<?xml version="1.0" encoding="ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-06" category="info">

  <front>
    <title abbrev="drip-arch">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linkoeping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linkoeping</city>
          <code>SE-58183 Linkoeping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2020" month="December" day="14"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, including required
architectural building blocks and their interfaces.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes a natural Internet and MAC-layer broadcast-based architecture for
Unmanned Aircraft System Remote Identification and tracking (UAS
RID), conforming to proposed regulations and external technical
standards, satisfying the requirements listed in the companion
requirements document <xref target="I-D.ietf-drip-reqs"/>.</t>

<t>Many considerations (especially safety) dictate that UAS be remotely
identifiable.  Civil Aviation Authorities (CAAs) worldwide are
mandating Unmanned Aircraft Systems (UAS) Remote Identification
(RID).  CAAs currently (2020) promulgate performance-based
regulations that do not specify techniques, but rather cite industry
consensus technical standards as acceptable means of compliance.</t>

<section anchor="overview-uas-remote-id-rid-and-rid-standardization" title="Overview UAS Remote ID (RID) and RID Standardization">

<t>A RID is an application enabler for a UAS to be identified by a UTM/
USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published <xref target="Delegated"/> and <xref target="Implementing"/>
Regulations.  The FAA has published a Notice of Proposed Rule Making
<xref target="NPRM"/>.  CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.</t>

<t>ASTM</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee
F38.02 (Aircraft Operations), Work Item WK65041, developed the new 
ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If a UAS uses 
both communication methods, generally the same information must
provided via both means.  The <xref target="F3411-19"/> is cited by FAA in its RID 
<xref target="NPRM"/> as "one potential means of compliance" to a Remote ID rule.</t>
</list></t>

<t>3GPP</t>

<t><list style='empty'>
  <t>With release 16, 3GPP completed the UAS RID requirement study
<xref target="TS-22.825"/> and proposed use cases in the mobile network and the
services that can be offered based on RID.  Release 17
specification works on enhanced UAS service requirements and
provides the protocol and application architecture support which
is applicable for both 4G and 5G network.</t>
</list></t>

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<section anchor="network-rid" title="Network RID">
<t>A RID data dictionary and data flow for Network RID are defined in <xref target="F3411-19"/>.
This flow is from a UAS via unspecified means (but at least in part over the Internet)
to a Network Remote ID Service Provider (Net-RID SP). These Net-RID SPs provide this
information to Network Remote ID Display Providers (Net-RID DP). It is 
the Net-RID DP that respond to queries from Network Remote ID clients (expected 
typically, but not specified exclusively, to be web based) specifying airspace
volumes of interest. Network RID depends upon connectivity, in several segments, 
via the Internet, from the UAS to the observer.</t>

<t>The Network RID is illustrated in <xref target="nrid-fig"/> below:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
            x x  UA
            xxxxx       ********************
             |   \    *                ------*---+------------+
             |    \   *              /       *  | NET_RID_SP |
             |     \  * ------------/    +---*--+------------+
             | RF   \ */                 |   *
             |        *      INTERNET    |   *  +------------+
             |       /*                  +---*--| NET_RID_DP |
             |      / *                  +---*--+------------+
             +     /   *                 |   *
              x   /     *****************|***      x
            xxxxx                        |       xxxxx
              x                          +-------  x
              x                                    x
             x x   Operator (GCS)      Observer   x x
            x   x                                x   x

]]></artwork></figure>

<t>Via the direct Radio Frequency (RF) link between the UA and GCS:
Command and Control (C2) flows between the GCS to the UA such that either 
can communicate with the Net-RID SP. For all but the simplest hobby aircraft,
position and status flow from the UA to the GCS and on to the Net-RID SP.
Thus via the Internet, through three distinct segments, Network RID information
flows from the UAS to the Observer.</t>

</section>
<section anchor="broadcast-rid" title="Broadcast RID">

<t>A set of RID messages are defined for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as
MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed
for UAS registry information lookup by Observers using the locally directly
received UAS RID as a key.  Broadcast RID should be functionally usable in situations 
with no Internet connectivity.</t>

<t>The Broadcast RID is illustrated in <xref target="brid-fig"/> below.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
               x x  UA
              xxxxx
                |
                |
                |     app messages directly over  
                |     one-way RF data link (no IP)
                |
                |
                +
                x
              xxxxx
                x
                x
                x x   Observer's device (e.g. smartphone)
              x   x

]]></artwork></figure>

<t>With Broadcast RID, an Observer is limited to their radio "visible"
airspace for UAS awareness and information.  With Internet queries using harvested
RID, the Observer may gain more information about those visible UAS.</t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">

<t>Each UAS is registered to at least one USS.  With Net-RID, there is
direct communication between the UAS and its USS.  With Broadcast-RID, the UAS Operator has
either pre-filed a 4D space volume for USS operational knowledge and/or Observers can be
providing information about observed UA to a USS.  USS exchange information via a
Discovery and Synchronization Service (DSS) so all USS have knowledge about all activities in a 4D airspace.
The interactions among observer, UA and USS is shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                            +----------+ 
                            | Observer |
                            +----------+
                           /            \
                          /              \      
                   +-----+                +-----+         
                   | UA1 |                | UA2 |
                   +-----+                +-----+       
                          \              /      
                           \            /                       
                            +----------+                            
                            | Internet | 
                            +----------+ 
                           /            \
                          /              \
                    +-------+           +-------+
                    | USS-1 | <-------> | USS-2 |   
                    +-------+           +-------+
                             \         /
                              \       /
                              +------+
                              |  DSS |
                              +------+
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-archicture" title="Overview of DRIP Archicture">

<t>The requirements document also provides an extended introduction to the problem space, use
cases, etc.  Only a brief summary of that introduction will be
restated here as context, with reference to the general architecture
shown in <xref target="arch-intro-1"/> below.</t>

<figure anchor="arch-intro-1"><artwork><![CDATA[
      General      x                           x     Public
      Public     xxxxx                       xxxxx   Safety
      Observer     x                           x     Observer
                   x                           x
                  x x ---------+  +---------- x x
                 x   x         |  |          x   x
                               |  |
         UA1 x x               |  |  +------------ x x UA2
            xxxxx              |  |  |            xxxxx
               |               +  +  +              |
               |            xxxxxxxxxx              |
               |           x          x             |
               +----------+x Internet x+------------+
    UA1        |           x          x             |       UA1 
   Pilot     x |            xxxxxxxxxx              | x    Pilot
  Operator  xxxxx              + + +                xxxxx Operator
   GCS1      x                 | | |                  x    GCS2
             x                 | | |                  x
            x x                | | |                 x x
           x   x               | | |                x   x
                               | | |
             +----------+      | | |       +----------+
             |          |------+ | +-------|          |
             | Public   |        |         | Private  |
             | Registry |     +-----+      | Registry |
             |          |     | DNS |      |          |
             +----------+     +-----+      +----------+

]]></artwork></figure>

<t>Editor's note: the archteture may need more clarification, and address the following:</t>

<t><list style="symbols">
  <t>connectivity requirements among UA, GCS, SP, DP (if necessary)</t>
</list></t>

<t>DRIP will enable leveraging existing Internet resources (standard
protocols, services, infrastructure and business models) to meet UAS
RID and closely related needs.  DRIP will specify how to apply IETF
standards, complementing <xref target="F3411-19"/> and other external standards, to
satisfy UAS RID requirements.  DRIP will update existing and develop
new protocol standards as needed to accomplish the foregoing.</t>

<t>This document will outline the UAS RID architecture into which DRIP
must fit, and an architecture for DRIP itself.  This includes
presenting the gaps between the CAAs' Concepts of Operations and
<xref target="F3411-19"/> as it relates to use of Internet technologies and UA
direct RF communications.  Issues include, but are not limited to:</t>

<t><list style="symbols">
  <t>Mechanisms to leverage Domain Name System (DNS: <xref target="RFC1034"/>) and Extensible
Provisioning Protocol (EPP <xref target="RFC5731"/>) technology to provide for private (<xref target="privateinforeg"/>) and public (<xref target="publicinforeg"/>) Information Registry.</t>
  <t>Trustworthy Remote ID and trust in RID messages <xref target="rid"/></t>
  <t>Privacy in RID messages (PII protection) <xref target="privacyforbrid"/></t>
</list></t>

<t><list style='empty'>
  <t>Eiditor's Note: The following aspects are not covered in this draft, yet. We may consider add sections for each of them if necessary.</t>
</list></t>

<t><list style="symbols">
  <t>UA -&gt; Ground communications including Broadcast RID</t>
  <t>Broadcast RID 'harvesting' and secure forwarding into the UTM</t>
  <t>Secure UAS -&gt; Net-RID SP communications</t>
  <t>Secure Observer -&gt; Pilot communications</t>
</list></t>

</section>
</section>
<section anchor="conventions" title="Conventions">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown above.</t>

</section>
<section anchor="definitionsandabbr" title="Definitions and Abbreviations">

<section anchor="additional-definitions" title="Additional Definitions">
<t>Editor's Note: to be updated.</t>

<t>This document uses terms defined in <xref target="I-D.ietf-drip-reqs"/>.</t>

</section>
<section anchor="abbreviations" title="Abbreviations">

<t>Editor's Note: to be updated.</t>

<t>ADS-B:  &#160;&#160;&#160;&#160;&#160;Automatic Dependent Surveillance Broadcast</t>

<t>DSS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Discovery &amp; Synchronization Service</t>

<t>EdDSA: &#160;&#160;&#160;&#160;&#160;Edwards-Curve Digital Signature Algorithm</t>

<t>GCS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Ground Control Station</t>

<t>HHIT:&#160;&#160;&#160;&#160;&#160;&#160;&#160;Hierarchical HIT Registries</t>

<t>HIP: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Host Identity Protocol</t>

<t>HIT: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Host Identity Tag</t>

<t>RID: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Remote ID</t>

<t>Net-RID SP: Network RID Service Provider</t>

<t>Net-RID DP: Network RID Display Provider.</t>

<t>PII: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Personally Identifiable Information</t>

<t>RF: &#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;Radio Frequency</t>

<t>SDSP:&#160;&#160;&#160;&#160;&#160;&#160;&#160;Supplemental Data Service Provider</t>

<t>UA: &#160;&#160;&#160;&#160;&#160;&#160;&#160; Unmanned Aircraft</t>

<t>UAS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Unmanned Aircraft System</t>

<t>USS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;UAS Service Supplier</t>

<t>UTM: &#160;&#160;&#160;&#160;&#160;&#160;&#160;UAS Traffic Management</t>

</section>
</section>
<section anchor="hhit-for-uas-remote-id" title="HHIT for UAS Remote ID">

<t>This section describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable Identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t>

<section anchor="hit-as-a-trustworthy-remote-id" title="HIT as a Trustworthy Remote ID">

<t>For a Remote ID to be trustworthy in the Broadcast mode, there MUST be an
asymmetric keypair for proof of ID ownership.  The common method of
using a key signing operation to assert ownership of an ID, does not
guarantee name uniqueness.  Any entity can sign an ID, claiming
ownership.  To mitigate spoofing risks, the ID needs to be
cryptographically generated from the public key, in such a manner that
it is statistically hard for an entity to create a public key that would
generate (spoof) the ID.  Thus the signing of such an ID becomes an
attestation (compared to claim) of ownership.</t>

<t>HITs are statistically unique through the cryptographic hash feature of second-preimage resistance.  The cryptographically-bound addition of the Hierarchy and a HHIT registration process (e.g. based on Extensible Provisioning Protocol, <xref target="RFC5730"/>) provide complete, global HHIT uniqueness.  This is in contrast to general IDs (e.g. a UUID or device serial number) as the subject in an X.509 certificate.</t>

</section>
<section anchor="hhit-for-remote-id-registration-and-lookup" title="HHIT for Remote ID Registration and Lookup">

<t>Remote IDs need a deterministic lookup mechanism that rapidly provides
actionable information about the identified UA.  The ID itself needs to
be the key into the lookup given the constraints imposed by some of the
broadcast media.  This can best be achieved by an ID registration
hierarchy cryptographically embedded within the ID.</t>

<t>The original proposal for HITs included a registration hierarchy
scheme.  This was dropped during HIP development for lack of a use
case.  No similar mechanism is possible within CGAs.  It is a rather
straightforward design update to HITs to Hierarchical HITs (HHITs) to
meet the UAS Remote ID use case.</t>

<t>The HHIT needs to consist of a registration hierarchy, the hashing
crypto suite information, and the hash of these items along with the
underlying public key.  Additional information, e.g. an IPv6 prefix, may
enhance the HHITs use beyond the basic Remote ID function (e.g. use in
HIP, <xref target="RFC7401"/>).</t>

</section>
<section anchor="hhit-for-remote-id-encryption" title="HHIT for Remote ID Encryption">

<t>The only (at time of Trustworthy Remote ID design) extant fixed length
ID cryptographically derived from a public key are the Host Identity Tag
<xref target="RFC7401"/>, HITs, and Cryptographically Generated Addresses <xref target="RFC3972"/>,
CGAs.  Both lack a registration/retrieval capability and CGAs have only
a limited crypto agility <xref target="RFC4982"/>. Distributed Hash Tables have been
tried for HITs <xref target="RFC6537"/>; this is really not workable for a globally
deployed UAS Remote ID scheme.</t>

<t>The security of HHITs is achieved first through the cryptographic
hashing function of the above information, along with a registration
process to mitigate the probability of a hash collision (first
registered, first allowed).</t>

</section>
</section>
<section anchor="ei" title="DRIP RID Entities (WAS Entities and their interfaces)">
<t>Editor: This section descrips the DRIP RID ecosystem such as RID design philosophy, PII registration, 
Still not sure this is a good title since here mainly talks about regiter, maybe use this seciton focus on HHIT RID registration?? I also have suggestion to move the CS-RID to a seperated section</t>

<t>Any DRIP solutions for UAS RID must fit into the UTM (or U-space)
system.  This implies interaction with entities including UA, GCS,
USS, Net-RID SP, Net-RID DP, Observers, Operators, Pilots In Command,
Remote Pilots, possibly SDSP, etc.  The only additional entities
introduced in this document are registries, required but not
specified by the regulations and <xref target="RFC7401"/>, and optionally CS-RID
SDSP and Finder nodes.</t>

<t>UAS registries hold both public and private UAS information.  The
public information is primarily pointers to the repositories of, and
keys for looking up, the private information.  Given these different
uses, and to improve scalability, security and simplicity of
administration, the public and private information can be stored in
different registries, indeed different types of registry.</t>

<t><list style='empty'>
  <t>Editor's note: what are differences &amp; relationships among public &amp; private registries, DP, SP, USS</t>
</list></t>

<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background" title="Background">
<t>The private information required for UAS RID is similar to that
required for Internet domain name registration.  Thus a DRIP RID
solution can leverage existing Internet resources: registration
protocols, infrastructure and business models, by fitting into an ID
structure compatible with DNS names.  This implies some sort of
hierarchy, for scalability, and management of this hierarchy.  It is
expected that the private registry function will be provided by the
same organizations that run USS, and likely integrated with USS.</t>

</section>
<section anchor="proposed-approach" title="Proposed Approach">

<t>A DRIP UAS ID MUST be amenable to handling as an Internet domain name
(at an arbitrary level in the hierarchy), MUST be registered in at
least a pseudo-domain (e.g. .ip6.arpa for reverse lookup), and MAY be
registered as a sub-domain (for forward lookup).</t>

<t>A DRIP private information registry MUST support essential Internet
domain name registry operations (e.g. add, delete, update, query)
using interoperable open standard protocols.  It SHOULD support the
Extensible Provisioning Protocol (EPP) and the Registry Data Access
Protocol (RDAP) with access controls.  It MAY use XACML to specify
those access controls.  It MUST be listed in a DNS: that DNS MAY be
private; but absent any compelling reasons for use of private DNS,
SHOULD be the definitive public Internet DNS hierarchy.  The DRIP
private information registry in which a given UAS is registered MUST
be findable, starting from the UAS ID, using the methods specified
in <xref target="RFC7484"/>.  A DRIP private information registry MAY support
WebFinger as specified in <xref target="RFC7033"/>.</t>

</section>
</section>
<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background-1" title="Background">

<t>The public information required to be made available by UAS RID is
transmitted as cleartext to local observers in Broadcast RID and is
served to a client by a Net-RID DP in Network RID.  Therefore, while
IETF can offer e.g.  <xref target="RFC6280"/> as one way to implement Network RID,
the only public information required to support essential DRIP
functions for UAS RID is that required to look up Internet domain
hosts, services, etc.</t>

</section>
<section anchor="proposed-approach-1" title="Proposed Approach">

<t>A DRIP public information registry MUST be a standard DNS server, in
the definitive public Internet DNS hierarchy.  It MUST support NS,
MX, SRV, TXT, AAAA, PTR, CNAME and HIP RR (the last per <xref target="RFC8005"/>)
types.  If a DRIP public information registry lists, in a HIP RR, any
HIP RVS servers for a given DRIP UAS ID, those RVS servers MUST
restrict relay services per AAA policy; this may require extensions
to <xref target="RFC8004"/>.</t>

</section>
</section>
<section anchor="cs-rid-concept" title="CS-RID concept">

<t><list style='empty'>
  <t>Editor's Note: if CS-RID is optional, may be added in separately section stating optional features
Maybe add the CS into architecture diagram</t>
</list></t>

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow RID requirements for small UAS
to be satisfied with the operator's choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for UAS of
essentially all UAS and is now considering Network RID also.  The FAA
NPRM requires both for Standard RID and specifies Network RID only
for Limited RID.  One obvious opportunity is to enhance the
architecture with gateways from Broadcast RID to Network RID.  This
provides the best of both and gives regulators and operators
flexibility.  Such gateways could be pre-positioned (e.g. around
airports and other sensitive areas) and/or crowdsourced (as nothing
more than a smartphone with a suitable app is needed).  As Broadcast
RID media have limited range, gateways receiving messages claiming
locations far from the gateway can alert authorities or a SDSP to the
failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position
stamps from the gateways to multilaterate UA location, independent of
the locations claimed in the messages, which are entirely operator
self-reported in UAS RID and UTM.  Further, gateways with additional
sensors (e.g. smartphones with cameras) can provide independent
information on the UA type and size, confirming or refuting those
claims made in the RID messages.  CS-RID would be an option, beyond
baseline DRIP functionality; if implemented, it adds two more entity
types.</t>

<section anchor="proposed-optional-cs-rid-sdsp" title="Proposed optional CS-RID SDSP">
<t>A CS-RID SDSP MUST appear (i.e. present the same interface) to a Net-
RID SP as a Net-RID DP.  A CS-RID SDSP MUST appear to a Net-RID DP as
a Net-RID SP.  A CS-RID SDSP MUST NOT present a standard GCS-facing
interface as if it were a Net-RID SP.  A CS-RID SDSP MUST NOT present
a standard client-facing interface as if it were a Net-RID DP.  A CS-
RID SDSP MUST present a TBD interface to a CS-RID Finder; this
interface SHOULD be based upon but readily distinguishable from that
between a GCS and a Net-RID SP.</t>

</section>
<section anchor="proposed-optional-cs-rid-finder" title="Proposed optional CS-RID Finder">
<t>A CS-RID Finder MUST present a TBD interface to a CS-RID SDSP; this
interface SHOULD be based upon but readily distinguishable from that
between a GCS and a Net-RID SP.  A CS-RID Finder must implement,
integrate, or accept outputs from, a Broadcast RID receiver.  A CS-
RID Finder MUST NOT interface directly with a GCS, Net-RID SP, Net-
RID DP or Network RID client.</t>

</section>
</section>
</section>
<section anchor="rid" title="UAS Remote Identifiers">

<section anchor="background-2" title="Background">
<t>A DRIP UA ID needs to be "Trustworthy".  This means that within the
framework of the RID messages, an observer can establish that the RID
used does uniquely belong to the UA.  That the only way for any other
UA to assert this RID would be to steal something from within the UA.
The RID is self-generated by the UAS (either UA or GCS) and
registered with the USS.</t>

<t>Within the limitations of Broadcast RID, this is extremely
challenging as:</t>

<t><list style="symbols">
  <t>An RID can at most be 20 characters</t>
  <t>The ASTM Basic RID message (the message containing the RID) is 25
characters; only 3 characters are currently unused</t>
  <t>The ASTM Authentication message, with some changes from <xref target="F3411-19"/>
can carry 224 bytes of payload.</t>
</list></t>

<t>Standard approaches like X.509 and PKI will not fit these
constraints, even using the new EdDSA algorithm.  An example of a
technology that will fit within these limitations is an enhancement
of the Host Identity Tag (HIT) of HIPv2 <xref target="RFC7401"/> introducing
hierarchy as defined in HHIT <xref target="I-D.ietf-drip-rid"/>; using Hierarchical
HITs for UAS RID is outlined in HHIT based UAS RID <xref target="I-D.ietf-drip-rid"/>.
As PKI with X.509 is being used in other systems with which UAS RID
must interoperate (e.g. the UTM Discovery and Synchronization Service
and the UTM InterUSS protocol) mappings between the more flexible but
larger X.509 certificates and the HHIT based structures must be
devised.</t>

<t>By using the EdDSA HHIT suite, self-assertions of the RID can be done
in as little as 84 bytes.  Third-party assertions can be done in 200
bytes.  An observer would need Internet access to validate a self-
assertion claim.  A third-party assertion can be validated via a
small credential cache in a disconnected environment.  This third-
party assertion is possible when the third-party also uses HHITs for
its identity and the UA has the public key for that HHIT.</t>

</section>
<section anchor="proposed-approach-2" title="Proposed Approach">
<t>A DRIP UAS ID MUST be a HHIT.  It SHOULD be self-generated by the UAS
(either UA or GCS) and MUST be registered with the Private
Information Registry identified in its hierarchy fields.  Each UAS ID
HHIT MUST NOT be used more than once, with one exception as follows.</t>

<t>Each UA MAY be assigned, by its manufacturer, a single HI and derived
HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a
static HHIT SHOULD be used only to bind one-time use UAS IDs (other
HHITs) to the unique UA.  Depending upon implementation, this may
leave a HI private key in the possession of the manufacturer (see
Security Considerations).</t>

<t>Each UA equipped for Broadcast RID MUST be provisioned not only with
its HHIT but also with the HI public key from which the HHIT was
derived and the corresponding private key, to enable message
signature.  Each UAS equipped for Network RID MUST be provisioned
likewise; the private key SHOULD reside only in the ultimate source
of Network RID messages (i.e. on the UA itself if the GCS is merely
relaying rather than sourcing Network RID messages).  Each observer
device MUST be provisioned with public keys of the UAS RID root
registries and MAY be provisioned with public keys or certificates
for subordinate registries.</t>

<t>Operators and Private Information Registries MUST possess and other
UTM entities MAY possess UAS ID style HHITs.  When present, such
HHITs SHOULD be used with HIP to strongly mutually authenticate and
optionally encrypt communications.</t>

</section>
</section>
<section anchor="Trustworthy" title="DRIP Transactions enabling Trustworthy">

<t>Each Operator MUST generate a Host Identity of the Operator (HIo) and
derived Hierarchical HIT of the Operator (HHITo), register them with
a Private Information Registry along with whatever Operator data
(inc.  PII) is required by the cognizant CAA and the registry, and
obtain a Certificate from the Registry on the Operator (Cro) signed
with the Host Identity of the Registry private key (HIr(priv))
proving such registration.</t>

<t>To add an UA, an Operator MUST generate a Host Identity of the
Aircraft (HIa) and derived Hierarchical HIT of the Aircraft (HHITa),
create a Certificate from the Operator on the Aircraft (Coa) signed
with the Host Identity of the Operator private key (HIo(priv)) to
associate the UA with its Operator, register them with a Private
Information Registry along with whatever UAS data is required by the
cognizant CAA and the registry, obtain a Certificate from the
Registry on the Operator and Aircraft ("Croa") signed with the
HIr(priv) proving such registration, and obtain a Certificate from
the Registry on the Aircraft (Cra) signed with HIr(priv) proving UA
registration in that specific registry while preserving Operator
privacy.  The operator then MUST provision the UA with HIa,
HIa(priv), HHITa and Cra.</t>

<t>UA engaging in Broadcast RID MUST use HIa(priv) to sign Auth Messages
and MUST periodically broadcast Cra. UAS engaging in Network RID MUST
use HIa(priv) to sign Auth Messages.  Observers MUST use HIa from
received Cra to verify received Broadcast RID Auth messages.
Observers without Internet connectivity MAY use Cra to identify the
trust class of the UAS based on known registry vetting.  Observers
with Internet connectivity MAY use HHITa to perform lookups in the
Public Information Registry and MAY then query the Private
Information Registry, which MUST enforce AAA policy on Operator PII
and other sensitive information.</t>

</section>
<section anchor="privacyforbrid" title="Privacy for Broadcast PII">
<t>Editor's ntoe: move this to a subsction of Operator Privacy?</t>

<t>Broadcast RID messages may contain PII.  This may be information
about the UA such as its destination or Operator information such as
GCS location.  There is no absolute "right" in hiding PII, as there
will be times (e.g., disasters) and places (buffer zones around
airports and sensitive facilities) where policy may mandate all
information be sent as cleartext.  Otherwise, the modern general
position (consistent with, e.g., the EU General Data Protection
Regulation) is to hide PII unless otherwise instructed.  While some
have argued that a system like that of automobile registration plates
should suffice for UAS, others have argued persuasively that each
generation of new identifiers should take advantage of advancing
technology to protect privacy, to the extent compatible with the
transparency needed to protect safety.</t>

<t>A viable architecture for PII protection would be symmetric
encryption of the PII using a key known to the UAS and a USS service.
An authorized Observer may send the encrypted PII along with the
Remote ID (to their UAS display service) to get the plaintext.  The
authorized Observer may send the Remote ID (to their UAS display
service) and receive the key to directly decrypt all PII content from
the UA.</t>

<t>PII is protected unless the UAS is informed otherwise.  This may come
from operational instructions to even permit flying in a space/time.
It may be special instructions at the start or during an operation.
PII protection should not be used if the UAS loses connectivity to
the USS.  The USS always has the option to abort the operation if PII
protection is disallowed.</t>

<t>An authorized observer may instruct a UAS via the USS that conditions
have changed mandating no PII protection or land the UA.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>Editor's note: placeholder</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>DRIP is all about safety and security, so content pertaining to such
is not limited to this section.  The security provided by asymmetric
cryptographic techniques depends upon protection of the private keys.
A manufacturer that embeds a private key in an UA may have retained a
copy.  A manufacturer whose UA are configured by a closed source
application on the GCS which communicates over the Internet with the
factory may be sending a copy of a UA or GCS self-generated key back
to the factory.  Keys may be extracted from a GCS or UA; the RID
sender of a small harmless UA (or the entire UA) could be carried by
a larger dangerous UA as a "false flag."  Compromise of a registry
private key could do widespread harm.  Key revocation procedures are
as yet to be determined.  These risks are in addition to those
involving Operator key management practices.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">
<t>The work of the FAA's UAS Identification and Tracking (UAS ID)
Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in
balancing the interests of diverse stakeholders is essential to the
necessary rapid and widespread deployment of UAS RID.  IETF
volunteers who have contributed to this draft include Amelia
Andersdotter and Mohamed Boucadair.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-drip-reqs">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements</title>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document defines terminology and requirements for Drone Remote Identification Protocol (DRIP) Working Group protocols to support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety and other purposes.  Complementing external technical standards as regulator-accepted means of compliance with UAS RID regulations, DRIP will:  facilitate use of existing Internet resources to support UAS RID and to enable enhanced related services;  enable online and offline verification that UAS RID information is trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-reqs-06.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>UAS RID requirement study</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>




<reference  anchor="RFC6280" target='https://www.rfc-editor.org/info/rfc6280'>
<front>
<title>An Architecture for Location and Location Privacy in Internet Applications</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='M.' surname='Lepinski' fullname='M. Lepinski'><organization /></author>
<author initials='A.' surname='Cooper' fullname='A. Cooper'><organization /></author>
<author initials='J.' surname='Morris' fullname='J. Morris'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<date year='2011' month='July' />
<abstract><t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities.  These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved.  This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services.  This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='160'/>
<seriesInfo name='RFC' value='6280'/>
<seriesInfo name='DOI' value='10.17487/RFC6280'/>
</reference>



<reference  anchor="RFC7033" target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author initials='P.' surname='Jones' fullname='P. Jones'><organization /></author>
<author initials='G.' surname='Salgueiro' fullname='G. Salgueiro'><organization /></author>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Smarr' fullname='J. Smarr'><organization /></author>
<date year='2013' month='September' />
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference  anchor="RFC7401" target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials='R.' surname='Moskowitz' fullname='R. Moskowitz' role='editor'><organization /></author>
<author initials='T.' surname='Heer' fullname='T. Heer'><organization /></author>
<author initials='P.' surname='Jokela' fullname='P. Jokela'><organization /></author>
<author initials='T.' surname='Henderson' fullname='T. Henderson'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference  anchor="RFC7484" target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author initials='M.' surname='Blanchet' fullname='M. Blanchet'><organization /></author>
<date year='2015' month='March' />
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference  anchor="RFC8004" target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author initials='J.' surname='Laganier' fullname='J. Laganier'><organization /></author>
<author initials='L.' surname='Eggert' fullname='L. Eggert'><organization /></author>
<date year='2016' month='October' />
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference  anchor="RFC8005" target='https://www.rfc-editor.org/info/rfc8005'>
<front>
<title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
<author initials='J.' surname='Laganier' fullname='J. Laganier'><organization /></author>
<date year='2016' month='October' />
<abstract><t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t></abstract>
</front>
<seriesInfo name='RFC' value='8005'/>
<seriesInfo name='DOI' value='10.17487/RFC8005'/>
</reference>



<reference  anchor="RFC5731" target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference  anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference  anchor="RFC5730" target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference  anchor="RFC3972" target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author initials='T.' surname='Aura' fullname='T. Aura'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference  anchor="RFC4982" target='https://www.rfc-editor.org/info/rfc4982'>
<front>
<title>Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)</title>
<author initials='M.' surname='Bagnulo' fullname='M. Bagnulo'><organization /></author>
<author initials='J.' surname='Arkko' fullname='J. Arkko'><organization /></author>
<date year='2007' month='July' />
<abstract><t>This document analyzes the implications of recent attacks on commonly used hash functions on Cryptographically Generated Addresses (CGAs) and updates the CGA specification to support multiple hash algorithms.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4982'/>
<seriesInfo name='DOI' value='10.17487/RFC4982'/>
</reference>



<reference  anchor="RFC6537" target='https://www.rfc-editor.org/info/rfc6537'>
<front>
<title>Host Identity Protocol Distributed Hash Table Interface</title>
<author initials='J.' surname='Ahrenholz' fullname='J. Ahrenholz'><organization /></author>
<date year='2012' month='February' />
<abstract><t>This document specifies a common interface for using the Host Identity Protocol (HIP) with a Distributed Hash Table (DHT) service to provide a name-to-Host-Identity-Tag lookup service and a Host- Identity-Tag-to-address lookup service.  This document defines an Experimental  Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='6537'/>
<seriesInfo name='DOI' value='10.17487/RFC6537'/>
</reference>



<reference anchor="I-D.ietf-drip-rid">
<front>
<title>UAS Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable Identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-rid-04.txt' />
</reference>




    </references>


<section anchor="overview-of-unmanned-aircraft-systems-uas-traffic" title="Overview of Unmanned Aircraft Systems (UAS) Traffic">

<section anchor="operation-concept" title="Operation Concept">
<t>The National Aeronautics and Space Administration (NASA) and FAAs'
effort of integrating UAS's operation into the national airspace
system (NAS) leads to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013.  The eventual development and implementation are conducted by
the UTM research transition team which is the joint workforce by FAA
and NASA.  World efforts took place afterward.  The Single European
Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published the UTM concept of operations to
guide the development of their future air traffic management (ATM)
system and make sure safe and efficient integrations of manned and
unmanned aircraft into the national airspace.</t>

<t>The UTM composes of UAS operation infrastructure, procedures and
local regulation compliance policies to guarantee UAS's safe
integration and operation.  The main functionality of a UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that a UTM has to offer.  Such Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitor and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS(s) to build a large service coverage map which
can load-balance, relay and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low
Altitude Authorization and Notification Capability <xref target="LAANC"/> program
which is the first implementation to realize UTM's functionality.
The LAANC program can automate the UAS's fly plan application and
approval process for airspace authorization in real-time by checking
against multiple aeronautical databases such as airspace
classification and fly rules associated with it, FAA UAS facility
map, special use airspace, Notice to airman (NOTAM) and Temporary
flight rule (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and takeoff or land in a
controlled airspace (e.g., Class Bravo, Charlie, Delta and Echo
in United States), the USS where UAS is currently communicating
with is responsible for UAS's registration, authenticating the
UAS's fly plan by checking against designated UAS fly map
database, obtaining the air traffic control (ATC) authorization
and monitor the UAS fly path in order to maintain safe boundary
and follow the pre-authorized route.</t>
  <t>For a UAS participating in UTM and take off or land in an
uncontrolled airspace (ex.  Class Golf in the United States),
pre-fly authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS) operation.  The USS either accepts
or rejects received intended fly plan from the UAS.  Accepted UAS
operation may share its current fly data such as GPS position and
altitude to USS.  The USS may keep the UAS operation status near
real-time and may keep it as a record for overall airspace air
traffic monitor.</t>
</list></t>

</section>
<section anchor="automatic-dependent-surveillance-broadcast-ads-b" title="Automatic Dependent Surveillance Broadcast (ADS-B)">
<t>The ADS-B is the de facto technology used in manned aviation 
for sharing locaiton infomraiton, which is
a ground and satellite based system designed in the early 2000s.
Broadcast RID is conceptually similar to ADS-B.  However, for
numerous technical and regulatory reasons, ADS-B itself is not
suitable for low-flying small UA.  Technical reasons include: needing
RF-LOS to large, expensive (hence scarce) ground stations; needing
both a satellite receiver and 1090 MHz transceiver onboard CSWaP
constrained UA; the limited bandwidth of both uplink and downlink,
which are adequate for the current manned aviation traffic volume,
but would likely be saturated by large numbers of UAS, endangering
manned aviation; etc.  Understanding these technical shortcomings,
regulators world-wide have ruled out use of ADS-B for the small UAS
for which UAS RID and DRIP are intended.</t>

<!-- ## Overview UAS Remote ID (RID) and RID Standardization ## 
A RID is an application enabler for a UAS to be identified by a UTM/
USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published {{Delegated}} and {{Implementing}}
Regulations.  The FAA has published a Notice of Proposed Rule Making
{{NPRM}}}.  CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.

3GPP provides UA service in the LTE network since release 15 in
published technical specification {{TS-36.777}}.  Start from its
release 16, it completed the UAS RID requirement study in {{TS-22.825}}
and proposed use cases in the mobile network and the services that
can be offered based on RID and ongoing release 17 specification
works on enhanced UAS service requirement and provides the protocol
and application architecture support which is applicable for both 4G
and 5G network.  ATIS's recent report {{ATIS-I-0000074}} proposes
architecture approaches for the 3GPP network to support UAS and one
of which is put RID in higher 3GPP protocol stack such as using ASTM
remote ID {{F3411-19}}. -->

<!-- # Architectural implications of EASA requirements #

According to EASA, in EU broadcasting drone identification will be
mandatory from July 2020.  Following info should be sent in cleartext
over Wifi or Bluetooth.  In real time during the whole duration of
the flight, the direct periodic broadcast from the UA using an open
and documented transmission protocol, of the following data, in a way
that they can be received directly by existing mobile devices within
the broadcasting range:

* the UAS operator registration number;

* the unique physical serial number of the UA compliant with
standard ANSI/CTA2063;

* the geographical position of the UA and its height above the
surface or take-off point;

* the route course measured clockwise from true north and ground
speed of the UA; and

* the geographical position of the remote pilot or, if not
available, the take-off point;

The architecture proposed in this document partially satisfies EASA
requirements.  In particular, i) is included to Operator-ID Message
as optional. ii) cannot be directly supported due to its heavy
privacy implications.  A cryptographic identifier that needs to be
resolved is proposed instead. iii) and iv) are included into
Location/Vector Message. v) is included into a System Message
(optional). -->

<!-- Table template
| Column-1 |  | Column-2 | | Column-3 |
| value-1  |  | value-2  | | value-3  |
 -->

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

