Tackling the Mobile Networking Challenges of Tomorrow

5G mobile networks represent a leap forward and offer revolutionary possibilities for smart cities, intelligent transportation, remote healthcare, and more. Maximizing these capabilities will require solutions to the challenges posed by wide adoption—ones that will unlock the potential of 5G, 6G, and beyond.

Peraton provides a bridge between emerging technologies in the commercial space and the needs of the government, leveraging those widely available products and customizing them to meet unique agency and military customer needs. Peraton is at the forefront of 5G with standards leadership, a full-featured 5G testbed, and a growing set of customer-funded 5G research, development, demonstration, and testing projects, including:

  • 5G zero trust architecture at scale
  • A revolutionary breakthrough in mobile telemetry
  • Machine learning to facilitate spectrum sharing
  • Edge computing to block bot attacks


Protect the Internet of Things

Among the billions of interconnected IoT devices installed today, low-cost, battery-operated devices are prolific and hard to defend, creating vulnerable entry points for hackers. As the cyber-physical convergence expands, digital vulnerabilities can cause increasingly severe, real-world consequences.

Peraton is developing a zero trust security architecture for 5G called SEDIMENT to protect against rogue devices, supply chain attacks, and defend resource-constrained endpoints. SEDIMENT relies exclusively on software and requires no modification to existing devices, which cuts down on cost, software verification, and encryption challenges. This distributed, scalable security architecture protects large numbers of networked integrity of Internet of Things (IoT) systems, including cell phones, smart security systems, and fitness trackers.


Access 5G in planes traveling at supersonic speeds

5G systems cannot provide reliable communications for users and devices moving at high speeds, such as those on aircraft—but Velocite™ leverages unmodified commercial 4G and 5G LTE infrastructure to deliver real-time, air-to-ground data communications at speeds exceeding Mach 1.

Velocite allows aerospace and defense organizations to leverage commercial investments in 5G to provide enhanced and affordable services for testing, training, predictive maintenance, and flight operations. It enables vendor-agnostic, future-proof data communications for testing, training, maintenance, and operations at a fraction of the current cost. This will allow multiple tests and communication channels to deliver information at the speed of the need, advancing military and commercial air platforms.


Cut through spectrum interference in congested or contested domains

5G deployment creates risks of spectrum interference. Intelligent, real-time spectrum sharing lets you get the most out of the available spectrum bands without the risk of critical communications becoming dropped or garbled due to interference.

Peraton is currently supporting the Department of Defense (DoD) on multiple large-scale experimentation projects to address the challenges of managing interference, enabling coexistence, and assuring service. One project, focusing on Dynamic Spectrum Utilization, allows for cooperating and non-cooperating 5G networks to coexist without interruption. This intelligent, 5G system control is based on machine learning and uses sophisticated signal processing techniques to detect and react to radar activity, interpret sensor data, and improve spectrum utilization.


Achieve defense-in-depth for 5G systems

5G systems are not invulnerable; an attack could devastate operations across modern society. Even some of the world’s largest tech giants have fallen victim to distributed denial of service (DDoS) attacks, also known as bot attacks, which are among the most malicious cyber threats.

Peraton is creating a programmable, real-time, distributed defense-in-depth solution, known as ProD3, to protect 5G services against cyberattacks and ensure service availability. The system uses edge computing and programmable network switches to detect and block malicious DDoS attacks. ProD3 ensures service continuity by generating code and delivering defense capabilities to protect networks from as many as 1 trillion bots.