ABSTRACT

This chapter describes the Unmanned Traffic Management (UTM) participants, including UAS operators, UAS Service Suppliers (USS), Supplemental Data Service Providers, Air Navigation Service Providers, Civil Aviation Authorities, and other participants and stakeholders; it also describes data and data exchanges necessary for safe and secure UAS operations. The scope and characterization of possible UTM services are described, to include, in part, registration, discovery, strategic coordination, conformance monitoring, constraint management, UAS remote identification, and associated security services. Because Unmanned Traffic Management harbors a heightened attack surface from its developing federated infrastructure, due attention is given to cybersecurity standards development, secure operations, and awareness. Discovery is described and various approaches to implementation are explained. The scope and characterization of possible UTM services are described, to include, in part, registration, discovery, strategic coordination, conformance monitoring, constraint management, UAS remote identification, and associated security services.