• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Physical Safety and Cyber Security Analysis of Multi-Agent Systems:A Survey of Recent Advances

    2021-04-22 03:54:26DanZhangIEEESeniorMemberGangFengIEEEFellowYangShiIEEEFellowandDiptiSrinivasanIEEEFellow
    IEEE/CAA Journal of Automatica Sinica 2021年2期

    Dan Zhang, IEEE Senior Member, Gang Feng, IEEE Fellow, Yang Shi, IEEE Fellow, and Dipti Srinivasan, IEEE Fellow

    Abstract—Multi-agent systems (MASs) are typically composed of multiple smart entities with independent sensing,communication, computing, and decision-making capabilities.Nowadays, MASs have a wide range of applications in smart grids, smart manufacturing, sensor networks, and intelligent transportation systems. Control of the MASs are often coordinated through information interaction among agents,which is one of the most important factors affecting coordination and cooperation performance. However, unexpected physical faults and cyber attacks on a single agent may spread to other agents via information interaction very quickly, and thus could lead to severe degradation of the whole system performance and even destruction of MASs. This paper is concerned with the safety/security analysis and synthesis of MASs arising from physical faults and cyber attacks, and our goal is to present a comprehensive survey on recent results on fault estimation,detection, diagnosis and fault-tolerant control of MASs, and cyber attack detection and secure control of MASs subject to two typical cyber attacks. Finally, the paper concludes with some potential future research topics on the security issues of MASs.

    I. INTRODUCTION

    WITH rapid development of perception, communication, and computation technologies, distributed cooperative control of multi-agent systems (MASs) has received great attention from scholars in different disciplines due to their wide applications in large-scale process industries,multi-robot systems, intelligent transportation systems, sensor networks, smart grids, and internet systems [1]–[5]. In the field of intelligent transportation systems, as shown in Fig.1,the distributed control framework of networked autonomous vehicles can provide new solutions for the safety and efficiency of transportation systems, and help solve practical problems such as traffic accidents, road congestion, energy conservation, and environmental protection [6]. Compared with traditional single-agent systems, multi-agent systems are more scalable and upgradeable while improving task execution efficiency and robustness due to its inherent ability to learn and make autonomous decisions cooperatively.

    Fig.1. The coordinated vehicles in transportation systems.

    The analysis and synthesis of MASs have been extensively studied in a variety of disciplines including computer science,control engineering, electrical engineering, and civil engineering. Existing survey articles present discussions on communication mechanism of MASs [7], [8], consensus protocol of MASs [9], and communication constraints of MASs [10]. Survey works on MASs in the context of computer sciences are also found in [11]–[14]. However, none of these articles concentrate on the issue of securities of MASs though such a kind of networked systems are fragile to physical faults and cyber attacks [15]. It has been recently revealed in [16] that a small fault or cyber attack on an agent can degrade the performance and even paralyze the whole system. What shall we do when some agents are misbehaving,wait, abandon, or adjust [17]? In [18], the issues of access control and trust/reputation of MASs were addressed for the security of MASs. In [19], fault-tolerant control methods of MASs were surveyed, and the attention was focused on topology reconfiguration methods. Nevertheless, there have been a large volume of works on physical safety and cyber security analysis and synthesis in literature recently, where the issues of fault estimation, detection and diagnosis, faulttolerant control, attack detection, and secure consensus were investigated. These studies provide some systematic perspectives and methodologies for improving security of MASs effectively.

    In this paper, we provide a comprehensive overview of recent advances in the physical safety and cyber security issues of MASs, where the actuator and sensor faults will be discussed in the physical safety analysis part, and the deny-ofservice (DoS) attack and Deception attack will be addressed in the cyber security section. The paper is organized as follows.Section II introduces salient results on the fault estimation of MASs, along with some key analysis methods. Section III addresses fault detection and diagnosis of MASs. Section IV discusses fault-tolerant control of MASs. Section V is concerned with representative cyber attacks in MASs and corresponding attack detection schemes. Section VI presents some recent results on secure control of MASs. Finally,Section VII concludes the article with some potential future research topics. The structure of this paper is depicted in Fig.2.The major differences between the relevant survey papers[18], [19] and our paper are summarized as follows:

    1) Reference [18] is concerned with the access control and reputation of MASs. Instead we focus on the cyber security and physical safety of MASs and deal with the safety and security control problem.

    2) In [19], the fault-tolerant control methods of MASs are surveyed with its attention focused on the topology reconfiguration methods. In contrary, we start with the physical threat and conduct a review on recent results on fault estimation,fault detection, and fault-tolerant control of MASs; Then, we pay attention to the cyber threat issue, and analyze recent advances on two typical attacks, DoS attack and Deception attack.

    3) A more systematic and broader overview on the safety and security of MASs is given, aiming to provide a comprehensive survey on this emerging and challenging research direction.

    II. FAULT ESTIMATION OF MASS

    In the past decades, there has been an increasing demand on safety and reliability of MASs, as a single fault on the sensor or actuator could lead to a significant performance degradation on the whole system and even the failure of the whole system. In [20], the performance of a group of unmmaned autonomous vehicles (UAVs) that are subject to different types of actuator faults was investigated, and it was shown that a consensus can still be achieved if a fault of the partial loss of effectiveness occurs in one actuator of an agent,but the transient performance could be degraded dramatically.The consensus would fail to be achieved when actuators are in complete loss of effectiveness. A good fault estimation scheme is capable of providing the timely and precise information of any faults within the system being monitored.Then the effective defense mechanism can be triggered to eliminate the effect of the fault to the system. In this section,we address the fault estimation problem, but only focus on the model-based fault estimation of MASs. The readers are referred to [21]–[23] for model-free ones. A detailed categorization of physical threats in the study of fault estimation of MASs is given in Table I.

    TABLE I CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULT ESTIMATION OF MASS

    A. Homogeneous MASs

    Online fault estimation of MASs is challenging due to the complex interactions among of MASs. Consider a homogeneous MAS with N agents, and each agent is modeled by the following linear system:matrices. In [24], the following system was introduced:

    It is worth pointing out that the local fault in the i -th agent cannot be estimated by its neighbors in the aforementioned results as only the local state and fault were augmented for estimation. Recently, the distributed fault estimator design for a class of Lipschitz nonlinear MASs was investigated in [32],where a new augmented state vector including the local state fault and the neighboring state fault was constructed. The designed observer therein is capable of providing a good estimation of faults both in local agent and its neighbors. The common limitation is still the computational burden when the augmentation technique is used.

    B. Heterogenous MASs

    It is worth pointing out that all the above studies [24]–[32],[34]–[36] focused on homogeneous MASs. In reality, most of multi-agent systems have different agent dynamics, see,trucks, buses and cars in transportation systems. Therefore,distributed fault estimation of heterogeneous MASs has received increasing attention. For a class of linear discretetime heterogeneous linear MASs, a distributed l1-norm-based optimization method was introduced to estimate the state and fault simultaneously in [33]. It was shown that if and only if the number of faulty agents is smaller than the half of number of agents and the following optimization problem:

    III. FAULT DETECTION AND DIAGNOSIS

    Compared with fault estimation, traditional fault detection and diagnosis is less demanding as it only seeks to trigger an alarm signal when a fault is detected in the system (and then isolate the fault). It has been extensively adopted in many real systems such as power systems [38], mechatronic systems[39], chemical systems [40], etc. We now address the fault detection and diagnosis issue of MASs, and present some recent results in this area. A detailed categorization of physical threats in the study of fault detection and diagnosis of MASs is given in Table II.

    TABLE II CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULT DETECTION AND DIAGNOSIS OF MASS

    A. Homogenous MASs

    Distributed fault detection for a network of second-order linear MASs was studied in [41], where a bank of unknown input observers (UIOs) were designed to detect the fault by regarding the fault as an unknown input. The faulty agent was removed from the network when it was detected by comparing the residual evaluation function with a threshold. The approach presented in [41] was feasible only if a single additive fault was present. Based on the analysis results in[41], distributed fault detection of a networked dynamical system with multiple faults was investigated in [46], where the minimum amount of information required by an agent to detect the faults was revealed. The distributed unknown input observer was also designed in [42] for a class of discrete-time high-order systems. The reduced-order unknown input observer was also applied to the high-order MASs as in [43].It must be pointed out that the matching condition is a direct restriction of those observers, e.g., rank(CE)=rank(E),where C is the output matrix, and E is the weighting matrix of the unknown disturbance.

    In [47], distributed fault detection for general high-order linear MASs was discussed, where the relative output information was used to construct the observer. In [44], the interval observer was proposed for a class of discrete-time MASs such that the lower and upper bounds of state observation were obtained, see the following interval observer designed for the i-th agent:

    Note that most of the above works only address the fault diagnosis including fault estimation, detection, and isolation of physical faults in MASs, the design of control protocols is yet to be further investigated. In the following section, the issue of fault-tolerant control is discussed.

    IV. FAULT-TOLERANT CONTROL

    The main role of fault-tolerant control is to trigger an adjustment control mechanism to deal with the faults when they are detected. Sometimes, the fault-tolerant controller is designed on the basis of the precise fault estimation information. Recent studies on this topic are summarized in this section. A detailed categorization of physical threats in the study of fault-tolerant control of MASs is given in Table III.

    TABLE III CATEGORIZATION OF PHYSICAL THREATS IN THE STUDY OF FAULTTOLERANT CONTROL OF MASS

    V. CYBER ATTACK DETECTION OF MASS

    We have made a comprehensive survey on physical fault estimation, detection, isolation, and fault-tolerant control of MASs in the previous sections. All those results deal with the physical threats in MASs. With recent development of information technology, the communication networks of MASs are exposed to the general public, with a great risk of being attacked by adversaries. In this article, we only focus on two typical attacks: the deny-of-service (DoS) attack and the Deception attack. A DoS attacker can exhaust the network or system resources of the target agent, causing the service of MASs to be temporarily interrupted, stopped, or crashed. On the other hand, wrong decision may be made when some false data are injected into sensors or actuators. In this case, the man-made fault could occur. The attack detection for networked systems has received increasing attention in past few years as in [71]–[73]. In this section, we focus our attention on the attack detection problem of MASs. A detailed categorization of cyber threats in the study of cyber attack detection of MASs is given in Table IV.

    TABLE IV CATEGORIZATION OF CYBER THREATS IN THE STUDY OF CYBER ATTACK DETECTION OF MASS

    A. Homogeneous MASs

    In [78], the DoS attack detection problem was considered for a network of vehicle systems, and an augmented system including the vehicle state (position, velocity) and controller state was proposed as follows:

    where di(t) is the relative distance between vehicles, vi(t) is the velocity of the i-th vehicle, and ai(t) is the acceleration signal of the i-th vehicle. τ is the unknown delay introduced to describe the duration time that the communication network was occupied by an illegal user. In order to estimate τ, the following sliding mode observer was designed:

    VI. SECURE CONSENSUS OF MASS

    The secure consensus control problem of MASs has been investigated in parallel with the attack detection problem in previous years. The salient results are collected and presented in this section. A detailed categorization of cyber threats in the study of secure consensus of MASs is given in Table V.

    TABLE V A CONCRETE CATEGORIZATION OF CYBER THREATS IN THE STUDY OF SECURE CONSENSUS OF MASS

    A. Homogeneous MASs

    Some other researchers studied the DoS effect on MASs from the Markovian jumping system point of view. For example, the secure consensus of linear MASs with random attack was studied in [90], where the attack was driven by a Markov process. A state feedback secure consensus protocol consisting of two controllers was proposed for different time intervals, where one controller was designed for the MAS subject to attacks and the other one was designed for the normal MAS without attacks, i.e.,

    where λ(t) is a switching signal obeying the Markov transition process. α and β are the coupling strengths for the MASs without attack and with attack, respectively. K and H are the two controller gains that were determined based on the solution of an algebraic Riccati equation and an algebraic Riccati inequality, respectively, i.e., K=R?1BTP and H=T?1BTS with

    where δ>0 is any given scalar, and P,R,S, and T are positive definite matrices.

    The similar analysis method was later extended to the observer-based control protocol in [91]. However, the attack distribution information must be known a prior for consensus protocol design, which may not be an easy task due to the fact that the adversaries would try to hide their attack strategies.On the other hand, the adversaries may inject some false data into the packet to mislead the agent as the price of launching the DoS attack may be very high. Now, we pay our attention to the case of Deception attack. The recent advances are summarized in the following.

    B. Heterogeneous MASs

    The secure output consensus of heterogeneous MASs with aperiodic sampling and DoS attack was studied in our earlier work [92], where the input-hold mechanism was adopted when DoS attack occurs. In our work [102], both of the communication channels of agent-satellite and agent-agent were broken when attack occurs. By introducing a piece-wise signal to describe the nonuniform sampling phenomenon, a stochastic variable to characterize the occurrence of the attack and the time-delay term to model the attack duration, a stochastic switched-time delay system was derived that is capable of modeling the MASs subject to nonuniform sampling and random DoS attack. With the help of Lyapunov stability theory, some sufficient conditions were proposed such that the output consensus error system was guaranteed to be exponentially stable in the mean-square sense and achieved a prescribed H∞performance level. Some matrix manipulation techniques were also introduced to derive the controller gain matrices. Note that the secure control protocol design was based on the precise attack probability, which is a limitation in reality. Recently, a new switched system approach was proposed for the secure consensus of heterogeneous MASs with DoS attack in [93], where a piecewise switching signal indicating different attack duration was proposed to characterize the attack strategy variation, i.e., the local position signal can be modeled as

    where d(k)∈{0,1,2,...,N} is a switching signal indicating the different attack durations. The similar modeling method was also adopted for the communication interaction of agent i and its neighbors. In this case, the attack probability is not involved in the system modeling and analysis. A major limitation is that the adversary could jam all the communication channels, while in reality the adversary may only have the ability to jam a few channels as the system size is usually large.

    Recently, the Markovian jumping system approach was proposed to model the partially unknown and uncertain attack in secure consensus of heterogenous MASs in [103], where the agents are communicating with each other periodically when there is no attack. A nonuniform sampled-data system was introduced when the attack occurs, the attack duration and probability are transformed into the number of sampling periods and transition probability of Markovian jumping system, respectively by assuming that the attack strategy follows a Markov chain as in [90].

    As for the Deception attacks, the research on secure consensus of heterogeneous MASs is yet to be reported.Compared with the results on secure consensus of homogeneous systems, the regulator equation [104] is usually necessary to derive the consensus protocols, see, e.g., [92],[93], [103].

    VII. CONCLUSIONS AND FUTURE WORK

    We have presented an overview of recent advances on the physical safety and cyber security issues of MASs in this paper. In particular, we have presented the results on physical fault estimation, detection and diagnosis, fault-tolerant control, cyber attack detection, and secure control under two typical kinds of attacks: the DoS attack and the Deception attack. Although many significant results have been reported on the security issue of MASs from various perspectives, the increasing complex security situation and higher security demand have brought many new challenges to the protection of MASs. Some potential research directions are recommended as follows.

    A. Consensus With Sophisticated Attacks

    In most of existing works, usually only one attack phenomenon is studied, i.e., the DoS attack and the Deception attack were usually investigated separately. A sole attack behavior may be easier to be detected and eliminated by a well designed detection system. In order to avoid being detected, the adversary would try to launch more sophisticated attacks such as a combination of the DoS attacks, Deception attacks, Replay attacks [105], Stealth attack [106] etc. In this scenario, how can we design the secure consensus protocol?The main challenge is that it is usually hard to precisely capture the dynamic behavior of adversaries precisely.Furthermore, with the rapid development of artificial intelligence, some well designed attacks may have the learning ability to evolve and mutate to avoid being detected[107]. Modeling of such a sophisticated attack is a difficult task [108]. This may be one of the potential reasons that very few works on secure consensus of heterogeneous MASs with Deception attack have been reported, not to mention a more sophisticated attack. A possible method to deal with those sophisticated attacks is from the game-theory perspective,which has been shown to be effective in dealing with the attacks in smart grids [109], [110]. Note that it is possible to design a perfect defense system only when the attacker’s dynamic behavior can be predicted and modeled accurately.Thus, the security analysis of MASs subject to more sophisticated attacks deserves further research attention as it is the first stage to deal with attacks.

    B. Consensus With Physical and Cyber Securities

    A successful working MAS relies on healthy components and a secure communication environment. However, most of current attention has only focused on the physical safety or cyber security individually, instead of both simultaneously.With the development of network and communication technologies, the boundaries between the physical world and the cyber world have been blurred. Furthermore, the adversaries may exploit security vulnerabilities to gain control over some of the sensors and actuators, MASs may crash quickly when they are subject to physical and cyber threats at the same time [111]. Therefore, a collaborative defense strategy must be established from both the physical and cyber levels to better protect MASs, which could be a second potential research direction. However, it is a challenging task,because we have not fully understood the physical world, let alone the cyber world. A possible method to deal with unknown physical and cyber securities is to use the current advanced artificial intelligence technology by collecting the large amount of running data; see the recent survey papers[112], [113].

    C. Finite-Time Attack Detection and Secure Consensus

    The MASs are safety-critical systems that should be designed with time-efficient attack detection and defense. In other words, malicious attack signals should be detected in a timely manner. However, most of current researchers only focused on whether malicious attack signals can be detected or not, with very little attention being paid on how fast malicious signals can be detected. The survey paper [9] has presented a few interesting results on finite-time consensus of MASs, which may be helpful to provide a new insight for development of time-efficient defense approaches for MASs with desirable detection speed and performance. To the best of our knowledge, such a kind of finite-time malicious signal detection and secure consensus is still not solved yet, which could be a good research direction in this area.

    D. Real Testbed Design and System-Level Application

    In most existing works, only theoretical results are reported with some simulations. For example, a simulation study was performed for the protection of power system in [114]. These results are still far away from real applications. Designing a real testbed to verify the effectiveness of existing theoretical results is an urgent task as this is the first step in developing practical techniques to protect actual systems. Note that some testbeds have been designed for industrial cyber-physical systems, see the water distribution testbed [115], power generation station testbed [116], the teleoperation system [96],etc. But, the development of the system testbeds is still very limited and the focus is only paid on detecting the attack without designing any defense mechanism. It should also be a challenge when the physical threats and cyber threats are simultaneously considered in the design of testbeds and defense strategies, which could be a fourth potential research direction.

    麻豆av在线久日| 亚洲色图 男人天堂 中文字幕| www.www免费av| 女警被强在线播放| 两个人看的免费小视频| 久热爱精品视频在线9| 亚洲av成人不卡在线观看播放网| 18禁国产床啪视频网站| 99riav亚洲国产免费| 一级片'在线观看视频| 国产成人免费无遮挡视频| 国产精品免费视频内射| 男人舔女人下体高潮全视频| 黄频高清免费视频| 国产单亲对白刺激| 日韩免费高清中文字幕av| 亚洲精品国产区一区二| 黑人猛操日本美女一级片| 亚洲 欧美一区二区三区| 成年版毛片免费区| 国产不卡一卡二| 国产av精品麻豆| 成人黄色视频免费在线看| 成人18禁在线播放| 亚洲熟女毛片儿| 日韩欧美一区视频在线观看| 欧美成人性av电影在线观看| 成人国语在线视频| 国产精品乱码一区二三区的特点 | 日韩欧美国产一区二区入口| 日本黄色日本黄色录像| 国产欧美日韩综合在线一区二区| 国产人伦9x9x在线观看| 欧美精品亚洲一区二区| 91麻豆精品激情在线观看国产 | 999精品在线视频| 欧美激情 高清一区二区三区| 日韩大码丰满熟妇| 成人影院久久| 久久婷婷成人综合色麻豆| 1024香蕉在线观看| 成年人黄色毛片网站| 久久午夜综合久久蜜桃| 亚洲欧美激情在线| 一二三四社区在线视频社区8| 中国美女看黄片| 亚洲avbb在线观看| 亚洲精品成人av观看孕妇| 久久亚洲精品不卡| 十八禁人妻一区二区| 色尼玛亚洲综合影院| 手机成人av网站| 国产一区在线观看成人免费| 在线看a的网站| 两人在一起打扑克的视频| 午夜成年电影在线免费观看| 亚洲精品久久午夜乱码| 亚洲国产欧美日韩在线播放| 午夜免费成人在线视频| 亚洲av第一区精品v没综合| 国产97色在线日韩免费| 好看av亚洲va欧美ⅴa在| 不卡一级毛片| 99国产精品免费福利视频| 大香蕉久久成人网| 国产在线精品亚洲第一网站| 精品国产超薄肉色丝袜足j| 18禁国产床啪视频网站| 日本一区二区免费在线视频| 真人做人爱边吃奶动态| 亚洲全国av大片| 啦啦啦 在线观看视频| 久久久久国内视频| 正在播放国产对白刺激| 色哟哟哟哟哟哟| 亚洲久久久国产精品| 久久性视频一级片| 9191精品国产免费久久| 99re在线观看精品视频| 丝袜人妻中文字幕| 免费在线观看日本一区| 好男人电影高清在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲自拍偷在线| 国产av精品麻豆| 狂野欧美激情性xxxx| 在线十欧美十亚洲十日本专区| 国产成人系列免费观看| 99riav亚洲国产免费| 人人澡人人妻人| 国产一区二区三区视频了| 十八禁网站免费在线| 一区在线观看完整版| 窝窝影院91人妻| 成人国产一区最新在线观看| 日韩视频一区二区在线观看| 成人国语在线视频| 欧美成人午夜精品| videosex国产| 成年女人毛片免费观看观看9| 久久精品国产综合久久久| 老司机亚洲免费影院| 欧美性长视频在线观看| 黄网站色视频无遮挡免费观看| 欧美丝袜亚洲另类 | 欧美激情极品国产一区二区三区| x7x7x7水蜜桃| 欧美日韩精品网址| 欧美激情 高清一区二区三区| 99在线视频只有这里精品首页| 精品国产乱子伦一区二区三区| 女人被躁到高潮嗷嗷叫费观| 一个人免费在线观看的高清视频| 性欧美人与动物交配| 亚洲色图av天堂| 国产欧美日韩一区二区三| 亚洲人成电影观看| 精品国产国语对白av| 精品久久久久久,| 日本a在线网址| 日韩欧美在线二视频| 国产视频一区二区在线看| 午夜免费观看网址| 亚洲欧美激情综合另类| 午夜激情av网站| 国产欧美日韩一区二区三| 后天国语完整版免费观看| 免费一级毛片在线播放高清视频 | 91av网站免费观看| 自拍欧美九色日韩亚洲蝌蚪91| 又黄又爽又免费观看的视频| 黄片小视频在线播放| 黄片大片在线免费观看| 脱女人内裤的视频| 亚洲国产精品sss在线观看 | 亚洲专区字幕在线| 国产精品香港三级国产av潘金莲| a在线观看视频网站| 亚洲欧美日韩高清在线视频| 神马国产精品三级电影在线观看 | 91国产中文字幕| 免费观看精品视频网站| 亚洲国产精品sss在线观看 | 午夜久久久在线观看| 欧美日韩精品网址| 久久精品人人爽人人爽视色| 国产97色在线日韩免费| 国产亚洲精品久久久久久毛片| 男女下面进入的视频免费午夜 | 日韩欧美一区视频在线观看| tocl精华| 女人爽到高潮嗷嗷叫在线视频| 国产成人系列免费观看| 香蕉国产在线看| 亚洲 欧美一区二区三区| 婷婷精品国产亚洲av在线| 欧美日韩亚洲综合一区二区三区_| av网站在线播放免费| 变态另类成人亚洲欧美熟女 | 18美女黄网站色大片免费观看| 国内久久婷婷六月综合欲色啪| 一二三四在线观看免费中文在| 宅男免费午夜| 欧美日韩一级在线毛片| 欧美日韩瑟瑟在线播放| 亚洲av成人av| 久久久国产成人精品二区 | 后天国语完整版免费观看| 亚洲av片天天在线观看| 国产免费av片在线观看野外av| 久久九九热精品免费| 黄色毛片三级朝国网站| 亚洲国产毛片av蜜桃av| 又大又爽又粗| 色播在线永久视频| 少妇被粗大的猛进出69影院| 免费在线观看黄色视频的| 国产熟女xx| 免费少妇av软件| 久久天躁狠狠躁夜夜2o2o| 欧美大码av| 999精品在线视频| 一个人免费在线观看的高清视频| 欧美成人免费av一区二区三区| 欧美不卡视频在线免费观看 | 一级毛片精品| 男女午夜视频在线观看| 久久久久国内视频| 看黄色毛片网站| 精品一区二区三卡| 欧美人与性动交α欧美精品济南到| 国产1区2区3区精品| 涩涩av久久男人的天堂| 丝袜人妻中文字幕| 女人爽到高潮嗷嗷叫在线视频| 精品一品国产午夜福利视频| 久久九九热精品免费| 亚洲av片天天在线观看| 国产蜜桃级精品一区二区三区| 国产精华一区二区三区| 韩国av一区二区三区四区| 啦啦啦免费观看视频1| 日韩大码丰满熟妇| 国产亚洲精品综合一区在线观看 | 校园春色视频在线观看| 一区二区三区激情视频| 国产精品自产拍在线观看55亚洲| 欧美另类亚洲清纯唯美| 女人被躁到高潮嗷嗷叫费观| 亚洲av熟女| 黄片播放在线免费| 村上凉子中文字幕在线| 国产av又大| 在线观看舔阴道视频| 欧美在线黄色| 国产熟女午夜一区二区三区| 国产伦一二天堂av在线观看| 丰满的人妻完整版| 亚洲第一欧美日韩一区二区三区| 动漫黄色视频在线观看| 欧美激情高清一区二区三区| 成人18禁高潮啪啪吃奶动态图| 韩国精品一区二区三区| 国产精品久久视频播放| 亚洲一区二区三区不卡视频| 亚洲精品一二三| 一级作爱视频免费观看| 九色亚洲精品在线播放| 中文字幕另类日韩欧美亚洲嫩草| 亚洲第一欧美日韩一区二区三区| 不卡av一区二区三区| 久久香蕉精品热| 亚洲少妇的诱惑av| 88av欧美| 一个人观看的视频www高清免费观看 | 久久国产亚洲av麻豆专区| 国产99白浆流出| 国产av一区二区精品久久| 日日干狠狠操夜夜爽| 欧美成人免费av一区二区三区| 国产精品久久久久成人av| 波多野结衣高清无吗| 亚洲男人天堂网一区| 真人一进一出gif抽搐免费| 9色porny在线观看| 欧美成人午夜精品| 琪琪午夜伦伦电影理论片6080| 日韩一卡2卡3卡4卡2021年| 亚洲专区国产一区二区| 国产一区二区激情短视频| 色综合欧美亚洲国产小说| 黄网站色视频无遮挡免费观看| av在线天堂中文字幕 | 男女午夜视频在线观看| 午夜精品在线福利| 亚洲av五月六月丁香网| 大陆偷拍与自拍| 男女高潮啪啪啪动态图| 女人高潮潮喷娇喘18禁视频| 久久久久久久久久久久大奶| 一级毛片高清免费大全| 亚洲成人国产一区在线观看| 成人国语在线视频| 一进一出抽搐gif免费好疼 | 老熟妇仑乱视频hdxx| 51午夜福利影视在线观看| 久久国产精品人妻蜜桃| 国产精品香港三级国产av潘金莲| 精品久久久久久电影网| 亚洲国产欧美日韩在线播放| 18美女黄网站色大片免费观看| 久久青草综合色| 国产在线观看jvid| 欧美日韩福利视频一区二区| 99久久综合精品五月天人人| 天天躁夜夜躁狠狠躁躁| 一个人观看的视频www高清免费观看 | 男女高潮啪啪啪动态图| 国产av在哪里看| 丝袜人妻中文字幕| 老司机深夜福利视频在线观看| 中文字幕人妻丝袜一区二区| 欧美一级毛片孕妇| 亚洲一区二区三区色噜噜 | 成人精品一区二区免费| 日本精品一区二区三区蜜桃| 精品午夜福利视频在线观看一区| 亚洲 国产 在线| 国产黄色免费在线视频| 美女国产高潮福利片在线看| 天天添夜夜摸| 免费在线观看日本一区| 国产91精品成人一区二区三区| 国产单亲对白刺激| 涩涩av久久男人的天堂| 精品熟女少妇八av免费久了| 国产精品一区二区精品视频观看| 久久中文字幕一级| 中文字幕高清在线视频| 18禁国产床啪视频网站| 国产高清国产精品国产三级| 巨乳人妻的诱惑在线观看| 久久久国产成人免费| 水蜜桃什么品种好| 亚洲欧美一区二区三区黑人| 色综合婷婷激情| 久久精品国产清高在天天线| 中文字幕色久视频| 黑人巨大精品欧美一区二区蜜桃| 欧美乱妇无乱码| 91精品国产国语对白视频| 亚洲,欧美精品.| 成人三级做爰电影| 亚洲精品一区av在线观看| 在线观看免费日韩欧美大片| 一级a爱视频在线免费观看| 亚洲九九香蕉| 9191精品国产免费久久| 国产一区二区激情短视频| 级片在线观看| 国产精品国产av在线观看| 性欧美人与动物交配| www.自偷自拍.com| 国产国语露脸激情在线看| 亚洲精品一卡2卡三卡4卡5卡| videosex国产| 午夜免费鲁丝| 精品国产美女av久久久久小说| 日本撒尿小便嘘嘘汇集6| 国产高清视频在线播放一区| 亚洲色图 男人天堂 中文字幕| 一级黄色大片毛片| 日韩人妻精品一区2区三区| 咕卡用的链子| 一个人免费在线观看的高清视频| 精品国内亚洲2022精品成人| 18禁国产床啪视频网站| 9色porny在线观看| 亚洲精品美女久久久久99蜜臀| www.精华液| 亚洲欧美日韩无卡精品| 欧美中文日本在线观看视频| 国产三级在线视频| 极品人妻少妇av视频| 12—13女人毛片做爰片一| 亚洲精华国产精华精| 欧美激情久久久久久爽电影 | 国产精品秋霞免费鲁丝片| 中文亚洲av片在线观看爽| 日韩av在线大香蕉| a级毛片黄视频| 精品免费久久久久久久清纯| 色婷婷久久久亚洲欧美| 一个人免费在线观看的高清视频| 日日爽夜夜爽网站| 宅男免费午夜| www.熟女人妻精品国产| 国产精品久久久av美女十八| 国产精品秋霞免费鲁丝片| 国产精品综合久久久久久久免费 | 操美女的视频在线观看| 久久久久久人人人人人| 国产欧美日韩综合在线一区二区| 国产精品综合久久久久久久免费 | 精品无人区乱码1区二区| 亚洲精品在线美女| 午夜免费激情av| 黑人巨大精品欧美一区二区mp4| 国产精品久久视频播放| 精品少妇一区二区三区视频日本电影| 免费搜索国产男女视频| 欧美日韩精品网址| 51午夜福利影视在线观看| 中文字幕精品免费在线观看视频| 久久人妻熟女aⅴ| 久久久久久久久中文| 天堂动漫精品| 国产精品一区二区免费欧美| 欧美黄色片欧美黄色片| 欧美久久黑人一区二区| 亚洲av美国av| 亚洲在线自拍视频| 免费高清视频大片| av国产精品久久久久影院| 亚洲精品美女久久久久99蜜臀| 一级毛片女人18水好多| av有码第一页| 国产激情欧美一区二区| 天堂√8在线中文| 欧美大码av| 久久中文看片网| 伦理电影免费视频| 亚洲精品一二三| www.熟女人妻精品国产| 亚洲成人国产一区在线观看| 黄片播放在线免费| 日韩三级视频一区二区三区| 一级毛片女人18水好多| videosex国产| 欧美 亚洲 国产 日韩一| 日韩视频一区二区在线观看| 咕卡用的链子| 欧美日韩乱码在线| 日韩精品中文字幕看吧| 久久精品91无色码中文字幕| 国产精品亚洲一级av第二区| 久久精品成人免费网站| 又紧又爽又黄一区二区| 1024视频免费在线观看| 亚洲精品在线美女| 欧美日韩福利视频一区二区| 成人国产一区最新在线观看| aaaaa片日本免费| 久久久久亚洲av毛片大全| 亚洲人成电影免费在线| 日韩精品青青久久久久久| 女人精品久久久久毛片| 色在线成人网| 人妻久久中文字幕网| 波多野结衣av一区二区av| 免费不卡黄色视频| 亚洲国产精品999在线| 自拍欧美九色日韩亚洲蝌蚪91| 久久狼人影院| www.精华液| 两个人免费观看高清视频| 老司机福利观看| 免费少妇av软件| 人妻久久中文字幕网| 国产精品国产av在线观看| 午夜成年电影在线免费观看| 他把我摸到了高潮在线观看| 两个人看的免费小视频| 国产精品一区二区三区四区久久 | 国产精品美女特级片免费视频播放器 | 最好的美女福利视频网| 少妇的丰满在线观看| 日本欧美视频一区| 久久久国产成人精品二区 | 夜夜躁狠狠躁天天躁| 亚洲成av片中文字幕在线观看| 欧美久久黑人一区二区| 久久久水蜜桃国产精品网| 丁香六月欧美| 99精国产麻豆久久婷婷| 亚洲一区中文字幕在线| 亚洲一区二区三区欧美精品| 国产主播在线观看一区二区| 欧美一级毛片孕妇| 男女下面进入的视频免费午夜 | 日日干狠狠操夜夜爽| 国产精品国产高清国产av| 国产成人精品无人区| 欧美激情久久久久久爽电影 | 亚洲精品国产色婷婷电影| 国产精品久久久人人做人人爽| 久久午夜综合久久蜜桃| 国产一区二区在线av高清观看| 99久久99久久久精品蜜桃| 香蕉丝袜av| 免费在线观看视频国产中文字幕亚洲| 亚洲一码二码三码区别大吗| 老司机深夜福利视频在线观看| 在线看a的网站| 又紧又爽又黄一区二区| 国产精品美女特级片免费视频播放器 | 亚洲精品一区av在线观看| 久久久国产成人精品二区 | 怎么达到女性高潮| 久久久国产精品麻豆| 国产免费男女视频| 亚洲aⅴ乱码一区二区在线播放 | 夜夜夜夜夜久久久久| av在线播放免费不卡| 黑人猛操日本美女一级片| 99精品欧美一区二区三区四区| 亚洲av成人一区二区三| 日韩av在线大香蕉| 悠悠久久av| 国产成人一区二区三区免费视频网站| 亚洲第一av免费看| 两个人看的免费小视频| 一个人免费在线观看的高清视频| 一边摸一边抽搐一进一出视频| 视频在线观看一区二区三区| 天天躁夜夜躁狠狠躁躁| 精品欧美一区二区三区在线| 18禁国产床啪视频网站| 亚洲中文日韩欧美视频| 免费搜索国产男女视频| 麻豆久久精品国产亚洲av | 一区二区日韩欧美中文字幕| 精品第一国产精品| 91成年电影在线观看| 激情在线观看视频在线高清| a在线观看视频网站| 精品电影一区二区在线| 99久久综合精品五月天人人| 亚洲,欧美精品.| 男男h啪啪无遮挡| 欧美在线一区亚洲| 999精品在线视频| 97超级碰碰碰精品色视频在线观看| 男女做爰动态图高潮gif福利片 | 国产精品久久久久成人av| 午夜福利在线观看吧| 悠悠久久av| 在线av久久热| 国产91精品成人一区二区三区| 在线国产一区二区在线| 久久亚洲真实| 丝袜在线中文字幕| 色综合欧美亚洲国产小说| 两个人免费观看高清视频| 脱女人内裤的视频| 亚洲av熟女| 变态另类成人亚洲欧美熟女 | 亚洲av片天天在线观看| 老鸭窝网址在线观看| 妹子高潮喷水视频| 性少妇av在线| 久久亚洲精品不卡| 亚洲精品av麻豆狂野| 香蕉丝袜av| 一二三四在线观看免费中文在| 真人一进一出gif抽搐免费| 成人国产一区最新在线观看| 色尼玛亚洲综合影院| 亚洲精品国产精品久久久不卡| 亚洲va日本ⅴa欧美va伊人久久| 国产黄色免费在线视频| 18禁观看日本| 多毛熟女@视频| 免费高清视频大片| 99国产精品一区二区三区| 夜夜爽天天搞| 少妇粗大呻吟视频| 成人三级做爰电影| 国产一区二区在线av高清观看| 老司机亚洲免费影院| 成年人黄色毛片网站| 丁香欧美五月| 黑人欧美特级aaaaaa片| 亚洲av第一区精品v没综合| 亚洲精品在线美女| 亚洲欧美精品综合久久99| 在线免费观看的www视频| 精品久久久精品久久久| 久久九九热精品免费| 久久国产乱子伦精品免费另类| 最近最新中文字幕大全电影3 | 国产成人系列免费观看| 精品一区二区三区av网在线观看| 国产午夜精品久久久久久| 日韩国内少妇激情av| 如日韩欧美国产精品一区二区三区| 色在线成人网| 精品一区二区三区av网在线观看| 日本免费a在线| 亚洲三区欧美一区| 精品久久蜜臀av无| 日本黄色日本黄色录像| 午夜激情av网站| 99久久国产精品久久久| 黄色女人牲交| 免费观看精品视频网站| 亚洲狠狠婷婷综合久久图片| 国产伦一二天堂av在线观看| 18禁美女被吸乳视频| 亚洲精品久久午夜乱码| 国产一区二区三区综合在线观看| 精品久久久久久久久久免费视频 | 久久九九热精品免费| 国产成人欧美| 成人三级做爰电影| 视频区欧美日本亚洲| 欧美日韩精品网址| 在线观看日韩欧美| 国产主播在线观看一区二区| 看黄色毛片网站| 嫁个100分男人电影在线观看| 女人高潮潮喷娇喘18禁视频| xxx96com| 亚洲七黄色美女视频| 午夜视频精品福利| 夫妻午夜视频| 国产一区二区三区在线臀色熟女 | 桃色一区二区三区在线观看| 免费在线观看完整版高清| 欧美 亚洲 国产 日韩一| 免费在线观看黄色视频的| 午夜福利一区二区在线看| 欧美日韩国产mv在线观看视频| 久久久久久久久久久久大奶| 久久久久亚洲av毛片大全| 亚洲情色 制服丝袜| 亚洲国产精品一区二区三区在线| 欧美一区二区精品小视频在线| 久久久久精品国产欧美久久久| 亚洲av电影在线进入| 黄网站色视频无遮挡免费观看| 99久久综合精品五月天人人| 国产一区二区激情短视频| 国产亚洲精品久久久久久毛片| 少妇的丰满在线观看| 琪琪午夜伦伦电影理论片6080| 黑人巨大精品欧美一区二区mp4| 亚洲第一欧美日韩一区二区三区| 欧美激情极品国产一区二区三区| 一二三四在线观看免费中文在| 少妇的丰满在线观看| 黄色视频不卡| 麻豆成人av在线观看| 亚洲成国产人片在线观看| 亚洲激情在线av|