<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-05" category="info">

  <front>
    <title abbrev="drip-arch">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street>na</street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, including required
architectural building blocks and their interfaces.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes a natural Internet and MAC-layer broadcast-based architecture for
Unmanned Aircraft System Remote Identification and tracking (UAS
RID), conforming to proposed regulations and external technical
standards, satisfying the requirements listed in the companion
requirements document <xref target="I-D.ietf-drip-reqs"/>.</t>

<t>Many considerations (especially safety) dictate that UAS be remotely
identifiable.  Civil Aviation Authorities (CAAs) worldwide are
mandating Unmanned Aircraft Systems (UAS) Remote Identification
(RID).  CAAs currently (2020) promulgate performance-based
regulations that do not specify techniques, but rather cite industry
consensus technical standards as acceptable means of compliance.</t>

<section anchor="overview-uas-remote-id-rid-and-rid-standardization" title="Overview UAS Remote ID (RID) and RID Standardization">

<t>A RID is an application enabler for a UAS to be identified by a UTM/
USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published <xref target="Delegated"/> and <xref target="Implementing"/>
Regulations.  The FAA has published a Notice of Proposed Rule Making
<xref target="NPRM"/>.  CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.</t>

<t>ASTM</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee
F38.02 (Aircraft Operations), Work Item WK65041, developed the new 
ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If a UAS uses 
both communication methods, generally the same information must
provided via both means.  The <xref target="F3411-19"/> is sighted by FAA in its RID 
<xref target="NPRM"/> as "one potential means of compliance" to a Remote ID rule.</t>
</list></t>

<t>3GPP</t>

<t><list style='empty'>
  <t>3GPP provides UA service in the LTE network since release 15 in
published technical specification <xref target="TS-36.777"/>.  Start from its
release 16, it completed the UAS RID requirement study in <xref target="TS-22.825"/>
and proposed use cases in the mobile network and the services that
can be offered based on RID and ongoing release 17 specification
works on enhanced UAS service requirement and provides the protocol
and application architecture support which is applicable for both 4G
and 5G network.  ATIS's recent report <xref target="ATIS-I-0000074"/> proposes
architecture approaches for the 3GPP network to support UAS and one
of which is put RID in higher 3GPP protocol stack such as using ASTM
remote ID <xref target="F3411-19"/>.</t>
</list></t>

<!-- Other Standards Development Organizations (SDOs, e.g., 3GPP,
Appendix A.4) may define their own communication methods for both
Network and Broadcast RID.  The CAAs expect any additional methods to
maintain consistency of the RID messages.  Encapsulation of Broadcast
RID messages in IP packets is infeasible over data links that support
only very small transmission frames, such as the {{F3411-19}} specified
Bluetooth 4 one-way advertisements, which cannot fit IP much less
transport layer overhead (even with header compression); but emerging
data links such as {{I-D.maeurer-raw-ldacs}} should not suffer such
severe limitations.

 -->

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<section anchor="network-rid" title="Network RID">
<t>Network RID defines a RID data dictionary and data flow: from a
UAS via unspecified means to a Network Remote ID Service Provider
(Net-RID SP); from the Net-RID SP to an integrated, or over the
Internet to a separate, Network Remote ID Display Provider (Net-
RID DP); from the Net-RID DP via the Internet to Network Remote ID
clients in response to their queries (expected typically, but not
specified exclusively, to be web based) specifying airspace
volumes of interest.  Network RID depends upon connectivity, in
several segments, via the Internet, from the UAS to the Observer.</t>

<t>The Network RID is illustrated in <xref target="nrid-fig"/> below.</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
            x x  UA
            xxxxx       ********************
             |         *              ------*---+------------+
             |        *              /       *  | NET_Rid_SP |
             |        * ------------/    +---*--+------------+
             | RF     */                 |   *
             |        *      INTERNET    |   *  +------------+
             |       /*                  +---*--| NET_Rid_DP |
             |      / *                 +----*--+------------+
             +     /   *                |   *
              x   /     ****************|***      x
            xxxxx                       |       xxxxx
              x                         +-------  x
              x                                   x
             x x   Operator (GCS)     Observer   x x
            x   x                               x   x

]]></artwork></figure>

<t>Via the direct Radio Frequency (RF) link between the UA and GCS:
Command and Control (C2) flows from the GCS to the UA; for all but
the simplest hobby aircraft, position and status flow from the UA to
the GCS.  Via the Internet, through three distinct segments, Network
RID information flows from the UAS (comprising the UA and its GCS) to
the Observer.</t>

</section>
<section anchor="broadcast-rid" title="Broadcast RID">

<t>Broadcast RID defines a set of RID messages and how the UA
transmits them locally directly one-way, over Bluetooth or Wi-Fi.
Broadcast RID should need Internet (or other Wide Area Network)
connectivity only for UAS registry information lookup using the
locally directly received UAS ID as a key.  Broadcast RID should
be functionally usable in situations with no Internet
connectivity.</t>

<t>The Broadcast RID is illustrated in <xref target="brid-fig"/> below.</t>

<t><list style='empty'>
  <t>Editor's note:  Is there a need to add interconnections 
between B-RID and N-RID in the drawing</t>
</list></t>

<figure anchor="brid-fig"><artwork><![CDATA[
               x x  UA
              xxxxx
                |
                |
                |     app messages directly over  
                |     one-way RF data link (no IP)
                |
                |
                +
                x
              xxxxx
                x
                x
                x x   Observer's device (e.g. smartphone)
              x   x

]]></artwork></figure>

<t>Editor's note: the following may more clarification:</t>

<t><list style="symbols">
  <t>what Broadcast RID can do w/ &amp; w/o Observer Internet connectivity</t>
  <t>How Broadcast RID transmits public info (obviating some registry lookups)</t>
  <t>how Network RID is “less constrained” than Broadcast RID</t>
</list></t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">
<t>Editor's Note: Show how DRIP RID is an enabler of USS Interoperability <xref target="inter-uss"/></t>

<figure anchor="inter-uss"><artwork><![CDATA[
                              +-------+
                              |  DSS  |
                              +-------+
                              /       \
                             /         \
                            /           \
                  +-------+              +-------+
                  | USS-1 | <----------> | USS-2 |   
                  +-------+              +-------+

]]></artwork></figure>

</section>
<section anchor="overview-of-drip-archicture" title="Overview of DRIP Archicture">

<t>The requirements document also provides an extended introduction to the problem space, use
cases, etc.  Only a brief summary of that introduction will be
restated here as context, with reference to the general architecture
shown in <xref target="arch-intro-1"/> below.</t>

<figure anchor="arch-intro-1"><artwork><![CDATA[
      General      x                           x     Public
      Public     xxxxx                       xxxxx   Safety
      Observer     x                           x     Observer
                   x                           x
                  x x ---------+  +---------- x x
                 x   x         |  |          x   x
                               |  |
                               +  +
                            xxxxxxxxxx
                           x          x
               +----------+x Internet x+------------+
               |           x          x             |
    UA1      x |            xxxxxxxxxx              | x    UA2
    Pilot  xxxxx               + + +                xxxxx  Pilot
   Operator  x                 | | |                  x  Operator
             x                 | | |                  x
            x x                | | |                 x x
           x   x               | | |                x   x
                               | | |
             +----------+      | | |       +----------+
             |          |------+ | +-------|          |
             | Public   |        |         | Private  |
             | Registry |     +-----+      | Registry |
             |          |     | DNS |      |          |
             +----------+     +-----+      +----------+

]]></artwork></figure>

<t>Editor's note: the archteture may need more clarification, and address the following:</t>

<t><list style="symbols">
  <t>add network RID and broadcast RID in the picture (since those are the focus points)</t>
  <t>connectivity requirements among UA, GCS, SP, DP (if necessary) …</t>
</list></t>

<t>DRIP will enable leveraging existing Internet resources (standard
protocols, services, infrastructure and business models) to meet UAS
RID and closely related needs.  DRIP will specify how to apply IETF
standards, complementing <xref target="F3411-19"/> and other external standards, to
satisfy UAS RID requirements.  DRIP will update existing and develop
new protocol standards as needed to accomplish the foregoing.</t>

<t>This document will outline the UAS RID architecture into which DRIP
must fit, and an architecture for DRIP itself.  This includes
presenting the gaps between the CAAs' Concepts of Operations and
<xref target="F3411-19"/> as it relates to use of Internet technologies and UA
direct RF communications.  Issues include, but are not limited to:</t>

<t><list style="symbols">
  <t>Mechanisms to leverage Domain Name System (DNS: <xref target="RFC1034"/>) and Extensible
Provisioning Protocol (EPP <xref target="RFC5731"/>) technology to provide for private (<xref target="privateinforeg"/>) and public (<xref target="publicinforeg"/>) Information Registry.</t>
  <t>Trustworthy Remote ID and trust in RID messages <xref target="rid"/></t>
  <t>Privacy in RID messages (PII protection) <xref target="privacyforbrid"/></t>
</list></t>

<t><list style='empty'>
  <t>Eiditor's Note: The following aspects are not covered in this draft, yet. We may consider add sections for each of them if necessary.</t>
</list></t>

<t><list style="symbols">
  <t>UA -&gt; Ground communications including Broadcast RID</t>
  <t>Broadcast RID 'harvesting' and secure forwarding into the UTM</t>
  <t>Secure UAS -&gt; Net-RID SP communications</t>
  <t>Secure Observer -&gt; Pilot communications</t>
</list></t>

</section>
</section>
<section anchor="conventions" title="Conventions">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown above.</t>

</section>
<section anchor="definitionsandabbr" title="Definitions and Abbreviations">

<section anchor="additional-definitions" title="Additional Definitions">
<t>Editor's Note: to be updated.</t>

<t>This document uses terms defined in <xref target="I-D.ietf-drip-reqs"/>.</t>

<t><list style='empty'>
  <t>Editor's note: in order to make it self-contain, listing terms used in this draft should be okie, comments?</t>
</list></t>

</section>
<section anchor="abbreviations" title="Abbreviations">

<t>Editor's Note: to be updated.</t>

<t>ADS-B:       Automatic Dependent Surveillance Broadcast</t>

<t>DSS:        Discovery &amp; Synchronization Service</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>GCS:        Ground Control Station</t>

<t>HHIT:       Hierarchical HIT Registries</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

<t>RID:        Remote ID</t>

<t>Net-RID SP: Network RID Service Provider</t>

<t>Net-RID DP: Network RID Display Provider.</t>

<t>PII:        Personally Identifiable Information</t>

<t>RF:         Radio Frequency</t>

<t>SDSP:       Supplemental Data Service Provider</t>

<t>UA:         Unmanned Aircraft</t>

<t>UAS:        Unmanned Aircraft System</t>

<t>USS:        UAS Service Supplier</t>

<t>UTM:        UAS Traffic Management</t>

</section>
</section>
<section anchor="hhit-for-uas-rid" title="HHIT for UAS RID">

<t><list style='empty'>
  <t>Editor's note: I think we should explain HHIT designs for UAS RID first and give readers a direct imporession what this draft is offering. This is one of Daniel's comment, we shall focus on solutions, without repeating too much of details from a sepecifc draft.</t>
</list></t>

<t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable Identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t>

<t>HITs are statistically unique through the cryptographic hash feature of second-preimage resistance.  The cryptographically-bound addition of the Hierarchy and a HHIT registration process (TBD; e.g. based on Extensible Provisioning Protocol, <xref target="RFC5730"/>) provide complete, global HHIT uniqueness.  This is in contrast to general IDs (e.g. a UUID or device serial number) as the subject in an X.509 certificate.</t>

<t><list style='empty'>
  <t>other pointers:  (mostly list how HHIT satisfy the reqs-)</t>
</list></t>

<t><list style="symbols">
  <t>Why DRIP RID should/MUST/May be a HHIT?</t>
  <t>HHIT RID format, metadate, and other useful info</t>
  <t>HHIT RID registar workflow</t>
  <t>HHIT Users (operator/USS/NETRID-SP?)
  <list style="symbols">
      <t>expand on different uses of &amp; relationship between optional manufacturer-assigned HI &amp; subsequent single-use HIs</t>
    </list></t>
  <t>how security is guaranteed
  <list style="symbols">
      <t>call X.509 PKI not “standard” but “classical”, describe it to justify why it won’t work here</t>
      <t>explain continuing role of some kind of CA even w/o X.509 PKI</t>
    </list></t>
</list></t>

<t><list style='empty'>
  <t><list style='empty'>
    <t>Editors' note: this is also one of the Michael's comment, we can address it here</t>
  </list></t>
</list></t>

<t><list style="symbols">
  <t>how DNS lookup may happen (Reverse DNS?)</t>
  <t>….</t>
</list></t>

</section>
<section anchor="ei" title="DRIP RID Entities (WAS Entities and their interfaces)">
<t>Editor: This section descrips the DRIP RID ecosystem such as RID design philosophy, PII registration, 
Still not sure this is a good title since here mainly talks about regiter, maybe use this seciton focus on HHIT RID registration?? I also have suggestion to move the CS-RID to a seperated section</t>

<t>Any DRIP solutions for UAS RID must fit into the UTM (or U-space)
system.  This implies interaction with entities including UA, GCS,
USS, Net-RID SP, Net-RID DP, Observers, Operators, Pilots In Command,
Remote Pilots, possibly SDSP, etc.  The only additional entities
introduced in this document are registries, required but not
specified by the regulations and <xref target="RFC7401"/>, and optionally CS-RID
SDSP and Finder nodes.</t>

<t>UAS registries hold both public and private UAS information.  The
public information is primarily pointers to the repositories of, and
keys for looking up, the private information.  Given these different
uses, and to improve scalability, security and simplicity of
administration, the public and private information can be stored in
different registries, indeed different types of registry.</t>

<t><list style='empty'>
  <t>Editor's note: what are differences &amp; relationships among public &amp; private registries, DP, SP, USS</t>
</list></t>

<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background" title="Background">
<t>The private information required for UAS RID is similar to that
required for Internet domain name registration.  Thus a DRIP RID
solution can leverage existing Internet resources: registration
protocols, infrastructure and business models, by fitting into an ID
structure compatible with DNS names.  This implies some sort of
hierarchy, for scalability, and management of this hierarchy.  It is
expected that the private registry function will be provided by the
same organizations that run USS, and likely integrated with USS.</t>

</section>
<section anchor="proposed-approach" title="Proposed Approach">

<t>A DRIP UAS ID MUST be amenable to handling as an Internet domain name
(at an arbitrary level in the hierarchy), MUST be registered in at
least a pseudo-domain (e.g. .ip6.arpa for reverse lookup), and MAY be
registered as a sub-domain (for forward lookup).</t>

<t>A DRIP private information registry MUST support essential Internet
domain name registry operations (e.g. add, delete, update, query)
using interoperable open standard protocols.  It SHOULD support the
Extensible Provisioning Protocol (EPP) and the Registry Data Access
Protocol (RDAP) with access controls.  It MAY use XACML to specify
those access controls.  It MUST be listed in a DNS: that DNS MAY be
private; but absent any compelling reasons for use of private DNS,
SHOULD be the definitive public Internet DNS hierarchy.  The DRIP
private information registry in which a given UAS is registered MUST
be findable, starting from the UAS ID, using the methods specified
in <xref target="RFC7484"/>.  A DRIP private information registry MAY support
WebFinger as specified in <xref target="RFC7033"/>.</t>

</section>
</section>
<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background-1" title="Background">

<t>The public information required to be made available by UAS RID is
transmitted as cleartext to local observers in Broadcast RID and is
served to a client by a Net-RID DP in Network RID.  Therefore, while
IETF can offer e.g.  <xref target="RFC6280"/> as one way to implement Network RID,
the only public information required to support essential DRIP
functions for UAS RID is that required to look up Internet domain
hosts, services, etc.</t>

</section>
<section anchor="proposed-approach-1" title="Proposed Approach">

<t>A DRIP public information registry MUST be a standard DNS server, in
the definitive public Internet DNS hierarchy.  It MUST support NS,
MX, SRV, TXT, AAAA, PTR, CNAME and HIP RR (the last per <xref target="RFC8005"/>)
types.  If a DRIP public information registry lists, in a HIP RR, any
HIP RVS servers for a given DRIP UAS ID, those RVS servers MUST
restrict relay services per AAA policy; this may require extensions
to <xref target="RFC8004"/>.</t>

</section>
</section>
<section anchor="cs-rid-concept" title="CS-RID concept">

<t><list style='empty'>
  <t>Editor's Note: if CS-RID is optional, may be added in separately section stating optional features
Maybe add the CS into architecture diagram</t>
</list></t>

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow RID requirements for small UAS
to be satisfied with the operator's choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for UAS of
essentially all UAS and is now considering Network RID also.  The FAA
NPRM requires both for Standard RID and specifies Network RID only
for Limited RID.  One obvious opportunity is to enhance the
architecture with gateways from Broadcast RID to Network RID.  This
provides the best of both and gives regulators and operators
flexibility.  Such gateways could be pre-positioned (e.g. around
airports and other sensitive areas) and/or crowdsourced (as nothing
more than a smartphone with a suitable app is needed).  As Broadcast
RID media have limited range, gateways receiving messages claiming
locations far from the gateway can alert authorities or a SDSP to the
failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position
stamps from the gateways to multilaterate UA location, independent of
the locations claimed in the messages, which are entirely operator
self-reported in UAS RID and UTM.  Further, gateways with additional
sensors (e.g. smartphones with cameras) can provide independent
information on the UA type and size, confirming or refuting those
claims made in the RID messages.  CS-RID would be an option, beyond
baseline DRIP functionality; if implemented, it adds two more entity
types.</t>

<section anchor="proposed-optional-cs-rid-sdsp" title="Proposed optional CS-RID SDSP">
<t>A CS-RID SDSP MUST appear (i.e. present the same interface) to a Net-
RID SP as a Net-RID DP.  A CS-RID SDSP MUST appear to a Net-RID DP as
a Net-RID SP.  A CS-RID SDSP MUST NOT present a standard GCS-facing
interface as if it were a Net-RID SP.  A CS-RID SDSP MUST NOT present
a standard client-facing interface as if it were a Net-RID DP.  A CS-
RID SDSP MUST present a TBD interface to a CS-RID Finder; this
interface SHOULD be based upon but readily distinguishable from that
between a GCS and a Net-RID SP.</t>

</section>
<section anchor="proposed-optional-cs-rid-finder" title="Proposed optional CS-RID Finder">
<t>A CS-RID Finder MUST present a TBD interface to a CS-RID SDSP; this
interface SHOULD be based upon but readily distinguishable from that
between a GCS and a Net-RID SP.  A CS-RID Finder must implement,
integrate, or accept outputs from, a Broadcast RID receiver.  A CS-
RID Finder MUST NOT interface directly with a GCS, Net-RID SP, Net-
RID DP or Network RID client.</t>

</section>
</section>
</section>
<section anchor="rid" title="UAS Remote Identifiers">

<section anchor="background-2" title="Background">
<t>A DRIP UA ID needs to be "Trustworthy".  This means that within the
framework of the RID messages, an observer can establish that the RID
used does uniquely belong to the UA.  That the only way for any other
UA to assert this RID would be to steal something from within the UA.
The RID is self-generated by the UAS (either UA or GCS) and
registered with the USS.</t>

<t>Within the limitations of Broadcast RID, this is extremely
challenging as:</t>

<t><list style="symbols">
  <t>An RID can at most be 20 characters</t>
  <t>The ASTM Basic RID message (the message containing the RID) is 25
characters; only 3 characters are currently unused</t>
  <t>The ASTM Authentication message, with some changes from <xref target="F3411-19"/>
can carry 224 bytes of payload.</t>
</list></t>

<t>Standard approaches like X.509 and PKI will not fit these
constraints, even using the new EdDSA algorithm.  An example of a
technology that will fit within these limitations is an enhancement
of the Host Identity Tag (HIT) of HIPv2 <xref target="RFC7401"/> introducing
hierarchy as defined in HHIT <xref target="I-D.moskowitz-hip-hierarchical-hit"/>; using Hierarchical
HITs for UAS RID is outlined in HHIT based UAS RID <xref target="I-D.ietf-drip-rid"/>.
As PKI with X.509 is being used in other systems with which UAS RID
must interoperate (e.g. the UTM Discovery and Synchronization Service
and the UTM InterUSS protocol) mappings between the more flexible but
larger X.509 certificates and the HHIT based structures must be
devised.</t>

<t>By using the EdDSA HHIT suite, self-assertions of the RID can be done
in as little as 84 bytes.  Third-party assertions can be done in 200
bytes.  An observer would need Internet access to validate a self-
assertion claim.  A third-party assertion can be validated via a
small credential cache in a disconnected environment.  This third-
party assertion is possible when the third-party also uses HHITs for
its identity and the UA has the public key for that HHIT.</t>

</section>
<section anchor="proposed-approach-2" title="Proposed Approach">
<t>A DRIP UAS ID MUST be a HHIT.  It SHOULD be self-generated by the UAS
(either UA or GCS) and MUST be registered with the Private
Information Registry identified in its hierarchy fields.  Each UAS ID
HHIT MUST NOT be used more than once, with one exception as follows.</t>

<t>Each UA MAY be assigned, by its manufacturer, a single HI and derived
HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a
static HHIT SHOULD be used only to bind one-time use UAS IDs (other
HHITs) to the unique UA.  Depending upon implementation, this may
leave a HI private key in the possession of the manufacturer (see
Security Considerations).</t>

<t>Each UA equipped for Broadcast RID MUST be provisioned not only with
its HHIT but also with the HI public key from which the HHIT was
derived and the corresponding private key, to enable message
signature.  Each UAS equipped for Network RID MUST be provisioned
likewise; the private key SHOULD reside only in the ultimate source
of Network RID messages (i.e. on the UA itself if the GCS is merely
relaying rather than sourcing Network RID messages).  Each observer
device MUST be provisioned with public keys of the UAS RID root
registries and MAY be provisioned with public keys or certificates
for subordinate registries.</t>

<t>Operators and Private Information Registries MUST possess and other
UTM entities MAY possess UAS ID style HHITs.  When present, such
HHITs SHOULD be used with HIP to strongly mutually authenticate and
optionally encrypt communications.</t>

</section>
</section>
<section anchor="Trustworthy" title="DRIP Transactions enabling Trustworthy">

<t>Each Operator MUST generate a Host Identity of the Operator (HIo) and
derived Hierarchical HIT of the Operator (HHITo), register them with
a Private Information Registry along with whatever Operator data
(inc.  PII) is required by the cognizant CAA and the registry, and
obtain a Certificate from the Registry on the Operator (Cro) signed
with the Host Identity of the Registry private key (HIr(priv))
proving such registration.</t>

<t>To add an UA, an Operator MUST generate a Host Identity of the
Aircraft (HIa) and derived Hierarchical HIT of the Aircraft (HHITa),
create a Certificate from the Operator on the Aircraft (Coa) signed
with the Host Identity of the Operator private key (HIo(priv)) to
associate the UA with its Operator, register them with a Private
Information Registry along with whatever UAS data is required by the
cognizant CAA and the registry, obtain a Certificate from the
Registry on the Operator and Aircraft ("Croa") signed with the
HIr(priv) proving such registration, and obtain a Certificate from
the Registry on the Aircraft (Cra) signed with HIr(priv) proving UA
registration in that specific registry while preserving Operator
privacy.  The operator then MUST provision the UA with HIa,
HIa(priv), HHITa and Cra.</t>

<t>UA engaging in Broadcast RID MUST use HIa(priv) to sign Auth Messages
and MUST periodically broadcast Cra. UAS engaging in Network RID MUST
use HIa(priv) to sign Auth Messages.  Observers MUST use HIa from
received Cra to verify received Broadcast RID Auth messages.
Observers without Internet connectivity MAY use Cra to identify the
trust class of the UAS based on known registry vetting.  Observers
with Internet connectivity MAY use HHITa to perform lookups in the
Public Information Registry and MAY then query the Private
Information Registry, which MUST enforce AAA policy on Operator PII
and other sensitive information.</t>

</section>
<section anchor="privacyforbrid" title="Privacy for Broadcast PII">
<t>Editor's ntoe: move this to a subsction of Operator Privacy?</t>

<t>Broadcast RID messages may contain PII.  This may be information
about the UA such as its destination or Operator information such as
GCS location.  There is no absolute "right" in hiding PII, as there
will be times (e.g., disasters) and places (buffer zones around
airports and sensitive facilities) where policy may mandate all
information be sent as cleartext.  Otherwise, the modern general
position (consistent with, e.g., the EU General Data Protection
Regulation) is to hide PII unless otherwise instructed.  While some
have argued that a system like that of automobile registration plates
should suffice for UAS, others have argued persuasively that each
generation of new identifiers should take advantage of advancing
technology to protect privacy, to the extent compatible with the
transparency needed to protect safety.</t>

<t>A viable architecture for PII protection would be symmetric
encryption of the PII using a key known to the UAS and a USS service.
An authorized Observer may send the encrypted PII along with the
Remote ID (to their UAS display service) to get the plaintext.  The
authorized Observer may send the Remote ID (to their UAS display
service) and receive the key to directly decrypt all PII content from
the UA.</t>

<t>PII is protected unless the UAS is informed otherwise.  This may come
from operational instructions to even permit flying in a space/time.
It may be special instructions at the start or during an operation.
PII protection should not be used if the UAS loses connectivity to
the USS.  The USS always has the option to abort the operation if PII
protection is disallowed.</t>

<t>An authorized observer may instruct a UAS via the USS that conditions
have changed mandating no PII protection or land the UA.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>Editor's note: placeholder</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>DRIP is all about safety and security, so content pertaining to such
is not limited to this section.  The security provided by asymmetric
cryptographic techniques depends upon protection of the private keys.
A manufacturer that embeds a private key in an UA may have retained a
copy.  A manufacturer whose UA are configured by a closed source
application on the GCS which communicates over the Internet with the
factory may be sending a copy of a UA or GCS self-generated key back
to the factory.  Keys may be extracted from a GCS or UA; the RID
sender of a small harmless UA (or the entire UA) could be carried by
a larger dangerous UA as a "false flag."  Compromise of a registry
private key could do widespread harm.  Key revocation procedures are
as yet to be determined.  These risks are in addition to those
involving Operator key management practices.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">
<t>The work of the FAA's UAS Identification and Tracking (UAS ID)
Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in
balancing the interests of diverse stakeholders is essential to the
necessary rapid and widespread deployment of UAS RID.  IETF
volunteers who have contributed to this draft include Amelia
Andersdotter and Mohamed Boucadair.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-drip-reqs">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements</title>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document defines terminology and requirements for Drone Remote Identification Protocol (DRIP) Working Group protocols to support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety and other purposes.  Complementing external technical standards as regulator-accepted means of compliance with UAS RID regulations, DRIP will:  facilitate use of existing Internet resources to support UAS RID and to enable enhanced related services;  enable online and offline verification that UAS RID information is trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-reqs-06.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-I-0000074" target="https://access.atis.org/apps/group_public/download.php/48760/ATIS-I-0000074.pdf">
  <front>
    <title>Report on UAS in 3GPP</title>
    <author >
      <organization>ATIS</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>UAS RID requirement study</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TS-36.777" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3231">
  <front>
    <title>UAV service in the LTE network</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>




<reference  anchor="RFC4122" target='https://www.rfc-editor.org/info/rfc4122'>
<front>
<title>A Universally Unique IDentifier (UUID) URN Namespace</title>
<author initials='P.' surname='Leach' fullname='P. Leach'><organization /></author>
<author initials='M.' surname='Mealling' fullname='M. Mealling'><organization /></author>
<author initials='R.' surname='Salz' fullname='R. Salz'><organization /></author>
<date year='2005' month='July' />
<abstract><t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier).  A UUID is 128 bits long, and can guarantee uniqueness across space and time.  UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t><t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group).  Information from earlier versions of the DCE specification have been incorporated into this document.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4122'/>
<seriesInfo name='DOI' value='10.17487/RFC4122'/>
</reference>



<reference  anchor="RFC6280" target='https://www.rfc-editor.org/info/rfc6280'>
<front>
<title>An Architecture for Location and Location Privacy in Internet Applications</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='M.' surname='Lepinski' fullname='M. Lepinski'><organization /></author>
<author initials='A.' surname='Cooper' fullname='A. Cooper'><organization /></author>
<author initials='J.' surname='Morris' fullname='J. Morris'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<date year='2011' month='July' />
<abstract><t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities.  These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved.  This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services.  This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='160'/>
<seriesInfo name='RFC' value='6280'/>
<seriesInfo name='DOI' value='10.17487/RFC6280'/>
</reference>



<reference  anchor="RFC7033" target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author initials='P.' surname='Jones' fullname='P. Jones'><organization /></author>
<author initials='G.' surname='Salgueiro' fullname='G. Salgueiro'><organization /></author>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Smarr' fullname='J. Smarr'><organization /></author>
<date year='2013' month='September' />
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference  anchor="RFC7401" target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials='R.' surname='Moskowitz' fullname='R. Moskowitz' role='editor'><organization /></author>
<author initials='T.' surname='Heer' fullname='T. Heer'><organization /></author>
<author initials='P.' surname='Jokela' fullname='P. Jokela'><organization /></author>
<author initials='T.' surname='Henderson' fullname='T. Henderson'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference  anchor="RFC7484" target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author initials='M.' surname='Blanchet' fullname='M. Blanchet'><organization /></author>
<date year='2015' month='March' />
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference  anchor="RFC8004" target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author initials='J.' surname='Laganier' fullname='J. Laganier'><organization /></author>
<author initials='L.' surname='Eggert' fullname='L. Eggert'><organization /></author>
<date year='2016' month='October' />
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference  anchor="RFC8005" target='https://www.rfc-editor.org/info/rfc8005'>
<front>
<title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
<author initials='J.' surname='Laganier' fullname='J. Laganier'><organization /></author>
<date year='2016' month='October' />
<abstract><t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t></abstract>
</front>
<seriesInfo name='RFC' value='8005'/>
<seriesInfo name='DOI' value='10.17487/RFC8005'/>
</reference>



<reference  anchor="RFC5731" target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference  anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference  anchor="RFC5730" target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor="I-D.moskowitz-drip-crowd-sourced-rid">
<front>
<title>Crowd Sourced Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='S' surname='Zhao' fullname='Shuai Zhao'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='May' day='20' year='2020' />

<abstract><t>This document describes using the ASTM Broadcast Remote ID (B-RID) specification in a "crowd sourced" smart phone environment to provide much of the FAA mandated Network Remote ID (N-RID) functionality. This crowd sourced B-RID data will use multilateration to add a level of reliability in the location data on the Unmanned Aircraft (UA). The crowd sourced environment will also provide a monitoring coverage map to authorized observers.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-drip-crowd-sourced-rid-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-drip-crowd-sourced-rid-04.txt' />
</reference>



<reference anchor="I-D.wiethuechter-drip-auth">
<front>
<title>DRIP Authentication Formats</title>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<date month='September' day='21' year='2020' />

<abstract><t>This document describes how to include trust into the ASTM Remote ID specification defined in ASTM 3411-19 under a Broadcast Remote ID (RID) scenario.  It defines a few different message schemes (based on the Authentication Message) that can be used to assure past messages sent by a UA and also act as an assurance for UA trustworthiness in the absence of Internet connectivity at the receiving node.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-wiethuechter-drip-auth-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-wiethuechter-drip-auth-04.txt' />
</reference>



<reference anchor="I-D.wiethuechter-drip-identity-claims">
<front>
<title>DRIP Identity Claims</title>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<date month='October' day='26' year='2020' />

<abstract><t>This document describes the Identity Claims or Certificates for use in various Drone Remote ID Protocols (DRIP) and the wider Unmanned Traffic Management (UTM) system.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-wiethuechter-drip-identity-claims-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-wiethuechter-drip-identity-claims-02.txt' />
</reference>



<reference anchor="I-D.moskowitz-drip-secure-nrid-c2">
<front>
<title>Secure UAS Network RID and C2 Transport</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='September' day='27' year='2020' />

<abstract><t>This document provides the mechanisms for secure transport of UAS Network-RemoteID and Command-and-Control messaging.  Both HIP and DTLS based methods are described.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-drip-secure-nrid-c2-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-drip-secure-nrid-c2-01.txt' />
</reference>



<reference anchor="I-D.ietf-drip-rid">
<front>
<title>UAS Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable Identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-rid-04.txt' />
</reference>



<reference anchor="I-D.moskowitz-hip-hhit-registries">
<front>
<title>Hierarchical HIT Registries</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document describes using the registration protocol and registries to support hierarchical HITs (HHITs).  New and existing HIP parameters are used to communicate Registry Policies and data about the HHIT device and the Registries.  Further Registries are expected to provide RVS services for registered HHIT devices.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-02.txt' />
</reference>



<reference anchor="I-D.moskowitz-hip-hierarchical-hit">
<front>
<title>Hierarchical HITs for HIPv2</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='May' day='13' year='2020' />

<abstract><t>This document describes using a hierarchical HIT to facilitate large deployments of managed devices.  Hierarchical HITs differ from HIPv2 flat HITs by only using 64 bits for mapping the Host Identity, freeing 32 bits to bind in a hierarchy of Registering Entities that provide services to the consumers of hierarchical HITs.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hierarchical-hit-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hierarchical-hit-05.txt' />
</reference>



<reference anchor="I-D.maeurer-raw-ldacs">
<front>
<title>L-band Digital Aeronautical Communications System (LDACS)</title>

<author initials='N' surname='Maeurer' fullname='Nils Maeurer'>
    <organization />
</author>

<author initials='T' surname='Graeupl' fullname='Thomas Graeupl'>
    <organization />
</author>

<author initials='C' surname='Schmitt' fullname='Corinna Schmitt'>
    <organization />
</author>

<date month='October' day='2' year='2020' />

<abstract><t>This document provides an overview of the architecture of the L-band Digital Aeronautical Communications System (LDACS), which provides a secure, scalable and spectrum efficient terrestrial data link for civil aviation.  LDACS is a scheduled, reliable multi-application cellular broadband system with support for IPv6.  LDACS shall provide a data link for IP network-based aircraft guidance.  High reliability and availability for IP connectivity over LDACS are therefore essential.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-maeurer-raw-ldacs-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-maeurer-raw-ldacs-06.txt' />
</reference>



<reference anchor="I-D.moskowitz-hip-new-crypto">
<front>
<title>New Cryptographic Algorithms for HIP</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='July' day='26' year='2020' />

<abstract><t>This document provides new cryptographic algorithms to be used with HIP.  The Edwards Elliptic Curve and the Keccak sponge functions are the main focus.  The HIP parameters and processing instructions impacted by these algorithms are defined.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-new-crypto-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-new-crypto-05.txt' />
</reference>



<reference anchor="I-D.moskowitz-orchid-cshake">
<front>
<title>Using cSHAKE in ORCHIDs</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='May' day='21' year='2020' />

<abstract><t>This document specifies how to use the cSHAKE hash for ORCHID generation and allows for varying sized hashes in the ORCHID along with additional information within the ORCHID.  It is an addendum to ORCHIDv2 [RFC7343].</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-orchid-cshake-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-orchid-cshake-01.txt' />
</reference>




    </references>


<section anchor="overview-of-unmanned-aircraft-systems-uas-traffic" title="Overview of Unmanned Aircraft Systems (UAS) Traffic">

<section anchor="operation-concept" title="Operation Concept">
<t>The National Aeronautics and Space Administration (NASA) and FAAs'
effort of integrating UAS's operation into the national airspace
system (NAS) leads to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013.  The eventual development and implementation are conducted by
the UTM research transition team which is the joint workforce by FAA
and NASA.  World efforts took place afterward.  The Single European
Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published the UTM concept of operations to
guide the development of their future air traffic management (ATM)
system and make sure safe and efficient integrations of manned and
unmanned aircraft into the national airspace.</t>

<t>The UTM composes of UAS operation infrastructure, procedures and
local regulation compliance policies to guarantee UAS's safe
integration and operation.  The main functionality of a UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that a UTM has to offer.  Such Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitor and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS(s) to build a large service coverage map which
can load-balance, relay and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low
Altitude Authorization and Notification Capability <xref target="LAANC"/> program
which is the first implementation to realize UTM's functionality.
The LAANC program can automate the UAS's fly plan application and
approval process for airspace authorization in real-time by checking
against multiple aeronautical databases such as airspace
classification and fly rules associated with it, FAA UAS facility
map, special use airspace, Notice to airman (NOTAM) and Temporary
flight rule (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and takeoff or land in a
controlled airspace (e.g., Class Bravo, Charlie, Delta and Echo
in United States), the USS where UAS is currently communicating
with is responsible for UAS's registration, authenticating the
UAS's fly plan by checking against designated UAS fly map
database, obtaining the air traffic control (ATC) authorization
and monitor the UAS fly path in order to maintain safe boundary
and follow the pre-authorized route.</t>
  <t>For a UAS participating in UTM and take off or land in an
uncontrolled airspace (ex.  Class Golf in the United States),
pre-fly authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS) operation.  The USS either accepts
or rejects received intended fly plan from the UAS.  Accepted UAS
operation may share its current fly data such as GPS position and
altitude to USS.  The USS may keep the UAS operation status near
real-time and may keep it as a record for overall airspace air
traffic monitor.</t>
</list></t>

</section>
<section anchor="automatic-dependent-surveillance-broadcast-ads-b" title="Automatic Dependent Surveillance Broadcast (ADS-B)">
<t>The ADS-B is the de facto technology used in manned aviation 
for sharing locaiton infomraiton, which is
a ground and satellite based system designed in the early 2000s.
Broadcast RID is conceptually similar to ADS-B.  However, for
numerous technical and regulatory reasons, ADS-B itself is not
suitable for low-flying small UA.  Technical reasons include: needing
RF-LOS to large, expensive (hence scarce) ground stations; needing
both a satellite receiver and 1090 MHz transceiver onboard CSWaP
constrained UA; the limited bandwidth of both uplink and downlink,
which are adequate for the current manned aviation traffic volume,
but would likely be saturated by large numbers of UAS, endangering
manned aviation; etc.  Understanding these technical shortcomings,
regulators world-wide have ruled out use of ADS-B for the small UAS
for which UAS RID and DRIP are intended.</t>

<!-- ## Overview UAS Remote ID (RID) and RID Standardization ## 
A RID is an application enabler for a UAS to be identified by a UTM/
USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published {{Delegated}} and {{Implementing}}
Regulations.  The FAA has published a Notice of Proposed Rule Making
{{NPRM}}}.  CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.

3GPP provides UA service in the LTE network since release 15 in
published technical specification {{TS-36.777}}.  Start from its
release 16, it completed the UAS RID requirement study in {{TS-22.825}}
and proposed use cases in the mobile network and the services that
can be offered based on RID and ongoing release 17 specification
works on enhanced UAS service requirement and provides the protocol
and application architecture support which is applicable for both 4G
and 5G network.  ATIS's recent report {{ATIS-I-0000074}} proposes
architecture approaches for the 3GPP network to support UAS and one
of which is put RID in higher 3GPP protocol stack such as using ASTM
remote ID {{F3411-19}}. -->

<!-- # Architectural implications of EASA requirements #

According to EASA, in EU broadcasting drone identification will be
mandatory from July 2020.  Following info should be sent in cleartext
over Wifi or Bluetooth.  In real time during the whole duration of
the flight, the direct periodic broadcast from the UA using an open
and documented transmission protocol, of the following data, in a way
that they can be received directly by existing mobile devices within
the broadcasting range:

* the UAS operator registration number;

* the unique physical serial number of the UA compliant with
standard ANSI/CTA2063;

* the geographical position of the UA and its height above the
surface or take-off point;

* the route course measured clockwise from true north and ground
speed of the UA; and

* the geographical position of the remote pilot or, if not
available, the take-off point;

The architecture proposed in this document partially satisfies EASA
requirements.  In particular, i) is included to Operator-ID Message
as optional. ii) cannot be directly supported due to its heavy
privacy implications.  A cryptographic identifier that needs to be
resolved is proposed instead. iii) and iv) are included into
Location/Vector Message. v) is included into a System Message
(optional). -->

<!-- Table template
| Column-1 |  | Column-2 | | Column-3 |
| value-1  |  | value-2  | | value-3  |
 -->

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

