Usable Security of Authentication Process: New Approach and Practical Assessment

被引:0
|
作者
Althobaiti, Maha M. [1 ]
Mayhew, Pam [1 ]
机构
[1] Univ East Anglia, Sch Comp Sci, Norwich, England
关键词
authentication; security; usability; HCI; E-banking;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication mechanisms are considered the typical method to secure financial websites. Context authentication has become increasingly important in the arena of online banking, which involves sensitive data that belong to users who trust their banks. Multifactor authentication is the most commonly used method of strengthening the log-in process in e-banking. Developing a usable and secure authentication approach and method is the most challenging area for researchers in the fields of security and Human-Computer Interaction (HCI). This paper describes a work-in-progress towards a new approach for authenticating users when access online banking by giving them the opportunity to choose their preferred method to log into e-banking. In our complex experiment with 100 online banking customers, we simulate an original online banking platform based on the proposed approach; then, we evaluate the usability and security of three different methods and assess user awareness of the most visible security design flaws. The initial result shows that the new system model was able to assess the usability and security of different multifactor authentication methods and it is considered a first attempt towards a usable and secure authentication approach.
引用
收藏
页码:179 / 180
页数:2
相关论文
共 50 条
  • [1] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [2] Passphrase and keystroke dynamics authentication: Usable security
    Bhana, Bhaveer
    Flowerday, Stephen
    COMPUTERS & SECURITY, 2020, 96
  • [3] Finding Runtime Usable Gadgets: On the Security of Return Address Authentication
    Xu, Qizhen
    Zhang, Zhijie
    Zhang, Lin
    Chen, Liwei
    Shi, Gang
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 374 - 381
  • [4] Usable Security by Design: A Pattern Approach
    Naqvi, Bilal
    Porras, Jari
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2020, 2020, 12210 : 609 - 618
  • [5] A new approach for UC security concurrent deniable authentication
    Tao Feng
    FengHua Li
    JianFeng Ma
    SangJae Moon
    Science in China Series F: Information Sciences, 2008, 51 : 352 - 367
  • [6] A new approach for UC security concurrent deniable authentication
    Feng Tao
    Li FengHua
    Ma JianFeng
    Moon, SangJae
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (04): : 352 - 367
  • [8] Web Services Security Assessment: An Authentication-Focused Approach
    Soupionis, Yannis
    Kandias, Miltiadis
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 561 - 566
  • [9] Don’t blame the user: Toward means for usable and practical authentication
    Schmidt A.
    Interactions, 2019, 26 (03): : 73 - 75
  • [10] EyeVeri: A Secure and Usable Approach for Smartphone User Authentication
    Song, Chen
    Wang, Aosen
    Ren, Kui
    Xu, Wenyao
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,