Innovating Works

H2020

Cerrada
HORIZON-JU-SNS-2024-STREA...
HORIZON-JU-SNS-2024-STREAM-B-01-04: Reliable Services and Smart Security–Standardisation and Follow-up/PoCs
ExpectedOutcome:The target outcomes address consolidation of results on:
Sólo fondo perdido 16M €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 18-04-2024.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Hace 8 mes(es) del cierre de la convocatoria y aún no tenemos información sobre los proyectos financiados, puede que esta información se publique pronto.
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:The target outcomes address consolidation of results on:

AI technology applied to security and service deployment in different aspects: i) secure and verifiable application of AI to enhanced service deployment in 6G; ii) consideration of potential security threats using AI; (trusted by people, systems and processes) AI for securing 6G control and management planes; to efficiently improve the security of distributed architectures and complex use environments.Beyond perimetric security strategies and disruptive security and reliability scenarios, including energy efficiency aspects. Holistic distribution of security in all its phases (protection, detection, response), with a particular focus on differentiated security architectures and cooperative security across domains, layers and stakeholders.Availability accessibility, and affordability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act) across a complete service continuum, supporting complex human centric multimodal communications, including entangled devices.A... ver más

ExpectedOutcome:The target outcomes address consolidation of results on:

AI technology applied to security and service deployment in different aspects: i) secure and verifiable application of AI to enhanced service deployment in 6G; ii) consideration of potential security threats using AI; (trusted by people, systems and processes) AI for securing 6G control and management planes; to efficiently improve the security of distributed architectures and complex use environments.Beyond perimetric security strategies and disruptive security and reliability scenarios, including energy efficiency aspects. Holistic distribution of security in all its phases (protection, detection, response), with a particular focus on differentiated security architectures and cooperative security across domains, layers and stakeholders.Availability accessibility, and affordability of technologies supporting the necessary levels of trustworthiness, resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR and Cyber Security Act) across a complete service continuum, supporting complex human centric multimodal communications, including entangled devices.Availability accessibility, and affordability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform for the complete life cycle of services, accessed by multi-stakeholders and tenants including vertical industries as users, for increasingly dynamic scenarios considering interdependencies between components and cascade effects that may be produced separately Zero-touch security deployment solutions for virtualized and distributed environments, taking into account the varying computational capabilities and security requirements of their building blocks and their interactions with third-party entities.Quantum key distribution and post-quantum cryptography support ensuring long term security for 6G networks.Efficient run-time service development methodologies able to operate across multiple stakeholders in an efficient way, to provide complex, multi-technology, dynamic services.Service technologies for time-sensitive and computationally intensive applications, able to optimize deployment considering aspects as energy consumption, reliability and security levels.Algorithms, software and hardware implementations where appropriate, which can be used for PoC and later trials systems Dissemination of solutions for international consensus building, which can be exploited in standardisation activities.Contributions to international standardisation.
Objective:Please refer to the "Specific Challenges and Objectives" section for Stream B in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.


Scope:The focus of this Strand is on several complementary issues mentioned below and applicants may select one or more of these issues.

Exploitation of (distributed) trusted AI/ML for 6G infrastructures. The topic deals with frameworks that will provide security for the whole AI life to assure for models and behaviours predictability, including the AI development and deployment environments, AI models vulnerability quantification, understandable AI considerations and protection measures on AI misuse.Cooperative holistic E2E security and privacy solutions for 6G architectures, including, but not limited to, zero trust frameworks. Human-centric security and privacy solutions should be incorporated in these E2E architectures. The whole sequence of security phases should be considered from identification of threats, protection, detection, response towards recovery. Recovery will contribute to the resilience of Digital infrastructure and services. Secure host-neutral infrastructure where multiple infrastructure providers are involved is also in scope.Smart and trustworthy service frameworks, aiming at creating a comprehensive service marketplace with secure lifecycle management, ensuring continuous security assessment. 6G network security must be continuously assessed for end-to-end provable security. Various methodologies, such as security composition, differential deployment, and incremental evolution, are considered. Service frameworks encompass software aspects such as secure deployment and up-dates. These technologies should support collaboration among stakeholders, interoperation with different service run-time systems, and provide abstractions of security levels allowing integration and end-to-end composition.Efficient security and privacy enablers. This includes enablers for technologies as multi‐level Security; security segregation and spatial fragmentation; flexible profiling of 6G resources; privacy enhancing technologies; security and privacy quantification with relevant evaluation methodologies and means; Multi-stakeholder Moving Target Defence evolutions; fast and proactive security recovery techniques.Zero-touch integrated security deployment, considering virtualized environments and highly distributed infrastructures. In scope are: i) the design and implementation of ciphers that can adapt to varying computational resources, with overall security levels being efficiently achieved adequately including limitations from resource-constrained devices and environments; ii) mechanisms, potentially using AI, to isolate and harden third party Apps; iii) and mechanisms to limit the attack surface resulting from exposing network capabilities to external applications; iv) techniques to improve the reliability of disaggregated architectures implemented by multiple building blocks.Integration of secured 6G communications via Quantum key distribution and post-quantum cryptography support deals with ensuring long-term security for 6G networks in end-to-end network infrastructure, particularly considering 6G requirements. This includes the coexistence with optical communication networks, facing the related challenges, the design and evaluation of techniques to combat impairments of the quantum channel, as well as 6G security procedures for quantum secure protocols enhancement (e.g., in terms of secure key rate). In scope are also flexible and efficient quantum-safe solutions, which can be programmable by software, facilitating the applicability of QKD and an optimal resource usage, strengthening the security of 6G networks. The topic also addresses new software-defined networking architectures and functional requirements for classical channel and key joint management.Timing sensitive, and time responsive software and related hardware technologies for distributed, multi-stakeholder multi-system service provision. These technologies should intelligently incorporate different technologies across different service providers, dynamically managing service execution realisation across arbitrary levels of horizontal and vertical interoperability, and performing optimal adaptation to the physical constraints. On scope are also interfaces for customer or user-centric policies, and distributed computing technologies, able to implement operational realisations by establishing consensus according to different priorities (e.g., cost, reliability, code footprint), and trading off service cost in this runtime process. The scope includes, where relevant, harmonisation/coordination with Member States or Associated countries 6G initiatives. Any produced PoCs should be implemented in a way that their integration in SNS WP2025-26 Stream C and/or Stream D project will be possible (e.g., open-source solutions, appropriate documentation, support after the completion of the project etc.).


ver menos

Temáticas Obligatorias del proyecto: Temática principal: ExpectedOutcome:The target outcomes address consolidation of results on:
Communication Engineering Telecommunications Systems

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: *Presupuesto para cada participante en el proyecto
Requisitos técnicos: ExpectedOutcome:The target outcomes address consolidation of results on: ExpectedOutcome:The target outcomes address consolidation of results on:
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Subcontracting costs.
Purchase costs.
Other cost categories.
Indirect costs.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 4:. Es el primer paso para determinar si los componentes individuales funcionarán juntos como un sistema en un entorno de laboratorio. Es un sistema de baja fidelidad para demostrar la funcionalidad básica y se definen las predicciones de rendimiento asociadas en relación con el entorno operativo final. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar como minimo un 100%.
The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations. The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
El presupuesto total de la convocatoria asciende a
Presupuesto total de la convocatoria.
Proyectos financiables en esta convocatoria.
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.
Certificado DNSH: Los proyectos presentados a esta línea deben de certificarse para demostrar que no causan perjuicio al medio ambiente. + info

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
Deducción I+D+i:
0% 25% 50% 75% 100%
La empresa puede aplicar deducciones fiscales en I+D+i de los gastos del proyecto y reducir su impuesto de sociedades. + info
HORIZON-JU-SNS-2024 Reliable Services and Smart Security–Standardisation and Follow-up/PoCs ExpectedOutcome:The target outcomes address consolidation of results on: AI technology applied to security and service deployment in differ...
Sin info.
HORIZON-JU-SNS-2024-STREAM-B-01-06 International Collaboration – EU-ROK
en consorcio: ExpectedOutcome:This SNS International Cooperation activity targets the Republic of Korea (ROK). It builds on the interactions developed bet...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-05 International Collaboration – EU-JP
en consorcio: ExpectedOutcome:EU-Japan research collaboration for the evolution of Radio Access Networks (RAN), evolving following 6G standardization orie...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-03 Communication Infrastructure Technologies and Devices – Standardisation and Follow-up/PoCs
en consorcio: ExpectedOutcome:The target outcomes address: Advanced solutions and technologies for optical, terrestrial and non-terrestrial networks incl...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-02 Wireless Communication Technologies and Signal Processing – Standardisation and Follow-up/PoCs
en consorcio: ExpectedOutcome:The target outcomes address: Methods for an efficient effective, affordable, and accessible use of frequency spectrum for j...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-04 Reliable Services and Smart Security–Standardisation and Follow-up/PoCs
en consorcio: ExpectedOutcome:The target outcomes address consolidation of results on: AI technology applied to security and service deployment in differ...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-08 Reliable AI for 6G Communications Systems and Services
en consorcio: ExpectedOutcome:The key expected outcomes include: Realistic applicability of AI at large scale in 6G networks for natively supporting AI a...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-01 System Architecture - Standardisation and Follow-up/PoCs
en consorcio: ExpectedOutcome:The target outcomes address consolidation of results in the field of: Architectures providing built-in capabilities/mechani...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de
HORIZON-JU-SNS-2024-STREAM-B-01-07 Sustainability Lighthouse
en consorcio: ExpectedOutcome:The Lighthouse project expected outcomes on both “Sustainable 6G” and “6G for sustainability” dimensions include: Technolog...
Cerrada hace 8 meses | Próxima convocatoria prevista para el mes de