ArXiv TLDR

Can Cross-Layer Design Bridge Security and Efficiency? A Robust Authentication Framework for Healthcare Information Exchange Systems

🐦 Tweet
2604.26339

Khalid M. Ezzat, Muhammad El-Saba, Mahmoud A. Shawky

cs.CReess.SP

TLDR

A novel cross-layer authentication framework for healthcare systems combines cryptography with physical-layer ML for robust, efficient, and continuous security.

Key contributions

  • Integrates PKI/ECC with physical (PHY) layer features (CFO, quadrature skewness) for robust authentication.
  • Utilizes a trained ML model for lightweight, real-time re-authentication based on unique PHY-layer device features.
  • Reduces computational and communication overhead by avoiding cryptographic signature validation for every message.
  • Enhances privacy with encrypted, frequently refreshed pseudo-identities, ensuring unlinkability and resistance to tracking.

Why it matters

Healthcare information exchange systems critically need secure and efficient authentication. This framework offers a robust solution by integrating cryptographic and physical-layer methods, significantly reducing overhead. It ensures continuous, lightweight security and enhanced privacy, vital for safeguarding sensitive patient data.

Original Abstract

As healthcare systems become increasingly interconnected, ensuring secure and continuous device authentication in health information exchange (HIE) networks is critical to safeguarding patient data and clinical operations. In this context, this paper proposes a novel cross-layer authentication scheme for HIE networks that integrates cryptographic mechanisms with physical (PHY) layer-based authentication to ensure reliable communication while minimizing computational and communication overheads. The initial authentication phase leverages a traditional public key infrastructure (PKI)-based approach, employing elliptic curve cryptography (ECC) and digital certificates to verify the legitimacy of communicating devices. Simultaneously, it extracts unique hardware-level features such as carrier frequency offset (CFO) and quadrature skewness from the devices. These features are then used to train a machine learning (ML) model during an offline phase managed by a regional centralized authority (RCA). For re-authentication, the system re-extracts these PHY-layer features from incoming orthogonal frequency division multiplexing (OFDM) symbols and verifies the device identity in real-time using the trained ML classifier. This cross-layer strategy enables continuous, lightweight identity verification without the need to exchange and validate cryptographic signatures for each message, thereby reducing system overhead. The proposed scheme further enhances privacy through the use of encrypted, frequently refreshed pseudo-identities, ensuring unlinkability and resistance to identity tracking. A formal security analysis using Burrows-Abadi-Needham (BAN) logic demonstrates the scheme's robustness against various threats, including impersonation, man-in-the-middle (MitM), replay, and Sybil attacks.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.