Skip to content
8a · Local Broadcast & Messaging

Local Broadcast and Messaging

Andi Lamprecht Andi Lamprecht ·· 10 min read· Draft
The RF/transport companion to Disconnected Operations. Disconnected Operations answers “how does verification still hold without internet” (capsule, trust hierarchy, time, reconciliation). This page answers “how do the bits get from drone to verifier” — channels, message formats, fragmentation, Pack scheduling, sideband. Regulatory/compliance framing for the same bits lives in Remote ID Standards Compatibility.

1. Scope and Audience

This page is for RF engineers, embedded developers, and verifier-app implementers. It assumes the reader has already loaded the capsule onto the aircraft per Disconnected Operations §4 and is now asking “what exactly goes on the wire?”

The conceptual story — why capsules are pre-signed, how time tampering is mitigated, how verification still works — stays in Disconnected Operations. The standards-compliance argument (does this fit Part 89 / F3411 / F3586?) stays in Remote ID Standards Compatibility.

2. Coexistence with Regulatory Remote ID

Many drones already broadcast over Bluetooth or Wi-Fi to comply with ASTM F3411 / FAA Remote ID rules. ATOMx is layered on top of, not in place of, the regulatory broadcast.

The aircraft transmits the standard Remote ID message set unchanged: Basic ID, Location/Vector, Self-ID, System, Operator ID. Receivers without ATOMx awareness see this and behave exactly as they do today.

ATOMx-specific data is carried inside the Authentication Message (F3411 Message Type 0x2). The 4-bit Authentication Type field has explicit “Available for Private Use” codes (0xA–0xF) that F3411 §5.4.5.11 reserves for custom attestation. ATOMx uses one of those (registry path discussed in Remote ID Standards Compatibility §6). ATOMx-aware receivers parse the payload; ATOMx-unaware receivers treat the Authentication Message as an unknown sub-type and ignore it. Backwards-compatible by construction.

3. Broadcast Channels

ChannelRangePer-PDU SizeRole
Bluetooth 5 LE Long Range (Coded PHY)~1 km LOSup to ~255 B per advertising PDU; Message Packs carry up to 9 blocksPrimary broadcast; low power; broad receiver support
Bluetooth 4 Legacy Advertising~100–300 m25 B per advert (one F3411 block)Compatibility fallback for older receivers
Wi-Fi NaN (Neighbor Awareness Networking)~1 km LOSlarger frames; Message Packs supportedHigher payload, complementary to BT
Wi-Fi Direct (peer sideband)~100 mfull TCP/UDP sessionOptional point-to-point channel for full capsule retrieval on demand

Channel-selection priority is currently a runtime decision per aircraft capability — see Open Questions for the formal selection ladder.

4. The Authentication Message Envelope

4.1 Block Structure (F3411 §5.4.5.9–5.4.5.15)

Every F3411 broadcast message is a 25-byte block: 1 byte of header + 24 bytes of body. The Authentication Message is a sequence of such blocks called pages, all sharing the same Message Counter (§5.4.4.2, BUR0060).

Page 0 layout (F3411 Table 8):

Byte(s)FieldWidthNotes
0Header1 BMessage Type (4 bits = 0x2) + Protocol Version (4 bits = 0x2)
1AuthType / PageNumber1 BAuthType (4 bits = ATOMx private-use code) + PageNumber (4 bits = 0x0)
2LastPageIndex1 B0x0–0xF — index of the final page (max 16 pages total)
2 (cont.)Length1 Buint8 — total bytes of concatenated Auth Data across all pages (cap 255)
3–6Timestamp4 BUnix epoch seconds since 2019-01-01
7–23Auth Data17 BOpaque ATOMx payload — page 0 carries 17 bytes

Pages 1–15 layout (F3411 Table 9):

Byte(s)FieldWidthNotes
0Header1 BSame as page 0
1AuthType / PageNumber1 BAuthType + PageNumber (0x1–0xF)
2–24Auth Data23 BOpaque ATOMx payload — pages 1+ carry 23 bytes each

Maximum capacity: 17 + 15 × 23 = 362 bytes total — but the on-the-wire Length field is a uint8 capped at 255 bytes. F3411 explicitly notes that data beyond the 255-byte Length limit may be sent on additional pages up to LastPageIndex, but this is a rarely-used corner of the spec.

4.2 ATOMx Payload Fragmentation

ATOMx’s ≈140-byte attestation (composition table below) fragments cleanly across 7 pages:

    flowchart LR
    P0["Page 0<br/>17 B payload<br/>+ timestamp"] --> P1["Page 1<br/>23 B"]
    P1 --> P2["Page 2<br/>23 B"]
    P2 --> P3["Page 3<br/>23 B"]
    P3 --> P4["Page 4<br/>23 B"]
    P4 --> P5["Page 5<br/>23 B"]
    P5 --> P6["Page 6<br/>23 B"]
    P6 --> Done["155 B capacity<br/>≈140 B used"]
    classDef pg fill:#fef3c7,stroke:#b45309,color:#7c2d12
    class P0,P1,P2,P3,P4,P5,P6 pg
  

Capacity used: 17 + 6 × 23 = 155 bytes. ATOMx attestation: ≈140 bytes. Slack: ~15 bytes — enough for minor format growth without slipping into an 8th page.

4.3 Reassembly Rules

  • All pages in a single Authentication Message share the same Message Counter (BUR0060).
  • Pages may arrive out of order. Receivers reassemble by PageNumber up to LastPageIndex, then validate the concatenated Auth Data against ATOMx’s payload schema.
  • Page 0 is mandatory — it carries the Timestamp and the LastPageIndex. A receiver that misses Page 0 cannot determine total length and must wait for the next broadcast cycle.
  • A missing intermediate page invalidates the whole attestation; receivers do not act on partial payloads.

5. ATOMx Payload Composition

Note

The over-the-air payload is not the full Offline Capsule. The capsule (≈3–5 KB) does not fit in the Remote ID Authentication Message. What broadcasts is a compact attestation that points back at the capsule by hash. The full capsule travels through a different path: pre-distributed to authority devices, fetched on demand over Wi-Fi Direct sideband, or shared mesh-to-mesh.

Broadcast FieldSizeRole
ASTM Basic ID, Location, Vector, Self-ID, System, Operator IDper specStandard regulatory Remote ID telemetry
ATOMx Authentication Type marker1 BTags this Authentication Message as ATOMx-format
ATOMx Public Aircraft Token16 BAuthorization-bound identifier
Capsule hash32 BPointer to full Offline Capsule
Validity window (start, end)16 BTime-bound replay protection
Aircraft signature segment (rotating nonce)64 BLive proof aircraft holds the secure-element private key
Manufacturer CA fingerprint8 BHint for cert-chain lookup
Protected Mission Mode flag1 BHint that public detail is generalized
Capsule retrieval hint (URL / mesh peer / cached)optionalWhere to obtain full capsule
Total ATOMx extension payload≈ 140 B + retrieval hintFits in 7 Auth pages (155 B capacity)

6. Message Pack Scheduling

On Bluetooth 5 LE Long Range and Wi-Fi Beacon, F3411 bundles up to 9 blocks into a Message Pack (Message Type 0xF, §5.4.7). Each multi-page Auth Message page counts as one block toward the 9-cap.

ATOMx (7 Auth pages) + the Part 89 mandatory set (Basic ID, Location/Vector, System) = 10 blocks — one over the cap. The full reasoning, the 9-block cap citation (BB50120), and the alternating-Pack mitigation diagrams live in Remote ID Standards Compatibility §5.1.

On Bluetooth Legacy 4.x, Packs don’t apply — each advertisement carries one 25-byte block. Auth pages are interleaved with required messages over time at the static refresh rate ([BcMinStaticRefreshRate], F3411 Annex A3).

7. Sideband Channel (Wi-Fi Direct)

When a verifier observes a broadcast but does not have the matching capsule cached, the verifier may fetch it directly from the aircraft over Wi-Fi Direct.

    flowchart LR
    subgraph A["Aircraft"]
        SE[Secure Element<br/>identity key + capsule]
    end
    A -->|BT / Wi-Fi NaN<br/>Authentication Message| Att[/Compact Attestation/]
    Att --> Verifier[Authority Field Device]
    Verifier -->|cache hit| Verify[Local Verify]
    Verifier -.cache miss.-> Side[Wi-Fi Direct<br/>sideband request]
    Side <-->|capsule| A
    Side --> Verify
  

7.1 Mutual Authentication

The Wi-Fi Direct sideband is mutually authenticated:

DirectionAuthentication
Verifier → AircraftVerifier presents its managed-device certificate; aircraft validates the chain to ATOMx Root and confirms the device is enrolled in an authority MDM
Aircraft → VerifierAircraft signs its capsule-response with its hardware-bound key; verifier validates against the aircraft cert chain

Aircraft refuses sideband requests from devices that do not present an enrolled authority device certificate. This prevents a hostile peer from harvesting capsules — the protected claims inside would still be envelope-encrypted, but defense-in-depth keeps the encrypted blob away from unauthorized peers entirely.

7.2 Retrieval Methods Compared

MethodWhenProsCons
Pre-distributed cacheAuthority device synced capsules for its jurisdiction before going offlineFastest, fully offlineRequires forward scheduling
Sideband fetch (Wi-Fi Direct)Authority device encounters an unfamiliar tokenWorks for unscheduled encountersRequires proximity and aircraft cooperation
Mesh peer shareMultiple authority devices in proximity exchange cachesReduces sync gaps in the fieldRequires mesh feature on the device app
Deferred verificationCapsule unavailable; verifier records broadcastAlways possibleYields only “Not Publicly Verifiable” state until reconciled — see §9 below

8. Multi-Aircraft RF

A single field verifier may observe many aircraft simultaneously — a sUAS swarm, an airshow, a wildfire-response operation.

ConcernHandling
RF channel contentionBT5 LE Long Range and Wi-Fi NaN both use slotted advertising; collisions are tolerable at typical airspace densities (≤ 100 aircraft within 1 km). Higher densities degrade gracefully — verifiers see fewer broadcasts per second per aircraft, not lost broadcasts.
Capsule-cache lookupPer-token hash lookup is O(1); a verifier with 1000 capsules cached can resolve any observed token in microseconds
Display saturationVerifier UI applies clustering at high density; trust state aggregates across the cluster (e.g., “12 aircraft in cluster, all L4+”)
DisambiguationPublic Aircraft Token + position is sufficient even when 50 aircraft are in proximity; the airspace-officer UI presents one row per token
Sideband fetchWi-Fi Direct sideband is point-to-point; high-density environments rate-limit cache-miss fetches. Mesh peer share reduces cache-miss pressure.

9. Mid-Flight Amendment Delivery and Deferred Verification

9.1 Mid-Flight Amendments

A flight underway in disconnected mode may receive an amendment (TFR pop-up, jurisdiction state change, authority instruction). Delivery paths in priority order:

  1. Operator app sideband — if the pilot’s phone has any cellular signal at any moment, ATOMx pushes the amendment; phone relays to controller relays to aircraft
  2. Direct cellular — if the aircraft has its own modem and is in coverage
  3. Authority field-device sideband — an authorized verifier within range can push an amendment via Wi-Fi Direct after authenticating
  4. Best-effort, not-acknowledged — if none of the above succeed, ATOMx records the amendment as issued-but-not-acknowledged; the conformance engine evaluates the original package on the aircraft side and flags any post-flight divergence in reconciliation

Mid-flight amendments are an open question for fully air-gapped environments; the current model gracefully degrades rather than fails. See Origins §9.

9.2 Deferred Verification (Cache-Miss Fallback)

When a verifier observes a broadcast and has neither the capsule cached nor a way to fetch it (sideband fails, no peer in range):

Verifier StateVisible Operator Surface
Token observed; no capsule“Not Publicly Verifiable” public state
Broadcast capturedStored locally; reconciliation candidate
Identity Trust stateCannot be determined — neither Trusted nor Untrusted
Authority operational viewShows “deferred” tag with capture timestamp and observed token

When the verifier reaches connectivity, captured broadcasts are reconciled — ATOMx returns the matching capsule and the verifier retroactively renders the historical operational view. Deferred verification does not retroactively change the public state operators saw at the time, but it does enable post-event review.

10. Open Questions

#QuestionOwnerADR?Blocking?
1ATOMx Authentication Type code registration — registry path with ASTM F38 (Annex A5 Specific Authentication Method Type vs private-use 0xA–0xF). See Remote ID Standards Compatibility §5.3.Standards-externalNoYes
2Broadcast cadence default — What is the default attestation broadcast rate (e.g., 1 Hz, 2 Hz) and how does it adapt under density / battery / time-degraded states? ADR: “Attestation Broadcast Cadence and Adaptive Backoff.”EngineeringYesNo
3Channel selection logic (BT4 / BT5 LE Long Range / Wi-Fi NaN) — Runtime priority and fallback ladder when an aircraft supports multiple radios. ADR: “Disconnected Broadcast Channel Selection.”EngineeringYesNo
4Wi-Fi Direct sideband protocol details — Framing, transport (TCP/UDP/QUIC), session lifetime, mutual-auth handshake. ADR: “Wi-Fi Direct Capsule Sideband Protocol.”EngineeringYesYes
5Multi-aircraft RF collision avoidance — Above ~100 aircraft/km the slotted-advertising assumption degrades. Coordination scheme (TDMA hint, jurisdictional channel partition) for swarm / airshow density?EngineeringYesNo
6Mesh peer-share protocol — How authority field devices discover each other, authenticate, and exchange capsule caches without leaking protected claims. ADR: “Authority Mesh Peer-Share.”EngineeringYesNo
7Deferred-verification UI rendering — Visual treatment of “Not Publicly Verifiable”, allowed operator actions, captured-broadcast retention, retroactive-update affordance after reconciliation.ProductNoNo
8Mid-flight amendment ACK over offline channel — Authority-pushed amendments via Wi-Fi Direct (§9.1 path 3) need an acknowledgement back to ATOMx eventually; receipt format and relay ownership.EngineeringYesNo
9Payload shrink to fit one Pack — Can ATOMx attestation drop ≤14 B to fit 6 Auth pages, allowing all 10 → 9 blocks in a single Message Pack? Worth a hard look at format finalization.EngineeringYesNo

11. Cross-References

Last updated on