BLADE-INFRA = Authority-Governed Critical Infrastructure Protection for ICS/SCADA
A ruggedized, authority-governed edge computing platform for critical infrastructure protection, ICS/SCADA monitoring, and industrial process control. Integrates Dempster-Shafer trust fusion, four-level authority with hysteresis, Byzantine fault-tolerant consensus, deliberation windows, and deterministic recovery — all enforced through a SIL-3 safety relay circuit driving a normally-open Pilz PNOZ S7.1 safety relay.
Published on Zenodo · DOI: 10.5281/zenodo.19277887This platform demonstrates that authority-governed autonomy is domain-agnostic: the same governance pipeline demonstrated in defense (BLADE-EDGE) applies directly to critical infrastructure systems under SIL 3 / IP65, NERC CIP, FIPS 140-2 Level 3, and IEC 62443 requirements.
Zenodo Publication: Oktenli, B. (2026). BLADE-INFRA Governance Node: Authority-Governed Critical Infrastructure Protection Node for ICS/SCADA Systems (v6.0). Zenodo. https://doi.org/10.5281/zenodo.19277887
U.S. critical infrastructure — power grids, water treatment plants, oil and gas pipelines — is increasingly connected to networked ICS/SCADA systems vulnerable to cyberattack. Presidential Policy Directive 21 identifies 16 critical infrastructure sectors requiring protection. The 2021 Oldsmar water treatment attack demonstrated that adversaries can remotely manipulate industrial process controls. Current SCADA systems lack formal governance mechanisms that continuously evaluate sensor trust and enforce graded authority over actuator commands. A compromised PLC can overdose chemicals, trip breakers, or open valves without proportional authority reduction.
The BLADE-INFRA Governance Node addresses this gap by applying the SATA-HMAA-MAIVA-FLAME-CARA pipeline demonstrated in defense weapons systems governance (BLADE-EDGE) to critical infrastructure ICS/SCADA governance, targeting SIL 3 functional safety (IEC 61508), NERC CIP cybersecurity compliance (CIP-003 through CIP-009), IP65 environmental protection, and IEC 62443 industrial cybersecurity requirements.
Critical infrastructure control systems operate in environments where cyberattacks can cause physical harm — chemical overdoses in water treatment, cascading blackouts in power grids, and pipeline ruptures in oil and gas. Three challenges distinguish the ICS/SCADA domain: legacy protocols (Modbus RTU, DNP3) lack authentication, safety-instrumented systems operate independently from cybersecurity monitoring, and multi-protocol environments require unified governance across IEC 61850 GOOSE, Modbus TCP, PROFINET IO, and 4-20mA analog signals.
The BLADE-INFRA governance pipeline is architecturally identical to the BLADE-EDGE defense variant (DOI: 10.5281/zenodo.19177472). This cross-domain portability demonstrates that authority-governed autonomy — continuous sensor trust fusion, graded authority with hysteresis, deliberation windows, and deterministic recovery — is a domain-agnostic safety principle applicable wherever autonomous systems exercise physical authority.
Directed-energy weapon governance. EFFECTOR = weapons release relay. MIL-STD-810G. Beam suitability (β_beam). Multi-effector WTA. ~$139K.
ICS/SCADA governance. EFFECTOR = Pilz PNOZ S7.1 SIL-3 safety relay. IP65. IEC 61850 + Modbus + PROFINET. NERC CIP. $12K.
Every infrastructure governance decision passes through nine sequential modules. The pipeline targets sub-second end-to-end latency. Each stage can independently prevent commands from reaching actuators.
4× CT sensors (100A), 3× PT sensors (480V), ADE9000 power analyzer, 2× ultrasonic flow, 2× pressure transducers, 4× RTD Pt100, 2× humidity, multi-gas detector, radar level sensor
Dempster-Shafer fusion over power quality, process, and environmental sensor channels. Weighted BPA from ADE9000 THD, flow differential, and gas concentration. Zynq FPGA.
Anomaly detection across ICS protocol channels (Modbus, IEC 61850, PROFINET). Pattern recognition for Stuxnet-class command injection. Jetson Orin NX.
SCADA master station authentication via ATECC608B. IEC 62351 certificate verification for IEC 61850 GOOSE messages. Zynq FPGA.
Trust scalar → graded authority over actuator commands (breaker trip, valve shutoff, pump control). SIL-3 safety relay gating. Zynq FPGA.
2-of-3 Byzantine fault-tolerant consensus on authority level. Zynq FPGA.
Mandatory deliberation window before safety-critical actuator commands (breaker trip, valve closure). Prevents flash-override attacks. Zynq FPGA.
GREP phases: Govern → Restrict → Execute → Persist. Mutual exclusion verified. Zynq FPGA.
Post-event trust revalidation and incident reporting. NERC CIP event logging. Jetson Orin NX.
Pilz PNOZ S7.1 SIL-3 safety relay (dual-channel, Cat. 4). Actuator commands pass ONLY when Zynq PASS ∧ Jetson APPROVE. Watchdog-independent hard reset.
Four-level authority with asymmetric hysteresis: immediate downgrade, 5-15s delayed upgrade. CARA GREP phases provide graduated operational restrictions within authority levels.
T_fused ≥ 0.80. Full autonomous authority. All actuator commands (breakers, valves, pumps) authorized. Operator advisory only.
0.50 ≤ T_fused < 0.80. Constrained operations. Non-critical actuators only. Safety-critical commands require operator confirmation.
0.15 ≤ T_fused < 0.50. All actuator commands blocked except emergency shutdown. CARA Restrict phase.
T_fused < 0.15. Safety relay de-energizes. All actuators safe-state. Emergency shutdown. CARA Execute/Persist.
92 components across a dual-compute platform. Jetson Orin NX runs AI perception (ADARA, IFF, BDA). Zynq UltraScale+ FPGA runs deterministic governance (SATA, HMAA, MAIVA, FLAME, CARA) and relay control. PCIe Gen3 x4 inter-processor governance bus.
| Subsystem | Component | Interface | Role |
|---|---|---|---|
| AI Compute | NVIDIA Jetson Orin NX 16GB | PCIe Gen3×4 | ADARA, IFF, BDA inference; anomaly detection |
| Governance FPGA | Zynq UltraScale+ ZU7EV SoM | PCIe / SPI / UART | SATA, HMAA, FLAME, CARA RTL governance |
| Power Grid | 4× CT (100A) + 3× PT (480V) | Analog → ADE9000 | 3φ + N current/voltage monitoring |
| Power Quality | ADE9000 Power Analyzer | SPI 20 MHz | THD, power factor, harmonics (IEC 61000) |
| Pipeline | 2× Ultrasonic Flow + 2× Pressure | 4-20mA / HART | Non-invasive flow; SIL-2 pressure transducers |
| Environment | 4× RTD Pt100 + 2× Humidity + Gas | ADC / I²C / UART | Temp, humidity, H₂S/CH₄/CO/O₂ detection |
| Industrial Protocols | Anybus B40 + netX 90 + RS-485 | SPI / DPRAM | Modbus/EtherNet/IP/PROFINET/IEC 61850 |
| Safety Relay | Pilz PNOZ S7.1 (SIL 3, Cat. 4) | Safety I/O 24V | Dual-channel actuator authority gate |
| Crypto / Auth | ATECC608B + TPM 2.0 + nShield HSM | I²C / SPI / PCIe | ECDSA, secure boot, FIPS 140-2 Level 3 |
| Timing | ZED-F9T GNSS + OCXO + PTP NIC | UART / PPS / RGMII | IEEE 1588 PTPv2, sub-μs sync, GPS holdover |
| Comms | LTE Cat-M1 + Iridium SBD + ESP32-S3 | USB / UART / SPI | Cellular + satellite + local WiFi/BLE |
| Power | 24V PSU (redundant) + PoE++ + LiFePO₄ | 24V / 48V DC | Redundant power, 30-min battery backup |
Full 92-component BOM available as downloadable CSV. Total platform cost: ~$11,589.70. All COTS components, no GFE required.
The BLADE-INFRA power architecture provides industrial-grade redundant power with AC mains, PoE++, and LiFePO₄ battery backup for uninterrupted critical infrastructure monitoring.
240V AC mains → 24V DIN-rail PSU (primary) + redundant 24V PSU (Phoenix Contact QUINT4). PoE++ input module for network-powered deployment. All rails fused and surge-protected.
LiFePO₄ battery pack with BMS for ~30 min backup. Vibration-dampened bracket mounting. Automatic switchover on mains loss.
Dual surge protection devices (SPD-1, SPD-2) on AC input. Reverse polarity and overvoltage protection on DC bus. DIN-rail mounted circuit protection.
Thermoelectric cooler with heatsink bolted to DIN-rail enclosure for external heat rejection. Thermal paste on Jetson and Zynq modules. Rated for −40°C to +70°C industrial environments.
Three-layer security architecture meeting FIPS 140-2 Level 3, NERC CIP, and IEC 62443 requirements for critical infrastructure protection.
Microchip ATECC608B secure element (I²C). Infineon Optiga TPM 2.0 (SPI). Thales nShield Edge HSM (PCIe Gen2 x1) for FIPS 140-2 Level 3 key management. JTAG isolation switch with physical keyed lockout.
Pilz PNOZ S7.1 SIL-3 safety relay with dual-channel safety I/O. Zynq FPGA governance pipeline. Hardware watchdog timer (2-stage). Tamper-evident seals on all access points.
SATA τ-chain attestation signed by ATECC608B + nShield HSM. NERC CIP event logging. IEC 62351 certificate verification for IEC 61850 GOOSE messages.
| Subsystem | Cost | % of Total |
|---|---|---|
| Compute Core (Jetson Orin NX + Zynq ZU7EV + carrier PCB) | $3,800 | 33% |
| Sensors (CT/PT sensors + flow + pressure + RTD + humidity + gas) | $2,450 | 21% |
| Industrial Protocols (Anybus B40 + netX 90 + RS-485 transceivers) | $1,200 | 10% |
| Security (ATECC608B + TPM 2.0 + nShield HSM + JTAG isolation) | $850 | 7% |
| Communications (LTE Cat-M1 + Iridium SBD + ESP32-S3 + PTP NIC) | $620 | 5% |
| Power (redundant PSU + PoE++ + LiFePO₄ + SPDs) | $580 | 5% |
| Safety (Pilz PNOZ S7.1 + watchdog + safety digital output) | $320 | 3% |
| Enclosure & Mechanical (DIN-rail + TEC heatsink + connectors + seals) | $1,770 | 15% |
Total platform cost: $11,589.70. All COTS components, no GFE required. Full 92-component BOM available as downloadable CSV.
| Parameter | Value |
|---|---|
| Operating temperature | −40°C to +70°C (industrial grade) |
| Enclosure rating | IP65 DIN-rail industrial enclosure |
| Power input | 240V AC mains + PoE++ (48V) + LiFePO₄ backup |
| Safety standard | SIL 3 (IEC 61508); NERC CIP (CIP-003 through CIP-009) |
| Security | FIPS 140-2 Level 3 (nShield HSM); IEC 62443 |
| Thermal | Thermoelectric cooler with bolted-flange heat rejection |
| Industrial protocols | IEC 61850 GOOSE · Modbus TCP/RTU · PROFINET IO · 4-20mA HART |
| Timing | IEEE 1588 PTPv2 (sub-μs sync) + GPS-disciplined OCXO holdover |
| Governance pipeline | SATA → ADARA → IFF → HMAA → MAIVA → FLAME → CARA → BDA → EFFECTOR |
| Safety relay | Pilz PNOZ S7.1 (SIL 3, Cat. 4), dual-channel safety I/O |
The Pilz PNOZ S7.1 SIL-3 safety relay provides dual-channel, Category 4 actuator authority gating. Both governance processor (Zynq) and AI inference engine (Jetson) must independently assert authority via isolated safety I/O channels. Any single channel de-assertion de-energizes the relay and forces all actuators to safe-state — breakers open, valves close, pumps stop.
Zynq UltraScale+ safety I/O → Pilz Channel 1. SATA/HMAA/CARA pipeline asserts PASS when sensor trust verified and authority computed.
Jetson Orin NX safety I/O → Pilz Channel 2. ADARA/IFF/BDA anomaly detection confirms no adversarial activity detected.
Hardware watchdog timer monitors both processors. Timeout → both safety channels de-assert → relay de-energizes → all actuators safe-state.
92 components, 82 electrical connections, 67 mechanical connections. Color-coded by node type.
The BLADE-INFRA simulator (v6.0, 98KB) executes the complete 9-module governance pipeline with three ICS/SCADA scenarios (power grid fault, water treatment overdose, pipeline leak), vintage CRT SCADA terminal live mode with animated SVG pipe-game schematics, sensitivity analysis, fault tree analysis, and MITRE ATT&CK for ICS threat mapping.
Power grid fault (IEC 61850 GOOSE, 340% overcurrent), water treatment overdose (Modbus TCP, Oldsmar-class), pipeline leak (Modbus RTU, H₂S + flow differential)
Vintage CRT SCADA terminal with animated SVG pipe-game schematics. Sensitivity analysis and MITRE ATT&CK for ICS mapping.
G*Power justified (α=0.05, power=0.80, d=0.80). Bonferroni correction. Shapiro-Wilk normality tests.
| ICS Scenario | Protocol | Trigger | SATA Response | HMAA Action | Actuator Action |
|---|---|---|---|---|---|
| Power Grid Fault | IEC 61850 GOOSE | Phase B 340% overcurrent + THD spike | τ: 0.92→0.31 | α=0.98 ≥ 0.90 | Breaker trip via SIL-3 relay |
| Water Treatment Overdose | Modbus TCP | Chlorine pump 280% overdose (Oldsmar-class) | pH dropping to 5.8 | α=0.95 ≥ 0.80 | Pump shutoff authorized |
| Pipeline Leak | Modbus RTU | 15% flow differential + H₂S 28.5 ppm | Pressure 65→41 bar | α=0.92 ≥ 0.85 | Valve shutoff authorized |
Scenarios based on real-world ICS/SCADA threat patterns. Power grid fault models IEC 61850 GOOSE messaging. Water treatment overdose models the 2021 Oldsmar attack vector. Pipeline leak models multi-sensor differential analysis.
Complete engineering documentation for the BLADE-INFRA Governance Node. All files are original work by Burak Oktenli. Published under CC BY 4.0.
All data, simulation code, engineering artifacts, and the interactive governance simulator are openly available at DOI: 10.5281/zenodo.19277887 under CC BY 4.0. No access restrictions apply.
Project documentation, blueprint PDF, schematic SVG, 92-component BOM, electrical/mechanical JSON. Full engineering specification.
v6.0 simulator with 3 ICS/SCADA scenarios, seeded PRNG (Mulberry32), SIL-3 safety relay model, SHA-256 + ECDSA P-384 audit chain, HSM/TPM latency. 3 ICS scenarios with vintage CRT SCADA terminal mode.
G*Power sample size justification, Bonferroni correction, Shapiro-Wilk normality tests, paired t-tests, Wilcoxon signed-rank for non-normal data.
IP65 / SIL 3 / NERC CIP / FIPS 140-2 Level 3 design targets. FIPS 140-2 key storage. M12 circular industrial connectors.
Live PLC connectivity testing with Siemens S7 and Allen-Bradley ControlLogix via PROFINET IO and EtherNet/IP
TLA+/UPPAAL full verification of all design invariants and safety properties across all configurations
4-layer controlled-impedance PCB design, fabrication, and integration testing with all 92 components
SIL 3 functional safety assessment (IEC 61508), NERC CIP compliance audit, FIPS 140-2 Level 3 validation at accredited facility
The BLADE-INFRA Governance Node is the fourth domain instantiation of the BLADE governance pipeline. The same architectures demonstrated in defense (BLADE-EDGE, ~$139K), automotive (BLADE-AV, ~$16K), and maritime (BLADE-MARITIME, ~$43K) apply to critical infrastructure governance (~$12K) under SIL 3 / NERC CIP / FIPS 140-2 regulatory frameworks.
Related platforms: Rover Testbed (~$484) · UAV Platform (~$4,200) · BLADE-EDGE (defense, ~$139K) · BLADE-AV (automotive, ~$16K) · BLADE-MARITIME (maritime, ~$43K) · BLADE-INFRA (infrastructure, ~$12K). Six platforms demonstrating governance stack portability across four domains.
The BLADE Governance SDK provides a unified API across all four domains. The same
blade_governance
library drives defense weapons governance (BLADE-EDGE), autonomous vehicle authority (BLADE-AV),
maritime surveillance (BLADE-MARITIME), and critical infrastructure protection (BLADE-INFRA).
Only the domain configuration file changes.
Cross-Domain Portability:
The blade_governance SDK
uses the same evaluate() →
result API across all four domains.
Switching from defense weapons governance to autonomous vehicle authority requires changing only the YAML
configuration file — not the application code. This is how the same governance pipeline operates under
DoDD 3000.09, ISO 26262 ASIL-D, MIL-STD-810G, and SIL 3 / NERC CIP simultaneously.
The BLADE-INFRA Governance Node is part of the authority-governed autonomy research program by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). It demonstrates four-domain pipeline portability — the same governance architectures demonstrated in defense weapons governance (BLADE-EDGE), automotive safety (BLADE-AV), and maritime surveillance (BLADE-MARITIME) apply to critical infrastructure protection.
Related architectures: SATA · HMAA · CARA · MAIVA · FLAME · ADARA