Cargando…

A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks

In a progressively interconnected world where the Internet of Things (IoT), ubiquitous computing, and artificial intelligence are leading to groundbreaking technology, cybersecurity remains an underdeveloped aspect. This is particularly alarming for brain-to-computer interfaces (BCIs), where hackers...

Descripción completa

Detalles Bibliográficos
Autores principales: Mezzina, Giovanni, Annese, Valerio F., De Venuto, Daniela
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8709057/
https://www.ncbi.nlm.nih.gov/pubmed/34960373
http://dx.doi.org/10.3390/s21248280
_version_ 1784622840395333632
author Mezzina, Giovanni
Annese, Valerio F.
De Venuto, Daniela
author_facet Mezzina, Giovanni
Annese, Valerio F.
De Venuto, Daniela
author_sort Mezzina, Giovanni
collection PubMed
description In a progressively interconnected world where the Internet of Things (IoT), ubiquitous computing, and artificial intelligence are leading to groundbreaking technology, cybersecurity remains an underdeveloped aspect. This is particularly alarming for brain-to-computer interfaces (BCIs), where hackers can threaten the user’s physical and psychological safety. In fact, standard algorithms currently employed in BCI systems are inadequate to deal with cyberattacks. In this paper, we propose a solution to improve the cybersecurity of BCI systems. As a case study, we focus on P300-based BCI systems using support vector machine (SVM) algorithms and EEG data. First, we verified that SVM algorithms are incapable of identifying hacking by simulating a set of cyberattacks using fake P300 signals and noise-based attacks. This was achieved by comparing the performance of several models when validated using real and hacked P300 datasets. Then, we implemented our solution to improve the cybersecurity of the system. The proposed solution is based on an EEG channel mixing approach to identify anomalies in the transmission channel due to hacking. Our study demonstrates that the proposed architecture can successfully identify 99.996% of simulated cyberattacks, implementing a dedicated counteraction that preserves most of BCI functions.
format Online
Article
Text
id pubmed-8709057
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87090572021-12-25 A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks Mezzina, Giovanni Annese, Valerio F. De Venuto, Daniela Sensors (Basel) Article In a progressively interconnected world where the Internet of Things (IoT), ubiquitous computing, and artificial intelligence are leading to groundbreaking technology, cybersecurity remains an underdeveloped aspect. This is particularly alarming for brain-to-computer interfaces (BCIs), where hackers can threaten the user’s physical and psychological safety. In fact, standard algorithms currently employed in BCI systems are inadequate to deal with cyberattacks. In this paper, we propose a solution to improve the cybersecurity of BCI systems. As a case study, we focus on P300-based BCI systems using support vector machine (SVM) algorithms and EEG data. First, we verified that SVM algorithms are incapable of identifying hacking by simulating a set of cyberattacks using fake P300 signals and noise-based attacks. This was achieved by comparing the performance of several models when validated using real and hacked P300 datasets. Then, we implemented our solution to improve the cybersecurity of the system. The proposed solution is based on an EEG channel mixing approach to identify anomalies in the transmission channel due to hacking. Our study demonstrates that the proposed architecture can successfully identify 99.996% of simulated cyberattacks, implementing a dedicated counteraction that preserves most of BCI functions. MDPI 2021-12-10 /pmc/articles/PMC8709057/ /pubmed/34960373 http://dx.doi.org/10.3390/s21248280 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mezzina, Giovanni
Annese, Valerio F.
De Venuto, Daniela
A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title_full A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title_fullStr A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title_full_unstemmed A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title_short A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks
title_sort cybersecure p300-based brain-to-computer interface against noise-based and fake p300 cyberattacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8709057/
https://www.ncbi.nlm.nih.gov/pubmed/34960373
http://dx.doi.org/10.3390/s21248280
work_keys_str_mv AT mezzinagiovanni acybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks
AT annesevaleriof acybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks
AT devenutodaniela acybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks
AT mezzinagiovanni cybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks
AT annesevaleriof cybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks
AT devenutodaniela cybersecurep300basedbraintocomputerinterfaceagainstnoisebasedandfakep300cyberattacks