首页 | 本学科首页   官方微博 | 高级检索  
     


Evaluation of user authentication methods in the gadget-free world
Affiliation:1. The American University in Cairo, New Cairo, Egypt;2. Memorial University of Newfoundland, St. John’s, Canada;1. Department of Computer and Systems Sciences, Stockholm University, Kista, Sweden;2. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China;1. State Key Laboratory of Software Development Environment and Key Laboratory of Biomechanics and Mechanobiology of Ministry of Education and Research Institute of Beihang University in Shenzhen, Beihang University, Beijing 100191, China;2. Microsoft Research Asia, Beijing 100080, China;3. School of Electronic and Information Engineering, Beihang University, Beijing 100191, China;1. Department of Computer Science, Hunter College, City University of New York, 10065, USA;2. Department of Computer Science and Engineering, University of Nevada, Reno, 89557, USA
Abstract:In an ideal gadget-free environment the user is interacting with the environment and the services through only “natural” means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user’s actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.
Keywords:User authentication  Security  Privacy  Gadget-free  Evaluation
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号