Aerospace 12 00478
Aerospace 12 00478
Article
experimental or high-fidelity databases [4,16] and they often limit the planning domain
to fixed altitudes or simplified geometries, thereby reducing their relevance in complex
operational scenarios [6]. Consequently, these studies do not provide sufficient fidelity for
generating realistic penetration trajectories, particularly for non-stealth platforms operating
in variable threat landscapes [2,13]. The absence of a comprehensive integration of RCS
dynamics with motion planning further weakens the practicality of these approaches, as
they cannot adapt to radar threats that depend on rapid changes in aircraft orientation [9,12].
Another point of concern, the control surface deflections, a critical factor in achieving precise
stealth maneuvers, is neglected in most studies [1,6,13,14]. Without explicit consideration
of control surface deflections, these methods cannot generate stealthy trajectories that are
both realistic and executable under operational constraints. Finally, previous studies have
predominantly focused on precomputed path planning rather than real-time maneuver
generation, which is a critical limitation in dynamic radar environments. Algorithms like
A-Star and sparse A-Star offer optimal solutions for static or semi-dynamic scenarios but
lack the adaptability needed for continuously changing radar threats [7,8,15]. By focusing
primarily on static optimization, these methods fail to address the need for continuous
trajectory adjustment, a cornerstone of effective stealth operations in modern contested
airspace [9,12].
Figure 1. The illustration of a radar-penetration maneuver scenario, emphasizing the virtual (or ideal)
path and alternative RCS-constrained maneuvers.
The scenario illustration demonstrates that the aircraft must pass through the radar
coverage zone, assuming that the radar location is pre-known, which is a reasonable
assumption consistent with the existing literature [4,6–9]. In the absence of radar, the
aircraft would have followed a straight flight path to pass over the zone. Consequently,
this straight flight trajectory is considered the virtual (or ideal) path, meaning that the
angular rates remain zero throughout the path, i.e., ωref = 03 . However, the presence of
radar necessitates reshaping the virtual path to account for the aircraft’s radar cross-section.
The problem can thus be formulated as an optimization problem for motion planning,
aiming to adhere to radar cross-section constraints while staying as close as possible to the
virtual path.
The methodology underlying this approach is grounded in the use of an RCS database,
belonging to a non-stealth aircraft. Building upon this foundation, the study leverages
control barrier functions to enforce constraints on RCS values during maneuver execution
by commanding angular rates, ωcmd .
2.1. Notations
Throughout this study, the time derivative of a continuously differentiable function
f : Rn → R is represented as f˙. Vectors are indicated using bold notation, i.e., v, and the
cross product of two vectors x and y is denoted by x × y. The notations s(∗), c(∗), and t(∗)
correspond to the sine, cosine, and tangent functions of (∗), respectively. A control affine
system is described as
ẋ = f ( x) + g ( x)u (1)
where x ∈ Rn is the state vector and u ∈ Rm is the control input vector. Nonlinear mappings
of f : Rn −
→ Rn and g : Rn − → Rn×m are locally Lipschitz continuous functions. Finally, for
∞
a C function Q : R −n → R and g : Rn× p −→ Rn , the Lie derivative is denoted by
Aerospace 2025, 12, 478 6 of 32
∂Q
L g Q( x) = ( x) g( x) (2)
∂x
C ={ x ∈ D ⊂ Rn : h( x) ≥ 0}
∂C ={ x ∈ D ⊂ Rn : h( x) = 0} (3)
n
Int(C) ={ x ∈ D ⊂ R : h( x) > 0}
where C is safe set, ∂C is the boundary, and Int(C) is the interior of the safe set. In addition,
h( x) ≥ 0 defines the safe region while h( x) < 0 defines the unsafe region.
where class κ∞ function α(h( x)) for a dynamic system described in Equation (1). If such safe
set C exists, then the control set ensuring the safety for ∀ x ∈ D can be given as
n o
Kcb f := u ∈ U : L f h( x) + L g h( x)u + α(h( x)) ≥ 0 (5)
Figure 2. An illustration of the baseline aircraft with its body axis and wind axis frames.
Aerospace 2025, 12, 478 7 of 32
The nonlinear flight dynamics equations, including translational and rotational dy-
namics, and translational and rotational kinematics are, respectively,
u̇ = ∑ FX /m + rv − qw
v̇ = ∑ FY /m + pw − ru
ẇ = ∑ FZ /m + qu − pv
ṗ = qr ( Iyy − Izz )/Ixx + (ṙ + pq) Ixz /Ixx + ∑ L/Ixx
q̇ = pr ( Izz − Ixx )/Iyy + (r2 − p2 ) Ixz /Iyy + ∑ M/Iyy
ṙ = pq( Ixx − Iyy )/Izz + ( ṗ − qr ) Ixz /Izz + ∑ N/Izz
(6)
ẋE = ucθcψ + v(sϕsθcψ − cϕsψ) + w(cϕsθcψ + sϕsψ)
ẏE = ucθcψ + v(sϕsθcψ + cϕcψ) + w(cϕsθsψ − sϕsψ)
żE = −usθ + vsϕcθ + wcϕcθ
ϕ̇ = p + tθ (qsϕ + rcϕ)
θ̇ = qcϕ − rsϕ
ψ̇ = (qsϕ + rcϕ)/cθ
where u, v, and w denote the components of the body velocity, while p, q, and r represent
the angular rate components in the body frame. The navigational position is specified
by xE , yE , and zE , and the orientation is described by the Euler angles ϕ, θ, and ψ. The
force components acting on the body frame are given as FX , FY , and FZ , with L, M, and N
representing the roll, pitch, and yaw moments, respectively. Additionally, m signifies the
mass of the aircraft, while Ixx , Iyy , Izz , and Ixz define the aircraft’s moments of inertia.
b
ω̇ = − J −1 (ω × Jω) + J −1 q̄∞ S c̄ Φ |{z} (7)
δ
b u
| {z }
g ( x)
where q̄∞ , S, b, and c̄ represent the dynamic pressure, wing area, wing span, and mean
aerodynamic chord, respectively. Additionally, Φ ∈ R3×n denotes the control effectivity
matrix, which contains the moment coefficient derivatives with respect to the control
surface deflections at the current instant, with n indicating the number of control surfaces.
The INDI control law for regulating the angular rates is derived as
where the subscript ‘0’ denotes the current state and ω̇c ∈ R3 represents the virtual input
to be designed. The final form of the control law is provided as
( b ) −1
−1
δ = J q̄∞ S c̄ Φ [ω̇c − ω̇0 ] + δ0 (9)
b
where K p , Kq , and Kr are the gains for the roll, pitch, and yaw channels, respectively. The
provided expressions outline the necessary generation of control surface deflections in
response to the pilot commands pcmd , qcmd , and rcmd .
Ss
σ = lim 4πr2 (11)
r →∞ Si
where Si is the incident power density measured at the target, Ss is the scattered power
density seen at a distance r away from the target, r is the distance from target. Additionally,
RCS is often expressed on a logarithmic scale for clarity and practicality, defined as
where σ represents the RCS measured in square meters (m2 ), while dBsm provides a
logarithmic representation of the RCS in decibels.
3.1. Methodology
The RCS database for a specific aircraft may not be available due to confidentiality
issues. Therefore, developing an approach regarding the observability during a radar
Aerospace 2025, 12, 478 9 of 32
The RCS analyzes were performed in ANSYS® v2021 R2 using the Shooting and
Bouncing Rays (SBR) method at 3 GHz (S-band radar) [20] with the generated mesh. The
S-band radar (3 GHz) represents a balance: high enough to capture detailed scattering be-
havior but still within reach of affordable GPU-accelerated platforms. It enables validation
of stealth characteristics against typical radar threats without requiring supercomputing
resources. RCS analyzes are characterized by the azimuth and elevation angles. These
angles represent the relative orientation of the aircraft with respect to the radar position, as
depicted in Figure 4.
Figure 4. The azimuth (Φ) and elevation (Θ) representation: the relative orientation of the aircraft
with respect to the radar position.
By definition, the range of the Φ angle is [−180◦ , 180◦ ], whereas the range of the Θ
angle is [0◦ , 180◦ ]. Therefore, a comprehensive RCS analysis should cover all combinations
within these ranges. Furthermore, however, analyzing only the possible combinations of Θ
and Φ angles is insufficient to construct a high-fidelity RCS database, as the control surfaces
are movable. Thereby, the deflection in the control surfaces changes the spatial geometry
and so do the RCS characteristics. To address the concern regarding the fidelity of the
constructed database, the geometry with control surface deflections must also be modeled,
Aerospace 2025, 12, 478 10 of 32
and the incremental addition of the control surface deflections should be included in the
RCS database. Consequently, the RCS analysis points should be defined as follows: Φ
within the range [−180◦ , 180◦ ], Θ within the range [0◦ , 180◦ ], and the aileron (δA ), horizontal
tail (δHT ), and rudder deflections (δR ) within the range [−30◦ , 30◦ ] The elevation and
azimuth angles are discretized in 15◦ increments, whereas the control surface deflections
are discretized into maximum, minimum, and neutral positions.
(a) (b)
Figure 5. F-16 RCS characteristics with the elevation, Θ, and azimuth, Φ: the RCS profiles indicate
that the peak values are observed in the azimuth angles of −90◦ and 90◦ , while the elevation is
constant at 90◦ . Additionally, the peaks are trackable at the elevation angles of 0◦ and 180◦ , while
the azimuth is constant at 0◦ . The RCS characteristics and values at different orientations of F-16
clearly exhibit the toughness of generating stealthy maneuvers. The computational cost of using a
high-resolution angular increment (i.e., 0.1◦ ) increases dramatically; therefore, a relatively coarse
resolution (i.e., 15◦ ), which still captures the RCS characteristics appropriately, is utilized throughout
the study. (a) RCS variation while the elevation, Θ, remains constant at 90◦ ; (b) RCS variation while
the azimuth, Φ, remains constant at 0◦ .
(a) (b)
Figure 6. F-16 RCS characteristics in polar map. (a) RCS variation while the elevation, Θ, remains
constant at 90◦ ; (b) RCS variation while the azimuth, Φ, remains constant at 0◦ .
The effects of the horizontal tail deflection on the RCS characteristics are depicted in
Figure 7 comparatively.
Aerospace 2025, 12, 478 11 of 32
(a) (b)
Figure 7. F-16 RCS variation with the horizontal tail deflection. (a) Positive horizontal tail deflection;
(b) Negative horizontal tail deflection.
The results indicate that while there is minimal variation in RCS values when the
aircraft is tracked from the frontal aspect of the radar, a noticeable increase occurs when
the radar rays encounter the horizontal tail at a perpendicular angle. Specifically, for a 25◦
horizontal tail angle, the RCS value increases by approximately 10 dBsm at an elevation
angle of 155◦ . Similarly, for a −25◦ horizontal tail angle, the RCS value rises by about
15 dBsm at an elevation angle of 205◦ . As an adjunct instance, the rudder deflection effects
on the RCS characteristics are illustrated in Figure 8.
where Pa is the position of the aircraft, Pr is the position of the radar, and Rib represents
the direction cosine matrix from the body frame of the F-16 to the inertial frame with ZYX
order rotation and is formulated as
cθcψ cθsψ −sθ
Rib = sϕsθcψ − cϕsψ sϕsθsψ + cϕcψ sϕcθ (14)
cϕsθcψ + sϕsψ cϕsθsψ − sϕcψ cϕcθ
Aerospace 2025, 12, 478 12 of 32
where bank angle ϕ, pitch angle θ, and yaw angle ψ represent the attitude angles. Then, the
Θ and Φ angles are determined by converting from the cartesian to the spherical coordinate
system using Equation (15).
Py
Θ = arctan
P
qx (15)
Px2 + Py2
Φ = arctan
Pz
4. Stealth-Maneuver Generator
The primary principle of stealth-maneuver generator design is to maintain the aircraft’s
RCS below a predetermined maximum allowable threshold during radar penetration. In
this regard, the stealth-maneuver generator is required to generate pcmd , qcmd , and rcmd ;
therefore, the RCS should be formulated and decomposed in a manner that ensures that
angular rates are observable. Fortunately, the RCS is a function of aircraft attitude angles
(ϕ, θ, and ψ), implying that the angular rates can be revealed provided that an appropriate
barrier function is established. A barrier function is then designed as
where σmax ∈ R is the predetermined maximum allowable RCS value. It is obvious that
h(σ ) > 0, ∀σ ∈ R<σmax , and h(σ ) = 0 ↔ σ = σmax . Thus, the time derivative of the barrier
function is ḣ(σ) = −σ̇. At this point, an expansion of the time derivative of the barrier
function should be given as
where σϕ , σθ , and σψ represent the RCS derivatives with respect to the bank angle, pitch
angle, and yaw angle, respectively. Provided that the RCS database is available, these
partial derivatives can be calculated using either the central difference method—preferred
in this study [21]—or formulating the RCS as a polynomial function.
Subsequently, to derive the angular rates from the RCS dynamics, the bank, pitch,
and yaw dynamics should be expressed as ϕ̇ = f (ϕ) + g(ϕ)ω, θ̇ = f (θ ) + g(θ )ω, and
ψ̇ = f (ψ) + g(ψ)ω, respectively. It is quite straightforward since the attitude dynamics
are represented through a transformation matrix and angular rates, i.e., Ω̇ = Rϕθψ ω. By
recalling the rotational kinematics given in Equation (6), the required decomposition for
the bank, pitch, and yaw dynamics can be performed as
Aerospace 2025, 12, 478 13 of 32
h i p
ϕ̇ = |{z}0 + 1 tan θ sin ϕ tan θ cos ϕ q
f (ϕ) | {z } r
g(ϕ) |{z}
ω
h i p
0 + 0 cos ϕ − sin ϕ q
θ̇ = |{z}
} r (18)
f (θ ) | {z
g(θ ) |{z}
ω
p
sin ϕ cos ϕ
ψ̇ = |{z}0 + 0 q
cos θ cos θ
f (ψ) | {z } r
g(ψ) |{z}
ω
Attentive eyes will notice that the components of g(ϕ), g(θ ), and g(ψ) are row elements
of the transformation matrix Rϕθψ . Subsequently, the RCS dynamics can be represented in
the form of σ̇ = f (σ ) + g(σ )ω, defined as
h i p
σ̇ = |{z}
0 + σϕ g(ϕ) σθ g(θ ) σψ g(ψ) q (19)
f (σ) | {z } r
g(σ) |{z}
ω
− f ( σ ) − g ( σ ) ω + γσ h ( σ ) ≥ 0 (20)
| {z }
L f h(σ)+L g h(σ)ωcmd
Figure 9. General framework of the proposed method: (1) Stealth-maneuver generator through
CBF-pilot, (2) CAS including INDI, and (3) A/C dynamics. The reference commands pref , qref , and
rref from virtual path are subjected to RCS constraint. Each reference angular rate signals are adjusted
by CBF constraint, and pcmd , qcmd , and rcmd are generated, if necessary. Otherwise, the reference
angular rate commands are passed through. Note that the demonstrated framework is activated in
autopilot mode only when the radar penetration maneuver is intended to be initiated; otherwise,
the pilot’s commands are directly transferred to the control augmentation system as pcmd , qcmd , and
rcmd . However, since the scope of the study is limited to the generation of stealth radar penetration
maneuver, the autopilot mode takes the control over rather than pilot commands.
the combinations of Φ and Θ where the RCS values are below 0 dBsm, while the red regions
indicate RCS values exceeding 0 dBsm. The black circles denote the angle combinations at
each time step of the simulation. It can be observed that the constraints are quickly satisfied,
and the RCS value remains below 0 dBsm until the end of the scenario, with the angles
staying within the blue region. The fluctuations observed toward the end of the scenario
can be visually explained through Figure 10, as the portrait approaches the border of the
blue region. The rate commands pcmd , qcmd , and rcmd , along with the aircraft’s states, are
shown in Figure 11.
Figure 10. Radar cross-section history for the radar-penetration maneuver: (1) RCS trajectories for
both the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and
elevation angles, along with the aircraft’s orientation trajectory on the right.
Angular rate commands are issued when the RCS value exceeds the threshold. The ratio-
nale behind this behavior is to satisfy the constraint while minimizing the objective function
of the optimization. Since the optimization minimizes the difference between ωre f and ωcmd ,
the result of the optimization yields zero angular rate commands when the constraints are
already satisfied. The resulting attitude angles for this case are shown in Figure 12.
Aerospace 2025, 12, 478 16 of 32
Figure 12. Attitude trajectories of the aircraft during the radar-penetration maneuver.
The aircraft successfully reduces its RCS value by employing a negative roll rate,
effectively orienting its canopy toward the radar. For approximately 13 s, the attitude
remains almost unchanged as the rate commands are zero. In the final phase of this scenario,
the aircraft continuously adjusts its orientation to satisfy the RCS constraint. When the
orientations result in an RCS value smaller than the threshold, the rate commands are zero,
and the attitudes remain constant until the satisfaction of the constraint requires further
angular rate commands. The resulting trajectory of this case is depicted with three planar
views and one isometric view in Figure 13, providing a clearer visual representation of the
generated maneuvers.
The changes in the initial orientation and the constant attitude over approximately
10 s are visualized in Figure 13. The adjustments made to the attitude at the end of the
engagement to satisfy the RCS threshold can also be observed in the resulting trajectory.
Throughout the simulation, the aircraft attempts to orient its canopy toward the radar, with
the dive at the end aimed at maintaining the same Φ angle.
Figure 14. Radar cross-section history for the radar-evasive maneuver: (1) RCS trajectories for both
the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and elevation
angles, along with the aircraft’s orientation trajectory on the right.
The proposed methodology is compared with the virtual path, which has no RCS
constraints and maintains a constant attitude, as shown in Figure 14. The initial orientation
of the aircraft results in an RCS of approximately 2 dBsm. Subsequently, with agile interven-
tion, the CBF-pilot commands an orientation that reduces the resultant RCS to quite below
0 dBsm, reaching nearly −20 dBsm. For a prolonged period, the RCS remains below 0 dBsm
as the aircraft maneuvers to avoid detection. Upon approaching and passing over the radar,
the RCS exhibits a peak. This phenomenon is also visualized in the RCS map shown on the
right of Figure 14. Obviously, the ability to remain below the threshold is only achievable
through ceaseless contact of the blue regions, which represent the attitude combinations
yielding an RCS below 0 dBsm. Based on this observation, the baseline non-stealth aircraft
is inherently incapable of sustaining a stealth maneuver even though the CBF-pilot is in
charge of keeping stealth maneuver. Fortunately, the detectable period of the maneuver is
relatively short, after which the aircraft is reoriented to maintain stealthy flight. The rate
commands pcmd , qcmd , and rcmd , along with the aircraft’s states, are shown in Figure 15.
Aerospace 2025, 12, 478 18 of 32
Again, the angular rate commands are only issued when the RCS value exceeds the
threshold. Thereby, the resulting attitude angles for this case are shown in Figure 16.
Figure 16. Attitude trajectories of the aircraft during the radar-evasive maneuver.
In this case as well, the aircraft successfully and rapidly reduces its RCS by employing
a negative roll rate. For approximately 12 s, the attitude remains almost unchanged as the
rate commands are zero. During the period of the subsequent peak in the RCS history,
the CBF-pilot applies impulsive adjustment commands. Depending on the aircraft’s RCS
characteristics, a significant portion of these adjustments during this period are effective,
while some fail to sustain the stealth maneuver, as its reason has been discussed previously.
Finally, the resulting trajectory for this case is illustrated in Figure 17 with three planar
views and one isometric view.
Aerospace 2025, 12, 478 19 of 32
Figure 18. Radar cross-section history for the radar-penetration maneuver: (1) RCS trajectories for
both the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and
elevation angles, along with the aircraft’s orientation trajectory on the right.
For the sake of comparison, the RCS map in Figure 18 is significantly more challenging
than the one shown in Figure 10. Nevertheless, the proposed maneuver generation rationale
remains effective in producing stealth maneuvers compared to the virtual path, despite the
more demanding RCS characteristics. The commands of stealth maneuver generator are
shown in Figure 19.
Figure 20. Attitude trajectories of the aircraft during the radar-penetration maneuver.
Finally, the resulting trajectory of this case is depicted with three planar views and one
isometric view in Figure 21, providing a clearer visual representation of the generated ma-
neuvers.
The adjustments made to the attitude throughout the engagement to satisfy the RCS
threshold can also be observed in the resulting trajectory.
Aerospace 2025, 12, 478 22 of 32
Figure 22. Radar cross-section history for the radar-evasive maneuver: (1) RCS trajectories for both
the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and elevation
angles, along with the aircraft’s orientation trajectory on the right.
Figure 24. Attitude trajectories of the aircraft during the radar-evasive maneuver.
Finally, the resulting trajectory of this case is depicted with three planar views and one
isometric view in Figure 25, providing a clearer visual representation of the generated ma-
neuvers.
The adjustments made to the attitude throughout the engagement to satisfy the RCS
threshold can also be observed in the resulting trajectory.
Aerospace 2025, 12, 478 24 of 32
Figure 26. Radar cross-section history for the radar-penetration maneuver: (1) RCS trajectories for
both the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and
elevation angles, along with the aircraft’s orientation trajectory on the right.
The reduced RCS map in Figure 26 has more azimuth and elevation angle combinations
below the 0 dB threshold compared to the one shown in Figure 10. As expected, the
maneuver-generation method continues to produce effective stealth maneuvers compared
to the virtual path as well as the proposed maneuver generation results given in Figure 10.
However, the resulting RCS trajectory differs due to the altered RCS distribution. The
commands of the stealth maneuver generator are shown in Figure 27.
The yielding aircraft states for reduced RCS map are demonstrated in Figure 28.
Figure 28. Attitude trajectories of the aircraft during the radar-penetration maneuver.
The resulting trajectory, shown in three planar perspectives and one isometric view in
Figure 29, offers a clear visual representation of the generated maneuvers.
An additional assessment using the same reduced RCS characteristics involves du-
plicating Scenario-2 presented in Section 5.2, i.e., the radar-evasive maneuver. The RCS
trajectory corresponding to this simulation is shown in Figure 30.
Aerospace 2025, 12, 478 26 of 32
Figure 30. Radar cross-section history for the radar-evasive maneuver: (1) RCS trajectories for both
the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and elevation
angles, along with the aircraft’s orientation trajectory on the right.
Consistent with prior assessments, the proposed maneuver generation rationale re-
mains highly effective in producing stealth maneuvers compared to the virtual path, given
that a larger region falls below the RCS threshold. Also, the resulting commands success-
fully maintain the RCS value below the threshold continuously after the initial transition
maneuvers. The commands of stealth maneuver generator are shown in Figure 31.
Figure 32. Attitude trajectories of the aircraft during the radar-evasive maneuver.
The resulting trajectory of this case is depicted with three planar views and one
isometric view in Figure 33, providing a clearer visual representation of the generated
maneuvers.
The resulting trajectory clearly shows the attitude changes applied during the engage-
ment to stay within the RCS threshold.
Aerospace 2025, 12, 478 28 of 32
Figure 34. Radar cross-section history for the radar-evasive maneuver: (1) RCS trajectories for both
the virtual path and RCS-constrained maneuver on the left, (2) RCS map with azimuth and elevation
angles, along with the aircraft’s orientation trajectory on the right.
It is evident that the setting of the design parameter has a significant impact on the
performance of the stealth maneuver generator. An increase in the parameter value extends
the duration during which the aircraft’s observability remains below the 0 dBsm threshold.
Additionally, an increase in the design parameter induces a more responsive behavior in
the RCS dynamics, as evidenced by the reduced settling time toward or below the threshold
RCS value. The setting of γσ = 1 × 103 enables a significant reduction in observability,
reaching as low as −20 dBsm. Furthermore, each setting of the design parameter results in a
distinct RCS profile, reflecting differences in the commands issued by the stealth maneuver
generator. Nevertheless, each design configuration ultimately aims to generate a maneuver
that keeps the radar cross-section below the threshold, albeit with varying characteristics.
Finally, the resulting trajectory, shown in three planar perspectives and one isometric view
in Figure 35, offers a clear visual representation of the generated maneuvers.
Consequently, the radar-evasive operation is successfully accomplished with varying
characteristics, despite differences in the design parameter settings.
ing within [2000 m, 5000 m] and its east coordinate ranging within [−2000 m, 2000 m].
The performance of the framework was assessed using three key metrics as depicted in
Figure 36.
Figure 36. Monte Carlo simulation performance metrics: (1) The mean RCS value is −4.8739 dBsm
and 3.9508 dBsm for the CBF-pilot and the virtual path, respectively; (2) The percentage of the mean
RCS below the threshold is 89.6% for the CBF-pilot and 1.26% for the virtual path; (3) The RCS value
remains below the threshold for 78.28% and 20.52% of the simulation duration for the CBF-pilot and
the virtual path, respectively.
The first metric, σavg , represents the mean RCS value observed during each simulation,
providing an overall measure of radar visibility. The distribution of σavg values for both
the proposed framework and the virtual path is shown in the upper portion of Figure 36.
The concentration of σavg values is below the 0 dBsm threshold for the CBF-pilot, while it
remains above the threshold for the virtual path, as expected. Additionally, the maximum
Aerospace 2025, 12, 478 30 of 32
σavg values for the CBF-pilot are smaller than those for the virtual path, reflecting the efforts
to reduce visibility. The second metric focuses on the percentage of total simulations in
which the mean RCS value was below the 0 dB threshold, highlighting the framework’s
effectiveness in maintaining low observability across different scenarios. This metric
reveals a significant difference between the results of the CBF-pilot and the virtual path.
Specifically, the virtual path achieves only 1.26% of cases with σavg below the threshold,
whereas the proposed CBF-pilot method successfully keeps 89.6% of total simulations below
the threshold. The third metric evaluates the percentage of RCS values that remain below
0 dB within each simulation, offering insights into the consistency of stealth performance.
Relying solely on σavg for performance measurement can be misleading, as cases where the
RCS value exceeds the threshold for a certain duration can still result in an average below
the threshold if the RCS achieves very low dBsm values for a short time. Therefore, using
this metric provides deeper insights into true performance. The results indicate that, for
the majority of cases, the RCS value remains below the threshold for over 78% of the total
simulation time in the CBF-pilot results. Conversely, the virtual path lacks this characteristic
due to the absence of CBF constraints. These three metrics combined demonstrate the
effectiveness of the proposed maneuver generation approach under various conditions and
solidify its impact on reducing the aircraft’s visibility.
6. Conclusions
This study presents a novel framework for generating maneuvers using CBF to dy-
namically manage RCS constraints. The approach utilizes a high-fidelity flight dynamics
model of an F16 aircraft in contrast to existing studies based on simplified kinematic flight
dynamics models to assess radar observability. Additionally, the generation of the RCS
dataset is achieved by incorporating the control surface deflections in addition to the
aircraft’s orientations to realistically model the exact RCS profile. The approach allows
non-stealth aircraft to reduce their radar observability by the generated maneuvers in real
time, ensuring compliance with RCS thresholds.
The effectiveness of the proposed method is evaluated through comparisons between
cases with CBF-pilot and virtual path which excludes a CBF-based maneuver generator. In
scenarios where virtual path is applied, the aircraft exhibit consistently higher RCS values,
making them more susceptible to radar detection. By contrast, the CBF-pilot approach
maintains RCS values below predefined thresholds for the majority of the mission timeline.
In realistic operational scenarios, such as radar-penetration and radar-evasive maneuvers,
the framework demonstrates its ability to dynamically adjust the aircraft’s orientation by
controlling angular rates to minimize radar exposure. During Monte Carlo simulations,
over 89.6% of cases with stealth maneuver generator achieve sustained low radar observ-
ability compared to just 1.26% of cases with virtual path. These results underline the critical
impact of dynamic and adaptive motion planning in achieving low detectability under
radar threat conditions. This analysis illustrates the performance of the CBF-based method
in enabling aircraft to evade radar detection and maintain survivability.
In conclusion, this study provides a practical and effective solution for enabling non-
stealth aircraft to dynamically evade radar detection through generated maneuvers. By
comparing cases with and without stealth maneuver generator, the results emphasize
the importance of dynamic maneuver generation in reducing radar observability. The
proposed method demonstrates strong potential for real-time implementation due to its
simple linearly-constrained quadratic programming formulation, the strong convergence
characteristics of the sequential quadratic programming algorithm, and its ability to operate
at high frequencies in the simulation environment. Since the proposed strategy is an
optimization-based motion planning algorithm, it can generate stealth maneuvers even
Aerospace 2025, 12, 478 31 of 32
against mobile radar threats, provided that a feasible solution exists. Therefore, the study is
also promising for various contested and hostile environments. Consequently, the proposed
framework sets a new benchmark for enhancing survivability in contested environments
and lays the groundwork for future innovations in stealth strategy and motion planning.
Thus, potential future work may involve assessing the framework under more challenging
scenarios, such as dynamic radar threats posed by aerial radar platforms.
Data Availability Statement: The raw data supporting the conclusions of this article will be made
available by the authors on request.
Acknowledgments: During the preparation of this manuscript/study, the authors used ChatGPT 4.0
for the purposes of the grammar and spell check. The authors have reviewed and edited the output
and take full responsibility for the content of this publication.
Conflicts of Interest: Author Uğur Zengin was employed by the company Turkish Aerospace. The
remaining authors declare that the research was conducted in the absence of any commercial or
financial relationships that could be construed as a potential conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Paterson, J. Overview of low observable technology and its effects on combat aircraft survivability. J. Aircr. 1999, 36, 380–388.
[CrossRef]
2. Moore, F.W. Radar cross-section reduction via route planning and intelligent control. IEEE Trans. Control Syst. Technol. 2002,
10, 696–700. [CrossRef]
3. Zikidis, K.; Skondras, A.; Tokas, C. Low observable principles, stealth aircraft and anti-stealth technologies. J. Comput. Model.
2014, 4, 129–165.
4. Woo, S.H.A.; Shin, J.J.; Kim, J. Implementation and analysis of pattern propagation factor based radar model for path planning. J.
Intell. Robot. Syst. 2019, 96, 517–528. [CrossRef]
5. Norsell, M. Radar cross section constraints in flight-path optimization. J. Aircr. 2003, 40, 412–415. [CrossRef]
6. Lu, X.; Huang, J.; Guan, J.; Song, L. Stealth Aircraft Penetration Trajectory Planning in 3D Complex Dynamic Based on Radar
Valley Radius and Turning Maneuver. Aerospace 2024, 11, 402. [CrossRef]
7. Zhang, Z.; Jiang, J.; Wu, J.; Zhu, X. Efficient and optimal penetration path planning for stealth unmanned aerial vehicle using
minimal radar cross-section tactics and modified A-Star algorithm. ISA Trans. 2023, 134, 42–57. [CrossRef] [PubMed]
8. Guan, J.; Huang, J.; Song, L.; Lu, X. Stealth Aircraft Penetration Trajectory Planning in 3D Complex Dynamic Environment Based
on Sparse A* Algorithm. Aerospace 2024, 11, 87. [CrossRef]
9. Xu, Q.; Ge, J.; Yang, T.; Sun, X. A trajectory design method for coupling aircraft radar cross-section characteristics. Aerosp. Sci.
Technol. 2020, 98, 105653. [CrossRef]
10. Paterson, J. Measuring low observable technology’s effects on combat aircraft survivability. In Proceedings of the 1997 World
Aviation Congress, Anaheim, CA, USA, 13–16 October 1997; p. 5544. [CrossRef]
Aerospace 2025, 12, 478 32 of 32
11. McFarland, M.B.; Zachery, R.A.; Taylor, B.K. Motion planning for reduced observability of autonomous aerial vehicles. In
Proceedings of the 1999 IEEE International Conference on Control Applications (Cat. No. 99CH36328), Kohala Coast, HI, USA,
22–27 August 1999; Volume 1, pp. 231–235. [CrossRef]
12. Liu, H.; Chen, J.; Shen, L.; Chen, S. Low observability trajectory planning for stealth aircraft to evade radars tracking. Proc. Inst.
Mech. Eng. Part G: J. Aerosp. Eng. 2014, 228, 398–410. [CrossRef]
13. Liu, H.; Chen, S.; Zhang, Y.; Chen, J. Modelling radar tracking features and low observability motion planning for UCAV. In
Proceedings of the 2012 4th International Conference on Intelligent Human-Machine Systems and Cybernetics, Nanchang, China,
26–27 August 2012; Volume 2, pp. 162–166. [CrossRef]
14. Zhang, Z.; Wu, J.; Dai, J.; He, C. A novel real-time penetration path planning algorithm for stealth UAV in 3D complex dynamic
environment. IEEE Access 2020, 8, 122757–122771. [CrossRef]
15. Zhang, Z.; Wu, J.; Dai, J.; He, C. Rapid penetration path planning method for stealth uav in complex environment with bb threats.
Int. J. Aerosp. Eng. 2020, 2020, 8896357. [CrossRef]
16. Guo, D.; Zhai, J.; Xie, X.; Yin, H.; Zhu, Y. Machine learning-based modeling and uncertainty quantification for radar cross
section of a cone-like target. In Proceedings of the 2022 IEEE 2nd International Conference on Power, Electronics and Computer
Applications (ICPECA), Shenyang, China, 21–23 January 2022; pp. 249–252. [CrossRef]
17. Ames, A.D.; Coogan, S.; Egerstedt, M.; Notomista, G.; Sreenath, K.; Tabuada, P. Control barrier functions: Theory and applications.
In Proceedings of the 2019 18th European control conference (ECC), Naples, Italy, 25–28 June 2019; pp. 3420–3431. [CrossRef]
18. Nguyen, Q.; Sreenath, K. Exponential control barrier functions for enforcing high relative-degree safety-critical constraints. In
Proceedings of the 2016 American Control Conference (ACC), Boston, MA, USA, 6–8 July 2016; pp. 322–328. [CrossRef]
19. Nguyen, L.T. Simulator Study of Stall/Post-Stall Characteristics of a Fighter Airplane with Relaxed Longitudinal Static Stability; National
Aeronautics and Space Administration: Washington, DC, USA, 1979; Volume 12854.
20. Pavlovic, M.S.; Tasic, M.S.; Mrdakovic, B.L.; Kolundzija, B. WIPL-D: Monostatic RCS analysis of fighter aircrafts. In Proceedings
of the 2016 10th European Conference on Antennas and Propagation (EuCAP), Davos, Switzerland, 10–15 April 2016; pp. 1–4.
[CrossRef]
21. Su, M.; Hu, J.; Wang, Y.; He, Z.; Cong, J.; Han, L. A multiobjective incremental control allocation strategy for tailless aircraft. Int. J.
Aerosp. Eng. 2022, 2022, 6515234. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.