Reliable Services and Smart Security–Standardisation and Follow-up/PoCs
HORIZON JU Research and Innovation Actions
Basic Information
- Identifier
- HORIZON-JU-SNS-2024-STREAM-B-01-04
- Programme
- HORIZON-JU-SNS-2024
- Programme Period
- 2021 - 2027
- Status
- Closed (31094503)
- Opening Date
- January 16, 2024
- Deadline
- April 18, 2024
- Deadline Model
- single-stage
- Budget
- €10,000,000
- Min Grant Amount
- €10,000,000
- Max Grant Amount
- €10,000,000
- Expected Number of Grants
- 1
- Keywords
- HORIZON-JU-SNS-2024-STREAM-B-01-04HORIZON-JU-SNS-2024Communication engineering and systems telecommunications
Description
The target outcomes address consolidation of results on:
- AI technology applied to security and service deployment in different aspects: i) secure and verifiable application of AI to enhanced service deployment in 6G; ii) consideration of potential security threats using AI; (trusted by people, systems and processes) AI for securing 6G control and management planes; to efficiently improve the security of distributed architectures and complex use environments.
- Beyond perimetric security strategies and disruptive security and reliability scenarios, including energy efficiency aspects. Holistic distribution of security in all its phases (protection, detection, response), with a particular focus on differentiated security architectures and cooperative security across domains, layers and stakeholders.
- Availability accessibility, and affordability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act) across a complete service continuum, supporting complex human centric multimodal communications, including entangled devices.
- Availability accessibility, and affordability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform for the complete life cycle of services, accessed by multi-stakeholders and tenants including vertical industries as users, for increasingly dynamic scenarios considering interdependencies between components and cascade effects that may be produced separately Zero-touch security deployment solutions for virtualized and distributed environments, taking into account the varying computational capabilities and security requirements of their building blocks and their interactions with third-party entities.
- Quantum key distribution and post-quantum cryptography support ensuring long term security for 6G networks.
- Efficient run-time service development methodologies able to operate across multiple stakeholders in an efficient way, to provide complex, multi-technology, dynamic services.
- Service technologies for time-sensitive and computationally intensive applications, able to optimize deployment considering aspects as energy consumption, reliability and security levels.
- Algorithms, software and hardware implementations where appropriate, which can be used for PoC and later trials systems Dissemination of solutions for international consensus building, which can be exploited in standardisation activities.
- Contributions to international standardisation.
Please refer to the "Specific Challenges and Objectives" section for Stream B in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.
Scope:The focus of this Strand is on several complementary issues mentioned below and applicants may select one or more of these issues.
- Exploitation of (distributed) trusted AI/ML for 6G infrastructures. The topic deals with frameworks that will provide security for the whole AI life to assure for models and behaviours predictability, including the AI development and deployment environments, AI models vulnerability quantification, understandable AI considerations and protection measures on AI misuse.
- Cooperative holistic E2E security and privacy solutions for 6G architectures, including, but not limited to, zero trust frameworks. Human-centric security and privacy solutions should be incorporated in these E2E architectures. The whole sequence of security phases should be considered from identification of threats, protection, detection, response towards recovery. Recovery will contribute to the resilience of Digital infrastructure and services. Secure host-neutral infrastructure where multiple infrastructure providers are involved is also in scope.
- Smart and trustworthy service frameworks, aiming at creating a comprehensive service marketplace with secure lifecycle management, ensuring continuous security assessment. 6G network security must be continuously assessed for end-to-end provable security. Various methodologies, such as security composition, differential deployment, and incremental evolution, are considered. Service frameworks encompass software aspects such as secure deployment and up-dates. These technologies should support collaboration among stakeholders, interoperation with different service run-time systems, and provide abstractions of security levels allowing integration and end-to-end composition.
- Efficient security and privacy enablers. This includes enablers for technologies as multi‐level Security; security segregation and spatial fragmentation; flexible profiling of 6G resources; privacy enhancing technologies; security and privacy quantification with relevant evaluation methodologies and means; Multi-stakeholder Moving Target Defence evolutions; fast and proactive security recovery techniques.
- Zero-touch integrated security deployment, considering virtualized environments and highly distributed infrastructures. In scope are: i) the design and implementation of ciphers that can adapt to varying computational resources, with overall security levels being efficiently achieved adequately including limitations from resource-constrained devices and environments; ii) mechanisms, potentially using AI, to isolate and harden third party Apps; iii) and mechanisms to limit the attack surface resulting from exposing network capabilities to external applications; iv) techniques to improve the reliability of disaggregated architectures implemented by multiple building blocks.
- Integration of secured 6G communications via Quantum key distribution and post-quantum cryptography support deals with ensuring long-term security for 6G networks in end-to-end network infrastructure, particularly considering 6G requirements. This includes the coexistence with optical communication networks, facing the related challenges, the design and evaluation of techniques to combat impairments of the quantum channel, as well as 6G security procedures for quantum secure protocols enhancement (e.g., in terms of secure key rate). In scope are also flexible and efficient quantum-safe solutions, which can be programmable by software, facilitating the applicability of QKD and an optimal resource usage, strengthening the security of 6G networks. The topic also addresses new software-defined networking architectures and functional requirements for classical channel and key joint management.
- Timing sensitive, and time responsive software and related hardware technologies for distributed, multi-stakeholder multi-system service provision. These technologies should intelligently incorporate different technologies across different service providers, dynamically managing service execution realisation across arbitrary levels of horizontal and vertical interoperability, and performing optimal adaptation to the physical constraints. On scope are also interfaces for customer or user-centric policies, and distributed computing technologies, able to implement operational realisations by establishing consensus according to different priorities (e.g., cost, reliability, code footprint), and trading off service cost in this runtime process.
The scope includes, where relevant, harmonisation/coordination with Member States or Associated countries 6G initiatives. Any produced PoCs should be implemented in a way that their integration in SNS WP2025-26 Stream C and/or Stream D project will be possible (e.g., open-source solutions, appropriate documentation, support after the completion of the project etc.).
Eligibility & Conditions
General conditions
General conditions
This topic deviates from the general conditions and includes additional conditions, which are explicitly stated in the Appendix 1 of the SNS R&I Work Programme 2024 ‘Additional Conditions of the SNS 2024 Call’.
1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
The page limit for a full application is 100 pages for RIAs and IAs.
2. Eligible countries: described in Annex B of the Work Programme General Annexes
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide.
3. Other eligibility conditions: described in Annex B of the Work Programme General Annexes
4. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes
-
Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes
Part D of the General Annexes to the Horizon Europe Work Programme 2023-2024 shall apply mutatis mutandis to the SNS call 2024 covered by this Work Programme with the following complements:
The award criteria table is complemented as follows:
- Introduction in the impact section of a sub criterion assessing the proposal contribution to the reinforcement of an EU added value, with particular attention to EU economic security objectives as well as economic security risks and the role of certain suppliers, as mentioned in the Commission Communication C(2023) 4049, in R&I activities. For the assessment of this sub criterion, the mandatory security declaration annexed to the proposal (see Appendix A, section 1.9 ii)) will also be taken into consideration. If this sub criterion is not addressed in a sufficiently effective way, this shall be considered as a significant weakness.
- Introduction in the impact section of a sub-criterion assessing the proposal contribution to the overall SME objective as appropriate;
- Introduction in the impact section of a sub-criterion assessing the proposal contribution to the IKOP objectives;
-
Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual
Part F of the General Annexes to the Horizon Europe Work Programme 2023-2024 shall apply mutatis mutandis to the SNS call 2024 covered by this Work Programme with the following amendment related to the procedure to rank proposal with equal scores, used to establish the priority order:
- When two RIA proposals are equally ranked and that it has not been possible to separate them using first the coverage criterion, second the excellence criterion, and third the generic Impact criterion (i.e., after step 2 of the procedure outlined in part F of the General Annex), the level of SME participation will be taken as the next criterion to sort out the ties and if still un-conclusive, the level of IKOP will be considered as appropriate. If still inconclusive, the procedure outlined in part F of the General Annex will be resumed from step 3 onwards.
-
Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes
6. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes
Funding rates
Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.
Specific conditions
7. Specific conditions: described in the specific topic of the Work Programme, and in Appendix 1 to the WP: Additional Conditions of the SNS 2024 Call.
For more call-specific questions, please check the FAQ section.
Project collaboration
As part of the call conditions, participants of selected projects will be requested to cooperate in the SNS Programme for topics of common interests by signing the collaboration agreement referred in the specific provisions of the Model Grant Agreement (MGA).
Security provisions applicable to Streams B, C and D
In order to meet the security requirements specified under the above section Context and Objectives (Cybersecurity and Economic Security), all proposals submitted in Streams B, C and D, shall have to include security declarations, which demonstrate that the economic security risks (e.g. technology leakage and supply chain risks) have been identified and addressed and that the management of project results, technologies and equipment (including software and services) in the proposed project comply with relevant security requirements. In addition, they should indicate that required documents, information and results produced within the proposed project will be duly protected and not lead to exposure of sensitive information in the cybersecurity or economic security context to entities not established in Member States or countries associated to Horizon Europe, or entities controlled from third countries. Particular attention should be paid to mitigating the higher risks associated with certain network suppliers as mentioned in Commission Communication C(2023) 4049. As part of the security declaration the proposal shall contain information that: (a) Demonstrates that any economic security risks including: 1. resilience of supply chains; 2. physical and cyber security of critical infrastructure; 3. technology security and technology leakage; and 4. weaponisation of economic dependencies or economic coercion, are taken into account and are properly addressed. (b) Demonstrates that the infrastructure deployed within the proposed project shall remain, during the action and after its completion, within the beneficiary/beneficiaries and shall not be subject to control or restrictions by entities not established in Member States or countries associated to Horizon Europe, or entities controlled from third countries. (c) Demonstrates that for any equipment to be deployed for the implementation of the proposed project and/or used for the management and operation of the resulting digital connectivity infrastructure, the required documents and information will be duly protected and not exposed to entities not established in Member States or countries associated to Horizon Europe, or entities controlled from third countries. Special care should be taken to satisfy the Commission Communication C(2023) 4049 requirements in relation to higher risks associated with certain network suppliers. Based on this security declaration by the applicant, as well as the evaluation carried out by independent experts, the funding body may require security measures to be implemented in the project and/or carry out a security scrutiny focusing on the exchange of project information, documents and results considered as security-sensitive information among project partners
Documents
Call documents:
A call-specific application form will be used in this topic — call-specific application form will be available in the Submission System
Standard evaluation form — will be used with the necessary adaptations
Standard evaluation form (HE RIA, IA)
MGA
Additional documents:
HE Main Work Programme 2023–2024 – 1. General Introduction
HE Main Work Programme 2023–2024 – 13. General Annexes
HE Framework Programme and Rules for Participation Regulation 2021/695
HE Specific Programme Decision 2021/764
Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment
EU Grants AGA — Annotated Model Grant Agreement
Funding & Tenders Portal Online Manual
Support & Resources
|
JU SNS FAQ - find the answers to most frequently asked questions on the JU SNS call. SNS Brokerage Platform- we are offering an online Brokerage service where you can present you profile and interests and/or present your project Ideas for potential participants to see. |
Online Manual is your guide on the procedures from proposal submission to managing your grant.
Horizon Europe Programme Guide contains the detailed guidance to the structure, budget and political priorities of Horizon Europe.
Funding & Tenders Portal FAQ – find the answers to most frequently asked questions on submission of proposals, evaluation and grant management.
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
National Contact Points (NCPs) – get guidance, practical information and assistance on participation in Horizon Europe. There are also NCPs in many non-EU and non-associated countries (‘third-countries’).
Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
IT Helpdesk – contact the Funding & Tenders Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
European IPR Helpdesk assists you on intellectual property issues.
CEN-CENELEC Research Helpdesk and ETSI Research Helpdesk – the European Standards Organisations advise you how to tackle standardisation in your project proposal.
The European Charter for Researchers and the Code of Conduct for their recruitment – consult the general principles and requirements specifying the roles, responsibilities and entitlements of researchers, employers and funders of researchers.
Partner Search Services help you find a partner organisation for your proposal.
Latest Updates
PROPOSAL NUMBERS
Call HORIZON-JU-SNS-2024 has closed on the 18 April 2024 at 17.00.00
109 proposals have been submitted.
The breakdown per topic is:
- HORIZON-JU-SNS-2024-STREAM-B-01-01: 26 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-02: 26 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-03: 15 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-04: 15 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-05: 3 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-06: 1 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-07: 2 proposals
- HORIZON-JU-SNS-2024-STREAM-B-01-08: 8 proposals
- HORIZON-JU-SNS-2024-STREAM-C-01-01: 2 proposals
- HORIZON-JU-SNS-2024-STREAM-CSA-01: 1 proposals
- HORIZON-JU-SNS-2024-STREAM-D-01-01: 10 proposals
Evaluation results are expected to be communicated in July 2024
Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.