Reliable Services and Smart Security

Closed

Programme Category

EU Competitive Programmes

Programme Name

Smart Networks and Services Joint Undertaking (SNS JU)

Programme Description

The European Smart Networks and Services Joint Undertaking (SNS JU) aims to ensure industrial leadership for Europe in 5G and 6G.

Programme Details

Identifier Code

HORIZON-JU-SNS-2023-STREAM-B-01-04

Call

Reliable Services and Smart Security

Summary

The target outcomes qualify the needed level of reliability, trust and resilience that applies to a critical infrastructure like 6G based on a globally connected continuum of heterogeneous environments supported by the convergence of networks and IT systems to enable new future digital services.

Detailed Call Description

The focus of this Stream is on several complementary issues mentioned below and applicants may select one or more of these issues:

Service deployment for complex services: The scope extends these capabilities towards truly flexible, resilient and versatile in-network computing, including: i) a broader range of deployable artefacts (e.g., Web Assemblies); ii) workloads that pertain to an entire user population (shared services like games, or even services for huge populations like joint video streaming for many watchers); iii) workloads with new characteristics (like bursty in-network training for ML models; iv) End-to-End Security Policies composition in distributed dynamic scenarios; v) data authenticity and trusted digital interactions in dynamically composed service environments. (further details in the Funding & Tenders)

Cooperative holistic E2E security for 6G architectures. Developing security architectures for providing E2E security guarantees across the heterogeneity and dynamicity of technologies envisaged in 6G is a major challenge. This topic should be able to address multi-layer, multi-provider protocols and interfaces for E2E adaptive security delivery (inter-orchestrator agent-based distributed convergence) ensuring multi-tenancy (e.g., verticals) remediation strategies with regard to business objectives (although vertical specifics); multi-layers/stakeholders authorities (including compute/network/security service providers); and include cooperative and adaptative (AI-based) attack detection (attacks known/zero days-anomalies). (further details in the Funding & Tenders)

Zero-touch integrated security deployment: The dynamics of the 6G system require autonomic and multi-agent approaches to security deployment, similar to the challenges of service deployment, in an environment with multiple control loops. Techniques should be able to address adaptive protection, detection and response, and reasoning techniques based on digital twins or AI are promising for candidates to consider.

Exploitation of (distributed) AI/ML for 6G Infrastructures, targeting net-zero scenarios: This topic covers security and service deployment scenarios. The objective is the development of techniques, protocols of novel architectures for the integration of AI/ML in scenarios to multiple applications in terms of security and service processes, including aspects as securing physical layers (e.g. anti-jamming), provide adaptive response to incidents, define service and security function placement (protection and detection), and for the intrinsic resilience of the AI process (e.g. data poisoning in control/management), improving AI security. (further details in the Funding & Tenders)

Developments on service technologies for secure time-sensitive and computation intensive applications. The challenges posed by virtualised environments require a new set of technologies to support stringent requirements. The topic aims to develop techniques able to: i) assure time guarantees for containers or similar virtualisation technologies; ii) time aware orchestration frameworks; iii) provide secure isolation techniques for dynamic instantiations; iv) abstraction mechanisms for the network compute fabric to support function delegation in low power scenarios.

Physical layer security: Physical layer security technologies, including ML based techniques to combat the increased number of potential threats (e.g., rogue terminal/network identification, eavesdropping detection) and cyberattacks to secure both users and networks, and considering the new attack surfaces brought in by new hardware and software architectures (e.g., massive MIMO, RIS).

Human Centric methods that give the control to the user to guarantee privacy and confidentiality, for both service development and service execution. It addresses service and business enablement with security attributes exposure and security awareness through security SLA, auditable per stakeholders and users. Methods for quantification of security to make the users aware of the systems and services used and associated risks is in scope, including certification proposals to raise user awareness.

Call Total Budget

€16,000,000

Financing percentage by EU or other bodies / Level of Subsidy or Loan

100% – non-for-profit organisations
90% – profit organisations

Expected EU contribution per topic: € 4,000,000 (€ 16,000,000)

 

 

 

Thematic Categories

  • Information and Communication Technologies
  • Information Technology
  • Research, Technological Development and Innovation

Eligibility for Participation

  • NGOs
  • Non Profit Organisations
  • Private Bodies
  • Researchers/Research Centers/Institutions
  • Small and Medium Enterprises (SMEs)
  • State-owned Enterprises

Call Opening Date

17/01/2023

Call Closing Date

25/04/2023

EU Contact Point

cnect-e1-sns@ec.europa.eu

(Publish Date: 23/02/2023-for internal use only)