A Comparative Usability Study of Two-Factor Authentication

نویسندگان

  • Emiliano De Cristofaro
  • Honglu Du
  • Julien Freudiger
  • Greg Norcie
چکیده

Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an exploratory comparative study of the usability of 2F technologies. First, we conduct a pre-study interview to identify popular technologies as well as contexts and motivations in which they are used. We then present the results of a quantitative study based on a survey completed by 219 Mechanical Turk users, aiming to measure the usability of three popular 2F solutions: codes generated by security tokens, one-time PINs received via email or SMS, and dedicated smartphone apps (e.g., Google Authenticator). We record contexts and motivations, and study their impact on perceived usability. We find that 2F technologies are overall perceived as usable, regardless of motivation and/or context of use. We also present an exploratory factor analysis, highlighting that three metrics – ease-of-use, required cognitive efforts, and trustworthiness – are enough to capture key factors affecting 2F usability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication

Decades of research and numerous incidents have demonstrated the weaknesses of text passwords and prompted the need for more secure alternatives. In recent years, two-factor authentication (2F) has emerged as the most used solution to strengthen passwords. By requiring users to provide more than one authentication factor – e.g., a code generated by a security token, along with the password – 2F...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Comparative Study to Evaluate the Usability of Context-Based Wi-Fi Access Mechanisms

This paper presents a comparative study of six di erent tag and context based authentication schemes for open Wi-Fi access. All of the implemented methods require only a smartphone and an HTML5 capable webbrowser, making them interchangeable and easy to incorporate into existing infrastructure. We recruited 22 participants for the study and used two standardized questionnaires as well as additi...

متن کامل

Improving Two-Factor Authentication Usability with Sensor-Assisted Facial Recognition

Two-factor authentication is often considered by users as annoying, hard to use and time consuming due to their complexity and implementation this often leads to users making usability-focused decisions at the expense of security. We believe the development of biometric recognition technology allows for an improvement in the way we implement twofactor authentication systems. In this paper we st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013