Closed

Secure Service development and Smart Security

HORIZON JU Research and Innovation Actions

Basic Information

Identifier
HORIZON-JU-SNS-2022-STREAM-B-01-04
Programme
HORIZON-JU-SNS-2022
Programme Period
2021 - 2027
Status
Closed (31094503)
Opening Date
January 18, 2022
Deadline
April 26, 2022
Deadline Model
single-stage
Budget
€6,000,000
Min Grant Amount
€6,000,000
Max Grant Amount
€6,000,000
Expected Number of Grants
1
Keywords
Communication engineering and systems telecommunic6GSmart networks and services

Description

ExpectedOutcome:

The target outcomes qualify the needed level of reliability, trust and resilience that applies to a critical infrastructure like 6G based on a globally connected continuum of heterogeneous environments supported by the convergence of networks and IT systems to enable new future digital services as follows:

  • Identification/characterisation of the threat landscape applying to future end-to-end 6G connectivity and service systems and of the technologies and architecture to mitigate them.
  • Availability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act, including associated provisions including new certification processes etc) across a complete continuum incorporating the human-cyber-physical system including connectivity-service provision.
  • Availability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform accessed by multi-stakeholders and tenants including vertical industries as users.
  • Availability of security technologies and processes addressing the challenge of open-source solutions developed in the context of multi-vendor interoperability.
  • Secure host-neutral infrastructure where multiple infrastructure providers are involved in the deployment, hosting and orchestration of the network service.
  • Identification of the life cycle of smart services security and trust requirements including development, provision, operation, maintenance and of their business impact on the stakeholders’ ecosystem.
  • AI technology applied to security in two ways: i) correct application of AI to enhance security in 6G; ii) consideration of potential security threats using AI.
Objective:

Please refer to the "Specific Challenges and Objectives" section for Stream B in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.

Scope:

The scope includes a set of complementary topics which will handle the securing of 6G technologies. Topics included are:

  • Human Centric methods that give the control to the user to guarantee privacy and confidentiality, for both service development and service execution. It addresses potential biased usage of AI and includes both the threats directly applicable to user data traffic, and their control and management. Methods for quantification of security to make the users aware of the systems and services used and associated risks is in scope as well as technologies for enhanced policy management (including huge data analytics, AI and cloud-native management and serverless approach) and facilitating human-understandable policies on trust and security of automated systems, to raise user awareness.
  • Holistic Smart Service frameworks which with secure lifecycle management and operation cover the development, provision, deployment, orchestration, and consumption of services for a new computing continuum that spans across multiple heterogeneous domains. Holistic Smart Service Frameworks include: a) IoT Device-Edge-Cloud continuum management and orchestration on virtualized and software-based elements, hardware accelerators, well as serverless frameworks, enabling zero-touch service automation; b) abstraction methods to support the network elements and providing flexible APIs, facilitating their combination addressing different orchestration styles at blurring RAN, MEC, Core and Cloud segments; c) new service developments to exploit of infrastructure slicing and sharing, capability exposure, discovery, and composition, for end-to-end management in the ICT continuum; d) end-to-end resource self-configuration and management based on key parameters such as service type, network traffic, channel conditions or mobility scenarios; e) composition methods able to handle situations where interconnected services are not known in advance, and able to model consequences (e.g., “digital twins”) with legal or ethical dimension, including new service-models that enhance human-centricity and interaction capabilities.
  • Secure Lifecycle management targets the provision of a smart, secure, adaptive, and efficient service management, spanning the lifecycle of smart networks and services (including vertical support), to manage risks and costs. It covers improved predictive orchestration algorithms for optimal usage of resources (processing, storage, networking) in terms of trust and risk level whilst bringing down OPEX and energy consumption for flexible provisioning of service instances and supports recursive deployments of functional components for secure multi-tenancy. It addresses AI-based service co-design to evolve DevSecOps methods that meet ethical, legal, social, economic, and energy-efficiency requirements together with tools for ‘security by design’ and for creation of “safer” services, to manage risks from dynamically evolving requirements and threats. Drastic incident reduction and response time for massive supervision of infrastructure elements is in scope as well as mechanisms for infrastructure and service certification for security and performance. The work also covers secured programmability with mechanisms to verify data authenticity and truthfulness (e.g., smart contracts, fact checking services), along with trusted digital interactions, especially in dynamically- composed service environments, including software engineering methodologies and tools and cost-effective certification in dynamically changing systems
  • Efficient security enablers build capability for untrusted environments. Security techniques using Artificial Intelligence, rule-based, statistical, contextual analysis and potentially relying in Distributed Ledger Technologies to improve trust in networking elements and service functions are in scope, as well as techniques to guarantee the trustworthiness and security of systems based on disaggregated cloud environments and able to reliably handle seamlessly any hardware of software element from different suppliers. Enablers can build upon developing technologies such as Full Homomorphic Encryption (FHE), Multi Party Computation (MPC), Zero Knowledge Proof (ZKP), Anonymisation/pseudonymization, data integrity of AI-based process constitute a set of relevant topics. Enablers should help to anticipate known potential threats which will mature based on other technological advances within the timeframe of the development and potential first deployments of 6G. Such threats though not yet active, are well known and are anticipated by the ICT community (e.g. Shor’s algorithm). New cryptographic techniques, and techniques to manage and distribute keys, are in development and maturing. Such techniques may be applied to end-to-end smart network security, reaching beyond performance and protection capabilities of traditional symmetric and asymmetric cryptographic and associated key exchange techniques.

Projects may address one or more of these topics.

Eligibility & Conditions

General conditions

1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes

Proposal page limits and layout: described in Part B of the Application Form available in the Submission System

The limit for a full application is 100 pages for RIA’s submitted under Stream B.

2. Eligible countries: described in Annex B of the Work Programme General Annexes

A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide.

 

3. Other eligibility conditions: described in Annex B of the Work Programme General Annexes

 

 

4. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes

 

 

5. Evaluation and award:

 

  • Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes
  • For RIA’s under Streams A and B, the award criteria table is complemented with a sub criterion in the impact section reflecting the relevance for proposals to contribute to the overall IKOP objectives of the call. (text in italic below). Relevant proposals are expected to credibly contribute to the overall 5% IKOP objectives:

    • Extent to which the members of the  proposed consortium contribute to the expected level of in-kind contribution to operational activities to help reaching the target additional investments

  • For RIA’s under Streams A, B and C, and for IA’s under stream D, the award criteria table is complemented with a sub criterion in the impact section reflecting the target SME participation.

    •  SME Participation and opportunities to leverage project  results. 

       

       

       

 

  • Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual
    • When two RIA proposals are equally ranked and that it has not been possible to separate them using first the coverage criterion, second the excellence criterion, and third the generic Impact criterion, the level of SME participation will be taken as the next criterion to sort out the ties and if still un-conclusive, the level of IKOP will be considered as appropriate. 
  • Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General  Annexes:
    • Information on the outcome of the evaluation: Maximum 5 months from the final date for submission
    • Indicative date for the signing of grant agreements: Maximum 8 months from the final date for submission.

 

6. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes

Specific conditions

7. Specific conditions: described in the specific topic of the Work Programme.

Project collaboration 

The project contracted under this call will be expected to enter into a collaboration agreement to collectively work on topics of mutual interests. To that end, they will be subject to contractual clause outlined in article 7  of the Model Grant Agreement.

Funding rates

 

Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.

Documents

Call documents:

A call-specific application form will be used in this topic — the call-specific application form is available in the Submission System.

 

Standard evaluation form will be used with the necessary adaptations

Standard evaluation form (HE RIA, IA)

 

MGA

HE General MGA v1.1

 

 

Additional documents:

HE Main Work Programme 2021–2022 – 1. General Introduction

SNS-R&I-Work-Programme-2021-2022

HE Main Work Programme 2021–2022 – 13. General Annexes

HE Programme Guide

HE Framework Programme and Rules for Participation Regulation 2021/695

HE Specific Programme Decision 2021/764

EU Financial Regulation

Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment

EU Grants AGA — Annotated Model Grant Agreement

Funding & Tenders Portal Online Manual

Funding & Tenders Portal Terms and Conditions

Funding & Tenders Portal Privacy Statement

Support & Resources

Online Manual is your guide on the procedures from proposal submission to managing your grant.

Horizon Europe Programme Guide contains the detailed guidance to the structure, budget and political priorities of Horizon Europe.

Funding & Tenders Portal FAQ – find the answers to most frequently asked questions on submission of proposals, evaluation and grant management.

Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.

National Contact Points (NCPs) – get guidance, practical information and assistance on participation in Horizon Europe. There are also NCPs in many non-EU and non-associated countries (‘third-countries’).

Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.

IT Helpdesk – contact the Funding & Tenders Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.

European IPR Helpdesk assists you on intellectual property issues.

CEN-CENELEC Research Helpdesk and ETSI Research Helpdesk –  the European Standards Organisations advise you how to tackle standardisation in your project proposal.  

The European Charter for Researchers and the Code of Conduct for their recruitment – consult the general principles and requirements specifying the roles, responsibilities and entitlements of researchers, employers and funders of researchers.

Partner Search Services help you find a partner organisation for your proposal.

 

Latest Updates

Last Changed: February 3, 2022

 Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.