A novel spoofing attack against electroencephalogram-based security systems

Koosha Sadeghi, Javad Sohankar, Ayan Banerjee, Sandeep Gupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Security systems using brain signals or Electroencephalogram (EEG), attempt to exploit chaotic nature of brain signals and their individuality to derive security primitives that are hard to reproduce. In this sense, the signal features are extracted to train a Machine Learning (ML) algorithm for classification. However, although brain signals are chaotic, feature extraction process might reduce the chaos rendering features in a way that they can be generated. Besides, even if features are chaotic, ML techniques might classify them in such a manner that an element in a particular class becomes easy to generate. In this paper, we perform entropy analysis on common features used in EEG-based security systems to estimate their information content, which is used to propose a novel technique for EEG signal generation in feature domain instead of time domain. These generated signals can potentially be used for spoofing attacks. We consider five types of feature extraction techniques and six classifiers found in recently proposed security systems, and analyze their vulnerability to spoofing attacks using generated EEG signals. The results show that the generation scheme can synthesize artificial signals to get classified as genuine brain signals by ML algorithms.

Original languageEnglish (US)
Title of host publication2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538604342
DOIs
StatePublished - Jun 26 2018
Event2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - San Francisco, United States
Duration: Apr 4 2017Apr 8 2017

Publication series

Name2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings

Other

Other2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017
Country/TerritoryUnited States
CitySan Francisco
Period4/4/174/8/17

Keywords

  • electroencephalogram
  • entropy
  • spoofing attack

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management
  • Energy Engineering and Power Technology
  • Safety, Risk, Reliability and Quality
  • Urban Studies

Fingerprint

Dive into the research topics of 'A novel spoofing attack against electroencephalogram-based security systems'. Together they form a unique fingerprint.

Cite this