To read this content please select one of the options below:

An experimental comparison of secret‐based user authentication technologies

I. Irakleous (Research Student, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK)
S.M. Furnell (Head of Group, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK)
P.S. Dowland (Lecturer, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK)
M. Papadaki (Research Student, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 August 2002

811

Abstract

The paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against alternative methods involving question and answer responses and graphical representation. All methods share the common basis of some secret knowledge and rely upon the user’s ability to recall it in order to achieve authentication. An experimental trial is described, along with the results based upon 27 participants. The alternative methods are assessed in terms of practical effectiveness (in this context relating to the participant’s ability to authenticate themselves a significant time after initial use of the methods), as well as the perceived levels of user friendliness and security that they provide. The investigation concludes that while passwords and PIN approaches garner good ratings on the basis of their existing familiarity to the participants, other methods based upon image recall and cognitive questions also achieved sufficiently positive results to suggest them as viable alternatives in certain contexts.

Keywords

Citation

Irakleous, I., Furnell, S.M., Dowland, P.S. and Papadaki, M. (2002), "An experimental comparison of secret‐based user authentication technologies", Information Management & Computer Security, Vol. 10 No. 3, pp. 100-108. https://doi.org/10.1108/09685220210431854

Publisher

:

MCB UP Ltd

Copyright © 2002, MCB UP Limited

Related articles