Appendix · RKD
This chapter provides a rare, implementation-focused account of RKD. It starts from the observation that the scientific literature is extensive, but commercial products are almost absent. Against that background, it explains the development of a concrete RKD product, including software prototyping, measurement campaigns, algorithm evaluation, and the final selection of practical components.
The chapter walks through the full processing chain: measurement error correction, normalization, LOESS smoothing, grid quantization, discrete cosine transformation, cascade error correction, secure sketch, privacy amplification, and attacker analysis. It explains why certain options were kept and others rejected, with a focus on usability, correction efficiency, and security. The empirical section is especially important: measurement scenarios covered static, indoor, outdoor, long-range, and vehicle-based settings, with Eve intentionally placed under highly favorable attack conditions.
The chapter concludes with the resulting product concept, cost structure, applicability across wireless technologies such as 5G, WLAN, ZigBee, and LoRaWAN, and known vulnerabilities together with countermeasures. It thereby turns RKD from an abstract research field into a practical engineering case.
- Describes end-to-end RKD product development
- Explains data collection and key extraction methods
- Evaluates attacker performance empirically
- Covers product design, cost, and deployment
- Assesses RKD across different wireless technologies