User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication

被引:4
|
作者
Isler, Devris [1 ]
Kupcu, Alptekin [2 ]
Coskun, Aykut [2 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[2] Koc Univ, Istanbul, Turkey
关键词
Password-based authentication; Usability; Two-factor authentication; Single password authentication;
D O I
10.1007/978-3-030-31500-9_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-factor authentication provides a significant improvement over the security of traditional password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. In this decade, single password authentication (SPA) schemes are introduced to overcome the challenges of traditional password authentication, which is vulnerable to the offline dictionary, phishing, honeypot, and man-in-the-middle attacks. Unlike classical password-based authentication systems, in SPA schemes the user is required to remember only a single password (and a username) for all her accounts, while the password is protected against the afore-mentioned attacks in a provably secure manner. In this paper, for the first time, we implement the state-of-the-art mobile-based SPA system of Acar et al. (2013) as a prototype and assess its usability in a lab environment where we compare it against two-factor authentication (where, in both cases, in addition to the password, the user needs access to her mobile device). Our study shows that mobile-based SPA is as easy as, but less intimidating and more secure than two-factor authentication, making it a better alternative for online banking type deployments. Based on our study, we conclude with deployment recommendations and further usability study suggestions.
引用
收藏
页码:99 / 117
页数:19
相关论文
共 50 条
  • [1] User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
    Gunson, Nancie
    Marshall, Diarmid
    Morton, Hazel
    Jack, Mervyn
    [J]. COMPUTERS & SECURITY, 2011, 30 (04) : 208 - 220
  • [2] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [3] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [4] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [5] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [6] Functional mobile-based two-factor authentication by photonic physical unclonable functions
    Silverio, Tiago
    Dias, Lilia M. S.
    Ramalho, Joao F. C. B.
    Correia, Sandra F. H.
    Fu, Lianshe
    Ferreira, Rute A. S.
    Andre, Paulo S.
    [J]. AIP ADVANCES, 2022, 12 (08)
  • [7] Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password
    Hou, Lin
    Wei, Laiwen
    Wang, Chen
    Wang, Andi
    Xu, Jian
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 712 - 723
  • [8] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [9] Two-factor face authentication using matrix permutation transformation and a user password
    Kang, Jeonil
    Nyang, DaeHun
    Lee, KyungHee
    [J]. INFORMATION SCIENCES, 2014, 269 : 1 - 20
  • [10] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +