An empirical study of touch-based authentication methods on smartwatches

Yue Zhao, Zhongtian Qiu, Yiqing Yang, Weiwei Li, Mingming Fan

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

17 Citations (Scopus)

Abstract

The emergence of smartwatches poses new challenges to information security. Although there are mature touch-based authentication methods for smartphones, the effectiveness of using these methods on smartwatches is still unclear. We conducted a user study (n=16) to evaluate how authentication methods (PIN and Pattern), UIs (Square and Circular), and display sizes (38mm and 42mm) affect authentication accuracy, speed, and security. Circular UIs are tailored to smartwatches with fewer UI elements. Results show that 1) PIN is more accurate and secure than Pattern; 2) Pattern is much faster than PIN; 3) Square UIs are more secure but less accurate than Circular UIs; 4) display size does not affect accuracy or speed, but security; 5) Square PIN is the most secure method of all. The study also reveals a security concern that participants' favorite method is not the best in any of the measures. We finally discuss implications for future touch-based smartwatch authentication design.

Original languageEnglish
Title of host publicationISWC 2017 - Proceedings of the 2017 ACM International Symposium on Wearable Computers
PublisherAssociation for Computing Machinery
Pages122-125
Number of pages4
ISBN (Electronic)9781450351881
Publication statusPublished - 11 Sept 2017
Externally publishedYes
Event29th ACM International Symposium on Wearable Computers, ISWC 2017 - Maui, United States
Duration: 11 Sept 201715 Sept 2017

Publication series

NameProceedings - International Symposium on Wearable Computers, ISWC
VolumePart F130534
ISSN (Print)1550-4816

Conference

Conference29th ACM International Symposium on Wearable Computers, ISWC 2017
Country/TerritoryUnited States
CityMaui
Period11/09/1715/09/17

Bibliographical note

Publisher Copyright:
© 2017 Association for Computing Machinery.

Keywords

  • Authentication
  • Empirical study
  • Security
  • Smartwatch

Fingerprint

Dive into the research topics of 'An empirical study of touch-based authentication methods on smartwatches'. Together they form a unique fingerprint.

Cite this