A research platform implementing SATA trust evaluation, HMAA mission authority control, and CARA recovery enforcement for resilient autonomous systems. The testbed enables controlled experiments on autonomy degradation, sensor trust evaluation, and mission recovery under contested operating conditions. The broader research program also extends these governance principles to manipulation systems, including authority-controlled robotic arms.
This platform represents an implemented experimental system integrating hardware architecture, governance software, and simulation-based validation. This testbed is part of a unified research framework for authority-governed autonomous systems spanning single-agent, multi-agent, and manipulation domains.
Design Complete · Implementation In ProgressZenodo Publication: Oktenli, B. (2026). Authority-Governed Assured Autonomy Rover Testbed: System Architecture, Governance Design, and Reproducible Artifact Package (v1.0). Zenodo. https://doi.org/10.5281/zenodo.19143190
Autonomous systems increasingly operate in environments where sensor deception, communication disruption, and adversarial interference threaten mission safety. Current autonomy architectures typically rely on binary fail-safe triggers or simple threshold-based switching, lacking formal mechanisms for graded authority degradation and structured recovery.
Authority-governed autonomy addresses this gap by making trust assessment, authority computation, and recovery enforcement first-class components of the autonomy stack. Rather than asking "Is the AI correct?", authority-governed systems ask: "Under what constraints should the AI be allowed to act given current trust conditions?"
Research in resilient autonomy and trusted AI has been identified as a strategic priority by organizations including DARPA (Assured Autonomy program), NASA (autonomous planetary rover operations), and the National Science Foundation. The DoD Directive 3000.09 explicitly requires autonomous weapons systems to maintain appropriate levels of human judgment over the use of force.
The Authority-Governed Autonomy Testbed is designed to experimentally evaluate governance architectures for autonomous systems operating in safety-critical and adversarial environments.
The platform allows controlled experiments involving:
The testbed provides a practical evaluation environment for the SATA, HMAA, and CARA architectures described in the associated patent disclosures and technical reports published on Zenodo. Unlike purely simulated environments, this experimental research platform is designed to validate governance behavior with physical sensors, real-time computation, and hardware safety interlocks.
The testbed implements a complete authority-governed autonomy pipeline. Every autonomous decision must pass through trust evaluation, authority computation, and recovery logic before reaching actuators.
Beyond rover navigation, the same authority-governed autonomy framework provides a generalizable governance layer for robotic manipulation systems performing safety-critical tasks. In this extension, manipulator actions are not executed directly from perception and planning outputs; they are gated through trust evaluation and authority governance before motion commands reach the robotic arm controller.
This manipulation-oriented extension is currently under development as a second application domain for the broader authority-governed autonomy research program.
This extension demonstrates that authority-governed autonomy is not limited to navigation systems, but can govern fine-grained manipulation tasks where incorrect actions may cause physical damage or safety risks. This highlights the framework's applicability to a broad class of autonomous systems operating under uncertainty.
The testbed also functions as a reusable sensor trust testing platform designed to evaluate trust-aware autonomy systems under controlled adversarial and degraded conditions. This platform enables systematic injection of sensor faults to study trust degradation, disagreement detection, and authority response.
Multi-sensor array (camera, LiDAR, IMU, ToF), programmable fault injection mechanisms, embedded compute for trust evaluation, real-time telemetry and logging
Sensor spoofing detection and response, sensor degradation modeling, cross-sensor disagreement analysis, trust-based authority adjustment validation
This platform supports experimental research on resilient perception systems and provides a controlled environment for validating trust evaluation algorithms under adversarial conditions.
Together with the rover testbed and robotic manipulation extension, this platform demonstrates a unified authority-governed autonomy framework spanning perception, decision-making, and actuation layers.
Full electrical schematic showing MCU, sensor, actuator, power, and module interconnections. Color-coded by node type: blue (MCU), teal (Sensor), orange (Actuator), yellow (Power), green (Module).
The rover testbed simulation environment provides a controlled experimental platform for evaluating authority-governed autonomy under adversarial and degraded sensor conditions. The simulator executes the complete SATA trust fusion, HMAA authority computation, and CARA recovery logic in real-time with configurable fault injection.
This simulation demonstrates executable validation of authority-governed autonomy rather than conceptual design alone. The simulation environment mirrors the physical rover hardware architecture, enabling direct transfer of validated governance behaviors from simulation to hardware testing.
Camera occlusion, LiDAR spoofing, IMU drift, RF disruption, compound failures
Real-time fused trust score, per-sensor values, Dempster-Shafer fusion, decay/recovery
Authority state transitions, command gating, CARA recovery activation, mission metrics
Experimental Simulation Environment (Research Use). This environment serves as a primary validation layer for testing authority transitions and recovery behaviors, enabling repeatable experimentation prior to physical hardware deployment.
Launch Governance SimulatorThe testbed implements a four-level authority state machine with hysteresis guards, dwell timers, and oscillation prevention. Upgrade thresholds are set higher than downgrade thresholds to ensure the system does not prematurely restore autonomy after trust degradation.
All sensors trusted. Autonomous navigation, planning, and mission execution. No operator input required.
Partial trust degradation. Planner restricted to conservative paths. Speed limits enforced. Operator alerted.
Significant trust loss. Loiter or return-to-base mode. Operator supervision required for any action beyond safe hold.
Critical trust failure or watchdog timeout. All motors disabled. System awaits operator recovery command or physical reset.
Transition rules include configurable dwell timers (minimum time at each level before upgrade), asymmetric thresholds (downgrade at τ < 0.6, upgrade only at τ > 0.8), and an oscillation guard preventing more than 2 transitions within any 10-second window.
The trust evaluation subsystem computes a continuous trust scalar from multi-sensor fusion using a weighted Dempster-Shafer belief model with cross-sensor validation:
Trust(s_i) = weighted belief function with cross-sensor consistency checks, disagreement penalties, asymmetric decay (fast) and recovery (slow), and single-sensor veto capability
Key properties: trust decays rapidly when sensors disagree but recovers slowly when consistency returns. A single sensor producing readings inconsistent with all others triggers an immediate trust penalty regardless of its historical reliability. This asymmetry prevents the system from trusting potentially spoofed inputs too quickly after an anomaly.
The testbed uses a dual-compute architecture separating high-level autonomy (Raspberry Pi 5) from real-time safety control (ESP32), connected via UART with hardware time synchronization.
Raspberry Pi 5 8GB: ROS 2 nodes, SATA trust, HMAA authority, CARA recovery, mission planner, sensor fusion
ESP32-DevKitC-32D: motor PWM, encoder feedback, watchdog heartbeat, LoRa comms, command gate enforcement
RPLIDAR A1M8 (USB), VL53L1X ToF (I2C), BNO085 IMU (I2C), RPi Camera v3 (CSI), magnetic wheel encoders (GPIO)
TPL5110 watchdog, mushroom E-stop, ATECC608B secure element, RFM95W LoRa 900MHz, MicroSD audit logger
| Component | Model | Purpose |
|---|---|---|
| Main Compute | Raspberry Pi 5 (8GB) | Autonomy stack, sensor fusion, ROS 2 |
| Safety Controller | ESP32-DevKitC-32D | Real-time control, watchdog, command gate |
| LiDAR | Slamtec RPLIDAR A1M8 | 360-degree obstacle sensing |
| IMU | Adafruit BNO085 9-DOF | Orientation and motion fusion |
| Camera | Raspberry Pi Camera v3 | Visual perception (Sony IMX708) |
| ToF Sensor | Adafruit VL53L1X | Close-range obstacle detection |
| Communication | Adafruit RFM95W (900 MHz) | LoRa long-range telemetry |
| Secure Element | ATECC608B TrustFLEX | Cryptographic key storage |
| Motor Driver | Pololu Dual G2 18v18 | Dual high-power motor control (18A/ch) |
| Drive Motors | Pololu 12V 75:1 Gearmotor (x2) | High-torque differential drive |
| Safety | E-stop + TPL5110 Watchdog | Hardware safety interlock layer |
| Power | 3S 11.1V 5000mAh LiPo + 10A UBEC | Mobile platform power with regulation |
37 components verified. All commercially available. Full BOM available as downloadable CSV.
Seven experiments designed to validate the authority-governed autonomy thesis. Each experiment injects a specific fault condition and measures authority response, mission behavior change, and recovery activation.
Each experiment requires minimum 30 trials for statistical significance. Metrics collected: trust scores, authority transitions, recovery activation events, mission success rate, unsafe action count (baseline vs. governed).
The platform design and specification are complete. Hardware procurement and implementation are currently underway. The architecture, authority model, trust evaluation method, and experimental methodology are fully defined and documented.
Complete engineering documentation for the Authority-Governed Autonomy Testbed. All files are original work by Burak Oktenli.
This project provides reproducible artifacts enabling researchers to replicate the autonomy governance experiments and system architecture. All documentation, schematics, and specifications are available for download.
Complete blueprint PDF, electrical schematic SVG, wiring connections JSON, system configuration JSON
37-component BOM with verified sources. All commercially available. Total cost under $500. Assembly guide included.
7 defined experiments with fault injection procedures, expected results, and statistical requirements (30+ trials each).
Fused trust scores, per-sensor trust values, authority state transitions, recovery latency, mission success rate.
The rover testbed operates from a 7.4V 2S LiPo battery with 5V and 3.3V regulated rails for compute and sensor modules.
7.4V 2S LiPo battery → 5V buck converter (RPi5) → 3.3V regulator (ESP32). Motor driver powered directly from battery.
Emergency stop cuts motor power via CARA-controlled GPIO. RPi5 and ESP32 remain powered for governance state preservation and audit logging.
The testbed implements a simplified security chain appropriate for a research platform while maintaining governance integrity.
48,751 states explored, 8 safety properties verified. Complete formal model of SATA-HMAA-CARA pipeline state transitions.
42-file Python engineering baseline with 98 unit tests and 200,000 FSM conformance comparisons.
Complete governance state log with timestamps. Every authority transition recorded for post-mission analysis.
| Subsystem | Cost | % of Total |
|---|---|---|
| Compute (Raspberry Pi 5 + ESP32-S3) | $95 | 20% |
| Sensors (ultrasonic + IMU + camera) | $65 | 13% |
| Drive System (motors + driver + wheels) | $120 | 25% |
| Chassis & Structure | $85 | 18% |
| Power (battery + regulators) | $45 | 9% |
| Wiring, connectors, misc | $74 | 15% |
Lowest-cost governance testbed demonstrating the complete SATA-HMAA-CARA pipeline at ~$484. All COTS components.
| Parameter | Value |
|---|---|
| Components | 37 (dual-compute: RPi5 + ESP32-S3) |
| Simulation runs | 350 across 7 fault scenarios, zero unsafe actions |
| Formal verification | TLA+ (48,751 states, 8 safety properties) |
| Test suite | 98 tests, 200,000 FSM conformance comparisons |
| Governance pipeline | SATA → HMAA → CARA (8-stage) |
| Power | 7.4V 2S LiPo |
| BOM | ~$484 |
This testbed represents the first phase of a broader research program in authority-governed autonomy. Future research directions include:
Authority coordination across multiple autonomous agents with distributed trust aggregation (MAIVA integration)
Integration of ADARA deception probability engine for proactive authority adjustment under sensor manipulation
Field experiments in outdoor contested environments with GPS spoofing, communication jamming, and multi-sensor failure injection
FLAME deliberation windows applied to physical actuator command chains with measured response timing
Extension of the governance framework to robotic manipulation, where perception uncertainty dynamically constrains motion authority, action permissions, and manipulator behavior
This project is part of ongoing research on authority-governed autonomy and resilient AI systems conducted by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). The testbed implements the same governance architectures published in the SATA, HMAA, and CARA patent disclosures and technical reports on Zenodo. Current work focuses on the rover testbed as an early physical platform, with planned extensions to robotic manipulation systems and additional authority-governed autonomy domains.
Related research architectures: SATA (sensor trust), HMAA (authority computation), CARA (recovery), MAIVA (multi-agent trust), FLAME (latency control), ADARA (deception-aware risk).