A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency
Ref: CISTER-TR-250603 Publication Date: 2025
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency
Ref: CISTER-TR-250603 Publication Date: 2025Abstract:
Inherent broadcast characteristics of wireless communication can raise privacy problems for a wireless network. The specifics of antenna ports, antenna types, orientation, and beamforming configurations of a transmitter can be susceptible to manipulation by any device within range when the signal is transmitted wirelessly. Personal and location information of users connected to the transmitter can be intercepted and exploited by malicious actors to track user movements and profile behaviors or launch targeted attacks, thus compromising user privacy and security. These problems necessitate protecting wireless communications from unauthorized access and ensuring user privacy. In this paper, we propose a novel precoding perturbation approach for privacy preservation in wireless communications. Our proposed method perturbs the precoding matrix of the transmitter using a Riemannian manifold (RM) structure that adaptively adjusts the magnitude and direction of perturbation based on the geometric properties of the data space. This approach ensures robust privacy protection while minimizing the distortion of the transmitted signals, thus striking a balance between privacy preservation and data utility. By perturbing the precoding matrix at the transmitted signal, privacy can be preserved without relying on additional cryptographic mechanisms resulting in the computational and communication overhead reduction. The proposed approach operates directly on the transmission of signals, making them inherently secure against eavesdropping and interception. Simulation results underscore the superiority of the proposed approach, showing a 17.21% improvement in privacy preservation while effectively maintaining data utility.
Document:
Published in IEEE Transactions on Information Forensics and Security (TIFS), IEEE.
Record Date: 18, Jun, 2025









Azadeh Pourkabirian
Wei Ni
Xiaolin Zhou
Kai Li
View
Download