<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-wiethuechter-drip-csrid-00" category="std" submissionType="IETF" xml:lang="en" obsoletes="" updates="">

  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>

    <date year="2023" month="July" day="10"/>

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes a way for an Internet connected device to forward/proxy received Broadcast Remote ID to Network Remote ID using UAS Traffic Management (UTM) Supplemental Data Service Providers (SDSPs). This enables more comprehensive situational awareness and reporting of Unmanned Aircraft (UA) in a “crowd sourced” manner.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><list style='empty'>
  <t>Note: This document is directly related and builds from <xref target="moskowitz-csrid"/>. That draft is a “top, down” approach to understand the concept and high level design. This document  is a “bottom, up” implementation of the CS-RID concept. The content of this draft is subject to change and adapt as further development continues.</t>
</list></t>

<t>This document defines a mechanism to capture Broadcast Remote ID (RID) <xref target="F3411"/> messages on any Internet connected device that receives them and can forward them to the Supplemental Data Service Providers (SDSPs) responsible for the geographic area the UA and receivers are in. This data can be aggregated and further decimated to other entities in Unmanned Aircraft Systems (UAS) Traffic Management (UTM) using Network RID <xref target="F3411"/>.</t>

<t>These Internet connected devices are herein called “Finders”, as they find UAs by listening for Broadcast RID. The Finders are Broadcast RID forwarding proxies. Their potentially limited spacial view of RID messages could result in bad decisions on what messages to send to the SDSP and which to drop. Thus they will send all received messages and the SDSP will make any filtering decisions in what it forwards into the UTM.</t>

<t>Finders can be smartphones, tablets, connected cars, CS-RID special purpose devices or any computing platform with Internet connectivity that can meet the requirements defined in this document. It is not expected, nor necessary, that Finders have any information about a UAS beyond the content found in Broadcast RID.</t>

<t>Finders MAY only need a loose association with SDSPs. The SDSP MAY require a stronger relationship to the Finders. The relationship MAY be completely open, but still authenticated to requiring encryption. The transport MAY be client-server based (using things like HIP or DTLS) to client push (using things like UDP or HTTPS).</t>

<section anchor="role-of-supplemental-data-service-provider-sdsp" title="Role of Supplemental Data Service Provider (SDSP)">

<t>The DRIP Architecture <xref target="drip-arch"/> introduces the basic CS-RID entities including CS-RID Finder and SDSP. This document has minimal information about the actions of SDSPs. In general the SDSP is out of scope of this document. That said, the SDSPs should not simply proxy cast RID messages to their UTM(s). They should perform some minimal level of filtering and content checking before forwarding those messages that pass these tests in a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based on location of active Finders. UTMs may use this information to notify authorized observers of where there is and there is not monitoring coverage. They may also use this information of where to place pro-active monitoring coverage.</t>

<t>An SDSP should only forward Authenticated messages like those defined in <xref target="drip-auth"/> to the UTM(s). Further, the SDSP SHOULD validate the RID and the Authentication signature before forwarding anything from the UA, and flagging those RIDs that were not validated. The SDSP MAY forward all Broadcast RID messages to the UTM, leaving all decision making on Broadcast messages veracity to the receiving UTM entity.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA, the SDSP is in a unique position to perform multilateration on these messages and compute the Finder’s view of the UA location to compare with the UA Location/Vector messages. This check against the UA’s location claims is both a validation on the UA’s reliability as well as the trustworthiness of the Finders. Other than providing data to allow for multilateration, this SDSP feature is out of scope of this document. This function is limited by the location accuracy for both the Finders and UA.</t>

</section>
</section>
<section anchor="terms-and-definitions" title="Terms and Definitions">

<section anchor="requirements-terminology" title="Requirements Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>This document uses terms defined in <xref target="RFC9153"/> and <xref target="drip-arch"/>.</t>

</section>
<section anchor="definitions" title="Definitions">

<t><list style="hanging">
  <t hangText="ECIES:">
  Elliptic Curve Integrated Encryption Scheme. A hybrid encryption scheme which provides semantic security against an adversary who is allowed to use chosen-plaintext and chosen-ciphertext attacks.</t>
  <t hangText="Finder:">
  In Internet connected device that can receive Broadcast RID messages and forward them to a SDSP.</t>
  <t hangText="Multilateration:">
  Multilateration (more completely, pseudo range multilateration) is a navigation and surveillance technique based on measurement of the times of arrival (TOAs) of energy waves (radio, acoustic, seismic, etc.) having a known propagation speed.</t>
</list></t>

</section>
</section>
<section anchor="problem-space" title="Problem Space">

<t>Broadcast and Network RID formats are both defined in <xref target="F3411"/> using the same data dictionary. Network RID is specified in JSON sent over HTTPS while Broadcast RID is byte structures sent over wireless links.</t>

<section anchor="advantages-of-broadcast-remote-id" title="Advantages of Broadcast Remote ID">

<t>Advantages over Network RID include:</t>

<t><list style="symbols">
  <t>more readily be implemented directly in the UA. Network RID will more frequently be provided by the GCS or a pilot’s Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over a direct radio connection, Broadcast RID could be a straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide Broadcast RID.</t>
    </list></t>
  <t>also be used by the UA to assist in Detect and Avoid (DAA).</t>
  <t>is available to observers even in situations with no Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="meeting-the-needs-of-network-remote-id" title="Meeting the needs of Network Remote ID">

<t>The USA Federal Aviation Authority (FAA), in the January 2021 Remote ID Final rule <xref target="FAA-FR"/>, postponed Network Remote ID and focused on Broadcast Remote ID. This was in response to the UAS vendors comments that Network RID places considerable demands on then currently used UAS.</t>

<t>However, Network RID, or equivalent, is necessary for UTM knowing what soon may be in an airspace and is mandated as required in the EU. A method that proxies Broadcast RID into UTM can function as an interim approach to Network RID and continue adjacent to Network RID.</t>

</section>
<section anchor="trustworthiness-of-proxy-data" title="Trustworthiness of Proxy Data">

<t>When a proxy is introduced in any communication protocol, there is a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for Broadcast RID, SHOULD be authenticated to the SDSP (see <xref target="Finder_Sec"/>). The SDSP can compare the information from multiple Finders to isolate a Finder sending fraudulent information.  SDSPs can additionally verify authenticated messages that follow <xref target="drip-auth"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see <xref target="Finder_Manage"/>) to limit DOS attacks from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages" title="Defense against fraudulent RID Messages">

<t>The strongest defense against fraudulent RID messages is to focus on <xref target="drip-auth"/> conforming messages.  Unless this behavior is mandated, an SDSP will have to use assorted algorithms to isolate messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec" title="SDSP Security Relationship">

<t>SDSPs and Finders SHOULD use EdDSA <xref target="RFC8032"/> keys as their trusted Identities. The public keys SHOULD be registered DRIP UAS Remote ID (DETs) <xref target="RFC9374"/> and <xref target="drip-reg"/>. Other similar methods may be used.</t>

<t>During this registration, the Finder gets the SDSP’s EdDSA Public Key. These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t>The SDSP uses some process (out of scope here) to register the Finders and their EdDSA Public Key. During this registration, the Finder gets the SDSP’s EdDSA Public Key. These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t><list style="numbers">
  <t>EdDSA keys are converted to X25519 keys per Curve25519 <xref target="RFC7748"/> to use in ECIES.</t>
  <t>ECIES can be used with a unique nonce to authenticate each message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to establish a shared secret that is then used to authenticate each message sent from a Finder to the SDSP sent during that period.</t>
  <t>HIP <xref target="RFC7401"/> can be used to establish a session secret that is then used with ESP <xref target="RFC4303"/> to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/> can be used to establish a secure connection that is then used to authenticate each message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="Finder_Map" title="Finder Map">

<t>The Finders are regularly providing their SDSP with their location. This is through the Broadcast RID Proxy Messages and Finder Location Update Messages.  With this information, the SDSP can maintain a monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage" title="Managing Finders">

<t>Finder density will vary over time and space. For example, sidewalks outside an urban train station can be packed with pedestrians at rush hour, either coming or going to their commute trains.  An SDSP may want to proactively limit the number of active Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to NOT proxy Broadcast RID messages. These Finders will continue to report their location and through that reporting, the SDSP can instruct them to again take on the proxying role.  For example a Finder moving slowly along with dozens of other slow-moving Finders may be instructed to suspend proxying.  Whereas a fast-moving Finder at the same location (perhaps a connected car or a pedestrian on a bus) would not be asked to suspend proxying as it will soon be out of the congested area.</t>

</section>
</section>
<section anchor="crowd-sourced-rid-protocol" title="Crowd Sourced RID Protocol">

<t>The CS-RID model is for Finders to send “batch reports” (<xref target="csrid-report"/>) to one or more SDSPs they have a relationship with. This relationship can be highly anonymous with little prior knowledge of the Finder (({unidirectional})) to very well defined and pre-established (<xref target="bidirectional"/>).</t>

<section anchor="csrid-report" title="Detection &amp; Report Structure">

<t><xref target="fig-csrid-report"/> is the report object, defined in CDDL, that is translated and adapted depending on the specific transport. It carries a batch of detections (up to a max of 10), the CDDL definition of which is shown in <xref target="fig-csrid-detection"/>.</t>

<figure title="Detection CDDL" anchor="fig-csrid-detection"><artwork><![CDATA[
csrid_detection = (
  timestamp: uint,  ; UTC timestamp
  ? latitude: uint,  ; scaled by 10^7
  ? longitude: uint,  ; scaled by 10^7
  ? altitude: float,  ; wgs84 meters
  rid_mac: hexdig .size 12,
  rid_message: hexdig .size(26..255)
)
]]></artwork></figure>

<figure title="Report CDDL" anchor="fig-csrid-report"><artwork><![CDATA[
csrid_report = {
  finder_id: hexdig .size 32 / tstr,
  finder_mac: hexdig .size 12,
  detection_count: int .size(1..10),
  detections: [+ csrid_detection],
  signature: tstr
}
]]></artwork></figure>

<t>Examples of various translations can be found in <xref target="example-reports"/>.</t>

</section>
<section anchor="unidirectional" title="Unidirectional">

<t><list style='empty'>
  <t>Author Note: Section Title is WIP, suggestions welcome</t>
</list></t>

<t>The unidirectional variant can allow for anonymous (non-strongly-authenticated) Finders to make reports to a publicly known SDSP endpoint. This is attractive for implementation to be lightweight, easy to deploy and use, such as over an open HTTPS API. Many clients (who run Finders in their software) may not be worried of being tracked for sending such reports.</t>

<t>It is recommended to use bare EdDSA25519 keypairs during the interactions as keys are expected to change frequently and DETs would allow for long term tracking of Finders.</t>

<section anchor="https" title="HTTPS">

<t>Use <xref target="csrid-report"/> as CBOR/JSON.</t>

</section>
<section anchor="udp" title="UDP">

<t>Use <xref target="csrid-report"/> as CBOR.</t>

</section>
</section>
<section anchor="bidirectional" title="Bidirectional">

<t><list style='empty'>
  <t>Author Note: Section Title is WIP, suggestions welcome</t>
</list></t>

<t>The bidirectional variant imposes a strong authentication and Finder onboarding process. It is attractive for well defined deployments of CS-RID, such as being used for area security. Implementations are RECOMMENDED to use HIP <xref target="RFC7401"/> or DTLS with a DET <xref target="RFC9374"/> as their primary identity.</t>

<t>A CS-RID SDSP SHOULD allow for any valid registered DET to report to it.</t>

<t>Send <xref target="csrid-report"/> as CBOR.</t>

<t>Bidirectionally also gives an added benefit of sending various commands to Finders to alter their behavior with the relationship. Unlike <xref target="unidirectional"/> where there is no control of the Finder behavior.</t>

<section anchor="messages" title="Messages">

<t>Defined all in CDDL. Adapted accordingly to given transport.</t>

<section anchor="batch-report" title="Batch Report">

<t>Same as <xref target="csrid-report"/> but removes the lat/lon/alt from detections as stored and updated separately.</t>

</section>
<section anchor="location-update" title="Location Update">

<t>Provides the lat/lon/alt of the Finder.</t>

</section>
<section anchor="parameter-update" title="Parameter Update">

<t>Enables SDSP to negotiate changes to Finder parameters such as <spanx style="verb">detection_count</spanx> maximum.</t>

</section>
<section anchor="filter-conditions" title="Filter Conditions">

<t>Enabled SDSP to give “smarter” Finders filtering conditions of detections to be sent back to the SDSP.</t>

</section>
</section>
<section anchor="hip" title="HIP">

<t>TODO</t>

</section>
<section anchor="dtls" title="DTLS">

<t>TODO</t>

</section>
</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>TBD</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

<section anchor="privacy-concerns" title="Privacy Concerns">

<t>TBD</t>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>The Crowd Sourcing idea in this document came from the Apple “Find My Device” presentation at the International Association for Cryptographic Research’s Real World Crypto 2020 conference.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor='moskowitz-csrid' target='https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-crowd-sourced-rid-10'>
   <front>
      <title>Crowd Sourced Remote ID</title>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Shuai Zhao' initials='S.' surname='Zhao'>
         <organization>Intel</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day='8' month='May' year='2023'/>
      <abstract>
	 <t>   This document describes using the ASTM Broadcast Remote ID (B-RID)
   specification in a &quot;crowd sourced&quot; smart phone or fixed receiver
   asset environment to provide much of the ASTM and FAA envisioned
   Network Remote ID (Net-RID) functionality.  This crowd sourced B-RID
   (CS-RID) data will use multilateration to add a level of reliability
   in the location data on the Unmanned Aircraft (UA).  The crowd
   sourced environment will also provide a monitoring coverage map to
   authorized observers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-moskowitz-drip-crowd-sourced-rid-10'/>
   
</reference>

<reference anchor='RFC8610' target='https://www.rfc-editor.org/info/rfc8610'>
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <author fullname='C. Vigano' initials='C.' surname='Vigano'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2019'/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8610'/>
  <seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>

<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
  <front>
    <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
    <author fullname='S. Card' initials='S.' role='editor' surname='Card'/>
    <author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'/>
    <author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'/>
    <author fullname='A. Gurtov' initials='A.' surname='Gurtov'/>
    <date month='February' year='2022'/>
    <abstract>
      <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9153'/>
  <seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>

<reference anchor='RFC8152' target='https://www.rfc-editor.org/info/rfc8152'>
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname='J. Schaad' initials='J.' surname='Schaad'/>
    <date month='July' year='2017'/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8152'/>
  <seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>

<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='drip-auth' target='https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-30'>
   <front>
      <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <date day='27' month='March' year='2023'/>
      <abstract>
	 <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   The document defines message types and associated formats (sent
   within the Authentication Message) that can be used to authenticate
   past messages sent by an unmanned aircraft (UA) and provide proof of
   UA trustworthiness even in the absence of Internet connectivity at
   the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-30'/>
   
</reference>


<reference anchor='drip-reg' target='https://datatracker.ietf.org/doc/html/draft-ietf-drip-registries-12'>
   <front>
      <title>DRIP Entity Tag (DET) Identity Management Architecture</title>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Jim Reid' initials='J.' surname='Reid'>
         <organization>RTFM llp</organization>
      </author>
      <date day='10' month='July' year='2023'/>
      <abstract>
	 <t>   This document describes the high level architecture for the
   registration and discovery of DRIP Entity Tags (DETs) using DNS.
   Discovery of DETs and their artifacts are through DRIP specific DNS
   structures and standard DNS methods.  A general overview of the
   interfaces required between involved components is described in this
   document with future supporting documents giving technical
   specifications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-12'/>
   
</reference>


<reference anchor='drip-arch' target='https://datatracker.ietf.org/doc/html/draft-ietf-drip-arch-31'>
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
      <author fullname='Stuart W. Card' initials='S. W.' surname='Card'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter' initials='A.' surname='Wiethuechter'>
         <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz' initials='R.' surname='Moskowitz'>
         <organization>HTT Consulting</organization>
      </author>
      <author fullname='Shuai Zhao' initials='S.' surname='Zhao'>
         <organization>Intel</organization>
      </author>
      <author fullname='Andrei Gurtov' initials='A.' surname='Gurtov'>
         <organization>Linköping University</organization>
      </author>
      <date day='6' month='March' year='2023'/>
      <abstract>
	 <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-arch-31'/>
   
</reference>

<reference anchor='RFC5238' target='https://www.rfc-editor.org/info/rfc5238'>
  <front>
    <title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
    <author fullname='T. Phelan' initials='T.' surname='Phelan'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP). DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery. DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5238'/>
  <seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>

<reference anchor='RFC4303' target='https://www.rfc-editor.org/info/rfc4303'>
  <front>
    <title>IP Encapsulating Security Payload (ESP)</title>
    <author fullname='S. Kent' initials='S.' surname='Kent'/>
    <date month='December' year='2005'/>
    <abstract>
      <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4303'/>
  <seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>

<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
  <front>
    <title>Host Identity Protocol Version 2 (HIPv2)</title>
    <author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'/>
    <author fullname='T. Heer' initials='T.' surname='Heer'/>
    <author fullname='P. Jokela' initials='P.' surname='Jokela'/>
    <author fullname='T. Henderson' initials='T.' surname='Henderson'/>
    <date month='April' year='2015'/>
    <abstract>
      <t>This document specifies the details of the Host Identity Protocol (HIP). HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes. HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication. The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks. When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
      <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility. It also incorporates lessons learned from the implementations of RFC 5201.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7401'/>
  <seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>

<reference anchor='RFC7049' target='https://www.rfc-editor.org/info/rfc7049'>
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <date month='October' year='2013'/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7049'/>
  <seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>

<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname='Z. Shelby' initials='Z.' surname='Shelby'/>
    <author fullname='K. Hartke' initials='K.' surname='Hartke'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7252'/>
  <seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>

<reference anchor='RFC7748' target='https://www.rfc-editor.org/info/rfc7748'>
  <front>
    <title>Elliptic Curves for Security</title>
    <author fullname='A. Langley' initials='A.' surname='Langley'/>
    <author fullname='M. Hamburg' initials='M.' surname='Hamburg'/>
    <author fullname='S. Turner' initials='S.' surname='Turner'/>
    <date month='January' year='2016'/>
    <abstract>
      <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7748'/>
  <seriesInfo name='DOI' value='10.17487/RFC7748'/>
</reference>

<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8032'/>
  <seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>

<reference anchor='RFC9374' target='https://www.rfc-editor.org/info/rfc9374'>
  <front>
    <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
    <author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'/>
    <author fullname='S. Card' initials='S.' surname='Card'/>
    <author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'/>
    <author fullname='A. Gurtov' initials='A.' surname='Gurtov'/>
    <date month='March' year='2023'/>
    <abstract>
      <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
      <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
      <t>This document updates RFCs 7401 and 7343.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9374'/>
  <seriesInfo name='DOI' value='10.17487/RFC9374'/>
</reference>


<reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2022" month="July"/>
  </front>
</reference>
<reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>FAA Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="gps-ionosphere" target="https://doi.org/10.1002/2015JA021629">
  <front>
    <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
    <author >
      <organization>Unknown</organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>


    </references>


<section anchor="gps-inaccuracy" title="GPS Inaccuracy">

<t>Single-band, consumer grade, GPS on small platforms is not accurate, particularly for altitude.  Longitude/latitude measurements can easily be off by 3M based on satellite position and clock accuracy.  Altitude accuracy is reported in product spec sheets and actual tests to be 3x less accurate. Altitude accuracy is hindered by ionosphere activity. In fact, there are studies of ionospheric events (e.g. 2015 St. Patrick’s day <xref target="gps-ionosphere"/>) as measured by GPS devices at known locations.  Thus where a UA reports it is rarely accurate, but may be accurate enough to map to visual sightings of single UA.</t>

<t>Smartphones and particularly smartwatches are plagued with the same challenge, though some of these can combine other information like cell tower data to improve location accuracy. FCC E911 accuracy, by FCC rules is NOT available to non-E911 applications due to privacy concerns, but general higher accuracy is found on some smart devices than reported for consumer UA.  The SDSP MAY have information on the Finder location accuracy that it can use in calculating the accuracy of a multilaterated location value.  When the Finders are fixed assets, the SDSP may have very high trust in their location for trusting the multilateration calculation over the UA reported location.</t>

</section>
<section anchor="LIDAR" title="Using LIDAR for UA location">

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a connected car) that has full sky coverage, the Finder can use this equipment to locate UAs in its airspace.  The Finder would then be able to detect non-participating UAs.  A non-participating UA is one that the Finder can “see” with the LIDAR, but not “hear” any Broadcast RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate Broadcast RID messages, and forward them to the SDSP as any real Broadcast RID messages.  There is an open issue as what to use for the actual RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a non-participating UA that it has received from multiple Finders with LIDAR detection.  In doing so, it would have to select a RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is beyond range for its Broadcast RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is needed.  there are full-sky LIDAR for automotive use with ranges varying from 20M to 250M.  Would more than UA location information be available?  What information can be sent in a CS-RID message for such “unmarked” UAs?</t>

</section>
<section anchor="multilat" title="UA location via multilateration">

<t>The SDSP can confirm/correct the UA location provided in the Location/Vector message by using multilateration on data provided by at least 3 Finders that reported a specific Location/Vector message (Note that 4 Finders are needed to get altitude sign correctly).  In fact, the SDSP can calculate the UA location from 3 observations of any Broadcast RID message.  This is of particular value if the UA is only within reception range of the Finders for messages other than the Location/Vector message.</t>

<t>This feature is of particular value when the Finders are fixed assets with highly reliable GPS location, around a high value site like an airport or large public venue.</t>

</section>
<section anchor="example-reports" title="CS-RID Report Examples">

<figure title="Example JSON Report" anchor="fig-csrid-report-json"><artwork type="json"><![CDATA[
{
  finder_id: "20010030000000050000000000000000",
  finder_mac: "001122334455",
  detection_count: 1,
  detections: [
    {
      timestamp: 0.0,
      latitude: 0.0,
      longitude: 0.0,
      altitude: 0.0,
      rid_mac: "667788990011",
      rid_message: "0002000000000000000000000000000000000000000000000000"
    }
  ],
  signature: "base64"
}
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

