SATA: Sensor Attestation and Trust Anchoring

Related Work

This architecture extends concepts from remote attestation (TPM 2.0, TCG), trusted computing, and sensor fusion integrity monitoring. SATA advances these foundations by producing a continuous trust scalar τ ∈ [0,1] from hardware-anchored attestation chains — enabling real-time authority modulation rather than binary pass/fail attestation decisions.

A Hardware-Anchored τ-Chain Protocol for Autonomous Mission Authority

Patent Submitted
Patent: U.S. Provisional Application No. 64/002,453 Filed: March 11, 2026 Receipt: 74808459 DOI: 10.5281/zenodo.18936251
Launch Simulation Zenodo Record Repository Evaluation Protocol

Zenodo: Oktenli, B. (2026). Sensor Attestation and Trust Anchoring. Zenodo. 10.5281/zenodo.18936251

National Importance

Sensor spoofing and degradation represent primary attack vectors against autonomous systems. GPS spoofing can redirect unmanned vehicles while the navigation system maintains full confidence. LiDAR interference can create phantom obstacles or blind perception systems. IMU manipulation through vibration or electromagnetic interference corrupts orientation data. These attacks exploit a fundamental weakness: current systems lack formal mechanisms to evaluate and quantify trust in their own sensor data.

The NIST AI Risk Management Framework identifies measurement and monitoring of AI system inputs as essential governance practices. Khaleghi et al. (2013) survey multisensor data fusion and identify trust-aware fusion as an open research challenge. SATA addresses this by providing continuous, mathematically grounded sensor trust evaluation using Dempster-Shafer evidence theory.

SATA Architecture

SATA computes a continuous trust scalar τ ∈ [0,1] for each sensor using weighted Dempster-Shafer belief functions over a binary frame of discernment Θ = {Trusted, Compromised}. Per-sensor basic probability assignments (BPAs) are constructed from four diagnostic components:

m_i({Trusted}) = τ(s_i, t) × w_i
m_i({Compromised}) = (1 - τ(s_i, t)) × w_i
m_i(Θ) = 1 - w_i

Combination: (m_1 ⊕ m_2)(A) = (1/K) × Σ[m_1(B) × m_2(C)] for B∩C=A

w_int: 0.25
Internal consistency
w_cross: 0.35
Cross-sensor agreement
w_temp: 0.20
Temporal stability
w_phys: 0.20
Physical plausibility

SATA Pipeline

SATA Trust Fusion Dataflow LiDAR Camera IMU GPS ToF Encoders Per-Sensor BPA Construction: m({Trusted}), m({Compromised}), m(Θ) Cross-Sensor Validation + Disagreement Penalty Dempster-Shafer Combination Fused Trust τ ∈ [0,1] → HMAA

Key Contributions

Role in the Governance Stack

SATA is the foundation layer of the governance stack. It provides the fused trust scalar τ that drives all downstream authority decisions. HMAA uses τ to compute authority levels. ADARA modifies SATA's output by incorporating adversarial deception probability. In multi-agent systems, per-agent SATA trust feeds into MAIVA for swarm-level aggregation. Both the rover testbed (5 sensors) and UAV platform (8 sensors) implement SATA as their primary trust evaluation mechanism.

All architectures (SATA, HMAA, CARA, MAIVA, FLAME, ADARA, ERAM) are components of a unified authority-governed autonomy framework. This architecture is validated through six physical research platforms (Rover Testbed, UAV Platform, BLADE-EDGE, BLADE-AV, BLADE-MARITIME, BLADE-INFRA) and thirteen interactive simulations.

Deployment flexibility: This architecture can operate as part of the full governance pipeline (SATA-HMAA-ADARA-MAIVA-FLAME-CARA) or independently as a single-layer module. SATA can operate as a standalone trust evaluation layer on resource-constrained edge devices, providing sensor attestation without the full governance stack.

The Sensor Trust Problem

Autonomous systems rely entirely on sensor data to perceive their environment and make operational decisions. When sensor data is unreliable, whether due to hardware degradation, environmental interference, or adversarial manipulation, every downstream decision is compromised. The fundamental challenge is: how does an autonomous system know whether to trust its own sensors?

Current sensor fusion approaches (Khaleghi et al., 2013) typically assume all sensors are reliable and focus on optimally combining their outputs. When a sensor fails, most systems either ignore it entirely or use simple voting schemes. These approaches lack the mathematical rigor needed for safety-critical governance: they cannot express partial trust, cannot detect sophisticated spoofing, and cannot quantify their own confidence in sensor integrity.

GPS spoofing demonstrations have shown that autonomous vehicles can be redirected while the navigation system maintains full confidence in the spoofed signal. LiDAR interference can create phantom obstacles or blind perception systems. IMU drift from electromagnetic interference corrupts orientation data gradually enough to evade threshold-based detection. SATA addresses these vulnerabilities through formal, evidence-theoretic trust evaluation.

Dempster-Shafer Trust Computation

SATA uses Dempster-Shafer evidence theory rather than probability theory because it explicitly represents uncertainty through the mass assigned to the full frame of discernment Θ. This means the system can distinguish between "I trust this sensor" (high m({Trusted})), "I distrust this sensor" (high m({Compromised})), and "I do not have enough evidence" (high m(Θ)).

Trust Diagnostic Components

Internal Consistency (w=0.25)

Evaluates whether a sensor's own readings are self-consistent over time. Detects noise spikes, stuck readings, and out-of-range values. Uses running variance comparison against calibrated baselines.

Cross-Sensor Agreement (w=0.35)

Compares each sensor's output against other sensors measuring overlapping phenomena. Camera and LiDAR should agree on obstacle positions; IMU and encoders should agree on motion. Disagreement above threshold triggers trust penalty of 0.30.

Temporal Stability (w=0.20)

Measures how smoothly sensor readings change over time. Physical sensors have characteristic noise profiles; deviations suggest interference. Sudden discontinuities inconsistent with platform dynamics indicate potential spoofing.

Physical Plausibility (w=0.20)

Checks whether sensor readings are physically possible given the platform's kinematic constraints. Speed readings exceeding motor capabilities, altitude changes exceeding climb rates, or position jumps exceeding physical limits indicate data corruption.

Asymmetric Trust Dynamics

Trust decay is deliberately faster than trust recovery: decay occurs with a 0.5-second time constant while recovery requires a 5.0-second time constant. This asymmetry ensures that a compromised sensor cannot quickly regain trust simply by momentarily producing correct readings. The 10:1 recovery-to-decay ratio means the system is conservative about trusting sensors that have been flagged as potentially unreliable.

SATA Trust Simulation

The SATA simulation provides real-time visualization of the complete trust evaluation pipeline. Users can manipulate individual sensor health, inject specific fault types, and observe how trust propagates through the Dempster-Shafer combination to produce the fused trust scalar that drives HMAA authority decisions.

Per-Sensor Trust Bars

Individual trust indicators for each sensor showing current τ value, diagnostic component breakdown, and color-coded health status.

Dempster-Shafer Visualization

Shows BPA construction, combination process, and normalization in real-time as trust fusion produces the fused trust scalar.

Cross-Sensor Matrix

Pairwise agreement matrix showing which sensors agree and which are in conflict, with disagreement penalties visible.

Trust Timeline

Scrolling timeline showing asymmetric trust dynamics: fast decay and slow recovery, with HMAA authority levels overlaid.

Launch SATA SimulationView Repository

Hardware Platform Integration

Rover Testbed (5 Sensors)

LiDAR (RPLIDAR A1, 360-degree scan), Camera (Raspberry Pi Camera Module 3), IMU (MPU-6050, 6-axis), Time-of-Flight (VL53L0X array), and motor encoders. Each monitored by SATA with cross-validation between overlapping modalities.

UAV Platform (8 Sensors)

GPS (u-blox ZED-F9P RTK), LiDAR (TFmini-S), camera (Intel RealSense D435), IMU (InvenSense ICM-42688-P on Cube Orange+), barometer, magnetometer, optical flow, and ESC telemetry. Expanded cross-sensor validation matrix for aerial operations.

API Implementation

REQUEST

POST /trust/evaluate

{
  "sensors": [
    {"id": "lidar", "internal": 0.95,
     "cross": 0.88, "temporal": 0.92,
     "physical": 0.97, "weight": 0.30},
    {"id": "camera", "internal": 0.42,
     "cross": 0.35, "temporal": 0.50,
     "physical": 0.88, "weight": 0.25},
    {"id": "imu", "internal": 0.98,
     "cross": 0.91, "temporal": 0.96,
     "physical": 0.99, "weight": 0.20}
  ]
}

RESPONSE

{
  "fused_trust": 0.62,
  "per_sensor": {
    "lidar": {"trust": 0.93, "status": "healthy"},
    "camera": {"trust": 0.38, "status": "degraded"},
    "imu": {"trust": 0.96, "status": "healthy"}
  },
  "disagreements": [
    {"pair": "lidar-camera", "delta": 0.55}
  ],
  "veto_active": true,
  "veto_source": "camera"
}

Minimal SATA Core

def sata_fuse(sensors):
    bpas = [build_bpa(s) for s in sensors]     # Per-sensor BPA
    cross_validate(sensors)                     # Disagreement penalty
    fused = dempster_combine(bpas)              # DS combination
    tau = fused.belief({Trusted})                # Extract trust scalar
    return clamp(tau, 0.0, 1.0)                 # τ ∈ [0,1] → HMAA

Selected References

Provable Guarantees

G1 Bounded Trust
∀ sensors, τ ∈ [0, 1]
Fused trust is always a valid probability. Dempster-Shafer combination with normalization guarantees bounded output.
G2 Asymmetric Dynamics
t_recovery / t_decay ≥ 10
Trust recovery is always at least 10x slower than trust decay, preventing rapid trust restoration from momentarily correct readings.
G3 Single-Sensor Veto
∃ sensor_i: τ_i < 0.2 → τ_fused drops ≥ 0.3
A single critically compromised sensor can force significant fused trust reduction, preventing the system from masking a compromised input.

Known Limitations and Failure Modes

Cross-sensor validation requires sensor overlap. Sensors measuring non-overlapping phenomena cannot be cross-validated. In systems with few sensors, cross-validation coverage may be limited. Weight w_cross=0.35 assumes sufficient overlap.
Asymmetric dynamics may cause extended low-trust states. The 10:1 recovery-to-decay ratio means brief sensor faults can cause extended periods of reduced trust even after the fault clears. This is a deliberate safety tradeoff.
Dempster-Shafer combination can amplify correlated evidence. When sensor faults are correlated (e.g., common power supply failure), DS combination may over-reduce trust. Shafer discounting partially mitigates this but does not eliminate it.

Simulation Reproducibility

Simulation Mode
Deterministic replay. Identical inputs always produce identical outputs. No stochastic components in governance computation.
Structured Runs
350 runs (Rover), 250 runs (UAV). 50 runs per scenario with varied fault injection timing and intensity. Fixed seeds for exact reproduction.
Artifact Availability
All simulation code, configuration files, and result data are published on Zenodo with DOI. Browser-based simulations run client-side with no server dependency.

The simulation supports single-architecture mode (SATA trust evaluation only) and full pipeline mode (SATA integrated with HMAA, ADARA, MAIVA, FLAME, and CARA). Both configurations demonstrate SATA behavior under adversarial conditions.

Deterministic Guarantee: All published results use fixed seeds. Math.random() is not used in benchmark-critical paths. The governance pipeline contains zero stochastic components. See Evaluation Protocol for full methodology.

FORMAL: TLA+ verified EMPIRICAL: Simulation results EXPERIMENTAL: Hardware planned

Cite This Work

If you reference this architecture in your research, please use one of the following citation formats:

APA 7th Edition

Oktenli, B. (2026). Sensor Attestation and Trust Anchoring. Zenodo. https://doi.org/10.5281/zenodo.18936251

BibTeX LaTeX

@misc{oktenli2026sata,
  author       = {Oktenli, Burak},
  title        = {Sensor Attestation and Trust Anchoring},
  year         = {2026},
  publisher    = {Zenodo},
  doi          = {10.5281/zenodo.18936251},
  url          = {https://doi.org/10.5281/zenodo.18936251},
  note         = {Georgetown University}
}

IEEE Conference / Journal

B. Oktenli, “Sensor Attestation and Trust Anchoring,” Zenodo, 2026. doi: 10.5281/zenodo.18936251.

Chicago Turabian

Oktenli, Burak. “Sensor Attestation and Trust Anchoring.” Zenodo, 2026. https://doi.org/10.5281/zenodo.18936251.
Permanent DOI
10.5281/zenodo.18936251
Zenodo Record
zenodo.org/records/18936251
License
CC BY 4.0
ORCID
0009-0001-8573-1667

About This Project

This architecture is part of the authority-governed autonomy research program by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). It is published on Zenodo with DOI 10.5281/zenodo.18936251 under CC BY 4.0.

Related: Full Research Portfolio · All Repositories · Rover Testbed · UAV Platform · Evaluation Protocol