2018
DOI: 10.1051/matecconf/201815501006
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of the Brain Computing Interface (BCI) and Proposed Electroencephalography (EEG) Signals Based Authentication Model

Abstract: toggleTechs (a creativity platform), Islamabad, PakistanAbstract. With current advancements in the field of Brain Computer interface it is required to study how it will affect the other technologies currently in use. In this paper, the authors motivate the need of Brain Computing Interface in the era of IoT (Internet of Things), and analyze how BCI in the presence of IoT could have serious privacy breach if not protected by new kind of more secure protocols. Security breach and hacking has been around for a lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…One of the main concerns about these vulnerabilities is the absence of connections between verification strategies and the identity of the person (Karthikeyan and Sabarigiri, 2011). Thus, unlike cryptographic based authentication methods, cognitive biometrics can remedy these obstacles as they can uniquely identify a person based upon independent physical or behavioral characteristics (Svogor and Kisasondi, 2012;Ramzan and Shidlovskiy, 2018). Another motivation behind the exploration of bio-signals is that they cannot be casually acquired by external agents and they are present in every living being, which gives them advantages over other biometric-based authentication methods such as iris, fingerprints, face, palm, voice, and gait recognition (Revett et al, 2010).…”
Section: Security and Authenticationmentioning
confidence: 99%
“…One of the main concerns about these vulnerabilities is the absence of connections between verification strategies and the identity of the person (Karthikeyan and Sabarigiri, 2011). Thus, unlike cryptographic based authentication methods, cognitive biometrics can remedy these obstacles as they can uniquely identify a person based upon independent physical or behavioral characteristics (Svogor and Kisasondi, 2012;Ramzan and Shidlovskiy, 2018). Another motivation behind the exploration of bio-signals is that they cannot be casually acquired by external agents and they are present in every living being, which gives them advantages over other biometric-based authentication methods such as iris, fingerprints, face, palm, voice, and gait recognition (Revett et al, 2010).…”
Section: Security and Authenticationmentioning
confidence: 99%
“…7. Ramzan and Shidlovskiy (2018) call for new security protocols to protect against privacy breaches in cases where BCIs are used with devices in the Internet of Things.…”
Section: Existing Work: Technical Contributionsmentioning
confidence: 99%