• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems

    2021-07-26 07:23:14YueZhaoZeChenChunjieZhouYuChuTianandYuanqingQin
    IEEE/CAA Journal of Automatica Sinica 2021年8期

    Yue Zhao, Ze Chen, Chunjie Zhou, Yu-Chu Tian,, and Yuanqing Qin

    Abstract—Secure control against cyber attacks becomes increasingly significant in cyber-physical systems (CPSs). False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals. For quantified false data injection attacks, this paper establishes an effective defense framework from the energy conversion perspective. Then, we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks. The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection. Moreover, with the L2disturbance attenuation technique,theburdenof control systemdesignissimplified because there is no need to design an attack observer. In addition,this secure control method is simple to implement because it avoids complicated mathematical operations. The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.

    I. INTRODUCTION

    RECENTLY, cyber attacks against cyber-physical systems(CPSs) have increasingly occured. Due to the existence of such attacks, CPSs usually exhibit strong nonlinear characteristics. The inherent nonlinear nature of the attacked CPSs has motivated the research of nonlinear control methods in security control. Existing investigations have delved into the nonlinear control of CPSs include adaptive control [1], [2],sliding mode control [3] and model predictive control [4]–[6].

    Existing nonlinear control methods against cyber attacks have been studied mostly from the perspective of signal processing. These nonlinear control methods show some disadvantages. For example, the design of adaptive control methods is usually complicated. When the control system has non-parametric uncertainties, its robustness is greatly affected by model errors. As another example, the application of sliding mode control methods not only shows a chattering phenomenon, but also is restricted by the relative order of the system. Furthermore, the backstepping control method is easy to cause the dimensional expansion of the system. The model predictive control method demands a large amount of calculation. As a result, the control time is difficult to guarantee. Because attacks are unpredictable, time-varying,and complex, these high-gain control methods have limited ability to deal with attacks.

    The design of adaptive secure controller in [7] counteracts denial-of-service (DoS) attacks as well as external disturbances. They offset the impact of unknown attacks on the system in real time. However, the selection of adaptive parameters is a difficult task as attacks are changeable. The study reported in [8] uses an backstepping secure controller to deal with attacks. However, this controller is only designed for second-order systems. Its applications to high-order systems are difficult because it will cause dimensional expansion problems. The work in [9] investigates discretetime cyber-physical systems under actuator and sensor attacks.As attacks are unknown, it adopts an observer-based control scheme to stabilize attacked systems. But the design of the additional attack observer complicates control system design.The reports in [10]–[13] consider a model predictive control algorithms to handle attacks for discrete-time systems. They solve an optimization problem with some constraints expressed by linear matrix inequalities. However, the optimization process is computationally expensive, increasing the complexity of the control problem.

    In the fields of science and engineering, it is generally believed that the change in various physical quantities in dynamic systems reflect a change in energy (absorption,conversion, and consumption). For example, the change in current flowing through an inductor reflects the change in magnetic field energy. Therefore, the physical quantity of the system can be controlled through the control of the system energy. The passivity of the system is the energy change property of the system. Passivity-based control [14]–[16] is an inherently nonlinear control method because of its good physical interpretation and global convergence characteristics.With an intuitive physical concept, this nonlinear control method provides a physical explanation for control behavior[17], [18]. It not only ensures the stability of the system but also improves the dynamic performance of the system through the method of damping injection [19]–[21]. Compared with other nonlinear control methods based on signal processing,the passive-based control method does not need to solve the high-gain feedback control law. Thus, it is computationally simpler, implying that it is easier to implement in engineering.

    However, a CPS under passivity-based control has weak stability when it is attacked. When false data injection attacks[22], [23] occur, the control commands and/or sensor outputs are maliciously increased or reduced. Eventually, the system energy will be maliciously changed, causing system instability. There are two main ways to increase the stability of the system: 1) Use the observer [24], [25] to observe, and compensate for, the attack, and 2) Use theL2disturbance attenuation method [26], [27] to suppress the impact of the attack on the system to a certain level. Due to the unpredictability of attacks, the existing disturbance observer may fail when observing unknown attacks. The design of the attack observer will increase the cost and difficulty of the control system design. Therefore, this paper combines the Hamiltonian system theory and theL2disturbance attenuation control technology. Adopting the passivity-based method of interconnection and damping configuration, we design a passivity-based robust controller from the port controlled Hamiltonian with dissipation (PCHD) model to improve the control quality.

    Overall, this paper makes the following two main contributions to the security of CPSs under false data injection attacks:

    1) A defense framework is proposed from the perspective of energy conversion; and

    2) With theL2gain disturbance attenuation technology, a passivity-based robust controller from the port controlled Hamiltonian model is designed to stabilize the attacked CPSs.

    The remainder of this paper is organized as follows:Section II describes our defense framework based on energy conversion. This is followed by our deign of a passivity-based robust controller in Section III. Section IV gives experimental results. Finally, Section V concludes the paper.

    Notations:R , Rn, and Rm×nstand for real space,ndimensional real space, andm×nreal matrices, respectively.||·|| means the 1-norm of a vector or matrix.Imrepresents anm-order unit matrix. diag(x1,...,xm) denotes a diagonal matrix.ATmeans the transpose of a vector or matrixA.

    II. DEFENSE FRAMEwORk BASED ON ENERGY CONVERSION

    In this section, we describe a defense framework from the perspective of energy conversion. The framework is based on system transformation.

    A. System Model Conversion for Energy Control

    For an arbitraryn- inputn-output affine nonlinear system:

    wherex∈Rnis a system state vector,u∈Rnrepresents control input vector,y∈Rndenotes sensor output vector,f(x)∈Rnandh(x)∈Rnare function vectors, andg(x)∈Rn×nis a function matrix.

    Almost all existing studies carry out secure control from the perspective of signal processing, with their defense framework based on system (1). However, this article designs a defense framework from the perspective of energy conversion. For energy control, system (1) is transformed into the following port controlled Hamiltonian with passivity (PCHD) form:

    B. Description of Attacks

    Typical attacks include denial-of-service attacks [28], [29],false data injection attacks [30], [31] replay attacks [32], [33],zero-dynamic attacks [34], and covert attacks [35], [36]. The false data injection attacks are simple to implement and can arbitrarily destroy a system. Therefore, there are many related literatures researching security control issues under false data injection attacks, such as in [37]–[39].

    The false data injection attack models in the literature are usually complicated because intelligent attackers are usually in conjunction with system models. Therefore, the attackers need to adopt system identification methods [40]–[42] to obtain the system model. This process is very complicated,which limits the application of these attack models. In addition, no matter how smart the attack models are, their ultimate effect on the system is reflected in the malicious change of control commands and/or sensor outputs.

    Therefore, this article dispenses with the application of these complex false data injection attack models. It finds a new way of false data injection attacks to attribute the impact of the attack on the system to the malicious increase or decrease of control commands and/or sensor outputs. This new way of exploits is simple to design and easy to implement for increasing or reducing control commands and/or sensor outputs. Ultimately, it can purposefully compromise the system. The exploit strategies are shown as follows:

    C. System Under Actuator and Sensor Attacks

    When attacks and external disturbances occur, system (2) is transformed into

    III. DESIGN OF PASSIVITY-BASED RObUST CONTROLLER

    A. Energy Shaping and Damping Injection

    In order to configure the energy of system (5), and construct the energy function of the closed-loop system, in this subsection, we assume that there is no uncertainty occur.Then, system (5) becomes

    The interconnection and damping assignment passivity based control (IDA-PBC) method is used to feedback stabilize system (6). Then, the closed-loop system (6) becomes

    B. Design of Passivity-Based Robust Controller

    When attacks, disturbances, and conversion errors occur,system (6) becomes the form of system (5). Under feedback control lawu=α(x), system (6) can be stabilized in the neighborhood of equilibrium pointx*. However, when attacks occur, system (5) has weak stability under controlleru=α(x).Therefore, we design a passivity-based robust controller (14)to stabilize the attacked system (5).

    Under controller (14), system (5) becomes

    The next goal is to design the control law β(x) for system(15). For this purpose, the true or estimated values ofg1(x)ω1andg2(x)ω2need to be available. The fact is that these two uncertain terms are unknown. Thus, disturbance observers need to be designed to estimate their values. To simplify the control system design, this paper uses theL2disturbance attenuation technique to suppressg1(x)ω1andg2(x)ω2within a certain level. This idea has been used in the disturbance attenuation problem of nonlinear systems [43]–[45].

    For system (15), define the penalty signal as

    Proof:The proof of Theorem 2 is given in Appendix B. ■

    Remark 2:Combining (12) and (18), controller (14)becomes the form of controller (19). Under controller (19),system (5) is stable in the presence of attacks.

    Remark 3:The secure control method proposed in this paper has the following advantages:

    1) It has a good physical interpretation and global convergence characteristics. Meanwhile, it avoids complicated mathematical operations. Moreover, as there is no need to design an attack observer, it simplifies the burden of control system design;

    2) It drives the system states to converge to the origin by promptly adjusting the system energy changes in the presence of attacks; and

    3) It ensures the dynamic performance of the system by adjusting the amount of damping injection.

    IV. NUMERICAL SIMULATIONS

    In this section, numerical simulations are conducted to demonstrate the performance of the proposed controller for CPSs under cyber attacks.

    A. Descriptions of An Example

    We consider a control system of an interior permanent magnet synchronous motor (IPMSM), as shown in Fig. 1. The controller proposed in this paper is applied to the current loop.

    Fig. 1. A control system for a interior permanent magnet synchronous motor.

    B. Design of Existing Controllers

    When attacks and disturbances occur, system (21) is transformed into

    When attacks and external disturbances occur, system (29)becomes

    The parameters of controllers (23)–(25) and (42) are tabulated in Table I.

    TABLE I PARAMETERS OF CONTROLLERS

    D. Design of Thirteen Case Studies and Four Control Strategies

    Thirteen cases are designed to validate the effectiveness of the proposed controller, as shown in Table II.

    TABLEII TEN CASES OF ATTACkSaui AND ayi (i =1,2)

    For comparative performance analysis, four control strategies are designed for system (20), as shown in Table III.Control strategies 1, 2, and 3 are existing control strategies.Control strategy 4 comes from our control strategy.

    TABLE III FOUR CONTROL STRATEGIES

    E. Five Case Studies With Positively Decreased ui and yi

    In this subsection, numerical experiments are implemented when the control commandsuiand sensor outputsyiare decreased since actuator attackauiand sensor attackayiare increased reversely.

    1) Case 1:In this case, no attack signal is implemented. The simulation results are shown in Fig. 2.

    Fig. 2. Case 1 without attack (a ui=0, a yi=0, d =10 N·m).

    2) Case 2:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 5 0% between 0.4 s and 0.6 s. Our simulation results are shown in Fig. 3.

    Fig. 3. Case 2 (a ui=-0.5 , a yi=-0.5, d =10 N·m, 0.4 s–0.6 s).

    3) Case 3:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 7 0% between 0.4 s and 0.6 s. The simulation results are depicted in Fig. 4.

    4) Case 4:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 9 0% between 0.4 s and 0.6 s. The results are illustrated in Fig. 5.

    5) Case 5:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 1 00% between 0.4 s and 0.6 s. The results are illustrated in Fig. 6.

    Fig. 4. Case 3 (a ui=-0.7 , a yi=-0.7, d =10 N·m, 0.4 s–0.6 s).

    Fig. 5. Case 4 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–0.6 s).

    Fig. 6. Case 5 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–0.6 s).

    Fig. 7. Case 6 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–1.4 s).

    Fig. 8. Case 7 (a ui=-0.9 , a yi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    Fig. 9. Case 8 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–1.4 s).

    As shown in Figs. 2 and 3, when there is no attack or in face of a weak attack, the motor works well under all of the four controllers. Under Cases 3 and 5, Figs. 4–6 indicate that the control performance of controller (23), (24), and (25) has declined during 0.4 s to 0.6 s, however, our controller (42) can always work normally.

    F. Four Case Studies With Different Values of Attack Duration

    In this subsection, in contrast to Cases 4 and 5, some experiments are carried out under the same attack intensity but different attack duration.

    1) Case 6:In this case,u1,u2,y1, andy2of system (20) are reduced by 9 0% between 0.4 s and 1.4 s. The simulation results are shown in Fig. 7.

    2) Case 7:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 90% between 0.4 s and 2.4 s. The simulation results are depicted in Fig. 8.

    3) Case 8:In this case,u1,u2,y1, andy2of system (20) are reduced by 100% between 0.4 s and 1.4 s. The simulation results are shown in Fig. 9.

    4) Case 9:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are reduced by 1 00% between 0.4 s and 2.4 s. The simulation results are depicted in Fig. 10.

    Fig. 10. Case 9 (a ui=-1, a yi=-1, d =10 N·m, 0.4 s–2.4 s).

    For Cases 4–9, during the period that the system is attacked,Figs. 5–10 show that as the attack duration increases, the time when the control performance of controllers (23)–(25) are reduced has also been extended. However, our controller (42)still works well even if the attack duration is extended.

    G. Two Case Studies With Reversely Increased ui andyi

    As the attack intensityaui,ayicontinue to increase reversely, the direction of the control commandsuiand sensor outputsyiwill change from positive to negative. In this subsection, some experiments on this situation will be tested.

    1) Case 10:In this case,u1,u2,y1, andy2of system (20) are reduced by 2 00% between 0.4 s and 0.6 s. The simulation results are shown in Fig. 11.

    Fig. 11. Case 10 (a ui=-2 , a yi=-2, d =10 N·m, 0.4 s–0.6 s).

    2) Case 11:Both actuator commandsu1andu2, and sensor outputsy1,y2of system (20) are reduced 500% between 0.4 s and 0.6 s. The simulation results are shown in Fig. 12.

    Fig. 12. Case 11 (a ui=-5 , a yi=-5, d =10 N·m, 0.4 s–0.6 s).

    Under Case 10, Fig. 11 shows that when control commands and sensor outputs are reversed, the control performance of controllers (23)–(25) has failed. On the contrary, our controller (42) is still resilient to attack. Under Case 11, Fig. 12 shows that when control commands and sensor outputs are more severely reversed, our controller has also failed.

    H. Two Case Studies With Positively Increased ui and yi

    In this subsection, some experiments are implemented on the situation where the control commandsuiand sensor outputsyiare increased since actuator attackauiand sensor attackayiare increased positively.

    1) Case 12:Both actuator commandsu1andu2, and sensor outputsy1andy2of system (20) are increased 200% between 0.4 s and 0.6 s. The results are shown in Fig. 13.

    2) Case 13:In this case, both actuator commandsu1andu2,and sensor outputsy1andy2of system (20) are increased 500%. The simulation results are shown in Fig. 14.

    Under Cases 12 and 13, Figs. 13 and 14 show that when the control commands and sensor outputs are positively increased by attacker, the control performance of all of the four controllers can remain normally.

    I. Verification of Our Method Under Different Speed References

    In this subsection, some experiments are implemented on the working situation where the speed reference is changed.Working situation 1 is implemented under attack in Case 4,and working situation 2 is implemented under attack in Case 7.

    Fig. 13. Case 12 (a ui=2 , a yi=2, d =10 N·m, 0.4 s–0.6 s).

    Fig. 14. Case 13 (a ui=5 , a yi=5, d =10 N·m, 0.4 s–0.6 s).

    1) Working Situation 1 Under Case 4:In this case, the speed reference is set as –500 rad/s and the motor will start reversely. The simulation results are shown in Fig. 15.

    Fig. 15. Working situation 1 under Case 4 with attack ( ,, , 0.4 s–0.6 s).

    aui=-0.9ayi=-0.9d=10 N·m

    2) Working Situation 2 Under Case 7:In this case, the speed reference is set as 500 rad/s at the beginning, and then is changed to –1000 rad/s at 0.4 s, and is finally reverted to 500 rad/s at 1 s. The motor will start positively, then will decelerate in reverse at 0.4 s, and then start to accelerate positively at 1 s. The simulation results are shown in Fig. 16.

    The above two cases study secure control under different working situations. As shown in Figs. 15 and 16, when attacks occur, the performance of controllers (23)–(25) will decline.In comparison, the performance of our controller (42) is resilient to attacks under different working situations.

    J. Verification of Our Method Under Different Friction Coefficients

    Consider some working situations in which the friction coefficient of the motor is increased (The initial friction coefficient of the motor is set as 0 N ·m·s). Working situation 1 is implemented under attack in Case 4, and working situation 2 is implemented under attack in Case 7.

    Fig. 16. Working situation 2 under Case 4 with attack (a ui=-0.9,ayi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    1) Working Situation 1 Under Case 4:In this case, the friction coefficient of the motor is set to 1.8 N·m·s. The simulation results are shown in Fig. 17.

    Fig. 17. Working situation 1 under Case 7 with attack ( ,, , 0.4 s–0.6 s).

    aui=-0.9ayi=-0.9d=10 N·m

    Fig. 18. Working situation 2 under Case 7 with attack ( aui=-0.9,ayi=-0.9, d =10 N·m, 0.4 s–2.4 s).

    In the above two cases, we study secure control when the friction coefficient of the motor is increased. As shown in Figs. 17 and 18, when attacks occur and the friction coefficient of the motor is increased, the control performance of controllers (23)–(25) will fail, and the control performance of our controller (42) will decline during the attack.

    V. CONCLUSIONS

    In this paper, we have studied secure control for CPSs under quantified actuator and sensor attacks, which can maliciously increase or reduce control commands and sensor outputs. For attacked CPSs, we have proposed a defense scheme from the perspective of energy conversion. Then, a passivity-based robust controller has been designed to stabilize the attacked system. The effectiveness of our method has been verified through an industrial CPS. In the future, we will study two secure control problems: 1) when the direction of control commands and sensor outputs are reversed due to attacks; and 2) the saturation of actuator and sensor outputs caused by attacks.

    APPENDIX A PROOF OF THEOREM 1

    亚洲av日韩精品久久久久久密| 波多野结衣高清无吗| 中文字幕精品亚洲无线码一区| 露出奶头的视频| 亚州av有码| 一区二区三区激情视频| 欧美3d第一页| 51国产日韩欧美| 国产麻豆成人av免费视频| 日本欧美国产在线视频| 色播亚洲综合网| 69av精品久久久久久| 舔av片在线| 淫秽高清视频在线观看| www.色视频.com| 国产爱豆传媒在线观看| 波野结衣二区三区在线| 变态另类成人亚洲欧美熟女| 精品福利观看| 不卡视频在线观看欧美| 少妇的逼水好多| 日本三级黄在线观看| 久99久视频精品免费| 一边摸一边抽搐一进一小说| 国国产精品蜜臀av免费| 五月玫瑰六月丁香| 97超视频在线观看视频| 热99在线观看视频| 国内揄拍国产精品人妻在线| 男女做爰动态图高潮gif福利片| 在线观看一区二区三区| 午夜免费成人在线视频| 色哟哟哟哟哟哟| 女同久久另类99精品国产91| 伦理电影大哥的女人| 成年版毛片免费区| 欧美激情国产日韩精品一区| netflix在线观看网站| 精品久久久久久久久久久久久| 一卡2卡三卡四卡精品乱码亚洲| 国内精品久久久久久久电影| 最后的刺客免费高清国语| 狠狠狠狠99中文字幕| 黄色视频,在线免费观看| 国产一区二区亚洲精品在线观看| 亚洲自偷自拍三级| 国产一区二区在线av高清观看| 国产黄a三级三级三级人| 国产精品免费一区二区三区在线| 99久久精品热视频| 日本 av在线| 欧美bdsm另类| 成人国产麻豆网| 婷婷六月久久综合丁香| 深夜a级毛片| 婷婷精品国产亚洲av在线| 亚洲国产精品sss在线观看| 亚洲国产精品sss在线观看| 人人妻,人人澡人人爽秒播| 嫩草影视91久久| 夜夜看夜夜爽夜夜摸| 国产视频一区二区在线看| 中国美白少妇内射xxxbb| 亚洲性久久影院| 韩国av一区二区三区四区| 特级一级黄色大片| 亚洲va日本ⅴa欧美va伊人久久| 成人永久免费在线观看视频| 老司机深夜福利视频在线观看| 一个人看视频在线观看www免费| 亚洲精品一卡2卡三卡4卡5卡| 成人特级黄色片久久久久久久| 成人特级黄色片久久久久久久| 成人特级黄色片久久久久久久| 亚洲人成网站在线播放欧美日韩| 亚洲中文字幕一区二区三区有码在线看| 成人av一区二区三区在线看| 自拍偷自拍亚洲精品老妇| 婷婷六月久久综合丁香| 久久久成人免费电影| 亚洲精品色激情综合| 国产国拍精品亚洲av在线观看| 88av欧美| АⅤ资源中文在线天堂| 九色成人免费人妻av| 嫩草影院精品99| 亚洲国产精品成人综合色| 婷婷精品国产亚洲av在线| 精品一区二区三区人妻视频| av天堂在线播放| 亚洲成人中文字幕在线播放| 国产三级在线视频| 亚洲成人中文字幕在线播放| 亚洲综合色惰| 国产精品三级大全| a级毛片a级免费在线| av视频在线观看入口| 99久久精品国产国产毛片| 18禁裸乳无遮挡免费网站照片| 熟女人妻精品中文字幕| 99热这里只有是精品在线观看| 美女高潮的动态| 如何舔出高潮| 免费人成在线观看视频色| 婷婷丁香在线五月| 日本在线视频免费播放| 欧美一级a爱片免费观看看| 美女被艹到高潮喷水动态| 日本熟妇午夜| 99视频精品全部免费 在线| 国内精品美女久久久久久| 色哟哟哟哟哟哟| 欧美日韩精品成人综合77777| 日日撸夜夜添| 欧美日韩中文字幕国产精品一区二区三区| 最近中文字幕高清免费大全6 | 国内精品久久久久久久电影| 一级av片app| 乱码一卡2卡4卡精品| 国产色爽女视频免费观看| 国产激情偷乱视频一区二区| 成人永久免费在线观看视频| 变态另类成人亚洲欧美熟女| 此物有八面人人有两片| 搡老岳熟女国产| 亚洲一级一片aⅴ在线观看| 五月玫瑰六月丁香| 最近中文字幕高清免费大全6 | 99热这里只有精品一区| 乱码一卡2卡4卡精品| 天堂av国产一区二区熟女人妻| 搡老熟女国产l中国老女人| 国产熟女欧美一区二区| 人人妻,人人澡人人爽秒播| 亚洲成人精品中文字幕电影| 欧美日本亚洲视频在线播放| 国内揄拍国产精品人妻在线| 18禁黄网站禁片免费观看直播| 一区福利在线观看| 亚洲国产欧洲综合997久久,| 日本免费a在线| 欧美xxxx黑人xx丫x性爽| 无人区码免费观看不卡| 婷婷丁香在线五月| 免费观看精品视频网站| 人妻制服诱惑在线中文字幕| 国内精品美女久久久久久| 色在线成人网| 国产私拍福利视频在线观看| 我要搜黄色片| 日本 欧美在线| av女优亚洲男人天堂| 99热这里只有是精品在线观看| 亚洲第一电影网av| 午夜视频国产福利| h日本视频在线播放| 久久精品人妻少妇| 黄色女人牲交| 综合色av麻豆| 俺也久久电影网| 蜜桃亚洲精品一区二区三区| 精品久久久噜噜| 日韩精品中文字幕看吧| 亚洲精品亚洲一区二区| 搡老岳熟女国产| 免费av毛片视频| 极品教师在线免费播放| 丝袜美腿在线中文| 亚洲最大成人手机在线| 久久久国产成人精品二区| 国产成人a区在线观看| 中文资源天堂在线| 欧美最新免费一区二区三区| 一区二区三区高清视频在线| 少妇丰满av| 国产一区二区激情短视频| 欧美黑人巨大hd| 国产真实乱freesex| 成人亚洲精品av一区二区| 国产在线男女| 国语自产精品视频在线第100页| 国产午夜福利久久久久久| 亚洲成人精品中文字幕电影| 久久精品国产清高在天天线| 精品久久国产蜜桃| 欧美黑人巨大hd| 中文字幕精品亚洲无线码一区| 久久久久久久久久久丰满 | 国产极品精品免费视频能看的| 久久欧美精品欧美久久欧美| 免费av毛片视频| 我要看日韩黄色一级片| a在线观看视频网站| 亚洲人成伊人成综合网2020| 亚洲精品成人久久久久久| 999久久久精品免费观看国产| 搡老岳熟女国产| 色哟哟·www| 久久天躁狠狠躁夜夜2o2o| 成人av在线播放网站| 特大巨黑吊av在线直播| 欧美一级a爱片免费观看看| 伊人久久精品亚洲午夜| 国产免费一级a男人的天堂| 18禁黄网站禁片免费观看直播| 亚洲一级一片aⅴ在线观看| 亚洲最大成人av| 亚洲欧美清纯卡通| 又爽又黄无遮挡网站| 免费观看精品视频网站| 老熟妇乱子伦视频在线观看| 一区二区三区激情视频| 少妇丰满av| 欧美一区二区国产精品久久精品| 夜夜爽天天搞| 免费在线观看成人毛片| 久久国产精品人妻蜜桃| 中文资源天堂在线| 国产一级毛片七仙女欲春2| 最好的美女福利视频网| 国产欧美日韩精品亚洲av| 免费人成视频x8x8入口观看| 美女 人体艺术 gogo| 中文在线观看免费www的网站| 天堂av国产一区二区熟女人妻| av福利片在线观看| 大型黄色视频在线免费观看| 搡女人真爽免费视频火全软件 | 精品一区二区三区视频在线观看免费| 亚洲 国产 在线| avwww免费| 色综合站精品国产| 亚洲黑人精品在线| 成年免费大片在线观看| 国产av麻豆久久久久久久| 国产亚洲精品久久久久久毛片| 五月伊人婷婷丁香| 一夜夜www| 国产亚洲欧美98| 看片在线看免费视频| 亚洲中文字幕日韩| 亚洲精品成人久久久久久| 国产av不卡久久| 免费搜索国产男女视频| 中文字幕精品亚洲无线码一区| 精品一区二区三区av网在线观看| 国产精品国产高清国产av| 国产一区二区三区av在线 | 国内久久婷婷六月综合欲色啪| 又黄又爽又免费观看的视频| 国产爱豆传媒在线观看| 国产精品一区二区三区四区久久| 嫁个100分男人电影在线观看| 国产精品伦人一区二区| 午夜精品一区二区三区免费看| 国产熟女欧美一区二区| 91麻豆精品激情在线观看国产| 99久久无色码亚洲精品果冻| 成熟少妇高潮喷水视频| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲欧美日韩无卡精品| 国产精品福利在线免费观看| 国产激情偷乱视频一区二区| 变态另类丝袜制服| 网址你懂的国产日韩在线| 日韩欧美精品免费久久| 内射极品少妇av片p| 天天一区二区日本电影三级| 12—13女人毛片做爰片一| 日日撸夜夜添| 久久亚洲真实| 日本三级黄在线观看| 欧美不卡视频在线免费观看| 国产真实伦视频高清在线观看 | 中文在线观看免费www的网站| 亚洲国产精品合色在线| 久久精品久久久久久噜噜老黄 | 亚洲av熟女| 麻豆av噜噜一区二区三区| 成人欧美大片| 免费在线观看影片大全网站| 99久久中文字幕三级久久日本| 18禁裸乳无遮挡免费网站照片| 高清在线国产一区| 国产老妇女一区| 在线免费观看的www视频| 午夜免费激情av| 如何舔出高潮| 少妇熟女aⅴ在线视频| 日韩中字成人| 中亚洲国语对白在线视频| 色av中文字幕| 亚洲va日本ⅴa欧美va伊人久久| 日韩欧美精品v在线| 亚洲性夜色夜夜综合| 99热6这里只有精品| 亚洲中文日韩欧美视频| 男人舔奶头视频| 露出奶头的视频| 51国产日韩欧美| 大又大粗又爽又黄少妇毛片口| 一进一出抽搐gif免费好疼| 亚洲精品粉嫩美女一区| 在线免费十八禁| 国产精品不卡视频一区二区| 很黄的视频免费| 99热精品在线国产| 又粗又爽又猛毛片免费看| 国产国拍精品亚洲av在线观看| 日韩亚洲欧美综合| 人人妻人人看人人澡| 欧美又色又爽又黄视频| 国产精品爽爽va在线观看网站| 国内精品久久久久久久电影| 欧美日韩国产亚洲二区| 亚洲国产精品sss在线观看| 观看美女的网站| 成年免费大片在线观看| 色5月婷婷丁香| av国产免费在线观看| 国产精品久久久久久av不卡| 国产精品永久免费网站| 三级男女做爰猛烈吃奶摸视频| 精品乱码久久久久久99久播| 别揉我奶头~嗯~啊~动态视频| 韩国av一区二区三区四区| 他把我摸到了高潮在线观看| 啪啪无遮挡十八禁网站| 校园春色视频在线观看| 伦理电影大哥的女人| 日本 av在线| 天天躁日日操中文字幕| 亚洲美女搞黄在线观看 | 午夜福利成人在线免费观看| 看免费成人av毛片| 久久亚洲精品不卡| 久久午夜福利片| 精品一区二区三区av网在线观看| 大型黄色视频在线免费观看| 日韩强制内射视频| 一级av片app| 一个人看视频在线观看www免费| 精品一区二区免费观看| a在线观看视频网站| 欧美最黄视频在线播放免费| 老熟妇仑乱视频hdxx| 久久久久久久精品吃奶| 免费观看精品视频网站| 村上凉子中文字幕在线| 亚洲国产欧洲综合997久久,| 哪里可以看免费的av片| 色av中文字幕| 欧美日本亚洲视频在线播放| 久久久久久久午夜电影| 国产久久久一区二区三区| 一区二区三区高清视频在线| 嫩草影院入口| 欧美日本视频| 88av欧美| 男人狂女人下面高潮的视频| 一级黄色大片毛片| 特级一级黄色大片| 九色成人免费人妻av| 亚洲av电影不卡..在线观看| 在线观看av片永久免费下载| 亚洲黑人精品在线| 日韩在线高清观看一区二区三区 | 国产精品精品国产色婷婷| 久久精品国产鲁丝片午夜精品 | 国产探花极品一区二区| 精品人妻偷拍中文字幕| 我要搜黄色片| 久久人妻av系列| 嫩草影视91久久| 一个人免费在线观看电影| 尤物成人国产欧美一区二区三区| 国产高清视频在线播放一区| 一级毛片久久久久久久久女| 欧美高清性xxxxhd video| 999久久久精品免费观看国产| 久久精品综合一区二区三区| 又爽又黄无遮挡网站| 成年女人看的毛片在线观看| 嫩草影院精品99| 成人亚洲精品av一区二区| 国产熟女欧美一区二区| 国产欧美日韩精品亚洲av| 久久久国产成人精品二区| 九九在线视频观看精品| 国产一区二区亚洲精品在线观看| 91麻豆av在线| 欧美日韩黄片免| 日本a在线网址| 日本一本二区三区精品| 亚洲精品一区av在线观看| 一边摸一边抽搐一进一小说| 真人做人爱边吃奶动态| av国产免费在线观看| 国产欧美日韩一区二区精品| 欧美绝顶高潮抽搐喷水| 亚洲一级一片aⅴ在线观看| 美女 人体艺术 gogo| 欧美区成人在线视频| 国产精品一区二区三区四区久久| 韩国av在线不卡| 欧美日韩综合久久久久久 | 在线免费十八禁| 又黄又爽又免费观看的视频| 天堂动漫精品| 久久精品国产99精品国产亚洲性色| 亚洲国产高清在线一区二区三| 亚洲性夜色夜夜综合| 级片在线观看| 久久久午夜欧美精品| 日韩欧美精品免费久久| 看黄色毛片网站| 久久中文看片网| 成年免费大片在线观看| 亚洲中文字幕日韩| 狠狠狠狠99中文字幕| 天堂网av新在线| 国产不卡一卡二| 18禁黄网站禁片午夜丰满| 国产精品98久久久久久宅男小说| 色哟哟·www| 直男gayav资源| 亚洲av中文av极速乱 | 欧美激情久久久久久爽电影| 变态另类丝袜制服| 内地一区二区视频在线| 嫩草影视91久久| 俺也久久电影网| 尾随美女入室| 国产高清视频在线观看网站| 一卡2卡三卡四卡精品乱码亚洲| 国产精品综合久久久久久久免费| 91在线精品国自产拍蜜月| 又黄又爽又刺激的免费视频.| 国产一区二区在线观看日韩| 好男人在线观看高清免费视频| 又黄又爽又免费观看的视频| 九色成人免费人妻av| 老司机福利观看| 国产极品精品免费视频能看的| 听说在线观看完整版免费高清| 日韩欧美在线二视频| 人人妻人人澡欧美一区二区| bbb黄色大片| 亚洲人成网站高清观看| 97人妻精品一区二区三区麻豆| 别揉我奶头~嗯~啊~动态视频| 色5月婷婷丁香| 久久人人爽人人爽人人片va| 精品日产1卡2卡| 国产爱豆传媒在线观看| 欧美黑人巨大hd| 久久久久久久久久成人| 亚洲精品粉嫩美女一区| 国产在视频线在精品| 男人舔女人下体高潮全视频| 桃色一区二区三区在线观看| 国产极品精品免费视频能看的| 亚洲av一区综合| 天堂av国产一区二区熟女人妻| 亚洲av.av天堂| 老司机福利观看| 国产高清视频在线播放一区| videossex国产| 特级一级黄色大片| 国产精品日韩av在线免费观看| 又黄又爽又刺激的免费视频.| 3wmmmm亚洲av在线观看| 在线看三级毛片| 老熟妇仑乱视频hdxx| 午夜老司机福利剧场| 看十八女毛片水多多多| 国产精品精品国产色婷婷| 大又大粗又爽又黄少妇毛片口| 99久久精品热视频| 国产v大片淫在线免费观看| 午夜福利在线在线| 午夜精品久久久久久毛片777| 麻豆成人av在线观看| 亚洲国产精品成人综合色| 亚洲性久久影院| a级毛片a级免费在线| 精品国内亚洲2022精品成人| 高清日韩中文字幕在线| 一卡2卡三卡四卡精品乱码亚洲| 日韩欧美精品v在线| 国产成人aa在线观看| 日本黄色视频三级网站网址| 亚洲国产精品成人综合色| 在线播放无遮挡| 亚洲精品色激情综合| 国产在视频线在精品| 国产伦精品一区二区三区视频9| 国产69精品久久久久777片| 男女啪啪激烈高潮av片| 午夜爱爱视频在线播放| 亚洲中文字幕一区二区三区有码在线看| 99国产精品一区二区蜜桃av| 伦精品一区二区三区| 亚洲熟妇熟女久久| 国内久久婷婷六月综合欲色啪| 国产一区二区三区av在线 | 久久久久国产精品人妻aⅴ院| 中文字幕熟女人妻在线| 国产av麻豆久久久久久久| 波多野结衣高清作品| 精品久久久噜噜| 亚洲精品色激情综合| 国产 一区 欧美 日韩| 免费电影在线观看免费观看| 在线播放国产精品三级| 婷婷六月久久综合丁香| 99久国产av精品| 亚洲精品日韩av片在线观看| 成年免费大片在线观看| 日日啪夜夜撸| 日韩 亚洲 欧美在线| 久久久久久九九精品二区国产| av女优亚洲男人天堂| 日本-黄色视频高清免费观看| a在线观看视频网站| 国产视频一区二区在线看| 在线观看午夜福利视频| 日本成人三级电影网站| 夜夜爽天天搞| 欧美激情久久久久久爽电影| 亚洲七黄色美女视频| 在线播放无遮挡| 国产精品三级大全| a级一级毛片免费在线观看| 国产欧美日韩精品亚洲av| 国产在线精品亚洲第一网站| 91麻豆精品激情在线观看国产| 国产av一区在线观看免费| 美女免费视频网站| 老司机福利观看| avwww免费| 色尼玛亚洲综合影院| 一a级毛片在线观看| 99热这里只有精品一区| 一区福利在线观看| 别揉我奶头 嗯啊视频| 九九久久精品国产亚洲av麻豆| 直男gayav资源| 国产蜜桃级精品一区二区三区| 亚洲美女搞黄在线观看 | 欧美一区二区精品小视频在线| 能在线免费观看的黄片| 欧美+亚洲+日韩+国产| 国产成人av教育| 日日啪夜夜撸| 麻豆av噜噜一区二区三区| 日韩欧美国产一区二区入口| 成人性生交大片免费视频hd| av天堂中文字幕网| 成人无遮挡网站| 国产毛片a区久久久久| а√天堂www在线а√下载| 久久久久久久久久成人| 日韩欧美免费精品| 欧美绝顶高潮抽搐喷水| 国产高清有码在线观看视频| 成人高潮视频无遮挡免费网站| 成人午夜高清在线视频| 99久久九九国产精品国产免费| 女人十人毛片免费观看3o分钟| 国产精品国产高清国产av| 国模一区二区三区四区视频| 日本成人三级电影网站| 国产亚洲av嫩草精品影院| av在线蜜桃| 国产成人av教育| 婷婷精品国产亚洲av在线| 男人狂女人下面高潮的视频| 精华霜和精华液先用哪个| 久久久国产成人精品二区| 日韩中字成人| 久久精品国产亚洲av天美| 九九久久精品国产亚洲av麻豆| 级片在线观看| 国产精品人妻久久久影院| 日韩一区二区视频免费看| 深爱激情五月婷婷| 黄色配什么色好看| 久久久久国内视频| 色哟哟哟哟哟哟| 一级黄片播放器| 国产 一区精品| 直男gayav资源| 国产成年人精品一区二区| 大又大粗又爽又黄少妇毛片口| 天堂√8在线中文| 国产精品野战在线观看| 欧美一区二区国产精品久久精品| 久久久久免费精品人妻一区二区| 亚洲av第一区精品v没综合| h日本视频在线播放| 毛片女人毛片| 22中文网久久字幕| 啦啦啦啦在线视频资源| 久久精品久久久久久噜噜老黄 | 波多野结衣巨乳人妻| 欧美一区二区亚洲| 欧美激情久久久久久爽电影| 18禁裸乳无遮挡免费网站照片| 久久久久久九九精品二区国产| 欧美色欧美亚洲另类二区| 美女大奶头视频| 老师上课跳d突然被开到最大视频| 床上黄色一级片| 国产伦在线观看视频一区|