Poster: Exploring user perceptions of authentication scheme security

نویسندگان

  • Ann Nosseir
  • Sotirios Terzis
چکیده

Despite researchers’ efforts authentication remains a challenge, as demonstrated by the prevalent use of passwords in spite of their usability and security problems. Although alternatives have been suggested addressing these problems [1], they have failed to gain wide acceptance. It is now recognized that a more comprehensive investigation of authentication schemes is necessary to address the challenge [2]. Research has shown that end-user perceptions and attitudes play a major role in the acceptance of new technologies [7]. However, they have received limited attention in the context of authentication [6, 4]. Studies suggest that authentication schemes are distinct enough to require consideration of a different set of factors, like the perception of their security. They have also shown that the relationship between perceived security and acceptance is not linear [6, 4], i.e. up to a certain level of security increases the acceptability of a scheme, but beyond that higher levels of security undermine it. As a higher level of security typically requires increased user effort, it would seem that a scheme that is perceived too easy to use may not be acceptable by users. From the above, it is clear that studying the perception of their security is an important aspect of a comprehensive investigation of authentication schemes. In this context, we conducted a first study of how users perceive the security of five authentication schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens

Security and usability issues with passwords suggest a need for a new authentication scheme. Several alternatives involve a physical device or token. We investigate one such alternative, Pico: an authentication scheme that utilizes multiple wearable devices. We present the grounded theory results of a series of semi-structured interviews for exploring perceptions of this scheme. We found that t...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013