NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones
Abstract
1. Introduction
1.1. Motivation
1.2. Near-Range Extended Reality for 2FA
1.3. Research Questions
- RQ1: Is it possible to use NRXR to support people in the process of confirming their identity via two-factor authentication?
- RQ2: What type of authentication challenges and modalities are most suitable for implementing a user-friendly form of two-factor authentication in the XR context?
- RQ3: When implementing two-factor authentication using NRXR, what is most effective for users: to present a challenge using the smartphone and have the challenge answered within VR, or the other way around?
- RQ4: What are users’ experiences, impressions, and preferences on two-factor authentication when using NRXR?
2. Related Work
Using Smartphones in VR
3. Methodology
3.1. CAPTCHA-Style Challenge
3.2. Numeric Code Challenge
3.3. Checkers Matching Challenge
3.4. Alphanumeric Password Challenge
3.5. Configuration Possibilities for 2FA in XR
3.5.1. Condition 1: HMD1_Phone2
3.5.2. Condition 2: Phone1_SVRP2
3.5.3. Condition 3: Phone1_VRC2 (a.k.a. the Baseline)
3.6. Overview
3.7. System Hardware and Software
- Meta Quest 2. Featuring a resolution of 1832× 1920 pixels per eye and a refresh rate of 90 Hz, this headset provides a high-quality visual experience essential for immersion in virtual environments.
- –
- Software Package Requirements: Integration of the Oculus PC app for Meta Quest Link establishes a seamless connection between the headset and the Unity engine. This software enables efficient data transfer and real-time rendering, minimizing latency and maximizing responsiveness in interactions.
- Intel RealSense and Technology Developer Kit (SR300). This depth-sensing camera was incorporated to enhance close-range depth perception, a critical feature for user interactions within a VR context. The camera’s specifications (color resolution of 1920× 1080 at 30 frames per second along with an operating range of 0.3 m to 2 m) enable precise spatial awareness and tracking of user movements. Such capabilities are particularly important in tasks requiring accurate depth recognition because they allow the system to interpret user actions in real time and respond appropriately, thereby facilitating a more intuitive interaction model [70]. Depth Field of View: H = 73, V = 59, D = 90. Auto-exposure: Off. Brightness level: 350 (set inside Unity).
- ZTE Z557BL Smartphone, ZTE, Shenzhen, China. This device has a touchscreen resolution of 480× 854 pixels along with basic processing capabilities suitable for the application’s requirements. The smartphone has 1.0 GB RAM and 8 GB storage. Android version: 8.1.0. Dimensions: 14.53 × 7.19 × 0.91 cm.
- Software requirements. We used SteamVR Runtime for Windows along with Unity-compatible Intel RealSense SDK 2.0 to ensure cohesive operation among all hardware components within the Unity environment. We selected version (2020.3.25f1) of Unity.
3.7.1. Blending of the RGBD Camera Feed
3.7.2. Preventing Overexposure During Smartphone Display Capture
4. Experimental Design
- How much did you like this way of authenticating?1 (I did not like it at all) 2 3 4 (Neutral) 5 6 7 (I liked it very much)
- On a scale from 1 to 7, How effective did you find this way of authenticating?1 (Not effective at all) 2 3 4 (Neutral) 5 6 7 (Very effective)
- On a scale from 1 to 7, How easy to use did you find this way of authenticating?1 (Not easy at all) 2 3 4 (Neutral) 5 6 7 (Very easy)
Data Analysis
5. Results
5.1. Participant Demographics
5.2. Performance Metrics
Interactions Between Challenge Types and Conditions
5.3. Participant Feedback
5.3.1. Structured Feedback Analysis
5.3.2. Unstructured Feedback Analysis
5.4. Summary of Results
6. Discussion
6.1. Security Considerations and Potential Vulnerabilities
6.2. Ethical Considerations for Real-World Deployment
6.3. Limitations
6.4. Future Work
Summary of Future Work
6.5. Design Implications of the Findings
7. Conclusions
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Landwehr, C.E. Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water. IEEE Secur. Priv. 2008, 6, 3–4. [Google Scholar] [CrossRef]
- Al-Hasan, M.; Deb, K.; Rahman, M.O. User-authentication approach for data security between smartphone and cloud. In Proceedings of the 2013 8th International Forum on Strategic Technology (IFOST 2013), Ulaanbaatar, Mongolia, 28 June–1 July2013; Volume 2, pp. 2–6. [Google Scholar] [CrossRef]
- Flores, P. Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity. In Proceedings of the 2019 Sixth HCT Information Technology Trends (ITT), Ras Al Khaimah, United Arab Emirates, 20–21 November 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Al-Hadadi, M.; Shidhani, A.A. Smartphone security awareness: Time to act. In Proceedings of the 2013 International Conference on Current Trends in Information Technology (CTIT), Dubai, United Arab Emirates, 11–12 December 2013; pp. 166–171. [Google Scholar] [CrossRef]
- Henrysson, A.; Ollila, M. Augmented reality on smartphones. In Proceedings of the 2003 IEEE International Augmented Reality Toolkit Workshop, Tokyo, Japan, 7 October 2003; pp. 27–28. [Google Scholar] [CrossRef]
- Anastasaki, I.; Drosatos, G.; Pavlidis, G.; Rantos, K. User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review. Information 2023, 14, 538. [Google Scholar] [CrossRef]
- Mylonas, A.; Dritsas, S.; Tsoumas, B.; Gritzalis, D. Smartphone security evaluation The malware attack case. In Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18–21 July 2011; pp. 25–36. [Google Scholar]
- Dörflinger, T.; Voth, A.; Krämer, J.; Fromm, R. “My smartphone is a safe!” The user’s point of view regarding novel authentication methods and gradual security levels on smartphones. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), Athens, Greece, 26–28 July 2010; pp. 1–10. [Google Scholar]
- Oh, T.; Stackpole, B.; Cummins, E.; Gonzalez, C.; Ramachandran, R.; Lim, S. Best security practices for android, blackberry, and iOS. In Proceedings of the 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), Seoul, Republic of Korea, 18 June 2012; pp. 42–47. [Google Scholar] [CrossRef]
- Mashkina, I.V.; Guzairov, M.B.; Vasilyev, V.I.; Tuliganova, L.R.; Konovalov, A.S. Issues of information security control in virtualization segment of company information system. In Proceedings of the 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, Russia, 25–27 May 2016; pp. 161–163. [Google Scholar] [CrossRef]
- Sha, L.; Chen, X.; Xiao, F.; Wang, Z.; Long, Z.; Fan, Q.; Dong, J. VRVul-Discovery: BiLSTM-based Vulnerability Discovery for Virtual Reality Devices in Metaverse. ACM Trans. Multimed. Comput. Commun. Appl. 2025, 21, 1–19. [Google Scholar] [CrossRef]
- Wang, H.; Zhan, Z.; Shan, H.; Dai, S.; Panoff, M.; Wang, S. GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS’24), Salt Lake City, UT, USA, 14–18 October 2024; pp. 1731–1745. [Google Scholar] [CrossRef]
- Fujita, M.; Kurasaki, S.; Kanaoka, A. Securing Cross Reality: Unraveling the Risks of 3D Object Disguise on Head Mount Display. In Proceedings of the 13th International Conference on the Internet of Things (IoT’23), Nagoya, Japan, 7–10 November 2024; pp. 281–286. [Google Scholar] [CrossRef]
- Lebeck, K.; Ruth, K.; Kohno, T.; Roesner, F. Securing Augmented Reality Output. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 320–337. [Google Scholar] [CrossRef]
- Sabra, M.; Vinayaga-Sureshkanth, N.; Sharma, A.; Maiti, A.; Jadliwala, M. De-anonymizing VR Avatars using Non-VR Motion Side-channels. In Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’24), Seoul, Republic of Korea, 27–29 May 2024; pp. 54–65. [Google Scholar] [CrossRef]
- De Guzman, J.A.; Thilakarathna, K.; Seneviratne, A. Security and Privacy Approaches in Mixed Reality: A Literature Survey. ACM Comput. Surv. 2019, 52, 1–37. [Google Scholar] [CrossRef]
- Peter, F.K. AR/VR Security Risks: Protecting Digital Spaces and Virtual Identities. Available online: https://www.presencesecure.com/ar-vr-security-risks-protecting-digital-spaces-and-virtual-identities/ (accessed on 20 August 2025).
- Schmidt, L.; Yigitbas, E. Taxonomy and Analysis of Security Vulnerabilities, Privacy Violations and Potential Mitigation Strategies to XR Systems. In Proceedings of the 18th ACM International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’25), Corfu Island, Greece, 25–27 June 2025; pp. 368–375. [Google Scholar] [CrossRef]
- Acheampong, R.; Popovici, D.M.; Balan, T.C.; Rekeraho, A.; Oprea, I.A. A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality. Information 2025, 16, 430. [Google Scholar] [CrossRef]
- Dastgerdy, S. Virtual Reality and Augmented Reality Security: A Reconnaissance and Vulnerability Assessment Approach. arXiv 2024, arXiv:2407.15984. [Google Scholar] [CrossRef]
- Jubur, M.; Shrestha, P.; Saxena, N. An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools. ACM Comput. Surv. 2025, 57, 1–32. [Google Scholar] [CrossRef]
- Bhanderi, D.; Kavathiya, M.; Bhut, T.; Kaur, H.; Mehta, M. Impact of Two-Factor Authentication on User Convenience and Security. In Proceedings of the 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 15–17 March 2023; pp. 617–622. [Google Scholar]
- McGill, M.; Boland, D.; Murray-Smith, R.; Brewster, S. A Dose of Reality: Overcoming Usability Challenges in VR Head-Mounted Displays. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15), Seoul, Republic of Korea, 18–23 April 2015; pp. 2143–2152. [Google Scholar] [CrossRef]
- Budhiraja, P.; Sodhi, R.; Jones, B.R.; Karsch, K.; Bailey, B.P.; Forsyth, D.A. Where’s My Drink? Enabling Peripheral Real World Interactions While Using HMDs. arXiv 2015, arXiv:1502.04744. [Google Scholar]
- Foerster, K.T.; Gross, A.; Hail, N.; Uitto, J.; Wattenhofer, R. SpareEye: Enhancing the safety of inattentionally blind smartphone users. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (MUM ’14), Melbourne, VIC, Australia, 25–28 November 2014; pp. 68–72. [Google Scholar] [CrossRef]
- Nahon, D.; Subileau, G.; Capel, B. “Never Blind VR” enhancing the virtual reality headset experience with augmented virtuality. In Proceedings of the 2015 IEEE Virtual Reality (VR), Arles, France, 23–27 March 2015; pp. 347–348. [Google Scholar] [CrossRef]
- Hartmann, J.; Holz, C.; Ofek, E.; Wilson, A.D. RealityCheck: Blending Virtual Environments with Situated Physical Reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI’19), Glasgow, UK, 4–9 May 2019; pp. 1–12. [Google Scholar] [CrossRef]
- Kanamori, K.; Sakata, N.; Tominaga, T.; Hijikata, Y.; Harada, K.; Kiyokawa, K. Obstacle Avoidance Method in Real Space for Virtual Reality Immersion. In Proceedings of the 2018 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), Munich, Germany, 16–20 October 2018; pp. 80–89. [Google Scholar] [CrossRef]
- Surale, H.B.; Gupta, A.; Hancock, M.; Vogel, D. TabletInVR: Exploring the Design Space for Using a Multi-Touch Tablet in Virtual Reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI’19), Glasgow, UK, 4–9 May 2019; pp. 1–13. [Google Scholar] [CrossRef]
- Zhu, F.; Grossman, T. BISHARE: Exploring Bidirectional Interactions Between Smartphones and Head-Mounted Augmented Reality. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI’20), Honolulu, HI, USA, 25–30 April 2020; pp. 1–14. [Google Scholar] [CrossRef]
- Ha, T.; Woo, W. ARWand: Phone-Based 3D Object Manipulation in Augmented Reality Environment. In Proceedings of the 2011 International Symposium on Ubiquitous Virtual Reality, Jeju Island, Republic of Korea, 1–4 July 2011; pp. 44–47. [Google Scholar] [CrossRef]
- Siddhpuria, S.; Malacria, S.; Nancel, M.; Lank, E. Pointing at a Distance with Everyday Smart Devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal, QC, Canada, 21–26 April 2018; pp. 1–11. [Google Scholar] [CrossRef]
- Wentzel, J.; Anderson, F.; Fitzmaurice, G.; Grossman, T.; Vogel, D. SwitchSpace: Understanding Context-Aware Peeking Between VR and Desktop Interfaces. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (CHI’24), Honolulu, HI, USA, 11–16 May 2024. [Google Scholar] [CrossRef]
- Lorensen, W.; Cline, H.; Nafis, C.; Kikinis, R.; Altobelli, D.; Gleason, L. Enhancing reality in the operating room. In Proceedings of the Visualization’93, San Jose, CA, USA, 25–29 October 1993; pp. 410–415. [Google Scholar] [CrossRef]
- Tecchia, F.; Avveduto, G.; Brondi, R.; Carrozzino, M.; Bergamasco, M.; Alem, L. I’m in VR! using your own hands in a fully immersive MR system. In Proceedings of the 20th ACM Symposium on Virtual Reality Software and Technology (VRST’14), Edinburgh, UK, 11–13 November 2014; pp. 73–76. [Google Scholar] [CrossRef]
- Biddle, R.; Chiasson, S.; Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 2012, 44, 1–41. [Google Scholar] [CrossRef]
- Liebers, J.; Brockel, S.; Gruenefeld, G.; Schneegass, S. Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality. Int. J. Hum.–Comput. Interact. 2024, 40, 409–424. [Google Scholar] [CrossRef]
- Rupp, D.; Grießer, P.; Bonsch, A.; Kuhlen, T.W. Authentication in Immersive Virtual Environments through Gesture-Based Interaction with a Virtual Agent. In Proceedings of the 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Orlando, FL, USA, 16–21 March 2024; pp. 54–60. [Google Scholar] [CrossRef]
- Huang, Y.; Zhang, D.; Rosenberg, E.S. DBA: Direction-Based Authentication in Virtual Reality. In Proceedings of the 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Shanghai, China, 25–29 March 2023; pp. 953–954. [Google Scholar] [CrossRef]
- Bologna, D.; Micciché, V.; Violo, G.; Visconti, A.; Cannavò, A.; Lamberti, F. SPHinX Authentication Technique: Secure Painting autHentication in eXtended reality. In Proceedings of the 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Shanghai, China, 25–29 March 2023; pp. 941–942. [Google Scholar] [CrossRef]
- Vora, R.A.; Bharadi, V.A.; Kekre, H.B. Retinal scan recognition using wavelet energy entropy. In Proceedings of the 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India, 19–20 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
- Daugman, J. 600 million Citizens of India Are Now Enrolled with Biometric ID. Available online: https://www.spie.org/news/5449-600-million-citizens-of-india-are-now-enrolled-with-biometric-id (accessed on 20 August 2025).
- Schneegass, S.; Oualil, Y.; Bulling, A. SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI’16), San Jose, CA, USA, 7–12 May 2016; pp. 1379–1384. [Google Scholar] [CrossRef]
- Heruatmadja, C.H.; Meyliana; Hidayanto, A.N.; Prabowo, H. Biometric as Secure Authentication for Virtual Reality Environment: A Systematic Literature Review. In Proceedings of the 2023 International Conference for Advancement in Technology (ICONAT), Goa, India, 24–26 January 2023; pp. 1–7. [Google Scholar] [CrossRef]
- Hadjidemetriou, G.; Belk, M.; Fidas, C.; Pitsillides, A. Picture Passwords in Mixed Reality: Implementation and Evaluation. In Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA’19), Glasgow, UK, 4–9 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Menzner, T.; Otte, A.; Gesslein, T.; Grubert, J.; Gagel, P.; Schneider, D. A Capacitive-sensing Physical Keyboard for VR Text Entry. In Proceedings of the 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), Osaka, Japan, 23–27 March 2019; pp. 1080–1081. [Google Scholar] [CrossRef]
- Kürtünlüoğlu, P.; Akdik, B.; Duygu, R.; Karaarslan, E. Towards More Secure Virtual Reality Authentication for the Metaverse: A Decentralized Method Proposal. In Proceedings of the 2023 16th International Conference on Information Security and Cryptology (ISCTürkiye), Ankara, Turkey, 18–19 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Mchale, S.; Murr, L.; Zhang, P. Using Decentralized Identifiers and InterPlanetary File System to Create a Recoverable Rare Disease Patient Identity Framework. In Proceedings of the 2023 7th International Conference on Medical and Health Informatics (ICMHI ’23), Kyoto, Japan, 12–14 May 2023; pp. 142–149. [Google Scholar] [CrossRef]
- Desai, A.P.; Pena-Castillo, L.; Meruvia-Pastor, O. A Window to your Smartphone: Exploring Interaction and Communication in Immersive VR with Augmented Virtuality. In Proceedings of the 2017 Computer and Robot Vision (CRV), Edmonton, AB, Canada, 16–19 May 2015. [Google Scholar]
- Alaee, G.; Deasi, A.P.; Pena-Castillo, L.; Brown, E.; Meruvia-Pastor, O. A User Study on Augmented Virtuality Using Depth Sensing Cameras for Near-Range Awareness in Immersive VR. In Proceedings of the IEEE VR’s 4th Workshop on Everyday Virtual Reality (WEVR 2018), Reutlingen, Germany, 18 March 2018. [Google Scholar]
- Mohr, P.; Tatzgern, M.; Langlotz, T.; Lang, A.; Schmalstieg, D.; Kalkofen, D. TrackCap: Enabling smartphones for 3D interaction on mobile head-mounted displays. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK, 4–9 May 2019. [Google Scholar] [CrossRef]
- Hattori, K.; Hirai, T. Inside-out Tracking Controller for VR/AR HMD using Image Recognition with Smartphones. In Proceedings of the ACM SIGGRAPH 2020 Posters, SIGGRAPH 2020, Virtual Event, USA, 17 August 2020; Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
- Zhang, L.; He, W.; Bai, H.; He, J.; Qiao, Y.; Billinghurst, M. A Hybrid 2D-3D Tangible Interface for Virtual Reality. In Proceedings of the ACM SIGGRAPH 2021 Posters, Virtual Event, USA, 9–13 August 2021. [Google Scholar] [CrossRef]
- Bai, H.; Zhang, L.; Yang, J.; Billinghurst, M. Bringing full-featured mobile phone interaction into virtual reality. Comput. Graph. 2021, 97, 42–53. [Google Scholar] [CrossRef]
- Unlu, A.E.; Xiao, R. PAIR: Phone as an Augmented Immersive Reality Controller. In Proceedings of the 27th ACM Symposium on Virtual Reality Software and Technology, Osaka, Japan, 8–10 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Hincapié-Ramos, J.D.; Özacar, K.; Irani, P.P.; Kitamura, Y. GyroWand: IMU-based Raycasting for Augmented Reality Head-Mounted Displays. In Proceedings of the SUI 2015—Proceedings of the 3rd ACM Symposium on Spatial User Interaction, Los Angeles, CA, USA, 8–9 August 2015; Association for Computing Machinery, Inc.: New York, NY, USA, 2015; pp. 89–98. [Google Scholar] [CrossRef]
- Young, T.S.; Teather, R.J.; Mackenzie, I.S. An arm-mounted inertial controller for 6DOF input: Design and evaluation. In Proceedings of the 2017 IEEE Symposium on 3D User Interfaces (3DUI 2017), Los Angeles, CA, USA, 18–19 March 2017; pp. 26–35. [Google Scholar] [CrossRef]
- Kharlamov, D.; Woodard, B.; Tahai, L.; Krzysztof, P. TickTockRay: Smartwatch-based 3D pointing for smartphone-based virtual reality. In Proceedings of the 22nd ACM Conference on Virtual Reality Software and Technology, Munich, Germany, 2–4 November 2016; pp. 363–364. [Google Scholar] [CrossRef]
- Kim, H.I.; Woo, W. Smartwatch-assisted robust 6-DOF hand tracker for object manipulation in HMD-based augmented reality. In Proceedings of the 2016 IEEE Symposium on 3D User Interfaces (3DUI 2016), Greenville, SC, USA, 19–20 March 2016; pp. 251–252. [Google Scholar] [CrossRef]
- Hirzle, T.; Gugenheimer, J.; Rixen, J.; Rukzio, E. WatchVR: Exploring the Usage of a Smartwatch for Interaction in Mobile Virtual Reality. In Proceedings of the Conference on Human Factors in Computing Systems, Montreal, QC, Canada, 21–26 April 2018; Association for Computing Machinery: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Park, K.B.; Lee, J.Y. New design and comparative analysis of smartwatch metaphor-based hand gestures for 3D navigation in mobile virtual reality. Multimed. Tools Appl. 2019, 78, 6211–6231. [Google Scholar] [CrossRef]
- Pietroszek, K.; Kuzminykh, A.; Wallace, J.R.; Lank, E. Smartcasting: A discount 3D interaction technique for public displays. In Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: The Future of Design, Sydney, Australia, 2–5 December 2014; pp. 119–128. [Google Scholar] [CrossRef]
- Aseeri, S.A.; Acevedo-Feliz, D.; Schulze, J. Poster: Virtual reality interaction using mobile devices. In Proceedings of the IEEE Symposium on 3D User Interface 2013 (3DUI 2013), Orlando, FL, USA, 16–17 March 2013; pp. 127–128. [Google Scholar] [CrossRef]
- Budhiraja, R.; Lee, G.A.; Billinghurst, M. Interaction techniques for HMD-HHD hybrid AR systems. In Proceedings of the 2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR 2013), Adelaide, Australia, 1–4 October 2013; pp. 243–244. [Google Scholar] [CrossRef]
- McDonald, B.; Zhang, Q.; Nanzatov, A.; Peña-Castillo, L.; Meruvia-Pastor, O. SmartVR Pointer: Using Smartphones and Gaze Orientation for Selection and Navigation in Virtual Reality. Sensors 2024, 24, 5168. [Google Scholar] [CrossRef] [PubMed]
- Zhu, F.; Sousa, M.; Sidenmark, L.; Grossman, T. PhoneInVR: An Evaluation of Spatial Anchoring and Interaction Techniques for Smartphone Usage in Virtual Reality. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI’24), Honolulu, HI, USA, 11–16 May 2024. [Google Scholar] [CrossRef]
- Pathmanathan, N.; Becher, M.; Rodrigues, N.; Reina, G.; Ertl, T.; Weiskopf, D.; Sedlmair, M. Eye vs. Head: Comparing Gaze Methods for Interaction in Augmented Reality. In Proceedings of the ACM Symposium on Eye Tracking Research and Applications (ETRA’20), Stuttgart, Germany, 2–5 June 2020. [Google Scholar] [CrossRef]
- Boletsis, C.; Kongsvik, S. Controller-based Text-input Techniques for Virtual Reality: An Empirical Comparison. Int. J. Virtual Real. 2019, 19, 2–15. [Google Scholar] [CrossRef]
- Blattgerste, J.; Renner, P.; Pfeiffer, T. Advantages of Eye-Gaze over Head-Gaze-Based Selection in Virtual and Augmented Reality under Varying Field of Views. In Proceedings of the Workshop on Communication by Gaze Interaction (COGAIN’18), Warsaw, Poland, 15 June 2018. [Google Scholar] [CrossRef]
- Ha, T.; Feiner, S.; Woo, W. WeARHand: Head-worn, RGB-D camera-based, bare-hand user interface with visually enhanced depth perception. In Proceedings of the 2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), Munich, Germany, 10–12 September 2014; pp. 219–228. [Google Scholar] [CrossRef]
- Brooke, J. SUS—A Quick and Dirty Usability Scale. 1990. Available online: https://digital.ahrq.gov/sites/default/files/docs/survey/systemusabilityscale%2528sus%2529_comp%255B1%255D.pdf (accessed on 20 August 2025).
- NASA; Hart; Staveland. NASA Task Load Index (TLX). 1990. Available online: https://humansystems.arc.nasa.gov/groups/TLX/index.php (accessed on 20 August 2025).
- Sauro, J.; Dumas, J.S. Comparison of three one-question, post-task usability questionnaires. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09), Boston, MA, USA, 4–9 April 2009; pp. 1599–1608. [Google Scholar] [CrossRef]
- Kennedy, R.S.; Lane, N.E.; Berbaum, K.S.; Lilienthal, M.G. Simulator Sickness Questionnaire: An Enhanced Method for Quantifying Simulator Sickness. Int. J. Aviat. Psychol. 1993, 3, 203–220. [Google Scholar] [CrossRef]
- Andrabi, S.J.; Reiter, M.K.; Sturton, C. Usability of augmented reality for revealing secret messages to users but not their devices. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (SOUPS’15), Ottawa, ON, Canada, 22–24 July 2015; pp. 89–102. [Google Scholar]
- Tirfe, D.; Anand, V.K. A Survey on Trends of Two-Factor Authentication. In Proceedings of the Contemporary Issues in Communication, Cloud and Big Data Analytics; Sarma, H.K.D., Balas, V.E., Bhuyan, B., Dutta, N., Eds.; Springer: Singapore, 2022; pp. 285–296. [Google Scholar]
- Abraham, M.; Saeghe, P.; Mcgill, M.; Khamis, M. Implications of XR on Privacy, Security and Behaviour: Insights from Experts. In Proceedings of the Nordic Human-Computer Interaction Conference (NordiCHI’22), Aarhus, Denmark, 8–12 October 2022. [Google Scholar] [CrossRef]
- X Reality Safety Intelligence. The XRSI Privacy Framework. 2020. Available online: https://xrsi.org/wp-content/uploads/2020/09/XRSI-Privacy-Framework-v1_002.pdf (accessed on 20 August 2025).
- Laubheimer, P. Beyond the NPS: Measuring Perceived Usability with the SUS, NASA-TLX, and the Single Ease Question After Tasks and Usability Tests. 2018. Available online: https://www.nngroup.com/articles/measuring-perceived-usability/ (accessed on 20 August 2025).
- Lamsweerde, A.v. Formal specification: A roadmap. In Proceedings of the Conference on The Future of Software Engineering (ICSE’00), Limerick, Ireland, 4–11 June 2000; pp. 147–159. [Google Scholar] [CrossRef]
- Emteq Labs; X Reality Safety Intelligence. An Imperative: Developing Standards for Safety and Security in XR Environments. 2021. Available online: https://xrsi.org/wp-content/uploads/2021/02/An-Imperative-Emteq-XRSI-Whitepaper-on-Standards-for-safety-and-Security.pdf (accessed on 20 August 2025).
Condition | CAPTCHA | Numeric | Checkers | Password |
---|---|---|---|---|
HMD1_Phone2 | ||||
Phone1_SVRP2 | ||||
Phone1_VRC2 | ||||
Average ± sd |
Factor | CAPTCHA | Numeric | Checkers | Password | ||||
---|---|---|---|---|---|---|---|---|
F-Value | p-Value | F-Value | p-Value | F-Value | p-Value | F-Value | p-Value | |
Condition | 30.02 | 17.45 | 1.69 | 9.69 | ||||
Round | 12.13 | 3.17 | 3.49 | 1.90 | 0.11 | |||
Order | 15.28 | 1.75 | 7.14 | 6.88 | 0.001 |
Round | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
CAPTCHA | 18.4 ± 12.1 | 14.2 ± 5.4 | 14.2 ± 6.3 | 13.0 ± 5.2 | 12.0 ± 4.2 |
Checkers | 15.6 ± 8.4 | 13.7 ± 4.4 | 13.2 ± 3.7 | 13.2 ± 3.8 | 13.6 ± 4.4 |
Condition | CAPTCHA | Numeric | Checkers | Password | Average |
---|---|---|---|---|---|
HMD1_Phone2 | 85% | 97% | 92% | 88% | 90% |
Phone1_SVRP2 | 94% | 99% | 89% | 91% | 93% |
Phone1_VRC2 | 96% | 93% | 91% | 87% | 91% |
Average ± sd | 91.83% |
Category | CAPTCHA | Numeric | Checkers | Password | Total |
---|---|---|---|---|---|
Best challenge | 2.38% | 4.76% | 14.29% | 0.00% | 21.43% |
Good challenge | 7.14% | 11.90% | 11.90% | 2.38% | 33.33% |
Bad challenge | 7.14% | 7.14% | 0.00% | 19.05% | 33.33% |
Worst challenge | 2.38% | 0.00% | 0.00% | 9.52% | 11.90% |
Balance | 0.00% | 9.52% | 26.19% | −26.19% | 9.52% |
Category | HMD1_Phone2 | Phone1_SVRP2 | Phone1_VRC2 | Total |
---|---|---|---|---|
Mostly Positive | 0.00% | 21.43% | 9.52% | 30.95% |
Positive | 7.14% | 14.29% | 14.29% | 35.71% |
Negative | 9.52% | 2.38% | 7.14% | 19.05% |
Mostly Negative | 9.52% | 0.00% | 4.76% | 14.29% |
Balance | −11.90% | 33.34% | 11.91% | 33.32% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nanzatov, A.; Peña-Castillo, L.; Meruvia-Pastor, O. NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones. Electronics 2025, 14, 3368. https://doi.org/10.3390/electronics14173368
Nanzatov A, Peña-Castillo L, Meruvia-Pastor O. NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones. Electronics. 2025; 14(17):3368. https://doi.org/10.3390/electronics14173368
Chicago/Turabian StyleNanzatov, Aiur, Lourdes Peña-Castillo, and Oscar Meruvia-Pastor. 2025. "NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones" Electronics 14, no. 17: 3368. https://doi.org/10.3390/electronics14173368
APA StyleNanzatov, A., Peña-Castillo, L., & Meruvia-Pastor, O. (2025). NRXR-ID: Two-Factor Authentication (2FA) in VR Using Near-Range Extended Reality and Smartphones. Electronics, 14(17), 3368. https://doi.org/10.3390/electronics14173368