). Interestingly, the pilot projects have, as far as we've located

From AutomationWiki
Jump to: navigation, search

In October 2014, a new proposal for the broad intelligent meter roll out in the Netherlands, on a voluntary basis, was approved by parliament. User participation in the electricity net is usually a great paradigm shift, each for users and operators. Practical experience shows that wrong assumptions are effortlessly made about tasks, responsibilities and risks with respect to (cyber) safety. For example, operators are applied to considering in top-down controllable components, which made them PF-04418948 web neglect privacy troubles for customers, while users will not be utilized to be title= j.addbeh.2012.10.012 conscious in regards to the electricity flow, let alone to adapt their behaviour ?they will need incentives. The pilots that happen to be conducted deliver a great chance for both sides to find out in a fairly controlled environment how roles within the method may perhaps shift, and what that would mean for the dangers and responsibilities with respect to cyber safety. The lack of explicit consideration to (cyber) security and privacy in the intelligent grid pilots (Dechesne 2013) leaves area for reflection on how the pilots could have already been made use of to learn about these aspects for sensible metering, by consciously designing them as social experiments. OV-Chipkaart The ``OV-chipkaart is usually a public transport chipcard gradually rolled out inside the Netherlands between 2002 and 2012. The initial version of your card applied the MIFARE classic chip. The cryptographic algorithm employed to safeguard the card contents was kept secret by the producer. In 2007, German researchers revealed a part of the key algorithm by so-called reverse-engineering (Nohl et al. 2008). In 2008, Dutch researchers of Radboud University (R)-K-13675 web Nijmegen identified two feasible attacks on the card. The attacks would enable them to study, clone, or restore cards by retrieving the cryptographic keys. The researchers demonstrated this possibility with several cards used in practice, such as the OV-chipkaart. Even so, travelling with cloned cards would nonetheless be detected by the back-end method in spot. The researchers informed the government and the manufacturer, with publication of the final results anticipated 7 months later. The idea of this ``responsible disclosure was giving the accountable authorities sufficient time to address the situation ahead of the understanding would turn into public. The manufacturer then asked the court to prohibit publication.2 The university claimed their actions were affordable from the point of view of academic freedom, and the court ruled within the university's favour. The results had been published ultimately (Garcia et al. 2008).http://www.sos.cs.ru.nl/applications/rfid/pressrelease-courtdecision.en.html.Security-by-ExperimentAfter these events, the organisation responsible for the OV-chipkaart setup a scientific advisory board to enable greater handling of feedback within the future. The MIFARE classic card was also progressively replaced using a various a single, using typical in lieu of proprietary cryptography.). Interestingly, the pilot projects have, as far as we have identified (Dechesne 2013), not been exploited to explicitly experiment with the effectiveness in the new requirements with respect towards the safety and privacy concerns that have been raised when the law was rejected. The pilots are mostly focused on testing the functionality of the technology, and learning the best way to deal with human participation in balancing the grid.