The Internet of Military Things is Transforming Defense Operations
Defense is evolving with the Internet of Military Things—enabling smarter systems, connected assets, and advanced cybersecurity.
6 minutes
19th of May, 2025
As militaries increasingly rely on connected technologies, the rise of the Internet of Military Things (IoMT) is accelerating. From net-centric warfare to air-gapped smartphones and tactical 5G, modern forces are adopting civilian innovation in high-stakes combat environments.
Net-Centric Warfare: Where Cyber Is the Fifth Domain
Net-centric warfare is revolutionizing how armed forces operate by making situational awareness seamless across land, sea, air, space, and now cyber. Near real-time data sharing—from headquarters to individual soldiers—demands that everything is connected internally yet fortified from external threats.
Net-centric warfare is revolutionizing how armed forces operate by making situational awareness seamless across land, sea, air, space, and now cyber.
This connectivity pulls cutting-edge technology from civilian industries into the extreme conditions of battlefield operations. From cloud-less cloud tech to ruggedized smartphones with civilian interfaces, engineers are innovating to provide high functionality in isolated, secure environments.
Even legacy military equipment, like 20-year-old vehicle systems, is being repurposed with modern software to meet current mission needs. Today’s defense tech is essentially “race car” performance with the durability of a tank.
Four Innovation Trends Shaping the Modern Military
The Internet of Military Things (IoMT) is driven by four major tech trends: more small connected devices, faster data processing, better wireless communication, and the growing importance of software that ties everything together.
“Software is king.” In fact, today’s defense technology sees more focus on software than hardware. The F-35 fighter jet, for example, runs over 8 million lines of code—four times more than its predecessor, the F-22. The USS Zumwalt, the US Navy’s most advanced ship, operates with 7 million lines of code.
Unified Combat Systems Enable Real-Time Decision-Making
Unified software systems like C4I (Command, Control, Computers, Communications, and Intelligence) are vital to modern military operations. These systems integrate data from satellites, radars, drones, and smartphones, providing real-time insights to military commanders.
Transparency across the command chain allows faster, safer, and more efficient operations. Even individual soldiers act as edge nodes, accessing the same battlefield intelligence as their commanding officers.
Transparency across the command chain allows faster, safer, and more efficient operations.
While strict communication protocols still limit the data flow between frontline and HQ, workarounds like cloud-less cloud access and secure air-gapped smartphones are bridging this divide.
Cybersecurity: The Always-Active Battlefield
The more connected military operations become, the more vulnerable they are to cyber threats. As NATO notes, “Cyberspace is contested at all times.” Cyberattacks can destabilize not just armed forces but entire economies and societies.
This has made collaboration between public, private, and defense sectors essential. These partnerships strengthen both passive and active cybersecurity postures.
For militaries, cybersecurity is paramount. With growing reliance on networked weapon systems and sensor-based intelligence, any vulnerability could compromise entire defense operations.
Tactical 5G and Strategic Communications
As part of net-centric transformation, Akkodis subsidiary Data Respons is enhancing tactical IP networking routers for 5G support. The Norwegian Armed Forces are testing private 5G networks to create secure, mobile battlefield communication systems.
Tactical 5G enables mobile military units to deploy autonomous networks on the move. Using small mobile cells (COWs – Cells on Wheels), troops can access high-speed, secure networks independent of civilian infrastructure. Data Respons’ solutions played a key role in Norway’s 5G-FUDGE pilot program.</body>
Proactive Cyber Defense with Honeypots
Akkodis is also advancing offensive cybersecurity tactics by deploying honeypots—deceptive cloud-based servers designed to lure and analyze cyberattacks before they cause damage.
These traps collect attacker behavior data, enabling real-time visualization and preventive response. Metrics tracked include the top attacking IP addresses, geographies, most-used passwords, and attack vectors. This intelligence helps identify and stop threats—even before they occur.