<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-drip-arch-22" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2022" month="March" day="21"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus UAS RID-related communications. This architecture adheres to the requirements listed in the DRIP Requirements document (RFC9153).</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus RID-related communications. The architecture takes into account both current (including proposed) regulations and non-IETF technical standards.</t>

<t>The architecture adheres to the requirements listed in the DRIP Requirements document <xref target="RFC9153"/>. The requirements document provides an extended introduction to the problem space and use cases.</t>

<section anchor="overview-of-unmanned-aircraft-system-uas-remote-id-rid-and-standardization"><name>Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and Standardization</name>

<t>UAS Remote Identification (RID) is an application that enables a UAS to be identified by Unmanned Aircraft Systems Traffic Management (UTM) and UAS Service Supplier (USS) (<xref target="appendix-a"/>) or third party entities such as law enforcement. Many considerations (e.g., safety) dictate that UAS be remotely identifiable.</t>

<t>Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID. CAAs currently promulgate performance-based regulations that do not specify techniques, but rather cite industry consensus technical standards as acceptable means of compliance.</t>

<t>Federal Aviation Administration (FAA)</t>

<ul empty="true"><li>
  <t>The FAA published a Notice of Proposed Rule Making <xref target="NPRM"/> in 2019  and thereafter published a "Final Rule" in 2021 <xref target="FAA_RID"/>, imposing requirements on UAS manufacturers and operators, both commercial and recreational. The rule clearly states that Automatic Dependent Surveillance Broadcast (ADS-B) Out and transponders cannot be used to satisfy the UAS RID requirements on UAS to which the rule applies (see <xref target="adsb"/>).</t>
</li></ul>

<t>European Union Aviation Safety Agency (EASA)</t>

<ul empty="true"><li>
  <t>The EASA published a <xref target="Delegated"/> regulation in 2019 imposing requirements on UAS manufacturers and third-country operators, including but not limited to UAS RID requirements. The EASA also published in 2019 an <xref target="Implementing"/> regulation laying down detailed rules and procedures for UAS operations and operating personnel.</t>
</li></ul>

<t>American Society for Testing and Materials (ASTM)</t>

<ul empty="true"><li>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item WK65041, developed the ASTM <xref target="F3411"/> Standard Specification for Remote ID and Tracking.</t>
</li></ul>

<ul empty="true"><li>
  <t>ASTM defines one set of UAS RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If an UAS uses 
both communication methods, the same information must be
provided via both means. <xref target="F3411"/> is cited by the FAA in its UAS RID final rule
<xref target="FAA_RID"/> as "a potential means of compliance" to a Remote ID rule.</t>
</li></ul>

<t>The 3rd Generation Partnership Project (3GPP)</t>

<ul empty="true"><li>
  <t>With release 16, the 3GPP completed the UAS RID requirement study <xref target="TS-22.825"/> and proposed a set of use cases in the mobile network and services that can be offered based on UAS RID.  Release 17 specification focuses on enhanced UAS service requirements and provides the protocol and application architecture support that will be applicable for both 4G and 5G networks.
The study of Further Architecture Enhancement for Uncrewed Aerial Vehicles (UAV) and Urban Air Mobility (UAM) <xref target="FS_AEUA"/> in release 18 further enhances the communication mechanism between UAS and USS/UTM. The UAS RID discussed in <xref target="rid"/> may be used as the 3GPP CAA-level UAS ID for Remote Identification purposes.</t>
</li></ul>

</section>
<section anchor="overview-of-types-of-uas-remote-id"><name>Overview of Types of UAS Remote ID</name>

<t>This specification introduces two types UAS Remote ID defined in ASTM <xref target="F3411"/>.</t>

<section anchor="brid"><name>Broadcast RID</name>

<t><xref target="F3411"/> defines a set of UAS RID messages for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the directly received UAS ID.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The minimum Broadcast RID data flow is illustrated in <xref target="brid-fig"/>.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
            +------------------------+
            | Unmanned Aircraft (UA) |
            +-----------o------------+
                        |
                        |
                        |
                        | app messages directly over 
                        | one-way RF data link (no IP)
                        |
                        |
                        v
      +------------------o-------------------+
      | Observer's device (e.g., smartphone) |
      +--------------------------------------+
]]></artwork></figure>
<t>Broadcast RID provides information only about unmanned aircraft (UA) within direct Radio Frequency (RF) Line-Of-Sight (LOS), typically similar to Visual LOS (VLOS), with a range up to approximately 1 km.  This information may be 'harvested' from received broadcasts and made available via the Internet, enabling surveillance of areas too large for local direct visual observation or direct RF link-based ID (see <xref target="harvestbridforutm"/>).</t>

</section>
<section anchor="nrid"><name>Network RID</name>

<t><xref target="F3411"/>, using the same data dictionary that is the basis of Broadcast RID messages, defines a Network Remote Identification (Net-RID) data flow as follows.</t>

<t><list style="symbols">
  <t>The information to be reported via UAS RID is generated by the UAS. Typically some of this data is generated by the UA and some by the GCS (Ground Control Station), e.g., their respective Global Navigation Satellite System (GNSS) derived locations.</t>
  <t>The information is sent by the UAS (UA or GCS) via unspecified means to the cognizant Network Remote Identification Service Provider (Net-RID SP), typically the USS under which the UAS is operating if participating in UTM.</t>
  <t>The Net-RID SP publishes via the Discovery and Synchronization Service (DSS) over the Internet that it has operations in various 4-D airspace volumes (Section 2.2 of <xref target="RFC9153"/>),
describing the volumes but not the operations.</t>
  <t>An Observer's device, which is expected, but not specified, to be web-based, queries a Network Remote Identification Display Provider (Net-RID DP),
typically also a USS, about any operations in a specific 4-D airspace volume.</t>
  <t>Using fully specified web-based methods over the Internet, the Net-RID DP queries all Net-RID SP that have operations in volumes intersecting that
of the Observer's query for details on all such operations.</t>
  <t>The Net-RID DP aggregates information received from all such Net-RID SP and responds to the Observer's query.</t>
</list></t>

<t>The minimum Net-RID data flow is illustrated in <xref target="nrid-fig"/>:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
 +-------------+     ******************
 |     UA      |     *    Internet    *
 +--o-------o--+     *                *
    |       |        *                *
    |       |        *                *     +------------+
    |       '--------*--(+)-----------*-----o            |
    |                *   |            *     |            |
    |       .--------*--(+)-----------*-----o Net-RID SP |
    |       |        *                *     |            |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
    |       |        *         '------*-----o            |
    |       |        *                *     | Net-RID DP |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
 +--o-------o--+     *         '------*-----o Observer's |
 |     GCS     |     *                *     | Device     |
 +-------------+     ******************     +------------+

]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path. Currently (in the year 2022)  this is typically a direct RF link; however, with increasing Beyond Visual Line of Sight (BVLOS) operations, it is expected often to be a wireless link at either end with the Internet between.</t>

<t>Telemetry (at least UA's position and heading) flows from the UA to the GCS via some path, typically the reverse of the C2 path. Thus, UAS RID information pertaining to both the GCS and the UA can be sent, by whichever has Internet connectivity, to the Net-RID SP, typically the USS managing the UAS operation.</t>

<t>The Net-RID SP forwards UAS RID information via the Internet to subscribed Net-RID DPs, typically USS. Subscribed Net-RID DPs then forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411"/> describes UAS RID data elements that must be transported end-to-end from the UAS to the subscribed Observer devices.</t>

<t><xref target="F3411"/> prescribes the protocols between the Net-RID SP, Net-RID DP, and the DSS.  It also prescribes data elements (in JSON) between the Observer and the Net-RID DP. DRIP could address standardization of secure protocols between the UA and GCS (over direct wireless and Internet connection), between the UAS and the Net-RID SP, and/or between the Net-RID DP and Observer devices.</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of UAS RID information is in the scope of <xref target="F3411"/> Network RID.</t>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="overview-of-uss-interoperability"><name>Overview of USS Interoperability</name>

<t>With Net-RID, there is direct communication between each UAS and its USS. Multiple USS exchange information with the assistance of a DSS so all USS collectively have knowledge about all activities in a 4D airspace.  The interactions among an Observer, multiple UAS, and their USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                +------+    +----------+    +------+
                | UAS1 |    | Observer |    | UAS2 |
                +---o--+    +-----o----+    +--o---+
                    |             |            |
              ******|*************|************|******
              *     |             |            |     *
              *     |         +---o--+         |     *
              *     |  .------o USS3 o------.  |     *
              *     |  |      +--o---+      |  |     *
              *     |  |         |          |  |     *
              *   +-o--o-+    +--o--+     +-o--o-+   *
              *   |      o----o DSS o-----o      |   *
              *   | USS1 |    +-----+     | USS2 |   *
              *   |      o----------------o      |   *
              *   +------+                +------+   *
              *                                      *
              *               Internet               *
              ****************************************
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture"><name>Overview of DRIP Architecture</name>

<t><xref target="arch-intro"/> illustrates a global UAS RID usage scenario. Broadcast RID links are not shown as they reach from 
any UA to any listening receiver in range and thus would obscure the intent of the figure. <xref target="arch-intro"/> shows, 
as context, some entities and interfaces beyond the scope of DRIP (as currently (2022) chartered).</t>

<figure anchor="arch-intro"><artwork><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork></figure>

<t>DRIP is meant to leverage existing Internet resources (standard protocols, services, infrastructures, and business models) to meet UAS RID and closely related needs.  DRIP will specify how to apply IETF standards, complementing <xref target="F3411"/> and other external standards, to satisfy UAS RID requirements.</t>

<t>This document outlines the DRIP architecture in the context of the UAS RID architecture.  This includes presenting the gaps between the CAAs' Concepts of Operations and <xref target="F3411"/> as it relates to the use of Internet technologies and UA direct RF communications. Issues include, but are not limited to:</t>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Design of trustworthy remote identifiers (<xref target="rid"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Mechanisms to leverage Domain Name System (DNS <xref target="RFC1034"/>), 
Extensible Provisioning Protocol (EPP <xref target="RFC5731"/>) and Registration Data Access Protocol (RDAP) (<xref target="RFC9082"/>) for publishing public and private information (see <xref target="publicinforeg"/> and <xref target="privateinforeg"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Specific authentication methods and message payload formats to enable verification that Broadcast RID messages were sent
by the claimed sender (<xref target="driptrust"/>) and that sender is in the claimed registry (<xref target="ei"/> and <xref target="driptrust"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Harvesting Broadcast RID messages for UTM inclusion, with the optional DRIP extension of Crowd Sourced Remote ID (CS-RID, <xref target="harvestbridforutm"/>), using the DRIP support for gateways required by GEN-5 <xref target="RFC9153"/>.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Methods for instantly establishing secure communications between an Observer and the pilot of an observed UAS (<xref target="dripcontact"/>), using the DRIP support for dynamic contact required by GEN-4 <xref target="RFC9153"/>.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Privacy in UAS RID messages (PII protection) (<xref target="privacyforbrid"/>).</t>
  </list></t>
</li></ul>

</section>
</section>
<section anchor="terms-and-definitions"><name>Terms and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>To encourage comprehension necessary for adoption of DRIP by the intended user community, the UAS community's norms are respected herein.</t>

<t>This document uses terms defined in <xref target="RFC9153"/>.</t>

<section anchor="definitionsandabbr"><name>Additional Abbreviations</name>

<t>DET:        DRIP Entity Tag</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>HHIT:       Hierarchical HIT</t>

<t>HI:         Host Identity</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

</section>
<section anchor="additional-definitions"><name>Additional Definitions</name>

<t>This section introduces the terms "Claims", "Assertions", "Attestations", and "Certificates" as used in DRIP. DRIP certificate has a different context compared with security certificates and Public Key Infrastructure used in X.509.</t>

<t>Claims:</t>

<ul empty="true"><li>
  <t>A claim in DRIP is a predicate (e.g., "X is Y", "X has property Y", and most importantly "X owns Y" or "X is owned by Y").</t>
</li></ul>

<t>Assertions:</t>

<ul empty="true"><li>
  <t>An assertion in DRIP is a set of claims.  This definition is borrowed from JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/>.</t>
</li></ul>

<t>Attestations:</t>

<ul empty="true"><li>
  <t>An attestation in DRIP is a signed assertion.  The signer may be the claimant or a related party with stake in the assertion(s).  Under DRIP this is normally used when an entity asserts a relationship with another entity, along with other information, and the asserting entity signs the assertion, thereby making it an attestation.</t>
</li></ul>

<t>Certificates:</t>

<ul empty="true"><li>
  <t>A certificate in DRIP is an attestation, strictly over identity information, signed by a third party. This third party should be one with no stake in the attestation(s) over which it is signing.</t>
</li></ul>

</section>
</section>
<section anchor="rid"><name>HHIT as the DRIP Entity Identifier</name>

<t>This section describes the DRIP architectural approach to meeting the basic requirements of a DRIP entity identifier within external technical standard ASTM <xref target="F3411"/> and regulatory constraints. It justifies and explains the use of Hierarchical Host Identity Tags (HHITs) <xref target="RFC7401"/> as self-asserting IPv6 addresses suitable as a UAS ID type and, more generally, as trustworthy multipurpose remote identifiers.</t>

<t>Self-asserting in this usage means that, given the Host Identity (HI), the HHIT ORCHID construction and a signature of the registry on the HHIT, the HHIT can be verified by the receiver. The explicit registration hierarchy within the HHIT provides registry discovery (managed by a Registrar) to either yield the HI for a 3rd-party (seeking UAS ID attestation) validation or prove that the HHIT and HI have been registered uniquely.</t>

<section anchor="uas-remote-identifiers-problem-space"><name>UAS Remote Identifiers Problem Space</name>

<t>A DRIP entity identifier needs to be "Trustworthy" (See DRIP Requirement GEN-1, ID-4 and ID-5 in <xref target="RFC9153"/>). This means that given a sufficient collection of UAS RID messages, an Observer can establish that the identifier claimed therein uniquely belongs to the claimant. To satisfy DRIP requirements and maintain important security properties, the DRIP identifier should be self-generated by the entity it names (e.g., a UAS) and registered (e.g., with a USS, see Requirements GEN-3 and ID-2).</t>

<t>Broadcast RID, especially its support for Bluetooth 4, imposes severe constraints.  ASTM UAS RID <xref target="F3411"/> allows a UAS ID of types 1, 2 and 3 of 20 bytes; a revision to <xref target="F3411"/>, currently in balloting (as of Oct 2021), adds type 4, Specific Session ID, to be standardized by IETF and other standards development organizations (SDOs) as extensions to ASTM UAS RID, consumes one of those bytes to index the sub-type, leaving only 19 for the identifier (see DRIP Requirement ID-1).</t>

<t>Likewise, the maximum ASTM UAS RID <xref target="F3411"/> Authentication Message payload is 201 bytes for most authentication types. A type 5 is also added in this revision for IETF and other SDOs to develop Specific Authentication Methods as extensions to ASTM UAS RID. One byte out of 201 bytes is consumed to index the sub-type which leaves only 200 for DRIP authentication payloads, including one or more DRIP entity identifiers and associated authentication data.</t>

</section>
<section anchor="hhit-as-a-trustworthy-drip-entity-identifier"><name>HHIT as A Trustworthy DRIP Entity Identifier</name>

<t>A Remote UAS ID that can be trustworthy for use in Broadcast RID can be built from an asymmetric keypair. In this method, the UAS ID is cryptographically derived directly from the public key. The proof of UAS ID ownership (verifiable attestation, versus mere claim) is guaranteed by signing this cryptographic UAS ID with the associated private key. The association between the UAS ID and the private key is ensured by cryptographically binding the public key with the UAS ID; more specifically, the UAS ID results from the hash of the public key. The public key is designated as the HI while the UAS ID is designated as the HIT.</t>

<t>By construction, the HIT is statistically unique through the cryptographic hash feature of second-preimage resistance. The cryptographically-bound addition of the Hierarchy and an HHIT registration process provide complete, global HHIT uniqueness. This registration forces the attacker to generate the same public key rather than a public key that generates the same HHIT. This is in contrast to general IDs (e.g., a UUID or device serial number) as the subject in an X.509 certificate.</t>

<t>A UA equipped for Broadcast RID SHOULD be provisioned not only with its HHIT but also with the HI public key from which the HHIT was derived and the corresponding private key, to enable message signature.  A UAS equipped for Network RID SHOULD be provisioned likewise; the private key resides only in the ultimate source of Network RID messages (i.e., on the UA itself if the GCS is merely relaying rather than sourcing Network RID messages).  Each Observer device SHOULD be provisioned either with public keys of the DRIP identifier root registries or certificates for subordinate registries.</t>

<t>HHITs can also be used throughout the USS/UTM system. Operators and Private Information Registries, as well as other UTM entities, can use HHITs for their IDs. Such HHITs can facilitate DRIP security functions such as used with HIP to strongly mutually authenticate and encrypt communications.</t>

<t>A self-attestation of a HHIT used as a UAS ID can be done in as little as 84 bytes when Ed25519 <xref target="RFC8032"/> is used, by avoiding an explicit encoding technology like ASN.1 or Concise Binary Object Representation (CBOR <xref target="RFC8949"/>). This attestation consists of only the HHIT, a timestamp, and the EdDSA signature on them.</t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT SHOULD only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (more details in  <xref target="sc"/>).</t>

<t>In general, Internet access may be needed to validate Attestations or Certificates. This may be obviated in the most common cases (e.g., attestation of the UAS ID), even in disconnected environments, by prepopulating small caches on Observer devices with Registry public keys and a chain of Attestations or Certificates (tracing a path through the Registry tree). This is assuming all parties on the trust path also use HHITs for their identities.</t>

</section>
<section anchor="hhitregandlookup"><name>HHIT for DRIP Identifier Registration and Lookup</name>

<t>UAS RID needs a deterministic lookup mechanism that rapidly provides actionable information about the identified UA.  Given the size constraints imposed by the Bluetooth 4 broadcast media, the UAS ID itself needs to be a non-spoofable inquiry input into the lookup.</t>

<t>A DRIP registration process based on the explicit hierarchy within a HHIT provides manageable uniqueness of the HI for the HHIT.  This is the defense against a cryptographic hash second pre-image attack on the HHIT (e.g., multiple HIs yielding the same HHIT, see Requirement ID-3).  A lookup of the HHIT into this registration data provides the registered HI for HHIT proof of ownership.  A first-come-first-served registration for a HHIT provides deterministic access to any other needed actionable information based on inquiry access authority (more details in <xref target="privateinforeg"/>).</t>

</section>
<section anchor="hhit-as-a-cryptographic-identifier"><name>HHIT as a Cryptographic Identifier</name>

<t>The only (known to the authors at the time of this writing) existing types of IP address compatible identifiers cryptographically derived from the public keys of the identified entities are Cryptographically Generated Addresses (CGAs) <xref target="RFC3972"/> and Host Identity Tags (HITs) <xref target="RFC7401"/>.  CGAs and HITs lack registration/retrieval capability. To provide this, each HHIT embeds plaintext information designating the hierarchy within which it is registered and a cryptographic hash of that information concatenated with the entity's public key, etc. Although hash collisions may occur, the registrar can detect them and reject registration requests rather than issue credentials, e.g., by enforcing a first-claimed, first-attested policy. Pre-image hash attacks are also mitigated through this registration process, locking the HHIT to a specific HI</t>

</section>
</section>
<section anchor="ei"><name>DRIP Identifier Registration and Registries</name>

<t>DRIP registries hold both public and private UAS information (See PRIV-1 in <xref target="RFC9153"/>) resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in different registries.  This section introduces the public and private information registries for DRIP identifiers. This DRIP Identifier registration process satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-3, GEN-4, ID-2, ID-4, ID-6, PRIV-3, PRIV-4, REG-1, REG-2, REG-3 and REG-4.</t>

<section anchor="publicinforeg"><name>Public Information Registry</name>

<section anchor="background"><name>Background</name>

<t>The public information registry provides trustable information such as attestations of UAS RID ownership and registration with the HDA (Hierarchical HIT Domain Authority). Optionally, pointers to the registries for the HDA and RAA (Registered Assigning Authority) implicit in the UAS RID can be included (e.g., for HDA  and RAA HHIT|HI used in attestation signing operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UAS that only use Network RID, is available via an Observer's Net-RID DP that would directly provide all public information registry information. The Net-RID DP is the only source of information for a query on an airspace volume.</t>

</section>
<section anchor="dns-as-the-public-drip-identifier-registry"><name>DNS as the Public DRIP Identifier Registry</name>

<t>A DRIP identifier SHOULD be registered as an Internet domain name (at an arbitrary level in the hierarchy, e.g., in .ip6.arpa). Thus DNS can provide all the needed public DRIP information.  A standardized HHIT FQDN (Fully Qualified Domain Name) can deliver the HI via a HIP RR (Resource Record) <xref target="RFC8005"/> and other public information (e.g., RRA and HDA PTRs, and HIP RVS (Rendezvous Servers) <xref target="RFC8004"/>). These public information registries can use secure DNS transport (e.g.,  DNS over TLS) to deliver public information that is not inherently trustable (e.g., everything other than attestations).</t>

</section>
</section>
<section anchor="privateinforeg"><name>Private Information Registry</name>

<section anchor="background-1"><name>Background</name>

<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.  A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure, and business models, by fitting into an UAS ID structure compatible with DNS names.  The HHIT hierarchy can provide the needed scalability and management structure. It is expected that the private information registry function will be provided by the same organizations that run a USS, and likely integrated with a USS.  The lookup function may be implemented by the Net-RID DPs.</t>

</section>
<section anchor="epp-and-rdap-as-the-private-drip-identifier-registry"><name>EPP and RDAP as the Private DRIP Identifier Registry</name>

<t>A DRIP private information registry supports essential registry operations (e.g., add, delete, update, query) using interoperable open standard protocols. It can accomplish this by using the Extensible Provisioning Protocol (EPP <xref target="RFC5730"/>) and the Registry Data Access Protocol (RDAP <xref target="RFC7480"/> <xref target="RFC9082"/> <xref target="RFC9083"/>).  The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC7484"/>.</t>

</section>
<section anchor="alternative-private-drip-registry-methods"><name>Alternative Private DRIP Registry methods</name>

<t>A DRIP private information registry might be an access-controlled DNS (e.g., via DNS over TLS).  Additionally, WebFinger <xref target="RFC7033"/> can be deployed. These alternative methods may be used by Net-RID DP with specific customers.</t>

</section>
</section>
</section>
<section anchor="driptrust"><name>DRIP Identifier Trust</name>

<t>While the DRIP entity identifier is self-asserting, it alone does not provide the trustworthiness (non-repudiability, protection vs. spoofing, message integrity protection, scalability, etc.) essential to UAS RID, as justified in <xref target="RFC9153"/>. For that it MUST be registered (under DRIP Registries) and be actively used by the party (in most cases the UA). A sender's identity can not be approved by only possessing a DRIP Entity Tag (DET), which is an HHIT-based UA ID and broadcasting a claim that it belongs to that sender.  Even the sender using that HI's private key to sign static data proves nothing as well, as it is subject to trivial replay attacks. Only sending the DET and a signature on frequently changing data that can be sanity-checked by the Observer (such as a Location/Vector message) proves that the observed UA possesses the claimed UAS ID.</t>

<t>For Broadcast RID, it is a challenge to balance the original requirements of Broadcast RID and the efforts needed  to satisfy the DRIP requirements all under severe constraints. From received Broadcast RID messages and information that can be looked up using the received UAS ID in online registries or local caches, it is possible to establish levels of trust in the asserted information and the Operator.</t>

<t>Optimization of different DRIP Authentication Messages allows an Observer, without Internet connection (offline) or with (online), to be able to validate a UAS DRIP ID in real-time.  First is the sending of Broadcast Attestations (over DRIP Link Authentication Messages) <xref target="I-D.ietf-drip-auth"/> containing the relevant registration of the UA's DRIP ID in the claimed Registry.  Next is sending DRIP Wrapper Authentication Messages that sign over both static (e.g., above registration) and dynamically changing data (such as UA location data).  Combining these two sets of information, an Observer can piece together a chain of trust and real-time evidence to make their determination of the UA's claims.</t>

<t>This process (combining the DRIP entity identifier, Registries and Authentication Formats for Broadcast RID) can satisfy the following DRIP requirement defined in <xref target="RFC9153"/>: GEN-1, GEN-2, GEN-3, ID-2, ID-3, ID-4 and ID-5.</t>

</section>
<section anchor="harvestbridforutm"><name>Harvesting Broadcast Remote ID messages for UTM Inclusion</name>

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow UAS RID requirements for small UAS
to be satisfied with the operator's choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for essentially all UAS, and is now also considering Network RID.  The FAA UAS RID Final Rules <xref target="FAA_RID"/> permit only Broadcast RID for rule compliance, but still encourage Network RID for complementary functionality, especially in support of UTM.</t>

<t>One opportunity is to enhance the architecture with gateways from Broadcast RID to Network RID. This provides the best of both and gives regulators and operators
flexibility.  It offers advantages over either form of UAS RID alone: greater fidelity than Network RID reporting of planned area operations; surveillance of areas too large for local direct visual observation and direct RF-LOS link based Broadcast RID (e.g., a city or a national forest).</t>

<t>These gateways could be pre-positioned (e.g., around airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing more than a smartphone with a suitable app is needed).  As Broadcast RID media have limited range, gateways receiving messages claiming locations far from the gateway can alert authorities or a SDSP to the failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position stamps from the gateways to multilaterate UA location, independent of the locations claimed in the messages, which are entirely operator self-reported in UAS RID and UTM, and thus are subject not only to natural time lag and error but also operator misconfiguration or intentional deception.</t>

<t>Multilateration technologies use physical layer information, such as precise Time Of Arrival (TOA) of transmissions from mobile transmitters at receivers with a priori precisely known locations, to estimate the locations of the mobile transmitters.</t>

<t>Further, gateways with additional sensors (e.g., smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the UAS RID messages.</t>

<t><xref target="csridfinder"/> and <xref target="csridsdsp"/> define two additional entities that are required to provide this Crowd Sourced Remote ID (CS-RID).</t>

<t>This approach satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-5, GEN-11, and REG-1.</t>

<section anchor="csridfinder"><name>The CS-RID Finder</name>
<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from a Broadcast RID receiver.  However, it should not depend upon a direct interface with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a new interface to a CS-RID SDSP, similar to but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="csridsdsp"><name>The CS-RID SDSP</name>

<t>A CS-RID SDSP aggregates and processes (e.g., estimates UA location using multilateration when possible) information collected by CS-RID Finders. A CS-RID SDSP should appear (i.e., present the same interface) to a Net-RID SP as a Net-RID DP.</t>

</section>
</section>
<section anchor="dripcontact"><name>DRIP Contact</name>

<t>One of the ways in which DRIP can enhance <xref target="F3411"/> with immediately actionable information is by enabling an Observer to instantly initiate secure communications with the UAS remote pilot, Pilot In Command, operator, USS under which the operation is being flown, or other entity potentially able to furnish further information regarding the operation and its intent and/or to immediately influence further conduct or termination of the operation (e.g., land or otherwise exit an airspace volume). Such potentially distracting communications demand strong "AAA" (Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, Audit) per applicable policies (e.g., of the cognizant CAA).</t>

<t>A DRIP entity identifier based on a HHIT as outlined in <xref target="rid"/> embeds an identifier of the registry in which it can be found (expected typically to be the USS under which the UAS is flying) and the procedures outlined in <xref target="driptrust"/> enable Observer verification of that relationship. A DRIP entity identifier with suitable records in public and private registries as outlined in Section 5 can enable lookup not only of information regarding the UAS, but also identities of and pointers to information regarding the various associated entities (e.g., the USS under which the UAS is flying an operation), including means of contacting those associated entities (i.e., locators, typically IP addresses).</t>

<t>A suitably equipped Observer could initiate a cryptographic handshake to a similarly equipped and identified entity: the UA itself, if operating autonomously; the GCS, if the UA is remotely piloted and the necessary records have been populated in DNS; the USS, etc. Assuming mutual authentication is successful, keys can then be negotiated for an IPsec Encapsulating Security Payload (ESP) tunnel, over which arbitrary standard higher layer protocols can then be used for Observer to Pilot (O2P)communications (e.g., SIP <xref target="RFC3261"/> et seq), V2X communications (e.g., <xref target="MAVLink"/>), etc. Certain preconditions are necessary: each party needs a currently usable means (typically DNS) of resolving the other party's DRIP entity identifier to a currently usable locator (IP address); and there must be currently usable bidirectional IP (not necessarily Internet) connectivity between the parties. One method directly supported by the use of HHITs as DRIP entity identifiers is initiation of a HIP Base Exchange (BEX) and Bound End-to-End Tunnel (BEET).</t>

<t>This approach satisfies DRIP requirement GEN-6 Contact, supports satisfaction of requirements <xref target="RFC9153"/> GEN-8, GEN-9, PRIV-2, PRIV-5 and REG-3, and is compatible with all other DRIP requirements.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not make any IANA request.</t>

</section>
<section anchor="sc"><name>Security Considerations</name>

<t>The security provided by asymmetric cryptographic techniques depends
upon protection of the private keys.  It may be necessary for the GCS
to have the key pair to register the HHIT to the USS.  Thus it may be the GCS
that generates the key pair and delivers it to the UA, making the GCS a part of
the key security boundary.  Leakage of the private key either from the UA or GCS
to the component manufacturer is a valid concern and steps need to be in
place to ensure safe keeping of the private key.</t>

<t>The size of the public key hash in the HHIT is also of concern.  It is well within
current server array technology to compute another key pair that hashes to the
same HHIT.  Thus an adversary could impersonate a validly registered UA.
This attack would only be exposed when the HI in DRIP authentication message
is checked back to the USS and found not to match.</t>

<t>Finally, the UAS RID sender of a small harmless UA (or the entire UA) could be carried by a larger dangerous UA as a "false flag."  Compromise of a registry private key could do widespread harm.  Key revocation procedures are as yet to be
determined. These risks are in addition to those involving Operator
key management practices.</t>

</section>
<section anchor="privacyforbrid"><name>Privacy &amp; Transparency Considerations</name>

<t>Broadcast RID messages can contain Personally Identifiable Information (PII).  A viable architecture for PII protection would be symmetric encryption of the PII using a session key known to the UAS and its USS. Authorized Observers could obtain plaintext in either of two ways. An Observer can send the UAS ID and the cyphertext to a server that offers decryption as a service. An Observer can send the UAS ID only to a server that returns the session key, so that Observer can directly locally decrypt all cyphertext sent by that UA during that session (UAS operation). In either case, the server can be: a Public Safety USS, the Observer's own USS, or the UA's USS if the latter can be determined (which under DRIP it can be, from the UAS ID itself).  PII can be protected unless the UAS is informed otherwise.  This could come as part of UTM operation authorization. It can be special instructions at the start or during an operation. PII protection MUST NOT be used if the UAS loses connectivity to the USS.  The UAS always has the option to abort the operation if PII protection is disallowed.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname='S. Card' initials='S.' role='editor' surname='Card'><organization/></author>
<author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'><organization/></author>
<author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'><organization/></author>
<author fullname='A. Gurtov' initials='A.' surname='Gurtov'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9153'/>
<seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-drip-auth'>
   <front>
      <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-05.txt' type='TXT'/>
</reference>



<reference anchor='RFC7480' target='https://www.rfc-editor.org/info/rfc7480'>
<front>
<title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<author fullname='B. Ellacott' initials='B.' surname='Ellacott'><organization/></author>
<author fullname='N. Kong' initials='N.' surname='Kong'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='7480'/>
<seriesInfo name='DOI' value='10.17487/RFC7480'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC9082' target='https://www.rfc-editor.org/info/rfc9082'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9082'/>
<seriesInfo name='DOI' value='10.17487/RFC9082'/>
</reference>


<reference anchor="F3411" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>Study on Remote Identification of Unmanned Aerial Systems (UAS)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="MAVLink" target="http://mavlink.io/">
  <front>
    <title>Micro Air Vehicle Communication Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FS_AEUA" target="https://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_147E_Electronic_2021-10/Docs/S2-2107092.zip">
  <front>
    <title>Study of Further Architecture Enhancement for UAV and UAM</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC7033' target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author fullname='P. Jones' initials='P.' surname='Jones'><organization/></author>
<author fullname='G. Salgueiro' initials='G.' surname='Salgueiro'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Smarr' initials='J.' surname='Smarr'><organization/></author>
<date month='September' year='2013'/>
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7484' target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author fullname='M. Blanchet' initials='M.' surname='Blanchet'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference anchor='RFC8004' target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<author fullname='L. Eggert' initials='L.' surname='Eggert'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference anchor='RFC5731' target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC5730' target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8392' target='https://www.rfc-editor.org/info/rfc8392'>
<front>
<title>CBOR Web Token (CWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='E. Wahlstroem' initials='E.' surname='Wahlstroem'><organization/></author>
<author fullname='S. Erdtman' initials='S.' surname='Erdtman'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8392'/>
<seriesInfo name='DOI' value='10.17487/RFC8392'/>
</reference>



<reference anchor='RFC8005' target='https://www.rfc-editor.org/info/rfc8005'>
<front>
<title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t></abstract>
</front>
<seriesInfo name='RFC' value='8005'/>
<seriesInfo name='DOI' value='10.17487/RFC8005'/>
</reference>



<reference anchor='RFC9083' target='https://www.rfc-editor.org/info/rfc9083'>
<front>
<title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9083'/>
<seriesInfo name='DOI' value='10.17487/RFC9083'/>
</reference>



<reference anchor='RFC3261' target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author fullname='J. Rosenberg' initials='J.' surname='Rosenberg'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<author fullname='A. Johnston' initials='A.' surname='Johnston'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='R. Sparks' initials='R.' surname='Sparks'><organization/></author>
<author fullname='M. Handley' initials='M.' surname='Handley'><organization/></author>
<author fullname='E. Schooler' initials='E.' surname='Schooler'><organization/></author>
<date month='June' year='2002'/>
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>




    </references>


<section anchor="appendix-a"><name>Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)</name>

<section anchor="operation-concept"><name>Operation Concept</name>

<t>The National Aeronautics and Space Administration (NASA) and FAA's
effort to integrate UAS operations into the national airspace
system (NAS) led to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 was published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual concept refinement, initial prototype implementation, and testing
were conducted by the joint FAA and NASA UTM research transition team. World efforts took place afterward.  The Single European Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published their UTM concepts of operations to
guide the development of their future air traffic management (ATM)
system and ensure safe and efficient integration of manned and
unmanned aircraft into the national airspace.</t>

<t>UTM comprises UAS operations infrastructure, procedures and
local regulation compliance policies to guarantee safe UAS
integration and operation.  The main functionality of UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss"><name>UAS Service Supplier (USS)</name>

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that UTM has to offer.  Such an Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitoring and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS to build a large service coverage map that
can load-balance, relay, and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low Altitude Authorization and Notification Capability <xref target="LAANC"/> program, which is the first system to realize some of the envisioned functionality of UTM. The LAANC program can automate UAS operational intent (flight plan) submission and application for airspace authorization in real-time by checking against multiple aeronautical databases such as airspace classification and operating rules associated with it, FAA UAS facility map, special use airspace, Notice to Airmen (NOTAM), and Temporary Flight Restriction (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations"><name>UTM Use Cases for UAS Operations</name>

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and taking off or landing in
controlled airspace (e.g., Class Bravo, Charlie, Delta, and Echo
in the United States), the USS under which the UAS is operating is responsible for verifying UA registration, authenticating the UAS operational intent (flight plan) by checking against designated UAS facility map database, obtaining the air traffic control (ATC) authorization, and monitoring the UAS flight path in order to maintain safe margins and follow the pre-authorized sequence of authorized 4-D volumes (route).</t>
  <t>For a UAS participating in UTM and taking off or landing in uncontrolled airspace (e.g., Class Golf in the United States), pre-flight authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS).  The USS either accepts or rejects the received operational intent (flight plan) from the UAS.  Accepted UAS operation may share its current flight data such as GPS position and altitude to USS.  The USS may keep the UAS operation status near real-time and may keep it as a record for overall airspace air traffic monitoring.</t>
</list></t>

</section>
</section>
<section anchor="adsb"><name>Automatic Dependent Surveillance Broadcast (ADS-B)</name>

<t>The ADS-B is the de jure technology used in manned aviation for sharing location information, from the aircraft to ground and satellite-based systems, designed in the early 2000s. Broadcast RID is 
conceptually similar to ADS-B, but with the receiver target being the general public on generally available devices (e.g., smartphones).</t>

<t>For numerous technical reasons, ADS-B itself is not suitable for 
low-flying small UAS. Technical reasons include but not limited to the following:</t>

<t><list style="numbers">
  <t>Lack of support for the 1090 MHz ADS-B channel on any consumer handheld devices</t>
  <t>Weight and cost of ADS-B transponders on CSWaP constrained UA</t>
  <t>Limited bandwidth of both uplink and downlink, which would likely be saturated by large numbers of UAS, endangering manned aviation</t>
</list></t>

<t>Understanding these technical shortcomings, regulators worldwide have ruled out the use of ADS-B for the small UAS for which UAS RID and DRIP are intended.</t>

</section>
<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t>The work of the FAA's UAS Identification and Tracking (UAS ID) Aviation Rulemaking Committee (ARC) is the foundation of later ASTM and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in balancing the interests of diverse stakeholders is essential to the necessary rapid and widespread deployment of UAS RID. Thanks to Alexandre Petrescu and Stephan Wenger for the helpful and positive comments. Thanks to chairs Daniel Migault and Mohamed Boucadair for direction of our team of authors and editor, some of whom are newcomers to writing IETF documents. Laura Welch is also thanked for her valuable review comments that led to great improvements of this memo.  Thanks especially to Internet Area Director Eric Vyncke for guidance and support.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

