• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Game Theoretic Approach for a Minimal Secure Dominating Set

    2023-12-22 11:06:54XiuyangChenChangbingTangandZhaoZhang
    IEEE/CAA Journal of Automatica Sinica 2023年12期

    Xiuyang Chen, Changbing Tang,,, and Zhao Zhang

    Abstract—The secure dominating set (SDS), a variant of the dominating set, is an important combinatorial structure used in wireless networks.In this paper, we apply algorithmic game theory to study the minimum secure dominating set (MinSDS) problem in a multi-agent system.We design a game framework for SDS and show that every Nash equilibrium (NE) is a minimal SDS, which is also a Pareto-optimal solution.We prove that the proposed game is an exact potential game, and thus NE exists,and design a polynomial-time distributed local algorithm which converges to an NE in O(n) rounds of interactions.Extensive experiments are done to test the performance of our algorithm,and some interesting phenomena are witnessed.

    I.INTRODUCTION

    WITH the rapid progress of wireless network technology,some distributed network systems such as multi-agent systems, sensor networks, and wireless ad hoc networks have become more and more popular for network monitoring which only requires little intervention from people.To save cost, it is desirable to use small number of intelligent devices to collect information from the whole system.Such a consideration leads to the minimum dominating set (MinDS) problem [1].

    Note that in a MinDS problem, each sensor is only responsible for detecting security issues of the system, and is not endowed with the power to handle them.This limits the scope of application of dominating sets.For example, in a museum,each pavilion is viewed as a vertex of a graph, and the corridors between the pavilions form the edge set of the graph.A guard in pavilionviis responsible for monitoring the surrounding pavilionsN[vi], whereN[vi] is the closed neighbor set ofvi.If every pavilion could be monitored, then those pavilions with guards form a dominating set.If a problem occurs in a guarded pavilion, then the guard in the corresponding pavilion can deal with the issue.If a problem occurs in an unguarded pavilion, then a nearby guard could move to deal with the issue.At the same time, it is expected that all pavilions remain to be monitored after movement.This leads to the minimum secure dominating set (MinSDS) problem.In addition to the above scenario, SDS problems are also applied in the context of the protection system, network security system,military strategy analysis, etc.[1]–[4].

    The concept of SDS was first introduced by Cockayneet al.[5] in 2005.Burgeret al.[6] designed two exponential-time algorithms for the MinSDS problem in general graphs.It is known that the MinSDS problem is NP-hard.In fact, Boumediene Merouane and Chellali [7] proved that the MinSDS problem is NP-hard even when restricted to bipartite graphs and split graphs.Therefore, many people attempted to solve the MinSDS problem with special classes of graphs [4],[8]–[15].These algorithms are centralized.Note that centralized algorithms are vulnerable to external attacks.Damage to the center may lead to a breakdown of the whole system.This observation motivates us to seek distributed algorithms for the MinSDS problem.

    A distributed algorithm can effectively reduce the damage of attacks, especially in multi-agent systems, in which each node is an autonomous agent and can determine its strategy for the next step based on currently collected information(which is often local since an agent might not be as powerful as a center).Such an autonomy eliminates the dependence on a center, and greatly improves anti-attack capability.Note that individual benefits and social welfare are often conflicting.Thus, a disadvantage resulting from such autonomy is that a self-organized algorithm take a longer time to run, and may fail to get satisfactory solutions.

    Using game theory can effectively cope with the above disadvantages, and the hypothetical definition of a player is exactly what we expect from an agent: rational, intelligent,and selfish.Game theory has the advantage whereby providing interaction frameworks (game design) and specific local rules (distributed methods), a satisfactory collective behavior may be theoretically guaranteed through competition and cooperation among individuals.For studies of game theory in wireless and communication networks, readers may refer to the monograph [16] and references therein.

    Compared with the large quantities of approximation algorithms for the MinDS problem and its variants [17], studies on the domination problems using game theory are not as common.Yen and Chen [18] designed a multi-domination game and proved that every Nash equilibrium (NE) of the game is a minimal multi-dominating set, and is also a Pareto optimal solution.Based on the game, a distributed algorithm was designed.Note that the algorithm uses a central daemon which allows only one process at a time.Later, Yen and Sun [19]designed an independent domination game and proved that every NE is a minimal independent dominating set.A distributed algorithm was also presented under a central daemon.Chen and Zhang [20] designed a connected domination game and proved that every NE is a minimal connected dominating set and a distributed algorithm can find an NE in linear rounds of interactions.An example was given showing that the game cannot guarantee Pareto optimality.All these game theoretical algorithms are sequential, i.e., players have to make decisions in turn.As far as we know, algorithms for the secure dominating set problem are rare, and existing algorithms are all used for special graphs.Our paper is the first one using game theory to compute a secure dominating set in general graphs.Furthermore, our algorithm allows players to make decisions simultaneously, only using local information.

    Another closely related area of research is game theoretical algorithms for the minimum vertex cover (MinVC) problem[21]–[25].Different from the dominating set problem which uses vertices to monitor vertices, the vertex cover problem uses vertices to monitor edges.Nevertheless, many ideas used in these studies are very inspiring to our work.Yang and Li[21] used snowdrift games to study the MinVC problem, and devised a distributed algorithm, trying to find a vertex cover with a small size.Tanget al.[22] generalized the study to the weighted version, and designed an asymmetric game algorithm, trying to find a vertex cover with small weight.Sunet al.[23], [24] proposed a distributed algorithm for the Min-WVC problem based on relaxed greed and finite memory.They used potential game theory to prove its convergence to an NE.Chenet al.[25] proposed a weighted vertex cover game using a 2-hop adjustment scheme, trying to get a better solution.In all of these works, minimality of NEs were proved, but Pareto optimality was not discussed, which is a preferred quality of solutions from a social point of view.

    In addition to the above works which are most closely related with our work, there are also many game theoretical studies on various coverage problems from different perspectives.For example, Liet al.[26], [27] employed cost sharing methods and mechanisms for a generalized set cover game.The focus was on whether players chose to lie.Fang and Kong[28] studied the core stability of vertex cover games.The core of a game is an important concept in cooperative game theory,which ensures that players have a willingness to participate.The cores of a domination game were studied by Velzen in[29], and the cores of a connected domination game were studied by Kim in [30].Another measure of the quality of a game theoretical solution is the price of anarchy (PoA), which is the ratio between the cost of a worst NE and the cost of a socially optimal solution.Aiet al.[31] studied PoA and computational complexity of a coverage game.Note that their algorithm is centralized.

    In this paper, we study the MinSDS problem in a multiagent system using potential game theory.The main contributions are summarized as follows.

    1)Game Design: We design a security domination game in multi-agent systems, in which every player determines himself to be a dominator or a dominatee.By carefully designing utility functions for the players, we show that every Nash equilibrium (NE) is a minimal secure dominating set (MSDS),as well as a Pareto-optimal solution.Furthermore, we prove that this game is an exact potential game, and thus NE exists.

    2)Algorithm Design: Based on the above security domination game, we propose a best response dynamic distributed local algorithm (BRDDLA) for the secure dominating set(SDS) problem.The algorithm is distributed and local: in each round of the algorithm, every player decides by himself on his strategy based on local information in his 6-hop neighborhood.

    3)Efficiency of Algorithm: We prove that BRDDLA can converge to an NE inO(n) rounds, wherenis the number of players.Hence the algorithm can find a minimal secure dominating set, which is also a Pareto-optimal solution, in linear time.Since the MinSDS problem is NP-hard, so minimal solutions and Pareto-optimal solutions that can be obtained in linear time are fairly good.Furthermore, an NE solution achieves a kind of balance in a multi-agent system, which is also a desirable property.

    4)Verification of Performance via Simulation: Simulations are done to experiment on the performance of our algorithm on randomly generated graphs.Since there is no previous algorithm on MinSDS in general graphs (GA), we compare BRDDLA with a natural greedy algorithm.It turns out that BRDDLA can obtain a much better solution than GA.Furthermore, we compare the algorithm with the exact algorithm on trees.It turns out that the output of BRDDLA is close to optimal solutions.Furthermore, the number of rounds of BRDDLA is less than those of reference algorithms, especially on the random tree graphs.It is also interesting to note that when testing the effect of decision priority on the performance of the algorithm in a Barabasi-Albert (BA) graph, a better performance can be reached if we let players decide in the order that the vertices are generated by the BA model.This might suggest that the earlier a vertex is generated in a BA graph, the more important it might be.

    The remaining parts of the paper are organized as follows.Section II introduces preliminaries in game theory which are used in this paper.Section III designs the security domination game.Section IV provides strict theoretical analysis for the game.Section V describes the algorithm in details and provides theoretical analysis on its convergence.Section VI evaluates the performance and complexity of the algorithm through extensive simulation.Section VII concludes the paper with some discussions on future work.

    II.PRELIMINARIES

    In this section, we give the formal definition of SDS, and some basic terminologies and notations of graph theory and game theory.Main notations are summarized in Table I.

    LetG=(V,E) be a graph with vertex setVand edge setE.We say that two verticesviandvjare adjacent if (vi,vj)∈E,in this case, we also say thatviandvjare neighbors of each

    TABLE I LIST OF NOTATIONS

    III.SECURITY DOMINATION GAME

    Assume that all players are selfish, intelligent and rational,in the sense that they will not consider the benefit of the other players while seeking to maximize their own benefits.The most critical part of the game is to design good utility functions for the players such that a stable and reasonable social status can be reached through cooperation and competition among players.The following are some preferred features of a game.

    1)Self-Stability: Starting from any initial state, the game can end up in an NE which corresponds to a secure dominating set.

    2)Small Size: The cardinality of the SDS corresponding to an NE should be reasonably small.Since the computation of a minimum SDS is NP-hard even using centralized algorithms,we cannot hope for a minimum SDS in reasonable time.An alternative requirement is that the computed SDS should be minimal, that is, removing any vertex will no longer be an SDS.

    3)Time Efficiency: The time for the game to reach an NE should be polynomial in the size of the instance.

    We define utility functions as follows.For a strategy profileC=(c1,c2,...,cn), the utility function ofviis defined as

    wheregi(C) andqi(C) are defined to be

    wheremk,j(C) is an indicator function defined as

    Fig.1.An example illustrating Property 2.

    Fig.2.An example illustrating the ideas behind the definition of utility function ui.Blackened vertices are selected vertices in strategy profile C.

    IV.THEORETICAL ANALYSIS

    In this section, we analyze the theoretical properties of the security domination game designed in the above section.In the following, we shall useCto denote both a strategy profile(c1,...,cn)∈Σ and the vertex set {vi:ci=1} it corresponds to.We assume that a player is willing to change his strategy only when he can bestrictlybetter off.

    A. Nash Equilibrium Solution

    In this subsection, we show that an NE of the game always corresponds to a minimal secure dominating set.The proof makes use of the following property and Lemma 1.

    Property 3:Foranyplayervi∈VandtwoprofilesC?C′,we havemk,j(C)≥mk,j(C′)foranyvj∈Vandvk∈Dj(C).

    B. Potential Game and Existence of NE

    Note that a game in strategic form does not necessarily have a pure Nash equilibrium [32].However, a potential game always has a pure Nash equilibrium [33].In this subsection,we prove the existence of NE for our game by showing that it is a potential game, and show that an NE can be reached in linear rounds of interactions among the players.

    Definition 8(Exact Potential Game): We call a game

    Lemma 2: The proposed security domination game is an exact potential game.

    Proof: We prove that the following function is a potential function:

    Denote the two terms ofπ(C) as π(1)(C) and π(2)(C), respectively.

    LetC=(ci,C-i) andC′=(,C-i) be two strategy profiles beforeandafter somevichangesitsstrategyfromcito.We mayassume, without loss ofgenerality,thatci=0and=1.It can be calculated that

    and

    where the second equality holds because of Property 2 and thus the second and the fourth terms are cancelled.Combining (5) and (6), we have

    Theorem 2: The secure domination game always has an NE.Furthermore, starting from any initial state, the number of iterations needed for the security domination game to reach an NE is at most

    C. Pareto Optimality

    Note that an NE is a stable state from the view of individual players, in which no single player can be strictly benefited by unilateral deviation.While a Pareto optimal solution is a stable state in which a strict benefit for some players will definitely harm the interest of some others, which is from the view of social welfare.This subsection shows that any NE of the game is also Pareto optimal.

    Theorem 3: Every NE of the security domination game is a Pareto-optimal solution.

    D. Relation of the Solutions

    V.ALGORITHM DESIGN AND ANALYSIS

    Fig.3.Relations between solution sets S S DS, S MS DS, S NE and S POS.

    To realize the above SDS game, one may let players make their decisions in order until no player can improve his utility.Theorem 2 guarantees that in this way, the algorithm converges to an NE inO(n) rounds.However, this algorithm is not distributed and is quite time consuming (since every player has to wait for the decisions of the other players).

    The reason why a mess might be created by a simultaneous decision is as follow: A best response of a player is based on the assumption that all the other players keep their strategies;thus, if two correlated players change their strategies simultaneously, then their best responses for the previous strategy profile are no longer best responses for the strategy profile after the simultaneous change.

    An idea to avoid such a mess is to let only a set of independent players make decisions simultaneously.By the definition of utility functionui(C), it is easy to see that playervican make his decision on local information which is at most six hops away fromvi.The following argument shows that a little more storage space may further reduce the dependence on local information to at most three hops.

    The distributed algorithm is described in Algorithm 1.To emphasize the range of information needed for a computation,we use a subscript.For example,BR(vi,CNi3) indicates that only information inNi3is needed forvito compute a best response.The details for the execution of the algorithm are explained as follows.Algorithm 1 is a distributed realization of the SDS game presented in Section II, where parameterthe reason of which will be clear after proving Lemma 4.For current strategy profileC, we denote the marginal utility of playervibymui(C)=ui(BR(vi,CNi3),C-i)-ui(ci,C-i).All players compute their marginal utility simultaneously, but not all of them change their strategy at the same time.A playervidecides to change his strategy only when

    Algorithm 1 Best Response Dynamic Distributed Local Algorithm (BRDDLA)Input: An initial strategy profile C′Output: A minimal SDS C ←C(0)1:C(0)=(c(0)1 ,...,c(0)n )2: for do t=1,2,...,T 3: for every player (this is done simultaneously) do c′i ←BR(vi,CN3i ) S S j vj ∈N3i 4: by accessing for mui ←ui(c′i,C-i)-ui(ci,C-i)5:vi 6: if satisfies (7) then ci ←c′i 7:8: end if 9: end for vi C=C(t-1)10: if then 11: Break and go to line 12: else C(t)←C 13:14: end if 15: end for C′←C 16: Output 16

    That is, the playervihas the priority to change his strategy only when he has the smallest ID among players inwith a strictly positive marginal utility.

    The reason why we use (7) to determine who can change strategy is based on the following property.

    Property 4: Suppose H is the set of players who have changed their strategies simultaneously in one execution of the inner for loop of Algorithm 1; then H is a 3-hop independent set in the SDS game, that is,

    As a consequence, if a strategy profile C changes intoC′,then for any playerviwho has changed his strategy by rule(7), his best response to C is also a best response toC′.

    Intuitively, since decisions are made locally, only allowing players who are somewhat distant to change strategies can effectively decouple mutual influences, and thus leads to a guaranteed convergence rate.We give a strict analysis for this intuition in the following.

    Lemma 3: Suppose C is the current strategy profile.After a round of the inner for loop of Algorithm 1, the new strategy profile is), where H is the set of players who have their strategies changed in this round.Then,

    The following theorem shows the quality of the solution.

    Theorem 4: The outputC′of algorithm BRDDLA is a minimal secure dominating set and a Pareto-optimal solution.

    Fig.4.Comparison between BRDDLA and GA.(a) BA, m 0=5; (b) ER, p=0.2.

    Fig.5.Comparison of BRDDLA and DefendTree on trees.(a) BAT; (b) RT.

    Proof: We claim that whenC=C(t-1),Cmust be an NE.In fact,Cstops being updated only when no player can be strictly better off.Thus, the reason whyC=C(t-1)is becauseC(t-1)consists of best responses for every player, and thus is an NE.Then, the theorem follows from Theorems 1 and 3.■

    VI.SIMULATION RESULTS

    In this section, we experiment on the performance of our algorithm BRDDLA.All experiments are coded in Python and run with an identical configuration: AMD Ryzen 5 3500U with Radeon Vega Mobile Gfx and 16 GB of RAM.

    A. Comparison With a Greedy Algorithm

    Although there are some polynomial-time algorithms for MinSDS on special classes of graphs [4], [8]–[15], we have not found any algorithm on MinSDS designed for a general graph.Hence, we compare our algorithm with a natural greedy algorithm (GA) described in Algorithm 2, whereIS(C)denotes the set of insecure vertices inVwith respect to current solutionC.The algorithm iteratively selects a vertex the addition of which reduces the number of insecure vertices most.By Lemma 1, the whole vertex setVis an SDS, and thus GA terminates in at mostnrounds.

    Algorithm 2 Greedy Algorithm (GA)Input: graph G Output: an SDS C IS(C)≠?1: while do vi ←argmaxvi∈VC{|IS(C)|-|IS(C ∪{vi})|}2:3:4: end while C ←C ∪{vi}

    Graphs for the experiments are generated randomly using the following two models.

    1)The Barabási-Albert Graph(BA)[34]: Starting from a graph with a small numberm0of vertices, new vertices are iteratively added.When a new vertex is added, it is connected tomexisting vertices, wherem≤m0, and the probability that an existing vertex is linked with the new vertex depends on its current degree.

    2)The Erdo¨s-Rényi Graph(ER)[35]: In this graph, every edge is presented with probabilitypindependent of the other edges.

    In Fig.4, the horizontal axis is the number of verticesn.For eachn, 1000 sampled graphs are generated.The vertical axis is the average size of computed solutions.It turns out that BRDDLA is superior to GA, especially in BA, where the average sizes of the solutions computed by BRDDLA are roughly 59% of those computed by GA.For clarity of figures,we only show the case whenm=m0=5 for the BA, andp=0.2 for the ER.In fact, when we tested on otherm,m0andp, all experiments support the same results.

    B. Comparison With an Exact Solution on Trees

    To see the accuracy of our algorithm, we compare BRDDLA with the exact algorithm DefendTree proposed by Burgeret al.[4] for MinSDS on trees.Trees for the experiments are constructed in the following two manners.

    1)Barabási-Albert Tree(BAT): A tree is constructed by the Barabási-Albert model withm0=2 andm=1.

    2)Random Tree(RT): LetVbe a vertex set onnvertices andFbe the edge set consisting all possible edges between vertices ofV.Starting from an empty graph on vertex setV,iteratively add an edgeefromFrandomly and uniformly as long as no cycle is created, until we obtain a spanning tree onV.

    Again, for eachn, 1000 trees of sizenare sampled.Fig.5 shows the average sizes of solutions computed by BRDDLA(red line) and the average sizes of optimal solutions computed by DefendTree (blue line).It can be seen that these two lines are very close.We useto measure relative error of BRDDLA, whereC′is the output of BRDDLA andC?is the optimal solution computed by DefendTree.It can be seen from Table II thatγis around 1% for BAT and 6% for RT.

    TABLE II RELATIVE ERROR OF BRDDLA MEASURED BY γ

    C. Effect of Decision Priority

    Theoretical analysis guarantees that BRDDLA could always find a minimal SDS, but different minimal solutions may have different sizes.According to decision rule 7, a player with a smaller ID has a higher priority to make a change.So, a question is: will different ID of players lead to solutions with much difference?

    Tables III and IV show the values ofωandηin various types of experimental graphs.

    From Table III, it can be seen that for a general graph, there is a big difference between the best solution and worst solution, and the difference is relatively smaller for ER than for BA.This indicates that sizes of different minimal solutions might vary greatly, and the variance is smaller in an evenly distributed graph than in a power-law graph.While for trees,the difference is much smaller, and smaller for BA than for ER.This might be because our algorithm is already fairly accurate for trees, especially for power law graphs.These experiments certify that different IDs of players do make a difference in the quality of the solution obtained by BRDDLA, which also suggests that in order to obtain a better solution, one may repeat the algorithm several times based on different ID arrangements.

    What is most interesting is to observe from Table IV that the improvement brought about by decision priority is significantly smaller for BA than for ER.The reason might be explained as follows.For BA, (1,2,...,n) is the order of vertices added in the construction of the graph.A vertex which is added earlier has a larger chance to be an important individual, and thus letting such the vertex to make a decision earlier may have a better chance to create a good result.While in ER,importance of vertices is distributed evenly, and thus trying different players’ IDs might result in more diversified solutions.In summary, changing players’ ID might improve the performance of the algorithm for evenly distributed random graphs, while for BA, letting players’ IDs be equivalent to construction order might be good enough.

    D. Effect of Initial Solution

    In the above experiments, the initial strategy profile is always taken to beC(0)=(0,...,0).Although Lemma 2 guarantees that BRDDLA could converge to an NE starting from any initial strategy profile, we would like to know the influence of initial strategy profile on the final output.For this purpose, we use a simple method: restart.

    The results are shown in Fig.6.For each type of graphs, 10 sample-graphs are generated.For each graph, 100 initial strategy profiles are taken uniformly and randomly, and the smallest size of these 100 solutions is recorded as the “result of restart”.In Fig.6, the green lines mark the results of restart,and the red lines mark the sizes of those solutions starting from strategy profile (0,...,0).It turns out that the effect of restart is obvious on ER and RT, but not so obvious on BA and BAT.The reason might be similar as before: our algorithm is already good enough for the BA model, which leaves only a little space for improvement.

    E. Convergence Rate

    In this subsection, we test on the number of rounds needed by DefendTree, GA and BRDDLA on BA, ER, BAT and RT.The number of vertices is 1000.The results are shown in Table V.As Lemma 4 shows, BRDDLA converges inO(n)rounds, wherenis the number of vertices.This is a theoretical result.It turns out that in a practical setting, BRDDLA converges in much less rounds thann.Furthermore, BRDDLA converges faster than the reference algorithms, especially on BAT and RT.The reason might be that both BAT and RT are sparse, and thus more players can change their strategies simultaneously.

    VII.CONCLUSION

    In this paper, we use the game theoretic method to solve the MinSDS problem in a multi-agent system.An SDS game was proposed and proven to be an exact potential game, converging to an NE in linear rounds of interactions.Moreover, we proved that every NE of the game is a minimal secure dominating set and a Pareto optimal solution.Then, a distributed algorithm was designed to simulate the game process.In each round of the algorithm, every player only uses local information at most three hops away to make his decision.The performance of our algorithm was tested through experiments on randomly generated graphs using both ER and BA.We compare its performance with a natural greedy heuristic, and it turns out that our algorithm out-performs the greedy strategy by a large amount.Compared with an existing exact algorithm for MinSDS on trees, our algorithm turns out to be fairly accurate.Furthermore, our algorithm is not only better in accuracy, but also faster in convergence.

    There might be a lot of interesting topics to be further explored, such as price of anarchy (PoA) [36], allocation games [37], evolutionary games [38] and networked games[39], [40].

    TABLE III INFLUENCE OF DECISION PRIORITY MEASURED BY ω

    TABLE IV IMPROVEMENT BY DECISION PRIORITY MEASURED BY η

    Fig.6.Effect of Initial Solution by Restart.(a) BA, m 0=m=5, | V|=50 ; (b) ER, p=0.2, | V|=50 ; (c) BAT, | V|=600 ; (d) RT, | V|=600.

    TABLE V NUMBER OF ROUNDS OF THREE ALGORITHMS

    svipshipincom国产片| 高清毛片免费观看视频网站 | 99热国产这里只有精品6| 桃花免费在线播放| a在线观看视频网站| 久久九九热精品免费| 别揉我奶头~嗯~啊~动态视频| 视频区图区小说| 国产精品亚洲av一区麻豆| 免费av中文字幕在线| 亚洲情色 制服丝袜| 两个人看的免费小视频| 国精品久久久久久国模美| 成人永久免费在线观看视频 | 精品福利永久在线观看| 男女边摸边吃奶| 久久久国产成人免费| aaaaa片日本免费| 国产亚洲午夜精品一区二区久久| 国产在线精品亚洲第一网站| 精品卡一卡二卡四卡免费| 老司机亚洲免费影院| 99国产精品一区二区三区| 女人爽到高潮嗷嗷叫在线视频| 老司机亚洲免费影院| 757午夜福利合集在线观看| 下体分泌物呈黄色| 91字幕亚洲| 考比视频在线观看| 老汉色av国产亚洲站长工具| 99国产综合亚洲精品| 视频在线观看一区二区三区| 成人黄色视频免费在线看| 国产成人免费观看mmmm| 日韩中文字幕视频在线看片| 两个人看的免费小视频| 精品福利观看| 亚洲伊人色综图| 一进一出好大好爽视频| 午夜福利,免费看| 久久精品人人爽人人爽视色| 亚洲一码二码三码区别大吗| 这个男人来自地球电影免费观看| 亚洲国产av影院在线观看| 欧美另类亚洲清纯唯美| 窝窝影院91人妻| 欧美精品啪啪一区二区三区| 一二三四在线观看免费中文在| 久久国产精品影院| 黄色 视频免费看| 免费黄频网站在线观看国产| 一进一出好大好爽视频| 99国产综合亚洲精品| 一边摸一边抽搐一进一小说 | 日韩一卡2卡3卡4卡2021年| 亚洲精品国产一区二区精华液| 怎么达到女性高潮| 久久精品国产综合久久久| 国产精品一区二区精品视频观看| 国产精品久久久久久精品电影小说| 12—13女人毛片做爰片一| 免费在线观看影片大全网站| 国产精品久久久久久精品古装| 97在线人人人人妻| 国产免费av片在线观看野外av| 性高湖久久久久久久久免费观看| 久久99一区二区三区| av免费在线观看网站| 欧美精品av麻豆av| 欧美大码av| 国产在视频线精品| 亚洲欧美激情在线| 亚洲全国av大片| av在线播放免费不卡| 一二三四社区在线视频社区8| 国产精品av久久久久免费| 久久精品成人免费网站| 午夜精品久久久久久毛片777| 日本撒尿小便嘘嘘汇集6| 性少妇av在线| 天堂8中文在线网| 久久精品亚洲精品国产色婷小说| 亚洲欧美激情在线| 精品一区二区三卡| 亚洲综合色网址| 777米奇影视久久| 黄色怎么调成土黄色| 欧美国产精品va在线观看不卡| 在线观看免费视频日本深夜| 国产深夜福利视频在线观看| 国产又色又爽无遮挡免费看| 天堂动漫精品| 最近最新中文字幕大全免费视频| 久9热在线精品视频| 老司机福利观看| 黑人欧美特级aaaaaa片| 欧美乱码精品一区二区三区| 精品国产超薄肉色丝袜足j| 麻豆成人av在线观看| 999久久久精品免费观看国产| 少妇精品久久久久久久| 国产免费av片在线观看野外av| 亚洲av日韩在线播放| 亚洲精华国产精华精| 99热国产这里只有精品6| svipshipincom国产片| 精品久久久精品久久久| 国产一区二区三区视频了| 一个人免费看片子| 在线永久观看黄色视频| 大陆偷拍与自拍| 一区二区三区精品91| 欧美黄色淫秽网站| 久久人人爽av亚洲精品天堂| 两性午夜刺激爽爽歪歪视频在线观看 | 国产人伦9x9x在线观看| 精品一区二区三区av网在线观看 | 国产日韩欧美亚洲二区| 久久精品国产亚洲av香蕉五月 | 久久人妻福利社区极品人妻图片| 国产成人影院久久av| 亚洲成a人片在线一区二区| 国产aⅴ精品一区二区三区波| 热re99久久国产66热| 黄色成人免费大全| 国产精品影院久久| kizo精华| 大型av网站在线播放| 热99re8久久精品国产| 久久热在线av| 国产亚洲精品一区二区www | 国产成人精品久久二区二区免费| 久久久久精品国产欧美久久久| 91大片在线观看| 色综合婷婷激情| 国产精品99久久99久久久不卡| 欧美日韩亚洲高清精品| tube8黄色片| 亚洲,欧美精品.| 国产av精品麻豆| 久久性视频一级片| 国产97色在线日韩免费| 高潮久久久久久久久久久不卡| 欧美 亚洲 国产 日韩一| 欧美日韩av久久| 12—13女人毛片做爰片一| 99re在线观看精品视频| 女人久久www免费人成看片| 中亚洲国语对白在线视频| 国产成人一区二区三区免费视频网站| 伦理电影免费视频| 啦啦啦视频在线资源免费观看| 亚洲欧美精品综合一区二区三区| 乱人伦中国视频| 人妻 亚洲 视频| 国产精品av久久久久免费| 在线观看免费午夜福利视频| 国产精品一区二区免费欧美| 成人永久免费在线观看视频 | 久久精品熟女亚洲av麻豆精品| 涩涩av久久男人的天堂| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品一二三| 亚洲久久久国产精品| 亚洲人成77777在线视频| 69av精品久久久久久 | 激情视频va一区二区三区| 午夜视频精品福利| 国产日韩欧美亚洲二区| 一本一本久久a久久精品综合妖精| 午夜福利在线免费观看网站| 1024视频免费在线观看| av片东京热男人的天堂| 久久青草综合色| 一级a爱视频在线免费观看| 精品人妻1区二区| www.999成人在线观看| 男女免费视频国产| 黄色片一级片一级黄色片| 啪啪无遮挡十八禁网站| 中文欧美无线码| 最新在线观看一区二区三区| 中文字幕最新亚洲高清| 国产精品久久久久成人av| 黄色 视频免费看| 久久狼人影院| 亚洲精品国产精品久久久不卡| 日本av免费视频播放| 国产成人免费观看mmmm| av天堂久久9| 香蕉久久夜色| 成人国产一区最新在线观看| 免费少妇av软件| 日韩视频一区二区在线观看| 香蕉国产在线看| 国产单亲对白刺激| 国产亚洲精品一区二区www | 大型黄色视频在线免费观看| 十八禁网站网址无遮挡| 纵有疾风起免费观看全集完整版| 99热国产这里只有精品6| 色尼玛亚洲综合影院| 天天躁日日躁夜夜躁夜夜| 少妇粗大呻吟视频| 欧美变态另类bdsm刘玥| 香蕉丝袜av| 在线观看免费午夜福利视频| 50天的宝宝边吃奶边哭怎么回事| 成年版毛片免费区| 日韩视频在线欧美| 亚洲精品中文字幕一二三四区 | 老熟妇仑乱视频hdxx| 国产不卡av网站在线观看| 日韩欧美免费精品| 99热国产这里只有精品6| 伦理电影免费视频| 成年版毛片免费区| 日韩成人在线观看一区二区三区| 国产在线视频一区二区| 色精品久久人妻99蜜桃| 久久久久视频综合| 久久青草综合色| 亚洲五月色婷婷综合| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品国产精品久久久不卡| 亚洲人成电影观看| 日本vs欧美在线观看视频| 人人妻人人添人人爽欧美一区卜| 色婷婷久久久亚洲欧美| 丝瓜视频免费看黄片| 80岁老熟妇乱子伦牲交| 久久人妻福利社区极品人妻图片| 亚洲一卡2卡3卡4卡5卡精品中文| 国产男女内射视频| 99国产精品99久久久久| 欧美日韩亚洲高清精品| 中文字幕人妻丝袜一区二区| av超薄肉色丝袜交足视频| 桃花免费在线播放| 色视频在线一区二区三区| 在线观看66精品国产| 亚洲第一av免费看| 欧美激情高清一区二区三区| 欧美人与性动交α欧美精品济南到| av一本久久久久| 亚洲av片天天在线观看| 伊人久久大香线蕉亚洲五| av欧美777| 亚洲一区二区三区欧美精品| av又黄又爽大尺度在线免费看| 国产精品久久久久成人av| 欧美+亚洲+日韩+国产| 美女高潮到喷水免费观看| 一区在线观看完整版| 两个人看的免费小视频| 久久久久久免费高清国产稀缺| 一区二区日韩欧美中文字幕| 亚洲av欧美aⅴ国产| 精品欧美一区二区三区在线| 亚洲av片天天在线观看| netflix在线观看网站| 午夜视频精品福利| 亚洲av美国av| 国产黄频视频在线观看| 精品欧美一区二区三区在线| 精品少妇内射三级| 一区二区三区激情视频| 国产淫语在线视频| 丝袜美腿诱惑在线| 精品国产一区二区久久| 人人妻人人添人人爽欧美一区卜| 一级毛片精品| 一边摸一边抽搐一进一出视频| 国产高清视频在线播放一区| 亚洲少妇的诱惑av| 美女高潮到喷水免费观看| 啪啪无遮挡十八禁网站| 国产男女内射视频| 精品一区二区三区av网在线观看 | 一本久久精品| 黑人巨大精品欧美一区二区mp4| 亚洲av成人不卡在线观看播放网| 精品一区二区三卡| 黄色视频,在线免费观看| 久久久久国内视频| 狂野欧美激情性xxxx| 中文字幕av电影在线播放| 岛国在线观看网站| 欧美+亚洲+日韩+国产| 一二三四社区在线视频社区8| 电影成人av| 成人国产av品久久久| 9热在线视频观看99| 亚洲精品在线观看二区| 捣出白浆h1v1| 国产黄色免费在线视频| 精品久久蜜臀av无| 9191精品国产免费久久| 国产深夜福利视频在线观看| 国产欧美日韩精品亚洲av| 又大又爽又粗| 欧美精品av麻豆av| 欧美日韩国产mv在线观看视频| 亚洲午夜精品一区,二区,三区| 欧美精品亚洲一区二区| 丝瓜视频免费看黄片| 久久亚洲精品不卡| 51午夜福利影视在线观看| av福利片在线| www.熟女人妻精品国产| 老司机深夜福利视频在线观看| 下体分泌物呈黄色| 在线观看一区二区三区激情| videosex国产| 国产色视频综合| 国产高清videossex| 久久国产精品影院| 悠悠久久av| 一二三四社区在线视频社区8| 成年人黄色毛片网站| 我的亚洲天堂| 久久久久久免费高清国产稀缺| 亚洲,欧美精品.| 免费人妻精品一区二区三区视频| 在线播放国产精品三级| 精品一区二区三区视频在线观看免费 | 国产亚洲午夜精品一区二区久久| 夜夜骑夜夜射夜夜干| 久久久国产欧美日韩av| 亚洲中文av在线| 两性夫妻黄色片| 国产日韩一区二区三区精品不卡| 99九九在线精品视频| 女人高潮潮喷娇喘18禁视频| 日韩欧美免费精品| 十分钟在线观看高清视频www| 色播在线永久视频| 嫩草影视91久久| 日韩三级视频一区二区三区| 国产黄频视频在线观看| av国产精品久久久久影院| 大型黄色视频在线免费观看| 精品国产一区二区三区久久久樱花| e午夜精品久久久久久久| 色老头精品视频在线观看| 他把我摸到了高潮在线观看 | 欧美亚洲日本最大视频资源| 久久久国产精品麻豆| 色婷婷av一区二区三区视频| 日韩免费高清中文字幕av| 亚洲成人国产一区在线观看| 午夜精品久久久久久毛片777| 国产在视频线精品| av欧美777| 日本av免费视频播放| 99久久99久久久精品蜜桃| av在线播放免费不卡| 99香蕉大伊视频| 欧美日韩国产mv在线观看视频| 午夜福利欧美成人| 亚洲一区二区三区欧美精品| 窝窝影院91人妻| 丝袜喷水一区| 欧美亚洲 丝袜 人妻 在线| 日日摸夜夜添夜夜添小说| 99re在线观看精品视频| 嫁个100分男人电影在线观看| 丝袜美足系列| 在线观看一区二区三区激情| 久久天躁狠狠躁夜夜2o2o| 精品高清国产在线一区| 亚洲国产毛片av蜜桃av| 丝袜人妻中文字幕| 午夜福利视频精品| 久久狼人影院| 最黄视频免费看| 欧美性长视频在线观看| 亚洲av美国av| 两人在一起打扑克的视频| 欧美日韩av久久| 亚洲中文av在线| 欧美成人免费av一区二区三区 | 美女扒开内裤让男人捅视频| 精品少妇一区二区三区视频日本电影| 亚洲第一青青草原| 一级片免费观看大全| 99精品在免费线老司机午夜| 国产亚洲精品第一综合不卡| 久久久久国内视频| 日日爽夜夜爽网站| 日韩 欧美 亚洲 中文字幕| 亚洲精华国产精华精| 中文字幕高清在线视频| 国产xxxxx性猛交| 麻豆国产av国片精品| 亚洲精品久久午夜乱码| 色在线成人网| 国产黄色免费在线视频| 91大片在线观看| 精品人妻1区二区| 男女免费视频国产| 国产片内射在线| 老熟妇仑乱视频hdxx| 亚洲国产精品一区二区三区在线| 91老司机精品| 日韩免费av在线播放| 免费观看av网站的网址| 丰满人妻熟妇乱又伦精品不卡| 久久久久久久国产电影| 欧美在线一区亚洲| 人人澡人人妻人| 欧美av亚洲av综合av国产av| 大香蕉久久成人网| 美女福利国产在线| 国产精品久久久av美女十八| 欧美成狂野欧美在线观看| 亚洲成人手机| 精品亚洲成国产av| 日韩大码丰满熟妇| 99九九在线精品视频| av视频免费观看在线观看| 欧美日韩福利视频一区二区| 精品久久久精品久久久| 午夜福利一区二区在线看| bbb黄色大片| 精品国产国语对白av| 久久久国产欧美日韩av| 在线观看免费日韩欧美大片| 在线观看舔阴道视频| 欧美变态另类bdsm刘玥| 亚洲国产av影院在线观看| 色老头精品视频在线观看| 久久久水蜜桃国产精品网| 两人在一起打扑克的视频| 精品少妇一区二区三区视频日本电影| 黄色视频,在线免费观看| 精品一区二区三区av网在线观看 | 国产男女超爽视频在线观看| 国产精品欧美亚洲77777| 午夜视频精品福利| 欧美日韩视频精品一区| 国产国语露脸激情在线看| 午夜老司机福利片| 婷婷丁香在线五月| 亚洲精品国产一区二区精华液| 窝窝影院91人妻| 岛国在线观看网站| 999久久久国产精品视频| 巨乳人妻的诱惑在线观看| 日韩人妻精品一区2区三区| 99精品在免费线老司机午夜| 9热在线视频观看99| 亚洲av电影在线进入| 国产欧美日韩综合在线一区二区| 五月天丁香电影| 午夜福利免费观看在线| 最新美女视频免费是黄的| 亚洲国产毛片av蜜桃av| 国产极品粉嫩免费观看在线| 国产亚洲av高清不卡| 狠狠狠狠99中文字幕| 午夜日韩欧美国产| 深夜精品福利| 免费av中文字幕在线| 无遮挡黄片免费观看| 视频区图区小说| 国产亚洲av高清不卡| 交换朋友夫妻互换小说| 精品国产乱子伦一区二区三区| tube8黄色片| 99久久精品国产亚洲精品| www.自偷自拍.com| av福利片在线| 亚洲精品国产区一区二| 纵有疾风起免费观看全集完整版| 亚洲午夜理论影院| 久久久久精品人妻al黑| 一级毛片电影观看| 国产男靠女视频免费网站| 最新的欧美精品一区二区| a级毛片黄视频| 黑丝袜美女国产一区| 精品一区二区三区av网在线观看 | 视频区欧美日本亚洲| 久久午夜综合久久蜜桃| 色在线成人网| 国产极品粉嫩免费观看在线| 欧美成人午夜精品| 最近最新中文字幕大全免费视频| 色综合婷婷激情| 一二三四社区在线视频社区8| 大片电影免费在线观看免费| 女人高潮潮喷娇喘18禁视频| 男人操女人黄网站| 一二三四在线观看免费中文在| 国产精品一区二区在线观看99| 亚洲精品国产色婷婷电影| 国产成人系列免费观看| 无人区码免费观看不卡 | 母亲3免费完整高清在线观看| 咕卡用的链子| 日韩熟女老妇一区二区性免费视频| 欧美精品av麻豆av| 精品亚洲成国产av| 国产欧美日韩综合在线一区二区| 一边摸一边做爽爽视频免费| 狠狠婷婷综合久久久久久88av| 黄色毛片三级朝国网站| 一本一本久久a久久精品综合妖精| 亚洲精品国产一区二区精华液| 十八禁高潮呻吟视频| 欧美日韩一级在线毛片| 精品一区二区三区视频在线观看免费 | 90打野战视频偷拍视频| 丰满迷人的少妇在线观看| 国产又色又爽无遮挡免费看| av片东京热男人的天堂| 亚洲精品在线美女| av超薄肉色丝袜交足视频| av不卡在线播放| 亚洲熟妇熟女久久| 两个人看的免费小视频| 人妻 亚洲 视频| 91麻豆av在线| 久久久国产欧美日韩av| 国产成人一区二区三区免费视频网站| 午夜激情av网站| 亚洲精品中文字幕一二三四区 | 黄色视频不卡| 制服人妻中文乱码| 亚洲美女黄片视频| 精品国产乱码久久久久久小说| 精品福利观看| 免费观看av网站的网址| 日日夜夜操网爽| 另类亚洲欧美激情| 大片电影免费在线观看免费| 在线观看人妻少妇| 久久香蕉激情| 亚洲中文字幕日韩| 最近最新免费中文字幕在线| 老司机亚洲免费影院| 欧美激情高清一区二区三区| 欧美日韩国产mv在线观看视频| 91精品三级在线观看| 国产aⅴ精品一区二区三区波| 啦啦啦免费观看视频1| 久久久久国产一级毛片高清牌| 91字幕亚洲| 国产欧美日韩一区二区精品| 侵犯人妻中文字幕一二三四区| 日韩欧美免费精品| 精品久久久精品久久久| 人人妻人人澡人人爽人人夜夜| 窝窝影院91人妻| 老汉色av国产亚洲站长工具| 人人澡人人妻人| 欧美午夜高清在线| 美女扒开内裤让男人捅视频| 巨乳人妻的诱惑在线观看| 久久久久视频综合| 午夜福利视频在线观看免费| 亚洲人成电影免费在线| 国产欧美日韩一区二区三区在线| 久久性视频一级片| 亚洲精品中文字幕在线视频| 在线观看免费午夜福利视频| 悠悠久久av| 后天国语完整版免费观看| 亚洲三区欧美一区| 久久精品91无色码中文字幕| av免费在线观看网站| 男女边摸边吃奶| 精品少妇一区二区三区视频日本电影| 免费观看人在逋| 我要看黄色一级片免费的| 黑丝袜美女国产一区| 精品少妇内射三级| videosex国产| 久久国产亚洲av麻豆专区| 成在线人永久免费视频| 黄色a级毛片大全视频| 国产欧美日韩精品亚洲av| 精品一区二区三区av网在线观看 | 国产成人精品久久二区二区91| 热99国产精品久久久久久7| 国产日韩欧美亚洲二区| 国产成人av教育| 国产在线一区二区三区精| 亚洲成a人片在线一区二区| 无遮挡黄片免费观看| 夜夜夜夜夜久久久久| 国产一区有黄有色的免费视频| 大码成人一级视频| 亚洲国产毛片av蜜桃av| 成年女人毛片免费观看观看9 | 亚洲av成人一区二区三| 久久国产精品大桥未久av| 一本久久精品| 51午夜福利影视在线观看| 久久精品亚洲熟妇少妇任你| 肉色欧美久久久久久久蜜桃| 热99国产精品久久久久久7| 老鸭窝网址在线观看| 黄色成人免费大全| 亚洲人成电影观看| 婷婷成人精品国产| 黄色片一级片一级黄色片| 伊人久久大香线蕉亚洲五| 亚洲人成伊人成综合网2020| 久久精品国产a三级三级三级| 免费不卡黄色视频| 丝袜喷水一区| 高清av免费在线| 国产精品国产av在线观看|