<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-moskowitz-drip-crowd-sourced-rid-06" category="std" submissionType="IETF" xml:lang="en" obsoletes="" updates="">

  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <region>CA</region>
          <code>94306</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date year="2021" month="May" day="26"/>

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes using the ASTM Broadcast Remote ID (B-RID)
specification in a “crowd sourced” smart phone environment to
provide much of the ASTM and FAA envisioned Network Remote ID (N-RID)
functionality.  This crowd sourced B-RID data will use
multilateration to add a level of reliability in the location data
on the Unmanned Aircraft (UA).  The crowd sourced environment will
also provide a monitoring coverage map to authorized observers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document defines a mechanism to capture the ASTM Broadcast
Remote ID messages (B-RID) <xref target="F3411-19"/> on any
Internet connected device that receives
them and can forward them to the SDSP(s) responsible for the
geographic area the UA and receivers are in.  This will create a
ecosystem that will meet most if not all data collection
requirements that CAAs are placing on Network Remote ID (N-RID).</t>

<t>These Internet connected devices are herein called “Finders”, as
they find UAs by listening for B-RID messages.  The Finders are
B-RID forwarding proxies.  Their potentially limited spacial view
of RID messages could result in bad decisions on what messages to
send to the SDSP and which to drop.  The SDSP will make any
filtering decisions in what it forwards to the UTM(s).</t>

<t>Finders can be smartphones, tablets, connected cars, or any
computing platform with Internet connectivity that can meet the
requirements defined in this document.  It is not expected, nor
necessary, that Finders have any information about a UAS beyond the
content in the B-RID messages.</t>

<t>Finders MAY only need a loose association with the SDSP(s).  They
may only have the SDSP’s Public Key and FQDN.  It would use these,
along with the Finder’s Public Key to use ECIES, or other security
methods, to send the messages in a secure manner to the SDSP.  The
SDSP MAY require a stronger relationship to the Finders.  This may
range from the Finder’s Public Key being registered to the SDSP
with other information so that the SDSP has some level of trust in
the Finders to requiring transmissions be sent over long-lived
transport connections like ESP or DTLS.</t>

<t>This document has minimal information about the actions of SDSPs.
In general the SDSP is out of scope of this document. That said,
the SDSPs should not simply proxy B-RID messages to the UTM(s).
They should perform some minimal level of filtering and content
checking before forwarding those messages that pass these tests in
a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based
on location of active Finders.  UTMs may use this information to
notify authorized observers of where there is and there is not
monitoring coverage.  They may also use this information of where
to place pro-active monitoring coverage.</t>

<t>An SDSP SHOULD only forward Authenticated B-RID messages like those
defined in <xref target="tmrid-auth"/> to the UTM(s).  Further, the SDSP SHOULD
validate the Remote ID (RID) and the Authentication signature
before forwarding anything from the UA.  The SDSP MAY forward all B-RID
messages to the UTM, leaving all decision making on B-RID messages
veracity to the UTM.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA,
the SDSP is in a unique position to perform multilateration on
these messages and compute the Finder’s view of the UA location to
compare with the UA Location/Vector messages.  This check against
the UA’s location claims is both a validation on the UA’s
reliability as well as the trustworthiness of the Finders.  Other
than providing data to allow for multilateration, this SDSP feature
is out of scope of this document.  This function is limited by the
location accuracy for both the Finders and UA.</t>

<section anchor="draft-status" title="Draft Status">

<t>This draft is still incomplete.  New features are being added as
capabilities are researched.  The actual message formats also still
need work.</t>

</section>
</section>
<section anchor="terms" title="Terms and Definitions">

<section anchor="requirements-terminology" title="Requirements Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="definitions" title="Definitions">

<t><list style="hanging">
  <t hangText="B-RID:"><vspace blankLines='0'/>
  Broadcast Remote ID. A method of sending RID messages as
1-way transmissions from the UA to any Observers within
radio range.</t>
  <t hangText="CAA:"><vspace blankLines='0'/>
  Civil Aeronautics Administration. An example is the Federal
Aviation Administration (FAA) in the United States of
America.</t>
  <t hangText="DAA:"><vspace blankLines='0'/>
  Detect and Avoid. The process of a UA detecting obstacles,
like other UAs and taking the necessary evasive action.</t>
  <t hangText="ECIES:"><vspace blankLines='0'/>
  Elliptic Curve Integrated Encryption Scheme.  A hybrid
encryption scheme which provides semantic security against
an adversary who is allowed to use chosen-plaintext and
chosen-ciphertext attacks.</t>
  <t hangText="GCS:"><vspace blankLines='0'/>
  Ground Control Station. The part of the UAS that the remote
pilot uses to exercise C2 over the UA, whether by remotely
exercising UA flight controls to fly the UA, by setting GPS
waypoints, or otherwise directing its flight.</t>
  <t hangText="Finder:"><vspace blankLines='0'/>
  In Internet connected device that can receive B-RID
messages and forward them to a UTM.</t>
  <t hangText="Observer:"><vspace blankLines='0'/>
  Referred to in other UAS documents as a “user”, but there
are also other classes of RID users, so we prefer
“observer” to denote an individual who has observed an UA
and wishes to know something about it, starting with its
RID.</t>
  <t hangText="Multilateration:"><vspace blankLines='0'/>
  Multilateration (more completely, pseudo range
multilateration) is a navigation and surveillance technique
based on measurement of the times of arrival (TOAs) of
energy waves (radio, acoustic, seismic, etc.) having a
known propagation speed.</t>
  <t hangText="NETSP:"><vspace blankLines='0'/>
  Network RID Service Provider. USS receiving Network RID
messages from UAS (UA or GCS), storing for a short
specified time, making available to NETDP.</t>
  <t hangText="NETDP:"><vspace blankLines='0'/>
  Network RID Display Provider. Entity (might be USS)
aggregating data from multiple NETSPs to answer query from
observer (or other party) desiring Situational Awareness of
UAS operating in a specific airspace volume.</t>
  <t hangText="N-RID:"><vspace blankLines='0'/>
  Network Remote ID. A method of sending RID messages via the
Internet connection of the UAS directly to the UTM.</t>
  <t hangText="RID:"><vspace blankLines='0'/>
  Remote ID. A unique identifier found on all UA to be used
in communication and in regulation of UA operation.</t>
  <t hangText="SDSP:"><vspace blankLines='0'/>
  Supplemental Data Service Provider. Entity providing
information that is allowed, but not required to be present
in the UTM system.</t>
  <t hangText="UA:"><vspace blankLines='0'/>
  Unmanned Aircraft. In this document UA’s are typically
though of as drones of commercial or military variety. This
is a very strict definition which can be relaxed to include
any and all aircraft that are unmanned.</t>
  <t hangText="UAS:"><vspace blankLines='0'/>
  Unmanned Aircraft System. Composed of Unmanned Aircraft and
all required on-board subsystems, payload, control station,
other required off-board subsystems, any required launch
and recovery equipment, all required crew members, and C2
links between UA and the control station.</t>
  <t hangText="UTM:"><vspace blankLines='0'/>
  UAS Traffic Management. A “traffic management” ecosystem
for uncontrolled operations that is separate from, but
complementary to, the FAA’s Air Traffic Management (ATM)
system.</t>
  <t hangText="USS:"><vspace blankLines='0'/>
  UAS Service Supplier. Provide UTM services to support the
UAS community, to connect Operators and other entities to
enable information flow across the USS network, and to
promote shared situational awareness among UTM
participants. (From FAA UTM ConOps V1, May 2018).</t>
</list></t>

</section>
</section>
<section anchor="prob-space" title="Problem Space">

<section anchor="meeting-the-needs-of-network-remote-id" title="Meeting the needs of Network Remote ID">

<t>The Federal (US) Aviation Authority (FAA), in the January 2021 Remote 
ID Final rule <xref target="FAA-FR"/>, has postponed Network Remote ID (N-RID) and 
focused on Broadcast Remote ID for now.  This was in response to the 
UAS vendors comments that N-RID places considerable demands on 
currently used UAS.</t>

<t>However, N-RID, or equivalent, is necessary for UTM and knowing what
soon may be in an airspace.  A method that proxies B-RID into UTM can
function as an interim approach to N-RID and continue as a adjunct to 
N-RID.</t>

</section>
<section anchor="advantages-of-broadcast-remote-id" title="Advantages of Broadcast Remote ID">

<t>B-RID has its advantages over N-RID.</t>

<t><list style="symbols">
  <t>B-RID can more readily be implemented directly in the UA.
N-RID will more frequently be provided by the GCS or a
pilot’s Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over
a direct radio connection, B-RID could be a
straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide B-RID.</t>
    </list></t>
  <t>B-RID can also be used by the UA to assist in Detect and
Avoid (DAA).</t>
  <t>B-RID is available to observers even in situations with no
Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="trustworthiness-of-proxied-data" title="Trustworthiness of Proxied Data">

<t>When a proxy is introduced in any communication protocol, there is
a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for B-RID, are authenticated
to the SDSP (see <xref target="Finder_Sec"/>). The
SDSP can compare the information from multiple Finders to isolate a
Finder sending fraudulent information.  SDSPs can additionally
verify authenticated messages that follow <xref target="tmrid-auth"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see
<xref target="Finder_Manage"/>) to limit DOS attacks
from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages" title="Defense against fraudulent RID Messages">

<t>The strongest defense against fraudulent RID messages is to focus
on <xref target="tmrid-auth"/> conforming messages.  Unless this behavior is
mandated, SPDPs will have to use assorted algorithms to isolate
messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec" title="The Finder - SDSP Security Relationship">

<t>The SDSP(s) and Finders SHOULD use EDDSA <xref target="RFC8032"/> keys as their
trusted Identities.
The public keys SHOULD be registered Hierarchical HITS,
<xref target="hierarchical-hit"/> and <xref target="hhit-registries"/>.</t>

<t>The SDSP uses some process (out of scope here) to register the
Finders and their EDDSA Public Key.  During this registration, the
Finder gets the SDSP’s EDDSA Public Key.  These Public Keys allow
for the following options for authenticated messaging from the
Finder to the SDSP.</t>

<t><list style="numbers">
  <t>ECIES can be used with a unique nonce to authenticate each
  message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to
  establish a shared secret that is then used to authenticate
  each message sent from a Finder to the SDSP sent during
  that period.</t>
  <t>HIPv2 <xref target="RFC7401"/> can be used to
  establish a session secret that is then used with ESP <xref target="RFC4303"/>
  to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/>  can be used to establish
  a secure connection that is then used to authenticate each
  message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="Finder_Map" title="The Finder Map">

<t>The Finders are regularly providing their SDSP with their location.
This is through the B-RID Proxy Messages and Finder Location Update
Messages.  With this information, the SDSP can maintain a
monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage" title="Managing Finders">

<t>Finder density will vary over time and space.  For example,
sidewalks outside an urban train station can be packed with
pedestrians at rush hour, either coming or going to their commute
trains.  An SDSP may want to proactively limit the number of active
Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to
NOT proxy B-RID messages.  These Finders will continue to report
their location and through that reporting, the SDSP can instruct
them to again take on the proxying role.  For example a Finder
moving slowly along with dozens of other slow-moving Finders may be
instructed to suspend proxying.  Whereas a fast-moving Finder at
the same location (perhaps a connected car or a pedestrian on a
bus) would not be asked to suspend proxying as it will soon be out
of the congested area.</t>

</section>
</section>
<section anchor="multilat" title="UA location via multilateration">

<t>The SDSP can confirm/correct the UA location provided in the 
Location/Vector message by using multilateration on data provided by
at least 3 Finders that reported a specific Location/Vector message 
(Note that 4 Finders are needed to get altitude sign correctly).  In 
fact, the SDSP can calculate the UA location from 3 observations of any
B-RID message.  This is of particular value if the UA is only within
reception range of the Finders for messages other than the 
Location/Vector message.</t>

<t>This feature is of particular value when the Finders are fixed assets
around a high value site like an airport or large public venue.</t>

<section anchor="gps-inaccuracy" title="GPS Inaccuracy">

<t>Single-band, consumer grade, GPS on small platforms is not accurate, 
particularly for altitude.  Longitude/latitude measurements can easily 
be off by 3M based on satellite postion and clock accuracy.  Altitude 
accuracy is reported in product spec sheets and actual tests to be 3x 
less accurate. Altitude accuracy is hindered by ionosphere activity. In 
fact, there are studies of ionospheric events (e.g. 2015 St. Patrick’s 
day <xref target="gps-ionosphere"/>) as measured by GPS devices at known locations.<vspace />
Thus where a UA reports it is rarely accurate, but may be accurate 
enough to map to visual sightings of single UA.</t>

<t>Smartphones and particulary smartwatches are plagued with the same
challenge, though some of these can combine other information like
cell tower data to improve location accuracy.  FCC E911 accuracy, by
FCC rules is NOT available to non-E911 applications due to privacy
concerns, but general higher accuracy is found on some smart devices
than reported for consumer UA.  The SDSP MAY have information on the
Finder location accuracy that it can use in calculating the accuracy of
a multilaterated location value.  When the Finders are fixed assets, the
SDSP may have very high trust in their location for trusting the
multilateration calculation over the UA reported location.</t>

</section>
</section>
<section anchor="CSRID_messages" title="The CS-RID Messages">

<t>The CS-RID messages between the Finders and the SDSPs primarily
support the proxy role of the Finders in forwarding the B-RID
messages.  There are also Finder registration and status messages.</t>

<t>CS-RID information is represented in CBOR <xref target="RFC7049"/>.
The CDDL <xref target="RFC8610"/> specification is used for CS-RID message description</t>

<t>CS-RID MAC and COAP <xref target="RFC7252"/> for the CS-RID protocol.</t>

<t>The following is a general representation of the content in the
CS-RID messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID MESSAGE CONTENT,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The CS-RID MESSAGE CONTENT varies by MESSAGE TYPE.</t>

<section anchor="CS-RID_MESSAGE_TYPE" title="CS-RID MESSAGE TYPE">

<t>The CS-RID MESSAGE TYPE is defined in <xref target="csrid-message"/>:</t>

<figure anchor="csrid-message"><artwork><![CDATA[
  Number   CS-RID Message Type
  ------   -----------------
  0        Reserved
  1        B-RID Forwarding
  2        Finder Registration
  3        SDSP Response
  4        Finder Location
]]></artwork></figure>

<section anchor="cddl-description-for-cs-rid-message-type" title="CDDL description for CS-RID message type">

<t>The overall CS-RID CDDL description is structured in <xref target="csrid-object"/>.</t>

<figure anchor="csrid-object"><artwork><![CDATA[
CSRID_Object = {
  application-context,
  info                => info_message,
  proxy_message       => broadcast_rid_proxy_message,
  finder_registration => finder_registration_message,
  sdsp_response       => sdsp_response_message,
  location_update     => location_update_message,
}

info_message = {
  common_message_members,
  message_content => tstr,
}

common_message_members = (
  message_type  => message_types,
  mac_address   => #6.37(bstr),
)

message_types = &(
  Reserved            : 0,
  BRD                 : 1,
  Finder-Registration : 2,
  SDSP-Response       : 3,
  Finder-Location     : 4,
)
]]></artwork></figure>

<t>The application context rule is defined in <xref target="csrid-app-context"/> for
CS-RID application identification and version negotiation.</t>

<figure anchor="csrid-app-context"><artwork><![CDATA[
application-context = (
  application => "DRIP-CSRID",
  ? version => uint .size(1..2),
)
]]></artwork></figure>

<t>The predefined CDDL text string labels (author note: for JSON currently, will move to CBOR uint keys in upcoming versions) used in the specification is listed in <xref target="csrid-variables"/>.</t>

<figure anchor="csrid-variables"><artwork><![CDATA[
application           = "application"
version               = "version"
info                  = "message_info"
proxy_message         = "proxy_message-type"
finder_registration   = "finder_registration"
sdsp_response         = "sdsp_response"
location_update       = "location_update"
rid                   = "id"
message_type          = "message_type"
mac_address           = "mac_address"
message_content       = "message_content"
timestamp             = "timestamp"
gps                   = "gps"
radio_type            = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message     = "broadcast_message"
sdsp_id               = "sdsp_id"
proxy_status_type     = "proxy_status_type"
update_interval       = "update_interval"
]]></artwork></figure>

</section>
</section>
<section anchor="CSRID_proxy" title="The CS-RID B-RID Proxy Message">

<t>The Finders add their own information to the B-RID messages,
permitting the SDSP(s) to gain additional knowledge about the
UA(s).  The RID information is the B-RID message content plus the
MAC address.  The MAC address is critical, as it is the only
field that links a UA’s B-RID messages together.  Only the ASTM
Basic ID Message and possibly the Authentication Message contain
the UAS ID field.</t>

<t>The Finders add an SDSP assigned ID, a 64 bit timestamp, GPS
information, and type of B-RID media to the B-RID message.  Both
the timestamp and GPS information are for when the B-RID
message(s) were received, not forwarded to the SDSP.  All this
content is MACed using a key shared between the Finder and SDSP.</t>

<t>The following is a representation of the content in the CS-RID
messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    RECEIVE TIMESTAMP,
    RECEIVE GPS,
    RECEIVE RADIO TYPE,
    B-RID MAC ADDRESS,
    B-RID MESSAGE,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="CS-RID_ID" title="CS-RID ID">

<t>The CS-RID ID is the ID recognized by the SDSP.  This may be an
HHIT <xref target="hierarchical-hit">Hierarchical HITs</xref>, or any ID used by the SDSP.</t>

</section>
<section anchor="cddl-description-for-cs-rid-b-rid-proxy-message" title="CDDL description for CS-RID B-RID Proxy Message">

<t>The broadcast CS-RID proxy CDDL is defined in <xref target="csrid-brid-proxy"/></t>

<figure anchor="csrid-brid-proxy"><artwork><![CDATA[
broadcast_rid_proxy_message = {
  common_message_members,
  rid                   => tstr,
  timestamp             => tdate,
  gps                   => gps-coordinates,
  radio_type            => radio_types,
  broadcast_mac_address => #6.37(bstr),
  broadcast_message     => #6.37(bstr),
}

radio_types = &(
  EFL : 0,
  VLF : 1,
  LF  : 2,
  MF  : 3,
  HF  : 4,
  HF  : 5,
  VHF : 6,
  UHF : 7,
  SHF : 8,
  EHF : 9,
)

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Reg" title="CS-RID Finder Registration">

<t>The CS-RID Finder MAY use <xref target="RFC7401">HIPv2</xref> with
the SDSP to establish a Security Association and a shared secret to
use for the CS-RID MAC generation.  In this approach, the HIPv2
mobility functionality and <xref target="RFC4303">ESP</xref> support are not used.</t>

<t>When HIPv2 is used as above, the Finder Registration is a SDSP
“wake up”.  It is sent prior to the Finder sending any proxied
B-RID messages to ensure that the SDSP is able to receive and
process the messages.</t>

<t>In this usage, the CS-RID is the Finder HIT.  If the SDSP has lost
state with the Finder, it initiates the HIP exchange with the
Finder to reestablish HIP state and a new shared secret for the
CS-RID B-RID Proxy Messages.  In this case the Finder Registration
Message is:</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-finder-registration" title="CDDL description for Finder Registration">
<t>The CDDL for CS-RID Finder Registration is defined in <xref target="csrid-finder-registration"/></t>

<figure anchor="csrid-finder-registration"><artwork><![CDATA[
finder_registration_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="SDSP_Reg_R" title="CS-RID SDSP Response">

<t>The SDSP MAY respond to any Finder messages to instruct the Finder on its
behavior.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID ID,
    CS-RID PROXY STATUS,
    CS-RID UPDATE INTERVAL,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The Proxy Status instructs the Finder if it should actively proxy
B-RID messages, or suspend proxying and only report its location.</t>

<t>The Update Interval is the frequency that the Finder SHOULD notify
the SDSP of its current location using the Location Update message.</t>

<section anchor="cddl-description-for-sdsp-response" title="CDDL description for SDSP Response">

<t>The CDDL for CS-RID SDSP response is defined in <xref target="csrid-sdsp-response"/></t>

<figure anchor="csrid-sdsp-response"><artwork><![CDATA[
sdsp_response_message = {
  common_message_members,
  sdsp_id           => tstr,
  rid               => tstr,
  proxy_status_type => proxy_status_types,
  update_interval   => uint,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]

proxy_status_types = &(
  0: "forward",
  1: "reverse",
  2: "bi-directional",
)
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Upd" title="CS-RID Location Update">

<t>The Finder SHOULD provide regular location updates to the SDSP. The
interval is based on the Update Interval from <xref target="SDSP_Reg_R"/> plus a random slew less than
1 second.  The Location Update message is only sent when no other
CS-RID messages, containing the Finder’s GPS location, have been
sent since the Update Interval.</t>

<t>If the Finder has not recieved a SDSP Registration Response, a
default of 5 minutes is used for the Update Interval.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-location-update" title="CDDL description for Location Update">

<t>The CDDL for CS-RID Location update is defined in <xref target="csrid-location-update"/></t>

<figure anchor="csrid-location-update"><artwork><![CDATA[
location_update_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="the-full-cs-rid-cddl-specification" title="The Full CS-RID CDDL specification">

<figure><artwork type="CDDL"><![CDATA[
<CODE BEGINS>
; CDDL specification for Crowd source RID
; It specifies a collection of CS message types
;

;
; The CSRID overall data structure

CSRID_Object = {
    application-context,
    info =>  info_message,
    proxy_message => broadcast_rid_proxy_message,
    finder_registration => finder_registration_message,
    sdsp_response => sdsp_response_message,
    location_update => location_update_message,
}

;
; Application context: general information about CSRID message 

application-context = (
    application => "DRIP-CSRID", ; TBD: consider CBOR tag 
    ? version => uint .size(1..2),
)

; These members are include in every message
common_message_members = (
    message_type => message_types,
    mac_address => #6.37(bstr),
)

;
; CSRID message general information

info_message = {
    common_message_members,
    message_content => tstr,
}

broadcast_rid_proxy_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
    radio_type => radio_types,
    broadcast_mac_address => #6.37(bstr)
    broadcast_message => #6.37(bstr)
}

finder_registration_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

sdsp_response_message = {
    common_message_members,
    sdsp_id => tstr,
    rid => tstr,
    proxy_status_type => proxy_status_types,
    update_interval => uint,
}

location_update_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

;
; Common rule definition

message_types = &(
    Reserved            : 0,
    BRD                 : 1,
    Finder-Registration : 2,
    SDSP-Response       : 3,
    Finder-Location     : 4,
)

gps-coordinates = [
    lat: float,
    long: float,
]

; Radio types, choose from one of radio_types (required)
radio_types = &(
    EFL : 0,
    VLF : 1,
    LF  : 2,
    MF  : 3,
    HF  : 4,
    HF  : 5,
    VHF : 6,
    UHF : 7,
    SHF : 8,
    EHF : 9,
)

proxy_status_types = &(
    0: "forward",
    1: "reverse",
    2: "bi",
)

;
; JSON label names

application = "application"
version = "version"
info = "message_info"
proxy_message = "proxy_message-type"
finder_registration = "finder_registration"
sdsp_response = "sdsp_response"
location_update = "location_update"
rid = "id"
message_type = "message_type"
mac_address = "mac_address"
message_content = "message_content"
timestamp = "timestamp"
gps = "gps"
radio_type = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message = "broadcast_message"
sdsp_id = "sdsp_id"
proxy_status_type = "proxy_status_type"
update_interval = "update_interval"
 
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="IANA" title="IANA Considerations">

<t>TBD</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

<section anchor="privacy-concerns" title="Privacy Concerns">

<t>TBD</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC8610' target='https://www.rfc-editor.org/info/rfc8610'>
<front>
<title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
<author fullname='H. Birkholz' initials='H.' surname='Birkholz'><organization/></author>
<author fullname='C. Vigano' initials='C.' surname='Vigano'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8610'/>
<seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>FAA Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="gps-ionosphere" target="https://doi.org/10.1002/2015JA021629">
  <front>
    <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>



<reference anchor='tmrid-auth'>
   <front>
      <title>TM-RID Authentication Formats</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='18' month='February' year='2020'/>
      <abstract>
	 <t>   This document describes how to include trust into the proposed ASTM
   Remote ID specification defined in WK65041 by the F38 Committee under
   a Broadcast Remote ID (RID) scenario.  It defines a few different
   message schemes (based on the authentication message) that can be
   used to assure past messages sent by a UA and also act as an
   assurance for UA trustworthiness in the absence of Internet
   connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-wiethuechter-tmrid-auth-05'/>
   <format target='https://www.ietf.org/archive/id/draft-wiethuechter-tmrid-auth-05.txt' type='TXT'/>
</reference>


<reference anchor='hierarchical-hit'>
   <front>
      <title>Hierarchical HITs for HIPv2</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <date day='13' month='May' year='2020'/>
      <abstract>
	 <t>   This document describes using a hierarchical HIT to facilitate large
   deployments of managed devices.  Hierarchical HITs differ from HIPv2
   flat HITs by only using 64 bits for mapping the Host Identity,
   freeing 32 bits to bind in a hierarchy of Registering Entities that
   provide services to the consumers of hierarchical HITs.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hierarchical-hit-05'/>
   <format target='https://www.ietf.org/archive/id/draft-moskowitz-hip-hierarchical-hit-05.txt' type='TXT'/>
</reference>


<reference anchor='hhit-registries'>
   <front>
      <title>Hierarchical HIT Registries</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <date day='9' month='March' year='2020'/>
      <abstract>
	 <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02'/>
   <format target='https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt' type='TXT'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC5238' target='https://www.rfc-editor.org/info/rfc5238'>
<front>
<title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
<author fullname='T. Phelan' initials='T.' surname='Phelan'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP).  DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.  DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5238'/>
<seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>



<reference anchor='RFC4303' target='https://www.rfc-editor.org/info/rfc4303'>
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author fullname='S. Kent' initials='S.' surname='Kent'><organization/></author>
<date month='December' year='2005'/>
<abstract><t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4303'/>
<seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7049' target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>


<section anchor="LIDAR" title="Using LIDAR for UA location">

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a
connected car) that has full sky coverage, the Finder can use this
equipment to locate UAs in its airspace.  The Finder would then be
able to detect non-participating UAs.  A non-participating UA is
one that the Finder can “see” with the LIDAR, but not “hear” any
B-RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate
B-RID messages, and forward them to the SPDP as any real B-RID
messages.  There is an open issue as what to use for the actual
RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a
non-participating UA that it has received from multiple Finders
with LIDAR detection.  In doing so, it would have to select a
RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is
beyond range for its B-RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs
on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is
needed.  there are full-sky LIDAR for automotive use with ranges
varying from 20M to 250M.  Would more than UA location information
be available?  What information can be sent in a CS-RID message for
such “unmarked” UAs?</t>

</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The Crowd Sourcing idea in this document came from the Apple “Find
My Device” presentation at the International Association for
Cryptographic Research’s Real World Crypto 2020 conference.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

