rfc9434v4.txt | rfc9434.txt | |||
---|---|---|---|---|
skipping to change at line 820 ¶ | skipping to change at line 820 ¶ | |||
RID or Network RID. The EASA initially specified Broadcast RID for | RID or Network RID. The EASA initially specified Broadcast RID for | |||
essentially all UAS and is now also considering Network RID. The FAA | essentially all UAS and is now also considering Network RID. The FAA | |||
UAS RID Final Rules [FAA_RID] permit only Broadcast RID for rule | UAS RID Final Rules [FAA_RID] permit only Broadcast RID for rule | |||
compliance but still encourage Network RID for complementary | compliance but still encourage Network RID for complementary | |||
functionality, especially in support of UTM. | functionality, especially in support of UTM. | |||
One opportunity is to enhance the architecture with gateways from | One opportunity is to enhance the architecture with gateways from | |||
Broadcast RID to Network RID. This provides the best of both and | Broadcast RID to Network RID. This provides the best of both and | |||
gives regulators and operators flexibility. It offers advantages | gives regulators and operators flexibility. It offers advantages | |||
over either form of UAS RID alone, i.e., greater fidelity than | over either form of UAS RID alone, i.e., greater fidelity than | |||
Network RID reporting of planned area operations, surveillance of | Network RID reporting of [FAA_RID] planned area operations, together | |||
areas too large for local direct visual observation, and direct Radio | with surveillance of areas too large for local direct visual | |||
Frequency Line Of Sight (RF-LOS) link-based Broadcast RID (e.g., a | observation and direct Radio Frequency Line Of Sight (RF-LOS) link- | |||
city or a national forest). | based Broadcast RID (e.g., a city or a national forest). | |||
These gateways could be pre-positioned (e.g., around airports, public | These gateways could be pre-positioned (e.g., around airports, public | |||
gatherings, and other sensitive areas) and/or crowdsourced (as | gatherings, and other sensitive areas) and/or crowdsourced (as | |||
nothing more than a smartphone with a suitable app is needed). | nothing more than a smartphone with a suitable app is needed). | |||
Crowdsourcing can be encouraged by quid pro quo, providing CS-RID | Crowdsourcing can be encouraged by quid pro quo, providing CS-RID | |||
Surveillance Supplemental Data Service Provider (SDSP) outputs only | Surveillance Supplemental Data Service Provider (SDSP) outputs only | |||
to CS-RID Finders. As Broadcast RID media have a limited range, | to CS-RID Finders. As Broadcast RID media have a limited range, | |||
gateways receiving messages claiming locations far from the gateway | messages claiming sender (typically UA) locations far from a physical | |||
can alert authorities or a Surveillance SDSP to the failed sanity | layer receiver thereof ("Finder" below, typically Observer device) | |||
check possibly indicating intent to deceive. CS-RID SDSPs can use | should arouse suspicion of possible intent to deceive; a fast and | |||
messages with precise date/time/position stamps from the gateways to | computationally inexpensive consistency check can be performed (by | |||
multilaterate UA locations, independent of the locations claimed in | the Finder or the Surveillance SDSP) on application layer data | |||
the messages, which are entirely self-reported by the operator in UAS | present in the gateway (claimed UA location vs physical receiver | |||
RID and UTM, and thus are subject not only to natural time lag and | location), and authorities can be alerted to failed checks. CS-RID | |||
error but also operator misconfiguration or intentional deception. | SDSPs can use messages with precise date/time/position stamps from | |||
the gateways to multilaterate UA locations, independent of the | ||||
locations claimed in the messages, which are entirely self-reported | ||||
by the operator in UAS RID and UTM, and thus are subject not only to | ||||
natural time lag and error but also operator misconfiguration or | ||||
intentional deception. | ||||
Multilateration technologies use physical layer information, such as | Multilateration technologies use physical layer information, such as | |||
precise Time Of Arrival (TOA) of transmissions from mobile | precise Time Of Arrival (TOA) of transmissions from mobile | |||
transmitters at receivers with a priori precisely known locations, to | transmitters at receivers with a priori precisely known locations, to | |||
estimate the locations of the mobile transmitters. | estimate the locations of the mobile transmitters. | |||
Further, gateways with additional sensors (e.g., smartphones with | Further, gateways with additional sensors (e.g., smartphones with | |||
cameras) can provide independent information on the UA type and size, | cameras) can provide independent information on the UA type and size, | |||
confirming or refuting those claims made in the UAS RID messages. | confirming or refuting those claims made in the UAS RID messages. | |||
skipping to change at line 1000 ¶ | skipping to change at line 1005 ¶ | |||
receiver. Thus, it is pointless to attempt to provide relief from | receiver. Thus, it is pointless to attempt to provide relief from | |||
DoS attacks, as there is always the ultimate RF jamming attack. | DoS attacks, as there is always the ultimate RF jamming attack. | |||
Also, DoS may be attempted with spoofing/replay attacks; for which, | Also, DoS may be attempted with spoofing/replay attacks; for which, | |||
see Section 9.4. | see Section 9.4. | |||
9.4. Spoofing & Replay Protection | 9.4. Spoofing & Replay Protection | |||
As noted in Section 5, spoofing is combatted by the intrinsic self- | As noted in Section 5, spoofing is combatted by the intrinsic self- | |||
attesting properties of HHITs, plus their registration. Also, as | attesting properties of HHITs, plus their registration. Also, as | |||
noted in Section 5, to combat replay attacks, a receiver MUST NOT | noted in Section 5, to combat replay attacks, a receiver MUST NOT | |||
trust an observed UA that is identified in the Basic ID message | trust any claims nominally received from an observed UA (not even the | |||
(i.e., possesses the corresponding private key) until it receives a | Basic ID message purportedly identifying that UA) until the receiver | |||
verifies that the private key used to sign those claims is trusted, | ||||
that the sender actually possesses that key, and that the sender | ||||
appears indeed to be that observed UA. This requires receiving a | ||||
complete chain of endorsement links from a root of trust to the UA's | complete chain of endorsement links from a root of trust to the UA's | |||
leaf DET, plus a signed message containing frequently changing and | leaf DET, plus a message containing suitable nonce-like data signed | |||
unpredictable but sanity-checkable data (e.g., a Location/Vector | with the private key corresponding to that DET, and verifying all the | |||
message), and verifies all the foregoing. | foregoing. The term "nonce-like" describes data that is readily | |||
available to the prover and the verifier, changes frequently, is not | ||||
predictable by the prover, and can be checked quickly at low | ||||
computational cost by the verifier; a Location/Vector message is an | ||||
obvious choice. | ||||
9.5. Timestamps & Time Sources | 9.5. Timestamps & Time Sources | |||
Section 6 and, more fundamentally, Section 3.3 both require | Section 6 and, more fundamentally, Section 3.3 both require | |||
timestamps. In Broadcast RID messages, [F3411-22a] specifies both | timestamps. In Broadcast RID messages, [F3411-22a] specifies both | |||
32-bit Unix-style UTC timestamps (seconds since midnight going into | 32-bit Unix-style UTC timestamps (seconds since midnight going into | |||
the 1st day of 2019, rather than 1970) and 16-bit relative timestamps | the 1st day of 2019, rather than 1970) and 16-bit relative timestamps | |||
(tenths of seconds since the start of the most recent hour or other | (tenths of seconds since the start of the most recent hour or other | |||
specified event). [F3411-22a] requires that 16-bit timestamp | specified event). [F3411-22a] requires that 16-bit timestamp | |||
accuracy, relative to the time of applicability of the data being | accuracy, relative to the time of applicability of the data being | |||
skipping to change at line 1117 ¶ | skipping to change at line 1129 ¶ | |||
Wiethuechter, A., Ed., Card, S., and R. Moskowitz, "DRIP | Wiethuechter, A., Ed., Card, S., and R. Moskowitz, "DRIP | |||
Entity Tag Authentication Formats & Protocols for | Entity Tag Authentication Formats & Protocols for | |||
Broadcast Remote ID", Work in Progress, Internet-Draft, | Broadcast Remote ID", Work in Progress, Internet-Draft, | |||
draft-ietf-drip-auth-30, 28 March 2023, | draft-ietf-drip-auth-30, 28 March 2023, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-drip- | <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | |||
auth-30>. | auth-30>. | |||
[DRIP-REGISTRIES] | [DRIP-REGISTRIES] | |||
Wiethuechter, A. and J. Reid, "DRIP Entity Tag (DET) | Wiethuechter, A. and J. Reid, "DRIP Entity Tag (DET) | |||
Identity Management Architecture", Work in Progress, | Identity Management Architecture", Work in Progress, | |||
Internet-Draft, draft-ietf-drip-registries-11, 30 June | Internet-Draft, draft-ietf-drip-registries-12, 10 July | |||
2023, <https://datatracker.ietf.org/doc/html/draft-ietf- | 2023, <https://datatracker.ietf.org/doc/html/draft-ietf- | |||
drip-registries-11>. | drip-registries-12>. | |||
[F3411-19] ASTM International, "Standard Specification for Remote ID | [F3411-19] ASTM International, "Standard Specification for Remote ID | |||
and Tracking", ASTM F3411-19, DOI 10.1520/F3411-19, May | and Tracking", ASTM F3411-19, DOI 10.1520/F3411-19, May | |||
2022, <https://www.astm.org/f3411-19.html>. | 2022, <https://www.astm.org/f3411-19.html>. | |||
[F3586-22] ASTM International, "Standard Practice for Remote ID Means | [F3586-22] ASTM International, "Standard Practice for Remote ID Means | |||
of Compliance to Federal Aviation Administration | of Compliance to Federal Aviation Administration | |||
Regulation 14 CFR Part 89", ASTM F3586-22, | Regulation 14 CFR Part 89", ASTM F3586-22, | |||
DOI 10.1520/F3586-22, July 2022, | DOI 10.1520/F3586-22, July 2022, | |||
<https://www.astm.org/f3586-22.html>. | <https://www.astm.org/f3586-22.html>. | |||
End of changes. 6 change blocks. | ||||
19 lines changed or deleted | 31 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |