<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.9 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<?rfc strict="no"?>

<rfc ipr="trust200902" docName="draft-moskowitz-drip-crowd-sourced-rid-08" category="std" consensus="true" submissionType="IETF" xml:lang="en" obsoletes="" updates="" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CS-RID">Crowd Sourced Remote ID</title>

    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart W. Card">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhao" fullname="Shuai Zhao">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd</street>
          <city>Santa Clara</city>
          <region>CA</region>
          <code>95054</code>
          <country>USA</country>
        </postal>
        <email>shuai.zhao@ieee.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date year="2022" month="May" day="10"/>

    <area>Internet</area>
    <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>

    <abstract>


<t>This document describes using the ASTM Broadcast Remote ID (B-RID) specification in a "crowd sourced" smart phone environment to provide much of the ASTM and FAA envisioned Network Remote ID (Net-RID) functionality.  This crowd sourced B-RID (CS-RID) data will use multilateration to add a level of reliability in the location data on the Unmanned Aircraft (UA).  The crowd sourced environment will also provide a monitoring coverage map to authorized observers.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a mechanism to capture the ASTM Broadcast Remote ID messages (B-RID) <xref target="F3411-19"/> on any Internet connected device that receives them and can forward them to the Supplemental Data Service Providers (SDSPs) responsible for the geographic area the UA and receivers are in.  This will create a ecosystem that will meet most if not all data collection requirements that Civil Aviation Authorities (CAA) are placing on Network Remote ID (Net-RID).</t>

<t>These Internet connected devices are herein called "Finders", as they find UAs by listening for B-RID messages.  The Finders are B-RID forwarding proxies. Their potentially limited spacial view of RID messages could result in bad decisions on what messages to send to the SDSP and which to drop.  Thus they will send all received messages and the SDSP will make any filtering decisions in what it forwards into the UAS Traffic Management (UTM).</t>

<t>Finders can be smartphones, tablets, connected cars, or any computing platform with Internet connectivity that can meet the requirements defined in this document.  It is not expected, nor necessary, that Finders have any information about a UAS beyond the content in the B-RID messages.</t>

<t>Finders MAY only need a loose association with the SDSP(s).  They may only have the SDSP's Public Key and FQDN.  It would use these,
along with the Finder's Public Key to use Elliptic Curve Integrated Encryption Scheme (ECIES), or other security methods, to send the messages in a secure manner to the SDSP.  The SDSP MAY require a stronger relationship to the Finders.  This may range from the Finder's Public Key being registered to the SDSP with other information so that the SDSP has some level of trust in the Finders to requiring transmissions be sent over long-lived transport connections like ESP or DTLS.</t>

<t>If a 1-way only secure packet forwarding method is used (e.g., not a TCP connection), the Finder SHOULD receive periodic "heartbeats" from the SDSP to inform it that its transmissions are being received.  The SDSP sets the rules on when to send these heartbeats as discuss below in <xref target="sdsp_heartbeats"/>.</t>

<section anchor="role-of-supplemental-data-service-provider-sdsp"><name>Role of Supplemental Data Service Provider (SDSP)</name>

<t>The DRIP Architecture <xref target="I-D.ietf-drip-arch"/> introduces the basic CS-RID entities including CS-RID Finder and CS-RID SDSP. This document has minimal information about the actions of SDSPs. In general the SDSP is out of scope of this document. That said, the SDSPs should not simply proxy B-RID messages to the UTM(s). They should perform some minimal level of filtering and content checking before forwarding those messages that pass these tests in a secure manner to the UTM(s).</t>

<t>The SDSPs are also capable of maintaining a monitoring map, based on location of active Finders.  UTMs may use this information to notify authorized observers of where there is and there is not monitoring coverage.  They may also use this information of where to place pro-active monitoring coverage.</t>

<t>An SDSP should only forward Authenticated B-RID messages like those defined in <xref target="drip-authentication"/> to the UTM(s). Further, the SDSP SHOULD validate the Remote ID (RID) and the Authentication signature before forwarding anything from the UA, and flagging those RIDs that were not validated.  The SDSP MAY forward all B-RID messages to the UTM, leaving all decision making on B-RID messages veracity to the UTM.</t>

<t>When 3 or more Finders are reporting to an SDSP on a specific UA, the SDSP is in a unique position to perform multilateration on these messages and compute the Finder's view of the UA location to compare with the UA Location/Vector messages.  This check against the UA's location claims is both a validation on the UA's reliability as well as the trustworthiness of the Finders.  Other than providing data to allow for multilateration, this SDSP feature is out of scope of this document.  This function is limited by the location accuracy for both the Finders and UA.</t>

</section>
<section anchor="draft-status"><name>Draft Status</name>

<t>This draft is still incomplete.  New features are being added as capabilities are researched.  The actual message formats also still need work.</t>

</section>
</section>
<section anchor="terms"><name>Terms and Definitions</name>

<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>This document uses terms defined in <xref target="RFC9153"/> and <xref target="I-D.ietf-drip-arch"/>.</t>

</section>
<section anchor="definitions"><name>Definitions</name>

<dl newline="true">
  <dt>B-RID:</dt>
  <dd>
    <t>Broadcast Remote ID. A method of sending RID messages as
1-way transmissions from the UA to any Observers within
radio range.</t>
  </dd>
</dl>

<!-- C2:

: Command and Control.  Previously mostly used in military contexts.
  Properly refers to a function that is exercisable over arbitrary
  communications, but in the small UAS context, often refers to the
  communications (typically RF data link) over which the GCS
  controls the UA. -->

<!-- CAA:

: Civil Aeronautics Administration. An example is the Federal
  Aviation Administration (FAA) in the United States of
  America. -->
<!-- 
DAA:

: Detect and Avoid. The process of a UA detecting obstacles,
  like other UAs and taking the necessary evasive action. -->

<dl>
  <dt>ECIES:</dt>
  <dd>
    <t>Elliptic Curve Integrated Encryption Scheme.  A hybrid
encryption scheme which provides semantic security against
an adversary who is allowed to use chosen-plaintext and
chosen-ciphertext attacks.</t>
  </dd>
</dl>

<!-- GCS:

: Ground Control Station. The part of the UAS that the remote
  pilot uses to exercise C2 over the UA, whether by remotely
  exercising UA flight controls to fly the UA, by setting GPS
  waypoints, or otherwise directing its flight. -->

<dl>
  <dt>Finder:</dt>
  <dd>
    <t>In Internet connected device that can receive B-RID
messages and forward them to a UTM.</t>
  </dd>
</dl>

<!-- Observer:

: Referred to in other UAS documents as a "user", but there
  are also other classes of RID users, so we prefer
  "observer" to denote an individual who has observed an UA
  and wishes to know something about it, starting with its
  RID. -->

<dl>
  <dt>Multilateration:</dt>
  <dd>
    <t>Multilateration (more completely, pseudo range
multilateration) is a navigation and surveillance technique
based on measurement of the times of arrival (TOAs) of
energy waves (radio, acoustic, seismic, etc.) having a
known propagation speed.</t>
  </dd>
</dl>

<!-- NETSP:

: Network RID Service Provider. USS receiving Network RID
  messages from UAS (UA or GCS), storing for a short
  specified time, making available to NETDP.

NETDP:

: Network RID Display Provider. Entity (might be USS)
  aggregating data from multiple NETSPs to answer query from
  observer (or other party) desiring Situational Awareness of
  UAS operating in a specific airspace volume. -->

<dl>
  <dt>Net-RID:</dt>
  <dd>
    <t>Network Remote ID. A method of sending RID messages via the
Internet connection of the UAS directly to the UTM.</t>
  </dd>
</dl>

<!-- UAS RID:

: Remote ID. A unique identifier found on all UA to be used
  in communication and in regulation of UA operation. -->

<!-- SDSP:

: Supplemental Data Service Provider. Entity providing
  information that is allowed, but not required to be present
  in the UTM system. -->

<!-- UA:

: Unmanned Aircraft. In this document UA's are typically
  though of as drones of commercial or military variety. This
  is a very strict definition which can be relaxed to include
  any and all aircraft that are unmanned. -->
<!-- 
UAS:

: Unmanned Aircraft System. Composed of Unmanned Aircraft and
  all required on-board subsystems, payload, control station,
  other required off-board subsystems, any required launch
  and recovery equipment, all required crew members, and C2
  links between UA and the control station. -->

<!-- UTM:

: UAS Traffic Management. A "traffic management" ecosystem
  for uncontrolled operations that is separate from, but
  complementary to, the FAA's Air Traffic Management (ATM)
  system. -->

<!-- USS:

: UAS Service Supplier. Provide UTM services to support the
  UAS community, to connect Operators and other entities to
  enable information flow across the USS network, and to
  promote shared situational awareness among UTM
  participants. (From FAA UTM ConOps V1, May 2018). -->

</section>
</section>
<section anchor="prob-space"><name>Problem Space</name>

<section anchor="meeting-the-needs-of-network-remote-id"><name>Meeting the needs of Network Remote ID</name>

<t>The USA Federal Aviation Authority (FAA), in the January 2021 Remote ID Final rule <xref target="FAA-FR"/>, postponed Network Remote ID (Net-RID) and focused on Broadcast Remote ID.  This was in response to the UAS vendors comments that Net-RID places considerable demands on then currently used UAS.</t>

<t>However, Net-RID, or equivalent, is necessary for UTM and knowing what soon may be in an airspace.  A method that proxies B-RID into UTM can function as an interim approach to Net-RID and continue as a adjunct to Net-RID.</t>

</section>
<section anchor="advantages-of-broadcast-remote-id"><name>Advantages of Broadcast Remote ID</name>

<t>B-RID has its advantages over Net-RID.</t>

<t><list style="symbols">
  <t>B-RID can more readily be implemented directly in the UA. Net-RID will more frequently be provided by the GCS or a pilot's Internet connected device.
  <list style="symbols">
      <t>If Command and Control (C2) is bi-directional over a direct radio connection, B-RID could be a straight-forward addition.</t>
      <t>Small IoT devices can be mounted on UA to provide B-RID.</t>
    </list></t>
  <t>B-RID can also be used by the UA to assist in Detect and Avoid (DAA).</t>
  <t>B-RID is available to observers even in situations with no Internet like natural disaster situations.</t>
</list></t>

</section>
<section anchor="trustworthiness-of-proxied-data"><name>Trustworthiness of Proxied Data</name>

<t>When a proxy is introduced in any communication protocol, there is a risk of corrupted data and DOS attacks.</t>

<t>The Finders, in their role as proxies for B-RID, are authenticated to the SDSP (see <xref target="Finder_Sec"/>). The SDSP can compare the information from multiple Finders to isolate a Finder sending fraudulent information.  SDSPs can additionally verify authenticated messages that follow <xref target="drip-authentication"/>.</t>

<t>The SPDP can manage the number of Finders in an area (see <xref target="Finder_Manage"/>) to limit DOS attacks from a group of clustered Finders.</t>

</section>
<section anchor="defense-against-fraudulent-rid-messages"><name>Defense against fraudulent RID Messages</name>

<t>The strongest defense against fraudulent RID messages is to focus on <xref target="drip-authentication"/> conforming messages.  Unless this behavior is
mandated, SPDPs will have to use assorted algorithms to isolate messages of questionable content.</t>

</section>
</section>
<section anchor="Finder_Sec"><name>The Finder - SDSP Security Relationship</name>

<t>The SDSP(s) and Finders SHOULD use EDDSA <xref target="RFC8032"/> keys as their
trusted Identities. The public keys SHOULD be registered DRIP UAS Remote ID <xref target="I-D.ietf-drip-rid"/> and <xref target="I-D.ietf-drip-registries"/>.  Other similar methods may be used.</t>

<t>During this registration, the Finder gets the SDSP's EdDSA Public Key.  These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t>The SDSP uses some process (out of scope here) to register the Finders and their EDDSA Public Key.  During this registration, the Finder gets the SDSP's EDDSA Public Key.  These Public Keys allow for the following options for authenticated messaging from the Finder to the SDSP.</t>

<t><list style="numbers">
  <t>ECIES can be used with a unique nonce to authenticate each message sent from a Finder to the SDSP.</t>
  <t>ECIES can be used at the start of some period (e.g. day) to establish a shared secret that is then used to authenticate each message sent from a Finder to the SDSP sent during that period.</t>
  <t>HIP <xref target="RFC7401"/> can be used to establish a session secret that is then used with ESP <xref target="RFC4303"/> to authenticate each message sent from a Finder to the SDSP.</t>
  <t>DTLS <xref target="RFC5238"/>  can be used to establish a secure connection that is then used to authenticate each message sent from a Finder to the SDSP.</t>
</list></t>

<section anchor="sdsp_heartbeats"><name>SDSP Heartbeats</name>

<t>If a 1-way messaging approach is used (e.g. not TCP-based), the SDSP SHOULD send a heartbeat at some periodicity to the Finders so that they get confirmation that there is a receiver of their transmissions.</t>

<t>A simple (see <xref target="sdsp_heartbeat_cddl"/>) message that identifies the SDSP is sent to the Finder per some published policy of the SDSP.  For example, at the first reception by the SDSP for the day, then the 1st for the hour.  It is NOT recommended for the SDSP to send a heartbeat for every message received, as this is a potential DOS attack against the SDSP.</t>

</section>
<section anchor="Finder_Map"><name>The Finder Map</name>

<t>The Finders are regularly providing their SDSP with their location. This is through the B-RID Proxy Messages and Finder Location Update
Messages.  With this information, the SDSP can maintain a monitoring map.  That is a map of where there Finder coverage.</t>

</section>
<section anchor="Finder_Manage"><name>Managing Finders</name>

<t>Finder density will vary over time and space.  For example, sidewalks outside an urban train station can be packed with pedestrians at rush hour, either coming or going to their commute trains.  An SDSP may want to proactively limit the number of active Finders in such situations.</t>

<t>Using the Finder mapping feature, the SDSP can instruct Finders to NOT proxy B-RID messages.  These Finders will continue to report their location and through that reporting, the SDSP can instruct them to again take on the proxying role.  For example a Finder moving slowly along with dozens of other slow-moving Finders may be instructed to suspend proxying.  Whereas a fast-moving Finder at the same location (perhaps a connected car or a pedestrian on a bus) would not be asked to suspend proxying as it will soon be out of the congested area.</t>

</section>
</section>
<section anchor="multilat"><name>UA location via multilateration</name>

<t>The SDSP can confirm/correct the UA location provided in the Location/Vector message by using multilateration on data provided by at least 3 Finders that reported a specific Location/Vector message (Note that 4 Finders are needed to get altitude sign correctly).  In fact, the SDSP can calculate the UA location from 3 observations of any B-RID message.  This is of particular value if the UA is only within reception range of the Finders for messages other than the  Location/Vector message.</t>

<t>This feature is of particular value when the Finders are fixed assets around a high value site like an airport or large public venue.</t>

<section anchor="gps-inaccuracy"><name>GPS Inaccuracy</name>

<t>Single-band, consumer grade, GPS on small platforms is not accurate, particularly for altitude.  Longitude/latitude measurements can easily  be off by 3M based on satellite postion and clock accuracy.  Altitude accuracy is reported in product spec sheets and actual tests to be 3x  less accurate. Altitude accuracy is hindered by ionosphere activity. In fact, there are studies of ionospheric events (e.g. 2015 St. Patrick's  day <xref target="gps-ionosphere"/>) as measured by GPS devices at known locations.  Thus where a UA reports it is rarely accurate, but may be accurate enough to map to visual sightings of single UA.</t>

<t>Smartphones and particulary smartwatches are plagued with the same challenge, though some of these can combine other information like cell tower data to improve location accuracy.  FCC E911 accuracy, by FCC rules is NOT available to non-E911 applications due to privacy concerns, but general higher accuracy is found on some smart devices than reported for consumer UA.  The SDSP MAY have information on the Finder location accuracy that it can use in calculating the accuracy of a multilaterated location value.  When the Finders are fixed assets, the SDSP may have very high trust in their location for trusting the
multilateration calculation over the UA reported location.</t>

</section>
</section>
<section anchor="CSRID_messages"><name>The CS-RID Messages</name>

<t>The CS-RID messages between the Finders and the SDSPs primarily support the proxy role of the Finders in forwarding the B-RID messages.  There are also Finder registration and status messages.</t>

<t>CS-RID information is represented in CBOR <xref target="RFC7049"/>.
COSE <xref target="RFC8152"/> MAY be used for CS-RID MAC and COAP <xref target="RFC7252"/> for the CS-RID protocol.
The CDDL <xref target="RFC8610"/> specification is used for CS-RID message description.</t>

<t>The following is a general representation of the content in the CS-RID messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID MESSAGE CONTENT,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The CS-RID MESSAGE CONTENT varies by MESSAGE TYPE.</t>

<section anchor="CS-RID_MESSAGE_TYPE"><name>CS-RID MESSAGE TYPE</name>

<t>The CS-RID MESSAGE TYPE is defined in <xref target="csrid-message"/>:</t>

<figure anchor="csrid-message"><artwork><![CDATA[
  Number   CS-RID Message Type
  ------   -----------------
  0        Reserved
  1        B-RID Forwarding
  2        Finder Registration
  3        SDSP Response
  4        Finder Location
  5        SDSP Heartbeat
]]></artwork></figure>

<section anchor="cddl-description-for-cs-rid-message-type"><name>CDDL description for CS-RID message type</name>

<t>The overall CS-RID CDDL description is structured in <xref target="csrid-object"/>.</t>

<figure anchor="csrid-object"><artwork><![CDATA[
CSRID_Object = {
  application-context,
  info                => info_message,
  proxy_message       => broadcast_rid_proxy_message,
  finder_registration => finder_registration_message,
  sdsp_response       => sdsp_response_message,
  location_update     => location_update_message,
  sdsp_heartbeat      => sdsp_heartbeat_message,
}

info_message = {
  common_message_members,
  message_content => tstr,
}

common_message_members = (
  message_type  => message_types,
  mac_address   => #6.37(bstr),
)

message_types = &(
  Reserved            : 0,
  BRD                 : 1,
  Finder-Registration : 2,
  SDSP-Response       : 3,
  Finder-Location     : 4,
)
]]></artwork></figure>

<t>The application context rule is defined in <xref target="csrid-app-context"/> for
CS-RID application identification and version negotiation.</t>

<figure anchor="csrid-app-context"><artwork><![CDATA[
application-context = (
  application => "DRIP-CSRID",
  ? version => uint .size(1..2),
)
]]></artwork></figure>

<t>The predefined CDDL text string labels (author note: for JSON currently, will move to CBOR uint keys in upcoming versions) used in the specification is listed in <xref target="csrid-variables"/>.</t>

<figure anchor="csrid-variables"><artwork><![CDATA[
application           = "application"
version               = "version"
info                  = "message_info"
proxy_message         = "proxy_message-type"
finder_registration   = "finder_registration"
sdsp_response         = "sdsp_response"
location_update       = "location_update"
sdsp_heartbeat        = "sdsp_heartbeat"
rid                   = "id"
message_type          = "message_type"
mac_address           = "mac_address"
message_content       = "message_content"
timestamp             = "timestamp"
gps                   = "gps"
radio_type            = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message     = "broadcast_message"
sdsp_id               = "sdsp_id"
proxy_status_type     = "proxy_status_type"
update_interval       = "update_interval"
]]></artwork></figure>

</section>
</section>
<section anchor="CSRID_proxy"><name>The CS-RID B-RID Proxy Message</name>

<t>The Finders add their own information to the B-RID messages,
permitting the SDSP(s) to gain additional knowledge about the
UA(s).  The RID information is the B-RID message content plus the
MAC address.  The MAC address is critical, as it is the only
field that links a UA's B-RID messages together.  Only the ASTM
Basic ID Message and possibly the Authentication Message contain
the UAS ID field.</t>

<t>The Finders add an SDSP assigned ID, a 64 bit timestamp, GPS
information, and type of B-RID media to the B-RID message.  Both
the timestamp and GPS information are for when the B-RID
message(s) were received, not forwarded to the SDSP.  All this
content is MACed using a key shared between the Finder and SDSP.</t>

<t>The following is a representation of the content in the CS-RID
messages.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    RECEIVE TIMESTAMP,
    RECEIVE GPS,
    RECEIVE RADIO TYPE,
    B-RID MAC ADDRESS,
    B-RID MESSAGE,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="CS-RID_ID"><name>CS-RID ID</name>

<t>The CS-RID ID is the ID recognized by the SDSP.  This may be an HHIT <xref target="I-D.ietf-drip-rid"/>, or any ID used by the SDSP.</t>

</section>
<section anchor="cddl-description-for-cs-rid-b-rid-proxy-message"><name>CDDL description for CS-RID B-RID Proxy Message</name>

<t>The broadcast CS-RID proxy CDDL is defined in <xref target="csrid-brid-proxy"/></t>

<figure anchor="csrid-brid-proxy"><artwork><![CDATA[
broadcast_rid_proxy_message = {
  common_message_members,
  rid                   => tstr,
  timestamp             => tdate,
  gps                   => gps-coordinates,
  radio_type            => radio_types,
  broadcast_mac_address => #6.37(bstr),
  broadcast_message     => #6.37(bstr),
}

radio_types = &(
  EFL : 0,
  VLF : 1,
  LF  : 2,
  MF  : 3,
  HF  : 4,
  HF  : 5,
  VHF : 6,
  UHF : 7,
  SHF : 8,
  EHF : 9,
)

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Reg"><name>CS-RID Finder Registration</name>

<t>The CS-RID Finder MAY use <xref target="RFC7401"/> with the SDSP to establish a Security Association and a shared secret to use for the CS-RID MAC generation.  In this approach, the HIP mobility functionality and <xref target="RFC4303"/> support are not used.</t>

<t>When HIP is used as above, the Finder Registration is a SDSP "wake up".  It is sent prior to the Finder sending any proxied
B-RID messages to ensure that the SDSP is able to receive and process the messages.</t>

<t>In this usage, the CS-RID ID is the Finder HIT.  If the SDSP has lost state with the Finder, it initiates the HIP exchange with the
Finder to reestablish HIP state and a new shared secret for the CS-RID B-RID Proxy Messages.  In this case the Finder Registration
Message is:</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-finder-registration"><name>CDDL description for Finder Registration</name>
<t>The CDDL for CS-RID Finder Registration is defined in <xref target="csrid-finder-registration"/></t>

<figure anchor="csrid-finder-registration"><artwork><![CDATA[
finder_registration_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="SDSP_Reg_R"><name>CS-RID SDSP Response</name>

<t>The SDSP MAY respond to any Finder messages to instruct the Finder on its
behavior.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID ID,
    CS-RID PROXY STATUS,
    CS-RID UPDATE INTERVAL,
    CS-RID MAC
  )
]]></artwork></figure>

<t>The Proxy Status instructs the Finder if it should actively proxy
B-RID messages, or suspend proxying and only report its location.</t>

<t>The Update Interval is the frequency that the Finder SHOULD notify
the SDSP of its current location using the Location Update message.</t>

<section anchor="cddl-description-for-sdsp-response"><name>CDDL description for SDSP Response</name>

<t>The CDDL for CS-RID SDSP response is defined in <xref target="csrid-sdsp-response"/></t>

<figure anchor="csrid-sdsp-response"><artwork><![CDATA[
sdsp_response_message = {
  common_message_members,
  sdsp_id           => tstr,
  rid               => tstr,
  proxy_status_type => proxy_status_types,
  update_interval   => uint,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]

proxy_status_types = &(
  0: "forward",
  1: "reverse",
  2: "bi-directional",
)
]]></artwork></figure>

</section>
</section>
<section anchor="CS-RID_Upd"><name>CS-RID Location Update</name>

<t>The Finder SHOULD provide regular location updates to the SDSP. The
interval is based on the Update Interval from <xref target="SDSP_Reg_R"/> plus a random slew less than
1 second.  The Location Update message is only sent when no other
CS-RID messages, containing the Finder's GPS location, have been
sent since the Update Interval.</t>

<t>If the Finder has not recieved a SDSP Registration Response, a
default of 5 minutes is used for the Update Interval.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    CS-RID ID,
    CS-RID TIMESTAMP,
    CS-RID GPS,
    CS-RID MAC
  )
]]></artwork></figure>

<section anchor="cddl-description-for-location-update"><name>CDDL description for Location Update</name>

<t>The CDDL for CS-RID Location update is defined in <xref target="csrid-location-update"/>.</t>

<figure anchor="csrid-location-update"><artwork><![CDATA[
location_update_message = {
  common_message_members,
  rid       => tstr,
  timestamp => tdate,
  gps       => gps-coordinates,
}

gps-coordinates = [
  latitude : float,
  longitude: float,
]
]]></artwork></figure>

</section>
</section>
<section anchor="sdsp_heartbeat_cddl"><name>SDSP Heartbeat</name>

<t>The SDSP SHOULD send a heartbeat message at some periodicity to the Finders so that they get confirmation that their is a receiver of their transmissions.</t>

<figure><artwork><![CDATA[
  (
    CS-RID MESSAGE TYPE,
    SDSP ID,
    CS-RID TIMESTAMP,
  )
]]></artwork></figure>

<section anchor="cddl-description-for-sdsp-heartbeat"><name>CDDL description for SDSP Heartbeat</name>

<t>The CDDL for CS-RID Heartbeat is defined in <xref target="csrid-sdsp-heartbeat"/>.</t>

<figure anchor="csrid-sdsp-heartbeat"><artwork><![CDATA[
sdsp_heartbeat_messagege = {
  common_message_members,
  sdsp_id   => tstr,
  timestamp => tdate,
}

]]></artwork></figure>

</section>
</section>
</section>
<section anchor="the-full-cs-rid-cddl-specification"><name>The Full CS-RID CDDL specification</name>

<figure><sourcecode type="CDDL"><![CDATA[
<CODE BEGINS>
; CDDL specification for Crowd source RID
; It specifies a collection of CS message types
;

;
; The CSRID overall data structure

CSRID_Object = {
    application-context,
    info =>  info_message,
    proxy_message => broadcast_rid_proxy_message,
    finder_registration => finder_registration_message,
    sdsp_response => sdsp_response_message,
    location_update => location_update_message,
}

;
; Application context: general information about CSRID message 

application-context = (
    application => "DRIP-CSRID", ; TBD: consider CBOR tag 
    ? version => uint .size(1..2),
)

; These members are include in every message
common_message_members = (
    message_type => message_types,
    mac_address => #6.37(bstr),
)

;
; CSRID message general information

info_message = {
    common_message_members,
    message_content => tstr,
}

broadcast_rid_proxy_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
    radio_type => radio_types,
    broadcast_mac_address => #6.37(bstr)
    broadcast_message => #6.37(bstr)
}

finder_registration_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

sdsp_response_message = {
    common_message_members,
    sdsp_id => tstr,
    rid => tstr,
    proxy_status_type => proxy_status_types,
    update_interval => uint,
}

location_update_message = {
    common_message_members,
    rid => tstr,
    timestamp => tdate,
    gps => gps-coordinates,
}

;
; Common rule definition

message_types = &(
    Reserved            : 0,
    BRD                 : 1,
    Finder-Registration : 2,
    SDSP-Response       : 3,
    Finder-Location     : 4,
)

gps-coordinates = [
    lat: float,
    long: float,
]

; Radio types, choose from one of radio_types (required)
radio_types = &(
    EFL : 0,
    VLF : 1,
    LF  : 2,
    MF  : 3,
    HF  : 4,
    HF  : 5,
    VHF : 6,
    UHF : 7,
    SHF : 8,
    EHF : 9,
)

proxy_status_types = &(
    0: "forward",
    1: "reverse",
    2: "bi",
)

;
; JSON label names

application = "application"
version = "version"
info = "message_info"
proxy_message = "proxy_message-type"
finder_registration = "finder_registration"
sdsp_response = "sdsp_response"
location_update = "location_update"
rid = "id"
message_type = "message_type"
mac_address = "mac_address"
message_content = "message_content"
timestamp = "timestamp"
gps = "gps"
radio_type = "radio_type"
broadcast_mac_address = "broadcast_mac_address"
broadcast_message = "broadcast_message"
sdsp_id = "sdsp_id"
proxy_status_type = "proxy_status_type"
update_interval = "update_interval"
 
<CODE ENDS>
]]></sourcecode></figure>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>TBD</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

<section anchor="privacy-concerns"><name>Privacy Concerns</name>

<t>TBD</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC8610' target='https://www.rfc-editor.org/info/rfc8610'>
<front>
<title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
<author fullname='H. Birkholz' initials='H.' surname='Birkholz'><organization/></author>
<author fullname='C. Vigano' initials='C.' surname='Vigano'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t></abstract>
</front>
<seriesInfo name='RFC' value='8610'/>
<seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>



<reference anchor='RFC9153' target='https://www.rfc-editor.org/info/rfc9153'>
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname='S. Card' initials='S.' role='editor' surname='Card'><organization/></author>
<author fullname='A. Wiethuechter' initials='A.' surname='Wiethuechter'><organization/></author>
<author fullname='R. Moskowitz' initials='R.' surname='Moskowitz'><organization/></author>
<author fullname='A. Gurtov' initials='A.' surname='Gurtov'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9153'/>
<seriesInfo name='DOI' value='10.17487/RFC9153'/>
</reference>



<reference anchor='RFC8152' target='https://www.rfc-editor.org/info/rfc8152'>
<front>
<title>CBOR Object Signing and Encryption (COSE)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t></abstract>
</front>
<seriesInfo name='RFC' value='8152'/>
<seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="F3411-19" target="http://www.astm.org/cgi-bin/resolver.cgi?F3411">
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization>ASTM International</organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>
<reference anchor="FAA-FR" target="https://www.govinfo.gov/content/pkg/FR-2021-01-15/pdf/2020-28948.pdf">
  <front>
    <title>FAA Remote Identification of Unmanned Aircraft</title>
    <author >
      <organization>United States Federal Aviation Administration (FAA)</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="gps-ionosphere" target="https://doi.org/10.1002/2015JA021629">
  <front>
    <title>Ionospheric response to the 2015 St. Patrick's Day storm A global multi-instrumental overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2015" month="September"/>
  </front>
</reference>



<reference anchor='drip-authentication'>
   <front>
      <title>DRIP Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <date day='30' month='April' year='2022'/>
      <abstract>
	 <t>   This document describes how to include trust into the ASTM Remote ID
   specification defined in ASTM F3411 under Broadcast Remote ID (RID).
   It defines a few message schemes (sent within the Authentication
   Message) that can be used to authenticate past messages sent by a
   unmanned aircraft (UA) and provide proof of UA trustworthiness even
   in the absence of Internet connectivity at the receiving node.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-auth-09'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-auth-09.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-rid'>
   <front>
      <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='24' month='April' year='2022'/>
      <abstract>
	 <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as self-asserting IPv6 addresses and thereby a trustable
   identifier for use as the Unmanned Aircraft System Remote
   Identification and tracking (UAS RID).

   This document updates RFC7401 and RFC7343.

   Within the context of RID, HHITs will be called DRIP Entity Tags
   (DETs).  HHITs self-attest to the included explicit hierarchy that
   provides registry (via, e.g., DNS, EPP) discovery for 3rd-party
   identifier attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-rid-24'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-rid-24.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-registries'>
   <front>
      <title>DRIP Entity Tag Registration &amp; Lookup</title>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Stuart Card'>
	 <organization>AX Enterprize, LLC</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Jim Reid'>
	 <organization>RTFM llp</organization>
      </author>
      <date day='30' month='April' year='2022'/>
      <abstract>
	 <t>   This document creates the DRIP DET registration and discovery
   ecosystem.  This includes all components in the ecosystem (e.g., RAA,
   HDA, UA, GCS, USS).  The registration process will use the Extensible
   Provisioning Protocol (EPP) and other protocols.  The discovery
   process will leverage DNS and DNSSEC and related technology.  The
   DETs can be registered with as their &quot;raw public keys&quot; or in X.509
   certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-registries-02'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-registries-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-drip-arch'>
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
      <author fullname='Stuart W. Card'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Adam Wiethuechter'>
	 <organization>AX Enterprize</organization>
      </author>
      <author fullname='Robert Moskowitz'>
	 <organization>HTT Consulting</organization>
      </author>
      <author fullname='Shuai Zhao'>
	 <organization>Tencent</organization>
      </author>
      <author fullname='Andrei Gurtov'>
	 <organization>Linköping University</organization>
      </author>
      <date day='21' month='March' year='2022'/>
      <abstract>
	 <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-drip-arch-22'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-drip-arch-22.txt' type='TXT'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC5238' target='https://www.rfc-editor.org/info/rfc5238'>
<front>
<title>Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)</title>
<author fullname='T. Phelan' initials='T.' surname='Phelan'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This document specifies the use of Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP).  DTLS provides communications privacy for applications that use datagram transport protocols and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.  DCCP is a transport protocol that provides a congestion-controlled unreliable datagram service.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5238'/>
<seriesInfo name='DOI' value='10.17487/RFC5238'/>
</reference>



<reference anchor='RFC4303' target='https://www.rfc-editor.org/info/rfc4303'>
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author fullname='S. Kent' initials='S.' surname='Kent'><organization/></author>
<date month='December' year='2005'/>
<abstract><t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4303'/>
<seriesInfo name='DOI' value='10.17487/RFC4303'/>
</reference>



<reference anchor='RFC7401' target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname='R. Moskowitz' initials='R.' role='editor' surname='Moskowitz'><organization/></author>
<author fullname='T. Heer' initials='T.' surname='Heer'><organization/></author>
<author fullname='P. Jokela' initials='P.' surname='Jokela'><organization/></author>
<author fullname='T. Henderson' initials='T.' surname='Henderson'><organization/></author>
<date month='April' year='2015'/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference anchor='RFC7049' target='https://www.rfc-editor.org/info/rfc7049'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t></abstract>
</front>
<seriesInfo name='RFC' value='7049'/>
<seriesInfo name='DOI' value='10.17487/RFC7049'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>


<section anchor="LIDAR"><name>Using LIDAR for UA location</name>

<t>If the Finder has LIDAR or similar detection equipment (e.g. on a
connected car) that has full sky coverage, the Finder can use this
equipment to locate UAs in its airspace.  The Finder would then be
able to detect non-participating UAs.  A non-participating UA is
one that the Finder can "see" with the LIDAR, but not "hear" any
B-RID messages.</t>

<t>These Finders would then take the LIDAR data, construct appropriate
B-RID messages, and forward them to the SPDP as any real B-RID
messages.  There is an open issue as what to use for the actual
RemoteID and MAC address.</t>

<t>The SDSP would do the work of linking information on a
non-participating UA that it has received from multiple Finders
with LIDAR detection.  In doing so, it would have to select a
RemoteID to use.</t>

<t>A seemingly non-participating UA may actually be a UA that is
beyond range for its B-RID but in the LIDAR range.</t>

<t>This would provide valuable information to SDSPs to forward to UTMs
on potential at-risk situations.</t>

<t>At this time, research on LIDAR and other detection technology is
needed.  there are full-sky LIDAR for automotive use with ranges
varying from 20M to 250M.  Would more than UA location information
be available?  What information can be sent in a CS-RID message for
such "unmarked" UAs?</t>

</section>
<section numbered="no" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The Crowd Sourcing idea in this document came from the Apple "Find
My Device" presentation at the International Association for
Cryptographic Research's Real World Crypto 2020 conference.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

