<?xml version="1.0" encoding="ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-11" category="info">

  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linkoeping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linkoeping</city>
          <code>SE-58183 Linkoeping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, including required
architectural building blocks and their interfaces.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications, conforming to proposed and final
regulations plus external technical standards, satisfying the
requirements listed in the companion requirements document
<xref target="I-D.ietf-drip-reqs"/>.</t>

<section anchor="overview-uas-remote-id-rid-and-rid-standardization" title="Overview UAS Remote ID (RID) and RID Standardization">

<t>UAS Remote Identification (RID) is an application enabler for a UAS to be identified by UTM/USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published <xref target="Delegated"/> and <xref target="Implementing"/>
Regulations.</t>

<!-- The FAA published a Notice of Proposed Rule Making
{{NPRM}} in 2019 and whereafter published the Final Rule {{FAA_RID}} in 2021. -->

<t>CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.</t>

<t>FAA</t>

<t><list style='empty'>
  <t>The FAA published a Notice of Proposed Rule Making
<xref target="NPRM"/> in 2019 and whereafter published the Final Rule <xref target="FAA_RID"/> in 2021.</t>
</list></t>

<t>ASTM</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee
F38.02 (Aircraft Operations), Work Item WK65041, developed the 
ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If a UAS uses 
both communication methods, the same information must be
provided via both means.  The <xref target="F3411-19"/> is cited by FAA in its RID final rule
<xref target="FAA_RID"/> as "a potential means of compliance" to a Remote ID rule.</t>
</list></t>

<t>3GPP</t>

<t><list style='empty'>
  <t>With release 16, 3GPP completed the UAS RID requirement study
<xref target="TS-22.825"/> and proposed use cases in the mobile network and the
services that can be offered based on RID.  Release 17
specification works on enhanced UAS service requirements and
provides the protocol and application architecture support which
is applicable for both 4G and 5G network.</t>
</list></t>

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<section anchor="brid" title="Broadcast RID">

<t>A set of RID messages are defined for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the locally directly received UAS RID as a key.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The Broadcast RID is illustrated in <xref target="brid-fig"/> below.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
               x x  UA
              xxxxx
                |
                |
                |     app messages directly over  
                |     one-way RF data link (no IP)
                |
                |
                +
                x
              xxxxx
                x
                x
                x x   Observer's device (e.g. smartphone)
              x   x

]]></artwork></figure>

<t>With Broadcast RID, an Observer is limited to their radio "visible"
airspace for UAS awareness and information.  With Internet queries using harvested
RID (see <xref target="harvestbridforutm"/>), the Observer may gain more information about those visible UAS.</t>

</section>
<section anchor="nrid" title="Network RID">
<t>A RID data dictionary and data flow for Network RID are defined in <xref target="F3411-19"/>.
This data flow is from a UAS via unspecified means (but at least in part over the Internet)
to a Network Remote ID Service Provider (Net-RID SP).
These Net-RID SPs provide the RID data to Network Remote ID Display Providers (Net-RID DP). 
It is the Net-RID DP that responds to queries from Network Remote ID Observers  (expected typically, but not specified exclusively, to be web-based) specifying airspace
volumes of interest. Network RID depends upon connectivity, in several segments, 
via the Internet, from the UAS to the Observer.</t>

<t>The Network RID is illustrated in <xref target="nrid-fig"/> below:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
            x x  UA
            xxxxx       ********************
             |   \    *                ------*---+------------+
             |    \   *              /       *  | NET_RID_SP |
             |     \  * ------------/    +---*--+------------+
             | RF   \ */                 |   *
             |        *      INTERNET    |   *  +------------+
             |       /*                  +---*--| NET_RID_DP |
             |      / *                  +---*--+------------+
             +     /   *                 |   *
              x   /     *****************|***      x
            xxxxx                        |       xxxxx
              x                          +-------  x
              x                                    x
             x x   Operator (GCS)      Observer   x x
            x   x                                x   x

]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path (ex. a direct RF link, but with increasing BVLOS operations expected often to be wireless links at either end with the Internet between). For all but the simplest hobby aircraft, telemetry (at least position and heading) flows from the UA to the GCS via some path (typically the
reverse of the C2 path). Thus RID information pertaining to both the GCS and the UA can be sent by whichever has Internet connectivity to the Net-RID SP (typically the USS managing the UAS operation). The Net-RID SP forwards RID information via the Internet to subscribed Net-RID DP (typically other USS). Subscribed Net-RID DP forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411-19"/> describes RID data elements end-to-end. <xref target="F3411-19"/> prescribes the protocol only among Net-RID SP, Net-RID DP, and the Discovery and Synchronization Service (DSS).</t>

<t><list style='empty'>
  <t><list style='empty'>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of RID information is in the scope of <xref target="F3411-19"/> Network RID..</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">

<t>Each UAS is registered to at least one USS.  With Net-RID, there is
direct communication between the UAS and its USS.  With Broadcast-RID, the UAS Operator has either pre-filed a 4D space volume for USS operational knowledge and/or Observers can be providing information about observed UA to a USS.  USS exchange information via a Discovery and Synchronization Service (DSS) so all USS collectively have knowledge about all activities in a 4D airspace.</t>

<t>The interactions among Observer, UA, and USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                            +----------+ 
                            | Observer |
                            +----------+
                           /            \
                          /              \      
                   +-----+                +-----+         
                   | UA1 |                | UA2 |
                   +-----+                +-----+       
                          \              /      
                           \            /                       
                            +----------+                            
                            | Internet | 
                            +----------+ 
                           /            \
                          /              \
                    +-------+           +-------+
                    | USS-1 | <-------> | USS-2 |   
                    +-------+           +-------+
                             \         /
                              \       /
                              +------+
                              |  DSS |
                              +------+
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture" title="Overview of DRIP Architecture">

<t>The requirements document <xref target="I-D.ietf-drip-reqs"/> also provides an extended introduction to the problem space, use cases, etc.  Only a brief summary of that introduction will be restated here as context, with reference to the general UAS RID usage scenarios shown in <xref target="arch-intro"/> below.</t>

<figure anchor="arch-intro"><artwork><![CDATA[
      General      x                           x     Public
      Public     xxxxx                       xxxxx   Safety
      Observer     x                           x     Observer
                   x                           x
                  x x ---------+  +---------- x x
                 x   x         |  |          x   x
                               |  |
         UA1 x x               |  |  +------------ x x UA2
            xxxxx              |  |  |            xxxxx
               |               +  +  +              |
               |            xxxxxxxxxx              |
               |           x          x             |
               +----------+x Internet x+------------+
    UA1        |           x          x             |       UA1 
   Pilot     x |            xxxxxxxxxx              | x    Pilot
  Operator  xxxxx              + + +                xxxxx Operator
   GCS1      x                 | | |                  x    GCS2
             x                 | | |                  x
            x x                | | |                 x x
           x   x               | | |                x   x
                               | | |
             +----------+      | | |       +----------+
             |          |------+ | +-------|          |
             | Public   |        |         | Private  |
             | Registry |     +-----+      | Registry |
             |          |     | DNS |      |          |
             +----------+     +-----+      +----------+

]]></artwork></figure>

<t>DRIP will enable leveraging existing Internet resources (standard
protocols, services, infrastructure, and business models) to meet UAS
RID and closely related needs.  DRIP will specify how to apply IETF
standards, complementing <xref target="F3411-19"/> and other external standards, to
satisfy UAS RID requirements.  DRIP will update existing and develop
new protocol standards as needed to accomplish the foregoing.</t>

<t>This document will outline the UAS RID architecture into which DRIP
must fit and the architecture for DRIP itself.  This includes
presenting the gaps between the CAAs' Concepts of Operations and
<xref target="F3411-19"/> as it relates to the use of Internet technologies and UA
direct RF communications.  Issues include, but are not limited to:</t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Design of trustworthy remote ID and trust in RID messages (<xref target="rid"/>)</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Mechanisms to leverage Domain Name System (DNS: <xref target="RFC1034"/>), 
Extensible Provisioning Protocol (EPP <xref target="RFC5731"/>) and Registration Data Access Protocol (RDAP) (<xref target="RFC7482"/>)
to provide for private (<xref target="privateinforeg"/>) and public (<xref target="publicinforeg"/>) Information Registry.</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Harvesting broadcast remote ID messages for UTM inclusion (<xref target="harvestbridforutm"/>)</t>
  </list></t>
</list></t>

<!-- > * Trustworthy RID Transactions ({{Trustworthy}}) -->

<t><list style='empty'>
  <t><list style="symbols">
    <t>Privacy in RID messages (PII protection) (<xref target="privacyforbrid"/>)</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="conventions" title="Conventions">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown above.</t>

</section>
<section anchor="definitionsandabbr" title="Definitions and Abbreviations">

<section anchor="additional-definitions" title="Additional Definitions">

<t>This document uses terms defined in <xref target="I-D.ietf-drip-reqs"/>.</t>

</section>
<section anchor="abbreviations" title="Abbreviations">

<t>ADS-B:  &#160;&#160;&#160;&#160;&#160;Automatic Dependent Surveillance Broadcast</t>

<t>DSS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Discovery &amp; Synchronization Service</t>

<t>EdDSA: &#160;&#160;&#160;&#160;&#160;Edwards-Curve Digital Signature Algorithm</t>

<t>GCS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Ground Control Station</t>

<t>HHIT:&#160;&#160;&#160;&#160;&#160;&#160;&#160;Hierarchical HIT Registries</t>

<t>HIP: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Host Identity Protocol</t>

<t>HIT: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Host Identity Tag</t>

<t>RID: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Remote ID</t>

<t>Net-RID SP: Network RID Service Provider</t>

<t>Net-RID DP: Network RID Display Provider.</t>

<t>PII: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Personally Identifiable Information</t>

<t>RF: &#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;Radio Frequency</t>

<t>SDSP:&#160;&#160;&#160;&#160;&#160;&#160;&#160;Supplemental Data Service Provider</t>

<t>UA: &#160;&#160;&#160;&#160;&#160;&#160;&#160; Unmanned Aircraft</t>

<t>UAS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;Unmanned Aircraft System</t>

<t>USS: &#160;&#160;&#160;&#160;&#160;&#160;&#160;UAS Service Supplier</t>

<t>UTM: &#160;&#160;&#160;&#160;&#160;&#160;&#160;UAS Traffic Management</t>

</section>
<section anchor="claims-assertions-attestations-and-certificates" title="Claims, Assertions, Attestations, and Certificates">

<t>This section introduces the terms "Claims", "Assertions", "Attestations", and "Certificates" as used in DRIP.</t>

<t>This is due to the term "certificate" having significant technological and legal baggage associated with it, specifically around X.509
certificates. These types of certificates and Public Key Infrastructure invoke more legal and public policy considerations
than probably any other electronic communication sector. It emerged as a governmental platform for trusted identity management and was
pursued in intergovernmental bodies with links into treaty instruments.</t>

<t>Claims:</t>

<t><list style='empty'>
  <t>A claim in DRIP is a predicate (e.g., "X is Y", "X has property Y", and most importantly "X owns Y" or "X is owned by Y").  One basic use case of a claim is an entity using an HHIT as an identifier, e.g., a UAS using an HHIT as a UAS ID.</t>
</list></t>

<t>Assertions:</t>

<t><list style='empty'>
  <t>An assertion in DRIP is a set of claims.  This definition is borrowed from JWT/CWT.  An HHIT of itself can be seen as an assertion: a claim that the identifier is a handle to an asymmetric keypair owned by the entity, and a claim that the identifier is in the registry specified by the HID embedded in the identifier.</t>
</list></t>

<t>Attestations:</t>

<t><list style='empty'>
  <t>An attestation in DRIP is a signed assertion.  The signer may be a claimant or a third party.  Under DRIP this is normally used when an entity asserts a relationship with another entity, along with other information, and the asserting entity signs the assertion, thereby making it an attestation.</t>
</list></t>

<t>Certificates:</t>

<t><list style='empty'>
  <t>A certificate in DRIP is an attestation, strictly over identity information, signed by a third party.</t>
</list></t>

</section>
</section>
<section anchor="rid" title="HHIT for DRIP Entity Identifier">

<t>This section describes the basic requirements of a DRIP entity identifier per regulation constrains from ASTM <xref target="F3411-19"/> and explains the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable DRIP identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t>

<section anchor="uas-remote-identifiers-problem-space" title="UAS Remote Identifiers Problem Space">
<t>A DRIP entity identifier needs to be "Trustworthy". This means that within the framework of the RID messages, an Observer can establish that the DRIP identifier used does uniquely belong to the UAS.  That the only way for any other UAS to assert this DRIP identifier would be to steal something from within the UAS. The DRIP identifier is self-generated by the UAS (either UA or GCS) and registered with the USS.</t>

<!-- 
Within the limitations of Broadcast RID, this is extremely challenging as:

+ An RID can at most be 20 characters.

+ The ASTM Basic RID message (the message containing the RID) is 25 characters; only 3 characters are currently unused.

> Editor's note 3: double check if this is still BT5's limitaiton. Dowe need to seperate BT4 and BT5?

+ The ASTM Authentication message, with some changes from {{F3411-19}} can carry 224 bytes of payload. -->

<t>The data communication of using Broadcast RID faces extreme challenges due to the limitation of the demanding support for Bluetooth. The ASTM <xref target="F3411-19"/> defines the basic RID message which is expected to contain certain RID data and the Authentication message. The Basic RID message has a maximum payload of 25 bytes and the maximum size allocated by ASTM for the RID is 20 bytes and only 3 bytes are left unused. currently, the authentication maximum payload is defined to be 201 bytes.</t>

<t>Standard approaches like X.509 and PKI will not fit these constraints, even using the new EdDSA <xref target="RFC8032"/> algorithm.
An example of a technology that will fit within these limitations is an enhancement of the Host Identity Tag (HIT) of HIPv2 <xref target="RFC7401"/> using Hierarchical HITs (HHITs) for UAS RID is outlined in HHIT based UAS RID <xref target="I-D.ietf-drip-rid"/>. As PKI with X.509 is being used in other systems with which UAS RID must interoperate (e.g. Discovery and Synchronization Service and any other communications involving USS) mappings between the more flexible but larger X.509 certificates and the HHIT-based structures must be devised.</t>

<t>By using the EdDSA HHIT suite, the self-attestations of the RID can be done in as little as 84 bytes.  Third-party Certificates can be done in 200 bytes.  An Observer would need Internet access to validate a self-attestations claim.  A third-party Certificate can be validated via a small credential cache in a disconnected environment.  This third-party Certificate is possible when the third-party also uses HHITs for its identity and the UA has the public key and the Certificate for that HHIT.</t>

</section>
<section anchor="hit-as-a-trustworthy-drip-entity-identifier" title="HIT as A Trustworthy DRIP Entity Identifier">

<t>For a Remote ID to be trustworthy in the Broadcast mode, it is better to have an asymmetric keypair for proof of ID ownership.  The common method of using a key signing operation to assert ownership of an ID, does not guarantee name uniqueness.  Any entity can sign an ID, claiming ownership.  To mitigate spoofing risks, the ID needs to be cryptographically generated from the public key, in such a manner that it is statistically hard for an entity to create a public key that would generate (spoof) the ID.  Thus the signing of such an ID becomes an a proof (verifiable attestation, versus mere claim) of ownership.</t>

<t>HITs are statistically unique through the cryptographic hash feature of second-preimage resistance.  The cryptographically-bound addition of the Hierarchy and an HHIT registration process (e.g. based on Extensible Provisioning Protocol, <xref target="RFC5730"/>) provide complete, global HHIT uniqueness.  This is in contrast to general IDs (e.g. a UUID or device serial number) as the subject in an X.509 certificate.</t>

</section>
<section anchor="hhit-for-drip-identifier-registration-and-lookup" title="HHIT for DRIP Identifier Registration and Lookup">

<t>DRIP identifiers need a deterministic lookup mechanism that rapidly provides
actionable information about the identified UA.  The identifier itself needs to
be the inquiry input into the lookup given the constraints imposed by some of the
broadcast media.  This can best be achieved by an Identifier registration
hierarchy cryptographically embedded within the Identifier.</t>

<t>A HHIT itself consists of a registration hierarchy, the hashing crypto suite information, and the hash of these items along with the underlying public key.  Additional information, e.g. an IPv6 prefix, can enhance the HHITs use beyond the basic Remote ID function (e.g use in HIP, <xref target="RFC7401"/>).</t>

<t>Therefore, a DRIP identifier can be represented as a HHIT.<vspace />
It can be self-generated by a UAS (either UA or GCS) and registered with the Private
Information Registry (More details in <xref target="privateinforeg"/>) identified in its hierarchy fields.
Each DRIP identifier represented as an HHIT can not be used more than once.</t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived
HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT can only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (more details in  <xref target="sc"/>).</t>

<t>In another case, a UAS equipped for Broadcast RID can be provisioned not only with
its HHIT but also with the HI public key from which the HHIT was
derived and the corresponding private key, to enable message
signature.  A UAS equipped for Network RID can be provisioned
likewise; the private key resides only in the ultimate source
of Network RID messages (i.e. on the UA itself if the GCS is merely
relaying rather than sourcing Network RID messages).  Each Observer
device can be provisioned either with public keys of the DRIP identifier root
registries or certificates for subordinate registries.</t>

<t>The Operators, Private Information Registries as well as other UTM entities can possess UAS ID style HHITs.  When present, such
HHITs can be used with HIP to strongly mutually authenticate and optionally encrypt communications.</t>

</section>
<section anchor="hhit-for-drip-identifier-cryptographic" title="HHIT for DRIP Identifier Cryptographic">

<t>The only (known to the authors of this document at the time of its writing) extant fixed-length ID cryptographically derived from a public key are the Host Identity Tag <xref target="RFC7401"/>, HITs, and Cryptographically Generated Addresses <xref target="RFC3972"/>, CGAs. However, both HITs and CGAs lack registration/retrieval capability. HHIT, on the other hand, is capable of providing a cryptographic hashing function, along with a registration process to mitigate the probability of a hash collision (first registered, first allowed).</t>

<!-- Both lack a registration/retrieval capability and CGAs have only
a limited crypto agility {{RFC4982}}. Distributed Hash Tables have been
tried for HITs {{RFC6537}}; this is really not workable for a globally
deployed UAS Remote ID scheme.

The security of HHITs is achieved through the cryptographic
hashing function of the above information, along with a registration
process to mitigate the probability of a hash collision (first
registered, first allowed). -->

</section>
</section>
<section anchor="ei" title="DRIP Identifier Registration and Registries">
<!-- 
The DRIP HHIT RID registration goes beyond what is currently
envisioned in UTM for the UAS to USS registration/subscription process. -->

<t>UAS registries can hold both public and private UAS information resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in
different registries. A DRIP identifier is amenable to handling as an Internet domain name (at an arbitrary level in the hierarchy). It also can be registered in at least a pseudo-domain (e.g. .ip6.arpa for reverse lookup), or as a sub-domain (for forward lookup). This section introduces the public and private information registries for DRIP identifiers.</t>

<!-- This DNS information MAY be protected with DNSSEC.  Its access SHOULD be protected with a secure DNS transport (e.g. DNS over TLS). -->

<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background" title="Background">

<t>The public registry provides trustable information such as attestations of RID ownership and HDA registration.  Optionally, pointers to the repositories for the HDA and RAA implicit in the RID can be included (e.g. for HDA and RAA HHIT|HI used in attestation signing
operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UAS that only use Network RID, is only available via an Observer's Net-RID DP that would tend to provide all public registry information directly.  The Observer can visually "see" these UAS, but they are silent to the Observer; the Net-RID DP is the only source of information based on a query for an airspace volume.<vspace />
<!-- Thus there is no need for information on them in a Public Registry. --></t>

</section>
<section anchor="proposed-approach" title="Proposed Approach">

<t>A DRIP public information registry can respond to standard DNS queries, in the definitive public Internet DNS hierarchy.<vspace />
<!-- It MUST support NS, MX, SRV, TXT, AAAA, PTR, CNAME and HIP RR (the last per {{RFC8005}}) types.   -->
If a DRIP public information registry lists, in a HIP RR, any HIP RVS servers for a given DRIP identifier, those RVS servers can restrict relay services per AAA policy; this requires extensions to <xref target="RFC8004"/>.  These public information registries can use secure DNS transport (e.g. DNS over TLS) to deliver public information that is not inherently trustable (e.g. everything other than attestations).</t>

</section>
</section>
<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background-1" title="Background">
<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.<vspace />
<!-- This information SHOULD be available for ALL UAS, including those that only use Network RID.   -->
A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure and business models, by fitting into an ID structure compatible with DNS names.  This implies some sort of hierarchy, for scalability, and management of this hierarchy.  It is expected that the private registry function will be provided by the same organizations that run USS, and likely integrated with USS.</t>

</section>
<section anchor="proposed-approach-1" title="Proposed Approach">

<t>A DRIP private information registry can support essential Internet domain name registry operations (e.g. add, delete, update, query) using interoperable open standard protocols.  It can also support the Extensible Provisioning Protocol (EPP) and the Registry Data Access
Protocol (RDAP) with access controls.<vspace />
<!-- It MAY use XACML to specify those access controls. -->
It might be listed in a DNS: that DNS could be private; but absent any compelling reasons for use of private DNS, a public DNS hierarchy needs to be in place. The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC7484"/>.  A DRIP private information registry can also support WebFinger as specified in <xref target="RFC7033"/>.</t>

</section>
</section>
</section>
<section anchor="harvestbridforutm" title="Harvesting Broadcast Remote ID messages for UTM Inclusion">

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow RID requirements for small UAS
to be satisfied with the operator's choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for UAS of
essentially all UAS and is now also considering Network RID.  The FAA
RID Final Rules only specifies Broadcast RID for UAS, however, still encourages Network RID for complementary functionality, especially in support of UTM.</t>

<t>One obvious opportunity is to enhance the
architecture with gateways from Broadcast RID to Network RID. This
provides the best of both and gives regulators and operators
flexibility.  It offers considerable enhancement over some Network RID
options such as only reporting planned 4D operation space by the
operator.</t>

<t>These gateways could be pre-positioned (e.g. around
airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing
more than a smartphone with a suitable app is needed).  As Broadcast
RID media have limited range, gateways receiving messages claiming
locations far from the gateway can alert authorities or a SDSP to the
failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position
stamps from the gateways to multilaterate UA location, independent of
the locations claimed in the messages (which may have a natural time lag
as it is), which are entirely operator self-reported in UAS RID and UTM.</t>

<t>Further, gateways with additional sensors (e.g. smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the RID messages.  This Crowd Sourced Remote ID
(CS-RID) would be a significant enhancement, beyond baseline DRIP
functionality; if implemented, it adds two more entity types.</t>

<section anchor="the-cs-rid-finder" title="The CS-RID Finder">
<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into the UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from, a Broadcast RID receiver.  However, it can not interface directly with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a TBD interface to a CS-RID SDSP; this interface needs to be based upon but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="the-cs-rid-sdsp" title="The CS-RID SDSP">

<t>A CS-RID SDSP would appear (i.e. present the same interface) to a Net-RID SP as a Net-RID DP. A CS-RID SDSP can not present a standard GCS-facing interface as if it were a Net-RID SP. A CS-RID SDSP would present a TBD interface to a CS-RID Finder; this interface can be based upon but readily distinguishable between a GCS and a Net-RID SP.</t>

<!-- 
# DRIP Transactions Enabling Trustworthy #  {#Trustworthy}

The UTM (U-SPACE) architecture leaves much about all the
operators/UAS to the various USS.  Each CAA will have some registration requirements on operators (FAA part 107 is considered very minimal by some CAA), along with some UAS and operation registration.  DRIP leverages this model with Identities for each component that augment the DRIP RID and transactions to support these Identities.

To this end, in DRIP, each Operator MUST generate a Host Identity of the
Operator (HIo) and derived Hierarchical HIT of the Operator (HHITo).
These are registered with a Private Information Registry along with
whatever Operator data (inc. PII) is required by the cognizant CAA
and the registry.  In response, the Operator will obtain a Certificate
from the Registry, an Operator (Cro), signed with the Host Identity of
the Registry private key (HIr(priv)) proving such registration.

An Operator may now add a UA.

*  An Operator MUST generate a Host Identity of the Aircraft (HIa) and derived Hierarchical HIT of the Aircraft (HHITa)

*  Create a Certificate from the Operator on the Aircraft (Coa)
signed with the Host Identity of the Operator private key (HIo(priv)) to
associate the UA with its Operator

*  Register them with a Private Information Registry along with
whatever UAS data is required by the cognizant CAA and the registry

*  Obtain a Certificate from the Registry on the Operator and
Aircraft ("Croa") signed with the HIr(priv) proving such registration

*  And obtain a Certificate from the Registry on the Aircraft
(Cra) signed with HIr(priv) proving UA registration in that specific registry
while preserving Operator privacy.

The operator then MUST provision the UA with HIa, HIa(priv), HHITa
and Cra.

*  UA engaging in Broadcast RID MUST use HIa(priv) to sign Auth
Messages and MUST periodically broadcast Cra.

*  UAS engaging in Network RID MUST use HIa(priv) to sign Auth
Messages.

*  Observers  MUST use HIa from received Cra to verify received
Broadcast RID Auth messages.

*  Observers  without Internet connectivity MAY use Cra to
identify the trust class of the UAS based on known registry vetting.

*  Observers  with Internet connectivity MAY use HHITa to perform
lookups in the Public Information Registry and MAY then query the Private Information Registry which MUST enforce AAA policy on Operator PII and other
sensitive information -->

</section>
</section>
<section anchor="privacyforbrid" title="Privacy for Broadcast PII">
<!-- 

This may be information
about the UA such as its destination or Operator information such as
GCS location.  There is no absolute "right" in hiding PII, as there
will be times (e.g., disasters) and places (buffer zones around
airports and sensitive facilities) where policy may mandate all
information be sent as cleartext.  Otherwise, the modern general
position (consistent with, e.g., the EU General Data Protection
Regulation) is to hide PII unless otherwise instructed.  While some
have argued that a system like that of automobile registration plates
should suffice for UAS, others have argued persuasively that each
generation of new identifiers should take advantage of advancing
technology to protect privacy, to the extent compatible with the
transparency needed to protect safety. -->

<t>Broadcast RID messages can contain PII.  A viable architecture for PII protection would be symmetric
encryption of the PII using a key known to the UAS and its USS.
An authorized Observer could send the encrypted PII along with the
UAS ID (to entities such as USS of the Observer, or to the UAS in which the UAS ID is registered if that can be determined from the UAS ID itself or to a Public Safety USS) to get the plaintext.
Alternatively, the authorized Observer can receive the key to
directly decrypt all future PII content from the UA.</t>

<t>PII can be protected unless the UAS is informed otherwise.  This could
come from operational instructions to even permit flying in a space/time.
It can be special instructions at the start or during an operation.
PII protection can not be used if the UAS loses connectivity to
the USS.  The UAS always has the option to abort the operation if PII
protection is disallowed.</t>

<t>An authorized Observer can instruct a UAS via the USS that conditions
have changed mandating no PII protection or land the UA (abort the
operation).</t>

<!-- # IANA Considerations # 

This document does not make any request to IANA. -->

</section>
<section anchor="sc" title="Security Considerations">

<t>The security provided by asymmetric
cryptographic techniques depends upon protection of the private keys.
A manufacturer that embeds a private key in an UA may have retained a
copy.  A manufacturer whose UA are configured by a closed source
application on the GCS which communicates over the Internet with the
factory may be sending a copy of a UA or GCS self-generated key back
to the factory.  Keys may be extracted from a GCS or UA. The RID
sender of a small harmless UA (or the entire UA) could be carried by
a larger dangerous UA as a "false flag."  Compromise of a registry
private key could do widespread harm.  Key revocation procedures are
as yet to be determined.  These risks are in addition to those
involving Operator key management practices.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">
<t>The work of the FAA's UAS Identification and Tracking (UAS ID)
Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in
balancing the interests of diverse stakeholders is essential to the
necessary rapid and widespread deployment of UAS RID.  IETF
volunteers who have contributed to this draft include Amelia
Andersdotter and Mohamed Boucadair.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-drip-reqs">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements</title>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document defines terminology and requirements for Drone Remote Identification Protocol (DRIP) Working Group protocols to support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety and other purposes.  Complementing external technical standards as regulator-accepted means of compliance with UAS RID regulations, DRIP will:  facilitate use of existing Internet resources to support UAS RID and to enable enhanced related services;  enable online and offline verification that UAS RID information is trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-reqs-06.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC8032" target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<author initials='I.' surname='Liusvaara' fullname='I. Liusvaara'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference  anchor="RFC7482" target='https://www.rfc-editor.org/info/rfc7482'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author initials='A.' surname='Newton' fullname='A. Newton'><organization /></author>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2015' month='March' />
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP).</t></abstract>
</front>
<seriesInfo name='RFC' value='7482'/>
<seriesInfo name='DOI' value='10.17487/RFC7482'/>
</reference>


<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>UAS RID requirement study</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>




<reference  anchor="RFC7033" target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author initials='P.' surname='Jones' fullname='P. Jones'><organization /></author>
<author initials='G.' surname='Salgueiro' fullname='G. Salgueiro'><organization /></author>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Smarr' fullname='J. Smarr'><organization /></author>
<date year='2013' month='September' />
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference  anchor="RFC7401" target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials='R.' surname='Moskowitz' fullname='R. Moskowitz' role='editor'><organization /></author>
<author initials='T.' surname='Heer' fullname='T. Heer'><organization /></author>
<author initials='P.' surname='Jokela' fullname='P. Jokela'><organization /></author>
<author initials='T.' surname='Henderson' fullname='T. Henderson'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference  anchor="RFC7484" target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author initials='M.' surname='Blanchet' fullname='M. Blanchet'><organization /></author>
<date year='2015' month='March' />
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference  anchor="RFC8004" target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author initials='J.' surname='Laganier' fullname='J. Laganier'><organization /></author>
<author initials='L.' surname='Eggert' fullname='L. Eggert'><organization /></author>
<date year='2016' month='October' />
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference  anchor="RFC5731" target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference  anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference  anchor="RFC5730" target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2009' month='August' />
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference  anchor="RFC3972" target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author initials='T.' surname='Aura' fullname='T. Aura'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor="I-D.ietf-drip-rid">
<front>
<title>UAS Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='December' day='31' year='2020' />

<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses and thereby a trustable Identifier for use as the UAS Remote ID.  HHITs self-attest to the included explicit hierarchy that provides Registrar discovery for 3rd-party ID attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-rid-06.txt' />
</reference>




    </references>


<section anchor="overview-of-unmanned-aircraft-systems-uas-traffic-management-utm" title="Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)">

<section anchor="operation-concept" title="Operation Concept">
<t>The National Aeronautics and Space Administration (NASA) and FAAs'
effort of integrating UAS's operation into the national airspace
system (NAS) leads to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 is published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual development and implementation are conducted by
the UTM research transition team which is the joint workforce by FAA
and NASA.  World efforts took place afterward.  The Single European
Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published the UTM concept of operations to
guide the development of their future air traffic management (ATM)
system and make sure safe and efficient integrations of manned and
unmanned aircraft into the national airspace.</t>

<t>The UTM composes of UAS operation infrastructure, procedures and
local regulation compliance policies to guarantee UAS's safe
integration and operation.  The main functionality of a UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that a UTM has to offer.  Such Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitor and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS(s) to build a large service coverage map which
can load-balance, relay and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low
Altitude Authorization and Notification Capability <xref target="LAANC"/> program
which is the first system to realize some of the UTM envisioned functionality.
The LAANC program can automate the UAS's flight plan application and
approval process for airspace authorization in real-time by checking
against multiple aeronautical databases such as airspace
classification and fly rules associated with it, FAA UAS facility
map, special use airspace, Notice to Airman (NOTAM), and Temporary
Flight Rule (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and takeoff or land in a
controlled airspace (e.g., Class Bravo, Charlie, Delta and Echo
in United States), the USS where UAS is currently communicating
with is responsible for UAS's registration, authenticating the
UAS's fly plan by checking against designated UAS fly map
database, obtaining the air traffic control (ATC) authorization
and monitor the UAS fly path in order to maintain safe boundary
and follow the pre-authorized route.</t>
  <t>For a UAS participating in UTM and take off or land in an
uncontrolled airspace (ex.  Class Golf in the United States),
pre-fly authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS) operation.  The USS either accepts
or rejects received intended fly plan from the UAS.  Accepted UAS
operation may share its current fly data such as GPS position and
altitude to USS.  The USS may keep the UAS operation status near
real-time and may keep it as a record for overall airspace air
traffic monitor.</t>
</list></t>

</section>
<section anchor="automatic-dependent-surveillance-broadcast-ads-b" title="Automatic Dependent Surveillance Broadcast (ADS-B)">
<t>The ADS-B is the de facto technology used in manned aviation 
for sharing location information, which is
a ground and satellite based system designed in the early 2000s.
Broadcast RID is conceptually similar to ADS-B.  However, for
numerous technical and regulatory reasons, ADS-B itself is not
suitable for low-flying small UA.  Technical reasons include: needing
RF-LOS to large, expensive (hence scarce) ground stations; needing
both a satellite receiver and 1090 MHz transceiver onboard CSWaP
constrained UA; the limited bandwidth of both uplink and downlink,
which are adequate for the current manned aviation traffic volume,
but would likely be saturated by large numbers of UAS, endangering
manned aviation; etc.  Understanding these technical shortcomings,
regulators world-wide have ruled out use of ADS-B for the small UAS
for which UAS RID and DRIP are intended.</t>

<!-- ## Overview UAS Remote ID (RID) and RID Standardization ## 
A RID is an application enabler for a UAS to be identified by a UTM/
USS or third parties entities such as law enforcement.  Many safety
and other considerations dictate that UAS be remotely identifiable. 
CAAs worldwide are mandating UAS RID.  The European Union Aviation
Safety Agency (EASA) has published {{Delegated}} and {{Implementing}}
Regulations.  The FAA has published a Notice of Proposed Rule Making
{{NPRM}}}.  CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.

3GPP provides UA service in the LTE network since release 15 in
published technical specification {{TS-36.777}}.  Start from its
release 16, it completed the UAS RID requirement study in {{TS-22.825}}
and proposed use cases in the mobile network and the services that
can be offered based on RID and ongoing release 17 specification
works on enhanced UAS service requirement and provides the protocol
and application architecture support which is applicable for both 4G
and 5G network.  ATIS's recent report {{ATIS-I-0000074}} proposes
architecture approaches for the 3GPP network to support UAS and one
of which is put RID in higher 3GPP protocol stack such as using ASTM
remote ID {{F3411-19}}. -->

<!-- # Architectural implications of EASA requirements #

According to EASA, in EU broadcasting drone identification will be
mandatory from July 2020.  Following info should be sent in cleartext
over Wifi or Bluetooth.  In real time during the whole duration of
the flight, the direct periodic broadcast from the UA using an open
and documented transmission protocol, of the following data, in a way
that they can be received directly by existing mobile devices within
the broadcasting range:

* the UAS operator registration number;

* the unique physical serial number of the UA compliant with
standard ANSI/CTA2063;

* the geographical position of the UA and its height above the
surface or take-off point;

* the route course measured clockwise from true north and ground
speed of the UA; and

* the geographical position of the remote pilot or, if not
available, the take-off point;

The architecture proposed in this document partially satisfies EASA
requirements.  In particular, i) is included to Operator-ID Message
as optional. ii) cannot be directly supported due to its heavy
privacy implications.  A cryptographic identifier that needs to be
resolved is proposed instead. iii) and iv) are included into
Location/Vector Message. v) is included into a System Message
(optional). -->

<!-- Table template
| Column-1 |  | Column-2 | | Column-3 |
| value-1  |  | value-2  | | value-3  |
 -->

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

