The Problem: Why Traditional Networks Fail in Real-World Environments

Most modern communication networks are designed around a shared set of assumptions: that infrastructure is stable, topology is predictable, connectivity is continuous, and some form of trusted central coordination exists. In civilian and enterprise environments, these assumptions generally hold well enough that their structural limitations remain largely invisible. The network works, services remain reachable, and routing converges as expected.

In operational environments, however, those assumptions break down.

Disaster response zones, remote industrial operations, unmanned systems, field deployments, and contested or denied environments all exhibit similar constraints. Infrastructure may be damaged, degraded, or entirely absent. Communication links may be intermittent, asymmetric, or bandwidth-constrained. Nodes may be mobile, intermittently powered, or operating at the edge of radio coverage. Central coordination, if it exists at all, may be delayed, unreachable, or intentionally disrupted.

Under these conditions, conventional networking architectures do not fail because radios stop transmitting. They fail because the network layer itself assumes continuity that no longer exists. Protocols designed for stable paths and persistent end-to-end connectivity struggle when links fragment, routes oscillate, or segments of the network become temporarily isolated.

The core challenge, therefore, is not simply extending radio range or increasing throughput. It is ensuring survivability under fragmentation — maintaining meaningful communication when the network is unreliable, partitioned, or only partially connected by design.

The Reticulum networking protocol was created specifically to address this problem. It is a decentralised, cryptography-native architecture built to operate under adverse conditions, where instability is normal rather than exceptional, and where resilience must be engineered into the network layer itself.

What Is Reticulum?

Reticulum is a cryptography-based networking stack designed to build both local and wide-area networks across heterogeneous physical mediums. It is not tied to any specific radio, hardware platform, or transport layer. Instead, it provides a self-contained networking layer that can operate independently of traditional IP infrastructure while remaining capable of interoperating with it when required.

At its core, Reticulum is hardware agnostic and transport agnostic. It does not depend on fixed infrastructure and does not assume the presence of central coordination. Most importantly, it is identity-based rather than address-based. Communication is anchored to cryptographic identities instead of IP or MAC addresses, allowing endpoints to remain reachable even as their physical connectivity or network attachment changes.

Reticulum can operate over a wide range of physical and logical transports. These include long-range radio systems such as LoRa and packet radio, custom physical layers, serial links, WiFi, Ethernet, and standard TCP or UDP over IP networks. It is equally capable of functioning across hybrid paths that combine several of these mediums simultaneously. A single Reticulum node may bridge radio, wired, and IP segments into a unified mesh without requiring reconfiguration at higher layers.

Although Reticulum does not require IP to function, it can encapsulate over IP when convenient. This allows it to operate natively over radios or serial connections while also tunnelling across the public Internet or private IP networks where appropriate.

The protocol is engineered to function over links as slow as 5 bits per second, assuming a physical-layer MTU of approximately 500 bytes. This unusually low baseline requirement is not incidental; it reflects Reticulum’s foundational design philosophy. Communication must remain possible even under extreme bandwidth constraints and high-latency conditions.

Rather than optimising for peak throughput or minimal latency under ideal conditions, Reticulum prioritises reliable delivery in degraded, intermittent, and partitioned environments. Its design choices reflect the assumption that instability is normal, not exceptional.

How the Reticulum Network Protocol Works, at a High Level

Reticulum uses cryptographic identities to represent endpoints, services, and applications. Rather than routing data to static IP addresses, the network dynamically discovers and maintains paths to identities as connectivity allows.

Routing paths are established opportunistically and updated as the network changes. When direct communication is not possible, data can be forwarded through intermediate nodes. Messages may be stored and forwarded when links are intermittent, allowing communication to continue even when the network becomes temporarily partitioned.

End-to-end encryption is a default property of Reticulum, not an optional feature layered on top. Trust is derived from cryptographic identity rather than network position.

Reticulum does not prioritise maximum throughput or low latency above all else. Instead, it prioritises reliable delivery across uncertain and degraded network conditions.

Reticulum Architecture: Identity, Routing, and Scalability

To understand why Reticulum behaves differently from traditional mesh networking systems, it is important to examine its architectural foundations.

Identity and Addressing

Reticulum does not use IP addresses or ports.

Instead, it uses destinations — 16-byte (128-bit) hashes derived by truncating a SHA-256 hash of identifying characteristics. A destination may appear as:

13425ec15b621c1d928589718000d814

Destinations are named in dotted notation (e.g., app.remotesensor.temperature), but only the truncated hash is transmitted. Long names do not increase packet size.

For single destinations, Reticulum automatically appends the public key before hashing. This guarantees uniqueness even when multiple nodes use identical logical names.

Routing is therefore to cryptographic identity, not network location.

Node Roles: Instances and Transport Nodes

Every device running Reticulum operates as a Reticulum Instance. An instance is capable of creating identities, sending and receiving packets, establishing links, and participating in the network at an endpoint level. However, not every instance is required to forward traffic for others.

Some systems may be explicitly configured as Transport Nodes by enabling the enable_transport = Yes directive. These nodes are typically fixed, stable, or intended to remain available for extended periods. Their role is to forward traffic on behalf of other nodes and to participate in multi-hop routing across the mesh.

Only Transport Nodes take part in forwarding packets between peers that are not directly connected. Regular instances rely on these transport-capable systems to extend connectivity beyond their immediate neighbours. This deliberate separation of roles is central to Reticulum’s scalability. By restricting forwarding responsibilities to designated nodes, the protocol reduces routing overhead, limits broadcast amplification, and avoids forcing every participant to maintain global routing knowledge. As a result, large and sparse meshes can scale without overwhelming lightweight or intermittently connected devices.

The Announce Mechanism

Reachability in Reticulum is established through a mechanism known as the announce. When a node wishes to make one of its destinations reachable across the network, it transmits an announce packet containing the destination hash, the associated public key, optional application-specific data, a random nonce to ensure uniqueness, and an Ed25519 signature verifying authenticity.

Announces propagate outward through the mesh according to a defined set of rules designed to balance convergence speed with bandwidth discipline. If an identical announce has already been received, it is ignored. When a Transport Node receives a new announce, it records the neighbour from which it was received and the associated hop count. Each retransmission increments this hop count, and propagation ceases once a configurable maximum—128 hops by default—is reached.

To prevent routing traffic from overwhelming the network, announce retransmissions are bandwidth-limited on a per-interface basis, typically capped at approximately two percent of available capacity. Announces with lower hop counts are prioritised, ensuring that local connectivity converges before more distant segments of the mesh. If retransmission does not appear to propagate successfully, limited retries may occur.

Importantly, no node in the network ever maintains a complete end-to-end path. Each Transport Node stores only the next hop toward a destination. Paths effectively build outward from the originating node as announces propagate through the network. Even in complex deployments operating near the 128-hop limit, full end-to-end reachability can converge in roughly one minute, provided sufficient bandwidth exists to process announce traffic.

Path Requests (On-Demand Discovery)

Reticulum does not rely solely on proactive announce propagation to maintain reachability across the entire mesh. While announces gradually establish paths outward from each destination, the protocol does not require full global convergence before communication can occur.

If a node has data to send to a destination for which it does not currently know a path, it can generate a Path Request. This request is forwarded by Transport Nodes through the network. When the destination itself, or any node that already has a valid route to it, receives the request, it generates a response. That response then propagates back toward the origin, establishing the necessary next-hop state along the way.

This mechanism enables routing to be discovered on demand rather than requiring constant global synchronisation. Control traffic is reduced because routing information does not need to be continuously flooded across the network when it is not being used. Communication can begin even in partially converged meshes where some announces have not yet propagated to every segment.

As a result, routing state in Reticulum is built incrementally and locally. Nodes maintain only the information required to reach active destinations, rather than maintaining a fully synchronised global routing table. This design significantly improves scalability and efficiency in large, sparse, or intermittently connected networks.

Packet Format and Wire Efficiency

Reticulum is engineered for environments where bandwidth is limited and overhead must be tightly controlled. Its wire format is compact, deterministic, and designed around the assumption of a physical-layer MTU of approximately 500 bytes.

A Reticulum packet consists of a two-byte header, followed optionally by an Interface Access Code (IFAC) field ranging from 0 to 64 bytes when interface authentication is enabled. This is followed by one or two 16-byte address fields, a one-byte context field, and a data payload of up to 465 bytes.

The two-byte header encodes multiple pieces of routing and processing information within a minimal footprint. It specifies whether interface authentication is present, the propagation type (broadcast or transport), the destination type (single, group, plain, or link), and the packet type (such as data, announce, link request, or proof). The second header byte carries the hop count, allowing propagation limits to be enforced without additional routing structures.

The compactness of the protocol is reflected in its on-wire sizes. Excluding any optional IFAC field, a Path Request occupies approximately 51 bytes. An Announce packet is roughly 167 bytes. A Link Request requires about 83 bytes, and a Link Proof approximately 115 bytes. Establishing a fully encrypted and verified link therefore requires only three packets totalling around 297 bytes. Once established, maintaining an open link consumes roughly 0.45 bits per second in keepalive traffic.

These figures are not incidental; they are foundational to the protocol’s ability to operate over extremely constrained links. By minimising structural overhead and keeping control traffic tightly bound, Reticulum remains viable on low-data-rate radios, high-latency channels, and bandwidth-limited mesh segments where traditional IP-based protocols would struggle to converge or remain stable.

Interface Access Codes (IFAC)

Reticulum provides a mechanism for creating logically segmented or access-controlled network segments through the use of Interface Access Codes (IFAC). This feature enables named virtual networks and passphrase-protected interfaces without requiring central infrastructure or external authentication servers.

When IFAC is enabled on an interface, each outbound packet includes a signature derived from a shared Ed25519 identity associated with that interface. Upon reception, the interface verifies this signature before the packet is accepted into the local Reticulum instance. Packets that fail verification are discarded immediately, before they participate in routing, announce processing, or link establishment.

This mechanism enables practical network segmentation within an otherwise open mesh. Nodes can be configured to accept traffic only from peers that possess the correct interface identity or shared secret, effectively creating whitelisted trust domains. Authentication occurs at the interface boundary, reducing unnecessary processing and preventing unauthorised traffic from consuming routing state or bandwidth.

Importantly, this capability is achieved without centralised control, certificate authorities, or external key distribution systems. Interface authentication remains consistent with Reticulum’s broader design philosophy: decentralised, cryptographically enforced trust boundaries established directly between participating nodes.

Encryption and cryptographic foundations

Reticulum is cryptography-native by design. Security is not an optional layer applied above the network stack; it is embedded directly into the protocol’s core behaviour. Identity, routing, encryption, and verification are all rooted in modern elliptic-curve cryptography.

All traffic addressed to single destinations is encrypted by default. When a node sends a packet, it generates a fresh ephemeral key pair and performs an Elliptic Curve Diffie–Hellman (ECDH) exchange using X25519 with the destination’s public key. Because that public key has already been learned through the announce mechanism, the sender can perform this key exchange locally, without requiring any additional handshake traffic before transmission. The resulting shared secret is passed through a key-derivation process to produce symmetric encryption keys specific to that packet.

A new ephemeral key is generated for every packet. This provides forward secrecy at the packet level: even if a long-term private key were compromised at some later time, previously captured traffic would remain unreadable.

For sustained communication, Reticulum supports links — persistent encrypted channels established between two destinations. A link is created through a lightweight three-packet exchange totalling approximately 297 bytes on the wire. During this process, both sides generate new X25519 key pairs, perform an ECDH exchange, and derive a shared symmetric channel key. Once established, the link provides authenticated, bidirectional communication across any number of hops with minimal overhead, including a keepalive cost measured in fractions of a bit per second.

Reticulum also provides a cryptographic proof-of-delivery mechanism. When enabled, a receiving destination can compute the SHA-256 hash of a received packet and sign that hash with its Ed25519 private key. This signed proof is then routed back through the network toward the sender. Upon receipt, the sender verifies the signature against the known public key of the destination. This mechanism allows delivery confirmation to be verified end-to-end without relying on trusted intermediaries, central servers, or transport-layer acknowledgements. Delivery assurance becomes a cryptographic property rather than a by-product of infrastructure trust.

The protocol relies on a concise and well-defined primitive suite. Ed25519 is used for digital signatures, including announce authentication and delivery proofs. X25519 is used for ECDH key exchange. HKDF is employed for key derivation. Symmetric encryption uses AES-256 in CBC mode with PKCS7 padding, and message authentication is provided by HMAC-SHA256. Hashing operations utilise SHA-256 and SHA-512 where appropriate.

Consistent with its privacy-oriented architecture, Reticulum packets do not include source addresses. Intermediate nodes forward packets based solely on destination identity and locally maintained routing state. As a result, the initiator of communication is not automatically exposed to the wider network, preserving initiator anonymity even in multi-hop scenarios.

Store-and-forward and delay tolerance

In unstable networks, loss of a route does not necessarily mean loss of data. When a destination is temporarily unreachable, Reticulum can buffer packets and retry delivery once connectivity is restored. Rather than immediately discarding traffic because an end-to-end path is not currently available, the protocol tolerates interruption and resumes transmission when conditions permit.

This behaviour places Reticulum closer in spirit to Delay-Tolerant Networking (DTN) architectures than to conventional MANET designs. In traditional IP-based meshes, a broken route typically results in dropped packets and failed sessions. In contrast, Reticulum treats partition as a normal operating condition. Short-term fragmentation does not automatically translate into communication failure.

By allowing messages to persist across temporary disconnections, Reticulum enables communication to survive in environments where links fluctuate, nodes move in and out of range, or segments of the network become briefly isolated.

Resource abstraction for large transfers

While Reticulum is highly efficient for small, message-oriented exchanges, it is not limited to minimal payloads. For larger data transfers, the protocol provides a higher-level construct known as a Resource. Resources operate over established links and provide a reliable mechanism for transferring substantial amounts of data across multi-hop paths.

The Resource mechanism abstracts away the complexity typically associated with large transfers in constrained or unreliable networks. Data is automatically divided into appropriately sized chunks, sequenced, and transmitted over the encrypted link. Integrity verification ensures that corrupted or missing segments are detected. When necessary, retransmission occurs automatically to recover lost data. On the receiving side, chunks are reassembled transparently into the original payload. Optional compression may be applied to improve efficiency over bandwidth-limited links.

From an application developer’s perspective, this significantly reduces implementation complexity. Rather than manually handling fragmentation, ordering, acknowledgement, and recovery logic, an application can invoke the Resource mechanism and rely on Reticulum to manage the transfer lifecycle. This allows anything from small configuration payloads to large files to be transmitted reliably across multi-hop meshes, even when links are intermittent or high latency.

Why Reticulum support 128+ hops

Most conventional MANET protocols begin to degrade beyond approximately 10 to 30 hops. As network diameter increases, routing tables grow in proportion to the number of nodes and links, control traffic expands through repeated flooding, and link-state synchronisation mechanisms consume increasing bandwidth. In large or highly mobile topologies, this overhead can destabilise routing, introduce oscillations, or make convergence impractically slow.

Reticulum avoids these limitations through a fundamentally different architectural approach. Instead of relying on address-based routing with globally synchronised topology information, it uses identity-based routing with compact, per-destination next-hop state. Each Transport Node stores only the information required to forward traffic one hop closer to a given destination. No node maintains a full map of the network.

Path discovery is performed on demand, either through announce propagation or through explicit Path Requests when necessary. Announce traffic itself is tightly controlled, with bandwidth caps and prioritisation rules that prevent uncontrolled flooding. Because routing state is constructed incrementally and locally, rather than through global link-state synchronisation, the amount of state maintained by any individual node remains bounded and proportional to active destinations rather than total network size.

The default maximum hop count is 128, and this limit is configurable. In practice, the protocol’s compact state model and controlled propagation mechanisms allow it to operate across large, sparse, or intermittently connected meshes where traditional MANET designs would encounter scaling limits.

Comparison with OLSR, BATMAN, and IP-Based MANETs

Traditional MANET protocols such as OLSR (Optimized Link State Routing) and BATMAN (Better Approach To Mobile Ad-hoc Networking) are fundamentally address-based systems. Nodes are identified by IP or MAC addresses, and routing decisions are made by constructing and maintaining tables that map those addresses to next hops.

OLSR is a link-state protocol that relies on periodic dissemination of topology control information throughout the network. It uses Multi-Point Relays (MPRs) to reduce broadcast redundancy, but it still depends on regular topology floods to maintain a global view of the network. Even when no application data is flowing, control traffic continues in order to keep routing state synchronised. As the number of nodes increases, the amount of routing information that must be distributed and maintained grows accordingly.

BATMAN takes a different approach, using originator messages (OGMs) to build a gradient toward each node rather than distributing full link-state information. Later versions, such as BATMAN V, operate closer to the MAC layer and improve mobility handling. However, the system remains address-based and assumes that reasonably stable connectivity exists between participating nodes. While it can perform well in moderately sized or quasi-static meshes, it is still optimised primarily for efficient IP routing rather than survivability under severe fragmentation.

Both OLSR and BATMAN are designed to route IP traffic. They assume that end-to-end connectivity will usually be present and that links, while possibly lossy, are sufficiently stable for routing convergence. They do not natively provide end-to-end encryption as a mandatory property of the protocol. Initiator anonymity is not a design goal; source addresses are embedded in packet headers. Nor do these protocols implement store-and-forward or delay-tolerant behaviour as intrinsic features of the routing layer.

Reticulum differs at a foundational level. It is identity-based rather than address-based. Packets do not carry source addresses, preserving initiator anonymity. Encryption is not optional but built into the protocol’s default operation. Routing state is compact and local, maintained per destination rather than as a globally synchronised topology map. Path discovery occurs on demand through announces and Path Requests rather than through constant topology floods. The protocol also incorporates delay-tolerant behaviour, allowing communication to persist across temporary partitions. Finally, Reticulum is transport agnostic, operating natively over radios, serial links, or IP without assuming any particular lower-layer technology.

Reticulum does not attempt to maximise IP routing efficiency under ideal conditions. Instead, it prioritises survivability under adversarial, degraded, and fragmented network conditions. Where traditional MANET protocols optimise for throughput and convergence speed in moderately stable meshes, Reticulum is designed to continue functioning when connectivity is intermittent, trust is limited, and infrastructure cannot be assumed.

Problems Solved by Reticulum Mesh Networking

This architecture directly addresses common failure modes in real-world communication systems.

When infrastructure is unavailable or denied, Reticulum does not rely on central servers or base stations. Networks can form organically from available nodes.

When topology changes due to mobility or interference, routing adapts dynamically.

When connectivity is intermittent, communication does not simply fail. Messages traverse the network as opportunities arise.

When trust relationships are unclear, cryptographic identity provides a secure foundation without requiring centralised authorities.

These properties distinguish Reticulum from traditional IP-based networks, cellular systems, and many mesh implementations that assume stable, continuous paths.

Why Beechat Uses Reticulum

Beechat’s design philosophy centres on decentralisation, resilience, and operational sovereignty. We build communication systems intended to function when conditions are constrained, degraded, or contested.

Reticulum aligns closely with these principles. Its resilience-first architecture matches the environments in which Beechat systems operate. Its transport-agnostic design allows support for multiple radios and bands without redesigning the network layer. Its open architecture ensures long-term viability without dependence on proprietary control.

Rather than building a proprietary networking protocol, Beechat chose to build on Reticulum because it is grounded in these principles and proven across diverse deployments. This allows us to focus on hardware robustness, secure radio design, and operational integration while relying on a mature networking foundation.

As global reliance on connectivity increases, systems that assume ideal conditions represent growing operational risk.

Resilient, decentralised networking offers an alternative path. By designing for failure as a normal condition rather than an exception, it becomes possible to build communication systems that continue functioning when conditions deteriorate.

Beechat builds on open foundations such as Reticulum because we believe this approach is essential for long-term resilience, independence, and real-world reliability. We use Reticulum-rs, a Rust implementation optimised for low size, weight, and power (SWaP) hardware. Our presentation at FOSDEM 2026 provides a deeper technical overview of this implementation and the design considerations behind running Reticulum on constrained embedded platforms.

Sources

Our FOSDEM 26 presentation

https://www.youtube.com/watch?v=_EaoPjlTHT

 

Reticulum Manual – Official Protocol Documentation

https://reticulum.network/manual/

 

Reticulum Rust implementation

https://github.com/BeechatNetworkSystemsLtd/Reticulum-rs

 

Reticulum Network Stack – Reference Implementation (GitHub)

https://github.com/markqvist/Reticulum

 

The Zen of Reticulum – Foundational Philosophy

https://reticulum.network/manual/zen.html

Last week marked the official launch of the first NATO DIANA cluster in Espoo, Finland. The opening programme brought together European startups, defence innovators, researchers, and government stakeholders working at the intersection of defence technology, dual-use innovation, and NATO capability development.

The week combined keynote sessions with in-depth working discussions focused on the current European and NATO defence environment. Topics included operational communications requirements, secure and resilient networking, evolving threat models, and the practical realities of NATO and European defence procurement. Particular attention was given to where new capabilities are genuinely needed, and where existing systems struggle under real operational constraints.

A recurring theme throughout the programme was the growing importance of decentralised and resilient communications systems that can operate in contested, denied, or degraded environments. As modern conflicts increasingly involve electronic warfare, spectrum congestion, and infrastructure disruption, the need for robust tactical communications and mesh networking is no longer theoretical, but operationally urgent.

The programme concluded with a gala event that brought together defence decision-makers and senior stakeholders, including representatives from the Finnish Defence Forces and Finland’s Minister of Defence, Antti Häkkänen. The discussions were open and practical, grounded in current defence realities, with conversations continuing well beyond the formal sessions. There was a shared understanding that defence innovation must translate into deployable capability, not just promising demonstrations.

We would like to thank VTT Dual-Use LaunchPad for organising the week, as well as our mentors Mario Aguilera, Benjam Bröijer, Timo Kerola, and Tomi Kankainen for their hands-on engagement and operational insight. We are also grateful to the other companies in the DIANA cohort for the depth of technical discussion and the willingness to share lessons across domains such as communications, autonomy, sensing, and defence software.

For Beechat, the focus now shifts decisively toward real-world use-cases and operational validation. Over the coming months, we will be deploying Kaonic, our secure mesh communications system, into operationally relevant environments. These trials will inform further development, ensuring the system is shaped by real operational feedback rather than laboratory assumptions.

Our objective is to contribute to the next generation of sovereign and resilient communications infrastructure, designed for defence, security, emergency response, and critical infrastructure use, and aligned with NATO’s long-term capability needs. Validation, iteration, and deployment are now the priority.

We look forward to continuing these discussions with the DIANA cohort in Munich in February, as the programme progresses from strategic dialogue toward tangible outcomes and fielded capability.

Contact information:

Web: beechat.network

Sales inquiries: sales@beechat.network

Technical support: outreach@beechat.network

We recently visited our manufacturing facility in Poland to follow the production of our flagship secure communications system, the Kaonic 1S. This visit provided the opportunity to observe the full production chain for our mesh radios, from controlled assembly to electrical testing, verification, and final quality checks. The focus throughout was not only on where the system is built, but on how it is built. Defence and security hardware requires robust processes, consistent execution, and a mature quality assurance framework that ensures every unit operates reliably in real-world conditions.

For systems such as tactical mesh radios, resilient communications platforms, and mission-critical networking devices, engineering alone is not enough. Production quality, repeatability, and supply-chain control directly influence field performance. Every step, including PCB assembly, component validation, optical and X-ray inspection, firmware loading, functional RF testing, and environmental preparation, contributes to ensuring that Kaonic 1S performs as specified across demanding operational environments.

Manufacturing in Europe with trusted partners is a strategic decision. Working with experienced production teams in Poland allows us to maintain supply-chain resilience, transparency, and traceability across all components used in the Kaonic platform. As secure communications requirements continue to evolve, the ability to scale production with confidence and maintain consistent manufacturing standards is just as important as the technical capabilities of the radio itself.

Seeing Kaonic 1S transition from design into full production highlights that building advanced mesh networking systems is not only an engineering challenge, but equally an execution challenge. Reliable radio systems must be built, tested, and validated with the same seriousness as the environments they are intended for. This includes everything from frequency-hopping performance to link stability, encryption support, and ruggedisation for edge deployments.

This work represents continued progress toward delivering systems that are ready for operational deployment, not just demonstration. By combining European manufacturing, rigorous quality assurance, and a clear focus on secure and resilient communications, the Kaonic platform moves steadily toward supporting real missions and real users.

You can watch the video of our production tour here: https://www.youtube.com/watch?v=13SUWuWIJbM

We are incredibly proud to announce that Beechat has been selected as one of the 150 companies joining the NATO Defence Innovation Accelerator for the North Atlantic (DIANA) 2026 Challenge Programme. Chosen from a competitive field of over 3,600 applicants across the Alliance, this selection marks a pivotal moment in our mission to deliver sovereign, resilient communications where they are needed most.

Accelerating Innovation for the Alliance

NATO DIANA was established to maintain the Alliance’s technological edge by identifying and accelerating dual-use solutions that address critical defence and security challenges. As a cornerstone of NATO’s innovation strategy, it connects world-class talent with operational end-users to foster deep-tech resilience.

Being selected for the 2026 Cohort is not just an accolade; it is a strategic opportunity. It allows us to align our infrastructure-independent capabilities with NATO’s urgent requirement for resilient command and control systems that can survive in contested environments.

The Solution: Kaonic

Modern conflict and humanitarian crises have demonstrated the fragility of centralised infrastructure. When cell towers fail or fibre lines are severed, the ability to coordinate evaporates.

Under the DIANA programme, we will accelerate the development of Kaonic, our rugged tactical mesh device designed to operate independently of these vulnerabilities. Unlike conventional radios that rely on IP addressing and routing infrastructure, Kaonic runs on the Reticulum cryptographic networking protocol. This allows for autonomous mesh formation and self-healing routing without the need for central coordination, servers, or discovery protocols that can reveal a unit’s location.

It effectively creates a sovereign network that travels with the operator, ensuring connectivity remains robust even when the electromagnetic spectrum is aggressively denied.

Building for the Future: Post-Quantum Cryptography

Our participation in the accelerator will focus heavily on future-proofing secure communications. We will use this opportunity to integrate National Institute of Standards and Technology (NIST) approved post-quantum cryptography (PQC) algorithms directly into the Kaonic stack.

Owing to the fact that our underlying mesh protocol is natively cryptographic, this integration is structural rather than “bolted on,” granting us a level of deep-rooted security that is inherently difficult for legacy architectures to replicate.

By incorporating Dilithium for digital signatures and Kyber for key encapsulation, we ensure that the networks built today remain secure against the decryption threats of tomorrow. This critical upgrade delivers a future-proof solution for dismounted teams, autonomous systems, and civil responders alike.

Leveraging the Ecosystem

Over the next six months, the Beechat team will leverage DIANA’s transatlantic network to push Kaonic towards full operational maturity. We will be working alongside accelerator sites and accessing a network of over 200 specialised test centres to validate our system’s ruggedness and cryptographic agility in realistic, mission-relevant scenarios.

This programme offers us a unique pathway to engage directly with Allied end-users, ensuring that our sovereign hardware meets the rigorous demands of NATO’s operational needs while retaining the commercial scalability required for widespread adoption.

We look forward to sharing more updates as we progress through the capability sprints and field trials.

 

A turning point for mesh radios

The past year has seen a sharp rise in public interest around mesh radios and off grid communication devices. High profile discussions, including those on widely viewed podcasts, have introduced many people to the idea of decentralised, self forming radio networks. It is a rare moment where a technical concept that usually stays within engineering and defence circles has crossed into general awareness.
This shift is valuable for both the off grid messaging community and professional users. It highlights a growing demand for resilient communication tools that do not depend on mobile networks or central infrastructure. At the same time, the rise in public discussion has also created some confusion about what a mesh radio actually is and what it is capable of. This transition point offers an opportunity to clarify the differences between long range narrowband mesh devices and the professional systems used in real world operations including emerging tactical mesh radios increasingly used in modern military SDR and internet of military things deployments.

What a Mesh Radio Actually Is


A mesh radio is a device that participates in a network where every node can relay messages for others. Instead of relying on a single tower or central point, the network distributes traffic across multiple paths. If one link fails or a node moves, the network adjusts automatically. In military and defence communications this is often referred to as a military mesh network or IP mesh radio, enabling voice, data and sensor exchange without fixed infrastructure.

The result is a communication system that can continue functioning even when infrastructure is unavailable or unreliable. Mesh networking is especially useful for field teams, search and rescue operations, robotics, UAVs and anyone operating outside the reach of established networks.

In practice, this includes scenarios such as:

urban rescue teams maintaining communication around concrete structures that block line of sight
• UAV telemetry that must stay stable in cluttered RF environments
• drone fleets requiring both command links and live sensor or video data
• dismounted teams sharing position, text and sensor information at the same time
tactical operators requiring software defined radio military applications for coordinated manoeuvre

As interest grows, it is important to understand that mesh networking is not one single technology. There are many classes of mesh radios, each built for different purposes, frequencies and environments. The recent public exposure has driven many people to search for simple explanations, and this is where clear guidance is needed.

The Rise of Mesh Devices


Long range narrowband radios based on LoRa-class modulation have grown quickly in popularity. They are affordable, easy to set up and ideal for experimentation. They allow people to explore long range links, basic relay networks and off grid messaging, which has led to vibrant communities of enthusiasts building their own decentralised communication systems. These devices are low cost, low power and highly accessible. They also serve as an introduction to mesh networking for many people who previously had no exposure to radio communications.

However, a narrowband architecture inherently limits throughput and shared network capacity. Typical LoRa configurations operate in 7.8 kHz to 500 kHz of bandwidth and deliver net data rates in the low kilobit per second range, depending on environmental conditions and spreading factor settings.

While these radios can reach very high sensitivity (as low as −148 dBm) for extended range, the trade-off is limited capacity and long airtime per message. When several users or multi-sensor applications share the same narrow channel, collisions, interference and duty-cycle constraints rapidly impact reliability.

Scalability studies show higher packet loss and congestion as node count or message frequency increases. Even modest situational awareness traffic, such as multiple GPS and text updates per minute across a small team, can push the channel close to saturation, especially in cluttered RF environments.

For personal messaging, field experimentation and low-rate telemetry, these systems are excellent. Yet, they are not designed for real time coordination, low latency, or multi-stream operations that require simultaneous command, control, sensor data and mapping overlays.

This growing public adoption is positive for the industry as a whole, but it can lead to misaligned expectations when users apply narrowband radios to mission-critical scenarios where performance demands exceed what the underlying technology can deliver.

From Experimental Platforms to Operational Requirements: Where the gap appears


The difference between low power long range messaging devices and a professional system becomes clear when communication is needed under pressure.
Professional users require higher power levels, greater throughput and more robust modulation schemes. Tactical teams need equipment that maintains links even when interference is present or when multiple nodes are moving rapidly. UAV operators expect stable telemetry and command links that tolerate long distances, changing elevation and urban clutter.


Operational environments often involve:

• complex RF noise
• deliberate jamming
• heavy multipath conditions
• simultaneous voice, data and sensor traffic
• integration with other platforms such as drones or vehicles

A device designed for experimentation cannot meet these demands. The growing public awareness is helpful, but it is equally important to make the distinction clear so that expectations align with real performance needs, especially in military IoT environments where security and reliability are mission-critical.

What Defines a Professional Mesh SDR Platform


A professional mesh radio is usually built around a software defined radio architecture. This allows it to operate across multiple frequency bands and adapt its waveform to changing conditions. The distinction becomes clear when comparing the underlying radio capabilities.

Long range narrowband mesh devices typically operate in tens to hundreds of kilohertz of bandwidth and deliver net data rates in the low kilobit per second range. This is excellent for occasional messaging over long distances, but the limited throughput quickly becomes a bottleneck when multiple nodes share the channel or when telemetry, mapping data and other situational awareness traffic must be carried together.

Professional wideband mesh SDR platforms operate in multi-megahertz channel widths using OFDM or similar waveforms with adaptive modulation such as QPSK through 64QAM. Combined with MIMO and spatial diversity techniques, these systems provide multi-megabit throughput and maintain stable links for fast moving nodes in congested and multipath environments. Even under low signal-to-noise conditions, they deliver enough capacity for real time telemetry, voice, and live situational awareness overlays.

Key characteristics include:

• multi band operation combining long range sub-GHz and higher throughput 2.4 GHz links
• channel bandwidths in the MHz range enabling multi-megabit data rates
• frequency agility and hopping techniques to avoid interference and reduce detectability
• support for fast moving nodes such as UAVs through MIMO and diversity waveforms
• mesh networking stacks designed to handle real traffic loads including video, maps and telemetry
• secure boot, signed firmware and hardware-rooted AES-256 encryption for operational security
• ruggedised hardware and thermal performance for field deployments and EMI-constrained environments

In more classified or government-restricted environments, mission systems may incorporate technologies such as inline network encryption or high assurance internet protocol encryptors to protect sensitive data at scale, sitting alongside professional mesh SDR platforms as part of a wider secure communications architecture.

These systems are built so that a single mesh network can simultaneously carry the traffic required for coordination in the field: command and control, sensor data, blue force tracking, real time mapping and other streams essential for safety and mission success.

Why This Public Interest Matters for Industry and Defence


The sudden growth in public interest is beneficial for the broader communications, defence and military internet of things industries. It introduces new users to the concept of decentralised radio networks and increases the overall level of understanding.
It also encourages small defence contractors, drone integrators and robotics developers to explore mesh technologies sooner than they otherwise would have. Many start by testing narrowband mesh capable radios before realising their limitations and seeking more capable alternatives.
This bridge between consumer enthusiasm and professional requirements is where meaningful industry growth occurs. Better informed customers make better decisions, and a wider knowledge base ultimately strengthens adoption across sectors such as emergency response, unmanned systems and security.

How Beechat’s Kaonic Platform Fits Into This New Landscape


The Kaonic platform was designed from the ground up as a professional, dual-use mesh SDR for both civilian and defence deployments. Operating across CE-compliant 868 MHz and FCC Part 15-compliant 902–928 MHz sub-GHz bands, as well as 2.4 GHz ISM, it enables long-range penetration and high-bandwidth situational awareness links within a single compact system, making it highly suitable for tactical SDR deployments and secure IP mesh radio architectures.

With two transceivers per band, Kaonic supports concurrent operation across sub-GHz and 2.4 GHz, delivering multi-megabit aggregate throughput under licensed or authorised configurations. This allows command, control and sensor data to flow together on one secure, decentralised mesh.

Kaonic is engineered for straightforward integration into UAVs, ground vehicles and dismounted kits, with modular expansion via M.2 FPGA and AI plug-ins for advanced robotic and autonomy applications. End-to-end encryption using modern public-key cryptography ensures secure geospatial messaging and decentralised networking without reliance on infrastructure.

As organisations move beyond low throughput radios, Kaonic demonstrates what a next generation tactical mesh radio delivers: robust, secure connectivity designed for real operational use cases across drones, robotics and field teams.

Where Mesh Communications Are Headed


Decentralised communications will continue to expand as mobility, autonomy and field operations evolve. Mesh networks are well suited for unmanned platforms, distributed sensors and teams that operate in unpredictable environments.
Future systems will likely place more emphasis on:

• adaptive waveforms
• multi band operation
• secure interoperability
• compact hardware
• integration with aerial and ground robotics

The increased visibility of mesh communications will accelerate development in these areas and draw more talent, research and investment into the field.

The Bridge Moment


The recent surge in attention around mesh radios marks a meaningful moment for the industry. Long range narrowband mesh devices have introduced thousands of new users to the idea of off grid, decentralised communication. As their understanding grows, many will look for more capable systems that meet real operational demands.
This creates a natural bridge between consumer curiosity and professional adoption. The role of companies in the sector is to provide clarity, guidance and equipment that meets the expectations of users who are moving beyond experimentation into practical use.
Mesh radios are now part of the public conversation. The next step is helping people understand what makes a system ready for real world operations and how professional platforms differ from the devices that first sparked their interest. Beechat works with organisations across defence, robotics and UAV systems to deploy secure, resilient mesh communications in the field. Teams evaluating operational requirements are welcome to reach out for demonstrations, technical integration discussions or case studies based on real deployments.

Readers who want to explore the subject further can find additional articles on mesh radios, professional mesh networking and off grid communication systems across our blog.

 

Sources

https://cdn-shop.adafruit.com/product-files/3179/sx1276_77_78_79.pdf?

https://en.wikipedia.org/wiki/LoRa?

https://pmc.ncbi.nlm.nih.gov/articles/PMC7435450/?

https://www.mdpi.com/1424-8220/23/5/2403

https://www.mdpi.com/1424-8220/21/13/4314

https://www.researchgate.net/publication/350896359_Hybrid_LoRa-IEEE_80211s_Opportunistic_Mesh_Networking_for_Flexible_UAV_Swarming