Published March 28, 2026 | Version 2.0
Report Open

BLADE-INFRA Governance Node: Authority-Governed Critical Infrastructure Protection Architecture for Power Grids, Water Treatment, and Industrial Control Systems

Authors/Creators

  • 1. EDMO icon Georgetown University

Description

Project Overview

BLADE-INFRA is a hardware-enforced, authority-governed protection architecture designed for critical infrastructure systems, including power grids, water treatment facilities, and industrial control environments. Rather than allowing actuator decisions to emerge directly from sensor readings or software logic, the system introduces an independent governance layer that determines whether physical actions are permitted under current system conditions.

The central question addressed by the architecture is:

“Given uncertainty, sensor reliability, and potential adversarial conditions, should the system be allowed to actuate?”

To answer this, BLADE-INFRA implements an eleven-stage governance pipeline that processes electrical, environmental, and process-control signals through anomaly correlation, trust evaluation, authority computation, advisory consensus, escalation control, and recovery logic before any actuator command is executed. The system integrates probabilistic reasoning through Dempster–Shafer evidence fusion, dynamically adjusts authority based on sensor trust degradation, and enforces safety constraints through a hardware-level interlock.

In contrast to conventional industrial control systems that rely on network segmentation or software safeguards, BLADE-INFRA enforces authority decisions at the hardware boundary. This ensures that unsafe or insufficiently verified actions cannot propagate to physical infrastructure, even in the presence of compromised control interfaces or manipulated data streams. The architecture is designed to mitigate threats such as sensor spoofing, protocol injection, cascading failures, insider manipulation, and communication disruption.

The project provides a fully reproducible system design, including a complete simulation environment, hardware specifications, configuration artifacts, and engineering documentation. While current results are derived from simulation-based validation, the system is engineered toward deployment under industrial safety and cybersecurity frameworks, including NERC CIP, IEC 61850, and IEC 62443.

BLADE-INFRA extends the authority-governed autonomy paradigm across domains, building upon prior implementations in defense and autonomous systems, and demonstrates its applicability as a generalized safety architecture for cyber-physical infrastructure.

 

Technical Description

BLADE-INFRA introduces a hardware-enforced authority gating architecture for critical infrastructure using Dempster–Shafer trust fusion and an eleven-stage governance pipeline:

Sensors → ADARA → SATA → IFF → HMAA → MAIVA → FLAME → ERAM → CARA → BDA → EFFECTOR

The system incorporates several core computational elements: (1) multi-sensor trust fusion combining power quality, flow, pressure, and environmental inputs, (2) anomaly-driven trust modulation for identifying inconsistent or adversarial signals, (3) authority computation that increases intervention confidence under verified fault conditions, and (4) advisory and escalation mechanisms that provide additional decision support without bypassing safety constraints.

Five primary governance modules — SATA (sensor trust fusion), HMAA (authority computation), MAIVA (multi-agent advisory consensus), FLAME (cascade prevention through controlled actuation timing), and CARA (deterministic recovery protocol) — operate across a dual-compute architecture consisting of a Zynq UltraScale+ FPGA for deterministic governance logic and a Jetson Orin NX platform for anomaly detection and infrastructure assessment.

The platform defines a complete hardware architecture comprising 92 components with fully specified electrical and mechanical interconnections, supported by a detailed bill of materials and system configuration files. The repository includes all engineering artifacts required for reproduction, including simulation tools, configuration datasets, schematics, and assembly guidance.

All results are based on simulation and architectural validation; hardware implementation, certification, and field deployment remain ongoing work. The design targets safety-critical operational environments and demonstrates the scalability of authority-governed control principles across infrastructure, defense, and autonomous system domains.

Files

blade-infra-zenodo-paper.pdf

Files (2.1 MB)

Name Size Download all
md5:0c91d6d84e13184fff8263031db2c61b
20.4 kB Preview Download
md5:ff7c0a84de9af934539563e3245eb4dd
142.4 kB Preview Download
md5:c628436cde4abc3487e352c9206e5aef
21.2 kB Preview Download
md5:8827bb373e8dfa7c86d05c6dd0a5edf4
9.7 kB Preview Download
md5:fda6a22bb28dcdcb920263c383b4f9fc
9.6 kB Preview Download
md5:82c2820e71b0504f1d5fc08f1067fe7f
154.8 kB Download
md5:e74b9c7b91e1e7863f38da10d390c9ee
100.2 kB Download
md5:24d18af5805e52eb67ae31667fb5e9ab
1.7 MB Preview Download

Additional details

Software

Repository URL
https://burakoktenli.com/repo-blade-infra
Programming language
JavaScript , HTML , JSON
Development Status
Active