Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication

This work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve...

Full description

Saved in:
Bibliographic Details
Main Authors: Zaib Unnisa, Asadullah Tariq, Irfan Ud Din, Danish Shehzad, Mohamed Adel Serhani, Abdelkader N. Belkacem, Nadeem Sarwar
Format: Article
Language:English
Published: Wiley 2025-01-01
Series:International Journal of Telemedicine and Applications
Online Access:http://dx.doi.org/10.1155/ijta/3946740
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823859650071625728
author Zaib Unnisa
Asadullah Tariq
Irfan Ud Din
Danish Shehzad
Mohamed Adel Serhani
Abdelkader N. Belkacem
Nadeem Sarwar
author_facet Zaib Unnisa
Asadullah Tariq
Irfan Ud Din
Danish Shehzad
Mohamed Adel Serhani
Abdelkader N. Belkacem
Nadeem Sarwar
author_sort Zaib Unnisa
collection DOAJ
description This work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve as a biometric modality for authentication and verification. Additional biometric modalities, such as fingerprints or irises, are vulnerable to both fabrication and degradation over time, and illicit use of dead people’s biometrics has sometimes been seen. EEG’s intrinsic properties prohibit signal imitation or postmortem acquisition, making it more reliable than other biometric modalities. This research is aimed at investigating the most recent advancements in the domain of EEG signals, clarifying the current knowledge that impacts EEG-based authentication, and evaluating the emerging challenges. Many research publications have been collected to achieve this objective. By considering historical and recent efforts and achievements, this research also presents feasible resolutions to the emerging inquiries prompted by the ongoing advancements in EEG-based technology. The potential future application of EEG-based authentication has also been the subject of this scholarly discourse. A comprehensive collection of articles over the previous decade has been compiled to answer contemporary EEG signal research questions to get valuable insights. According to research findings, in February 2022, a significant milestone was achieved when the EEG signals of a deceased person were successfully captured for the first time in recorded history. However, this groundbreaking discovery may threaten EEG-based authentication. In addition, it is found that EEG-based authentication literature did not completely implement “liveness detection.” An updated approach for identifying liveness addresses novel challenges, that is, falsified EEG signals and a dead person’s EEG signals for EEG-based authentication that have not been discussed in the literature. The suggested solutions put forward in this study have the potential to stimulate additional research in this area.
format Article
id doaj-art-e2692e4af9d2490caee85c717483f220
institution Kabale University
issn 1687-6423
language English
publishDate 2025-01-01
publisher Wiley
record_format Article
series International Journal of Telemedicine and Applications
spelling doaj-art-e2692e4af9d2490caee85c717483f2202025-02-11T00:00:01ZengWileyInternational Journal of Telemedicine and Applications1687-64232025-01-01202510.1155/ijta/3946740Threats and Mitigation Strategies for Electroencephalography-Based Person AuthenticationZaib Unnisa0Asadullah Tariq1Irfan Ud Din2Danish Shehzad3Mohamed Adel Serhani4Abdelkader N. Belkacem5Nadeem Sarwar6Department of Computer ScienceCollege of Information TechnologyDepartment of Computer ScienceDepartment of Computer ScienceCollege of Computing and InformaticsCollege of Information TechnologyDepartment of Computer ScienceThis work is aimed at investigating the potential risks linked to electroencephalography (EEG)-based person authentication and providing solutions to mitigate these issues. Authenticating a person by EEG involves verifying the legitimacy of the signals used for user identification. EEG signals serve as a biometric modality for authentication and verification. Additional biometric modalities, such as fingerprints or irises, are vulnerable to both fabrication and degradation over time, and illicit use of dead people’s biometrics has sometimes been seen. EEG’s intrinsic properties prohibit signal imitation or postmortem acquisition, making it more reliable than other biometric modalities. This research is aimed at investigating the most recent advancements in the domain of EEG signals, clarifying the current knowledge that impacts EEG-based authentication, and evaluating the emerging challenges. Many research publications have been collected to achieve this objective. By considering historical and recent efforts and achievements, this research also presents feasible resolutions to the emerging inquiries prompted by the ongoing advancements in EEG-based technology. The potential future application of EEG-based authentication has also been the subject of this scholarly discourse. A comprehensive collection of articles over the previous decade has been compiled to answer contemporary EEG signal research questions to get valuable insights. According to research findings, in February 2022, a significant milestone was achieved when the EEG signals of a deceased person were successfully captured for the first time in recorded history. However, this groundbreaking discovery may threaten EEG-based authentication. In addition, it is found that EEG-based authentication literature did not completely implement “liveness detection.” An updated approach for identifying liveness addresses novel challenges, that is, falsified EEG signals and a dead person’s EEG signals for EEG-based authentication that have not been discussed in the literature. The suggested solutions put forward in this study have the potential to stimulate additional research in this area.http://dx.doi.org/10.1155/ijta/3946740
spellingShingle Zaib Unnisa
Asadullah Tariq
Irfan Ud Din
Danish Shehzad
Mohamed Adel Serhani
Abdelkader N. Belkacem
Nadeem Sarwar
Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
International Journal of Telemedicine and Applications
title Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
title_full Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
title_fullStr Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
title_full_unstemmed Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
title_short Threats and Mitigation Strategies for Electroencephalography-Based Person Authentication
title_sort threats and mitigation strategies for electroencephalography based person authentication
url http://dx.doi.org/10.1155/ijta/3946740
work_keys_str_mv AT zaibunnisa threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT asadullahtariq threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT irfanuddin threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT danishshehzad threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT mohamedadelserhani threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT abdelkadernbelkacem threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication
AT nadeemsarwar threatsandmitigationstrategiesforelectroencephalographybasedpersonauthentication