2021
DOI: 10.1016/j.imu.2020.100489
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in Brain-Computer Interfaces: RFID-based design-theoretical framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…The objective of the paper in [115] is to ensure security in a network supporting BCI applications to identify brain activities in a real-time mode. To achieve such goal, the authors of this paper proposed a Radio Frequency Identification (RFID)-based system made of semi-active RFID tags placed on the patient's scalp.…”
Section: Data Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The objective of the paper in [115] is to ensure security in a network supporting BCI applications to identify brain activities in a real-time mode. To achieve such goal, the authors of this paper proposed a Radio Frequency Identification (RFID)-based system made of semi-active RFID tags placed on the patient's scalp.…”
Section: Data Securitymentioning
confidence: 99%
“…Brain-computer interfacing is a real-time communication system that connects the brain and external devices. A BCI system can directly convert the information sent by the brain into commands that can drive external devices and can replace human limbs or phonation organs to achieve communication with the outside world and to control the external environment [115]. In other words, a BCI system can replace the normal peripheral nerve and muscle tissue to achieve communication between a human and a computer or between a human and the external environment [115].…”
Section: Progress On Applications Of Brain-computer Interfaces To Conmentioning
confidence: 99%
“…Several solutions, summarized in Table 1, have been proposed to improve the security of a neural interface [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30]. The proposed methods typically use one or more solutions to supervise the BCI session [17,18], authenticate the user [19][20][21][22][23], encrypt the data [24][25][26][27], and ultimately detect cyberattacks [28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…Authentication-based solutions establish a cybersecure communication channel between the user/sensors and the BCI framework. Authentication can involve the use of additional hardware, including user-specific radio frequency identification (RFID) technology [24], near-field or directional communication [28], and cameras for facial recognition [27]. Brainprint biometric authentication systems with no additional hardware using user-specific signatures in the EEG data have also been developed [20,21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation