Neurosecurity: security and privacy for neural devices

被引:56
|
作者
Denning, Tamara [1 ]
Matsuoka, Yoky [1 ]
Kohno, Tadayoshi [1 ]
机构
[1] Univ Washington, Dept Comp Sci & Engn, Seattle, WA 98195 USA
关键词
neural engineering; computer security; neurosecurity; implantable device; CORTICAL CONTROL; STIMULATION; TRIAL; ARM;
D O I
10.3171/2009.4.FOCUS0985
中图分类号
R74 [神经病学与精神病学];
学科分类号
摘要
An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices. (DOI:10.3171/2009.4.FOCUS0985)
引用
收藏
页数:4
相关论文
共 50 条
  • [1] NFC devices: Security and privacy
    Madlmayr, Gerald
    Langer, Josef
    Kantner, Christian
    Scharinger, Josef
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 642 - +
  • [2] Security and privacy for implantable medical devices
    Halperin, Daniel
    Kohno, Tadayoshi
    Heydt-Benjamin, Thomas S.
    Fu, Kevin
    Maisel, William H.
    [J]. IEEE PERVASIVE COMPUTING, 2008, 7 (01) : 30 - 39
  • [3] Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study
    Anderson, Bonnie Brinton
    Kirwan, C. Brock
    Eargle, David
    Jensen, Scott R.
    Vance, Anthony
    [J]. JOURNAL OF CYBERSECURITY, 2015, 1 (01): : 109 - 120
  • [4] Are ConsumersWilling to Pay for Security and Privacy of IoT Devices?
    Emami-Naeini, Pardis
    Dheenadhayalan, Janarth
    Agarwal, Yuvraj
    Cranor, Lorrie Faith
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1505 - 1522
  • [5] Privacy and Security in Internet of Things and Wearable Devices
    Arias, Orlando
    Wurm, Jacob
    Khoa Hoang
    Jin, Yier
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02): : 99 - 109
  • [6] Security and Privacy Protection of Contact less Devices
    Savry, Olivier
    Vacherand, Francois
    [J]. INTERNET OF THINGS-BOOK, 2010, : 409 - 419
  • [7] A Testbed for Security and Privacy Analysis of IoT Devices
    Tekeoglu, Ali
    Tosun, Ali Saman
    [J]. PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 343 - 348
  • [8] The Security and Privacy Protection Framework for Wearable Devices
    Cui, Youxiang
    Gu, Zhongwei
    Sun, Lei
    Tang, Haibo
    Cui, Lumeng
    [J]. DESIGN, OPERATION AND EVALUATION OF MOBILE COMMUNICATIONS, MOBILE 2022, 2022, 13337 : 203 - 210
  • [9] (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices
    Choe, Yurak
    Yu, Hyungseok
    Kim, Taeho
    Lee, Shinjae
    Lee, Hojoon
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1630 - 1643
  • [10] Retrofitting Security and Privacy Measures to Smart Home Devices
    Ye, Chenghao
    Indra, Praburam Prabhakar
    Aspinall, David
    [J]. 2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 283 - 290