<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-moskowitz-drip-crowd-sourced-rid-05" category="std" submissionType="IETF" xml:lang="en" obsoletes="" updates="">

  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <region>CA</region>
          <code>94306</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date year="2020"/>

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes using the ASTM Broadcast Remote ID (B-RID)
specification in a “crowd sourced” smart phone environment to
provide much of the FAA mandated Network Remote ID (N-RID)
functionality.  This crowd sourced B-RID data will use
multilateration to add a level of reliability in the location data
on the Unmanned Aircraft (UA).  The crowd sourced environment will
also provide a monitoring coverage map to authorized observers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document defines a mechanism to capture the ASTM Broadcast
Remote ID messages (B-RID) <xref target="F3411-19"/> on any
Internet connected device that receives
them and can forward them to the SDSP(s) responsible for the
geographic area the UA and receivers are in.  This will create a
ecosystem that will meet most if not all data collection
requirements that CAAs are placing on Network Remote ID (N-RID).</t>

<t>These Internet connected devices are herein called “Finders”, as
they find UAs by listening for B-RID messages.  The Finders are
B-RID forwarding proxies.  Their potentially limited spacial view
of RID messages could result in bad decisions on what messages to
send to the SDSP and which to drop.  The SDSP will make any
filtering decisions in what it forwards to the UTM(s).</t>

<t>Finders can be smartphones, tablets, connected cars, or any
computing platform with Internet connectivity that can meet the
requirements defined in this document.  It is not expected, nor
necessary, that Finders have any information about a UAS beyond the
content in the B-RID messages.</t>

<t>Finders MAY only need a loose association with the SDSP(s).  They
may only have the SDSP’s Public Key and FQDN.  It would use these,
along with the Finder’s Public Key to use ECIES, or other security
methods, to send the messages in a secure manner to the SDSP.  The
SDSP MAY require a stronger relationship to the Finders.  This may
range from the Finder’s Public Key being registered to the SDSP
with other information so that the SDSP has some level of trust in
the Finders to requiring transmissions be sent over long-lived
transport connections like ESP or DTLS.</t>

<t>This document has minimal information about the actions of SDSPs.
In general the SDSP is out of scope of this document. That said,
the SDSPs should not simply proxy B-RID messages to the UTM(s).
They should perform some minimal level of filtering and content
checking before forwarding those messages that pass these tests in
a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based
on location of active Finders.  UTMs may use this information to
notify authorized observers of where this is and there is not
monitoring coverage.  They may also use this information of where
to place pro-active monitoring coverage.</t>

<t>An SDSP SHOULD only forward Authenticated B-RID messages like those
defined in <xref target="tmrid-auth"/> to the UTM(s).  Further, the SDSP SHOULD
validate the Remote ID (RID) and the Authentication signature
before forwarding anything from the UA.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA,
the SDSP is in a unique position to perform multilateration on
these messages and compute the Finder’s view of the UA location to
compare with the UA Location/Vector messages.  This check against
the UA’s location claims is both a validation on the UA’s
reliability as well as the trustworthiness of the Finders.  Other
than providing data to allow for multilateration, this SDSP feature
is out of scope of this document.</t>

<section anchor="draft-status" title="Draft Status">

<t>This draft is still incomplete.  New features are being added as
capabilities are researched.  The actual message formats also still
need work.</t>

</section>
</section>
<section anchor="terms" title="Terms and Definitions">

<section anchor="requirements-terminology" title="Requirements Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="definitions" title="Definitions">

<t><list style="hanging">
  <t hangText='B-RID:'><vspace blankLines='0'/>
  Broadcast Remote ID. A method of sending RID messages as
1-way transmissions from the UA to any Observers within
radio range.</t>
  <t hangText='CAA:'><vspace blankLines='0'/>
  Civil Aeronautics Administration. An example is the Federal
Aviation Administration (FAA) in the United States of
America.</t>
  <t hangText='DAA:'><vspace blankLines='0'/>
  Detect and Avoid. The process of a UA detecting obstacles,
like other UAs and taking the necessary evasive action.</t>
  <t hangText='ECIES:'><vspace blankLines='0'/>
  Elliptic Curve Integrated Encryption Scheme.  A hybrid
encryption scheme which provides semantic security against
an adversary who is allowed to use chosen-plaintext and
chosen-ciphertext attacks.</t>
  <t hangText='GCS:'><vspace blankLines='0'/>
  Ground Control Station. The part of the UAS that the remote
pilot uses to exercise C2 over the UA, whether by remotely
exercising UA flight controls to fly the UA, by setting GPS
waypoints, or otherwise directing its flight.</t>
  <t hangText='Finder:'><vspace blankLines='0'/>
  In Internet connected device that can receive B-RID
messages and forward them to a UTM.</t>
  <t hangText='Observer:'><vspace blankLines='0'/>
  Referred to in other UAS documents as a “user”, but there
are also other classes of RID users, so we prefer
“observer” to denote an individual who has observed an UA
and wishes to know something about it, starting with its
RID.</t>
  <t hangText='Multilateration:'><vspace blankLines='0'/>
  Multilateration (more completely, pseudo range
multilateration) is a navigation and surveillance technique
based on measurement of the times of arrival (TOAs) of
energy waves (radio, acoustic, seismic, etc.) having a
known propagation speed.</t>
  <t hangText='NETSP:'><vspace blankLines='0'/>
  Network RID Service Provider. USS receiving Network RID
messages from UAS (UA or GCS), storing for a short
specified time, making available to NETDP.</t>
  <t hangText='NETDP:'><vspace blankLines='0'/>
  Network RID Display Provider. Entity (might be USS)
aggregating data from multiple NETSPs to answer query from
observer (or other party) desiring Situational Awareness of
UAS operating in a specific airspace volume.</t>
  <t hangText='N-RID:'><vspace blankLines='0'/>
  Network Remote ID. A method of sending RID messages via the
Internet connection of the UAS directly to the UTM.</t>
  <t hangText='RID:'><vspace blankLines='0'/>
  Remote ID. A unique identifier found on all UA to be used
in communication and in regulation of UA operation.</t>
  <t hangText='SDSP:'><vspace blankLines='0'/>
  Supplemental Data Service Provider. Entity providing
information that is allowed, but not required to be present
in the UTM system.</t>
  <t hangText='UA:'><vspace blankLines='0'/>
  Unmanned Aircraft. In this document UA’s are typically
though of as drones of commercial or military variety. This
is a very strict definition which can be relaxed to include
any and all aircraft that are unmanned.</t>
  <t hangText='UAS:'><vspace blankLines='0'/>
  Unmanned Aircraft System. Composed of Unmanned Aircraft and
all required on-board subsystems, payload, control station,
other required off-board subsystems, any required launch
and recovery equipment, all required crew members, and C2
links between UA and the control station.</t>
  <t hangText='UTM:'><vspace blankLines='0'/>
  UAS Traffic Management. A “traffic management” ecosystem
for uncontrolled operations that is separate from, but
complementary to, the FAA’s Air Traffic Management (ATM)
system.</t>
  <t hangText='USS:'><vspace blankLines='0'/>
  UAS Service Supplier. Provide UTM services to support the
UAS community, to connect Operators and other entities to
enable information flow across the USS network, and to
promote shared situational awareness among UTM
participants. (From FAA UTM ConOps V1, May 2018).</t>
</list></t>

</section>
</section>
<section anchor="prob-space" title="Problem Space">

<section anchor="meeting-the-needs-of-network-id" title="Meeting the needs of Network ID">

<t>The Federal (US) Aviation Authority (FAA), in the December 31, 2019
Remote ID Notice of Proposed Rulemaking <xref target="FAA-NPRM"/>, is requiring
“Standard” and “Limited” Remote
ID.  Standard is when the UAS provides both Network and Broadcast
RID.  Limited is when the UAS provides only Network RID.  The FAA
has dropped their previous position on allowing for only Broadcast
RID.  We can guess as to their reasons; they are not spelled out in
the NPRM.  It may be that just B-RID does not meet the FAA’s
statutory UA tracking responsibility.</t>

<t>The UAS vendors have commented that N-RID places considerable
demands on currently used UAS.  For some UAS like RC planes,
meaningful N-RID (via the Pilot’s smartphone) are of limited value.
A mechanism that can augment B-RID to provide N-RID would help all
members of the UAS environment to provide safe operation and allow
for new applications.</t>

</section>
<section anchor="advantages-of-broadcast-remote-id" title="Advantages of Broadcast Remote ID">

<t>B-RID has its advantages over N-RID.</t>

<t><list style="symbols">
  <t>B-RID can more readily be implemented directly in the UA.
N-RID will more frequently be provided by the GCS or a
pilot’s Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over
a direct radio connection, B-RID could be a
straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide B-RID.</t>
    </list></t>
  <t>B-RID can also be used by the UA to assist in Detect and
Avoid (DAA).</t>
  <t>B-RID is available to observers even in situations with no
Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="trustworthiness-of-proxied-data" title="Trustworthiness of Proxied Data">

<t>When a proxy is introduced in any communication protocol, there is
a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for B-RID, are authenticated
to the SDSP (see <xref target="Finder_Sec"/>). The
SDSP can compare the information from multiple Finders to isolate a
Finder sending fraudulent information.  SDSPs can additionally
verify authenticated messages that follow <xref target="tmrid-auth"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see
<xref target="Finder_Manage"/>) to limit DOS attacks
from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages" title="Defense against fraudulent RID Messages">

<t>The strongest defense against fraudulent RID messages is to focus
on <xref target="tmrid-auth"/> conforming messages.  Unless this behavior is
mandated, SPDPs will have to use assorted algorithms to isolate
messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec" title="The Finder - SDSP Security Relationship">

<t>The SDSP(s) and Finders SHOULD use EDDSA <xref target="RFC8032"/> keys as their
trusted Identities.
The public keys SHOULD be registered Hierarchical HITS,
<xref target="hierarchical-hit"/> and <xref target="hhit-registries"/>.</t>

<t>The SDSP uses some process (out of scope here) to register the
Finders and their EDDSA Public Key.  During this registration, the
Finder gets the SDSP’s EDDSA Public Key.  These Public Keys allow
for the following options for authenticated messaging from the
Finder to the SDSP.</t>

<t><list style="numbers">
  <t>ECIES can be used with a unique nonce to authenticate each
  message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to
  establish a shared secret that is then used to authenticate
  each message sent from a Finder to the SDSP sent during
  that period.</t>
  <t>HIPv2 <xref target="RFC7401"/> can be used to
  establish a session secret that is then used with ESP <xref target="RFC4303"/>
  to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/>  can be used to establish
  a secure connection that is then used to authenticate each
  message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="Finder_Map" title="The Finder Map">

<t>The Finders are regularly providing their SDSP with their location.
This is through the B-RID Proxy Messages and Finder Location Update
Messages.  With this information, the SDSP can maintain a
monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage" title="Managing Finders">

<t>Finder density will vary over time and space.  For example,
sidewalks outside an urban train station can be packed with
pedestrians at rush hour, either coming or going to their commute
trains.  An SDSP may want to proactively limit the number of active
Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to
NOT proxy B-RID messages.  These Finders will continue to report
their location and through that reporting, the SDSP can instruct
them to again take on the proxying role.  For example a Finder
moving slowly along with dozens of other slow-moving Finders may be
instructed to suspend proxying.  Whereas a fast-moving Finder at
the same location (perhaps a connected car or a pedestrian on a
bus) would not be asked to suspend proxying as it will soon be out
of the congested area.</t>

</section>
</section>
<section anchor="CSRID_messages" title="The CS-RID Messages">

<t>The CS-RID messages between the Finders and the SDSPs primarily
support the proxy role of the Finders in forwarding the B-RID
messages.  There are also Finder registration and status messages.</t>

<t>CS-RID information is represented in CBOR <xref target="RFC7049"/>.
The CDDL <xref target="RFC8610"/> specification is used for CS-RID message description</t>

<t>CS-RID MAC and COAP <xref target="RFC7252"/> for the CS-RID protocol.</t>

<t>The following is a general representation of the content in the
CS-RID messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID MESSAGE CONTENT,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The CS-RID MESSAGE CONTENT varies by MESSAGE TYPE.</t>

<section anchor="CS-RID_MESSAGE_TYPE" title="CS-RID MESSAGE TYPE">

<t>The CS-RID MESSAGE TYPE is defined in <xref target="csrid-message"/>:</t>

<figure anchor="csrid-message"><artwork><![CDATA[
  Number   CS-RID Message Type
  ------   -----------------
  0        Reserved
  1        B-RID Forwarding
  2        Finder Registration
  3        SDSP Response
  4        Finder Location
]]></artwork></figure>

<section anchor="cddl-description-for-cs-rid-message-type" title="CDDL description for CS-RID message type">

<t>The overall CS-RID CDDL description is structured in <xref target="csrid-object"/>.</t>

<figure anchor="csrid-object"><artwork><![CDATA[
CSRID_Object = {
  application-context,
  info                => info_message,
  proxy_message       => broadcast_rid_proxy_message,
  finder_registration => finder_registration_message,
  sdsp_response       => sdsp_response_message,
  location_update     => location_update_message,
}

info_message = {
  common_message_members,
  message_content => tstr,
}

common_message_members = (
  message_type  => message_types,
  mac_address   => #6.37(bstr),
)

message_types = &(
  Reserved            : 0,
  BRD                 : 1,
  Finder-Registration : 2,
  SDSP-Response       : 3,
  Finder-Location     : 4,
)
]]></artwork></figure>

<t>The application context rule is defined in <xref target="csrid-app-context"/> for
CS-RID application identification and version negotiation.</t>

<figure anchor="csrid-app-context"><artwork><![CDATA[
application-context = (
  application => "DRIP-CSRID",
  ? version => uint .size(1..2),
)
]]></artwork></figure>

<t>The predefined CDDL text string labels (author note: for JSON currently, will move to CBOR uint keys in upcoming versions) used in the specification is listed in <xref target="csrid-variables"/>.</t>

<figure anchor="csrid-variables"><artwork><![CDATA[
application           = "application"
version               = "version"
info                  = "message_info"
proxy_message         = "proxy_message-type"
finder_registration   = "finder_registration"
sdsp_response         = "sdsp_response"
location_update       = "location_update"
rid                   = "id"
message_type          = "message_type"
mac_address           = "mac_address"
message_content       = "message_content"
timestamp             = "timestamp"
gps                   = "gps"
radio_type            = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message     = "broadcast_message"
sdsp_id               = "sdsp_id"
proxy_status_type     = "proxy_status_type"
update_interval       = "update_interval"
]]></artwork></figure>

</section>
</section>
<section anchor="CSRID_proxy" title="The CS-RID B-RID Proxy Message">

<t>The Finders add their own information to the B-RID messages,
permitting the SDSP(s) to gain additional knowledge about the
UA(s).  The RID information is the B-RID message content plus the
MAC address.  The MAC address is critical, as it is the only
field that links a UA’s B-RID messages together.  Only the ASTM
Basic ID Message and possibly the Authentication Message contain
the UAS ID field.</t>

<t>The Finders add an SDSP assigned ID, a 64 bit timestamp, GPS
information, and type of B-RID media to the B-RID message.  Both
the timestamp and GPS information are for when the B-RID
message(s) were received, not forwarded to the SDSP.  All this
content is MACed using a key shared between the Finder and SDSP.</t>

<t>The following is a representation of the content in the CS-RID
messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    RECEIVE TIMESTAMP,
    RECEIVE GPS,
    RECEIVE RADIO TYPE,
    B-RID MAC ADDRESS,
    B-RID MESSAGE,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="CS-RID_ID" title="CS-RID ID">

<t>The CS-RID ID is the ID recognized by the SDSP.  This may be an
HHIT <xref target="hierarchical-hit">Hierarchical HITs</xref>, or any ID used by the SDSP.</t>

</section>
<section anchor="cddl-description-for-cs-rid-b-rid-proxy-message" title="CDDL description for CS-RID B-RID Proxy Message">

<t>The broadcast CS-RID proxy CDDL is defined in <xref target="csrid-brid-proxy"/></t>

<figure anchor="csrid-brid-proxy"><artwork><![CDATA[
broadcast_rid_proxy_message = {
  common_message_members,
  rid                   => tstr,
  timestamp             => tdate,
  gps                   => gps-coordinates,
  radio_type            => radio_types,
  broadcast_mac_address => #6.37(bstr),
  broadcast_message     => #6.37(bstr),
}

radio_types = &(
  EFL : 0,
  VLF : 1,
  LF  : 2,
  MF  : 3,
  HF  : 4,
  HF  : 5,
  VHF : 6,
  UHF : 7,
  SHF : 8,
  EHF : 9,
)

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Reg" title="CS-RID Finder Registration">

<t>The CS-RID Finder MAY use <xref target="RFC7401">HIPv2</xref> with
the SDSP to establish a Security Association and a shared secret to
use for the CS-RID MAC generation.  In this approach, the HIPv2
mobility functionality and <xref target="RFC4303">ESP</xref> support are not used.</t>

<t>When HIPv2 is used as above, the Finder Registration is a SDSP
“wake up”.  It is sent prior to the Finder sending any proxied
B-RID messages to ensure that the SDSP is able to receive and
process the messages.</t>

<t>In this usage, the CS-RID is the Finder HIT.  If the SDSP has lost
state with the Finder, it initiates the HIP exchange with the
Finder to reestablish HIP state and a new shared secret for the
CS-RID B-RID Proxy Messages.  In this case the Finder Registration
Message is:</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-finder-registration" title="CDDL description for Finder Registration">
<t>The CDDL for CS-RID Finder Registration is defined in <xref target="csrid-finder-registration"/></t>

<figure anchor="csrid-finder-registration"><artwork><![CDATA[
finder_registration_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="SDSP_Reg_R" title="CS-RID SDSP Response">

<t>The SDSP MAY respond to any Finder messages to instruct the Finder on its
behavior.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID ID,
    CS-RID PROXY STATUS,
    CS-RID UPDATE INTERVAL,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The Proxy Status instructs the Finder if it should actively proxy
B-RID messages, or suspend proxying and only report its location.</t>

<t>The Update Interval is the frequency that the Finder SHOULD notify
the SDSP of its current location using the Location Update message.</t>

<section anchor="cddl-description-for-sdsp-response" title="CDDL description for SDSP Response">

<t>The CDDL for CS-RID SDSP response is defined in <xref target="csrid-sdsp-response"/></t>

<figure anchor="csrid-sdsp-response"><artwork><![CDATA[
sdsp_response_message = {
  common_message_members,
  sdsp_id           => tstr,
  rid               => tstr,
  proxy_status_type => proxy_status_types,
  update_interval   => uint,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]

proxy_status_types = &(
  0: "forward",
  1: "reverse",
  2: "bi-directional",
)
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Upd" title="CS-RID Location Update">

<t>The Finder SHOULD provide regular location updates to the SDSP. The
interval is based on the Update Interval from <xref target="SDSP_Reg_R"/> plus a random slew less than
1 second.  The Location Update message is only sent when no other
CS-RID messages, containing the Finder’s GPS location, have been
sent since the Update Interval.</t>

<t>If the Finder has not recieved a SDSP Registration Response, a
default of 5 minutes is used for the Update Interval.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-location-update" title="CDDL description for Location Update">

<t>The CDDL for CS-RID Location update is defined in <xref target="csrid-location-update"/></t>

<figure anchor="csrid-location-update"><artwork><![CDATA[
location_update_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="the-full-cs-rid-cddl-specification" title="The Full CS-RID CDDL specification">

<figure><artwork type="CDDL"><![CDATA[
<CODE BEGINS>
; CDDL specification for Crowd source RID
; It specifies a collection of CS message types
;

;
; The CSRID overall data structure

CSRID_Object = {
    application-context,
    info =>  info_message,
    proxy_message => broadcast_rid_proxy_message,
    finder_registration => finder_registration_message,
    sdsp_response => sdsp_response_message,
    location_update => location_update_message,
}

;
; Application context: general information about CSRID message 

application-context = (
    application => "DRIP-CSRID", ; TBD: consider CBOR tag 
    ? version => uint .size(1..2),
)

; These members are include in every message
common_message_members = (
    message_type => message_types,
    mac_address => #6.37(bstr),
)

;
; CSRID message general information

info_message = {
    common_message_members,
    message_content => tstr,
}

broadcast_rid_proxy_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
    radio_type => radio_types,
    broadcast_mac_address => #6.37(bstr)
    broadcast_message => #6.37(bstr)
}

finder_registration_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

sdsp_response_message = {
    common_message_members,
    sdsp_id => tstr,
    rid => tstr,
    proxy_status_type => proxy_status_types,
    update_interval => uint,
}

location_update_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

;
; Common rule definition

message_types = &(
    Reserved            : 0,
    BRD                 : 1,
    Finder-Registration : 2,
    SDSP-Response       : 3,
    Finder-Location     : 4,
)

gps-coordinates = [
    lat: float,
    long: float,
]

; Radio types, choose from one of radio_types (required)
radio_types = &(
    EFL : 0,
    VLF : 1,
    LF  : 2,
    MF  : 3,
    HF  : 4,
    HF  : 5,
    VHF : 6,
    UHF : 7,
    SHF : 8,
    EHF : 9,
)

proxy_status_types = &(
    0: "forward",
    1: "reverse",
    2: "bi",
)

;
; JSON label names

application = "application"
version = "version"
info = "message_info"
proxy_message = "proxy_message-type"
finder_registration = "finder_registration"
sdsp_response = "sdsp_response"
location_update = "location_update"
rid = "id"
message_type = "message_type"
mac_address = "mac_address"
message_content = "message_content"
timestamp = "timestamp"
gps = "gps"
radio_type = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message = "broadcast_message"
sdsp_id = "sdsp_id"
proxy_status_type = "proxy_status_type"
update_interval = "update_interval"
 
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="IANA" title="IANA Considerations">

<t>TBD</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

<section anchor="privacy-concerns" title="Privacy Concerns">

<t>TBD</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC8610" target='https://www.rfc-editor.org/info/rfc8610'>
<front>
<title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
<author initials='H.' surname='Birkholz' fullname='H. Birkholz'><organization /></author>
<author initials='C.' surname='Vigano' fullname='C. Vigano'><organization /></author>
<author initials='C.' surname='Bormann' fullname='C. Bormann'><organization /></author>
<date year='2019' month='June' />
<abstract><t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8610'/>
<seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="FAA-NPRM" target="https://www.regulations.gov/docket?D=FAA-2019-1100">
  <front>
    <title>FAA Remote ID Notice of Proposed Rule Making</title>
    <author >
      <organization>Federal (US) Aviation Authority</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>




<reference anchor="tmrid-auth">
<front>
<title>TM-RID Authentication Formats</title>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<date month='February' day='18' year='2020' />

<abstract><t>This document describes how to include trust into the proposed ASTM Remote ID specification defined in WK65041 by the F38 Committee under a Broadcast Remote ID (RID) scenario.  It defines a few different message schemes (based on the authentication message) that can be used to assure past messages sent by a UA and also act as an assurance for UA trustworthiness in the absence of Internet connectivity at the receiving node.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-wiethuechter-tmrid-auth-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-wiethuechter-tmrid-auth-05.txt' />
</reference>



<reference anchor="hierarchical-hit">
<front>
<title>Hierarchical HITs for HIPv2</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='May' day='13' year='2020' />

<abstract><t>This document describes using a hierarchical HIT to facilitate large deployments of managed devices.  Hierarchical HITs differ from HIPv2 flat HITs by only using 64 bits for mapping the Host Identity, freeing 32 bits to bind in a hierarchy of Registering Entities that provide services to the consumers of hierarchical HITs.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hierarchical-hit-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hierarchical-hit-05.txt' />
</reference>



<reference anchor="hhit-registries">
<front>
<title>Hierarchical HIT Registries</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document describes using the registration protocol and registries to support hierarchical HITs (HHITs).  New and existing HIP parameters are used to communicate Registry Policies and data about the HHIT device and the Registries.  Further Registries are expected to provide RVS services for registered HHIT devices.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-02.txt' />
</reference>



<reference  anchor="RFC7252" target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author initials='Z.' surname='Shelby' fullname='Z. Shelby'><organization /></author>
<author initials='K.' surname='Hartke' fullname='K. Hartke'><organization /></author>
<author initials='C.' surname='Bormann' fullname='C. Bormann'><organization /></author>
<date year='2014' month='June' />
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference  anchor="RFC5238" target='https://www.rfc-editor.org/info/rfc5238'>
<front>
<title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
<author initials='T.' surname='Phelan' fullname='T. Phelan'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP).  DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.  DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5238'/>
<seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>



<reference  anchor="RFC4303" target='https://www.rfc-editor.org/info/rfc4303'>
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author initials='S.' surname='Kent' fullname='S. Kent'><organization /></author>
<date year='2005' month='December' />
<abstract><t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4303'/>
<seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>



<reference  anchor="RFC7401" target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials='R.' surname='Moskowitz' fullname='R. Moskowitz' role='editor'><organization /></author>
<author initials='T.' surname='Heer' fullname='T. Heer'><organization /></author>
<author initials='P.' surname='Jokela' fullname='P. Jokela'><organization /></author>
<author initials='T.' surname='Henderson' fullname='T. Henderson'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference  anchor="RFC7049" target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author initials='C.' surname='Bormann' fullname='C. Bormann'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2013' month='October' />
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference  anchor="RFC8032" target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<author initials='I.' surname='Liusvaara' fullname='I. Liusvaara'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>


<section anchor="LIDAR" title="Using LIDAR for UA location">

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a
connected car) that has full sky coverage, the Finder can use this
equipment to locate UAs in its airspace.  The Finder would then be
able to detect non-participating UAs.  A non-participating UA is
one that the Finder can “see” with the LIDAR, but not “hear” any
B-RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate
B-RID messages, and forward them to the SPDP as any real B-RID
messages.  There is an open issue as what to use for the actual
RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a
non-participating UA that it has received from multiple Finders
with LIDAR detection.  In doing so, it would have to select a
RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is
beyond range for its B-RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs
on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is
needed.  there are full-sky LIDAR for automotive use with ranges
varying from 20M to 250M.  Would more than UA location information
be available?  What information can be sent in a CS-RID message for
such “unmarked” UAs?</t>

</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The Crowd Sourcing idea in this document came from the Apple “Find
My Device” presentation at the International Association for
Cryptographic Research’s Real World Crypto 2020 conference.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

