<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-moskowitz-drip-crowd-sourced-rid-07" category="std" consensus="true" submissionType="IETF" xml:lang="en" obsoletes="" updates="" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao" fullname="Shuai Zhao">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd</street>
          <city>Santa Clara</city>
          <region>CA</region>
          <code>95054</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date year="2022" month="May" day="01"/>

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes using the ASTM Broadcast Remote ID (B-RID)
specification in a "crowd sourced" smart phone environment to
provide much of the ASTM and FAA envisioned Network Remote ID (N-RID)
functionality.  This crowd sourced B-RID (CS-RID) data will use
multilateration to add a level of reliability in the location data
on the Unmanned Aircraft (UA).  The crowd sourced environment will
also provide a monitoring coverage map to authorized observers.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a mechanism to capture the ASTM Broadcast
Remote ID messages (B-RID) <xref target="F3411-19"/> on any
Internet connected device that receives
them and can forward them to the SDSP(s) (Supplemental Data Service Provider) responsible for the geographic area the UA and receivers are in.  This will create a ecosystem that will meet most if not all data collection requirements that CAAs (Civil Aviation Authority) are placing on Network Remote ID (N-RID).</t>

<t>These Internet connected devices are herein called "Finders", as
they find UAs by listening for B-RID messages.  The Finders are
B-RID forwarding proxies. Their potentially limited spacial view of RID messages could result in bad decisions on what messages to send to the SDSP and which to drop.  Thus they will send all received messages and the SDSP will make any filtering decisions in what it forwards into the UTM (UAS Traffic Management).</t>

<t>Finders can be smartphones, tablets, connected cars, or any
computing platform with Internet connectivity that can meet the
requirements defined in this document.  It is not expected, nor
necessary, that Finders have any information about a UAS beyond the
content in the B-RID messages.</t>

<t>Finders MAY only need a loose association with the SDSP(s).  They
may only have the SDSP's Public Key and FQDN.  It would use these,
along with the Finder's Public Key to use ECIES (Elliptic Curve Integrated Encryption Scheme), or other security methods, to send the messages in a secure manner to the SDSP.  The SDSP MAY require a stronger relationship to the Finders.  This may range from the Finder's Public Key being registered to the SDSP with other information so that the SDSP has some level of trust in
the Finders to requiring transmissions be sent over long-lived
transport connections like ESP or DTLS.</t>

<t>If a 1-way only secure packet forwarding method is used (e.g., not a TCP connection), the Finder SHOULD receive periodic "heartbeats" from the SDSP to inform it that its transmissions are being received.  The SDSP sets the rules on when to send these heartbeats as discuss below in <xref target="sdsp_heartbeats"/>.</t>

<section anchor="role-of-supplemental-data-service-provider-sdsp"><name>Role of Supplemental Data Service Provider (SDSP)</name>

<t>This document has minimal information about the actions of SDSPs.
In general the SDSP is out of scope of this document. That said,
the SDSPs should not simply proxy B-RID messages to the UTM(s).
They should perform some minimal level of filtering and content
checking before forwarding those messages that pass these tests in
a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based
on location of active Finders.  UTMs may use this information to
notify authorized observers of where there is and there is not
monitoring coverage.  They may also use this information of where
to place pro-active monitoring coverage.</t>

<t>An SDSP SHOULD only forward Authenticated B-RID messages like those
defined in <xref target="drip-authentication"/> to the UTM(s).  Further, the SDSP SHOULD
validate the Remote ID (RID) and the Authentication signature
before forwarding anything from the UA.  The SDSP MAY forward all B-RID
messages to the UTM, leaving all decision making on B-RID messages
veracity to the UTM.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA,
the SDSP is in a unique position to perform multilateration on
these messages and compute the Finder's view of the UA location to
compare with the UA Location/Vector messages.  This check against
the UA's location claims is both a validation on the UA's
reliability as well as the trustworthiness of the Finders.  Other
than providing data to allow for multilateration, this SDSP feature
is out of scope of this document.  This function is limited by the
location accuracy for both the Finders and UA.</t>

</section>
<section anchor="draft-status"><name>Draft Status</name>

<t>This draft is still incomplete.  New features are being added as
capabilities are researched.  The actual message formats also still
need work.</t>

</section>
</section>
<section anchor="terms"><name>Terms and Definitions</name>

<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="definitions"><name>Definitions</name>

<dl newline="true">
  <dt>B-RID:</dt>
  <dd>
    <t>Broadcast Remote ID. A method of sending RID messages as
1-way transmissions from the UA to any Observers within
radio range.</t>
  </dd>
  <dt>CAA:</dt>
  <dd>
    <t>Civil Aeronautics Administration. An example is the Federal
Aviation Administration (FAA) in the United States of
America.</t>
  </dd>
  <dt>DAA:</dt>
  <dd>
    <t>Detect and Avoid. The process of a UA detecting obstacles,
like other UAs and taking the necessary evasive action.</t>
  </dd>
  <dt>ECIES:</dt>
  <dd>
    <t>Elliptic Curve Integrated Encryption Scheme.  A hybrid
encryption scheme which provides semantic security against
an adversary who is allowed to use chosen-plaintext and
chosen-ciphertext attacks.</t>
  </dd>
  <dt>GCS:</dt>
  <dd>
    <t>Ground Control Station. The part of the UAS that the remote
pilot uses to exercise C2 over the UA, whether by remotely
exercising UA flight controls to fly the UA, by setting GPS
waypoints, or otherwise directing its flight.</t>
  </dd>
  <dt>Finder:</dt>
  <dd>
    <t>In Internet connected device that can receive B-RID
messages and forward them to a UTM.</t>
  </dd>
  <dt>Observer:</dt>
  <dd>
    <t>Referred to in other UAS documents as a "user", but there
are also other classes of RID users, so we prefer
"observer" to denote an individual who has observed an UA
and wishes to know something about it, starting with its
RID.</t>
  </dd>
  <dt>Multilateration:</dt>
  <dd>
    <t>Multilateration (more completely, pseudo range
multilateration) is a navigation and surveillance technique
based on measurement of the times of arrival (TOAs) of
energy waves (radio, acoustic, seismic, etc.) having a
known propagation speed.</t>
  </dd>
  <dt>NETSP:</dt>
  <dd>
    <t>Network RID Service Provider. USS receiving Network RID
messages from UAS (UA or GCS), storing for a short
specified time, making available to NETDP.</t>
  </dd>
  <dt>NETDP:</dt>
  <dd>
    <t>Network RID Display Provider. Entity (might be USS)
aggregating data from multiple NETSPs to answer query from
observer (or other party) desiring Situational Awareness of
UAS operating in a specific airspace volume.</t>
  </dd>
  <dt>N-RID:</dt>
  <dd>
    <t>Network Remote ID. A method of sending RID messages via the
Internet connection of the UAS directly to the UTM.</t>
  </dd>
  <dt>RID:</dt>
  <dd>
    <t>Remote ID. A unique identifier found on all UA to be used
in communication and in regulation of UA operation.</t>
  </dd>
  <dt>SDSP:</dt>
  <dd>
    <t>Supplemental Data Service Provider. Entity providing
information that is allowed, but not required to be present
in the UTM system.</t>
  </dd>
  <dt>UA:</dt>
  <dd>
    <t>Unmanned Aircraft. In this document UA's are typically
though of as drones of commercial or military variety. This
is a very strict definition which can be relaxed to include
any and all aircraft that are unmanned.</t>
  </dd>
  <dt>UAS:</dt>
  <dd>
    <t>Unmanned Aircraft System. Composed of Unmanned Aircraft and
all required on-board subsystems, payload, control station,
other required off-board subsystems, any required launch
and recovery equipment, all required crew members, and C2
links between UA and the control station.</t>
  </dd>
  <dt>UTM:</dt>
  <dd>
    <t>UAS Traffic Management. A "traffic management" ecosystem
for uncontrolled operations that is separate from, but
complementary to, the FAA's Air Traffic Management (ATM)
system.</t>
  </dd>
  <dt>USS:</dt>
  <dd>
    <t>UAS Service Supplier. Provide UTM services to support the
UAS community, to connect Operators and other entities to
enable information flow across the USS network, and to
promote shared situational awareness among UTM
participants. (From FAA UTM ConOps V1, May 2018).</t>
  </dd>
</dl>

</section>
</section>
<section anchor="prob-space"><name>Problem Space</name>

<section anchor="meeting-the-needs-of-network-remote-id"><name>Meeting the needs of Network Remote ID</name>

<t>The USA Federal Aviation Authority (FAA), in the January 2021 Remote ID Final rule <xref target="FAA-FR"/>, postponed Network Remote ID (N-RID) and focused on Broadcast Remote ID.  This was in response to the UAS vendors comments that N-RID places considerable demands on then currently used UAS.</t>

<t>However, N-RID, or equivalent, is necessary for UTM and knowing what soon may be in an airspace.  A method that proxies B-RID into UTM can function as an interim approach to N-RID and continue as a adjunct to N-RID.</t>

</section>
<section anchor="advantages-of-broadcast-remote-id"><name>Advantages of Broadcast Remote ID</name>

<t>B-RID has its advantages over N-RID.</t>

<t><list style="symbols">
  <t>B-RID can more readily be implemented directly in the UA.
N-RID will more frequently be provided by the GCS or a
pilot's Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over
a direct radio connection, B-RID could be a
straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide B-RID.</t>
    </list></t>
  <t>B-RID can also be used by the UA to assist in Detect and
Avoid (DAA).</t>
  <t>B-RID is available to observers even in situations with no
Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="trustworthiness-of-proxied-data"><name>Trustworthiness of Proxied Data</name>

<t>When a proxy is introduced in any communication protocol, there is
a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for B-RID, are authenticated
to the SDSP (see <xref target="Finder_Sec"/>). The
SDSP can compare the information from multiple Finders to isolate a
Finder sending fraudulent information.  SDSPs can additionally
verify authenticated messages that follow <xref target="drip-authentication"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see
<xref target="Finder_Manage"/>) to limit DOS attacks
from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages"><name>Defense against fraudulent RID Messages</name>

<t>The strongest defense against fraudulent RID messages is to focus
on <xref target="drip-authentication"/> conforming messages.  Unless this behavior is
mandated, SPDPs will have to use assorted algorithms to isolate
messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec"><name>The Finder - SDSP Security Relationship</name>

<t>The SDSP(s) and Finders SHOULD use EDDSA <xref target="RFC8032"/> keys as their
trusted Identities. The public keys SHOULD be registered Hierarchical HITS,
<xref target="I-D.ietf-drip-rid"/> and <xref target="I-D.ietf-drip-registries"/>.  Other similar methods may be used.</t>

<t>During this registration, the Finder gets the SDSP's EdDSA Public Key.  These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t>The SDSP uses some process (out of scope here) to register the
Finders and their EDDSA Public Key.  During this registration, the
Finder gets the SDSP's EDDSA Public Key.  These Public Keys allow
for the following options for authenticated messaging from the
Finder to the SDSP.</t>

<t><list style="numbers">
  <t>ECIES can be used with a unique nonce to authenticate each
  message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to
  establish a shared secret that is then used to authenticate
  each message sent from a Finder to the SDSP sent during
  that period.</t>
  <t>HIP <xref target="RFC7401"/> can be used to
  establish a session secret that is then used with ESP <xref target="RFC4303"/>
  to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/>  can be used to establish
  a secure connection that is then used to authenticate each
  message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="sdsp_heartbeats"><name>SDSP Heartbeats</name>

<t>If a 1-way messaging approach is used (e.g. not TCP-based), the SDSP SHOULD send a heartbeat at some periodicity to the Finders so that they get confirmation that their is a receiver of their transmissions.</t>

<t>A simple (see <xref target="sdsp_heartbeat_cddl"/>) message that identifies the SDSP is sent to the Finder per some published }policy of the SDSP.  For example, at the first reception by the SDSP for the day, then the 1st for the hour.  It is NOT recommended for the SDSP to send a heartbeat for every message received, as this is a potential DOS attack against the SDSP.</t>

</section>
<section anchor="Finder_Map"><name>The Finder Map</name>

<t>The Finders are regularly providing their SDSP with their location.
This is through the B-RID Proxy Messages and Finder Location Update
Messages.  With this information, the SDSP can maintain a
monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage"><name>Managing Finders</name>

<t>Finder density will vary over time and space.  For example,
sidewalks outside an urban train station can be packed with
pedestrians at rush hour, either coming or going to their commute
trains.  An SDSP may want to proactively limit the number of active
Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to
NOT proxy B-RID messages.  These Finders will continue to report
their location and through that reporting, the SDSP can instruct
them to again take on the proxying role.  For example a Finder
moving slowly along with dozens of other slow-moving Finders may be
instructed to suspend proxying.  Whereas a fast-moving Finder at
the same location (perhaps a connected car or a pedestrian on a
bus) would not be asked to suspend proxying as it will soon be out
of the congested area.</t>

</section>
</section>
<section anchor="multilat"><name>UA location via multilateration</name>

<t>The SDSP can confirm/correct the UA location provided in the 
Location/Vector message by using multilateration on data provided by
at least 3 Finders that reported a specific Location/Vector message 
(Note that 4 Finders are needed to get altitude sign correctly).  In 
fact, the SDSP can calculate the UA location from 3 observations of any
B-RID message.  This is of particular value if the UA is only within
reception range of the Finders for messages other than the 
Location/Vector message.</t>

<t>This feature is of particular value when the Finders are fixed assets
around a high value site like an airport or large public venue.</t>

<section anchor="gps-inaccuracy"><name>GPS Inaccuracy</name>

<t>Single-band, consumer grade, GPS on small platforms is not accurate, 
particularly for altitude.  Longitude/latitude measurements can easily 
be off by 3M based on satellite postion and clock accuracy.  Altitude 
accuracy is reported in product spec sheets and actual tests to be 3x 
less accurate. Altitude accuracy is hindered by ionosphere activity. In 
fact, there are studies of ionospheric events (e.g. 2015 St. Patrick's 
day <xref target="gps-ionosphere"/>) as measured by GPS devices at known locations.<br />
Thus where a UA reports it is rarely accurate, but may be accurate 
enough to map to visual sightings of single UA.</t>

<t>Smartphones and particulary smartwatches are plagued with the same
challenge, though some of these can combine other information like
cell tower data to improve location accuracy.  FCC E911 accuracy, by
FCC rules is NOT available to non-E911 applications due to privacy
concerns, but general higher accuracy is found on some smart devices
than reported for consumer UA.  The SDSP MAY have information on the
Finder location accuracy that it can use in calculating the accuracy of
a multilaterated location value.  When the Finders are fixed assets, the
SDSP may have very high trust in their location for trusting the
multilateration calculation over the UA reported location.</t>

</section>
</section>
<section anchor="CSRID_messages"><name>The CS-RID Messages</name>

<t>The CS-RID messages between the Finders and the SDSPs primarily
support the proxy role of the Finders in forwarding the B-RID
messages.  There are also Finder registration and status messages.</t>

<t>CS-RID information is represented in CBOR <xref target="RFC7049"/>.
The CDDL <xref target="RFC8610"/> specification is used for CS-RID message description.</t>

<!-- CS-RID MAC and COAP {{RFC7252}} for the CS-RID protocol. -->

<t>The following is a general representation of the content in the
CS-RID messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID MESSAGE CONTENT,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The CS-RID MESSAGE CONTENT varies by MESSAGE TYPE.</t>

<section anchor="CS-RID_MESSAGE_TYPE"><name>CS-RID MESSAGE TYPE</name>

<t>The CS-RID MESSAGE TYPE is defined in <xref target="csrid-message"/>:</t>

<figure anchor="csrid-message"><artwork><![CDATA[
  Number   CS-RID Message Type
  ------   -----------------
  0        Reserved
  1        B-RID Forwarding
  2        Finder Registration
  3        SDSP Response
  4        Finder Location
  5        SDSP Heartbeat
]]></artwork></figure>

<section anchor="cddl-description-for-cs-rid-message-type"><name>CDDL description for CS-RID message type</name>

<t>The overall CS-RID CDDL description is structured in <xref target="csrid-object"/>.</t>

<figure anchor="csrid-object"><artwork><![CDATA[
CSRID_Object = {
  application-context,
  info                => info_message,
  proxy_message       => broadcast_rid_proxy_message,
  finder_registration => finder_registration_message,
  sdsp_response       => sdsp_response_message,
  location_update     => location_update_message,
}

info_message = {
  common_message_members,
  message_content => tstr,
}

common_message_members = (
  message_type  => message_types,
  mac_address   => #6.37(bstr),
)

message_types = &(
  Reserved            : 0,
  BRD                 : 1,
  Finder-Registration : 2,
  SDSP-Response       : 3,
  Finder-Location     : 4,
)
]]></artwork></figure>

<t>The application context rule is defined in <xref target="csrid-app-context"/> for
CS-RID application identification and version negotiation.</t>

<figure anchor="csrid-app-context"><artwork><![CDATA[
application-context = (
  application => "DRIP-CSRID",
  ? version => uint .size(1..2),
)
]]></artwork></figure>

<t>The predefined CDDL text string labels (author note: for JSON currently, will move to CBOR uint keys in upcoming versions) used in the specification is listed in <xref target="csrid-variables"/>.</t>

<figure anchor="csrid-variables"><artwork><![CDATA[
application           = "application"
version               = "version"
info                  = "message_info"
proxy_message         = "proxy_message-type"
finder_registration   = "finder_registration"
sdsp_response         = "sdsp_response"
location_update       = "location_update"
rid                   = "id"
message_type          = "message_type"
mac_address           = "mac_address"
message_content       = "message_content"
timestamp             = "timestamp"
gps                   = "gps"
radio_type            = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message     = "broadcast_message"
sdsp_id               = "sdsp_id"
proxy_status_type     = "proxy_status_type"
update_interval       = "update_interval"
]]></artwork></figure>

</section>
</section>
<section anchor="CSRID_proxy"><name>The CS-RID B-RID Proxy Message</name>

<t>The Finders add their own information to the B-RID messages,
permitting the SDSP(s) to gain additional knowledge about the
UA(s).  The RID information is the B-RID message content plus the
MAC address.  The MAC address is critical, as it is the only
field that links a UA's B-RID messages together.  Only the ASTM
Basic ID Message and possibly the Authentication Message contain
the UAS ID field.</t>

<t>The Finders add an SDSP assigned ID, a 64 bit timestamp, GPS
information, and type of B-RID media to the B-RID message.  Both
the timestamp and GPS information are for when the B-RID
message(s) were received, not forwarded to the SDSP.  All this
content is MACed using a key shared between the Finder and SDSP.</t>

<t>The following is a representation of the content in the CS-RID
messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    RECEIVE TIMESTAMP,
    RECEIVE GPS,
    RECEIVE RADIO TYPE,
    B-RID MAC ADDRESS,
    B-RID MESSAGE,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="CS-RID_ID"><name>CS-RID ID</name>

<t>The CS-RID ID is the ID recognized by the SDSP.  This may be an
HHIT <xref target="hierarchical-hit">Hierarchical HITs</xref>, or any ID used by the SDSP.</t>

</section>
<section anchor="cddl-description-for-cs-rid-b-rid-proxy-message"><name>CDDL description for CS-RID B-RID Proxy Message</name>

<t>The broadcast CS-RID proxy CDDL is defined in <xref target="csrid-brid-proxy"/></t>

<figure anchor="csrid-brid-proxy"><artwork><![CDATA[
broadcast_rid_proxy_message = {
  common_message_members,
  rid                   => tstr,
  timestamp             => tdate,
  gps                   => gps-coordinates,
  radio_type            => radio_types,
  broadcast_mac_address => #6.37(bstr),
  broadcast_message     => #6.37(bstr),
}

radio_types = &(
  EFL : 0,
  VLF : 1,
  LF  : 2,
  MF  : 3,
  HF  : 4,
  HF  : 5,
  VHF : 6,
  UHF : 7,
  SHF : 8,
  EHF : 9,
)

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Reg"><name>CS-RID Finder Registration</name>

<t>The CS-RID Finder MAY use <xref target="RFC7401"/>(#RFC7401) with
the SDSP to establish a Security Association and a shared secret to
use for the CS-RID MAC generation.  In this approach, the HIP
mobility functionality and <xref target="RFC4303"/><xref target="RFC4303"/> support are not used.</t>

<t>When HIP is used as above, the Finder Registration is a SDSP
"wake up".  It is sent prior to the Finder sending any proxied
B-RID messages to ensure that the SDSP is able to receive and
process the messages.</t>

<t>In this usage, the CS-RID ID is the Finder HIT.  If the SDSP has lost
state with the Finder, it initiates the HIP exchange with the
Finder to reestablish HIP state and a new shared secret for the
CS-RID B-RID Proxy Messages.  In this case the Finder Registration
Message is:</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-finder-registration"><name>CDDL description for Finder Registration</name>
<t>The CDDL for CS-RID Finder Registration is defined in <xref target="csrid-finder-registration"/></t>

<figure anchor="csrid-finder-registration"><artwork><![CDATA[
finder_registration_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="SDSP_Reg_R"><name>CS-RID SDSP Response</name>

<t>The SDSP MAY respond to any Finder messages to instruct the Finder on its
behavior.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID ID,
    CS-RID PROXY STATUS,
    CS-RID UPDATE INTERVAL,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The Proxy Status instructs the Finder if it should actively proxy
B-RID messages, or suspend proxying and only report its location.</t>

<t>The Update Interval is the frequency that the Finder SHOULD notify
the SDSP of its current location using the Location Update message.</t>

<section anchor="cddl-description-for-sdsp-response"><name>CDDL description for SDSP Response</name>

<t>The CDDL for CS-RID SDSP response is defined in <xref target="csrid-sdsp-response"/></t>

<figure anchor="csrid-sdsp-response"><artwork><![CDATA[
sdsp_response_message = {
  common_message_members,
  sdsp_id           => tstr,
  rid               => tstr,
  proxy_status_type => proxy_status_types,
  update_interval   => uint,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]

proxy_status_types = &(
  0: "forward",
  1: "reverse",
  2: "bi-directional",
)
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Upd"><name>CS-RID Location Update</name>

<t>The Finder SHOULD provide regular location updates to the SDSP. The
interval is based on the Update Interval from <xref target="SDSP_Reg_R"/> plus a random slew less than
1 second.  The Location Update message is only sent when no other
CS-RID messages, containing the Finder's GPS location, have been
sent since the Update Interval.</t>

<t>If the Finder has not recieved a SDSP Registration Response, a
default of 5 minutes is used for the Update Interval.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-location-update"><name>CDDL description for Location Update</name>

<t>The CDDL for CS-RID Location update is defined in <xref target="csrid-location-update"/></t>

<figure anchor="csrid-location-update"><artwork><![CDATA[
location_update_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="sdsp_heartbeat_cddl"><name>SDSP Heartbeat</name>

<t>TBD</t>

</section>
</section>
<section anchor="the-full-cs-rid-cddl-specification"><name>The Full CS-RID CDDL specification</name>

<figure><sourcecode type="CDDL"><![CDATA[
<CODE BEGINS>
; CDDL specification for Crowd source RID
; It specifies a collection of CS message types
;

;
; The CSRID overall data structure

CSRID_Object = {
    application-context,
    info =>  info_message,
    proxy_message => broadcast_rid_proxy_message,
    finder_registration => finder_registration_message,
    sdsp_response => sdsp_response_message,
    location_update => location_update_message,
}

;
; Application context: general information about CSRID message 

application-context = (
    application => "DRIP-CSRID", ; TBD: consider CBOR tag 
    ? version => uint .size(1..2),
)

; These members are include in every message
common_message_members = (
    message_type => message_types,
    mac_address => #6.37(bstr),
)

;
; CSRID message general information

info_message = {
    common_message_members,
    message_content => tstr,
}

broadcast_rid_proxy_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
    radio_type => radio_types,
    broadcast_mac_address => #6.37(bstr)
    broadcast_message => #6.37(bstr)
}

finder_registration_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

sdsp_response_message = {
    common_message_members,
    sdsp_id => tstr,
    rid => tstr,
    proxy_status_type => proxy_status_types,
    update_interval => uint,
}

location_update_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

;
; Common rule definition

message_types = &(
    Reserved            : 0,
    BRD                 : 1,
    Finder-Registration : 2,
    SDSP-Response       : 3,
    Finder-Location     : 4,
)

gps-coordinates = [
    lat: float,
    long: float,
]

; Radio types, choose from one of radio_types (required)
radio_types = &(
    EFL : 0,
    VLF : 1,
    LF  : 2,
    MF  : 3,
    HF  : 4,
    HF  : 5,
    VHF : 6,
    UHF : 7,
    SHF : 8,
    EHF : 9,
)

proxy_status_types = &(
    0: "forward",
    1: "reverse",
    2: "bi",
)

;
; JSON label names

application = "application"
version = "version"
info = "message_info"
proxy_message = "proxy_message-type"
finder_registration = "finder_registration"
sdsp_response = "sdsp_response"
location_update = "location_update"
rid = "id"
message_type = "message_type"
mac_address = "mac_address"
message_content = "message_content"
timestamp = "timestamp"
gps = "gps"
radio_type = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message = "broadcast_message"
sdsp_id = "sdsp_id"
proxy_status_type = "proxy_status_type"
update_interval = "update_interval"
 
<CODE ENDS>
]]></sourcecode></figure>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>TBD</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

<section anchor="privacy-concerns"><name>Privacy Concerns</name>

<t>TBD</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC8610' target='https://www.rfc-editor.org/info/rfc8610'>
<front>
<title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
<author fullname='H. Birkholz' initials='H.' surname='Birkholz'><organization/></author>
<author fullname='C. Vigano' initials='C.' surname='Vigano'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8610'/>
<seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>FAA Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="gps-ionosphere" target="https://doi.org/10.1002/2015JA021629">
  <front>
    <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>



<reference anchor='drip-authentication'>
   <front>
      <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='30' month='April' year='2022'/>
      <abstract>
	 <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-09'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-09.txt' type='TXT'/>
</reference>


<reference anchor='hierarchical-hit'>
   <front>
      <title>Hierarchical HITs for HIPv2</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <date day='13' month='May' year='2020'/>
      <abstract>
	 <t>   This document describes using a hierarchical HIT to facilitate large
   deployments of managed devices.  Hierarchical HITs differ from HIPv2
   flat HITs by only using 64 bits for mapping the Host Identity,
   freeing 32 bits to bind in a hierarchy of Registering Entities that
   provide services to the consumers of hierarchical HITs.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hierarchical-hit-05'/>
   <format target='https://www.ietf.org/archive/id/draft-moskowitz-hip-hierarchical-hit-05.txt' type='TXT'/>
</reference>


<reference anchor='hhit-registries'>
   <front>
      <title>Hierarchical HIT Registries</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <date day='9' month='March' year='2020'/>
      <abstract>
	 <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02'/>
   <format target='https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='24' month='April' year='2022'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   identifier for use as the Unmanned Aircraft System Remote
   Identification and tracking (UAS RID).

   This document updates RFC7401 and RFC7343.

   Within the context of RID, HHITs will be called DRIP Entity Tags
   (DETs).  HHITs self-attest to the included explicit hierarchy that
   provides registry (via, e.g., DNS, EPP) discovery for 3rd-party
   identifier attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-24'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-24.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-registries'>
   <front>
      <title>DRIP Entity Tag Registration &amp; Lookup</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Jim Reid'>
	 <organization>RTFM llp</organization>
      </author>
      <date day='30' month='April' year='2022'/>
      <abstract>
	 <t>   This document creates the DRIP DET registration and discovery
   ecosystem.  This includes all components in the ecosystem (e.g., RAA,
   HDA, UA, GCS, USS).  The registration process will use the Extensible
   Provisioning Protocol (EPP) and other protocols.  The discovery
   process will leverage DNS and DNSSEC and related technology.  The
   DETs can be registered with as their &quot;raw public keys&quot; or in X.509
   certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-02'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-registries-02.txt' type='TXT'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC5238' target='https://www.rfc-editor.org/info/rfc5238'>
<front>
<title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
<author fullname='T. Phelan' initials='T.' surname='Phelan'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP).  DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.  DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5238'/>
<seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>



<reference anchor='RFC4303' target='https://www.rfc-editor.org/info/rfc4303'>
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author fullname='S. Kent' initials='S.' surname='Kent'><organization/></author>
<date month='December' year='2005'/>
<abstract><t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4303'/>
<seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7049' target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>


<section anchor="LIDAR"><name>Using LIDAR for UA location</name>

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a
connected car) that has full sky coverage, the Finder can use this
equipment to locate UAs in its airspace.  The Finder would then be
able to detect non-participating UAs.  A non-participating UA is
one that the Finder can "see" with the LIDAR, but not "hear" any
B-RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate
B-RID messages, and forward them to the SPDP as any real B-RID
messages.  There is an open issue as what to use for the actual
RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a
non-participating UA that it has received from multiple Finders
with LIDAR detection.  In doing so, it would have to select a
RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is
beyond range for its B-RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs
on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is
needed.  there are full-sky LIDAR for automotive use with ranges
varying from 20M to 250M.  Would more than UA location information
be available?  What information can be sent in a CS-RID message for
such "unmarked" UAs?</t>

</section>
<section numbered="no" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The Crowd Sourcing idea in this document came from the Apple "Find
My Device" presentation at the International Association for
Cryptographic Research's Real World Crypto 2020 conference.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

