Evaluation of user authentication methods in the gadget-free world

Research output: Contribution to journalArticleScientificpeer-review

4 Citations (Scopus)

Abstract

In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.
Original languageEnglish
Pages (from-to)220-241
Number of pages22
JournalPervasive and Mobile Computing
Volume40
DOIs
Publication statusPublished - 1 Sep 2017
MoE publication typeA1 Journal article-refereed

Fingerprint

User Authentication
Authentication
Evaluation
Requirements
Usability
Privacy
Open Problems
Restriction
Scenarios
Evaluate
Interaction

Keywords

  • evaluation
  • gadget-free
  • privacy
  • security
  • user authentication

Cite this

@article{cb848ee7d7e540bab2ed88896f5ee4bc,
title = "Evaluation of user authentication methods in the gadget-free world",
abstract = "In an ideal gadget-free environment the user is interacting with the environment and the services through only {"}natural{"} means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.",
keywords = "evaluation, gadget-free, privacy, security, user authentication",
author = "Kimmo Halunen and Juha H{\"a}iki{\"o} and Visa Vallivaara",
year = "2017",
month = "9",
day = "1",
doi = "10.1016/j.pmcj.2017.06.017",
language = "English",
volume = "40",
pages = "220--241",
journal = "Pervasive and Mobile Computing",
issn = "1574-1192",
publisher = "Elsevier",

}

Evaluation of user authentication methods in the gadget-free world. / Halunen, Kimmo; Häikiö, Juha; Vallivaara, Visa.

In: Pervasive and Mobile Computing, Vol. 40, 01.09.2017, p. 220-241.

Research output: Contribution to journalArticleScientificpeer-review

TY - JOUR

T1 - Evaluation of user authentication methods in the gadget-free world

AU - Halunen, Kimmo

AU - Häikiö, Juha

AU - Vallivaara, Visa

PY - 2017/9/1

Y1 - 2017/9/1

N2 - In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.

AB - In an ideal gadget-free environment the user is interacting with the environment and the services through only "natural" means. This imposes restrictions on many aspects of the interaction. One key element in this is user authentication, because it assures the environment and related services of the legitimacy of user's actions and empowers the user to carry out his tasks. We present five high-level categories of features of user authentication in the gadget-free world including security, privacy and usability aspects. These are adapted and extended from earlier research on web authentication methods. We survey existing authentication methods together with some emerging technologies and evaluate these according to the features in our categories. Our results show, that no single authentication method can realise all these requirements for authentication. In conclusion, we give future research directions and open problems that stem from our observations. Especially, finding combinations of authentication factors and methods that achieve all requirements is an interesting problem in the gadget-free scenario.

KW - evaluation

KW - gadget-free

KW - privacy

KW - security

KW - user authentication

UR - http://www.scopus.com/inward/record.url?scp=85022195348&partnerID=8YFLogxK

U2 - 10.1016/j.pmcj.2017.06.017

DO - 10.1016/j.pmcj.2017.06.017

M3 - Article

VL - 40

SP - 220

EP - 241

JO - Pervasive and Mobile Computing

JF - Pervasive and Mobile Computing

SN - 1574-1192

ER -