Usability Assessment of the OnlyKey Hardware Two-Factor Authentication Key Among Low Vision or Blind Users

08/10/2023
by   Aziz Zeidieh, et al.
0

Hardware security keys undoubtedly have advantage for users as "usability" pain is trivial compared to the maximum "security" gain in authentication. Naturally, the hardware factor in the authentication received a widespread adoption amongst average users, as it is ergonomically less demanding than phone texts or authentication prompts. This ergonomic advantage in particular is essential for users who are blind or low vision, as their interaction with a phone is impractical. However, the "usability" for low vision or blind users pain might be much higher than an average well-bodied user for the same "security" gain. In an effort to learn more we conducted a usability assessment with ten low vision or blind users setting up the OnlyKey two-factor authentication key. First, the setup process was insurmountable for more than half of the participants, resulting in a situation where the hardware key was abandoned. Secondly, the lack of tactile orientation led participants to consider it as both impractical, and prone to difficulties locating or loosing it. We discuss the implications of our findings for future improvements in usable authentication for visually impaired users.

READ FULL TEXT
research
07/02/2018

Tap-based User Authentication for Smartwatches

This paper presents TapMeIn, an eyes-free, two-factor authentication met...
research
07/01/2019

Geographical Security Questions for Fallback Authentication

Fallback authentication is the backup authentication method used when th...
research
06/13/2023

Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance

Since the introduction of bcrypt in 1999, adaptive password hashing func...
research
10/29/2021

2D-2FA: A New Dimension in Two-Factor Authentication

We propose a two-factor authentication (2FA) mechanism called 2D-2FA to ...
research
11/05/2020

Lessons Learnt from a 2FA roll out within a higher education organisation

Rolling out a new security mechanism in an organisation requires plannin...
research
06/02/2021

Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints

The security of messaging applications against person-in-the-middle atta...

Please sign up or login with your details

Forgot password? Click here to reset