﻿<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<?rfc iprnotified="no" ?>
<?rfc strict="no" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" consensus="true" docName="draft-moskowitz-drip-secure-nrid-c2-06"
	category="std" ipr="trust200902" obsoletes="" updates="" submissionType="IETF"
	xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version="3">

<front>
<title abbrev="Secure UAS Transport">Secure UAS Network RID and C2 Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-06"/>
	<author fullname="Robert Moskowitz" initials="R" surname="Moskowitz">
    <organization>HTT Consulting</organization>
    <address>
      <postal> 
	    <street></street>
        <city>Oak Park</city>
        <region>MI</region>
        <code>48237</code>
        <country>USA</country>
      </postal>
      <email>rgm@labs.htt-consult.com</email>
	</address>
	</author>
	<author fullname="Stuart W. Card" initials="S." surname="Card">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>stu.card@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>adam.wiethuechter@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
	<organization>Linköping University</organization>
	<address>
	  <postal>
		<street>IDA</street>
		<city>Linköping</city>
		<code>58183</code>
		<country>Sweden</country>
	  </postal>
	  <email>gurtov@acm.org</email>
	</address>
	</author>
   <date year="2022" />
   <area>Internet</area>
   <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>
     <keyword>Request for Comments</keyword>
     <keyword>I-D</keyword>
     <keyword>Internet-Draft</keyword>
     <keyword>RID</keyword>
<abstract>
<t>
	This document defines a transport mechanism for Unmanned Aircraft 
	System (UAS) Network Remote ID (N-RID).  The Broadcast Remote ID 
	(B-RID) messages can be sent directly over UDP or via a more 
	functional protocol using CoAP/CBOR for the N-RID messaging.  This 
	is secured via either HIP/ESP or DTLS. HIP/ESP or DTLS secure 
	messaging Command-and-Control (C2) for is also described.
</t>
</abstract>
</front>
<middle>   
<section numbered="true" toc="default"> <name>Introduction</name>
<t> 
	This document defines a set of messages for Unmanned Aircraft 
	System (UAS) Network Remote ID (N-RID) derived from the ASTM Remote 
	ID <xref target="F3411-19" format="default"/> broadcast messages 
	and common data dictionary.  These messages are transported from 
	the UAS to its USS Network Service Provider (N-RID SP) either 
	directly over UDP or via CoAP/CBOR (<xref target="RFC7252" 
	format="default" />/<xref target="RFC8949" format="default" />).
</t>
<t> 
	Direct UDP, referred here as Minimal N-RID (MN-RID), and
	CoAP/CBOR were selected for their low communication "cost".  This 
	may not be an issue if N-RID originates from the Ground Control 
	Station (GCS, <xref target="NRID_GCS" format="default"/>), but it 
	may be an important determinant when originating from the UA (<xref 
	target="NRID_UA" format="default"/>).  Particularly, very small 
	messages may open N-RID transmissions over a variety of wireless 
	technologies.
</t>
<t> 
	A secure end-to-end transport for N-RID (UAS to Network RID Service 
	Provider (N-RID SP)) also should provide full Confidentiality, 
	Integrity, and Authenticity (CIA).  It may seem that 
	confidentiality is optional, as most of the information in N-RID is 
	sent in the clear in Broadcast Remote ID (B-RID), but this is a 
	potentially flawed analysis. N-RID has evesdropping risks not in 
	B-RID and may contain more sensitive information than B-RID. The 
	secure transport for N-RID should also manage IP address changes 
	(IP mobility) for the UAS.
</t>
<t> 
	This document also defines mechanisms to provide secure transport 
	for these N-RID messages and Command and Control (C2) messaging.
</t>
<t> 
	A secure end-to-end transport for C2 is critical for UAS especially 
	for Beyond Line of Sight (BLOS) operations.  It needs to provide 
	data CIA.  Depending on the underlying network technology, this 
	secure transport may need to manage IP address changes (IP 
	mobility) for both the UA and GCS.
</t>
<t>
	Two options for secure transport are provided:  HIP <xref 
	target="RFC7401" /> and DTLS 1.3 <xref target="I-D.ietf-tls-dtls13" 
	/>. These options are generally defined and their applicability is 
	compared and contrasted.  It is up to N-RID and C2 to select which 
	is preferred for their situation.
</t>
<t> 
	To further reduce the communication cost, SCHC <xref 
	target="RFC8724" format="default" /> is defined for both the direct 
	UDP and CoAP layer <xref target="RFC8824" format="default" />. For 
	ESP "compression", either ESP Implicit IV, <xref target="RFC8750" 
	format="default" /> and/or Diet ESP <xref 
	target="I-D.mglt-ipsecme-diet-esp" format="default"/> amy be used. 
	SCHC for the IP/UDP layer is currently defined by IP carrier (e.g. 
	LoRaWAN, <xref target="RFC9011" format="default" />) and will be 
	covered in any specific implementation.
</t>
</section>
<section anchor="terms" numbered="true" toc="default"> <name>Terms and Definitions</name>
<section numbered="true" toc="default"> <name>Requirements Terminology</name>
	<t>
		The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
		NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", 
		"MAY", and "OPTIONAL" in this document are to be interpreted as 
		described in BCP 14 <xref target="RFC2119" /> <xref 
		target="RFC8174" /> when, and only when, they appear in all 
		capitals, as shown here.
	</t>
</section>
<section numbered="true" toc="default"> <name>Definitions</name>
<t>
	See <xref target="RFC9153" section="2.2" format="default" /> for 
	common DRIP terms. The following new terms are used in the 
	document:
</t>
	<dl newline="true" spacing="normal">
		<dt>B-RID</dt>
		<dd>
			Broadcast Remote ID. A method of sending RID messages as 
			1-way transmissions from the UA to any Observers within 
			radio range.
		</dd>
		<dt>MN-RID</dt>
		<dd>
			A Minimal implementation of Network Remote ID.
		</dd>
		<dt>N-RID</dt>
		<dd>
			Network Remote ID. A method of sending RID messages via the 
			Internet connection of the UAS directly to the UTM.
		</dd>
		<dt>RID</dt>
		<dd>
			Remote ID. A unique identifier found on all UA to be used 
			in communication and in regulation of UA operation.
		</dd>
	</dl>
</section>
</section>
<section anchor="NRID" numbered="true" toc="default"> <name>Network Remote ID</name>
<t>
	In UAS Traffic Management (UTM), the purpose of N-RID is to provide 
	situational awareness of UA (in the form of flight tracking) in a 
	user specified 3D volume.  The data needed for this is already 
	defined in <xref target="F3411-19" format="default"/>, but a 
	standard message format, protocol, and secure communications 
	methodology are missing.  F3411, and other UTM based standards 
	going through ASTM, provide JSON objects and some of the messages 
	for passing information between various UTM entities (e.g., N-RID 
	SP to N-RID SP and N-RID SP to N-RID DP) but does not specify 
	how the data gets into UTM to begin with.  This document will 
	provide such an open standard.
</t>
<t>
	The Broadcast Remote ID (B-RID) messages in <xref target="F3411-19" 
	format="default"/> are sufficient to meet the needs of N-RID.  
	These messages can be sent to the N-RID SP when their contents 
	change.  Further, a UAS supporting B-RID will have minimal 
	development to add N-RID support.
</t>
<t>
	This approach has the added advantage of being very compact, 
	minimizing the N-RID communications cost.
</t>
<t>
	Other messages may be needed in some N-RID situations.  Thus a 
	simple message multiplexer is provided for MN-RID and CoAP is 
	defined for a richer messaging environment.
</t>
<section anchor="NRID_EP" numbered="true" toc="default"> <name>Network RID Endpoints</name>
<t>
	The US FAA defines the Network Remote ID endpoints as a USS Network 
	Service Provider (N-RID SP) and the UAS.  Both of these are rather 
	nebulous items and what they actually are will impact how 
	communications flow between them.
</t>
<t>
	The N-RID SP may be provided by the same entity serving as the UAS 
	Service Provider (USS).  This simplifies a number of aspects of the 
	N-RID communication flow.  The N-RID SP is likely to be stable in 
	the network, that is its IP address will not change during a 
	mission.  This simplifies maintaining the N-RID communications.
</t>
<t>
	The UAS component in N-RID may be either the UA, GCS, or the 
	Operator's Internet connected device (e.g. smartphone or tablet 
	that is not the GCS). In all cases, mobility MUST be assumed.  That 
	is the IP address of this end of the N-RID communication may 
	change during an operation. The N-RID mechanism MUST support this.  
	The UAS Identity for the secure connection may vary based on the 
	UAS endpoint.
</t>
<section anchor="NRID_UA" numbered="true" toc="default"> <name>N-RID from the UA</name>
<t>
	Some UA will be equipped with direct Internet access.  These UA 
	will also tend to have multiple radios for their Internet access 
	(e.g., Cellular and WiFi). Thus multi-homing with "make before 
	break" behavior is needed. This is on top of any IP address changes 
	on any of the interfaces while in use.
</t>
</section>
<section anchor="NRID_GCS" numbered="true" toc="default"> <name>N-RID from the GCS</name>
<t>
	Many UA will lack direct Internet access, but their GCS are 
	connected.  As an Operator is expected to register an operation 
	with its USS, this may be done via the Internet connected GCS. The 
	GCS could then be the source of the secure connection for N-RID 
	(acting as a gateway).
</t>
<t>
	There are two sources for the GCS for the RID messages, 
	both from the UA.  These are UA B-RID messages, or content from C2 
	messages that the GCS converts to RID message format.  In either 
	case, the GCS may be mobile with changing IP addresses.  The GCS 
	may be in a fast moving ground device (e.g. delivery van), so it 
	can have as mobility demanding connection needs as the UA.
</t>
</section>
<section anchor="NRID_Op" numbered="true" toc="default"> <name>N-RID from the Operator</name>
<t>
	Many UAS will have no Internet connectivity, but the UA is sending 
	B-RID messages and the Operator, when within RF range, can receive 
	these B-RID messages on an Internet Connected device that can act 
	as the proxy for these messages, turning them into N-RID messages.
</t>
</section>
</section>
<section anchor="NRID_MSG" numbered="true" toc="default"> <name>Network RID Messaging</name>
<t>
	N-RID messaging is tied to a UA operation (generally called a 
	flight or mission).  This consists of an initial secure link setup, 
	followed by a set of mostly static information related to the 
	operation.  During the operation, continuous location information 
	is sent by the UA with any needed updates to the mostly static 
	operation information.
</t>
<t>
	The N-RID SP SHOULD send regular "heartbeats" to the UAS.  If the 
	UAS does not receive these heartbeats for some policy set time, the 
	UA MUST take the policy set response to loss of N-RID SP 
	connectivity.  For example, this could be a mandated immediate 
	landing.  There may be other messages from the N-RID SP to the 
	UAS (e.g., call the USS operator at this number NOW!).  The UAS 
	MUST follow acknowledge policy for these messages.
</t>
<t>
	If the N-RID SP stops receiving messages from the UAS (<xref 
	target="Loc_Msg" format="default"/>), it should notify the UTM of a 
	non-communicating UA while still in operation.
</t>
<section anchor="Secure_Start" numbered="true" toc="default"> <name>Secure Link Setup</name>
<t>
	The secure link setup MUST be done before the operation begins, 
	thus it can use a high capacity connection like WiFi.  It MAY use 
	the UA RID for this setup, including other data elements provided 
	in the B-RID Basic ID (Msg Type 0x0) Message. If the Basic ID 
	information is NOT included via the secure setup (including the 
	N-RID SP querying the USS for this information), it MUST be sent 
	as part of the Static Messages (<xref target="Static_Msg" 
	format="default"/>)
</t>
<section anchor="UAS_ID" numbered="true" toc="default"> <name>UAS Identity</name>
<t>
	The UAS MAY use its RID if it is a HHIT (DET per <xref 
	target="I-D.ietf-drip-rid" format="default"/>).  It may use some 
	other Identity, based on the N-RID SP policy.
</t>
<t>
	The GCS or Operator smart device may have a copy of the UA 
	credentials and use them in the connection to the N-RID SP.  In 
	this case, they are indistinguishable from the UA as seen from the 
	N-RID SP.  Alternatively, they may use their own credentials with 
	the N-RID SP which would need some internal mechanism to tie that 
	to the UA.
</t>
</section>
<section anchor="DET_ID" numbered="true" toc="default"> <name>HIP for ESP Secure Link</name>
<t>
	HIP <xref target="RFC7401" format="default"/> for ESP Secure Link 
	is a natural choice for a DET RID.  For this, the N-RID SP would 
	also need a HHIT, possibly following the process in <xref 
	target="I-D.ietf-drip-registries" format="default"/>.
</t>
</section>
<section anchor="DTLS_ID" numbered="true" toc="default"> <name>DTLS Secure Link</name>
<t>
	For DTLS <xref target="I-D.ietf-tls-dtls13"/> secure link, DANCE 
	<xref target="I-D.ietf-dance-client-auth" format="default"/> may be 
	used with a DET's DNS lookup to retrieve a TLSA RR  with the DET's 
	HI encoded in PKIX SubjectPublicKeyInfo format (per <xref 
	target="RFC7250" format="default"/>).
</t>
<t>
	The N-RID SP DTLS credential may follow DANE <xref target="RFC6698" 
	format="default"/> or any other DTLS server credential method.
</t>
</section>
</section>
<section anchor="Static_Msg" numbered="true" toc="default"> <name>Static Messages</name>
<t>
	For simplicity, a class of UAS information is called here "Static", 
	though in practice any of it can change during the operation, but 
	will change infrequently.  This information is the contents of the 
	B-RID Self-ID (Msg Type 0x3), Operator ID (Msg Type 0x5), and 
	System Messages (Msg Type 0x4).  This information can simply be 
	sent in the same format as the B-RID messages. Alternatively the 
	individual data elements may be send as separate CBOR objects.
</t>
<t>
	The Basic ID (Msg Type 0x0) Message may be included as a static 
	message if this information was not used for the secure setup.  
	There may be more than one Basic ID Message needed if as in the 
	case where the Japan Civil Aviation Bureau (JCAB) has mandated that 
	the CAA assigned ID (UA ID type 2) and Serial Number (UA ID type 1) 
	be broadcasted.
</t>
<t>
	The information in the System Message is most likely to change 
	during an operation.  Noteably the Operator Location data elements 
	are subject to change if the GCS is physically moving (e.g. 
	hand-held and the operator is walking or driving in a car).  The 
	whole System Message may be sent, or only the changing data 
	elements as CBOR objects.
</t>
<t>
	These static message elements may be sent before the operation 
	begins, thus their transmission can use a high capacity connection 
	like WiFi.  Once the operation is underway, any updates will have 
	to traverse the operational link which may be very constrained and 
	this will impact data element formatting.
</t>
<t>
	The N-RID SP MUST acknowledge these messages.  The UAS MUST 
	receive these ACKs.  If no ACK is received, the UAS MUST resend the 
	message(s).  This send/ACK sequence continues either until ACK is 
	received, or some policy number of tries.  If this fails, the UAS 
	MUST act that the N-RID SP connection is lost and MUST take the 
	policy set response to loss of N-RID SP connectivity.  If the 
	information changes during this cycle, the latest information MUST 
	always be sent.
</t>
</section>
<section anchor="Loc_Msg" numbered="true" toc="default"> <name>Vector/Location Message</name>
<t>
	Many CAAs mandate that the UA Vector/Location information be 
	updated at least once per second.  Without careful message design, 
	this messaging volume would overwhelm many wireless technologies.  
	Thus to enable the widest deployment choices, a highly compressed 
	format is recommended.
</t>
<t>
	The B-RID Vector/Location Message (Msg Type 0x1) is the simplest 
	small object (24 bytes) for sending this information as a single 
	CBOR object or viva MN-RID.  It may be possible to send only those 
	data elements that changed in the last time interval.  This may 
	result in smaller individual transmissions, but should not be used 
	if the resulting message is larger than the Vector/Location 
	Message.
</t>
</section>
</section>
<section anchor="MN-RID" numbered="true" toc="default"> <name>The Minimal, UDP, N-RID Protocol</name>
<t>
	The Minimal Network Remote ID protocol is a simple UDP messaging 
	consisting of a 1-byte message type field and a message field of 
	maximum 25-bytes length.
</t>
<t>
	The Message Type Field is defined as follows:
</t>
<artwork name="" type="" align="left" alt="">
<![CDATA[
     Value        Type

     0            RESERVED         
     1            B-RID Message     [F3411]
     2            N-RID SP ACK
     3            N-RID SP Heartbeat
]]>
</artwork> 
<t>
	The B-RID Message is 25 bytes:
</t>
<artwork name="" type="" align="left" alt="">
<![CDATA[
     Bytes        Description

     1            B-RID Message Type/version
     24           B-RID Message
]]>
</artwork> 
<t>
	The N-RID SP ACK is 5 bytes:
</t>
<artwork name="" type="" align="left" alt="">
<![CDATA[
     Bytes        Description

     4            Timestamp
     1            B-RID Message Type/version from message ACKed
]]>
</artwork> 
<t>
	The N-RID SP Heartbeat is 4 bytes:
</t>
<artwork name="" type="" align="left" alt="">
<![CDATA[
     Bytes        Description

     4            Timestamp
]]>
</artwork> 
</section>
<section anchor="CoAP_Msg" numbered="true" toc="default"> <name>CoAP N-RID messages</name>
<t>
	TBD
</t>
</section>
</section>
<section anchor="SCHC" numbered="true" toc="default"> <name>SCHC Message Compression</name>
<t>
	TBD
</t>
</section>
<section anchor="c2_End" numbered="true" toc="default"> <name>Command and Control</name>
<t>
	The Command and Control (C2) connection is between the UA and GCS. 
	This is often this over a direct link radio.  Some times, particularly for 
	BLOS, it is via Internet connections.  In either case C2 SHOULD be 
	secure from eavesdropping and tampering.  For design and 
	implementation consistency it is best to treat the direct link as a 
	local link Internet connection and use constrained networking 
	compression standards.
</t>
<t>
	Both the UA and GCS need to be treated as fully mobile in the IP 
	networking sense.  Either one can have its IP address change and 
	both could change at the same time (the double jump problem).  It 
	is preferable to use a peer-to-peer (P2P) secure technology like 
	<xref target="RFC7401">HIPv2</xref>.
</t>
<t>
	Finally UA may also tend to have multiple radios for their C2 
	communications. Thus multi-homing with "make before break" behavior 
	is needed. This is on top of any IP address changes on any of the 
	interfaces while in use.
</t>
<section anchor="sMAVLINK" numbered="true" toc="default"> <name>Securing MAVLink</name>
<t>
	<xref target="MAVLINK">MAVLink</xref> is a commonly used protocol 
	for C2 that uses UDP port 14550 for transport over IP.  Message 
	authenticity was added in MAVLink 2 in the form of a SHA-256 
	(secret + message hash) left-truncated to 6 byte.  This does not 
	follow <xref target="RFC2104">HMAC</xref> security recommendations, 
	nor provides confidentiality.
</t>
<t>
	By following the security approach here, UAS C2 is superior to that 
	currently provided within MAVlink.
</t>
</section>
</section>
<section anchor="Sec_TP" numbered="true" toc="default"> <name>Secure Transports</name>
<t>
	Secure UDP-based protocols are preferred for both Network Remote ID 
	(N-RID) and C2. Both HIPv2 and DTLS can be used.  It will be shown 
	below that HIPv2 is better suited in most cases.
</t>
<t>
	For IPv6 and CoAP over both WiFi and Bluetooth (or any other radio 
	link), SCHC <xref target="RFC8724" format="default" /> is defined 
	to significantly reduce the per packet transmission cost. SCHC is 
	used both within the secure envelope and before the secure envelope 
	as shown in <xref target="I-D.ietf-lpwan-architecture" 
	section="5.2.10" format="default"/>. For Bluetooth, there is also 
	IPv6 over Bluetooth LE <xref target="RFC7668" /> for more guidance.
</t>
<t>
	Local link (direct radio) C2 security is possible with the link's 
	MAC layer security.  SCHC SHOULD still be used as above.  Both WiFi 
	and Bluetooth link security can provide appropriate security, but 
	this would not provide trustworthy multi-homed security.
</t>
<section anchor="HIP_TP" numbered="true" toc="default"> <name>HIP for Secure Transport</name>
<t>
	HIP has already been used for C2 mobility, managing the ongoing 
	connectivity over WiFi at start of an operation, switching to LTE 
	once out of WiFi range, and returning to WiFi connectivity at the 
	end of the operation.  This functionality is especially important 
	for BLOS. HHITs are already defined for RID, and need only be added 
	to the GCS via a GCS Registration as part of the UAS to USS 
	registration to be usedfor C2 HIP.
</t>
<t>
	When the UA is the UAS endpoint for N-RID (<xref target="NRID_UA" 
	format="default"/>), and particularly when HIP is used for C2, HIP 
	for N-RID simplifies protocol use on the UA.  The N-RID SP 
	endpoint may already support HIP if it is also the HHIT Registrar.  
	If the UA lacks any IP ability and the RID HHIT registration was 
	done via the GCS or Operator device, then they may also be set for 
	using HIP for N-RID.
</t>
<t>
	Further, double jump and multi-homing support is mandatory for C2 
	mobility.  This is inherent in the HIP design.  The HIP address 
	update can be improved with <xref 
	target="I-D.moskowitz-hip-fast-mobility" format="default"/>.
</t>
</section>
<section anchor="DTLS_TP" numbered="true" toc="default"> <name>DTLS for Secure Transport</name>
<t>
	DTLS is a good fit for N-RID for any of the possible UAS endpoints. 
	There are challenges in using it for C2.  To use DTLS for C2, the 
	GCS will need to be the DTLS server.  How does it 'push' commands 
	to the UA?  How does it reestablish DTLS security if state is lost?  
	And finally, how is the double jump scenario handled?
</t>
<t>
	All the above DTLS for C2 probably have solutions.  None of them 
	are inherent in the DTLS design.
</t>
</section>
<section anchor="TP_Cipher" numbered="true" toc="default"> <name>Ciphers for Secure Transport</name>
<t>
	The cipher choice for either HIP or DTLS depends, in large measure, 
	on the UAS endpoint.  If the endpoint is computationally 
	constrained, the cipher computations become important. If any of 
	the links are constrained or expensive, then the over-the-wire cost 
	needs to be minimized.  AES-CCM and AES-GCM are the preferred, 
	modern, AEAD ciphers.
</t>
<t>
	For ESP with HIP <xref target="RFC7402" />, an additional 4 - 8 
	bytes can be trimmed by using the Implicit IV for ESP option <xref 
	target="RFC8750" />.
</t>
<t>
	NIST is working on selecting a new lightweight cipher that may be 
	the best choice for use on a UA.  The Keccak Xoodyak cipher in <xref 
	target="I-D.moskowitz-hip-new-crypto" format="default"/> is a good 
	"Green Cipher".
</t>
</section>
<section anchor="HIP_DTLS" numbered="true" toc="default"> <name>HIP and DTLS contrasted and compared</name>
<t>
	This document specifies the use of DTLS 1.3 for its 0-RTT mobility 
	feature and improved (over 1.2) handshake.  DTLS 1.3 is still an 
	IETF draft, so there is little data available to properly contrast 
	it with HIPv2.  This section will be based on the current DTLS 1.2.  
	The basic client-server model is unchanged.
</t>
<t>
	The use of DTLS vs HIPv2 (both over UDP, HIP in IPsec ESP BEET 
	mode) has pros and cons. DTLS is currently at version 1.2 and based 
	on TLS 1.2. It is a more common protocol than HIP, with many 
	different implementations available for various platforms and 
	languages.
</t>
<t>
	DTLS implements a client-server model, where the client initiates 
	the communication. In HIP, two parties are equal and either can be 
	an Initiator or Responder of the Base Exchange. HIP provides 
	separation between key management (base exchange) and secure 
	transport (for example IPsec ESP BEET) while both parts are tightly 
	coupled in DTLS.
</t>
<t>
	DTLS 1.2 still has quite chatty connection establishment taking 3-5 
	RTTs and 15 packets. HIP connection establishment requires 4 
	packets (I1,R1,I2,R2) over 2 RTTs. This is beneficial for 
	constrained environments of UAs. HIPv2 supports cryptoagility with 
	possibility to negotiate cryptography mechanisms during the Base 
	Exchange.
</t>
<t>
	Both DTLS and HIP support mobility with a change of IP address. 
	However, in DTLS only client mobility is well supported, while in 
	HIP either party can be mobile. The double-jump problem 
	(simultaneous mobility) is supported in HIP with a help of 
	Rendezvous Server <xref target="RFC8004">(RVS)</xref>. HIP can 
	implement secure mobility with IP source address validation in 2 
	RTTs, and in 1 RTT with fast mobility extension.
</t>
<t>
	One study comparing DTLS and IPsec-ESP performance concluded that 
	DTLS is recommended for memory-constrained applications while 
	IPSec-ESP for battery power-constrained <xref target="Vignesh" 
	format="default"/>.
</t>
</section>
</section>

<section anchor="IANA" numbered="true" toc="default"> <name>IANA Considerations</name>
<t>
	TBD
</t>
</section>
<section numbered="true" toc="default"> <name>Security Considerations</name>
<t>
	Designing secure transports is challenging.  Where possible, 
	existing technologies SHOULD be used.  Both ESP and DTLS have stood 
	"the test of time" against many attack scenarios. Their use here 
	for N-RID and C2 do not represent new uses, but rather variants on 
	existing depoyments.
</t>
<t>
	The same can be said for both key establishment, using HIPv2 and 
	DTLS, and the actual cipher choice for per packet encryption and 
	authentication.  N-RID and C2 do not present new challenges, rather 
	new opportunities to provide communications security using well 
	researched technologies.
</t>
</section>
<section numbered="true" toc="default"> <name>Acknowledgments</name>
<t>
	Stuart Card and Adam Wiethuechter provivded information on their 
	use of HIP for C2 at the Syracuse NY UAS test corridor.  This, in 
	large measure, was the impetus to develop this document.
</t>
</section>
</middle>
<back>
<displayreference target="I-D.ietf-tls-dtls13" to="DTLS-1.3-draft"/>
<displayreference target="I-D.ietf-dance-client-auth" to="dane-clients"/>
<displayreference target="I-D.ietf-drip-rid" to="drip-uas-rid"/>
<displayreference target="I-D.ietf-drip-registries" to="drip-registries"/>
<displayreference target="I-D.ietf-lpwan-architecture" to="lpwan-architecture"/>
<displayreference target="I-D.mglt-ipsecme-diet-esp" to="diet-esp"/>
<displayreference target="I-D.moskowitz-hip-new-crypto" to="new-hip-crypto"/>
<displayreference target="I-D.moskowitz-hip-fast-mobility" to="hip-fast-mobility"/>
<references> <name>References</name>
<references title="Normative References">
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml"/>
</references>
<references title="Informative References">
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2104.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6698.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7250.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7401.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7402.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7668.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8004.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8724.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8750.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8824.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9011.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9153.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-tls-dtls13.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-dance-client-auth.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-drip-rid.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-drip-registries.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-lpwan-architecture.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-mglt-ipsecme-diet-esp.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-moskowitz-hip-new-crypto.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-moskowitz-hip-fast-mobility.xml"/>
	<reference anchor="F3411-19"  target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
		<front>
			<title>Standard Specification for Remote ID and Tracking</title>
			<author><organization>ASTM International</organization></author>
			<date month="02" year="2020" />
		</front>
	</reference>
	<reference anchor="MAVLINK"  target="http://mavlink.io/">
		<front>
			<title>Micro Air Vehicle Communication Protocol</title>
			<author/>
			<date year="2021"/>
		</front>
	</reference>
	<reference anchor="Vignesh"  target="http://www.diva-portal.org/smash/get/diva2:1157047/FULLTEXT02">
		<front>
			<title>Performance analysis of end-to-end DTLS and IPsec-based communication in IoT environments</title>
            <author fullname="Kuna Vignesh" initials="K." surname="Vignesh">
              <organization>Blekinge Institute of Technology</organization>
              <address/>
            </author>
			<date month="" year="2017" />
        </front>
		<seriesInfo name='Thesis no.' value='MSEE-2017: 42'/>
	</reference>
</references>
</references>
</back>
</rfc>
