draft-moskowitz-drip-efficient-a2g-comm-01.txt | draft-moskowitz-drip-efficient-a2g-comm-02.txt | |||
---|---|---|---|---|
DRIP R. Moskowitz | DRIP R. Moskowitz | |||
Internet-Draft HTT Consulting | Internet-Draft HTT Consulting | |||
Intended status: Standards Track S. Card | Intended status: Standards Track S. Card | |||
Expires: 31 March 2024 AX Enterprize | Expires: 27 September 2024 AX Enterprize | |||
A. Gurtov | A. Gurtov | |||
Linköping University | Linköping University | |||
28 September 2023 | 26 March 2024 | |||
Efficient Air-Ground Communications | Efficient Air-Ground Communications | |||
draft-moskowitz-drip-efficient-a2g-comm-01 | draft-moskowitz-drip-efficient-a2g-comm-02 | |||
Abstract | Abstract | |||
This document defines protocols to provide efficient air-ground | This document defines protocols to provide efficient air-ground | |||
communications without associated need for aircraft to maintain | communications without associated need for aircraft to maintain | |||
stateful connection to ground-tower infrastructure. Instead, a | stateful connection to any tower infrastructure. Instead, a secure | |||
secure source-routed ground infrastructure will not only provide the | source-routed ground infrastructure will not only provide the needed | |||
needed routing intelligence, but also reliable packet delivery | routing intelligence, but also reliable packet delivery through | |||
through inclusion of Automatic Repeat reQuest (ARQ) and Forward Error | inclusion of Automatic Repeat reQuest (ARQ) and Forward Error | |||
Correction (FEC) to address both reliable wireless packet delivery, | Correction (FEC) protocols to address both reliable wireless packet | |||
and assured terrestrial packet delivery. | delivery, and assured terrestrial packet delivery. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on 31 March 2024. | This Internet-Draft will expire on 27 September 2024. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
extracted from this document must include Revised BSD License text as | extracted from this document must include Revised BSD License text as | |||
described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
skipping to change at page 2, line 35 ¶ | skipping to change at page 2, line 35 ¶ | |||
4.4. Improved uplink reliability . . . . . . . . . . . . . . . 7 | 4.4. Improved uplink reliability . . . . . . . . . . . . . . . 7 | |||
4.5. Alternative dedicated Tower-GS tunneling . . . . . . . . 8 | 4.5. Alternative dedicated Tower-GS tunneling . . . . . . . . 8 | |||
5. Aircraft to GS Messaging . . . . . . . . . . . . . . . . . . 8 | 5. Aircraft to GS Messaging . . . . . . . . . . . . . . . . . . 8 | |||
5.1. The Tower to GS tunnel . . . . . . . . . . . . . . . . . 10 | 5.1. The Tower to GS tunnel . . . . . . . . . . . . . . . . . 10 | |||
6. GS to Aircraft Messaging . . . . . . . . . . . . . . . . . . 11 | 6. GS to Aircraft Messaging . . . . . . . . . . . . . . . . . . 11 | |||
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 | |||
8. Security Considerations . . . . . . . . . . . . . . . . . . . 12 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 12 | |||
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
9.1. Normative References . . . . . . . . . . . . . . . . . . 12 | 9.1. Normative References . . . . . . . . . . . . . . . . . . 12 | |||
9.2. Informative References . . . . . . . . . . . . . . . . . 12 | 9.2. Informative References . . . . . . . . . . . . . . . . . 12 | |||
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 13 | Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
1. Introduction | 1. Introduction | |||
The goal of this design approach is to place minimal network | The goal of this design approach is to place minimal network | |||
intelligence in the aircraft and even the wireless towers. | intelligence in the aircraft and even the wireless towers. | |||
Practically all the networking intelligence is placed within the | Practically all the networking intelligence is placed within the | |||
Ground Station (GS). The justification for this approach is | Ground Station (GS). The target application is uncrewed aircraft | |||
intelligence in the aircraft has disproportional costs to that in the | communications, but could equally applied to all aircraft. | |||
GS; there are many factors in this claim. Lower intelligence | ||||
requirements in the towers will make the technology more attractive | The justification for this approach is intelligence in the aircraft | |||
to tower owners, provided there is an associated functional payment | has disproportional costs to that in the GS; there are many factors | |||
mechanism for them for the service. | in this claim. Lower intelligence requirements in the towers will | |||
make the technology more attractive to tower owners, provided there | ||||
is an associated functional payment mechanism for them for the | ||||
service. | ||||
The wireless downlink from the aircraft is treated as a broadcast | The wireless downlink from the aircraft is treated as a broadcast | |||
message, with every receiving tower forwarding messages to the GS. | message, with every receiving tower forwarding messages to the GS. | |||
The GS, in turns, notes which towers are in contact with the aircraft | The GS, in turns, notes which towers are in contact with the aircraft | |||
and sends uplink messages through them to the aircraft. There is no | and sends uplink messages through them to the aircraft. There is no | |||
need for complex aircraft/tower connection technologies. At most, | need for complex aircraft/tower connection technologies. At most, | |||
for billing purposes, the towers are aware of aircraft and GS that | for billing purposes, the towers are aware of aircraft and GS that | |||
will use their connectivity services via their source IP addresses. | will use their connectivity services via their source IP addresses. | |||
2. Terms and Definitions | 2. Terms and Definitions | |||
skipping to change at page 3, line 38 ¶ | skipping to change at page 3, line 42 ¶ | |||
3.1. Enabling Requirements | 3.1. Enabling Requirements | |||
The aircraft: | The aircraft: | |||
* Support end-to-end secure communications with the GS and start the | * Support end-to-end secure communications with the GS and start the | |||
operation with the pre-configured GS IP address. The aircraft | operation with the pre-configured GS IP address. The aircraft | |||
sends the first message, to the GS, to establish the routing | sends the first message, to the GS, to establish the routing | |||
knowledge in the GS, | knowledge in the GS, | |||
* use a fixed IP address for itself for the duration of the | * Use a fixed IP address for itself for the duration of the | |||
operation, and | operation, and | |||
* be able to process multiple copies of messages from the GS, | * be able to process multiple copies of messages from the GS, | |||
received potentially from multiple towers. | received potentially from multiple towers. | |||
The tower: | The tower: | |||
* Support digital signing of messages from the aircraft, and the | * Support digital signing of messages from the aircraft, and the | |||
tower’s IP address, and forward these objects to the GS. | tower’s IP address, and forward these objects to the GS. | |||
skipping to change at page 4, line 4 ¶ | skipping to change at page 4, line 8 ¶ | |||
received potentially from multiple towers. | received potentially from multiple towers. | |||
The tower: | The tower: | |||
* Support digital signing of messages from the aircraft, and the | * Support digital signing of messages from the aircraft, and the | |||
tower’s IP address, and forward these objects to the GS. | tower’s IP address, and forward these objects to the GS. | |||
The GS: | The GS: | |||
* Support end-to-end secure communications with the aircraft, | * Support end-to-end secure communications with the aircraft, | |||
* support processing multiple copies of messages from the aircraft, | * support processing multiple copies of messages from the aircraft, | |||
* support digital signing by the tower, and | * support digital signing by the tower, and | |||
* maintain a list/map of towers forwarding aircraft messages from | * maintain a list/map of towers forwarding aircraft messages from | |||
the aircraft for messaging to the aircraft. The list of trusted | the aircraft for messaging to the aircraft. The list of trusted | |||
tower IP addresses is constructed from within the tower signed | tower IP addresses is constructed from within the tower signed | |||
objects. | objects. | |||
3.2. Enhancing Security Requirement | 3.2. Enhancing Security Requirement | |||
The GS should: | The GS should: | |||
* Support digital signing for the tower to trust messages from the | * Support digital signing for the tower to trust messages from the | |||
GS. | GS. | |||
3.3. Enhancing Performance Requirements | 3.3. Enhancing Performance Requirements | |||
The aircraft may: | The aircraft may: | |||
* Support uplink usage optimizations like FEC and ARQ, and | * Support uplink usage optimizations like FEC and ARQ (e.g., NORM | |||
[RFC5740]), and | ||||
* support GS IP address mobility (e.g. via HIP, [RFC7401]). | * support GS IP address mobility (e.g. via HIP, [RFC7401]). | |||
The tower may: | The tower may: | |||
* Include information like timestamp and its GPS-derived location | * Include information like timestamp and its GPS-derived location | |||
(and accuracy of same) in the signed object delivered to the GS, | (and accuracy of same) in the signed object delivered to the GS, | |||
* may be IP address mobile, if so, then MUST provide its IP address | * may be IP address mobile, if so, then MUST provide its IP address | |||
within the signed object, | within the signed object, | |||
* support multicast and DETNET (rfc8938) for efficient and reliable | * support multicast and DETNET [RFC8938] for efficient and reliable | |||
communications with the GS, and | communications with the GS, and | |||
* use a subscription model to filter messages supported for | * use a subscription model to filter messages supported for | |||
forwarding. If done with a list of registered IP addresses it | forwarding. If done with a list of registered IP addresses it | |||
MUST support GS IP address mobility. | MUST support GS IP address mobility. | |||
The GS may: | The GS may: | |||
* Support intelligent operation routing and tower contact | * Support intelligent operation routing and tower contact | |||
information to select towers to use to send messages to the | information to select towers to use to send messages to the | |||
skipping to change at page 5, line 4 ¶ | skipping to change at page 5, line 10 ¶ | |||
forwarding. If done with a list of registered IP addresses it | forwarding. If done with a list of registered IP addresses it | |||
MUST support GS IP address mobility. | MUST support GS IP address mobility. | |||
The GS may: | The GS may: | |||
* Support intelligent operation routing and tower contact | * Support intelligent operation routing and tower contact | |||
information to select towers to use to send messages to the | information to select towers to use to send messages to the | |||
aircraft, | aircraft, | |||
* support tower subscription for tower communication filtering, | * support tower subscription for tower communication filtering, | |||
* support multicast and DETNET for efficient communications with the | * support multicast and DETNET for efficient communications with the | |||
towers,and | towers,and | |||
* support FEC and ARQ for efficient use of uplinks to the aircraft. | * support FEC and ARQ for efficient use of uplinks to the aircraft. | |||
4. Background Discussion | 4. Background Discussion | |||
The following considers the possible technologies, some challenges, | The following considers the possible technologies, some challenges, | |||
and final proposed solution. | and final proposed solution. | |||
4.1. The problem and simple solution using IPnIP | 4.1. The problem and simple solution using IPnIP | |||
Internet Protocol (IP) transmissions from the aircraft to ground, | Internet Protocol (IP) transmissions from the aircraft to ground, | |||
though unicast in construction (i.e. IP destination/source paired), | though unicast in construction (i.e. IP destination/source paired), | |||
are really broadcasts, as a practical matter, to all available ground | are really broadcasts, as a practical matter, to all available | |||
towers. Such towers can simply send the packets on their way and | towers. Such towers can simply send the packets on their way and | |||
they will naturally get routed, i.e. relayed, to the GS which | they will naturally get routed, i.e. relayed, to the GS which | |||
correspondingly simply recognizes and processes potential multiple | correspondingly simply recognizes and processes potential multiple | |||
receipts via the many relaying towers. The problem is only the | receipts via the many relaying towers. The problem is only the | |||
uplink: how to get IP transmissions from the GS to the aircraft. | uplink: how to get IP transmissions from the GS to the aircraft. | |||
The GS needs to ‘know’ which towers can likely transmit up to the | The GS needs to ‘know’ which towers can likely transmit up to the | |||
aircraft and how to route packets through them. A simple solution is | aircraft and how to route packets through them. A simple solution is | |||
to use IP-in-IP (IPnIP) tunneling protocol [RFC1853]. Here, each | to use IP-in-IP (IPnIP) tunneling protocol [RFC1853]. Here, each | |||
receiving tower wraps the downlink message in IPnIP with the outer | receiving tower wraps the downlink message in IPnIP with the outer | |||
skipping to change at page 5, line 50 ¶ | skipping to change at page 6, line 8 ¶ | |||
Though this approach works, it has security and traffic management | Though this approach works, it has security and traffic management | |||
challenges. First and foremost, the aircraft must know the GS IP | challenges. First and foremost, the aircraft must know the GS IP | |||
address. It either needs to be fixed or the aircraft needs a | address. It either needs to be fixed or the aircraft needs a | |||
separate process to update its knowledge of the GS address. The GS | separate process to update its knowledge of the GS address. The GS | |||
should have the aircraft address prior to operation start or can | should have the aircraft address prior to operation start or can | |||
simply learn them through received messages. | simply learn them through received messages. | |||
There are two security issues associated with the GS processing | There are two security issues associated with the GS processing | |||
messages from any random aircraft address: | messages from any random aircraft address: | |||
* Either these addresses are preset (e.g. registered DET), or there | * either these addresses are preset (e.g. registered DET), or there | |||
is some process for the GS to dynamically learn which to trust. | is some process for the GS to dynamically learn which to trust. | |||
* A larger security challenge is why should the GS trust the address | * a larger security challenge is why should the GS trust the address | |||
for the towers as a route to the aircraft. A malicious source | for the towers as a route to the aircraft. A malicious source | |||
could provide bad tower addresses resulting in loss of aircraft | could provide bad tower addresses resulting in loss of aircraft | |||
contact at worst, or consumption, through DOS attacks, of both GS | contact at worst, or consumption, through DOS attacks, of both GS | |||
processing resources and tower uplink bandwidth. | processing resources and tower uplink bandwidth. | |||
An additional challenge for the GS is determining which set of towers | An additional challenge for the GS is determining which set of towers | |||
to use to send messages uplinked to the aircraft. Which of the | to use to send messages uplinked to the aircraft. Which of the | |||
towers last sending messages from the aircraft are still in RF reach | towers last sending messages from the aircraft are still in RF reach | |||
of the aircraft and are there now towers better able to message the | of the aircraft and are there now towers better able to message the | |||
aircraft? If the GS can trust the towers and know their GPS location | aircraft? If the GS can trust the towers and know their GPS location | |||
skipping to change at page 13, line 8 ¶ | skipping to change at page 13, line 8 ¶ | |||
[RFC9374] Moskowitz, R., Card, S., Wiethuechter, A., and A. Gurtov, | [RFC9374] Moskowitz, R., Card, S., Wiethuechter, A., and A. Gurtov, | |||
"DRIP Entity Tag (DET) for Unmanned Aircraft System Remote | "DRIP Entity Tag (DET) for Unmanned Aircraft System Remote | |||
ID (UAS RID)", RFC 9374, DOI 10.17487/RFC9374, March 2023, | ID (UAS RID)", RFC 9374, DOI 10.17487/RFC9374, March 2023, | |||
<https://www.rfc-editor.org/info/rfc9374>. | <https://www.rfc-editor.org/info/rfc9374>. | |||
9.2. Informative References | 9.2. Informative References | |||
[drip-a2x-adhoc-session] | [drip-a2x-adhoc-session] | |||
Moskowitz, R., Card, S. W., and A. Gurtov, "Aircraft to | Moskowitz, R., Card, S. W., and A. Gurtov, "Aircraft to | |||
Anything AdHoc Broadcasts and Session", Work in Progress, | Anything AdHoc Broadcasts and Session", Work in Progress, | |||
Internet-Draft, draft-moskowitz-drip-a2x-adhoc-session-02, | Internet-Draft, draft-moskowitz-drip-a2x-adhoc-session-03, | |||
23 July 2023, <https://datatracker.ietf.org/doc/html/ | 23 October 2023, <https://datatracker.ietf.org/doc/html/ | |||
draft-moskowitz-drip-a2x-adhoc-session-02>. | draft-moskowitz-drip-a2x-adhoc-session-03>. | |||
[drip-secure-nrid-c2] | [drip-secure-nrid-c2] | |||
Moskowitz, R., Card, S. W., Wiethuechter, A., and A. | Moskowitz, R., Card, S. W., Wiethuechter, A., and A. | |||
Gurtov, "Secure UAS Network RID and C2 Transport", Work in | Gurtov, "Secure UAS Network RID and C2 Transport", Work in | |||
Progress, Internet-Draft, draft-moskowitz-drip-secure- | Progress, Internet-Draft, draft-moskowitz-drip-secure- | |||
nrid-c2-13, 19 September 2023, | nrid-c2-14, 16 March 2024, | |||
<https://datatracker.ietf.org/doc/html/draft-moskowitz- | <https://datatracker.ietf.org/doc/html/draft-moskowitz- | |||
drip-secure-nrid-c2-13>. | drip-secure-nrid-c2-14>. | |||
[RFC1853] Simpson, W., "IP in IP Tunneling", RFC 1853, | [RFC1853] Simpson, W., "IP in IP Tunneling", RFC 1853, | |||
DOI 10.17487/RFC1853, October 1995, | DOI 10.17487/RFC1853, October 1995, | |||
<https://www.rfc-editor.org/info/rfc1853>. | <https://www.rfc-editor.org/info/rfc1853>. | |||
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | |||
RFC 4303, DOI 10.17487/RFC4303, December 2005, | RFC 4303, DOI 10.17487/RFC4303, December 2005, | |||
<https://www.rfc-editor.org/info/rfc4303>. | <https://www.rfc-editor.org/info/rfc4303>. | |||
[RFC5740] Adamson, B., Bormann, C., Handley, M., and J. Macker, | ||||
"NACK-Oriented Reliable Multicast (NORM) Transport | ||||
Protocol", RFC 5740, DOI 10.17487/RFC5740, November 2009, | ||||
<https://www.rfc-editor.org/info/rfc5740>. | ||||
[RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T. | [RFC7401] Moskowitz, R., Ed., Heer, T., Jokela, P., and T. | |||
Henderson, "Host Identity Protocol Version 2 (HIPv2)", | Henderson, "Host Identity Protocol Version 2 (HIPv2)", | |||
RFC 7401, DOI 10.17487/RFC7401, April 2015, | RFC 7401, DOI 10.17487/RFC7401, April 2015, | |||
<https://www.rfc-editor.org/info/rfc7401>. | <https://www.rfc-editor.org/info/rfc7401>. | |||
[RFC8152] Schaad, J., "CBOR Object Signing and Encryption (COSE)", | [RFC8152] Schaad, J., "CBOR Object Signing and Encryption (COSE)", | |||
RFC 8152, DOI 10.17487/RFC8152, July 2017, | RFC 8152, DOI 10.17487/RFC8152, July 2017, | |||
<https://www.rfc-editor.org/info/rfc8152>. | <https://www.rfc-editor.org/info/rfc8152>. | |||
[RFC8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC. | [RFC8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC. | |||
Zuniga, "SCHC: Generic Framework for Static Context Header | Zuniga, "SCHC: Generic Framework for Static Context Header | |||
Compression and Fragmentation", RFC 8724, | Compression and Fragmentation", RFC 8724, | |||
DOI 10.17487/RFC8724, April 2020, | DOI 10.17487/RFC8724, April 2020, | |||
<https://www.rfc-editor.org/info/rfc8724>. | <https://www.rfc-editor.org/info/rfc8724>. | |||
[RFC8938] Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S. | ||||
Bryant, "Deterministic Networking (DetNet) Data Plane | ||||
Framework", RFC 8938, DOI 10.17487/RFC8938, November 2020, | ||||
<https://www.rfc-editor.org/info/rfc8938>. | ||||
[RFC9147] Rescorla, E., Tschofenig, H., and N. Modadugu, "The | [RFC9147] Rescorla, E., Tschofenig, H., and N. Modadugu, "The | |||
Datagram Transport Layer Security (DTLS) Protocol Version | Datagram Transport Layer Security (DTLS) Protocol Version | |||
1.3", RFC 9147, DOI 10.17487/RFC9147, April 2022, | 1.3", RFC 9147, DOI 10.17487/RFC9147, April 2022, | |||
<https://www.rfc-editor.org/info/rfc9147>. | <https://www.rfc-editor.org/info/rfc9147>. | |||
Acknowledgments | Acknowledgments | |||
Adam Wiethuechter of AX Enterprize provided review and implementation | Adam Wiethuechter of AX Enterprize provided review and implementation | |||
insights. Michael Baum provided extensive review of the contents in | insights. Michael Baum provided extensive review of the contents in | |||
chapters 3 and 4 in a prior white paper. | chapters 3 and 4 in a prior white paper. | |||
End of changes. 21 change blocks. | ||||
29 lines changed or deleted | 45 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |