research-article
Open Access

Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity

Published:23 March 2023Publication History
Skip Abstract Section

Abstract

Defining and analyzing the impact of cyberattacks on novel generations of BCIs.

References

  1. Bonaci, T. et al. App stores for the brain: Privacy and security in brain-computer interfaces. IEEE Tech. and Society Mag. 34, 2 (June 2015), 32--39.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bysani, L.K. and Turuk, A.K. A survey on selective forwarding attack in wireless sensor networks. In 2011 Intern. Conf. on Devices and Communications, 1--5.Google ScholarGoogle Scholar
  3. Camara, C., Peris-Lopez, P., and Tapiador, J.E. Security and privacy issues in implantable medical devices: A comprehensive survey. J. of Biomedical Informatics 55 (2015), 272--289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Denning, T., Matsuoka, Y., and Kohno, T. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus FOC 27, 1 (2009), E7.Google ScholarGoogle ScholarCross RefCross Ref
  5. Douceur, J.R. The Sybil attack. In Proceedings of the 1st Intern. Workshop on Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg (January 2022), 251--260.Google ScholarGoogle Scholar
  6. Edwards, C.A. et al. Neurostimulation devices for the treatment of neurologic disorders. Mayo Clinic Proceedings 92, 9 (September 2017), 1427--1444.Google ScholarGoogle ScholarCross RefCross Ref
  7. Gal, E. et al. Rich cell-type-specific network topology in neocortical microcircuitry. Nature Neuroscience 20, 7 (July 2017), 1004--1013.Google ScholarGoogle ScholarCross RefCross Ref
  8. Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symp. on Security and Privacy, 129--142.Google ScholarGoogle Scholar
  9. Hartmann, C.J. et al. An update on best practice of deep brain stimulation in Parkinson's disease. Therapeutic Advances in Neurological Disorders 12 (January 2019),Google ScholarGoogle Scholar
  10. Izhikevich, E.M. Simple model of spiking neurons. IEEE Transactions on Neural Networks 14, 6 (2003), 1569--1572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kalfas, I., Kumar, S., and Vogels, R. Shape selectivity of middle superior temporal sulcus body patch neurons. eNeuro 4, 3 (2017).Google ScholarGoogle Scholar
  12. Kandel, E. Principles of Neural Science. McGraw-Hill, New York (2013).Google ScholarGoogle Scholar
  13. Kriegeskorte, N. Deep neural networks: A new framework for modeling biological vision and brain information processing. Annual Rev. of Vision Science 1, 1 (2015), 417--446.Google ScholarGoogle ScholarCross RefCross Ref
  14. Kuzovkin, I. et al. Activations of deep convolutional neural networks are aligned with gamma band activity of human visual cortex. Communications Biology 1, 1 (August 2018), 107.Google ScholarGoogle ScholarCross RefCross Ref
  15. Lindsay, G.W. Convolutional neural networks as a model of the visual system: Past, present, and future. J. of Cognitive Neuroscience 33, 10 (2021), 2017--2031.Google ScholarGoogle ScholarCross RefCross Ref
  16. López Bernal, S. et al. Security in brain-computer interfaces: State-of-the-art, opportunities, and future challenges. ACM Computing Surveys 54, 1, Article 11 (January 2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. López Bernal, S. et al. Cyberattacks on miniature brain implants to disrupt spontaneous neural signaling. IEEE Access 8 (2020), 152204--152222.Google ScholarGoogle ScholarCross RefCross Ref
  18. López Bernal, S., Huertas Celdrán, A., and Martínez Pérez, G. Neuronal jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities. Computers & Security 112 (2022), 102534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Martinovic, I. et al. On the feasibility of side-channel attacks with brain-computer interfaces. In Proceedings of the 21st USENIX Conf. on Security Symposium (2012), 34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Musk, E. An integrated brain-machine interface platform with thousands of channels. J. of Medical Internet Research 21, 10 (October 2019), e16194.Google ScholarGoogle ScholarCross RefCross Ref
  21. Rehman, A., Rehman, S.U., and Raheem, H. Sinkhole attacks in wireless sensor networks: A survey. Wireless Personal Communications 106, 4 (June 1, 2019), 2291--2313.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Stallings, W. Cryptography and Network Security: Principles and Practice (7th ed.). Pearson, London (2017).Google ScholarGoogle Scholar
  23. Stimberg, M., Brette, R., and Goodman, D.F.M. Brian 2, an intuitive and efficient neural simulator. eLife 8 (August 2019), e47314.Google ScholarGoogle Scholar
  24. Takabi, H., Bhalotiya, A., and Alohaly, M. Brain computer interface (BCI) applications: Privacy threats and countermeasures. In IEEE 2nd Intern. Conf. on Collaboration and Internet Computing. (2016), 102--111.Google ScholarGoogle ScholarCross RefCross Ref
  25. Vadlamani, S. et al. Jamming attacks on wireless networks: A taxonomic survey. Intern. J. of Production Economics 172 (2016), 76--94.Google ScholarGoogle ScholarCross RefCross Ref
  26. Wirdatmadja, S.A. et al. Wireless optogenetic nanonetworks for brain stimulation: Device model and charging protocols. IEEE Transactions on NanoBioscience 16, 8 (2017), 859--872.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 66, Issue 4
                April 2023
                94 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/3589208
                • Editor:
                • James Larus
                Issue’s Table of Contents

                Copyright © 2023 ACM

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 23 March 2023

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
              • Article Metrics

                • Downloads (Last 12 months)2,119
                • Downloads (Last 6 weeks)2,119

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format
              About Cookies On This Site

              We use cookies to ensure that we give you the best experience on our website.

              Learn more

              Got it!