2022
DOI: 10.48550/arxiv.2201.07711
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Enhancing the Security & Privacy of Wearable Brain-Computer Interfaces

Abstract: Brain computing interfaces (BCI) are used in a plethora of safety/privacy-critical applications, ranging from healthcare to smart communication and control. Wearable BCI setups typically involve a head-mounted sensor connected to a mobile device, combined with MLbased data processing. Consequently, they are susceptible to a multiplicity of attacks across the hardware, software, and networking stacks used that can leak users' brainwave data or at worst relinquish control of BCI-assisted devices to remote attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 41 publications
(49 reference statements)
0
2
0
Order By: Relevance
“…Also, FDA approval does not remove the threat to the user's physical health if the device is maliciously programmed, e.g. neural attacks (Bernal et al 2023), and with MitM it is possible to capture data between devices (Tarkhani et al 2022). Big Tech's push for more power creates privacy and security challenges.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, FDA approval does not remove the threat to the user's physical health if the device is maliciously programmed, e.g. neural attacks (Bernal et al 2023), and with MitM it is possible to capture data between devices (Tarkhani et al 2022). Big Tech's push for more power creates privacy and security challenges.…”
Section: Discussionmentioning
confidence: 99%
“…Attacks could include unauthorized access or traffic sniffing in the BCI network. Tarkhani et al (2022) were able to successfully capture data using Man-inthe-Middle (MitM) where the Bluetooth device was acting as a headset. The problem was that authentication was insufficient between the devices.…”
Section: Bci Security and Privacymentioning
confidence: 99%