Research Article

A Rhythm-Based Authentication Scheme for Smart Media Devices

Table 5

Comparison of the existing locking systems and the RLS against various attacks.

Pattern lockPINPasswordRLS

Brute force attackXOO
Shoulder surfing attackXXOO
Dictionary attackXO
Smudge attackXXO

O: strong, △: medium, and X: weak.