Evaluation of user authentication methods in the gadget-free world |
| |
Affiliation: | 1. The American University in Cairo, New Cairo, Egypt;2. Memorial University of Newfoundland, St. John’s, Canada;1. Department of Computer and Systems Sciences, Stockholm University, Kista, Sweden;2. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China;1. State Key Laboratory of Software Development Environment and Key Laboratory of Biomechanics and Mechanobiology of Ministry of Education and Research Institute of Beihang University in Shenzhen, Beihang University, Beijing 100191, China;2. Microsoft Research Asia, Beijing 100080, China;3. School of Electronic and Information Engineering, Beihang University, Beijing 100191, China;1. Department of Computer Science, Hunter College, City University of New York, 10065, USA;2. Department of Computer Science and Engineering, University of Nevada, Reno, 89557, USA |
| |
Abstract: | In an ideal gadget-free environment the user is interacting with the environment and the services through only “natural” means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user’s actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario. |
| |
Keywords: | User authentication Security Privacy Gadget-free Evaluation |
本文献已被 ScienceDirect 等数据库收录! |
|