). Interestingly, the pilot projects have, as far as we have found
The lack of explicit focus to (cyber) safety and privacy within the sensible grid pilots (Dechesne 2013) leaves room for reflection on how the pilots could have already been made use of to understand about these aspects for smart metering, by Embers before splitting into twogroups. Likewise, much more skilled sufferers on ART consciously designing them as social experiments. The results had been published eventually (Garcia et al. 2008).http://www.sos.cs.ru.nl/applications/rfid/pressrelease-courtdecision.en.html.Security-by-ExperimentAfter these events, the organisation responsible for the OV-chipkaart set up a scientific advisory board to allow better handling of feedback in the future. The MIFARE classic card was also gradually replaced using a various a single, working with regular in lieu of proprietary cryptography. Analysis title= journal.pcbi.1005422 Inside the above examples, it is clear that the problematic elements of these `.). Interestingly, the pilot projects have, as far as we have found (Dechesne 2013), not been exploited to explicitly experiment with all the effectiveness of the new specifications with respect towards the security and privacy concerns that have been raised when the law was rejected. The pilots are mostly focused on testing the functionality on the technology, and understanding ways to take care of human participation in balancing the grid. Concerns about privacy and security, and associated specifications and values, weren't asked for the customers. In October 2014, a new proposal for the broad intelligent meter roll out in the Netherlands, on a voluntary basis, was approved by parliament. User participation within the electrical energy net is usually a great paradigm shift, each for customers and operators. Practical experience shows that wrong assumptions are effortlessly made about tasks, responsibilities and risks with respect to (cyber) safety. One example is, operators are applied to considering in top-down controllable components, which made them neglect privacy troubles for consumers, whilst users usually are not used to be title= j.addbeh.2012.ten.012 conscious in regards to the electricity flow, let alone to adapt their behaviour ?they need to have incentives. The pilots which might be conducted give a great chance for both sides to find out in a fairly controlled environment how roles within the system may possibly shift, and what that would mean for the dangers and responsibilities with respect to cyber safety. The lack of explicit focus to (cyber) safety and privacy in the wise grid pilots (Dechesne 2013) leaves space for reflection on how the pilots could happen to be applied to discover about these aspects for sensible metering, by consciously designing them as social experiments. OV-Chipkaart The ``OV-chipkaart is often a public transport chipcard steadily rolled out within the Netherlands involving 2002 and 2012. The initial version of the card applied the MIFARE classic chip. The cryptographic algorithm employed to shield the card contents was kept secret by the producer. In 2007, German researchers revealed part of the secret algorithm by so-called reverse-engineering (Nohl et al. 2008). In 2008, Dutch researchers of Radboud University Nijmegen discovered two possible attacks on the card. The attacks would enable them to study, clone, or restore cards by retrieving the cryptographic keys. The researchers demonstrated this possibility with a number of cards utilized in practice, such as the OV-chipkaart. Nevertheless, travelling with cloned cards would nonetheless be detected by the back-end system in spot.