Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

08/24/2020
by   Hassan Khan, et al.
0

Personal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured interviews (n=35), participants reported on PIN usage for different types of assets, including how users choose, share, inherit, and reuse PINs, as well as behaviour following the compromise of a PIN. We find that memorability is the most important criterion when choosing a PIN, more so than security or concerns of reuse. Updating or changing a PIN is very uncommon, even when a PIN is compromised. Participants reported sharing PINs for one type of asset with acquaintances but inadvertently reused them for other assets, thereby subjecting themselves to potential risks. Participants also reported using PINs originally set by previous homeowners for physical devices (e.g., alarm or keypad door entry systems). While aware of the risks of not updating PINs, this did not always deter participants from using inherited PINs, as they were often missing instructions on how to update them. aware of the risks of not updating PINs, participants continued using these PINs, as they were often missing instructions on how to update them.Given the expected increase in PIN-protected assets (e.g., loyalty cards, smart locks, and web apps), we provide suggestions and future research directions to better support users with multiple digital and non-digital assets and more secure human-device interaction when utilizing PINs.

READ FULL TEXT
research
12/23/2020

If This Context Then That Concern: Exploring users' concerns with IFTTT applets

End users are increasingly using trigger-action platforms like, If-This-...
research
02/15/2023

FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones

Modern smartphones support FIDO2 passwordless authentication using eithe...
research
10/09/2019

Aegis: A Context-aware Security Framework for Smart Home Systems

Our everyday lives are expanding fast with the introduction of new Smart...
research
03/09/2022

Usage Control Specification, Enforcement, and Robustness: A Survey

The management of data and digital assets poses various challenges, incl...
research
12/04/2022

"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications

Voice-controlled smart speaker devices have gained a foothold in many mo...
research
12/24/2017

Studying the Impact of Managers on Password Strength and Reuse

Despite their well-known security problems, passwords are still the incu...

Please sign up or login with your details

Forgot password? Click here to reset