• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular Networks

    2022-02-13 09:54:22ChenxiLiLeiGunHuqingWuNnChengZnLiXueminShermnShen
    Engineering 2022年10期

    Chenxi Li, Lei Gun,*, Huqing Wu, Nn Cheng, Zn Li,c,*, Xuemin (Shermn) Shen

    a State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China

    b Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada

    c Collaborative Innovation Center of Information Sensing and Understanding, Xi’an 710071, China

    Keywords:Heterogeneous cellular networks Dynamic spectrum control Transmission security Efficient data transmission

    A B S T R A C T Heterogeneous cellular networks(HCNs)are envisioned as a promising architecture to provide seamless wireless coverage and increase network capacity.However,the densified multi-tier network architecture introduces excessive intra- and cross-tier interference and makes HCNs vulnerable to eavesdropping attacks. In this article, a dynamic spectrum control (DSC)-assisted transmission scheme is proposed for HCNs to strengthen network security and increase the network capacity. Specifically, the proposed DSC-assisted transmission scheme leverages the idea of block cryptography to generate sequence families,which represent the transmission decisions,by performing iterative and orthogonal sequence transformations. Based on the sequence families, multiple users can dynamically occupy different frequency slots for data transmission simultaneously. In addition,the collision probability of the data transmission is analyzed, which results in closed-form expressions of the reliable transmission probability and the secrecy probability.Then,the upper and lower bounds of network capacity are further derived with given requirements on the reliable and secure transmission probabilities. Simulation results demonstrate that the proposed DSC-assisted scheme can outperform the benchmark scheme in terms of security performance.Finally,the impacts of key factors in the proposed DSC-assisted scheme on the network capacity and security are evaluated and discussed.

    1. Introduction

    To support the surging growth of wireless data traffic while meeting the requirements for high data rates in next-generation cellular networks, heterogeneous cellular networks (HCNs) are emerging as a promising solution to enable a significant leap in network performance [1–4]. By densely deploying hierarchical infrastructure in different tiers (i.e., macro base stations (MBSs),micro base stations (mBSs), pico base stations (BSs), femto base stations, and relays) and permitting them to transmit information simultaneously over the same spectrum band, the HCNs are capable of achieving seamless coverage and accommodating more users. Motivated by the great potential, the investigation of the HCNs has received substantial interest [5–7].

    Despite the benefits brought by HCNs,there are some challenging issues that should be further investigated. On the one hand,there are massive communication terminals coexisting in different tiers of HCNs and sharing limited spectrum resources. Therefore,unlike conventional single-tier cellular networks where data transmission is hampered mainly by malicious jamming, substantial intra- and inter-tier interference exists in HCNs, which reduces the success probability and reliability of data transmission. On the other hand,due to the open system architecture and the broadcast nature of radio propagation, confidential messages intended for authorized users are vulnerable to eavesdropping attacks.

    Recent advances in interference and eavesdropping technologies in communication networks [8–12] further exacerbate the security risks in HCNs. Based on the report of risk-based security(RBS)in the third quarter of 2019[13],there were 5183 data leakage events around the world in the first nine months of 2019. In view of the fact that wireless networks have been introduced into many fields (such as intelligent manufacturing [14], smart healthcare [15], and the Internet of Things [16,17]), the negative impact of data leakage on wireless network security has captured both industry and academia attention.When private information cannot be transmitted reliably and securely, serious consequences can occur, including property damage (e.g., disruption of industrial production chains, traffic congestion) and even personnel casualties (e.g., medical malpractice, traffic collisions).

    Therefore,it is crucial to guarantee reliable and successful data transmission in HCNs while addressing interference and eavesdropping threats.However,the design of the transmission scheme is a daunting task in HCNs for the following reasons. First, the transmission scheme design should not only address the interference and eavesdropping threats but also improve the network capacity in HCNs. Considering the limited spectrum resources,dynamic spectrum control(DSC)is required to enable more authorized users to access HCNs without causing harmful interference.Second, to improve the security performance, authorized data transmission should occupy different frequency slots during the transmission period to make it intractable for eavesdroppers to intercept the transmitted information.Furthermore,reliable transmission and secure transmission probabilities should be analyzed and provided to evaluate the performance of the transmission scheme in HCNs.

    1.1. Related work

    In the literature, there are many studies on interference management and security enhancement [18–22]. Lv et al. [18] pioneered the study of physical layer security in downlink two-tier heterogeneous networks(HetNets)and optimized the secrecy rate performance by designing a beamforming scheme. Subsequently,Wang et al.[19]considered the randomness of the spatial location of network nodes and proposed a secrecy mobile association policy based on the access threshold, which provided a basic analytical framework to evaluate the secrecy performance of HCNs. Xu et al. [20] introduced cooperative multipoint transmission (CoMP)into the construction of HetNets to enhance the secured coverage probability. Inspired by the aforementioned methods, an interference-canceled opportunistic antenna selection (IC-OAS)scheme was proposed in Ref. [21] to improve the potential of the security–reliability tradeoff of macrocells and microcells. In Ref.[22],the secrecy energy efficiency(EE)was optimized by introducing artificial noise into orthogonal frequency division multiplexing(OFDM)-based cognitive radio networks with different base stations.

    However, the aforementioned methods mainly focus on the security and interference issues of HCNs, while ignoring the everincreasing wireless network traffic that should be handled by limited spectrum resources. In fact, the scarce spectrum resources available to support wireless communications services are underutilized.Therefore,it is essential to design an effective transmission scheme to improve the spectrum utilization efficiency and increase the network capacity of HCNs.

    To mitigate spectrum scarcity in HCNs, some initiatives have been investigated in the past decade[23–26].To improve the spectrum efficiency (SE) and EE under quality-of-service (QoS) constraints in multi-tier HetNets simultaneously, Rao and Fapojuwo[23] and Al Masri and Sesay [24] verified that traffic offloading is an effective approach. However, the performance gain brought by offloading is strongly affected by intra-and inter-tier interference.Yang et al.[25]pointed out that inter-tier interference is the main bottleneck for increasing network capacity in HetNets and proposed an F-ALOHA based cognitive spectrum access scheme for macro–femto HetNets. This scheme incorporated the idea of cross-tier spectrum access to offload traffic, thereby achieving interference management and optimization of SE. In addition,another spectrum flowing scheme that can trade or lease the licensed spectrum among tiers or network nodes to minimize spectrum holes was proposed in Ref. [26].

    In summary, network capacity improvement and security enhancement have attracted substantial research interest.Although HCNs can effectively increase network capacity,the densified network architecture introduces cross-tier interference,which might further aggravate the threats to network security.The existing works focus either on network capacity improvement or transmission security enhancement in HCNs, failing to address both issues in HCNs. On the one hand, the aforementioned endeavors to cope with transmission security threats consume additional power and signal overhead, which might introduce extra interferences and hamper the network capacity performance.On the other hand,the existing approaches for increasing network capacity can effectively address the interferences in HCNs,but cannot overcome the threats of eavesdropping. To the best of our knowledge,there is no existing analysis of HCNs by jointly considering security and network performance. However, only by jointly considering the two performances together can HCNs meet the requirements of authorized users in real-world applications. This has motivated our work.In this work,we focus on the transmission scheme design in HCNs to effectively improve network capacity while guaranteeing security performance.

    1.2. Main contributions

    In this article,we propose a transmission scheme based on DSC for HCNs. By sensing the occupation status of the spectrum resources, the proposed scheme can generate a set of decisions by leveraging the idea of block cryptography and performing iterative and orthogonal operations.Based on these decisions,the data transmission can effectively occupy the idle frequency slots in each time slot. In addition, based on the analysis of the collision probability caused by multiple data packets occupying the same frequency slot in a time slot, the closed-form expressions of the reliable transmission probability(i.e.,the data packets can be completely transmitted to authorized receivers) and secrecy probability (i.e., the data packets cannot be acquired by eavesdroppers)are derived from the idea of information-theoretic security [27].Furthermore,under the constraints of reliable transmission probability and secrecy probability, the upper and lower bounds of network capacity can be determined. Therefore, by employing the DSC-assisted transmission scheme, the goal of strengthening the security and improving the network capacity of HCNs can be achieved.The main contributions of this article can be summarized as follows:

    · We propose a DSC-assisted transmission scheme, which can guide the data packets to occupy the frequency slots in each time slot by generating orthogonal sequences. By scheduling communication links in an orderly manner, the proposed scheme can effectively reduce interference and make it more intractable for eavesdroppers to intercept transmitted privacy information.

    · We theoretically analyze the collision probability of multiple data packets occupying the same frequency slot in a time slot,which provides the theoretical foundation for security and network capacity analysis in HCNs.

    · We define the reliable transmission probability and secrecy probability of the proposed transmission scheme in HCNs and derive their closed-form expressions, which provides an analytical framework for evaluating the security performance of HCNs.Based on these two probabilities,the network capacity of HCNs under security constraints can be determined.

    ·We verify that the proposed DSC-assisted scheme can outperform the conventional secure transmission scheme in terms of security performance, which can be further improved by adjusting the network parameters. In addition, the maximum number of users allowed to associate with HCNs can be adjusted according to the actual security requirements.

    The remainder of this article is organized as follows. Section 2 depicts the system model. Then, the proposed DSC-assisted transmission scheme is presented in Section 3. Based on the proposed scheme,the security analysis in HCNs(including reliable transmission probability and secrecy probability)is conducted in Section 4.In Section 5,we evaluate the network capacity.After that,the simulation results are shown in Section 6, followed by the conclusion and future work in Section 7.

    2. System model

    Based on real-world application scenarios and the existing HCNs models[28–32],a typical multi-tier HCNs scenario is considered in this work as shown in Fig.1.The HCNs consist of one MBS,multiple mBSs, several authorized users, and randomly located passive eavesdroppers. Let {BSφ| φ = (1, 2, ???, m, M)} denote the base stations in the scenario with different clocks, where m is a positive integer representing the number of mBSs and M is a symbol representing the MBS. In addition, φ?{1, 2, ???, m} represents the mBS and φ = M refers to the MBS. These base stations are equipped with multiple antennas to support the communication of multiple authorized users simultaneously. In the considered HCNs scenario,the BSMcovers the entire network to form a macrocell and can serve authorized users with a high transmission power PBS(from 5 to 40 W),where PBSis the power of the BSM.To handle the ever-growing traffic requirement and achieve seamless coverage, several BSms can be deployed within the macrocell. Different from the BSM, BSms have smaller coverage radii and form multiple microcells that do not overlap with each other thus they can only serve the authorized users within their coverage areas with a lower transmission power Pbs(from 250 mW to 2 W), where Pbsis the power of the BSm.Since it is almost impossible to accurately determine the instantaneous channel state information (CSI) of passive eavesdroppers in practice, only statistical CSI of the channels is available in our work, as assumed in many previous works [33–35]. Without loss of generality, we assume that each communication link in our constructed HCNs experiences independent flat Rayleigh fading such that the channel power gains are exponentially distributed.Specifically,the mean value of the channel power gain is |hu|2between the BSMand authorized users, |he|2between the BSMand eavesdroppers,|hmu|2between the BSmand authorized users, and |hme|2between the BSmand eavesdroppers.

    Specifically, we focus on the downlink transmission for the authorized users, where data packets are transmitted by the base stations independently over the shared transmission channel.Without loss of generality, the authorized users Uk(k = 1, 2, ???,K) can choose to associate with the BSMor BSms based on the signal-to-interference-plus-noise ratio (SINR) of downlinks in HCNs [36], where K is a positive integer representing the total number of the authorized users and k represents one of them.

    Fig. 1. Illustration of the HCNs. BSM: MBS; BSm: mBS; UM,d: the authorized user d associated with the BSM; UM,b: the authorized user b associated with the BSM; U1,a: the authorized user a associated with the BS1; U1,c: the authorized user c associated with the BS1.

    As shown in Fig.1,there are many potential threats affecting the transmission performance between base stations and users (e.g.,unfriendly jammers, uncooperative interference, and malicious eavesdropping). Specifically, unfriendly jammers existing in the service area might randomly send interference signals to occupy the transmission band,which reduces the quality of the communication link and even tamper with the transmitted information or interrupt communication.In addition,since the BSMand BSms share the same frequency band,the signals transmitted by the BSMare regarded as uncooperative interference for the authorized users in the BSms,and vice versa. Furthermore, considering the small geographical area covered by each BSm, authorized users occupying the same frequency band served by the same BSmcan interfere with each other.However,the most malicious one is the eavesdroppers,as shown in Fig.1,who can be randomly distributed and desire to intercept the privacy information transmitted by authorized users with the assistance of an energy detector(e.g.,a radiometer).

    3. DSC-assisted transmission scheme

    To cope with the aforementioned threats effectively, an effective transmission scheme for assisting asynchronous networking is proposed in this section to strengthen the security of HCNs and facilitate the realization of superior network performance.

    Without loss of generality, all authorized users transmit their data packets on a discrete-time channel with p time slots (t1, t2,???, tp),where p is a positive integer representing the total number of divided time slots, and tpis the pth time slot. We assume that the transmitted data packets of authorized users in our considered HCNs need to occupy L consecutive time slots to complete their transmissions in each transmission period, where L represents the length of the transmitted data packets.Authorized users who desire to transmit information with a large data volume may require multiple transmission periods to complete the transmission of all information. In addition, to address the contradiction between the increasing number of authorized users and the limited spectrum resources, we divide the shared transmission bandwidth into q0non-overlapping frequency slots in advance, which constitute the set of frequency slots F0={f1,f2,???,fq0},where q0is a positive integer representing the initial value of the divided frequency slots,and fq0denotes the q0th frequency slot.Note that the frequency slots in F0cannot only be used by authorized users, but also be occupied by interference signals. Furthermore, considering that passive eavesdroppers can intercept data transmission,in the designed transmission scheme,every frequency slot can only be occupied by each user no more than once during a transmission period to make it intractable for eavesdroppers to decode the transmitted information.Therefore, we propose a DSC-assisted transmission scheme as follows to enhance the security of the network we are considering.

    To tackle the negative impact of malicious interference, each base station leverages the spectrum sensing method within F0to determine the occupation status of each frequency slot in our proposed DSC-assisted transmission scheme.In recent decades,many refined spectrum sensing methods have been proposed [37–39],including spectrum sensing methods based on energy detection,eigenvalues, high-order cumulants (HOCs), and so forth. Here, we choose the HOCs-based spectrum sensing method to provide us with the occupation status of each frequency slot, since this method can extract a non-Gaussian signal from Gaussian noise even when the noise is colored and eliminate the adverse effects of noise power uncertainty in practical applications. According to the sensing results, the status of the frequency slots (P) can be expressed as P = {Pfj| j = 1, 2, ???, q0}, where j is the number of the frequency slots, the Pfjrepresents the status of the jth frequency slot and Pfj?{0,1}. If Pfj= 1, the jth frequency slot fjis already occupied, otherwise frequency slot fjcan be accessed.Finally, the base station can remove the interfered frequency slots from F0and acquire the set of available frequency slots Fswith q frequency slots, where q indicates the number of idle frequency slots. Consequently, the BSφshould select and allocate frequency slots from Fsfor the authorized users to ensure secure and reliable data transmission over a transmission period (t1–tp). The detailed procedure of determining Fsis described in Algorithm 1.

    Algorithm 1. Principles of available frequency slots.Input: Number of frequency slots q0 1. Generate a set of frequency slots F0 2. Determine the status of the entire frequency slots P={Pf1,Pf2, ???,Pfq0}, Pfj ?{0,1},by leveraging the spectrum sensing method 3. If Pfj =1, the fjth frequency slot is occupied by interference, otherwise fj is available 4. Remove the set of the occupied frequency slots FI={fj |Pfj=1} from F0 5. Update the set of frequency slots F0 and the number of frequency slots Output: The available frequency slots Fs with q frequency slots

    In the following,we propose a DSC-assisted transmission scheme that can be dynamically adjusted based on the spectrum sensing results with superior security performance.The DSC-assisted transmission scheme can generate a family of DSC sequences to represent the transmission decisions of the authorized users. With the proposed scheme,multiple authorized users can receive the data packets reliably during the same period and the possibility for passive eavesdroppers to decipher the transmission scheme is reduced,thereby achieving the goal of secure communication for authorized users. The procedures of generating the proposed DSC-assisted transmission scheme can be summarized in Algorithm 2.

    Algorithm 2. The proposed DSC-assisted transmission scheme.Input: The set of available frequency slots Fs, the number of available frequency slots q 1. For i=1, 2, ???, p 2. Generate a basic sequence family (Zφ,k) for k authorized users Zφ,k = {ziφ,k|k=1, 2, ???, K} based on the block cryptography 3. Upon applying sφ,k i =(sφ,k i-1 +zφ,k i + i)mod(q), acquire the sequence family Sφ,k={sφ,k i }4. If the frequency slots sφ,k i and sφ,w i occupied by user Uk and user Uw associated with BSφ in the ith time slot satisfies sφ,k i =sφ,w i (the authorized user w=1, 2, ???, K; w ≠k), let xφ,k i =(sφ,k i +ri)mod(q), where the orthogonal transformation factor ri=min(r|(sφ,k xφ,k i =sφ,k i +r)mod(q)≠sφ,w i ), otherwise,i 5. End for Output: The DSC sequence family Xφ,k={xφ,k; k=1, 2, ???, K}

    Based on the generated DSC sequence family Xφ,k, authorized users can occupy idle frequency slots in each time slot. It is clear that authorized users in the same microcell can access this micronetwork synchronously under the control of the mBS. Since the clocks are different in diverse microcells, the users associated with different mBSs and the MBS access the shared spectrum resources asynchronously.As shown in Fig.2,two authorized users in different communication cells (U1,aand UM,b) transmit the data packet occupying L (L ≤p ?q) consecutive time slots independently and randomly.

    4. Security analysis of data transmission in HCNs

    In this section,we conduct a theoretical analysis of the collision probability between two authorized users employing the DSCassisted transmission scheme.Based on the analysis of the collision probability, we also derive the closed-form expressions of the probability that authorized users can reliably receive the transmitted data packets and the probability that the eavesdroppers cannot acquire the transmitted data packets.

    4.1. Collision probability

    Considering that the TODs of these communication cells are different, authorized users in the MBS and mBSs might occupy the same frequency slot simultaneously, which causes a collision and introduces transmission interference. We assume that the process of data packets arriving at the shared transmission channel follows a Poisson distribution with an arrival rate (G).

    Fig. 2. Schematic diagram of the transmission scheme. fq: the qth frequency slot.

    Consequently, the probability density function (PDF) of transmitting data packets n in L time slots can be presented by fPDF(n).

    Note that the interference caused by the authorized data transmission in the HCNs is much greater than the interference power of the background noise. Therefore, the collision probability of data transmission should be analyzed since it greatly affects the data transmission performance. In our constructed HCNs, the collision probability for an authorized user refers to the probability that the authorized user occupies the same frequency slot as others in the same time slot when transmitting data packets in this network. Note that with the proposed DSC-assisted transmission scheme, authorized users served by the same base station do not collide with each other following the orthogonal sequences.Therefore, the data transmitted by the MBS can only conflict with the data transmitted by the mBS. Furthermore, considering that the coverage areas of the mBSs do not overlap with each other,an authorized user served by an mBS can only conflict with the data transmission from the MBS. In the following, we analyze the collision probability between users U1,a(associated with BS1) and UM,b(associated with the BSM) when transmitting their data packets.

    The data packet transmission processes of U1,aand UM,bthat are located in the BS1cell are shown in Fig.3.The symbols x1,ai (i=1,2,???, L) and xM,bi in Fig. 3 correspond to the frequency slots that are occupied by U1,aand UM,bat the ith time slot,respectively.Considering that the clocks of different cells are independent of each other,the data transmission start time of UM,bmight not be aligned with that of U1,a. As shown in Fig. 3, UM,bdoes not start transmitting until U1,ais about to complete the transmission task of the second time slot.We assume that there are l time slots overlapping between these two packets during the transmission period.In this case, during the data transmission period of UM,b, every time slot t (t1≤t ≤tl-1) of UM,boverlaps with two consecutive time slots of U1,a,the lth time slot of UM,bonly overlaps with the Lth time slot of U1,a,and the remaining time slots of UM,bdo not overlap with U1,a.It is worth noting that there is a special case where only the first time slot of UM,boverlaps with the last time slot of U1,a.

    Proof: Without loss of generality, if two data packets occupy different frequency slots in each time slot,they can be regarded as not colliding. Considering that data transmission in different time slots is independent of each other, the non-collision probability of two data packets transmitted by U1,aand UM,bis

    Considering that UM,bcan randomly occupy one of the available frequency slots at the rth time slot and lth time slot, (i.e.,

    Fig.3. Packet-transmission of U1,a and UM,b.l:the number of overlapping time slots between two packets in a transmission period;x1,aL :the frequency slot that is occupied by U1,a at the Lth time slot; : the frequency slot that is occupied by U1,a at the ith time slot; : the frequency slot that is occupied by UM,b at the Lth time slot; : the frequency slot that is occupied by UM,b at the ith time slot; tL and ti are the Lth and ith time slots, respectively.

    Since 0 ≤{Pj,P?j}≤1,{j,?j} = 1,2,???,q, apparently only when P1=P2=???=Pq=1/q can Pr(U1,a, UM,b) obtain its maximum value.Therefore,the maximum value of the non-collision probability is Eq. (2).

    Therefore, only when all the available frequency slots can be occupied by authorized users with equal probability, the maximum value of non-collision probability can be obtained.

    Based on the Theorem 1,we analyze the probability that n data packets can be transmitted without collision in HCNs.Theorem 2: Suppose that the authorized users in our constructed HCNs can occupy the frequency slots in Fswith equal probability 1/q. When user Uφ,τ (τ?{1, 2, ???, K}) is transmitting a data packet,there are k(k ≤K)users that might collide with Uφ,τ(when φ=M,these k authorized users served by all the mBSs,when φ=1,2,???,m, these k authorized users served by the MBS). Hence, the probability that Uφ,τ transmits a data packet without collision during the L data transmission time slots is

    Proof: Assume that the data transmission of authorized users U1,aand UM,boverlaps by l time slots. Since the process of the data packet arriving at the transmission channel follows the Poisson distribution, the probability for the authorized users transmitting the information at any time slot is equal. Accordingly, we can obtain that the probability of two data packets overlapping l time slots is

    Hence, the non-collision probability between this data packet and all other k data packets is given by Eq. (9).

    Two remarks can be derived from Theorem 2.

    Remark 1: For a fixed k,Pr(L,k,q)is a power function of the ratio L/q,and this function monotonically decreases with increasing value of L/q.

    Remark 2: For a fixed L/q,Pr(L,k,q)is an exponential function of k. In addition, since 0 < 1 - (L/q) < 1, Pr(L,k,q) decreases as k increases.

    Corollary 1: Based on Theorem 2, the collision probability between Uφ,τ and k users in other base stations can be given by

    4.2. Reliable transmission probability

    In HCNs,the interference to the transmitted information mainly comes from three aspects: background noise (N0), unauthorized malicious interference devices(Iun),and collisions between authorized users during data transmission(Ic).Therefore,the SINR of the authorized user (SINRu) can be expressed as

    where Purepresents the power received by the authorized user from the associated BS,and Ic,uis the interference from other authorized users due to transmission collision.Note that the influence of unauthorized malicious interference devices on data packets transmitted by authorized users Iun,ucan be avoided by Algorithm 1(i.e.,Iun,u= 0). Moreover, N0is characterized by a zero-mean, complex Gaussian random variable. Similarly, the SINR of the eavesdropper(SINRe) can be presented by

    where Peis the power of the data packet received by the eavesdropper,and Ic,edenotes the collisions between data packets transmitted within the observed frequency slots of the eavesdropper and other authorized transmitted data packets. The interference of unauthorized signals to the frequency slots observed by eavesdropper Iun,e= 0.

    As Wyner demonstrated in pioneering work[27],to decode the received data packet, the SINR of the authorized user should be greater than the decoding threshold(δu).We define the probability that all transmitted information can be received by authorized users as the reliable transmission probability, which can be expressed as

    where SINRu,BSis the SINR of the authorized user associated with the BSM.

    In the DSC-assisted scheme,the probability of the MBS occupying an available frequency slot(fj?Fs; j=1,2,???,q)is Pr(fj).Then,the power of desired data transmission received by the authorized user (Pu,BS) can be expressed as

    where PBSis the power of the BSM, θ is the number of authorized users associated with the BSM;g(u,BS)=|hu.fj.l|2denotes the channel gain between the BSMand the authorized user at the lth time slot,which follows an exponential distribution with parameter α2; u indicates the authorized users. In addition, the interference power caused by other authorized users occupying the same frequency slot is

    Based on Eq.(20),we can now derive the following proposition.

    where ρ refers to the number of users served by the mBSs.

    4.3. Secrecy probability

    To prevent passive eavesdroppers from decoding the information transmitted between authorized devices, the SINR of any eavesdroppers should be lower than the decoding threshold δe.

    Accordingly, we define the probability that valid information cannot be obtained by any eavesdropper as the secrecy probability,for example,

    where SINRe,BSis the SINR of the eavesdropper observing the signal transmitted by the BSM.

    Assume that eavesdroppers do not know the sequence family Xφ,k, which is also the common case for most practical systems.Therefore, each eavesdropper associates a random frequency slot to intercept the transmitted data packet. Hence, when eavesdropping on the BSMtransmission, the total power of intercepted data packets by the eavesdropper Ue(Pe)and the inter-cell interference to Ue(Ic,e) can be expressed as

    where e refers to the eavesdropper, the channel gain g(e,BS) =|he.fj.l|2between the eavesdropper and the MBS follows an exponential distribution with parameter λ2. Similarly, the channel gain g(e,bs) = |hme.fj.l|2between the eavesdropper and an mBS obeys an exponential distribution with parameter ω2.

    Substituting Eqs. (14) and (24) into Eq. (16), the SINR of eavesdropper can be rewritten as

    Proof: Proposition 2 can be verified in a similar manner as Proposition 1, so that the detailed proof is omitted here.

    For an authorized user associated with the MBS, the secrecy probability can be expressed as

    5. Network capacity analysis

    According to the analysis in Section 4,we can find that the reliable transmission probability and secrecy probability are both dependent on the number of users in the HCNs.Therefore,the upper and lower bounds on network capacity (i.e., the number of users that can be supported in the network) are derived in this section to guarantee reliable and secure data transmission probabilities.

    5.1. Network capacity of the MBS

    Assuming that Pr,minis the minimum required reliable transmission probability in HCNs, the following relationship can be obtained according to Proposition 1.

    where W is the Lambert-W function.

    As long as the number of authorized users associated with the BSMdoes not exceed the maximum capacity of this network, the data transmission can be successfully completed.

    Similarly, when the HCNs are constrained by the minimum secrecy probability (Ps,min), we can acquire the following relationship

    With the aid of the Lambert-W function, we can derive the lower bound of this macrocell network capacity in HCNs under the constraints of Ps,min.

    Therefore, the number of authorized users associated with the BSMshould exceed the lower bound of the capacity to ensure that the data packets transmitted in the BSMcannot be decrypted by the eavesdropper.

    5.2. Network capacity of the mBSs

    Similar to the analysis in Section 5.1, the network capacity of the mBSs can be obtained. The upper bound of the mBS network capacity is

    To this end, the upper and lower bounds of the number of authorized users allowed to access the network can be obtained according to the requirements of the actual application scenarios for the reliable transmission probability Pr,minand secrecy probability Ps,minof the HCNs. Therefore, by reasonably limiting the number of users accessing the network, the goal of effectively increasing the possibility of multiple users successfully transmitting data packets in the same transmission period while reducing the possibility of eavesdropping can be achieved.

    6. Numerical results

    In this section, we present simulation results to validate our theoretical analysis of the security and network capacity of HCNs.Moreover, we compare the proposed DSC-assisted transmission scheme with a benchmark scheme to demonstrate the effectiveness of the proposed scheme.

    6.1. Simulation configurations

    We consider a two-tier HCNs scenario, which consists of one MBS, and ten mBSs.Additionally, there are ten passive eavesdroppers were randomly distributed in our constructed HCNs.The powers of the MBS and the mBS are PBS= 43 decibel relative to one milliwatt (dBm)) and Pbs= 30 dBm, respectively. The parameter of average channel gain between the MBS and the authorized user is α2=5,for the channel between the MBS and the eavesdropper,it is λ2=3.Similarly,for the mBSs,the parameter of average channel gain for the authorized user is β2= 2, and for the eavesdropper is ω2= 1. In addition, the bandwidth of the shared transmission channel is set to 300 MHz. Unless otherwise specified, all of the results in this section are obtained with the above parameter settings.

    Fig. 4. Average reliable transmission and average secrecy probabilities vary with the SNR when q = 128 and L = 8. dB: decibel.

    6.2. Security performance evaluation

    (1)Different SINR thresholds δuand δe:Fig.4 shows the average reliable transmission probability and the secrecy probability with different signal-to-noise ratios(SNRs)when q and L are equal to 128 and 8, respectively. From the figure, we can find that

    · The probability of reliable transmission increases with increasing SNR, while the secrecy probability decreases approximately linearly.This phenomenon is especially obvious when the SNR is in the range from-5 to 10 decibel(dB).This demonstrates that with the assistance of our proposed DSC-assisted transmission scheme,when the communication environment improves, the possibility of reliable transmission can increase rapidly,while the possibility of eavesdroppers intercepting the information also slightly increases.

    · When the decoding thresholds δuand δeincrease from 2 to 3, the probability of reliable transmission decreases, while the secrecy probability increases.This shows that with stricter requirements on the channel conditions for successful data transmission, HCNs become more vulnerable to security threats.

    · We compare our proposed scheme with a conventional OFDM transmission method and an artificial noise-aided OFDM method [22]. The conventional OFDM transmission scheme aims to improve the resource utilization efficiency and achieve better network performance.Based on the conventional OFDM transmission scheme, the artificial noiseaided OFDM scheme introduces artificial noise to combat eavesdropping and enhance network security. We can find from the simulation results that the proposed DSC-assisted scheme can obtain the highest reliable transmission probability and secrecy probability. Furthermore, the proposed scheme does not introduce additional signal sources or require knowledge of the location of authorized users in advance. Therefore, it consumes less transmission power than the artificial noise-aided OFDM method and has a lower implementation complexity than the other two schemes.

    · The theoretical results match well with the simulation results as shown in Fig. 4, which confirms the correctness of our theoretical analysis.In the following,we use theoretical results to evaluate the impact of different parameters on the performance of the proposed scheme.

    (2)Impacts of L and q on the reliable transmission probability:Fig.5 demonstrates the influence of the time slot number L and the frequency slot number q on the average reliable transmission probability of the HCNs. The decoding threshold of the transmission link between the BSs and authorized users δuis 3.When each data transmission occupies L = 8 time slots, the reliable transmission probability increases as q increases. This is because dividing more frequency slots can effectively reduce the collision possibility among the data transmissions, leading to less co-channel interference among authorized users.In other words,it enhances the probability that the data packets can be successfully transmitted.However, when the available frequency slots number q is 128, as L increases, the reliable transmission probability decreases. The reason is that,with more time slots required for one data transmission, the collision probability increases with more co-channel interference.

    (3) Impacts of L and q on the secrecy probability: We obtain the average secrecy probability curves in Fig. 6 with δe= 3. Different from the results in Fig.5,the secrecy probability decreases with increasing SNR. Moreover, from Fig. 6, it is clear that the secrecy probability increases with a large L,when q is fixed.Once L is determined,the secrecy probability also increases as q increases.By utilizing the DSC-assisted transmission scheme,the eavesdropper has no idea which frequency slot is occupied for target data transmission in each time slot. If the eavesdropper always monitors one or several available frequency slots,it can only receive data fragments from different data packet transmissions. Since each data packet transmission occupies different frequency slots at different time slots, the eavesdropper has to successfully intercept all the data fragments to decode and obtain the entire data packet.With larger L and q, the eavesdropper needs to monitor more frequency slots for a longer time to obtain the complete data packet transmitted by the target authorized user. Therefore, with large L and q in the proposed DSC-assisted transmission scheme, it is difficult for the eavesdropper to decipher the transmitted data packets, leading to a high network security performance.

    6.3. Network capacity evaluation

    Fig.5. Average reliable transmission probability variation with SNR under different L and q when δu = 3.

    Fig.6. Average secrecy transmission probability variation with SNR under different L and q when δe = 3.

    We examine the impacts of different parameter settings on the network capacity of the proposed scheme. Fig. 7 shows the network capacity of the HCNs when L = 8,and δu=δe= 2.Fig. 7(a)shows that as the minimum required value of the reliable transmission probability increases, the upper bound of the network capacity slightly decreases. This is because when the requirement for the successful transmission of data packets becomes stricter,fewer users are allowed to access the network to reduce the collision probability between data packets transmitted over the limited spectrum resources. Fig. 7(b) reflects that as the minimum required value of secrecy probability increases, the lower bound of network capacity increases. To make it more difficult for eavesdroppers to obtain data packets in HCNs, the number of users accessing the network should increase to introduce more possibilities of frequency slot occupation at different time slots.

    We can also find from Figs. 7(a) and (b) that, with a fixed Pr,minor Ps,min, a larger q indicates that more authorized users can be allowed to access the network. Furthermore, according to our simulation, for the cases with q greater than 128, the lower bound of the network capacity falls below 0, which means that the secrecy requirements of the HCNs can always be guaranteed regardless of the number of users in the networks. The above observations allow us to conclude that with fixed requirements on reliable transmission probability and secrecy probability, the parameters of the DSC-assisted transmission scheme can be adjusted to accommodate more users for reliable and secure transmission.

    7. Conclusions and future work

    In this article, we have investigated the reliable and secure transmission problem in HCNs. Specifically, we have proposed a DSC-assisted transmission scheme to flexibly schedule the spectrum occupation for authorized data transmissions at different time slots. Moreover, we have also analyzed and derived closedform expressions of the collision probability,reliable transmission probability,secrecy probability,and network capacity.By adopting the proposed scheme,limited spectrum resources can be efficiently utilized,and the parameters of the DSC-assisted scheme(e.g.,L and q) can be flexibly adjusted to enhance network capacity while guaranteeing secure transmission.The scheme design and theoretical analysis in this work can provide useful guidance for future research on security enhancement of wireless networks. For our future work, we will introduce friendly interference sources and investigate source selection and power allocation to further improve the reliable and secure transmission probabilities.

    Fig.7. Average network capacity variation with different requirements on reliable transmission probability and secrecy probability for PBS=43 dBm,Pbs=30 dBm,L=8,and δu=δe=2.(a)The impact of the reliable transmission probability requirement on the upper bound of average network capacity with different values of q;(b)the impact of the secrecy probability requirement on the lower bound of average network capacity with different values of q.

    Acknowledgments

    This work was supported by the National Natural Science Foundation of China (61825104 and 91638204), the China Scholarship Council (CSC), the Natural Sciences and Engineering Research Council (NSERC) of Canada, and University Innovation Platform Project (2019921815KYPT009JC011).

    Compliance with ethics guidelines

    Chenxi Li, Lei Guan, Huaqing Wu, Nan Cheng, Zan Li, and Xuemin (Sherman) Shen declare that they have no conflicts of interest or financial conflicts to disclose.

    Appendix A. Supplementary data

    Supplementary data to this article can be found online at https://doi.org/10.1016/j.eng.2021.04.019.

    成人国语在线视频| 亚洲伊人色综图| 在线永久观看黄色视频| 国内毛片毛片毛片毛片毛片| bbb黄色大片| 欧美中文综合在线视频| 亚洲va日本ⅴa欧美va伊人久久| 久久婷婷成人综合色麻豆| 一区二区日韩欧美中文字幕| 91av网站免费观看| 久久这里只有精品19| av天堂久久9| 美国免费a级毛片| 精品国产超薄肉色丝袜足j| 伊人久久大香线蕉亚洲五| 国产欧美日韩一区二区三| 亚洲七黄色美女视频| 极品人妻少妇av视频| 日日夜夜操网爽| 亚洲欧美激情在线| 热99久久久久精品小说推荐| 亚洲一区二区三区欧美精品| 一级毛片电影观看| 亚洲五月色婷婷综合| 日韩 欧美 亚洲 中文字幕| 黄色视频,在线免费观看| 99香蕉大伊视频| 国产精品一区二区免费欧美| 国产视频一区二区在线看| 在线观看一区二区三区激情| 亚洲av电影在线进入| 波多野结衣一区麻豆| 丰满人妻熟妇乱又伦精品不卡| 老司机亚洲免费影院| 色在线成人网| 亚洲av第一区精品v没综合| 国产一区二区在线观看av| 丰满迷人的少妇在线观看| 欧美精品av麻豆av| 高清av免费在线| 十八禁网站免费在线| 亚洲精品一二三| 色在线成人网| 欧美精品高潮呻吟av久久| 亚洲成人国产一区在线观看| 国产成人精品在线电影| 一夜夜www| 久久性视频一级片| 在线观看免费午夜福利视频| 欧美一级毛片孕妇| 男女高潮啪啪啪动态图| 日日摸夜夜添夜夜添小说| 一级毛片精品| 午夜91福利影院| 国产精品免费视频内射| 成人精品一区二区免费| 久久99热这里只频精品6学生| 久久午夜综合久久蜜桃| 国产精品国产高清国产av | 中亚洲国语对白在线视频| 亚洲av国产av综合av卡| 色精品久久人妻99蜜桃| 别揉我奶头~嗯~啊~动态视频| 人人妻人人澡人人看| 99香蕉大伊视频| 又大又爽又粗| 日韩大码丰满熟妇| 51午夜福利影视在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 色播在线永久视频| 日本av手机在线免费观看| 久久国产精品人妻蜜桃| 亚洲专区字幕在线| 一本综合久久免费| 亚洲专区字幕在线| 一本综合久久免费| 在线观看免费高清a一片| 香蕉久久夜色| 不卡av一区二区三区| 色播在线永久视频| av不卡在线播放| 亚洲五月色婷婷综合| 国产野战对白在线观看| 日韩欧美一区二区三区在线观看 | 一边摸一边抽搐一进一出视频| 欧美激情久久久久久爽电影 | 欧美av亚洲av综合av国产av| 免费黄频网站在线观看国产| 一区福利在线观看| 日韩欧美一区视频在线观看| 国产一区二区激情短视频| 色94色欧美一区二区| 色94色欧美一区二区| 少妇裸体淫交视频免费看高清 | 最近最新免费中文字幕在线| 最近最新免费中文字幕在线| 久9热在线精品视频| 日本wwww免费看| www.精华液| 午夜91福利影院| 美女视频免费永久观看网站| 久久精品aⅴ一区二区三区四区| 国产精品九九99| 1024视频免费在线观看| 99久久精品国产亚洲精品| 国产日韩一区二区三区精品不卡| 99久久99久久久精品蜜桃| 女同久久另类99精品国产91| 精品亚洲成国产av| 国产免费av片在线观看野外av| 午夜福利在线观看吧| svipshipincom国产片| 亚洲五月色婷婷综合| 亚洲成av片中文字幕在线观看| 欧美乱妇无乱码| 脱女人内裤的视频| 女人被躁到高潮嗷嗷叫费观| 国产高清视频在线播放一区| 午夜福利乱码中文字幕| 国产伦理片在线播放av一区| 91麻豆精品激情在线观看国产 | 丁香六月欧美| 亚洲成人手机| 国产老妇伦熟女老妇高清| 欧美成人午夜精品| 天天躁狠狠躁夜夜躁狠狠躁| 捣出白浆h1v1| 最近最新中文字幕大全免费视频| 国产av又大| 亚洲精品国产一区二区精华液| 亚洲成人手机| 麻豆乱淫一区二区| 日韩视频在线欧美| 亚洲人成77777在线视频| 日本精品一区二区三区蜜桃| 亚洲av第一区精品v没综合| 久久午夜亚洲精品久久| 精品欧美一区二区三区在线| 午夜免费鲁丝| 成年版毛片免费区| 国产精品久久久久成人av| 亚洲午夜精品一区,二区,三区| 另类精品久久| 国产又色又爽无遮挡免费看| 国产在线免费精品| 男女免费视频国产| 国产欧美日韩综合在线一区二区| 国产男女内射视频| 美女福利国产在线| 精品福利观看| 中文字幕制服av| 国产一区有黄有色的免费视频| kizo精华| 久久人妻熟女aⅴ| av片东京热男人的天堂| 国产aⅴ精品一区二区三区波| 亚洲情色 制服丝袜| 精品第一国产精品| 咕卡用的链子| 黄网站色视频无遮挡免费观看| 久久毛片免费看一区二区三区| 天天操日日干夜夜撸| 桃花免费在线播放| 日日爽夜夜爽网站| 美国免费a级毛片| 成人av一区二区三区在线看| 亚洲伊人色综图| 日韩欧美三级三区| 国产精品.久久久| 老司机影院毛片| 桃红色精品国产亚洲av| 欧美久久黑人一区二区| 757午夜福利合集在线观看| 老熟妇仑乱视频hdxx| 欧美午夜高清在线| 大型av网站在线播放| 成人国语在线视频| 国产精品电影一区二区三区 | 久久精品亚洲精品国产色婷小说| 在线观看免费视频日本深夜| 午夜福利乱码中文字幕| 交换朋友夫妻互换小说| 别揉我奶头~嗯~啊~动态视频| 久久久久国产一级毛片高清牌| 免费久久久久久久精品成人欧美视频| 国产人伦9x9x在线观看| 午夜激情久久久久久久| 欧美另类亚洲清纯唯美| 丰满少妇做爰视频| 色老头精品视频在线观看| 色婷婷久久久亚洲欧美| 在线观看66精品国产| 精品一区二区三区视频在线观看免费 | 午夜福利乱码中文字幕| 精品免费久久久久久久清纯 | 日韩中文字幕视频在线看片| 日韩免费高清中文字幕av| 国产精品一区二区精品视频观看| 999久久久精品免费观看国产| 亚洲精品久久成人aⅴ小说| 最近最新中文字幕大全免费视频| 日韩中文字幕视频在线看片| 午夜福利影视在线免费观看| 自线自在国产av| 成年人免费黄色播放视频| 国产成人av教育| 真人做人爱边吃奶动态| 黄网站色视频无遮挡免费观看| 久久久欧美国产精品| 亚洲精华国产精华精| 大片电影免费在线观看免费| 在线观看免费高清a一片| 蜜桃国产av成人99| 亚洲成人免费av在线播放| 国产91精品成人一区二区三区 | 国产1区2区3区精品| 无限看片的www在线观看| 伊人久久大香线蕉亚洲五| 岛国毛片在线播放| 这个男人来自地球电影免费观看| 国产亚洲欧美精品永久| 午夜两性在线视频| 天堂动漫精品| 日韩大码丰满熟妇| 日本av手机在线免费观看| 欧美精品啪啪一区二区三区| 无遮挡黄片免费观看| 少妇裸体淫交视频免费看高清 | av一本久久久久| 亚洲专区字幕在线| 韩国精品一区二区三区| 99在线人妻在线中文字幕 | 国产精品偷伦视频观看了| 多毛熟女@视频| 国产老妇伦熟女老妇高清| 久久久久久久大尺度免费视频| 国产伦理片在线播放av一区| 国产黄频视频在线观看| 成人18禁高潮啪啪吃奶动态图| 又黄又粗又硬又大视频| 欧美+亚洲+日韩+国产| 国产精品九九99| 一级毛片精品| 妹子高潮喷水视频| 日韩欧美一区二区三区在线观看 | 考比视频在线观看| 久久精品成人免费网站| 丰满人妻熟妇乱又伦精品不卡| 女同久久另类99精品国产91| 久久久欧美国产精品| 成人手机av| 精品少妇久久久久久888优播| 999精品在线视频| 精品人妻熟女毛片av久久网站| 69精品国产乱码久久久| 美女福利国产在线| 91成人精品电影| 18禁美女被吸乳视频| 午夜激情久久久久久久| 色婷婷久久久亚洲欧美| 亚洲av电影在线进入| 最新美女视频免费是黄的| 日本五十路高清| 丝袜人妻中文字幕| 国产亚洲精品一区二区www | 99久久国产精品久久久| 悠悠久久av| 欧美精品一区二区大全| 欧美国产精品va在线观看不卡| 五月开心婷婷网| 制服人妻中文乱码| 欧美黑人精品巨大| 午夜激情久久久久久久| 老熟女久久久| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美成人午夜精品| 1024视频免费在线观看| 午夜激情av网站| 成在线人永久免费视频| 黄色怎么调成土黄色| 国产av一区二区精品久久| 国产精品亚洲av一区麻豆| 纯流量卡能插随身wifi吗| 亚洲精华国产精华精| 老司机深夜福利视频在线观看| 国产在线免费精品| 99精品在免费线老司机午夜| 精品乱码久久久久久99久播| 丰满人妻熟妇乱又伦精品不卡| tube8黄色片| 别揉我奶头~嗯~啊~动态视频| 精品少妇一区二区三区视频日本电影| a级毛片在线看网站| 一本久久精品| 人人妻人人澡人人爽人人夜夜| 国产高清国产精品国产三级| 精品一品国产午夜福利视频| 久久久久视频综合| 涩涩av久久男人的天堂| 99热网站在线观看| 女人高潮潮喷娇喘18禁视频| 老司机午夜十八禁免费视频| 久久精品国产a三级三级三级| 成人黄色视频免费在线看| 激情在线观看视频在线高清 | 夜夜夜夜夜久久久久| 亚洲国产成人一精品久久久| 69精品国产乱码久久久| 飞空精品影院首页| 久久久国产成人免费| 日韩一区二区三区影片| 汤姆久久久久久久影院中文字幕| 九色亚洲精品在线播放| 电影成人av| 亚洲av片天天在线观看| 90打野战视频偷拍视频| 精品少妇内射三级| 久久精品人人爽人人爽视色| 青青草视频在线视频观看| 日韩欧美一区视频在线观看| √禁漫天堂资源中文www| 在线观看人妻少妇| 亚洲精品乱久久久久久| 精品亚洲成国产av| 一本色道久久久久久精品综合| 狠狠精品人妻久久久久久综合| 中文欧美无线码| 午夜激情av网站| 亚洲国产精品一区二区三区在线| 欧美精品啪啪一区二区三区| 国产成人精品久久二区二区91| 亚洲午夜理论影院| 99国产综合亚洲精品| 久久 成人 亚洲| 一本一本久久a久久精品综合妖精| 黄色丝袜av网址大全| 在线观看免费视频网站a站| 少妇的丰满在线观看| 国产在线一区二区三区精| 中文字幕人妻熟女乱码| 免费在线观看影片大全网站| 最黄视频免费看| 动漫黄色视频在线观看| 91国产中文字幕| 亚洲色图av天堂| 国产成人精品久久二区二区91| 欧美人与性动交α欧美软件| 男女免费视频国产| 激情在线观看视频在线高清 | 亚洲精品国产一区二区精华液| 丁香欧美五月| 可以免费在线观看a视频的电影网站| 韩国精品一区二区三区| 免费不卡黄色视频| 国产野战对白在线观看| 日韩中文字幕视频在线看片| 午夜福利欧美成人| 亚洲avbb在线观看| 精品人妻在线不人妻| 婷婷丁香在线五月| 国产主播在线观看一区二区| 久久久久精品国产欧美久久久| 精品人妻在线不人妻| 国产激情久久老熟女| 国产日韩欧美在线精品| 国产精品久久电影中文字幕 | 国产一区二区三区综合在线观看| 国产精品电影一区二区三区 | 欧美日韩福利视频一区二区| 999久久久国产精品视频| 久久香蕉激情| 丝瓜视频免费看黄片| 精品国产乱码久久久久久小说| 国产成人欧美| av福利片在线| 久久精品国产a三级三级三级| 亚洲国产av影院在线观看| av线在线观看网站| 操美女的视频在线观看| 国产成人系列免费观看| 自拍欧美九色日韩亚洲蝌蚪91| 欧美在线黄色| 高清在线国产一区| 人人妻人人爽人人添夜夜欢视频| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品美女久久久久99蜜臀| 亚洲精品久久午夜乱码| av有码第一页| 一本久久精品| 纵有疾风起免费观看全集完整版| 777久久人妻少妇嫩草av网站| 在线看a的网站| 美女国产高潮福利片在线看| 19禁男女啪啪无遮挡网站| 国产成人啪精品午夜网站| 成人18禁高潮啪啪吃奶动态图| 怎么达到女性高潮| 乱人伦中国视频| 啪啪无遮挡十八禁网站| 99久久99久久久精品蜜桃| 18禁国产床啪视频网站| 免费在线观看黄色视频的| 欧美精品亚洲一区二区| 国产精品一区二区在线观看99| www.精华液| 日本五十路高清| 后天国语完整版免费观看| 岛国在线观看网站| 国产精品九九99| 国产高清国产精品国产三级| 国产精品麻豆人妻色哟哟久久| 桃红色精品国产亚洲av| av不卡在线播放| 亚洲av日韩精品久久久久久密| 国产片内射在线| 国产亚洲精品第一综合不卡| 成人手机av| 欧美精品亚洲一区二区| 叶爱在线成人免费视频播放| 色视频在线一区二区三区| h视频一区二区三区| 两人在一起打扑克的视频| 日本黄色视频三级网站网址 | 精品乱码久久久久久99久播| 精品少妇黑人巨大在线播放| 国产成人免费观看mmmm| 国产在线一区二区三区精| 欧美人与性动交α欧美精品济南到| 亚洲国产欧美网| 精品乱码久久久久久99久播| 久久久久精品国产欧美久久久| 80岁老熟妇乱子伦牲交| 可以免费在线观看a视频的电影网站| 日韩欧美国产一区二区入口| 精品熟女少妇八av免费久了| 国产日韩欧美视频二区| 黄色视频,在线免费观看| 人人妻人人添人人爽欧美一区卜| 亚洲第一av免费看| 欧美日韩福利视频一区二区| 欧美成人午夜精品| 亚洲欧美一区二区三区黑人| 精品高清国产在线一区| 精品少妇黑人巨大在线播放| 欧美乱码精品一区二区三区| 黄片小视频在线播放| 色综合欧美亚洲国产小说| 国产精品影院久久| 香蕉国产在线看| 一级a爱视频在线免费观看| 国产精品av久久久久免费| 脱女人内裤的视频| 亚洲,欧美精品.| 亚洲欧洲日产国产| 亚洲成人免费av在线播放| 18禁黄网站禁片午夜丰满| 麻豆乱淫一区二区| 国产伦人伦偷精品视频| 中文字幕av电影在线播放| 人妻 亚洲 视频| 亚洲人成伊人成综合网2020| 丝袜在线中文字幕| 大香蕉久久成人网| 99国产精品一区二区三区| 中文字幕人妻丝袜一区二区| www.精华液| 精品国产一区二区三区四区第35| 久久久国产成人免费| 亚洲熟女毛片儿| cao死你这个sao货| 在线观看舔阴道视频| 亚洲精品美女久久久久99蜜臀| 国产人伦9x9x在线观看| 99re在线观看精品视频| 亚洲成a人片在线一区二区| 欧美 日韩 精品 国产| 黄片大片在线免费观看| 美女国产高潮福利片在线看| 叶爱在线成人免费视频播放| 丝袜美足系列| 捣出白浆h1v1| svipshipincom国产片| 啦啦啦免费观看视频1| 无人区码免费观看不卡 | 国产午夜精品久久久久久| 亚洲欧美日韩高清在线视频 | av一本久久久久| 久久亚洲精品不卡| 大码成人一级视频| 国产日韩欧美亚洲二区| 视频区图区小说| 每晚都被弄得嗷嗷叫到高潮| 亚洲五月婷婷丁香| 亚洲欧美激情在线| 亚洲人成电影观看| 一级黄色大片毛片| 人成视频在线观看免费观看| 欧美人与性动交α欧美软件| 极品教师在线免费播放| 亚洲精品久久午夜乱码| 黄片小视频在线播放| 国产精品一区二区在线不卡| 少妇精品久久久久久久| 黄色片一级片一级黄色片| 日本黄色视频三级网站网址 | 国产黄频视频在线观看| 水蜜桃什么品种好| 中亚洲国语对白在线视频| 一边摸一边抽搐一进一出视频| 久久国产精品大桥未久av| 午夜福利视频精品| 国产在线免费精品| 午夜免费鲁丝| 国产精品二区激情视频| 久久国产精品人妻蜜桃| 日韩欧美一区视频在线观看| 久久久久视频综合| 午夜福利欧美成人| 亚洲国产中文字幕在线视频| 啦啦啦免费观看视频1| 国产区一区二久久| 亚洲国产成人一精品久久久| 亚洲色图 男人天堂 中文字幕| 欧美亚洲日本最大视频资源| 欧美精品一区二区免费开放| 亚洲五月色婷婷综合| 视频在线观看一区二区三区| 国产精品99久久99久久久不卡| 亚洲黑人精品在线| 老熟妇乱子伦视频在线观看| 男女免费视频国产| 色老头精品视频在线观看| 黄频高清免费视频| 欧美性长视频在线观看| 国产男女超爽视频在线观看| 国产免费视频播放在线视频| 美女高潮到喷水免费观看| 黄色毛片三级朝国网站| 亚洲人成77777在线视频| 女人爽到高潮嗷嗷叫在线视频| 99精国产麻豆久久婷婷| 热re99久久国产66热| 午夜福利免费观看在线| 啦啦啦视频在线资源免费观看| 岛国毛片在线播放| 国精品久久久久久国模美| 99国产精品免费福利视频| 高潮久久久久久久久久久不卡| 99re6热这里在线精品视频| 制服人妻中文乱码| 美女高潮喷水抽搐中文字幕| 正在播放国产对白刺激| 成年动漫av网址| 亚洲avbb在线观看| 一区二区日韩欧美中文字幕| 在线播放国产精品三级| 国产又色又爽无遮挡免费看| 色尼玛亚洲综合影院| 欧美激情 高清一区二区三区| 91大片在线观看| 精品乱码久久久久久99久播| 青青草视频在线视频观看| 日韩三级视频一区二区三区| 啦啦啦中文免费视频观看日本| 99re6热这里在线精品视频| 久久青草综合色| 日韩熟女老妇一区二区性免费视频| 国产成人精品久久二区二区免费| 极品教师在线免费播放| 无限看片的www在线观看| 精品福利永久在线观看| 久久国产精品影院| 久久性视频一级片| 欧美日韩黄片免| 无人区码免费观看不卡 | 亚洲精品av麻豆狂野| 久久中文字幕人妻熟女| 免费在线观看视频国产中文字幕亚洲| 亚洲欧美一区二区三区黑人| 岛国在线观看网站| 男女边摸边吃奶| 成人特级黄色片久久久久久久 | 啦啦啦中文免费视频观看日本| 国产一区二区激情短视频| 香蕉久久夜色| 人成视频在线观看免费观看| 久久国产精品影院| 成人黄色视频免费在线看| av天堂在线播放| 日韩大片免费观看网站| 丁香六月天网| 欧美中文综合在线视频| 亚洲,欧美精品.| 国产1区2区3区精品| 精品少妇黑人巨大在线播放| 夫妻午夜视频| 国产高清激情床上av| 国产高清国产精品国产三级| 99在线人妻在线中文字幕 | 久久精品亚洲熟妇少妇任你| 1024视频免费在线观看| 老司机靠b影院| 日本wwww免费看| 国产精品麻豆人妻色哟哟久久| 亚洲欧洲日产国产| 精品人妻熟女毛片av久久网站| 丝袜美足系列| 久久99一区二区三区| 下体分泌物呈黄色| 汤姆久久久久久久影院中文字幕| 蜜桃国产av成人99| 国产熟女午夜一区二区三区| 精品亚洲成国产av| 国产精品免费大片| 久久av网站|