Login
HomePublicationsJournal Paper

A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency
Ref: CISTER-TR-250603       Publication Date: 2025

A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency

Ref: CISTER-TR-250603       Publication Date: 2025

Abstract:
Inherent broadcast characteristics of wireless communication can raise privacy problems for a wireless network. The specifics of antenna ports, antenna types, orientation, and beamforming configurations of a transmitter can be susceptible to manipulation by any device within range when the signal is transmitted wirelessly. Personal and location information of users connected to the transmitter can be intercepted and exploited by malicious actors to track user movements and profile behaviors or launch targeted attacks, thus compromising user privacy and security. These problems necessitate protecting wireless communications from unauthorized access and ensuring user privacy. In this paper, we propose a novel precoding perturbation approach for privacy preservation in wireless communications. Our proposed method perturbs the precoding matrix of the transmitter using a Riemannian manifold (RM) structure that adaptively adjusts the magnitude and direction of perturbation based on the geometric properties of the data space. This approach ensures robust privacy protection while minimizing the distortion of the transmitted signals, thus striking a balance between privacy preservation and data utility. By perturbing the precoding matrix at the transmitted signal, privacy can be preserved without relying on additional cryptographic mechanisms resulting in the computational and communication overhead reduction. The proposed approach operates directly on the transmission of signals, making them inherently secure against eavesdropping and interception. Simulation results underscore the superiority of the proposed approach, showing a 17.21% improvement in privacy preservation while effectively maintaining data utility.

Authors:
Azadeh Pourkabirian
,
Wei Ni
,
Xiaolin Zhou
,
Kai Li
,
Mohammad Hossein Anisi


Published in IEEE Transactions on Information Forensics and Security (TIFS), IEEE.



Record Date: 18, Jun, 2025