<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-csrid-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-csrid-03"/>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 80?>

<t>This document describes a way for an Internet connected device to forward/proxy received Broadcast Remote ID into UAS Traffic Management (UTM). This is done through a Supplemental Data Service Provider (SDSP) that takes Broadcast Remote ID in from Finder and provides an aggregated view using Network Remote ID data models and protocols. This enables more comprehensive situational awareness and reporting of Unmanned Aircraft (UA) in a "crowd sourced" manner.</t>
    </abstract>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <ul empty="true">
        <li>
          <t>Note: This document is directly related and builds from <xref target="MOSKOWITZ-CSRID"/>. That draft is a "top, down" approach to understand the concept and high level design. This document  is a "bottom, up" implementation of the CS-RID concept. The content of this draft is subject to change and adapt as further development continues.</t>
        </li>
      </ul>
      <t>This document defines a mechanism to capture <xref target="F3411"/> Broadcast Remote ID (RID) messages on any Internet connected device that receives them and can forward them to Supplemental Data Service Providers (SDSPs) responsible for the geographic area the UA and receivers are in. This data can be aggregated and further decimated to other entities in Unmanned Aircraft Systems (UAS) Traffic Management (UTM) similar to <xref target="F3411"/> Network RID. It builds upon the introduction of the concepts and terms found in <xref target="RFC9434"/>. We call this service Crowd Sourced RID (CS-RID).</t>
      <section anchor="role-of-finders">
        <name>Role of Finders</name>
        <t>These Internet connected devices are herein called "Finders", as they find UAs by listening for Broadcast RID. The Finders are Broadcast RID forwarding proxies. Their potentially limited spacial view of RID messages could result in bad decisions on what messages to send to the SDSP and which to drop. Thus they SHOULD send all received messages and the SDSP will make any filtering decisions in what it forwards into the UTM.</t>
        <t>Finders can be smartphones, tablets, connected cars, special purpose devices or any computing platform with Internet connectivity that can meet the requirements defined in this document. It is not expected, nor necessary, that Finders have any information about a UAS beyond the content found in Broadcast RID.</t>
      </section>
      <section anchor="role-of-supplemental-data-service-providers">
        <name>Role of Supplemental Data Service Providers</name>
        <t>The SDSP provides a gateway service for supplemental data into UTM. This document focuses on RID exclusively, other types of supplemental data is out of scope for this document.</t>
        <t>The primary role of a CS-RID SDSP is to aggregate reports from Finders and forward them as a subscription based service to UTM clients. These clients MAY be a USS or another SDSP. An CS-RID SDSP SHOULD NOT proxy raw data/reports into UTM. An CS-RID SDSP MAY provide such a service, but it is out of scope for this document.</t>
        <t>An SDSP MAY have its coverage constrained to a manageable area that has value to its subscribers. An CS-RID SDSP MAY not allow public reports of Broadcast RID due to policy. Policies of SDSPs is out of scope for this document.</t>
        <t><xref target="F3411"/> Network RID is the defined interface (protocol and model) for an SDSP to provide Broadcast RID as supplemental data to UTM.</t>
      </section>
      <section anchor="relationship-between-finders-sdsps">
        <name>Relationship between Finders &amp; SDSPs</name>
        <t>Finders MAY only need a loose association with SDSPs. The SDSP MAY require a stronger relationship to the Finders. The relationship MAY be completely open, but still authenticated to requiring encryption. The transport MAY be client-server based (using things like HIP or DTLS) to client push (using things like UDP or HTTPS).</t>
      </section>
    </section>
    <section anchor="document-objectives">
      <name>Document Objectives</name>
      <t>This document standardizes transports between the Finder and SDSP. It also gives an overview of Network RID. Specific details of Network RID is out scope for this document. All models are specified in CDDL <xref target="RFC8610"/>.</t>
    </section>
    <section anchor="terms-and-definitions">
      <name>Terms and Definitions</name>
      <section anchor="requirements-terminology">
        <name>Requirements Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
        <t>This document uses terms defined in <xref target="RFC9153"/> and <xref target="RFC9434"/>.</t>
      </section>
      <section anchor="definitions">
        <name>Definitions</name>
        <dl>
          <dt>ECIES:</dt>
          <dd>
            <t>Elliptic Curve Integrated Encryption Scheme. A hybrid encryption scheme which provides semantic security against an adversary who is allowed to use chosen-plaintext and chosen-ciphertext attacks.</t>
          </dd>
          <dt>Finder:</dt>
          <dd>
            <t>In Internet connected device that can receive Broadcast RID messages and forward them to an SDSP.</t>
          </dd>
          <dt>Multilateration:</dt>
          <dd>
            <t>Multilateration (more completely, pseudo range multilateration) is a navigation and surveillance technique based on measurement of the times of arrival (TOAs) of energy waves (radio, acoustic, seismic, etc.) having a known propagation speed.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>Broadcast and Network RID formats are both defined in <xref target="F3411"/> using the same data dictionary. Network RID is specified in JSON sent over HTTPS while Broadcast RID is octet structures sent over wireless links.</t>
      <section anchor="advantages-of-broadcast-remote-id">
        <name>Advantages of Broadcast Remote ID</name>
        <t>Advantages over Network RID include:</t>
        <ul spacing="normal">
          <li>
            <t>more readily be implemented directly in the UA. Network RID will more frequently be provided by the GCS or a pilot's Internet connected device.
            </t>
            <ul spacing="normal">
              <li>
                <t>If Command and Control (C2) is bi-directional over a direct radio connection, Broadcast RID could be a straight-forward addition.</t>
              </li>
              <li>
                <t>Small IoT devices can be mounted on UA to provide Broadcast RID.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>also be used by the UA to assist in Detect and Avoid (DAA).</t>
          </li>
          <li>
            <t>is available to observers even in situations with no Internet like natural disaster situations.</t>
          </li>
        </ul>
      </section>
      <section anchor="meeting-the-needs-of-network-remote-id">
        <name>Meeting the needs of Network Remote ID</name>
        <t>The USA Federal Aviation Administration (FAA), in the January 2021 Remote ID Final rule <xref target="FAA-FR"/>, postponed Network Remote ID and focused on Broadcast Remote ID. This was in response to the UAS vendors comments that Network RID places considerable demands on then currently used UAS.</t>
        <t>However, Network RID, or equivalent, is necessary for UTM knowing what soon may be in an airspace and is mandated as required in the EU. A method that proxies Broadcast RID into UTM can function as an interim approach to Network RID and continue adjacent to Network RID.</t>
      </section>
      <section anchor="trustworthiness-of-proxy-data">
        <name>Trustworthiness of Proxy Data</name>
        <t>When a proxy is introduced in any communication protocol, there is a risk of corrupted data and DOS attacks.</t>
        <t>The Finders, in their role as proxies for Broadcast RID, SHOULD be authenticated to the SDSP (see <xref target="session-security"/>). The SDSP can compare the information from multiple Finders to isolate a Finder sending fraudulent information. SDSPs can additionally verify authenticated messages that follow <xref target="DRIP-AUTH"/>.</t>
        <t>The SPDP can manage the number of Finders in an area (see <xref target="managing-finders"/>) to limit DOS attacks from a group of clustered Finders.</t>
      </section>
      <section anchor="defense-against-fraudulent-rid-messages">
        <name>Defense against fraudulent RID Messages</name>
        <t>The strongest defense against fraudulent RID messages is to focus on <xref target="DRIP-AUTH"/> conforming messages.  Unless this behavior is mandated, an SDSP will have to use assorted algorithms to isolate messages of questionable content.</t>
      </section>
    </section>
    <section anchor="crowd-sourced-rid-protocol">
      <name>Crowd Sourced RID Protocol</name>
      <figure anchor="fig-csrid-protocol">
        <name>Protocol Overview</name>
        <artwork><![CDATA[
+--------+                 +------+                 +-----+
| Finder o---------------->o SDSP o<----------------o USS |
+--------+     HTTPS,      +--o---+   Network RID   +-----+
               UDP, HIP,      :
               DTLS           :
                              : Network RID
                              v
                       +------o------+
                       | UTM Clients |
                       +-------------+
]]></artwork>
      </figure>
      <t>This document will focus on the general protocol specification between the Finder and the SDSP. Transport specification and use is provided in <xref target="transports"/>. A normative appendix (<xref target="network-rid"/>) provides background to Network RID.</t>
      <t>For all data models CBOR <xref target="RFC7049"/> MUST be used for encoding. JSON MAY be supported but its definition is out of scope for this document.</t>
      <section anchor="csrid-reports">
        <name>Detection &amp; Report Models</name>
        <t>The CS-RID model is for Finders to send "batch reports" to one or more SDSPs they have a relationship with. This relationship can be highly anonymous with little prior knowledge of the Finder to very well defined and pre-established.</t>
        <t><xref target="fig-csrid-report"/> is the report object, defined in CDDL, that is translated and adapted depending on the specific transport. It carries a batch of detections (up to a max of 10), the CDDL definition of which is shown in <xref target="fig-csrid-detection"/>.</t>
        <figure anchor="fig-csrid-report">
          <artwork><![CDATA[
report = [report_type: uint, report_time: time, finder_info: finder-info, ? report_data: any]
finder-info: {
  finder_id: tstr / bstr / uuid / ip6,
  ? make: tstr,
  ? model: tstr,
  ? serial: tstr,
  ? ip_addr: ip4 / ip6,
  ? last_detect_time: time,
  ? position: #6.103
  ? status: any
}
]]></artwork>
        </figure>
        <figure anchor="fig-csrid-detection">
          <artwork><![CDATA[
detection = [timestamp: time, transport_type: &transport-types, mac_address: #6.48, data: bstr .size(26..255), ? rssi: uint, ? position: #6.103]
transport-types = (
  ble: 0, ble-lr: 1, beacon: 2, nan: 3
)
]]></artwork>
        </figure>
        <t>The <tt>position</tt> fields of both <xref target="fig-csrid-detection"/> and <xref target="fig-csrid-report"/> are OPTIONAL. If multiple sets of these are present the deepest nested values take precedence. For example if <tt>position</tt> is used in both the Report and Detection structures then the value found in the individual Detections take precedence.</t>
      </section>
      <section anchor="session-security">
        <name>Session Security</name>
        <t>Both Finder and SDSP SHOULD use EdDSA <xref target="RFC8032"/> keypairs as the base for their identities. These identities SHOULD be in the form of registered DRIP Entity Tags <xref target="RFC9374"/>. Registration is covered in <xref target="DIME-ARCH"/>. An SDSP MAY have its own DRIP Identity Management Entity (DIME) or share one with other entities in UTM.</t>
        <t>An SDSP MUST NOT ignore Finders with DETs outside the DIME it is aware of, and SHOULD use <xref target="DIME-ARCH"/> to obtain public key information.</t>
        <section anchor="cbor-web-token-method">
          <name>CBOR Web Token Method</name>
          <t>A CWT is used to carry and apply a signature to the data. This is the primary method for sending data. A Claim ID of 170 is used for Report data.</t>
        </section>
        <section anchor="eceis-method">
          <name>ECEIS Method</name>
          <t>ECIES is the preferred method to initialize a session between the Finder and SDSP. The following steps MUST be followed to setup ECIES for CS-RID:</t>
          <ol spacing="normal" type="1"><li>
              <t>Finder uses <xref target="DIME-ARCH"/> to obtain SDSP EdDSA key</t>
            </li>
            <li>
              <t>EdDSA keys are converted to X25519 keys per Curve25519 <xref target="RFC7748"/> to use in ECIES</t>
            </li>
            <li>
              <t>ECIES can be used with a unique nonce to authenticate each message sent from a Finder to the SDSP</t>
            </li>
            <li>
              <t>ECIES can be used at the start of some period (e.g. day) to establish a shared secret that is then used to authenticate each message sent from a Finder to the SDSP sent during that period</t>
            </li>
            <li>
              <t>HIP <xref target="RFC7401"/> can be used to establish a session secret that is then used with ESP <xref target="RFC4303"/> to authenticate each message sent from a Finder to the SDSP</t>
            </li>
            <li>
              <t>DTLS <xref target="RFC5238"/> can be used to establish a secure connection that is then used to authenticate each message sent from a Finder to the SDSP</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="transports">
      <name>Transports</name>
      <t>CS-RID transport from Finder to SDSP can vary from highly unidirectional with no acknowledgements to strong authenticated and encrypted sessions. Some transports, such as HIP and DTLS, MAY support bi-directional communication to enable control operations between the SDSP and Finder.</t>
      <t>The section contains a variety of transports that MAY be supported by an SDSP. CoAP is the RECOMMENDED transport.</t>
      <section anchor="coap">
        <name>CoAP</name>
        <t>When using CoAP <xref target="RFC7252"/> with UDP, a payload MUST be a CS-RID Report (<xref target="csrid-reports"/>). DTLS is the RECOMMENDED underlying transport for CoAP and uses a DET as the identity.</t>
        <t>A Finder MUST ACK when accepting and RST when ignoring/rejecting a command from an SDSP.</t>
        <t>As CoAP is designed with a stateless mapping to HTTP; such proxies are RECOMMENDED for CS-RID to allow as many Finders as possible to provide reports.</t>
      </section>
      <section anchor="hip">
        <name>HIP</name>
        <t>The use of HIP <xref target="RFC7401"/> imposes a strong authentication and Finder onboarding process. It is attractive for well defined deployments of CS-RID, such as being used for area security. A DET MUST be used as the primary identity when using this transport method.</t>
        <t>The use of HIP as an underlying transport for CoAP is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The Crowd Sourcing idea in this document came from the Apple "Find My Device" presentation at the International Association for Cryptographic Research's Real World Crypto 2020 conference.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DIME-ARCH">
          <front>
            <title>DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document describes the discovery and management of DRIP Entity
   Tags (DETs) in DNS.  Authoritative Name Servers, with DRIP specific
   DNS structures and standard DNS methods, are the Public Information
   Registries for DETs and their related metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-24"/>
        </reference>
        <reference anchor="DRIP-AUTH">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="21" month="February" year="2024"/>
            <abstract>
              <t>   The Drone Remote Identification Protocol (DRIP), plus trust policies
   and periodic access to registries, augments Unmanned Aircraft System
   (UAS) Remote Identification (RID), enabling local real time
   assessment of trustworthiness of received RID messages and observed
   UAS, even by Observers lacking Internet access.  This document
   defines DRIP message types and formats to be sent in Broadcast RID
   Authentication Messages to verify that attached and recent detached
   messages were signed by the registered owner of the DRIP Entity Tag
   (DET) claimed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-49"/>
        </reference>
        <reference anchor="MOSKOWITZ-CSRID">
          <front>
            <title>Crowd Sourced Remote ID</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="October" year="2024"/>
            <abstract>
              <t>   This document describes using the ASTM Broadcast Remote ID (B-RID)
   specification in a "crowd sourced" smart phone or fixed receiver
   asset environment to provide much of the ASTM and FAA envisioned
   Network Remote ID (Net-RID) functionality.  This crowd sourced B-RID
   (CS-RID) data will use multilateration to add a level of reliability
   in the location data on the Uncrewed Aircraft (UA).  The crowd
   sourced environment will also provide a monitoring coverage map to
   authorized observers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-crowd-sourced-rid-13"/>
        </reference>
        <reference anchor="RFC5238">
          <front>
            <title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
            <author fullname="T. Phelan" initials="T." surname="Phelan"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP). DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery. DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5238"/>
          <seriesInfo name="DOI" value="10.17487/RFC5238"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7049"/>
          <seriesInfo name="DOI" value="10.17487/RFC7049"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7401">
          <front>
            <title>Host Identity Protocol Version 2 (HIPv2)</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="T. Heer" initials="T." surname="Heer"/>
            <author fullname="P. Jokela" initials="P." surname="Jokela"/>
            <author fullname="T. Henderson" initials="T." surname="Henderson"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies the details of the Host Identity Protocol (HIP). HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes. HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication. The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks. When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
              <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility. It also incorporates lessons learned from the implementations of RFC 5201.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7401"/>
          <seriesInfo name="DOI" value="10.17487/RFC7401"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
          <front>
            <title>FAA Remote Identification of Unmanned Aircraft</title>
            <author>
              <organization>United States Federal Aviation Administration (FAA)</organization>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="GPS-IONOSPHERE" target="https://doi.org/10.1002/2015JA021629">
          <front>
            <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
            <author>
              <organization>Unknown</organization>
            </author>
            <date year="2015" month="September"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 280?>

<section anchor="network-rid">
      <name>Network RID Overview</name>
      <t>This appendix is normative and an overview of the Network RID portion of <xref target="F3411"/>.</t>
      <t>This appendix is intended a guide to the overall object of Network RID and generally how it functions in context with a CS-RID SDSP. Please refer to the actual standard of <xref target="F3411"/> for specifics in implementing said protocol.</t>
      <t>For CS-RID the goal is for the SDSP to act as both a Network RID Service Provider (SP) and Network RID Display Provider (DP). The endpoints and models MUST follow the specifications for these roles so UTM clients do not need to implement specific endpoints for CS-RID and can instead leverage existing endpoints.</t>
      <t>An SDSP SHOULD use Network RID, as it is able, to query a USS for UAS sending telemetry in a given area to integrate into the Broadcast RID it is receiving from Finders. How the SDSP discovers which USS to query is out of scope for this document.</t>
      <t>An SDSP MUST provide the Network RID DP interface for clients that wish to subscribe for updates on aircraft in the SDSP aggregated coverage area.</t>
    </section>
    <section anchor="sdsp-functions">
      <name>Additional SDSP Functionality</name>
      <t>This appendix is informative.</t>
      <section anchor="multilateration">
        <name>Multilateration</name>
        <t>The SDSP can confirm/correct the UA location provided in the Location/Vector message by using multilateration on data provided by at least 3 Finders that reported a specific Location/Vector message (Note that 4 Finders are needed to get altitude sign correctly).  In fact, the SDSP can calculate the UA location from 3 observations of any Broadcast RID message.  This is of particular value if the UA is only within reception range of the Finders for messages other than the Location/Vector message.</t>
        <t>This feature is of particular value when the Finders are fixed assets with highly reliable GPS location, around a high value site like an airport or large public venue.</t>
      </section>
      <section anchor="finder-map">
        <name>Finder Map</name>
        <t>The Finders are regularly providing their SDSP with their location. With this information, the SDSP can maintain a monitoring map. That is a map of approximate coverage range of their registered and active Finders.</t>
      </section>
      <section anchor="managing-finders">
        <name>Managing Finders</name>
        <t>Finder density will vary over time and space. For example, sidewalks outside an urban train station can be packed with pedestrians at rush hour, either coming or going to their commute trains.  An SDSP may want to proactively limit the number of active Finders in such situations.</t>
        <t>Using the Finder mapping feature, the SDSP can instruct Finders to NOT proxy Broadcast RID messages. These Finders will continue to report their location and through that reporting, the SDSP can instruct them to again take on the proxying role.  For example a Finder moving slowly along with dozens of other slow-moving Finders may be instructed to suspend proxying.  Whereas a fast-moving Finder at the same location (perhaps a connected car or a pedestrian on a bus) would not be asked to suspend proxying as it will soon be out of the congested area.</t>
        <t>Such operation SHOULD be using transports such as HIP or DTLS.</t>
      </section>
    </section>
    <section anchor="gps-inaccuracy">
      <name>GPS Inaccuracy</name>
      <t>This appendix is informative.</t>
      <t>Single-band, consumer grade, GPS on small platforms is not accurate, particularly for altitude.  Longitude/latitude measurements can easily be off by 3M based on satellite position and clock accuracy.  Altitude accuracy is reported in product spec sheets and actual tests to be 3x less accurate. Altitude accuracy is hindered by ionosphere activity. In fact, there are studies of ionospheric events (e.g. 2015 St. Patrick's day <xref target="GPS-IONOSPHERE"/>) as measured by GPS devices at known locations.  Thus where a UA reports it is rarely accurate, but may be accurate enough to map to visual sightings of single UA.</t>
      <t>Smartphones and particularly smartwatches are plagued with the same challenge, though some of these can combine other information like cell tower data to improve location accuracy. FCC E911 accuracy, by FCC rules is NOT available to non-E911 applications due to privacy concerns, but general higher accuracy is found on some smart devices than reported for consumer UA.  The SDSP MAY have information on the Finder location accuracy that it can use in calculating the accuracy of a multilaterated location value.  When the Finders are fixed assets, the SDSP may have very high trust in their location for trusting the multilateration calculation over the UA reported location.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
