of our proposed beamforming schemes.

    The rest of this paper is organized as follows.In Section II, we will describe the system model and formulate an optimization problem.Solutions of the optimization problem are proposed in Section III.Section IV presents simulation results.Section V concludes the paper.

    II.SYSTEM MODEL AND PROBLEM FORMULATION

    We consider cooperation between a cellular downlink communication and a D2D communication.The cellular downlink communication system consists of a source (S) and a cellular user (CU), while the D2D communication system has a D2D transmitter (DT) who serves one desired D2D user (DU).There existsKidle DUs.All terminals have a single antenna except that the DT hasNantennas.The S intends to send a confidential message,to the CU while the DT transmits a non-confidential message,, to the desired DU.For example, in a small cell area, a small cell access point (AP) equipped with single antenna serves CUs.However, the cellular link is so worse that it needs the DT to relay the cellular message.As a return, the DT can transmit its own message by using the spectrum of the cellular link [30].

    In this paper, we consider a two-phase transmission.At the first phase, the S transmits signalto all the receivers.At the second phase, the DT concurrently transmits both the cellular confidential message and its own message to the CU and to the desired DU, respec-tively.TheKidle DUs harvest energy from the received signal.However, the idle DUs may decode the cellular confidential message instead of harvesting energy.Thus, the idles DUs may be potential eavesdroppers which should be taken into account for providing secure D2D cooperative communications with SWIPT.

    The channel coefficients of the S-CU, the S-DU and thelinks are denoted by the complex scalarandrespectively.For simplicity, the complex scalar of the channel coefficientsandis written asThecomplex channel vectors of the S-DT, DT-CU, DT-DU andlinks are represented byandrespectively, in whichandare further denoted asIn order to satisfy the energy harvesting requirements, the idle DUs feedbacks their channel state information (CSI) to the DT to design the transmit beamforming.Thus, the DT knows the full CSI of all the receivers.

    As shown in Fig.1, at the first phase, the received signal at the CU, the DT, the desired DU and thekth idle DU are given by, respectively,

    At the second phase, the DT concurrently transmits both the cellular confidential message and its own message by using the forwarding beamforming vectorand the transmitting beamforming vectorThe resulting transmit signal vector at the DT is given by,

    with average power

    Fig.1 System model of cooperative D2D communications with SWIPT.The black solid lines denote the first phase and the red dotted lines denote the second phase

    The achievable SINR of the D2D message at the desired DU is expressed as,

    Suppose that thekth idle DU is an eavesdropper and decodes the cellular confidential message instead of harvesting energy.The received signal at thekth idle DU is,

    The achievable SINR of the cellular confidential message at theth idle DU is,

    Thus the achievable secrecy rate at the CU is given by [31],

    On the other hand, the harvested energy of theth idle DU in each slot is given by

    The secure beamforming is designed to maximize the desired DU data rate subject to the secrecy QoS requirement for the CU and the individual harvested energy constrains for all the idle DUs.The optimization problem can be formulated as (P1),

    III.SOLUTIONS OF THE OPTIMIZATION PROBLEM

    In this section, we present both optimal and suboptimal solutions to (P1).

    3.1 Optimal solution to (P1):

    In this subsection, we utilize the semi-definite programming relaxation (SDR) [32] to obtain the optimal solution for problem (P1).

    Problem (P1)can be equivalently written as,

    If the optimal solution of problem (P2)areandsatisfyingandthen the optimal forwarding beamformingand the optimal transmitting beamformingcan be obtained from the the eigenvalue decomposition (EVD) ofandrespectively; otherwise, ifand, then the optimal value of problem (P2) only serves as an upper bound on that problem (P1).However, we provide the method to construct the optimal solution with

    Problem (P2) is still non-convex since its objective function, the constraint C1 and the constraint C2 are non-concave overand.However, we can apply the Charnes-Cooper transformation [33] to reformulate (P2) as an equivalent convex problem.

    Lemma 1:Problem (P2) is equivalent to the following problem (P3).

    Proof:First, given any feasible solutionto problem (P2), it can be shown that with the solutionandproblem (P3)achieves the same objective value as that of problem (P2).Second, given any feasible solutionto problem (P3), problem(P2) achieves the same objective value as that of (P3).Thus, problem (P2) and problem (P3)have the same optimal value.

    In the following, we provide the method for constructing the optimal solutionwith rank-one.Letanddenote the dual variables of (P3) associated with C1-C5, respectively.Then the Lagrangian of (P3)is,

    where

    Algorithm 1 The proposed optimal algorithm for problem (P3)

    Proposition 1:The optimal solutionsto problem (P3) satisfy the following conditions:

    Proof:Please refer to Appendix A.

    The optimal transmitting beamforming and forwarding beamformingcan be obtained by EVD ofThe specifical procedure of the proposed optimal scheme to solve problem (P3) is presented inAlgorithm1.

    3.2 Suboptimal solution I to (P1):

    In this subsection, we propose a suboptimal solution I for problem (P1) with lower complexity.In our proposed suboptimal solution,the forwarding beamformingis restricted to lie in the null space of the desired DU and the idle DUs’ channelsin order to eliminate the interference of the cellular message to the desired D2D user and the leakage of the cellular message to the idle D2D users.Note that the proposed suboptimal solution is only applicable whenWe present the proposed suboptimal solution in details.

    The suboptimal solution aims to solve problem (P1) with the addition constrains:To satisfy this, the beamforming vectoris chosen as,

    The suboptimal problem is formulated as(P4),

    Assuming that (P4-SDP) is feasible, then it can be solved via CVX.Denote the optimal solution asThen the optimalcan be obtained by the EVD of

    3.3 Suboptimal solution II to (P1):

    In this section, we propose the second sub-optimal solution, in which there should be no interference between the cellular transmission and the D2D transmission.Thus, problem(P1) adds with the additional constraints:The beamforming vectoris chosen as,

    Due to the fact that both constraints C1 and C3 should hold with equality,can be expressed respectively as

    IV.NUMERICAL RESULTS

    In this section, we evaluate the performance of the proposed secure beamforming design schemes by providing numerical results.We assume that the DT is equipped withN=5 antennas and there isK=1 idle D2D user.We consider a scenario where the distance from the DT to all the other terminals are 10 m,while the distance from the S to the CU is 20m.The channel between a transmit-receive antenna pair is modeled aswheredis the distance,is the path loss exponent, chosen as 3.5, andwis uniformly distributed overThe variance of noise are set asN0= -35 dBm.The power of the S and the DT are set to beand.The energy harvesting efficiencyis set to be 0.5.The maximum allowable SINR for thekth idle DU to eavesdrop the cellular message is set to beThe minimum required energy harvesting at thekth idle DU is 0 dBm.

    Fig.2 depicts the achievable secrecy rate of the CU versus the minimum required SINR of the CU,for different beamforming schemes.It can be observed that the achievable secrecy rate of the CU is a monotonically non-decreasing withThis is mainly due to the fact that with increasingmore power will be used for satisfy the minimum required SINR of the CU in the constraint one in the original problem.Besides, suboptimal solution I is observed to perform better than suboptimal solution II.However, it is worth noting that suboptimal solution II has the lowest complexity among the three proposed solutions,since the closed form solutions of the forwarding beamformingand the transmitting beamformingare obtained in (31) and (32),respectively.

    Fig.2 The achievable secrecy rate of the CU vs the minimum required SINR of the CU

    Fig.3 The achievable data rate of the desired DU vs the minimum required SINR of the CU

    Fig.4 The total harvested energy of the idle DUs vs the minimum required SINR of the CU

    Fig.3 illustrates the achievable data rate of the desired DU versus the minimum required SINR of the CU,for different secure beamforming schemes.It can be seen that the achievable data rate of the desired DU decreases with the increasing ofsince most of the power of the DT is used for meeting the minimum required SINR of the CU in the constraint one in the original problem.The achievable data rate of the desired DU in the optimal beamforming scheme is higher than that in the suboptimal beamforming scheme I and that in the suboptimal beamforming scheme II.In the suboptimal beamforming scheme II, the idle D2D users only harvest energy from thedue to the fact that both the transmitting beamformingand the forwarding beamformingare designed in the channel null space.A small value of thecan meet the energy harvesting amount requirement in constraint three in the original problem, thus the change of the achievable data rate of the desired D2D user is not obviously.However, we plot a sub figure to show the decrease of the data rate of the desired DU in the suboptimal beamforming scheme II with the increasing of

    Fig.4 shows the total harvested energy of the idle DUs versus the minimum required SINR of CU,for different secure beamforming schemes.It is expected that the total harvested energy of the idle DUs decreases with the increasing ofThe total harvested energy of the idle DUs in the optimal beamforming scheme is higher than that of the suboptimal beamforming scheme I and that of the suboptimal beamforming scheme II.The change of the total harvested energy of the idle DUs is still not obviously in the suboptimal beamforming scheme II.It is similar to Fig.3,we plot a sub figure to show the decrease of the total harvested energy of the idle DUs in the suboptimal beamforming scheme II with the increasing of

    In the following numerical results, we will observe the affect of the number of idle D2D users on the performance of the proposed three beamforming schemes.We set the transmit antennas at the D2D transmitterand the number of idle D2D usersFig.5 depicts the achievable secrecy rate of the CU versus the number of the idle D2D users for the three proposed beamforming schemes.It can be observed that the achievable secrecy rate of the CU decreases with the increasing number of the idle D2D users for all the three beamforming schemes.The reason is that with the increasing number of the idle D2D users,there is higher probability of existing idle D2D users with better channel gains.Thus the D2D transmitter needs to allocate more power to the transmitting beamformingto combat the cellular information leakage to the idle D2D users.Moreover, It is observed that when the first idle D2D user is activated, there is a drastic decrease in the secrecy rate achieved in suboptimal solution II.However, the optimal beamforming scheme performs better than other two suboptimal schemes.

    Fig.6 shows the achievable data rate of the desired DU versus the number of the idle D2D users for the three proposed beamforming schemes.It is similar to Fig.5 that the achievable data rate of the desired DU still decreases with the increasing number of the idle D2D users, since most of the D2D transmitter’s power is used for combatting the cellular information leakage to the idle D2D users.In addition, the data rate of the desired DU achieved by the optimal beamforming scheme is higher than that of the other two suboptimal beamforming schemes.

    Fig.7 shows the total harvested energy of the idle DUs versus the number of the idle D2D users for the three proposed beamforming schemes.From the figure we can see that the total harvested energy of the idle DUs increases with the increasing number of the idle DUs.The total harvested energy of the idle DUs in the optimal beamforming scheme is higher than that of the suboptimal beamforming scheme I and that of the suboptimal beamforming scheme II.From the results in above figures, it is inferred that our proposed optimal beamforming scheme achieves good performance due to the jointly optimized forwarding beamformingand transmitting beamforming.

    V.CONCLUSION

    Fig.5 The achievable secrecy rate of the CU vs the number of the idle D2D users

    Fig.6 The achievable data rate of the desired DU vs the number of the idle D2D users

    In this paper, we considered a new security problem in cooperative D2D communications with SWIPT, in which the multiple idle DUs may eavesdrop the cellular confidential message instead of harvesting energy from the received signal.We aimed to design secure beamforming to maximize the D2D users data rate subject to the secrecy rate requirements of the cellular user and the minimum required amounts of power transferred to the idle DUs.To solve this non-convex problem, a SDR approach was adopted to obtain the optimal solution.Furthermore, we proposed two suboptimal secure beamforming scheme with low computational complexity.Simulation results demonstrated that comparing with the two suboptimal secure beamforming scheme, our proposed optimal secure beamforming scheme achieves a significant data rate of the desired DU while provides a high secrecy rate for the cellular users and facilitates the efficient power transfer for the idle DUs.

    Appendice A Proof of Proposition 1

    The Karush-Kuhn-Tucker (KKT) conditions of problem (P3) are expressed as,

    According to (17), we have,

    Next, we prove the second part of Proposition 1.Define

    Last, we prove the third part.Forandwe construct another solution of the problem (P3),Then substituting them into the objective function and constraints in (P3) which achieves the same optimal value as the optimal solution and satisfies all the constrains.Thus,are also optimal solutions to (P3) but withand

    This work is supported in part by National Natural Science Foundation of China under Grants 61602048, by National Natural Science Foundation of China under Grants 61471060,by Creative Research Groups of China under Grants 61421061, by National Science and Technology Major Project of the Ministry of Science and Technology of China under Grants 2015ZX03001025-002.

    [1] F.Xia, L.Yang, L.Wang and A.Vinel, ”Internet of things,”Int.J.Commun.Syst., vol.25, no.9, pp.1101-1102, Aug.2012.

    [2] Y.Zhang, R.Yu, W.Yao, S.Xie, Y.Xiao and M.Guizani, ”Home M2M Networks: Architectures,Standards, and QoS Improvement,”IEEE Commun.Mag., vol.49, no.4, pp.44-52, Apr.2011.

    [3] Y.Zhang, R.Yu, M.Nekovee, Y.Liu, S.Xie, and S.Gjessing, ”Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid,”IEEE Network Mag., vol.26, no.3,pp.6-13, May 2012.

    [4] J.Ding, R.Yu, Y.Zhang, S.Gjessing and D.Tsang,”Service Providers Competition and Coopera-tion in Cloud-based Software Defined Wireless Networks,”IEEE Commun.Mag., vol.53, no.11,pp.134-140, Nov.2015.

    [5] M.Tehrani, M.Uysal and H.Yanikomeroglu,”Device-to-Device Communication in 5G Cellular Netowks: Challenges, Solutions, and Future Directions,”IEEE Commun.Mag., vol.52, no.5,pp.86-92, May 2014.

    [6] M.Khoshkholgh, Y.Zhang, K-C Chen, Kang G.Shin, and S.Gjessing, “Connectivity of Cognitive Device-to-Device Communications Underlying Cellular Networks,”IEEE J.Sel.Area in Commun., vol.33, no.1, pp.81-99, Jan.2015.

    [7] G.Zhang, K.Yang, P.Liu and J.Wei, “Power Allocation for Full-Duplex Relaying-Based D2D Communication Underlaying Cellular Networks,”IEEE Trans.Veh.Technol., vol.64, no.10,pp.4911-4916, Oct.2015.

    [8] X.Zhang, R.Yu, Y.Zhang, Y.Gao, M.Im, L.Cuthbert, and W.Wang, “Energy-Efficient Multimedia Transmissions through Base Station Cooperation over Heterogeneous Cellular Networks Exploiting User Behavior,”IEEE Wirel.Commun.,vol.21, no.4, pp.54-61, Aug.2014.

    [9] X.Zhang, Y.Zhang, R.Yu, W.Wang and M.Guizani, “Enhancing Spectral-Energy Efficiency for LTE-Advanced Heterogeneous Networks: A Users Social Pattern Perspective,”IEEE Wirel.Commun., vol.21, no.2, pp.10-17, Apr.2014.

    [10] X.Zhang, J.Zhang, Y.Zhang, W.Wang, C-L.I,Z.Pan, G.Li, and Y.Chen, “Macro-assisted Data-only Carrier for 5G Green Cellular Systems,”IEEE Commun.Mag., vol.53, no.5, pp.223-231,May 2015.

    [11] L.Jiang, H.Tian, Z.Xing, K.Wang, K.Zhang,S.Maharjan, S.Gjessing, and Y.Zhang, “Social-aware Energy Harvesting Device to Device Communications in 5G Networks ,” Accepted byIEEE Wirel.Commun., 2016.

    [12] J.Kang, R.Yu, S.Maharjan, Y.Zhang, X.Huang,S.Xie, H.Bogucka, and S.Gjessing, “Toward Secure Energy Harvesting Cooperative Networks,”IEEE Commun.Mag., vol.53, no.8, pp.114-121,Aug.2015.

    [13] Y.Liu, Y.Zhang, R.Yu, and S.Xie, “Integrated Energy and Spectrum Harvesting for 5G Wireless Communications,”IEEE Network Mag., vol.29, no.3, pp.75-81, May 2015.

    [14] A.Sakr and E.Hossain, “Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis ,”IEEE Trans.Commun., vol.63, no.5, pp.1867-1880, May 2015.

    [15] H.Yang, J.Lee and T.Quek “Heterogeneous Cellular Network with Energy Harvesting-Based D2D Communication,”IEEE Trans.Wirel.Commun., vol.15, no.2, pp.1406-1419, Feb.2016.

    [16] S.Gupta, R.Zhang and L.Hanzo “Energy Harvesting Aided Device-to-Device Communication Underlaying the Cellular Downlink,”IEEE Access, vol.PP, no.99, pp.1-1, Aug.2016.

    [17] A.Wyner, “The wiretap channel,”Bell Syst, Tech.J., vol.54, pp.1355-1387, Oct.1975.

    [18] A.Khisti, G.Wornell, “Secure transmission with multiple antennas I: the MISOME wiretap channel,”IEEE Trans.Inf.Theory, vol.56, no.7, pp.3088-3104, Jun.2010.

    [19] F.Oggier, B.Hassibi, “A perspective on the MIMO wiretap channel,”Proceedings of the IEEE, vol.103, no.10, pp.1874-1882, Sep.2015.

    [20] L.Jiang, H.Tian, C.Qin, S.Gjessing and Y.Zhang, “Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks,”IEEE Commun.Lett., vol.20, no.3, pp.522-525,Mar.2016.

    [21] C.Wu, P.Lan, P.Yeh, C.Lee and C.Cheng,“ physical layer security schemes for MIMO-OFDM systems using precoding matrix indices,”IEEE J.Sel.Area Comm., vol.31, no.9,pp.1687-1700, Aug.2013.

    [22] N.Zurita, D.Mclernon, M.Ghogho, “Physical layer security by robust masked beamforming and protected zone optimization,”IET Comm.,vol.8, no.8, pp.1248-1257, 2014.

    [23] Q.Li, W.Ma, “Spatially selective artificial-noise aided transmit optimization for MISO multieves secrecy rate maximization,”IEEE Trans.Signal.Proces., vol.61, no.10, pp.2704-2717,May 2013.

    [24] L.Liu, R.Zhang and K.Chua, “Secrecy wireless information and power transfer with MISO beamforming,”IEEE Trans.Signal Proces., pp.1850-1863, Jan.2014.

    [25] D.Ng, E.Lo and R.Schober, “Robust beamforming for secure communication in systems with wireless information and power transfer,”IEEE Trans.Wireless Commun., vol.13, no.8, pp.4599-4615, Aug.2014.

    [26] Q.Li, Q.Zhang and J.Qin, “Secure relay bemforming for simultaneous wireless information and power transfer in nonregenerative relay networks,”IEEE Trans.Veh.Technol., vol.63, no.5, pp.2462-2467, Jun.2014.

    [27] Y.Liu, L.Wang, S.Zaidi, M.Elkashlan and T.Duong, “Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model,”IEEE Trans.Commun.,vol.64, no.1, pp.329-342, Jan.2016.

    [28] J.Yang, S.Xie, X.Zhou, R.Yu, Y.Zhang, ”A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems,”IEEE Trans.Commun., vol.62, no.7, pp.2400-2410, Jul.2014.

    [29] Y.Han, S.Jin, X.Li, H.Zhang, R.Yu and Y.Zhang,”Investigation of Transmission Schemes for Millimeter-Wave Massive MU-MIMO Systems,”Accepted byIEEE System Journal.

    [30] Y.Liu, R.Yu, X.Pan, Y.Zhang and S.Xie, ”SD-MAC: Spectrum Database-Driven MAC Protocol for Cognitive Machine-to-Machine Networks,”Accepted byIEEE Trans.Veh.Technol.

    [31] I.Csiszar and J.Korner, “Broadcast channels with confidential messages,”IEEE Trans.Iform.Theory, vol.24, no.3, pp.339-348, 1978.

    [32] Z.Luo, W.Ma, A.So, Y.Ye and S.Zhang,“Semidefinite relaxation of quadratic optimization problems,”IEEE Signal Process.Mag., vol.27, no.3, pp.20-34, May 2010.

    [33] T.Chang, C.Hsin, W.Ma and C.Chi, “A linear fractional semidefinite relaxation approach to maximum likelihood detection of higher-order QAM OSTBC in unknown channels,”IEEE Trans.Signal Process., vol.58, no.2, pp.664-678, Apr.2010.

    [34] G.Zheng, H.Z.Jorswieck and B.Ottersten, “Information and Energy Cooperation in Cognitive Radio Networks,”IEEE Trans.Signal Process.,vol.62, no.9, pp.2290-2303, May 2014.

    两个人的视频大全免费| 欧美日韩一区二区视频在线观看视频在线| 国产亚洲5aaaaa淫片| 少妇人妻久久综合中文| 亚洲高清免费不卡视频| 狠狠精品人妻久久久久久综合| 日韩欧美一区视频在线观看 | 日韩国内少妇激情av| 男的添女的下面高潮视频| 少妇丰满av| 久久久久人妻精品一区果冻| 少妇熟女欧美另类| 国产精品人妻久久久久久| 免费观看av网站的网址| 亚洲怡红院男人天堂| 久久精品久久精品一区二区三区| 美女高潮的动态| 免费人成在线观看视频色| 全区人妻精品视频| 最近最新中文字幕免费大全7| a级毛片免费高清观看在线播放| 中文字幕精品免费在线观看视频 | 精品国产露脸久久av麻豆| 美女主播在线视频| 91久久精品国产一区二区成人| 韩国av在线不卡| 亚洲av成人精品一区久久| 性高湖久久久久久久久免费观看| 日韩不卡一区二区三区视频在线| 一区二区三区免费毛片| 免费黄频网站在线观看国产| 大话2 男鬼变身卡| 精品久久久久久久久av| 亚洲精品第二区| h视频一区二区三区| 全区人妻精品视频| 九色成人免费人妻av| 免费观看的影片在线观看| 久久精品国产鲁丝片午夜精品| 亚洲色图av天堂| 3wmmmm亚洲av在线观看| 久久午夜福利片| 极品教师在线视频| 亚洲精华国产精华液的使用体验| 欧美激情极品国产一区二区三区 | 国精品久久久久久国模美| 国产69精品久久久久777片| kizo精华| 日本色播在线视频| 91久久精品国产一区二区成人| 一级av片app| 高清视频免费观看一区二区| 国产一区二区在线观看日韩| 久久久久性生活片| 日韩成人伦理影院| 美女主播在线视频| 亚洲va在线va天堂va国产| 亚洲av在线观看美女高潮| 99re6热这里在线精品视频| 亚洲av欧美aⅴ国产| 日韩三级伦理在线观看| 国产人妻一区二区三区在| 美女中出高潮动态图| av在线蜜桃| 亚洲一级一片aⅴ在线观看| 日韩欧美精品免费久久| 人妻 亚洲 视频| 亚洲激情五月婷婷啪啪| 久久久久久久精品精品| 伊人久久国产一区二区| 国产免费福利视频在线观看| 自拍欧美九色日韩亚洲蝌蚪91 | 在线观看人妻少妇| 中文天堂在线官网| 青春草亚洲视频在线观看| 人妻系列 视频| 亚洲精品一二三| 国产精品国产三级专区第一集| 男女国产视频网站| 国产一级毛片在线| 亚洲色图av天堂| 日本vs欧美在线观看视频 | 高清在线视频一区二区三区| 三级国产精品欧美在线观看| 舔av片在线| 国产视频内射| 国产白丝娇喘喷水9色精品| 日韩不卡一区二区三区视频在线| 欧美成人一区二区免费高清观看| 亚洲国产毛片av蜜桃av| 亚洲av日韩在线播放| 97在线视频观看| 午夜激情福利司机影院| 一个人看视频在线观看www免费| 亚洲欧美精品专区久久| 亚洲欧美日韩卡通动漫| 亚洲精品国产av成人精品| 国产精品免费大片| 国产男女超爽视频在线观看| 男女啪啪激烈高潮av片| 日韩中字成人| 国产男女内射视频| 美女福利国产在线 | 成年人午夜在线观看视频| 在线免费观看不下载黄p国产| 亚洲欧美一区二区三区国产| 2018国产大陆天天弄谢| 亚洲欧美日韩卡通动漫| 久久久久久久国产电影| 成人高潮视频无遮挡免费网站| 国产欧美亚洲国产| 国产精品偷伦视频观看了| 欧美另类一区| 六月丁香七月| 中文字幕精品免费在线观看视频 | 九九在线视频观看精品| 亚洲经典国产精华液单| 老司机影院毛片| 日本黄色日本黄色录像| 免费看光身美女| 精品一品国产午夜福利视频| 国产精品国产av在线观看| 亚洲av成人精品一区久久| 国产成人一区二区在线| 国产黄片美女视频| 亚洲欧美精品专区久久| 精品少妇久久久久久888优播| av女优亚洲男人天堂| 欧美成人午夜免费资源| 国产成人精品福利久久| 欧美精品人与动牲交sv欧美| 久久精品久久久久久噜噜老黄| a级毛片免费高清观看在线播放| 日本欧美国产在线视频| 内地一区二区视频在线| 高清视频免费观看一区二区| 身体一侧抽搐| 各种免费的搞黄视频| av国产精品久久久久影院| 在现免费观看毛片| 日韩 亚洲 欧美在线| 国产淫语在线视频| 久久精品人妻少妇| 97超视频在线观看视频| 日韩免费高清中文字幕av| 亚洲四区av| 中文字幕亚洲精品专区| 亚洲av综合色区一区| 亚洲国产精品成人久久小说| 欧美精品亚洲一区二区| 久久精品国产鲁丝片午夜精品| 在线观看人妻少妇| 精品亚洲成国产av| 日日啪夜夜爽| 乱码一卡2卡4卡精品| 欧美激情国产日韩精品一区| 亚洲精品久久久久久婷婷小说| 成人18禁高潮啪啪吃奶动态图 | 欧美区成人在线视频| av网站免费在线观看视频| 一级a做视频免费观看| 简卡轻食公司| tube8黄色片| 亚洲精品一二三| 久久99蜜桃精品久久| 亚洲真实伦在线观看| 国产午夜精品久久久久久一区二区三区| 日韩不卡一区二区三区视频在线| 免费av中文字幕在线| av国产久精品久网站免费入址| 中文乱码字字幕精品一区二区三区| 亚洲图色成人| 小蜜桃在线观看免费完整版高清| 人妻一区二区av| 亚洲久久久国产精品| av免费观看日本| 一边亲一边摸免费视频| 好男人视频免费观看在线| 亚洲精品第二区| 狠狠精品人妻久久久久久综合| 一级爰片在线观看| 免费观看av网站的网址| 丰满人妻一区二区三区视频av| 亚洲欧美精品专区久久| 噜噜噜噜噜久久久久久91| 成人无遮挡网站| 99久久精品国产国产毛片| 国产亚洲精品久久久com| 国产黄色视频一区二区在线观看| 欧美xxxx性猛交bbbb| 亚洲不卡免费看| 黄色视频在线播放观看不卡| 国产精品久久久久久精品电影小说 | 肉色欧美久久久久久久蜜桃| 身体一侧抽搐| 最近最新中文字幕大全电影3| 国产精品蜜桃在线观看| 免费黄网站久久成人精品| 国产91av在线免费观看| 又黄又爽又刺激的免费视频.| 美女高潮的动态| 国模一区二区三区四区视频| 99热这里只有是精品在线观看| 蜜桃在线观看..| 十八禁网站网址无遮挡 | 韩国高清视频一区二区三区| 又爽又黄a免费视频| 国产精品不卡视频一区二区| 中文字幕av成人在线电影| 这个男人来自地球电影免费观看 | 这个男人来自地球电影免费观看 | av播播在线观看一区| 久久99蜜桃精品久久| 少妇人妻一区二区三区视频| 精品久久久久久久久亚洲| 亚洲欧洲国产日韩| 日本vs欧美在线观看视频 | 亚洲国产精品专区欧美| 九色成人免费人妻av| 我要看日韩黄色一级片| 校园人妻丝袜中文字幕| 中文字幕亚洲精品专区| 国产精品99久久久久久久久| 人体艺术视频欧美日本| 成年美女黄网站色视频大全免费 | 亚洲国产最新在线播放| 日韩亚洲欧美综合| 久久精品国产亚洲网站| 蜜桃亚洲精品一区二区三区| 熟妇人妻不卡中文字幕| 中文在线观看免费www的网站| av专区在线播放| 亚洲久久久国产精品| 久久国产精品大桥未久av | 免费av不卡在线播放| 全区人妻精品视频| 亚洲精品亚洲一区二区| 欧美日韩在线观看h| 草草在线视频免费看| 亚洲av福利一区| 精品一区在线观看国产| 色视频在线一区二区三区| 久久韩国三级中文字幕| 成人无遮挡网站| 亚洲欧美一区二区三区国产| 妹子高潮喷水视频| 又爽又黄a免费视频| 80岁老熟妇乱子伦牲交| 国产精品99久久久久久久久| 色网站视频免费| 91午夜精品亚洲一区二区三区| 观看av在线不卡| 十分钟在线观看高清视频www | 九九在线视频观看精品| 亚洲激情五月婷婷啪啪| 日本色播在线视频| 免费不卡的大黄色大毛片视频在线观看| 一级黄片播放器| 99热全是精品| 亚洲精品一区蜜桃| 美女中出高潮动态图| 色5月婷婷丁香| 老司机影院毛片| 91午夜精品亚洲一区二区三区| 最新中文字幕久久久久| 国产欧美另类精品又又久久亚洲欧美| 国产精品精品国产色婷婷| 六月丁香七月| 精品人妻熟女av久视频| 国产91av在线免费观看| 在线观看免费视频网站a站| 久久久久国产网址| 日本-黄色视频高清免费观看| 蜜臀久久99精品久久宅男| 日本wwww免费看| 亚洲精品国产色婷婷电影| 91精品伊人久久大香线蕉| 下体分泌物呈黄色| 中文字幕免费在线视频6| av专区在线播放| 亚洲色图av天堂| 亚洲精品视频女| 亚洲av成人精品一二三区| 精品久久久久久久久av| 亚洲精品久久午夜乱码| 我要看黄色一级片免费的| 免费看av在线观看网站| 一个人免费看片子| 精品少妇黑人巨大在线播放| 欧美日韩一区二区视频在线观看视频在线| 亚洲精品亚洲一区二区| 亚洲av.av天堂| 青青草视频在线视频观看| 国内精品宾馆在线| 中文字幕亚洲精品专区| 久热这里只有精品99| 亚洲成人av在线免费| 日本与韩国留学比较| av又黄又爽大尺度在线免费看| 国产国拍精品亚洲av在线观看| 久久久久久久精品精品| 亚洲欧美中文字幕日韩二区| 亚洲图色成人| 亚洲国产精品999| 我的老师免费观看完整版| 男女下面进入的视频免费午夜| 精品久久久久久久久av| av国产久精品久网站免费入址| 色视频www国产| 成人综合一区亚洲| 黄色日韩在线| 黄片无遮挡物在线观看| 高清av免费在线| 午夜91福利影院| 国产成人欧美| 久久毛片免费看一区二区三区| 香蕉丝袜av| 久9热在线精品视频| 男女边吃奶边做爰视频| 国产在视频线精品| 黄色 视频免费看| 欧美黑人精品巨大| 你懂的网址亚洲精品在线观看| 麻豆国产av国片精品| 国产精品三级大全| 91九色精品人成在线观看| 飞空精品影院首页| 国产不卡av网站在线观看| 久久人妻福利社区极品人妻图片 | 精品福利观看| 欧美av亚洲av综合av国产av| 看十八女毛片水多多多| 国产精品偷伦视频观看了| 国产成人啪精品午夜网站| 精品国产国语对白av| 欧美 日韩 精品 国产| 国产av精品麻豆| 视频区图区小说| 久久精品成人免费网站| 国产亚洲欧美精品永久| 悠悠久久av| 在线天堂中文资源库| 亚洲国产中文字幕在线视频| 免费看av在线观看网站| 19禁男女啪啪无遮挡网站| 亚洲av成人精品一二三区| 亚洲色图综合在线观看| 在线观看人妻少妇| 波野结衣二区三区在线| 婷婷色综合大香蕉| 国产精品一区二区在线不卡| 另类精品久久| 两个人免费观看高清视频| 免费观看人在逋| 色婷婷av一区二区三区视频| 免费一级毛片在线播放高清视频 | 一本久久精品| 亚洲av成人不卡在线观看播放网 | 国产伦理片在线播放av一区| 国产精品久久久久久人妻精品电影 | 国产视频首页在线观看| 久久久久网色| 美女午夜性视频免费| 精品免费久久久久久久清纯 | 美女主播在线视频| 亚洲国产精品一区三区| 亚洲欧美日韩另类电影网站| 777久久人妻少妇嫩草av网站| 丁香六月天网| 人人妻人人澡人人爽人人夜夜| 波多野结衣一区麻豆| 精品第一国产精品| 男人舔女人的私密视频| 夫妻性生交免费视频一级片| 精品国产一区二区久久| 午夜日韩欧美国产| 亚洲av在线观看美女高潮| 汤姆久久久久久久影院中文字幕| 久久青草综合色| 免费少妇av软件| 波多野结衣一区麻豆| 中文字幕高清在线视频| 日韩中文字幕欧美一区二区 | 天堂8中文在线网| 在线观看www视频免费| 一本一本久久a久久精品综合妖精| 日韩av不卡免费在线播放| 黑人猛操日本美女一级片| 亚洲欧美中文字幕日韩二区| 久久狼人影院| 男女下面插进去视频免费观看| 久久久国产一区二区| 色婷婷久久久亚洲欧美| 欧美精品高潮呻吟av久久| 亚洲欧美一区二区三区黑人| 国产男人的电影天堂91| 亚洲一区中文字幕在线| 久久狼人影院| 日韩一本色道免费dvd| 国产成人啪精品午夜网站| 久久久久国产精品人妻一区二区| 国产精品久久久人人做人人爽| 亚洲av欧美aⅴ国产| 国产激情久久老熟女| 一二三四在线观看免费中文在| 国产又色又爽无遮挡免| 免费人妻精品一区二区三区视频| 国产精品三级大全| 一级黄片播放器| 叶爱在线成人免费视频播放| 777米奇影视久久| 伊人久久大香线蕉亚洲五| 亚洲色图 男人天堂 中文字幕| 一级a爱视频在线免费观看| 久久国产精品大桥未久av| 久久午夜综合久久蜜桃| 日韩一区二区三区影片| 美女脱内裤让男人舔精品视频| 各种免费的搞黄视频| 国产精品免费视频内射| 国产有黄有色有爽视频| 久久午夜综合久久蜜桃| 精品视频人人做人人爽| 母亲3免费完整高清在线观看| 人妻人人澡人人爽人人| 亚洲精品美女久久久久99蜜臀 | 久久久精品免费免费高清| 成年人黄色毛片网站| av在线播放精品| 丝瓜视频免费看黄片| 五月开心婷婷网| 91麻豆av在线| 日本五十路高清| 51午夜福利影视在线观看| av又黄又爽大尺度在线免费看| 九色亚洲精品在线播放| 国产成人一区二区在线| 视频区图区小说| 不卡av一区二区三区| 国产又色又爽无遮挡免| 欧美人与性动交α欧美精品济南到| 搡老乐熟女国产| 国产精品久久久久久精品古装| 欧美激情极品国产一区二区三区| 国产一区亚洲一区在线观看| 亚洲欧美日韩另类电影网站| 亚洲国产日韩一区二区| 国产成人免费观看mmmm| a级毛片黄视频| 人人妻人人爽人人添夜夜欢视频| 亚洲国产av影院在线观看| 久久精品亚洲熟妇少妇任你| 欧美97在线视频| 肉色欧美久久久久久久蜜桃| 成人18禁高潮啪啪吃奶动态图| 十八禁高潮呻吟视频| 欧美精品人与动牲交sv欧美| 一区二区三区四区激情视频| 免费少妇av软件| 男人操女人黄网站| 日韩免费高清中文字幕av| 宅男免费午夜| 一级毛片 在线播放| 久久久久久久大尺度免费视频| 免费人妻精品一区二区三区视频| 欧美人与性动交α欧美软件| 亚洲,欧美精品.| 亚洲精品自拍成人| 亚洲,一卡二卡三卡| 91麻豆精品激情在线观看国产 | 欧美变态另类bdsm刘玥| 91国产中文字幕| 免费在线观看视频国产中文字幕亚洲 | 9热在线视频观看99| 肉色欧美久久久久久久蜜桃| 亚洲精品久久午夜乱码| 久久国产精品男人的天堂亚洲| 亚洲精品日韩在线中文字幕| 91精品国产国语对白视频| 久久狼人影院| 美女主播在线视频| 亚洲一区中文字幕在线| 高清视频免费观看一区二区| 久久久久久亚洲精品国产蜜桃av| 侵犯人妻中文字幕一二三四区| 首页视频小说图片口味搜索 | 女人久久www免费人成看片| 亚洲综合色网址| 黄色 视频免费看| 免费观看av网站的网址| 精品一区二区三区av网在线观看 | 久久精品人人爽人人爽视色| 男女边吃奶边做爰视频| 伊人久久大香线蕉亚洲五| 亚洲av欧美aⅴ国产| 日日摸夜夜添夜夜爱| 欧美黑人精品巨大| 国产国语露脸激情在线看| 狂野欧美激情性bbbbbb| 午夜福利在线免费观看网站| 国产高清videossex| av天堂在线播放| 亚洲黑人精品在线| 两个人看的免费小视频| 亚洲 国产 在线| 亚洲av国产av综合av卡| 欧美乱码精品一区二区三区| 亚洲国产精品999| 大码成人一级视频| 午夜精品国产一区二区电影| 天天躁夜夜躁狠狠久久av| 9191精品国产免费久久| 欧美黑人精品巨大| 日韩一卡2卡3卡4卡2021年| 建设人人有责人人尽责人人享有的| 色网站视频免费| 成人18禁高潮啪啪吃奶动态图| 国产又色又爽无遮挡免| 亚洲综合色网址| 一个人免费看片子| 首页视频小说图片口味搜索 | 99热国产这里只有精品6| 黄色视频在线播放观看不卡| 国产男女超爽视频在线观看| 天堂8中文在线网| 国产成人系列免费观看| 国产一区二区在线观看av| 每晚都被弄得嗷嗷叫到高潮| 你懂的网址亚洲精品在线观看| 日日夜夜操网爽| 欧美激情 高清一区二区三区| 夫妻午夜视频| 亚洲av在线观看美女高潮| 色精品久久人妻99蜜桃| 高清不卡的av网站| 久久亚洲国产成人精品v| 一本—道久久a久久精品蜜桃钙片| 久久人人爽人人片av| 色网站视频免费| 啦啦啦在线免费观看视频4| 国产av一区二区精品久久| 亚洲伊人久久精品综合| 丰满饥渴人妻一区二区三| 永久免费av网站大全| 大片免费播放器 马上看| 欧美激情 高清一区二区三区| 成年女人毛片免费观看观看9 | 爱豆传媒免费全集在线观看| 999精品在线视频| 中国美女看黄片| 热99国产精品久久久久久7| 在线精品无人区一区二区三| 免费久久久久久久精品成人欧美视频| 在线观看一区二区三区激情| 一级毛片 在线播放| 精品人妻1区二区| 日韩中文字幕视频在线看片| 国产成人系列免费观看| 亚洲成国产人片在线观看| 亚洲第一av免费看| 国产男女内射视频| 男女无遮挡免费网站观看| av网站在线播放免费| 精品视频人人做人人爽| 午夜久久久在线观看| 亚洲精品久久成人aⅴ小说| 又粗又硬又长又爽又黄的视频| 精品人妻在线不人妻| 9色porny在线观看| 91麻豆精品激情在线观看国产 | 在线天堂中文资源库| 50天的宝宝边吃奶边哭怎么回事| 国产又色又爽无遮挡免| 国产精品一区二区免费欧美 | 中文字幕人妻丝袜制服| 下体分泌物呈黄色| 亚洲人成电影观看| 纯流量卡能插随身wifi吗| 久久久亚洲精品成人影院| 免费在线观看影片大全网站 | 人人妻人人添人人爽欧美一区卜| 女性生殖器流出的白浆| 国产免费视频播放在线视频| 精品国产一区二区三区久久久樱花| 婷婷色综合www| 少妇裸体淫交视频免费看高清 | 亚洲国产看品久久| 男女国产视频网站| 国产伦理片在线播放av一区| 国产日韩一区二区三区精品不卡| www.av在线官网国产| 午夜日韩欧美国产| 香蕉丝袜av| 欧美日韩av久久| 欧美精品一区二区免费开放| 另类精品久久| 亚洲国产av影院在线观看| 无遮挡黄片免费观看| 亚洲国产中文字幕在线视频| 黄片小视频在线播放| 一区二区三区四区激情视频| 成人亚洲欧美一区二区av| 国语对白做爰xxxⅹ性视频网站| 久久中文字幕一级| 一级黄片播放器| 日本午夜av视频| 精品人妻一区二区三区麻豆| 日韩中文字幕视频在线看片| 日韩欧美一区视频在线观看| 黑人欧美特级aaaaaa片| 岛国毛片在线播放| 咕卡用的链子| 最近最新中文字幕大全免费视频 | 久久精品成人免费网站| 纯流量卡能插随身wifi吗|