Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use
With the increasing proliferation of security-critical voice-based services such as voice banking, user authentication on smart speakers is becoming a vital requirement. Prior research on verifying the speaker’s identity has been taken a technical perspective predominantly, while respective user-cen...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2023-03-01
|
Series: | i-com |
Subjects: | |
Online Access: | https://doi.org/10.1515/icom-2022-0039 |
_version_ | 1797646322199691264 |
---|---|
author | Renz Andreas Neff Thomas Baldauf Matthias Maier Edith |
author_facet | Renz Andreas Neff Thomas Baldauf Matthias Maier Edith |
author_sort | Renz Andreas |
collection | DOAJ |
description | With the increasing proliferation of security-critical voice-based services such as voice banking, user authentication on smart speakers is becoming a vital requirement. Prior research on verifying the speaker’s identity has been taken a technical perspective predominantly, while respective user-centered research is scarce. To investigate authentication methods for smart speakers from a user’s perspective, we conducted a multi-method experiment. In a comprehensive online survey (n = 696) and a comparative lab study (n = 18) with an advanced functional prototype we studied 6 authentication methods (spoken PIN, biometrics, app with button/voice confirmation, card reader, sound authentication) regarding their perceived security and ease of use. While token-based authentication approaches (in particular an authenticator app on a smartphone) typically are perceived as more secure, they are found inferior when it comes to the ease of use. The currently most frequently used authentication method for smart speakers, the spoken PIN method, seems to represent a compromise between security and ease of use. The sophisticated sound authentication was appreciated for its ease of use, however, was rated worst regarding the perceived security. |
first_indexed | 2024-03-11T14:59:56Z |
format | Article |
id | doaj.art-9ef7ee8e7ebd42d69749d9f09f7439f6 |
institution | Directory Open Access Journal |
issn | 2196-6826 |
language | English |
last_indexed | 2024-03-11T14:59:56Z |
publishDate | 2023-03-01 |
publisher | De Gruyter |
record_format | Article |
series | i-com |
spelling | doaj.art-9ef7ee8e7ebd42d69749d9f09f7439f62023-10-30T07:58:26ZengDe Gruyteri-com2196-68262023-03-01221678110.1515/icom-2022-0039Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of useRenz Andreas0Neff Thomas1Baldauf Matthias2Maier Edith3Skyguide Swiss Air Navigation Services Ltd, Wangen bei Dübendorf, SwitzerlandInnovation Process Technology AG, Bern, SwitzerlandEastern Switzerland University of Applied Sciences, Institute for Information and Process Management, St. Gallen, SwitzerlandEastern Switzerland University of Applied Sciences, Institute for Information and Process Management, St. Gallen, SwitzerlandWith the increasing proliferation of security-critical voice-based services such as voice banking, user authentication on smart speakers is becoming a vital requirement. Prior research on verifying the speaker’s identity has been taken a technical perspective predominantly, while respective user-centered research is scarce. To investigate authentication methods for smart speakers from a user’s perspective, we conducted a multi-method experiment. In a comprehensive online survey (n = 696) and a comparative lab study (n = 18) with an advanced functional prototype we studied 6 authentication methods (spoken PIN, biometrics, app with button/voice confirmation, card reader, sound authentication) regarding their perceived security and ease of use. While token-based authentication approaches (in particular an authenticator app on a smartphone) typically are perceived as more secure, they are found inferior when it comes to the ease of use. The currently most frequently used authentication method for smart speakers, the spoken PIN method, seems to represent a compromise between security and ease of use. The sophisticated sound authentication was appreciated for its ease of use, however, was rated worst regarding the perceived security.https://doi.org/10.1515/icom-2022-0039conversational servicesuser authenticationvoice assistant |
spellingShingle | Renz Andreas Neff Thomas Baldauf Matthias Maier Edith Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use i-com conversational services user authentication voice assistant |
title | Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use |
title_full | Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use |
title_fullStr | Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use |
title_full_unstemmed | Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use |
title_short | Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use |
title_sort | authentication methods for voice services on smart speakers a multi method study on perceived security and ease of use |
topic | conversational services user authentication voice assistant |
url | https://doi.org/10.1515/icom-2022-0039 |
work_keys_str_mv | AT renzandreas authenticationmethodsforvoiceservicesonsmartspeakersamultimethodstudyonperceivedsecurityandeaseofuse AT neffthomas authenticationmethodsforvoiceservicesonsmartspeakersamultimethodstudyonperceivedsecurityandeaseofuse AT baldaufmatthias authenticationmethodsforvoiceservicesonsmartspeakersamultimethodstudyonperceivedsecurityandeaseofuse AT maieredith authenticationmethodsforvoiceservicesonsmartspeakersamultimethodstudyonperceivedsecurityandeaseofuse |