<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<?rfc iprnotified="no" ?>
<?rfc strict="no" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
	docName="draft-card-drip-arch-02" category="info" 
	ipr="trust200902" obsoletes="" updates="" submissionType="IETF" 
	xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" 
	version="3">
  <!-- xml2rfc v2v3 conversion 2.37.1 -->
<front>
	<title abbrev="DRIP Arch">Drone Remote Identification Protocol 
	(DRIP) Architecture</title> <seriesInfo name="Internet-Draft" 
	value="draft-card-drip-arch-02"/>
	<author fullname="Stuart W. Card" initials="S." surname="Card">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>stu.card@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>adam.wiethuechter@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Robert Moskowitz" initials="R" surname="Moskowitz">
    <organization>HTT Consulting</organization>
    <address>
      <postal> 
	    <street></street>
        <city>Oak Park</city>
        <region>MI</region>
        <code>48237</code>
        <country>USA</country>
      </postal>
      <email>rgm@labs.htt-consult.com</email>
	</address>
	</author>
	<author fullname="Shuai Zhao" initials="S" surname="Zhao"> <organization>Tencent</organization> <address>
	  <postal>
		<street/>
		<city/>
		<region>CA</region>
		<code/>
		<country>USA</country>
	  </postal>
	  <email>shuaiizhao@tencent.com</email>
	</address>
	</author>
    <date year="2020"/>
    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>
    <keyword>Request for Comments</keyword>
    <keyword>I-D</keyword>
    <keyword>Internet-Draft</keyword>
    <keyword>HIP</keyword>
    <keyword>DRIP</keyword>
<abstract>
<t>
	This document defines an architecture for Drone Remote 
	Identification Protocol (DRIP) Working Group protocols and services 
	to support Unmanned Aircraft System Remote Identification (UAS RID) 
	and RID-related communications, including its building blocks and 
	their interfaces, all to be standardized.
</t>
<t>
	CAVEAT LECTOR: This draft version is undergoing substantial 
	restructuring and is submitted to the DRIP WG only to spark
	discussion on architecture and to be adopted as a placeholder if
	there is consensus that there should be an architecture document
	(however far from any future consensus on that architecture this
	draft may be).
</t> 
</abstract>
</front>
<middle>
<section numbered="true" toc="default"> <name>Introduction</name>
<t>
	Many safety and other considerations dictate that Unmanned Aircraft 
	(UA) be remotely identifiable. Civil Aviation Authorities (CAAs) 
	worldwide are mandating Unmanned Aircraft Systems (UAS) Remote 
	Identification (RID). The European Union Aviation Safety Agency 
	(EASA) has published <xref target="Delegated" format="default"/> 
	and <xref target="Implementing" format="default"/> Regulations. The 
	United States Federal Aviation Administration (FAA) has published a 
	Notice of Proposed Rule Making <xref target="NPRM" 
	format="default"/>. CAAs currently promulgate performance-based 
	regulations that do not specify techniques, but rather cite 
	industry consensus technical standards as acceptable means of 
	compliance.
</t>
<!-- Should the FAA ConOps be referenced above?  -->
<t>  
	ASTM International, Technical Committee F38 (UAS), Subcommittee 
	F38.02 (Aircraft Operations), Work Item WK65041, developed the new 
	ASTM <xref target="F3411-19" format="default"/> Standard 
	Specification for Remote ID and Tracking. It defines 1 set of RID 
	information and 2 means of communicating it (if a UAS uses both 
	communication methods, the CAAs are expected to mandate that the 
	RID information content will be identical over both methods).
</t>
	<ul empty="true">
		<li>
			Network RID defines a RID data dictionary and data flow: 
			from a UAS via unspecified means to a Network Remote ID 
			Service Provider (Net-RID SP); from the Net-RID SP to an 
			integrated, or over the Internet to a separate, Network 
			Remote ID Display Provider (Net-RID DP); from the Net-RID 
			DP via the Internet to Network Remote ID clients in 
			response to their queries (expected typically, but not 
			specified exclusively, to be web based) specifying airspace 
			volumes of interest. Network RID depends upon connectivity, 
			in several segments, including the Internet, from the UAS 
			to the Observer.
		</li>
		<li>
			Broadcast RID defines a set of RID messages and how the UA 
			transmits them locally directly one-way, over Bluetooth or 
			Wi-Fi. Broadcast RID should need Internet (or other Wide 
			Area Network) connectivity only for UAS registry 
			information lookup using the locally directly received UAS 
			ID as a key. Broadcast RID should be functionally usable in 
			situations with no Internet connectivity.
		</li>
	</ul>
<t>  
	Other SDOs (e.g. 3GPP, <xref target="RID_Overview" 
	format="default"/>) may define their own communication methods for 
	both Network and Broadcast RID.  The CAAs expect any additional 
	methods to maintain consistency of the RID messages.
</t>
<t>
	<xref target="F3411-19" format="default"/> specifies 3 UAS ID Types. 
</t>
	<ol>
		<li>
			1: a static, manufacturer assigned, hardware serial number per 
			ANSI/CTA-2063-A "Small Unmanned Aerial System Serial 
			Numbers" <xref target="CTA2063A" format="default"/>.
		</li>
		<li>
			2: a CAA assigned (presumably static) ID.
		</li>
		<li>
			3: a UAS Traffic Management (UTM) system assigned UUID v4 
			<xref target="RFC4122" format="default"/>, which can but 
			need not be dynamic.
		</li>
	</ol>
<t>
	The EU allows only Type 1. The US allows Types 1 and 3, but 
	requires Type 3 IDs (if used) each to be used only once (for a 
	single UAS flight, which in the context of UTM is called an 
	"operation"). <xref target="F3411-19" format="default"/> Broadcast 
	RID transmits all information in the clear as plaintext, so Types 1 
	and 2 static IDs enable trivial correlation of patterns of use, 
	unacceptable in many applications (e.g. package delivery routes of 
	competitors).
</t>
<section numbered="true" toc="default"> <name>UAS RID Uses</name>
<t>
	An ID is not an end in itself; it exists to enable lookups and 
	provision of services complementing mere identification.
</t>
<t>
	Minimal specified information must be made available to the public.
	Access to other data, e.g. UAS operator Personally Identifiable 
	Information (PII), must be limited to strongly authenticated 
	personnel, properly authorized per policy. <xref target="F3411-19" 
	format="default"/> specifies only how to get the UAS ID to the 
	observer; how the observer can perform these lookups, and how the 
	registries first can be populated with information, is unspecified.
</t>
<t>
	Dynamic establishment of secure communications between the observer 
	and the UAS pilot seems to have been contemplated by the FAA UAS ID 
	and Tracking Aviation Rulemaking Committee (ARC) in their <xref 
	target="Recommendations" format="default"/>, but it is not 
	addressed in any of the subsequent proposed regulations or 
	technical specifications.
</t>
<t>
	Using UAS RID to facilitate related services, such as Detect And 
	Avoid (DAA) and other applications of Vehicle to Vehicle or Vehicle 
	to Infrastructure (V2V, V2I, collectively V2X) communications, is 
	an obvious application.  This is explicitly contemplated in the FAA 
	NPRM, but has been omitted from <xref target="F3411-19" 
	format="default"/>. DAA has been explicitly declared out of scope 
	in ASTM working group discussions, based on a distinction between 
	RID as a security standard vs DAA as a safety application.
</t>
</section>
<section numbered="true" toc="default"> <name>UAS RID Design Considerations</name>
<t>
	The need for near-universal deployment of UAS RID is pressing. This 
	implies the need to support use by observers of already ubiquitous 
	mobile devices (smartphones and tablets). UA onboard RID devices 
	are severely constrained in Cost, Size, Weight and Power ($SWaP). 
	Cost is a significant impediment to the necessary near-universal 
	adoption of UAS send and observer receive RID capabilities. 
</t>
<t>
	To accommodate the most severely constrained cases, all these 
	conspire to motivate system design decisions, especially for the 
	Broadcast RID data link, which complicate the protocol design 
	problem: one-way links; extremely short packets; and 
	Internet-disconnected operation of UA onboard devices. 
	Internet-disconnected operation of observer devices has been deemed 
	by ASTM F38.02 too infrequent to address, but for some users is 
	important and presents further challenges. Heavyweight security 
	protocols are infeasible, yet trustworthiness of UAS RID 
	information is essential. Under <xref target="F3411-19" 
	format="default"/>, even the most basic datum, the UAS ID string 
	(typically number) itself can be merely an unsubstantiated claim.
</t>
</section>
<section numbered="true" toc="default"> <name>DRIP Goals</name>
<t>
	DRIP will enable leveraging existing Internet resources (standard 
	protocols, services, infrastructure and business models) to meet 
	UAS RID and closely related needs. DRIP will specify how to apply 
	IETF standards, complementing <xref target="F3411-19" 
	format="default"/> and other external standards, to satisfy UAS RID 
	requirements. DRIP will update existing and develop new protocol 
	standards as needed to accomplish the foregoing.
</t>
<t>
	This document will outline the UAS RID architecture into which DRIP 
	must fit, and an architecture for DRIP itself. This includes 
	presenting the gaps between the CAAs' Concepts of Operations and 
	<xref target="F3411-19" format="default"/> as it relates to use of 
	Internet technologies and UA direct RF communications.  Issues 
	include, but are not limited to:
</t>
	<ul>
		<li>
			Trustworthy Remote ID and trust in RID messages
		</li>
		<li>
			Privacy in RID messages (PII protection)
		</li>
		<li>
			UA -> Ground communications including Broadcast RID
		</li>
		<li>
			Broadcast RID 'harvesting' and secure forwarding into the 
			UTM
		</li>
		<li>
			Secure UAS -> Net-RID SP communications
		</li>
	</ul>
</section>
</section>
<section anchor="terms" numbered="true" toc="default"> <name>Terms and Definitions</name>
<section numbered="true" toc="default"> <name>Requirements Terminology</name>
<t>
	The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
	"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", 
	and "OPTIONAL" in this document are to be interpreted as described 
	in BCP 14 <xref target="RFC2119" format="default"/> <xref 
	target="RFC8174" format="default"/> when, and only when, they 
	appear in all capitals, as shown here.
</t>
</section>
<section numbered="true" toc="default"> <name>Additional Definitions</name>
<t>
	Most terminology needed in the DRIP context is introduced in the
	paired Requirements document (currently draft-card-drip-reqs).
</t>
	<dl newline="true" spacing="normal">
		<dt>CS-RID</dt>
		<dd>
			Crowd Sourced Remote Identification. An optional DRIP WG 
			service that gateways Broadcast RID to Network RID, and 
			supports verification of RID position/velocity claims with 
			independent measurements (e.g. by multilateration), via a 
			SDSP.
		</dd>
		<dt>HI</dt>
		<dd>
			Host Identity. The public key portion of an asymmetric 
			key pair from HIP. In this document it is assumed that the 
			HI is based on an EdDSA25519 key pair. This is supported by 
			new crypto defined in <xref 
			target="I-D.moskowitz-hip-new-crypto" format="default"/>.
		</dd>
		<dt>HIP</dt>
		<dd>
			Host Identity Protocol. The origin of HI, HIT, and HHIT, 
			required for DRIP. Optional full use of HIP enables 
			additional DRIP functionality.
		</dd>
		<dt>HHIT</dt>
		<dd>
			Hierarchical Host Identity Tag. A HIT with extra 
			information not found in a standard HIT. Defined in <xref 
			target="I-D.moskowitz-hip-hierarchical-hit" 
			format="default"/>.
		</dd>
		<dt>HIT</dt>
		<dd>
			Host Identity Tag. A 128 bit handle on the HI. Defined in 
			HIPv2 <xref target="RFC7401" format="default"/>.
		</dd>
	</dl>		
</section>
</section>
<section numbered="true" toc="default"> <name>Entities and their Interfaces</name>
<t>
	Any DRIP WG solutions for UAS RID must fit into the UTM (or 
	U-space) system. This implies interaction with entities including 
	UA, GCS, USS, Net-RID SP, Net-RID DP, Observers, Operators, Pilots 
	In Command, Remote Pilots, possibly SDSP, etc. The only additional 
	entities introduced in this document are registries, required but 
	not specified by the regulations and <xref target="RFC7401" 
	format="default"/>, and optionally CS-RID SDSP and Finder nodes. 
	The DRIP WG may yet introduce other entities if/as needed.
</t>
<t>
	UAS registries hold both public and private UAS information. The 
	public information is primarily pointers to the repositories of, 
	and keys for looking up, the private information. Given these 
	different uses, and to improve scalability, security and simplicity 
	of administration, the public and private information can be stored 
	in different registries, indeed different types of registry.
</t>
<section numbered="true" toc="default"> <name>Private Information Registry</name>
<section numbered="true" toc="default"> <name>Background</name>
<t>
	The private information required for UAS RID is similar to that 
	required for Internet domain name registration.  Thus a DRIP RID 
	solution can leverage existing Internet resources: registration 
	protocols, infrastructure and business models, by fitting into an 
	ID structure compatible with DNS names.  This implies some sort of 
	hierarchy, for scalability, and management of this hierarchy. It is 
	expected that the private registry function will be provided by the 
	same organizations that run USS, and likely integrated with USS.
</t>
</section>
<section numbered="true" toc="default"> <name>Proposed Approach</name>
<t>
	
	A DRIP UAS ID MUST be amenable to handling as an Internet domain 
	name (at an arbitrary level in the hierarchy), MUST be registered 
	in at least a pseudo-domain (e.g. .ip6 for reverse lookup), and MAY 
	be registered as a sub-domain (for forward lookup).
</t>
<t>
	A DRIP private information registry MUST support essential Internet 
	domain name registry operations (e.g. add, delete, update, query) 
	using interoperable open standard protocols. It SHOULD support the 
	Extensible Provisioning Protocol (EPP) and the Registry Data Access 
	Protocol (RDAP) with access controls. It MAY use XACML to specify 
	those access controls. It MUST be listed in a DNS: that DNS MAY be 
	private; but absent any compelling reasons for use of private DNS, 
	SHOULD be the definitive public Internet DNS hierarchy. The DRIP 
	private information registry in which a given UAS is registered 
	MUST be locatable, starting from the UAS ID, using the methods 
	specified in <xref target="RFC7484" format="default"/>.
</t>
</section>
</section>
<section numbered="true" toc="default"> <name>Public Information
Registry</name>
<section numbered="true" toc="default"> <name>Background</name>
<t>
	The public information required to be made available by UAS RID is 
	transmitted as clear plaintext to local observers in Broadcast RID 
	and is served to a client by a Net-RID DP in Network RID. Therefore, 
	while IETF can offer e.g. <xref target="RFC6280" format="default"/> 
	as one way to implement Network RID, the only public information 
	required to support essential DRIP functions for UAS RID is that 
	required to look up Internet domain hosts, services, etc.
</t>
</section>
<section numbered="true" toc="default"> <name>Proposed Approach</name>
<t>
	A DRIP public information registry MUST be a standard DNS server, 
	in the definitive public Internet DNS hierarchy. It MUST support 
	NS, MX, SRV, TXT, AAAA, PTR, CNAME and HIP RR types.
</t>
</section>
</section>
<section numbered="true" toc="default"> <name>CS-RID concept</name>
<t>
	ASTM anticipated that regulators would require both Broadcast RID 
	and Network RID for large UAS, but allow RID requirements for small 
	UAS to be satisfied with the operator's choice of either Broadcast 
	RID or Network RID. The EASA initially specified Broadcast RID for 
	UAS of essentially all UAS and is now considering Network RID also. 
	The FAA NPRM requires both for Standard RID and specifies Broadcast 
	RID only for Limited RID. One obvious opportunity is to enhance the 
	architecture with gateways from Broadcast RID to Network RID. This 
	provides the best of both and gives regulators and operators 
	flexibility. Such gateways could be pre-positioned (e.g. around 
	airports and other sensitive areas) and/or crowdsourced (as nothing 
	more than a smartphone with a suitable app is needed). Gateways can 
	also perform multilateration to provide independent measurements of 
	UA position, which is otherwise entirely operator self-reported in 
	UAS RID and UTM. CS-RID would be an option, beyond baseline DRIP 
	functionality; if implemented, it adds 2 more entity types.
</t>
<section numbered="true" toc="default"> <name>Proposed optional CS-RID SDSP</name>
<t>
	A CS-RID SDSP MUST appear (i.e. present the same interface) to a 
	Net-RID SP as a Net-RID DP. A CS-RID SDSP MUST appear to a Net-RID 
	DP as a Net-RID SP. A CS-RID SDSP MUST NOT present a standard 
	GCS-facing interface as if it were a Net-RID SP. A CS-RID SDSP MUST 
	NOT present a standard client-facing interface as if it were a 
	Net-RID DP. A CS-RID SDSP MUST present a TBD interface to a CS-RID 
	Finder; this interface SHOULD be based upon but readily 
	distinguishable from that between a GCS and a Net-RID SP.
</t>
</section>
<section numbered="true" toc="default"> <name>Proposed optional CS-RID Finder</name>
<t>
	A CS-RID Finder MUST present a TBD interface to a CS-RID SDSP; this 
	interface SHOULD be based upon but readily distinguishable from 
	that between a GCS and a Net-RID SP. A CS-RID Finder must 
	implement, integrate, or accept outputs from, a Broadcast RID 
	receiver. A CS-RID Finder MUST NOT interface directly with a GCS, 
	Net-RID SP, Net-RID DP or Network RID client.
</t>
</section>
</section>
</section>
<section numbered="true" toc="default"> <name>Identifiers</name>
<section numbered="true" toc="default"> <name>Background</name>
<t>
	A DRIP UA ID needs to be "Trustworthy".  This means that within the 
	framework of the RID messages, an observer can establish that the 
	RID used does uniquely belong to the UA.  That the only way for any 
	other UA to assert this RID would be to steal something from 
	within the UA.  The RID is self-generated by the UAS (either UA or 
	GCS) and registered with the USS.
</t>
<t>	
	Within the limitations of Broadcast RID, this is extremely 
	challenging as:
</t>
	<ul>
		<li>
			An RID can at most be 20 characters
		</li>
		<li>
			The ASTM Basic RID message (the message containing the RID) 
			is 25 characters; only 3 characters are currently unused
		</li>
		<li>
			The ASTM Authentication message, with some changes from 
			<xref target="F3411-19" format="default"/> can carry 224 
			bytes of payload.
		</li>
	</ul>
<t>	
	Standard approaches like X.509 and PKI will not fit these 
	constraints, even using the new EdDSA algorithm.  An example of a 
	technology that will fit within these limitations is an enhancement 
	on the Host Identity Tag (HIT) <xref target="RFC7401" 
	format="default">HIPv2</xref> as defined in <xref 
	target="I-D.moskowitz-hip-hierarchical-hit" 
	format="default">HHIT</xref>.
</t>
<t>	
	By using the EdDSA HHIT suite, self-assertions of the RID can be 
	done in as little as 84 bytes.  Third-party assertions can be done 
	in 200 bytes.  An observer would need Internet access to validate a 
	self-assertion claim.  A third-party assertion can be validated via 
	a small credential cache in a disconnected environment.  This 
	third-party assertion is possible when the third-party also uses 
	HHITs for its identity and the UA has the public key for that HHIT.
</t>
</section>
<section numbered="true" toc="default"> <name>Proposed Approach</name>
<t>
	A DRIP UAS ID MUST be a HHIT. It SHOULD be self-generated by the 
	UAS (either UA or GCS) and MUST be registered with the Private 
	Information Registry identified in its hierarchy fields. Each UAS 
	ID HHIT MUST NOT be used more than once, with one exception as 
	follows.
</t>
<t>	
	Each UA MAY be assigned, by its manufacturer, a single HI and 
	derived HHIT encoded as a hardware serial number per <xref 
	target="CTA2063A" format="default"/>. Such a static HHIT SHOULD be 
	used only to bind one-time use UAS IDs (other HHITs) to the unique 
	UA. Depending upon implementation, this may leave a HI private key 
	in the possession of the manufacturer (see Security Considerations).
</t>
<t>
	Each UA equipped for Broadcast RID MUST be provisioned not only 
	with its HHIT but also with the HI public key from which the HHIT 
	was derived and the corresponding private key, to enable message 
	signature. Each UAS equipped for Network RID MUST be provisioned 
	likewise; the private key SHOULD reside only in the ultimate source 
	of Network RID messages (i.e. on the UA itself if the GCS is merely 
	relaying rather than sourcing Network RID messages). Each observer 
	device MUST be provisioned with public keys of the UAS RID root 
	registries and MAY be provisioned with public keys or certificates 
	for subordinate registries.
</t>
<t>
	Operators and Private Information Registries MUST possess and other 
	UTM entities MAY possess UAS ID style HHITs. When present, such 
	HHITs SHOULD be used with HIP to strongly mutually authenticate and 
	optionally encrypt communications.
</t>
</section>
</section>
<section numbered="true" toc="default"> <name>Proposed Transactions</name>
<t>
	Each Operator MUST generate a "HIo" and derived "HHITo", register 
	them with a Private Information Registry along with whatever 
	Operator data (inc. PII) is required by the cognizant CAA and the 
	registry, and obtain a certificate "Cro" signed with "HIr(priv)" 
	proving such registration.
</t>
<t>
	To add an UA, an Operator MUST generate a "HIa" and derived 
	"HHITa", create a certificate "Coa" signed with "HIo(priv)" to 
	associate the UA with its Operator, register them with a Private 
	Information Registry along with whatever UAS data is required by 
	the cognizant CAA and the registry, obtain a certificate "Croa" 
	signed with "HIr(priv)" proving such registration, and obtain a 
	certificate "Cra" signed with "HIr(priv)" proving UA registration 
	in that specific registry while preserving Operator privacy. The 
	operator then MUST provision the UA with "HIa", "HIa(priv)", 
	"HHITa" and "Cra".
</t>
<t>
	UA engaging in Broadcast RID MUST use "HIa(priv)" to sign Auth 
	Messages and MUST periodically broadcast "Cra". UAS engaging in 
	Network RID MUST use "HIa(priv)" to sign Auth Messages. Observers 
	MUST use "HIa" from received "Cra" to verify received Broadcast RID 
	Auth messages. Observers without Internet connectivity MAY use 
	"Cra" to identify the trust class of the UAS based on known 
	registry vetting. Observers with Internet connectivity MAY use 
	"HHITa" to perform lookups in the Public Information Registry and 
	MAY then query the Private Information Registry, which MUST enforce 
	AAA policy on Operator PII and other sensitive information.
</t>
</section>
<section anchor="IANA" numbered="true" toc="default"> <name>IANA Considerations</name>
<t>
	It is likely that an IPv6 prefix will be needed for the HHIT (or 
	other identifier) space: this should be coordinated with ICAO; this 
	will be specified in other drafts.
</t>
</section>
<section numbered="true" toc="default"> <name>Security Considerations</name>
<t>
	DRIP is all about safety and security, so content pertaining to 
	such is not limited to this section. The security provided by 
	asymmetric cryptographic techniques depends upon protection of the 
	private keys. A manufacturer that embeds a private key in an UA may 
	have retained a copy. A manufacturer whose UA are configured by a 
	closed source application on the GCS which communicates over the 
	Internet with the factory may be sending a copy of a UA or GCS 
	self-generated key back to the factory. Compromise of a registry 
	private key could do widespread harm. Key revocation procedures are 
	as yet to be determined. These risks are in addition to those 
	involving Operator key management practices. 
</t>
</section>
<section numbered="true" toc="default"> <name>Acknowledgments</name>
<t>
	The work of the FAA's UAS Identification and Tracking (UAS ID) 
	Aviation Rulemaking Committee (ARC) is the foundation of later ASTM 
	and proposed IETF DRIP WG efforts. The work of ASTM F38.02 in 
	balancing the interests of diverse stakeholders is essential to the 
	necessary rapid and widespread deployment of UAS RID.
</t>
<t>
	<xref target="Overview" format="default"/> was provided by Shuai 
	Zhao of Tencent.
</t>
</section>
</middle>
<back>
<references> <name>References</name>
<references> <name>Normative References</name>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
</references>
<references> <name>Informative References</name>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6280.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7401.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-hip-hierarchical-hit.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-hip-new-crypto.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4122.xml"/>
	<reference anchor="CTA2063A" target="">
	<front>
		<title>Small Unmanned Aerial Systems Serial Numbers</title>
		<author>
			<organization>ANSI</organization>
		</author>
		<date month="09" year="2019"/>
	</front>
	</reference>
	<reference anchor="F3411-19" target="">
	<front>
		<title>Standard Specification for Remote ID and Tracking</title>
		<author>
			<organization>ASTM</organization>
		</author>
		<date month="12" year="2019"/>
	</front>
	</reference>
	<reference anchor="LANNC" target="https://www.faa.gov/uas/programs_partnerships/data_exchange/">
	<front>
		<title>Low Altitude Authorization and Notification Capability</title>
		<author>
			<organization>United States Federal Aviation Administration (FAA)</organization>
		</author>
	</front>
	</reference>
	<reference anchor="TS-36.777" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3231">
	<front>
		<title>UAV service in the LTE network</title>
		<author>
			<organization>3GPP</organization>
		</author>
	</front>
	</reference>
	<reference anchor="TS-22.825" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3527">
	<front>
		<title>UAS RID requirement study</title>
		<author>
			<organization>3GPP</organization>
		</author>
	</front>
	</reference>
	<reference anchor="ATIS-I-0000074" target="https://access.atis.org/apps/group_public/download.php/48760/ATIS-I-0000074.pdf">
	<front>
		<title>Report on UAS in 3GPP</title>
		<author>
			<organization>ATIS</organization>
		</author>
	</front>
	</reference>
	<reference anchor="Delegated" target="">
	<front>
		<title>EU Commission Delegated Regulation 2019/945 of 12 March 2019 on unmanned aircraft systems and on third-country operators of unmanned aircraft systems</title>
		<author>
			<organization>European Union Aviation Safety Agency (EASA)</organization>
		</author>
		<date month="03" year="2019"/>
	</front>
	</reference>
	<reference anchor="Implementing" target="">
	<front>
		<title>EU Commission Implementing Regulation 2019/947 of 24 May 2019 on the rules and procedures for the operation of unmanned aircraft </title>
		<author>
			<organization>European Union Aviation Safety Agency (EASA)</organization>
		</author>
		<date month="05" year="2019"/>
	</front>
	</reference>
	<reference anchor="U-Space" target="https://www.sesarju.eu/sites/default/files/documents/u-space/CORUS%20ConOps%20vol2.pdf">
	<front>
		<title>U-space Concept of Operations</title>
		<author>
			<organization>European Organization for the Safety of Air Navigation (EUROCONTROL)</organization>
		</author>
		<date month="10" year="2019"/>
	</front>
	</reference>
	<reference anchor="NPRM" target="">
	<front>
		<title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
		<author>
			<organization>United States Federal Aviation Administration (FAA)</organization>
		</author>
		<date month="12" year="2019"/>
	</front>
	</reference>
	<reference anchor="Recommendations" target="">
	<front>
		<title>UAS ID and Tracking ARC Recommendations Final Report</title>
		<author>
			<organization>FAA UAS Identification and Tracking Aviation Rulemaking Committee</organization>
		</author>
		<date month="09" year="2017"/>
	</front>
	</reference>
</references>
</references>
<section anchor="Overview" numbered="true" toc="default"> <name>Overview of Unmanned Aircraft Systems (UAS) Traffic Management (UTM)</name>
<section anchor="Operation" numbered="true" toc="default"> <name>Operation Concept</name>
<t>
	The National Aeronautics and Space Administration (NASA) and FAAs’ 
	effort of integrating UAS’s operation into the national airspace 
	system (NAS) leads to the development of the concept of UTM and the 
	ecosystem around it. The UTM concept was initially presented in 
	2013. The eventual development and implementation are conducted by 
	the UTM research transition team (RTT) which is the joint workforce 
	by FAA and NASA. World efforts took place afterward. The Single 
	European Sky ATM Research (SESAR) started the CORUS project to 
	research its UTM counterpart concept, namely <xref 
	target="U-Space" format="default">U-Space</xref>. This effort is 
	led by the European Organization for the Safety of Air Navigation 
	(Eurocontrol).
</t>
<t>
	Both NASA and SESAR have published the UTM concept of operations to 
	guide the development of their future air traffic management (ATM) 
	system and make sure safe and efficient integrations of manned and 
	unmanned aircraft into the national airspace.
</t>
<t>
	The UTM composes of UAS operation infrastructure, procedures and 
	local regulation compliance policies to guarantee UAS’s safe 
	integration and operation. The main functionality of a UTM includes 
	but not limited to provides means of communication between UAS 
	operators and service providers and a platform to facilitate 
	communication among UAS service providers.
</t>
</section>
<section numbered="true" toc="default"> <name>UAS service supplier (USS)</name>
<t>
	A USS plays an important role to fulfill the key performance 
	indicators (KPIs) that a UTM has to offer. Such Entity acts as a 
	proxy between UAS operators and UTM service providers. It provides 
	services like real-time UAS traffic monitor and planning, 
	aeronautical data archiving, airspace and violation control, 
	interacting with other third-party control entities, etc. A USS can 
	coexist with other USS(s) to build a large service coverage map 
	which can load-balance, relay and share UAS traffic information.
</t>
<t>
	The FAA works with UAS industry shareholders and promotes the Low 
	Altitude Authorization and Notification Capability <xref 
	target="LANNC" format="default"/> program which is the first 
	implementation to realize UTM’s functionality. The LAANC program 
	can automate the UAS’s fly plan application and approval process 
	for airspace authorization in real-time by checking against 
	multiple aeronautical databases such as airspace classification and 
	fly rules associated with it, FAA UAS facility map, special use 
	airspace, Notice to airman (NOTAM) and Temporary flight rule (TFR).
</t>
</section>
<section numbered="true" toc="default"> <name>UTM Use cases for UAS operation</name>
<t>
	This section illustrates a couple of use case scenarios where UAS’s 
	participation in UTM has significant safety improvement.
</t>
	<ol>
		<li>
			For a UAS participating in UTM and takeoff or land in a 
			controlled airspace (ex. Class Bravo, Charlie, Delta and 
			Echo in United Stated), the USS where UAS is currently 
			communicating with is responsible for UAS’s registration, 
			authenticating the UAS’s fly plan by checking against 
			designated UAS fly map database, obtaining the air traffic 
			control (ATC) authorization and monitor the UAS fly path in 
			order to maintain safe boundary and follow the 
			pre-authorized route.
		</li>
		<li>
			For a UAS participating in UTM and take off or land in an 
			uncontrolled airspace (ex. Class Golf in the United 
			States), pre-fly authorization must be obtained from a USS 
			when operating beyond-visual-of-sight (BVLOS) operation. 
			The USS either accepts or rejects received intended fly 
			plan from the UAS. Accepted UAS operation may share its 
			current fly data such as GPS position and altitude to USS. 
			The USS may keep the UAS flight status near real-time and 
			may keep it as a record for overall airspace air traffic 
			monitor.
		</li>
	</ol>
</section>
<section anchor="RID_Overview" numbered="true" toc="default"> <name>Overview UAS Remote ID (RID) and RID Standardization</name>
<t>
	A RID is an application enabler for a UAS to be identified by a 
	UTM/USS or third parties entities such as law enforcement. Many 
	safety and other considerations dictate that UAS be remotely 
	identifiable.  CAAs worldwide are mandating UAS RID.  The European 
	Union Aviation Safety Agency (EASA) has published <xref 
	target="Delegated" format="default">Delegated</xref> and <xref 
	target="Implementing" format="default">Implementing</xref> 
	Regulations.  The FAA has published a Notice of Proposed Rule 
	Making <xref target="NPRM" format="default">NPRM</xref>.  CAAs 
	currently promulgate  performance-based regulations that do not 
	specify techniques, but rather cite industry consensus technical 
	standards as acceptable means of compliance.
</t>
<t>
	3GPP provides UA service in the LTE network since release 15 in 
	published technical specification <xref target="TS-36.777" 
	format="default"/>. Start from its release 16, it completed the UAS 
	RID requirement study in <xref target="TS-22.825" 
	format="default"/> and proposed use cases in the mobile network and 
	the services that can be offered based on RID and ongoing release 
	17 specification works on enhanced UAS service requirement and 
	provides the protocol and application architecture support which is 
	applicable for both 4G and 5G network. ATIS’s recent report <xref 
	target="ATIS-I-0000074" format="default"/> proposes architecture 
	approaches for the 3GPP network to support UAS and one of which is 
	put RID in higher 3GPP protocol stack such as using ASTM remote ID 
	<xref target="F3411-19" format="default"/>.
</t>
</section>
</section>
</back>
</rfc>
