Development of 5G Mobile Ad Hoc Networks for DoD

Raytheon Technologies’ networks are set to connect a minimum of 20 pieces of equipment using 5G's sidelink technology, while securely enabling the transmission of data at 100 Mbps By Abi Wylie / 30 Aug 2023
Raytheon to Deliver 5G Mobile Ad Hoc Networks
Follow DA

Raytheon Technologies’ (RTX) BBN division will lead a team to create multi-hop mobile ad hoc networks, or MANETs, for the Department of Defense (DoD). 

The technology will allow forward-deployed service members with 5G equipment to communicate directly without the need for a complex 5G infrastructure.

The Opportunistic eXtemporarY 5G Encrypted Network (OXYGEN) capability is being developed under a contract with the Office of the Undersecretary of Defense for Research and Engineering’s (OUSD (R&E)’s) FutureG and 5G Office, with a potential value of $6.6 million over two years. 

It aims to connect a minimum of 20 pieces of user equipment by taking advantage of 5G’s sidelink technology, while securely enabling the transmission of data at 100 Mbps.

Piggybacking sensitive information over commercial infrastructure requires additional layers of security and mesh networking on top of relay links. This allows for multicast traffic instead of simple peer-to-peer communication.

The RTX BBN-led team includes Kryptowire LLC, Novowi LLC and Curated Networks, Inc. 

“Our warfighters use existing infrastructure like roads and bridges when they’re forward deployed now,” said Dr. Daniel Massey, program lead for the FutureG & 5G Office’s Operate Through team. “Why shouldn’t we use existing communications infrastructure as well? Access to a 5G MANET allows us to move from single-digit megabit per second individual data sharing, for ground soldiers to 100 times more throughput, which will enable sharing more high-resolution video and imagery.”

“OXYGEN will enhance commercial cellular equipment to ensure a fully trusted and secure tactical MANET capability,” added Chris Vander Valk, research engineer at Raytheon BBN. “We’re using techniques like cryptographic scrambling, encryption of control and data traffic and secure memory compartmentalization to achieve this.”

Find military communication companies and suppliers of military radio systems for defense >>

Posted by Abi Wylie Connect & Contact
Latest Articles