<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.9 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-moskowitz-drip-crowd-sourced-rid-10" category="std" consensus="true" submissionType="IETF" xml:lang="en" obsoletes="" updates="" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao" fullname="Shuai Zhao">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd</street>
          <city>Santa Clara</city>
          <region>CA</region>
          <code>95054</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date year="2023" />

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes using the ASTM Broadcast Remote ID (B-RID) specification in a "crowd sourced" smart phone or fixed receiver asset environment to provide much of the ASTM and FAA envisioned Network Remote ID (Net-RID) functionality. This crowd sourced B-RID (CS-RID) data will use multilateration to add a level of reliability in the location data on the Unmanned Aircraft (UA). The crowd sourced environment will also provide a monitoring coverage map to authorized observers.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a mechanism to capture the ASTM Broadcast Remote ID messages (B-RID) <xref target="F3411-22a"/> on any Internet connected device that receives them and can forward them to the Supplemental Data Service Providers (SDSPs) responsible for the geographic area the UA and receivers are in.  This will create a ecosystem that will meet most if not all data collection requirements that Civil Aviation Authorities (CAA) are placing on Network Remote ID (Net-RID).</t>

<t>These Internet connected devices are herein called "Finders", as they find UAs by listening for B-RID messages.  The Finders are B-RID forwarding proxies. Their potentially limited spacial view of RID messages could result in bad decisions on what messages to send to the SDSP and which to drop.  Thus they will send all received messages and the SDSP will make any filtering decisions in what it forwards into the UAS Traffic Management (UTM).</t>

<t>Finders can be smartphones, tablets, connected cars, or any computing platform with Internet connectivity that can meet the requirements defined in this document.  It is not expected, nor necessary, that Finders have any information about a UAS beyond the content in the B-RID messages.</t>

<t>Finders MAY only need a loose association with the SDSP(s).  They may only have the SDSP's Public Key and FQDN.  It would use these,
along with the Finder's Public Keypair to use Elliptic Curve Integrated Encryption Scheme (ECIES), or other security methods, to send the messages in a secure manner to the SDSP.  The SDSP MAY require a stronger relationship to the Finders.  This may range from the Finder's Public Key being registered to the SDSP with other information so that the SDSP has some level of trust in the Finders to requiring transmissions be sent over long-lived transport connections like ESP or DTLS.</t>

<t>If a 1-way only secure packet forwarding method is used (e.g., not a TCP connection), the Finder SHOULD receive periodic "heartbeats" from the SDSP to inform it that its transmissions are being received.  The SDSP sets the rules on when to send these heartbeats as discuss below in <xref target="sdsp_heartbeats"/>.</t>

<section anchor="role-of-supplemental-data-service-provider-sdsp"><name>Role of Supplemental Data Service Provider (SDSP)</name>

<t>The DRIP Architecture <xref target="I-D.ietf-drip-arch"/> introduces the basic CS-RID entities including CS-RID Finder and CS-RID SDSP. This document has minimal information about the actions of SDSPs. In general the SDSP is out of scope of this document. That said, the SDSPs should not simply proxy B-RID messages to the UTM(s). They should perform some minimal level of filtering and content checking before forwarding those messages that pass these tests in a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based on location of active Finders.  UTMs may use this information to notify authorized observers of where there is and there is not monitoring coverage.  They may also use this information of where to place pro-active monitoring coverage.</t>

<t>An SDSP should only forward Authenticated B-RID messages like those defined in <xref target="drip-authentication"/> to the UTM(s). Further, the SDSP SHOULD validate the Remote ID (RID) and the Authentication signature before forwarding anything from the UA, and flagging those RIDs that were not validated.  The SDSP MAY forward all B-RID messages to the UTM, leaving all decision making on B-RID messages veracity to the UTM.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA, the SDSP is in a unique position to perform multilateration on these messages and compute the Finder's view of the UA location to compare with the UA Location/Vector messages.  This check against the UA's location claims is both a validation on the UA's reliability as well as the trustworthiness of the Finders.  Other than providing data to allow for multilateration, this SDSP feature is out of scope of this document.  This function is limited by the location accuracy for both the Finders and UA.</t>

</section>
<section anchor="draft-status"><name>Draft Status</name>

<t>This draft is still incomplete.  New features are being added as capabilities are researched.  The actual message formats also still need work.</t>

</section>
</section>
<section anchor="terms"><name>Terms and Definitions</name>

<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>This document uses terms defined in <xref target="RFC9153"/> and <xref target="I-D.ietf-drip-arch"/>.</t>

</section>
<section anchor="definitions"><name>Definitions</name>

<dl newline="true">
  <dt>B-RID:</dt>
  <dd>
    <t>Broadcast Remote ID. A method of sending RID messages as
1-way transmissions from the UA to any Observers within
radio range.</t>
  </dd>
</dl>

<!-- C2:

: Command and Control.  Previously mostly used in military contexts.
  Properly refers to a function that is exercisable over arbitrary
  communications, but in the small UAS context, often refers to the
  communications (typically RF data link) over which the GCS
  controls the UA. -->

<!-- CAA:

: Civil Aeronautics Administration. An example is the Federal
  Aviation Administration (FAA) in the United States of
  America. -->
<!-- 
DAA:

: Detect and Avoid. The process of a UA detecting obstacles,
  like other UAs and taking the necessary evasive action. -->

<dl>
  <dt>ECIES:</dt>
  <dd>
    <t>Elliptic Curve Integrated Encryption Scheme.  A hybrid
encryption scheme which provides semantic security against
an adversary who is allowed to use chosen-plaintext and
chosen-ciphertext attacks.</t>
  </dd>
</dl>

<!-- GCS:

: Ground Control Station. The part of the UAS that the remote
  pilot uses to exercise C2 over the UA, whether by remotely
  exercising UA flight controls to fly the UA, by setting GPS
  waypoints, or otherwise directing its flight. -->

<dl>
  <dt>Finder:</dt>
  <dd>
    <t>In Internet connected device that can receive B-RID
messages and forward them to a UTM.</t>
  </dd>
</dl>

<!-- Observer:

: Referred to in other UAS documents as a "user", but there
  are also other classes of RID users, so we prefer
  "observer" to denote an individual who has observed an UA
  and wishes to know something about it, starting with its
  RID. -->

<dl>
  <dt>Multilateration:</dt>
  <dd>
    <t>Multilateration (more completely, pseudo range
multilateration) is a navigation and surveillance technique
based on measurement of the times of arrival (TOAs) of
energy waves (radio, acoustic, seismic, etc.) having a
known propagation speed.</t>
  </dd>
</dl>

<!-- NETSP:

: Network RID Service Provider. USS receiving Network RID
  messages from UAS (UA or GCS), storing for a short
  specified time, making available to NETDP.

NETDP:

: Network RID Display Provider. Entity (might be USS)
  aggregating data from multiple NETSPs to answer query from
  observer (or other party) desiring Situational Awareness of
  UAS operating in a specific airspace volume. -->

<dl>
  <dt>Net-RID:</dt>
  <dd>
    <t>Network Remote ID. A method of sending RID messages via the
Internet connection of the UAS directly to the UTM.</t>
  </dd>
</dl>

<!-- UAS RID:

: Remote ID. A unique identifier found on all UA to be used
  in communication and in regulation of UA operation. -->

<!-- SDSP:

: Supplemental Data Service Provider. Entity providing
  information that is allowed, but not required to be present
  in the UTM system. -->

<!-- UA:

: Unmanned Aircraft. In this document UA's are typically
  though of as drones of commercial or military variety. This
  is a very strict definition which can be relaxed to include
  any and all aircraft that are unmanned. -->
<!-- 
UAS:

: Unmanned Aircraft System. Composed of Unmanned Aircraft and
  all required on-board subsystems, payload, control station,
  other required off-board subsystems, any required launch
  and recovery equipment, all required crew members, and C2
  links between UA and the control station. -->

<!-- UTM:

: UAS Traffic Management. A "traffic management" ecosystem
  for uncontrolled operations that is separate from, but
  complementary to, the FAA's Air Traffic Management (ATM)
  system. -->

<!-- USS:

: UAS Service Supplier. Provide UTM services to support the
  UAS community, to connect Operators and other entities to
  enable information flow across the USS network, and to
  promote shared situational awareness among UTM
  participants. (From FAA UTM ConOps V1, May 2018). -->

</section>
</section>
<section anchor="prob-space"><name>Problem Space</name>

<section anchor="meeting-the-needs-of-network-remote-id"><name>Meeting the needs of Network Remote ID</name>

<t>The USA Federal Aviation Authority (FAA), in the January 2021 Remote ID Final rule <xref target="FAA-FR"/>, postponed Network Remote ID (Net-RID) and focused on Broadcast Remote ID.  This was in response to the UAS vendors comments that Net-RID places considerable demands on then currently used UAS.</t>

<t>However, Net-RID, or equivalent, is necessary for UTM and knowing what soon may be in an airspace.  A method that proxies B-RID into UTM can function as an interim approach to Net-RID and continue as a adjunct to Net-RID.</t>

</section>
<section anchor="advantages-of-broadcast-remote-id"><name>Advantages of Broadcast Remote ID</name>

<t>B-RID has its advantages over Net-RID.</t>

<t><list style="symbols">
  <t>B-RID can more readily be implemented directly in the UA. Net-RID will more frequently be provided by the GCS or a pilot's Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over a direct radio connection, B-RID could be a straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide B-RID.</t>
    </list></t>
  <t>B-RID can also be used by the UA to assist in Detect and Avoid (DAA).</t>
  <t>B-RID is available to observers even in situations with no Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="trustworthiness-of-proxied-data"><name>Trustworthiness of Proxied Data</name>

<t>When a proxy is introduced in any communication protocol, there is a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for B-RID, are authenticated to the SDSP (see <xref target="Finder_Sec"/>). The SDSP can compare the information from multiple Finders to isolate a Finder sending fraudulent information.  SDSPs can additionally verify authenticated messages that follow <xref target="drip-authentication"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see <xref target="Finder_Manage"/>) to limit DOS attacks from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages"><name>Defense against fraudulent RID Messages</name>

<t>The strongest defense against fraudulent RID messages is to focus on <xref target="drip-authentication"/> conforming messages.  Unless this behavior is
mandated, SPDPs will have to use assorted algorithms to isolate messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec"><name>The Finder - SDSP Security Relationship</name>

<t>The SDSP(s) and Finders SHOULD use EdDSA <xref target="RFC8032"/> keys as their
trusted Identities. The public keys SHOULD be registered DRIP UAS Remote ID <xref target="I-D.ietf-drip-rid"/> and <xref target="I-D.ietf-drip-registries"/>.  Other similar methods may be used.</t>

<t>During this registration, the Finder gets the SDSP's EdDSA Public Key.  These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t>The SDSP uses some process (out of scope here) to register the Finders and their EdDSA Public Key.  During this registration, the Finder gets the SDSP's EdDSA Public Key.  These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t><list style="numbers">
  <t>EdDSA keys are converted to X25519 keys per Curve25519 <xref target="RFC7748"/> to use in ECIES.</t>
  <t>ECIES can be used with a unique nonce to authenticate each message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to establish a shared secret that is then used to authenticate each message sent from a Finder to the SDSP sent during that period.</t>
  <t>HIP <xref target="RFC7401"/> can be used to establish a session secret that is then used with ESP <xref target="RFC4303"/> to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/>  can be used to establish a secure connection that is then used to authenticate each message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="sdsp_heartbeats"><name>SDSP Heartbeats</name>

<t>If a 1-way messaging approach is used (e.g. not TCP-based), the SDSP SHOULD send a heartbeat at some periodicity to the Finders so that they get confirmation that there is a receiver of their transmissions.</t>

<t>A simple (see <xref target="sdsp_heartbeat_cddl"/>) message that identifies the SDSP is sent to the Finder per some published policy of the SDSP.  For example, at the first reception by the SDSP for the day, then the 1st for the hour.  It is NOT recommended for the SDSP to send a heartbeat for every message received, as this is a potential DOS attack against the SDSP.</t>

</section>
<section anchor="Finder_Map"><name>The Finder Map</name>

<t>The Finders are regularly providing their SDSP with their location. This is through the B-RID Proxy Messages and Finder Location Update
Messages.  With this information, the SDSP can maintain a monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage"><name>Managing Finders</name>

<t>Finder density will vary over time and space.  For example, sidewalks outside an urban train station can be packed with pedestrians at rush hour, either coming or going to their commute trains.  An SDSP may want to proactively limit the number of active Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to NOT proxy B-RID messages.  These Finders will continue to report their location and through that reporting, the SDSP can instruct them to again take on the proxying role.  For example a Finder moving slowly along with dozens of other slow-moving Finders may be instructed to suspend proxying.  Whereas a fast-moving Finder at the same location (perhaps a connected car or a pedestrian on a bus) would not be asked to suspend proxying as it will soon be out of the congested area.</t>

</section>
</section>
<section anchor="multilat"><name>UA location via multilateration</name>

<t>The SDSP can confirm/correct the UA location provided in the Location/Vector message by using multilateration on data provided by at least 3 Finders that reported a specific Location/Vector message (Note that 4 Finders are needed to get altitude sign correctly).  In fact, the SDSP can calculate the UA location from 3 observations of any B-RID message.  This is of particular value if the UA is only within reception range of the Finders for messages other than the  Location/Vector message.</t>

<t>This feature is of particular value when the Finders are fixed assets with highly reliable GPS location, around a high value site like an airport or large public venue.</t>

<section anchor="gps-inaccuracy"><name>GPS Inaccuracy</name>

<t>Single-band, consumer grade, GPS on small platforms is not accurate, particularly for altitude.  Longitude/latitude measurements can easily  be off by 3M based on satellite postion and clock accuracy.  Altitude accuracy is reported in product spec sheets and actual tests to be 3x  less accurate. Altitude accuracy is hindered by ionosphere activity. In fact, there are studies of ionospheric events (e.g. 2015 St. Patrick's  day <xref target="gps-ionosphere"/>) as measured by GPS devices at known locations.  Thus where a UA reports it is rarely accurate, but may be accurate enough to map to visual sightings of single UA.</t>

<t>Smartphones and particulary smartwatches are plagued with the same challenge, though some of these can combine other information like cell tower data to improve location accuracy.  FCC E911 accuracy, by FCC rules is NOT available to non-E911 applications due to privacy concerns, but general higher accuracy is found on some smart devices than reported for consumer UA.  The SDSP MAY have information on the Finder location accuracy that it can use in calculating the accuracy of a multilaterated location value.  When the Finders are fixed assets, the SDSP may have very high trust in their location for trusting the
multilateration calculation over the UA reported location.</t>

</section>
</section>
<section anchor="CSRID_messages"><name>The CS-RID Messages</name>

<t>The CS-RID messages between the Finders and the SDSPs primarily support the proxy role of the Finders in forwarding the B-RID messages.  There are also Finder registration and status messages.</t>

<t>CS-RID information is represented in CBOR <xref target="RFC7049"/>.
COSE <xref target="RFC8152"/> MAY be used for CS-RID MAC and COAP <xref target="RFC7252"/> for the CS-RID protocol.
The CDDL <xref target="RFC8610"/> specification is used for CS-RID message description.</t>

<t>The following is a general representation of the content in the CS-RID messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID MESSAGE CONTENT,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The CS-RID MESSAGE CONTENT varies by MESSAGE TYPE.</t>

<section anchor="CS-RID_MESSAGE_TYPE"><name>CS-RID MESSAGE TYPE</name>

<t>The CS-RID MESSAGE TYPE is defined in <xref target="csrid-message"/>:</t>

<figure anchor="csrid-message"><artwork><![CDATA[
  Number   CS-RID Message Type
  ------   -----------------
  0        Reserved
  1        B-RID Forwarding
  2        Finder Registration
  3        SDSP Response
  4        Finder Location
  5        SDSP Heartbeat
]]></artwork></figure>

<section anchor="cddl-description-for-cs-rid-message-type"><name>CDDL description for CS-RID message type</name>

<t>The overall CS-RID CDDL description is structured in <xref target="csrid-object"/>.</t>

<figure anchor="csrid-object"><artwork><![CDATA[
CSRID_Object = {
  application-context,
  info                => info_message,
  proxy_message       => broadcast_rid_proxy_message,
  finder_registration => finder_registration_message,
  sdsp_response       => sdsp_response_message,
  location_update     => location_update_message,
  sdsp_heartbeat      => sdsp_heartbeat_message,
}

info_message = {
  common_message_members,
  message_content => tstr,
}

common_message_members = (
  message_type  => message_types,
  mac_address   => #6.37(bstr),
)

message_types = &(
  Reserved            : 0,
  BRD                 : 1,
  Finder-Registration : 2,
  SDSP-Response       : 3,
  Finder-Location     : 4,
)
]]></artwork></figure>

<t>The application context rule is defined in <xref target="csrid-app-context"/> for
CS-RID application identification and version negotiation.</t>

<figure anchor="csrid-app-context"><artwork><![CDATA[
application-context = (
  application => "DRIP-CSRID",
  ? version => uint .size(1..2),
)
]]></artwork></figure>

<t>The predefined CDDL text string labels (author note: for JSON currently, will move to CBOR uint keys in upcoming versions) used in the specification is listed in <xref target="csrid-variables"/>.</t>

<figure anchor="csrid-variables"><artwork><![CDATA[
application           = "application"
version               = "version"
info                  = "message_info"
proxy_message         = "proxy_message-type"
finder_registration   = "finder_registration"
sdsp_response         = "sdsp_response"
location_update       = "location_update"
sdsp_heartbeat        = "sdsp_heartbeat"
rid                   = "id"
message_type          = "message_type"
mac_address           = "mac_address"
message_content       = "message_content"
timestamp             = "timestamp"
gps                   = "gps"
radio_type            = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message     = "broadcast_message"
sdsp_id               = "sdsp_id"
proxy_status_type     = "proxy_status_type"
update_interval       = "update_interval"
]]></artwork></figure>

</section>
</section>
<section anchor="CSRID_proxy"><name>The CS-RID B-RID Proxy Message</name>

<t>The Finders add their own information to the B-RID messages,
permitting the SDSP(s) to gain additional knowledge about the
UA(s).  The RID information is the B-RID message content plus the
MAC address.  The MAC address is critical, as it is the only
field that links a UA's B-RID messages together.  Only the ASTM
Basic ID Message and possibly the Authentication Message contain
the UAS ID field.</t>

<t>The Finders add an SDSP assigned ID, a 64 bit timestamp, GPS
information, and type of B-RID media to the B-RID message.  Both
the timestamp and GPS information are for when the B-RID
message(s) were received, not forwarded to the SDSP.  All this
content is MACed using a key shared between the Finder and SDSP.</t>

<t>The following is a representation of the content in the CS-RID
messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    RECEIVE TIMESTAMP,
    RECEIVE GPS,
    RECEIVE RADIO TYPE,
    B-RID MAC ADDRESS,
    B-RID MESSAGE,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="CS-RID_ID"><name>CS-RID ID</name>

<t>The CS-RID ID is the ID recognized by the SDSP.  This may be an HHIT <xref target="I-D.ietf-drip-rid"/>, or any ID used by the SDSP.</t>

</section>
<section anchor="cddl-description-for-cs-rid-b-rid-proxy-message"><name>CDDL description for CS-RID B-RID Proxy Message</name>

<t>The broadcast CS-RID proxy CDDL is defined in <xref target="csrid-brid-proxy"/></t>

<figure anchor="csrid-brid-proxy"><artwork><![CDATA[
broadcast_rid_proxy_message = {
  common_message_members,
  rid                   => tstr,
  timestamp             => tdate,
  gps                   => gps-coordinates,
  radio_type            => radio_types,
  broadcast_mac_address => #6.37(bstr),
  broadcast_message     => #6.37(bstr),
}

radio_types = &(
  EFL : 0,
  VLF : 1,
  LF  : 2,
  MF  : 3,
  HF  : 4,
  HF  : 5,
  VHF : 6,
  UHF : 7,
  SHF : 8,
  EHF : 9,
)

gps-coordinates = [
  latitude : float,
  longitude: float,
  altitude : float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Reg"><name>CS-RID Finder Registration</name>

<t>The CS-RID Finder MAY use <xref target="RFC7401"/> with the SDSP to establish a Security Association and a shared secret to use for the CS-RID MAC generation.  In this approach, the HIP mobility functionality and <xref target="RFC4303"/> support are not used.</t>

<t>When HIP is used as above, the Finder Registration is a SDSP "wake up".  It is sent prior to the Finder sending any proxied
B-RID messages to ensure that the SDSP is able to receive and process the messages.</t>

<t>In this usage, the CS-RID ID is the Finder HIT.  If the SDSP has lost state with the Finder, it initiates the HIP exchange with the
Finder to reestablish HIP state and a new shared secret for the CS-RID B-RID Proxy Messages.  In this case the Finder Registration
Message is:</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-finder-registration"><name>CDDL description for Finder Registration</name>
<t>The CDDL for CS-RID Finder Registration is defined in <xref target="csrid-finder-registration"/></t>

<figure anchor="csrid-finder-registration"><artwork><![CDATA[
finder_registration_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
  altitude : float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="SDSP_Reg_R"><name>CS-RID SDSP Response</name>

<t>The SDSP MAY respond to any Finder messages to instruct the Finder on its
behavior.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID ID,
    CS-RID PROXY STATUS,
    CS-RID UPDATE INTERVAL,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The Proxy Status instructs the Finder if it should actively proxy
B-RID messages, or suspend proxying and only report its location.</t>

<t>The Update Interval is the frequency that the Finder SHOULD notify
the SDSP of its current location using the Location Update message.</t>

<section anchor="cddl-description-for-sdsp-response"><name>CDDL description for SDSP Response</name>

<t>The CDDL for CS-RID SDSP response is defined in <xref target="csrid-sdsp-response"/></t>

<figure anchor="csrid-sdsp-response"><artwork><![CDATA[
sdsp_response_message = {
  common_message_members,
  sdsp_id           => tstr,
  rid               => tstr,
  proxy_status_type => proxy_status_types,
  update_interval   => uint,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
  altitude : float,
]

proxy_status_types = &(
  0: "forward",
  1: "reverse",
  2: "bi-directional",
)
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Upd"><name>CS-RID Location Update</name>

<t>The Finder SHOULD provide regular location updates to the SDSP. The
interval is based on the Update Interval from <xref target="SDSP_Reg_R"/> plus a random slew less than
1 second.  The Location Update message is only sent when no other
CS-RID messages, containing the Finder's GPS location, have been
sent since the Update Interval.</t>

<t>If the Finder has not recieved a SDSP Registration Response, a
default of 5 minutes is used for the Update Interval.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-location-update"><name>CDDL description for Location Update</name>

<t>The CDDL for CS-RID Location update is defined in <xref target="csrid-location-update"/>.</t>

<figure anchor="csrid-location-update"><artwork><![CDATA[
location_update_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
  altitude : float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="sdsp_heartbeat_cddl"><name>SDSP Heartbeat</name>

<t>The SDSP SHOULD send a heartbeat message at some periodicity to the Finders so that they get confirmation that their is a receiver of their transmissions.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID TIMESTAMP,
  )
]]></artwork></figure>

<section anchor="cddl-description-for-sdsp-heartbeat"><name>CDDL description for SDSP Heartbeat</name>

<t>The CDDL for CS-RID Heartbeat is defined in <xref target="csrid-sdsp-heartbeat"/>.</t>

<figure anchor="csrid-sdsp-heartbeat"><artwork><![CDATA[
sdsp_heartbeat_messagege = {
  common_message_members,
  sdsp_id   => tstr,
  timestamp => tdate,
}

]]></artwork></figure>

</section>
</section>
</section>
<section anchor="the-full-cs-rid-cddl-specification"><name>The Full CS-RID CDDL specification</name>

<figure><sourcecode type="CDDL"><![CDATA[
<CODE BEGINS>
; CDDL specification for Crowd source RID
; It specifies a collection of CS message types
;

;
; The CSRID overall data structure

CSRID_Object = {
    application-context,
    info =>  info_message,
    proxy_message => broadcast_rid_proxy_message,
    finder_registration => finder_registration_message,
    sdsp_response => sdsp_response_message,
    location_update => location_update_message,
}

;
; Application context: general information about CSRID message 

application-context = (
    application => "DRIP-CSRID", ; TBD: consider CBOR tag 
    ? version => uint .size(1..2),
)

; These members are include in every message
common_message_members = (
    message_type => message_types,
    mac_address => #6.37(bstr),
)

;
; CSRID message general information

info_message = {
    common_message_members,
    message_content => tstr,
}

broadcast_rid_proxy_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
    radio_type => radio_types,
    broadcast_mac_address => #6.37(bstr)
    broadcast_message => #6.37(bstr)
}

finder_registration_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

sdsp_response_message = {
    common_message_members,
    sdsp_id => tstr,
    rid => tstr,
    proxy_status_type => proxy_status_types,
    update_interval => uint,
}

location_update_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

;
; Common rule definition

message_types = &(
    Reserved            : 0,
    BRD                 : 1,
    Finder-Registration : 2,
    SDSP-Response       : 3,
    Finder-Location     : 4,
)

gps-coordinates = [
    lat: float,
    long: float,
    alt : float,
]

; Radio types, choose from one of radio_types (required)
radio_types = &(
    EFL : 0,
    VLF : 1,
    LF  : 2,
    MF  : 3,
    HF  : 4,
    HF  : 5,
    VHF : 6,
    UHF : 7,
    SHF : 8,
    EHF : 9,
)

proxy_status_types = &(
    0: "forward",
    1: "reverse",
    2: "bi",
)

;
; JSON label names

application = "application"
version = "version"
info = "message_info"
proxy_message = "proxy_message-type"
finder_registration = "finder_registration"
sdsp_response = "sdsp_response"
location_update = "location_update"
rid = "id"
message_type = "message_type"
mac_address = "mac_address"
message_content = "message_content"
timestamp = "timestamp"
gps = "gps"
radio_type = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message = "broadcast_message"
sdsp_id = "sdsp_id"
proxy_status_type = "proxy_status_type"
update_interval = "update_interval"
 
<CODE ENDS>
]]></sourcecode></figure>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>TBD</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

<section anchor="privacy-concerns"><name>Privacy Concerns</name>

<t>TBD</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC8610' target='https://www.rfc-editor.org/info/rfc8610'>
<front>
<title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
<author fullname='H. Birkholz' initials='H.' surname='Birkholz'><organization/></author>
<author fullname='C. Vigano' initials='C.' surname='Vigano'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8610'/>
<seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>



<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname='S. Card' initials='S.' role='editor' surname='Card'><organization/></author>
<author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'><organization/></author>
<author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'><organization/></author>
<author fullname='A. Gurtov' initials='A.' surname='Gurtov'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9153'/>
<seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>



<reference anchor='RFC8152' target='https://www.rfc-editor.org/info/rfc8152'>
<front>
<title>CBOR Object Signing and Encryption (COSE)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t></abstract>
</front>
<seriesInfo name='RFC' value='8152'/>
<seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-22a" target="https://www.astm.org/f3411-22a.html">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2022" month="July"/>
  </front>
</reference>
<reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>FAA Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="gps-ionosphere" target="https://doi.org/10.1002/2015JA021629">
  <front>
    <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>



<reference anchor='drip-authentication'>
   <front>
      <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <date day='14' month='October' year='2022'/>
      <abstract>
	 <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   It defines message types and associated formats (sent within the
   Authentication Message) that can be used to authenticate past
   messages sent by an unmanned aircraft (UA) and provide proof of UA
   trustworthiness even in the absence of Internet connectivity at the
   receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-26'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-26.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov' initials='A.' surname='Gurtov'>
         <organization>Linköping University</organization>
      </author>
      <date day='2' month='December' year='2022'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   identifier for use as the Unmanned Aircraft System Remote
   Identification and tracking (UAS RID).

   This document updates RFC7401 and RFC7343.

   Within the context of RID, HHITs will be called DRIP Entity Tags
   (DETs).  HHITs provide claims to the included explicit hierarchy that
   provides registry (via, e.g., DNS, RDAP) discovery for 3rd-party
   identifier endorsement.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-37'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-37.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-registries'>
   <front>
      <title>DRIP Entity Tag (DET) Identity Management Architecture</title>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Jim Reid' initials='J.' surname='Reid'>
         <organization>RTFM llp</organization>
      </author>
      <date day='5' month='December' year='2022'/>
      <abstract>
	 <t>   This document describes the high level architecture for the
   registration and discovery of DRIP Entity Tags (DETs) using DNS.
   Discovery of DETs and their artifacts are through the existing DNS
   structure and methods by using FQDNs.  A general overview of the
   interfaces required between involved components is described in this
   document with supporting documents giving technical specifications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-07'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-registries-07.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-arch'>
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <author fullname='Shuai Zhao' initials='S.' surname='Zhao'>
         <organization>Intel</organization>
      </author>
      <author fullname='Andrei Gurtov' initials='A.' surname='Gurtov'>
         <organization>Linköping University</organization>
      </author>
      <date day='16' month='August' year='2022'/>
      <abstract>
	 <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-arch-29'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-arch-29.txt' type='TXT'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC5238' target='https://www.rfc-editor.org/info/rfc5238'>
<front>
<title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
<author fullname='T. Phelan' initials='T.' surname='Phelan'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP).  DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.  DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5238'/>
<seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>



<reference anchor='RFC4303' target='https://www.rfc-editor.org/info/rfc4303'>
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author fullname='S. Kent' initials='S.' surname='Kent'><organization/></author>
<date month='December' year='2005'/>
<abstract><t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4303'/>
<seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7049' target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC7748' target='https://www.rfc-editor.org/info/rfc7748'>
<front>
<title>Elliptic Curves for Security</title>
<author fullname='A. Langley' initials='A.' surname='Langley'><organization/></author>
<author fullname='M. Hamburg' initials='M.' surname='Hamburg'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='January' year='2016'/>
<abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract>
</front>
<seriesInfo name='RFC' value='7748'/>
<seriesInfo name='DOI' value='10.17487/RFC7748'/>
</reference>




    </references>


<section anchor="LIDAR"><name>Using LIDAR for UA location</name>

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a
connected car) that has full sky coverage, the Finder can use this
equipment to locate UAs in its airspace.  The Finder would then be
able to detect non-participating UAs.  A non-participating UA is
one that the Finder can "see" with the LIDAR, but not "hear" any
B-RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate
B-RID messages, and forward them to the SPDP as any real B-RID
messages.  There is an open issue as what to use for the actual
RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a
non-participating UA that it has received from multiple Finders
with LIDAR detection.  In doing so, it would have to select a
RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is
beyond range for its B-RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs
on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is
needed.  there are full-sky LIDAR for automotive use with ranges
varying from 20M to 250M.  Would more than UA location information
be available?  What information can be sent in a CS-RID message for
such "unmarked" UAs?</t>

</section>
<section numbered="no" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The Crowd Sourcing idea in this document came from the Apple "Find
My Device" presentation at the International Association for
Cryptographic Research's Real World Crypto 2020 conference.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

