Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication

نویسندگان

  • Emiliano De Cristofaro
  • Honglu Du
  • Julien Freudiger
  • Gregory Norcie
چکیده

Decades of research and numerous incidents have demonstrated the weaknesses of text passwords and prompted the need for more secure alternatives. In recent years, two-factor authentication (2F) has emerged as the most used solution to strengthen passwords. By requiring users to provide more than one authentication factor – e.g., a code generated by a security token, along with the password – 2F aims to enhance resilience against guessing attacks and breaches of password databases. Alas, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process, nevertheless, little research has focused on its usability. This paper presents a comparative usability study of twofactor authentication. First, we report on a preliminary interview-based study involving 9 participants, identifying the most popular 2F technologies as well as the contexts and motivations in which they are used. Then, we design and administer a survey to 219 Mechanical Turk users, aiming to explore the landscape of 2F technologies and measure the usability of three popular solutions: codes generated by security tokens, one-time PINs received via email or SMS, and dedicated smartphone apps (e.g., Google Authenticator). We record contexts and motivations, and study their impact on perceived usability. We also present an exploratory factor analysis that captures some key factors affecting usability of 2F and highlight interesting findings that call for further research in the field.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Usability Study of Two-Factor Authentication

Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an explorato...

متن کامل

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

This paper describes an experiment to investigate user perceptions of the usability and security of single-factor and two-factor authentication methods in automated telephone banking. In a controlled experiment with 62 banking customers a knowledge-based, single-factor authentication procedure, based on those commonly used in the financial services industry, was compared with a two-factor appro...

متن کامل

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound

Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why twofactor authentication is so unpopular is the extra steps that the user must complete in order to log in. Currently deployed two-factor authentication mechanisms require the user to interact with his phone to, for example, copy a verificatio...

متن کامل

"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking

To prevent password breaches and guessing attacks, banks increasingly turn to two-factor authentication (2FA), requiring users to present at least one more factor, such as a one-time password generated by a hardware token or received via SMS, besides a password. We can expect some solutions – especially those adding a token – to create extra work for users, but little research has investigated ...

متن کامل

Improving Two-Factor Authentication Usability with Sensor-Assisted Facial Recognition

Two-factor authentication is often considered by users as annoying, hard to use and time consuming due to their complexity and implementation this often leads to users making usability-focused decisions at the expense of security. We believe the development of biometric recognition technology allows for an improvement in the way we implement twofactor authentication systems. In this paper we st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1309.5344  شماره 

صفحات  -

تاریخ انتشار 2013