The Usability Paradigm in Passwordless Authentication : A Comparative Study of YubiKey and Passkey Implementations

Authors

  • Sharath Chandra Thurupati MSR Technology Group, USA Author

DOI:

https://doi.org/10.32628/CSEIT24106152

Keywords:

Passwordless Authentication, User Experience, Accessibility, YubiKey, Passkeys

Abstract

The widespread adoption of passwordless authentication methods, such as YubiKey and passkeys, represents a significant shift in Identity and Access Management (IAM) systems. While these technologies offer enhanced security by mitigating vulnerabilities associated with traditional passwords, their success hinges on effectively balancing robust security with user experience and accessibility. This article comprehensively analyzes YubiKey and passkey implementations, examining their impact on user interaction, cross-platform compatibility, and setup processes. We explore critical accessibility considerations, including challenges faced by users with physical disabilities and the inclusivity of biometric systems. The article also investigates the delicate balance between security and convenience, emphasizing the importance of user education and support in fostering adoption. By evaluating current implementations and projected technological advancements, we provide insights into the future landscape of passwordless authentication. Our findings underscore the crucial role of user-centric design in developing secure, accessible, and inclusive authentication systems, paving the way for a more secure and user-friendly digital ecosystem.

Downloads

Download data is not yet available.

References

Gupta, B. B., Quamara, M., "An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurrency and Computation: Practice and Experience, vol. 32, no. 21, 2020. [Online]. Available: https://doi.org/10.1002/cpe.4946 DOI: https://doi.org/10.1002/cpe.4946

Bonneau, J., Herley, C., Van Oorschot, P. C., Stajano, F., "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 553-567, 2012. [Online]. Available: https://doi.org/10.1109/SP.2012.44 DOI: https://doi.org/10.1109/SP.2012.44

Lyastani, S. G., Schilling, M., Neumayr, S., Backes, M., & Bugiel, S., "Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication," in 2020 IEEE Symposium on Security and Privacy (SP), pp. 268-285, 2020. [Online]. Available: https://doi.org/10.1109/SP40000.2020.00047 DOI: https://doi.org/10.1109/SP40000.2020.00047

Fagan, M., Albayram, Y., Khan, M. M. H., & Buck, R., "An investigation into users' considerations towards using password managers," Human-centric Computing and Information Sciences, vol. 7, no. 1, pp. 1-20, 2017. [Online]. Available: https://doi.org/10.1186/s13673-017-0093-6 DOI: https://doi.org/10.1186/s13673-017-0093-6

J. Colnago, "It's not actually that horrible: Exploring Adoption of Two-Factor Authentication at a University," in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018, Paper 456, pp. 1-11. [Online]. Available: https://doi.org/10.1145/3173574.3174030 DOI: https://doi.org/10.1145/3173574.3174030

Das, S., Dingman, A., & Camp, L. J., "Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key," in Financial Cryptography and Data Security, 2018, pp. 160-179. [Online]. Available: https://doi.org/10.1007/978-3-662-58387-6_9 DOI: https://doi.org/10.1007/978-3-662-58387-6_9

Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., & Seamons, K., "A Usability Study of Five Two-Factor Authentication Methods," in Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS), 2019. [Online]. Available: https://www.usenix.org/system/files/soups2019-reese.pdf

Farke, F. M., Lorenz, L., Schnitzler, T., Markert, P., & Dürmuth, M., "You still use the password after all" – Exploring FIDO2 Security Keys in a Small Company," in Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020, pp. 19-35. [Online]. Available: https://www.usenix.org/system/files/soups2020-farke.pdf

Guerar, M., Migliardi, M., Merlo, A., Benmoshe, M., & Baudry, B., "Using Screen Brightness to Improve Security in Mobile Social Network Access," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 621-632, 2018. [Online]. Available: https://doi.org/10.1109/TDSC.2016.2601603 DOI: https://doi.org/10.1109/TDSC.2016.2601603

Downloads

Published

04-11-2024

Issue

Section

Research Articles

How to Cite

[1]
Sharath Chandra Thurupati, “The Usability Paradigm in Passwordless Authentication : A Comparative Study of YubiKey and Passkey Implementations”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 6, pp. 12–21, Nov. 2024, doi: 10.32628/CSEIT24106152.

Similar Articles

1-10 of 87

You may also start an advanced similarity search for this article.