The Usability Paradigm in Passwordless Authentication : A Comparative Study of YubiKey and Passkey Implementations
DOI:
https://doi.org/10.32628/CSEIT24106152Keywords:
Passwordless Authentication, User Experience, Accessibility, YubiKey, PasskeysAbstract
The widespread adoption of passwordless authentication methods, such as YubiKey and passkeys, represents a significant shift in Identity and Access Management (IAM) systems. While these technologies offer enhanced security by mitigating vulnerabilities associated with traditional passwords, their success hinges on effectively balancing robust security with user experience and accessibility. This article comprehensively analyzes YubiKey and passkey implementations, examining their impact on user interaction, cross-platform compatibility, and setup processes. We explore critical accessibility considerations, including challenges faced by users with physical disabilities and the inclusivity of biometric systems. The article also investigates the delicate balance between security and convenience, emphasizing the importance of user education and support in fostering adoption. By evaluating current implementations and projected technological advancements, we provide insights into the future landscape of passwordless authentication. Our findings underscore the crucial role of user-centric design in developing secure, accessible, and inclusive authentication systems, paving the way for a more secure and user-friendly digital ecosystem.
Downloads
References
Gupta, B. B., Quamara, M., "An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurrency and Computation: Practice and Experience, vol. 32, no. 21, 2020. [Online]. Available: https://doi.org/10.1002/cpe.4946 DOI: https://doi.org/10.1002/cpe.4946
Bonneau, J., Herley, C., Van Oorschot, P. C., Stajano, F., "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 553-567, 2012. [Online]. Available: https://doi.org/10.1109/SP.2012.44 DOI: https://doi.org/10.1109/SP.2012.44
Lyastani, S. G., Schilling, M., Neumayr, S., Backes, M., & Bugiel, S., "Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication," in 2020 IEEE Symposium on Security and Privacy (SP), pp. 268-285, 2020. [Online]. Available: https://doi.org/10.1109/SP40000.2020.00047 DOI: https://doi.org/10.1109/SP40000.2020.00047
Fagan, M., Albayram, Y., Khan, M. M. H., & Buck, R., "An investigation into users' considerations towards using password managers," Human-centric Computing and Information Sciences, vol. 7, no. 1, pp. 1-20, 2017. [Online]. Available: https://doi.org/10.1186/s13673-017-0093-6 DOI: https://doi.org/10.1186/s13673-017-0093-6
J. Colnago, "It's not actually that horrible: Exploring Adoption of Two-Factor Authentication at a University," in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018, Paper 456, pp. 1-11. [Online]. Available: https://doi.org/10.1145/3173574.3174030 DOI: https://doi.org/10.1145/3173574.3174030
Das, S., Dingman, A., & Camp, L. J., "Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key," in Financial Cryptography and Data Security, 2018, pp. 160-179. [Online]. Available: https://doi.org/10.1007/978-3-662-58387-6_9 DOI: https://doi.org/10.1007/978-3-662-58387-6_9
Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., & Seamons, K., "A Usability Study of Five Two-Factor Authentication Methods," in Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS), 2019. [Online]. Available: https://www.usenix.org/system/files/soups2019-reese.pdf
Farke, F. M., Lorenz, L., Schnitzler, T., Markert, P., & Dürmuth, M., "You still use the password after all" – Exploring FIDO2 Security Keys in a Small Company," in Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020, pp. 19-35. [Online]. Available: https://www.usenix.org/system/files/soups2020-farke.pdf
Guerar, M., Migliardi, M., Merlo, A., Benmoshe, M., & Baudry, B., "Using Screen Brightness to Improve Security in Mobile Social Network Access," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 621-632, 2018. [Online]. Available: https://doi.org/10.1109/TDSC.2016.2601603 DOI: https://doi.org/10.1109/TDSC.2016.2601603
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.