| < draft-moskowitz-drip-secure-nrid-c2-04.txt | draft-moskowitz-drip-secure-nrid-c2-05.txt > | |||
|---|---|---|---|---|
| DRIP R. Moskowitz | DRIP R. Moskowitz | |||
| Internet-Draft HTT Consulting | Internet-Draft HTT Consulting | |||
| Intended status: Standards Track S. Card | Intended status: Standards Track S. Card | |||
| Expires: 24 April 2022 A. Wiethuechter | Expires: 23 October 2022 A. Wiethuechter | |||
| AX Enterprize | AX Enterprize | |||
| A. Gurtov | A. Gurtov | |||
| Linköping University | Linköping University | |||
| 21 October 2021 | 21 April 2022 | |||
| Secure UAS Network RID and C2 Transport | Secure UAS Network RID and C2 Transport | |||
| draft-moskowitz-drip-secure-nrid-c2-04 | draft-moskowitz-drip-secure-nrid-c2-05 | |||
| Abstract | Abstract | |||
| This document provides the mechanisms for secure transport of | This document defines a transport mechanism for Unmanned Aircraft | |||
| Unmanned Aircraft System (UAS) Network Remote ID (N-RID) and Command- | System (UAS) Network Remote ID (N-RID). CoAP/CBOR is used for the | |||
| and-Control (C2) messaging. Both HIP and DTLS based methods are | N-RID messaging. This is secured via either HIP/ESP or DTLS. HIP/ | |||
| ESP or DTLS secure messaging Command-and-Control (C2) for is also | ||||
| described. | described. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 24 April 2022. | This Internet-Draft will expire on 23 October 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
| extracted from this document must include Simplified BSD License text | extracted from this document must include Revised BSD License text as | |||
| as described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Terms and Definitions . . . . . . . . . . . . . . . . . . . . 3 | 2. Terms and Definitions . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. Requirements Terminology . . . . . . . . . . . . . . . . 3 | 2.1. Requirements Terminology . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Network Remote ID . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Secure Transports . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.1. Network RID endpoints . . . . . . . . . . . . . . . . . . 4 | 3.1. HIP for Secure Transport . . . . . . . . . . . . . . . . 4 | |||
| 3.1.1. N-RID from the UA . . . . . . . . . . . . . . . . . . 4 | 3.2. DTLS for Secure Transport . . . . . . . . . . . . . . . . 5 | |||
| 3.1.2. N-RID from the GCS . . . . . . . . . . . . . . . . . 5 | 3.3. Ciphers for Secure Transport . . . . . . . . . . . . . . 5 | |||
| 3.1.3. N-RID from the Operator . . . . . . . . . . . . . . . 5 | 3.4. HIP and DTLS contrasted and compared . . . . . . . . . . 5 | |||
| 3.2. UAS Identity . . . . . . . . . . . . . . . . . . . . . . 5 | 4. Network Remote ID . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4. Command and Control . . . . . . . . . . . . . . . . . . . . . 5 | 4.1. Network RID Endpoints . . . . . . . . . . . . . . . . . . 7 | |||
| 4.1. Securing MAVLink . . . . . . . . . . . . . . . . . . . . 6 | 4.1.1. N-RID from the UA . . . . . . . . . . . . . . . . . . 7 | |||
| 5. Secure Transports . . . . . . . . . . . . . . . . . . . . . . 6 | 4.1.2. N-RID from the GCS . . . . . . . . . . . . . . . . . 7 | |||
| 5.1. HIPv2 for Secure Transport . . . . . . . . . . . . . . . 6 | 4.1.3. N-RID from the Operator . . . . . . . . . . . . . . . 7 | |||
| 5.2. DTLS for Secure Transport . . . . . . . . . . . . . . . . 7 | 4.2. Network RID Messaging . . . . . . . . . . . . . . . . . . 8 | |||
| 5.3. Ciphers for Secure Transport . . . . . . . . . . . . . . 7 | 4.2.1. Secure Link Setup . . . . . . . . . . . . . . . . . . 8 | |||
| 5.4. HIP and DTLS contrasted and compared . . . . . . . . . . 7 | 4.2.2. Static Messages . . . . . . . . . . . . . . . . . . . 9 | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | 4.2.3. Vector/Location Message . . . . . . . . . . . . . . . 9 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | 4.3. CoAP N-RID messages . . . . . . . . . . . . . . . . . . . 10 | |||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9 | 5. Command and Control . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 5.1. Securing MAVLink . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 9 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 9 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11 | 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 | ||||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 11 | ||||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 11 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | ||||
| 1. Introduction | 1. Introduction | |||
| This document defines a set of messages for Unmanned Aircraft System | ||||
| (UAS) Network Remote ID (N-RID) derived from the ASTM Remote ID | ||||
| [F3411-19] broadcast messages and common data dictionary. These | ||||
| messages are transported from the UAS to its USS Network Service | ||||
| Provider (Net-RID SP) over CoAP/CBOR ([RFC7252]/[RFC8949]). | ||||
| CoAP/CBOR were selected for their low communication "cost". This may | ||||
| not be an issue if N-RID originates from the Ground Control Station | ||||
| (GCS, Section 4.1.2), but it may be an important determinant when | ||||
| originating from the UA (Section 4.1.1). Particularly, very small | ||||
| messages may open N-RID transmissions over a variety of wireless | ||||
| technologies. | ||||
| To further reduce the communication cost, SCHC [RFC8724] is defined | ||||
| for the CoAP layer ([RFC8824]) and security "compression" (ESP | ||||
| Implicit IV, [RFC8750]) for ESP. SCHC for the IP/UDP layer is | ||||
| currently defined by IP carrier (e.g. LoRaWAN, [RFC9011]) and will | ||||
| be covered in any specific implementation. | ||||
| This document defines mechanisms to provide secure transport for | This document defines mechanisms to provide secure transport for | |||
| Unmanned Aircraft System (UAS) ASTM Network Remote ID [F3411-19] | these N-RID messages and Command and Control (C2) messaging. | |||
| (N-RID) and Command and Control (C2) messaging. | ||||
| A secure end-to-end transport for C2 is critical for UAS especially | A secure end-to-end transport for C2 is critical for UAS especially | |||
| for Beyond Line of Sight (BLOS) operations. It needs to provide data | for Beyond Line of Sight (BLOS) operations. It needs to provide data | |||
| confidentiality, integrity, and authenticity (CIA). Depending on the | Confidentiality, Integrity, and Authenticity (CIA). Depending on the | |||
| underlying network technology, this secure transport may need to | underlying network technology, this secure transport may need to | |||
| manage IP address changes (IP mobility) for both the UA and GCS. | manage IP address changes (IP mobility) for both the UA and GCS. | |||
| A secure end-to-end transport for N-RID (UAS to Network RID Service | A secure end-to-end transport for N-RID (UAS to Network RID Service | |||
| Provider (Net-RID SP)) also should provide full CIA. It may seem | Provider (Net-RID SP)) also should provide full CIA. It may seem | |||
| that confidentiality is optional, as most of the information in N-RID | that confidentiality is optional, as most of the information in N-RID | |||
| is sent in the clear in Broadcast Remote ID (B-RID), but this is a | is sent in the clear in Broadcast Remote ID (B-RID), but this is a | |||
| potentially flawed analysis. N-RID has evesdropping risks not in | potentially flawed analysis. N-RID has evesdropping risks not in | |||
| B-RID and may contain more sensitive information than B-RID. The | B-RID and may contain more sensitive information than B-RID. The | |||
| secure transport for N-RID should only need to manage IP address | secure transport for N-RID should only need to manage IP address | |||
| skipping to change at page 3, line 31 ¶ | skipping to change at page 4, line 7 ¶ | |||
| 2.1. Requirements Terminology | 2.1. Requirements Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 2.2. Definitions | 2.2. Definitions | |||
| This document uses the terms defined in [drip-requirements]. The | See Section 2.2 of [RFC9153] for common DRIP terms. The following | |||
| following new terms are used in the document: | new terms are used in the document: | |||
| B-RID | B-RID | |||
| Broadcast Remote ID. A method of sending RID messages as 1-way | Broadcast Remote ID. A method of sending RID messages as 1-way | |||
| transmissions from the UA to any Observers within radio range. | transmissions from the UA to any Observers within radio range. | |||
| N-RID | N-RID | |||
| Network Remote ID. A method of sending RID messages via the | Network Remote ID. A method of sending RID messages via the | |||
| Internet connection of the UAS directly to the UTM. | Internet connection of the UAS directly to the UTM. | |||
| RID | RID | |||
| Remote ID. A unique identifier found on all UA to be used in | Remote ID. A unique identifier found on all UA to be used in | |||
| communication and in regulation of UA operation. | communication and in regulation of UA operation. | |||
| 3. Network Remote ID | 3. Secure Transports | |||
| The purpose/goal of Network Remote ID (N-RID) is to provide the UAS | Secure UDP-based protocols are preferred for both Network Remote ID | |||
| Traffic Management (UTM) UA situational awareness. The data needed | (N-RID) and C2. Both HIPv2 and DTLS can be used. It will be shown | |||
| for this is already defined in [F3411-19], but a standard message | below that HIPv2 is better suited in most cases. | |||
| format, protocol, and secure communications methodology are missing. | ||||
| This document will provide such an open standard. | For IPv6 and CoAP over both WiFi and Bluetooth (or any other radio | |||
| link), SCHC [RFC8724] is defined to significantly reduce the per | ||||
| packet transmission cost. SCHC is used both within the secure | ||||
| envelope and before the secure envelope as shown in Section 5.2.10 of | ||||
| [lpwan-architecture]. For Bluetooth, there is also IPv6 over | ||||
| Bluetooth LE [RFC7668] for more guidance. | ||||
| Local link (direct radio) C2 security is possible with the link's MAC | ||||
| layer security. SCHC SHOULD still be used as above. Both WiFi and | ||||
| Bluetooth link security can provide appropriate security, but this | ||||
| would not provide trustworthy multi-homed security. | ||||
| 3.1. HIP for Secure Transport | ||||
| HIP has already been used for C2 mobility, managing the ongoing | ||||
| connectivity over WiFi at start of an operation, switching to LTE | ||||
| once out of WiFi range, and returning to WiFi connectivity at the end | ||||
| of the operation. This functionality is especially important for | ||||
| BLOS. HHITs are already defined for RID, and need only be added to | ||||
| the GCS via a GCS Registration as part of the UAS to USS registration | ||||
| to be usedfor C2 HIP. | ||||
| When the UA is the UAS endpoint for N-RID (Section 4.1.1), and | ||||
| particularly when HIP is used for C2, HIP for N-RID simplifies | ||||
| protocol use on the UA. The Net-RID SP endpoint may already support | ||||
| HIP if it is also the HHIT Registrar. If the UA lacks any IP ability | ||||
| and the RID HHIT registration was done via the GCS or Operator | ||||
| device, then they may also be set for using HIP for N-RID. | ||||
| Further, double jump and multi-homing support is mandatory for C2 | ||||
| mobility. This is inherent in the HIP design. The HIP address | ||||
| update can be improved with [hip-fast-mobility]. | ||||
| 3.2. DTLS for Secure Transport | ||||
| DTLS is a good fit for N-RID for any of the possible UAS endpoints. | ||||
| There are challenges in using it for C2. To use DTLS for C2, the GCS | ||||
| will need to be the DTLS server. How does it 'push' commands to the | ||||
| UA? How does it reestablish DTLS security if state is lost? And | ||||
| finally, how is the double jump scenario handled? | ||||
| All the above DTLS for C2 probably have solutions. None of them are | ||||
| inherent in the DTLS design. | ||||
| 3.3. Ciphers for Secure Transport | ||||
| The cipher choice for either HIP or DTLS depends, in large measure, | ||||
| on the UAS endpoint. If the endpoint is computationally constrained, | ||||
| the cipher computations become important. If any of the links are | ||||
| constrained or expensive, then the over-the-wire cost needs to be | ||||
| minimized. AES-CCM and AES-GCM are the preferred, modern, AEAD | ||||
| ciphers. | ||||
| For ESP with HIP [RFC7402], an additional 4 - 8 bytes can be trimmed | ||||
| by using the Implicit IV for ESP option [RFC8750]. | ||||
| NIST is working on selecting a new lightweight cipher that may be the | ||||
| best choice for use on a UA. The Keccak Xoodyak cipher in | ||||
| [new-hip-crypto] is a good "Green Cipher". | ||||
| 3.4. HIP and DTLS contrasted and compared | ||||
| This document specifies the use of DTLS 1.3 for its 0-RTT mobility | ||||
| feature and improved (over 1.2) handshake. DTLS 1.3 is still an IETF | ||||
| draft, so there is little data available to properly contrast it with | ||||
| HIPv2. This section will be based on the current DTLS 1.2. The | ||||
| basic client-server model is unchanged. | ||||
| The use of DTLS vs HIPv2 (both over UDP, HIP in IPsec ESP BEET mode) | ||||
| has pros and cons. DTLS is currently at version 1.2 and based on TLS | ||||
| 1.2. It is a more common protocol than HIP, with many different | ||||
| implementations available for various platforms and languages. | ||||
| DTLS implements a client-server model, where the client initiates the | ||||
| communication. In HIP, two parties are equal and either can be an | ||||
| Initiator or Responder of the Base Exchange. HIP provides separation | ||||
| between key management (base exchange) and secure transport (for | ||||
| example IPsec ESP BEET) while both parts are tightly coupled in DTLS. | ||||
| DTLS 1.2 still has quite chatty connection establishment taking 3-5 | ||||
| RTTs and 15 packets. HIP connection establishment requires 4 packets | ||||
| (I1,R1,I2,R2) over 2 RTTs. This is beneficial for constrained | ||||
| environments of UAs. HIPv2 supports cryptoagility with possibility | ||||
| to negotiate cryptography mechanisms during the Base Exchange. | ||||
| Both DTLS and HIP support mobility with a change of IP address. | ||||
| However, in DTLS only client mobility is well supported, while in HIP | ||||
| either party can be mobile. The double-jump problem (simultaneous | ||||
| mobility) is supported in HIP with a help of Rendezvous Server (RVS) | ||||
| [RFC8004]. HIP can implement secure mobility with IP source address | ||||
| validation in 2 RTTs, and in 1 RTT with fast mobility extension. | ||||
| One study comparing DTLS and IPsec-ESP performance concluded that | ||||
| DTLS is recommended for memory-constrained applications while IPSec- | ||||
| ESP for battery power-constrained [Vignesh]. | ||||
| 4. Network Remote ID | ||||
| In UAS Traffic Management (UTM), the purpose of N-RID is to provide | ||||
| situational awareness of UA (in the form of flight tracking) in a | ||||
| user specified 3D volume. The data needed for this is already | ||||
| defined in [F3411-19], but a standard message format, protocol, and | ||||
| secure communications methodology are missing. F3411, and other UTM | ||||
| based standards going through ASTM, provide JSON objects and some of | ||||
| the messages for passing information between various UTM entities | ||||
| (e.g., Net-RID SP to Net-RID SP and Net-RID SP to Net-RID DP) but | ||||
| does not specify how the data gets into UTM to begin with. This | ||||
| document will provide such an open standard. | ||||
| The Broadcast Remote ID (B-RID) messages in [F3411-19] are sufficient | The Broadcast Remote ID (B-RID) messages in [F3411-19] are sufficient | |||
| to meet the needs of N-RID. In particular, the Message Pack (Msg | to meet the needs of N-RID. These messages can be sent to the Net- | |||
| Type 0xF) is well suited, as this single message can send all the | RID SP when their contents change. Further, a UAS supporting B-RID | |||
| needed information. Further, a UAS supporting B-RID will have | will have minimal development to add N-RID support. | |||
| minimal development to add N-RID support. | ||||
| This approach has the added advantage of being very compact, | This approach has the added advantage of being very compact, | |||
| minimizing the N-RID communications cost. | minimizing the N-RID communications cost. | |||
| 3.1. Network RID endpoints | 4.1. Network RID Endpoints | |||
| The FAA defines the Network Remote ID endpoints as a USS Network | The FAA defines the Network Remote ID endpoints as a USS Network | |||
| Service Provider (Net-RID SP) and the UAS. Both of these are rather | Service Provider (Net-RID SP) and the UAS. Both of these are rather | |||
| nebulous items and what they actually are will impact how | nebulous items and what they actually are will impact how | |||
| communications flow between them. | communications flow between them. | |||
| The Net-RID SP may be provided by the same entity serving as the UAS | The Net-RID SP may be provided by the same entity serving as the UAS | |||
| Service Provider (USS). This simplifies a number of aspects of the | Service Provider (USS). This simplifies a number of aspects of the | |||
| N-RID communication flow. An Operator is expected to register an | N-RID communication flow. An Operator is expected to register an | |||
| operation with the USS. If this is done via the GCS and the GCS is | operation with the USS. If this is done via the GCS and the GCS is | |||
| skipping to change at page 4, line 37 ¶ | skipping to change at page 7, line 28 ¶ | |||
| in the network, that is its IP address will not change during a | in the network, that is its IP address will not change during a | |||
| mission. This simplifies maintaining the N-RID communications. | mission. This simplifies maintaining the N-RID communications. | |||
| The UAS component in N-RID may be either the UA, GCS, or the | The UAS component in N-RID may be either the UA, GCS, or the | |||
| Operator's Internet connected device (e.g. smartphone or tablet). In | Operator's Internet connected device (e.g. smartphone or tablet). In | |||
| all cases, mobility MUST be assumed. That is the IP address of this | all cases, mobility MUST be assumed. That is the IP address of this | |||
| end of the N-RID communication will change during an operation. The | end of the N-RID communication will change during an operation. The | |||
| N-RID mechanism MUST support this. The UAS Identity for the secure | N-RID mechanism MUST support this. The UAS Identity for the secure | |||
| connection may vary based on the UAS endpoint. | connection may vary based on the UAS endpoint. | |||
| 3.1.1. N-RID from the UA | 4.1.1. N-RID from the UA | |||
| Some UA will be equipped with direct Internet access. These UA will | Some UA will be equipped with direct Internet access. These UA will | |||
| also tend to have multiple radios for their Internet access (e.g. | also tend to have multiple radios for their Internet access (e.g. | |||
| Cellular and WiFi). Thus multi-homing with "make before break" | Cellular and WiFi). Thus multi-homing with "make before break" | |||
| behavior is needed. This is on top of any IP address changes on any | behavior is needed. This is on top of any IP address changes on any | |||
| of the interfaces while in use. | of the interfaces while in use. | |||
| 3.1.2. N-RID from the GCS | 4.1.2. N-RID from the GCS | |||
| Many UA will lack direct Internet access, but their GCS may be so | Many UA will lack direct Internet access, but their GCS are | |||
| connected. There are two sources for the GCS for the RID messages, | connected. There are two sources for the GCS for the RID messages, | |||
| both from the UA. These are UA B-RID messages, or content from C2 | both from the UA. These are UA B-RID messages, or content from C2 | |||
| messages that the GCS converts to RID message format. In either | messages that the GCS converts to RID message format. In either | |||
| case, the GCS may be mobile with changing IP addresses. The GCS may | case, the GCS may be mobile with changing IP addresses. The GCS may | |||
| be in a fast moving ground device (e.g. delivery van), so it can have | be in a fast moving ground device (e.g. delivery van), so it can have | |||
| as mobility demanding connection needs as the UA. | as mobility demanding connection needs as the UA. | |||
| 3.1.3. N-RID from the Operator | 4.1.3. N-RID from the Operator | |||
| Many UAS will have no Internet connectivity, but the UA is sending | Many UAS will have no Internet connectivity, but the UA is sending | |||
| B-RID messages and the Operator has an Internet Connected device that | B-RID messages and the Operator, when within RF range, can receive | |||
| is receiving these B-RID messages. The Operator's device can act as | these B-RID messages on an Internet Connected device that can act as | |||
| the proxy for these messages, turning them into N-RID messages. | the proxy for these messages, turning them into N-RID messages. | |||
| 3.2. UAS Identity | 4.2. Network RID Messaging | |||
| The UA MAY use its RID if it is a HHIT [drip-uas-rid]. It may use | N-RID messaging is tied to a UA operation (generally called a flight | |||
| or mission). This consists of an initial secure link setup, followed | ||||
| by a set of mostly static information related to the operation. | ||||
| During the operation, continuous location information is sent by the | ||||
| UA with any needed updates to the mostly static operation | ||||
| information. | ||||
| The Net-RID SP SHOULD send regular "heartbeats" to the UAS. If the | ||||
| UAS does not receive these heartbeats for some policy set time, the | ||||
| UA MUST take the policy set response to loss of Net-RID SP | ||||
| connectivity. For example, this could be a mandated immediate | ||||
| landing. There may be other messages from the Net-RID SP to the UAS | ||||
| (e.g., call the USS operator at this number NOW!). The UAS MUST | ||||
| acknowledge these messages. | ||||
| If the Net-RID SP stops receiving messages from the UAS | ||||
| (Section 4.2.3), it should notify the UTM of a non-communicating UA | ||||
| while still in operation. | ||||
| 4.2.1. Secure Link Setup | ||||
| The secure link setup MUST be done before the operation begins, thus | ||||
| it can use a high capacity connection like WiFi. It MAY use the UA | ||||
| RID for this setup, including other data elements provided in the | ||||
| B-RID Basic ID (Msg Type 0x0) Message. If the Basic ID information | ||||
| is NOT included via the secure setup (including the Net-RID SP | ||||
| querying the USS for this information), it MUST be sent as part of | ||||
| the Static Messages (Section 4.2.2) | ||||
| 4.2.1.1. UAS Identity | ||||
| The UAS MAY use its RID if it is a HHIT [drip-uas-rid]. It may use | ||||
| some other Identity, based on the Net-RID SP policy. | some other Identity, based on the Net-RID SP policy. | |||
| The GCS or Operator smart device may have a copy of the UA | The GCS or Operator smart device may have a copy of the UA | |||
| credentials and use them in the connection to the Net-RID SP. In | credentials and use them in the connection to the Net-RID SP. In | |||
| this case, they are indistinguishable from the UA as seen from the | this case, they are indistinguishable from the UA as seen from the | |||
| Net-RID SP. Alternatively, they may use their own credentials with | Net-RID SP. Alternatively, they may use their own credentials with | |||
| the Net-RID SP which would need some internal mechanism to tie that | the Net-RID SP which would need some internal mechanism to tie that | |||
| to the UA. | to the UA. | |||
| 4. Command and Control | 4.2.2. Static Messages | |||
| For simplicity, a class of UAS information is called here "Static", | ||||
| though in practice any of it can change during the operation, but | ||||
| will change infrequently. This information is the contents of the | ||||
| B-RID Self-ID (Msg Type 0x3), Operator ID (Msg Type 0x5), and System | ||||
| Messages (Msg Type 0x4). This information can simply be sent in the | ||||
| same format as the B-RID messages. Alternatively the individual data | ||||
| elements may be send as separate CBOR objects. | ||||
| The Basic ID (Msg Type 0x0) Message may be included as a static | ||||
| message if this information was not used for the secure setup. There | ||||
| may be more than one Basic ID Message needed if as in the case where | ||||
| the Japan Civil Aviation Bureau (JCAB) has mandated that the CAA | ||||
| assigned ID (UA ID type 2) and Serial Number (UA ID type 1) be | ||||
| broadcasted. | ||||
| The information in the System Message is most likely to change during | ||||
| an operation. Noteably the Operator Location data elements are | ||||
| subject to change if the GCS is physically moving (e.g. hand-held | ||||
| and the operator is walking or driving in a car). The whole System | ||||
| Message may be sent, or only the changing data elements as CBOR | ||||
| objects. | ||||
| These static message elements may be sent before the operation | ||||
| begins, thus their transmission can use a high capacity connection | ||||
| like WiFi. Once the operation is underway, any updates will have to | ||||
| traverse the operational link which may be very constrained and this | ||||
| will impact data element formatting. | ||||
| The Net-RID SP MUST acknowledge these messages. The UAS MUST receive | ||||
| these ACKs. If no ACK is received, the UAS MUST resent the | ||||
| message(s). This send/ACK sequence continues either until ACK is | ||||
| received, or some policy number of tries. If this fails, the UAS | ||||
| MUST act that the Net-RID SP connection is lost and MUST take the | ||||
| policy set response to loss of Net-RID SP connectivity. If the | ||||
| information changes during this cycle, the latest information MUST | ||||
| always be sent. | ||||
| 4.2.3. Vector/Location Message | ||||
| Many CAAs mandate that the UA Vector/Location information be updated | ||||
| at least once per second. Without careful message design, this | ||||
| messaging volume would overwhelm many wireless technologies. Thus to | ||||
| enable the widest deployment choices, a highly compressed format is | ||||
| recommended. | ||||
| The B-RID Vector/Location Message (Msg Type 0x1) is the simplest | ||||
| small object (24 bytes) for sending this information as a single CBOR | ||||
| object. It may be possible to send only those data elements that | ||||
| changed in the last time interval. This may result in smaller | ||||
| individual transmissions, but should not be used if the resulting | ||||
| message is larger than the Vector/Location Message. | ||||
| 4.3. CoAP N-RID messages | ||||
| TBD | ||||
| 5. Command and Control | ||||
| The Command and Control (C2) connection is between the UA and GCS. | The Command and Control (C2) connection is between the UA and GCS. | |||
| This is often this over a direct link radio. Some times, | This is often this over a direct link radio. Some times, | |||
| particularly for BLOS, it is via Internet connections. In either | particularly for BLOS, it is via Internet connections. In either | |||
| case C2 SHOULD be secure from eavesdropping and tampering. For | case C2 SHOULD be secure from eavesdropping and tampering. For | |||
| design and implementation consistency it is best to treat the direct | design and implementation consistency it is best to treat the direct | |||
| link as a local link Internet connection and use constrained | link as a local link Internet connection and use constrained | |||
| networking compression standards. | networking compression standards. | |||
| Both the UA and GCS need to be treated as fully mobile in the IP | Both the UA and GCS need to be treated as fully mobile in the IP | |||
| networking sense. Either one can have its IP address change and both | networking sense. Either one can have its IP address change and both | |||
| could change at the same time (the double jump problem). It is | could change at the same time (the double jump problem). It is | |||
| preferable to use a peer-to-peer (P2P) secure technology like HIPv2 | preferable to use a peer-to-peer (P2P) secure technology like HIPv2 | |||
| [RFC7401]. | [RFC7401]. | |||
| Finally UA may also tend to have multiple radios for their C2 | Finally UA may also tend to have multiple radios for their C2 | |||
| communications. Thus multi-homing with "make before break" behavior | communications. Thus multi-homing with "make before break" behavior | |||
| is needed. This is on top of any IP address changes on any of the | is needed. This is on top of any IP address changes on any of the | |||
| interfaces while in use. | interfaces while in use. | |||
| 4.1. Securing MAVLink | 5.1. Securing MAVLink | |||
| MAVLink [MAVLINK] is a commonly used protocol for C2. Message | MAVLink [MAVLINK] is a commonly used protocol for C2. Message | |||
| authenticity was added in MAVLink 2 in the form of a SHA-256 (secret | authenticity was added in MAVLink 2 in the form of a SHA-256 (secret | |||
| + message hash) left-truncated to 6 byte. This does not follow HMAC | + message hash) left-truncated to 6 byte. This does not follow HMAC | |||
| [RFC2104] security recommendations, nor provides confidentiality. | [RFC2104] security recommendations, nor provides confidentiality. | |||
| By following the security approach here, UAS C2 is superior to that | By following the security approach here, UAS C2 is superior to that | |||
| currently provided within MAVlink. | currently provided within MAVlink. | |||
| 5. Secure Transports | ||||
| The raw N-RID and C2 messages will be wrapped in UDP. These UDP | ||||
| packets will either be transported in ESP for the HIPv2 approach or | ||||
| DTLS application messages for DTLS. In both cases header compression | ||||
| technologies SHOULD be used and negotiated based on policy. | ||||
| For IPv6 over both WiFi and Bluetooth (or any other radio link), | ||||
| Robust Header Compression (ROHC) [RFC5795] and/or Generic Header | ||||
| Compression (6LoWAN-HGC) [RFC7400] can significantly reduce the per | ||||
| packet transmission cost of IPv6. For Bluetooth, there is also IPv6 | ||||
| over Bluetooth LE [RFC7668] for more guidance. | ||||
| Local link (direct radio) C2 security is possible with the link's MAC | ||||
| layer security. Both WiFi and Bluetooth link security can provide | ||||
| appropriate security, but this would not provide trustworthy multi- | ||||
| homed security. | ||||
| 5.1. HIPv2 for Secure Transport | ||||
| HIP has already been used for C2 mobility, managing the ongoing | ||||
| connectivity over WiFi at start of an operation, switching to LTE | ||||
| once out of WiFi range, and returning to WiFi connectivity at the end | ||||
| of the operation. This functionality is especially important for | ||||
| BLOS. HHITs are already defined for RID, and need only be added to | ||||
| the GCS via a GCS Registration as part of the UAS to USS registration | ||||
| to be usedfor C2 HIP. | ||||
| When the UA is the UAS endpoint for N-RID, and particularly when HIP | ||||
| is used for C2, HIP for N-RID simplifies protocol use on the UA. The | ||||
| Net-RID SP endpoint may already support HIP if it is also the HHIT | ||||
| Registrar. If the UA lacks any IP ability and the RID HHIT | ||||
| registration was done via the GCS or Operator device, then they may | ||||
| also be set for using HIP for N-RID. | ||||
| Further, double jump and multi-homing support is mandatory for C2 | ||||
| mobility. This is inherent in the HIP design. The HIP address | ||||
| update can be improved with [hip-fast-mobility]. | ||||
| 5.2. DTLS for Secure Transport | ||||
| DTLS is a good fit for N-RID for any of the possible UAS endpoints. | ||||
| There are challenges in using it for C2. To use DTLS for C2, the GCS | ||||
| will need to be the DTLS server. How does it 'push' commands to the | ||||
| UA? How does it reestablish DTLS security if state is lost? And | ||||
| finally, how is the double jump scenario handled? | ||||
| All the above DTLS for C2 probably have solutions. None of them are | ||||
| inherent in the DTLS design. | ||||
| 5.3. Ciphers for Secure Transport | ||||
| The cipher choice for either HIP or DTLS depends, in large measure, | ||||
| on the UAS endpoint. If the endpoint is computationally constrained, | ||||
| the cipher computations become important. If any of the links are | ||||
| constrained or expensive, then the over-the-wire cost needs to be | ||||
| minimized. AES-CCM and AES-GCM are the preferred, modern, AEAD | ||||
| ciphers. | ||||
| For ESP with HIP [RFC7402], an additional 4 - 8 bytes can be trimmed | ||||
| by using the Implicit IV for ESP option [RFC8750]. | ||||
| NIST is working on selecting a new lightweight cipher that may be the | ||||
| best choice for use on a UA. The Keccak Xoodyak cipher in | ||||
| [new-crypto] is a good "Green Cipher". | ||||
| 5.4. HIP and DTLS contrasted and compared | ||||
| This document specifies the use of DTLS 1.3 for its 0-RTT mobility | ||||
| feature and improved (over 1.2) handshake. DTLS 1.3 is still an IETF | ||||
| draft, so there is little data available to properly contrast it with | ||||
| HIPv2. This section will be based on the current DTLS 1.2. The | ||||
| basic client-server model is unchanged. | ||||
| The use of DTLS vs HIPv2 (both over UDP, HIP in IPsec ESP BEET mode) | ||||
| has pros and cons. DTLS is currently at version 1.2 and based on TLS | ||||
| 1.2. It is a more common protocol than HIP, with many different | ||||
| implementations available for various platforms and languages. | ||||
| DTLS implements a client-server model, where the client initiates the | ||||
| communication. In HIP, two parties are equal and either can be an | ||||
| Initiator or Responder of the Base Exchange. HIP provides separation | ||||
| between key management (base exchange) and secure transport (for | ||||
| example IPsec ESP BEET) while both parts are tightly coupled in DTLS. | ||||
| DTLS 1.2 still has quite chatty connection establishment taking 3-5 | ||||
| RTTs and 15 packets. HIP connection establishment requires 4 packets | ||||
| (I1,R1,I2,R2) over 2 RTTs. This is beneficial for constrained | ||||
| environments of UAs. HIPv2 supports cryptoagility with possibility | ||||
| to negotiate cryptography mechanisms during the Base Exchange. | ||||
| Both DTLS and HIP support mobility with a change of IP address. | ||||
| However, in DTLS only client mobility is well supported, while in HIP | ||||
| either party can be mobile. The double-jump problem (simultaneous | ||||
| mobility) is supported in HIP with a help of Rendezvous Server (RVS) | ||||
| [RFC8004]. HIP can implement secure mobility with IP source address | ||||
| validation in 2 RTTs, and in 1 RTT with fast mobility extension. | ||||
| One study comparing DTLS and IPsec-ESP performance concluded that | ||||
| DTLS is recommended for memory-constrained applications while IPSec- | ||||
| ESP for battery power-constrained [Vignesh]. | ||||
| 6. IANA Considerations | 6. IANA Considerations | |||
| TBD | TBD | |||
| 7. Security Considerations | 7. Security Considerations | |||
| Designing secure transports is challenging. Where possible, existing | Designing secure transports is challenging. Where possible, existing | |||
| technologies SHOULD be used. Both ESP and DTLS have stood "the test | technologies SHOULD be used. Both ESP and DTLS have stood "the test | |||
| of time" against many attack scenarios. Their use here for N-RID and | of time" against many attack scenarios. Their use here for N-RID and | |||
| C2 do not represent new uses, but rather variants on existing | C2 do not represent new uses, but rather variants on existing | |||
| skipping to change at page 9, line 20 ¶ | skipping to change at page 11, line 34 ¶ | |||
| 9. References | 9. References | |||
| 9.1. Normative References | 9.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained | ||||
| Application Protocol (CoAP)", RFC 7252, | ||||
| DOI 10.17487/RFC7252, June 2014, | ||||
| <https://www.rfc-editor.org/info/rfc7252>. | ||||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 9.2. Informative References | [RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object | |||
| Representation (CBOR)", STD 94, RFC 8949, | ||||
| DOI 10.17487/RFC8949, December 2020, | ||||
| <https://www.rfc-editor.org/info/rfc8949>. | ||||
| [drip-requirements] | 9.2. Informative References | |||
| Card, S. W., Wiethuechter, A., Moskowitz, R., and A. | ||||
| Gurtov, "Drone Remote Identification Protocol (DRIP) | ||||
| Requirements", Work in Progress, Internet-Draft, draft- | ||||
| ietf-drip-reqs-18, 8 September 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | ||||
| reqs-18>. | ||||
| [drip-uas-rid] | [drip-uas-rid] | |||
| Moskowitz, R., Card, S. W., Wiethuechter, A., and A. | Moskowitz, R., Card, S. W., Wiethuechter, A., and A. | |||
| Gurtov, "DRIP Entity Tag (DET) for Unmanned Aircraft | Gurtov, "DRIP Entity Tag (DET) for Unmanned Aircraft | |||
| System Remote Identification (UAS RID)", Work in Progress, | System Remote ID (UAS RID)", Work in Progress, Internet- | |||
| Internet-Draft, draft-ietf-drip-rid-11, 20 October 2021, | Draft, draft-ietf-drip-rid-22, 13 April 2022, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | |||
| rid-11>. | rid-22>. | |||
| [DTLS-1.3-draft] | [DTLS-1.3-draft] | |||
| Rescorla, E., Tschofenig, H., and N. Modadugu, "The | Rescorla, E., Tschofenig, H., and N. Modadugu, "The | |||
| Datagram Transport Layer Security (DTLS) Protocol Version | Datagram Transport Layer Security (DTLS) Protocol Version | |||
| 1.3", Work in Progress, Internet-Draft, draft-ietf-tls- | 1.3", Work in Progress, Internet-Draft, draft-ietf-tls- | |||
| dtls13-43, 30 April 2021, | dtls13-43, 30 April 2021, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-tls- | <https://datatracker.ietf.org/doc/html/draft-ietf-tls- | |||
| dtls13-43>. | dtls13-43>. | |||
| [F3411-19] ASTM International, "Standard Specification for Remote ID | [F3411-19] ASTM International, "Standard Specification for Remote ID | |||
| and Tracking", February 2020, | and Tracking", February 2020, | |||
| <http://www.astm.org/cgi-bin/resolver.cgi?F3411>. | <http://www.astm.org/cgi-bin/resolver.cgi?F3411>. | |||
| [hip-fast-mobility] | [hip-fast-mobility] | |||
| Moskowitz, R., Card, S. W., and A. Wiethuechter, "Fast HIP | Moskowitz, R., Card, S. W., and A. Wiethuechter, "Fast HIP | |||
| Host Mobility", Work in Progress, Internet-Draft, draft- | Host Mobility", Work in Progress, Internet-Draft, draft- | |||
| moskowitz-hip-fast-mobility-03, 3 April 2020, | moskowitz-hip-fast-mobility-03, 3 April 2020, | |||
| <https://datatracker.ietf.org/doc/html/draft-moskowitz- | <https://datatracker.ietf.org/doc/html/draft-moskowitz- | |||
| hip-fast-mobility-03>. | hip-fast-mobility-03>. | |||
| [lpwan-architecture] | ||||
| Pelov, A., Thubert, P., and A. Minaburo, "LPWAN Static | ||||
| Context Header Compression (SCHC) Architecture", Work in | ||||
| Progress, Internet-Draft, draft-ietf-lpwan-architecture- | ||||
| 01, 26 November 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-lpwan- | ||||
| architecture-01>. | ||||
| [MAVLINK] "Micro Air Vehicle Communication Protocol", 2021, | [MAVLINK] "Micro Air Vehicle Communication Protocol", 2021, | |||
| <http://mavlink.io/>. | <http://mavlink.io/>. | |||
| [new-crypto] | [new-hip-crypto] | |||
| Moskowitz, R., Card, S. W., and A. Wiethuechter, "New | Moskowitz, R., Card, S. W., and A. Wiethuechter, "New | |||
| Cryptographic Algorithms for HIP", Work in Progress, | Cryptographic Algorithms for HIP", Work in Progress, | |||
| Internet-Draft, draft-moskowitz-hip-new-crypto-10, 2 | Internet-Draft, draft-moskowitz-hip-new-crypto-10, 2 | |||
| August 2021, <https://datatracker.ietf.org/doc/html/draft- | August 2021, <https://datatracker.ietf.org/doc/html/draft- | |||
| moskowitz-hip-new-crypto-10>. | moskowitz-hip-new-crypto-10>. | |||
| [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | |||
| Hashing for Message Authentication", RFC 2104, | Hashing for Message Authentication", RFC 2104, | |||
| DOI 10.17487/RFC2104, February 1997, | DOI 10.17487/RFC2104, February 1997, | |||
| <https://www.rfc-editor.org/info/rfc2104>. | <https://www.rfc-editor.org/info/rfc2104>. | |||
| [RFC5795] Sandlund, K., Pelletier, G., and L-E. Jonsson, "The RObust | ||||
| Header Compression (ROHC) Framework", RFC 5795, | ||||
| DOI 10.17487/RFC5795, March 2010, | ||||
| <https://www.rfc-editor.org/info/rfc5795>. | ||||
| [RFC7400] Bormann, C., "6LoWPAN-GHC: Generic Header Compression for | ||||
| IPv6 over Low-Power Wireless Personal Area Networks | ||||
| (6LoWPANs)", RFC 7400, DOI 10.17487/RFC7400, November | ||||
| 2014, <https://www.rfc-editor.org/info/rfc7400>. | ||||
| [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T. | [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T. | |||
| Henderson, "Host Identity Protocol Version 2 (HIPv2)", | Henderson, "Host Identity Protocol Version 2 (HIPv2)", | |||
| RFC 7401, DOI 10.17487/RFC7401, April 2015, | RFC 7401, DOI 10.17487/RFC7401, April 2015, | |||
| <https://www.rfc-editor.org/info/rfc7401>. | <https://www.rfc-editor.org/info/rfc7401>. | |||
| [RFC7402] Jokela, P., Moskowitz, R., and J. Melen, "Using the | [RFC7402] Jokela, P., Moskowitz, R., and J. Melen, "Using the | |||
| Encapsulating Security Payload (ESP) Transport Format with | Encapsulating Security Payload (ESP) Transport Format with | |||
| the Host Identity Protocol (HIP)", RFC 7402, | the Host Identity Protocol (HIP)", RFC 7402, | |||
| DOI 10.17487/RFC7402, April 2015, | DOI 10.17487/RFC7402, April 2015, | |||
| <https://www.rfc-editor.org/info/rfc7402>. | <https://www.rfc-editor.org/info/rfc7402>. | |||
| [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., | |||
| Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low | Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low | |||
| Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, | Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, | |||
| <https://www.rfc-editor.org/info/rfc7668>. | <https://www.rfc-editor.org/info/rfc7668>. | |||
| [RFC8004] Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | [RFC8004] Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | |||
| Rendezvous Extension", RFC 8004, DOI 10.17487/RFC8004, | Rendezvous Extension", RFC 8004, DOI 10.17487/RFC8004, | |||
| October 2016, <https://www.rfc-editor.org/info/rfc8004>. | October 2016, <https://www.rfc-editor.org/info/rfc8004>. | |||
| [RFC8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC. | ||||
| Zuniga, "SCHC: Generic Framework for Static Context Header | ||||
| Compression and Fragmentation", RFC 8724, | ||||
| DOI 10.17487/RFC8724, April 2020, | ||||
| <https://www.rfc-editor.org/info/rfc8724>. | ||||
| [RFC8750] Migault, D., Guggemos, T., and Y. Nir, "Implicit | [RFC8750] Migault, D., Guggemos, T., and Y. Nir, "Implicit | |||
| Initialization Vector (IV) for Counter-Based Ciphers in | Initialization Vector (IV) for Counter-Based Ciphers in | |||
| Encapsulating Security Payload (ESP)", RFC 8750, | Encapsulating Security Payload (ESP)", RFC 8750, | |||
| DOI 10.17487/RFC8750, March 2020, | DOI 10.17487/RFC8750, March 2020, | |||
| <https://www.rfc-editor.org/info/rfc8750>. | <https://www.rfc-editor.org/info/rfc8750>. | |||
| [RFC8824] Minaburo, A., Toutain, L., and R. Andreasen, "Static | ||||
| Context Header Compression (SCHC) for the Constrained | ||||
| Application Protocol (CoAP)", RFC 8824, | ||||
| DOI 10.17487/RFC8824, June 2021, | ||||
| <https://www.rfc-editor.org/info/rfc8824>. | ||||
| [RFC9011] Gimenez, O., Ed. and I. Petrov, Ed., "Static Context | ||||
| Header Compression and Fragmentation (SCHC) over LoRaWAN", | ||||
| RFC 9011, DOI 10.17487/RFC9011, April 2021, | ||||
| <https://www.rfc-editor.org/info/rfc9011>. | ||||
| [RFC9153] Card, S., Ed., Wiethuechter, A., Moskowitz, R., and A. | ||||
| Gurtov, "Drone Remote Identification Protocol (DRIP) | ||||
| Requirements and Terminology", RFC 9153, | ||||
| DOI 10.17487/RFC9153, February 2022, | ||||
| <https://www.rfc-editor.org/info/rfc9153>. | ||||
| [Vignesh] Vignesh, K., "Performance analysis of end-to-end DTLS and | [Vignesh] Vignesh, K., "Performance analysis of end-to-end DTLS and | |||
| IPsec-based communication in IoT environments", Thesis | IPsec-based communication in IoT environments", Thesis | |||
| no. MSEE-2017: 42, 2017, <http://www.diva- | no. MSEE-2017: 42, 2017, <http://www.diva- | |||
| portal.org/smash/get/diva2:1157047/FULLTEXT02>. | portal.org/smash/get/diva2:1157047/FULLTEXT02>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Robert Moskowitz | Robert Moskowitz | |||
| HTT Consulting | HTT Consulting | |||
| Oak Park, MI 48237 | Oak Park, MI 48237 | |||
| End of changes. 36 change blocks. | ||||
| 182 lines changed or deleted | 321 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||