HORIZON-JU-SNS-2024-STREAM-B-01-04

Reliable Services and Smart Security–Standardisation and Follow-up/PoCs -

Call text (as on F&T portal)

View on F&T portal
Expected Outcome:

The target outcomes address consolidation of results on:

  • AI technology applied to security and service deployment in different aspects: i) secure and verifiable application of AI to enhanced service deployment in 6G; ii) consideration of potential security threats using AI; (trusted by people, systems and processes) AI for securing 6G control and management planes; to efficiently improve the security of distributed architectures and complex use environments.
  • Beyond perimetric security strategies and disruptive security and reliability scenarios, including energy efficiency aspects. Holistic distribution of security in all its phases (protection, detection, response), with a particular focus on differentiated security architectures and cooperative security across domains, layers and stakeholders.
  • Availability accessibility, and affordability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act) across a complete service continuum, supporting complex human centric multimodal communications, including entangled devices.
  • Availability accessibility, and affordability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform for the complete life cycle of services, accessed by multi-stakeholders and tenants including vertical industries as users, for increasingly dynamic scenarios considering interdependencies between components and cascade effects that may be produced separately Zero-touch security deployment solutions for virtualized and distributed environments, taking into account the varying computational capabilities and security requirements of their building blocks and their interactions with third-party entities.
  • Quantum key distribution and post-quantum cryptography support ensuring long term security for 6G networks.
  • Efficient run-time service development methodologies able to operate across multiple stakeholders in an efficient way, to provide complex, multi-technology, dynamic services.
  • Service technologies for time-sensitive and computationally intensive applications, able to optimize deployment considering aspects as energy consumption, reliability and security levels.
  • Algorithms, software and hardware implementations where appropriate, which can be used for PoC and later trials systems Dissemination of solutions for international consensus building, which can be exploited in standardisation activities.
  • Contributions to international standardisation.
Objective:

Please refer to the "Specific Challenges and Objectives" section for Stream B in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.

Scope:

The focus of this Strand is on several complementary issues mentioned below and applicants may select one or more of these issues.

  • Exploitation of (distributed) trusted AI/ML for 6G infrastructures. The topic deals with frameworks that will provide security for the whole AI life to assure for models and behaviours predictability, including the AI development and deployment environments, AI models vulnerability quantification, understandable AI considerations and protection measures on AI misuse.
  • Cooperative holistic E2E security and privacy solutions for 6G architectures, including, but not limited to, zero trust frameworks. Human-centric security and privacy solutions should be incorporated in these E2E architectures. The whole sequence of security phases should be considered from identification of threats, protection, detection, response towards recovery. Recovery will contribute to the resilience of Digital infrastructure and services. Secure host-neutral infrastructure where multiple infrastructure providers are involved is also in scope.
  • Smart and trustworthy service frameworks, aiming at creating a comprehensive service marketplace with secure lifecycle management, ensuring continuous security assessment. 6G network security must be continuously assessed for end-to-end provable security. Various methodologies, such as security composition, differential deployment, and incremental evolution, are considered. Service frameworks encompass software aspects such as secure deployment and up-dates. These technologies should support collaboration among stakeholders, interoperation with different service run-time systems, and provide abstractions of security levels allowing integration and end-to-end composition.
  • Efficient security and privacy enablers. This includes enablers for technologies as multi‐level Security; security segregation and spatial fragmentation; flexible profiling of 6G resources; privacy enhancing technologies; security and privacy quantification with relevant evaluation methodologies and means; Multi-stakeholder Moving Target Defence evolutions; fast and proactive security recovery techniques.
  • Zero-touch integrated security deployment, considering virtualized environments and highly distributed infrastructures. In scope are: i) the design and implementation of ciphers that can adapt to varying computational resources, with overall security levels being efficiently achieved adequately including limitations from resource-constrained devices and environments; ii) mechanisms, potentially using AI, to isolate and harden third party Apps; iii) and mechanisms to limit the attack surface resulting from exposing network capabilities to external applications; iv) techniques to improve the reliability of disaggregated architectures implemented by multiple building blocks.
  • Integration of secured 6G communications via Quantum key distribution and post-quantum cryptography support deals with ensuring long-term security for 6G networks in end-to-end network infrastructure, particularly considering 6G requirements. This includes the coexistence with optical communication networks, facing the related challenges, the design and evaluation of techniques to combat impairments of the quantum channel, as well as 6G security procedures for quantum secure protocols enhancement (e.g., in terms of secure key rate). In scope are also flexible and efficient quantum-safe solutions, which can be programmable by software, facilitating the applicability of QKD and an optimal resource usage, strengthening the security of 6G networks. The topic also addresses new software-defined networking architectures and functional requirements for classical channel and key joint management.
  • Timing sensitive, and time responsive software and related hardware technologies for distributed, multi-stakeholder multi-system service provision. These technologies should intelligently incorporate different technologies across different service providers, dynamically managing service execution realisation across arbitrary levels of horizontal and vertical interoperability, and performing optimal adaptation to the physical constraints. On scope are also interfaces for customer or user-centric policies, and distributed computing technologies, able to implement operational realisations by establishing consensus according to different priorities (e.g., cost, reliability, code footprint), and trading off service cost in this runtime process.

The scope includes, where relevant, harmonisation/coordination with Member States or Associated countries 6G initiatives. Any produced PoCs should be implemented in a way that their integration in SNS WP2025-26 Stream C and/or Stream D project will be possible (e.g., open-source solutions, appropriate documentation, support after the completion of the project etc.).

News flashes

2024-04-19

PROPOSAL NUMBERS

Call HORIZON-JU-SNS-2024 has closed on the 18 April 2024 at 17.00.00

109 proposals have been submitted.

The breakdown per topic is:

  • HORIZON-JU-SNS-2024-STREAM-B-01-01: 26 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-02: 26 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-03: 15 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-04: 15 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-05: 3 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-06: 1 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-07: 2 proposals
  • HORIZON-JU-SNS-2024-STREAM-B-01-08: 8 proposals
  • HORIZON-JU-SNS-2024-STREAM-C-01-01: 2 proposals
  • HORIZON-JU-SNS-2024-STREAM-CSA-01: 1 proposals
  • HORIZON-JU-SNS-2024-STREAM-D-01-01: 10 proposals

Evaluation results are expected to be communicated in July 2024

2024-01-16
The submission session is now available for: HORIZON-JU-SNS-2024-STREAM-D-01-01(HORIZON-JU-IA), HORIZON-JU-SNS-2024-STREAM-B-01-08(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-03(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-06(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-C-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-07(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-CSA-01(HORIZON-JU-CSA), HORIZON-JU-SNS-2024-STREAM-B-01-05(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-04(HORIZON-JU-RIA), HORIZON-JU-SNS-2024-STREAM-B-01-02(HORIZON-JU-RIA)
2023-12-08

Please note that the funding rates in this topic are:100% for non-for-profit organizationsand90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask allfor-profit organizationsto make a manual calculation andrequest only 90% of the budget.

call topic details
Call status: Closed
Publication date: 2023-12-04 (1 year ago)
Opening date: 2024-01-16 (1 year ago)
Closing date: 2024-04-18 (1 year ago)
Procedure: single-stage

Budget: 16000000
Expected grants: 2
Contribution: 8000000 - 8000000
News flashes

This call topic has been appended 3 times by the EC with news.

  • 2024-04-19
    proposal numberscall horizon-ju-sns-2024...
  • 2024-01-16
    the submission session is now available...
  • 2023-12-08
    please note that the funding rates in th...
Source information

Showing the latest information. Found 3 versions of this call topic in the F&T portal.

Information from

  • 2024-11-23_03-30-19
  • 2024-07-04_15-01-30
  • 2024-03-30_14-18-15

Check the differences between the versions.