<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.9 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-drip-arch-25" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DRIP Architecture">Drone Remote Identification Protocol (DRIP) Architecture</title>

    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville, NY</city>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao (Editor)" fullname="Shuai Zhao">
      <organization>Tencent</organization>
      <address>
        <postal>
          <street>2747 Park Blvd</street>
          <city>Palo Alto</city>
          <code>94588</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="A." surname="Gurtov" fullname="Andrei Gurtov">
      <organization>Linköping University</organization>
      <address>
        <postal>
          <street>IDA</street>
          <city>Linköping</city>
          <code>SE-58183 Linköping</code>
          <country>Sweden</country>
        </postal>
        <email>gurtov@acm.org</email>
      </address>
    </author>

    <date year="2022" month="July" day="25"/>

    <area>ART</area>
    <workgroup>drip</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus UAS RID-related communications. This architecture adheres to the requirements listed in the DRIP Requirements document (RFC9153).</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document describes an architecture for protocols and services to
support Unmanned Aircraft System (UAS) Remote Identification (RID) and tracking, plus RID-related communications. The architecture takes into account both current (including proposed) regulations and non-IETF technical standards.</t>

<t>The architecture adheres to the requirements listed in the DRIP Requirements document <xref target="RFC9153"/>. The requirements document provides an extended introduction to the problem space and use cases. Further, it frames the DRIP Entity Tag (DET) <xref target="I-D.ietf-drip-rid"/> within the architecture.</t>

<section anchor="overview-of-unmanned-aircraft-system-uas-remote-id-rid-and-standardization"><name>Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and Standardization</name>

<t>UAS Remote Identification (RID) is an application that enables a UAS to be identified by Unmanned Aircraft Systems Traffic Management (UTM) and UAS Service Supplier (USS) (<xref target="appendix-a"/>) or third party entities such as law enforcement. Many considerations (e.g., safety) dictate that a UAS be remotely identifiable.</t>

<t>Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID. CAAs currently promulgate performance-based regulations that do not specify techniques, but rather cite industry consensus technical standards as acceptable means of compliance.</t>

<t>USA Federal Aviation Administration (FAA)</t>

<ul empty="true"><li>
  <t>The FAA published a Notice of Proposed Rule Making <xref target="NPRM"/> in 2019  and thereafter published a "Final Rule" in 2021 <xref target="FAA_RID"/>, imposing requirements on UAS manufacturers and operators, both commercial and recreational. The rule  states that Automatic Dependent Surveillance Broadcast (ADS-B) Out and transponders cannot be used to satisfy the UAS RID requirements on UAS to which the rule applies (see <xref target="adsb"/>).</t>
</li></ul>

<t>European Union Aviation Safety Agency (EASA)</t>

<ul empty="true"><li>
  <t>The EASA published a <xref target="Delegated"/> regulation in 2019 imposing requirements on UAS manufacturers and third-country operators, including but not limited to UAS RID requirements. The same year, EASA also published an <xref target="Implementing"/> regulation laying down detailed rules and procedures for UAS operations and operating personnel which then was updated in 2021 <xref target="Implementing_update"/>. A Notice of Proposed Amendment <xref target="NPA"/> was published in 2021 to provide more information about the development of acceptable means of compliance and guidance material to support the U-space regulation.</t>
</li></ul>

<t>American Society for Testing and Materials (ASTM)</t>

<ul empty="true"><li>
  <t>ASTM International, Technical Committee F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item WK65041, developed the ASTM <xref target="F3411-19"/> Standard Specification for Remote ID and Tracking.</t>
</li></ul>

<ul empty="true"><li>
  <t>ASTM defines one set of UAS RID information and two means, MAC-layer
broadcast and IP-layer network, of communicating it.  If an UAS uses 
both communication methods, the same information must be
provided via both means. <xref target="F3411-19"/> is cited by the FAA in its UAS RID final rule
<xref target="FAA_RID"/> as "a potential means of compliance" to a Remote ID rule.</t>
</li></ul>

<t>The 3rd Generation Partnership Project (3GPP)</t>

<ul empty="true"><li>
  <t>With release 16, the 3GPP completed the UAS RID requirement study <xref target="TS-22.825"/> and proposed a set of use cases in the mobile network and services that can be offered based on UAS RID.  The Release 17 specification focuses on enhanced UAS service requirements and provides the protocol and application architecture support that will be applicable for both 4G and 5G networks.
The study of Further Architecture Enhancement for Uncrewed Aerial Vehicles (UAV) and Urban Air Mobility (UAM) <xref target="FS_AEUA"/> in release 18 further enhances the communication mechanism between UAS and USS/UTM. The DRIP Entity Tag in <xref target="rid"/> may be used as the 3GPP CAA-level UAS ID for Remote Identification purposes.</t>
</li></ul>

</section>
<section anchor="overview-of-types-of-uas-remote-id"><name>Overview of Types of UAS Remote ID</name>

<t>This specification introduces two types of UAS Remote ID defined in ASTM <xref target="F3411-19"/>.</t>

<section anchor="brid"><name>Broadcast RID</name>

<t><xref target="F3411-19"/> defines a set of UAS RID messages for direct, one-way, broadcast
transmissions from the UA over Bluetooth or Wi-Fi.  These are currently defined as MAC-Layer messages. Internet (or other Wide Area Network) connectivity is only needed for UAS registry information lookup by Observers using the directly received UAS ID.  Broadcast RID should be functionally usable in situations with no Internet connectivity.</t>

<t>The minimum Broadcast RID data flow is illustrated in <xref target="brid-fig"/>.</t>

<figure anchor="brid-fig"><artwork><![CDATA[
                +------------------------+
                | Unmanned Aircraft (UA) |
                +-----------o------------+
                            |
                            | app messages directly over 
                            | one-way RF data link (no IP)
                            |
                            v
          +------------------o-------------------+
          | Observer's device (e.g., smartphone) |
          +--------------------------------------+
]]></artwork></figure>
<t>Broadcast RID provides information only about unmanned aircraft (UA) within direct Radio Frequency (RF) Line-Of-Sight (LOS), typically similar to Visual LOS (VLOS), with a range up to approximately 1 km.  This information may be 'harvested' from received broadcasts and made available via the Internet, enabling surveillance of areas too large for local direct visual observation or direct RF link-based ID (see <xref target="harvestbridforutm"/>).</t>

</section>
<section anchor="nrid"><name>Network RID</name>

<t><xref target="F3411-19"/>, using the same data dictionary that is the basis of Broadcast RID messages, defines a Network Remote Identification (Net-RID) data flow as follows.</t>

<t><list style="symbols">
  <t>The information to be reported via UAS RID is generated by the UAS. Typically some of this data is generated by the UA and some by the GCS (Ground Control Station), e.g., their respective Global Navigation Satellite System (GNSS) derived locations.</t>
  <t>The information is sent by the UAS (UA or GCS) via unspecified means to the cognizant Network Remote Identification Service Provider (Net-RID SP), typically the USS under which the UAS is operating if participating in UTM.</t>
  <t>The Net-RID SP publishes via the Discovery and Synchronization Service (DSS) over the Internet that it has operations in various 4-D airspace volumes (Section 2.2 of <xref target="RFC9153"/>),
describing the volumes but not the operations.</t>
  <t>An Observer's device, which is expected, but not specified, to be web-based, queries a Network Remote Identification Display Provider (Net-RID DP),
typically also a USS, about any operations in a specific 4-D airspace volume.</t>
  <t>Using fully specified web-based methods over the Internet, the Net-RID DP queries all Net-RID SPs that have operations in volumes intersecting that of the Observer's query for details on all such operations.</t>
  <t>The Net-RID DP aggregates information received from all such Net-RID SPs and responds to the Observer's query.</t>
</list></t>

<t>The minimum Net-RID data flow is illustrated in <xref target="nrid-fig"/>:</t>

<figure anchor="nrid-fig"><artwork><![CDATA[
 +-------------+     ******************
 |     UA      |     *    Internet    *
 +--o-------o--+     *                *
    |       |        *                *     +------------+
    |       '--------*--(+)-----------*-----o            |
    |                *   |            *     |            |
    |       .--------*--(+)-----------*-----o Net-RID SP |
    |       |        *                *     |            |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
    |       |        *         '------*-----o            |
    |       |        *                *     | Net-RID DP |
    |       |        *         .------*-----o            |
    |       |        *         |      *     +------------+
    |       |        *         |      *
    |       |        *         |      *     +------------+
 +--o-------o--+     *         '------*-----o Observer's |
 |     GCS     |     *                *     | Device     |
 +-------------+     ******************     +------------+
]]></artwork></figure>

<t>Command and Control (C2) must flow from the GCS to the UA via some path. Currently (in the year 2022)  this is typically a direct RF link; however, with increasing Beyond Visual Line of Sight (BVLOS) operations, it is expected often to be a wireless link at either end with the Internet between.</t>

<t>Telemetry (at least the UA's position and heading) flows from the UA to the GCS via some path, typically the reverse of the C2 path. Thus, UAS RID information pertaining to both the GCS and the UA can be sent, by whichever has Internet connectivity, to the Net-RID SP, typically the USS managing the UAS operation.</t>

<t>The Net-RID SP forwards UAS RID information via the Internet to subscribed Net-RID DPs, typically USSs. Subscribed Net-RID DPs then forward RID information via the Internet to subscribed Observer devices. Regulations require and <xref target="F3411-19"/> describes UAS RID data elements that must be transported end-to-end from the UAS to the subscribed Observer devices.</t>

<t><xref target="F3411-19"/> prescribes the protocols between the Net-RID SP, Net-RID DP, and the DSS.  It also prescribes data elements (in JSON) between the Observer and the Net-RID DP. DRIP could address standardization of secure protocols between the UA and GCS (over direct wireless and Internet connection), between the UAS and the Net-RID SP, and/or between the Net-RID DP and Observer devices.</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>Informative note: Neither link layer protocols nor the use of links (e.g., the link often existing between the GCS and the UA) for any purpose other than carriage of UAS RID information is in the scope of <xref target="F3411-19"/> Network RID.</t>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="overview-of-uss-interoperability"><name>Overview of USS Interoperability</name>

<t>With Net-RID, there is direct communication between each UAS and its USS. Multiple USS exchange information with the assistance of a DSS so all USS collectively have knowledge about all activities in a 4D airspace.  The interactions among an Observer, multiple UAS, and their USS are shown in <xref target="inter-uss"/>.</t>

<figure anchor="inter-uss"><artwork><![CDATA[
                +------+    +----------+    +------+
                | UAS1 |    | Observer |    | UAS2 |
                +---o--+    +-----o----+    +--o---+
                    |             |            |
              ******|*************|************|******
              *     |             |            |     *
              *     |         +---o--+         |     *
              *     |  .------o USS3 o------.  |     *
              *     |  |      +--o---+      |  |     *
              *     |  |         |          |  |     *
              *   +-o--o-+    +--o--+     +-o--o-+   *
              *   |      o----o DSS o-----o      |   *
              *   | USS1 |    +-----+     | USS2 |   *
              *   |      o----------------o      |   *
              *   +------+                +------+   *
              *                                      *
              *               Internet               *
              ****************************************
]]></artwork></figure>

</section>
<section anchor="overview-of-drip-architecture"><name>Overview of DRIP Architecture</name>

<t><xref target="arch-intro"/> illustrates a global UAS RID usage scenario. Broadcast RID links are not shown as they reach from any UA to any listening receiver in range and thus would obscure the intent of the figure. <xref target="arch-intro"/> shows, as context, some entities and interfaces beyond the scope of DRIP (as currently (2022) chartered).</t>

<figure anchor="arch-intro"><artwork><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork></figure>

<ul empty="true"><li>
  <t>Informative note: see <xref target="RFC9153"/> for detailed definitions.</t>
</li></ul>

<t>DRIP is meant to leverage existing Internet resources (standard protocols, services, infrastructures, and business models) to meet UAS RID and closely related needs.  DRIP will specify how to apply IETF standards, complementing <xref target="F3411-19"/> and other external standards, to satisfy UAS RID requirements.</t>

<t>This document outlines the DRIP architecture in the context of the UAS RID architecture.  This includes presenting the gaps between the CAAs' Concepts of Operations and <xref target="F3411-19"/> as it relates to the use of Internet technologies and UA direct RF communications. Issues include, but are not limited to:</t>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Design of trustworthy remote identifiers (<xref target="rid"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Mechanisms to leverage the Domain Name System (DNS <xref target="RFC1034"/>), 
Extensible Provisioning Protocol (EPP <xref target="RFC5731"/>) and Registration Data Access Protocol (RDAP) (<xref target="RFC9082"/>) for publishing public and private information (see <xref target="publicinforeg"/> and <xref target="privateinforeg"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Specific authentication methods and message payload formats to enable verification that Broadcast RID messages were sent by the claimed sender (<xref target="driptrust"/>) and that the sender is in the claimed registry (<xref target="ei"/> and <xref target="driptrust"/>).</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Harvesting Broadcast RID messages for UTM inclusion, with the optional DRIP extension of Crowd Sourced Remote ID (CS-RID, <xref target="harvestbridforutm"/>), using the DRIP support for gateways required by GEN-5 <xref target="RFC9153"/>.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Methods for instantly establishing secure communications between an Observer and the pilot of an observed UAS (<xref target="dripcontact"/>), using the DRIP support for dynamic contact required by GEN-4 <xref target="RFC9153"/>.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>Privacy in UAS RID messages (PII protection) (<xref target="privacyforbrid"/>).</t>
  </list></t>
</li></ul>

</section>
</section>
<section anchor="terms-and-definitions"><name>Terms and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>To encourage comprehension necessary for adoption of DRIP by the intended user community, the UAS community's norms are respected herein.</t>

<t>This document uses terms defined in <xref target="RFC9153"/>.</t>

<section anchor="definitionsandabbr"><name>Additional Abbreviations</name>

<t>DET:        DRIP Entity Tag</t>

<t>EdDSA:      Edwards-Curve Digital Signature Algorithm</t>

<t>HHIT:       Hierarchical HIT</t>

<t>HI:         Host Identity</t>

<t>HIP:        Host Identity Protocol</t>

<t>HIT:        Host Identity Tag</t>

</section>
<section anchor="additional-definitions"><name>Additional Definitions</name>

<t>This section introduces the terms "Claims", "Assertions", "Attestations", and "Certificates" as used in DRIP. A DRIP certificate has a different context compared with security certificates and Public Key Infrastructure used in X.509.</t>

<t>Claims:</t>

<ul empty="true"><li>
  <t>A claim in DRIP is a predicate (e.g., "X is Y", "X has property Y", and most importantly "X owns Y" or "X is owned by Y").</t>
</li></ul>

<t>Assertions:</t>

<ul empty="true"><li>
  <t>An assertion in DRIP is a set of claims.  This definition is borrowed from JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/>.</t>
</li></ul>

<t>Attestations:</t>

<ul empty="true"><li>
  <t>An attestation in DRIP is a signed assertion.  The signer may be the claimant or a related party with a stake in the assertion(s).  Under DRIP this is normally used when an entity asserts a relationship with another entity, along with other information, and the asserting entity signs the assertion, thereby making it an attestation.</t>
</li></ul>

<t>Certificates:</t>

<ul empty="true"><li>
  <t>A certificate in DRIP is an attestation, strictly over identity information, signed by a third party. This third party should be one with no stake in the attestation(s) over which it is signing.</t>
</li></ul>

</section>
</section>
<section anchor="rid"><name>HHIT as the DRIP Entity Identifier</name>

<t>This section describes the DRIP architectural approach to meeting the basic requirements of a DRIP entity identifier within external technical standard ASTM <xref target="F3411-19"/> and regulatory constraints. It justifies and explains the use of Hierarchical Host Identity Tags (HHITs) <xref target="I-D.ietf-drip-rid"/> as self-asserting IPv6 addresses suitable as a UAS ID type and, more generally, as trustworthy multipurpose remote identifiers.</t>

<t>Self-asserting in this usage means that, given the Host Identity (HI), the HHIT ORCHID construction (see section 3.5 of <xref target="I-D.ietf-drip-rid"/>) and a signature of the registry on the HHIT and HI, the HHIT can be verified by the receiver as a trusted UAS ID. The explicit registration hierarchy within the HHIT provides registry discovery (managed by a Registrar) to either yield the HI for a 3rd-party (seeking UAS ID attestation) validation or prove that the HHIT and HI have been registered uniquely.</t>

<section anchor="uas-remote-identifiers-problem-space"><name>UAS Remote Identifiers Problem Space</name>

<t>A DRIP entity identifier needs to be "Trustworthy" (see DRIP Requirement GEN-1, ID-4 and ID-5 in <xref target="RFC9153"/>). This means that given a sufficient collection of UAS RID messages, an Observer can establish that the identifier claimed therein uniquely belongs to the claimant. To satisfy DRIP requirements and maintain important security properties, the DRIP identifier should be self-generated by the entity it names (e.g., a UAS) and registered (e.g., with a USS, see Requirements GEN-3 and ID-2).</t>

<t>However the Broadcast RID, especially its support for Bluetooth 4.x, imposes severe constraints. The ASTM UAS RID <xref target="F3411-19"/> allows a UAS ID of types 1, 2 and 3 of 20 bytes. <xref target="F3411-22a"/> add an additional type 4 (Specific Session ID). Type 4 uses one byte to index the Specific Session ID (leaving 19 bytes, see ID-1 of DRIP Requirement <xref target="RFC9153"/>); Specific Session ID of value 1 is allocated to IETF DRIP by ASTM.  This new Specific Session ID will be standardized by IETF and other standards development organizations (SDOs) as extensions to ASTM UAS RID.</t>

<t>Likewise, the maximum ASTM UAS RID <xref target="F3411-19"/> Authentication Message payload is 201 bytes for most authentication types. A type 5 is also added in this revision for IETF and other SDOs to develop Specific Authentication Methods as extensions to ASTM UAS RID. One byte out of 201 bytes is consumed to index the sub-type which leaves only 200 for DRIP authentication payloads, including one or more DRIP entity identifiers and associated authentication data.</t>

</section>
<section anchor="hhit-as-a-trustworthy-drip-entity-identifier"><name>HHIT as A Trustworthy DRIP Entity Identifier</name>

<t>A Remote UAS ID that can be trustworthy for use in Broadcast RID can be built from an asymmetric keypair. In this method, the UAS ID is cryptographically derived directly from the public key. The proof of UAS ID ownership (verifiable attestation, versus mere claim) is guaranteed by signing this cryptographic UAS ID with the associated private key. The association between the UAS ID and the private key is ensured by cryptographically binding the public key with the UAS ID; more specifically, the UAS ID results from the hash of the public key. The public key is designated as the HI while the UAS ID is designated as the HIT.</t>

<t>By construction, the HIT is statistically unique through the mandatory use of cryptographic hash functions with second-preimage resistance. The cryptographically-bound addition of the Hierarchy and an HHIT registration process provide complete, global HHIT uniqueness. This registration forces the attacker to generate the same public key rather than a public key that generates the same HHIT. This is in contrast to general IDs (e.g., a UUID or device serial number) as the subject in an X.509 certificate.</t>

<t>A UA equipped for Broadcast RID MUST be provisioned not only with its HHIT but also with the HI public key from which the HHIT was derived and the corresponding private key, to enable message signature.  A UAS equipped for Network RID SHOULD be provisioned likewise; the private key resides only in the ultimate source of Network RID messages (i.e., on the UA itself if the GCS is merely relaying rather than sourcing Network RID messages).  Each Observer device SHOULD be provisioned either with public keys of the DRIP identifier root registries or certificates for subordinate registries.</t>

<t>HHITs can also be used throughout the USS/UTM system. Operators and Private Information Registries, as well as other UTM entities, can use HHITs for their IDs. Such HHITs can facilitate DRIP security functions such as used with HIP to strongly mutually authenticate and encrypt communications.</t>

<t>A self-attestation of a HHIT used as a UAS ID can be done in as little as 84 bytes when Ed25519 <xref target="RFC8032"/> is used by only including the 16-byte HHIT, a 4-byte timestamp, and the 64-byte Ed25519 signature.</t>

<t>Ed25519 <xref target="RFC8032"/> is used as the HHIT Mandatory to Implement signing algorithm as <xref target="RFC9153"/> GEN-1 and ID-5 can best be met by restricting the HI to 32 bytes.  A larger public key would rule out the offline attestation feature that fits within the 200-byte Authentication Message maximum length.  Other algorithms that meet this 32 byte constraint can be added as deemed needed.</t>

<t>A DRIP identifier can be assigned to a UAS as a static HHIT by its manufacturer, such as a single HI and derived HHIT encoded as a hardware serial number per <xref target="CTA2063A"/>.  Such a static HHIT SHOULD only be used to bind one-time use DRIP identifiers to the unique UA.  Depending upon implementation, this may leave a HI private key in the possession of the manufacturer (see also <xref target="sc"/>).</t>

<t>In general, Internet access may be needed to validate Attestations or Certificates. This may be obviated in the most common cases (e.g., attestation of the UAS ID), even in disconnected environments, by prepopulating small caches on Observer devices with Registry public keys and a chain of Attestations or Certificates (tracing a path through the Registry tree). This is assuming all parties on the trust path also use HHITs for their identities.</t>

</section>
<section anchor="hhitregandlookup"><name>HHIT for DRIP Identifier Registration and Lookup</name>

<t>UAS RID needs a deterministic lookup mechanism that rapidly provides actionable information about the identified UA.  Given the size constraints imposed by the Bluetooth 4 broadcast media, the UAS ID itself needs to be a non-spoofable inquiry input into the lookup.</t>

<t>A DRIP registration process based on the explicit hierarchy within a HHIT provides manageable uniqueness of the HI for the HHIT.  The hierarchy is defined in <xref target="I-D.ietf-drip-rid"/> and consists of 2-levels, a Registered Assigning Authority (RAA) and then a Hierarchical HIT Domain Authority (HDA). The registration within this hierarchy is the defense against a cryptographic hash second pre-image attack on the HHIT (e.g., multiple HIs yielding the same HHIT, see Requirement ID-3 in <xref target="RFC9153"/>).  A lookup of the HHIT into the registration data provides the registered HI for HHIT proof of ownership.  A first-come-first-served registration for a HHIT provides deterministic access to any other needed actionable information based on inquiry access authority (more details in <xref target="privateinforeg"/>).</t>

</section>
<section anchor="hhit-as-a-cryptographic-identifier"><name>HHIT as a Cryptographic Identifier</name>

<t>The only (known to the authors at the time of this writing) existing types of IP address compatible identifiers cryptographically derived from the public keys of the identified entities are Cryptographically Generated Addresses (CGAs) <xref target="RFC3972"/> and Host Identity Tags (HITs) <xref target="RFC7401"/>.  CGAs and HITs lack registration/retrieval capability. To provide this, each HHIT embeds plaintext information designating the hierarchy within which it is registered and a cryptographic hash of that information concatenated with the entity's public key, etc. Although hash collisions may occur, the registrar can detect them and reject registration requests rather than issue credentials, e.g., by enforcing a first-claimed, first-attested policy. Pre-image hash attacks are also mitigated through this registration process, locking the HHIT to a specific HI.</t>

</section>
</section>
<section anchor="ei"><name>DRIP Identifier Registration and Registries</name>

<t>DRIP registries hold both public and private UAS information (see PRIV-1 in <xref target="RFC9153"/>) resulting from the DRIP identifier registration process.  Given these different uses, and to improve scalability, security, and simplicity of administration, the public and private information can be stored in different registries.  This section introduces the public and private information registries for DRIP identifiers. This DRIP Identifier registration process satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-3, GEN-4, ID-2, ID-4, ID-6, PRIV-3, PRIV-4, REG-1, REG-2, REG-3 and REG-4.</t>

<section anchor="publicinforeg"><name>Public Information Registry</name>

<section anchor="background"><name>Background</name>

<t>The public information registry provides trustable information such as attestations of UAS RID ownership and registration with the HDA (Hierarchical HIT Domain Authority). Optionally, pointers to the registries for the HDA and RAA (Registered Assigning Authority) implicit in the UAS RID can be included (e.g., for HDA  and RAA HHIT|HI used in attestation signing operations).  This public information will be principally used by Observers of Broadcast RID messages.  Data on UASs that only use Network RID, is available via an Observer's Net-RID DP that would directly provide all public registry information. The Net-RID DP is the only source of information for a query on an airspace volume.</t>

</section>
<section anchor="dns-as-the-public-drip-identifier-registry"><name>DNS as the Public DRIP Identifier Registry</name>

<t>A DRIP identifier SHOULD be registered as an Internet domain name (at an arbitrary level in the hierarchy, e.g., in .ip6.arpa). Thus DNS can provide all the needed public DRIP information.  A standardized HHIT FQDN (Fully Qualified Domain Name) can deliver the HI via a HIP RR (Resource Record) <xref target="RFC8005"/> and other public information (e.g., RAA and HDA PTRs, and HIP RVS (Rendezvous Servers) <xref target="RFC8004"/>). These public information registries can use secure DNS transport (e.g.,  DNS over TLS) to deliver public information that is not inherently trustable (e.g., everything other than attestations).</t>

<t>This DNS entry for the HHIT can also provide a revocation service.  For example,
instead of returning the HI RR it may return some record showing that the HI
(and thus HHIT) has been revoked.</t>

</section>
</section>
<section anchor="privateinforeg"><name>Private Information Registry</name>

<section anchor="background-1"><name>Background</name>

<t>The private information required for DRIP identifiers is similar to that required for Internet domain name registration.  A DRIP identifier solution can leverage existing Internet resources: registration protocols, infrastructure, and business models, by fitting into a UAS ID structure compatible with DNS names.  The HHIT hierarchy can provide the needed scalability and management structure. It is expected that the private information registry function will be provided by the same organizations that run a USS, and likely integrated with a USS.  The lookup function may be implemented by the Net-RID DPs.</t>

</section>
<section anchor="epp-and-rdap-as-the-private-drip-identifier-registry"><name>EPP and RDAP as the Private DRIP Identifier Registry</name>

<t>A DRIP private information registry supports essential registry operations (e.g., add, delete, update, query) using interoperable open standard protocols. It can accomplish this by using the Extensible Provisioning Protocol (EPP <xref target="RFC5730"/>) and the Registry Data Access Protocol (RDAP <xref target="RFC7480"/> <xref target="RFC9082"/> <xref target="RFC9083"/>).  The DRIP private information registry in which a given UAS is registered needs to be findable, starting from the UAS ID, using the methods specified in <xref target="RFC9224"/>.</t>

</section>
<section anchor="alternative-private-drip-registry-methods"><name>Alternative Private DRIP Registry methods</name>

<t>A DRIP private information registry might be an access-controlled DNS (e.g., via DNS over TLS).  Additionally, WebFinger <xref target="RFC7033"/> can be deployed. These alternative methods may be used by Net-RID DP with specific customers.</t>

</section>
</section>
</section>
<section anchor="driptrust"><name>DRIP Identifier Trust</name>

<t>While the DRIP entity identifier is self-asserting, it alone does not provide the trustworthiness (non-repudiability, protection vs. spoofing, message integrity protection, scalability, etc.) essential to UAS RID, as justified in <xref target="RFC9153"/>. For that it MUST be registered (under DRIP Registries) and be actively used by the party (in most cases the UA).  A sender's identity can not be proved by only possessing a DRIP Entity Tag (DET) and broadcasting it as a claim that it belongs to that sender.  Even the sender using that HI's private key to sign static data proves nothing as well, as it is subject to trivial replay attacks.  Only sending the DET and a signature on frequently changing data that can be externally validated by the Observer (such as a Location/Vector message matching actually seeing the UA at that location) proves that the observed UA possesses the claimed UAS ID.</t>

<t>For Broadcast RID, it is a challenge to balance the original requirements of Broadcast RID and the efforts needed  to satisfy the DRIP requirements all under severe constraints. From received Broadcast RID messages and information that can be looked up using the received UAS ID in online registries or local caches, it is possible to establish levels of trust in the asserted information and the Operator.</t>

<t>Optimization of different DRIP Authentication Messages allows an Observer, without Internet connection (offline) or with (online), to be able to validate a UAS DRIP ID in real-time.  First is the sending of Broadcast Attestations (over DRIP Link Authentication Messages) <xref target="I-D.ietf-drip-auth"/> containing the relevant registration of the UA's DRIP ID in the claimed Registry.  Next is sending DRIP Wrapper Authentication Messages that sign over both static (e.g., above registration) and dynamically changing data (such as UA location data).  Combining these two sets of information, an Observer can piece together a chain of trust and real-time evidence to make their determination of the UA's claims.</t>

<t>This process (combining the DRIP entity identifier, Registries and Authentication Formats for Broadcast RID) can satisfy the following DRIP requirement defined in <xref target="RFC9153"/>: GEN-1, GEN-2, GEN-3, ID-2, ID-3, ID-4 and ID-5.</t>

</section>
<section anchor="harvestbridforutm"><name>Harvesting Broadcast Remote ID messages for UTM Inclusion</name>

<t>ASTM anticipated that regulators would require both Broadcast RID and
Network RID for large UASs, but allow UAS RID requirements for small UAS
to be satisfied with the operator's choice of either Broadcast RID or
Network RID.  The EASA initially specified Broadcast RID for essentially all UAS, and is now also considering Network RID.  The FAA UAS RID Final Rules <xref target="FAA_RID"/> permit only Broadcast RID for rule compliance, but still encourage Network RID for complementary functionality, especially in support of UTM.</t>

<t>One opportunity is to enhance the architecture with gateways from Broadcast RID to Network RID. This provides the best of both and gives regulators and operators
flexibility.  It offers advantages over either form of UAS RID alone: greater fidelity than Network RID reporting of planned area operations; surveillance of areas too large for local direct visual observation and direct RF-LOS link based Broadcast RID (e.g., a city or a national forest).</t>

<t>These gateways could be pre-positioned (e.g., around airports, public gatherings, and other sensitive areas) and/or
crowd-sourced (as nothing more than a smartphone with a suitable app is needed).  As Broadcast RID media have limited range, gateways receiving messages claiming locations far from the gateway can alert authorities or a SDSP to the failed sanity check possibly indicating intent to deceive.
Surveillance SDSPs can use messages with precise date/time/position stamps from the gateways to multilaterate UA location, independent of the locations claimed in the messages, which are entirely operator self-reported in UAS RID and UTM, and thus are subject not only to natural time lag and error but also operator misconfiguration or intentional deception.</t>

<t>Multilateration technologies use physical layer information, such as precise Time Of Arrival (TOA) of transmissions from mobile transmitters at receivers with a priori precisely known locations, to estimate the locations of the mobile transmitters.</t>

<t>Further, gateways with additional sensors (e.g., smartphones with cameras) can provide independent information on the UA type and size, confirming or refuting those claims made in the UAS RID messages.</t>

<t><xref target="csridfinder"/> and <xref target="csridsdsp"/> define two additional entities that are required to provide this Crowd Sourced Remote ID (CS-RID).</t>

<t>This approach satisfies the following DRIP requirements defined in <xref target="RFC9153"/>: GEN-5, GEN-11, and REG-1. As Broadcast messages are inherently multicast, GEN-10 is met for local-link multicast to multiple Finders (how multilateration is possible).</t>

<section anchor="csridfinder"><name>The CS-RID Finder</name>
<t>A CS-RID Finder is the gateway for Broadcast Remote ID Messages into UTM.  It performs this gateway function via a CS-RID SDSP.  A CS-RID Finder could implement, integrate, or accept outputs from a Broadcast RID receiver.  However, it should not depend upon a direct interface with a GCS, Net-RID SP, Net-RID DP or Network RID client.  It would present a new interface to a CS-RID SDSP, similar to but readily distinguishable from that between a GCS and a Net-RID SP.</t>

</section>
<section anchor="csridsdsp"><name>The CS-RID SDSP</name>

<t>A CS-RID SDSP aggregates and processes (e.g., estimates UA location using multilateration when possible) information collected by CS-RID Finders. A CS-RID SDSP should appear (i.e., present the same interface) to a Net-RID SP as a Net-RID DP.</t>

</section>
</section>
<section anchor="dripcontact"><name>DRIP Contact</name>

<t>One of the ways in which DRIP can enhance <xref target="F3411-19"/> with immediately actionable information is by enabling an Observer to instantly initiate secure communications with the UAS remote pilot, Pilot In Command, operator, USS under which the operation is being flown, or other entity potentially able to furnish further information regarding the operation and its intent and/or to immediately influence further conduct or termination of the operation (e.g., land or otherwise exit an airspace volume). Such potentially distracting communications demand strong "AAA" (Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, Audit) per applicable policies (e.g., of the cognizant CAA).</t>

<t>A DRIP entity identifier based on a HHIT as outlined in <xref target="rid"/> embeds an identifier of the registry in which it can be found (expected typically to be the USS under which the UAS is flying) and the procedures outlined in <xref target="driptrust"/> enable Observer verification of that relationship. A DRIP entity identifier with suitable records in public and private registries as outlined in Section 5 can enable lookup not only of information regarding the UAS, but also identities of and pointers to information regarding the various associated entities (e.g., the USS under which the UAS is flying an operation), including means of contacting those associated entities (i.e., locators, typically IP addresses).</t>

<t>A suitably equipped Observer could initiate a secure communication channel, using the DET HI, to a similarly equipped and identified entity: the UA itself, if operating autonomously; the GCS, if the UA is remotely piloted and the necessary records have been populated in DNS; the USS, etc. Assuming secure communication setup (e.g. via IPsec or HIP), arbitrary standard higher layer protocols can then be used for Observer to Pilot (O2P communications (e.g., SIP <xref target="RFC3261"/> et seq), V2X communications (e.g., <xref target="MAVLink"/>), etc. Certain preconditions are necessary: each party needs a currently usable means (typically DNS) of resolving the other party's DRIP entity identifier to a currently usable locator (IP address); and there must be currently usable bidirectional IP (not necessarily Internet) connectivity between the parties.  One method directly supported by the use of HHITs as DRIP entity identifiers is initiation of a HIP Base Exchange (BEX) and Bound End-to-End Tunnel (BEET).</t>

<t>This approach satisfies DRIP requirement GEN-6 Contact, supports satisfaction of requirements <xref target="RFC9153"/> GEN-8, GEN-9, PRIV-2, PRIV-5 and REG-3, and is compatible with all other DRIP requirements.</t>

</section>
<section anchor="sc"><name>Security Considerations</name>

<t>The size of the public key hash in the HHIT is vulnerable to a second-image attack. It is well within current server array technology to compute another key pair that hashes to the same HHIT. Thus, if a receiver were to check HHIT validity only by verifying that the received HI and associated information, when hashed in the ORCHID construction, reproduce the received HHIT, an adversary could impersonate a validly registered UA. To defend against this, on-line receivers should verify the received HHIT and received HI with the USS with which the HHIT purports to be registered. On-line and off-line receivers can use a chain of received DRIP link attestations from a root of trust through the RAA and the HDA to the UA, as described, e.g., in <xref target="I-D.ietf-drip-auth"/> and <xref target="I-D.ietf-drip-registries"/>.</t>

<t>Compromise of a registry private key could do widespread harm <xref target="I-D.ietf-drip-registries"/>. In particular, it would allow bad actors to impersonate trusted members of said registry. Key revocation procedures are as yet to be determined. These risks are in addition to those involving Operator key management practices and will be addressed as part of the registry process.</t>

<section anchor="private-key-physical-security"><name>Private Key Physical Security</name>

<t>The security provided by asymmetric cryptographic techniques depends upon protection of the private keys. It may be necessary for the GCS to have the key pair to register the HHIT to the USS. Thus it may be the GCS that generates the key pair and delivers it to the UA, making the GCS a part of the key security boundary. Leakage of the private key either from the UA or GCS to the component manufacturer is a valid concern and steps need to be in place to ensure safe keeping of the private key.</t>

<t>Since it is possible for the UAS RID sender of a small harmless UA (or the entire UA) to be carried by a larger dangerous UA as a "false flag", it is out of scope to deal with secure store for the private key.</t>

</section>
<section anchor="post-quantum-computing"><name>Post Quantum Computing</name>

<t>There has been no effort, at this time, to address post quantum computing
cryptography.  UAs and Broadcast Remote ID communications are so
constrained that current post quantum computing cryptography is not
applicable.  Plus since a UA may use a unique HHIT for each operation, the
attack window could be limited to the duration of the operation.</t>

<t>Finally, as the HHIT contains the ID for the cryptographic suite used in its creation,
a future post quantum computing safe algorithm that fits the Remote ID constraints may readily be added.</t>

</section>
<section anchor="denial-of-service-dos-protection"><name>Denial Of Service (DOS) Protection</name>

<t>Remote ID services from the UA use a wireless link in a public space. As such, they are open to many forms of RF jamming. It is trivial for an attacker to stop any UA messages from reaching a wireless receiver. Thus it is pointless to attempt to provide relief from DOS attacks as there is always the ultimate RF jamming attack. Subtle DOS attacks of message content altering are not practical with the basic message error correction provided. Finally, this whole architecture is put forth to make DOS spoofing/replay attacks very hard.</t>

</section>
</section>
<section anchor="privacyforbrid"><name>Privacy &amp; Transparency Considerations</name>

<t>Broadcast RID messages can contain Personally Identifiable Information (PII).  A viable architecture for PII protection would be symmetric encryption of the PII using a session key known to the UAS and its USS. Authorized Observers could obtain plaintext in either of two ways. An Observer can send the UAS ID and the cyphertext to a server that offers decryption as a service. An Observer can send the UAS ID only to a server that returns the session key, so that Observer can directly locally decrypt all cyphertext sent by that UA during that session (UAS operation). In either case, the server can be: a Public Safety USS, the Observer's own USS, or the UA's USS if the latter can be determined (which under DRIP it can be, from the UAS ID itself).  PII can be protected unless the UAS is informed otherwise.  This could come as part of UTM operation authorization. It can be special instructions at the start or during an operation. PII protection MUST NOT be used if the UAS loses connectivity to the USS.  The UAS always has the option to abort the operation if PII protection is disallowed.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname='S. Card' initials='S.' role='editor' surname='Card'><organization/></author>
<author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'><organization/></author>
<author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'><organization/></author>
<author fullname='A. Gurtov' initials='A.' surname='Gurtov'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9153'/>
<seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-drip-auth'>
   <front>
      <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture.  It defines a
   few message schemes (sent within the Authentication Message) that can
   be used to authenticate past messages sent by a unmanned aircraft
   (UA) and provide proof of UA trustworthiness even in the absence of
   Internet connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-15'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-15.txt' type='TXT'/>
</reference>



<reference anchor='RFC7480' target='https://www.rfc-editor.org/info/rfc7480'>
<front>
<title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<author fullname='B. Ellacott' initials='B.' surname='Ellacott'><organization/></author>
<author fullname='N. Kong' initials='N.' surname='Kong'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='7480'/>
<seriesInfo name='DOI' value='10.17487/RFC7480'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC9082' target='https://www.rfc-editor.org/info/rfc9082'>
<front>
<title>Registration Data Access Protocol (RDAP) Query Format</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using &quot;RESTful&quot; web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9082'/>
<seriesInfo name='DOI' value='10.17487/RFC9082'/>
</reference>


<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="F3411-22a" target="https://www.astm.org/f3411-22a.html">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2022" month="July"/>
  </front>
</reference>
<reference anchor="CTA2063A" >
  <front>
    <title>Small Unmanned Aerial Systems Serial Numbers</title>
    <author >
      <organization>ANSI</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Delegated" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32019R0945">
  <front>
    <title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32019R0947">
  <front>
    <title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="Implementing_update" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32021R0664">
  <front>
    <title>EU COMMISSION IMPLEMENTING REGULATION (EU) 2021/664 of 22 April 2021 on a regulatory framework for the U-space</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="NPA" target="https://www.easa.europa.eu/downloads/134303/en">
  <front>
    <title>Notice of Proposed Amendment 2021-14 Development of acceptable means of compliance and guidance material to support the U-space regulation</title>
    <author >
      <organization>European Union Aviation Safety Agency (EASA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="LAANC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
  <front>
    <title>Low Altitude Authorization and Notification Capability</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
  <front>
    <title>Study on Remote Identification of Unmanned Aerial Systems (UAS)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
  <front>
    <title>U-space Concept of Operations</title>
    <author >
      <organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="FAA_RID" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FAA_UAS_Concept_Of_Ops" target="https://www.faa.gov/uas/research_development/traffic_management/media/UTM_ConOps_v2.pdf">
  <front>
    <title>Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations (V2.0)</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="MAVLink" target="http://mavlink.io/">
  <front>
    <title>Micro Air Vehicle Communication Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="FS_AEUA" target="https://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_147E_Electronic_2021-10/Docs/S2-2107092.zip">
  <front>
    <title>Study of Further Architecture Enhancement for UAV and UAM</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC7033' target='https://www.rfc-editor.org/info/rfc7033'>
<front>
<title>WebFinger</title>
<author fullname='P. Jones' initials='P.' surname='Jones'><organization/></author>
<author fullname='G. Salgueiro' initials='G.' surname='Salgueiro'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Smarr' initials='J.' surname='Smarr'><organization/></author>
<date month='September' year='2013'/>
<abstract><t>This specification defines the WebFinger protocol, which can be used to discover information about people or other entities on the Internet using standard HTTP methods.  WebFinger discovers information for a URI that might not be usable as a locator otherwise, such as account or email URIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7033'/>
<seriesInfo name='DOI' value='10.17487/RFC7033'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC9224' target='https://www.rfc-editor.org/info/rfc9224'>
<front>
<title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
<author fullname='M. Blanchet' initials='M.' surname='Blanchet'><organization/></author>
<date month='March' year='2022'/>
<abstract><t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9224'/>
<seriesInfo name='DOI' value='10.17487/RFC9224'/>
</reference>



<reference anchor='RFC8004' target='https://www.rfc-editor.org/info/rfc8004'>
<front>
<title>Host Identity Protocol (HIP) Rendezvous Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<author fullname='L. Eggert' initials='L.' surname='Eggert'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document defines a rendezvous extension for the Host Identity Protocol (HIP).  The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers.  Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile.  This document obsoletes RFC 5204.</t></abstract>
</front>
<seriesInfo name='RFC' value='8004'/>
<seriesInfo name='DOI' value='10.17487/RFC8004'/>
</reference>



<reference anchor='RFC5731' target='https://www.rfc-editor.org/info/rfc5731'>
<front>
<title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository.  Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5731'/>
<seriesInfo name='DOI' value='10.17487/RFC5731'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC5730' target='https://www.rfc-editor.org/info/rfc5730'>
<front>
<title>Extensible Provisioning Protocol (EPP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='69'/>
<seriesInfo name='RFC' value='5730'/>
<seriesInfo name='DOI' value='10.17487/RFC5730'/>
</reference>



<reference anchor='RFC3972' target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname='T. Aura' initials='T.' surname='Aura'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8392' target='https://www.rfc-editor.org/info/rfc8392'>
<front>
<title>CBOR Web Token (CWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='E. Wahlstroem' initials='E.' surname='Wahlstroem'><organization/></author>
<author fullname='S. Erdtman' initials='S.' surname='Erdtman'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8392'/>
<seriesInfo name='DOI' value='10.17487/RFC8392'/>
</reference>



<reference anchor='RFC8005' target='https://www.rfc-editor.org/info/rfc8005'>
<front>
<title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
<author fullname='J. Laganier' initials='J.' surname='Laganier'><organization/></author>
<date month='October' year='2016'/>
<abstract><t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t></abstract>
</front>
<seriesInfo name='RFC' value='8005'/>
<seriesInfo name='DOI' value='10.17487/RFC8005'/>
</reference>



<reference anchor='RFC9083' target='https://www.rfc-editor.org/info/rfc9083'>
<front>
<title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
<author fullname='S. Hollenbeck' initials='S.' surname='Hollenbeck'><organization/></author>
<author fullname='A. Newton' initials='A.' surname='Newton'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t></abstract>
</front>
<seriesInfo name='STD' value='95'/>
<seriesInfo name='RFC' value='9083'/>
<seriesInfo name='DOI' value='10.17487/RFC9083'/>
</reference>



<reference anchor='RFC3261' target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author fullname='J. Rosenberg' initials='J.' surname='Rosenberg'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<author fullname='A. Johnston' initials='A.' surname='Johnston'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='R. Sparks' initials='R.' surname='Sparks'><organization/></author>
<author fullname='M. Handley' initials='M.' surname='Handley'><organization/></author>
<author fullname='E. Schooler' initials='E.' surname='Schooler'><organization/></author>
<date month='June' year='2002'/>
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>


<reference anchor='I-D.ietf-drip-registries'>
   <front>
      <title>DRIP Entity Tag (DET) Registration &amp; Lookup</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Jim Reid'>
	 <organization>RTFM llp</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document details the required mechanisms for the registration
   and discovery of DRIP Entity Tags (DETs).  The registration process
   relies upon the Extensible Provisioning Protocol (EPP).  The
   discovery process leverages DNS, DNSSEC, and related technology.  The
   lookup process relies upon the Registration Data Access Protocol
   (RDAP).  The DETs can be registered with as their &quot;raw public keys&quot;
   or in X.509 certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-registries-05.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   identifier for use as the Unmanned Aircraft System Remote
   Identification and tracking (UAS RID).

   This document updates RFC7401 and RFC7343.

   Within the context of RID, HHITs will be called DRIP Entity Tags
   (DETs).  HHITs self-attest to the included explicit hierarchy that
   provides registry (via, e.g., DNS, EPP) discovery for 3rd-party
   identifier attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-30'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-30.txt' type='TXT'/>
</reference>




    </references>


<section anchor="appendix-a"><name>Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)</name>

<section anchor="operation-concept"><name>Operation Concept</name>

<t>The National Aeronautics and Space Administration (NASA) and FAA's
effort to integrate UAS operations into the national airspace
system (NAS) led to the development of the concept of UTM and the
ecosystem around it.  The UTM concept was initially presented in
2013 and version 2.0 was published in 2020 <xref target="FAA_UAS_Concept_Of_Ops"/>.</t>

<t>The eventual concept refinement, initial prototype implementation, and testing
were conducted by the joint FAA and NASA UTM research transition team. World efforts took place afterward.  The Single European Sky ATM Research (SESAR) started the CORUS project to research its
UTM counterpart concept, namely <xref target="U-Space"/>.  This effort is led by the
European Organization for the Safety of Air Navigation (Eurocontrol).</t>

<t>Both NASA and SESAR have published their UTM concepts of operations to
guide the development of their future air traffic management (ATM)
system and ensure safe and efficient integration of manned and
unmanned aircraft into the national airspace.</t>

<t>UTM comprises UAS operations infrastructure, procedures and
local regulation compliance policies to guarantee safe UAS
integration and operation.  The main functionality of UTM includes,
but is not limited to, providing means of communication between UAS
operators and service providers and a platform to facilitate
communication among UAS service providers.</t>

</section>
<section anchor="uas-service-supplier-uss"><name>UAS Service Supplier (USS)</name>

<t>A USS plays an important role to fulfill the key performance
indicators (KPIs) that UTM has to offer.  Such an Entity acts as a
proxy between UAS operators and UTM service providers.  It provides
services like real-time UAS traffic monitoring and planning,
aeronautical data archiving, airspace and violation control,
interacting with other third-party control entities, etc.  A USS can
coexist with other USS to build a large service coverage map that
can load-balance, relay, and share UAS traffic information.</t>

<t>The FAA works with UAS industry shareholders and promotes the Low Altitude Authorization and Notification Capability <xref target="LAANC"/> program, which is the first system to realize some of the envisioned functionality of UTM. The LAANC program can automate UAS operational intent (flight plan) submission and application for airspace authorization in real-time by checking against multiple aeronautical databases such as airspace classification and operating rules associated with it, FAA UAS facility map, special use airspace, Notice to Airmen (NOTAM), and Temporary Flight Restriction (TFR).</t>

</section>
<section anchor="utm-use-cases-for-uas-operations"><name>UTM Use Cases for UAS Operations</name>

<t>This section illustrates a couple of use case scenarios where UAS participation in UTM has significant safety improvement.</t>

<t><list style="numbers">
  <t>For a UAS participating in UTM and taking off or landing in
controlled airspace (e.g., Class Bravo, Charlie, Delta, and Echo
in the United States), the USS under which the UAS is operating is responsible for verifying UA registration, authenticating the UAS operational intent (flight plan) by checking against a designated UAS facility map database, obtaining the air traffic control (ATC) authorization, and monitoring the UAS flight path in order to maintain safe margins and follow the pre-authorized sequence of authorized 4-D volumes (route).</t>
  <t>For a UAS participating in UTM and taking off or landing in uncontrolled airspace (e.g., Class Golf in the United States), pre-flight authorization must be obtained from a USS when operating
Beyond-Visual-Line-of-Sight (BVLOS).  The USS either accepts or rejects the received operational intent (flight plan) from the UAS.  Approved UAS operation may share its current flight data such as GPS position and altitude to the USS.  The USS may keep the UAS operation status near real-time and may keep it as a record for overall airspace air traffic monitoring.</t>
</list></t>

</section>
</section>
<section anchor="adsb"><name>Automatic Dependent Surveillance Broadcast (ADS-B)</name>

<t>The ADS-B is the de jure technology used in manned aviation for sharing location information, from the aircraft to ground and satellite-based systems, designed in the early 2000s. Broadcast RID is 
conceptually similar to ADS-B, but with the receiver target being the general public on generally available devices (e.g., smartphones).</t>

<t>For numerous technical reasons, ADS-B itself is not suitable for low-flying small UAS. Technical reasons include but are not limited to the following:</t>

<t><list style="numbers">
  <t>Lack of support for the 1090 MHz ADS-B channel on any consumer handheld devices</t>
  <t>Weight and cost of ADS-B transponders on CSWaP (Cost, Size, Weight, and Power) constrained UA</t>
  <t>Limited bandwidth of both uplink and downlink, which would likely be saturated by large numbers of UASs, endangering manned aviation</t>
</list></t>

<t>Understanding these technical shortcomings, regulators worldwide have ruled out the use of ADS-B for the small UAS for which UAS RID and DRIP are intended.</t>

</section>
<section numbered="no" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The work of the FAA's UAS Identification and Tracking (UAS ID) Aviation Rulemaking Committee (ARC) is the foundation of later ASTM and proposed IETF DRIP WG efforts.  The work of ASTM F38.02 in balancing the interests of diverse stakeholders is essential to the necessary rapid and widespread deployment of UAS RID. Thanks to Alexandre Petrescu and Stephan Wenger for the helpful and positive comments. Thanks to chairs Daniel Migault and Mohamed Boucadair for direction of our team of authors and editor, some of whom are newcomers to writing IETF documents. Laura Welch is also thanked for her valuable review comments that led to great improvements of this memo.  Thanks especially to Internet Area Director Eric Vyncke for guidance and support.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

