skip to main content
10.1145/2638728.2641710acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

My thoughts are not your thoughts

Published: 13 September 2014 Publication History

Abstract

Authenticating users of computer systems based on their brainwave signals is now a realistic possibility, made possible by the increasing availability of EEG (electroencephalography) sensors in wireless headsets and wearable devices. This possibility is especially interesting because brainwave-based authentication naturally meets the criteria for two-factor authentication. To pass an authentication test using brainwave signals, a user must have both an inherence factor (his or her brain) and a knowledge factor (a chosen passthought). In this study, we investigate the extent to which both factors are truly necessary. In particular, we address the question of whether an attacker may gain advantage from information about a given target's secret thoughts.

References

[1]
Bionym Nymi. http://www.bionym.com/.
[2]
Ashby, C., Bhatia, A., Tenore, F., and Vogelstein, J. Low-cost electroencephalogram (eeg) based authentication. In Proceedings of 5th International IEEE EMBS Conference on Neural Engineering (April 2011).
[3]
Chuang, J., Nguyen, H., Wang, C., and Johnson, B. I think, therefore i am: Usability and security of authentication using brainwaves. In Proceedings of 2013 Workshop on Usable Security (2013).
[4]
Devices, P. N. Press release: Pnd wearable environment. http://personalneuro.com/, 2014. {Online; accessed 30-May-2014}.
[5]
Killourhy, K. S., and Maxion, R. A. Comparing anomaly detectors for keystroke dynamics. In Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009), IEEE Computer Society Press (June 2009), 125--134.
[6]
Marcel, S., and del R. Millan, J. Person authentication using brainwaves (eeg) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 4 (April 2007).
[7]
Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., and Song, D. On the feasibility of side-channel attacks with brain-computer interfaces. In Proceedings of 21st Usenix Security Symposium (Usenix Security) (2012).
[8]
Monrose, F., and Rubin, A. Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security, ACM (1997), 48--56.
[9]
Palaniappan, R. Electroencephalogram signals from imagined activities: A novel biometric identifier for a small population. In IDEAL 2006, LNCS 4224 (2006), 604--611.
[10]
Palaniappan, R. Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems 18, 1 (2008), 59--66.
[11]
Poulos, M., Rangoussi, M., Alexandris, N., and Evangelou, A. Person identification from the eeg using nonlinear signal classification. Methods of Information in Medicine (2002).
[12]
Thorpe, J., van Oorschot, P., and Somayaji, A. Pass-thoughts: Authenticating with our minds. In Proceedings of the New Security Paradigms Workshop (NSPW) (2005).

Cited By

View all
  • (2023)Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer DevicesACM Transactions on Privacy and Security10.1145/357935626:3(1-36)Online publication date: 13-Mar-2023
  • (2023)A Review of EEG-Based User Authentication: Trends and Future Research DirectionsIEEE Access10.1109/ACCESS.2023.325302611(22917-22934)Online publication date: 2023
  • (2022)Hand Gesture Signatures Acquisition and Processing by Means of a Novel Ultrasound SystemBioengineering10.3390/bioengineering1001003610:1(36)Online publication date: 28-Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
September 2014
1409 pages
ISBN:9781450330473
DOI:10.1145/2638728
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 September 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. EEG
  2. brainwave signals
  3. impersonation
  4. mobile security
  5. passthoughts
  6. wearable authentication

Qualifiers

  • Research-article

Funding Sources

Conference

UbiComp '14
UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing
September 13 - 17, 2014
Washington, Seattle

Acceptance Rates

Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)6
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer DevicesACM Transactions on Privacy and Security10.1145/357935626:3(1-36)Online publication date: 13-Mar-2023
  • (2023)A Review of EEG-Based User Authentication: Trends and Future Research DirectionsIEEE Access10.1109/ACCESS.2023.325302611(22917-22934)Online publication date: 2023
  • (2022)Hand Gesture Signatures Acquisition and Processing by Means of a Novel Ultrasound SystemBioengineering10.3390/bioengineering1001003610:1(36)Online publication date: 28-Dec-2022
  • (2022)SoKProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528541(175-187)Online publication date: 16-May-2022
  • (2022)Person Identification and Authentication via Ultrasound Hand-gesture-signature Analysis2022 IEEE International Conference on E-health Networking, Application & Services (HealthCom)10.1109/HealthCom54947.2022.9982742(229-233)Online publication date: 17-Oct-2022
  • (2021)Authentication System by Human Brainwaves Using Machine Learning and Artificial IntelligenceAdvances in Computer Science for Engineering and Education IV10.1007/978-3-030-80472-5_31(374-388)Online publication date: 21-Jul-2021
  • (2019)A Survey on Brain BiometricsACM Computing Surveys10.1145/323063251:6(1-38)Online publication date: 27-Feb-2019
  • (2019)A Shoulder-Surfing Resistant Image-Based Authentication Scheme with a Brain-Computer Interface2019 International Conference on Cyberworlds (CW)10.1109/CW.2019.00061(336-343)Online publication date: Oct-2019
  • (2018)Combining Cryptography with EEG BiometricsComputational Intelligence and Neuroscience10.1155/2018/18675482018Online publication date: 1-Jan-2018
  • (2018)IACProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274713(641-652)Online publication date: 3-Dec-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media