Closed

Reliable Services and Smart Security

HORIZON JU Research and Innovation Actions

Basic Information

Identifier
HORIZON-JU-SNS-2023-STREAM-B-01-04
Programme
HORIZON-JU-SNS-2023
Programme Period
2021 - 2027
Status
Closed (31094503)
Opening Date
January 16, 2023
Deadline
April 24, 2023
Deadline Model
single-stage
Budget
€3,000,000
Keywords
Communication engineering and systems telecommunications

Description

Expected Outcome:

The target outcomes qualify the needed level of reliability, trust and resilience that applies to a critical infrastructure like 6G based on a globally connected continuum of heterogeneous environments supported by the convergence of networks and IT systems to enable new future digital services.

  • Availability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act, including associated provisions including new certification processes) across a complete continuum incorporating the human-cyber-physical system including connectivity-service provision, supporting complex human centric multimodal communications, including entangled devices.
  • Availability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform accessed by multi-stakeholders and tenants including vertical industries as users, for increasingly fleeting and dynamic scenarios.
  • Secure host-neutral infrastructure where multiple infrastructure providers are involved in the deployment, hosting and orchestration of the network service, especially in the context of stringent requirements for the communications.
  • Identification of the life cycle of smart services security and trust requirements including development, provision, operation, maintenance and of their business impact on the stakeholders’ ecosystem.
  • AI technology applied to security and service deployment in several ways: i) correct application of AI to enhance security and service deployment in 6G; ii) consideration of potential security threats using AI.
  • Operational security: End-to-End, system wide Security policies composition and management among multiple stakeholders based on trusted and eventually certified services, eventually providing technology solutions in the context of regulatory initiatives like the cybersecurity toolbox.
  • New services and security technologies that will fulfil 6G needs and EU policies in this area.

Note: The perimeters of the heterogeneous domains considered addressed by the proposals should be clearly identified as well as the expected impact towards the adoption of solutions, especially when domains outside of EU jurisdiction are considered.

Objective:

Please refer to the "Specific Challenges and Objectives" section for Stream B in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.

Scope:

The focus of this Stream is on several complementary issues mentioned below and applicants may select one or more of these issues.

  • Service deployment for complex services: In-network / edge computing has evolved into a standard component of network architecture. However, it is geared mostly to "conventional" workloads: services running on behalf of individual users, with ordinary resource needs (e.g., web servers or network functions). The scope extends these capabilities towards truly flexible, resilient and versatile in-network computing, including: i) a broader range of deployable artefacts (e.g., Web Assemblies); ii) workloads that pertain to an entire user population (shared services like games, or even services for huge populations like joint video streaming for many watchers); iii) workloads with new characteristics (like bursty in-network training for ML models; iv) End-to-End Security Policies composition in distributed dynamic scenarios; v) data authenticity and trusted digital interactions in dynamically composed service environments. Challenges here pertain to the entire lifecycle from development, deployment, operation and decommitment, for a diversity of dynamic user populations, including explicit support for in-network computation with advanced patterns (e.g., ML training workloads, workloads coming from user populations not just individual users, additional types of deployment units).
  • Cooperative holistic E2E security for 6G architectures. Developing security architectures for providing E2E security guarantees across the heterogeneity and dynamicity of technologies envisaged in 6G is a major challenge. This topic should be able to address multi-layer, multi-provider protocols and interfaces for E2E adaptive security delivery (inter-orchestrator agent-based distributed convergence) ensuring multi-tenancy (e.g., verticals) remediation strategies with regard to business objectives (although vertical specifics); multi-layers/stakeholders authorities (including compute/network/security service providers); and include cooperative and adaptative (AI-based) attack detection (attacks known/zero days-anomalies). The solutions should be able to handle a diversity of 6G scenarios (cell, cell-less, 3D/NTN, private, public environments), and should cover realistic E2E security for Cyber Physical scenarios, with termination points of the system being sensing. Ultimately the work can delve on the challenges of roots for an EU wide, private/public CTI (Cyber Threat Intelligence) dedicated to 6G systems.
  • Zero-touch integrated security deployment: The dynamics of the 6G system require autonomic and multi-agent approaches to security deployment, similar to the challenges of service deployment, in an environment with multiple control loops. Techniques should be able to address adaptive protection, detection and response, and reasoning techniques based on digital twins or AI are promising for candidates to consider.
  • Exploitation of (distributed) AI/ML for 6G Infrastructures, targeting net-zero scenarios: This topic covers security and service deployment scenarios. The objective is the development of techniques, protocols of novel architectures for the integration of AI/ML in scenarios to multiple applications in terms of security and service processes, including aspects as securing physical layers (e.g. anti-jamming), provide adaptive response to incidents, define service and security function placement (protection and detection), and for the intrinsic resilience of the AI process (e.g. data poisoning in control/management), improving AI security. It can address societal concerns such as potential biased usage of AI and includes both the threats directly applicable to user data traffic, and their control and management. Another major concern inside this challenge is to promote the utilisation of renewable energy resources (deployed and distributed all over the network) for the learning process, able to provide an efficient greenness-accuracy trade-off, preserve privacy, and scale to large networks.
  • Developments on service technologies for secure time-sensitive and computation intensive applications. The challenges posed by virtualised environments require a new set of technologies to support stringent requirements. The topic aims to develop techniques able to: i) assure time guarantees for containers or similar virtualisation technologies; ii) time aware orchestration frameworks; iii) provide secure isolation techniques for dynamic instantiations; iv) abstraction mechanisms for the network compute fabric to support function delegation in low power scenarios.
  • Physical layer security: Physical layer security technologies, including ML based techniques to combat the increased number of potential threats (e.g., rogue terminal/network identification, eavesdropping detection) and cyberattacks to secure both users and networks, and considering the new attack surfaces brought in by new hardware and software architectures (e.g., massive MIMO, RIS).

Human Centric methods that give the control to the user to guarantee privacy and confidentiality, for both service development and service execution. It addresses service and business enablement with security attributes exposure and security awareness through security SLA, auditable per stakeholders and users. Methods for quantification of security to make the users aware of the systems and services used and associated risks is in scope, including certification proposals to raise user awareness.

Eligibility & Conditions

General conditions

General conditions

This topic deviates from the general conditions and includes additional conditions, which are explicitly stated in the Appendix 1 of the SNS R&I Work Programme 2023-2024 ‘Additional Conditions of the SNS 2023 Call’

1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes

Proposal page limits and layout: described in Part B of the Application Form available in the Submission System

The page limit for a full application is 100 pages for RIAs and IAs.

2. Eligible countries: described in Annex B of the Work Programme General Annexes

A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide.

3. Other eligibility conditions: described in Annex B of the Work Programme General Annexes

4. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes

  • Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes

    Part D of the General Annexes to the Horizon Europe Work Programme 2023-2024 shall apply mutatis mutandis to this topic with the following complements:

    The award criteria table is complemented as follows:

    §  Introduction in the impact section of a sub criterion assessing the proposal contribution to the reinforcement of an EU supply side in the context of sovereignty;

    §  Introduction in the impact section of a sub criterion assessing the proposal contribution to the overall SME objective as appropriate;

    §  Introduction in the impact section of a sub criterion assessing the proposal contribution to the IKOP objectives;

  • Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual

    Annex F of the WP General Annexes shall apply mutatis mutandis to the SNS call 2023 covered by this Work Programme with the following amendment related to the procedure to rank proposal with equal scores:

    §  When two RIA proposals are equally ranked and that it has not been possible to separate them using first the coverage criterion, second the excellence criterion, and third the generic Impact criterion (i.e. after step 2 of the procedure outlined in part F of the General Annex), the level of SME participation will be taken as the next criterion to sort out the ties and if still unconclusive, the level of IKOP will be considered as appropriate. If still inconclusive, the procedure outlined in part F of the General Annex will be resumed from step 3 onwards. 

  • Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes

6. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes

 Funding rates

Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.

Specific conditions

7. Specific conditions: described in the specific topic of the Work Programme, and in Appendix 1 to the WP: Additional Conditions of the SNS 2023 Call.

 Project collaboration.

The project contracted under this call will be expected to enter into a collaboration agreement to collectively work on topics of mutual interests. To that end, they will be subject to contractual clauses outlined in article 7 of the Model Grant Agreement.
 

For more call-specific questions, please check the FAQ section

 

 
 

Support & Resources

JU SNS FAQ - find the answers to most frequently asked questions on the JU SNS call. 

Online Manual is your guide on the procedures from proposal submission to managing your grant.

Horizon Europe Programme Guide contains the detailed guidance to the structure, budget and political priorities of Horizon Europe.

Funding & Tenders Portal FAQ – find the answers to most frequently asked questions on submission of proposals, evaluation and grant management.

Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.

National Contact Points (NCPs) – get guidance, practical information and assistance on participation in Horizon Europe. There are also NCPs in many non-EU and non-associated countries (‘third-countries’).

Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.

IT Helpdesk – contact the Funding & Tenders Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.

European IPR Helpdesk assists you on intellectual property issues.

CEN-CENELEC Research Helpdesk and ETSI Research Helpdesk – the European Standards Organisations advise you how to tackle standardisation in your project proposal.  

The European Charter for Researchers and the Code of Conduct for their recruitment – consult the general principles and requirements specifying the roles, responsibilities and entitlements of researchers, employers and funders of researchers.

Partner Search Services help you find a partner organisation for your proposal.

 

Latest Updates

Last Changed: July 31, 2023

 

EVALUATION results (corrigendum):

Published: 15/12/2022

Deadline: 25/04/2023

Available budget: EUR 132 million

The results of the evaluation are as follows:

Number of proposals submitted (including proposals transferred from or to other calls): 112

Number of inadmissible proposals: 0

Number of ineligible proposals: 0

Number of above-threshold proposals: 91

Total budget requested for above-threshold proposals: EUR 422,251,119.57 

We recently informed the applicants about the evaluation results for their proposals.

For questions, please contact the Research Enquiry Service.

 

Last Changed: July 31, 2023

EVALUATION results

Published: 15/12/2022

Deadline: 25/04/2023

Available budget: EUR 49 000 000

The results of the evaluation are as follows:

Number of proposals submitted (including proposals transferred from or to other calls): 112

Number of inadmissible proposals: 0

Number of ineligible proposals: 0

Number of above-threshold proposals: 91

Total budget requested for above-threshold proposals: 422,251,119.57 €

We recently informed the applicants about the evaluation results for their proposals.

For questions, please contact the Research Enquiry Service.

Last Changed: April 26, 2023

PROPOSAL NUMBERS

Call HORIZON-JU-SNS-2023 has closed on the 25 April 2023 at 17.00.00.

112 proposals have been submitted.

The breakdown per topic is:

  • HORIZON-JU-SNS-2023-STREAM-B-01-01: 34 proposals
  • HORIZON-JU-SNS-2023-STREAM-B-01-02: 26 proposals
  • HORIZON-JU-SNS-2023-STREAM-B-01-03: 17 proposals
  • HORIZON-JU-SNS-2023-STREAM-B-01-04: 13 proposals
  • HORIZON-JU-SNS-2023-STREAM-B-01-05: 6 proposals
  • HORIZON-JU-SNS-2023-STREAM-B-01-06: 4 proposals
  • HORIZON-JU-SNS-2023-STREAM-C-01-01: 4 proposals
  • HORIZON-JU-SNS-2023-STREAM-CSA-01: 1 proposal
  • HORIZON-JU-SNS-2023-STREAM-D-01-01: 7 proposals. 

Evaluation results are expected to be communicated in July 2023. 

Last Changed: March 21, 2023

Following the Council Implementing Decision (EU) 2022/2506, as of 16th December 2022, no legal commitments (including the grant agreement itself as well as subcontracts, purchase contracts, financial support to third parties etc.) can be signed with Hungarian public interest trusts established under Hungarian Act IX of 2021 or any entity they maintain.

Affected entities may continue to apply to calls for proposals. However, in case the Council measures are not lifted, such entities are not eligible to participate in any funded role (beneficiaries, affiliated entities, subcontractors, recipients of financial support to third parties). In this case, co-applicants will be invited to remove or replace that entity /or to change its status into associated partner. Tasks and budget may be redistributed accordingly.

Last Changed: January 17, 2023

Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.

Last Changed: January 17, 2023
The submission session is now available for: HORIZON-JU-SNS-2023-STREAM-B-01-03(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-B-01-05(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-B-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-D-01-01(HORIZON-JU-IA), HORIZON-JU-SNS-2023-STREAM-B-01-02(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-B-01-04(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-B-01-06(HORIZON-JU-RIA), HORIZON-JU-SNS-2023-STREAM-CSA-01(HORIZON-JU-CSA), HORIZON-JU-SNS-2023-STREAM-C-01-01(HORIZON-JU-RIA)
Reliable Services and Smart Security | Grantalist