Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
This work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2025-01-01
|
Series: | International Journal of Telemedicine and Applications |
Online Access: | http://dx.doi.org/10.1155/ijta/3946740 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823859650071625728 |
---|---|
author | Zaib Unnisa Asadullah Tariq Irfan Ud Din Danish Shehzad Mohamed Adel Serhani Abdelkader N. Belkacem Nadeem Sarwar |
author_facet | Zaib Unnisa Asadullah Tariq Irfan Ud Din Danish Shehzad Mohamed Adel Serhani Abdelkader N. Belkacem Nadeem Sarwar |
author_sort | Zaib Unnisa |
collection | DOAJ |
description | This work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve as a biometric modality for authentication and verification. Additional biometric modalities, such as fingerprints or irises, are vulnerable to both fabrication and degradation over time, and illicit use of dead people’s biometrics has sometimes been seen. EEG’s intrinsic properties prohibit signal imitation or postmortem acquisition, making it more reliable than other biometric modalities. This research is aimed at investigating the most recent advancements in the domain of EEG signals, clarifying the current knowledge that impacts EEG-based authentication, and evaluating the emerging challenges. Many research publications have been collected to achieve this objective. By considering historical and recent efforts and achievements, this research also presents feasible resolutions to the emerging inquiries prompted by the ongoing advancements in EEG-based technology. The potential future application of EEG-based authentication has also been the subject of this scholarly discourse. A comprehensive collection of articles over the previous decade has been compiled to answer contemporary EEG signal research questions to get valuable insights. According to research findings, in February 2022, a significant milestone was achieved when the EEG signals of a deceased person were successfully captured for the first time in recorded history. However, this groundbreaking discovery may threaten EEG-based authentication. In addition, it is found that EEG-based authentication literature did not completely implement “liveness detection.” An updated approach for identifying liveness addresses novel challenges, that is, falsified EEG signals and a dead person’s EEG signals for EEG-based authentication that have not been discussed in the literature. The suggested solutions put forward in this study have the potential to stimulate additional research in this area. |
format | Article |
id | doaj-art-e2692e4af9d2490caee85c717483f220 |
institution | Kabale University |
issn | 1687-6423 |
language | English |
publishDate | 2025-01-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Telemedicine and Applications |
spelling | doaj-art-e2692e4af9d2490caee85c717483f2202025-02-11T00:00:01ZengWileyInternational Journal of Telemedicine and Applications1687-64232025-01-01202510.1155/ijta/3946740Threats and Mitigation Strategies for Electroencephalography-Based Person AuthenticationZaib Unnisa0Asadullah Tariq1Irfan Ud Din2Danish Shehzad3Mohamed Adel Serhani4Abdelkader N. Belkacem5Nadeem Sarwar6Department of Computer ScienceCollege of Information TechnologyDepartment of Computer ScienceDepartment of Computer ScienceCollege of Computing and InformaticsCollege of Information TechnologyDepartment of Computer ScienceThis work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve as a biometric modality for authentication and verification. Additional biometric modalities, such as fingerprints or irises, are vulnerable to both fabrication and degradation over time, and illicit use of dead people’s biometrics has sometimes been seen. EEG’s intrinsic properties prohibit signal imitation or postmortem acquisition, making it more reliable than other biometric modalities. This research is aimed at investigating the most recent advancements in the domain of EEG signals, clarifying the current knowledge that impacts EEG-based authentication, and evaluating the emerging challenges. Many research publications have been collected to achieve this objective. By considering historical and recent efforts and achievements, this research also presents feasible resolutions to the emerging inquiries prompted by the ongoing advancements in EEG-based technology. The potential future application of EEG-based authentication has also been the subject of this scholarly discourse. A comprehensive collection of articles over the previous decade has been compiled to answer contemporary EEG signal research questions to get valuable insights. According to research findings, in February 2022, a significant milestone was achieved when the EEG signals of a deceased person were successfully captured for the first time in recorded history. However, this groundbreaking discovery may threaten EEG-based authentication. In addition, it is found that EEG-based authentication literature did not completely implement “liveness detection.” An updated approach for identifying liveness addresses novel challenges, that is, falsified EEG signals and a dead person’s EEG signals for EEG-based authentication that have not been discussed in the literature. The suggested solutions put forward in this study have the potential to stimulate additional research in this area.http://dx.doi.org/10.1155/ijta/3946740 |
spellingShingle | Zaib Unnisa Asadullah Tariq Irfan Ud Din Danish Shehzad Mohamed Adel Serhani Abdelkader N. Belkacem Nadeem Sarwar Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication International Journal of Telemedicine and Applications |
title | Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication |
title_full | Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication |
title_fullStr | Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication |
title_full_unstemmed | Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication |
title_short | Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication |
title_sort | threats and mitigation strategies for electroencephalography based person authentication |
url | http://dx.doi.org/10.1155/ijta/3946740 |
work_keys_str_mv | AT zaibunnisa threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT asadullahtariq threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT irfanuddin threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT danishshehzad threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT mohamedadelserhani threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT abdelkadernbelkacem threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication AT nadeemsarwar threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication |