{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T23:59:24Z","timestamp":1768694364159,"version":"3.49.0"},"reference-count":47,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T00:00:00Z","timestamp":1680048000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,25]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>With the increasing proliferation of security-critical voice-based services such as voice banking, user authentication on smart speakers is becoming a vital requirement. Prior research on verifying the speaker\u2019s identity has been taken a technical perspective predominantly, while respective user-centered research is scarce. To investigate authentication methods for smart speakers from a user\u2019s perspective, we conducted a multi-method experiment. In a comprehensive online survey (<jats:italic>n<\/jats:italic> = 696) and a comparative lab study (<jats:italic>n<\/jats:italic> = 18) with an advanced functional prototype we studied 6 authentication methods (spoken PIN, biometrics, app with button\/voice confirmation, card reader, sound authentication) regarding their perceived security and ease of use. While token-based authentication approaches (in particular an authenticator app on a smartphone) typically are perceived as more secure, they are found inferior when it comes to the ease of use. The currently most frequently used authentication method for smart speakers, the spoken PIN method, seems to represent a compromise between security and ease of use. The sophisticated sound authentication was appreciated for its ease of use, however, was rated worst regarding the perceived security.<\/jats:p>","DOI":"10.1515\/icom-2022-0039","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T19:08:23Z","timestamp":1680116903000},"page":"67-81","source":"Crossref","is-referenced-by-count":6,"title":["Authentication methods for voice services on smart speakers \u2013 a multi-method study on perceived security and ease of use"],"prefix":"10.1515","volume":"22","author":[{"given":"Andreas","family":"Renz","sequence":"first","affiliation":[{"name":"Skyguide Swiss Air Navigation Services Ltd , Wangen bei D\u00fcbendorf , Switzerland"}]},{"given":"Thomas","family":"Neff","sequence":"additional","affiliation":[{"name":"Innovation Process Technology AG , Bern , Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1876-5082","authenticated-orcid":false,"given":"Matthias","family":"Baldauf","sequence":"additional","affiliation":[{"name":"Eastern Switzerland University of Applied Sciences , Institute for Information and Process Management , St. Gallen , Switzerland"}]},{"given":"Edith","family":"Maier","sequence":"additional","affiliation":[{"name":"Eastern Switzerland University of Applied Sciences , Institute for Information and Process Management , St. Gallen , Switzerland"}]}],"member":"374","published-online":{"date-parts":[[2023,3,29]]},"reference":[{"key":"2025042611001153168_j_icom-2022-0039_ref_001","unstructured":"Statista. Smart Speakers \u2013 Statistics & Facts, 2022. https:\/\/www.statista.com\/topics\/4748\/smart-speakers (accessed Nov 15, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_002","doi-asserted-by":"crossref","unstructured":"Ammari, T., Kaye, J., Tsai, J. Y., Bentley, F. Music, search, and iot: how people (really) use voice assistants. ACM Trans. Comput. Hum. Interact. 2019, 26, 1\u201328. https:\/\/doi.org\/10.1145\/3311956.","DOI":"10.1145\/3311956"},{"key":"2025042611001153168_j_icom-2022-0039_ref_003","unstructured":"Ally Bank. The Ally Skill for Amazon Alexa, 2019. https:\/\/www.ally.com\/bank\/online-banking\/how-to-bank-with-ally\/alexa\/ (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_004","doi-asserted-by":"crossref","unstructured":"Baldauf, M., Zimmermann, H. D. Towards conversational e-government. In HCI in Business, Government and Organizations; Springer International Publishing: Copenhagen, Denmark, 2020; pp. 3\u201314.","DOI":"10.1007\/978-3-030-50341-3_1"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_005.1","doi-asserted-by":"crossref","unstructured":"Anand, S. A., Liu, J., Wang, C., Shirvanian, M., Saxena, N., Echovib, Y. C. Exploring voice authentication via unique non-linear vibrations of short replayed speech. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, ASIA CCS '21","DOI":"10.1145\/3433210.3437518"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_005.2","unstructured":"Association for Computing Machinery: New York, USA, 2021, pp.\u00a067-81."},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_006.1","doi-asserted-by":"crossref","unstructured":"Blue, L., Abdullah, H., Vargas, L., Traynor, P. 2ma: verifying voice commands vie two microphone authentication. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18","DOI":"10.1145\/3196494.3196545"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_006.2","doi-asserted-by":"crossref","unstructured":"Kim, J., Ahn, G. J., Kim, S., Kim, Y., Lopez, J., Kim, T., Eds. ACM Press: New York, USA, 2018, pp.\u00a089-100.","DOI":"10.1145\/3210825.3210829"},{"key":"2025042611001153168_j_icom-2022-0039_ref_007","doi-asserted-by":"crossref","unstructured":"Feng, H., Fawaz, K., Shin, K. G. Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking \u2013 MobiCom \u201917; van der Merwe, K., Greenstein, B., Srinivasan, K., Eds. ACM Press: New York, USA, 2017, pp.\u00a0343\u2013355.","DOI":"10.1145\/3117811.3117823"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_008.1","doi-asserted-by":"crossref","unstructured":"Kwak, I. Y., Huh, J. H., Han, S. T., Kim, I., Yoon, J. Voice presentation attack detection through text-converted voice command analysis. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI '19","DOI":"10.1145\/3290605.3300828"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_008.2","unstructured":"Association for Computing Machinery: New York, USA, 2019, pp.\u00a01-12."},{"key":"2025042611001153168_j_icom-2022-0039_ref_009","unstructured":"Sudharsan, B., Ali, M. I., Corcoran, P. Smart speaker design and implementation with biometric authentication and advanced voice interaction capability. In 27th AIAI Irish Conference on Artificial Intelligence and Cognitive Science; CEUR-WS.Org: Aachen, 2019."},{"key":"2025042611001153168_j_icom-2022-0039_ref_010","doi-asserted-by":"crossref","unstructured":"Wang, Y., Cai, W., Gu, T., Shao, W., Li, Y., Yu, Y. Secure your voice: an oral airflow-based continuous liveness detection for voice assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2019, 3, 1\u201328. https:\/\/doi.org\/10.1145\/3369811.","DOI":"10.1145\/3369811"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_011.1","doi-asserted-by":"crossref","unstructured":"Zhang, L., Tan, S., Yang, J. Hearing your voice is not enough. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17","DOI":"10.1145\/3133956.3133962"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_011.2","unstructured":"Thuraisingham, B., Evans, D., Malkin, T., Xu, D., Eds. ACM Press: New York, USA, 2017, pp.\u00a057-71."},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_012.1","unstructured":"Ponticello, A., Fassl, M., Krombholz, K. Exploring authentication for security-sensitive tasks on smart home voice assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_012.2","unstructured":"USENIX Association: Berkeley, CA, USA, 2021, pp.\u00a0475-492."},{"key":"2025042611001153168_j_icom-2022-0039_ref_013","doi-asserted-by":"crossref","unstructured":"Braz, C., Robert, J. M. Security and usability: the case of the user authentication methods. In Proceedings of the 18th Conference on l\u2019Interaction Homme-Machine, IHM \u201906; Association for Computing Machinery: New York, USA, 2006, pp.\u00a0199\u2013203.","DOI":"10.1145\/1132736.1132768"},{"key":"2025042611001153168_j_icom-2022-0039_ref_014","unstructured":"Google. Link Your Voice to Your Google Assistant Device with Voice Match \u2013 Android \u2013 Google Assistant Help, 2019. https:\/\/support.google.com\/assistant\/answer\/9071681 (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_015","doi-asserted-by":"crossref","unstructured":"Chang, Y. T., Marc, D. My voiceprint is my authenticator: a two-layer authentication approach using voiceprint for voice assistants. In 2019 IEEE SmartWorld, editor, Conference: 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation; IEEE: Leicester, England, 2019.","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00243"},{"key":"2025042611001153168_j_icom-2022-0039_ref_016","unstructured":"Rao, V. S., Song, T. Biometric Enabled Proximity-based User Authentication. In Technical Disclosure Commons, (July 09), 2018. https:\/\/www.tdcommons.org\/dpubs_series\/1296."},{"key":"2025042611001153168_j_icom-2022-0039_ref_017","unstructured":"Meva, D. T., Kumbharana, C. K. Comparative study of different fusion techniques in multimodal biometric authentication. In International Journal of Computer Applications (0975 \u2013 8887); Foundation of Computer Science (FCS): New York, USA, 2013, pp.\u00a016\u201319."},{"key":"2025042611001153168_j_icom-2022-0039_ref_018","doi-asserted-by":"crossref","unstructured":"Liu, R., Cornelius, C., Rawassizadeh, R., Peterson, R., Kotz, D. Vocal resonance. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 1\u201323. https:\/\/doi.org\/10.1145\/3191751.","DOI":"10.1145\/3191751"},{"key":"2025042611001153168_j_icom-2022-0039_ref_019","doi-asserted-by":"crossref","unstructured":"Lee, Y., Zhao, Y., Zeng, J., Lee, K., Zhang, N., Hossain Shezan, F., Tian, Y., Chen, K., Wang, X. F. Using sonar for liveness detection to protect smart speakers against remote attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2020, 4, 1\u201328. https:\/\/doi.org\/10.1145\/3380991.","DOI":"10.1145\/3380991"},{"key":"2025042611001153168_j_icom-2022-0039_ref_020","doi-asserted-by":"crossref","unstructured":"Zhang, S., Das, A. Handlock: enabling 2-fa for smart home voice assistants using inaudible acoustic signal. In Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID \u201921; Association for Computing Machinery: New York, USA, 2021, pp.\u00a0251\u2013265.","DOI":"10.1145\/3471621.3471866"},{"key":"2025042611001153168_j_icom-2022-0039_ref_021","doi-asserted-by":"crossref","unstructured":"Vassinen, R. The rise of conversational commerce: what brands need to know. J. Brand Strategy 2018, 7, 13\u201322.","DOI":"10.69554\/JHVL9858"},{"key":"2025042611001153168_j_icom-2022-0039_ref_022","unstructured":"U.S. Bank. How U.S. Bank Aims to Shape the Future of Voice Banking, 2018. https:\/\/www.usbank.com\/newsroom\/stories\/new-technology-you-can-bank-on.html (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_023","unstructured":"Collier, Z. The Story of the Capital One Alexa Skill, 2016. https:\/\/developer.amazon.com\/blogs\/alexa\/post\/c70e3a9b-405c-4fe1-bc20-bc0519d48c97\/the-story-of-the-capital-one-alexa-skill (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_024","unstructured":"Sparkasse. Sparkasse Banking-App, 2019. https:\/\/www.sparkasse.de\/unsere-loesungen\/privatkunden\/rund-ums-konto\/voice-banking\/voice-banking-sparkasse.html (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_025","unstructured":"Futurae. Futurae: Strong Authentication (2fa) and App Security, 2022. https:\/\/www.futurae.com\/smart-assistant\/ (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_026","doi-asserted-by":"crossref","unstructured":"Yan, C., Ji, X., Wang, K., Jiang, Q., Jin, Z., Xu, W. A survey on voice assistant security: attacks and countermeasures. ACM Comput. Surv. 2022, 55, 1\u201336. https:\/\/doi.org\/10.1145\/3527153.","DOI":"10.1145\/3527153"},{"key":"2025042611001153168_j_icom-2022-0039_ref_027","doi-asserted-by":"crossref","unstructured":"Lei, X., Tu, G. H., Liu, A. X., Li, C. Y., Xie, T. The insecurity of home digital voice assistants - vulnerabilities, attacks and countermeasures. In 2018 IEEE Conference on Communications and Network Security (CNS); IEEE: Beijing, China, 2018; pp. 1\u20139.","DOI":"10.1109\/CNS.2018.8433167"},{"key":"2025042611001153168_j_icom-2022-0039_ref_028","doi-asserted-by":"crossref","unstructured":"Roy, N., Hassanieh, H., Choudhury, R. R. Backdoor: sounds that a microphone can record, but that humans can\u2019t hear. GetMobile: Mobile Comp. and Comm. 2018, 21, 25\u201329. https:\/\/doi.org\/10.1145\/3191789.3191799.","DOI":"10.1145\/3191789.3191799"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_029.1","doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W. Dolphinattack: inaudible voice commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17","DOI":"10.1145\/3133956.3134052"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_029.2","unstructured":"Association for Computing Machinery: New York, USA, 2017, pp.\u00a0103-117."},{"key":"2025042611001153168_j_icom-2022-0039_ref_030","unstructured":"Kumar, D., Paccagnella, R., Paul, M., Hennenfent, E., Mason, J., Adam, B., Bailey, M. Skill squatting attacks on amazon alexa. In Proceedings of the 27th USENIX Conference on Security Symposium, SEC\u201918; USENIX Association: Berkeley, CA, USA, 2018, pp.\u00a033\u201347."},{"key":"2025042611001153168_j_icom-2022-0039_ref_031","doi-asserted-by":"crossref","unstructured":"Zhang, N., Mi, X., Feng, X., Wang, X. F., Tian, Y., Qian, F. Dangerous skills: understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In 2019 IEEE Symposium on Security and Privacy (SP); IEEE: Los Alamitos, CA, USA, 2019.","DOI":"10.1109\/SP.2019.00016"},{"key":"2025042611001153168_j_icom-2022-0039_ref_032","unstructured":"Microsoft. Microsoft Authenticator \u2013 Apps on Google Play, 2021. https:\/\/play.google.com\/store\/apps\/details?id=com.azure.authenticator, 04\/01\/2020 06:23:54 (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_033","unstructured":"Google. Google authenticator \u2013 apps on google play, 2021. https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2 (accessed Nov 01, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_034","doi-asserted-by":"crossref","unstructured":"Johnson, D. R., Creech, J. C. Ordinal measures in multiple indicator models: a simulation study of categorization error. Am. Socio. Rev. 1983, 48, 398. https:\/\/doi.org\/10.2307\/2095231.","DOI":"10.2307\/2095231"},{"key":"2025042611001153168_j_icom-2022-0039_ref_035","doi-asserted-by":"crossref","unstructured":"Braun, V., Clarke, V. Thematic analysis. In APA Handbook of Research Methods in Psychology, Vol 2: Research Designs: Quantitative, Qualitative, Neuropsychological, and Biological; American Psychological Association: Washington, DC, 2012, pp.\u00a057\u201371.","DOI":"10.1037\/13620-004"},{"key":"2025042611001153168_j_icom-2022-0039_ref_036","unstructured":"Dietrich, A., Rey, R., Rommel, H., R\u00fcesch, S. Wie nutzen Schweizerinnen und Schweizer das E-Banking und Mobile Banking? 2020. https:\/\/hub.hslu.ch\/retailbanking\/wie-nutzen-schweizerinnen-und-schweizer-das-e-banking-und-mobile-banking\/ (accessed Nov 18, 2022)."},{"key":"2025042611001153168_j_icom-2022-0039_ref_037","unstructured":"Abdi, N., Ramokapane, K. M., Such, J. M. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security, SOUPS\u201919; USENIX Association: USA, 2019, pp.\u00a0451\u2013466."},{"key":"2025042611001153168_j_icom-2022-0039_ref_038","doi-asserted-by":"crossref","unstructured":"Yao, Y., Reed Basdeo, J., Mcdonough, O. R., Wang, Y. Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum.-Comput. Interact. 2019, 3, 1\u201324. https:\/\/doi.org\/10.1145\/3359161.","DOI":"10.1145\/3359161"},{"key":"2025042611001153168_j_icom-2022-0039_ref_039","doi-asserted-by":"crossref","unstructured":"Baldauf, M., B\u00f6sch, R., Frei, C., Hautle, F., Jenny, M. Exploring requirements and opportunities of conversational user interfaces for the cognitively impaired. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, MobileHCI \u201918; Association for Computing Machinery: New York, USA, 2018, pp.\u00a0119\u2013126.","DOI":"10.1145\/3236112.3236128"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_040.1","doi-asserted-by":"crossref","unstructured":"Renz, A., Baldauf, M., Maier, E., Alt, F. Alexa, it's me! an online survey on the user experience of smart speaker authentication. In Proceedings of Mensch Und Computer 2022, MuC '22","DOI":"10.1145\/3543758.3543765"},{"key":"#cr-split#-2025042611001153168_j_icom-2022-0039_ref_040.2","unstructured":"Association for Computing Machinery: New York, USA, 2022, pp.\u00a014-24."}],"container-title":["i-com"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2022-0039\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2022-0039\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T11:00:28Z","timestamp":1745665228000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2022-0039\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,29]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3,29]]},"published-print":{"date-parts":[[2023,4,25]]}},"alternative-id":["10.1515\/icom-2022-0039"],"URL":"https:\/\/doi.org\/10.1515\/icom-2022-0039","relation":{},"ISSN":["2196-6826"],"issn-type":[{"value":"2196-6826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,29]]}}}