<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-27" category="info">

  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd</street>
          <city>Santa Clara</city>
          <code>95054</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2022" month="August" day="05"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus UAS RID-related communications. This architecture adheres to the requirements listed in the DRIP Requirements document (RFC9153).</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus RID-related communications. The architecture takes into account both current (including proposed) regulations and non-IETF technical standards.</t>

<t>The architecture adheres to the requirements listed in the DRIP Requirements document <xref target="RFC9153"/>. The requirements document provides an extended introduction to the problem space and use cases. Further, this architecture document frames the DRIP Entity Tag (DET) <xref target="I-D.ietf-drip-rid"/> within the architecture.</t>

<section anchor="overview-of-unmanned-aircraft-system-uas-remote-id-rid-and-standardization" title="Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and Standardization">

<t>UAS Remote Identification (RID) is an application that enables a UAS to be identified by Unmanned Aircraft Systems Traffic Management (UTM) and UAS Service Supplier (USS) (<xref target="appendix-a"/>) or third party entities such as law enforcement. Many considerations (e.g., safety) dictate that a UAS be remotely identifiable.</t>

<t>Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID. CAAs currently promulgate performance-based regulations that do not specify techniques, but rather cite industry consensus technical standards as acceptable means of compliance.</t>

<t>USA Federal Aviation Administration (FAA)</t>

<t><list style='empty'>
  <t>The FAA published a Notice of Proposed Rule Making <xref target="NPRM"/> in 2019  and thereafter published a “Final Rule” in 2021 <xref target="FAA_RID"/>, imposing requirements on UAS manufacturers and operators, both commercial and recreational. The rule  states that Automatic Dependent Surveillance Broadcast (ADS-B) Out and transponders cannot be used to satisfy the UAS RID requirements on UAS to which the rule applies (see <xref target="adsb"/>).</t>
</list></t>

<t>European Union Aviation Safety Agency (EASA)</t>

<t><list style='empty'>
  <t>The EASA published a <xref target="Delegated"/> regulation in 2019 imposing requirements on UAS manufacturers and third-country operators, including but not limited to UAS RID requirements. The same year, EASA also published an <xref target="Implementing"/> regulation laying down detailed rules and procedures for UAS operations and operating personnel which then was updated in 2021 <xref target="Implementing_update"/>. A Notice of Proposed Amendment <xref target="NPA"/> was published in 2021 to provide more information about the development of acceptable means of compliance and guidance material to support the U-space regulation.</t>
</list></t>

<t>American Society for Testing and Materials (ASTM)</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item WK65041, developed the ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of UAS RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If an UAS uses 
both communication methods, the same information must be
provided via both means. <xref target="F3411-19"/> is cited by the FAA in its UAS RID final rule <xref target="FAA_RID"/> as “a potential means of compliance” to a Remote ID rule.</t>
</list></t>

<t>The 3rd Generation Partnership Project (3GPP)</t>

<t><list style='empty'>
  <t>With release 16, the 3GPP completed the UAS RID requirement study <xref target="TS-22.825"/> and proposed a set of use cases in the mobile network and services that can be offered based on UAS RID.  The Release 17 study <xref target="TR-23.755"/> and specification <xref target="TS-23.255"/> focus on enhanced UAS service requirements and provides the protocol and application architecture support that will be applicable for both 4G and 5G networks. The study of Further Architecture Enhancement for Uncrewed Aerial Vehicles (UAV) and Urban Air Mobility (UAM) <xref target="FS_AEUA"/> in release 18 further enhances the communication mechanism between UAS and USS/UTM. The DRIP Entity Tag in <xref target="rid"/> may be used as the 3GPP CAA-level UAS ID for Remote Identification purposes.</t>
</list></t>

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<t>This specification introduces two types of UAS Remote ID defined in ASTM <xref target="F3411-19"/>.</t>

<section anchor="brid" title="Broadcast RID">

<t><xref target="F3411-19"/> defines a set of UAS RID messages for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the directly received UAS ID.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The minimum Broadcast RID data flow is illustrated in <xref target="brid-fig"/>.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
                +------------------------+
                | Unmanned Aircraft (UA) |
                +-----------o------------+
                            |
                            | app messages directly over 
                            | one-way RF data link (no IP)
                            |
                            v
          +------------------o-------------------+
          | Observer's device (e.g., smartphone) |
          +--------------------------------------+
]]></artwork></figure>
<t>Broadcast RID provides information only about unmanned aircraft (UA) within direct Radio Frequency (RF) Line-Of-Sight (LOS), typically similar to Visual LOS (VLOS), with a range up to approximately 1 km.  This information may be ‘harvested’ from received broadcasts and made available via the Internet, enabling surveillance of areas too large for local direct visual observation or direct RF link-based ID (see <xref target="harvestbridforutm"/>).</t>

</section>
<section anchor="nrid" title="Network RID">

<t><xref target="F3411-19"/>, using the same data dictionary that is the basis of Broadcast RID messages, defines a Network Remote Identification (Net-RID) data flow as follows.</t>

<t><list style="symbols">
  <t>The information to be reported via UAS RID is generated by the UAS. Typically some of this data is generated by the UA and some by the GCS (Ground Control Station), e.g., their respective Global Navigation Satellite System (GNSS) derived locations.</t>
  <t>The information is sent by the UAS (UA or GCS) via unspecified means to the cognizant Network Remote Identification Service Provider (Net-RID SP), typically the USS under which the UAS is operating if participating in UTM.</t>
  <t>The Net-RID SP publishes via the Discovery and Synchronization Service (DSS) over the Internet that it has operations in various 4-D airspace volumes (Section 2.2 of <xref target="RFC9153"/>),
describing the volumes but not the operations.</t>
  <t>An Observer’s device, which is expected, but not specified, to be web-based, queries a Network Remote Identification Display Provider (Net-RID DP),
typically also a USS, about any operations in a specific 4-D airspace volume.</t>
  <t>Using fully specified web-based methods over the Internet, the Net-RID DP queries all Net-RID SPs that have operations in volumes intersecting that of the Observer’s query for details on all such operations.</t>
  <t>The Net-RID DP aggregates information received from all such Net-RID SPs and responds to the Observer’s query.</t>
</list></t>

<t>The minimum Net-RID data flow is illustrated in <xref target="nrid-fig"/>:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
 +-------------+     ******************
 |     UA      |     *    Internet    *
 +--o-------o--+     *                *
    |       |        *                *     +------------+
    |       '--------*--(+)-----------*-----o            |
    |                *   |            *     |            |
    |       .--------*--(+)-----------*-----o Net-RID SP |
    |       |        *                *     |            |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
    |       |        *         '------*-----o            |
    |       |        *                *     | Net-RID DP |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
 +--o-------o--+     *         '------*-----o Observer's |
 |     GCS     |     *                *     | Device     |
 +-------------+     ******************     +------------+
]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path. Currently (in the year 2022)  this is typically a direct RF link; however, with increasing Beyond Visual Line of Sight (BVLOS) operations, it is expected often to be a wireless link at either end with the Internet between.</t>

<t>Telemetry (at least the UA’s position and heading) flows from the UA to the GCS via some path, typically the reverse of the C2 path. Thus, UAS RID information pertaining to both the GCS and the UA can be sent, by whichever has Internet connectivity, to the Net-RID SP, typically the USS managing the UAS operation.</t>

<t>The Net-RID SP forwards UAS RID information via the Internet to subscribed Net-RID DPs, typically USSs. Subscribed Net-RID DPs then forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411-19"/> describes UAS RID data elements that must be transported end-to-end from the UAS to the subscribed Observer devices.</t>

<t><xref target="F3411-19"/> prescribes the protocols between the Net-RID SP, Net-RID DP, and the DSS.  It also prescribes data elements (in JSON) between the Observer and the Net-RID DP. DRIP could address standardization of secure protocols between the UA and GCS (over direct wireless and Internet connection), between the UAS and the Net-RID SP, and/or between the Net-RID DP and Observer devices.</t>

<t><list style='empty'>
  <t><list style='empty'>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of UAS RID information is in the scope of <xref target="F3411-19"/> Network RID.</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">

<t>With Net-RID, there is direct communication between each UAS and its USS. Multiple USS exchange information with the assistance of a DSS so all USS collectively have knowledge about all activities in a 4D airspace.  The interactions among an Observer, multiple UAS, and their USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                +------+    +----------+    +------+
                | UAS1 |    | Observer |    | UAS2 |
                +---o--+    +-----o----+    +--o---+
                    |             |            |
              ******|*************|************|******
              *     |             |            |     *
              *     |         +---o--+         |     *
              *     |  .------o USS3 o------.  |     *
              *     |  |      +--o---+      |  |     *
              *     |  |         |          |  |     *
              *   +-o--o-+    +--o--+     +-o--o-+   *
              *   |      o----o DSS o-----o      |   *
              *   | USS1 |    +-----+     | USS2 |   *
              *   |      o----------------o      |   *
              *   +------+                +------+   *
              *                                      *
              *               Internet               *
              ****************************************
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture" title="Overview of DRIP Architecture">

<t><xref target="arch-intro"/> illustrates a global UAS RID usage scenario. Broadcast RID links are not shown as they reach from any UA to any listening receiver in range and thus would obscure the intent of the figure. <xref target="arch-intro"/> shows, as context, some entities and interfaces beyond the scope of DRIP (as currently (2022) chartered).</t>

<figure anchor="arch-intro"><artwork><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork></figure>

<t><list style='empty'>
  <t>Informative note: see <xref target="RFC9153"/> for detailed definitions.</t>
</list></t>

<t>DRIP is meant to leverage existing Internet resources (standard protocols, services, infrastructures, and business models) to meet UAS RID and closely related needs.  DRIP will specify how to apply IETF standards, complementing <xref target="F3411-19"/> and other external standards, to satisfy UAS RID requirements.</t>

<t>This document outlines the DRIP architecture in the context of the UAS RID architecture.  This includes closing the gaps between the CAAs’ Concepts of Operations and <xref target="F3411-19"/> as it relates to the use of Internet technologies and UA direct RF communications. Issues include, but are not limited to:</t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Design of trustworthy remote identifiers required by GEN-1 (<xref target="rid"/>).</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Mechanisms to leverage the Domain Name System (DNS <xref target="RFC1034"/>), for registering and publishing public and private information (see <xref target="publicinforeg"/> and <xref target="privateinforeg"/>) as required by REG-1 and REG-2.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Specific authentication methods and message payload formats to enable verification that Broadcast RID messages were sent by the claimed sender (<xref target="driptrust"/>) and that the sender is in the claimed registry (<xref target="ei"/> and <xref target="driptrust"/>) as required by GEN-2.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Harvesting Broadcast RID messages for UTM inclusion, with the optional DRIP extension of Crowd Sourced Remote ID (CS-RID, <xref target="harvestbridforutm"/>), using the DRIP support for gateways required by GEN-5 <xref target="RFC9153"/>.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Methods for instantly establishing secure communications between an Observer and the pilot of an observed UAS (<xref target="dripcontact"/>), using the DRIP support for dynamic contact required by GEN-4 <xref target="RFC9153"/>.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Privacy in UAS RID messages (PII protection) (<xref target="privacyforbrid"/>).</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="terms-and-definitions" title="Terms and Definitions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>To encourage comprehension necessary for adoption of DRIP by the intended user community, the UAS community’s norms are respected herein.</t>

<t>This document uses terms defined in <xref target="RFC9153"/>.</t>

<section anchor="definitionsandabbr" title="Additional Abbreviations">

<t>DET:        DRIP Entity Tag</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>HHIT:       Hierarchical HIT</t>

<t>HI:         Host Identity</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

</section>
<section anchor="additional-definitions" title="Additional Definitions">

<t>This section introduces the terms “Claim”, “Evidence”, “Endorsement”, and “Certificate” as used in DRIP. A DRIP certificate has a different context compared with security certificates and Public Key Infrastructure used in X.509.</t>

<t>Claim:</t>

<t><list style='empty'>
  <t>A claim shares the same definition as a claim in RATS <xref target="I-D.ietf-rats-architecture"/>; it is a piece of asserted information, sometimes in the form of a name/value pair. It could also been seen as a predicate (e.g., “X is Y”, “X has property Y”, and most importantly “X owns Y” or “X is owned by Y”).</t>
</list></t>

<t>Evidence:</t>

<t><list style='empty'>
  <t>Evidence in DRIP borrows the same definition as in RATS <xref target="I-D.ietf-rats-architecture"/>; that is a set of claims.</t>
</list></t>

<t>Endorsement:</t>

<t><list style='empty'>
  <t>An Endorsement is inspired from RATS <xref target="I-D.ietf-rats-architecture"/>; it is a secure (i.e. signed) statement vouching the integrity and veracity of evidence.</t>
</list></t>

<t>Certificate:</t>

<t><list style='empty'>
  <t>A certificate in DRIP is an endorsement, strictly over identity information, signed by a third party. This third party should be one with no stake in the endorsement over which it is signing.</t>
</list></t>

<t>DRIP Identity Management Entity (DIME):</t>

<t><list style='empty'>
  <t>An entity that performs functions similar to a domain registrar. A DIME vets Claims and/or Evidence from a registrant and delivers back Endorsements and/or Certificates in response. It is a high level entity in the DRIP registration/provisioning process.</t>
</list></t>

</section>
</section>
<section anchor="rid" title="HHIT as the DRIP Entity Identifier">

<t>This section describes the DRIP architectural approach to meeting the basic requirements of a DRIP entity identifier within external technical standard ASTM <xref target="F3411-19"/> and regulatory constraints. It justifies and explains the use of Hierarchical Host Identity Tags (HHITs) <xref target="I-D.ietf-drip-rid"/> as self-asserting IPv6 addresses suitable as a UAS ID type and, more generally, as trustworthy multipurpose remote identifiers.</t>

<t>Self-asserting in this usage means that given the Host Identity (HI), the HHIT ORCHID construction (see section 3.5 of <xref target="I-D.ietf-drip-rid"/>) and a signature of the registry on the HHIT and HI; the HHIT can be verified by the receiver as a trusted UAS ID. The explicit registration hierarchy within the HHIT provides registry discovery (managed by a DRIP Identity Management Entity (DIME)) to either yield the HI for a 3rd-party (seeking UAS ID attestation) validation or prove that the HHIT and HI have been registered uniquely.</t>

<section anchor="uas-remote-identifiers-problem-space" title="UAS Remote Identifiers Problem Space">

<t>A DRIP entity identifier needs to be “Trustworthy” (see DRIP Requirement GEN-1, ID-4 and ID-5 in <xref target="RFC9153"/>). This means that given a sufficient collection of UAS RID messages, an Observer can establish that the identifier claimed therein uniquely belongs to the claimant. To satisfy DRIP requirements and maintain important security properties, the DRIP identifier should be self-generated by the entity it names (e.g., a UAS) and registered (e.g., with a USS, see Requirements GEN-3 and ID-2).</t>

<t>However the Broadcast RID, especially its support for Bluetooth 4.x, imposes severe constraints. The ASTM UAS RID <xref target="F3411-19"/> allows a UAS ID of types 1, 2 and 3 of 20 bytes. <xref target="F3411-22a"/> add an additional type 4 (Specific Session ID). Type 4 uses one byte to index the Specific Session ID (leaving 19 bytes, see ID-1 of DRIP Requirement <xref target="RFC9153"/>); Specific Session ID of value 1 is allocated to IETF DRIP by ASTM.  This new Specific Session ID will be standardized by IETF and other standards development organizations (SDOs) as extensions to ASTM UAS RID.</t>

<t>Likewise, the maximum ASTM UAS RID <xref target="F3411-19"/> Authentication Message payload is 201 bytes for most authentication types. A type 5 is also added in this revision for IETF and other SDOs to develop Specific Authentication Methods as extensions to ASTM UAS RID. One byte out of 201 bytes is consumed to index the sub-type which leaves only 200 for DRIP authentication payloads, including one or more DRIP entity identifiers and associated authentication data.</t>

</section>
<section anchor="hhit-as-a-cryptographic-identifier" title="HHIT as a Cryptographic Identifier">

<t>The only (known to the authors at the time of this writing) existing types of IP address compatible identifiers cryptographically derived from the public keys of the identified entities are Cryptographically Generated Addresses (CGAs) <xref target="RFC3972"/> and Host Identity Tags (HITs) <xref target="RFC7401"/>.  CGAs and HITs lack registration/retrieval capability. To provide this, each HHIT embeds plaintext information designating the hierarchy within which it is registered and a cryptographic hash of that information concatenated with the entity’s public key, etc. Although hash collisions may occur, the DIME can detect them and reject registration requests rather than issue credentials, e.g., by enforcing a first-claimed, first-attested policy. Pre-image hash attacks are also mitigated through this registration process, locking the HHIT to a specific HI.</t>

</section>
<section anchor="hhit-as-a-trustworthy-drip-entity-identifier" title="HHIT as A Trustworthy DRIP Entity Identifier">

<t>A Remote UAS ID that can be trustworthy for use in Broadcast RID can be built from an asymmetric keypair. In this method, the UAS ID is cryptographically derived directly from the public key. The proof of UAS ID ownership (verifiable attestation, versus mere claim) is guaranteed by signing this cryptographic UAS ID with the associated private key. The association between the UAS ID and the private key is ensured by cryptographically binding the public key with the UAS ID; more specifically, the UAS ID results from the hash of the public key. The public key is designated as the HI while the UAS ID is designated as the HIT.</t>

<t>By construction, the HIT is statistically unique through the mandatory use of cryptographic hash functions with second-preimage resistance. The cryptographically-bound addition of the Hierarchy and an HHIT registration process provide complete, global HHIT uniqueness. This registration forces the attacker to generate the same public key rather than a public key that generates the same HHIT. This is in contrast to general IDs (e.g., a UUID or device serial number) as the subject in an X.509 certificate.</t>

<t>A UA equipped for Broadcast RID MUST be provisioned not only with its HHIT but also with the HI public key from which the HHIT was derived and the corresponding private key, to enable message signature.</t>

<t>A UAS equipped for DRIP enhanced Network RID MUST be provisioned likewise; the private key resides only in the ultimate source of Network RID messages. If the GCS is the source of the Network RID messages; the GCS MUST hold the private key. If the UA is the source of the Network RID messages and they are being relayed by the GCS; the UA MUST hold the private key, just as a UA that directly connects to the network rather than through its GCS.</t>

<t>Each Observer device functioning with Internet connectivity MAY be provisioned either with public keys of the DRIP identifier root registries or certificates for subordinate registries; each Observer devices that needs to operate without Internet connectivity at any time MUST be so provisioned.</t>

<t>HHITs can also be used throughout the USS/UTM system. Operators and Private Information Registries, as well as other UTM entities, can use HHITs for their IDs. Such HHITs can facilitate DRIP security functions such as used with HIP to strongly mutually authenticate and encrypt communications.</t>

<t>A self-attestation of a HHIT used as a UAS ID can be done in as little as 84 bytes when Ed25519 <xref target="RFC8032"/> is used by only including the 16-byte HHIT, a 4-byte timestamp, and the 64-byte Ed25519 signature.</t>

<t>Ed25519 <xref target="RFC8032"/> is used as the HHIT Mandatory to Implement signing algorithm as <xref target="RFC9153"/> GEN-1 and ID-5 can best be met by restricting the HI to 32 bytes.  A larger public key would rule out the offline attestation feature that fits within the 200-byte Authentication Message maximum length.  Other algorithms that meet this 32 byte constraint can be added as deemed needed.</t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT SHOULD only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (see also <xref target="sc"/>).</t>

<t>In general, Internet access may be needed to validate Attestations or Certificates. This may be obviated in the most common cases (e.g., attestation of the UAS ID), even in disconnected environments, by prepopulating small caches on Observer devices with Registry public keys and a chain of Attestations or Certificates (tracing a path through the Registry tree). This is assuming all parties on the trust path also use HHITs for their identities.</t>

</section>
<section anchor="hhitregandlookup" title="HHIT for DRIP Identifier Registration and Lookup">

<t>UAS RID needs a deterministic lookup mechanism that rapidly provides actionable information about the identified UA.  Given the size constraints imposed by the Bluetooth 4 broadcast media, the UAS ID itself needs to be a non-spoofable inquiry input into the lookup.</t>

<t>A DRIP registration process based on the explicit hierarchy within a HHIT provides manageable uniqueness of the HI for the HHIT.  The hierarchy is defined in <xref target="I-D.ietf-drip-rid"/> and consists of 2-levels, a Registered Assigning Authority (RAA) and then a Hierarchical HIT Domain Authority (HDA). The registration within this hierarchy is the defense against a cryptographic hash second pre-image attack on the HHIT (e.g., multiple HIs yielding the same HHIT, see Requirement ID-3 in <xref target="RFC9153"/>). Registration first-come-first served is adequate.</t>

<t>A lookup of the HHIT into the registry data provides the registered HI for HHIT proof of ownership and deterministic access to any other needed actionable information based on inquiry access authority (more details in <xref target="privateinforeg"/>).</t>

</section>
</section>
<section anchor="ei" title="DRIP Identifier Registration and Registries">

<t>DRIP registries hold both public and private UAS information (see PRIV-1 in <xref target="RFC9153"/>) resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in different registries.  This section introduces the public and private information registries for DRIP identifiers. This DRIP Identifier registration process satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-3, GEN-4, ID-2, ID-4, ID-6, PRIV-3, PRIV-4, REG-1, REG-2, REG-3 and REG-4.</t>

<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background" title="Background">

<t>The public information registry provides trustable information such as attestations of UAS RID ownership and registration with the HDA (Hierarchical HIT Domain Authority). Optionally, pointers to the registries for the HDA and RAA (Registered Assigning Authority) implicit in the UAS RID can be included (e.g., for HDA  and RAA HHIT|HI used in attestation signing operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UASs that only use Network RID, is available via an Observer’s Net-RID DP that would directly provide all public registry information. The Net-RID DP is the only source of information for a query on an airspace volume.</t>

</section>
<section anchor="public-drip-identifier-registry" title="Public DRIP Identifier Registry">

<t>A DRIP identifier MUST be registered as an Internet domain name (at an arbitrary level in the hierarchy, e.g., in .ip6.arpa). Thus DNS can provide all the needed public DRIP information.  A standardized HHIT FQDN (Fully Qualified Domain Name) can deliver the HI via a HIP RR (Resource Record) <xref target="RFC8005"/> and other public information (e.g., RAA and HDA PTRs, and HIP RVS (Rendezvous Servers) <xref target="RFC8004"/>). These public information registries can use DNSSEC to deliver public information that is not inherently trustable (e.g., everything other than attestations).</t>

<t>This DNS entry for the HHIT can also provide a revocation service.  For example,
instead of returning the HI RR it may return some record showing that the HI
(and thus HHIT) has been revoked.</t>

</section>
</section>
<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background-1" title="Background">

<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.  A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure, and business models, by fitting into a UAS ID structure compatible with DNS names.  The HHIT hierarchy can provide the needed scalability and management structure. It is expected that the private information registry function will be provided by the same organizations that run a USS, and likely integrated with a USS.  The lookup function may be implemented by the Net-RID DPs.</t>

</section>
<section anchor="private-drip-identifier-registry-methods" title="Private DRIP Identifier Registry Methods">

<t>A DRIP private information registry supports essential registry operations (e.g., add, delete, update, query) using interoperable open standard protocols. It can accomplish this by leveraging aspects of Extensible Provisioning Protocol (EPP <xref target="RFC5730"/>) and the Registry Data Access Protocol (RDAP <xref target="RFC7480"/> <xref target="RFC9082"/> <xref target="RFC9083"/>).  The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC9224"/>.</t>

</section>
<section anchor="alternative-private-drip-registry-methods" title="Alternative Private DRIP Registry Methods">

<t>A DRIP private information registry might be an access-controlled DNS (e.g., via DNS over TLS) or a blockchain.  Additionally, WebFinger <xref target="RFC7033"/> can be supported. These alternative methods may be used by Net-RID DP with specific customers.</t>

</section>
</section>
</section>
<section anchor="driptrust" title="DRIP Identifier Trust">

<t>While the DRIP entity identifier is self-asserting, it alone does not provide the trustworthiness (non-repudiability, protection vs. spoofing, message integrity protection, scalability, etc.) essential to UAS RID, as justified in <xref target="RFC9153"/>. For that it MUST be registered (under DRIP Registries) and be actively used by the party (in most cases the UA).  A sender’s identity can not be proved by only possessing a DRIP Entity Tag (DET) and broadcasting it as a claim that it belongs to that sender.  Even the sender using that HI’s private key to sign static data proves nothing as well, as it is subject to trivial replay attacks.  Only sending the DET and a signature on frequently changing data (which is unpredicatable) that can be externally validated by the Observer (such as a Location/Vector message matching actually seeing the UA at that location) proves that the observed UA possesses the claimed UAS ID.</t>

<t>The severe constraints of Broadcast RID make it challenging to satisfy UAS RID requirements. From received Broadcast RID messages and information that can be looked up using the received UAS ID in online registries or local caches, it is possible to establish levels of trust in the asserted information and the Operator.</t>

<t>Optimization of different DRIP Authentication Messages allows an Observer, without Internet connection (offline) or with (online), to be able to validate a UAS DRIP ID in real-time.  First is the sending of messages containing the relevant registration of the UA’s DRIP ID in the claimed Registry.  Next is sending messages that sign over both static (e.g., above registration) and dynamically changing data (such as UA location data).  Combining these two sets of information, an Observer can piece together a chain of trust and real-time evidence to make their determination of the UA’s claims.</t>

<t>This process (combining the DRIP entity identifier, Registries and Authentication Formats for Broadcast RID) can satisfy the following DRIP requirement defined in <xref target="RFC9153"/>: GEN-1, GEN-2, GEN-3, ID-2, ID-3, ID-4 and ID-5.</t>

</section>
<section anchor="harvestbridforutm" title="Harvesting Broadcast Remote ID messages for UTM Inclusion">

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UASs, but allow UAS RID requirements for small UAS
to be satisfied with the operator’s choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for essentially all UAS, and is now also considering Network RID.  The FAA UAS RID Final Rules <xref target="FAA_RID"/> permit only Broadcast RID for rule compliance, but still encourage Network RID for complementary functionality, especially in support of UTM.</t>

<t>One opportunity is to enhance the architecture with gateways from Broadcast RID to Network RID. This provides the best of both and gives regulators and operators
flexibility.  It offers advantages over either form of UAS RID alone: greater fidelity than Network RID reporting of planned area operations; surveillance of areas too large for local direct visual observation and direct RF-LOS link based Broadcast RID (e.g., a city or a national forest).</t>

<t>These gateways could be pre-positioned (e.g., around airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing more than a smartphone with a suitable app is needed).  As Broadcast RID media have limited range, gateways receiving messages claiming locations far from the gateway can alert authorities or a SDSP to the failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position stamps from the gateways to multilaterate UA location, independent of the locations claimed in the messages, which are entirely operator self-reported in UAS RID and UTM, and thus are subject not only to natural time lag and error but also operator misconfiguration or intentional deception.</t>

<t>Multilateration technologies use physical layer information, such as precise Time Of Arrival (TOA) of transmissions from mobile transmitters at receivers with a priori precisely known locations, to estimate the locations of the mobile transmitters.</t>

<t>Further, gateways with additional sensors (e.g., smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the UAS RID messages.</t>

<t><xref target="csridfinder"/> and <xref target="csridsdsp"/> define two additional entities that are required to provide this Crowd Sourced Remote ID (CS-RID).</t>

<t>This approach satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-5, GEN-11, and REG-1. As Broadcast messages are inherently multicast, GEN-10 is met for local-link multicast to multiple Finders (how multilateration is possible).</t>

<section anchor="csridfinder" title="The CS-RID Finder">

<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from a Broadcast RID receiver.  However, it should not depend upon a direct interface with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a new interface to a CS-RID SDSP, similar to but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="csridsdsp" title="The CS-RID SDSP">

<t>A CS-RID SDSP aggregates and processes (e.g., estimates UA location using multilateration when possible) information collected by CS-RID Finders. A CS-RID SDSP should appear (i.e., present the same interface) to a Net-RID SP as a Net-RID DP and to a Net-RID DP like a Net-RID SP but be readily distinguishable with its data source.</t>

</section>
</section>
<section anchor="dripcontact" title="DRIP Contact">

<t>One of the ways in which DRIP can enhance <xref target="F3411-19"/> with immediately actionable information is by enabling an Observer to instantly initiate secure communications with the UAS remote pilot, Pilot In Command, operator, USS under which the operation is being flown, or other entity potentially able to furnish further information regarding the operation and its intent and/or to immediately influence further conduct or termination of the operation (e.g., land or otherwise exit an airspace volume). Such potentially distracting communications demand strong “AAA” (Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, Audit) per applicable policies (e.g., of the cognizant CAA).</t>

<t>A DRIP entity identifier based on a HHIT as outlined in <xref target="rid"/> embeds an identifier of the registry in which it can be found (expected typically to be the USS under which the UAS is flying) and the procedures outlined in <xref target="driptrust"/> enable Observer verification of that relationship. A DRIP entity identifier with suitable records in public and private registries as outlined in Section 5 can enable lookup not only of information regarding the UAS, but also identities of and pointers to information regarding the various associated entities (e.g., the USS under which the UAS is flying an operation), including means of contacting those associated entities (i.e., locators, typically IP addresses).</t>

<t>A suitably equipped Observer could initiate a secure communication channel, using the DET HI, to a similarly equipped and identified entity: the UA itself, if operating autonomously; the GCS, if the UA is remotely piloted and the necessary records have been populated in DNS; the USS, etc. Assuming secure communication setup (e.g. via IPsec or HIP), arbitrary standard higher layer protocols can then be used for Observer to Pilot (O2P) communications (e.g., SIP <xref target="RFC3261"/> et seq), V2X communications (e.g., <xref target="MAVLink"/>), etc. Certain preconditions are necessary: each party needs a currently usable means (typically DNS) of resolving the other party’s DRIP entity identifier to a currently usable locator (IP address); and there must be currently usable bidirectional IP (not necessarily Internet) connectivity between the parties.  One method directly supported by the use of HHITs as DRIP entity identifiers is initiation of a HIP Base Exchange (BEX) and Bound End-to-End Tunnel (BEET).</t>

<t>This approach satisfies DRIP requirement GEN-6 Contact, supports satisfaction of requirements <xref target="RFC9153"/> GEN-8, GEN-9, PRIV-2, PRIV-5 and REG-3, and is compatible with all other DRIP requirements.</t>

</section>
<section anchor="sc" title="Security Considerations">

<t>The size of the public key hash in the HHIT is vulnerable to a second-image attack. It is well within current server array technology to compute another key pair that hashes to the same HHIT. Thus, if a receiver were to check HHIT validity only by verifying that the received HI and associated information, when hashed in the ORCHID construction, reproduce the received HHIT, an adversary could impersonate a validly registered UA. To defend against this, on-line receivers should verify the received HHIT and received HI with the USS with which the HHIT purports to be registered. On-line and off-line receivers can use a chain of received DRIP link attestations from a root of trust through the RAA and the HDA to the UA, as described, in <xref target="I-D.ietf-drip-auth"/> and <xref target="I-D.ietf-drip-registries"/>.</t>

<t>Compromise of a registry private key could do widespread harm <xref target="I-D.ietf-drip-registries"/>. In particular, it would allow bad actors to impersonate trusted members of said registry. Key revocation procedures are as yet to be determined. These risks are in addition to those involving Operator key management practices and will be addressed as part of the registry process.</t>

<section anchor="private-key-physical-security" title="Private Key Physical Security">

<t>The security provided by asymmetric cryptographic techniques depends upon protection of the private keys. It may be necessary for the GCS to have the key pair to register the HHIT to the USS. Thus it may be the GCS that generates the key pair and delivers it to the UA, making the GCS a part of the key security boundary. Leakage of the private key either from the UA or GCS to the component manufacturer is a valid concern and steps need to be in place to ensure safe keeping of the private key.</t>

<t>Since it is possible for the UAS RID sender of a small harmless UA (or the entire UA) to be carried by a larger dangerous UA as a “false flag”, it is out of scope to deal with secure store for the private key.</t>

</section>
<section anchor="quantum-resistant-cryptography" title="Quantum Resistant Cryptography">

<t>There has been no effort, at this time, to address post quantum computing
cryptography.  UAs and Broadcast Remote ID communications are so
constrained that current post quantum computing cryptography is not
applicable.  Plus since a UA may use a unique HHIT for each operation, the
attack window could be limited to the duration of the operation.</t>

<t>One potential use for post quantum cryptography is its use in keypairs that have long usage lives, but rarely if ever need to be transmitted over bandwidth constrained links; such as for Serial Numbers or Operators. Finally, as the HHIT contains the ID for the cryptographic suite used in its creation, a future post quantum computing safe algorithm that fits the Remote ID constraints may readily be added.</t>

</section>
<section anchor="denial-of-service-dos-protection" title="Denial Of Service (DOS) Protection">

<t>Remote ID services from the UA use a wireless link in a public space. As such, they are open to many forms of RF jamming. It is trivial for an attacker to stop any UA messages from reaching a wireless receiver. Thus it is pointless to attempt to provide relief from DOS attacks as there is always the ultimate RF jamming attack. Also the DRIP architecture make spoofing/replay attacks, that might be used to attempt DOS, very hard.</t>

</section>
</section>
<section anchor="privacyforbrid" title="Privacy &amp; Transparency Considerations">

<t>Broadcast RID messages can contain Personally Identifiable Information (PII).  A viable architecture for PII protection would be symmetric encryption of the PII using a session key known to the UAS and its USS. Authorized Observers could obtain plaintext in either of two ways. An Observer can send the UAS ID and the cyphertext to a server that offers decryption as a service. An Observer can send the UAS ID only to a server that returns the session key, so that Observer can directly locally decrypt all cyphertext sent by that UA during that session (UAS operation). In either case, the server can be: a Public Safety USS, the Observer’s own USS, or the UA’s USS if the latter can be determined (which under DRIP it can be, from the UAS ID itself).  PII can be protected unless the UAS is informed otherwise.  This could come as part of UTM operation authorization. It can be special instructions at the start or during an operation. PII protection MUST NOT be used if the UAS loses connectivity to the USS, as if the UAS loses connectivity chances are Observers also won’t have connectivity in the vicinity to enabled decryption of the PII. The UAS always has the option to abort the operation if PII protection is disallowed.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname='S. Card' initials='S.' role='editor' surname='Card'><organization/></author>
<author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'><organization/></author>
<author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'><organization/></author>
<author fullname='A. Gurtov' initials='A.' surname='Gurtov'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9153'/>
<seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-rats-architecture'>
   <front>
      <title>Remote Attestation Procedures Architecture</title>
      <author fullname='Henk Birkholz'>
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler'>
	 <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith'>
	 <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='28' month='July' year='2022'/>
      <abstract>
	 <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-20'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-rats-architecture-20.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-auth'>
   <front>
      <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture.  It defines a
   few message schemes (sent within the Authentication Message) that can
   be used to authenticate past messages sent by a unmanned aircraft
   (UA) and provide proof of UA trustworthiness even in the absence of
   Internet connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-15'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-15.txt' type='TXT'/>
</reference>



<reference anchor='RFC7480' target='https://www.rfc-editor.org/info/rfc7480'>
<front>
<title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<author fullname='B. Ellacott' initials='B.' surname='Ellacott'><organization/></author>
<author fullname='N. Kong' initials='N.' surname='Kong'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='7480'/>
<seriesInfo name='DOI' value='10.17487/RFC7480'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC9082' target='https://www.rfc-editor.org/info/rfc9082'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9082'/>
<seriesInfo name='DOI' value='10.17487/RFC9082'/>
</reference>


<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="F3411-22a" target="https://www.astm.org/f3411-22a.html">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2022" month="July"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32019R0945">
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32019R0947">
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing_update" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32021R0664">
  <front>
    <title>EU COMMISSION IMPLEMENTING REGULATION (EU) 2021/664 of 22 April 2021 on a regulatory framework for the U-space</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NPA" target="https://www.easa.europa.eu/downloads/134303/en">
  <front>
    <title>Notice of Proposed Amendment 2021-14 Development of acceptable means of compliance and guidance material to support the U-space regulation</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>Study on Remote Identification of Unmanned Aerial Systems (UAS)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="TR-23.755" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3588">
  <front>
    <title>Study on application layer support for Unmanned Aerial Systems (UAS) (Release 17)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-23.255" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3843">
  <front>
    <title>Application layer support for Uncrewed Aerial System (UAS) Functional architecture and information flows; (Release 17)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="MAVLink" target="http://mavlink.io/">
  <front>
    <title>Micro Air Vehicle Communication Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FS_AEUA" target="https://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_147E_Electronic_2021-10/Docs/S2-2107092.zip">
  <front>
    <title>Study of Further Architecture Enhancement for UAV and UAM</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC7033' target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author fullname='P. Jones' initials='P.' surname='Jones'><organization/></author>
<author fullname='G. Salgueiro' initials='G.' surname='Salgueiro'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Smarr' initials='J.' surname='Smarr'><organization/></author>
<date month='September' year='2013'/>
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC9224' target='https://www.rfc-editor.org/info/rfc9224'>
<front>
<title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
<author fullname='M. Blanchet' initials='M.' surname='Blanchet'><organization/></author>
<date month='March' year='2022'/>
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9224'/>
<seriesInfo name='DOI' value='10.17487/RFC9224'/>
</reference>



<reference anchor='RFC8004' target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<author fullname='L. Eggert' initials='L.' surname='Eggert'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC5730' target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC8005' target='https://www.rfc-editor.org/info/rfc8005'>
<front>
<title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t></abstract>
</front>
<seriesInfo name='RFC' value='8005'/>
<seriesInfo name='DOI' value='10.17487/RFC8005'/>
</reference>



<reference anchor='RFC9083' target='https://www.rfc-editor.org/info/rfc9083'>
<front>
<title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9083'/>
<seriesInfo name='DOI' value='10.17487/RFC9083'/>
</reference>



<reference anchor='RFC3261' target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author fullname='J. Rosenberg' initials='J.' surname='Rosenberg'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<author fullname='A. Johnston' initials='A.' surname='Johnston'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='R. Sparks' initials='R.' surname='Sparks'><organization/></author>
<author fullname='M. Handley' initials='M.' surname='Handley'><organization/></author>
<author fullname='E. Schooler' initials='E.' surname='Schooler'><organization/></author>
<date month='June' year='2002'/>
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>


<reference anchor='I-D.ietf-drip-registries'>
   <front>
      <title>DRIP Entity Tag (DET) Registration &amp; Lookup</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Jim Reid'>
	 <organization>RTFM llp</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document details the required mechanisms for the registration
   and discovery of DRIP Entity Tags (DETs).  The registration process
   relies upon the Extensible Provisioning Protocol (EPP).  The
   discovery process leverages DNS, DNSSEC, and related technology.  The
   lookup process relies upon the Registration Data Access Protocol
   (RDAP).  The DETs can be registered with as their &quot;raw public keys&quot;
   or in X.509 certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-registries-05.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='3' month='August' year='2022'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   identifier for use as the Unmanned Aircraft System Remote
   Identification and tracking (UAS RID).

   This document updates RFC7401 and RFC7343.

   Within the context of RID, HHITs will be called DRIP Entity Tags
   (DETs).  HHITs provide claims to the included explicit hierarchy that
   provides registry (via, e.g., DNS, RDAP) discovery for 3rd-party
   identifier endorsement.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-32'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-32.txt' type='TXT'/>
</reference>




    </references>


<section anchor="appendix-a" title="Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)">

<section anchor="operation-concept" title="Operation Concept">

<t>The National Aeronautics and Space Administration (NASA) and FAA’s
effort to integrate UAS operations into the national airspace
system (NAS) led to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 was published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual concept refinement, initial prototype implementation, and testing
were conducted by the joint FAA and NASA UTM research transition team. World efforts took place afterward.  The Single European Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published their UTM concepts of operations to
guide the development of their future air traffic management (ATM)
system and ensure safe and efficient integration of manned and
unmanned aircraft into the national airspace.</t>

<t>UTM comprises UAS operations infrastructure, procedures and
local regulation compliance policies to guarantee safe UAS
integration and operation.  The main functionality of UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that UTM has to offer.  Such an Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitoring and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS to build a large service coverage map that
can load-balance, relay, and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low Altitude Authorization and Notification Capability <xref target="LAANC"/> program, which is the first system to realize some of the envisioned functionality of UTM. The LAANC program can automate UAS operational intent (flight plan) submission and application for airspace authorization in real-time by checking against multiple aeronautical databases such as airspace classification and operating rules associated with it, FAA UAS facility map, special use airspace, Notice to Airmen (NOTAM), and Temporary Flight Restriction (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and taking off or landing in
controlled airspace (e.g., Class Bravo, Charlie, Delta, and Echo
in the United States), the USS under which the UAS is operating is responsible for verifying UA registration, authenticating the UAS operational intent (flight plan) by checking against a designated UAS facility map database, obtaining the air traffic control (ATC) authorization, and monitoring the UAS flight path in order to maintain safe margins and follow the pre-authorized sequence of authorized 4-D volumes (route).</t>
  <t>For a UAS participating in UTM and taking off or landing in uncontrolled airspace (e.g., Class Golf in the United States), pre-flight authorization must be obtained from a USS when operating
Beyond-Visual-Line-of-Sight (BVLOS).  The USS either accepts or rejects the received operational intent (flight plan) from the UAS.  Approved UAS operation may share its current flight data such as GPS position and altitude to the USS.  The USS may keep the UAS operation status near real-time and may keep it as a record for overall airspace air traffic monitoring.</t>
</list></t>

</section>
</section>
<section anchor="adsb" title="Automatic Dependent Surveillance Broadcast (ADS-B)">

<t>The ADS-B is the de jure technology used in manned aviation for sharing location information, from the aircraft to ground and satellite-based systems, designed in the early 2000s. Broadcast RID is 
conceptually similar to ADS-B, but with the receiver target being the general public on generally available devices (e.g., smartphones).</t>

<t>For numerous technical reasons, ADS-B itself is not suitable for low-flying small UAS. Technical reasons include but are not limited to the following:</t>

<t><list style="numbers">
  <t>Lack of support for the 1090 MHz ADS-B channel on any consumer handheld devices</t>
  <t>Weight and cost of ADS-B transponders on CSWaP (Cost, Size, Weight, and Power) constrained UA</t>
  <t>Limited bandwidth of both uplink and downlink, which would likely be saturated by large numbers of UASs, endangering manned aviation</t>
</list></t>

<t>Understanding these technical shortcomings, regulators worldwide have ruled out the use of ADS-B for the small UAS for which UAS RID and DRIP are intended.</t>

</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The work of the FAA’s UAS Identification and Tracking (UAS ID) Aviation Rulemaking Committee (ARC) is the foundation of later ASTM and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in balancing the interests of diverse stakeholders is essential to the necessary rapid and widespread deployment of UAS RID. Thanks to Alexandre Petrescu and Stephan Wenger for the helpful and positive comments. Thanks to chairs Daniel Migault and Mohamed Boucadair for direction of our team of authors and editor, some of whom are newcomers to writing IETF documents. Laura Welch is also thanked for her valuable review comments that led to great improvements of this memo.  Thanks especially to Internet Area Director Eric Vyncke for guidance and support.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

