<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-drip-arch-14" category="info">

  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2021" month="July" day="09"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications. This architecture adheres to the
requirements listed in the DRIP Requirements document.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System Remote Identification and tracking
(UAS RID), plus RID-related communications. The architecture takes into account both current (including proposed) regulations and non-IETF technical standards.</t>

<t>The architecture adheres to the requirements listed in the DRIP Requirements document <xref target="I-D.ietf-drip-reqs"/>.</t>

<section anchor="overview-of-unmanned-aircraft-system-uas-remote-id-rid-and-standardization" title="Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and Standardization">

<t>CAAs currently promulgate performance-based regulations that
do not specify techniques, but rather cite industry consensus
technical standards as acceptable means of compliance.</t>

<t>UAS Remote Identification (RID) is an application enabler for a UAS to be identified by Unmanned Aircraft Systems Traffic Management (UTM) and UAS Service Supplier (USS) (<xref target="appendix-a"/>) or third parties entities such as law enforcement. Many considerations (e.g., safety) dictate that UAS be remotely identifiable.  Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID. For example, the European Union Aviation Safety Agency (EASA) has published <xref target="Delegated"/> and <xref target="Implementing"/> Regulations.</t>

<t>Federal Aviation Administration (FAA)</t>

<t><list style='empty'>
  <t>The FAA published a Notice of Proposed Rule Making
<xref target="NPRM"/> in 2019 and whereafter published the “Final Rule” in 2021 <xref target="FAA_RID"/>. In FAA’s final rule, it is clearly stated that Automatic Dependent Surveillance Broadcast (ADS-B) Out and transponders can not be used to serve the purpose of an remote identification. More details about ADS-B can be found in <xref target="adsb"/>.</t>
</list></t>

<t>American Society for Testing and Materials (ASTM)</t>

<t><list style='empty'>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item WK65041, developed the ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</list></t>

<t><list style='empty'>
  <t>ASTM defines one set of RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If an UAS uses 
both communication methods, the same information must be
provided via both means. <xref target="F3411-19"/> is cited by FAA in its RID final rule
<xref target="FAA_RID"/> as “a potential means of compliance” to a Remote ID rule.</t>
</list></t>

<t>The 3rd Generation Partnership Project (3GPP)</t>

<t><list style='empty'>
  <t>With release 16, the 3GPP completed the UAS RID requirement study
<xref target="TS-22.825"/> and proposed a set of use cases in the mobile network and the
services that can be offered based on RID.  Release 17
specification focuses on enhanced UAS service requirements and
provides the protocol and application architecture support that will be applicable for both 4G and 5G networks.</t>
</list></t>

</section>
<section anchor="overview-of-types-of-uas-remote-id" title="Overview of Types of UAS Remote ID">

<section anchor="brid" title="Broadcast RID">

<t>A set of RID messages are defined for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the directly received UAS ID.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The minimum Broadcast RID data flow is illustrated in <xref target="brid-fig"/>.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
               x x  UA
              xxxxx
                |
                |
                |     app messages directly over  
                |     one-way RF data link (no IP)
                |
                |
                +
                x
              xxxxx
                x
                x
                x x   Observer's device (e.g. smartphone)
              x   x

]]></artwork></figure>

<t>With queries sent over the Internet using harvested RID (see <xref target="harvestbridforutm"/>), the Observer may gain more information about those visible UAS” is only true if the locally observed UAS is (or very recently was) observed somewhere else; harvesting RID is not so much about learning more about directly observed nearby UAS as it is about surveillance of areas too large for local direct visual observation &amp; direct RF link based ID (e.g., an entire air force base, or even larger, a national forest)</t>

<!--
With Broadcast RID, an Observer is limited to their radio "visible"
airspace for UAS awareness and information.  With queries sent over the Internet using harvested
RID (see {{harvestbridforutm}}), the Observer may gain more information about those visible UAS.
-->

</section>
<section anchor="nrid" title="Network RID">

<t>A RID data dictionary and data flow for Network RID are defined in <xref target="F3411-19"/>.
This data flow is emitted from an UAS via unspecified means (but at least in part over the Internet)
to a Network Remote ID Service Provider (Net-RID SP).
A Net-RID SP provides the RID data to Network Remote ID Display Providers (Net-RID DP). 
It is the Net-RID DP that responds to queries from Network Remote ID Observers  (expected typically, but not specified exclusively, to be web-based) specifying airspace
volumes of interest. Network RID depends upon connectivity, in several segments, 
via the Internet, from the UAS to the Observer.</t>

<t><list style='empty'>
  <t>Editor-note 1: 
+ list all the segments mentioned above
+ specify how DRIP provide solutions for each segment</t>
</list></t>

<t>The mimunum Network RID data flow is illustrated in <xref target="nrid-fig"/>:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
            x x  UA
            xxxxx       ********************
             |   \    *                ------*---+------------+
             |    \   *              /       *  | NET_RID_SP |
             |     \  * ------------/    +---*--+------------+
             | RF   \ */                 |   *
             |        *      INTERNET    |   *  +------------+
             |       /*                  +---*--| NET_RID_DP |
             |      / *                  +---*--+------------+
             +     /   *                 |   *
              x   /     *****************|***      x
            xxxxx                        |       xxxxx
              x                          +-------  x
              x                                    x
             x x   Operator (GCS)      Observer   x x
            x   x                                x   x

]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path, currently (in the year of 2021) typically a direct RF link, but with increasing beyond Visual Line of Sight (BVLOS) operations expected often to be wireless links at either end with the Internet between.</t>

<t><list style='empty'>
  <t>Editor-note 2:  Explain the difference with wireless and RF link includes what are the end entities, usages for each transport media.</t>
</list></t>

<t>For all but the simplest hobby aircraft, telemetry (at least position and heading) flows from the UA to the GCS via some path, typically the reverse of the C2 path. Thus, RID information pertaining to both the GCS and the UA can be sent, by whichever has Internet connectivity, to the Net-RID SP, typically the USS managing the UAS operation.</t>

<t><list style='empty'>
  <t>Editor-note 3:  Does all UAS support telemetry? explain what are simplsest hobby aircraft vs UAS in general. Is it necessary to keep “For all but the simplest hobby aircraft”?</t>
</list></t>

<t>The Net-RID SP forwards RID information via the Internet to subscribed Net-RID DP, typically USS. Subscribed Net-RID DP forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411-19"/> describes RID data elements that must be transported end-to-end from the UAS to the subscribed Observer devices.</t>

<t><xref target="F3411-19"/> prescribes the protocols only between the Net-RID SP, Net-RID DP, and the Discovery and Synchronization Service (DSS). DRIP may also address standardization of protocols between the UA and GCS, between the UAS and the Net-RID SP, and/or between the Net-RID DP and Observer devices.</t>

<t><list style='empty'>
  <t>Editor-note 4:  “DRIP may also…” Specify what protocol DRIP can or will standardize.</t>
</list></t>

<t><list style='empty'>
  <t><list style='empty'>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of RID information is in the scope of <xref target="F3411-19"/> Network RID.</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="overview-of-uss-interoperability" title="Overview of USS Interoperability">

<t>With Net-RID, there is direct communication between the UAS and its USS.  With Broadcast-RID, the UAS Operator has either pre-filed a 4D space volume for USS operational knowledge and/or Observers can be providing information about observed UA to a USS.  USS exchange information via a Discovery and Synchronization Service (DSS) so all USS collectively have knowledge about all activities in a 4D airspace.</t>

<t>The interactions among Observer, UA, and USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                            +----------+ 
                            | Observer |
                            +----------+
                           /            \
                          /              \      
                   +-----+                +-----+         
                   | UAS1 |                | UAS2 |
                   +-----+                +-----+       
                          \              /      
                           \            /                       
                            +----------+                            
                            | Internet | 
                            +----------+ 
                           /            \
                          /              \
                    +-------+           +-------+
                    | USS1 | <-------> | USS2 |   
                    +-------+           +-------+
                             \         /
                              \       /
                              +------+
                              |  DSS |
                              +------+
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture" title="Overview of DRIP Architecture">

<t>The requirements document <xref target="I-D.ietf-drip-reqs"/> provides an extended introduction to the problem space and use cases. Only a brief summary of that introduction is restated here as context, with reference to the general UAS RID usage scenarios shown in <xref target="arch-intro"/>.</t>

<figure anchor="arch-intro"><artwork><![CDATA[
      General      x                           x     Public
      Public     xxxxx                       xxxxx   Safety
      Observer     x                           x     Observer
                   x                           x
                  x x ---------+  +---------- x x
                 x   x         |  |          x   x
                               |  |
         UA1 x x               |  |  +------------ x x UA2
            xxxxx              |  |  |            xxxxx
               |               +  +  +              |
               |            xxxxxxxxxx              |
               |           x          x             |
               +----------+x Internet x+------------+
    UA1        |           x          x             |       UA1 
   Pilot     x |            xxxxxxxxxx              | x    Pilot
  Operator  xxxxx              + + +                xxxxx Operator
   GCS1      x                 | | |                  x    GCS2
             x                 | | |                  x
            x x                | | |                 x x
           x   x               | | |                x   x
                               | | |
             +----------+      | | |       +----------+
             |          |------+ | +-------|          |
             | Public   |        |         | Private  |
             | Registry |     +-----+      | Registry |
             |          |     | DNS |      |          |
             +----------+     +-----+      +----------+

]]></artwork></figure>

<t>DRIP is meant to leverage existing Internet resources (standard protocols, services, infrastructures, and business models) to meet UAS RID and closely related needs.  DRIP will specify how to apply IETF standards, complementing <xref target="F3411-19"/> and other external standards, to satisfy UAS RID requirements.</t>

<t>This document outlines the UAS RID architecture.  This includes presenting the gaps between the CAAs’ Concepts of Operations and <xref target="F3411-19"/> as it relates to the use of Internet technologies and UA direct RF communications. Issues include, but are not limited to:</t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Design of trustworthy remote ID and trust in RID messages (<xref target="rid"/>)</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Mechanisms to leverage Domain Name System (including DNS: <xref target="RFC1034"/>), 
Extensible Provisioning Protocol (EPP <xref target="RFC5731"/>) and Registration Data Access Protocol (RDAP) (<xref target="RFC7482"/>) for publishing public and private information (see <xref target="publicinforeg"/> and <xref target="privateinforeg"/>).</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Harvesting broadcast  RID messages for UTM inclusion (<xref target="harvestbridforutm"/>).</t>
  </list></t>
</list></t>

<t><list style='empty'>
  <t><list style="symbols">
    <t>Privacy in RID messages (PII protection) (<xref target="privacyforbrid"/>).</t>
  </list></t>
</list></t>

</section>
</section>
<section anchor="convetions" title="Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown above.</t>

</section>
<section anchor="definitionsandabbr" title="Definitions and Abbreviations">

<t><list style='empty'>
  <t>Editor-note 13: 1) should we merge <xref target="convetions"/> and <xref target="definitionsandabbr"/> 2) how should we list abbr in the Arch? Previous WG agreement is that all the DRIP terms shall be defined in -reqs, which may or may not be used in -reqs itself, but other documents such as Arch-. And arch- can list terms when they are used in the arch- only. So which is which ?</t>
</list></t>

<section anchor="additional-definitions" title="Additional Definitions">

<t>This document uses terms defined in <xref target="I-D.ietf-drip-reqs"/>.</t>

</section>
<section anchor="abbreviations" title="Abbreviations">

<t>ADS-B:       Automatic Dependent Surveillance Broadcast</t>

<t>DSS:        Discovery &amp; Synchronization Service</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>GCS:        Ground Control Station</t>

<t>HHIT:       Hierarchical HIT Registries</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

<t>RID:        Remote ID</t>

<t>Net-RID SP: Network RID Service Provider</t>

<t>Net-RID DP: Network RID Display Provider.</t>

<t>PII:        Personally Identifiable Information</t>

<t>RF:         Radio Frequency</t>

<t>SDSP:       Supplemental Data Service Provider</t>

<t>UA:         Unmanned Aircraft</t>

<t>UAS:        Unmanned Aircraft System</t>

<t>USS:        UAS Service Supplier</t>

<t>UTM:        UAS Traffic Management</t>

</section>
<section anchor="claims-assertions-attestations-and-certificates" title="Claims, Assertions, Attestations, and Certificates">

<t>This section introduces the terms “Claims”, “Assertions”, “Attestations”, and “Certificates” as used in DRIP. DRIP certificate has a different context compared with security certificates and Public Key Infrastructure used in X.509.</t>

<t>Editor-note 5: To be confirmed</t>

<!--
This is due to the term "certificate" having significant technological and legal baggage associated with it, specifically around X.509 certificates. These types of certificates and Public Key Infrastructure invoke more legal and public policy considerations than probably any other electronic communication sector. It emerged as a governmental platform for trusted identity management and was
pursued in intergovernmental bodies with links into treaty instruments.
-->

<t>Claims:</t>

<t><list style='empty'>
  <t>A claim in DRIP is a predicate (e.g., “X is Y”, “X has property Y”, and most importantly “X owns Y” or “X is owned by Y”).</t>
</list></t>

<!-- One basic use case of a claim is an entity using an HHIT as an identifier, e.g., a UAS using an HHIT as a UAS ID. -->

<t>Assertions:</t>

<t><list style='empty'>
  <t>An assertion in DRIP is a set of claims.  This definition is borrowed from JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/>.</t>
</list></t>

<!-- An HHIT of itself can be seen as an assertion: a claim that the identifier is a handle to an asymmetric keypair owned by the entity, and a claim that the identifier is in the registry specified by the HID embedded in the identifier. -->

<t>Attestations:</t>

<t><list style='empty'>
  <t>An attestation in DRIP is a signed assertion.  The signer may be a claimant or a third party.  Under DRIP this is normally used when an entity asserts a relationship with another entity, along with other information, and the asserting entity signs the assertion, thereby making it an attestation.</t>
</list></t>

<t>Certificates:</t>

<t><list style='empty'>
  <t>A certificate in DRIP is an attestation, strictly over identity information, signed by a third party.</t>
</list></t>

</section>
</section>
<section anchor="rid" title="HHIT as the Primary DRIP Entity Identifier">

<t>This section describes the DRIP architectural approach to meeting the basic requirements of a DRIP entity identifier within external technical standard ASTM <xref target="F3411-19"/> and regulatory constraints. It
justifies and explains the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses suitable as a UAS ID type and more generally as trustworthy multipurpose remote identifiers.</t>

<t>A HHIT, together with the Host Identity (HI) from which it is partly derived, self-attests to its included explicit registration hierarchy, providing Registrar discovery for a 3rd-party who is looking for ID attestation retrieves the necessary information to the registrar via a DNS request HHIT.</t>

<t><list style='empty'>
  <t>Editor-note 6: Is there a need to specify how self-attest works? if yes then where? possible a new section under <xref target="rid"/>}</t>
</list></t>

<section anchor="uas-remote-identifiers-problem-space" title="UAS Remote Identifiers Problem Space">

<t><list style='empty'>
  <t>Editor-note 14: Good to have: adding match requirment numbering from requirement document</t>
</list></t>

<t>A DRIP entity identifier needs to be “Trustworthy”. This means that within the framework of the RID messages, an Observer can establish that the DRIP identifier uniquely belong to the UAS.  That the only way for any other UAS to assert this DRIP identifier would be to steal something from within the UAS. The DRIP identifier is self-generated by the UAS (either UA or GCS) and registered with the USS.</t>

<t>The Broadcast RID data exchange faces extreme challenges due to the limitation of the demanding support for Bluetooth. The ASTM <xref target="F3411-19"/> defines the basic RID message which is expected to contain certain RID data and the Authentication message. The Basic RID message has a maximum payload of 25 bytes and the maximum size allocated by ASTM for the RID is 20 bytes and only 3 bytes are left unused. currently, the authentication maximum payload is defined to be 201 bytes.</t>

<t><list style='empty'>
  <t>Editor-note 7: To be more specific about the RID message header and payload structure, such as 1) list different type of BRID messages defined in ASTM F3411, 2) how many bytes for each filed.</t>
</list></t>

<t>Standard approaches like X.509 and PKI will not fit these constraints, even using the new EdDSA <xref target="RFC8032"/> algorithm cannot fit within the maximum 201 byte limit, due in large measure to ASN.1 encoding format overhead.</t>

<t>An example of a technology that will fit within these limitations is
an enhancement of the Host Identity Tag (HIT) of HIPv2 <xref target="RFC7401"/> using Hierarchical HITs (HHITs) for UAS RID <xref target="I-D.ietf-drip-rid"/>. As PKI with X.509 is being used in other systems with which UAS RID must interoperate (e.g. Discovery and Synchronization Service and any other communications involving USS) mappings between the more flexible but larger X.509 certificates and the HHIT-based structures can must be devised. This could be as in <xref target="RFC8002"/> or simply the HHIT as Subject Alternative Name (SAN) and no Distinguished Name (DN).</t>

<t><list style='empty'>
  <t>Editor-note 8: is there a need to explain the how binding/proxy/translation between the HHIT and X509? Should this be addressed in Arch- or solution?</t>
</list></t>

<t>A self-attestation of the HHIT RID can be done in as little as 84 bytes, by avoiding an explicit encoding technology like ASN.1 or Concise Binary Object Representation (CBOR <xref target="RFC8949"/>). This compressed attestation consists of only the HHIT, a timestamp, and the EdDSA signature on them.</t>

<t><list style='empty'>
  <t>Editor-note 9: to be more specific regarding how HHIT can only use as little as 84 bytes to address the crypto concern.</t>
</list></t>

<t>The HHIT prefix and suiteID provide crypto agility and implicit encoding rules. Similarly, a self-attestation of the Hierarchical registration of the RID (an attestation of a RID third-party registration “certificate”) can be done in 200 bytes.  Both these are detailed in UAS RID <xref target="I-D.ietf-drip-rid"/>.</t>

<t><list style='empty'>
  <t>Editor-note 10: to be more specific why 200 bytes is sufficient.</t>
</list></t>

<t>An Observer would need Internet access to validate a self-attestations claim.  A third-party Certificate can be validated via a small credential cache in a disconnected environment.  This third-party Certificate is possible when the third-party also uses HHITs for its identity and the UA has the public key and the Certificate for that HHIT.</t>

</section>
<section anchor="hit-as-a-trustworthy-drip-entity-identifier" title="HIT as A Trustworthy DRIP Entity Identifier">

<t><list style='empty'>
  <t>Editor-note 15: general comments about rewrite of this section due to lack of coherence.</t>
</list></t>

<t>A Remote ID that can be trustworthily used in the RID Broadcast mode can be built from an asymmetric keypair. Rather than using a key signing operation to claim ownership of an ID that does not guarantee name uniqueness, in this method the ID is cryptographically derived directly from the public key. The proof of ID ownership (verifiable attestation, versus mere claim) is guaranteed by signing this cryptographic ID with the associated private key. The association between the ID and the private key is ensured by cryptographically binding the public key with the ID, more specifically the ID results from the hash of the public key. It is statistically hard for another entity to create a public key that would generate (spoof) the ID.</t>

<t>The HITs is designed statistically unique through the cryptographic hash feature of second-preimage resistance. The cryptographically-bound addition of the Hierarchy and an HHIT registration process (e.g. based on Extensible Provisioning Protocol, <xref target="RFC5730"/>) provide complete, global HHIT uniqueness. This registration forces the attacker to generate the same public key rather than a public key that generates the same HHIT. This is in contrast to general IDs (e.g. a UUID or device serial number) as the subject in an X.509 certificate.</t>

<t><list style='empty'>
  <t>Editor-note 11: Explain how HIT itself and HHIT registry address naming collision.</t>
</list></t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT can only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (more details in  <xref target="sc"/>).</t>

<t>In another case, a UAS equipped for Broadcast RID can be provisioned not only with its HHIT but also with the HI public key from which the HHIT was derived and the corresponding private key, to enable message signature.  A UAS equipped for Network RID can be provisioned likewise; the private key resides only in the ultimate source of Network RID messages (i.e. on the UA itself if the GCS is merely relaying rather than sourcing Network RID messages).  Each Observer device can be provisioned either with public keys of the DRIP identifier root registries or certificates for subordinate registries.</t>

<t>HHITs can also be used throughout the USS/UTM system. The Operators, Private Information Registries, as well as other UTM entities, can use HHITs for their IDs. Such HHITs can facilitate DRIP security functions such as used with HIP to strongly mutually authenticate and encrypt communications.</t>

</section>
<section anchor="hhitregandlookup" title="HHIT for DRIP Identifier Registration and Lookup">

<t>Remote ID needs a deterministic lookup mechanism that rapidly provides actionable information about the identified UA.  Given the size constraints imposed by the Bluetooth 4 broadcast media, the Remote ID itself needs to be the inquiry input into the lookup.  An HHIT DRIP identifier contains cryptographically embedded registration information.  This HHIT registration hierarchy, along with the IPv6 prefix, is trustable and sufficient information that can be used to perform such a lookup.  Additionally, the IPv6 prefix can enhance the HHITs use beyond the basic Remote ID function (e.g use in HIP, <xref target="RFC7401"/>).</t>

<t><list style='empty'>
  <t>Editor-note 12: more description regarding 1) Is that something we should address in the Arch- 2) if yes, then adding more text about how a trustable lookup is performed</t>
</list></t>

<t>Therefore, a DRIP identifier can be represented as a HHIT.  It can be self-generated by a UAS (either UA or GCS) and registered with the Private Information Registry (More details in <xref target="privateinforeg"/>) identified in its hierarchy fields. Each DRIP identifier represented as an HHIT can not be used more than once.</t>

</section>
<section anchor="hhit-for-drip-identifier-cryptographic" title="HHIT for DRIP Identifier Cryptographic">

<t>The only (known to the authors of this document at the time of its writing) extant fixed-length ID cryptographically derived from a public key are the Host Identity Tag <xref target="RFC7401"/>, HITs, and Cryptographically Generated Addresses <xref target="RFC3972"/>, CGAs. However, both HITs and CGAs lack registration/retrieval capability. HHIT, on the other hand, is capable of providing a cryptographic hashing function, along with a registration process to mitigate the probability of a hash collision (first registered, first allowed).</t>

</section>
</section>
<section anchor="ei" title="DRIP Identifier Registration and Registries">

<t><list style='empty'>
  <t>Editor-note 16: Fundamentally disagree with not actually specifying an architecture
in the DRIP Architecture document (From Stuart Card)</t>
</list></t>

<t>UAS registries can hold both public and private UAS information resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in
different registries. A DRIP identifier is amenable to handling as an Internet domain name (at an arbitrary level in the hierarchy). It also can be registered in at least a pseudo-domain (e.g. .ip6.arpa for reverse lookup), or as a sub-domain (for forward lookup). This section introduces the public and private information registries for DRIP identifiers.</t>

<section anchor="publicinforeg" title="Public Information Registry">

<section anchor="background" title="Background">

<t>The public registry provides trustable information such as attestations of RID ownership and HDA registration.  Optionally, pointers to the repositories for the HDA and RAA implicit in the RID can be included (e.g. for HDA and RAA HHIT|HI used in attestation signing
operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UAS that only use Network RID, is only available via an Observer’s Net-RID DP that would tend to provide all public registry information directly.  The Observer can visually “see” these UAS, but they are silent to the Observer; the Net-RID DP is the only source of information based on a query for an airspace volume.</t>

</section>
<section anchor="proposed-approach" title="Proposed Approach">

<t>A DRIP public information registry can respond to standard DNS queries, in the definitive public Internet DNS hierarchy.  If a DRIP public information registry lists, in a HIP RR, any HIP RVS servers for a given DRIP identifier, those RVS servers can restrict relay services per AAA policy; this requires extensions to <xref target="RFC8004"/>.  These public information registries can use secure DNS transport (e.g. DNS over TLS) to deliver public information that is not inherently trustable (e.g. everything other than attestations).</t>

</section>
</section>
<section anchor="privateinforeg" title="Private Information Registry">

<section anchor="background-1" title="Background">

<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.  A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure and business models, by fitting into an ID structure compatible with DNS names.  This implies some sort of hierarchy, for scalability, and management of this hierarchy.  It is expected that the private registry function will be provided by the same organizations that run a USS, and likely integrated with a USS.</t>

</section>
<section anchor="proposed-approach-1" title="Proposed Approach">

<t>A DRIP private information registry can support essential Internet domain name registry operations (e.g. add, delete, update, query) using interoperable open standard protocols.  It can also support the Extensible Provisioning Protocol (EPP) and the Registry Data Access
Protocol (RDAP) with access controls.  It might be listed in a DNS: that DNS could be private; but absent any compelling reasons for use of private DNS, a public DNS hierarchy needs to be in place. The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC7484"/>.  A DRIP private information registry can also support WebFinger as specified in <xref target="RFC7033"/>.</t>

</section>
</section>
</section>
<section anchor="harvestbridforutm" title="Harvesting Broadcast Remote ID messages for UTM Inclusion">

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UAS, but allow RID requirements for small UAS
to be satisfied with the operator’s choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for UAS of
essentially all UAS and is now also considering Network RID.  The FAA
RID Final Rules <xref target="FAA_RID"/> only specify Broadcast RID for UAS, however, still encourages Network RID for complementary functionality, especially in support of UTM.</t>

<t>One obvious opportunity is to enhance the
architecture with gateways from Broadcast RID to Network RID. This
provides the best of both and gives regulators and operators
flexibility.  It offers considerable enhancement over some Network RID
options such as only reporting planned 4D operation space by the
operator.</t>

<t>These gateways could be pre-positioned (e.g. around
airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing
more than a smartphone with a suitable app is needed).  As Broadcast
RID media have limited range, gateways receiving messages claiming
locations far from the gateway can alert authorities or a SDSP to the
failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position
stamps from the gateways to multilaterate UA location, independent of
the locations claimed in the messages (which may have a natural time lag
as it is), which are entirely operator self-reported in UAS RID and UTM,
and thus are subject not only to natural time lag and error
but also operator misconfiguration or intentional deception.</t>

<t>Further, gateways with additional sensors (e.g. smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the RID messages.  This Crowd Sourced Remote ID
(CS-RID) would be a significant enhancement, beyond baseline DRIP
functionality; if implemented, it adds two more entity types.</t>

<section anchor="the-cs-rid-finder" title="The CS-RID Finder">
<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into the UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from, a Broadcast RID receiver.  However, it should not depend upon a direct interface with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a TBD interface to a CS-RID SDSP; this interface should be based upon but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="the-cs-rid-sdsp" title="The CS-RID SDSP">

<t>A CS-RID SDSP would present a TBD interface to a CS-RID Finder; this interface should be based upon but readily distinguishable from that between a GCS and a Net-RID SP. A CS-RID SDSP should appear (i.e. present the same interface) to a Net-RID SP as a Net-RID DP.</t>

</section>
</section>
<section anchor="iana-consideration" title="IANA Consideration">

<t>This document does not make any IANA request.</t>

</section>
<section anchor="sc" title="Security Considerations">

<t>The security provided by asymmetric
cryptographic techniques depends upon protection of the private keys.
A manufacturer that embeds a private key in an UA may have retained a
copy.  A manufacturer whose UA are configured by a closed source
application on the GCS which communicates over the Internet with the
factory may be sending a copy of a UA or GCS self-generated key back
to the factory.  Keys may be extracted from a GCS or UA. The RID
sender of a small harmless UA (or the entire UA) could be carried by
a larger dangerous UA as a “false flag.”  Compromise of a registry
private key could do widespread harm.  Key revocation procedures are
as yet to be determined.  These risks are in addition to those
involving Operator key management practices.</t>

</section>
<section anchor="privacyforbrid" title="Privacy &amp; Transparency Considerations">

<t>Broadcast RID messages can contain PII.  A viable architecture for PII protection would be symmetric encryption of the PII using a session key known to the UAS and its USS. An authorized Observer could send the encrypted PII along with the UAS ID (to the USS in which the UAS ID is registered if that can be determined, e.g., from received Broadcast RID information such as the UAS ID itself, or to the Observer’s USS, or to a Public Safety USS) to get the plaintext. Alternatively, the authorized Observer can receive the key to directly decrypt all PII content sent by that UA during that session (UAS operation).</t>

<t>An authorized Observer can instruct a UAS via the USS that conditions
have changed mandating no PII protection or land the UA (abort the
operation).</t>

<t>PII can be protected unless the UAS is informed otherwise.  This could
come as part of UTM operation authorization. It can be special instructions at the start or during an operation. PII protection can not be used if the UAS loses connectivity to the USS.  The UAS always has the option to abort the operation if PII protection is disallowed.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor='I-D.ietf-drip-reqs'>
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Requirements</title>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='7' month='July' year='2021'/>
      <abstract>
	 <t>   This document defines terminology and requirements for Drone Remote
   Identification Protocol (DRIP) Working Group solutions to support
   Unmanned Aircraft System Remote Identification and tracking (UAS RID)
   for security, safety, and other purposes (e.g., initiation of
   identity based network sessions supporting UAS applications).  DRIP
   will facilitate use of existing Internet resources to support RID and
   to enable enhanced related services, and will enable online and
   offline verification that RID information is trustworthy.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-17'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-reqs-17.txt' type='TXT'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8002' target='https://www.rfc-editor.org/info/rfc8002'>
<front>
<title>Host Identity Protocol Certificates</title>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='S. Varjonen' initials='S.' surname='Varjonen'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>The Certificate (CERT) parameter is a container for digital certificates.  It is used for carrying these certificates in Host Identity Protocol (HIP) control packets.  This document specifies the certificate parameter and the error signaling in case of a failed verification.  Additionally, this document specifies the representations of Host Identity Tags (HITs) in X.509 version 3 (v3).</t><t>The concrete use cases of certificates, including how certificates are obtained and requested and which actions are taken upon successful or failed verification, are specific to the scenario in which the certificates are used.  Hence, the definition of these scenario-specific aspects is left to the documents that use the CERT parameter.</t><t>This document updates RFC 7401 and obsoletes RFC 6253.</t></abstract>
</front>
<seriesInfo name='RFC' value='8002'/>
<seriesInfo name='DOI' value='10.17487/RFC8002'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC7482' target='https://www.rfc-editor.org/info/rfc7482'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP).</t></abstract>
</front>
<seriesInfo name='RFC' value='7482'/>
<seriesInfo name='DOI' value='10.17487/RFC7482'/>
</reference>


<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" >
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" >
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>Study on Remote Identification of Unmanned Aerial Systems (UAS)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>




<reference anchor='RFC7033' target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author fullname='P. Jones' initials='P.' surname='Jones'><organization/></author>
<author fullname='G. Salgueiro' initials='G.' surname='Salgueiro'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Smarr' initials='J.' surname='Smarr'><organization/></author>
<date month='September' year='2013'/>
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7484' target='https://www.rfc-editor.org/info/rfc7484'>
<front>
<title>Finding the Authoritative Registration Data (RDAP) Service</title>
<author fullname='M. Blanchet' initials='M.' surname='Blanchet'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7484'/>
<seriesInfo name='DOI' value='10.17487/RFC7484'/>
</reference>



<reference anchor='RFC8004' target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<author fullname='L. Eggert' initials='L.' surname='Eggert'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference anchor='RFC5731' target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC5730' target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8392' target='https://www.rfc-editor.org/info/rfc8392'>
<front>
<title>CBOR Web Token (CWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='E. Wahlstroem' initials='E.' surname='Wahlstroem'><organization/></author>
<author fullname='S. Erdtman' initials='S.' surname='Erdtman'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8392'/>
<seriesInfo name='DOI' value='10.17487/RFC8392'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>UAS Remote ID</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='28' month='January' year='2021'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   Identifier for use as the UAS Remote ID.  HHITs self-attest to the
   included explicit hierarchy that provides Registrar discovery for
   3rd-party ID attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-07'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-07.txt' type='TXT'/>
</reference>




    </references>


<section anchor="appendix-a" title="Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)">

<section anchor="operation-concept" title="Operation Concept">

<t>The National Aeronautics and Space Administration (NASA) and FAA’s
effort of integrating UAS’s operation into the national airspace
system (NAS) led to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 was published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual concept refinement, initial prototype implementation and testing
were conducted by the UTM research transition team which is the joint workforce by FAA
and NASA.  World efforts took place afterward.  The Single European
Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published the UTM concept of operations to
guide the development of their future air traffic management (ATM)
system and ensure safe and efficient integrations of manned and
unmanned aircraft into the national airspace.</t>

<t>The UTM comprises UAS operation infrastructure, procedures and
local regulation compliance policies to guarantee safe UAS
integration and operation.  The main functionality of a UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss" title="UAS Service Supplier (USS)">

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that a UTM has to offer.  Such Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitoring and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS to build a large service coverage map which
can load-balance, relay and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low
Altitude Authorization and Notification Capability <xref target="LAANC"/> program
which is the first system to realize some of the UTM envisioned functionality.
The LAANC program can automate the UAS’s flight plan application and
approval process for airspace authorization in real-time by checking
against multiple aeronautical databases such as airspace
classification and fly rules associated with it, FAA UAS facility
map, special use airspace, Notice to Airman (NOTAM), and Temporary
Flight Rule (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations" title="UTM Use Cases for UAS Operations">

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and taking off or landing in a
controlled airspace (e.g., Class Bravo, Charlie, Delta and Echo
in the United States), the USS under which the UAS is operating is responsible for verifying UA registration, authenticating the UAS operational intent (flight plan) by checking against designated UAS fly map database, obtaining the air traffic control (ATC) authorization and monitor the UAS flight path in order to maintain safe margins and follow the pre-authorized sequence of authorized 4-D volumes (route).</t>
  <t>For a UAS participating in UTM and taking off or landing in an uncontrolled airspace (ex.  Class Golf in the United States), pre-flight authorization must be obtained from a USS when operating
beyond-visual-of-sight (BVLOS).  The USS either accepts or rejects received operational intent (flight plan) from the UAS.  Accepted UAS operation may share its current flight data such as GPS position and
altitude to USS.  The USS may keep the UAS operation status near real-time and may keep it as a record for overall airspace air traffic monitoring.</t>
</list></t>

</section>
</section>
<section anchor="adsb" title="Automatic Dependent Surveillance Broadcast (ADS-B)">

<t>The ADS-B is the de jure technology used in manned aviation for sharing location information, from the aircraft to ground and satellite-based systems, designed in the early 2000s. Broadcast RID is 
conceptually similar to ADS-B, but with the receiver target being the general public on generally available devices (e.g. smartphones).</t>

<t>For numerous technical reasons, ADS-B itself is not suitable for 
low-flying small UA. Technical reasons include but not limited to the following:</t>

<t><list style="numbers">
  <t>Lack of support for the 1090 MHz ADS-B channel on any consumer handheld devices</t>
  <t>Weight and cost of ADS-B transponders on CSWaP constrained UA</t>
  <t>Limited bandwidth of both uplink and downlink, which would likely be saturated by large numbers of UAS, endangering manned aviation</t>
</list></t>

<t>Understanding these technical shortcomings, regulators worldwide have ruled out the use of ADS-B for the small UAS for which UAS RID and DRIP are intended.</t>

</section>
<section numbered="no" anchor="acknowledgements" title="Acknowledgements">

<t>The work of the FAA’s UAS Identification and Tracking (UAS ID)
Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in
balancing the interests of diverse stakeholders is essential to the
necessary rapid and widespread deployment of UAS RID.  IETF
volunteers who have contributed to this draft include Amelia
Andersdotter and Mohamed Boucadair.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

