Content of this chapter

Appendix · RKD

This chapter provides a rare, implementation-focused account of RKD. It starts from the observation that the scientific literature is extensive, but commercial products are almost absent. Against that background, it explains the development of a concrete RKD product, including software prototyping, measurement campaigns, algorithm evaluation, and the final selection of practical components.

The chapter walks through the full processing chain: measurement error correction, normalization, LOESS smoothing, grid quantization, discrete cosine transformation, cascade error correction, secure sketch, privacy amplification, and attacker analysis. It explains why certain options were kept and others rejected, with a focus on usability, correction efficiency, and security. The empirical section is especially important: measurement scenarios covered static, indoor, outdoor, long-range, and vehicle-based settings, with Eve intentionally placed under highly favorable attack conditions.

The chapter concludes with the resulting product concept, cost structure, applicability across wireless technologies such as 5G, WLAN, ZigBee, and LoRaWAN, and known vulnerabilities together with countermeasures. It thereby turns RKD from an abstract research field into a practical engineering case.

  • Describes end-to-end RKD product development
  • Explains data collection and key extraction methods
  • Evaluates attacker performance empirically
  • Covers product design, cost, and deployment
  • Assesses RKD across different wireless technologies

Suggested citation

Insert DOI / Springer chapter citation here once available.

Show BibTeX placeholder
@incollection{piller_schoelnast_physcrypto_ch1,
  title     = {Introduction},
  author    = {Piller, Ernst and Sch\"olnast, Hubert},
  booktitle = {Data Encryption at the Intersection of Mathematics and Physics},
  publisher = {Springer},
  year      = {2026},
  note      = {Open Access}
}