<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-12" category="info">

  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2021" month="May" day="10"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, conforming to proposed and final
regulations plus external technical standards, satisfying the
requirements listed in the companion requirements document
<xref target="I-D.ietf-drip-reqs"/>.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, conforming to proposed and final
regulations plus external technical standards, satisfying the
requirements listed in the companion requirements document
<xref target="I-D.ietf-drip-reqs"/>.</t>

<t>This document assumes the reader is familiar with <xref target="I-D.ietf-drip-reqs"/>.</t>

<section anchor="overview-of-unmanned-aircraft-system-uas-remote-id-rid-and-standardization" title="Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and Standardization">

<t>UAS Remote Identification (RID) is an application enabler for a UAS to be identified by Unmanned Aircraft Systems Traffic Management (UTM) and UAS Service Supplier (USS) (<xref target="appendix-a"/>) or third parties entities such as law enforcement.  Many safety and other considerations dictate that UAS be remotely identifiable.  Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID.  The European Union Aviation Safety Agency (EASA) has published <xref target="Delegated"/> and <xref target="Implementing"/> Regulations.</t>

<t>CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.</t>

<t>Federal Aviation Administration (FAA)</t>

<t><list style='empty'>
  <t>The FAA published a Notice of Proposed Rule Making
<xref target="NPRM"/> in 2019 and whereafter published the Final Rule <xref target="FAA_RID"/> in 2021. In FAA’s final rule, it is clearly stating that Automatic Dependent Surveillance Broadcast (ADS-B) Out and transponders can not be used to serve the purpose of an remote identification. (More about ADS-B in <xref target="adsb"/>)</t>
</list></t>

<t>American Society for Testing and Materials (ASTM)</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item WK65041, developed the ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If a UAS uses 
both communication methods, the same information must be
provided via both means.  The <xref target="F3411-19"/> is cited by FAA in its RID final rule
<xref target="FAA_RID"/> as “a potential means of compliance” to a Remote ID rule.</t>
</list></t>

<t>The 3rd Generation Partnership Project (3GPP)</t>

<t><list style='empty'>
  <t>With release 16, 3GPP completed the UAS RID requirement study
<xref target="TS-22.825"/> and proposed use cases in the mobile network and the
services that can be offered based on RID.  Release 17
specification works on enhanced UAS service requirements and
provides the protocol and application architecture support which
is applicable for both 4G and 5G network.</t>
</list></t>

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<section anchor="brid" title="Broadcast RID">

<t>A set of RID messages are defined for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the locally directly received UAS RID as a key.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The Broadcast RID is illustrated in <xref target="brid-fig"/> below.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
               x x  UA
              xxxxx
                |
                |
                |     app messages directly over  
                |     one-way RF data link (no IP)
                |
                |
                +
                x
              xxxxx
                x
                x
                x x   Observer's device (e.g. smartphone)
              x   x

]]></artwork></figure>

<t>With Broadcast RID, an Observer is limited to their radio “visible”
airspace for UAS awareness and information.  With Internet queries using harvested
RID (see <xref target="harvestbridforutm"/>), the Observer may gain more information about those visible UAS.</t>

</section>
<section anchor="nrid" title="Network RID">

<t>A RID data dictionary and data flow for Network RID are defined in <xref target="F3411-19"/>.
This data flow is emitted from a UAS via unspecified means (but at least in part over the Internet)
to a Network Remote ID Service Provider (Net-RID SP).
These Net-RID SPs provide the RID data to Network Remote ID Display Providers (Net-RID DP). 
It is the Net-RID DP that responds to queries from Network Remote ID Observers  (expected typically, but not specified exclusively, to be web-based) specifying airspace
volumes of interest. Network RID depends upon connectivity, in several segments, 
via the Internet, from the UAS to the Observer.</t>

<t>The Network RID is illustrated in <xref target="nrid-fig"/> below:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
            x x  UA
            xxxxx       ********************
             |   \    *                ------*---+------------+
             |    \   *              /       *  | NET_RID_SP |
             |     \  * ------------/    +---*--+------------+
             | RF   \ */                 |   *
             |        *      INTERNET    |   *  +------------+
             |       /*                  +---*--| NET_RID_DP |
             |      / *                  +---*--+------------+
             +     /   *                 |   *
              x   /     *****************|***      x
            xxxxx                        |       xxxxx
              x                          +-------  x
              x                                    x
             x x   Operator (GCS)      Observer   x x
            x   x                                x   x

]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path, currently (in the year of 2021) typically a direct RF link, but with increasing BVLOS operations expected often to be wireless links at either end with the Internet between. For all but the simplest hobby aircraft, telemetry (at least position and heading) flows from the UA to the GCS via some path, typically the reverse of the C2 path. Thus RID information pertaining to both the GCS and the UA can be sent, by whichever has Internet connectivity, to the Net-RID SP, typically the USS managing the UAS operation.</t>

<t>The Net-RID SP forwards RID information via the Internet to subscribed Net-RID DP, typically a USS. Subscribed Net-RID DP forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411-19"/> describes RID data elements that must be transported end-to-end from the UAS to the subscribed Observer devices.</t>

<t><xref target="F3411-19"/> prescribes the protocols only between the  Net-RID SP, Net-RID DP, and the Discovery and Synchronization Service (DSS). DRIP may also address standardization of protocols between the UA and GCS, between the UAS and the Net-RID SP, and/or between the Net-RID DP and Observer devices.</t>

<t><list style='empty'>
  <t><list style='empty'>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of RID information is in the scope of <xref target="F3411-19"/> Network RID.</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">

<t>Each UAS is registered to at least one USS.  With Net-RID, there is
direct communication between the UAS and its USS.  With Broadcast-RID, the UAS Operator has either pre-filed a 4D space volume for USS operational knowledge and/or Observers can be providing information about observed UA to a USS.  USS exchange information via a Discovery and Synchronization Service (DSS) so all USS collectively have knowledge about all activities in a 4D airspace.</t>

<t>The interactions among Observer, UA, and USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                            +----------+ 
                            | Observer |
                            +----------+
                           /            \
                          /              \      
                   +-----+                +-----+         
                   | UA1 |                | UA2 |
                   +-----+                +-----+       
                          \              /      
                           \            /                       
                            +----------+                            
                            | Internet | 
                            +----------+ 
                           /            \
                          /              \
                    +-------+           +-------+
                    | USS-1 | <-------> | USS-2 |   
                    +-------+           +-------+
                             \         /
                              \       /
                              +------+
                              |  DSS |
                              +------+
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture" title="Overview of DRIP Architecture">

<t>The requirements document <xref target="I-D.ietf-drip-reqs"/> also provides an extended introduction to the problem space, use cases, etc.  Only a brief summary of that introduction will be restated here as context, with reference to the general UAS RID usage scenarios shown in <xref target="arch-intro"/> below.</t>

<figure anchor="arch-intro"><artwork><![CDATA[
      General      x                           x     Public
      Public     xxxxx                       xxxxx   Safety
      Observer     x                           x     Observer
                   x                           x
                  x x ---------+  +---------- x x
                 x   x         |  |          x   x
                               |  |
         UA1 x x               |  |  +------------ x x UA2
            xxxxx              |  |  |            xxxxx
               |               +  +  +              |
               |            xxxxxxxxxx              |
               |           x          x             |
               +----------+x Internet x+------------+
    UA1        |           x          x             |       UA1 
   Pilot     x |            xxxxxxxxxx              | x    Pilot
  Operator  xxxxx              + + +                xxxxx Operator
   GCS1      x                 | | |                  x    GCS2
             x                 | | |                  x
            x x                | | |                 x x
           x   x               | | |                x   x
                               | | |
             +----------+      | | |       +----------+
             |          |------+ | +-------|          |
             | Public   |        |         | Private  |
             | Registry |     +-----+      | Registry |
             |          |     | DNS |      |          |
             +----------+     +-----+      +----------+

]]></artwork></figure>

<t>DRIP will enable leveraging existing Internet resources (standard
protocols, services, infrastructure, and business models) to meet UAS
RID and closely related needs.  DRIP will specify how to apply IETF
standards, complementing <xref target="F3411-19"/> and other external standards, to
satisfy UAS RID requirements.  DRIP will update existing and develop
new protocol standards as needed to accomplish the foregoing.</t>

<t>This document will outline the UAS RID architecture into which DRIP
must fit and the architecture for DRIP itself.  This includes
presenting the gaps between the CAAs’ Concepts of Operations and
<xref target="F3411-19"/> as it relates to the use of Internet technologies and UA
direct RF communications.  Issues include, but are not limited to:</t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Design of trustworthy remote ID and trust in RID messages (<xref target="rid"/>)</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Mechanisms to leverage Domain Name System (DNS: <xref target="RFC1034"/>), 
Extensible Provisioning Protocol (EPP <xref target="RFC5731"/>) and Registration Data Access Protocol (RDAP) (<xref target="RFC7482"/>)
to provide for private (<xref target="privateinforeg"/>) and public (<xref target="publicinforeg"/>) Information Registry.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Harvesting broadcast remote ID messages for UTM inclusion (<xref target="harvestbridforutm"/>)</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Privacy in RID messages (PII protection) (<xref target="privacyforbrid"/>)</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="conventions" title="Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown above.</t>

</section>
<section anchor="definitionsandabbr" title="Definitions and Abbreviations">

<section anchor="additional-definitions" title="Additional Definitions">

<t>This document uses terms defined in <xref target="I-D.ietf-drip-reqs"/>.</t>

</section>
<section anchor="abbreviations" title="Abbreviations">

<t>ADS-B:       Automatic Dependent Surveillance Broadcast</t>

<t>DSS:        Discovery &amp; Synchronization Service</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>GCS:        Ground Control Station</t>

<t>HHIT:       Hierarchical HIT Registries</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

<t>RID:        Remote ID</t>

<t>Net-RID SP: Network RID Service Provider</t>

<t>Net-RID DP: Network RID Display Provider.</t>

<t>PII:        Personally Identifiable Information</t>

<t>RF:         Radio Frequency</t>

<t>SDSP:       Supplemental Data Service Provider</t>

<t>UA:         Unmanned Aircraft</t>

<t>UAS:        Unmanned Aircraft System</t>

<t>USS:        UAS Service Supplier</t>

<t>UTM:        UAS Traffic Management</t>

</section>
<section anchor="claims-assertions-attestations-and-certificates" title="Claims, Assertions, Attestations, and Certificates">

<t>This section introduces the terms “Claims”, “Assertions”, “Attestations”, and “Certificates” as used in DRIP.</t>

<t>This is due to the term “certificate” having significant technological and legal baggage associated with it, specifically around X.509
certificates. These types of certificates and Public Key Infrastructure invoke more legal and public policy considerations
than probably any other electronic communication sector. It emerged as a governmental platform for trusted identity management and was
pursued in intergovernmental bodies with links into treaty instruments.</t>

<t>Claims:</t>

<t><list style='empty'>
  <t>A claim in DRIP is a predicate (e.g., “X is Y”, “X has property Y”, and most importantly “X owns Y” or “X is owned by Y”).  One basic use case of a claim is an entity using an HHIT as an identifier, e.g., a UAS using an HHIT as a UAS ID.</t>
</list></t>

<t>Assertions:</t>

<t><list style='empty'>
  <t>An assertion in DRIP is a set of claims.  This definition is borrowed from JWT/CWT.  An HHIT of itself can be seen as an assertion: a claim that the identifier is a handle to an asymmetric keypair owned by the entity, and a claim that the identifier is in the registry specified by the HID embedded in the identifier.</t>
</list></t>

<t>Attestations:</t>

<t><list style='empty'>
  <t>An attestation in DRIP is a signed assertion.  The signer may be a claimant or a third party.  Under DRIP this is normally used when an entity asserts a relationship with another entity, along with other information, and the asserting entity signs the assertion, thereby making it an attestation.</t>
</list></t>

<t>Certificates:</t>

<t><list style='empty'>
  <t>A certificate in DRIP is an attestation, strictly over identity information, signed by a third party.</t>
</list></t>

</section>
</section>
<section anchor="rid" title="HHIT for DRIP Entity Identifier">

<t>This section describes the basic requirements of a DRIP entity identifier per regulation constrains from ASTM <xref target="F3411-19"/> and explains the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable DRIP identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t>

<section anchor="uas-remote-identifiers-problem-space" title="UAS Remote Identifiers Problem Space">

<t>A DRIP entity identifier needs to be “Trustworthy”. This means that within the framework of the RID messages, an Observer can establish that the DRIP identifier used does uniquely belong to the UAS.  That the only way for any other UAS to assert this DRIP identifier would be to steal something from within the UAS. The DRIP identifier is self-generated by the UAS (either UA or GCS) and registered with the USS.</t>

<t>The data communication of using Broadcast RID faces extreme challenges due to the limitation of the demanding support for Bluetooth. The ASTM <xref target="F3411-19"/> defines the basic RID message which is expected to contain certain RID data and the Authentication message. The Basic RID message has a maximum payload of 25 bytes and the maximum size allocated by ASTM for the RID is 20 bytes and only 3 bytes are left unused. currently, the authentication maximum payload is defined to be 201 bytes.</t>

<t>Standard approaches like X.509 and PKI will not fit these constraints, even using the new EdDSA <xref target="RFC8032"/> algorithm cannot fit within the maximum 201 byte limit, due in large measure to ASN.1 encoding format overhead.</t>

<t>An example of a technology that will fit within these limitations is an enhancement of the Host Identity Tag (HIT) of HIPv2 <xref target="RFC7401"/> using Hierarchical HITs (HHITs) for UAS RID is outlined in HHIT based UAS RID <xref target="I-D.ietf-drip-rid"/>. As PKI with X.509 is being used in other systems with which UAS RID must interoperate (e.g. Discovery and Synchronization Service and any other communications involving USS) mappings between the more flexible but larger X.509 certificates and the HHIT-based structures must be devised. This could be as in <xref target="RFC8002"/> or simply the HHIT as Subject Alternative Name (SAN) and no Distinguished Name (DN).</t>

<t>A self-attestation of the HHIT RID can be done in as little as 84 bytes, by avoiding an explicit encoding technology like ASN.1 or Concise Binary Object Representation (CBOR <xref target="RFC8949"/>). This compressed attestation consists of only the HHIT, a timestamp, and the EdDSA signature on them. The HHIT prefix and suiteID provide crypto agility and implicit encoding rules. Similarly, a self-attestation of the Hierarchical registration of the RID (an attestation of a RID third-party registration “certificate”) can be done in 200 bytes.  Both these are detailed in UAS RID <xref target="I-D.ietf-drip-rid"/>.</t>

<t>An Observer would need Internet access to validate a self-attestations claim.  A third-party Certificate can be validated via a small credential cache in a disconnected environment.  This third-party Certificate is possible when the third-party also uses HHITs for its identity and the UA has the public key and the Certificate for that HHIT.</t>

</section>
<section anchor="hit-as-a-trustworthy-drip-entity-identifier" title="HIT as A Trustworthy DRIP Entity Identifier">

<t>A Remote ID that can be trustworthily used in the RID Broadcast mode can be built from an asymmetric keypair. Rather than using a key signing operation to claim ownership of an ID that does not guarantee name uniqueness, in this method the ID is cryptographically derived directly from the public key. The proof of ID ownership (verifiable attestation, versus mere claim) comes from signing this cryptographic ID with the associated private key. It is statistically hard for another entity to create a public key that would generate (spoof) the ID.</t>

<t>HITs are so designed; they are statistically unique through the cryptographic hash feature of second-preimage resistance. The cryptographically-bound addition of the Hierarchy and an HHIT registration process (e.g. based on Extensible Provisioning Protocol, <xref target="RFC5730"/>) provide complete, global HHIT uniqueness. This registration forces the attacker to generate the same public key rather than a public key that generates the same HHIT. This is in contrast to general IDs (e.g. a UUID or device serial number) as the subject in an X.509 certificate.</t>

</section>
<section anchor="hhit-for-drip-identifier-registration-and-lookup" title="HHIT for DRIP Identifier Registration and Lookup">
<!-- 
DRIP identifiers need a deterministic lookup mechanism that rapidly provides
actionable information about the identified UA.  The identifier itself needs to
be the inquiry input into the lookup given the constraints imposed by some of the
broadcast media.  This can best be achieved by an Identifier registration
hierarchy cryptographically embedded within the Identifier. -->

<t>Remote ID needs a deterministic lookup mechanism that rapidly provides actionable information about the identified UA.  Given the size constraints imposed by the Bluetooth 4 broadcast media, the Remote ID itself needs to be the inquiry input into the lookup.  An HHIT DRIP identifier contains cryptographically embedded registration information.  This HHIT registration hierarchy, along with the IPv6 prefix, is trustable and sufficient information that can be used to perform such a lookup.  Additionally, the IPv6 prefix can enhance the HHITs use beyond the basic Remote ID function (e.g use in HIP, <xref target="RFC7401"/>).</t>

<!-- 
A HHIT itself consists of a registration hierarchy, the hashing crypto suite information, and the hash of these items along with the underlying public key.  Additional information, e.g. an IPv6 prefix, can enhance the HHITs use beyond the basic Remote ID function (e.g use in HIP, {{RFC7401}}). 
 -->

<t>Therefore, a DRIP identifier can be represented as a HHIT.  It can be self-generated by a UAS (either UA or GCS) and registered with the Private Information Registry (More details in <xref target="privateinforeg"/>) identified in its hierarchy fields. Each DRIP identifier represented as an HHIT can not be used more than once.</t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT can only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (more details in  <xref target="sc"/>).</t>

<t>In another case, a UAS equipped for Broadcast RID can be provisioned not only with its HHIT but also with the HI public key from which the HHIT was derived and the corresponding private key, to enable message signature.  A UAS equipped for Network RID can be provisioned likewise; the private key resides only in the ultimate source of Network RID messages (i.e. on the UA itself if the GCS is merely relaying rather than sourcing Network RID messages).  Each Observer device can be provisioned either with public keys of the DRIP identifier root registries or certificates for subordinate registries.</t>

<t>HHITs can be used throughout the UAS/UTM system. The Operators, Private Information Registries, as well as other UTM entities, can use HHITs for their IDs. Such HHITs can facilitate DRIP security functions such as used with HIP to strongly mutually authenticate and encrypt communications.</t>

</section>
<section anchor="hhit-for-drip-identifier-cryptographic" title="HHIT for DRIP Identifier Cryptographic">

<t>The only (known to the authors of this document at the time of its writing) extant fixed-length ID cryptographically derived from a public key are the Host Identity Tag <xref target="RFC7401"/>, HITs, and Cryptographically Generated Addresses <xref target="RFC3972"/>, CGAs. However, both HITs and CGAs lack registration/retrieval capability. HHIT, on the other hand, is capable of providing a cryptographic hashing function, along with a registration process to mitigate the probability of a hash collision (first registered, first allowed).</t>

</section>
</section>
<section anchor="ei" title="DRIP Identifier Registration and Registries">

<t>UAS registries can hold both public and private UAS information resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in
different registries. A DRIP identifier is amenable to handling as an Internet domain name (at an arbitrary level in the hierarchy). It also can be registered in at least a pseudo-domain (e.g. .ip6.arpa for reverse lookup), or as a sub-domain (for forward lookup). This section introduces the public and private information registries for DRIP identifiers.</t>

<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background" title="Background">

<t>The public registry provides trustable information such as attestations of RID ownership and HDA registration.  Optionally, pointers to the repositories for the HDA and RAA implicit in the RID can be included (e.g. for HDA and RAA HHIT|HI used in attestation signing
operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UAS that only use Network RID, is only available via an Observer’s Net-RID DP that would tend to provide all public registry information directly.  The Observer can visually “see” these UAS, but they are silent to the Observer; the Net-RID DP is the only source of information based on a query for an airspace volume.</t>

</section>
<section anchor="proposed-approach" title="Proposed Approach">

<t>A DRIP public information registry can respond to standard DNS queries, in the definitive public Internet DNS hierarchy.  If a DRIP public information registry lists, in a HIP RR, any HIP RVS servers for a given DRIP identifier, those RVS servers can restrict relay services per AAA policy; this requires extensions to <xref target="RFC8004"/>.  These public information registries can use secure DNS transport (e.g. DNS over TLS) to deliver public information that is not inherently trustable (e.g. everything other than attestations).</t>

</section>
</section>
<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background-1" title="Background">

<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.  A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure and business models, by fitting into an ID structure compatible with DNS names.  This implies some sort of hierarchy, for scalability, and management of this hierarchy.  It is expected that the private registry function will be provided by the same organizations that run USS, and likely integrated with USS.</t>

</section>
<section anchor="proposed-approach-1" title="Proposed Approach">

<t>A DRIP private information registry can support essential Internet domain name registry operations (e.g. add, delete, update, query) using interoperable open standard protocols.  It can also support the Extensible Provisioning Protocol (EPP) and the Registry Data Access
Protocol (RDAP) with access controls.  It might be listed in a DNS: that DNS could be private; but absent any compelling reasons for use of private DNS, a public DNS hierarchy needs to be in place. The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC7484"/>.  A DRIP private information registry can also support WebFinger as specified in <xref target="RFC7033"/>.</t>

</section>
</section>
</section>
<section anchor="harvestbridforutm" title="Harvesting Broadcast Remote ID messages for UTM Inclusion">

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow RID requirements for small UAS
to be satisfied with the operator’s choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for UAS of
essentially all UAS and is now also considering Network RID.  The FAA
RID Final Rules only specifies Broadcast RID for UAS, however, still encourages Network RID for complementary functionality, especially in support of UTM.</t>

<t>One obvious opportunity is to enhance the
architecture with gateways from Broadcast RID to Network RID. This
provides the best of both and gives regulators and operators
flexibility.  It offers considerable enhancement over some Network RID
options such as only reporting planned 4D operation space by the
operator.</t>

<t>These gateways could be pre-positioned (e.g. around
airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing
more than a smartphone with a suitable app is needed).  As Broadcast
RID media have limited range, gateways receiving messages claiming
locations far from the gateway can alert authorities or a SDSP to the
failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position
stamps from the gateways to multilaterate UA location, independent of
the locations claimed in the messages (which may have a natural time lag
as it is), which are entirely operator self-reported in UAS RID and UTM.</t>

<t>Further, gateways with additional sensors (e.g. smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the RID messages.  This Crowd Sourced Remote ID
(CS-RID) would be a significant enhancement, beyond baseline DRIP
functionality; if implemented, it adds two more entity types.</t>

<section anchor="the-cs-rid-finder" title="The CS-RID Finder">
<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into the UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from, a Broadcast RID receiver.  However, it can not interface directly with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a TBD interface to a CS-RID SDSP; this interface needs to be based upon but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="the-cs-rid-sdsp" title="The CS-RID SDSP">

<t>A CS-RID SDSP would appear (i.e. present the same interface) to a Net-RID SP as a Net-RID DP. A CS-RID SDSP can not present a standard GCS-facing interface as if it were a Net-RID SP. A CS-RID SDSP would present a TBD interface to a CS-RID Finder; this interface can be based upon but readily distinguishable between a GCS and a Net-RID SP.</t>

</section>
</section>
<section anchor="privacyforbrid" title="Privacy for Broadcast PII">

<t>Broadcast RID messages can contain PII.  A viable architecture for PII protection would be symmetric
encryption of the PII using a key known to the UAS and its USS.
An authorized Observer could send the encrypted PII along with the
UAS ID (to entities such as USS of the Observer, or to the UAS in which the UAS ID is registered if that can be determined from the UAS ID itself or to a Public Safety USS) to get the plaintext.
Alternatively, the authorized Observer can receive the key to
directly decrypt all future PII content from the UA.</t>

<t>PII can be protected unless the UAS is informed otherwise.  This could
come from operational instructions to even permit flying in a space/time.
It can be special instructions at the start or during an operation.
PII protection can not be used if the UAS loses connectivity to
the USS.  The UAS always has the option to abort the operation if PII
protection is disallowed.</t>

<t>An authorized Observer can instruct a UAS via the USS that conditions
have changed mandating no PII protection or land the UA (abort the
operation).</t>

</section>
<section anchor="sc" title="Security Considerations">

<t>The security provided by asymmetric
cryptographic techniques depends upon protection of the private keys.
A manufacturer that embeds a private key in an UA may have retained a
copy.  A manufacturer whose UA are configured by a closed source
application on the GCS which communicates over the Internet with the
factory may be sending a copy of a UA or GCS self-generated key back
to the factory.  Keys may be extracted from a GCS or UA. The RID
sender of a small harmless UA (or the entire UA) could be carried by
a larger dangerous UA as a “false flag.”  Compromise of a registry
private key could do widespread harm.  Key revocation procedures are
as yet to be determined.  These risks are in addition to those
involving Operator key management practices.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The work of the FAA’s UAS Identification and Tracking (UAS ID)
Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in
balancing the interests of diverse stakeholders is essential to the
necessary rapid and widespread deployment of UAS RID.  IETF
volunteers who have contributed to this draft include Amelia
Andersdotter and Mohamed Boucadair.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor='I-D.ietf-drip-reqs'>
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Requirements</title>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='27' month='April' year='2021'/>
      <abstract>
	 <t>   This document defines terminology and requirements for Drone Remote
   Identification Protocol (DRIP) Working Group solutions to support
   Unmanned Aircraft System Remote Identification and tracking (UAS RID)
   for security, safety, and other purposes (e.g., initiation of
   identity based network sessions supporting UAS applications).
   Complementing external technical standards as regulator-accepted
   means of compliance with UAS RID regulations, DRIP will facilitate
   use of existing Internet resources to support RID and to enable
   enhanced related services, and will enable online and offline
   verification that RID information is trustworthy.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-10'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-reqs-10.txt' type='TXT'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8002' target='https://www.rfc-editor.org/info/rfc8002'>
<front>
<title>Host Identity Protocol Certificates</title>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='S. Varjonen' initials='S.' surname='Varjonen'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>The Certificate (CERT) parameter is a container for digital certificates.  It is used for carrying these certificates in Host Identity Protocol (HIP) control packets.  This document specifies the certificate parameter and the error signaling in case of a failed verification.  Additionally, this document specifies the representations of Host Identity Tags (HITs) in X.509 version 3 (v3).</t><t>The concrete use cases of certificates, including how certificates are obtained and requested and which actions are taken upon successful or failed verification, are specific to the scenario in which the certificates are used.  Hence, the definition of these scenario-specific aspects is left to the documents that use the CERT parameter.</t><t>This document updates RFC 7401 and obsoletes RFC 6253.</t></abstract>
</front>
<seriesInfo name='RFC' value='8002'/>
<seriesInfo name='DOI' value='10.17487/RFC8002'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC7482' target='https://www.rfc-editor.org/info/rfc7482'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP).</t></abstract>
</front>
<seriesInfo name='RFC' value='7482'/>
<seriesInfo name='DOI' value='10.17487/RFC7482'/>
</reference>


<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>UAS RID requirement study</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>




<reference anchor='RFC7033' target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author fullname='P. Jones' initials='P.' surname='Jones'><organization/></author>
<author fullname='G. Salgueiro' initials='G.' surname='Salgueiro'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Smarr' initials='J.' surname='Smarr'><organization/></author>
<date month='September' year='2013'/>
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7484' target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author fullname='M. Blanchet' initials='M.' surname='Blanchet'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference anchor='RFC8004' target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<author fullname='L. Eggert' initials='L.' surname='Eggert'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference anchor='RFC5731' target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC5730' target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>UAS Remote ID</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='28' month='January' year='2021'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   Identifier for use as the UAS Remote ID.  HHITs self-attest to the
   included explicit hierarchy that provides Registrar discovery for
   3rd-party ID attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-07'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-07.txt' type='TXT'/>
</reference>




    </references>


<section anchor="appendix-a" title="Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)">

<section anchor="operation-concept" title="Operation Concept">

<t>The National Aeronautics and Space Administration (NASA) and FAAs’
effort of integrating UAS’s operation into the national airspace
system (NAS) leads to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 is published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual development and implementation are conducted by
the UTM research transition team which is the joint workforce by FAA
and NASA.  World efforts took place afterward.  The Single European
Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published the UTM concept of operations to
guide the development of their future air traffic management (ATM)
system and make sure safe and efficient integrations of manned and
unmanned aircraft into the national airspace.</t>

<t>The UTM composes of UAS operation infrastructure, procedures and
local regulation compliance policies to guarantee UAS’s safe
integration and operation.  The main functionality of a UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that a UTM has to offer.  Such Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitor and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS(s) to build a large service coverage map which
can load-balance, relay and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low
Altitude Authorization and Notification Capability <xref target="LAANC"/> program
which is the first system to realize some of the UTM envisioned functionality.
The LAANC program can automate the UAS’s flight plan application and
approval process for airspace authorization in real-time by checking
against multiple aeronautical databases such as airspace
classification and fly rules associated with it, FAA UAS facility
map, special use airspace, Notice to Airman (NOTAM), and Temporary
Flight Rule (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and takeoff or land in a
controlled airspace (e.g., Class Bravo, Charlie, Delta and Echo
in United States), the USS where UAS is currently communicating
with is responsible for UAS’s registration, authenticating the
UAS’s fly plan by checking against designated UAS fly map
database, obtaining the air traffic control (ATC) authorization
and monitor the UAS fly path in order to maintain safe boundary
and follow the pre-authorized route.</t>
  <t>For a UAS participating in UTM and take off or land in an
uncontrolled airspace (ex.  Class Golf in the United States),
pre-fly authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS) operation.  The USS either accepts
or rejects received intended fly plan from the UAS.  Accepted UAS
operation may share its current fly data such as GPS position and
altitude to USS.  The USS may keep the UAS operation status near
real-time and may keep it as a record for overall airspace air
traffic monitor.</t>
</list></t>

</section>
<section anchor="adsb" title="Automatic Dependent Surveillance Broadcast (ADS-B)">

<t>The ADS-B is the de jure technology used in manned aviation for sharing location information, from the aircraft to ground and satellite-based systems, designed in the early 2000s. Broadcast RID is 
conceptually similar to ADS-B, but with the receiver target being the general public on generally available devices (e.g. smartphones).</t>

<t>For numerous technical reasons, ADS-B itself is not suitable for 
low-flying small UA. Technical reasons include but not limited to the following:</t>

<t><list style="numbers">
  <t>Lack of support for the 1090 MHz ADS-B channel on any consumer handheld devices</t>
  <t>Weight and cost of ADS-B transponders on CSWaP constrained UA</t>
  <t>Limited bandwidth of both uplink and downlink, which would likely be saturated by large numbers of UAS, endangering manned aviation</t>
</list></t>

<t>Understanding these technical shortcomings, regulators worldwide have ruled out the use of ADS-B for the small UAS for which UAS RID and DRIP are intended.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

