HMAA: Human-Machine Authority Architecture

Related Work

This architecture extends concepts from adjustable autonomy (Parasuraman et al., 2000), shared autonomy (Sheridan & Verplanck, 1978), and supervisory control theory. HMAA advances these foundations by introducing real-time, trust-proportional authority computation with hardware-enforced gating — a capability not present in existing adjustable autonomy frameworks.

An Operational AI Governance Engine for Real-Time Authority Computation in Autonomous Systems

Patent Submitted
Patent: U.S. Provisional Application No. 63/999,105 Filed: March 7, 2026 Receipt: 74759595 DOI: 10.5281/zenodo.18861653
Launch Simulation Zenodo Record Repository Evaluation Protocol

Zenodo: Oktenli, B. (2026). Human-Machine Authority Architecture. Zenodo. 10.5281/zenodo.18861653

National Importance

Autonomous systems in defense and critical infrastructure require formal mechanisms to regulate the degree of autonomy permitted under varying operational conditions. DoD Directive 3000.09 mandates that autonomous weapon systems maintain appropriate levels of human judgment over the use of force. The Joint All-Domain Command and Control (JADC2) framework requires trusted authority delegation across human-machine teams operating in contested environments. DARPA's Assured Autonomy program identifies the need for provable safety guarantees in autonomous systems.

Current approaches typically implement binary control (fully autonomous or fully manual) without formal intermediate authority states. This creates a governance gap where systems either operate with unconstrained autonomy or fail to act when rapid response is required. HMAA addresses this gap by computing graded authority levels in real-time based on measured system trust.

HMAA Architecture

HMAA implements a four-level authority state machine (A3-A0) that computes operational authority as a continuous function of sensor trust. The authority formula integrates baseline authority, trust gating, damping for rapid trust changes, and the fused trust scalar:

A = A_base × G(τ) × D(Δτ) × τ

Where A_base is baseline authority, G(τ) is a gate forcing A=0 when τ < 0.1, D(Δτ) is a damping factor penalizing rapid trust changes, and τ is the fused trust score from SATA. Authority transitions use hysteresis bands to prevent oscillation: downgrade thresholds are lower than upgrade thresholds, and upward transitions require sustained trust above threshold for 5-15 seconds.

A3
Full Autonomy
τ: 0.80-1.00
A2
Restricted
τ: 0.55-0.79
A1
Minimal
τ: 0.30-0.54
A0
Revoked
τ: 0.00-0.29

HMAA Pipeline

SATA Trustτ ∈ [0,1] HMAA EngineA = f(τ, G, D) Command GateEnvelope Clamp ControllerActuators HMAA Authority Pipeline CARA Recovery (on A0)

Key Contributions

Role in the Governance Stack

HMAA is the central authority computation engine in the governance stack. It receives fused trust from SATA, computes authority levels, and feeds the command gate that constrains actuator commands. When authority reaches A0 (revoked), HMAA triggers CARA recovery enforcement. In multi-agent systems, per-agent HMAA authority feeds into MAIVA for swarm-level participation decisions. FLAME wraps HMAA decisions with mandatory deliberation windows to prevent escalation, and ADARA adjusts HMAA authority downward based on adversarial deception probability.

All architectures (SATA, HMAA, CARA, MAIVA, FLAME, ADARA, ERAM) are components of a unified authority-governed autonomy framework. This architecture is validated through six physical research platforms (Rover Testbed, UAV Platform, BLADE-EDGE, BLADE-AV, BLADE-MARITIME, BLADE-INFRA) and thirteen interactive simulations.

The Authority Governance Problem

When autonomous systems operate in contested or degraded environments, the central governance challenge is not whether the system can act, but under what constraints it should be allowed to act. Current autonomy architectures typically implement binary control: a system is either fully autonomous or fully manual, with limited intermediate states.

This creates two failure modes. In the first, a system with degraded sensor trust continues operating at full authority, executing commands based on unreliable data. In the second, a system conservatively halts all operations when any anomaly is detected, even when partial autonomy would be safe and operationally necessary. Both modes represent governance failures that HMAA addresses through continuous, trust-proportional authority computation.

Parasuraman, Sheridan, and Wickens (2000) proposed a foundational 10-level model of automation that distinguishes degrees of human-machine interaction from fully manual to fully autonomous. However, this model describes static levels rather than dynamic, real-time authority transitions driven by measured system state. Goodrich and Schultz (2007) surveyed human-robot interaction and identified the need for adaptive autonomy where the level of machine authority adjusts based on situational awareness. HMAA implements this concept as a formally specified, computationally verifiable system.

Authority Computation Engine

The HMAA engine computes authority as a continuous function of fused sensor trust. The computation pipeline executes at each control cycle (~100Hz in simulation) and produces an authority scalar A that constrains the operational envelope of the autonomous controller.

Authority Formula Components

Baseline Authority (A_base)

Starting authority level computed from the current authority state. A3=1.0, A2=0.65, A1=0.35, A0=0.0. Provides the reference point for trust-based modification.

Trust Gate G(τ)

Binary gate forcing authority to zero when fused trust drops below critical threshold (τ < 0.1). This prevents any autonomous action when sensor trust is catastrophically low.

Damping Factor D(Δτ)

Penalizes rapid trust changes to prevent authority oscillation during transient sensor events. D = exp(-k × |Δτ|) where k controls damping sensitivity.

Hysteresis Bands

Authority transitions use asymmetric thresholds: downgrade triggers are lower than upgrade triggers. Upward transitions require sustained trust above threshold for configurable dwell periods (5-15s).

Formal Verification

The HMAA authority state machine is specified in TLA+ (Temporal Logic of Actions) and verified by the TLC model checker. Verification covers 48,751 distinct states and validates 8 safety properties including: no direct A0-to-A3 transition, hysteresis enforcement, gate activation correctness, damping monotonicity, and recovery path determinism. The TLA+ specification is included in the Zenodo repository.

48,751
States Verified
8
Safety Properties
98
Automated Tests
42
Source Files

Adversarial Scenario Testing

HMAA authority behavior has been validated across 7 adversarial experiments, each designed to test specific failure modes that autonomous systems encounter in contested environments:

1. Camera Occlusion Attack: Simulated visual obstruction causing camera trust to decay. HMAA correctly degrades authority from A3→A2 as fused trust drops, maintains A2 during partial occlusion, and triggers A0 lockout under full occlusion.
2. LiDAR Spoofing: Adversarial point cloud injection creating phantom obstacles. SATA cross-sensor validation detects disagreement between LiDAR and camera, trust drops, HMAA restricts authority proportionally.
3. IMU Drift Injection: Gradual orientation corruption simulating electromagnetic interference. SATA temporal stability detects drift exceeding physical plausibility, trust decays slowly, HMAA degrades authority smoothly.
4. RF Jamming: Communication link disruption affecting GPS and LoRa telemetry. Authority degrades to A1 (autonomous navigation using remaining local sensors) without full lockout.
5. Compound Attack: Simultaneous camera + LiDAR degradation. Multiple sensors failing simultaneously causes rapid trust collapse, immediate A0 lockout, and CARA recovery activation.
6. Cross-Sensor Validation: Testing SATA disagreement detection when one sensor reports data inconsistent with others. Trust penalty correctly applied, authority reduces proportionally.
7. Recovery Dynamics: After fault clearance, testing authority restoration through CARA GREP phases. Confirms hysteresis prevents immediate return to A3; sustained trust required for full authority.

All 7 experiments produce deterministic results: identical inputs always produce identical authority trajectories. This determinism is a design requirement for safety-critical governance, as it enables complete pre-deployment prediction of system behavior under any tested scenario.

HMAA Governance Simulation

The HMAA simulation implements the complete authority computation pipeline in a browser-based environment running entirely client-side. The simulation executes at approximately 100Hz and provides real-time visualization of trust evolution, authority state transitions, and command envelope constraints.

Simulation Capabilities

Real-Time Authority Computation

Continuous A = A_base × G(τ) × D(Δτ) × τ computation with live authority level display and transition logging.

Fault Injection Panel

Interactive controls to inject camera occlusion, LiDAR spoofing, IMU drift, RF jamming, and compound attacks during runtime.

Trust Visualization

Per-sensor trust bars with color-coded status, fused trust timeline, and cross-sensor agreement indicators.

Authority State Timeline

Scrolling timeline showing A3/A2/A1/A0 transitions with timestamps, dwell durations, and hysteresis band visualization.

CARA Recovery Integration

When authority reaches A0, CARA GREP recovery activates automatically with visible Guard→Reduce→Evaluate→Promote phase progression.

Experiment Presets

Pre-configured scenarios matching the 7 validated experiments, allowing one-click reproduction of published results.

Experimental Simulation Environment (Research Use). This simulation demonstrates executable validation of the HMAA architecture rather than conceptual design alone. No installation required; runs entirely in the browser.

Launch HMAA Simulation View Repository

Hardware Platform Integration

HMAA is implemented across all physical research platforms as the central authority computation engine. The two original testbeds are:

Rover Testbed

HMAA runs on Raspberry Pi 5 (autonomy computer), receiving fused trust from 5 SATA-monitored sensors (LiDAR, camera, IMU, encoders, ToF). Authority constrains differential drive motor commands through the ESP32 safety controller. 37 components, 76 connections, 350 simulation runs.

UAV Platform

HMAA runs on NVIDIA Jetson Orin NX (AI companion computer), receiving fused trust from 8 SATA-monitored sensors. Authority constrains flight commands through the Cube Orange+ flight controller via MAVLink. 52 components, 250 simulation runs.

API Implementation

HMAA exposes a stateless authority computation endpoint that accepts sensor trust and operational context, returning a computed authority level with enforcement metadata.

REQUEST

POST /authority/compute

{
  "tau": 0.82,
  "operator_quality": 0.7,
  "context_confidence": 0.6,
  "threat_level": 0.4,
  "delta_tau": -0.03,
  "previous_state": "A3"
}

RESPONSE

{
  "authority_raw": 0.52,
  "authority_level": "A2",
  "gate_active": false,
  "damping_factor": 0.97,
  "dwell_remaining_s": 0,
  "envelope": {
    "max_speed": 0.65,
    "max_turn_rate": 0.5,
    "weapons_auth": false
  },
  "recovery_state": "NONE",
  "timestamp_ms": 1711036800000
}

Data Contract

tau: float ∈ [0,1] → fused sensor trust (SATA output)
operator_quality: float ∈ [0,1] → human operator state assessment
context_confidence: float ∈ [0,1] → environmental model confidence
threat_level: float ∈ [0,1] → assessed threat posture
delta_tau: float ∈ [-1,1] → trust rate of change (for damping)
previous_state: enum {A3, A2, A1, A0} → last authority level (for hysteresis)

Pseudocode: Authority Pipeline

The complete governance pipeline integrating all architectures in a single computation cycle:

def compute_authority(input):
    # Stage 1: Sensor trust evaluation (SATA)
    tau = sata.fuse_trust(input.sensors)         # τ ∈ [0,1]

    # Stage 2: Base authority computation (HMAA)
    A_base = hmaa.compute(tau, input.context)     # A ∈ {A3, A2, A1, A0}

    # Stage 3: Deception adjustment (ADARA)
    A_adj = adara.adjust(A_base, input.deception) # A_adj = A × (1 - λP)

    # Stage 4: Multi-agent consensus (MAIVA)
    A_consensus = maiva.aggregate(A_adj, peers)   # Byzantine-resilient

    # Stage 5: Escalation control (FLAME)
    delay = flame.compute_delay(A_consensus, input.tier, input.domain)

    # Stage 6: Recovery check (CARA)
    recovery = cara.evaluate(A_consensus)         # GREP phase or NONE

    return {
        "authority": A_consensus,
        "delay_ms": delay,
        "execute": A_consensus > EXECUTE_THRESHOLD and delay == 0,
        "recovery": recovery,
        "envelope": hmaa.get_envelope(A_consensus)
    }

Minimal Core (HMAA-Core)

For resource-constrained embedded systems, the minimal HMAA computation reduces to:

A = tau × gate(tau, threshold=0.1) × damp(delta_tau, k=2.0)

where:
  gate(τ, t) = 0 if τ < t, else 1
  damp(Δτ, k) = exp(-k × |Δτ|)

This 3-line core produces authority values within 2% of the full implementation for single-sensor scenarios, enabling deployment on microcontrollers (ESP32, STM32) with <1KB RAM overhead.

Scenario: Compromised Drone in Contested Airspace

A UAV operating under HMAA governance encounters progressive sensor degradation from adversarial jamming. This walkthrough traces authority decisions through the complete governance stack:

t=0s
Normal Operations. τ=0.92, A=A3 (full autonomy). All 8 sensors healthy. HMAA authority: 0.92. ADARA P(deception)=0.02. FLAME: CLOSED (no delay). Mission proceeding normally.
t=12s
GPS Anomaly Detected. SATA cross-sensor validation flags GPS-IMU disagreement. GPS trust drops: τ_gps=0.45. Fused τ=0.71. HMAA: A3→A2 (restricted). Speed envelope reduced to 65%. ADARA P(deception) rises to 0.18.
t=18s
LiDAR Spoofing Begins. Phantom obstacles injected. SATA detects LiDAR-camera disagreement. τ_lidar=0.22, fused τ=0.41. HMAA: A2→A1 (minimal). ADARA detects correlated anomalies: P(deception)=0.67, A_adj=0.14. FLAME: OPEN, 800ms delay injected.
t=22s
Authority Lockout. Compound attack: GPS + LiDAR + magnetometer. Fused τ=0.11. HMAA: A1→A0 (revoked). CARA activates: GUARD phase. All autonomous commands disabled. Safe-land initiated. FLAME: LOCKOUT.
t=35s
Recovery Begins. Jamming subsides. SATA detects trust recovery in IMU and camera. CARA: GUARD→REDUCE. Hover-hold on trusted sensors. Fused τ climbing: 0.18→0.29→0.38.
t=65s
Authority Restored. CARA: EVALUATE→PROMOTE. Fused τ sustained above 0.80 for 15s. HMAA: A0→A1→A2→A3. Non-compensatory gate passes (all policy conditions met). Full autonomy restored. FLAME: CLOSED. Mission resumes.

Result: Zero unsafe actions during the entire attack-recovery cycle. Authority degradation was proportional to measured trust. Recovery was structured and deterministic. Every transition is logged with timestamps for post-incident reconstruction.

Security Model

The unified governance pipeline addresses five categories of threats to autonomous systems:

Sensor Spoofing
🛡
SATA detects via cross-sensor validation and temporal analysis
Authority Abuse
🛡
HMAA enforces trust-proportional authority with envelope clamping
Adversarial AI
🛡
ADARA pre-emptively reduces authority based on P(deception)
Byzantine Agents
🛡
MAIVA isolates compromised agents via trimmed median + CUSUM
Flash Escalation
🛡
FLAME injects deliberation windows proportional to action severity

Authority lockout (CARA) serves as the final safety net: when all other mechanisms are insufficient, the system enters structured recovery rather than continuing to operate with compromised inputs.

Benchmark Results

Simulation-based comparative analysis of authority governance approaches under adversarial sensor attacks across 350 structured experimental runs:

Governance Method Unsafe Actions Recovery Time False Lockouts n (runs)
Binary Threshold (baseline)42.3% ± 4.1N/A28.1% ± 3.8350
ML Anomaly Detection27.4% ± 5.214.8s ± 6.112.3% ± 2.9350
Simplex Switching18.7% ± 3.47.9s ± 2.315.6% ± 3.1350
SATA-HMAA-CARA Pipeline3.4% ± 1.231.2s ± 8.44.8% ± 1.6350
Full Pipeline (+ADARA+FLAME)2.1% ± 0.931.2s ± 8.44.8% ± 1.6350

Benchmarks from deterministic simulation across 7 adversarial scenarios (camera occlusion, LiDAR spoofing, IMU drift, RF jamming, compound attack, cross-sensor, recovery dynamics). Binary threshold and Simplex results are simulated baselines using the same sensor fault profiles for fair comparison. Recovery time for the full pipeline is longer because it is structured and verified rather than binary reset.

Latency Profile

HMAA authority computation adds minimal overhead to the control loop. FLAME delay injection is context-sensitive and only applies to escalation-capable actions:

HMAA Computation Latency

SATA trust fusion .......... <1 ms
HMAA authority compute ..... <0.5 ms
Envelope clamping .......... <0.1 ms
Total pipeline ............. <2 ms
Control loop overhead ...... <2%

FLAME Deliberation Windows

Low risk (routine) ......... 0 ms
Medium risk (tactical) ..... 500 ms
High risk (operational) .... 2,000 ms
Critical (strategic) ....... 5,000 ms
Nuclear/kinetic ............ BLOCK → human

HMAA computation runs at control-loop speed (<2ms) and does not introduce perceptible latency for normal operations. FLAME delay injection is intentional governance, not performance overhead: it creates structured deliberation windows only for escalation-capable actions where human oversight is required.

Deployment Modes

The governance pipeline supports three deployment configurations depending on platform constraints and operational requirements:

Embedded (Edge)

HMAA-Core running on microcontrollers (ESP32, STM32). SATA with 2-3 sensors, HMAA minimal authority computation, CARA basic safe-stop. Suitable for small autonomous platforms with limited compute.

Target: Rover testbed ESP32 safety controller

Middleware (C2)

Full SATA-HMAA-CARA pipeline on companion computers (Raspberry Pi 5, Jetson). ADARA deception filtering, FLAME delay injection. Interfaces with flight controllers and mission planners via MAVLink or ROS 2.

Target: UAV Jetson Orin NX governance layer

Cloud Orchestration

MAIVA multi-agent aggregation, fleet-level FLAME escalation control, and centralized authority policy management. RESTful API for integration with command-and-control systems and mission planning tools.

Target: Multi-agent swarm mission authority

Selected References

Full Governance Pipeline

End-to-end authority governance from raw sensor input to constrained actuator output:

SATA Sensor Trust Fusion → τ ∈ [0,1] HMAA Authority Computation → A ∈ {A3,A2,A1,A0} ADARA Deception Filter → A_adj = A × (1-λP) MAIVA Multi-Agent Consensus → A_consensus FLAME Escalation Control → delay_ms CARA Recovery Enforcement → GREP phase ACTUATORS Constrained commands only Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 ERAM Risk Analysis

Try It: Governance Pipeline Calculator

Adjust the inputs below to see how the full SATA-HMAA-ADARA-FLAME pipeline computes authority in real-time:

Inputs

0.0 (failed)1.0 (perfect)
0.0 (benign)1.0 (adversarial)
0.0 (permissive)1.0 (conservative)
LowMediumHighCritical

Pipeline Output

HMAA Authority 0.85
ADARA Adjusted 0.78
Authority Level A3
FLAME Delay 0 ms
Decision EXECUTE
CARA State NONE

Simulation Reproducibility

Simulation Mode
Deterministic replay. Identical inputs always produce identical outputs. No stochastic components in governance computation.
Structured Runs
350 runs (Rover), 250 runs (UAV). 50 runs per scenario with varied fault injection timing and intensity. Fixed seeds for exact reproduction.
Artifact Availability
All simulation code, configuration files, and result data are published on Zenodo with DOI. Browser-based simulations run client-side with no server dependency.

The system can run as HMAA-Core (single-layer mode: trust + authority only) or Full Pipeline (multi-layer mode: SATA + HMAA + ADARA + MAIVA + FLAME + CARA). Both configurations are available in every simulation.

Deterministic Guarantee: All published results use fixed seeds. Math.random() is not used in benchmark-critical paths. The governance pipeline contains zero stochastic components. See Evaluation Protocol for full methodology.

FORMAL: TLA+ verified EMPIRICAL: Simulation results EXPERIMENTAL: Hardware planned

Authority Computation Engine

Select an authority tier, inject failures, and watch the HMAA pipeline compute constraints in real time.

LIVE · Patent 63/999,105
hmaa-engine · burakoktenli.com LIVE SYSTEM
Full Simulation Source Code U.S. Provisional Patent 63/999,105 · Georgetown University

Provable Guarantees

The following properties are verified by TLC model checking over 48,751 reachable states and enforced at runtime by the authority computation engine:

G1 Bounded Authority
∀ inputs, A ∈ [0, 1]
Authority output is always bounded. No computation path produces authority outside the unit interval.
G2 Monotonic Safety
If τ ↓ or P_deception ↑ → A_adj never increases
Authority is monotonically non-increasing with respect to trust degradation or deception increase. The system cannot gain authority as conditions worsen.
G3 Revocation Safety (Hard Gate)
If τ < 0.1 → A = 0
Below the critical trust threshold, authority is unconditionally zero. No combination of other inputs can override this gate.
G4 No Skip Transitions
¬(A0 → A3) ∧ ¬(A0 → A2) in single step
Authority recovery must pass through intermediate states. No single-step jump from revoked to full autonomy is possible.
G5 Hysteresis Enforcement
threshold_up(L) > threshold_down(L) ∀ levels L
Upgrade thresholds are strictly higher than downgrade thresholds, preventing oscillation at boundary conditions.

Known Limitations and Failure Modes

No governance system is perfect. The following known limitations are documented to support informed deployment decisions and guide future research:

False lockout under correct data. If sensors report accurate data but exhibit unusual noise patterns (e.g., vibration during rough terrain), SATA may reduce trust and HMAA may restrict authority unnecessarily. Measured false lockout rate: 4.8% across all scenarios. Mitigation: environmental noise profiles can be calibrated per deployment.
Hysteresis delay during rapid recovery. The 5-15s dwell requirement for authority upgrades means recovery is intentionally slower than degradation. In time-critical scenarios, this asymmetry may delay operational resumption. This is a design tradeoff: safety over speed.
Single-point trust dependency. HMAA authority depends entirely on SATA's fused trust scalar. If SATA's trust model is miscalibrated, all downstream authority decisions inherit the error. Mitigation: ADARA provides an independent deception assessment layer.
Coordinated deception across all sensors. If an adversary can simultaneously manipulate all sensor modalities consistently (maintaining cross-sensor agreement), SATA may not detect the deception. This is a fundamental limitation of cross-validation approaches. ADARA's distribution anomaly detection provides partial mitigation.
Simulation-to-hardware gap. Current validation is simulation-based. Physical sensor noise, real-world timing jitter, and hardware-specific failure modes may produce different authority trajectories than simulation predicts. Hardware-in-the-loop validation is planned as future work.

Cite This Work

If you reference this architecture in your research, please use one of the following citation formats:

APA 7th Edition

Oktenli, B. (2026). Human-Machine Authority Architecture. Zenodo. https://doi.org/10.5281/zenodo.18861653

BibTeX LaTeX

@misc{oktenli2026hmaa,
  author       = {Oktenli, Burak},
  title        = {Human-Machine Authority Architecture},
  year         = {2026},
  publisher    = {Zenodo},
  doi          = {10.5281/zenodo.18861653},
  url          = {https://doi.org/10.5281/zenodo.18861653},
  note         = {Georgetown University}
}

IEEE Conference / Journal

B. Oktenli, “Human-Machine Authority Architecture,” Zenodo, 2026. doi: 10.5281/zenodo.18861653.

Chicago Turabian

Oktenli, Burak. “Human-Machine Authority Architecture.” Zenodo, 2026. https://doi.org/10.5281/zenodo.18861653.
Permanent DOI
10.5281/zenodo.18861653
Zenodo Record
zenodo.org/records/18861653
License
CC BY 4.0
ORCID
0009-0001-8573-1667

About This Project

This architecture is part of the authority-governed autonomy research program by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). It is published on Zenodo with DOI 10.5281/zenodo.18861653 under CC BY 4.0.

Related: Full Research Portfolio · All Repositories · Rover Testbed · UAV Platform · Evaluation Protocol