v0.3.0: Gap-to-Draft pipeline, Living Standards Observatory, blog series
Gap-to-Draft Pipeline (ietf pipeline): - Context builder assembles ideas, RFC foundations, similar drafts, ecosystem vision - Generator produces outlines + sections using rich context with Claude - Quality gates: novelty (embedding similarity), references, format, self-rating - Family coordinator generates 5-draft ecosystem (AEM/ATD/HITL/AEPB/APAE) - I-D formatter with proper headers, references, 72-char wrapping Living Standards Observatory (ietf observatory): - Source abstraction with IETF + W3C fetchers - 7-step update pipeline: snapshot, fetch, analyze, embed, ideas, gaps, record - Static GitHub Pages dashboard (explorer, gap tracker, timeline) - Weekly CI/CD automation via GitHub Actions Also includes: - 361 drafts (expanded from 260 with 6 new keywords), 403 authors, 1,262 ideas, 12 gaps - Blog series (8 posts planned), reports, arXiv paper figures - Agent team infrastructure (CLAUDE.md, scripts, dev journal) - 5 new DB tables, schema migration, ~15 new query methods Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -1,80 +1,629 @@
|
||||
# Gap Analysis: IETF AI/Agent Draft Landscape
|
||||
*Generated 2026-02-28 12:14 UTC — analyzing 260 drafts*
|
||||
*Generated 2026-03-03 19:58 UTC — analyzing 361 drafts, 1780 technical ideas*
|
||||
|
||||
### 1. Agent Resource Management
|
||||
**Severity:** CRITICAL
|
||||
**Category:** autonomous netops
|
||||
**Description:** No comprehensive framework for managing computational resources, memory, and processing power across distributed AI agents. Current drafts focus on communication but ignore how agents compete for and share limited resources in multi-agent environments.
|
||||
**Evidence:** Real deployments will face resource contention, but no drafts address scheduling, quotas, or fair allocation mechanisms
|
||||
## Overview
|
||||
|
||||
### 2. Agent Behavior Verification
|
||||
**Severity:** CRITICAL
|
||||
**Category:** AI safety/alignment
|
||||
**Description:** No mechanisms to verify that deployed agents actually behave according to their declared policies or specifications. Gap between stated capabilities and runtime behavior validation.
|
||||
**Evidence:** Only 36 safety drafts vs 260 total, and no mention of runtime behavior verification in technical ideas
|
||||
This report identifies **12 gaps** — areas, problems, or technical challenges not adequately addressed by the current 361 IETF AI/agent drafts. Each gap is cross-referenced with related drafts and extracted technical ideas to show partial coverage.
|
||||
|
||||
### 3. Agent Error Recovery and Rollback
|
||||
**Severity:** CRITICAL
|
||||
**Category:** autonomous netops
|
||||
**Description:** Missing standards for how agents handle and recover from errors, particularly cascading failures across agent networks. No rollback mechanisms for autonomous decisions gone wrong.
|
||||
**Evidence:** Autonomous operations imply unsupervised decisions, but no error recovery mechanisms identified
|
||||
| Severity | Count |
|
||||
|----------|------:|
|
||||
| **CRITICAL** | 3 |
|
||||
| **HIGH** | 6 |
|
||||
| **MEDIUM** | 3 |
|
||||
|
||||
### 4. Cross-Protocol Translation
|
||||
**Severity:** HIGH
|
||||
**Category:** A2A protocols
|
||||
**Description:** With 92 A2A protocol drafts and high overlap, there's no standard way for agents using different communication protocols to interoperate. Missing universal translation layer or protocol negotiation mechanism.
|
||||
**Evidence:** Multiple competing A2A protocols with no interoperability framework suggests fragmentation problem
|
||||
### Safety Deficit
|
||||
|
||||
### 5. Agent Lifecycle Management
|
||||
**Severity:** HIGH
|
||||
**Category:** agent discovery/reg
|
||||
**Description:** Missing standards for agent deployment, versioning, updates, and retirement. No clear protocols for how agents evolve or get replaced without disrupting dependent services.
|
||||
**Evidence:** Registration covered but no mention of versioning, updates, or graceful shutdown procedures
|
||||
Only **44** of 361 drafts address AI safety/alignment, while **120** focus on A2A protocols and **93** on autonomous operations. The ratio of capability-building to safety is roughly **4:1**.
|
||||
|
||||
### 6. Multi-Agent Consensus Mechanisms
|
||||
**Severity:** HIGH
|
||||
**Category:** A2A protocols
|
||||
**Description:** No frameworks for how groups of AI agents reach consensus on conflicting decisions or priorities. Critical for autonomous systems that must coordinate without human intervention.
|
||||
**Evidence:** Autonomous netops requires coordination but no consensus mechanisms appear in technical ideas list
|
||||
---
|
||||
|
||||
### 7. Human Override and Intervention
|
||||
**Severity:** HIGH
|
||||
**Category:** human-agent interaction
|
||||
**Description:** Only 22 human-agent interaction drafts but no clear emergency override protocols. Missing standardized ways for humans to intervene in autonomous agent operations during critical situations.
|
||||
**Evidence:** Disproportionately low human interaction focus (22 drafts) compared to autonomous operations (60 drafts)
|
||||
## 1. Agent Behavior Verification
|
||||
|
||||
### 8. Cross-Domain Security Boundaries
|
||||
**Severity:** HIGH
|
||||
**Category:** agent identity/auth
|
||||
**Description:** While identity management exists, missing frameworks for agents operating across security domains with different trust levels. No clear isolation or privilege escalation prevention.
|
||||
**Evidence:** Cross-domain identity mentioned but no corresponding security boundary enforcement mechanisms
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | CRITICAL |
|
||||
| **Category** | AI safety/alignment |
|
||||
| **Drafts in category** | 44 |
|
||||
|
||||
### 9. Dynamic Trust and Reputation
|
||||
**Severity:** HIGH
|
||||
**Category:** agent identity/auth
|
||||
**Description:** Missing frameworks for agents to build, assess, and revoke trust relationships dynamically based on behavior history. Static authentication insufficient for long-running autonomous systems.
|
||||
**Evidence:** Certificate authorities mentioned but no dynamic trust or reputation systems in technical ideas
|
||||
While many drafts address agent identity and authentication, few tackle how to verify that an agent is actually behaving according to its declared capabilities and policies. There's a critical gap in runtime behavioral attestation and compliance monitoring mechanisms.
|
||||
|
||||
### 10. Agent Performance Monitoring
|
||||
**Severity:** MEDIUM
|
||||
**Category:** autonomous netops
|
||||
**Description:** No standardized metrics or monitoring frameworks for tracking agent performance, efficiency, or drift over time. Missing observability standards for production agent deployments.
|
||||
**Evidence:** ML traffic management only has 24 drafts but no performance monitoring in technical ideas
|
||||
**Evidence:** High overlap in identity/auth (108 drafts) but only 44 drafts on safety/alignment, with no specific focus on behavioral verification
|
||||
|
||||
### 11. Agent Explainability Standards
|
||||
**Severity:** MEDIUM
|
||||
**Category:** AI safety/alignment
|
||||
**Description:** No protocols for agents to explain their decisions or reasoning to other agents or humans. Critical gap for debugging and compliance in regulated environments.
|
||||
**Evidence:** Low safety/alignment focus suggests governance requirements not fully addressed
|
||||
### Related Drafts
|
||||
|
||||
### 12. Agent Data Provenance
|
||||
**Severity:** MEDIUM
|
||||
**Category:** data formats/interop
|
||||
**Description:** No standards for tracking data lineage and provenance as information flows between agents. Critical for compliance and debugging in complex agent networks.
|
||||
**Evidence:** 102 data format drafts but no provenance tracking mechanisms identified in technical ideas
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
## Summary by Severity
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-ruan-spring-priority-flow-control-sid](https://datatracker.ietf.org/doc/draft-ruan-spring-priority-flow-control-sid/) (score 3.1) — SRv6 behavior extention for Flow Control in WAN
|
||||
|
||||
- **Critical:** 3 gaps
|
||||
- **High:** 6 gaps
|
||||
- **Medium:** 3 gaps
|
||||
**Top-rated in AI safety/alignment** (44 drafts):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra
|
||||
- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and
|
||||
- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou
|
||||
- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb
|
||||
- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
53 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Verifiable Agent Behavior Attestation | draft-birkholz-verifiable-agent-conversations | requirement |
|
||||
| Behavioral Trustworthiness Assessment | draft-chen-agent-decoupled-authorization-model | mechanism |
|
||||
| Multi-Vendor TEE Attestation (M-TACE) | draft-aylward-aiga-1 | mechanism |
|
||||
| Multi-Vendor TEE Attestation (M-TACE) | draft-aylward-aiga-2 | mechanism |
|
||||
| Cryptographic Identity Verification | draft-aylward-daap-v2 | mechanism |
|
||||
| Behavioral Monitoring Framework | draft-aylward-daap-v2 | mechanism |
|
||||
| Post-Discovery Authorization Handshake | draft-barney-caam | protocol |
|
||||
| Five Enforcement Pillars with Typed Schemas | draft-berlinai-vera | pattern |
|
||||
|
||||
*...and 45 more*
|
||||
|
||||
---
|
||||
|
||||
## 2. Cross-Domain Agent Liability
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | CRITICAL |
|
||||
| **Category** | Policy/governance |
|
||||
| **Drafts in category** | 91 |
|
||||
|
||||
When autonomous agents operate across organizational boundaries and cause harm or make decisions with legal implications, there's no standardized framework for liability attribution. The policy/governance drafts don't address cross-jurisdictional legal accountability.
|
||||
|
||||
**Evidence:** 91 policy/governance drafts but legal liability for cross-domain autonomous actions remains unaddressed
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-diaconu-agents-authz-info-sharing](https://datatracker.ietf.org/doc/draft-diaconu-agents-authz-info-sharing/) (score 3.2) — Cross-Domain AuthZ Information sharing for Agents
|
||||
- [draft-cui-dmsc-agent-cdi](https://datatracker.ietf.org/doc/draft-cui-dmsc-agent-cdi/) (score 3.0) — Cross-Domain Interoperability Framework for AI Agent Collaboration
|
||||
- [draft-han-rtgwg-agent-gateway-intercomm-framework](https://datatracker.ietf.org/doc/draft-han-rtgwg-agent-gateway-intercomm-framework/) (score 3.6) — Agent Gateway Intercommunication Framework
|
||||
- [draft-ni-a2a-ai-agent-security-requirements](https://datatracker.ietf.org/doc/draft-ni-a2a-ai-agent-security-requirements/) (score 3.7) — Security Requirements for AI Agents
|
||||
- [draft-intellinode-ai-semantic-contract](https://datatracker.ietf.org/doc/draft-intellinode-ai-semantic-contract/) (score 3.2) — Semantic-Driven Traffic Shaping Contract for AI Networks
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
|
||||
**Top-rated in Policy/governance** (91 drafts):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra
|
||||
- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and
|
||||
- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int
|
||||
- [draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/) (4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e
|
||||
- [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
26 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Cross-Domain Agent Identity Management | draft-abbey-scim-agent-extension | protocol |
|
||||
| Multi-level Inference Protocol | draft-chuyi-nmrg-agentic-network-inference | protocol |
|
||||
| Cross-Domain Agent Coordination | draft-chuyi-nmrg-agentic-network-inference | mechanism |
|
||||
| Cross-Domain Agent Discovery | draft-cui-dmsc-agent-cdi | mechanism |
|
||||
| Federated Agent Identity Framework | draft-cui-dmsc-agent-cdi | architecture |
|
||||
| Agent Capability Negotiation Protocol | draft-cui-dmsc-agent-cdi | protocol |
|
||||
| Federated Policy Enforcement | draft-cui-dmsc-agent-cdi | architecture |
|
||||
| Cross-Domain Authorization Information Sharing | draft-diaconu-agents-authz-info-sharing | mechanism |
|
||||
|
||||
*...and 18 more*
|
||||
|
||||
---
|
||||
|
||||
## 3. Human Override Protocols
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | CRITICAL |
|
||||
| **Category** | Human-agent interaction |
|
||||
| **Drafts in category** | 30 |
|
||||
|
||||
Critical gap in standardized protocols for humans to safely interrupt, override, or take control of autonomous agents in emergency situations. Only 30 drafts address human-agent interaction, with no focus on emergency takeover procedures.
|
||||
|
||||
**Evidence:** Only 30 human-agent interaction drafts compared to 213+ autonomous operation drafts, with no emergency override standards
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (score 4.2) — HTTP Agent Profile (HAP): Authenticated and Monetized Agent Traffic on the Web
|
||||
- [draft-irtf-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-irtf-nmrg-llm-nm/) (score 3.5) — A Framework for LLM-Assisted Network Management with Human-in-the-Loop
|
||||
- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (score 4.1) — A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop
|
||||
- [draft-zeng-opsawg-applicability-mcp-a2a](https://datatracker.ietf.org/doc/draft-zeng-opsawg-applicability-mcp-a2a/) (score 3.5) — When NETCONF Is Not Enough: Applicability of MCP and A2A for Advanced Network Ma
|
||||
- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (score 4.2) — Network Digital Twin and Agentic AI based Architecture for AI driven Network Ope
|
||||
- [draft-ietf-suit-firmware-encryption](https://datatracker.ietf.org/doc/draft-ietf-suit-firmware-encryption/) (score 3.7) — Encrypted Payloads in SUIT Manifests
|
||||
|
||||
**Top-rated in Human-agent interaction** (30 drafts):
|
||||
|
||||
- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb
|
||||
- [draft-ietf-aipref-vocab](https://datatracker.ietf.org/doc/draft-ietf-aipref-vocab/) (4.4) — Defines a standardized vocabulary for expressing preferences about how digital assets should be used
|
||||
- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an
|
||||
- [draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/) (4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains
|
||||
- [draft-liu-agent-operation-authorization](https://datatracker.ietf.org/doc/draft-liu-agent-operation-authorization/) (4.1) — Specifies framework for verifiable delegation of actions from humans to AI agents using JWT tokens.
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
7 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| LLM-Human Collaborative Framework | draft-irtf-nmrg-llm-nm | architecture |
|
||||
| CHEQ Protocol | draft-rosenberg-aiproto-cheq | protocol |
|
||||
| Signed Confirmation Objects | draft-rosenberg-aiproto-cheq | mechanism |
|
||||
| Cross-Protocol Integration Pattern | draft-rosenberg-aiproto-cheq | pattern |
|
||||
| CHEQ Protocol | draft-rosenberg-cheq | protocol |
|
||||
| Signed Decision Objects | draft-rosenberg-cheq | mechanism |
|
||||
| Protocol Integration Pattern | draft-rosenberg-cheq | pattern |
|
||||
|
||||
---
|
||||
|
||||
## 4. Agent Resource Exhaustion Protection
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | Autonomous netops |
|
||||
| **Drafts in category** | 93 |
|
||||
|
||||
Missing standardized mechanisms to prevent malicious or poorly designed agents from consuming excessive network, compute, or storage resources. Current drafts focus on traffic management but not on agent-specific resource quotas and enforcement.
|
||||
|
||||
**Evidence:** 93 autonomous netops drafts and 73 ML traffic management drafts lack agent-specific resource protection mechanisms
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-jia-oauth-scope-aggregation](https://datatracker.ietf.org/doc/draft-jia-oauth-scope-aggregation/) (score 3.5) — OAuth 2.0 Scope Aggregation for Multi-Step AI Agent Workflows
|
||||
|
||||
**Top-rated in Autonomous netops** (93 drafts):
|
||||
|
||||
- [draft-cui-nmrg-llm-benchmark](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-benchmark/) (4.3) — Provides comprehensive evaluation framework for LLM-based network configuration agents. Includes emu
|
||||
- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o
|
||||
- [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) (4.1) — Defines task-oriented multi-agent framework for fault recovery in converged mobile networks. Targets
|
||||
- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (4.1) — Defines framework for collaborative network management between LLM agents and human operators. Intro
|
||||
- [draft-jadoon-nmrg-agentic-ai-autonomous-networks](https://datatracker.ietf.org/doc/draft-jadoon-nmrg-agentic-ai-autonomous-networks/) (4.1) — Introduces architectural principles for integrating AI agents into IP protocol stack layers while pr
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
40 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Agent Resource Type | draft-abbey-scim-agent-extension | extension |
|
||||
| Agentic Application Resource Type | draft-abbey-scim-agent-extension | extension |
|
||||
| Collaborative Inference Acceleration (KDN) | draft-agent-gw | mechanism |
|
||||
| Data and Agent Aware-Inference and Training Network (DA-ITN) | draft-akhavain-moussa-ai-network | architecture |
|
||||
| Agent-to-Agent (A2A) Communication Paradigm | draft-an-nmrg-i2icf-cits | protocol |
|
||||
| Network-Level Quarantine Protocol | draft-aylward-aiga-1 | protocol |
|
||||
| Agent Task Negotiation | draft-cui-ai-agent-task | protocol |
|
||||
| Multi-Agent Security Protection | draft-fu-nmop-agent-communication-framework | mechanism |
|
||||
|
||||
*...and 32 more*
|
||||
|
||||
---
|
||||
|
||||
## 5. Agent-Generated Data Provenance
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | Data formats/interop |
|
||||
| **Drafts in category** | 145 |
|
||||
|
||||
While 145 drafts address data formats for AI interop, there's insufficient attention to tracking the provenance and lineage of data generated by agents. This creates trust and auditability issues in agent-to-agent data exchanges.
|
||||
|
||||
**Evidence:** 145 data format drafts with high overlap but no clear standards for agent-generated data provenance tracking
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-romanchuk-normative-admissibility](https://datatracker.ietf.org/doc/draft-romanchuk-normative-admissibility/) (score 3.4) — Normative Admissibility Framework for Agent Speech Acts
|
||||
- [draft-li-semantic-routing-architecture](https://datatracker.ietf.org/doc/draft-li-semantic-routing-architecture/) (score 3.6) — Semantic Routing Architecture for AI Agents Communication
|
||||
- [draft-cui-nmrg-llm-nm](https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/) (score 4.1) — A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop
|
||||
- [draft-mpsb-agntcy-messaging](https://datatracker.ietf.org/doc/draft-mpsb-agntcy-messaging/) (score 2.6) — An Overview of Messaging Systems and Their Applicability to Agentic AI
|
||||
- [draft-gaikwad-south-authorization](https://datatracker.ietf.org/doc/draft-gaikwad-south-authorization/) (score 3.7) — SOUTH: Stochastic Authorization for Agent and Service Requests
|
||||
- [draft-abaris-aicdh](https://datatracker.ietf.org/doc/draft-abaris-aicdh/) (score 2.8) — AI Content Disclosure Header
|
||||
|
||||
**Top-rated in Data formats/interop** (145 drafts):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra
|
||||
- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L
|
||||
- [draft-ietf-lake-app-profiles](https://datatracker.ietf.org/doc/draft-ietf-lake-app-profiles/) (4.6) — Defines canonical CBOR representation for EDHOC application profiles and coordination mechanisms for
|
||||
- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco
|
||||
- [draft-birkholz-verifiable-agent-conversations](https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/) (4.5) — Defines CDDL-based data format for verifiable agent conversation records using COSE signing. Support
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
4 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Context-Enhanced Training Data | draft-improving-data-quality-tags | extension |
|
||||
| Training Data Provenance Claims | draft-messous-eat-ai | mechanism |
|
||||
| Sentinel Evidence Package | draft-reilly-sentinel-protocol | architecture |
|
||||
| AI Lifecycle Provenance Tracking | draft-reilly-sentinel-protocol | architecture |
|
||||
|
||||
---
|
||||
|
||||
## 6. Agent Capability Degradation Handling
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | AI safety/alignment |
|
||||
| **Drafts in category** | 44 |
|
||||
|
||||
No standardized approaches for detecting and handling when an agent's capabilities degrade due to model drift, data corruption, or hardware issues. Systems need graceful degradation protocols rather than silent failures.
|
||||
|
||||
**Evidence:** Only 44 safety/alignment drafts don't address capability degradation, while 213+ drafts assume stable agent performance
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) (score 3.1) — Dynamic Multi-agent Secured Collaboration Infrastructure Architecture
|
||||
|
||||
**Top-rated in AI safety/alignment** (44 drafts):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra
|
||||
- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and
|
||||
- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou
|
||||
- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb
|
||||
- [draft-goswami-agentic-jwt](https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/) (4.5) — Extends OAuth 2.0 with Agentic JWT to address authorization challenges in autonomous AI systems. Int
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
45 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Semantic Routing | draft-agent-gw | mechanism |
|
||||
| Semantic Routing | draft-ainp-protocol | mechanism |
|
||||
| Capability-based Discovery | draft-ainp-protocol | pattern |
|
||||
| Complex Delegation Relationship Management | draft-chen-ai-agent-auth-new-requirements | architecture |
|
||||
| Capability-Based Discovery Mechanism | draft-cui-ai-agent-discovery-invocation | mechanism |
|
||||
| Agent Capability Negotiation Protocol | draft-cui-dmsc-agent-cdi | protocol |
|
||||
| Agent Capability-Based Routing | draft-du-catalist-routing-considerations | mechanism |
|
||||
| Agent Monitoring and Tracking | draft-fu-nmop-agent-communication-framework | mechanism |
|
||||
|
||||
*...and 37 more*
|
||||
|
||||
---
|
||||
|
||||
## 7. Multi-Agent Coordination Deadlocks
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | A2A protocols |
|
||||
| **Drafts in category** | 120 |
|
||||
|
||||
With 120+ A2A protocol drafts, there's insufficient attention to preventing deadlock situations where multiple agents create circular dependencies or resource conflicts. Missing are standardized deadlock detection and resolution mechanisms.
|
||||
|
||||
**Evidence:** 120 A2A protocol drafts with high internal overlap but no systematic deadlock prevention frameworks
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-mcps-agw](https://datatracker.ietf.org/doc/draft-li-dmsc-mcps-agw/) (score 3.5) — Multi-agent Collaboration Protocol Suite based on Agent Gateway
|
||||
- [draft-li-dmsc-inf-architecture](https://datatracker.ietf.org/doc/draft-li-dmsc-inf-architecture/) (score 3.1) — Dynamic Multi-agent Secured Collaboration Infrastructure Architecture
|
||||
- [draft-yue-anima-agent-recovery-networks](https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/) (score 4.1) — Task-Oriented Multi-Agent Recovery Framework for High-Reliability in Converged M
|
||||
- [draft-chang-agent-context-interaction](https://datatracker.ietf.org/doc/draft-chang-agent-context-interaction/) (score 2.9) — Agent Context Interaction Optimizations
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-cui-ai-agent-task](https://datatracker.ietf.org/doc/draft-cui-ai-agent-task/) (score 3.0) — Task-oriented Coordination Requirements for AI Agent Protocols
|
||||
|
||||
**Top-rated in A2A protocols** (120 drafts):
|
||||
|
||||
- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou
|
||||
- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L
|
||||
- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco
|
||||
- [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) (4.2) — Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl
|
||||
- [draft-mallick-muacp](https://datatracker.ietf.org/doc/draft-mallick-muacp/) (4.2) — Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with de
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
11 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Multi-Agent Task Coordination | draft-du-ai-agent-communication-6g-aspect | mechanism |
|
||||
| AI Gateway | draft-fu-nmop-agent-communication-framework | architecture |
|
||||
| DMSC Infrastructure Architecture | draft-li-dmsc-inf-architecture | architecture |
|
||||
| Multi-agent Collaboration Protocol Suite | draft-li-dmsc-macp | protocol |
|
||||
| Task-based Multi-Agent Coordination | draft-li-dmsc-mcps-agw | pattern |
|
||||
| Cognitive Networking Substrate | draft-li-semantic-routing-architecture | architecture |
|
||||
| Agent Communication Use Cases | draft-stephan-ai-agent-6g | pattern |
|
||||
| Structured Responsibility and Traceability Architecture (SRTA) | draft-takagi-srta-trinity | architecture |
|
||||
|
||||
*...and 3 more*
|
||||
|
||||
---
|
||||
|
||||
## 8. Agent Privacy Preservation
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | Agent identity/auth |
|
||||
| **Drafts in category** | 108 |
|
||||
|
||||
Agents often process sensitive data but current drafts don't adequately address privacy-preserving computation, differential privacy, or secure multi-party computation for agent interactions. This is critical for deployment in regulated industries.
|
||||
|
||||
**Evidence:** 108 identity/auth drafts focus on authentication but lack privacy preservation mechanisms for agent data processing
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-kale-agntcy-federated-privacy](https://datatracker.ietf.org/doc/draft-kale-agntcy-federated-privacy/) (score 3.2) — Privacy-Preserving Federated Learning Architecture for Multi-Tenant AI Agent Sys
|
||||
|
||||
**Top-rated in Agent identity/auth** (108 drafts):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (4.8) — Defines tamper-evident execution trace format for AI agent workflows using hash chains and cryptogra
|
||||
- [draft-aylward-daap-v2](https://datatracker.ietf.org/doc/draft-aylward-daap-v2/) (4.8) — Defines comprehensive protocol for AI agent accountability including authentication, monitoring, and
|
||||
- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou
|
||||
- [draft-drake-email-tpm-attestation](https://datatracker.ietf.org/doc/draft-drake-email-tpm-attestation/) (4.6) — Defines hardware attestation for email using TPM verification chains to prevent spam and provide Syb
|
||||
- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
11 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Agent Card Structure | draft-nandakumar-agent-sd-jwt | protocol |
|
||||
| Pseudonymous Key Generation | draft-bradleylundberg-cfrg-arkg | mechanism |
|
||||
| Privacy-Preserving Human Tokens | draft-dhir-http-agent-profile | mechanism |
|
||||
| Cryptographic Erasure Compliance | draft-gaikwad-aps-profile | mechanism |
|
||||
| Privacy-Respecting Capability Attestation | draft-huang-rats-agentic-eat-cap-attest | pattern |
|
||||
| Differential Privacy for Agent Models | draft-kale-agntcy-federated-privacy | mechanism |
|
||||
| Agent Identity Preservation | draft-liu-oauth-a2a-profile | pattern |
|
||||
| Inference-Time Data Access Policy Claims | draft-messous-eat-ai | mechanism |
|
||||
|
||||
*...and 3 more*
|
||||
|
||||
---
|
||||
|
||||
## 9. Agent Firmware/Model Update Security
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | HIGH |
|
||||
| **Category** | Model serving/inference |
|
||||
| **Drafts in category** | 42 |
|
||||
|
||||
While model serving is addressed in 42 drafts, there's insufficient focus on secure update mechanisms for agent models and firmware. Missing are standards for cryptographically verified, rollback-capable agent updates.
|
||||
|
||||
**Evidence:** 42 model serving drafts but no comprehensive security standards for agent software/model updates
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-ietf-tls-extended-key-update](https://datatracker.ietf.org/doc/draft-ietf-tls-extended-key-update/) (score 4.2) — Extended Key Update for Transport Layer Security (TLS) 1.3
|
||||
|
||||
**Top-rated in Model serving/inference** (42 drafts):
|
||||
|
||||
- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L
|
||||
- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco
|
||||
- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu
|
||||
- [draft-wang-cats-odsi](https://datatracker.ietf.org/doc/draft-wang-cats-odsi/) (4.5) — Specifies framework for decentralized LLM inference across untrusted participants with layer-aware e
|
||||
- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
79 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Multi-layered Security Architecture | draft-aylward-daap-v2 | architecture |
|
||||
| VERA Zero Trust Reference Architecture | draft-berlinai-vera | architecture |
|
||||
| Evidence-Based Maturity Runtime | draft-berlinai-vera | mechanism |
|
||||
| Five Enforcement Pillars with Typed Schemas | draft-berlinai-vera | pattern |
|
||||
| AI Agent Structured Threat Model | draft-berlinai-vera | requirement |
|
||||
| Cryptographic Proof-Based Autonomy | draft-berlinai-vera | mechanism |
|
||||
| Pseudonymous Key Generation | draft-bradleylundberg-cfrg-arkg | mechanism |
|
||||
| Multi-Agent Security Protection | draft-fu-nmop-agent-communication-framework | mechanism |
|
||||
|
||||
*...and 71 more*
|
||||
|
||||
---
|
||||
|
||||
## 10. Real-time Agent Debugging
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | MEDIUM |
|
||||
| **Category** | Other AI/agent |
|
||||
| **Drafts in category** | 26 |
|
||||
|
||||
Missing standardized protocols for debugging autonomous agents in production environments. When agents make unexpected decisions, there are no standard interfaces for real-time introspection without disrupting operations.
|
||||
|
||||
**Evidence:** 26 other AI/agent drafts suggest various approaches but no standardized debugging protocols for production agents
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/) (score 3.7) — Interface to In-Network Computing Functions for Cooperative Intelligent Transpor
|
||||
- [draft-zhao-detnet-enhanced-use-cases](https://datatracker.ietf.org/doc/draft-zhao-detnet-enhanced-use-cases/) (score 3.2) — Enhanced Use Cases for Scaling Deterministic Networks
|
||||
- [draft-zhang-rvp-problem-statement](https://datatracker.ietf.org/doc/draft-zhang-rvp-problem-statement/) (score 3.5) — Problem Statements and Requirements of Real-Virtual Agent Protocol (RVP): Commun
|
||||
- [draft-yuan-rtgwg-traffic-agent-usecase](https://datatracker.ietf.org/doc/draft-yuan-rtgwg-traffic-agent-usecase/) (score 3.7) — Use cases of the AI Network Traffic Optimization Agent
|
||||
- [draft-hong-nmrg-agenticai-ps](https://datatracker.ietf.org/doc/draft-hong-nmrg-agenticai-ps/) (score 3.0) — Motivations and Problem Statement of Agentic AI for network management
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
|
||||
**Top-rated in Other AI/agent** (26 drafts):
|
||||
|
||||
- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu
|
||||
- [draft-ietf-tls-ecdhe-mlkem](https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/) (4.4) — Defines hybrid post-quantum key agreement mechanisms for TLS 1.3 that combine ML-KEM with traditiona
|
||||
- [draft-wmz-nmrg-agent-ndt-arch](https://datatracker.ietf.org/doc/draft-wmz-nmrg-agent-ndt-arch/) (4.2) — Comprehensive architecture combining Network Digital Twin with Agentic AI for intent-based network o
|
||||
- [draft-an-nmrg-i2icf-cits](https://datatracker.ietf.org/doc/draft-an-nmrg-i2icf-cits/) (3.7) — Defines framework for orchestrating In-Network Computing Functions in Cooperative Intelligent Transp
|
||||
- [draft-cui-nmrg-auto-test](https://datatracker.ietf.org/doc/draft-cui-nmrg-auto-test/) (3.6) — Framework for AI-assisted network protocol testing using LLMs and automated test generation. Defines
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
23 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| A2A Protocol Transport over MOQT | draft-a2a-moqt-transport | protocol |
|
||||
| QUIC-based Publish/Subscribe for AI Agents | draft-a2a-moqt-transport | mechanism |
|
||||
| Streaming Capabilities Integration | draft-a2a-moqt-transport | mechanism |
|
||||
| Action-Based Authorization | draft-aylward-aiga-2 | mechanism |
|
||||
| Multi-layered Security Architecture | draft-aylward-daap-v2 | architecture |
|
||||
| Behavioral Monitoring Framework | draft-aylward-daap-v2 | mechanism |
|
||||
| Context-Aware Task Scheduling | draft-cui-ai-agent-task | mechanism |
|
||||
| Real-Time Task Adaptability | draft-cui-ai-agent-task | requirement |
|
||||
|
||||
*...and 15 more*
|
||||
|
||||
---
|
||||
|
||||
## 11. Cross-Protocol Agent Migration
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | MEDIUM |
|
||||
| **Category** | A2A protocols |
|
||||
| **Drafts in category** | 120 |
|
||||
|
||||
No standardized mechanisms for migrating agent state and context when moving between different A2A protocols or infrastructure providers. This creates vendor lock-in and limits agent mobility.
|
||||
|
||||
**Evidence:** 120 A2A protocol drafts with high overlap suggest competing approaches but no migration standards between them
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-cowles-volt](https://datatracker.ietf.org/doc/draft-cowles-volt/) (score 4.8) — Verifiable Operations Ledger and Trace (VOLT) Protocol
|
||||
- [draft-han-ai-agent-impact-infra](https://datatracker.ietf.org/doc/draft-han-ai-agent-impact-infra/) (score 2.3) — The Impact of AI Agent to Network Infrastructure
|
||||
- [draft-narajala-ans](https://datatracker.ietf.org/doc/draft-narajala-ans/) (score 4.2) — Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery an
|
||||
- [draft-ietf-emu-eap-edhoc](https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/) (score 3.2) — Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman
|
||||
- [draft-howe-sipcore-mcp-extension](https://datatracker.ietf.org/doc/draft-howe-sipcore-mcp-extension/) (score 3.7) — SIP Extension for Model Context Protocol (MCP)
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
|
||||
**Top-rated in A2A protocols** (120 drafts):
|
||||
|
||||
- [draft-guy-bary-stamp-protocol](https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/) (4.6) — Defines STAMP protocol for cryptographic delegation and proof in AI agent systems. Provides task-bou
|
||||
- [draft-williams-netmod-lm-hierarchy-topology](https://datatracker.ietf.org/doc/draft-williams-netmod-lm-hierarchy-topology/) (4.6) — Defines YANG data model for hierarchical language model coordination across tiny, small, and large L
|
||||
- [draft-chang-agent-token-efficient](https://datatracker.ietf.org/doc/draft-chang-agent-token-efficient/) (4.5) — Defines ADOL (Agentic Data Optimization Layer) to address token bloat in agent communication protoco
|
||||
- [draft-chen-oauth-rar-agent-extensions](https://datatracker.ietf.org/doc/draft-chen-oauth-rar-agent-extensions/) (4.2) — Extends OAuth RAR with policy_context and lifecycle_binding members for AI agent environments. Enabl
|
||||
- [draft-mallick-muacp](https://datatracker.ietf.org/doc/draft-mallick-muacp/) (4.2) — Resource-efficient messaging protocol specifically designed for constrained IoT/Edge devices with de
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
3 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| Transport-Independent Attestation Format | draft-drake-email-tpm-attestation | extension |
|
||||
| Cross-Protocol Integration Pattern | draft-rosenberg-aiproto-cheq | pattern |
|
||||
| Agent Mobility with IPv6 MIPv6 | draft-yc-ipv6-for-ioa | mechanism |
|
||||
|
||||
---
|
||||
|
||||
## 12. Agent Energy Consumption Optimization
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Severity** | MEDIUM |
|
||||
| **Category** | ML traffic mgmt |
|
||||
| **Drafts in category** | 73 |
|
||||
|
||||
Missing standards for energy-aware agent deployment and operation. As AI workloads are energy-intensive, there's no framework for agents to optimize their energy consumption or for infrastructure to enforce energy budgets.
|
||||
|
||||
**Evidence:** 73 ML traffic management drafts focus on performance but lack energy consumption considerations for sustainable AI deployment
|
||||
|
||||
### Related Drafts
|
||||
|
||||
**Keyword matches** (drafts mentioning gap topic):
|
||||
|
||||
- [draft-li-dmsc-macp](https://datatracker.ietf.org/doc/draft-li-dmsc-macp/) (score 4.2) — Multi-agent Collaboration Protocol Suite
|
||||
- [draft-zheng-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-agent-identity-management/) (score 3.7) — Agent Identity Managenment
|
||||
- [draft-zheng-dispatch-agent-identity-management](https://datatracker.ietf.org/doc/draft-zheng-dispatch-agent-identity-management/) (score 3.3) — Agent Identity Managenment
|
||||
- [draft-fu-nmop-agent-communication-framework](https://datatracker.ietf.org/doc/draft-fu-nmop-agent-communication-framework/) (score 3.0) — Agent Communication Framework for Network AIOps
|
||||
- [draft-zyyhl-agent-networks-framework](https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/) (score 3.6) — Framework for AI Agent Networks
|
||||
- [draft-ahc-green-smartpdu-yang](https://datatracker.ietf.org/doc/draft-ahc-green-smartpdu-yang/) (score 2.9) — A YANG Model for SmartPDU Monitoring and Control
|
||||
|
||||
**Top-rated in ML traffic mgmt** (73 drafts):
|
||||
|
||||
- [draft-calabria-bmwg-ai-fabric-inference-bench](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-inference-bench/) (4.5) — Defines benchmarking methodology for AI inference network fabrics. Establishes KPIs and test procedu
|
||||
- [draft-dhir-http-agent-profile](https://datatracker.ietf.org/doc/draft-dhir-http-agent-profile/) (4.2) — Defines HTTP Agent Profile for authenticating agent traffic, separating human from agent traffic, an
|
||||
- [draft-calabria-bmwg-ai-fabric-terminology](https://datatracker.ietf.org/doc/draft-calabria-bmwg-ai-fabric-terminology/) (4.2) — Defines comprehensive benchmarking terminology for AI network fabrics including collective communica
|
||||
- [draft-li-spring-rdma-multicast-over-srv6](https://datatracker.ietf.org/doc/draft-li-spring-rdma-multicast-over-srv6/) (4.2) — Specifies SRv6 extensions for RDMA multicast delivery with new End.MT behavior and ACK/NACK aggregat
|
||||
- [draft-song-tsvwg-camp](https://datatracker.ietf.org/doc/draft-song-tsvwg-camp/) (4.2) — Proposes CAMP, a multipath transport protocol for interactive multimodal LLM systems that maintains
|
||||
|
||||
### Partially Addressing Ideas
|
||||
|
||||
17 extracted ideas touch on this gap:
|
||||
|
||||
| Idea | Draft | Type |
|
||||
|------|-------|------|
|
||||
| SmartPDU Telemetry Framework | draft-ahc-green-smartpdu-yang | mechanism |
|
||||
| Agent Context Distribution | draft-chang-agent-context-interaction | mechanism |
|
||||
| Context Distribution Optimization Procedures | draft-chang-agent-context-interaction | protocol |
|
||||
| Schema Deduplication via JSON References | draft-chang-agent-token-efficient | mechanism |
|
||||
| Agentic Data Optimization Layer (ADOL) | draft-chang-agent-token-efficient | architecture |
|
||||
| Information Exchange Efficiency | draft-chuyi-nmrg-agentic-network-inference | mechanism |
|
||||
| Vector Index Workload Optimization | draft-gaikwad-aps-profile | pattern |
|
||||
| Collaboration Tunnel Protocol (TCT) | draft-jurkovikj-collab-tunnel | protocol |
|
||||
|
||||
*...and 9 more*
|
||||
|
||||
---
|
||||
|
||||
## Cross-Cutting Analysis
|
||||
|
||||
### Gaps by Category
|
||||
|
||||
| Category | Drafts | Gaps | Gap Topics |
|
||||
|----------|-------:|-----:|------------|
|
||||
| a2a protocols | 120 | 2 | Multi-Agent Coordination Deadlocks; Cross-Protocol Agent Migration |
|
||||
| agent identity/auth | 108 | 1 | Agent Privacy Preservation |
|
||||
| ai safety/alignment | 44 | 2 | Agent Behavior Verification; Agent Capability Degradation Handling |
|
||||
| autonomous netops | 93 | 1 | Agent Resource Exhaustion Protection |
|
||||
| data formats/interop | 145 | 1 | Agent-Generated Data Provenance |
|
||||
| human-agent interaction | 30 | 1 | Human Override Protocols |
|
||||
| ml traffic mgmt | 73 | 1 | Agent Energy Consumption Optimization |
|
||||
| model serving/inference | 42 | 1 | Agent Firmware/Model Update Security |
|
||||
| other ai/agent | 26 | 1 | Real-time Agent Debugging |
|
||||
| policy/governance | 91 | 1 | Cross-Domain Agent Liability |
|
||||
|
||||
## Recommendations
|
||||
|
||||
Based on the gap analysis, the highest-impact areas for new standardization work:
|
||||
|
||||
1. **Runtime behavior verification** — The most critical safety gap. Agents declare policies but nothing validates compliance at runtime.
|
||||
2. **Error recovery and rollback** — Autonomous operations need standardized failure handling before real deployment at scale.
|
||||
3. **Protocol interoperability layer** — 92 competing A2A protocols need a translation/negotiation framework to avoid fragmentation.
|
||||
4. **Dynamic trust systems** — Static certificates cannot scale to long-running agent ecosystems. Trust must be earned and revocable.
|
||||
5. **Human emergency override** — The 7:1 ratio of autonomous capability to human oversight drafts is concerning for production deployments.
|
||||
Reference in New Issue
Block a user