summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9434.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9434.txt')
-rw-r--r--doc/rfc/rfc9434.txt1471
1 files changed, 1471 insertions, 0 deletions
diff --git a/doc/rfc/rfc9434.txt b/doc/rfc/rfc9434.txt
new file mode 100644
index 0000000..6cd29a0
--- /dev/null
+++ b/doc/rfc/rfc9434.txt
@@ -0,0 +1,1471 @@
+
+
+
+
+Internet Engineering Task Force (IETF) S. Card
+Request for Comments: 9434 A. Wiethuechter
+Category: Informational AX Enterprize
+ISSN: 2070-1721 R. Moskowitz
+ HTT Consulting
+ S. Zhao, Ed.
+ Intel
+ A. Gurtov
+ Linköping University
+ July 2023
+
+
+ Drone Remote Identification Protocol (DRIP) Architecture
+
+Abstract
+
+ This document describes an architecture for protocols and services to
+ support Unmanned Aircraft System Remote Identification and tracking
+ (UAS RID), plus UAS-RID-related communications. This architecture
+ adheres to the requirements listed in the Drone Remote Identification
+ Protocol (DRIP) Requirements document (RFC 9153).
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9434.
+
+Copyright Notice
+
+ Copyright (c) 2023 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. Overview of UAS RID and Its Standardization
+ 1.2. Overview of Types of UAS Remote ID
+ 1.2.1. Broadcast RID
+ 1.2.2. Network RID
+ 1.3. Overview of USS Interoperability
+ 1.4. Overview of DRIP Architecture
+ 2. Terms and Definitions
+ 2.1. Additional Abbreviations
+ 2.2. Additional Definitions
+ 3. HHIT as the DRIP Entity Identifier
+ 3.1. UAS Remote Identifiers Problem Space
+ 3.2. HHIT as a Cryptographic Identifier
+ 3.3. HHIT as a Trustworthy DRIP Entity Identifier
+ 3.4. HHIT for DRIP Identifier Registration and Lookup
+ 4. DRIP Identifier Registration and Registries
+ 4.1. Public Information Registry
+ 4.1.1. Background
+ 4.1.2. Public DRIP Identifier Registry
+ 4.2. Private Information Registry
+ 4.2.1. Background
+ 4.2.2. Information Elements
+ 4.2.3. Private DRIP Identifier Registry Methods
+ 4.2.4. Alternative Private DRIP Registry Methods
+ 5. DRIP Identifier Trust
+ 6. Harvesting Broadcast Remote ID Messages for UTM Inclusion
+ 6.1. The CS-RID Finder
+ 6.2. The CS-RID SDSP
+ 7. DRIP Contact
+ 8. IANA Considerations
+ 9. Security Considerations
+ 9.1. Private Key Physical Security
+ 9.2. Quantum Resistant Cryptography
+ 9.3. Denial-of-Service (DoS) Protection
+ 9.4. Spoofing and Replay Protection
+ 9.5. Timestamps and Time Sources
+ 10. Privacy and Transparency Considerations
+ 11. References
+ 11.1. Normative References
+ 11.2. Informative References
+ Appendix A. Overview of UAS Traffic Management (UTM)
+ A.1. Operation Concept
+ A.2. UAS Service Supplier (USS)
+ A.3. UTM Use Cases for UAS Operations
+ Appendix B. Automatic Dependent Surveillance Broadcast (ADS-B)
+ Acknowledgments
+ Authors' Addresses
+
+1. Introduction
+
+ This document describes an architecture for protocols and services to
+ support Unmanned Aircraft System Remote Identification and tracking
+ (UAS RID), plus UAS-RID-related communications. The architecture
+ takes into account both current (including proposed) regulations and
+ non-IETF technical standards.
+
+ The architecture adheres to the requirements listed in the DRIP
+ Requirements document [RFC9153] and illustrates how all of them can
+ be met, except for GEN-7 QoS, which is left for future work. The
+ requirements document provides an extended introduction to the
+ problem space and use cases. Further, this architecture document
+ frames the DRIP Entity Tag (DET) [RFC9374] within the architecture.
+
+1.1. Overview of UAS RID and Its Standardization
+
+ UAS RID is an application that enables UAS to be identified by UAS
+ Traffic Management (UTM), UAS Service Suppliers (USS) (Appendix A),
+ and third-party entities, such as law enforcement. Many
+ considerations (e.g., safety and security) dictate that UAS be
+ remotely identifiable.
+
+ Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID.
+ CAAs currently promulgate performance-based regulations that do not
+ specify techniques but rather cite industry consensus technical
+ standards as acceptable means of compliance.
+
+ USA Federal Aviation Administration (FAA)
+ The FAA published a Notice of Proposed Rule Making [NPRM] in 2019
+ and thereafter published a "Final Rule" in 2021 [FAA_RID],
+ imposing requirements on UAS manufacturers and operators, both
+ commercial and recreational. The rule states that Automatic
+ Dependent Surveillance Broadcast (ADS-B) Out and transponders
+ cannot be used to satisfy the UAS RID requirements on UAS to which
+ the rule applies (see Appendix B).
+
+ European Union Aviation Safety Agency (EASA)
+ In pursuit of the "U-space" concept of a single European airspace
+ safely shared by manned and unmanned aircraft, the EASA published
+ a [Delegated] regulation in 2019, imposing requirements on UAS
+ manufacturers and third-country operators, including but not
+ limited to UAS RID requirements. The same year, the EASA also
+ published a regulation [Implementing], laying down detailed rules
+ and procedures for UAS operations and operating personnel, which
+ then was updated in 2021 [Implementing_update]. A Notice of
+ Proposed Amendment [NPA] was published in 2021 to provide more
+ information about the development of acceptable means of
+ compliance and guidance material to support U-space regulations.
+
+ American Society for Testing and Materials (ASTM)
+ ASTM International, Technical Committee F38 (UAS), Subcommittee
+ F38.02 (Aircraft Operations), Work Item WK65041 developed an ASTM
+ standard [F3411-22a], titled "Standard Specification for Remote ID
+ and Tracking".
+
+ ASTM defines one set of UAS RID information and two means, Media
+ Access Control (MAC) layer broadcast and IP layer network, of
+ communicating it. If a UAS uses both communication methods, the
+ same information must be provided via both means. [F3411-22a] is
+ the technical standard basis of the Means Of Compliance (MOC)
+ specified in [F3586-22]. The FAA has accepted [F3586-22] as a MOC
+ to the FAA's UAS RID Final Rule [FAA_RID], with some caveats, as
+ per [MOC-NOA]. Other CAAs are expected to accept the same or
+ other MOCs likewise based on [F3411-22a].
+
+ 3rd Generation Partnership Project (3GPP)
+ With Release 16, the 3GPP completed the UAS RID requirement study
+ [TR-22.825] and proposed a set of use cases in the mobile network
+ and services that can be offered based on UAS RID. The Release 17
+ study [TR-23.755] and specification [TS-23.255] focus on enhanced
+ UAS service requirements and provide the protocol and application
+ architecture support that will be applicable for both 4G and 5G
+ networks. The study of Further Architecture Enhancement for
+ Uncrewed Aerial Vehicles (UAV) and Urban Air Mobility (UAM) in
+ Release 18 [FS_AEUA] further enhances the communication mechanism
+ between UAS and USS/UTM. The DET in Section 3 may be used as the
+ 3GPP CAA-level UAS ID for RID purposes.
+
+1.2. Overview of Types of UAS Remote ID
+
+ This specification introduces two types of UAS Remote IDs as defined
+ in ASTM [F3411-22a].
+
+1.2.1. Broadcast RID
+
+ [F3411-22a] defines a set of UAS RID messages for direct, one-way
+ broadcast transmissions from the Unmanned Aircraft (UA) over
+ Bluetooth or Wi-Fi. These are currently defined as MAC layer
+ messages. Internet (or other Wide Area Network) connectivity is only
+ needed for UAS registry information lookup by Observers using the
+ directly received UAS ID. Broadcast RID should be functionally
+ usable in situations with no Internet connectivity.
+
+ The minimum Broadcast RID data flow is illustrated in Figure 1.
+
+ +------------------------+
+ | Unmanned Aircraft (UA) |
+ +-----------o------------+
+ |
+ | app messages directly over
+ | one-way RF data link (no IP)
+ |
+ v
+ +------------------o-------------------+
+ | Observer's device (e.g., smartphone) |
+ +--------------------------------------+
+
+ Figure 1: Minimum Broadcast RID Data Flow
+
+ Broadcast RID provides information only about UA within direct Radio
+ Frequency (RF) Line Of Sight (LOS), typically similar to Visual LOS
+ (VLOS), with a range up to approximately 1 km. This information may
+ be 'harvested' from received broadcasts and made available via the
+ Internet, enabling surveillance of areas too large for local direct
+ visual observation or direct RF link-based identification (see
+ Section 6).
+
+1.2.2. Network RID
+
+ [F3411-22a], using the same data dictionary that is the basis of
+ Broadcast RID messages, defines a Network Remote Identification (Net-
+ RID) data flow as follows.
+
+ * The information to be reported via UAS RID is generated by the
+ UAS. Typically, some of this data is generated by the UA and some
+ by the Ground Control Station (GCS), e.g., their respective
+ locations derived from the Global Navigation Satellite System
+ (GNSS).
+
+ * The information is sent by the UAS (UA or GCS) via unspecified
+ means to the cognizant Network Remote Identification Service
+ Provider (Net-RID SP), typically the USS under which the UAS is
+ operating if it is participating in UTM.
+
+ * The Net-RID SP publishes, via the Discovery and Synchronization
+ Service (DSS) over the Internet, that it has operations in various
+ 4-D airspace volumes (Section 2.2 of [RFC9153]), describing the
+ volumes but not the operations.
+
+ * An Observer's device, which is expected but not specified to be
+ based on the Web, queries a Network Remote Identification Display
+ Provider (Net-RID DP), typically also a USS, about any operations
+ in a specific 4-D airspace volume.
+
+ * Using fully specified Web-based methods over the Internet, the
+ Net-RID DP queries all Net-RID SPs that have operations in volumes
+ intersecting that of the Observer's query for details on all such
+ operations.
+
+ * The Net-RID DP aggregates information received from all such Net-
+ RID SPs and responds to the Observer's query.
+
+ The minimum Net-RID data flow is illustrated in Figure 2:
+
+ +-------------+ ******************
+ | UA | * Internet *
+ +--o-------o--+ * *
+ | | * * +------------+
+ | '--------*--(+)-----------*-----o |
+ | * | * | |
+ | .--------*--(+)-----------*-----o Net-RID SP |
+ | | * * | |
+ | | * .------*-----o |
+ | | * | * +------------+
+ | | * | *
+ | | * | * +------------+
+ | | * '------*-----o |
+ | | * * | Net-RID DP |
+ | | * .------*-----o |
+ | | * | * +------------+
+ | | * | *
+ | | * | * +------------+
+ +--o-------o--+ * '------*-----o Observer's |
+ | GCS | * * | Device |
+ +-------------+ ****************** +------------+
+
+ Figure 2: Minimum Net-RID Data Flow
+
+ Command and Control (C2) must flow from the GCS to the UA via some
+ path. Currently (in the year 2023), this is typically a direct RF
+ link; however, with increasing Beyond Visual Line Of Sight (BVLOS)
+ operations, it is expected to often be a wireless link at either end
+ with the Internet between.
+
+ Telemetry (at least the UA's position and heading) flows from the UA
+ to the GCS via some path, typically the reverse of the C2 path.
+ Thus, UAS RID information pertaining to both the GCS and the UA can
+ be sent by whichever has Internet connectivity to the Net-RID SP,
+ typically the USS managing the UAS operation.
+
+ The Net-RID SP forwards UAS RID information via the Internet to
+ subscribed Net-RID DPs, typically the USS. Subscribed Net-RID DPs
+ then forward RID information via the Internet to subscribed Observer
+ devices. Regulations require and [F3411-22a] describes UAS RID data
+ elements that must be transported end to end from the UAS to the
+ subscribed Observer devices.
+
+ [F3411-22a] prescribes the protocols between the Net-RID SP, Net-RID
+ DP, and DSS. It also prescribes data elements (in JSON) between the
+ Observer and the Net-RID DP. DRIP could address standardization of
+ secure protocols between the UA and the GCS (over direct wireless and
+ Internet connection), between the UAS and the Net-RID SP, and/or
+ between the Net-RID DP and Observer devices.
+
+ _Neither link-layer protocols nor the use of links (e.g., the link
+ often existing between the GCS and the UA) for any purpose other than
+ carriage of UAS RID information are in the scope of Network RID
+ [F3411-22a]._
+
+1.3. Overview of USS Interoperability
+
+ With Net-RID, there is direct communication between each UAS and its
+ USS. Multiple USS exchange information with the assistance of a DSS
+ so all USS collectively have knowledge about all activities in a 4-D
+ airspace. The interactions among an Observer, multiple UAS, and
+ their USS are shown in Figure 3.
+
+ +------+ +----------+ +------+
+ | UAS1 | | Observer | | UAS2 |
+ +---o--+ +-----o----+ +--o---+
+ | | |
+ ******|*************|************|******
+ * | | | *
+ * | +---o--+ | *
+ * | .------o USS3 o------. | *
+ * | | +--o---+ | | *
+ * | | | | | *
+ * +-o--o-+ +--o--+ +-o--o-+ *
+ * | o----o DSS o-----o | *
+ * | USS1 | +-----+ | USS2 | *
+ * | o----------------o | *
+ * +------+ +------+ *
+ * *
+ * Internet *
+ ****************************************
+
+ Figure 3: Interactions Between Observers, UAS, and USS
+
+1.4. Overview of DRIP Architecture
+
+ Figure 4 illustrates a global UAS RID usage scenario. Broadcast RID
+ links are not shown, as they reach from any UA to any listening
+ receiver in range and thus would obscure the intent of the figure.
+ Figure 4 shows, as context, some entities and interfaces beyond the
+ scope of DRIP (as currently (2023) chartered). Multiple UAS are
+ shown, each with its own UA controlled by its own GCS, potentially
+ using the same or different USS, with the UA potentially
+ communicating directly with each other (V2V), especially for low-
+ latency, safety-related purposes (DAA).
+
+ *************** ***************
+ * UAS1 * * UAS2 *
+ * * * *
+ * +--------+ * DAA/V2V * +--------+ *
+ * | UA o--*----------------------------------------*--o UA | *
+ * +--o--o--+ * * +--o--o--+ *
+ * | | * +------+ Lookups +------+ * | | *
+ * | | * | GPOD o------. .------o PSOD | * | | *
+ * | | * +------+ | | +------+ * | | *
+ * | | * | | * | | *
+ * C2 | | * V2I ************ V2I * | | C2 *
+ * | '-----*--------------* *--------------*-----' | *
+ * | * * * * | *
+ * | o====Net-RID===* *====Net-RID===o | *
+ * +--o--+ * * Internet * * +--o--+ *
+ * | GCS o-----*--------------* *--------------*-----o GCS | *
+ * +-----+ * Registration * * Registration * +-----+ *
+ * * (and UTM) * * (and UTM) * *
+ *************** ************ ***************
+ | | |
+ +----------+ | | | +----------+
+ | Public o---' | '---o Private |
+ | Registry | | | Registry |
+ +----------+ | +----------+
+ +--o--+
+ | DNS |
+ +-----+
+
+ DAA: Detect And Avoid
+ GPOD: General Public Observer Device
+ PSOD: Public Safety Observer Device
+ V2I: Vehicle-to-Infrastructure
+ V2V: Vehicle-to-Vehicle
+
+ Figure 4: Global UAS RID Usage Scenario
+
+ | Informative note: See [RFC9153] for detailed definitions.
+
+ DRIP is meant to leverage existing Internet resources (standard
+ protocols, services, infrastructures, and business models) to meet
+ UAS RID and closely related needs. DRIP will specify how to apply
+ IETF standards, complementing [F3411-22a] and other external
+ standards, to satisfy UAS RID requirements.
+
+ This document outlines the DRIP architecture in the context of the
+ UAS RID architecture. This includes closing the gaps between the
+ CAAs' concepts of operations and [F3411-22a] as it relates to the use
+ of Internet technologies and UA-direct RF communications. Issues
+ include, but are not limited to:
+
+ * the design of trustworthy remote identifiers required by GEN-1
+ (Section 3), especially but not exclusively for use as single-use
+ session IDs,
+
+ * mechanisms to leverage the Domain Name System (DNS) [RFC1034] for
+ registering and publishing public and private information (see
+ Sections 4.1 and 4.2), as required by REG-1 and REG-2,
+
+ * specific authentication methods and message payload formats to
+ enable verification that Broadcast RID messages were sent by the
+ claimed sender (Section 5) and that the sender is in the claimed
+ DRIP Identity Management Entity (DIME) (see Sections 4 and 5), as
+ required by GEN-2,
+
+ * harvesting Broadcast RID messages for UTM inclusion, with the
+ optional DRIP extension of Crowdsourced Remote ID (CS-RID)
+ (Section 6), using the DRIP support for gateways required by GEN-5
+ [RFC9153],
+
+ * methods for instantly establishing secure communications between
+ an Observer and the pilot of an observed UAS (Section 7), using
+ the DRIP support for dynamic contact required by GEN-4 [RFC9153],
+ and
+
+ * privacy in UAS RID messages (personal data protection)
+ (Section 10).
+
+ This document should serve as a main point of entry into the set of
+ IETF documents addressing the basic DRIP requirements.
+
+2. Terms and Definitions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+ To encourage comprehension necessary for adoption of DRIP by the
+ intended user community, the UAS community's norms are respected
+ herein.
+
+ This document uses terms defined in [RFC9153].
+
+ Some of the acronyms have plural forms that remain the same as their
+ singular forms, e.g., "UAS" can expand to "Unmanned Aircraft System"
+ (singular) or "Unmanned Aircraft Systems" (plural), as appropriate
+ for the context. This usage is consistent with Section 2.2 of
+ [RFC9153].
+
+2.1. Additional Abbreviations
+
+ DET: DRIP Entity Tag
+
+ EdDSA: Edwards-curve Digital Signature Algorithm
+
+ HHIT: Hierarchical HIT
+
+ HI: Host Identity
+
+ HIP: Host Identity Protocol
+
+ HIT: Host Identity Tag
+
+2.2. Additional Definitions
+
+ This section introduces the terms "Claim", "Evidence", "Endorsement",
+ and "Certificate", as used in DRIP. A DRIP certificate has a
+ different context compared with security certificates and Public Key
+ Infrastructure used in X.509.
+
+ Claim:
+ A claim shares the same definition as a claim in Remote
+ ATtestation procedureS (RATS) [RFC9334]; it is a piece of asserted
+ information, sometimes in the form of a name/value pair. It could
+ also been seen as a predicate (e.g., "X is Y", "X has property Y",
+ and most importantly "X owns Y" or "X is owned by Y").
+
+ Evidence:
+ Evidence in DRIP borrows the same definition as in RATS [RFC9334],
+ that is, a set of claims.
+
+ Endorsement:
+ An Endorsement is inspired from RATS [RFC9334]; it is a secure
+ (i.e., signed) statement vouching the integrity and veracity of
+ evidence.
+
+ Certificate:
+ A certificate in DRIP is an endorsement, strictly over identity
+ information, signed by a third party. This third party should be
+ one with no stake in the endorsement over which it is signing.
+
+ DRIP Identity Management Entity (DIME):
+ A DIME is an entity that performs functions similar to a domain
+ registrar/registry. A DIME vets Claims and/or Evidence from a
+ registrant and delivers back Endorsements and/or Certificates in
+ response. It is a high-level entity in the DRIP registration/
+ provisioning process that can hold the role of HHIT Domain
+ Authority (HDA), Registered Assigning Authority (RAA), or root of
+ trust (typically the HHIT prefix owner or DNS apex owner) for
+ DETs.
+
+3. HHIT as the DRIP Entity Identifier
+
+ This section describes the DRIP architectural approach to meeting the
+ basic requirements of a DRIP entity identifier within the external
+ technical standard ASTM [F3411-22a] and regulatory constraints. It
+ justifies and explains the use of Hierarchical Host Identity Tags
+ (HHITs) [RFC9374] as self-asserting IPv6 addresses suitable as a UAS
+ ID type and, more generally, as trustworthy multipurpose remote
+ identifiers.
+
+ Self-asserting in this usage means that, given the Host Identity
+ (HI), the HHIT Overlay Routable Cryptographic Hash IDentifier
+ (ORCHID) construction (see Section 3.5 of [RFC9374]), and a signature
+ of the DIME on the HHIT and HI, the HHIT can be verified by the
+ receiver as a trusted UAS ID. The explicit registration hierarchy
+ within the HHIT provides registration discovery (managed by a DIME)
+ to either yield the HI for third-party (seeking UAS ID endorsement)
+ validation or prove that the HHIT and HI have been registered
+ uniquely.
+
+3.1. UAS Remote Identifiers Problem Space
+
+ A DRIP entity identifier needs to be "Trustworthy" (see DRIP
+ requirements GEN-1, ID-4, and ID-5 in [RFC9153]). This means that
+ given a sufficient collection of UAS RID messages, an Observer can
+ establish that the identifier claimed therein uniquely belongs to the
+ claimant. To satisfy DRIP requirements and maintain important
+ security properties, the DRIP identifier should be self-generated by
+ the entity it names (e.g., a UAS) and registered (e.g., with a USS;
+ see DRIP requirements GEN-3 and ID-2).
+
+ However, Broadcast RID, especially its support for Bluetooth 4,
+ imposes severe constraints. A previous revision of the ASTM UAS RID,
+ [F3411-19], allowed a UAS ID of types (1, 2, and 3), each of 20
+ bytes. [F3411-22a] adds type 4, Specific Session ID, for other
+ Standards Development Organizations (SDOs) to extend ASTM UAS RID.
+ Type 4 uses one byte to index the Specific Session ID subtype,
+ leaving 19 bytes (see ID-1 of DRIP Requirements [RFC9153]). As
+ described in Section 3 of [RFC9153], ASTM has allocated Specific
+ Session ID subtype 1 to IETF DRIP.
+
+ The maximum ASTM UAS RID Authentication Message payload is 201 bytes
+ each for Authentication Types 1, 2, 3, and 4. [F3411-22a] adds
+ Authentication Type 5 for other SDOs (including the IETF) to extend
+ ASTM UAS RID with Specific Authentication Methods (SAMs). With Type
+ 5, one of the 201 bytes is consumed to index the SAM Type, leaving
+ only 200 bytes for DRIP authentication payloads, including one or
+ more DRIP entity identifiers and associated authentication data.
+
+3.2. HHIT as a Cryptographic Identifier
+
+ The only (known to the authors at the time of writing) existing types
+ of IP-address-compatible identifiers cryptographically derived from
+ the public keys of the identified entities are Cryptographically
+ Generated Addresses (CGAs) [RFC3972] and Host Identity Tags (HITs)
+ [RFC7401]. CGAs and HITs lack registration/retrieval capability. To
+ provide this, each HHIT embeds plaintext information designating the
+ hierarchy within which it is registered, a cryptographic hash of that
+ information concatenated with the entity's public key, etc. Although
+ hash collisions may occur, the DIME can detect them and reject
+ registration requests rather than issue credentials, e.g., by
+ enforcing a First Come First Served policy [RFC8126]. Preimage hash
+ attacks are also mitigated through this registration process, locking
+ the HHIT to a specific HI.
+
+3.3. HHIT as a Trustworthy DRIP Entity Identifier
+
+ A Remote UAS ID that can be trustworthy for use in Broadcast RID can
+ be built from an asymmetric key pair. In this method, the UAS ID is
+ cryptographically derived directly from the public key. The proof of
+ UAS ID ownership (verifiable endorsement versus mere claim) is
+ guaranteed by signing this cryptographic UAS ID with the associated
+ private key. The association between the UAS ID and the private key
+ is ensured by cryptographically binding the public key with the UAS
+ ID; more specifically, the UAS ID results from the hash of the public
+ key. The public key is designated as the HI, while the UAS ID is
+ designated as the HIT.
+
+ By construction, the HIT is statistically unique through the
+ mandatory use of cryptographic hash functions with second-preimage
+ resistance. The cryptographically bound addition of the hierarchy
+ and a HHIT registration process provide complete, global HHIT
+ uniqueness. This registration forces the attacker to generate the
+ same public key rather than a public key that generates the same
+ HHIT. This is in contrast to general IDs (e.g., a Universally Unique
+ Identifier (UUID) or device serial number) as the subject in an X.509
+ certificate.
+
+ A UA equipped for Broadcast RID MUST be provisioned not only with its
+ HHIT but also with the HI public key from which the HHIT was derived
+ and the corresponding private key to enable message signature.
+
+ A UAS equipped for DRIP-enhanced Network RID MUST be provisioned
+ likewise; the private key resides only in the ultimate source of
+ Network RID messages. If the GCS is the source of the Network RID
+ messages, the GCS MUST hold the private key. If the UA is the source
+ of the Network RID messages and they are being relayed by the GCS,
+ the UA MUST hold the private key, just as a UA that directly connects
+ to the network rather than through its GCS.
+
+ Each Observer device functioning with Internet connectivity MAY be
+ provisioned either with public keys of the DRIP identifier root
+ registries or certificates for subordinate registries; each Observer
+ device that needs to operate without Internet connectivity at any
+ time MUST be so provisioned.
+
+ HHITs can also be used throughout the USS/UTM system. Operators and
+ Private Information Registries, as well as other UTM entities, can
+ use HHITs for their IDs. Such HHITs can facilitate DRIP security
+ functions, such as those used with HIP, to strongly mutually
+ authenticate and encrypt communications.
+
+ A self-endorsement of a HHIT used as a UAS ID can be done in as
+ little as 88 bytes when Ed25519 [RFC8032] is used by only including
+ the 16-byte HHIT, two 4-byte timestamps, and the 64-byte Ed25519
+ signature.
+
+ Ed25519 [RFC8032] is used as the HHIT mandatory-to-implement signing
+ algorithm, as GEN-1 and ID-5 [RFC9153] can best be met by restricting
+ the HI to 32 bytes. A larger public key would rule out the offline
+ endorsement feature that fits within the 200-byte Authentication
+ Message maximum length. Other algorithms that meet this 32-byte
+ constraint can be added as deemed needed.
+
+ A DRIP identifier can be assigned to a UAS as a static HHIT by its
+ manufacturer, such as a single HI and derived HHIT encoded as a
+ hardware serial number, per [CTA2063A]. Such a static HHIT SHOULD
+ only be used to bind one-time-use DRIP identifiers to the unique UA.
+ Depending upon implementation, this may leave a HI private key in the
+ possession of the manufacturer (see also Section 9).
+
+ In general, Internet access may be needed to validate Endorsements or
+ Certificates. This may be obviated in the most common cases (e.g.,
+ endorsement of the UAS ID), even in disconnected environments, by
+ prepopulating small caches on Observer devices with DIME public keys
+ and a chain of Endorsements or Certificates (tracing a path through
+ the DIME tree). This is assuming all parties on the trust path also
+ use HHITs for their identities.
+
+3.4. HHIT for DRIP Identifier Registration and Lookup
+
+ UAS RID needs a deterministic lookup mechanism that rapidly provides
+ actionable information about the identified UA. Given the size
+ constraints imposed by the Bluetooth 4 broadcast media, the UAS ID
+ itself needs to be a non-spoofable inquiry input into the lookup.
+
+ A DRIP registration process based on the explicit hierarchy within a
+ HHIT provides manageable uniqueness of the HI for the HHIT. The
+ hierarchy is defined in [RFC9374] and consists of 2 levels: an RAA
+ and then an HDA. The registration within this hierarchy is the
+ defense against a cryptographic hash second-preimage attack on the
+ HHIT (e.g., multiple HIs yielding the same HHIT; see Requirement ID-3
+ in [RFC9153]). The First Come First Served registration policy is
+ adequate.
+
+ A lookup of the HHIT into the DIME provides the registered HI for
+ HHIT proof of ownership and deterministic access to any other needed
+ actionable information based on inquiry access authority (more
+ details in Section 4.2).
+
+4. DRIP Identifier Registration and Registries
+
+ DRIP registries hold both public and private UAS information (see
+ PRIV-1 in [RFC9153]) resulting from the DRIP identifier registration
+ process. Given these different uses, and to improve scalability,
+ security, and simplicity of administration, the public and private
+ information can be stored in different registries. This section
+ introduces the public and private information registries for DRIP
+ identifiers. In this section, for ease of comprehension, the
+ registry functions are described (using familiar terminology) without
+ detailing their assignment to specific implementing entities (or
+ using unfamiliar jargon). Elsewhere in this document, and in
+ forthcoming documents detailing the DRIP registration processes and
+ entities, the more specific term "DRIP Identity Management Entity"
+ (DIME) will be used. This DRIP identifier registration process
+ satisfies the following DRIP requirements defined in [RFC9153]: GEN-
+ 3, GEN-4, ID-2, ID-4, ID-6, PRIV-3, PRIV-4, REG-1, REG-2, REG-3, and
+ REG-4.
+
+4.1. Public Information Registry
+
+4.1.1. Background
+
+ The public information registry provides trustable information, such
+ as endorsements of UAS RID ownership and registration with the HDA.
+ Optionally, pointers to the registries for the HDA and RAA implicit
+ in the UAS RID can be included (e.g., for HDA and RAA HHIT|HI used in
+ endorsement signing operations). This public information will be
+ principally used by Observers of Broadcast RID messages. Data on UAS
+ that only use Network RID is available via an Observer's Net-RID DP
+ that would directly provide all public registry information. The
+ Net-RID DP is the only source of information for a query on an
+ airspace volume.
+
+ | Note: In the above paragraph, | signifies concatenation of
+ | information, e.g., X | Y is the concatenation of X and Y.
+
+4.1.2. Public DRIP Identifier Registry
+
+ A DRIP identifier MUST be registered as an Internet domain name (at
+ an arbitrary level in the hierarchy, e.g., in .ip6.arpa). Thus, the
+ DNS can provide all the needed public DRIP information. A
+ standardized HHIT Fully Qualified Domain Name (FQDN) can deliver the
+ HI via a HIP Resource Record (RR) [RFC8005] and other public
+ information (e.g., RAA and HDA PTRs and HIP Rendezvous Servers (RVSs)
+ [RFC8004]). These public information registries can use DNSSEC to
+ deliver public information that is not inherently trustable (e.g.,
+ everything other than endorsements).
+
+ This DNS entry for the HHIT can also provide a revocation service.
+ For example, instead of returning the HI RR, it may return some
+ record showing that the HI (and thus HHIT) has been revoked.
+
+4.2. Private Information Registry
+
+4.2.1. Background
+
+ The private information required for DRIP identifiers is similar to
+ that required for Internet domain name registration. A DRIP
+ identifier solution can leverage existing Internet resources, i.e.,
+ registration protocols, infrastructure, and business models, by
+ fitting into a UAS ID structure compatible with DNS names. The HHIT
+ hierarchy can provide the needed scalability and management
+ structure. It is expected that the private information registry
+ function will be provided by the same organizations that run a USS
+ and likely integrated with a USS. The lookup function may be
+ implemented by the Net-RID DPs.
+
+4.2.2. Information Elements
+
+ When a DET is used as a UA's Session ID, the corresponding
+ manufacturer-assigned serial number MUST be stored in a private
+ information registry that can be identified uniquely from the DET.
+ When a DET is used as either a UA's Session ID or a UA's
+ manufacturer-assigned serial number, and the operation is being flown
+ under UTM, the corresponding UTM-system-assigned Operational Intent
+ Identifier SHOULD be so stored. Other information MAY be stored as
+ such, and often must, to satisfy CAA regulations or USS operator
+ policies.
+
+4.2.3. Private DRIP Identifier Registry Methods
+
+ A DRIP private information registry supports essential registry
+ operations (e.g., add, delete, update, and query) using interoperable
+ open standard protocols. It can accomplish this by leveraging
+ aspects of the Extensible Provisioning Protocol (EPP) [RFC5730] and
+ the Registry Data Access Protocol (RDAP) [RFC7480] [RFC9082]
+ [RFC9083]. The DRIP private information registry in which a given
+ UAS is registered needs to be findable, starting from the UAS ID,
+ using the methods specified in [RFC9224].
+
+4.2.4. Alternative Private DRIP Registry Methods
+
+ A DRIP private information registry might be an access-controlled DNS
+ (e.g., via DNS over TLS). Additionally, WebFinger [RFC7033] can be
+ supported. These alternative methods may be used by a Net-RID DP
+ with specific customers.
+
+5. DRIP Identifier Trust
+
+ While the DRIP entity identifier is self-asserting, it alone does not
+ provide the trustworthiness (i.e., non-repudiation, protection vs.
+ spoofing, message integrity protection, scalability, etc.) essential
+ to UAS RID, as justified in [RFC9153]. For that, it MUST be
+ registered (under DRIP registries) and actively used by the party (in
+ most cases the UA). A sender's identity cannot be proved merely by
+ its possessing of a DRIP Entity Tag (DET) and broadcasting it as a
+ claim that it belongs to that sender. Sending data signed using that
+ HI's private key proves little, as it is subject to trivial replay
+ attacks using previously broadcast messages. Only sending the DET
+ and a signature on novel (i.e., frequently changing and
+ unpredictable) data that can be externally validated by the Observer
+ (such as a signed Location/Vector message that matches actually
+ seeing the UA at the location and time reported in the signed
+ message) proves that the observed UA possesses the private key and
+ thus the claimed UAS ID.
+
+ The severe constraints of Broadcast RID make it challenging to
+ satisfy UAS RID requirements. From received Broadcast RID messages
+ and information that can be looked up using the received UAS ID in
+ online registries or local caches, it is possible to establish levels
+ of trust in the asserted information and the operator.
+
+ A combination of different DRIP Authentication Messages enables an
+ Observer, without Internet connection (offline) or with (online), to
+ validate a UAS DRIP ID in real time. Some messages must contain the
+ relevant registration of the UA's DRIP ID in the claimed DIME. Some
+ messages must contain sender signatures over both static (e.g.,
+ registration) and dynamically changing (e.g., current UA location)
+ data. Combining these two sets of information, an Observer can piece
+ together a chain of trust, including real-time evidence to make a
+ determination on the UA's claims.
+
+ This process (combining the DRIP entity identifier, registries, and
+ authentication formats for Broadcast RID) can satisfy the following
+ DRIP requirements defined in [RFC9153]: GEN-1, GEN-2, GEN-3, ID-2,
+ ID-3, ID-4, and ID-5.
+
+6. Harvesting Broadcast Remote ID Messages for UTM Inclusion
+
+ ASTM anticipated that regulators would require both Broadcast RID and
+ Network RID for large UAS but allow UAS RID requirements for small
+ UAS to be satisfied with the operator's choice of either Broadcast
+ RID or Network RID. The EASA initially specified Broadcast RID for
+ essentially all UAS and is now also considering Network RID. The FAA
+ UAS RID Final Rules [FAA_RID] permit only Broadcast RID for rule
+ compliance but still encourage Network RID for complementary
+ functionality, especially in support of UTM.
+
+ One opportunity is to enhance the architecture with gateways from
+ Broadcast RID to Network RID. This provides the best of both and
+ gives regulators and operators flexibility. It offers advantages
+ over either form of UAS RID alone, i.e., greater fidelity than
+ Network RID reporting of [FAA_RID] planned area operations, together
+ with surveillance of areas too large for local direct visual
+ observation and direct Radio Frequency Line Of Sight (RF-LOS) link-
+ based Broadcast RID (e.g., a city or a national forest).
+
+ These gateways could be pre-positioned (e.g., around airports, public
+ gatherings, and other sensitive areas) and/or crowdsourced (as
+ nothing more than a smartphone with a suitable app is needed).
+ Crowdsourcing can be encouraged by quid pro quo, providing CS-RID
+ Surveillance Supplemental Data Service Provider (SDSP) outputs only
+ to CS-RID Finders. As Broadcast RID media have a limited range,
+ messages claiming sender (typically UA) locations far from a physical
+ layer receiver thereof ("Finder" below, typically Observer device)
+ should arouse suspicion of possible intent to deceive; a fast and
+ computationally inexpensive consistency check can be performed (by
+ the Finder or the Surveillance SDSP) on application layer data
+ present in the gateway (claimed UA location vs physical receiver
+ location), and authorities can be alerted to failed checks. CS-RID
+ SDSPs can use messages with precise date/time/position stamps from
+ the gateways to multilaterate UA locations, independent of the
+ locations claimed in the messages, which are entirely self-reported
+ by the operator in UAS RID and UTM, and thus are subject not only to
+ natural time lag and error but also operator misconfiguration or
+ intentional deception.
+
+ Multilateration technologies use physical layer information, such as
+ precise Time Of Arrival (TOA) of transmissions from mobile
+ transmitters at receivers with a priori precisely known locations, to
+ estimate the locations of the mobile transmitters.
+
+ Further, gateways with additional sensors (e.g., smartphones with
+ cameras) can provide independent information on the UA type and size,
+ confirming or refuting those claims made in the UAS RID messages.
+
+ Sections 6.1 and 6.2 define two additional entities that are required
+ to provide this Crowdsourced Remote ID (CS-RID).
+
+ This approach satisfies the following DRIP requirements defined in
+ [RFC9153]: GEN-5, GEN-11, and REG-1. As Broadcast messages are
+ inherently multicast, GEN-10 is met for local-link multicast to
+ multiple Finders (this is how multilateration is possible).
+
+6.1. The CS-RID Finder
+
+ A CS-RID Finder is the gateway for Broadcast Remote ID Messages into
+ UTM. It performs this gateway function via a CS-RID SDSP. A CS-RID
+ Finder could implement, integrate, or accept outputs from a Broadcast
+ RID receiver. However, it should not depend upon a direct interface
+ with a GCS, Net-RID SP, Net-RID DP, or Net-RID client. It would
+ present a new interface to a CS-RID SDSP, similar to but readily
+ distinguishable from that which a UAS (UA or GCS) presents to a Net-
+ RID SP.
+
+6.2. The CS-RID SDSP
+
+ A CS-RID SDSP aggregates and processes (e.g., estimates UA locations
+ using multilateration when possible) information collected by CS-RID
+ Finders. A CS-RID SDSP should present the same interface to a Net-
+ RID SP as it does to a Net-RID DP and to a Net-RID DP as it does to a
+ Net-RID SP, but its data source must be readily distinguishable via
+ Finders rather than direct from the UAS itself.
+
+7. DRIP Contact
+
+ One of the ways in which DRIP can enhance [F3411-22a] with
+ immediately actionable information is by enabling an Observer to
+ instantly initiate secure communications with the UAS remote pilot,
+ Pilot In Command, operator, USS under which the operation is being
+ flown, or other entity potentially able to furnish further
+ information regarding the operation and its intent and/or to
+ immediately influence further conduct or termination of the operation
+ (e.g., land or otherwise exit an airspace volume). Such potentially
+ distracting communications demand strong "AAA" (Authentication,
+ Attestation, Authorization, Access Control, Accounting, Attribution,
+ Audit), per applicable policies (e.g., of the cognizant CAA).
+
+ A DRIP entity identifier based on a HHIT, as outlined in Section 3,
+ embeds an identifier of the DIME in which it can be found (expected
+ typically to be the USS under which the UAS is flying), and the
+ procedures outlined in Section 5 enable Observer verification of that
+ relationship. A DRIP entity identifier with suitable records in
+ public and private registries, as outlined in Section 5, can enable
+ lookup not only of information regarding the UAS but also identities
+ of and pointers to information regarding the various associated
+ entities (e.g., the USS under which the UAS is flying an operation),
+ including means of contacting those associated entities (i.e.,
+ locators, typically IP addresses).
+
+ A suitably equipped Observer could initiate a secure communication
+ channel, using the DET HI, to a similarly equipped and identified
+ entity, i.e., the UA itself, if operating autonomously; the GCS, if
+ the UA is remotely piloted and the necessary records have been
+ populated in the DNS; the USS; etc. Assuming secure communication
+ setup (e.g., via IPsec or HIP), arbitrary standard higher-layer
+ protocols can then be used for Observer to Pilot (O2P) communications
+ (e.g., SIP [RFC3261] et seq), Vehicle to Everything (V2X) (or more
+ specifically Aircraft to Anything (A2X)) communications (e.g.,
+ [MAVLink]), etc. Certain preconditions are necessary: 1) each party
+ needs a currently usable means (typically a DNS) of resolving the
+ other party's DRIP entity identifier to a currently usable locator
+ (IP address), and 2) there must be currently usable bidirectional IP
+ connectivity (not necessarily via the Internet) between the parties.
+ One method directly supported by the use of HHITs as DRIP entity
+ identifiers is initiation of a HIP Base Exchange (BEX) and Bound End-
+ to-End Tunnel (BEET).
+
+ This approach satisfies DRIP requirement GEN-6 Contact, supports
+ satisfaction of DRIP requirements GEN-8, GEN-9, PRIV-2, PRIV-5, and
+ REG-3 [RFC9153], and is compatible with all other DRIP requirements.
+
+8. IANA Considerations
+
+ This document has no IANA actions.
+
+9. Security Considerations
+
+ The size of the public key hash in the HHIT is vulnerable to a
+ second-preimage attack. It is well within current server array
+ technology to compute another key pair that hashes to the same HHIT
+ (given the current ORCHID construction hash length to fit UAS RID and
+ IPv6 address constraints). Thus, if a receiver were to check HHIT/HI
+ pair validity only by verifying that the received HI and associated
+ information, when hashed in the ORCHID construction, reproduce the
+ received HHIT, an adversary could impersonate a validly registered
+ UA. To defend against this, online receivers should verify the
+ received HHIT and received HI with the HDA (typically USS) with which
+ the HHIT/HI pair purports to be registered. Online and offline
+ receivers can use a chain of received DRIP link endorsements from a
+ root of trust through the RAA and the HDA to the UA, e.g., as
+ described in [DRIP-AUTH] and [DRIP-REGISTRIES].
+
+ Compromise of a DIME private key could do widespread harm
+ [DRIP-REGISTRIES]. In particular, it would allow bad actors to
+ impersonate trusted members of said DIME. These risks are in
+ addition to those involving key management practices and will be
+ addressed as part of the DIME process. All DRIP public keys can be
+ found in the DNS, thus they can be revoked in the DNS, and users
+ SHOULD check the DNS when available. Specific key revocation
+ procedures are as yet to be determined.
+
+9.1. Private Key Physical Security
+
+ The security provided by asymmetric cryptographic techniques depends
+ upon protection of the private keys. It may be necessary for the GCS
+ to have the key pair to register the HHIT to the USS. Thus, it may
+ be the GCS that generates the key pair and delivers it to the UA,
+ making the GCS a part of the key security boundary. Leakage of the
+ private key, from either the UA or the GCS, to the component
+ manufacturer is a valid concern, and steps need to be in place to
+ ensure safe keeping of the private key. Since it is possible for the
+ UAS RID sender of a small harmless UA (or the entire UA) to be
+ carried by a larger dangerous UA as a "false flag", it is out of
+ scope to deal with secure storage of the private key.
+
+9.2. Quantum Resistant Cryptography
+
+ There has been no effort as of yet in DRIP to address post quantum
+ computing cryptography. Small UAS and Broadcast Remote ID
+ communications are so constrained that current post quantum computing
+ cryptography is not applicable. Fortunately, since a UA may use a
+ unique HHIT for each operation, the attack window can be limited to
+ the duration of the operation. One potential future DRIP use for
+ post quantum cryptography is for key pairs that have long usage lives
+ but that rarely, if ever, need to be transmitted over bandwidth
+ constrained links, such as for serial numbers or operators. As the
+ HHIT contains the ID for the cryptographic suite used in its
+ creation, a future post quantum computing safe algorithm that fits
+ Remote ID constraints may be readily added. This is left for future
+ work.
+
+9.3. Denial-of-Service (DoS) Protection
+
+ Remote ID services from the UA use a wireless link in a public space.
+ As such, they are open to many forms of RF jamming. It is trivial
+ for an attacker to stop any UA messages from reaching a wireless
+ receiver. Thus, it is pointless to attempt to provide relief from
+ DoS attacks, as there is always the ultimate RF jamming attack.
+ Also, DoS may be attempted with spoofing/replay attacks; for which,
+ see Section 9.4.
+
+9.4. Spoofing and Replay Protection
+
+ As noted in Section 5, spoofing is combatted by the intrinsic self-
+ attesting properties of HHITs, plus their registration. Also, as
+ noted in Section 5, to combat replay attacks, a receiver MUST NOT
+ trust any claims nominally received from an observed UA (not even the
+ Basic ID message purportedly identifying that UA) until the receiver
+ verifies that the private key used to sign those claims is trusted,
+ that the sender actually possesses that key, and that the sender
+ appears indeed to be that observed UA. This requires receiving a
+ complete chain of endorsement links from a root of trust to the UA's
+ leaf DET, plus a message containing suitable nonce-like data signed
+ with the private key corresponding to that DET, and verifying all the
+ foregoing. The term "nonce-like" describes data that is readily
+ available to the prover and the verifier, changes frequently, is not
+ predictable by the prover, and can be checked quickly at low
+ computational cost by the verifier; a Location/Vector message is an
+ obvious choice.
+
+9.5. Timestamps and Time Sources
+
+ Section 6 and, more fundamentally, Section 3.3 both require
+ timestamps. In Broadcast RID messages, [F3411-22a] specifies both
+ 32-bit Unix-style UTC timestamps (seconds since midnight going into
+ the 1st day of 2019, rather than 1970) and 16-bit relative timestamps
+ (tenths of seconds since the start of the most recent hour or other
+ specified event). [F3411-22a] requires that 16-bit timestamp
+ accuracy, relative to the time of applicability of the data being
+ timestamped, also be reported, with a worst allowable case of 1.5
+ seconds. [F3411-22a] does not specify the time source, but GNSS is
+ generally assumed, as latitude, longitude, and geodetic altitude must
+ be reported and most small UAS use GNSS for positioning and
+ navigation.
+
+ | Informative note: For example, to satisfy [FAA_RID], [F3586-22]
+ | specifies tamper protection of the entire RID subsystem and use
+ | of the GPS operated by the US Government. The GPS has sub-
+ | microsecond accuracy and 1.5-second precision. In this
+ | example, UA-sourced messages can be assumed to have timestamp
+ | accuracy and precision of 1.5 seconds at worst.
+
+ GCS often have access to cellular LTE or other time sources better
+ than the foregoing, and such better time sources would be required to
+ support multilateration in Section 6, but such better time sources
+ cannot be assumed generally for purposes of security analysis.
+
+10. Privacy and Transparency Considerations
+
+ Broadcast RID messages can contain personal data (Section 3.2 of
+ [RFC6973]), such as the operator ID, and, in most jurisdictions, must
+ contain the pilot/GCS location. The DRIP architectural approach for
+ personal data protection is symmetric encryption of the personal data
+ using a session key known to the UAS and its USS, as follows.
+ Authorized Observers obtain plaintext in either of two ways: 1) an
+ Observer can send the UAS ID and the cyphertext to a server that
+ offers decryption as a service, and 2) an Observer can send just the
+ UAS ID to a server that returns the session key so that the Observer
+ can directly, locally decrypt all cyphertext sent by that UA during
+ that session (UAS operation). In either case, the server can be a
+ public safety USS, the Observer's own USS, or the UA's USS if the
+ latter can be determined (which, under DRIP, can be from the UAS ID
+ itself). Personal data is protected unless the UAS is otherwise
+ configured, i.e., as part of DRIP-enhanced RID subsystem
+ provisioning, as part of UTM operation authorization, or via
+ subsequent authenticated communications from a cognizant authority.
+ Personal data protection MUST NOT be used if the UAS loses
+ connectivity to its USS; if the UAS loses connectivity, Observers
+ nearby likely also won't have connectivity enabling decryption of the
+ personal data. The UAS always has the option to abort the operation
+ if personal data protection is disallowed, but if this occurs during
+ flight, the UA then MUST broadcast the personal data without
+ protection until it lands and is powered off. Note that normative
+ language was used only minimally in this section, as privacy
+ protection requires refinement of the DRIP architecture and
+ specification of interoperable protocol extensions, which are left
+ for future DRIP documents.
+
+11. References
+
+11.1. Normative References
+
+ [F3411-22a]
+ ASTM International, "Standard Specification for Remote ID
+ and Tracking", ASTM F3411-22A, DOI 10.1520/F3411-22A, July
+ 2022, <https://www.astm.org/f3411-22a.html>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC9153] Card, S., Ed., Wiethuechter, A., Moskowitz, R., and A.
+ Gurtov, "Drone Remote Identification Protocol (DRIP)
+ Requirements and Terminology", RFC 9153,
+ DOI 10.17487/RFC9153, February 2022,
+ <https://www.rfc-editor.org/info/rfc9153>.
+
+ [RFC9374] Moskowitz, R., Card, S., Wiethuechter, A., and A. Gurtov,
+ "DRIP Entity Tag (DET) for Unmanned Aircraft System Remote
+ ID (UAS RID)", RFC 9374, DOI 10.17487/RFC9374, March 2023,
+ <https://www.rfc-editor.org/info/rfc9374>.
+
+11.2. Informative References
+
+ [CTA2063A] ANSI, "Small Unmanned Aerial Systems Serial Numbers",
+ ANSI/CTA 2063-A, September 2019.
+
+ [Delegated]
+ European Union Aviation Safety Agency (EASA), "Commission
+ Delegated Regulation (EU) 2019/945 of 12 March 2019 on
+ unmanned aircraft systems and on third-country operators
+ of unmanned aircraft systems", March 2019,
+ <https://eur-lex.europa.eu/eli/reg_del/2019/945/oj>.
+
+ [DRIP-AUTH]
+ Wiethuechter, A., Ed., Card, S., and R. Moskowitz, "DRIP
+ Entity Tag Authentication Formats & Protocols for
+ Broadcast Remote ID", Work in Progress, Internet-Draft,
+ draft-ietf-drip-auth-30, 28 March 2023,
+ <https://datatracker.ietf.org/doc/html/draft-ietf-drip-
+ auth-30>.
+
+ [DRIP-REGISTRIES]
+ Wiethuechter, A. and J. Reid, "DRIP Entity Tag (DET)
+ Identity Management Architecture", Work in Progress,
+ Internet-Draft, draft-ietf-drip-registries-12, 10 July
+ 2023, <https://datatracker.ietf.org/doc/html/draft-ietf-
+ drip-registries-12>.
+
+ [F3411-19] ASTM International, "Standard Specification for Remote ID
+ and Tracking", ASTM F3411-19, DOI 10.1520/F3411-19, May
+ 2022, <https://www.astm.org/f3411-19.html>.
+
+ [F3586-22] ASTM International, "Standard Practice for Remote ID Means
+ of Compliance to Federal Aviation Administration
+ Regulation 14 CFR Part 89", ASTM F3586-22,
+ DOI 10.1520/F3586-22, July 2022,
+ <https://www.astm.org/f3586-22.html>.
+
+ [FAA_RID] United States Federal Aviation Administration (FAA),
+ "Remote Identification of Unmanned Aircraft", Federal
+ Register, Vol. 86, No. 10, January 2021,
+ <https://www.govinfo.gov/content/pkg/FR-2021-01-15/
+ pdf/2020-28948.pdf>.
+
+ [FAA_UAS_Concept_Of_Ops]
+ United States Federal Aviation Administration (FAA),
+ "Unmanned Aircraft System (UAS) Traffic Management (UTM)
+ Concept of Operations", v2.0, March 2020,
+ <https://www.faa.gov/sites/faa.gov/files/2022-08/
+ UTM_ConOps_v2.pdf>.
+
+ [FS_AEUA] "Study of Further Architecture Enhancement for UAV and
+ UAM", S2-2107092, October 2021,
+ <https://www.3gpp.org/ftp/tsg_sa/WG2_Arch/
+ TSGS2_147E_Electronic_2021-10/Docs/S2-2107092.zip>.
+
+ [Implementing]
+ European Union Aviation Safety Agency (EASA), "Commission
+ Implementing Regulation (EU) 2019/947 of 24 May 2019 on
+ the rules and procedures for the operation of unmanned
+ aircraft (Text with EEA relevance.)", May 2019,
+ <https://eur-lex.europa.eu/legal-content/EN/
+ TXT/?uri=CELEX%3A32019R0947>.
+
+ [Implementing_update]
+ European Union Aviation Safety Agency (EASA), "Commission
+ Implementing Regulation (EU) 2021/664 of 22 April 2021 on
+ a regulatory framework for the U-space (Text with EEA
+ relevance)", April 2021, <https://eur-lex.europa.eu/legal-
+ content/EN/TXT/?uri=CELEX%3A32021R0664>.
+
+ [LAANC] United States Federal Aviation Administration (FAA), "Low
+ Altitude Authorization and Notification Capability",
+ <https://www.faa.gov/
+ air_traffic/publications/atpubs/foa_html/
+ chap12_section_9.html>.
+
+ [MAVLink] MAVLink, "Micro Air Vehicle Communication Protocol",
+ <http://mavlink.io/>.
+
+ [MOC-NOA] United States Federal Aviation Administration (FAA),
+ "Accepted Means of Compliance; Remote Identification of
+ Unmanned Aircraft", Document ID FAA-2022-0859-0001, August
+ 2022,
+ <https://www.regulations.gov/document/FAA-2022-0859-0001>.
+
+ [NPA] European Union Aviation Safety Agency (EASA), "Notice of
+ Proposed Amendment 2021-14: Development of acceptable
+ means of compliance and guidance material to support the
+ U-space regulation", December 2021,
+ <https://www.easa.europa.eu/downloads/134303/en>.
+
+ [NPRM] United States Federal Aviation Administration (FAA),
+ "Remote Identification of Unmanned Aircraft Systems",
+ Notice of proposed rulemaking, December 2019,
+ <https://www.federalregister.gov/documents/2019/
+ 12/31/2019-28100/remote-identification-of-unmanned-
+ aircraft-systems>.
+
+ [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
+ STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987,
+ <https://www.rfc-editor.org/info/rfc1034>.
+
+ [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
+ A., Peterson, J., Sparks, R., Handley, M., and E.
+ Schooler, "SIP: Session Initiation Protocol", RFC 3261,
+ DOI 10.17487/RFC3261, June 2002,
+ <https://www.rfc-editor.org/info/rfc3261>.
+
+ [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)",
+ RFC 3972, DOI 10.17487/RFC3972, March 2005,
+ <https://www.rfc-editor.org/info/rfc3972>.
+
+ [RFC5730] Hollenbeck, S., "Extensible Provisioning Protocol (EPP)",
+ STD 69, RFC 5730, DOI 10.17487/RFC5730, August 2009,
+ <https://www.rfc-editor.org/info/rfc5730>.
+
+ [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
+ Morris, J., Hansen, M., and R. Smith, "Privacy
+ Considerations for Internet Protocols", RFC 6973,
+ DOI 10.17487/RFC6973, July 2013,
+ <https://www.rfc-editor.org/info/rfc6973>.
+
+ [RFC7033] Jones, P., Salgueiro, G., Jones, M., and J. Smarr,
+ "WebFinger", RFC 7033, DOI 10.17487/RFC7033, September
+ 2013, <https://www.rfc-editor.org/info/rfc7033>.
+
+ [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T.
+ Henderson, "Host Identity Protocol Version 2 (HIPv2)",
+ RFC 7401, DOI 10.17487/RFC7401, April 2015,
+ <https://www.rfc-editor.org/info/rfc7401>.
+
+ [RFC7480] Newton, A., Ellacott, B., and N. Kong, "HTTP Usage in the
+ Registration Data Access Protocol (RDAP)", STD 95,
+ RFC 7480, DOI 10.17487/RFC7480, March 2015,
+ <https://www.rfc-editor.org/info/rfc7480>.
+
+ [RFC8004] Laganier, J. and L. Eggert, "Host Identity Protocol (HIP)
+ Rendezvous Extension", RFC 8004, DOI 10.17487/RFC8004,
+ October 2016, <https://www.rfc-editor.org/info/rfc8004>.
+
+ [RFC8005] Laganier, J., "Host Identity Protocol (HIP) Domain Name
+ System (DNS) Extension", RFC 8005, DOI 10.17487/RFC8005,
+ October 2016, <https://www.rfc-editor.org/info/rfc8005>.
+
+ [RFC8032] Josefsson, S. and I. Liusvaara, "Edwards-Curve Digital
+ Signature Algorithm (EdDSA)", RFC 8032,
+ DOI 10.17487/RFC8032, January 2017,
+ <https://www.rfc-editor.org/info/rfc8032>.
+
+ [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, DOI 10.17487/RFC8126, June 2017,
+ <https://www.rfc-editor.org/info/rfc8126>.
+
+ [RFC9082] Hollenbeck, S. and A. Newton, "Registration Data Access
+ Protocol (RDAP) Query Format", STD 95, RFC 9082,
+ DOI 10.17487/RFC9082, June 2021,
+ <https://www.rfc-editor.org/info/rfc9082>.
+
+ [RFC9083] Hollenbeck, S. and A. Newton, "JSON Responses for the
+ Registration Data Access Protocol (RDAP)", STD 95,
+ RFC 9083, DOI 10.17487/RFC9083, June 2021,
+ <https://www.rfc-editor.org/info/rfc9083>.
+
+ [RFC9224] Blanchet, M., "Finding the Authoritative Registration Data
+ Access Protocol (RDAP) Service", STD 95, RFC 9224,
+ DOI 10.17487/RFC9224, March 2022,
+ <https://www.rfc-editor.org/info/rfc9224>.
+
+ [RFC9334] Birkholz, H., Thaler, D., Richardson, M., Smith, N., and
+ W. Pan, "Remote ATtestation procedureS (RATS)
+ Architecture", RFC 9334, DOI 10.17487/RFC9334, January
+ 2023, <https://www.rfc-editor.org/info/rfc9334>.
+
+ [TR-22.825]
+ 3GPP, "Study on Remote Identification of Unmanned Aerial
+ Systems (UAS)", Release 16, 3GPP TR 22.825, September
+ 2018,
+ <https://portal.3gpp.org/desktopmodules/Specifications/
+ SpecificationDetails.aspx?specificationId=3527>.
+
+ [TR-23.755]
+ 3GPP, "Study on application layer support for Unmanned
+ Aerial Systems (UAS)", Release 17, 3GPP TR 23.755, March
+ 2021,
+ <https://portal.3gpp.org/desktopmodules/Specifications/
+ SpecificationDetails.aspx?specificationId=3588>.
+
+ [TS-23.255]
+ 3GPP, "Application layer support for Uncrewed Aerial
+ System (UAS); Functional architecture and information
+ flows", Release 17, 3GPP TS 23.255, June 2021,
+ <https://portal.3gpp.org/desktopmodules/Specifications/
+ SpecificationDetails.aspx?specificationId=3843>.
+
+ [U-Space] European Organization for the Safety of Air Navigation
+ (EUROCONTROL), "U-space Concept of Operations", October
+ 2019,
+ <https://www.sesarju.eu/sites/default/files/documents/u-
+ space/CORUS%20ConOps%20vol2.pdf>.
+
+Appendix A. Overview of UAS Traffic Management (UTM)
+
+A.1. Operation Concept
+
+ The efforts of the National Aeronautics and Space Administration
+ (NASA) and FAA to integrate UAS operations into the national airspace
+ system (NAS) led to the development of the concept of UTM and the
+ ecosystem around it. The UTM concept was initially presented in
+ 2013, and version 2.0 was published in 2020 [FAA_UAS_Concept_Of_Ops].
+
+ The eventual concept refinement, initial prototype implementation,
+ and testing were conducted by the joint FAA and NASA UTM research
+ transition team. World efforts took place afterward. The Single
+ European Sky ATM Research (SESAR) started the Concept of Operation
+ for EuRopean UTM Systems (CORUS) project to research its UTM
+ counterpart concept, namely [U-Space]. This effort is led by the
+ European Organization for the Safety of Air Navigation (EUROCONTROL).
+
+ Both NASA and SESAR have published their UTM concepts of operations
+ to guide the development of their future air traffic management (ATM)
+ system and ensure safe and efficient integration of manned and
+ unmanned aircraft into the national airspace.
+
+ UTM comprises UAS operations infrastructure, procedures, and local
+ regulation compliance policies to guarantee safe UAS integration and
+ operation. The main functionality of UTM includes, but is not
+ limited to, providing means of communication between UAS operators
+ and service providers and a platform to facilitate communication
+ among UAS service providers.
+
+A.2. UAS Service Supplier (USS)
+
+ A USS plays an important role to fulfill the key performance
+ indicators (KPIs) that UTM has to offer. Such an entity acts as a
+ proxy between UAS operators and UTM service providers. It provides
+ services like real-time UAS traffic monitoring and planning,
+ aeronautical data archiving, airspace and violation control,
+ interacting with other third-party control entities, etc. A USS can
+ coexist with other USS to build a large service coverage map that can
+ load-balance, relay, and share UAS traffic information.
+
+ The FAA works with UAS industry shareholders and promotes the Low
+ Altitude Authorization and Notification Capability [LAANC] program,
+ which is the first system to realize some of the envisioned
+ functionality of UTM. The LAANC program can automate UAS operational
+ intent (flight plan) submissions and applications for airspace
+ authorization in real time by checking against multiple aeronautical
+ databases, such as airspace classification and operating rules
+ associated with it, the FAA UAS facility map, special use airspace,
+ Notice to Airmen (NOTAM), and Temporary Flight Restriction (TFR).
+
+A.3. UTM Use Cases for UAS Operations
+
+ This section illustrates a couple of use case scenarios where UAS
+ participation in UTM has significant safety improvement.
+
+ 1. For a UAS participating in UTM and taking off or landing in
+ controlled airspace (e.g., Class Bravo, Charlie, Delta, and Echo
+ in the United States), the USS under which the UAS is operating
+ is responsible for verifying UA registration, authenticating the
+ UAS operational intent (flight plan) by checking against a
+ designated UAS facility map database, obtaining the air traffic
+ control (ATC) authorization, and monitoring the UAS flight path
+ in order to maintain safe margins and follow the pre-authorized
+ sequence of authorized 4-D volumes (route).
+
+ 2. For a UAS participating in UTM and taking off or landing in
+ uncontrolled airspace (e.g., Class Golf in the United States),
+ preflight authorization must be obtained from a USS when
+ operating BVLOS. The USS either accepts or rejects the received
+ operational intent (flight plan) from the UAS. An accepted UAS
+ operation may, and in some cases must, share its current flight
+ data, such as GPS position and altitude, to the USS. The USS may
+ maintain (and provide to authorized requestors) the UAS operation
+ status near real time in the short term and may retain at least
+ some of it in the longer term, e.g., for overall airspace air
+ traffic monitoring.
+
+Appendix B. Automatic Dependent Surveillance Broadcast (ADS-B)
+
+ ADS-B is the de jure technology used in manned aviation for sharing
+ location information, from the aircraft to ground and satellite-based
+ systems, designed in the early 2000s. Broadcast RID is conceptually
+ similar to ADS-B but with the receiver target being the general
+ public on generally available devices (e.g., smartphones).
+
+ For numerous technical reasons, ADS-B itself is not suitable for low-
+ flying, small UAS. Technical reasons include, but are not limited
+ to, the following:
+
+ 1. lack of support for the 1090-MHz ADS-B channel on any consumer
+ handheld devices
+
+ 2. Cost, Size, Weight, and Power (CSWaP) requirements of ADS-B
+ transponders on CSWaP-constrained UA
+
+ 3. limited bandwidth of both uplink and downlink, which would likely
+ be saturated by large numbers of UAS, endangering manned aviation
+
+ Understanding these technical shortcomings, regulators worldwide have
+ ruled out the use of ADS-B for the small UAS for which UAS RID and
+ DRIP are intended.
+
+Acknowledgments
+
+ The work of the FAA's UAS Identification and Tracking (UAS ID)
+ Aviation Rulemaking Committee (ARC) is the foundation of later ASTM
+ and IETF DRIP WG efforts. The work of ASTM F38.02 in balancing the
+ interests of diverse stakeholders is essential to the necessary rapid
+ and widespread deployment of UAS RID. Thanks to Alexandre Petrescu,
+ Stephan Wenger, Kyle Rose, Roni Even, Thomas Fossati, Valery Smyslov,
+ Erik Kline, John Scudder, Murray Kucheraway, Robert Wilton, Roman
+ Daniliw, Warren Kumari, Zaheduzzaman Sarker, and Dave Thaler for the
+ reviews and helpful positive comments. Thanks to Laura Welch for her
+ assistance in greatly improving this document. Thanks to Dave Thaler
+ for showing our authors how to leverage the RATS model for
+ attestation in DRIP. Thanks to chairs Daniel Migault and Mohamed
+ Boucadair for direction of our team of authors and editors, some of
+ whom are relative newcomers to writing IETF documents. Thanks
+ especially to Internet Area Director Éric Vyncke for guidance and
+ support.
+
+Authors' Addresses
+
+ Stuart W. Card
+ AX Enterprize
+ 4947 Commercial Drive
+ Yorkville, NY 13495
+ United States of America
+ Email: stu.card@axenterprize.com
+
+
+ Adam Wiethuechter
+ AX Enterprize
+ 4947 Commercial Drive
+ Yorkville, NY 13495
+ United States of America
+ Email: adam.wiethuechter@axenterprize.com
+
+
+ Robert Moskowitz
+ HTT Consulting
+ Oak Park, MI 48237
+ United States of America
+ Email: rgm@labs.htt-consult.com
+
+
+ Shuai Zhao (editor)
+ Intel
+ 2200 Mission College Blvd.
+ Santa Clara, 95054
+ United States of America
+ Email: shuai.zhao@ieee.org
+
+
+ Andrei Gurtov
+ Linköping University
+ IDA
+ SE-58183 Linköping
+ Sweden
+ Email: gurtov@acm.org