In modern battlefields and disaster zones, connectivity can no longer be taken for granted. Picture a team of unmanned aerial vehicles (UAVs) operating deep in hostile territory where satellite links are jammed and no cell towers or GPS signals exist. Even in these disconnected or denied environments, missions still depend on drones and ground teams sharing data and coordinating actions. How can communication networks endure under such extreme conditions? The answer lies in mesh networking and Mobile Ad Hoc Networks (MANETs) – technologies that allow UAVs and other nodes to form fluid, resilient networks on the fly. In fact, militaries are already experimenting with turning drones into flying relay nodes to “extend and thicken” their tactical networks when conventional infrastructure fails. These airborne mesh networks can blanket a large area with connectivity; in one U.S. Army exercise, a solar-powered drone at 18,000 feet provided coverage roughly the size of Rhode Island. Such trials underscore a growing reality: when primary communications are knocked out by jamming or distance, self-healing mesh networks of UAVs can keep critical links alive.
Mesh Networking and MANETs for Tactical Communications
Mesh networking allows each node (drone, vehicle, or soldier unit) to not only send and receive data but also route data for others. In a mesh, if one path is blocked or a node is lost, the data finds another route – a crucial advantage in combat. Unlike a traditional point-to-point link or hub-and-spoke system, a mesh has no single point of failure. Decentralised wireless mesh networks are ideal for military communications because they automatically reroute data if nodes are destroyed or taken offline, maintaining operations despite losses. A particular type of mesh network, the Mobile Ad Hoc Network (MANET), involves only mobile nodes and forms dynamically without fixed infrastructure. Each node in a MANET acts as a router, forwarding messages hop-by-hop, and the network self-organises and self-heals as nodes move or drop out. This means a swarm of UAVs can disperse over a wide area and still stay connected, extending communications beyond line-of-sight and through obstacles.
Field tests do show, however, that scaling up mesh networks comes with challenges. As more drones or vehicles join the network, radio congestion can grow exponentially and bandwidth becomes a scarce resource. For example, one study found conventional point-to-point radio links struggled to sustain >10 Mbps data rates once about 10 aerial nodes were active, due to interference and overhead traffic. Routing in a large, dynamic swarm is complex; proactive routing protocols that constantly update paths (like OLSR) can end up flooding the airwaves with coordination messages, leaving little room for actual data. On the other hand, purely reactive protocols may introduce latency when finding new routes in a fast-moving scenario. Balancing network resilience and coverage against bandwidth and power limitations is an ongoing engineering puzzle. In essence, MANET-based tactical networks must be engineered to handle high mobility and intermittent links gracefully, without collapsing under their own management traffic.
Security and Resilience Gaps in Conventional Meshes
Another under-discussed aspect of tactical mesh networks is the security and integrity of the network itself. Traditional MANET protocols often assume a friendly environment, which is rarely the case in military operations. Adversaries can attempt to disrupt the network by injecting false routing information, impersonating nodes, or simply overwhelming the network with bogus traffic. In fact, most conventional mesh protocols are vulnerable to Sybil attacks (where one node pretends to be many), flooding attacks, routing cache poisoning, and other denial-of-service tactics. A well-resourced attacker could exploit these weaknesses to degrade or even paralyse a tactical MANET. Encryption is not always baked into legacy mesh protocols either – radios might rely on link-level encryption or external VPN tunnels for security, which may not protect the routing layer itself from manipulation.
The harsh conditions of a contested environment also put unique demands on network resilience. High mobility and RF interference (intentional jamming or natural obstruction) can cause frequent dropouts. Military communicators use the acronym PACE (Primary, Alternate, Contingency, Emergency) to ensure there are fallback communication paths. Mesh networks support this by layering in an additional path: every node is an alternate relay for every other. As Col. Shermoan Daiyaan of the U.S. Army noted, “Being out in the jungle… it’s probably one of the hardest places to get the mesh network robust”, which is why aerial relays and other tools are used to reinforce communications. Even so, maintaining a stable mesh with dozens of nodes is difficult when signals are being jammed or nodes are moving rapidly. Without careful design, routing overhead or misbehaving nodes can swamp a mesh network’s capacity exactly when it’s needed most. This is driving interest in new approaches that are secure and efficient by design – leading to emerging solutions like the Reticulum network stack.
Reticulum: A New Paradigm for Secure Mesh Networking
One of the more cutting-edge entrants in this space is Reticulum, an open-source, cryptography-centric networking stack built specifically for resilient mesh and delay-tolerant communications. Reticulum takes a very different approach from traditional IP-based MANET protocols. First, it eliminates source addresses entirely: packets contain a destination but no information about their origin, which dramatically improves anonymity and makes traffic analysis more difficult. Nodes don’t have to be pre-configured with a global address or rely on a central authority to assign one – anyone can generate as many addresses as needed on the fly. These addresses are self-sovereign and portable; if a device physically moves across the network (as mobile UAVs do), its address stays reachable, with the network automatically figuring out the new routing within a few packets. In a fluid battlespace where units may join or leave the network at will, this kind of agility ensures end-to-end connectivity without the heavy churn of constant route broadcasts.
Perhaps most importantly, Reticulum is secure by default. All communication is end-to-end encrypted with strong modern ciphers, and every session uses ephemeral keys to provide forward secrecy. Unlike conventional systems where encryption might be layered on as an option, Reticulum only operates with encryption – it does not even allow a node to send or receive unencrypted packets. This built-in security means features like authentication and integrity come for free with the networking stack, rather than relying on external solutions. Additionally, because addresses are essentially cryptographic identities, it’s extremely difficult for an enemy to spoof a node’s identity or insert counterfeit nodes (mitigating Sybil attacks). The network also limits control traffic overhead by design; for example, Reticulum’s architecture caps the bandwidth used for network announcements to prevent flooding, and it localises route discovery to avoid spamming the entire mesh. These choices make Reticulum able to function in adverse conditions that would break normal networks – it can keep working even with very high latency and extremely low bandwidth links, using any medium available (HF radio, LoRa, WiFi, etc.) to ferry messages.
Reticulum is still emerging and not yet a standard in defence communications, but it highlights what next-generation tactical mesh protocols might look like. Compared to traditional MANET waveforms and protocols (which often evolved from earlier Internet or radio networking schemes), Reticulum flips the model to prioritise privacy, resilience, and decentralisation above all. For a tactical unit, a Reticulum-style network could enable truly autonomous comms: squads of drones or soldiers could spin up their own encrypted mesh on demand, without needing permission or configuration from a central server, and without fear that a sophisticated adversary could easily intercept or shut it down. It is a glimpse of a more secure, peer-to-peer future for battlefield networks – one where even a highly contested electromagnetic environment can’t silence the flow of crucial information.
Emerging Challenges and Opportunities
Even as technologies like mesh networking and Reticulum expand what’s possible, there remain critical challenges to address. From a founder’s perspective in this field, the following areas are both hurdles and opportunities for innovation:
- Cryptographic Agility in Mobile Nodes: Tactical networks deployed today must be ready for the threats of tomorrow. Cryptographic agility refers to the ability to swiftly swap out encryption algorithms and keys across all nodes as threats evolve. This is vital in an era of fast-emerging cyber attacks and future quantum computers. For example, industrial IoT networks with crypto agility can rapidly update algorithms or move to quantum-resistant ciphers without replacing hardware. In a mesh of UAVs, cryptographic agility means a fleet can be re-keyed or upgraded on the fly – ensuring that even long-lived drones remain secure against new vulnerabilities. Designing protocols and hardware that support seamless crypto updates (without overwhelming limited bandwidth) will be an important focus for resilient communications.
- Power-Aware Security: UAVs and mobile nodes often run on batteries, so there is a trade-off between robust security and power consumption. Encrypting and signing every packet can tax processors and drain energy. The challenge is to achieve strong security efficiently, through lightweight cryptography and smart system design. Research into lightweight cryptographic algorithms is yielding ciphers that require less computation and memory, making them ideal for power-constrained devices. Techniques like optimizing code, using dedicated encryption hardware, and dynamically scaling the level of security based on a node’s battery status all play a role. A mesh network should be able to defend itself without burning through the UAVs’ flight time. Future tactical radios will likely incorporate power-aware security modes that adapt encryption schemes to current energy levels – maintaining confidentiality and integrity while squeezing the most out of every watt.
- Swarm Mesh Autonomy: As UAV swarms grow in size and complexity, humans will no longer micromanage network connectivity – nor could they, given the split-second decisions and reconfigurations required. The goal is autonomous swarm networks that self-optimize and heal in real time. This means applying AI and swarm intelligence to networking. Recent research is exploring algorithms that let groups of drones coordinate their communications and routing without central control, even under tough conditions like communication delays or intermittent links. In practice, a truly autonomous mesh might have drones automatically repositioning to act as better relays, adjusting transmission power to mitigate jamming, or re-routing traffic as bandwidth conditions change – all without explicit orders. Ensuring reliable low-latency links for coordination is a big challenge here, as is trust: the swarm’s decision logic must be secure from spoofing or manipulation. Nonetheless, the trend is clear: we are moving toward intelligent, self-managing networks where UAVs and other nodes collaborate to maintain the mesh, leaving people free to focus on mission decisions rather than network tuning.
A Mesh Networking Future for Defence Communications
Tactical communication is entering a new era of resilience. Mesh networking and MANETs are enabling UAVs and soldiers to maintain links where traditional radios falter, by dynamically routing around obstacles and outages. Emerging protocols like Reticulum demonstrate that it’s possible to build networks that are secure, censorship-resistant and autonomous by design – properties extremely relevant to defence and emergency domains. By weaving together robust connectivity, strong cryptography, and intelligent autonomy, future tactical networks will be far harder to disable.
From a technology leader’s point of view, the key will be holistic design: radio hardware, network protocols, and security measures all crafted together with the realities of contested environments in mind. The payoff for getting it right is huge. Imagine a swarm of drones coordinating a search-and-rescue or a military operation, seamlessly sharing data through a mesh that adapts to every jamming attempt or loss of a node. That kind of resilient network can provide a decisive edge, keeping data flowing freely when adversaries expect it to collapse. Achieving it will require continued innovation in areas like cryptographic agility and power-efficient design, and a willingness to move beyond legacy protocols to embrace new ideas. The result will be communication networks that bend but don’t break – truly unstoppable networks for the most challenging missions.
Sources:
https://reticulum.network/docs.html
https://defensescoop.com/2024/03/08/army-tests-high-altitude-network-extension-project-convergence/
https://www.defenseadvancement.com/suppliers/mesh-networking/
https://www.mdpi.com/2504-446X/9/2/139
https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography-algorithms-protect-small-devices
https://arxiv.org/html/2405.00556v2
https://markqvist.github.io/Reticulum/manual/
https://reticulum.network/manual/understanding.html
https://reticulum.network/manual/networks.html
https://reticulum.network/manual/Reticulum%20Manual.pdf
https://github.com/markqvist/Reticulum
https://github.com/markqvist/Reticulum/blob/master/README.md
https://defence-blog.com/us-air-force-tests-drone-mesh-network/
https://research.tees.ac.uk/ws/portalfiles/portal/49903399/Lightweight_Cryptography_for_Resource.pdf
https://pmc.ncbi.nlm.nih.gov/articles/PMC11207458/
https://www.researchgate.net/publication/348937073_A_Performance_Comparison_of_EncryptionDecryption_Algorithms_for_UAV_Swarm_Communications
https://pmc.ncbi.nlm.nih.gov/articles/PMC11633978/
https://www.mdpi.com/2079-9292/12/8/1908
https://www.nature.com/articles/s41598-024-81038-1
https://csrc.nist.gov/pubs/sp/800/232/ipd
https://www.sciencedirect.com/topics/computer-science/lightweight-cryptography
https://www.secure-ic.com/blog/lightweight-cryptography/
https://www.bluwireless.com/insight/how-mmwave-mesh-networks-are-powering-the-future-of-defence-connectivity/
https://www.unmannedsystemstechnology.com/2024/05/mesh-radios-integrated-with-suas-for-successful-ew-field-testing/
https://defensescoop.com/2025/03/04/army-testing-network-architecture-with-whole-division/
https://defensescoop.com/2025/04/22/army-could-be-eliminating-radios-at-tactical-edge-gen-mingus/
https://defensescoop.com/2025/02/14/army-updated-network-gear-transforming-in-contact-dispersed-digital-footprints/
https://defensescoop.com/2024/12/11/army-planning-outfit-armored-units-with-network-kit-2025/
https://defensescoop.com/2025/02/13/army-transforming-in-contact-unit-drones-uas-exercises/
https://defensescoop.com/2025/03/04/army-unit-making-own-drones-3d-printing-101st-airborne-division/
https://defensescoop.com/2024/07/19/defense-innovation-board-military-drone-challenges/
https://www.parraid.com/advancements-in-tactical-radio-network-technologies-a-comprehensive-overview/
https://defensescoop.com/2025/05/14/cdao-leaves-edge-data-mesh-nodes-indo-pacom-after-major-exercise/
https://www.wired.com/story/electronic-warfare-russia-ukraine
https://www.businessinsider.com/ukrainian-walkie-talkie-maker-caught-attention-us-military-2025-4
https://www.wired.com/story/lightweight-encryption-internet-of-things
https://www.wired.com/story/android-encryption-cheap-smartphones
https://www.wired.com/2008/04/160-billion-robotic-army-network-passes-first-big-test-kinda
https://www.lineofdeparture.army.mil/Journals/Infantry/Infantry-Archive/Winter-2024-2025/Can-you-hear-me-now/
https://www.sciencedirect.com/science/article/abs/pii/S0957417425009297
https://unsigned.io/rnode_bootstrap_console/r/docs.html
https://markqvist.github.io/Reticulum/manual/gettingstartedfast.html
https://reticulum.network/manual/reference.html
https://kimhyungsub.github.io/VehicleSec23_secure_pairing.pdf