1. Introduction
Brain-to-Brain Communication (B2B-C) is an emerging field at the intersection of neuroscience and communication technology. It proposes a revolutionary shift in how information can be transferred between individuals. This field, still in its nascent stages, aims to enable direct brain-to-brain interaction, bypassing traditional forms of communication like speech and text. Such advancements can transform numerous domains, including healthcare, education, and everyday social interactions [
1]. The complexity of B2B-C arises from the need to interpret and transmit neural signals between brains accurately [
2]. The human brain is an incredibly intricate organ consisting of approximately 86 billion neurons, each forming thousands of synaptic connections. Translating the electrochemical signals from one brain into meaningful information that can be received and understood by another is a task fraught with challenges, requiring sophisticated technology and a deep understanding of neuroscience and signal processing [
3].
Electroencephalography (EEG) signals are pivotal in this era of brain research due to their non-invasive nature and ability to provide real-time monitoring of brain activity. EEG captures the brain’s electrical activity using sensors placed on the scalp, offering a window into the neural processes underlying cognition, perception, and motor functions. The complexity of EEG data lies in its low amplitude, high dimensionality, and noise, which necessitates advanced methods for effective data analysis and interpretation [
4].
High-density EEG, in particular, offers a rich dataset analogous to a series of images evolving over time [
5]. These data can be processed using methods from medical image analysis and deep learning to extract meaningful patterns and insights. Techniques commonly used in image processing have proven effective in handling EEG data’s high dimensionality and complexity, enhancing the robustness and accuracy of B2B-C systems [
6].
Integrating these advanced methodologies into EEG analysis opens new possibilities for improving the performance and security of B2B-C systems. For example, by employing deep learning techniques, researchers have significantly advanced the accuracy of EEG signal classification, contributing to more reliable and secure communication channels [
7]. Furthermore, medical image analysis techniques have been adapted to process high-density EEG data, allowing for the detailed exploration of brain activity and its applications in various domains [
8].
Given the high complexity of EEG data, dimensionality reduction techniques are often employed to distill the data into a more manageable form without losing critical information [
9]. Within the realm of EEG, Steady-State Visually Evoked Potentials (SSVEPs) stand out for their robustness and reliability in various applications, including B2B-C [
10]. SSVEPs are elicited by visual stimuli flickering at specific frequencies, producing brain responses that are relatively easy to detect and analyze [
11]. This makes SSVEPs particularly useful for B2B-C, as they can provide consistent and high-quality signals that facilitate accurate interpretation and communication between brains [
12].
Ensuring the security and robustness of B2B-C systems, particularly when transmitting EEG signals, is paramount due to the sensitive nature of neural data [
13]. While offering a non-invasive and real-time glimpse into brain activity, EEG signals are highly susceptible to noise, interference, and malicious attacks [
14]. The integrity of the transmitted data is critical; any compromise can lead to significant errors in interpretation and potentially harmful consequences. One of the main challenges lies in protecting these signals from adversarial attacks that can subtly alter the data, leading to miscommunication or data breaches [
15]. Robustness must be built into the system to ensure that it can withstand such perturbations and continue to function accurately. This requires advanced machine learning techniques, such as Adversarial Neural Network Training (ANNT), which can develop models to recognize and resist these adversarial patterns. Additionally, secure transmission protocols must be developed to safeguard the data as it travels through wireless channels, preventing unauthorized access and ensuring the privacy and integrity of the communication [
16]. As B2B-C technology evolves, addressing these security and robustness challenges will be essential to realizing its full potential and maintaining trust in its applications across healthcare, education, and other fields.
Enormous studies have been conducted on EEG analysis, particularly within Brain-Computer Interface (BCI) technology, significantly advancing our understanding and application. One extraordinary work is by Donchin and colleagues, who developed the P300-based BCI, a system that allows individuals to communicate without muscle activity by detecting the P300 wave, a component of EEG that occurs in response to decision-making processes [
17]. Another notable study is by Wolpaw et al., who created the sensorimotor rhythm-based BCI, enabling users to control external devices by modulation of sensorimotor rhythms in their EEG signals [
18]. Furthermore, Buzsáki’s research on using EEG for understanding the brain’s oscillatory activity has provided profound insights into how different brain waves are associated with various cognitive functions and states of consciousness [
19]. In [
20], a novel ensemble model was introduced, significantly enhancing motor imagery EEG classification by integrating multiple machine learning (ML) classifiers through a weighted stacking approach. Additionally, their study on the Weighted and Stacked Adaptive Integrated Ensemble Classifier (WS-AIEC) has shown superior performance in EEG signal classification, achieving exceptional accuracy and reliability across multiple datasets [
21]. These outstanding works, among many others, highlight the versatility and potential of EEG analysis in advancing both theoretical neuroscience and practical applications in neurotechnology.
Despite the extensive research on various aspects of EEG signal analysis, studies focusing on using EEG in direct B2B-C remain relatively scarce. Even fewer investigations have addressed this context’s critical security and robustness issues. The challenge is further compounded when considering integrating interdisciplinary fields such as wireless communication, neuroscience, and artificial intelligence. This interdisciplinary approach is crucial for developing a comprehensive and secure B2B-C system, yet it is an area that has not been extensively explored. For instance, authors in [
1] and [
22] have done valuable foundational work in B2B-C but didn’t discuss its critical aspect: security. On the other hand, studies like [
23] and [
24] have emphasized the need for security but have not ventured into applying ANNT, particularly in conjunction with EEG, for fortifying B2B-C systems. This gap underscores the importance of advancing research in this specific intersection to realize the full potential of B2B-C technology.
In our previous work [
25], we aimed to enhance the robustness and security of B2B-C systems against adversarial attacks using Event-Related Potentials (ERP) EEG data through ANNT. By focusing on ERP and employing eight diverse datasets, our objectives were to rigorously evaluate the model’s defense mechanisms against adversarial manipulations and optimize trial durations and sampling rates for maximum security. The results signified a notable advancement in system defense, evidenced by an average increase in adversarial accuracy by 17% and an improvement in the Area Under the Curve (AUC) by 0.12 points, demonstrating the effectiveness of our approach in strengthening B2B-C systems against sophisticated cyber threats.
This work extends our previous efforts by focusing on SSVEP EEG data. This extension will allow us to explore the robustness and security of B2B-C systems in a different and highly reliable EEG paradigm, further enhancing such systems’ practical applicability and resilience against adversarial attacks.
Our contribution to this field lies in leveraging ANNT to improve the robustness and security of B2B-C systems based on SSVEP EEG data. By focusing on SSVEP, which provides robust and reliable signals, we aim to enhance the resilience of B2B-C systems against adversarial attacks. Our approach involves a detailed analysis of key factors such as sampling rate, trial duration, and the number of classes, which are critical in optimizing the performance and security of B2B-C systems. By systematically varying these parameters, we aim to identify the optimal conditions under which the ANNT can most effectively enhance the security and robustness of SSVEP-based B2B-C systems. Our findings are expected to provide valuable insights into developing more secure and reliable neural communication technologies, paving the way for practical and trustworthy B2B-C applications.
The organization of this paper is structured to provide a comprehensive overview of our research methodology, findings, and implications. Following this Introduction, the Methodology section details the data description, signal processing techniques, and algorithms used in our study, highlighting the specific methods employed to preprocess and analyze SSVEP EEG data. In the Results section, we present our experimental findings, including the impact of various parameters on the performance and security of the B2B-C system. The Discussion section discusses and interprets our results, offering insights into our research’s practical implications and potential applications. Finally, the Conclusion summarizes our study, emphasizing the significance of our contributions and outlining potential future research directions.
3. Results
In this section, we present the performance of our proposed B2B-C system using SSVEP EEG data, evaluated with and without the application of ANNT. The primary focus is on the confusion matrices derived from the Nakanishi2015 and Lee2019_SSVEP datasets. These confusion matrices offer a detailed overview of the classification accuracy and error distribution across different classes of SSVEP stimuli. By analyzing the performance without ANNT, we establish a baseline that highlights the challenges posed by adversarial attacks and sets the stage for subsequent comparisons with ANNT-enhanced models. The confusion matrix is a fundamental evaluation tool in classification tasks. It provides insights into the model’s performance by displaying the number of true positive, true negative, false positive, and false negative predictions for each class. In the context of SSVEP-based B2B-C systems, understanding the distribution of these predictions is crucial for assessing the system’s reliability and identifying areas where adversarial attacks may exploit vulnerabilities. In
Figure 3, we present the confusion matrices, showcasing the classification results without ANNT. These matrices illustrate the initial performance metrics, serving as a benchmark for subsequent comparisons with adversarially trained models.
To better understand the model’s behavior when the data is attacked and ANNT has not yet been applied, we also present the Receiver Operating Characteristic (ROC) curves. These curves provide a comprehensive view of the model’s performance by illustrating the trade-off between sensitivity (true positive rate) and the false positive rate across different threshold settings. Analyzing the ROC curves helps us evaluate how well the model distinguishes between classes under clean and perturbed conditions.
Figure 4 presents the ROC curves for the Nakanishi2015 and Lee2019_SSVEP datasets, highlighting the model’s performance without ANNT when subjected to adversarial attacks.
To evaluate the effectiveness of ANNT in enhancing the robustness and security of our B2B-C system, we present the confusion matrices after applying ANNT. By comparing these results with those obtained without ANNT, we can assess the impact of adversarial training on the system’s accuracy and resilience to potential attacks.
Figure 5 illustrates the confusion matrices for the datasets after ANNT application, providing a clearer understanding of how the model’s performance benefits from this advanced training method.
We plot the ROC curves for both datasets under clean and perturbed conditions to better understand the model’s performance after applying ANNT. Combined with the confusion matrices, these curves allow us to evaluate the model’s accuracy and AUC, providing a holistic view of its robustness and sensitivity. By comparing these ROC curves with those obtained without ANNT, we can better assess the effectiveness of adversarial training in enhancing the system’s resilience to potential attacks.
Figure 6 presents the ROC curves for the Nakanishi2015 and Lee2019_SSVEP datasets, illustrating the model’s performance improvements with ANNT.
5. Conclusion
Our study confirms the effectiveness of ANNT in enhancing the robustness and security of B2B-C systems, aligning well with the findings from previous research [
25]. The consistent improvements in accuracy and AUC with ANNT reinforce the previous study’s conclusions. This demonstrates ANNT’s reliability and applicability across different datasets, highlighting its potential as a standard approach for securing B2B-C systems against adversarial attacks.
Moreover, our detailed analysis of dataset characteristics provides further insights into how specific features influence the efficacy of ANNT. This underscores the importance of considering subject and channel count, number of classes, sampling rate, and trial duration in model training and evaluation.
In addition to adversarial attacks, our research suggests that future work should consider exploring other types of attacks, such as jamming and eavesdropping. Investigating these additional threats and developing appropriate countermeasures will provide a more comprehensive security framework for B2B-C systems, ensuring their robustness and availability in real-world applications.
In summary, our findings underscore the significant impact of ANNT on improving the accuracy and robustness of B2B-C systems. Future research should continue to explore this promising area, focusing on practical implementations, further refinement of adversarial techniques, and addressing additional security threats to enhance neural communication technologies’ overall security and efficiency.