BLADE-INFRA Governance Node: Authority-Governed Critical Infrastructure Protection Architecture for Power Grids, Water Treatment, and Industrial Control Systems
Description
Project Overview
BLADE-INFRA is a hardware-enforced, authority-governed protection architecture designed for critical infrastructure systems, including power grids, water treatment facilities, and industrial control environments. Rather than allowing actuator decisions to emerge directly from sensor readings or software logic, the system introduces an independent governance layer that determines whether physical actions are permitted under current system conditions.
The central question addressed by the architecture is:
“Given uncertainty, sensor reliability, and potential adversarial conditions, should the system be allowed to actuate?”
To answer this, BLADE-INFRA implements an eleven-stage governance pipeline that processes electrical, environmental, and process-control signals through anomaly correlation, trust evaluation, authority computation, advisory consensus, escalation control, and recovery logic before any actuator command is executed. The system integrates probabilistic reasoning through Dempster–Shafer evidence fusion, dynamically adjusts authority based on sensor trust degradation, and enforces safety constraints through a hardware-level interlock.
In contrast to conventional industrial control systems that rely on network segmentation or software safeguards, BLADE-INFRA enforces authority decisions at the hardware boundary. This ensures that unsafe or insufficiently verified actions cannot propagate to physical infrastructure, even in the presence of compromised control interfaces or manipulated data streams. The architecture is designed to mitigate threats such as sensor spoofing, protocol injection, cascading failures, insider manipulation, and communication disruption.
The project provides a fully reproducible system design, including a complete simulation environment, hardware specifications, configuration artifacts, and engineering documentation. While current results are derived from simulation-based validation, the system is engineered toward deployment under industrial safety and cybersecurity frameworks, including NERC CIP, IEC 61850, and IEC 62443.
BLADE-INFRA extends the authority-governed autonomy paradigm across domains, building upon prior implementations in defense and autonomous systems, and demonstrates its applicability as a generalized safety architecture for cyber-physical infrastructure.
Technical Description
BLADE-INFRA introduces a hardware-enforced authority gating architecture for critical infrastructure using Dempster–Shafer trust fusion and an eleven-stage governance pipeline:
Sensors → ADARA → SATA → IFF → HMAA → MAIVA → FLAME → ERAM → CARA → BDA → EFFECTOR
The system incorporates several core computational elements: (1) multi-sensor trust fusion combining power quality, flow, pressure, and environmental inputs, (2) anomaly-driven trust modulation for identifying inconsistent or adversarial signals, (3) authority computation that increases intervention confidence under verified fault conditions, and (4) advisory and escalation mechanisms that provide additional decision support without bypassing safety constraints.
Five primary governance modules — SATA (sensor trust fusion), HMAA (authority computation), MAIVA (multi-agent advisory consensus), FLAME (cascade prevention through controlled actuation timing), and CARA (deterministic recovery protocol) — operate across a dual-compute architecture consisting of a Zynq UltraScale+ FPGA for deterministic governance logic and a Jetson Orin NX platform for anomaly detection and infrastructure assessment.
The platform defines a complete hardware architecture comprising 92 components with fully specified electrical and mechanical interconnections, supported by a detailed bill of materials and system configuration files. The repository includes all engineering artifacts required for reproduction, including simulation tools, configuration datasets, schematics, and assembly guidance.
All results are based on simulation and architectural validation; hardware implementation, certification, and field deployment remain ongoing work. The design targets safety-critical operational environments and demonstrates the scalability of authority-governed control principles across infrastructure, defense, and autonomous system domains.
Files
blade-infra-zenodo-paper.pdf
Files
(2.1 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:0c91d6d84e13184fff8263031db2c61b
|
20.4 kB | Preview Download |
|
md5:ff7c0a84de9af934539563e3245eb4dd
|
142.4 kB | Preview Download |
|
md5:c628436cde4abc3487e352c9206e5aef
|
21.2 kB | Preview Download |
|
md5:8827bb373e8dfa7c86d05c6dd0a5edf4
|
9.7 kB | Preview Download |
|
md5:fda6a22bb28dcdcb920263c383b4f9fc
|
9.6 kB | Preview Download |
|
md5:82c2820e71b0504f1d5fc08f1067fe7f
|
154.8 kB | Download |
|
md5:e74b9c7b91e1e7863f38da10d390c9ee
|
100.2 kB | Download |
|
md5:24d18af5805e52eb67ae31667fb5e9ab
|
1.7 MB | Preview Download |
Additional details
Identifiers
Software
- Repository URL
- https://burakoktenli.com/repo-blade-infra
- Programming language
- JavaScript , HTML , JSON
- Development Status
- Active