Research Article
Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks
Table 4
Comparative characteristics of the developed approach and existing approaches.
| Hacking methods (software and hardware) | Authentication methods | Biometrics | Single sign-on (SSO) | Open ID connect (OIDC) | One-time password (OTP) | Developed approach |
| John the Ripper | + | − | − | − | + | Spidering | ± | − | − | − | + | Cain and Abel | + | − | − | + | ± | Dictionary attack | + | − | − | − | + | Brute force attack | + | − | − | − | + | Ophcrack | + | − | − | + | + | Create a clone | − | + | + | + | + |
|
|
+ not vulnerable, ± partially vulnerable, and − vulnerable.
|