Research Article

Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks

Table 4

Comparative characteristics of the developed approach and existing approaches.

Hacking methods (software and hardware)Authentication methods
BiometricsSingle sign-on (SSO)Open ID connect (OIDC)One-time password (OTP)Developed approach

John the Ripper++
Spidering±+
Cain and Abel++±
Dictionary attack++
Brute force attack++
Ophcrack+++
Create a clone++++

+ not vulnerable, ± partially vulnerable, and − vulnerable.