<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-csada-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="csada">Protocol for Crowd Sourcing Air Domain Awareness</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-csada-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>This document standardizes an architecture to enable trust to sensors that provide Air Domain Awareness. Broadcast Remote ID is used as the primary example to define data models and methods used.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <ul empty="true">
        <li>
          <t>Note: This document is directly related and builds from <xref target="MOSKOWITZ-CSRID"/> expanding it to be more general for ADA. That draft is a "top, down" approach to understand the concept and high level design. This document  is a "bottom, up" implementation of the CS-RID concept. The content of this draft is subject to change and adapt as further development continues.</t>
        </li>
      </ul>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>Air Domain Awareness (ADA) is an important part of safe operations for aviation.</t>
        <t>While this document will focus on adding Broadcast RID for ADA to UTM, the concepts, models and methods in this document can be expanded and used in other domain areas.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t>TBD</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document uses Broadcast RID as a titular example to define a basic architecture and initial method of providing sensor data to UTM in a way that enables trust. This specific scenario is referred to as Crowd Sourced RID (CS-RID).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document uses terms defined in <xref target="RFC9153"/> and <xref target="RFC9434"/> as well as those defined below.</t>
        <t>Finder:
Device acting as a sensor of one or more inputs in a domain. For this document the domain is aviation with the inputs being of various types such as audio, video, radio frequency, etc.</t>
        <t>Supplemental Data Service Provider (SDSP):
A server that Finders report updates to and acts as a gateway into UTM.</t>
        <t>Web Token:
An encapsulation mechanism for data. Can be either a CBOR Web Token (CWT, <xref target="RFC8392"/>) or JSON Web Token (JWT, <xref target="RFC7519"/>).</t>
      </section>
    </section>
    <section anchor="arch">
      <name>Architecture</name>
      <t>With the initial use case of providing Broadcast RID for ADA to UTM this architecture closely follows and integrates into the wider UTM. See <xref section="A" sectionFormat="of" target="RFC9434"/> for more information. All data models in this document are defined in the Concise Data Definition Language (CDDL, <xref target="RFC8610"/>).</t>
      <figure anchor="csada-arch">
        <name>Simplified Architecture for Crowd Sourced ADA</name>
        <artwork type="ascii-art"><![CDATA[
+--------+
| Finder |
+----o---+
     |
     |         +-----------------+
     |         | Supplemental    |
     '---------o Data Service    o----------.
               | Provider (SDSP) |          |
               +-----------------+          |
                                            |
                                      +-----o-------+
                                      | ADA Clients |
                                      +-------------+
]]></artwork>
      </figure>
      <ul empty="true">
        <li>
          <t>Author TODO: expand <xref target="csada-arch"/> to showcase different Finder sources and optional SDSP-to-SDSP interactions.</t>
        </li>
      </ul>
      <t>In this architecture the SDSP depends upon Finders to provide data via its "ingress" and exposes to clients on its "egress" data that has been filtered, aggregated and/or fused.</t>
      <t>For CS-RID, defined in <xref target="csrid"/>, Finders report a mix of raw detections or pre-processed UAS data (detected from Broadcast RID) to the SDSP to be further refined and translated to Network RID for UTM Clients.</t>
      <t>Links between the SDSP and other entities is assumed to be bi-directional unless otherwise noted by a specific use-case. It is up to a given sensor use case to determine more in depth interaction models between the entities.</t>
      <t>SDSPs can redirect "ingress" reports with unknown data elements if it knows another SDSP under the same ADA ecosystem that will process those unknown elements. An SDSPs "egress" may feed into another SDSP for further aggregation/fusion with other data sources.</t>
      <t>It is RECOMMENDED that all participating entities of this ecosystem have a DRIP Entity Tag (DET, <xref target="RFC9374"/>) to enable between the parties during all interactions.</t>
      <section anchor="reporting">
        <name>Reporting</name>
        <figure anchor="report-model">
          <name>Reporting Model</name>
          <artwork><![CDATA[
report = {
  reporter_id: bstr / tstr / #6.54 / uuid,
  report_window: [
    start: tdate / time, 
    end: tdate / time / uint
  ],
  ? brid: [+ detection],
  ? uas: [+ uas_datum],
  ? gnss: gnss_datum,
  ? reporter => reporter-datum,
  ? status => status-datum,
  * &(tstr, int) => any
}
]]></artwork>
        </figure>
        <t>The reporting model <xref target="report-model"/> is primarily used between the Finder and SDSP but MAY be used between SDSP and its clients. A report is filled with various different models under unique keys.</t>
        <t>This document defines required report keys and models for CS-RID in <xref target="csrid"/> and additional OPTIONAL ones in <xref target="add-reports"/>.</t>
      </section>
      <section anchor="encap-transport">
        <name>Encapsulation &amp; Transporting</name>
        <t>Reports MUST be authenticated and SHOULD be encrypted by its original source. These attributes can come from the combination of the transport and the application layer between the source and destination party. At the application layer the report can be encapsulated in a Web Token to provide both of these attributes.</t>
        <t>Selection of certain transports can also securely enable for the SDSP to "push" information to Finders, such as provisioning and filtering requests. This problem can be considered a "configuration" problem, thus bringing a number of different alternatives to be used to solve rather than creating another domain specific solution. This problem, while noted, is out of scope for this document.</t>
        <t>Selection of transport and supported interactions for given use-case, other than Broadcast RID, are out of scope for this document.</t>
        <section anchor="web-token">
          <name>Web Token Encapsulation</name>
          <t>The use of Web Token is RECOMMENDED when the transport layer does not provider either authentication of the source or encryption capabilities. Hosts SHOULD use a DET as the <tt>kid</tt> in the Web Token but MAY provider either a different <tt>kid</tt> or place the public key directly in the Web Token header.</t>
        </section>
        <section anchor="https">
          <name>HTTPS Transport</name>
          <t>When using the HTTPS transport Reports MUST be encapsulated in a Web Token as described in <xref target="web-token"/> to provide client authentication and encryption. It is RECOMMENDED that the SDSP serve their endpoints under <tt>/.well-known/csada</tt> for interoperability. Support for both Web Token encodings is RECOMMENDED.</t>
          <t>The use of Mutual TLS <xref section="7.4.6" sectionFormat="of" target="RFC5246"/> as part of the HTTPS exchange has not been explored for this architecture, but is theoretically possible for small and large scale deployments in both public and private domains when using the DRIP Key Infrastructure X.509 (DKIX).</t>
        </section>
        <section anchor="hip">
          <name>HIP Transport</name>
          <t>The Host Identity Protocol (HIP, <xref target="RFC7401"/>) can be used and provides, via the Base Exchange (BEX), authentication and encryption for both parties. DETs MUST be used and Reports MUST be CBOR encoded.</t>
        </section>
        <section anchor="coap">
          <name>CoAP Transport</name>
          <t>The Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) is another supported transport that can provide both parties authentication and encryption. DTLS <xref target="RFC9147"/> is RECOMMENDED for use and MUST use the DET, and the Report MUST be sent encoded in CBOR. When using UDP, Reports MUST be encapsulated in a CWT per <xref target="web-token"/>. Use of <tt>./well-known/cs-ada/</tt> similar to HTTPS is encouraged.</t>
        </section>
      </section>
    </section>
    <section anchor="csrid">
      <name>Crowd Sourced Remote ID</name>
      <t>This document defines two data models, <xref target="detections"/> and <xref target="uas-datum"/>, to be used between the Finder and SDSP. The UTM, RID data encapsulation and transportation is already standardized with an overview provided in <xref target="nrid"/>.</t>
      <t>For CS-RID, Finders and SDSP MUST support Web Tokens over HTTPS (<xref target="https"/>) as the primary encapsulation and transport method. The other defined transports in <xref target="encap-transport"/> MAY be supported by an SDSP. Interactions started by the SDSP to the Finder are out of scope for this document with that link (Finder to SDSP) expected to be unidirectional.</t>
      <section anchor="detections">
        <name>Detection Report</name>
        <figure anchor="detection-model">
          <name>Detections Model</name>
          <artwork type="ascii-art"><![CDATA[
detection = [
  reporter_position: #6.103 / null,
  detection_time: tdate / time,
  antenna: [ + antenna-info], 
  transport: &transport-enum,
  mac_address: #6.48,
  message_counter: uint,
  brid_message: bstr,
  compliance: [* uint]
]

antenna-info = [
  frequency: number / null,
  sector: tstr / null,
  rssi: number
]
transport-enum = (
  0: UKN, 1: BLE, 2: BLR, 3: BCN, 4: NAN, 5: SIK
)
]]></artwork>
        </figure>
      </section>
      <section anchor="uas-datum">
        <name>UAS Datum Report</name>
        <figure anchor="uas-model">
          <name>UAS Datum Model</name>
          <artwork type="ascii-art"><![CDATA[
uas_datum = [
  reporter_position: #6.103,
  transports: {
    + &transport-enum: [+ mac_address: #6.48]
  },
  datum: {
    ? timestamp => utc,
    ? uas_type => 0..15,
    ? uas_ids => [
      + [
        id_type: 0..15,
        uas_id: uas-id
      ]
    ],
    ? ua_status => 0..15,
    ? ua_position => [
      lla: position,
      barometric_altitude: number / null
    ],
    ? ua_bearing => uint,
    ? ua_speed => [
      vertical: number / null,
      horizontal: number / null
    ],
    ? ua_height => [
      agl: bool,
      height: number
    ],
    ? accuracy => [
      vertical: 0..15,
      horizontal: 0..15,
      altitude: 0..15,
      barometric: 0..15,
      timestamp: 0..15
    ],
    ? auth => [
      + [
        auth_type: 0..15,
        data: auth-data
      ]
    ],
    ? self_id => [
      desc_type: 0..255,
      desc: tstr .size 23
    ],
    ? fixed_operator_position => position,
    ? gnss_operator_position => position,
    ? take_off_position => position,
    ? classification => [
      region: 0..8,
      category: 0..15,
      class: 0..15
    ],
    ? area => [
      count: 1..255,
      radius: number,
      floor: number,
      ceiling: number
    ],
    ? operator_id => [
      operator_type: 0..255,
      operator_id: tstr .size 20
    ],
    ? compliance => [+ uint]
  }
]

transport-enum = (
  0: UKN, 1: BLE, 2: BLR, 3: BCN, 4: NAN, 5: SIK
)
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="drip-requirements-addressed">
      <name>DRIP Requirements Addressed</name>
      <t>This document addresses the following requirements from <xref target="RFC9153"/>: GEN-5 (Gateway)</t>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <section anchor="well-known-uris">
        <name>Well-Known URIs</name>
        <t>IANA is requested to add the following entries in the "Well-Known URIs" registry <xref target="WELL-KNOWN"/>.</t>
        <table>
          <name>Additions to Well-Known URIs Registry</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related Information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">csada</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The Crowd Sourcing idea in this document came from the Apple "Find My Device" presentation at the International Association for Cryptographic Research's Real World Crypto 2020 conference.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7401">
          <front>
            <title>Host Identity Protocol Version 2 (HIPv2)</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="T. Heer" initials="T." surname="Heer"/>
            <author fullname="P. Jokela" initials="P." surname="Jokela"/>
            <author fullname="T. Henderson" initials="T." surname="Henderson"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies the details of the Host Identity Protocol (HIP). HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes. HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication. The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks. When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
              <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility. It also incorporates lessons learned from the implementations of RFC 5201.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7401"/>
          <seriesInfo name="DOI" value="10.17487/RFC7401"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="MOSKOWITZ-CSRID">
          <front>
            <title>Crowd Sourced Remote ID</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document describes using the ASTM Broadcast Remote ID (B-RID)
   specification in a "crowd sourced" smart phone or fixed receiver
   asset environment to provide much of the ASTM and FAA envisioned
   Network Remote ID (Net-RID) functionality.  This crowd sourced B-RID
   (CS-RID) data will use multilateration to add a level of reliability
   in the location data on the Uncrewed Aircraft (UA).  The crowd
   sourced environment will also provide a monitoring coverage map to
   authorized observers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-crowd-sourced-rid-15"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="WELL-KNOWN" target="https://www.iana.org/assignments/well-known-uris/">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 328?>

<section anchor="nrid">
      <name>ASTM Network RID Overview</name>
      <t>This appendix is normative and an overview of the Network RID portion of <xref target="F3411"/>.</t>
      <t>This appendix is intended a guide to the overall object of Network RID and generally how it functions in context with a SDSP supporting CS-RID. Please refer to the actual standard of <xref target="F3411"/> for specifics in implementing said protocol.</t>
      <t>For CS-RID the goal is for the SDSP to act as both a Network RID Service Provider (SP) and Network RID Display Provider (DP). The endpoints and models MUST follow the specifications for these roles so UTM clients do not need to implement specific endpoints for CS-RID and can instead leverage existing endpoints.</t>
      <t>An SDSP SHOULD use Network RID, as it is able, to query a USS for UAS sending telemetry in a given area to integrate into the Broadcast RID it is receiving from Finders. How the SDSP discovers which USS to query is out of scope for this document.</t>
      <t>An SDSP MUST provide the Network RID DP interface for clients that wish to subscribe for updates on aircraft in the SDSP aggregated coverage area.</t>
    </section>
    <section anchor="add-reports">
      <name>Additional Report Models</name>
      <section anchor="global-navigation-satellite-system-gnss">
        <name>Global Navigation Satellite System (GNSS)</name>
        <figure anchor="gnss-model">
          <name>GNSS Model</name>
          <artwork type="ascii-art"><![CDATA[
gnss_datum = [
  status: gnss-status,
  errors: [* gnss-error]
]
gnss-status = [
  timestamp: tdate / time,
  position: #6.103,
  dop: [
    hdop: number,
    vdop: number,
    pdop: number
  ] / null,
  fix: 0..3,
  bearing: number,
  speed: number,
  satellites_in_view: uint,
  satellites: [
    * [
      id: uint,
      snr: number,
      elevation: number,
      azimuth: number
    ]
  ]
]
gnss-error = [
  field: tstr,
  reported: any,
  threshold: any
]
]]></artwork>
        </figure>
      </section>
      <section anchor="reporter">
        <name>Reporter</name>
        <figure anchor="reporter-model">
          <name>Reporter Model</name>
          <artwork type="ascii-art"><![CDATA[
reporter-datum = {
  serial: tstr,
  ? make: tstr,
  ? model: tstr,
  ? ip_addr: tstr / #6.52 / #6.54,
  * &(tstr, int) => any
}
]]></artwork>
        </figure>
      </section>
      <section anchor="finder-status">
        <name>Finder Status</name>
        <figure anchor="status-model">
          <name>Status Model</name>
          <artwork type="ascii-art"><![CDATA[
status-datum = {
  ? last_detect_time: tdate / time,
  * &(tstr, int) => any
}
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
