A Study on Usability and Security of Mid-Air Gesture-Based Locking System

  • BoYu Gao
  • HyungSeok Kim
  • J. Divya Udayan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 750)


To balance usability and security is an important aspect to be considered in any authentication systems including locking systems. Conventional authentication methods such as text and PINs passwords sacrifice security over usability, while freeform gesture passwords have been introduced as an alternative method, which sacrifices usability over security. In this work, the mid-air-based gesture authentication method for locking system is proposed, and the several criteria on discussion of its advantages over existing ones (PINs and freeform gesture-based methods) through the survey questionnaire was designed. We adopted the Multi-Criteria Satisfaction Analysis (MUSA) to analyze the user’s satisfaction according to the proposed criteria. In addition, the correlation between participants’ satisfaction and three aspects, age difference, gender difference, and education levels, were analyzed. The result revealed the better satisfaction on dimensions of security, use frequency and friendly experience in mid-air gesture authentication.


Usability Security Mid-air gesture-based authentication Evaluation criteria 



This work was partially supported by the Bio-Synergy Research Project (NRF-2013M3A9C4078140) of the Ministry of Science, ICT and Future Planning through the National Research Foundation and Cooperative R&D between Industry, Academy, and Research Institute funded through Korea Small and Medium Business Administration (Grants No.C0453564).


  1. 1.
    Kainda, R., Flechais, I., Roscoe, A.: Security and usability: analysis and evaluation. In: International Conference on Availability, Reliability, and Security, 2010. ARES’10, pp. 275–282 IEEE (2010)Google Scholar
  2. 2.
    Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K.: In search of usable security: five lessons from the field. IEEE Secur. Priv. 5, 19–24 (2004)CrossRefGoogle Scholar
  3. 3.
    Whitten, A., Tygar, J.: Usability of security: a case study. DTIC Document, Tech. Report (1998)Google Scholar
  4. 4.
    Merchant, K., Cai, J., Maurya, S.: System and method for authenticating a smart card using an authentication token transmitted to a smart card reader., US Patent 8,522,326, 27 Aug 2013Google Scholar
  5. 5.
    Blakley III, G.R., Hinton, H.M.: Method and system for proof-of-possession operations associated with authentication assertions in a heterogeneous federated environment. US Patent 8,554,930, 8 Oct 2013Google Scholar
  6. 6.
    Gorman, L.O.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)CrossRefGoogle Scholar
  7. 7.
    Payne, B.D., Edwards, W.K.: A brief introduction to usable security. Internet Comput. IEEE 12(3), 13–21 (2008)CrossRefGoogle Scholar
  8. 8.
    Vu, K.P.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.L.B., Cook, J., Schultz, E.E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. Comput. Stud. 65(8), 744–757 (2007)CrossRefGoogle Scholar
  9. 9.
    Brostoff, S., Sasse, M.A., Are passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV Usability or Else!, pp. 405–424. Springer (2000)Google Scholar
  10. 10.
    Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004)Google Scholar
  11. 11.
    Thorpe, J., van Oorschot, P.C.: Graphical dictionaries and the memorable space of graphical passwords. In: USENIX Security Symposium, pp. 135–150 (2004)Google Scholar
  12. 12.
    Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: accelerometer-based personalized gesture recognition and its applications. Pervasive Mobile Comput. 5(6), 657–675 (2009)CrossRefGoogle Scholar
  13. 13.
    Luff, P., Frohlich, D., Gilbert, N.G.: Computers and Conversation. Elsevier, Burlington (2014)Google Scholar
  14. 14.
    Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a single triaxis accelerometer. In: Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, p. 15. ACM (2009)Google Scholar
  15. 15.
    Wu, J., Christianson, J, Konrad, J., Ishwar, P.: Leveraging shape and depth in user authentication from in-air hand gestures. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 3195–3199. IEEE (2015)Google Scholar
  16. 16.
    Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.K.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451–456. IEEE (2012)Google Scholar
  17. 17.
    Aslan, I., Uhl, A., Meschtscherjakov, A., Tscheligi, M., Design and exploration of mid-air authentication gestures. ACM Trans. Interact. Intell. Syst. 6(3) (2016) (Article 23)Google Scholar
  18. 18.
    Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: GazeTouchPass: multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2156–2164 (2016)Google Scholar
  19. 19.
    Ipsilandis, P., Samaras, G., Mplanas, N.: A multicriteria satisfaction analysis approach in the assessment of operational programmes. Int. J. Project Manage. 26(6), 601–611 (2008)CrossRefGoogle Scholar
  20. 20.
    Muhtaseb, R., et al.: Applying a multicriteria satisfaction analysis approach based on user preferences to rank usability attributes in e-tourism websites. J. Theor. Appl. Electron. Commer. Res. 7(3), 28–43 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.College of Cyber SecurityJinan UniversityGuangzhouChina
  2. 2.Department of SoftwareKonkuk UniversitySeoulRepublic of Korea
  3. 3.School of Information Technology and EngineeringVIT UniversityVelloreIndia

Personalised recommendations