• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults

    2020-05-21 05:43:38XinHuangandJiuxiangDong
    IEEE/CAA Journal of Automatica Sinica 2020年3期

    Xin Huang and Jiuxiang Dong,

    Abstract—This study deals with reliable control problems in data-driven cyber-physical systems (CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault’s intermittent characteristic is described by the average dwell-time (ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method.

    I. Introduction

    DRIVEN by networking, computing and control techniques, cyber-physical system (CPS) can greatly improve the work efficiency of existing industrial systems[1]–[5]. On account of the dependence of the CPS’s operation on data transmitted via the communication devices and networks, the system/control performance of the CPS relies heavily on the quality of the transmitted data [6]. In some practical control applications, bad or broken communication, sudden environmental disturbances, or malfunction of either software or hardware often corrupt the transmitted data. Thus, the characteristics of the communication devices may change over time, and there may be partial or complete system failure [7],which can deteriorate performance and even diverge systems in certain cases.

    In addition, since communication networks are vulnerable to attacks, and such attacks compromise transmitted data, cyber attacks are also one of the main reasons behind communication faults [8]–[11]. Recently, typical cyber attacks in CPSs, such as denial-of-service (DoS) attacks [12], [13],false data injection attacks [14], [15], replay attacks [16], [17],and other attacks [18]–[20], have been reported. To defend them, some works about secure estimation and detection have been reported in [21]–[28]. In secure control aspects, [29]introduced in great detail and provided available techniques for secure control designs against cyber-physical attacks,while [30] gives a defense analysis against malicious threats on cloud control systems via a Stackelberg game. To mitigate sensor and actuator attacks, [31] presents a moving target defense control framework. Against the adversarial attacks,[32] proposes an event-triggered secure observer-based control policy. In [33], an adaptive reliable control policy was presented to stabilise the CPSs under the frequencyconstrained sensor and actuator attacks. In [34] and [35],resilient control methods against frequency- and durationconstrained DoS attacks were proposed. In [36], adaptive control architectures were presented for sensor attacks in CPSs to recover system performance. In [18] and [37], which consider simultaneous sensor and actuator attacks, adaptive control policies were proposed to ensure stability of the systems. In addition, for actuator attacks, [38] presented an adaptive integral sliding-mode control strategy such that datadriven CPSs are stable with an optimal performance.

    On the other hand, it is costly and difficult to attain a system’s accurate model due to the complexity of industrial systems. Furthermore, for many industrial systems, data is pervasive in every aspect of industrial production, and should be fully utilized. Due to this, data-driven controls have gained much attention [39]. In the research of data-driven controls,the adaptive dynamic programming (ADP) technique (or policy iteration (PI) algorithm), as an effective approach of solving the algebraic Riccati equation (ARE), is widely applied in order to obtain a data-driven (or model-free)controller [40]–[44]. Both [45] and [46] studied the datadriven control problems via the zero-sum game. In order to achieve a model-free optimal controller, [47] developed a data-based policy gradient ADP algorithm. Reference [48]presented an identifier-critic-based ADP structure to online solveH∞control problem of nonlinear continuous-time systems. Recently, [49] developed a new model-free eventtriggered optimal control algorithm for continuous-time linear systems. Finally, [50] presented an event-triggered robust control policy for unknown nonlinear systems via the neural network (NN) and ADP techniques.

    Based on the above discussions, it is noted that some important problems need to be further investigated for CPS security. For instance, 1) most secure control results including[18], [31]–[34], [36], and [37], are model-based; however, the exact system knowledge for the industrial systems is usually difficult to obtain in practice. 2) Optimal/robust control problems of model-free systems without adversarial environments have been well solved via ADP-based methods[40]–[50], yet the secure control issue for data-driven CPSs remains open. 3) The communication faults in [18], [36], and[37] are supposed to be on a single transmission channels;nonetheless, the multi-transmission-channel situation has been not fully studied.

    Motivated by these observation, this paper, which is written from the CPS operator’s viewpoint, studies reliable control problems for data-driven CPSs under communication faults,and focuses on the intermittent faults of the multitransmission-channel situation. The main contributions of this paper are summarized as below:

    1) According to the theory of the describing function, a watermark-based anomaly detector is presented, so that the faults are classified as either detectable or undetectable to the detector. It can contribute to the effective execution of the proposed learning-based switched control policy.

    2) Based on the identifier-critic-structure learning algorithm, a data-driven switch controller with a prescribedperformance-based switching law is proposed, and with the aid of the average dwell-time (ADT) approach, a fault set,which the closed-loop systems can tolerate, is given.

    3) The advantages of the presented method are:

    i) Different from the model-based secure control results[18], [31]–[34], [36], [37], ours is data-driven;

    ii) Compared with most ADP-based model-free methods[40]–[50], ours guarantees the reliability for the case of a class of intermittent communication faults;

    iii) Contrary to the switched controls under the intermittent faults [51], [52], the system knowledge and switching rule are unknown for the CPS operators in this paper;

    iv) Distinct from [18], [36] and [37], the presented approach focuses on the faults in multi-transmission-channel case.

    The remainder of the paper is organized as follows. Section II states problem formulations. Section III presents a new data-driven control policy to tolerate a class of intermittent communication faults. Simulation results are shown in Section IV. Section V concludes this paper.Rn∥·∥Notations:is then-dimensional vector space.indicates the 2-norm of vectors or induced 2-norm of matrices.For a matrixX,XTrepresents its transpose.X≥0(X> 0)means thatXis a symmetric positive semi-definite (positive definite) matrix with an appropriate dimension.diag{x1,x2,...,xm}denotes a diagonal matrix withx1,x2,...,xmin its main diagonal.Iindicates an identity matrix with a suitable dimension. ? means the Kronecker product.wherexiis theith column ofX∈Rn×m. For a square matrixX,He(X)=XT+X.w∈L2(0,∞) means

    II. Problem Formulation

    This paper considers the architecture of data-driven CPSs,as shown in Fig. 1, and the models of the physical system and communication faults are depicted as follows.

    A. Physical System

    The physical system can be described by the following linear time-invariant system

    wherex(t)∈Rn,u(t)∈Rmandd(t)∈Rpare the measurable system state, control input and external disturbance, respectively.A,BuandBdare all unknown matrices with appropriate dimensions. It is assumed that the pair (A,Bu) is controllable,d∈L2(0,∞)and there is no packet dropout and delay in the transmission channels (or network layer). For the sake of simplicity, the dependence of the functions (e.g.,x˙,x,u(t),d(t),etc) ontis omitted in some cases.

    Remark 1:This paper mainly focuses on reliable controls under the case of no packet dropout and delay in the transmission channel. Such an assumption was found in [18],[31]–[33], [36] and [37], and contributes to simplifying the system models such that we are only concerned with the reliable controller design under the faults. Actually, in practice, the packet dropout and delay are common in the networked control systems. They may influence the control performance. Nevertheless, [29] and [30] have developed some effective methods to solve them, thus, in future work,we will further investigate CPS reliable controls for packetdropout and delay cases with the aid of the nice results in [29]and [30].

    B. Intermittent Communication Fault

    In this paper, the communication channels used to transmit sensor output signals are assumed to be vulnerable to the faults. In reality, communication faults are common in CPSs,and have been investigated in [18], [36] and [37]. Reference[36] has also reported that faults exist in some practical systems such as control systems of unmanned air vehicles.The model is usually represented by δs(x). In [18], [36] and[37], it is parameterized as δs(x)=ωs(t)x, with the gain ωs(t)∈R subject toThe system state compromised by the faults (i.e., that the controller receives) is given by

    Fig. 1. Subsystem architecture of cyber-physical systems under communication faults.

    where the compromised system stateand the parameter Λ =diagλ1,λ2,...,λn.

    Additionally, as reported in [51] and [52], the fault usually has intermittent and random characteristics. Then, to describe the intermittent characteristic of fault (2), we introduce the concept of average dwell-time (ADT), which has been used to describe intermittent DoS attacks [29], [34], [35]. Inspired by definitions in [29], [34] and [35], let {ti}i∈Nwitht0≥0 denote the sequence of the fault on/off and off/on transitions. Without loss of generality, letTk:=[t2k+1,t2k+2) (fork∈N) mean thekth time interval where the fault is active. Then, define

    where Υ (τ,t) andrepresent the subsets of [ τ,t], in which there is the fault and no fault, respectively. Meanwhile, letandindicate the total lengths of the occurring fault and no fault within the interval [ τ,t]. Thus, the gain in (2)can be denoted as

    Letn(τ,t) represent the number of the faults occurring in the interval [τ,t). Thus, the following assumptions are given to describe the intermittent characteristic of the fault in (2).

    Assumption 1 (Fault frequency [34], [35]):There exist constants ηf≥0 and τD>0 such that

    Assumption 2 (Fault duration [34], [35]):There exist constants κ ≥0,T1≥1 and 1 ≥1/T1≥T2≥0 such that

    Remark 2:In our work, Assumptions 1 and 2 are similar to those in [34] and [35], and are used to constrain the fault signal in terms of its average frequency and duration.Following [34] and [35], τDindicates the average dwell-time between consecutive fault off/on transitions; ηfmeans the chattering bound; 1/T1andT2respectively provide an upper bound and a lower bound on the average duration of the fault per unit time; analogous to ηf, κ plays the role of a regularization term. Note that the considered fault may be always active, thenT1in Assumption 2 satisfiesT1≥1 notT1>1.

    The objective in this paper is to give a reliable control scheme such that the systems under the communication faults are stable.

    III. Reliable Control Scheme of Data-Driven CPSs With Communication Faults

    From the Laplace transform of (2), it follows thatwith frequency ω. This means that the fault only damages the value of the sensor data, and does not change its frequency. According to the characteristic, a periodic oscillation with a known fixed frequency and amplitude is inserted into sensor transmission channels, and then, based on the amplitude change of the oscillation, the system checks whether it is under faults or not; meanwhile,according to the characteristic of the fixed frequency, a filter,equipped at the position of the controller side, is used to eliminate the effect of the introduced oscillation. In reality, the frequency of the introduced oscillation can be designed such that the oscillation, and, the input and output of the system (1)are in different frequency domains, thus, in such a way, a filter is used to effectively eliminate the oscillation. However, in theory, it is simple to produce a periodic oscillation. By contrast, in practice, the oscillation is very sensitive to parameter changes. Hence, according to the describing function theory [53], we can design an oscillation which is robust to disturbance, noise and uncertainty. Then, the expected oscillation is generated and injected into communication channels by the way shown in Fig. 2. In Fig. 2,we consider a smart sensori, which performs a process measurement (i.e., sensorito measure the system state), and a“closed-loop” to generate a desired oscillation to check whether the sensor communication channel is faulty, whereG(s)is the transfer function with the sufficient low-pass behavior, andN(A) is the describing function of a nonlinear function. In “closed-loop”, ?y2andvare the input and output ofN(A), respectively.y1is the output ofG(s), andris zeroreference input of “closed-loop”. In addition, sincey1is needed to be fed-back for “closed-loop”, a acknowledgementbased protocol is needed. It is noted that, for no fault case,y2=y1; otherwise,y2=λiy1. To facilitate the analysis,suppose that the system statexand the desired oscillationy1are low- and high-frequency signals, respectively, and,ReceiverIiin “closed-loop” has a high-pass behavior. Thus,in this setting, after the signaly1+xienters ReceiverIi, the output of the receiver approximates to the signaly1. For the Fourier series of the periodic signalv(t) with periodT, the input and output of transfer functionG(s) can be written as

    Fig. 2. A mechanism of producing a period oscillation with a fixed frequency and amplitude in ith sensor transmission channel.

    According to the theory of the describing function [53], the describing function of the nonlinear function is denoted as

    whereey(·)=?y2(·), and A denotes the oscillation amplitude received by the detector. From the Nyquist criterion, it is known that if the open loop transfer functionG0(A,jω)=N(A)G(jω) crosses the critical point (?1+j0), a periodic oscillation with the fixed frequency ω and amplitude Awill be produced, where ω and A satisfy the following equalities

    whereNI(A) represents the inverse describing function,which depends on the signal amplitude A. So, by designingG(s) and N(A), a period oscillation with the expected ω and A can be obtained.

    Based on (4), the detection criterion is given in the following form

    Remark 3:The detection mechanism (5) can detect whether theith transmission channel is under faults or not, and the faults are divided into the detectable faults satisfyingorand relatively undetectable faults satisfyingBy applying this detection method to all (or unreliable) channels, it is checked whether the overall sensor transmission channels are under faults, and it is restricted that parameter Λ of the communication faults is invertible.

    According to the detection mechanism (5), it is known that for no-alarm cases, the communication channels might also be under faults successfully bypassing the proposed detector,thus, the reliability of the system may not be guaranteed. In the following sections, for this situation, a reliable control policy is given to stabilise the data-driven CPSs under the communication faults or no faults.

    A. Switching-Based Reliable Control Strategy of CPSs Under Communication Faults

    When system (1) suffers the communication fault which successfully bypasses the proposed watermark-based anomaly detector, the dynamics of the compromised system states can be depicted in the following form

    Lemma 1:Considering systems (1) and (6), and the invertible matrix Λ, the pairis controllable if and only if the pair (A,Bu) is controllable.

    Proof:According to Theorem 9.5 in [54], it is easy to prove Lemma 1, thus, it is omitted.

    From Lemma 1 and the controllable pair (A,Bu), system (6)is controllable. Thus, to ensure the stability of system (6), a control policyuand a disturbance inputdare given in the following forms

    The gainsK1andL1of control and disturbance inputs are determined in the linear quadratic zero-sum game framework,where control and disturbance inputs are viewed as two players. It is known from the optimal theory [55] thatuanddsatisfy the following two-player zero-sum differential game

    where

    is theH∞performance index,Q=QT>0 andR=RT>0.The pairis observable and γ>γ?is theH-infinity gain. For the controllable pairand accurate parametersandthere exists a uniqueby solving the following game algebraic Riccati equation (GARE)

    The opti mal feedback gain matrixin (10) andin (11)can be determined by

    andu?andd?satisfy the following inequalities

    On the other hand, it is noted from (6) that if Λ=I, (6)reduces to system (1); thus, in that case, the control policyuand the worst disturbance inputdare designed by the abovementioned method, and are given by

    and

    Based on the aforementioned description and the intermittency of the communication fault (2), the reliable control problem of system (1) under fault (2) can be converted into a problem to stabilise the following virtual switched system, which is switching between subsystems (1) and (6)

    where σ(t)∈{0,1} is the switched signal of the system (9),which is determined by the fault maker. σ′(t)∈{0,1} is the switched law ofuσ′(t)anddσ′(t), to be determined, where

    where

    σ(t)=0indicates that subsystem (1) is active, i.e., the system is under normal operation, otherwise, σ(t)=1 means that the subsystem (6) is active. The corresponding system parameters are given in the following:

    The fault maker may be a smarter attacker and their aims may be to degrade the system/control performance as much as possible. On account of their intelligence, the fault-makert riggered switching law σ(t) is generally unknown for the CPS operators. So, it is a challenging problem to give a suitable switching law σ′(t) of the controller such that the system (9) is stable. Fig. 3 describes the relationship of σ(t) and σ′(t).Without loss of generality, it is assumed thatfor anyk. By Fig. 3, there always exists an intervalorcaused by the wrong switching, in which the system may be unstable. To address this problem, a new switching law based on a prescribed performance function is proposed in this paper, and it is given in the following form:

    Fig. 3. Relationship between σ (t) and σ ′(t). on/off transitions are represented as ↓, while off/on transitions are represented as ↑. For k =0,1,···,(a) off/on transitions occurring at t 2k+1 indicate that the faults occur and on/off transitions occurring at t 2k+2 mean that the faults stop; (b) off/on transitions occurring at indicate that the mode 0 of the controller switches the mode 1 (i.e., the CPS operator thinks that the faults occur), and on/off transitions occurring at mean that the mode 1 of the controller switches the mode 0(i.e., the CPS operator thinks that the faults stop).

    where η0, η∞are positive constants and satisfy η0≥1, η∞≥0.satisfieswhereis a known constant, andfori∈{0,1}.

    Lemma 2:Denote the time sequence consisted of the no fault time intervaland fault-activated time intervalasand the switching time sequence generated by the switched law (12)under the sequence ι asthus, the following inequalities are satisfied

    and

    where

    and

    which implies that

    On the other hand, from the switched law (12), forwe have

    and, it is manipulated into

    Furthermore, the above equation can be written as

    In addition, fort=t2k+1, one has

    the above inequality can be manipulated into

    thus, by some mathematical operations, we have

    Based on (14) and (15), we have

    Remark 4:Note that, in the time intervalsandthe time derivative of the Lyapunov function(13) is greater than zero; thus, decreasing the intervals can improve the system performance. From Lemma 2, it follows that under the switched law proposed in this paper,andcan be guaranteed, andTτ,2k+1andTτ,2k+2are reduced by decreasing η0and η∞.

    In the sequel, a main result can be depicted as follows.

    Theorem 1:Consider system (9) with communication faults(2) satisfying Assumptions 1 and 2 with arbitrary ηfand κ.Denoteas the solution of GARE with the mode σ′(t)∈{0,1}, then,

    1) for no controller-switched case,H∞control pair (10) and(11) with the switching law (12) guaranteeswhere

    2) for the controller-switched case, if the following conditions are satisfied

    Proof:Consider the following Lyapunov function candidate

    The proof starts from two cases: one is where there are no switching controller, and the other is the case of switching controller fort∈[0,∞].

    Case 1 (No controller-switched case):In this situation, it is assumed that the mode of the controller isi, i.e., σ′(t)=i.From the switched law (9), it is known that

    Case 2 (Controller-switched case):We considerin which the mode of the controller is assumed to bei, i.e., σ′(t)=i, and, in this case, there exists the intervalin which the time derivative of the Lyapunov function is greater than zero, so, it is assumed thatForthe time derivative of (17) is

    further, one has

    From Lemma 2, it is known thatandfork=0,1,..., where

    andthus, let(in fact,forbeing any positive constant, just replace 0 with the correspondingand the following proof still holds), we have

    thus, one gets

    which implies that system (9) is global asymptotically stable.

    Remark 5:Note thatis equivalent toand it is known from Theorem 1 that the proposed control policy can ensure that the virtual switched system (9) is stable, which implies that the system states in CPSs with the controller (10) under the intermittent communication faults (2) are stable. On the other hand,parameters τD,T1andT2help to depict the fault frequency and duration; hence, condition (16) also means a fault set that can be tolerated by controller (10).

    Theorem 1 indicates that theH∞control pair (10) and (11)can ensure the stability of (9), where the accurate parametersandneed to be used in (10) and (11).However, for the data-driven CPSs, the system parameters are usually unknown. In the next section, an identifier-critic learning algorithm is used to obtain the available parameters.Then, the above-mentioned result is extended to the datadriven case.

    B. Learning-Based Switched Reliable Control Policy of Data-Driven CPSs

    In this section, we first assume that the unknown parameters(in (10) and (11)) for the systems under the considered faults and no faults can be estimated. Then, (6) can be written as

    whereand. In this paper, the filtered variablesxfand Ψ1fin [56] are introduced to identify the system parameters, and the corresponding filters are denoted asand,wherexf(0)=0 and ψ1f(0)=0. ?>0 is the “bandwidth” of the filter (·)f=(·)/(?s+1), and should be set small to retain robustness [48].xfand ψ1fare obtained by applying a stable filter operation (·)f=(·)/(?s+1) onand ψ1. By this filter operation, (18) can be written as

    Furthermore, the following auxiliary matricesP1∈andare defined as

    where P1(0)=0 and Q1(0)=0.is a forgetting factor,and should be chosen to trade off the convergence speed and the robustness [48]. In light of (19)–(21), one gets

    Letandbe the estimate and estimation error ofW1,i.e.,then, the weight updating law is given by

    where Γ1>0 is a learning gain matrix.

    Lemma 3:Consider system (6). Under the adaptive law(22), the estimation errorconverges to zero exponentially if ψ1is persistently exciting (PE).

    Proof:Similar to the proof of Theorem 2 in [56], thus, the corresponding proof is omitted.

    Based on Lemma 3, system (6) can be written in the following form

    whereandare the estimations ofandrespectively, and the corresponding estimation errors areandis the system identification error.According to the optimal theory [55] and performance index(7), it is known that the value function is

    The Hamiltonian for the system (23) can be written as

    where

    By using the critic network, the value function can be reconstructed as

    and, its derivative is

    whereW2is the weight of the critic NN. ψ2is the activation function of the criticNN,e2is the NN reconstruction error,and ?ψ2and ?e2are the derivatives of ψ2ande2with respect torespectively. It is assumed thatandwhereandare positive constants [57]. In the sequel, (25) is approximated by the following critic NN

    Based on (27) and (28), Hamilton-Jacobilsaacs (HJI) can be rewritten as

    where P2(0)=0 and Q2(0)=0.l2is a positive constant. Thus,we have

    Lemma 4:Consider critic NN (26) with adaptive law (29). If Ξis PE, then the critic NN weight errorconverges to a compact set around zero forMoreover, foreHJI=0,W?2converges to zero exponentially.

    Proof:Similar to the proofs of Theorem 2 in [56] and Theorem 4.1 in [48], thus, the corresponding proof is omitted.

    Next, the stability of the closed-loop system (6) with (27)and (28) is analysed. By substituting (27) and (28) into (6),one gets

    Lemma 5:Consider the system (6) equipped with (27) and(28) with adaptive laws (22) and (29). If ψ1and Ξ are PE,then, the system stateidentifer errorand critic NN weight errorare uniformly ultimately bounded (UUB).Furthermore,uin (27) anddin (28) converge to a bounded set around the idealH∞control solutionsu??andd??.

    Proof.See Appendix A.

    Remark 6:From the optimal theory [55], it is known that,for the linear system, the value function and its derivative with respect toare denoted asandrespectively. In addition, the value function also can be rewritten asIf the activation function of the critic NN is selected asthus, the corresponding weight iswhich implies thatand there is no NN reconstruction error, i.e.,e2=0. So, in this case, according to the proof of Lemma 5, it is shown that, ife2=0, the system states can converge to zero and the proposedH∞control pair can converge to their ideal solution in ideal case.

    Remark 7:Note that if Λ=I, the system (6) can be reduced to (1), thus, by implementing the above identifier-critic based method, the accurate estimations of the parametersA,Bu,Bd,andL0can be obtained.

    From Remarks 6 and 7, it is known that, if the activation function of the critic NN is selected asthe unknown parameters in (10) and (11) can converge to the ideal ones. So, one has that the followingH∞control pairs,which can ensure that the time derivatives ofandare less than 0, respectively,

    Based on the above-obtained available parameters, the method proposed in Section III-A is extended to the datadriven case. Thus, for the system (9) with the unknown parameters, a switched controller is given by

    where σ′(t)∈{0,1}. The available parameters used in the controller are

    A learning-based switching law is given in the following form

    Theorem 2:Consider system (9), whose system parameters are unknown. Suppose that the system parameter estimations andPσ′, σ′∈{0,1} can be obtained from Lemmas 4 and 5:

    1) for no controller-switched case,H∞control pair (31) and(32) with the switching law (33) guarantees,where

    2) for the controller-switched case, if the following conditions are satisfied

    wherethus,H∞control pair (31) and (32) with the switching law (33) guarantees that the system (9) is global asymptotically stable.

    Proof:The proof is analogous to that of Theorem 1 and omitted.

    Remark 8:Notice that the existing results on the switched controls against the intermittent attacks mainly include 1) [29]and [34] focus on the intermittent DoS (I-DoS) attack case,and 2) [51] and [52] are concerned with the intermittent actuator failure (I-AF) case. Then, the differences between the existing approached and ours can be described by Table I.Clearly, due to unknown system knowledge and the switching law σ(t), under the considered faults, the switched controls in[29], [34], [51] and [52] lose efficacy.

    From the above analysis, the proposed reliable control policy can be described in Fig. 4. In Fig. 4, ADP-based learning module indicates the identification-critic based controllers (27), and switched controller represents controller(31) with the switching law (33). The corresponding implementing process can be depicted as follows:

    Step 1:Activate the ADP-based learning module. Let σ =0.During the learning process, decision module exportsuσof the ADP-based learning module. It stops until the available parametersare gained, and the obtained available parameters are sent to switched controller.

    Step 2:After switched controller receives the available parameters, the decision module exports the control signaluσof switched controller. Until the system is abnormal, ADPbased learning module is reactivated. Let σ=1, and repeat Step 1.

    TABLE I Comparisons of the Existing Switched Controls Against the Intermittent Attacks

    Fig. 4. Diagrammatic sketch of the learning-based switched reliable control policy.

    IV. Illustrative Example

    In this section, the DC motor speed control system is given to validate the presented method, where the control system is shown in Fig. 5. It can be seen that the rotating speed and armature current signals of the motor are transmitted via the network channels 1 and 2, respectively, and the transmission channels are assumed to be vulnerable to cyber attacks.Furthermore, the system parameters are borrowed from [58],where they are obtained from actual measurements and hardware equipments. These parameters are summarized in Table II. Additionally, through the working principle of the DC motor, the dynamics of the motor are represented by

    whereIis the armature current; ? is the rotating speed of the motor; andUrepresents the terminal voltage.

    The desired rotating speed and the steady-state current of

    Fig. 5. Block diagram of a DC motor speed control system.

    TABLE II DC Motor Speed Control System Parameters

    the DC motor are defined as ?dandrespectively. Thus, the tracking errors are ??=???dandThe dynamics of the errors are given by

    In order to verify the proposed algorithm, it is assumed that the system parameters are unknown, the control system is equipped with the detector (5) withandand the communication channels are subjected to a fault/attack in (2)with Λ=diag{?1.5,?0.5} , ηf=0, κ=0, τD=75,T1=1 andT2=0.6.

    Next, the ADP-based learning algorithm in this paper is first implemented to obtain the system parameters for (1) and (6) and the corresponding critic weights. Then we consider theH∞performance index (7) with theH∞gain γ=2,R=1 andQ=diag{1,1}, and the activation functionof the critic NN. In the simulation experiment, to accurately estimate the unknown parameters, a probing noise is introduced before 2 s. The initial critic weights are randomly chosen and all the initial values for the parameters in the adaptive laws are set to zero. The ADP-based learning process is shown in Fig.6. Due to similarity to (1), the learning process for the system(6) is omitted. The obtained optimal estimations of the system parameters and the critic weights are given by

    Fig. 6. The ADP-based learning process for the system (1): (a) System parameters; (b) Critic NN weights; (c) System states; (d) Control input signal.

    and

    Fig. 7. Simulation results using the proposed method. (a) The system and controller switching signals σ and σ′; (b) Prescribed performance and system performance The system performance (d) The norm ∥x∥of the system states.

    In the sequel, we test the effectiveness of the reliable switched controller (31) under the intermittent communication faults in the simulation experiment. In the simulation, the disturbance occurs from the initial time to 500 s, and a potential switching signal generated from the fault marker satisfying Assumptions 1 and 2 is considered and plotted by the blue solid line in Fig. 7(a). And then, the parameters of the prescribed performance function used in switching law (33)are chosen as η0=1.1, η∞=0.05,a0=2.6 anda1=1.7. Then,under the communication faults, the switching signal of the controller generated by switching law (33) is denoted by the red dash line in Fig. 7(a). It can be observed thatTτ,M0≤0.353 andTτ,M1≤0.353. Furthermore, byW2,0andW2,1, we have α0=2.6451, α1=1.7171, β0=94.4412 and β1=109.6481. We chose μ=5, thus, by computing, it is obtained that λ?>Tμ/τD=1.0240 , andλ?<α0(1?1/T1)+α1T2=1.0302, which implies that condition (34) is satisfied.Under the proposed switching law (33), the system performances are exhibited by Fig. 7(b)?(d). It can been seen that whenVσ′ violates the prescribed performance, the switching of the controllers is triggered, and prior to switching controllers, the performanceVσ′ is inside the prescribed performance. Also, observe that there are some chatters in the trajectory of the norm of the compromised system states. They are caused by passively switching the controllers. These chatters can be improved by reducing the parameters of the prescribed performance. In order to clearly illustrate this, we consider the trajectories of the norm of the compromised system states under four cases: 1) η∞=50 ; 2) η∞=5; 3)η∞=0.5 and 4) η∞=0.05. The simulation results are plotted in Fig. 8. It verifies the chatters can be reduced through decreasing η∞.

    Fig. 8. The norm of the system states under (a) η ∞=50; (b) η ∞=5; (c)η∞=0.5; (a) η ∞=0.05.

    In the following simulation experiment, we consider the same intermittent communication faults as those mentioned above. Then, under S-ADPC and ET-ADPC, the compromised system performances are shown in Fig. 9. It can be seen that the norms ∥x∥ of the compromised system states under the two

    Fig. 9. The system performances: (a) the norm of the system states under S-ADPC; (b) under S-ADPC; (c) the norm of the system states under EV-ADPC; and (d) under EV-ADPC.

    V. Conclusion

    This paper from the CPS operator’s viewpoint studied reliable control problems of data-driven cyber-physical systems with communication faults on multiple channels.Based on our previous result [11], a data-driven switched controller with a prescribed-performance-based switching law was proposed, and through the ADT approach, a fault set, which the closed-loop systems can tolerate, was given. Then, driven by the cooperation of the proposed watermark-based anomaly detector and learning-based switched control policy, the reliability of the systems under the faults was guaranteed. An illustrative example verified the effectiveness of the presented method.

    Appendix A The Proof of Lemma 5

    Proof:Consider the following Lyapunov function candidate

    where

    From Lemmas 3 and 4, it follows that

    wherec1,c2>0 are constants. The time derivative of L3is

    From the value function (24), it is clear thatand then, substituting(30) into (38) yields

    The time derivative ofL4is

    Substituting (36), (37), (39) and (40) into (35) yields

    where

    Hence, if the designed parameters Γ,Kand η satisfies the following conditions

    thus, f rom (41), it is deduced thatandv2are UUB.

    Next, the errors between (27), (28) and the ideal ones are analysed. The corresponding errors are

    According to the above analysis, one has

    whereeuandedare positive constants, which are determined by the NN approximation errors.

    如日韩欧美国产精品一区二区三区| 亚洲精品中文字幕在线视频| 精品熟女少妇八av免费久了| 欧美 日韩 精品 国产| 中文字幕色久视频| 久久人妻福利社区极品人妻图片| 欧美精品啪啪一区二区三区| 国产成人一区二区三区免费视频网站| 免费在线观看完整版高清| 无限看片的www在线观看| 亚洲色图 男人天堂 中文字幕| 亚洲成人国产一区在线观看| 在线十欧美十亚洲十日本专区| 国产一区二区在线观看av| 十八禁网站免费在线| 国产精品免费视频内射| √禁漫天堂资源中文www| 亚洲国产欧美一区二区综合| 午夜福利一区二区在线看| 女同久久另类99精品国产91| 中文字幕最新亚洲高清| 大香蕉久久成人网| 黄色视频不卡| 美女午夜性视频免费| 91麻豆av在线| 99国产综合亚洲精品| 欧美精品高潮呻吟av久久| 成年人午夜在线观看视频| 狂野欧美激情性xxxx| cao死你这个sao货| 一进一出好大好爽视频| 亚洲精品中文字幕在线视频| 欧美日韩国产mv在线观看视频| 桃花免费在线播放| 日本a在线网址| 成人黄色视频免费在线看| 五月开心婷婷网| 黑人巨大精品欧美一区二区蜜桃| 午夜福利视频精品| 亚洲成a人片在线一区二区| tocl精华| 成人免费观看视频高清| 精品亚洲乱码少妇综合久久| 成人永久免费在线观看视频 | 国产av国产精品国产| 亚洲天堂av无毛| 亚洲精品国产精品久久久不卡| 嫩草影视91久久| av电影中文网址| 亚洲国产中文字幕在线视频| 一级片免费观看大全| 人人妻人人爽人人添夜夜欢视频| 午夜精品国产一区二区电影| 亚洲欧美一区二区三区久久| 777米奇影视久久| 欧美精品一区二区免费开放| 国产一区二区激情短视频| 黑人巨大精品欧美一区二区蜜桃| 在线观看免费高清a一片| 在线av久久热| 最近最新免费中文字幕在线| 日韩欧美三级三区| 黄色成人免费大全| 精品国内亚洲2022精品成人 | 久久天堂一区二区三区四区| 飞空精品影院首页| 无限看片的www在线观看| 国产片内射在线| 人成视频在线观看免费观看| 黄色视频在线播放观看不卡| 久久精品成人免费网站| 精品国产超薄肉色丝袜足j| 桃红色精品国产亚洲av| 少妇粗大呻吟视频| 日韩一卡2卡3卡4卡2021年| 韩国精品一区二区三区| av又黄又爽大尺度在线免费看| 久热这里只有精品99| 黄色a级毛片大全视频| 久久久国产精品麻豆| 水蜜桃什么品种好| 制服诱惑二区| 天天添夜夜摸| 两个人免费观看高清视频| 成人av一区二区三区在线看| 老司机亚洲免费影院| 脱女人内裤的视频| 亚洲综合色网址| 成人手机av| 少妇裸体淫交视频免费看高清 | 亚洲中文字幕日韩| 一本久久精品| 国产高清国产精品国产三级| 亚洲伊人久久精品综合| 高清毛片免费观看视频网站 | 精品久久久久久电影网| 午夜福利在线观看吧| 亚洲人成77777在线视频| 亚洲精品一二三| 亚洲 国产 在线| 变态另类成人亚洲欧美熟女 | 99精品在免费线老司机午夜| 高清av免费在线| 久久这里只有精品19| 欧美日韩成人在线一区二区| 精品国产乱码久久久久久男人| 久久狼人影院| 国产在线一区二区三区精| 老司机亚洲免费影院| 99热网站在线观看| 久久中文字幕人妻熟女| 人人妻人人爽人人添夜夜欢视频| 久久久国产欧美日韩av| 日日夜夜操网爽| 一级片'在线观看视频| 久久香蕉激情| 另类亚洲欧美激情| 在线观看www视频免费| 国产精品一区二区在线不卡| 国产成人欧美在线观看 | 99精国产麻豆久久婷婷| 美女高潮喷水抽搐中文字幕| 搡老岳熟女国产| 国产精品久久久久久精品古装| 建设人人有责人人尽责人人享有的| 亚洲国产欧美网| 黄色a级毛片大全视频| 国产精品 欧美亚洲| 日本wwww免费看| 欧美日韩视频精品一区| 纵有疾风起免费观看全集完整版| 亚洲av日韩精品久久久久久密| 日韩视频在线欧美| av天堂在线播放| 黄色 视频免费看| 亚洲欧美精品综合一区二区三区| 一区二区三区乱码不卡18| av国产精品久久久久影院| 亚洲精品国产色婷婷电影| 亚洲综合色网址| 女人精品久久久久毛片| 亚洲天堂av无毛| 亚洲精品自拍成人| 19禁男女啪啪无遮挡网站| 热99久久久久精品小说推荐| 国产在线观看jvid| 国产在线一区二区三区精| 日韩一区二区三区影片| 9热在线视频观看99| 美国免费a级毛片| 在线观看免费高清a一片| 9色porny在线观看| 欧美国产精品一级二级三级| 成年女人毛片免费观看观看9 | www.999成人在线观看| 久热这里只有精品99| 久久国产精品男人的天堂亚洲| 在线亚洲精品国产二区图片欧美| 日本黄色视频三级网站网址 | 欧美 亚洲 国产 日韩一| xxxhd国产人妻xxx| 国产在线精品亚洲第一网站| 亚洲精品国产一区二区精华液| 亚洲国产av影院在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 老司机影院毛片| 国产三级黄色录像| 国产av一区二区精品久久| 国产一区有黄有色的免费视频| 日韩欧美国产一区二区入口| 美女视频免费永久观看网站| 一区二区三区激情视频| 黑人巨大精品欧美一区二区mp4| 国产精品熟女久久久久浪| 丰满少妇做爰视频| 国产成人精品久久二区二区免费| 亚洲精品久久午夜乱码| 亚洲欧洲日产国产| 午夜久久久在线观看| 国产成人一区二区三区免费视频网站| 99香蕉大伊视频| 久久午夜亚洲精品久久| 欧美成狂野欧美在线观看| 日韩大码丰满熟妇| 欧美精品一区二区大全| 黄色片一级片一级黄色片| cao死你这个sao货| 午夜激情久久久久久久| 日韩中文字幕视频在线看片| 女人精品久久久久毛片| 王馨瑶露胸无遮挡在线观看| 精品少妇一区二区三区视频日本电影| 黄片播放在线免费| 天堂8中文在线网| 黄片播放在线免费| 人人妻人人添人人爽欧美一区卜| 一进一出好大好爽视频| 国产欧美日韩一区二区三| 日韩 欧美 亚洲 中文字幕| 精品视频人人做人人爽| 老司机靠b影院| 精品一区二区三区视频在线观看免费 | 亚洲精品国产精品久久久不卡| 亚洲精品国产精品久久久不卡| 啦啦啦 在线观看视频| 精品国产乱码久久久久久男人| 中文字幕人妻丝袜一区二区| 高清视频免费观看一区二区| 久久久精品免费免费高清| 成年动漫av网址| 国产精品香港三级国产av潘金莲| 欧美黑人精品巨大| 久久精品aⅴ一区二区三区四区| 国产高清激情床上av| 久久精品国产亚洲av香蕉五月 | 国产在线一区二区三区精| 女人高潮潮喷娇喘18禁视频| 欧美精品高潮呻吟av久久| 一区福利在线观看| 国产精品免费一区二区三区在线 | 成年版毛片免费区| 变态另类成人亚洲欧美熟女 | 老司机深夜福利视频在线观看| 黑人操中国人逼视频| 久久精品亚洲精品国产色婷小说| 香蕉久久夜色| 激情在线观看视频在线高清 | 一本久久精品| 成年人午夜在线观看视频| 一二三四在线观看免费中文在| 变态另类成人亚洲欧美熟女 | 成年版毛片免费区| 精品少妇一区二区三区视频日本电影| 九色亚洲精品在线播放| 国产在线精品亚洲第一网站| 热99re8久久精品国产| 18禁美女被吸乳视频| 久久天堂一区二区三区四区| 久久久久久人人人人人| 丰满少妇做爰视频| 亚洲欧洲日产国产| 麻豆国产av国片精品| 一个人免费在线观看的高清视频| 一个人免费看片子| 久久国产精品影院| 精品少妇内射三级| 国产亚洲欧美精品永久| 国产精品偷伦视频观看了| 黄色视频,在线免费观看| 80岁老熟妇乱子伦牲交| 老熟妇仑乱视频hdxx| 日韩一区二区三区影片| 男人舔女人的私密视频| 精品国产一区二区三区四区第35| a级片在线免费高清观看视频| 成年人免费黄色播放视频| 成年人免费黄色播放视频| 中文字幕人妻丝袜制服| 18在线观看网站| 国产麻豆69| 国产精品欧美亚洲77777| 黄片播放在线免费| 91九色精品人成在线观看| 午夜激情av网站| 飞空精品影院首页| 十八禁高潮呻吟视频| 国产主播在线观看一区二区| 亚洲熟妇熟女久久| 99国产精品一区二区蜜桃av | 国产黄色免费在线视频| 国产极品粉嫩免费观看在线| 2018国产大陆天天弄谢| 国精品久久久久久国模美| 欧美性长视频在线观看| 老汉色∧v一级毛片| 在线观看人妻少妇| 99精品欧美一区二区三区四区| 精品国产乱码久久久久久男人| 国产精品偷伦视频观看了| 欧美黄色淫秽网站| 国产成人av激情在线播放| 两性午夜刺激爽爽歪歪视频在线观看 | 正在播放国产对白刺激| 天天躁日日躁夜夜躁夜夜| 女同久久另类99精品国产91| 十八禁高潮呻吟视频| 亚洲,欧美精品.| 午夜福利在线观看吧| 国产精品熟女久久久久浪| 国产97色在线日韩免费| 18禁美女被吸乳视频| 久久久久国内视频| 国产黄色免费在线视频| 国产精品 国内视频| 欧美日韩视频精品一区| 日韩三级视频一区二区三区| 色94色欧美一区二区| 日韩欧美免费精品| 69av精品久久久久久 | 久久久久精品国产欧美久久久| 久久影院123| 精品国产乱子伦一区二区三区| 老司机深夜福利视频在线观看| 亚洲精品一卡2卡三卡4卡5卡| 欧美日韩黄片免| 丝瓜视频免费看黄片| 久久久国产欧美日韩av| 天堂动漫精品| 国产一区二区三区综合在线观看| av有码第一页| 国产黄色免费在线视频| 色婷婷av一区二区三区视频| 老司机深夜福利视频在线观看| 两个人免费观看高清视频| 亚洲久久久国产精品| 久久久国产精品麻豆| 久久久久久久久久久久大奶| 母亲3免费完整高清在线观看| 91国产中文字幕| 女警被强在线播放| 婷婷丁香在线五月| 国产在线精品亚洲第一网站| 亚洲少妇的诱惑av| 少妇精品久久久久久久| 日本精品一区二区三区蜜桃| 亚洲精华国产精华精| av福利片在线| e午夜精品久久久久久久| 黑人猛操日本美女一级片| 久久99热这里只频精品6学生| 国产老妇伦熟女老妇高清| 激情视频va一区二区三区| 日韩制服丝袜自拍偷拍| 久久毛片免费看一区二区三区| 天堂动漫精品| 99国产综合亚洲精品| 免费看十八禁软件| 香蕉国产在线看| 国产单亲对白刺激| 菩萨蛮人人尽说江南好唐韦庄| 欧美大码av| 日日爽夜夜爽网站| 女性被躁到高潮视频| 国产无遮挡羞羞视频在线观看| 伊人久久大香线蕉亚洲五| 国产伦理片在线播放av一区| 91成年电影在线观看| 最近最新免费中文字幕在线| 最新在线观看一区二区三区| 欧美乱码精品一区二区三区| 国产精品免费一区二区三区在线 | 老汉色∧v一级毛片| 99在线人妻在线中文字幕 | 国产精品.久久久| 欧美日韩亚洲国产一区二区在线观看 | 看免费av毛片| 国产欧美日韩一区二区三区在线| 国产一区有黄有色的免费视频| 国产高清激情床上av| 亚洲成人国产一区在线观看| 国产伦理片在线播放av一区| 亚洲中文av在线| 中文字幕人妻丝袜制服| 久久精品成人免费网站| 黄片大片在线免费观看| 亚洲熟女精品中文字幕| 国产成人免费观看mmmm| 亚洲综合色网址| 人人澡人人妻人| 99九九在线精品视频| 岛国在线观看网站| 亚洲五月色婷婷综合| tube8黄色片| 久久中文看片网| 人人妻人人澡人人爽人人夜夜| 性高湖久久久久久久久免费观看| 99国产综合亚洲精品| 国产精品免费一区二区三区在线 | 午夜福利视频精品| 久久精品亚洲熟妇少妇任你| 亚洲精品一卡2卡三卡4卡5卡| 日韩免费高清中文字幕av| 国产精品国产高清国产av | 中文字幕人妻熟女乱码| 亚洲成国产人片在线观看| 日本wwww免费看| 午夜免费鲁丝| 又黄又粗又硬又大视频| 天堂俺去俺来也www色官网| av线在线观看网站| 两个人免费观看高清视频| 大香蕉久久网| 性色av乱码一区二区三区2| 国产精品成人在线| 国产精品亚洲av一区麻豆| 搡老乐熟女国产| av电影中文网址| 欧美日韩亚洲高清精品| 国产亚洲精品第一综合不卡| 国产精品国产av在线观看| 国产三级黄色录像| 欧美激情高清一区二区三区| 久久久久国内视频| 菩萨蛮人人尽说江南好唐韦庄| 国产激情久久老熟女| 久久国产精品人妻蜜桃| 一区二区三区乱码不卡18| 侵犯人妻中文字幕一二三四区| 亚洲全国av大片| 久久精品aⅴ一区二区三区四区| 精品少妇黑人巨大在线播放| 美女高潮喷水抽搐中文字幕| 国产免费现黄频在线看| 亚洲av电影在线进入| 丝袜人妻中文字幕| 99久久国产精品久久久| 美国免费a级毛片| av免费在线观看网站| 亚洲精品国产精品久久久不卡| 亚洲av第一区精品v没综合| 国产一区二区在线观看av| 男女高潮啪啪啪动态图| 丝袜美足系列| 亚洲伊人色综图| 国产无遮挡羞羞视频在线观看| 99国产极品粉嫩在线观看| 亚洲av美国av| 国产一卡二卡三卡精品| 欧美黑人欧美精品刺激| 又大又爽又粗| 成人18禁高潮啪啪吃奶动态图| 成人av一区二区三区在线看| 免费人妻精品一区二区三区视频| 欧美大码av| 真人做人爱边吃奶动态| 亚洲国产中文字幕在线视频| 国产男女内射视频| 啦啦啦中文免费视频观看日本| 欧美日韩国产mv在线观看视频| 黑人巨大精品欧美一区二区mp4| 男人舔女人的私密视频| 久久天堂一区二区三区四区| 91成年电影在线观看| 日本一区二区免费在线视频| 日日夜夜操网爽| 日韩免费av在线播放| 日韩欧美免费精品| 色婷婷av一区二区三区视频| 色播在线永久视频| 男人舔女人的私密视频| 亚洲成av片中文字幕在线观看| 最黄视频免费看| 看免费av毛片| 超碰97精品在线观看| 1024香蕉在线观看| 中亚洲国语对白在线视频| 亚洲精品国产一区二区精华液| 欧美 亚洲 国产 日韩一| 国产又爽黄色视频| 久久人妻熟女aⅴ| 成年女人毛片免费观看观看9 | 亚洲国产毛片av蜜桃av| 99国产综合亚洲精品| 18禁黄网站禁片午夜丰满| 国产精品电影一区二区三区 | 午夜91福利影院| 日本五十路高清| 狠狠婷婷综合久久久久久88av| 亚洲欧洲日产国产| 一级a爱视频在线免费观看| 欧美变态另类bdsm刘玥| 国产有黄有色有爽视频| 亚洲成国产人片在线观看| 少妇 在线观看| 欧美老熟妇乱子伦牲交| 国产色视频综合| 亚洲精品久久午夜乱码| 免费在线观看影片大全网站| 1024视频免费在线观看| 精品国产国语对白av| 久久精品国产亚洲av香蕉五月 | 精品少妇黑人巨大在线播放| 99热网站在线观看| 欧美人与性动交α欧美软件| 在线观看一区二区三区激情| 视频在线观看一区二区三区| av国产精品久久久久影院| 久久久精品免费免费高清| 国产有黄有色有爽视频| 大码成人一级视频| 国产成+人综合+亚洲专区| 国产不卡av网站在线观看| a在线观看视频网站| 精品少妇久久久久久888优播| 久久久久久人人人人人| 最近最新中文字幕大全免费视频| 黑人猛操日本美女一级片| 国产日韩欧美视频二区| 亚洲成av片中文字幕在线观看| av片东京热男人的天堂| 日韩免费高清中文字幕av| 精品国产一区二区三区四区第35| 亚洲七黄色美女视频| 脱女人内裤的视频| 国产亚洲精品第一综合不卡| 少妇裸体淫交视频免费看高清 | 男女免费视频国产| 国产成人啪精品午夜网站| 亚洲成人免费电影在线观看| 久久国产精品大桥未久av| 首页视频小说图片口味搜索| 在线 av 中文字幕| 天天躁狠狠躁夜夜躁狠狠躁| 老汉色av国产亚洲站长工具| av片东京热男人的天堂| 久久久精品区二区三区| 国产精品九九99| 91麻豆av在线| 91字幕亚洲| 久久99一区二区三区| 久久午夜综合久久蜜桃| 天天躁狠狠躁夜夜躁狠狠躁| 国产黄色免费在线视频| 免费一级毛片在线播放高清视频 | 日本欧美视频一区| 99香蕉大伊视频| 超碰成人久久| 欧美黑人欧美精品刺激| 99热网站在线观看| 一二三四在线观看免费中文在| 19禁男女啪啪无遮挡网站| 在线av久久热| 一区二区三区激情视频| 欧美精品人与动牲交sv欧美| 91老司机精品| 男女午夜视频在线观看| 精品国产一区二区三区久久久樱花| 50天的宝宝边吃奶边哭怎么回事| 日韩欧美国产一区二区入口| av网站免费在线观看视频| xxxhd国产人妻xxx| 国产精品久久久人人做人人爽| 亚洲欧美一区二区三区黑人| 亚洲情色 制服丝袜| 人人妻,人人澡人人爽秒播| 欧美日韩视频精品一区| 一本综合久久免费| 亚洲男人天堂网一区| 午夜成年电影在线免费观看| 在线亚洲精品国产二区图片欧美| 久久99一区二区三区| 欧美乱码精品一区二区三区| 欧美变态另类bdsm刘玥| 午夜老司机福利片| 黑人巨大精品欧美一区二区mp4| 精品国产乱码久久久久久男人| 国产人伦9x9x在线观看| 女人高潮潮喷娇喘18禁视频| 欧美日韩一级在线毛片| 欧美日韩av久久| 一个人免费在线观看的高清视频| 高潮久久久久久久久久久不卡| 丝袜喷水一区| 久9热在线精品视频| 亚洲成人免费电影在线观看| 成人亚洲精品一区在线观看| 免费av中文字幕在线| 一级a爱视频在线免费观看| 亚洲国产精品一区二区三区在线| 婷婷丁香在线五月| 精品一区二区三区视频在线观看免费 | 一级毛片精品| 99精品欧美一区二区三区四区| 国产单亲对白刺激| 999精品在线视频| 久久性视频一级片| 在线 av 中文字幕| 一个人免费在线观看的高清视频| 一级毛片女人18水好多| 久久狼人影院| 在线观看免费午夜福利视频| 亚洲va日本ⅴa欧美va伊人久久| 成在线人永久免费视频| 国产男女内射视频| 婷婷成人精品国产| 色精品久久人妻99蜜桃| 曰老女人黄片| 啦啦啦 在线观看视频| 狂野欧美激情性xxxx| 精品国产超薄肉色丝袜足j| 国产有黄有色有爽视频| 亚洲欧美日韩高清在线视频 | 51午夜福利影视在线观看| 看免费av毛片| 捣出白浆h1v1| 欧美国产精品一级二级三级| 亚洲精品在线观看二区| 欧美日韩视频精品一区| 王馨瑶露胸无遮挡在线观看| 一进一出好大好爽视频| 久久久久久亚洲精品国产蜜桃av| av天堂在线播放| 久久久久国内视频| 久久精品亚洲精品国产色婷小说| 国产精品av久久久久免费| 国产在线精品亚洲第一网站| h视频一区二区三区| 日本撒尿小便嘘嘘汇集6| 下体分泌物呈黄色| 黄色视频,在线免费观看| 高潮久久久久久久久久久不卡| 成年动漫av网址| 国产激情久久老熟女| 男女午夜视频在线观看| 夜夜夜夜夜久久久久|