Evaluation of user authentication methods in the gadget-free world

    Research output: Contribution to journalArticleScientificpeer-review

    7 Citations (Scopus)

    Abstract

    In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.
    Original languageEnglish
    Pages (from-to)220-241
    Number of pages22
    JournalPervasive and Mobile Computing
    Volume40
    DOIs
    Publication statusPublished - 1 Sep 2017
    MoE publication typeA1 Journal article-refereed

    Fingerprint

    User Authentication
    Authentication
    Evaluation
    Requirements
    Usability
    Privacy
    Open Problems
    Restriction
    Scenarios
    Evaluate
    Interaction

    Keywords

    • evaluation
    • gadget-free
    • privacy
    • security
    • user authentication

    Cite this

    @article{cb848ee7d7e540bab2ed88896f5ee4bc,
    title = "Evaluation of user authentication methods in the gadget-free world",
    abstract = "In an ideal gadget-free environment the user is interacting with the environment and the services through only {"}natural{"} means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.",
    keywords = "evaluation, gadget-free, privacy, security, user authentication",
    author = "Kimmo Halunen and Juha H{\"a}iki{\"o} and Visa Vallivaara",
    year = "2017",
    month = "9",
    day = "1",
    doi = "10.1016/j.pmcj.2017.06.017",
    language = "English",
    volume = "40",
    pages = "220--241",
    journal = "Pervasive and Mobile Computing",
    issn = "1574-1192",
    publisher = "Elsevier",

    }

    Evaluation of user authentication methods in the gadget-free world. / Halunen, Kimmo; Häikiö, Juha; Vallivaara, Visa.

    In: Pervasive and Mobile Computing, Vol. 40, 01.09.2017, p. 220-241.

    Research output: Contribution to journalArticleScientificpeer-review

    TY - JOUR

    T1 - Evaluation of user authentication methods in the gadget-free world

    AU - Halunen, Kimmo

    AU - Häikiö, Juha

    AU - Vallivaara, Visa

    PY - 2017/9/1

    Y1 - 2017/9/1

    N2 - In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.

    AB - In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.

    KW - evaluation

    KW - gadget-free

    KW - privacy

    KW - security

    KW - user authentication

    UR - http://www.scopus.com/inward/record.url?scp=85022195348&partnerID=8YFLogxK

    U2 - 10.1016/j.pmcj.2017.06.017

    DO - 10.1016/j.pmcj.2017.06.017

    M3 - Article

    VL - 40

    SP - 220

    EP - 241

    JO - Pervasive and Mobile Computing

    JF - Pervasive and Mobile Computing

    SN - 1574-1192

    ER -