Neurosecurity: security and privacy for neural devices.

An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.

[1]  Andrew B. Schwartz,et al.  Brain-Controlled Interfaces: Movement Restoration with Neural Prosthetics , 2006, Neuron.

[2]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[3]  R. Stein,et al.  Reanimating limbs after injury or disease , 2005, Trends in Neurosciences.

[4]  A. Lozano,et al.  Deep Brain Stimulation for Treatment-Resistant Depression , 2005, Neuron.

[5]  David M. Santucci,et al.  Frontal and parietal cortical ensembles predict single‐trial muscle activity during reaching movements in primates , 2005, The European journal of neuroscience.

[6]  S. Meagher Instant neural control of a movement signal , 2002 .

[7]  T.W. Berger,et al.  Restoring lost cognitive function , 2005, IEEE Engineering in Medicine and Biology Magazine.

[8]  Andrew S. Whitford,et al.  Cortical control of a prosthetic arm for self-feeding , 2008, Nature.

[9]  Judy Illes,et al.  NEUROETHICS: DEFINING THE ISSUES IN THEORY, PRACTICE, AND POLICY , 2006 .

[10]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[11]  Miguel A. L. Nicolelis,et al.  Real-time control of a robot arm using simultaneously recorded neurons in the motor cortex , 1999, Nature Neuroscience.

[12]  Andrew Jackson,et al.  An autonomous implantable computer for neural recording and stimulation in unrestrained primates , 2005, Journal of Neuroscience Methods.

[13]  R. Coffey,et al.  Deep brain stimulation for chronic pain: results of two multicenter trials and a structured review. , 2001, Pain medicine.

[14]  Yoky Matsuoka,et al.  An EMG-Controlled Hand Exoskeleton for Natural Pinching , 2004, J. Robotics Mechatronics.

[15]  Dawn M. Taylor,et al.  Direct Cortical Control of 3D Neuroprosthetic Devices , 2002, Science.

[16]  Pedram Afshar,et al.  On the design of robotic hands for brain-machine interface. , 2006, Neurosurgical focus.

[17]  David C. Turner,et al.  A neuronal cell line (PC12) expresses two β 1-class integrins—α 1 β 1, and α 3 β 1—that recognize different neurite outgrowth-promoting domains in laminin , 1990, Neuron.

[18]  J. Chapin Using multi-neuron population recordings for neural prosthetics , 2004, Nature Neuroscience.

[19]  G. Deuschl,et al.  A randomized trial of deep-brain stimulation for Parkinson's disease. , 2006, The New England journal of medicine.

[20]  David Clark,et al.  Tussle in cyberspace: defining tomorrow's internet , 2002, SIGCOMM 2002.