• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical system s

    2018-04-04 03:48:56QinxueLIBugongXUShanbinLIYongguiLIUDelongCUI
    Control Theory and Technology 2018年1期

    Qinxue LI,Bugong XU ,Shanbin LI,Yonggui LIU ,Delong CUI

    1.School of Automation Science and Engineering,South China University of Technology,Guangzhou Guang dong 510640,China;

    2.College of Computer and Electronic Inform ation,Guangdong University of Petrochemical Technology,Maoming Guangdong 525000,China

    1 Introduction

    The design of estimation and control algorithm s or strategies for cyber physical system s(CPS),which is resilient against malicious attacks is a new and hard work in recent years.Many researchers focus on designing the more resilient estimators and controllers[1–4]or attack-detection and identification technology[5,6]to reduce dam age from the attacks,but few researchers pay attention to reconstruction of the transmitted data from the sensors to estimators or from controllers to actuators,which is incomplete data after attacks.

    In general,the measurements from sensors are very important for state estimator and vulnerable to cyber attacks,which can be processed in two ways.The first w ay is that polluted(or corrupted)measurements are all received by state estimator,then anti-attack state estimators are designed elaborately.For example,state recovery technology is achieved by l1/lrdecoder[2],attack reconstruction[7,8]or state reconstruction[9,10],which is similar to the error correction and thus relevant techniques,such as signal separation,fault-tolerant or noise-tolerant state estimator,but all of these researches mentioned above must need the known model of state equation.Inspired by the idea of data reconstruction,we pay attention to the measurement reconstruction under the unknown model of state equation after discarding the polluted measurements.Therefore,discarding the polluted data is the second processing way for measurements,which is similar to remove outliers of data and lends to less and less clean measurements used by state estimator.With the reduction of clean measurements,large estimating errors or failures of the general anti-noise state estimator(such as Kalman,weighted least squares)will appear,hence the measurement reconstruction is necessary to be considered.

    In the case of unknown model of state equation,we focus on the reconstruction of measurements under cyber attacks,which is different from the idea of state reconstruction or resilient state estimator before.If the exchanged or transmitted measurements are reconstructed accurately under the cyber attacks,the design of secure state estimator is not the most important,which is a new idea to solve the security problem under malicious attacks for CPS(for instance,modern power system,namely smart grid[11]).In other words,we do not design the anti-attack state estimator but focus on reconstructing the enough measurements from the incomplete(or residual)clean measurements,including the triggering time of the reconstruction and high precision reconstruction method.Inspired by[12],the indirect and direct methods of state estimation are developed based on compressive sensing(CS),which reduce the burden of communication and data processing.Instead,the CS is draw n to restore the measurements from in complete but clean measurements under the cyber attacks scenario.

    It is very important to design the dictionary matrix for optimal sparse representation for measurements and the measurement matrix of CS.There are three main ways to obtain the dictionary matrix in CS[12–14].The first way is the traditional transformation basis,such as discrete wavelet trans form(DWT)basis[12],which is simple and fast but depends on whether or not the characteristics of the signal are consistent with the characteristics of the basis vectors.The second way is joint dictionary,in which vectors come from different classes of basis[13],whose effect is better than the first one but still not the best sparse representation.Finally,improved sparsity can be achieved by choosing the dictionary for the signals adaptively,that is,dictionary learning[14].For the design of measurement matrix,the Gauss or Bernoulli random matrices are usually proposed[12,15],which have a good effect in the field of image reconstruction before.In this paper several improvements have been done for the CS under the cyber attacks to CPS.

    The approaches and contributions of the paper are summarized as follows:

    ?For the polluted measurements under malicious attacks,the observability analysis is used to decide the time to trigger the reconstruction and the damage level from attacks.The reconstruction of measurements can be triggered as long as the damage level of the attacks makes the system losing observability,which can reduce computational burden.

    ?With unknown model of state equation,the improved CS is applied in reconstruction of measurements against deception attacks for CPS.In particular,the dictionary learning by K-singular value decomposition(KSVD)is proposed to form the over-completed dictionary matrix for the power measurements of power system,which never been adopted before in this field.

    ?Since the irregularity of residual measurements,instead of the traditional Gauss or Bernoulli random matrix,a kind of sampling matrix is designed as the measurement matrix of CS for specific CPS,such as power system,which improves the effect of reconstruction.

    ?A new state estimation strategy against the cyber attacks based on linear model is introduced in this paper,which can improve the resilience of system and is meaningful and different idea from the design of the resilient estimator with the known model of the state equation.

    As the typical CPS,security of the smart grid under malicious attacks is widely concerned.Therefore,we apply our proposed reconstruction method on smart grid(modern power system).The rest of this paper is organized as follow s.In Section 2,the general state estimation Model of power system(Section 2.1)and Gaussian Markov Random Field associated with attack detection and identification(Section 2.2)are introduced,and stealthy deception attacks strategy is described in Section 2.3.The attack detection and identification technology is presented in Section 3.1,which not only can detect the stealthy deception attacks but also identify the attacked nodes of system.Section 3.2 introduce observability analysis,which can decide the time to do the reconstruction and the dam age level from attacks.The reconstruction process of measurements is proposed in Section 3.3,including the design of over-completed dictionary and measurement matrix,in addition,recovery strategy is also chosen.The whole state estimation strategy is summarized in Section 3.4.Finally,in Section 4,qualitative and quantitative analyses of simulation experiments are completed on 6-bus power system to show the effect of our proposed method,and conclusion is seen in Section 5.

    Notation0nmeans a null vector of dimension n,and Indenotes that I is the identity matrix and n is the state dimension.b1∝b2denotes that b1is proportional to b2.For a vector ·,‖·‖0denotes the number of nonzero elements for this vector.‖·‖1and ‖·‖2denotes the 1-norm and 2-norm of the vector ·,respectively.∩ is used to denote the union set.Finally,diag{b3}denotes that the vector b3are diagonal elements of a matrix.

    2 Preliminaries and problem formulation

    The proposed overall framework in this paper is displayed in Fig.1.The parts in the dashed-line box of Fig.1 are our main works,which are also the proposed state estimation strategy and have a great contribution to improve the resilience of the strategy under cyber attacks.

    The state estimation strategy is applied to the power system in this paper,which is a major component of energy management systems(EMS)and relies on the supervisory control and data acquisition(SCADA).This is a process about optimal estimation for the power system state using noisy data from power meters and system para meters on the state estimation model.However,the measurements are collected by SCADA via remote terminal units(RTU),which is prone to the cyber attacks.We consider the stealthy deception attacks that consist of a set of com promised power meters whose readings are altered by the intelligent attacker,which lead to the polluted power measurements of nodes.The general state estimation model of the system and stealthy deception attack strategy is elaborated as follow s,respectively.In addition,the know ledge of a Gaussian Markov random field is introduced,which is the foundation for attack detection and identification method.

    Fig.1 The proposed overall framework.

    2.1 General system model

    The nonlinear measurement model of power system for state estimation(SE)is show n in(1),whose relationship between measurements and states in detail can be found in[16].

    where the state x=(θT,VT)Tdenote the phase angles and magnitudes of the bus voltage,the measurements z∈Rm,and e~N(0,R)is the measurement noise.

    To test the method proposed in this paper,a DC approximation model for the measurement equations(1)is adopted.Specifically,the DC model is obtained by assuming that all branch resistances and shunt elements are neglected.In addition,the bus voltage magnitudes are already known and all equal to 1 p.u.[16,17].With linear correlation between the measurements z and the state x(voltage phase angles θ in this paper),the DC model is given by

    1)If zk=Pij,then

    2)If zk=Pi,then

    w here the voltage phase angles x=θ∈Rn,H is the m easurem ent Jacobian m atrix.Pijis real power flow on line i?j.Piis real power injection at bus i.Niis the set of buses connected to bus i,and Xijdenote that the reactance of branch between nodes i and j.

    2.2 Gaussian Markov random field

    A Gaussian Markov random field(GMRF)[18]is a family whose factor is a finite-dimensional random vector following a Gaussian distribution according to a given graph G=(V,E),with V={1,2,...,n}.The vector of Gaussian random variables X=[x1,x2,...,xn]is considered,where each node i∈V is associated with a scalar Gaussian random variable xi.A probability density function of a GMRF can be parameterized as follows on G:

    w here J is the potential or information matrix,which is a positive-definite symmetric matrix.The sparsity pattern of J corresponds to that of the graph G.More precisely,

    and the vector h is a vertex potential vector.In general,graph G=(V,E)is known as the Markov graph(graphical model)underlying the joint probability distribution fX(x),where the node set V represents random variable set{xi}(voltage phase angle θiin this paper)and the edge set E is defined in order to satisfy the local Markov property.Σ represents covariance matrix for voltage phase angles.

    2.3 Stealthy deception attacks

    It assumes that the attacker can obtain the know ledge of the bus-branch model,and the goal of the attacker is to deceive the traditional bad data detection(BDD)(such as the largest normalized residual,LNR)and state estimator(SE)(such as the weighted least square)[19].The measurements are polluted as follows:

    where za∈Rmis the polluted measurements and a∈Rmis the attack vector.(7)assumes that a is independent of the measurement z in the network.However,(7)is not enough,the cost of attacks is always hoped to be lower.Therefore,the stealthy deception attack a with the minimum cost can be formulated by solving the problem

    Rem ark 1It is noted that the stealth of the(7)in power system have been proved in[20].Based on the(7)and the(8),the attacks should have some functions.First,the attack strategy is designed to ensure that the SE algorithm still converges under attacks.Second,the attacker hopes the estimated measurementis equal to the actual polluted measurementsuch that,which is more stringent for the practical nonlinear power system s,since the stealthy deception attacks is built on DC approximation model.Therefore,the limitations of this linear attack strategy mentioned in[19]should be considered,including varying model matrix H that is acquired by the attacker and saturation limits,which make sure the attack strategy(7)is optimal and stealth under the traditional BDD(LNR)and SE(WLS)for a practical nonlinear system.Therefore,the stealthy deception attacks are coordinated attacks,which need corrupt a set of measurements but not just the target measurements[19].

    Since the attacker is intelligent,we need m ore effective attack detection and identification technologies and state estimation strategies to resist the stealthy deception attacks,which is important for the subsequent supervisory control.

    3 Methodology

    3.1 Attack detection and identification

    The voltage phase angles(θ)in DC model can form a GMRF and argue that their Markov graph is dictated by the structure of pow er grid[18].Therefore,the conditional covariance test CM IT is introduced to learn the structure of the power grid.It should be noted that since the CMIT for structure learning of phase angle data is robust against measurement noise(see[18],Section IIIA),the measurement noise e can be ignored.From(2)and(5),we get

    where xais the vector of phase angles when the system is under attacks.H?1denotes the pseudo-inverse of matrix H.since a is independent on the measurement z,we have the covariance matrix as follows:

    When the attack occurs,the attacker tends to insert non-constant vectors a during some samples,since constant attack vectors could not follow the measurements in change during some samples to satisfy(7),which can be easily detected.Thus Σ(a,a)≠ 0 and

    It is showed that the Markov graph of the voltage angles θ is consistent with the power grid graph under no attack circum stances,but changes once the power grid has been attacked on(11)and(12).Hencea discrepancy between the calculated Markov graph under attacks and learned Markov graph under no attacks should trigger the attack alarm.The attack detection method can detect the stealthy deception attacks in Section 2.3,which is elaborated in[18].

    Moreover,the correlation anomaly metric[21]is used to identify the attacked nodes.As soon as the attack is detected,the anomaly score for each node is computed through differences between the attacked information matrix and the information matrix corresponding to the current topology of the power grid.The nodes with highest anomaly scores are announced as the nodes under attacks.This attack identification technology has been proved to be valid for stealthy deception attacks in Section 2.3[18].

    3.2 Observability analysis

    From the(8),it is easy to see that the attack vector is always sparse.Therefore,discarding few polluted measurements and isolating the attacked parts after attack detection and identification are feasible.However,less and less clean measurements could lend to large estimating errors or failures of the general anti-noise state estimator,which is the time to trigger the reconstruction of measurements.

    This section,the observability analysis of the CPS is used to decide the time to trigger the reconstruction and the damage level from attacks,which is based on orthogonal transformation algorithm,including checking observability,identifying critical measurements,determining observable/unobservable islands.Variable descriptions of observability analysis are shown in Table1.

    Table 1 Variable description about observability analysis.

    The algorithm[22]is presented as follow s:

    Step 1(Initialization) Set matrix W=In,vector U=0n.

    Fori=1:m(m is the dimension of the measurements).

    Step 2Calculate the dot productsj=1,...,n,namely,the dot products of the i throw of matrix H by the j th column of matrix W.

    Step 3If the first no n null valuecorresponding to a null element in position p on vector U is found,which indicate that the column p of Wis pivot,and then the p th component of vector U should be replaced by i.Else there is no such colum n,append i to vector V and vector Tito matrix S and go to Step 5.

    Step 4Update the matrix W.If j=p,W(:,p)=W(:,k=1,...,n.

    Step 5If i=m,end.Otherwise,i=i+1 and jumps to Step 2.

    End

    Step 6If Ucontain sonly one zero element,the state is observable;otherwise,it is not.

    3.3 Reconstruction of measurements

    Reconstruction of measurements is the foundation for state estimation,which can be achieved by CS in the paper.Through the learning of the measurement data under no attacks,the over-completed dictionary is formed to provide prior information for possible triggered reconstruction at any time.There are three steps in the reconstruction process,including design of the over completed dictionary(dictionary learning is proposed),compressive observation(how to design the measurement matrix in CS)and recovery of in completed data(power flow measurements z),where the first two steps are coding procedure and the last step is decoding procedure.The problem can be formulated as follows:recover s from know ledge of

    w here y∈Rm1(m1?m)are residual measurements data.Ψ is m1× m measurement matrix,and Φ is sparse transformation basis or dictionary matrix.As significant coefficient,s contains the representation sparse coefficients of the signal z(z=Φs)that must be a K-sparse vector(K<m1?m).A=ΨΦ is a sensing matrix.It is quite intuitive to recover s from know ledge of y by solving

    However,the fact is that there is certain error in the solution to(14),hence the optimization problem can be rep laced by a simple approximate solution:

    whereεis a very small constant.It should be pointed out that the algorithm s(14)and(15)are NP-hard,therefore,the l0norm is often substituted by the closest convex norm,namely the l1norm[23].Here the problem is equivalent to a much simpler linear programming problem.The measurement signals can be reconstructed by solving the following problem:

    In fact,(16)is equivalent to basis pursuit de-noising(BPDN)[24].In addition,regularized orthogonal matching pursuit(ROMP)[25],sparsity adaptive matching pursuit(SAMP)[26],basis pursuit(BP)and iterative thresholding(IS)[27]are adopted by researchers to completed the reconstruction.

    3.3.1 Design of over-completed dictionary

    From the described above,it is easy to find that the Ψ and Φ have key roles in the whole reconstruction process,especially Φ.Designing or choosing the Φ for optimal sparse representation for data,which is sim ilar to(14)and(15).In other words,the data must be sparse in some transform basis vectors.

    Rem ark 2The design of the dictionary for optimal sparse representation for data is extremely critical.The traditional transformation basis depends on whether or not the characteristics of the signal are consistent with the characteristics of the single basis vector,hence it has great limitation,such as discrete wavelet transform(DWT)basis[12],discrete cosine transform(DCT)[28]and so on.The joint dictionary includes different classes of basis[13],whose effect is better than the single basis but still has the similar problem with the traditional transformation basis.Therefore,im proved sparse representation in dictionary learning is formed adaptively according to the specific characteristics of signal,which has no limitations and is more suitable.

    In this paper,the dictionary learning on K-SVD algorithm is used to obtain the over-completed dictionary,which is generalization of the K-means clustering pro-cess.To better fit the data,the method alternates between sparse coding of the examples based on the current dictionary and a process of updating the dictionary atom s,completing not only the update of the dictionary but the update of the sparse representations,which render convergence[14].The K-SVD algorithm is adaptive and can work with any pursuit methods(e.g.,matching pursuit or basis pursuit).

    Assume that Φ ∈ Rm×Kdenote over-completed dictionary after training.z∈Rmand s∈RKis training samples and corresponding sparse representation coefficient vector.are M sets of training data samples.are M sets of coefficient vector.Thus the dictionary learning process can be represented as an optimization problem:

    where Tmaxis the maximum value of the number of nonzero entries in si.The dictionary learning process is described as follows:

    1)Initialization:there are two ways to initialization dictionary.First one is initialized by giving a traditional transformation basis dictionary(such as the DWT dictionary).The other one is initialized by the training sam p les them selves.

    2)Sparse coding:use any pursuit algorithm(such as BP)to compute the representation vectorsifor each ziby approximating the solution of

    3)Dictionary update:update dictionary Φ after fixed vector si.Denote vector ?kas k th column of Φ.The decomposition form of the sample sets can be expressed as

    Note that ωkis pointing to examples{zi}that use the atom ?k.Define Ωkas M × |ωk|matrix with ones on the(ωk(i),i)th entries and zeros elsewhere.Then there have the definitions as follows:

    where Ekandis shrinkage result by discarding of the zero entries,respectively.indicate a selection of error columns that correspond to examples who use the atom ?k.Thenis decomposed by SVD render thatwhere U and V are two mutually orthogonal matrices and Δ is diagonal matrix:

    Note that σi(i=1,2,...,r)is all nonzero singular value of,and r is the rank of the matrix.

    If Δ(1,1)is the maximum singular value of Δ,and then the atom ?kshould be rep laced by the first column of U.The coefficient vectoris updated by the first column of V multiplied by Δ(1,1),until the update of the atom ?kis finished.If the convergence condition is satisfied or to the maximum number of iterations that indicate a new over-completed dictionary will been done,otherwise go to Step 2).

    3.3.2 Designing measurement matrix and recovery strategy

    Due to the irregularity of in complete measurements or residual measurements,we can not select the traditional Gauss or Bernoulli random matrix as measurement matrix,which are widely used in image processing.In this paper,the sampling matrix Ψ(m1× m)is used as the measurement matrix,which is an under determined matrix.m1?m implies residual character of the measurements.We define that Z is the set of the residual measurements,C is the set of the complete measurements,which is our reconstruction target.i denote that the number of the residual measurements in Z,and j is the position number of the residual measurements in C.We have the sampling matrix Ψ as follows:

    To restore or reconstruct the measurements,the matrix A should meet the following restricted isometry property(RIP)[23]:

    Definition 1(Restricted isometry constant(RIC))For any K-sparse vector s and δk∈ (0,1),A has the RIP of order k such that

    It is noted that the RIC δ is always adopted in stead of the RIP,which is the sm allest value of the δk.

    In order to test the effect of our over-completed dictionary,recovery strategy should not contains only one recovery algorithm.As the last step of the reconstruction,the recovery algorithm in the paper are adopted including several algorithm s,such as BP,BPDN,ROMP,SAMP and iterative soft thresholding(IST),which can prove the universality of the method proposed.Note that the BP,BPDN,ROMP,SAMP and IST have been widely used in the field of image processing,which can be seen in[24–27,29].

    3.4 State estimation strategy

    The w hole state estimation strategy around in the dashed-line box of Fig.1 is presented as follow s:

    Algorithm flow(whole state estimation strategy)

    1)Receive the measurements and attack information(whether or not the nodes are attacked and the set of attacked nodes)from the attack detector(attack detection and identification).

    2)The observability analysis is run according to the measurements.

    3)If the system is observable,the Gauss-New ton’s method[16]is adopted in state estimator,otherwise,the measurements should be reconstructed by our proposed in Section 3.3:First,the over-completed dictionary can be formed by dictionary learning on K-SVD,namely,matrix Φ is obtained.Second,the measurement matrix Ψ is designed according to the actual situation,for instance,the information of attacked nodes.Third,the optimal s?is obtained by solving the problem(16)by the IST,since the effect of IST on data recovery is verified to be the best among the five recovery algorithms in simulation experiments.Finally,the z?can be calculated by(17).

    It should be noted that the whole state estimation strategy is a general solution,although our proposed state estimation strategy is based on linear model.

    4 Simulation experiments

    The IEEE 6-bus power system[30]is considered to investigate the effect of the proposed method,which includes 3 generators,6 buses,8 transmission lines.The measurement configuration of a6-bus powersy stem are shown in Fig.2.If there is no attacks,7 power flow measurements({P12,P14,P24,P25,P36,P45,P56})are transmitted to state estimator.However,owing to the stealthy deception attacks,some of measurements could be discarded after attack detection and identification,the residual measurements are called incomplete measurements,which need be restored to 7 original power flow measurements to ensure precision of SE.Sinceat tack detection and identification in Section 3.1 has been proved to detect the attacks in Section2.3 and identify the attacked nodes successfully in[18],we pay main attention to the reconstruction method of measurements in this paper.

    Fig.2 Measurement configuration of a 6-bus power system.

    Two cases in simulation experiments are considered,which are shown in Table2.Define η =m1/m×100%,which indicate the damage level from attacks,where m1denotes the number of available clean measurements(some measurements could have been discarded as soon as possible once corresponding nod es are attacked nodes that should be isolated),m is 7 that denotes maxim um number of measurements(assume that there is no packet loss and delay).In case 1,there are 4 available clean measurements(U={P14,P36,P45,P56}),which lead the system to be unobservable,where the observability analysis method in Section3.2 is em ployed.With less available measurements,the system also loses observability in case 2.Hence the proposed reconstruction method in Section 3.3 should be used to restore the measurements for cases 1 and 2.

    Table 2 Available measurements and observability in detail for cases.

    4.1 Simulation experiment analysis in a highly coherent dictionary

    As mentioned in Section 3.3.1,the over-completed dictionary(OcD)can be initialized by giving a traditional transformation basis dictionary(such as the DST or the joint dictionary)or the training samples themselves.Through experiments,we find that different initialization methods influence the coherence of the atoms of the dictionary and the effects of reconstruction directly.At first,the training samples are adopted as the initial dictionary,which is better theoretically but lend to a highly coherent dictionary in this application scenario.

    4.1.1 Simulation experiment analysis for over-completed dictionary

    In the reconstruction process,the effect of OcD proposed in this paper and the joint dictionary(JD)are com pared.In the JD,many sparse bases(discrete cosine transform(DCT),discrete sine transform(DST),discrete Fourier transform(DFT),discrete wavelet transform(DWT),discrete Hartley transform(DHT),discrete Wtrans form(DWT))are em braced as far as possible to improve sparse representation,where the orthogonal matching pursuit(OMP)is em ployed to select optimal sparse basis to form the final JD.Fur therm ore,the BP and BPDN,ROMP,SAMP,IST are all introduced to display the reconstruction results at last sampling time in Fig.3 when m1=2(case 2),where “Original”are the 7 original power flow measurements that the reconstruction process wants to fit.

    From Fig.3,we observe that reconstruction effect under OcD proposed in this paper(Fig.3(b))is obviously better than the effect under the JD(Fig.3(a)),whatever how many sparse bases are embraced in the JD.That is because the dictionary learning proposed in this paper is flexible and adaptive in essence and is not formed by the fixed property sparse bases,which bring the optimal performance.Especially in the case 2,only 29%available clean measurements are left,the five recovery algorithm s still restore the measurements well(Fig.3(b)).

    where zjandis reconstruction targeted values and reconstruction values of measurements,respectively.

    Fig.3(a)The reconstruction of measurement values on JD;and(b)The reconstruction of measurement values on OcD proposed in this paper,when m1=2(number of the remaining measurements).

    In order to give a full exhibition for the superiority of OcD,the integrated normalized absolute error(INAE)is introduced for the quantitative analysis.

    Only one sampling time is not enough,hence Fig.4 disp lay the INAE of reconstruction on JD(Fig.4(a))and OcD(Fig.4(b))at 10 sampling times respectively,when m1=2.The maximum of INAE of reconstruction on JD is about 1.37 in Fig.4(a)for ROMP and SAMP at 10th sampling time,while the maximum of INAE of reconstruction on OcD is about 0.15 in Fig.4(b)for BPDN at 10th sampling time.The maximum in Fig.4(a))is more than 9 times as much as the maxim um in Fig.4(b).

    In addition,the exact quantitative analysis(mean value of INAE for 10 sampling times)for reconstruction process is shown in Table3 for both cases1 and 2.Either in case 1 or case 2,the mean values of INAE on OcD(Mean-INAE-OcD)are all more Lower than the mean values of INAE on JD(Mean-INAE-JD)by five recovery algorithm s,where the mean values of INAE on OcD by IST are lowest among the five recovery algorithm s both in cases1 and 2.In other words,the effect of IST on OcD for data recovery can be verified to be the best among the five recovery algorithm s in Table3.Therefore,from Fig.4 and Table3,the superiority of OcD proposed in this paper is reflected further.

    Fig.4(a)The INAE of reconstruction on JD at 10 sampling times;and(b)The INAE of reconstruction on OcD at 10 sampling times,when m1=2(number of the available clean measurements).

    Table 3 Quantitative analysis(mean value of INAE for 10 sampling times)for reconstruction process.

    4.1.2 Simulation experiment analysis for measurement matrix

    In order to choose the most suitable measurement matrix for the reconstruction process in this paper and verify our theoretical analysis results,the influence of the chosen measurement matrix on the reconstruction of measurements by IST under the OcD is shown in Fig.5.Three kinds of measurement matrices are compared,including the traditional Gauss random matrix,Bernoulli random matrix and the sampling matrix proposed in this paper.It is noted that the first two kinds of measurement matrix are widely applied to image processing,but under this reconstruction scenario,the proposed sampling matrix can fit reconstruction targeted values perfectly,which is m ore suitable than the two traditional measurement matrixes in Fig.5.

    Fig.5 The influence of the chosen measurement matrix on the reconstruction of measurements by IST under the OcD.

    Finally,significance of reconstruction for measurements is displayed in Fig.6 through the results of the error of state estimator for voltage phase angle(Va).The maximal error of state estimator for Va(?)under no reconstruction is about 11.78 at the 6th sampling time,while the corresponding maximal error under reconstruction by our method in this paper is only 0.5848 at the 7th sampling time.In summary,the proposed reconstruction method for measurements and state estimation strategy improve the accuracy of state estimation under the malicious intelligence attacks extremely.

    Fig.6(a)Error of state estimator for Va(?)under no reconstruction;and(b)Error of state estimator for Va(?)under reconstruction by our proposed method in this paper,when m1=2.

    Rem ark 3From the analysis results above,the measurements are reconstructed well by the method proposed,especially by the IST.In other words,state estimation strategy on reconstruction of the measurements is more resilient to the intelligence attacks,which has certain self-recovery capability when received measurements are polluted by malicious attackers.However,the RIC value of the IST is maximum value among the five recovery algorithm s,whose performance is the best one.What is the reason for this result?From[31]and[32],there are two kinds of recovery algorithms,that are the greedy algorithm s(such as OMP and BP)and the convex optimization algorithms(such as IST),where the effects of the greedy algorithm s largely depend on the lowly coherent atoms of the dictionary,while the convex optimization algorithms maybe not,instead,the convex optimization algorithm s maybe have perfect performance on the highly coherent dictionary,like the IST in this paper,which can reconstruct the power flow measurements beyond the RIP constraint.In the next section,the simply simulation experiments analysis on lower coherent dictionary are completed for comparison.

    4.2 Simulation experiment analysis in a lower coherent dictionary

    In this section,the OcD is initialized by giving a traditional transformation basis(such as the DST mentioned before),the RIC value of BP,BPDN,ROMP,SAMP and IST are 0.1297,0.5899,?0.6043,?0.6043 and 0.1297,which show the success rate of reconstruction of BP and IST are the possible highest.The INAE of reconstruction on JD and OcD(initialized by the DST)at 10 sampling times are shown in Fig.7.

    The good perform an ce of the proposed method is also proved from Fig.7,although there are some different effects for the five recovery algorithms.

    Fig.7 (a)The INAE of reconstruction on JD at 10 sampling times;and(b)The INAE of reconstruction on OcD at 10 sampling times,when m1=2(number of the available clean measurements).

    5 Conclusions

    In this paper,the resilience of state estimation strategy in cyber physical systems under intelligent stealthy deception attacks is studied.We do not focus on design of the state estimator but on reconstruction of the residual measurements with the unknown model of state equation.The dictionary learning by K-SVD is introduced to form the over-completed dictionary for the measurements.Furthermore,different from CS in image processing,a special sampling matrix is designed as the measurement matrix to improve the performance of reconstruction.Simulation experiments of two cases for 6-bus power system show that not only the proposed over-completed dictionary(OcD)is more flexible and adaptive than the joint dictionary but also effect of the designed measurement matrix on the reconstruction of measurements by IST under the OcD is much better than that of traditional Gauss and Bernoulli random matrix.In addition,the results of qualitative and quantitative analyses indicate that the measurements are re-stored very well on our proposed method by five general recovery algorithm s,even when 29%available measurements are left.The proposed method in this paper p lay a key role in the whole state estimation strategy.In a word,from a new perspective,the resilience of state estimation strategy is improved.

    In the future,the distributed reconstruction method of state estimation strategy for large scale CPSs will be focused on.In addition,there are some unsolved problem in the paper will be studied,such as reconstruction conditions for IST on highly coherent dictionary except for RIP,which indicates that there are more or less differences between theory and application.

    [1]S.Z.Yong,M.Q.Foo,E.Frazzoli.Robust and resilient estimation for cyber-physical systems under adversarial attacks.Proceedings of the American Control Conference,Boston:IEEE,2016:308–315.

    [2]H.Fawzi,P.Tabuada,S.Diggavi.Secure estimation and control for cyber-physical systems under adversarial attacks.IEEE Transactions on Automatic Control,2014,59(6):1454–1467.

    [3]Y.Yuan,F.Sun,H.Liu.Resilient control of cyber-physical systems against intelligent attacker:a hierarchal stackelberg game approach.International Journal of System s Science,2016,47(9):2067–2077.

    [4]A.Teixeira,I.Sham es,H.Sandberg,et al.A secure control fram ework for resource-lim ited adversaries.Autom atica,2015,51:135–148.

    [5]F.Pasqualetti,F.Dorfler,F.Bullo.Attack detection and identification in cyber-physical systems.IEEE Transactions on Automatic Control,2013,58(11):2715–2729.

    [6]Y.Mo,S.Weerakkody,B.Sinopoli.Physical authentication of control system s:Designing watermarked control inputs to detect counterfeit sensor outputs.IEEE Control System s Magazine,2015,35(1):93–109.

    [7]Q.Hu,D.Fooladivanda,Y.H.Chang,et al.Secure state estimation for nonlinear power systems under cyber attacks.Proceedings of the American Control Conference,Seattle:IEEE,2016:2779–2784.

    [8]W.Ao,Y.Song,C.Wen.Adaptive cyber-physical system attack detection and reconstruction with application to power systems.IET Control Theory and Applications,2016,10(12):1458–1468.

    [9]Y.H.Chang,Q.Hu,C.J.Tomlin.Secure estimation based Kalm an filter for cyber-physical systems against adversarial attacks.arXiv.2015:arXiv:1512.03853[cs.SY].

    [10]Y.Shoukry,P.Tabuada.Event-triggered state observers for sparse sensor noise/attacks.IEEE Transactions on Automatic Control,2016,61(8):2079–2091.

    [11]G.Wu,J.Sun,J.Chen.A survey on the security of cyber-physical system s.Control Theory and Technology,2016,14(1):2–10.

    [12]S.M.S.Alam,B.Natarajan,A.Pahwa.Distribution grid state estimation from com pressed measurements.IEEE Transactions on Sm art Grid,2014,5(4):1631–1642.

    [13]M.Elad.Sparse and Redundant Representations:From Theory to Applications in Signal and Im age Processing.New York:Springer,2010.

    [14]M.Aharon,M.Elad,A.Bruckstein.K-SVD:An algorithm for designing over complete dictionaries for sparse representation.IEEE Transactions on Signal Processing,2006,54(11):4311–4322.

    [15]V.Pudi,A.Chattopadhyay,T.Srikanthan.Modified projected Land weber method for compressive-sensing reconstruction of images with non-orthogonal matrices.International Symposium on Integrated Circuits(ISIC).Singapore:IEEE,2016:1–4.

    [16]A.Abur,A.G.Exposito.Pow er System State Estimation:Theory and Implementation.New York:CRC Press,2004.

    [17]A.Minot,N.Li.A fully distributed state estimation using matrix splitting methods.Proceedings of the American Control Conference,Chicago:IEEE,2015:2488–2493.

    [18]H.Sedghi,E.Jonckheere.Statistical structure learning to ensure data integrity in smartgrid.IEEE Transactions on Smart Grid,2015,6(4):1924–1933.

    [19]A.Teixeira,G.Dán,H.Sandberg,et al.A cyber security study of a SCADA energy management system:Stealthy deception attacks on the state estimator.IFAC Proceedings Volumes,2011,44(1):11271–11277.

    [20]Y.Liu,P.Ning,M.K.Reiter.False data injection attacks against state estimation in electric power grids.ACM Transactions on Information and System Security,2011,14(1):DOI 10.1145/1952982.1952995.

    [21]T.Idé,A.C.Lozano,N.Abe,et al.Proximity-based anomaly detection using sparse structure learning.Proceedings of the SIAM international Conference on Data Mining.Sparks:SIAM,2009:97–108.

    [22]E.Castillo,A.J.Conejo,R.E.Pruneda,et al.Observability analysis in state estimation:A unified numerical approach.IEEE Transactions on Power System s,2006,21(2):877–886.

    [23]Y.C.Eldar,G.Kutyniok(eds.).Com pressed Sensing:Theory and Applications.New York:Cambridge University Press,2012.

    [24]P.R.Gill,A.Wang,A.Molnar.The in-crow d algorithm for fast basis pursuit denoising.IEEE Transactions on Signal Processing,2011,59(10):4595–4605.

    [25]J.Wang,B.Shim.On the recovery limit of sparse signals using orthogonal matching pursuit.IEEE Transactions on Signal Processing,2012,60(9):4973–4976.

    [26]T.T.Do,L.Gan,N.Nguyen,et al.Sparsity adaptive matching pursuit algorithm for practical com pressed sensing.The 42nd Asilomar Conference on Signals,System s and Com puters.Pacific Grove:IEEE,2008:581–587.

    [27]T.Blum ensath,M.E.Davies.Iterative thresholding for sparse approximations.Journal of Fourier Analysis and Applications,2008,14(5/6):629–654.

    [28]T.H.Kim,R.M.Narayanan.Compressive sensing based image reconstruction for synthetic aperture radar using discrete cosine transform and noiselets.2015 38th International Conference on Telecommunications and Signal Processing(TSP).Prague:IEEE,2015:582–586.

    [29]J.M.Bioucas-Dias,M.A.T.Figueiredo.A new TwIST:Two-step iterative shrinkage/thresholding algorithms for image restoration.IEEE Transactions on Image Processing,2007,16(12):2992–3004.

    [30]R.D.Zimmerman,C.E.Murillo-Sánchez,R.J.Thom as.MATPOWER:Steady-state operations,planning,and analysis tools for power systems research and education.IEEE Transactions on Power System s,2011,26(1):12–19.

    [31]H.Zhao,X.Ni.Redundant dictionaries of com pressed sensing and an application algorithm of iterative soft threshold.Journal of Circuits and System s,2013,18(1):59–64.

    [32]A.Huang.Sparse Recovery Algorithms Based on Sensing Directionary.Ph.D.dissertation.Chengdu:University of Electronic Science and Technology of China,2011.

    九色成人免费人妻av| 18禁美女被吸乳视频| 啦啦啦免费观看视频1| 久久精品国产自在天天线| 97人妻精品一区二区三区麻豆| 亚洲 欧美 日韩 在线 免费| 日本 av在线| 天堂√8在线中文| 亚洲av熟女| 成人av在线播放网站| 国内久久婷婷六月综合欲色啪| 国产午夜精品论理片| 亚洲av二区三区四区| 久久国产乱子伦精品免费另类| 欧美一区二区国产精品久久精品| 99在线视频只有这里精品首页| 校园春色视频在线观看| 日韩国内少妇激情av| 一区二区三区高清视频在线| 亚洲精品美女久久久久99蜜臀| 51午夜福利影视在线观看| 国产麻豆成人av免费视频| 精品久久久久久久久久免费视频| 午夜福利在线观看免费完整高清在 | 亚洲熟妇熟女久久| 熟女少妇亚洲综合色aaa.| 国产精华一区二区三区| 精品欧美国产一区二区三| 欧美黄色淫秽网站| 国产高清三级在线| 日本熟妇午夜| 国产在线精品亚洲第一网站| 国产单亲对白刺激| 久久久久精品国产欧美久久久| 天堂网av新在线| 国产激情偷乱视频一区二区| 国产午夜精品论理片| 白带黄色成豆腐渣| 国产亚洲精品久久久久久毛片| 老汉色∧v一级毛片| 国产三级中文精品| 国产成人系列免费观看| 免费av毛片视频| 国产三级黄色录像| 亚洲欧美日韩卡通动漫| 国模一区二区三区四区视频| 久9热在线精品视频| 欧美丝袜亚洲另类 | 亚洲av免费在线观看| 狠狠狠狠99中文字幕| av片东京热男人的天堂| 免费看光身美女| 亚洲精品在线观看二区| 日本免费a在线| 亚洲成人久久爱视频| 午夜精品一区二区三区免费看| 中文亚洲av片在线观看爽| 亚洲美女视频黄频| 色播亚洲综合网| 国产精品久久久久久久久免 | 99久久九九国产精品国产免费| 色在线成人网| 亚洲av第一区精品v没综合| 午夜激情福利司机影院| 淫妇啪啪啪对白视频| 国产精品亚洲一级av第二区| 日韩欧美三级三区| 国产欧美日韩一区二区精品| 免费一级毛片在线播放高清视频| 国产三级在线视频| 国产黄色小视频在线观看| 一本久久中文字幕| 99精品久久久久人妻精品| 毛片女人毛片| 久久久久久人人人人人| 久久欧美精品欧美久久欧美| www.999成人在线观看| 一个人免费在线观看电影| 亚洲五月婷婷丁香| 久久久国产成人精品二区| 久久久久精品国产欧美久久久| 蜜桃亚洲精品一区二区三区| 人妻丰满熟妇av一区二区三区| 99国产精品一区二区三区| 亚洲av二区三区四区| 熟女电影av网| 一级a爱片免费观看的视频| 国产精品日韩av在线免费观看| 日韩欧美一区二区三区在线观看| 亚洲真实伦在线观看| 男女下面进入的视频免费午夜| 久久精品影院6| 69人妻影院| 成年人黄色毛片网站| 国产精品亚洲av一区麻豆| 精品久久久久久成人av| av专区在线播放| 首页视频小说图片口味搜索| 免费看日本二区| 欧美一级a爱片免费观看看| 国产精品乱码一区二三区的特点| 国产高潮美女av| 欧美bdsm另类| 欧美在线黄色| eeuss影院久久| 亚洲 欧美 日韩 在线 免费| 国产亚洲av嫩草精品影院| 国产亚洲av嫩草精品影院| 最新在线观看一区二区三区| 国产探花在线观看一区二区| 国产亚洲精品av在线| 啦啦啦韩国在线观看视频| 激情在线观看视频在线高清| 日韩欧美 国产精品| 97人妻精品一区二区三区麻豆| 宅男免费午夜| 超碰av人人做人人爽久久 | 色视频www国产| 九色国产91popny在线| 特级一级黄色大片| 女同久久另类99精品国产91| 久久国产乱子伦精品免费另类| 国产亚洲欧美在线一区二区| 国产精品 国内视频| 午夜激情福利司机影院| 手机成人av网站| www.色视频.com| 嫁个100分男人电影在线观看| 淫妇啪啪啪对白视频| 国产精品综合久久久久久久免费| 欧美性感艳星| 久久久久精品国产欧美久久久| 欧美日韩黄片免| 国产亚洲欧美在线一区二区| 色av中文字幕| 亚洲电影在线观看av| 九色成人免费人妻av| 国内精品久久久久久久电影| 老司机在亚洲福利影院| 欧美黑人欧美精品刺激| 日本黄色片子视频| 亚洲中文字幕日韩| 国内毛片毛片毛片毛片毛片| www.熟女人妻精品国产| 亚洲国产精品合色在线| 国产精品香港三级国产av潘金莲| 国产成年人精品一区二区| 欧美绝顶高潮抽搐喷水| av视频在线观看入口| 亚洲,欧美精品.| 长腿黑丝高跟| 香蕉丝袜av| 观看美女的网站| 女警被强在线播放| 欧洲精品卡2卡3卡4卡5卡区| 亚洲国产日韩欧美精品在线观看 | 99国产精品一区二区蜜桃av| 亚洲成人久久爱视频| 级片在线观看| 内射极品少妇av片p| 身体一侧抽搐| 美女黄网站色视频| 欧美成人性av电影在线观看| 国产精品美女特级片免费视频播放器| 蜜桃亚洲精品一区二区三区| 国产精品一区二区三区四区免费观看 | 国产蜜桃级精品一区二区三区| 69av精品久久久久久| 欧美中文日本在线观看视频| 国产色婷婷99| 国产亚洲精品av在线| 两个人的视频大全免费| 国产精品av视频在线免费观看| 哪里可以看免费的av片| 久久亚洲真实| 99久久精品国产亚洲精品| 国产高清三级在线| 亚洲国产精品合色在线| 精品国产亚洲在线| 18禁国产床啪视频网站| 母亲3免费完整高清在线观看| 99久久精品国产亚洲精品| 成人精品一区二区免费| 国产免费一级a男人的天堂| 久久久久久久久久黄片| 可以在线观看的亚洲视频| 亚洲一区二区三区不卡视频| 美女高潮喷水抽搐中文字幕| 亚洲欧美精品综合久久99| av天堂中文字幕网| 欧美性猛交黑人性爽| 最新在线观看一区二区三区| 麻豆成人av在线观看| 色综合站精品国产| 人妻久久中文字幕网| 1000部很黄的大片| 成熟少妇高潮喷水视频| 欧美最新免费一区二区三区 | 最近视频中文字幕2019在线8| 人妻久久中文字幕网| 人妻夜夜爽99麻豆av| 69人妻影院| 亚洲欧美日韩高清在线视频| 在线观看一区二区三区| 1024手机看黄色片| 精品久久久久久成人av| 天堂网av新在线| 高潮久久久久久久久久久不卡| 激情在线观看视频在线高清| 亚洲成人精品中文字幕电影| 舔av片在线| 97超级碰碰碰精品色视频在线观看| 波多野结衣巨乳人妻| 久久久久久九九精品二区国产| 久久精品影院6| 欧美成狂野欧美在线观看| 亚洲精品国产精品久久久不卡| 丰满乱子伦码专区| 亚洲成人久久爱视频| 成人一区二区视频在线观看| 全区人妻精品视频| 亚洲18禁久久av| 亚洲五月婷婷丁香| 久久国产精品人妻蜜桃| 在线十欧美十亚洲十日本专区| 美女免费视频网站| 国产蜜桃级精品一区二区三区| 亚洲精品国产精品久久久不卡| 少妇人妻精品综合一区二区 | 中文字幕av在线有码专区| 日韩人妻高清精品专区| 宅男免费午夜| 亚洲人成伊人成综合网2020| 午夜视频国产福利| 国产午夜精品久久久久久一区二区三区 | 精品一区二区三区视频在线 | 色吧在线观看| 国产伦人伦偷精品视频| 99久国产av精品| 美女被艹到高潮喷水动态| 亚洲av成人不卡在线观看播放网| 少妇人妻一区二区三区视频| 亚洲精品粉嫩美女一区| 99久久精品国产亚洲精品| 欧美乱码精品一区二区三区| 亚洲乱码一区二区免费版| 一个人免费在线观看电影| 亚洲不卡免费看| 人妻夜夜爽99麻豆av| 俄罗斯特黄特色一大片| 午夜福利成人在线免费观看| 一级黄色大片毛片| 天堂动漫精品| 很黄的视频免费| 日本熟妇午夜| 岛国视频午夜一区免费看| 在线观看日韩欧美| 99久久99久久久精品蜜桃| av中文乱码字幕在线| 色精品久久人妻99蜜桃| 亚洲在线观看片| 大型黄色视频在线免费观看| 久久久精品欧美日韩精品| 成熟少妇高潮喷水视频| 亚洲成人免费电影在线观看| 亚洲精品美女久久久久99蜜臀| av片东京热男人的天堂| 99久久九九国产精品国产免费| 久久中文看片网| www.www免费av| 中文字幕久久专区| 亚洲成人久久性| 日韩欧美免费精品| 亚洲久久久久久中文字幕| 亚洲av五月六月丁香网| 18禁国产床啪视频网站| 亚洲av免费高清在线观看| 在线播放无遮挡| 一级a爱片免费观看的视频| 欧美成人性av电影在线观看| 国产久久久一区二区三区| 午夜福利在线观看免费完整高清在 | 久久久久九九精品影院| 精品午夜福利视频在线观看一区| 欧美乱码精品一区二区三区| 国产午夜精品久久久久久一区二区三区 | 国产av一区在线观看免费| 婷婷亚洲欧美| 欧美午夜高清在线| 成人av在线播放网站| 亚洲va日本ⅴa欧美va伊人久久| 一区福利在线观看| 久久午夜亚洲精品久久| 亚洲久久久久久中文字幕| 亚洲成人免费电影在线观看| 国产av不卡久久| 非洲黑人性xxxx精品又粗又长| 国产伦在线观看视频一区| 国产精品av视频在线免费观看| 嫁个100分男人电影在线观看| 国产探花在线观看一区二区| av福利片在线观看| 国产精品一区二区免费欧美| 成人国产综合亚洲| 午夜a级毛片| 免费人成视频x8x8入口观看| 首页视频小说图片口味搜索| 成人永久免费在线观看视频| 美女免费视频网站| 欧美在线一区亚洲| 国产综合懂色| 日韩人妻高清精品专区| 欧美性感艳星| 欧美极品一区二区三区四区| 熟女电影av网| АⅤ资源中文在线天堂| 午夜激情欧美在线| 欧美+日韩+精品| 国产主播在线观看一区二区| 桃红色精品国产亚洲av| 成人欧美大片| 亚洲美女黄片视频| 99国产精品一区二区蜜桃av| 日本一本二区三区精品| 精品人妻1区二区| 最近最新免费中文字幕在线| 激情在线观看视频在线高清| а√天堂www在线а√下载| 天堂av国产一区二区熟女人妻| 88av欧美| 国产在线精品亚洲第一网站| 国产精品一及| 亚洲欧美精品综合久久99| 又粗又爽又猛毛片免费看| 桃红色精品国产亚洲av| 国产精品亚洲一级av第二区| 十八禁人妻一区二区| 在线十欧美十亚洲十日本专区| 亚洲精品粉嫩美女一区| 精品国内亚洲2022精品成人| 久久久久久久久久黄片| 日韩欧美国产在线观看| 人人妻人人澡欧美一区二区| 午夜老司机福利剧场| 人妻丰满熟妇av一区二区三区| 精品人妻偷拍中文字幕| 91久久精品国产一区二区成人 | 最新美女视频免费是黄的| 一进一出抽搐gif免费好疼| 淫秽高清视频在线观看| 99久国产av精品| 欧美日韩综合久久久久久 | 级片在线观看| 欧美+亚洲+日韩+国产| 制服丝袜大香蕉在线| 99久久成人亚洲精品观看| 成人av一区二区三区在线看| 精品免费久久久久久久清纯| 免费人成在线观看视频色| 日韩成人在线观看一区二区三区| 亚洲五月婷婷丁香| 国产伦在线观看视频一区| 一进一出好大好爽视频| 美女高潮的动态| 国产视频一区二区在线看| 女生性感内裤真人,穿戴方法视频| 狂野欧美激情性xxxx| 亚洲 欧美 日韩 在线 免费| 黄色视频,在线免费观看| 18+在线观看网站| 色综合站精品国产| 91九色精品人成在线观看| 亚洲国产欧美人成| 小蜜桃在线观看免费完整版高清| 综合色av麻豆| 人人妻人人看人人澡| 十八禁网站免费在线| 久久久久久久亚洲中文字幕 | a在线观看视频网站| 变态另类成人亚洲欧美熟女| 日韩高清综合在线| 国产乱人伦免费视频| 欧美zozozo另类| 欧美日韩瑟瑟在线播放| 国产精品 国内视频| 757午夜福利合集在线观看| 亚洲av第一区精品v没综合| 欧美日韩国产亚洲二区| 免费观看人在逋| 国产亚洲精品一区二区www| 观看美女的网站| 熟妇人妻久久中文字幕3abv| 精品免费久久久久久久清纯| 亚洲av五月六月丁香网| 久久亚洲真实| 国产精品亚洲一级av第二区| 高清毛片免费观看视频网站| 国产99白浆流出| 国产精品嫩草影院av在线观看 | 国产高清三级在线| 97超视频在线观看视频| 国产高清三级在线| 国产成年人精品一区二区| 久久久精品大字幕| 哪里可以看免费的av片| 国产精品野战在线观看| 麻豆国产97在线/欧美| 99热这里只有是精品50| 床上黄色一级片| 亚洲av中文字字幕乱码综合| 久久久久久国产a免费观看| 国产激情欧美一区二区| 亚洲精品粉嫩美女一区| 亚洲一区二区三区不卡视频| 一夜夜www| 成人国产综合亚洲| 国产精品 国内视频| 中文亚洲av片在线观看爽| 在线观看午夜福利视频| 老汉色∧v一级毛片| 亚洲成av人片免费观看| 国产午夜福利久久久久久| 99精品久久久久人妻精品| 日韩人妻高清精品专区| 欧美色欧美亚洲另类二区| 无遮挡黄片免费观看| 婷婷丁香在线五月| 久久中文看片网| 高潮久久久久久久久久久不卡| 国产91精品成人一区二区三区| 国产又黄又爽又无遮挡在线| 亚洲内射少妇av| 亚洲国产欧美网| 久久久久久大精品| 搞女人的毛片| 亚洲国产精品成人综合色| av天堂中文字幕网| 99在线视频只有这里精品首页| 男人舔奶头视频| 狂野欧美激情性xxxx| 亚洲美女视频黄频| 99热这里只有是精品50| 色吧在线观看| 国产亚洲欧美98| av在线蜜桃| 日韩欧美精品免费久久 | 精品国产亚洲在线| 性色avwww在线观看| www日本在线高清视频| 国产一区二区三区在线臀色熟女| 国产精品野战在线观看| 亚洲熟妇熟女久久| 国产色婷婷99| 美女黄网站色视频| 天堂影院成人在线观看| 男女做爰动态图高潮gif福利片| 国产成人欧美在线观看| 国产精品99久久久久久久久| 成人国产一区最新在线观看| 免费观看的影片在线观看| 国语自产精品视频在线第100页| 超碰av人人做人人爽久久 | 波多野结衣高清无吗| 老司机午夜十八禁免费视频| 一a级毛片在线观看| 国产高清videossex| 国产欧美日韩精品亚洲av| netflix在线观看网站| 51午夜福利影视在线观看| 一级黄色大片毛片| 熟女人妻精品中文字幕| 在线观看av片永久免费下载| 蜜桃亚洲精品一区二区三区| 丰满人妻一区二区三区视频av | 色吧在线观看| 久久久久久久久中文| 国产高清有码在线观看视频| 久久精品91蜜桃| 亚洲成人久久爱视频| 又粗又爽又猛毛片免费看| 中出人妻视频一区二区| 18禁国产床啪视频网站| 午夜免费男女啪啪视频观看 | 国产极品精品免费视频能看的| 三级毛片av免费| 亚洲精品成人久久久久久| 国产av一区在线观看免费| 变态另类丝袜制服| 老司机深夜福利视频在线观看| 老鸭窝网址在线观看| 身体一侧抽搐| 久久精品国产99精品国产亚洲性色| 99久久精品热视频| 麻豆一二三区av精品| 51午夜福利影视在线观看| 午夜两性在线视频| 免费在线观看亚洲国产| 国产伦精品一区二区三区视频9 | 国产精品av视频在线免费观看| xxx96com| 嫩草影院精品99| 国产黄片美女视频| av女优亚洲男人天堂| 少妇人妻一区二区三区视频| 男女那种视频在线观看| 黄色视频,在线免费观看| 在线十欧美十亚洲十日本专区| 91久久精品国产一区二区成人 | 国产精品久久视频播放| 级片在线观看| 亚洲电影在线观看av| 免费高清视频大片| 欧美中文综合在线视频| 丰满的人妻完整版| 亚洲一区高清亚洲精品| 男人舔奶头视频| 国模一区二区三区四区视频| 国产欧美日韩精品一区二区| 久久久精品欧美日韩精品| 精品国内亚洲2022精品成人| 欧美av亚洲av综合av国产av| 亚洲精品乱码久久久v下载方式 | 亚洲欧美日韩无卡精品| 欧美成人免费av一区二区三区| 精品国产美女av久久久久小说| 两个人看的免费小视频| 久久精品国产自在天天线| 亚洲不卡免费看| 久久久久久久久久黄片| 欧美一区二区亚洲| 老司机在亚洲福利影院| 成年人黄色毛片网站| 在线观看av片永久免费下载| 久久久久九九精品影院| 亚洲精品在线美女| 一级作爱视频免费观看| 久久久久国产精品人妻aⅴ院| 俺也久久电影网| 好男人电影高清在线观看| 日本撒尿小便嘘嘘汇集6| 精品一区二区三区视频在线观看免费| 午夜激情欧美在线| 黄色丝袜av网址大全| bbb黄色大片| 日本免费a在线| 老鸭窝网址在线观看| 欧美中文综合在线视频| 99久久99久久久精品蜜桃| 三级国产精品欧美在线观看| 欧美区成人在线视频| 好男人电影高清在线观看| 国产精品影院久久| 成人av一区二区三区在线看| 身体一侧抽搐| 日本免费一区二区三区高清不卡| 男女下面进入的视频免费午夜| 国产私拍福利视频在线观看| 亚洲欧美日韩卡通动漫| 午夜免费激情av| 色综合欧美亚洲国产小说| 国产高清三级在线| 国产精品98久久久久久宅男小说| ponron亚洲| 欧美黑人欧美精品刺激| 欧美日韩乱码在线| 国产日本99.免费观看| 国产成人av激情在线播放| 欧美日韩国产亚洲二区| 99精品欧美一区二区三区四区| 91在线观看av| 最近最新免费中文字幕在线| 欧美日韩精品网址| 99精品久久久久人妻精品| 久久国产乱子伦精品免费另类| 欧美大码av| 99热只有精品国产| 久久久久国产精品人妻aⅴ院| 欧美在线一区亚洲| 日韩欧美精品免费久久 | 亚洲国产精品sss在线观看| 国产探花极品一区二区| 亚洲欧美激情综合另类| 9191精品国产免费久久| 欧美日韩瑟瑟在线播放| 悠悠久久av| 久久精品91蜜桃| 神马国产精品三级电影在线观看| 久久精品综合一区二区三区| 日日干狠狠操夜夜爽| 日本撒尿小便嘘嘘汇集6| 国产激情偷乱视频一区二区| 成年女人永久免费观看视频| 国产aⅴ精品一区二区三区波| 深夜精品福利| 人妻丰满熟妇av一区二区三区| 麻豆久久精品国产亚洲av| 色精品久久人妻99蜜桃| 欧美一区二区亚洲| 国产99白浆流出| 色综合欧美亚洲国产小说| 日本一二三区视频观看| 观看美女的网站| 久久久久久久午夜电影| 女生性感内裤真人,穿戴方法视频| 国产高清激情床上av| 精品福利观看| 国产精品久久久久久久电影 | 国产亚洲av嫩草精品影院| 国产精品日韩av在线免费观看| 三级毛片av免费| 日韩成人在线观看一区二区三区| 精品午夜福利视频在线观看一区| 亚洲精品在线观看二区| 少妇的丰满在线观看| 天堂√8在线中文|