<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<?rfc iprnotified="no" ?>
<?rfc strict="no" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
	docName="draft-ietf-drip-reqs-07" category="info" 
	ipr="trust200902" obsoletes="" updates="" submissionType="IETF" 
	xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" 
	version="3">
  <!-- xml2rfc v2v3 conversion 2.37.1 -->
<front>
	<title abbrev="DRIP Requirements">Drone Remote Identification Protocol 
	(DRIP) Requirements</title>
	<seriesInfo name="Internet-Draft" value="draft-ietf-drip-reqs-07"/>
	<author fullname="Stuart W. Card" 
	initials="S." surname="Card" role="editor">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
		<street>4947 Commercial Drive</street>
		<city>Yorkville</city>
		<region>NY</region>
		<code>13495</code>
		<country>USA</country>
	  </postal>
	  <email>stu.card@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Adam Wiethuechter" 
	initials="A." surname="Wiethuechter">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
		<street>4947 Commercial Drive</street>
		<city>Yorkville</city>
		<region>NY</region>
		<code>13495</code>
		<country>USA</country>
	  </postal>
	  <email>adam.wiethuechter@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Robert Moskowitz" 
	initials="R" surname="Moskowitz">
	<organization>HTT Consulting</organization>
	<address>
	  <postal>
		<street/>
		<city>Oak Park</city>
		<region>MI</region>
		<code>48237</code>
		<country>USA</country>
	  </postal>
	  <email>rgm@labs.htt-consult.com</email>
	</address>
	</author>
	<author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
	<organization>Linköping University</organization>
	<address>
	  <postal>
		<street>IDA</street>
        <city>Linköping</city>
        <code>58183</code>
        <country>Sweden</country>
      </postal>
      <email>gurtov@acm.org</email>
    </address>
    </author>
    <date year="2021"/>
    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>
    <keyword>Request for Comments</keyword>
    <keyword>I-D</keyword>
    <keyword>Internet-Draft</keyword>
    <keyword>DRIP</keyword>
<abstract>
<t>
	This document defines terminology and requirements for Drone Remote 
	Identification Protocol (DRIP) Working Group solutions to support 
	Unmanned Aircraft System Remote Identification and tracking (UAS 
	RID) for security, safety, and other purposes. Complementing 
	external technical standards as regulator-accepted means of 
	compliance with UAS RID regulations, DRIP will facilitate use of 
	existing Internet resources to support UAS RID and to enable 
	enhanced related services, and enable online and offline 
	verification that UAS RID information  is trustworthy.
</t>
</abstract>
</front>
<middle>
<section numbered="true" toc="default"> <name>Introduction</name>
<section numbered="true" toc="default"> <name>Motivation</name>
<t>
	Many considerations (especially safety and security) necessitate 
	Unmanned Aircraft Systems (UAS) Remote Identification and tracking 
	(RID).
</t>
<t>
	Unmanned Aircraft (UA) may be fixed wing, rotary wing (e.g., 
	helicopter), hybrid, balloon, rocket, etc. Small fixed wing UA 
	typically have Short Take-Off and Landing (STOL) capability; rotary 
	wing and hybrid UA typically have Vertical Take-Off and Landing 
	(VTOL) capability. UA may be single- or multi-engine. The most 
	common today are multicopters: rotary wing, multi engine. The 
	explosion in UAS was enabled by hobbyist development, for 
	multicopters, of advanced flight stability algorithms, enabling 
	even inexperienced pilots to take off, fly to a location of 
	interest, hover, and return to the take-off location or land at a 
	distance. UAS can be remotely piloted by a human (e.g., with a 
	joystick) or programmed to proceed from Global Navigation Satellite 
	System (GNSS) waypoint to waypoint in a weak form of autonomy; 
	stronger autonomy is coming. 
</t>
<t>
	Small UA are "low observable" as they:
</t>
	<ul spacing="normal" empty="false">
	<li>
		typically have small radar cross sections;
	</li>
	<li>
		make noise quite noticeable at short range but difficult to 
		detect at distances they can quickly close (500 meters in under 
		17 seconds at 60 knots);
	</li>
	<li>
		typically fly at low altitudes (e.g., for those to which RID 
		applies in the US, under 400 feet Above Ground Level (AGL) as 
		per <xref target="Part107" format="default"/>);
	</li>
	<li>
		are highly maneuverable so can fly under trees and between
		buildings.
	</li>
	</ul>
<t>
	UA can carry payloads including sensors, cyber and kinetic weapons, 
	or can be used themselves as weapons by flying them into targets. 
	They can be flown by clueless, careless, or criminal operators. 
	Thus the most basic function of UAS RID is "Identification Friend 
	or Foe" (IFF) to mitigate the significant threat they present.
</t>
<t> 
	Diverse other applications can be enabled or facilitated by RID. 
	Consider the importance of identifiers in many Internet protocols 
	and services, e.g., Fully Qualified Domain Names (FQDNs), transport 
	protocol identifiers, UDP and TCP ports, Uniform Resource 
	Identifiers (URIs), X.509 public key identifiers, E.164 numbers, 
	Network Access Identifiers (NAIs), email addresses, Digital Object 
	Identifiers (DOIs), and pretty much anything for which IANA is 
	responsible.
</t>
<t>
	The general UAS RID usage scenario is illustrated in <xref 
	target="Scenario" format="default"/>.
</t>
<figure anchor="Scenario">
<name>"General UAS RID Usage Scenario"</name>
<artwork type="ascii-art">

                     UA1               UA2
                     x x               x x
                    xxxxx             xxxxx


   General      x                           x     Public
   Public     xxxxx                       xxxxx   Safety
   Observer     x                           x     Observer
                x                           x
               x x ---------+  +---------- x x
              x   x         |  |          x   x
                            |  |
                            +  +
                         xxxxxxxxxx
                        x          x
            +----------+x Internet x+------------+
            |           x          x             |
UA1       x |            xxxxxxxxxx              | x    UA2
Pilot/  xxxxx               + + +                xxxxx  Pilot/
Operator  x                 | | |                  x    Operator
          x                 | | |                  x
         x x                | | |                 x x
        x   x               | | |                x   x
                            | | |
          +----------+      | | |       +----------+
          |          |------+ | +-------|          |
          | Public   |        |         | Private  |
          | Registry |     +-----+      | Registry |
          |          |     | DNS |      |          |
          +----------+     +-----+      +----------+

</artwork>
</figure>
<t>
	<xref target="Scenario" format="default"/> illustrates a typical 
	case where there may be: multiple Observers, some of them members 
	of the general public, others government officers with public 
	safety/security responsibilities; multiple UA in flight within 
	observation range, each with its own pilot/operator; at least one 
	registry each for lookup of public and (by authorized parties only) 
	private information regarding the UAS and their pilots/operators; 
	and in the DRIP vision, DNS resolving various identifiers and 
	locators of the entities involved. Note the absence of any links 
	to/from the UA in the figure; this is because UAS RID and other 
	connectivity involving the UA varies as described below.
</t>
<t>
	An Observer of UA may need to classify them, as illustrated 
	notionally in <xref target="Classification" format="default"/>, for 
	basic airspace Situational Awareness (SA). An Observer who 
	classifies a UAS: as Taskable, can ask it to do something useful; 
	as Low Concern, can reasonably assume it is not malicious and would 
	cooperate with requests to modify its flight plans for safety 
	concerns that arise; as High Concern or Unidentified, can focus 
	surveillance on it.
</t>
<figure anchor="Classification">
<name>"Notional UAS Classification"</name>
<artwork type="ascii-art">

                     xxxxxxx        +--------------+
                    x       x  No   |              |
                   x   ID?   x+---->| Unidentified |
                    x       x       |              |
                     xxxxxxx        +--------------+
                        +
                        | Yes
                        v
                     xxxxxxx
                    x       x
        +---------+x  Type?  x+----------+
        |           x       x            |
        |            xxxxxxx             |
        |               +                |
        v               v                v
+--------------+ +--------------+ +--------------+
|              | |              | |              |
|  Taskable    | | Low Concern  | | High Concern |
|              | |              | |              |
+--------------+ +--------------+ +--------------+

</artwork>
</figure>
<t>
	ASTM International, Technical Committee F38 (UAS), Subcommittee 
	F38.02 (Aircraft Operations), Work Item WK65041, developed the 
	widely cited Standard Specification for Remote ID and Tracking 
	<xref target="F3411-19" format="default"/>: the published standard 
	is available for purchase from ASTM and as an ASTM membership 
	premium; early drafts are freely available as <xref 
	target="OpenDroneID" format="default"/> specifications. <xref 
	target="F3411-19" format="default"/> is frequently referenced in 
	DRIP, where building upon its link layers and both enhancing 
	support for and expanding the scope of its applications is a 
	central focus.
</t>
<t>
	In many applications, including UAS RID, identification and 
	identifiers are not ends in themselves; they exist to enable 
	lookups and provision of other services.
</t>
<t>
	Using UAS RID to facilitate vehicular (V2X) communications and 
	applications such as Detect And Avoid (DAA), which would impose 
	tighter latency bounds than RID itself, is an obvious possibility, 
	explicitly contemplated in the United States (US) Federal Aviation 
	Administration (FAA) Remote Identification of Unmanned Aircraft 
	rule <xref target="FRUR" format="default"/>. However, applications 
	of RID beyond RID itself, including DAA, have been declared out of 
	scope in ASTM F38.02 WK65041, based on a distinction between RID as 
	a security standard vs DAA as a safety application. Although 
	dynamic establishment of secure communications between the Observer 
	and the UAS pilot seems to have been contemplated by the FAA UAS ID 
	and Tracking Aviation Rulemaking Committee (ARC) in their <xref 
	target="Recommendations" format="default"/>, it is not addressed in 
	any of the subsequent regulations or technical specifications.
</t>
<t>
	<xref target="Opinion1" format="default"/> and <xref target="WG105" 
	format="default"/> cite the Direct Remote Identification previously 
	required and specified, explicitly stating that whereas Direct RID 
	is primarily for security purposes, the "Network Identification 
	Service" <xref target="Opinion1" format="default"/> (in the context 
	of U-space <xref target="InitialView" format="default"/>) or 
	"Electronic Identification" <xref target="WG105" format="default"/> 
	is primarily for safety purposes (e.g., Air Traffic Management, 
	especially hazards deconfliction) and also is allowed to be used 
	for other purposes such as support of efficient operations. These 
	emerging standards allow the security and safety oriented systems 
	to be separate or merged. In addition to mandating both Broadcast 
	and Network one-way to Observers, they will use V2V to other UAS 
	(also likely to and/or from some manned aircraft). These reflect 
	the broad scope of the European Union (EU) U-space concept, as 
	being developed in the Single European Sky ATM Research (SESAR) 
	Joint Undertaking, the U-space architectural principles of which 
	are outlined in <xref target="InitialView" format="default"/>.
</t>
<t>
	Security oriented UAS RID essentially has two goals: enable the 
	general public to obtain and record an opaque ID for any observed 
	UA, which they can then report to authorities; enable authorities, 
	from such an ID, to look up information about the UAS and its 
	operator. Safety oriented UAS RID has stronger requirements. 
	Aviation community Standards Development Organizations (SDOs) set a 
	higher bar for safety than for security, especially with respect to 
	reliability.
</t>
</section>
<section numbered="true" toc="default"> <name>Concerns and Constraints</name>
<t> 
	Disambiguation of multiple UA flying in close proximity may be very 
	challenging, even if each is reporting its identity, position, and 
	velocity as accurately as it can.
</t>
<t>
	The origin of all information in UAS RID is operator self-reports. 
	Reports may be initiated by the remote pilot at the Ground Control 
	Station (GCS) console, by a software process on the GCS, or by a 
	process on the UA. Data in the reports may come from the UA (e.g., 
	an on-board GNSS receiver), the GCS (e.g., dead reckoning UA 
	location based on takeoff location and piloting commands given 
	since takeoff), and/or sensors available to the operator (e.g., 
	radar or cameras). Whether information comes proximately from the 
	operator, or from automated systems configured by the operator, 
	there are possibilities not only of unintentional error in, but 
	also of intentional falsification of, this data.
</t>
<t>
	Minimal specified information must be made available to the public. 
	Access to other data, e.g., UAS operator Personally Identifiable 
	Information (PII), must be limited to strongly authenticated 
	personnel, properly authorized in accordance with applicable 
	policy. The balance between privacy and transparency remains a 
	subject for public debate and regulatory action; DRIP can only 
	offer tools to expand the achievable trade space and enable 
	trade-offs within that space. <xref target="F3411-19" 
	format="default"/>, the basis for most current (2021) thinking 
	about and efforts to provide UAS RID, specifies only how to get the 
	UAS ID to the Observer: how the Observer can perform these lookups 
	and how the registries first can be populated with information are 
	unspecified therein.
</t>
<t>
	The need for nearly universal deployment of UAS RID is pressing: 
	consider how negligible the value of an automobile license plate 
	system would be if only 90% of the cars displayed plates. This 
	implies the need to support use by Observers of already ubiquitous 
	mobile devices (typically smartphones and tablets). Anticipating 
	Civil Aviation Authority (CAA) requirements to support legacy 
	devices, especially in light of <xref target="Recommendations" 
	format="default"/>, <xref target="F3411-19" format="default"/> 
	specifies that any UAS sending Broadcast RID over Bluetooth must do 
	so over Bluetooth 4, regardless of whether it also does so over 
	newer versions; as UAS sender devices and Observer receiver devices 
	are unpaired, this implies extremely short "advertisement" (beacon) 
	frames.
</t>
<t>
	Wireless data links on the UA are challenging due to low altitude 
	flight amidst structures and foliage over terrain, as well as the 
	severe Cost, Size, Weight, and Power (CSWaP) constraints of devices 
	onboard UA. CSWaP is a burden not only on the designers of new UA 
	for production and sale, but also on owners of existing UA that 
	must be retrofit. Radio Controlled (RC) aircraft modelers, "hams" 
	who use licensed amateur radio frequencies to control UAS, drone 
	hobbyists, and others who custom build UAS, all need means of 
	participating in UAS RID, sensitive to both generic CSWaP and 
	application-specific considerations.
</t>
<t>	
	To accommodate the most severely constrained cases, all these 
	conspire to motivate system design decisions that complicate the 
	protocol design problem. All UA are constrained by their batteries 
	(both instantaneous power and total energy) and small UA imply 
	small antennas, so wireless air to ground links will generally be 
	slow and unreliable. Densely populated volumes will suffer from 
	link congestion: even if UA in an airspace volume are few, other 
	transmitters nearby on the ground, sharing the same license free 
	spectral band may be many. Broadcast RID uses one-way data links. 
	Bluetooth 4 restricts broadcast messages to fit in extremely short 
	"advertisement" packets. UA onboard devices may have Internet 
	connectivity only intermittently, or not at all, during flight. 
	Internet-disconnected operation of Observer devices has been deemed 
	by ASTM F38.02 too infrequent to address, but for some users is 
	important and presents further challenges.
</t>
<t>
	As RID must often operate within these constraints, heavyweight 
	cryptographic security protocols or even simple cryptographic 
	handshakes are infeasible, yet trustworthiness of UAS RID 
	information is essential. Under <xref target="F3411-19" 
	format="default"/>, <em>even the most basic datum, the UAS ID 
	itself, can be merely an unsubstantiated claim</em>.
</t>
<t>
	Observer devices being ubiquitous, thus popular targets for malware 
	or other compromise, cannot be generally trusted (although the user 
	of each device is compelled to trust that device, to some extent); 
	a "fair witness" functionality (inspired by <xref target="Stranger" 
	format="default"/>) is desirable.
</t>
<t>
	Despite work by regulators and SDOs, there are substantial gaps in 
	UAS standards generally and UAS RID specifically. <xref 
	target="Roadmap" format="default"/> catalogs UAS related standards, 
	ongoing standardization activities and gaps (as of 2020); Section 
	7.8 catalogs those related specifically to UAS RID. DRIP will 
	address the most fundamental of these gaps, as foreshadowed above.
</t>
</section>
<section numbered="true" toc="default"> <name>DRIP Scope</name>
<t>
	DRIP’s initial goal is to make RID immediately actionable, in both 
	Internet and local-only connected scenarios (especially 
	emergencies), in severely constrained UAS environments, balancing 
	legitimate (e.g., public safety) authorities’ Need To Know 
	trustworthy information with UAS operators’ privacy. By 
	"immediately actionable" is meant information of sufficient 
	precision, accuracy, timeliness, etc. for an Observer to use it as 
	the basis for immediate decisive action, whether that be to trigger 
	a defensive counter-UAS system, to attempt to initiate 
	communications with the UAS operator, to accept the presence of the 
	UAS in the airspace where/when observed as not requiring further 
	action, or whatever, with potentially severe consequences of any 
	action or inaction chosen based on that information. For further 
	explanation of the concept of immediate actionability, see <xref 
	target="ENISACSIRT" format="default"/>.
</t>
<t>
	Note that UAS RID must achieve nearly universal adoption, but DRIP 
	can add value even if only selectively deployed. Authorities with 
	jurisdiction over more sensitive airspace volumes may set a higher 
	than generally mandated RID requirement for flight in such volumes. 
	Those with a greater need for high-confidence IFF can equip with 
	DRIP, enabling strong authentication of their own aircraft and 
	allied operators without regard for the weaker (if any) 
	authentication of others.
</t>
<t>	
	DRIP (originally Trustworthy Multipurpose Remote Identification, 
	TM-RID) potentially could be applied to verifiably identify other 
	types of registered things reported to be in specified physical 
	locations, and providing timely trustworthy identification data is 
	also prerequisite to identity-oriented networking, but the urgent 
	motivation and clear initial focus is UAS. Existing Internet 
	resources (protocol standards, services, infrastructure, and 
	business models) should be leveraged.
</t>
</section>
<section numbered="true" toc="default"> <name>Document Scope</name>
<t>
	This document describes the problem space for UAS RID conforming to 
	proposed regulations and external technical standards, defines 
	common terminology, specifies numbered requirements for DRIP, 
	identifies some important considerations (IANA, security, privacy 
	and transparency), and discusses limitations.
</t>
<t>
	A natural Internet based approach to meet these requirements is 
	described in a companion architecture document <xref 
	target="I-D.ietf-drip-arch" format="default"/> and elaborated in 
	other DRIP documents.
</t>
</section>
</section>
<section anchor="terms" numbered="true" toc="default"> <name>Terms and Definitions</name>
<section numbered="true" toc="default"> <name>Requirements Terminology</name>
<t>
	The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
	"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", 
	and "OPTIONAL" in this document are to be interpreted as described 
	in BCP 14 <xref target="RFC2119" format="default"/> <xref 
	target="RFC8174" format="default"/> when, and only when, they 
	appear in all capitals, as shown here.
</t>
</section>
<section numbered="true" toc="default"> <name>Definitions</name>
<t>
	This section defines a non-comprehensive set of terms expected to 
	be used in DRIP documents. This list is meant to be the DRIP 
	terminology reference; as such, some of the terms listed below are 
	not used in this document.
</t> 
<t>
	<xref target="RFC4949" format="default"/> provides a glossary 
	of Internet security terms that should be used where applicable.
</t>	
<t>
	In the UAS community, the plural form of acronyms generally is the 
	same as the singular form, e.g., Unmanned Aircraft System (singular) 
	and Unmanned Aircraft Systems (plural) are both represented as UAS. 
	On this and other terminological issues, to encourage comprehension 
	necessary for adoption of DRIP by the intended user community, that 
	community's norms are respected herein, and definitions are quoted 
	in cases where they have been found in that community's documents. 
	Most of the listed terms are from that community (even if specific 
	source documents are not cited); any that are DRIP-specific or 
	invented by the authors of this document are marked "(DRIP)".
</t>
	<dl newline="true" spacing="normal">
		<dt>4-D</dt>
		<dd>
			Four-dimensional. Latitude, Longitude, Altitude, Time. Used 
			especially to delineate an airspace volume in which an 
			operation is being or will be conducted.
		</dd>
		<dt>AAA</dt>
		<dd>
			Attestation, Authentication, Authorization, Access Control, 
			Accounting, Attribution, Audit, or any subset thereof (uses 
			differ by application, author, and context). (DRIP)
		</dd>
		<dt>ABDAA</dt>
		<dd>
			AirBorne DAA. Accomplished using systems onboard the 
			aircraft involved. Supports "self-separation" (remaining 
			"well clear" of other aircraft) and collision avoidance.
		</dd>
		<dt>ADS-B</dt>
		<dd>
			Automatic Dependent Surveillance - Broadcast. "ADS-B Out" 
			equipment obtains aircraft position from other on-board 
			systems (typically GNSS) and periodically broadcasts it to 
			"ADS-B In" equipped entities, including other aircraft, 
			ground stations, and satellite based monitoring systems.
		</dd>
		<dt>AGL</dt>
		<dd>
			Above Ground Level. Relative altitude, above the variously 
			defined local ground level, typically of a UA, measured in 
			feet or meters. Should be explicitly specified as either 
			barometric (pressure) or geodetic (GNSS) altitude.
		</dd>
		<dt>ATC</dt>
		<dd>
			Air Traffic Control. Explicit flight direction to pilots 
			from ground controllers. Contrast with ATM.
		</dd>
		<dt>ATM</dt>
		<dd>
			Air Traffic Management. A broader functional and geographic 
			scope and/or a higher layer of abstraction than ATC. "The 
			dynamic, integrated management of air traffic and airspace 
			including air traffic services, airspace management and air 
			traffic flow management - safely, economically and 
			efficiently - through the provision of facilities and 
			seamless services in collaboration with all parties and 
			involving airborne and ground-based functions" <xref 
			target="ICAOATM" format="default"/>.
		</dd>
		<dt>Authentication Message</dt>
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 2. 
			Provides framing for authentication data, only.
		</dd>
		<dt>Basic ID Message</dt> 
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 0. 
			Provides UA Type, UAS ID Type, and UAS ID, only.
		</dd>
		<dt>BVLOS</dt>
		<dd>
			Beyond Visual Line Of Sight. See VLOS.
		</dd>
		<dt>CAA</dt>
		<dd>
			Civil Aviation Authority of a regulatory jurisdiction. 
			Often so named, but other examples include the United 
			States Federal Aviation Administration (FAA) and the Japan 
			Civil Aviation Bureau.
		</dd>
		<dt>CSWaP</dt>
		<dd>
			Cost, Size, Weight, and Power.
		</dd>
		<dt>C2</dt>
		<dd>
			Command and Control. Previously mostly used in military 
			contexts. Properly refers to a function, exercisable over 
			arbitrary communications; but in the small UAS context, 
			often refers to the communications (typically RF data link) 
			over which the GCS controls the UA.
		</dd>
		<dt>DAA</dt>
		<dd>
			Detect And Avoid, formerly Sense And Avoid (SAA). A means 
			of keeping aircraft "well clear" of each other and 
			obstacles for safety. "The capability to see, sense or 
			detect conflicting traffic or other hazards and take the 
			appropriate action to comply with the applicable rules of 
			flight" <xref target="ICAOUAS" format="default"/>.
		</dd>
		<dt>Direct RID</dt>
		<dd>
			Direct Remote Identification. EU regulatory requirement for 
			"a system that ensures the local broadcast of information 
			about a UA in operation, including the marking of the UA, 
			so that this information can be obtained without physical 
			access to the UA". <xref target="Delegated" 
			format="default"/> that presumably can be satisfied with 
			appropriately configured <xref target="F3411-19" 
			format="default"/> Broadcast RID.
		</dd>
		<dt>DSS</dt>
		<dd>
			Discovery and Synchronization Service. Formerly Inter-USS. 
			The UTM system overlay network backbone. Most importantly, 
			it enables one USS to learn which other USS have UAS 
			operating in a given 4-D airspace volume, for strategic 
			deconfliction of planned operations and Network RID 
			surveillance of active operations. <xref target="F3411-19" 
			format="default"/>
		</dd>
		<dt>EUROCAE</dt>
		<dd>
			European Organisation for Civil Aviation Equipment. 
			Aviation SDO, originally European, now with broader 
			membership. Cooperates extensively with RTCA.
		</dd>
		<dt>GBDAA</dt>
		<dd>
			Ground Based DAA. Accomplished with the aid of ground based 
			functions.
		</dd>
		<dt>GCS</dt>
		<dd>
			Ground Control Station. The part of the UAS that the remote 
			pilot uses to exercise C2 over the UA, whether by remotely 
			exercising UA flight controls to fly the UA, by setting 
			GNSS waypoints, or otherwise directing its flight.
		</dd>
		<dt>GNSS</dt>
		<dd>
			Global Navigation Satellite System. Satellite based timing 
			and/or positioning with global coverage, often used to 
			support navigation.
		</dd>
		<dt>GPS</dt>
		<dd>
			Global Positioning System. A specific GNSS, but in the UAS 
			context, the term is typically misused in place of the more 
			generic term GNSS.
		</dd>
		<dt>GRAIN</dt>
		<dd>
			Global Resilient Aviation Interoperable Network. ICAO 
			managed IPv6 overlay internetwork based on IATF, dedicated 
			to aviation (but not just aircraft). Currently (2021) in 
			design, accommodating the proposed DRIP identifier.
		</dd>
		<dt>IATF</dt>
		<dd>
			International Aviation Trust Framework. ICAO effort to 
			develop a resilient and secure by design framework for 
			networking in support of all aspects of aviation.
		</dd>
		<dt>ICAO</dt>
		<dd>
			International Civil Aviation Organization. A United Nations 
			specialized agency that develops and harmonizes 
			international standards relating to aviation.
		</dd>
		<dt>LAANC</dt>
		<dd>
			Low Altitude Authorization and Notification Capability. 
			Supports ATC authorization requirements for UAS operations: 
			remote pilots can apply to receive a near real-time 
			authorization for operations under 400 feet in controlled 
			airspace near airports. US partial stopgap until UTM comes.
		</dd>
<!--	<dt>Limited RID</dt>
		<dd>
			A proposed mode of operation that must use Network RID, 
			must not use Broadcast RID, and must provide pilot/GCS 
			location only (not UA location). This mode was to be 
			allowed only for UA that neither require (due to e.g., 
			size) nor are equipped for Standard RID, operated within 
			VLOS and within 400 feet of the pilot, below 400 feet AGL, 
			etc. <xref target="NPRM" format="default"/> Not actually 
			permitted by the "final" rule <xref target="FRUR" 
			format="default"/> but the term is retained in this 
			glossary to facilitate interpretation of older references.
		</dd>
-->
		<dt>Location/Vector Message</dt>
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 1. 
			Provides UA location, altitude, heading, speed, and status.
		</dd>
		<dt>LOS</dt>
		<dd>
			Line Of Sight. An adjectival phrase describing any 
			information transfer that travels in a nearly straight line 
			(e.g., electromagnetic energy, whether in the visual light, 
			RF, or other frequency range) and is subject to blockage. A 
			term to be avoided due to ambiguity, in this context, 
			between RF LOS and VLOS.
		</dd>
		<dt>Message Pack</dt>
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 15. 
			The framed concatenation, in message type index order, of 
			at most one message of each type of any subset of the other 
			types. Required to be sent in Wi-Fi NAN and in Bluetooth 5 
			Extended Advertisements, if those media are used; cannot be 
			sent in Bluetooth 4.
		</dd>
		<dt>MSL</dt>
		<dd>
			Mean Sea Level. Shorthand for relative altitude, above the 
			variously defined mean sea level, typically of a UA (but in 
			<xref target="FRUR" format="default"/> also for a GCS), 
			measured in feet or meters. Should be explicitly specified 
			as either barometric (pressure) or geodetic (e.g., as 
			indicated by GNSS, referenced to the WGS84 ellipsoid).
		</dd>
		<dt>Net-RID DP</dt>
		<dd>
			Network RID Display Provider. <xref target="F3411-19" 
			format="default"/> logical entity that aggregates data from 
			Net-RID SPs as needed in response to user queries regarding 
			UAS operating within specified airspace volumes, to enable 
			display by a user application on a user device. Potentially 
			could provide not only information sent via UAS RID but 
			also information retrieved from UAS RID registries or 
			information beyond UAS RID. Under superseded <xref 
			target="NPRM" format="default"/>, not recognized as a 
			distinct entity, but a service provided by USS, including 
			Public Safety USS that may exist primarily for this purpose 
			rather than to manage any subscribed UAS. 
		</dd>
		<dt>Net-RID SP</dt>
		<dd>
			Network RID Service Provider. <xref target="F3411-19" 
			format="default"/> logical entity that collects RID 
			messages from UAS and responds to NetRID-DP queries for 
			information on UAS of which it is aware. Under superseded 
			<xref target="NPRM" format="default"/>, the USS to which 
			the UAS is subscribed ("Remote ID USS").
		</dd>
		<dt>Network Identification Service</dt>
		<dd>
			EU regulatory requirement in <xref target="Opinion1" 
			format="default"/> and <xref target="WG105" 
			format="default"/> that presumably can be satisfied with 
			appropriately configured <xref target="F3411-19" 
			format="default"/> Network RID.
		</dd>		
		<dt>Observer</dt>
		<dd>
			An entity (typically but not necessarily an individual 
			human) who has directly or indirectly observed a UA and 
			wishes to know something about it, starting with its ID. An 
			observer typically is on the ground and local (within VLOS 
			of an observed UA), but could be remote (observing via 
			Network RID or other surveillance), operating another UA, 
			aboard another aircraft, etc. (DRIP)
		</dd>
		<dt>Operation</dt>
		<dd>
			A flight, or series of flights of the same mission, by the 
			same UAS, separated by at most brief ground intervals. 
			(Inferred from UTM usage, no formal definition found)
		</dd>
		<dt>Operator</dt>
		<dd>
			"A person, organization or enterprise engaged in or 
			offering to engage in an aircraft operation" <xref 
			target="ICAOUAS" format="default"/>.
		</dd>
		<dt>Operator ID Message</dt>
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 5. 
			Provides CAA issued Operator ID, only. Operator ID is 
			distinct from UAS ID.
		</dd>
		<dt>PIC</dt>
		<dd>
			Pilot In Command. "The pilot designated by the operator, or 
			in the case of general aviation, the owner, as being in 
			command and charged with the safe conduct of a flight" 
			<xref target="ICAOUAS" format="default"/>.
		</dd>
		<dt>PII</dt>
		<dd>
			Personally Identifiable Information. In the UAS RID 
			context, typically of the UAS Operator, Pilot In Command 
			(PIC), or Remote Pilot, but possibly of an Observer or 
			other party.
		</dd>
		<dt>Remote Pilot</dt>
		<dd>
			A pilot using a GCS to exercise proximate control of a UA. 
			Either the PIC or under the supervision of the PIC. "The 
			person who manipulates the flight controls of a 
			remotely-piloted aircraft during flight time" <xref 
			target="ICAOUAS" format="default"/>.
		</dd>
		<dt>RF</dt>
		<dd>
			Radio Frequency. Adjective, e.g., "RF link", or noun.
		</dd>

		<dt>RF LOS</dt>
		<dd>
			RF Line Of Sight. Typically used in describing a direct 
			radio link between a GCS and the UA under its control, 
			potentially subject to blockage by foliage, structures, 
			terrain, or other vehicles, but less so than VLOS.
		</dd>
		<dt>RTCA</dt>
		<dd>
			Radio Technical Commission for Aeronautics. US aviation 
			SDO. Cooperates extensively with EUROCAE.
		</dd>
		<dt>Self-ID Message</dt>
		<dd>
			<xref target="F3411-19"	format="default"/> Message Type 3. 
			Provides a 1 byte descriptor and 23 byte ASCII free text 
			field, only. Expected to be used to provide context on the 
			operation, e.g., mission intent.
		</dd>
<!--	<dt>Standard RID</dt>
		<dd>
			A proposed mode of operation that must use both Network RID
			(if Internet connectivity is available at the time in the 
			operating area) and Broadcast RID (always and everywhere), 
			and must provide both pilot/GCS location and UA location. 
			This mode is required for UAS that exceed the allowed 
			envelope (e.g., size, range) of Limited RID and for all UAS 
			equipped for Standard RID (even if operated within 
			parameters that would otherwise permit Limited RID). <xref 
			target="NPRM" format="default"/> The Broadcast RID portion 
			corresponds roughly to EU Direct RID; the Network RID 
			portion corresponds roughly to EU Network Identification 
			Service. Not actually permitted by the "final" rule
			<xref target="FRUR" format="default"/> but the term is
			retained in this glossary to facilitate interpretation of
			older references.
		</dd>
-->
		<dt>SDO</dt>
		<dd>
			Standards Development Organization. ASTM, IETF, et al.
		</dd>
		<dt>SDSP</dt>
		<dd>
			Supplemental Data Service Provider. An entity that 
			participates in the UTM system, but provides services 
			beyond those specified as basic UTM system functions (e.g., 
			weather data). <xref target="FAACONOPS" format="default"/>
		</dd>
		<dt>System Message</dt>
		<dd>
			<xref target="F3411-19" format="default"/> Message Type 4. 
			Provides general UAS information, including remote pilot 
			location, multiple UA group operational area, etc.
		</dd>
		<dt>U-space</dt>
		<dd>
			EU concept and emerging framework for integration of UAS 
			into all classes of airspace, specifically including high 
			density urban areas, sharing airspace with manned aircraft
			<xref target="InitialView" format="default"/>.
		</dd>
		<dt>UA</dt>
		<dd>
			Unmanned Aircraft. In popular parlance, "drone". "An 
			aircraft which is intended to operate with no pilot on 
			board" <xref target="ICAOUAS" format="default"/>.
		</dd>
		<dt>UAS</dt>
		<dd>
			Unmanned Aircraft System. Composed of UA, all required 
			on-board subsystems, payload, control station, other 
			required off-board subsystems, any required launch and 
			recovery equipment, all required crew members, and C2 links 
			between UA and control station <xref target="F3411-19" 
			format="default"/>.
		</dd>
		<dt>UAS ID</dt>
		<dd>
			UAS identifier. Although called "UAS ID", unique to the UA, 
			neither to the operator (as some UAS registration numbers 
			have been and for exclusively recreational purposes are 
			continuing to be assigned), nor to the combination of GCS 
			and UA that comprise the UAS. <em>Maximum length of 20 
			bytes</em> <xref target="F3411-19" format="default"/>.
		</dd>
		<dt>UAS ID Type</dt>
		<dd>
			UAS Identifier type index. 4 bits, see <xref 
			target="IDtypes" format="default"></xref> for currently 
			defined values 0-3. <xref target="F3411-19" 
			format="default"/>
		</dd>
		<dt>UAS RID</dt>
		<dd>
			UAS Remote Identification and tracking. System to enable 
			arbitrary Observers to identify UA during flight.
		</dd>
		<dt>UAS RID Verifier Service</dt>
		<dd>
			System component designed to handle the authentication 
			requirements of RID by offloading verification to a web 
			hosted service <xref target="F3411-19" format="default"/>.
		</dd>
		<dt>USS</dt>
		<dd>
			UAS Service Supplier. "A USS  is  an  entity  that assists 
			UAS  Operators with meeting  UTM operational  requirements 
			that enable safe and efficient use of airspace" and 
			"... provide services  to  support  the  UAS community, to 
			connect Operators and other entities to enable information 
			flow across the USS Network, and to promote shared 
			situational awareness among UTM participants" <xref 
			target="FAACONOPS" format="default"/>.
		</dd>
		<dt>UTM</dt>
		<dd>
			UAS Traffic Management. "A specific aspect of air traffic 
			management which manages UAS operations safely, 
			economically and efficiently through the provision of 
			facilities and a seamless set of services in collaboration 
			with all parties and involving airborne and ground-based 
			functions" <xref target="ICAOUTM" format="default"/>. In 
			the US, according to the FAA, a "traffic management" 
			ecosystem for "uncontrolled" low altitude UAS operations, 
			separate from, but complementary to, the FAA's ATC system 
			for "controlled" operations of manned aircraft.
		</dd>
		<dt>V2V</dt>
		<dd>
			Vehicle-to-Vehicle. Originally communications between 
			automobiles, now extended to apply to communications 
			between vehicles generally. Often, together with 
			Vehicle-to-Infrastructure (V2I) etc., generalized to V2X.
		</dd>
		<dt>VLOS</dt>
		<dd>
			Visual Line Of Sight. Typically used in describing 
			operation of a UA by a "remote" pilot who can clearly 
			directly (without video cameras or any aids other than 
			glasses or under some rules binoculars) see the UA and its 
			immediate flight environment. Potentially subject to 
			blockage by foliage, structures, terrain, or other 
			vehicles, more so than RF LOS.
		</dd>
	</dl>
</section>
</section>
<section numbered="true" toc="default"> <name>UAS RID Problem Space</name>
<t>
	Civil Aviation Authorities (CAAs) worldwide are mandating UAS RID. 
	The European Union Aviation Safety Agency (EASA) has published 
	<xref target="Delegated" format="default"/> and <xref 
	target="Implementing" format="default"/> Regulations. The US FAA 
	has published a "final" rule <xref target="FRUR" format="default"/> 
	and has described the key role that UAS RID plays in UAS Traffic 
	Management (UTM) in <xref target="FAACONOPS" format="default"/> 
	(especially Section 2.6). CAAs currently (2021) promulgate 
	performance-based regulations that do not specify techniques, but 
	rather cite industry consensus technical standards as acceptable 
	means of compliance.
</t>	
<t>  
	The most widely cited such industry consensus technical standard 
	for UAS RID is <xref target="F3411-19" format="default"/>, which 
	defines two means of UAS RID:
</t>
	<ul spacing="normal" empty="true">
	<li>
		Network RID defines a set of information for UAS to make 
		available globally indirectly via the Internet, through servers 
		that can be queried by Observers.
	</li>
	<li>
		Broadcast RID defines a set of messages for UA to transmit 
		locally directly one-way over Bluetooth or Wi-Fi (without IP or 
		any other protocols between the data link and application 
		layers), to be received in real time by local Observers.
	</li>
	</ul>
<t>
	UAS using both means must send the same UAS RID application layer 
	information via each <xref target="F3411-19" format="default"/>. 
	The presentation may differ, as Network RID defines a data 
	dictionary, whereas Broadcast RID defines message formats (which 
	carry items from that same data dictionary). The interval (or rate) 
	at which it is sent may differ, as Network RID can accommodate 
	Observer queries asynchronous to UAS updates (which generally need 
	be sent only when information, such as location, changes), whereas 
	Broadcast RID depends upon Observers receiving UA messages at the 
	time they are transmitted.
</t>
<t>	
	Network RID depends upon Internet connectivity in several segments 
	from the UAS to each Observer. Broadcast RID should need Internet 
	(or other Wide Area Network) connectivity only for UAS registry 
	information lookup using the directly locally received UAS 
	Identifier (UAS ID) as a key. Broadcast RID does not assume IP 
	connectivity of UAS; messages are encapsulated by the UA without 
	IP, directly in Bluetooth or Wi-Fi Neighbor Awareness Networking 
	<xref target="WiFiNAN" format="default"/> link layer frames.
</t>
<t anchor="IDtypes">
	<xref target="F3411-19" format="default"/> specifies three UAS ID
	types:
</t>
	<ol spacing="normal" type="TYPE-%d" group="type">
	<li>
		A static, manufacturer assigned, hardware serial number as 
		defined in ANSI/CTA-2063-A "Small Unmanned Aerial System Serial 
		Numbers" <xref target="CTA2063A" format="default"/>.
	</li>
	<li>
		A CAA assigned (generally static) ID, like the registration 
		number of a manned aircraft.
	</li>
	<li>
		A UTM system assigned UUID <xref target="RFC4122" 
		format="default"/>, which can but need not be dynamic.
	</li>
	</ol>
<t>
	Per <xref target="Delegated" format="default"/>, the EU allows only 
	Type 1. Under <xref target="FRUR" format="default"/>, the US allows 
	Types 1 and 3. <xref target="NPRM" format="default"/> proposed that 
	a Type 3 "Session ID" would be "e.g., a randomly-generated 
	alphanumeric code assigned by a Remote ID USS on a per-flight basis 
	designed to provide additional privacy to the operator", but given 
	the omission of Network RID from <xref target="FRUR" 
	format="default"/>, how this is to be assigned in the US is still 
	to be determined.
</t>
<t>
	As yet apparently there are no CAA public proposals to use Type 2. 
	In the preamble of <xref target="FRUR" format="default"/>, the FAA 
	argues that registration numbers should not be sent in RID, insists 
	that the capability of looking up registration numbers from 
	information contained in RID should be restricted to FAA and other 
	Government agencies, and implies that Session ID would be linked to 
	the registration number only indirectly via the serial number in 
	the registration database. The possibility of cryptographically 
	blinding registration numbers, such that they can be revealed under 
	specified circumstances, does not appear to be mentioned in 
	applicable regulations or external technical standards.
</t>
<t>
	Under <xref target="Delegated" format="default"/>, the EU also 
	requires an operator registration number (an additional identifier 
	distinct from the UAS ID) that can be carried in an <xref 
	target="F3411-19" format="default"/> optional Operator ID message.
</t>
<t>
	<xref target="FRUR" format="default"/> allows RID requirements to 
	be met by either the UA itself, which is then designated a 
	"standard remote identification unmanned aircraft", or by an add-on 
	"remote identification broadcast module". Relative to a standard 
	RID UA, the different requirements for a module are that the 
	latter: must transmit its own serial number (neither the serial 
	number of the UA to which it is attached, nor a Session ID); must 
	transmit takeoff location as a proxy for the location of the 
	pilot/GCS; need not transmit UA emergency status; and is allowed to 
	be used only for operations within VLOS of the remote pilot.
</t>
<t>
	Jurisdictions may relax or waive RID requirements for certain 
	operators and/or under certain conditions. For example, <xref 
	target="FRUR" format="default"/> allows operators with UAS not 
	equipped for RID to conduct VLOS operations at counter-intuitively 
	named "FAA-recognized identification areas" (FRIA); radio 
	controlled model aircraft flying clubs and other eligible 
	organizations can apply to the FAA for such recognition of their 
	operating areas.
</t>
<section numbered="true" toc="default"> <name>Network RID</name>
<figure anchor="NetRID">
<name>"Network RID Information Flow"</name>
<artwork type="ascii-art">

          x x    UA
         xxxxxxx
          |    \
          |     \
          |      \
          |       \  ********************
          |        \*              ------*---+------------+
          |        *\             /       *  | NET_Rid_SP |
          |        * ------------/    +---*--+------------+
          | RF     */                 |   *
          |        /      INTERNET    |   *  +------------+
          |       /*                  +---*--| NET_Rid_DP |
          |      / *                 +----*--+------------+
          +     /   *                |   *
           x   /     ****************|***      x
         xxxxx                       |       xxxxx
           x                         +-------  x
           x                                   x
          x x   Operator's GCS     Observer   x x
         x   x                               x   x
         
</artwork>
</figure>
<t>
	<xref target="NetRID" format="default"/> illustrates Network RID 
	information flows. Only two of the three typically wireless links 
	shown involving the UAS (UA-GCS, UA-Internet, and GCS-Internet) 
	need exist. All three may exist, at the same or different times, 
	especially in Beyond Visual Line Of Sight (BVLOS) operations. There 
	must be some information flow path (direct or indirect) between the 
	GCS and the UA, for the former to exercise C2 over the latter. If 
	this path is two-way (as increasingly it is, even for inexpensive 
	small UAS), the UA will also send its status (and position, if 
	suitably equipped, e.g., with GNSS) to the GCS. There also must be 
	some path between at least one subsystem of the UAS (UA or GCS) and 
	the Internet, for the former to send status and position updates to 
	its USS (serving <em>inter alia</em> as a Net-RID SP).
</t>
<t>
	Direct UA-Internet wireless links are expected to become more 
	common, especially on larger UAS, but currently (2021) are rare. 
	Instead, the RID data flow typically originates on the UA and 
	passes through the GCS, or originates on the GCS. Network RID data 
	makes three trips through the Internet (GCS-SP, SP-DP, DP-Observer, 
	unless any of them are colocated), implying use of IP (and other 
	middle layer protocols) on those trips. IP is not necessarily used 
	or supported on the UA-GCS link (if indeed that direct link exists, 
	as it typically does now, but in BVLOS operations often will not).
</t>
<t>
	Network RID is publish-subscribe-query. In the UTM context:
</t>
<ol spacing="normal" type="1">
	<li>
		The UAS operator pushes an "operational intent" (the current 
		term in UTM corresponding to a flight plan in manned aviation) 
		to the USS (call it USS#1) that will serve that UAS (call it 
		UAS#1) for that operation, primarily to enable deconfliction 
		with other operations potentially impinging upon that 
		operation's 4-D airspace volume (call it Volume#1).
	</li>
	<li> 
		Assuming the operation is approved and commences, UAS#1 
		periodically pushes location/status updates to USS#1, which 
		serves <em>inter alia</em> as the Network RID Service Provider 
		(Net-RID SP) for that operation.
	</li>
	<li>
		When users of any other USS (whether they be other UAS 
		operators or Observers) develop an interest in any 4-D airspace 
		volume (e.g., because they wish to submit an operational intent 
		or because they have observed a UA), they query their own USS 
		on the volumes in which they are interested.
	</li>
	<li>
		Their USS query, via the UTM Discovery and Synchronization 
		Service (DSS), all other USS in the UTM system, and learn of 
		any USS that have operations in those volumes (including any 
		volumes intersecting them); thus those USS whose query volumes 
		intersect Volume#1 (call them USS#2 through USS#n) learn that 
		USS#1 has such operations.
	</li>
	<li> 
		Interested parties can then subscribe to track updates on that 
		operation of UAS#1, via their own USS, which serve as Network 
		RID Display Providers (Net-RID DP) for that operation.
	</li>
	<li> 
		USS#1 (as Net-RID SP) will then publish updates of UAS#1 status 
		and position to all other subscribed USS in USS#2 through USS#n 
		(as Net-RID DP).
	</li>
	<li>
		All Net-RID DP subscribed to that operation of UAS#1 will 
		deliver its track information to their users who subscribed to 
		that operation of UAS#1, via unspecified (generally presumed to 
		be web browser based) means.
	</li> 
</ol>
<t>
	Network RID has several variants. The UA may have persistent 
	onboard Internet connectivity, in which case it can consistently 
	source RID information directly over the Internet. The UA may have 
	intermittent onboard Internet connectivity, in which case the GCS 
	must source RID information whenever the UA itself is offline. The 
	UA may not have Internet connectivity of its own, but have instead 
	some other form of communications to another node that can relay 
	RID information to the Internet. In this last case, the relay would 
	typically be the GCS (which to perform its function must know where 
	the UA is, although C2 link outages do occur).
</t>
<t>	The UA may have no means of sourcing RID information, in which case
	the GCS or some other interface available to the operator must 
	source it. In the extreme case, this could be the pilot using a web 
	browser/application to designate, to a UAS Service Supplier (USS) 
	or other UTM entity, a time-bounded airspace volume in which an 
	operation will be conducted. This is referred to as a "non-equipped 
	network participant". This may impede disambiguation of ID if 
	multiple UAS operate in the same or overlapping 4-D volumes.
</t>
<t>
	In most cases in the near term (2021), the Network RID first hop 
	data link is likely to be cellular Long Term Evolution (LTE), which 
	can also support BVLOS C2 over existing large coverage areas, or 
	Wi-Fi, which can also support Broadcast RID. However, provided the 
	data link can support at least UDP/IP and ideally also TCP/IP, its 
	type is generally immaterial to higher layer protocols. The UAS, as 
	the ultimate source of Network RID information, feeds a Network RID 
	Service Provider (Net-RID SP, typically the USS to which the UAS 
	operator subscribes), which proxies for the UAS and other data 
	sources. An Observer or other ultimate consumer of Network RID 
	information obtains it from a Network RID Display Provider (Net-RID 
	DP, also typically a USS), which aggregates information from 
	multiple Net-RID SPs to offer airspace Situational Awareness (SA) 
	coverage of a volume of interest. Network RID Service and Display 
	providers are expected to be implemented as servers in 
	well-connected infrastructure, communicating with each other via 
	the Internet, and accessible by Observers via means such as web 
	Application Programming Interfaces (APIs) and browsers.
</t>
<t>
	Network RID is the less constrained of the defined UAS RID means. 
	<xref target="F3411-19" format="default"/> specifies only Net-RID 
	SP to Net-RID DP information exchanges. It is presumed that IETF 
	efforts supporting the more constrained Broadcast RID (see next 
	section) can be generalized for Network RID and potentially also 
	for UAS to USS or other UTM communications.
</t>
</section>
<section numbered="true" toc="default"> <name>Broadcast RID</name>
<figure anchor="B-RID">
<name>"Broadcast RID Information Flow"</name>
<artwork type="ascii-art">

          x x  UA
         xxxxx
          |
          |
          | app messages directly over one-way RF data link
          |
          |
          +
           x
         xxxxx
           x
           x
          x x   Observer's device (e.g., smartphone)
         x   x

</artwork>
</figure>
<t>
	<xref target="B-RID" format="default"/> illustrates Broadcast RID 
	information flow. Note the absence of the Internet from the figure. 
	This is because Broadcast RID is one-way direct transmission of 
	application layer messages over a RF data link (without IP or other 
	middle layer protocols) from the UA to local Observer devices. 
	Internet connectivity is involved only in what the Observer chooses 
	to do with the information received, such as verify signatures 
	using a web based verifier service and look up information in 
	registries using the UAS ID as the primary unique key.
</t>
<t>
	Broadcast RID is conceptually similar to Automatic Dependent 
	Surveillance - Broadcast (ADS-B). However, for various technical 
	and other reasons, regulators including the EASA have not indicated 
	intent to allow, and FAA has explicitly prohibited, use of ADS-B 
	for UAS RID.
</t>
<t>
	<xref target="F3411-19" format="default"/> specifies four Broadcast 
	RID data links: Bluetooth 4.x, Bluetooth 5.x with Extended 
	Advertisements and Long Range Coded PHY (S=8), Wi-Fi with Neighbor 
	Awareness Networking (NAN) at 2.4 GHz, and Wi-Fi NAN at 5 GHz. A UA 
	must broadcast (using advertisement mechanisms where no other 
	option supports broadcast) on at least one of these. If sending on 
	Bluetooth 5.x, it is also required concurrently to do so on 4.x 
	(referred to in <xref target="F3411-19" format="default"/> as 
	Bluetooth Legacy); current (2021) discussions in ASTM F38.02 on 
	revising the standard include reversing this. If broadcasting Wi-Fi 
	NAN at 5 GHz, it is also required concurrently to do so at 2.4 GHz; 
	current discussions in F38.02 include relaxing this. Wi-Fi Beacons 
	are also under consideration. Future revisions of <xref 
	target="F3411-19" format="default"/> may allow other data links.
</t>
<t>
	The selection of the Broadcast media was driven by research into 
	what is commonly available on 'ground' units (smartphones and 
	tablets) and what was found as prevalent or 'affordable' in UA. 
	Further, there must be an Application Programming Interface (API) 
	for the observer's receiving application to have access to these 
	messages. As yet only Bluetooth 4.x support is readily available, 
	thus the current focus is on working within the 25 byte limit of 
	the Bluetooth 4.x "Broadcast Frame" transmitted on beacon channels. 
	After nominal overheads, this limits the UAS ID string to a maximum 
	length of 20 bytes, and precludes the same frame carrying position, 
	velocity, and other information that should be bound to the UAS ID, 
	much less strong authentication data. This requires segmentation 
	("paging") of longer messages and correlation of short messages 
	(anticipated by ASTM to be done on the basis of MAC address, which 
	is weak and unverifiable) on Bluetooth 4.x; data elements are not 
	so detached on other media (see Message Pack below).
</t>
<t>
	<xref target="F3411-19" format="default"/> Broadcast RID specifies 
	several message types. The 4 bit message type field in the header 
	can index up to 16 types. Only 7 are currently defined. Only 2 are 
	mandatory. All others are optional, unless required by a 
	jurisdictional authority, e.g., a CAA. To satisfy EASA and FAA 
	rules, all types are needed, except Self-ID and Authentication. The 
	Message Pack (type 0xF) is not actually a message, but the framed 
	concatenation of at most one message of each type of any subset of 
	the other types, in type index order; it is the sole frame type on 
	links that can encapsulate it (Bluetooth 5.x and Wi-Fi).
</t>
<table anchor="MsgTypes">
	<name>F3411-19 Message Types</name>
	<thead>
		<tr><td>Index</td><td>Name</td><td>Req</td><td>Notes</td></tr>
	</thead>
	<tbody>
		<tr><td>0x0</td><td>Basic ID</td><td>Mandatory</td>
			<td>-</td></tr>
		<tr><td>0x1</td><td>Location/Vector</td><td>Mandatory</td>
			<td>-</td></tr> 
		<tr><td>0x2</td><td>Authentication</td><td>Optional</td>
			<td>paged</td></tr> 
		<tr><td>0x3</td><td>Self-ID</td><td>Optional</td>
			<td>free text</td></tr> 
		<tr><td>0x4</td><td>System</td><td>Optional</td>
			<td>-</td></tr> 
		<tr><td>0x5</td><td>Operator</td><td>Optional</td>
			<td>-</td></tr> 
		<tr><td>0xF</td><td>Message Pack</td><td>-</td>
			<td>BT5 and Wi-Fi</td></tr>
	</tbody>
	<tfoot>
		<tr><td>See Section 5.4.5 and Table 3 of <xref 
		target="F3411-19" format="default"/></td>
		<td>-</td><td>-</td><td>-</td></tr>
	</tfoot>
</table>
<t>
	<xref target="F3411-19" format="default"/> Broadcast RID specifies 
	very few quantitative performance requirements: static information 
	must be transmitted at least once per 3 seconds; dynamic 
	information (the Location/Vector message) must be transmitted at 
	least once per second and be no older than one second when sent. 
	<xref target="FRUR" format="default"/> requires all information be 
	sent at least once per second.
</t>
<t>
	<xref target="F3411-19" format="default"/> Broadcast RID transmits 
	all information as cleartext (ASCII or binary), so static IDs 
	enable trivial correlation of patterns of use, unacceptable in many 
	applications, e.g., package delivery routes of competitors.
</t>
<t>
	Any UA can assert any ID using the <xref target="F3411-19" 
	format="default"/> required Basic ID message, which lacks any 
	provisions for verification. The Position/Vector message likewise 
	lacks provisions for verification, and does not contain the ID, so 
	must be correlated somehow with a Basic ID message: the developers 
	of <xref target="F3411-19" format="default"/> have suggested using 
	the MAC addresses on the Broadcast RID data link, but these may be 
	randomized by the operating system stack to avoid the adversarial 
	correlation problems of static identifiers.
</t>
<t>
	The <xref target="F3411-19" format="default"/> optional 
	Authentication Message specifies framing for authentication data, 
	but does not specify any authentication method, and the maximum 
	length of the specified framing is too short for conventional 
	digital signatures and far too short for conventional certificates. 
	The one-way nature of Broadcast RID precludes challenge-response 
	security protocols (e.g., observers sending nonces to UA, to be 
	returned in signed messages). An Observer would be seriously 
	challenged to validate the asserted UAS ID or any other information 
	about the UAS or its operator looked up therefrom.
</t>
</section>
<section numbered="true" toc="default"> <name>USS in UTM and RID</name>
<t>
	UAS RID and UTM are complementary; Network RID is a UTM service. 
	The backbone of the UTM system is comprised of multiple USS: one or 
	several per jurisdiction; some limited to a single jurisdiction, 
	others spanning multiple jurisdictions. USS also serve as the 
	principal or perhaps the sole interface for operators and UAS into 
	the UTM environment. Each operator subscribes to at least one USS. 
	Each UAS is registered by its operator in at least one USS. Each 
	operational intent is submitted to one USS; if approved, that UAS 
	and operator can commence that operation. During the operation, 
	status and location of that UAS must be reported to that USS, which 
	in turn provides information as needed about that operator, UAS, 
	and operation into the UTM system and to Observers via Network RID.
</t>
<t>
	USS provide services not limited to Network RID; indeed, the 
	primary USS function is deconfliction of airspace usage by 
	different UAS and other (e.g., manned aircraft, rocket launch) 
	operations. Most deconfliction involving a given operation is hoped 
	to be completed prior to commencing that operation, and is called 
	"strategic deconfliction". If that fails, "tactical deconfliction" 
	comes into play; ABDAA may not involve USS, but GBDAA likely will. 
	Dynamic constraints, formerly called UAS Volume Restrictions (UVR), 
	can be necessitated by local emergencies, extreme weather, etc., 
	specified by authorities on the ground, and propagated in UTM.
</t>
<t>
	No role for USS in Broadcast RID is currently specified by 
	regulators or <xref target="F3411-19" format="default"/>. However, 
	USS are likely to serve as registries (or perhaps registrars) for 
	UAS (and perhaps operators); if so, USS will have a role in all 
	forms of RID. Supplemental Data Service Providers (SDSP) are also 
	likely to find roles, not only in UTM as such but also in enhancing 
	UAS RID and related services. Whether USS, SDSP, etc. are involved 
	or not, RID services, narrowly defined, provide regulator specified 
	identification information; more broadly defined, RID services may 
	leverage identification to facilitate related services or 
	functions, likely beginning with V2X.
</t>
</section>
<section numbered="true" toc="default"> <name>DRIP Focus</name>
<t>
	In addition to the gaps described above, there is a fundamental gap 
	in almost all current or proposed regulations and technical 
	standards for UAS RID. As noted above, ID is not an end in itself, 
	but a means. Protocols specified in <xref target="F3411-19" 
	format="default"/> etc. provide limited information potentially 
	enabling, and no technical means for, an Observer to communicate 
	with the pilot, e.g., to request further information on the UAS 
	operation or exit from an airspace volume in an emergency. The 
	System Message provides the location of the pilot/GCS, so an 
	observer could physically go to the asserted location to look for 
	the remote pilot; this is at best slow and may not be feasible. 
	What if the pilot is on the opposite rim of a canyon, or there are 
	multiple UAS operators to contact, whose GCS all lie in different 
	directions from the Observer? An Observer with Internet 
	connectivity and access privileges could look up operator PII in a 
	registry, then call a phone number in hopes someone who can 
	immediately influence the UAS operation will answer promptly during 
	that operation; this is at best unreliable and may not be prudent. 
	Should pilots be encouraged to answer phone calls while flying? 
	Internet technologies can do much better than this.
</t>
<t>	
	Thus complementing <xref target="F3411-19" format="default"/> with 
	protocols enabling strong authentication, preserving operator 
	privacy while enabling immediate use of information by authorized 
	parties, is critical to achieve widespread adoption of a RID system 
	supporting safe and secure operation of UAS.
</t>
<t>
	DRIP will focus on making information obtained via UAS RID 
	immediately usable:
</t>
<ol spacing="normal" type="1">
	<li>
		by making it trustworthy (despite the severe constraints 
		of Broadcast RID);
	</li>
	<li>
		by enabling verification that a UAS is registered for RID, and 
		if so, in which registry (for classification of trusted 
		operators on the basis of known registry vetting, even by 
		observers lacking Internet connectivity at observation time);
	</li>
	<li>
		by facilitating independent reports of UA aeronautical data 
		(location, velocity, etc.) to confirm or refute the operator 
		self-reports upon which UAS RID and UTM tracking are based;
	</li>
	<li>
		by enabling instant establishment, by authorized parties, 
		of secure communications with the remote pilot.
	</li>
</ol>
<t>
	The foregoing considerations, beyond those addressed by baseline 
	UAS RID standards such as <xref target="F3411-19" 
	format="default"/>, imply the following requirements for DRIP.
</t>
</section>
</section>
<section numbered="true" toc="default"> <name>Requirements</name>
<t>
	The following requirements apply to DRIP as a set of related 
	protocols, various subsets of which, in conjunction with other IETF 
	and external technical standards, may suffice to comply with the 
	regulations in any given jurisdiction or meet any given user need. 
	It is not intended that each and every DRIP protocol alone satisfy 
	each and every requirement.
</t>
<section numbered="true" toc="default"> <name>General</name>
<ol spacing="normal" type="GEN-%d" group="gen">
	<li>
		Provable Ownership: DRIP MUST enable verification that the UAS 
		ID asserted in the Basic ID message is that of the actual 
		current sender of the message (i.e., the message is not a 
		replay attack or other spoof, authenticating, e.g., by 
		verifying an asymmetric cryptographic signature using a sender 
		provided public key from which the asserted ID can be at least 
		partially derived), even on an Observer device lacking Internet 
		connectivity at the time of observation.
	</li>
	<li>
		Provable Binding: DRIP MUST enable binding all other <xref 
		target="F3411-19" format="default"/> messages from the same 
		actual current sender to the UAS ID asserted in the Basic ID 
		message.
	</li>
	<li>
		Provable Registration: DRIP MUST enable verification that the 
		UAS ID is in a registry and identification of which one, even 
		on an Observer device lacking Internet connectivity at the time 
		of observation; with UAS ID Type 3, the same sender may have 
		multiple IDs, potentially in different registries, but each ID 
		must clearly indicate in which registry it can be found.
	</li>
	<li>    
		Readability: DRIP MUST enable information (regulation required 
		elements, whether sent via UAS RID or looked up in registries) 
		to be read and utilized by both humans and software.
	</li>
	<li>
		Gateway: DRIP MUST enable Broadcast RID to Network RID 
		application layer gateways to stamp messages with precise 
		date/time received and receiver location, then relay them to a 
		network service (e.g., SDSP or distributed ledger).
	</li>
	<li>
		Finger: DRIP MUST enable dynamically establishing, with AAA, 
		per policy, end-to-end strongly encrypted communications with 
		the UAS RID sender and entities looked up from the UAS ID, 
		including at least the remote pilot and USS.
	</li>
	<li>
		QoS: DRIP MUST enable policy based specification of performance 
		and reliability parameters, such as maximum message 
		transmission intervals and delivery latencies.
	</li>
	<li>
		Mobility: DRIP MUST support physical and logical mobility of 
		UA, GCS and Observers. DRIP SHOULD support mobility of 
		essentially all participating nodes (UA, GCS, Observers, 
		Net-RID SP,	Net-RID DP, Private Registry, SDSP, and potentially 
		others as RID and UTM evolve).
	</li>
	<li>
		Multihoming: DRIP MUST support multihoming of UA and GCS, for 
		make-before-break smooth handoff and resiliency against 
		path/link failure. DRIP SHOULD support multihoming of 
		essentially all participating nodes.
	</li>
	<li>
		Multicast: DRIP SHOULD support multicast for efficient 
		and flexible publish-subscribe notifications, e.g., of UAS 
		reporting positions in designated airspace volumes.
	</li>
	<li>
		Management: DRIP SHOULD support monitoring of the health 
		and coverage of Broadcast and Network RID services.
	</li>
</ol>
<t>
	Requirements imposed either by regulation or <xref 
	target="F3411-19" format="default"/> are not reiterated here, but 
	drive many of the numbered requirements listed here. The <xref 
	target="FRUR" format="default"/> regulatory QoS requirement 
	currently would be satisfied by ensuring information refresh rates 
	of at least 1 Hertz, with latencies no greater than 1 second, at 
	least 80% of the time, but these numbers may vary between 
	jurisdictions and over time. So instead the DRIP QoS requirement is 
	that performance, reliability, etc. parameters be user policy 
	specifiable, which does not imply satisfiable in all cases, but 
	(especially together with the management requirement) implies that 
	when specifications are not met, appropriate parties are notified.
</t>
<t>
	The "provable ownership" requirement addresses the possibility that 
	the actual sender is not the claimed sender (i.e., is a spoofer). 
	The "provable binding" requirement addresses the MAC address 
	correlation problem of <xref target="F3411-19" format="default"/> 
	noted above. The "provable registration" requirement may impose 
	burdens not only on the UAS sender and the Observer's receiver, but 
	also on the registry; yet it cannot depend upon the Observer being 
	able to contact the registry at the time of observing the UA. The 
	"readability" requirement may involve machine assisted format 
	conversions, e.g., from binary encodings.
</t>
<t>
	The "gateway" requirement is in pursuit of three objectives: (1) 
	mark up a RID message with where and when it was actually received, 
	which may agree or disagree with the self-report in the set of 
	messages; (2) defend against replay attacks; and (3) support 
	optional SDSP services such as multilateration, to complement UAS 
	position self-reports with independent measurements. This is the 
	only instance in which DRIP transports <xref target="F3411-19" 
	format="default"/> messages; most of DRIP pertains to the 
	authentication of such messages and identifiers carried in them.
</t>
</section>
<section numbered="true" toc="default"> <name> Identifier</name>
<ol spacing="normal" type="ID-%d" group="id">
	<li>
		Length: The DRIP entity identifier MUST NOT be longer than 20 
		bytes, to fit in the UAS ID field of the Basic ID message of 
		<xref target="F3411-19" format="default"/>.
	</li>
	<li>
		Registry ID: The DRIP identifier MUST be sufficient to identify 
		a registry in which the entity identified therewith is listed.
	</li>
	<li>
		Entity ID: The DRIP identifier MUST be sufficient to enable 
		lookups of other data associated with the entity identified 
		therewith in that registry.
	</li>
	<li>
		Uniqueness: The DRIP identifier MUST be unique within the 
		applicable global identifier space from when it is first 
		registered therein until it is explicitly de-registered 
		therefrom (due to, e.g., expiration after a specified lifetime, 
		revocation by the registry, or surrender by the operator).
	</li>
	<li>
		Non-spoofability: The DRIP identifier MUST NOT be spoofable 
		within the context of a minimal Remote ID broadcast message set 
		(to be specified within DRIP to be sufficient collectively to 
		prove sender ownership of the claimed identifier).
	</li>
	<li>
		Unlinkability: The DRIP identifier MUST NOT facilitate 
		adversarial correlation over multiple operations. If this is 
		accomplished by limiting each identifier to a single use or 
		brief period of usage, the DRIP identifier MUST support 
		well-defined, scalable, timely registration methods.
	</li>
</ol>
<t>
	The DRIP identifier can refer to various entities. In the primary 
	initial use case, the entity to be identified is the UA. Entities 
	to be identified in other likely use cases include but are not 
	limited to the operator, USS, and Observer. In all cases, the 
	entity identified must own (have the exclusive capability to use, 
	such that receivers can verify its ownership of) the identifier.
</t>
<t>
	The DRIP identifier can be used at various layers. In Broadcast 
	RID, it would be used by the application running directly over the 
	data link. In Network RID, it would be used by the application 
	running over HTTPS (and possibly other protocols). In RID initiated 
	V2X applications such as DAA and C2, it could be used between the 
	network and transport layers (e.g., with HIP or DTLS).
</t>
<t>
	Registry ID (which registry the entity is in) and Entity ID (which 
	entity it is, within that registry) are requirements on a single 
	DRIP entity identifier, not separate (types of) ID. In the most 
	common use case, the entity will be the UA, and the DRIP identifier 
	will be the UAS ID; however, other entities may also benefit from 
	having DRIP identifiers, so the entity type is not prescribed here.
</t>
<t>
	Whether a UAS ID is generated by the operator, GCS, UA, USS, 
	registry, or some collaboration thereamong, is unspecified; 
	however, there must be agreement on the UAS ID among these 
	entities.
</t>
</section>
<section numbered="true" toc="default"> <name>Privacy</name>
<ol spacing="normal" type="PRIV-%d" group="priv">
	<li>
		Confidential Handling: DRIP MUST enable confidential 
		handling of private information (i.e., any and all information 
		designated by neither cognizant authority nor the information 
		owner as public, e.g., personal data).
	</li>
	<li>
		Encrypted Transport: DRIP MUST enable selective strong 
		encryption of private data in motion in such a manner that only 
		authorized actors can recover it. If transport is via IP, then 
		encryption MUST be end-to-end, at or above the IP layer. DRIP 
		MUST NOT encrypt safety critical data to be transmitted over 
		Broadcast RID in any situation where it is unlikely that local 
		Observers authorized to access the plaintext will be able to 
		decrypt it or obtain it from a service able to decrypt it. DRIP 
		MUST NOT encrypt data when/where doing so would conflict with 
		applicable regulations or CAA policies/procedures, i.e., DRIP 
		MUST support configurable disabling of encryption.
	</li>
	<li>
		Encrypted Storage: DRIP SHOULD facilitate selective strong 
		encryption of private data at rest in such a manner that only 
		authorized actors can recover it.
	</li>
	<li>
		Public/Private Designation: DRIP SHOULD facilitate designation, 
		by cognizant authorities and information owners, which 
		information is public and which private. By default, all 
		information required to be transmitted via Broadcast RID, even 
		when actually sent via Network RID, is assumed to be public; 
		all other information contained in registries for lookup using 
		the UAS ID is assumed to be private.
	</li>
	<li>
		Pseudonymous Rendezvous: DRIP MAY enable mutual discovery of 
		and communications among participating UAS operators whose UA 
		are in 4-D proximity, using the UAS ID without revealing 
		pilot/operator identity or physical location.
	</li>
</ol>
<t>
	In some jurisdictions, the configurable enabling and disabling of 
	encryption may need to be outside the control of the operator. 
	<xref target="FRUR" format="default"/> mandates manufacturers 
	design RID equipment with some degree of tamper resistance; the 
	preamble and other FAA commentary suggest this is to reduce the 
	likelihood that an operator, intentionally or unintentionally, 
	might alter the values of the required data elements or	disable 
	their transmission in the required manner (e.g., as cleartext).
</t>
<t>
	How information is stored on end systems is out of scope for DRIP. 
	Encouraging privacy best practices, including end system storage 
	encryption, by facilitating it with protocol design reflecting such 
	considerations, is in scope. Similar logic applies to methods for 
	designating information as public or private.
</t>
<t>
	The privacy requirements above are for DRIP, neither for <xref 
	target="F3411-19" format="default"/> (which requires obfuscation of 
	location to any Network RID subscriber engaging in wide area 
	surveillance, limits data retention periods, etc., in the interests 
	of privacy), nor for UAS RID in any specific jurisdiction (which 
	may have its own regulatory requirements). The requirements above
	are also in a sense parameterized: who are the "authorized actors", 
	how are they designated, how are they authenticated, etc.?
</t>
</section>
<section numbered="true" toc="default"> <name>Registries</name>
<ol spacing="normal" type="REG-%d" group="reg">
	<li>
		Public Lookup: DRIP MUST enable lookup, from the UAS ID, of 
		information designated by cognizant authority as public, and 
		MUST NOT restrict access to this information based on identity 
		or role of the party submitting the query.
	</li>
	<li>
		Private Lookup: DRIP MUST enable lookup of private information 
		(i.e., any and all information in a registry, associated with 
		the UAS ID, that is designated by neither cognizant authority 
		nor the information owner as public), and MUST, according to 
		applicable policy, enforce AAA, including restriction of access 
		to this information based on identity or role of the party 
		submitting the query.
	</li>
	<li>
		Provisioning: DRIP MUST enable provisioning registries with 
		static information on the UAS and its operator, dynamic 
		information on its current operation within the U-space/UTM 
		(including means by which the USS under which the UAS is 
		operating may be contacted for further, typically even more 
		dynamic, information), and Internet direct contact information 
		for services related to the foregoing.
	</li>
	<li>
		AAA Policy: DRIP AAA MUST be specifiable by policies; the 
		definitive copies of those policies must be accessible in 
		registries; administration of those policies and all DRIP 
		registries must be protected by AAA.
	</li>
</ol>
<t>
	Registries are fundamental to RID. Only very limited information 
	can be Broadcast, but extended information is sometimes needed. The 
	most essential element of information sent is the UAS ID itself, 
	the unique key for lookup of extended information in registries. 
	Beyond designating the UAS ID as that unique key, the registry 
	information model is not specified herein, in part because 
	regulatory requirements for different registries (UAS operators and 
	their UA, each narrowly for UAS RID and broadly for U-space/UTM) 
	and business models for meeting those requirements are in flux. 
	However those may evolve, the essential registry functions remain 
	the same, so are specified herein.
</t>
</section>
</section>
<section anchor="IANA" numbered="true" toc="default"> <name>IANA Considerations</name>
<t>
	This document does not make any IANA request.
</t>
</section>
<section anchor="Security" numbered="true" toc="default"> <name>Security Considerations</name>
<t>
	DRIP is all about safety and security, so content pertaining to 
	such is not limited to this section. This document does not define 
	any protocols, so security considerations of such are speculative. 
	Potential vulnerabilities of DRIP solutions to these requirements 
	include but are not limited to:
</t>
	<ul>
		<li>
			Sybil attacks
		</li>
		<li>
			confusion created by many spoofed unsigned messages
		</li>
		<li>
			processing overload induced by attempting to verify many 
			spoofed signed messages (where verification will fail but 
			still consume cycles)
		</li>
		<li>
			malicious or malfunctioning registries
		</li>
		<li>
			interception of (e.g., Man In The Middle attacks on) 
			registration messages
		</li>
		<li>
			UA impersonation through private key extraction, improper 
			key sharing, or carriage of a small (presumably harmless) 
			UA, i.e., as a "false flag", by a larger (malicious) UA
		</li>
	</ul>
<t>
	It may be inferred from the general requirements (Section 4.1) for 
	provable ownership, provable binding, and provable registration, 
	together with the identifier requirements (Section 4.2), that DRIP 
	must provide:
</t>
	<ul>
		<li>
			message integrity
		</li>
		<li>
			non-repudiation
		</li>
		<li>
			defense against replay attacks
		</li>
		<li>
			defense against spoofing
		</li>
	</ul>
<t>	
	One approach to so doing involves verifiably binding the DRIP 
	identifier to a public key. Providing these security features, 
	whether via this approach or another, is likely to be especially 
	challenging for Observers without Internet connectivity at the time 
	of observation. For example, checking the signature of a registry 
	on a public key certificate received via Broadcast RID in a remote 
	area presumably would require that the registry’s public key had 
	been previously installed on the Observer’s device, yet there may 
	be many registries and the Observer’s device may be storage 
	constrained, and new registries may come on-line subsequent to 
	installation of DRIP software on the Observer’s device. Thus there 
	may be caveats on the extent to which requirements can be satisfied 
	in such cases, yet strenuous effort should be made to satisfy them, 
	as such cases, e.g., firefighting in a national forest, are 
	important.
</t>
</section>
<section anchor="Privacy" numbered="true" toc="default"> 
<name>Privacy and Transparency Considerations</name>
<t>
	Privacy and transparency are important for legal reasons including 
	regulatory consistency. <xref target="EU2018" format="default"/> 
	states "harmonised and interoperable national registration 
	systems... should comply with the applicable Union and national law 
	on privacy and processing of personal data, and the information 
	stored in those registration systems should be easily accessible.”
</t>
<t>	
	Privacy and transparency (where essential to security or safety) 
	are also ethical and moral imperatives. Even in cases where old 
	practices (e.g., automobile registration plates) could be imitated, 
	when new applications involving PII (such as UAS RID) are addressed 
	and newer technologies could enable improving privacy, such 
	opportunities should not be squandered. Thus it is recommended that 
	all DRIP work give due regard to <xref target="RFC6973" 
	format="default"/> and more broadly <xref target="RFC8280" 
	format="default"/>.
</t>
<t>
	However, privacy and transparency are often conflicting goals, 
	demanding careful attention to their balance.
</t>
<t>
	DRIP information falls into two classes: that which, to achieve the 
	purpose, must be published openly as cleartext, for the benefit of 
	any Observer (e.g., the basic UAS ID itself); and that which must 
	be protected (e.g., PII of pilots) but made available to properly 
	authorized parties (e.g., public safety personnel who urgently need 
	to contact pilots in emergencies).
</t>
<t>
	How properly authorized parties are authorized, authenticated, etc. 
	are questions that extend beyond the scope of DRIP, but DRIP may be 
	able to provide support for such processes. Classification of 
	information as public or private must be made explicit and 
	reflected with markings, design, etc. Classifying the information 
	will be addressed primarily in external standards; herein it will 
	be regarded as a matter for CAA, registry, and operator policies, 
	for which enforcement mechanisms will be defined within the scope 
	of DRIP WG and offered. Details of the protection mechanisms will 
	be provided in other DRIP documents. Mitigation of adversarial 
	correlation will also be addressed.
</t>
</section>
</middle>
<back>
<displayreference target="I-D.ietf-drip-arch" to="drip-architecture"/>
<!-- 
<displayreference target="I-D.moskowitz-hip-hierarchical-hit" to="hierarchical-hit"/> 
<displayreference target="I-D.moskowitz-hip-hhit-registries" to="hhit-registries"/> 
<displayreference target="I-D.moskowitz-hip-new-crypto" to="new-hip-crypto"/> 
<displayreference target="I-D.moskowitz-drip-crowd-sourced-rid" to="crowd-sourced-rid"/> 
<displayreference target="I-D.moskowitz-drip-secure-nrid-c2" to="drip-secure-nrid-c2"/> 
<displayreference target="I-D.moskowitz-drip-uas-rid" to="drip-uas-rid"/> 
<displayreference target="I-D.moskowitz-orchid-cshake" to="new-orchid"/> 
<displayreference target="I-D.wiethuechter-drip-auth" to="drip-auth"/> 
<displayreference target="I-D.wiethuechter-drip-identity-claims" to="drip-identity-claims"/>
-->

<references> <name>References</name>
<references> <name>Normative References</name>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
	<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
	<front>
		<title>Standard Specification for Remote ID and Tracking</title>
		<author>
			<organization>ASTM International</organization>
		</author>
		<date month="02" year="2020"/>
	</front>
	</reference>
</references>

<references> <name>Informative References</name>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4122.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4949.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-drip-arch.xml"/>
<!--
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-hip-hierarchical-hit.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-hip-hhit-registries.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-hip-new-crypto.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-drip-crowd-sourced-rid.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-drip-secure-nrid-c2.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-drip-uas-rid.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-orchid-cshake.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.wiethuechter-drip-auth.xml"/>
    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.wiethuechter-drip-identity-claims.xml"/>
-->
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.maeurer-raw-ldacs.xml"/>
	<reference anchor="CPDLC"  target="https://www.mdpi.com/1424-8220/18/5/1636">
        <front>
            <title>Controller-Pilot Data Link Communication Security</title>
            <author initials = "A." surname = "Gurtov">  <organization />   </author>
            <author initials = "T." surname = "Polishchuk">  <organization />   </author>
            <author initials = "M." surname = "Wernberg">  <organization />   </author>
            <date month="" year="2018" />
        </front>
        <seriesInfo name="MDPI Sensors" value="18(5), 1636"/>
	</reference> 
	<reference anchor="CTA2063A" target="">
	<front>
		<title>Small Unmanned Aerial Systems Serial Numbers</title>
		<author>
			<organization>ANSI</organization>
		</author>
		<date month="09" year="2019"/>
	</front>
	</reference>
	<reference anchor="Delegated" target="">
	<front>
		<title>Commission Delegated Regulation (EU) 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
		<author>
			<organization> European Union Aviation Safety Agency (EASA) </organization>
		</author>
		<date month="03" year="2019"/>
	</front>
	</reference>
	<reference anchor="ENISACSIRT" target="https://www.enisa.europa.eu/topics/csirt-cert-services/reactive-services/copy_of_actionable-information">
	<front>
		<title>Actionable information for Security Incident Response</title>
		<author>
			<organization>European Union Agency for Cybersecurity (ENISA)</organization>
		</author>
		<date month="11" year="2014"/>
	</front>
	</reference>
	<reference anchor="EU2018" target="">
	<front>
		<title>2015/0277 (COD) PE-CONS 2/18</title>
		<author>
			<organization> European Parliament and Council </organization>
		</author>
		<date month="02" year="2018"/>
	</front>
	</reference>
	<reference anchor="FAACONOPS" target="">
	<front>
		<title>UTM Concept of Operations v2.0</title>
		<author>
			<organization>FAA Office of NextGen</organization>
		</author>
		<date month="03" year="2020"/>
	</front>
	</reference>
	<reference anchor="FRUR" target="">
	<front>
		<title>Remote Identification of Unmanned Aircraft</title>
		<author>
			<organization>Federal Aviation Administration</organization>
		</author>
		<date month="01" year="2021"/>
	</front>
	</reference>	
	<reference anchor="ICAOATM" target="">
	<front>
		<title>Doc 4444: Procedures for Air Navigation Services: Air Traffic Management</title> <author>
			<organization> International Civil Aviation Organization </organization>
		</author>
		<date month="11" year="2016"/>
	</front>
	</reference>
	<reference anchor="ICAOUAS" target="">
	<front>
		<title>Circular 328: Unmanned Aircraft Systems</title> <author>
			<organization> International Civil Aviation Organization </organization>
		</author>
		<date month="02" year="2011"/>
	</front>
	</reference>
	<reference anchor="ICAOUTM" target="">
	<front>
		<title>Unmanned Aircraft Systems Traffic Management (UTM) - A Common Framework with Core Principles for Global Harmonization, Edition 2</title> <author>
			<organization> International Civil Aviation Organization </organization>
		</author>
		<date month="11" year="2019"/>
	</front>
	</reference>

	<reference anchor="Implementing" target="">
	<front>
		<title>Commission Implementing Regulation (EU) 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft </title>
		<author>
			<organization>European Union Aviation Safety Agency (EASA)</organization>
		</author>
		<date month="05" year="2019"/>
	</front>
	</reference>
	<reference anchor="InitialView" target="">
	<front>
		<title>Initial view on Principles for the U-space architecture</title>
		<author>
			<organization>SESAR Joint Undertaking</organization>
		</author>
		<date month="07" year="2019"/>
	</front>
	</reference>
	<reference anchor="NPRM" target="">
	<front>
		<title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
		<author>
			<organization>United States Federal Aviation Administration (FAA)</organization>
		</author>
		<date month="12" year="2019"/>
	</front>
	</reference>
	<reference anchor="OpenDroneID" target="https://github.com/opendroneid/specs">
	<front>
		<title>Open Drone ID</title>
		<author>
			<organization>Intel Corp.</organization>
		</author>
		<date month="03" year="2019"/>
	</front>
	</reference>
	<reference anchor="Opinion1" target="">
	<front>
		<title>Opinion No 01/2020: High-level regulatory framework for the U-space</title>
		<author>
			<organization>European Union Aviation Safety Agency (EASA)</organization>
		</author>
		<date month="03" year="2020"/>
	</front>
	</reference>
	<reference anchor="Part107" target="">
	<front>
		<title>Code of Federal Regulations Part 107</title>
		<author>
			<organization>United States Federal Aviation Administration</organization>
		</author>
		<date month="06" year="2016"/>
	</front>
	</reference>
	<reference anchor="Recommendations" target="">
	<front>
		<title>UAS ID and Tracking ARC Recommendations Final Report</title>
		<author>
			<organization>FAA UAS Identification and Tracking Aviation Rulemaking Committee</organization>
		</author>
		<date month="09" year="2017"/>
	</front>
	</reference>
	<reference anchor="Roadmap" target="https://share.ansi.org/Shared Documents/Standards Activities/UASSC/UASSC_20-001_WORKING_DRAFT_ANSI_UASSC_Roadmap_v2.pdf">
	<front>
		<title>Standardization Roadmap for Unmanned Aircraft Systems draft v2.0</title>
		<author>
			<organization>American National Standards Institute (ANSI) Unmanned Aircraft Systems Standardization Collaborative (UASSC)</organization>
		</author>
		<date month="04" year="2020"/>
	</front>
	</reference>
	<reference anchor="Stranger" target="">
	<front>
		<title>Stranger in a Strange Land</title>
		<author surname="Heinlein" initials="R.A.">
		</author>
		<date month="06" year="1961"/>
	</front>
	</reference>
	<reference anchor="WG105" target="">
	<front>
		<title>WG-105 draft Minimum Operational Performance Standards (MOPS) for Unmanned Aircraft System (UAS) Electronic Identification</title>
		<author>
			<organization> EUROCAE </organization>
		</author>
		<date month="06" year="2020"/>
	</front>
	</reference>
	<reference anchor="WiFiNAN" target="">
	<front>
		<title>Wi-Fi Aware™ Specification Version 3.2</title>
		<author>
			<organization> Wi-Fi Alliance </organization>
		</author>
		<date month="10" year="2020"/>
	</front>
	</reference>
</references>
</references>
<section anchor="Discussion" numbered="true" toc="default"> <name>Discussion and Limitations</name>
<t>
	This document is largely based on the process of one SDO, ASTM. 
	Therefore, it is tailored to specific needs and data formats of 
	this standard. Other organizations, for example in EU, do not 
	necessary follow the same architecture.
</t>
<t>
	The need for drone ID and operator privacy is an open discussion 
	topic. For instance, in the ground vehicular domain each car 
	carries a publicly visible plate number. In some countries, for 
	nominal cost or even for free, anyone can resolve the identity and 
	contact information of the owner. Civil commercial aviation and 
	maritime industries also have a tradition of broadcasting plane or 
	ship ID, coordinates, and even flight plans in plain text. 
	Community networks such as OpenSky and Flightradar use this open 
	information through ADS-B to deploy public services of flight 
	tracking. Many researchers also use these data to perform 
	optimization of routes and airport operations. Such ID information 
	should be integrity protected, but not necessarily confidential.
</t>
<t>
	In civil aviation, aircraft identity is broadcast by a device known 
	as transponder. It transmits a four-digit squawk code, which is 
	assigned by a traffic controller to an airplane after approving a 
	flight plan. There are several reserved codes such as 7600 which 
	indicate radio communication failure. The codes are unique in each 
	traffic area and can be re-assigned when entering another control 
	area. The code is transmitted in plain text by the transponder and 
	also used for collision avoidance by a system known as Traffic 
	alert and Collision Avoidance System (TCAS). The system could be 
	used for UAS as well initially, but the code space is quite limited 
	and likely to be exhausted soon. The number of UAS far exceeds the 
	number of civil airplanes in operation.
</t>
<t>
	The ADS-B system is utilized in civil aviation for each “ADS-B Out” 
	equipped airplane to broadcast its ID, coordinates, and altitude 
	for other airplanes and ground control stations. If this system is 
	adopted for drone IDs, it has additional benefit with backward 
	compatibility with civil aviation infrastructure; then, pilots and 
	dispatchers will be able to see UA on their control screens and 
	take those into account. If not, a gateway translation system 
	between the proposed drone ID and civil aviation system should be 
	implemented. Again, system saturation due to large numbers of UAS 
	is a concern.
</t>
<t>
	Wi-Fi and Bluetooth are two wireless technologies currently 
	recommended by ASTM specifications due to their widespread use and 
	broadcast nature. However, those have limited range (max 100s of 
	meters) and may not reliably deliver UAS ID at high altitude or 
	distance. Therefore, a study should be made of alternative 
	technologies from the telecom domain (WiMAX / IEEE 802.16, 5G) or 
	sensor networks (Sigfox, LORA). Such transmission technologies can 
	impose additional restrictions on packet sizes and frequency of 
	transmissions, but could provide better energy efficiency and 
	range. In civil aviation, Controller-Pilot Data Link Communications 
	(CPDLC) is used to transmit command and control between the pilots 
	and ATC. It could be considered for UAS as well due to long range 
	and proven use despite its lack of security <xref target="CPDLC" 
	format="default"/>.
</t>
<t>
	L-band Digital Aeronautical Communications System (LDACS) is being 
	standardized by ICAO and IETF for use in future civil aviation 
	<xref target="I-D.maeurer-raw-ldacs" format="default"/>. It 
	provides secure communication, positioning, and control for aircraft 
	using a dedicated radio band. It should be analyzed as a potential 
	provider for UAS RID as well. This will bring the benefit of a 
	global integrated system creating a global airspace use 
	awareness.
</t>
</section>
<section numbered="false" toc="default"> <name>Acknowledgments</name>
<t>
	The work of the FAA's UAS Identification and Tracking (UAS ID) 
	Aviation Rulemaking Committee (ARC) is the foundation of later ASTM 
	<xref target="F3411-19" format="default"/> and IETF DRIP efforts. 
	The work of Gabriel Cox, Intel Corp., and their Open Drone ID 
	collaborators opened UAS RID to a wider community. The work of ASTM 
	F38.02 in balancing the interests of diverse stakeholders is 
	essential to the necessary rapid and widespread deployment of UAS 
	RID. IETF volunteers who have extensively reviewed or otherwise 
	contributed to this document include Amelia Andersdotter, Carsten 
	Bormann, Mohamed Boucadair, Toerless Eckert, Susan Hares, Mika 
	Jarvenpaa, Daniel Migault, Alexandre Petrescu, Saulo Da Silva and 
	Shuai Zhao.
</t>
</section>
</back>
</rfc>
