Horizon 2020 Security

Provides 1 - 5M € in subsidies for research, development, and demonstration within:

About Horizon 2020 Security

With support from Horizon 2020 you will be able to conduct international research projects in support of EU policies for security. With a successful application of the program, companies will receive:

  • 1-5M EUR for technology and product development
  • IPR - Intellectual Property Rights
  • Network of partners for development
  • Access to new markets
  • Technology and knowledge transfer

The purpose of Horizon 2020 Security is to increase European competitiveness and create new jobs.

Possibilities with Horizon 2020 Security

Horizon 2020 Security offers opportunities for SMEs as well as large companies, regardless of industry and technological level. It offers interesting possibilities for traditional production companies as well as high-tech companies; the key factor is that the company is facing a technological challenge or has a project idea for the solution of a technological/societal challenge. With Horizon 2020 Security, the company can receive co-financing from the EU for project research and development.

Horizon 2020 Security calls will be offered to projects within the following categories (see current calls below):

  • Crisis Management: Extreme weather, chemical - biological - radiological - nuclear (CBRN) contaminations, pandemic protection, climate adaption, natural hazards, critical infrastructure protection, communication technologies, etc.

  • Crime and Terrorism: Forensic infrastructure and tools, internet monitoring, identity management, urban security etc.

  • Border and External Security: Costal and land border security, radar systems, biometrics, scanners, freight inspection, external security, etc.

  • Digital Security: Privacy, access control, ICT in critical infrastructure protection, secure information sharing, etc.

Requirements for Horizon 2020 Security

There are three primary requirements for a project to be eligible for support from Horizon 2020 Security:

  • Height of Innovation - the project/technology must be novel and solve a European security problem.
  • Large market potential or socioeconomic impact - min. 100M EUR over 5 years.
  • The project demands three partners from three countries.

Upcoming deadlines

Below are the upcoming deadlines for Horizon 2020 Security. Expect 1-2 months for the proposal writing process.

25
aug

Disaster risks (natural, accidental, or intentional) should be addressed in the context of:

  • The EU Civil Protection Mechanism (Decision 1313/2013), which paves the way for reinforced cooperation in civil protection assistance interventions for the protection primarily of people, and also of the environment and property in the event of natural and man-made disasters, emergency situations in case of mass events, acts of terrorism and technological, chemical, biological, radiological or environmental accidents
  • The IPCC5 recommendations in relation to extreme climatic events
  • The Sendai Framework for Disaster Risk Reduction at international level
25
aug

The large variability among families of biological toxins complicates their measurement and unambiguous identification in human specimens, and environmental or food samples. Toxins are rapidly metabolised and degraded after incorporation, limiting the time window for successful identification and forensic analysis. Proposals should develop quality control tools, as well as the Standard Operating Procedures necessary for establishing a mechanism to systematically validate laboratory-based measurement techniques, including sample preparation strategies and analyses made in-situ issued by mobile and quickly deployable laboratories, which should be proposed for adoption at EU level. 

25
aug

The forensic community still requires:

a) In the specific area of trace qualification:

  • Better knowledge of the composition of traces; of the time when they were left, whether they result from crime-related or inoffensive activities; of the effect, on the quality of traces, of the time elapsed between the moments when there are deposited and collected; of the transfer mechanisms, persistence and recovery of traces; of the circumstances of the trace deposit;
  •  New tools, to be used in the field, that can detect, collect and analyse traces, and assist in the interpretation of trace data with a view to avoiding practitioner’s biases;

b) Alternatively, in the specific area of DNA extended exploitation:

  • Tools and techniques, and advanced methods for data analysis and statistical interpretation to extend the exploitation of DNA, which implement “privacy by design” (that take account of the status of personal data depending on the EU Member State legislations.
  • New method for complete sequencing to establish genetic composite sketch.
25
aug

Innovative approaches are required to: assess the effectiveness of the methods and techniques used to counter a threat at certain point in time of the plot, against credible scenarios based on real cases; assess how to best combine methods and techniques along the timeline of a plot; identify methods and techniques able to fill in existing gaps.

Methods and techniques to be considered include:

  • Intelligence to spot those preparing for an attack;
  • The inhibition of precursors;
  • Detection of specific chemicals, bomb factories, and/or IED;
  • Neutralization of IED;
  • Identification of weakness of the current defences against IED, and possible improvements.
25
aug
  • New knowledge and targeted technologies for fighting both old and new forms of crime and terrorist behaviours supported by advanced technologies;
  • Test and demonstration of newly developed technology by Law Enforcement Agencies (LEAs) involved in proposals;
  • Innovative curricula, training and (joint) exercises to be used to facilitate the EU-wide take-up of these new technologies, in particular in the fields of:

Sub-topic: 1.cyber-crime: virtual/crypto currencies des-anonymisation/tracing/impairing where they support underground markets in the darknet.

Sub-topic: 2.detection and neutralization of rogue/suspicious light drone/UAV flying over restricted areas, and involving as beneficiaries, where appropriate, the operators of infrastructure

Sub-topic: 3.video analysis in the context of legal investigation Sub-topic: Others. 

25
aug

The proposed action should cover one of the following sub-topics:

  • Sub-topic: 1.Autonomous surveillance
    Autonomous agents should be adaptable: in order to deal, where applicable, with extreme and diverse weather and sea condition, including in the Artic region; interconnected: interoperable and capable of exchanging information among themselves and with the system's ground segment; tele-operable from the ground. 
  • Sub-topic: 2.Enhanced command and control systems for the surveillance of borders in a 3D environment Autonomous surveillance 
25
aug

Taking into consideration the adequate level of security commensurate with the considered use-case, proposals may address one of the following types of end-users:

  • SMEs
  • local public administration,
  • individual citizens. 

To identify the most wide spread threats and cyber security issues facing end-users, proposals should take into account the guidance documents, best practices and standards issued by International Standardisation Organisations, technical forum and Member State Authorities which are tailored for SMEs or Individuals and actively contribute to their development or improvement.

Proposals should develop innovative solutions with a high degree of usability and automation while ensuring that the end-users retain an adequate degree of cyber situational awareness and control. 

24
apr

Several reseach and innovation actions (RIA) aiming at research and development of novel CBRN technologies and innovations identified in the above-mentioned catalogue will be selected by the European Commission. Each of these actions will be led by an SME. Each consortium implementing such a RIA must not only establish a consortium agreement among its members, but also a collaboration agreement with the participants in the CSA supported part. Such a collaboration agreement must settle how the results from the RIA will be exploited and integrated into platforms managed by the CSA.

25
apr

Proposals may address one or more of the areas/challenges described below but not necessarily all of them:

  • Functional encryption solutions that offer more flexibility and make it feasible to process encrypted data held on the Internet.
  • For application areas such as the Internet of Things, implantable medical devices and sensor nodes that harvest energy from the environment there is a need for ultra-lightweight cryptology.
  • Implementation (hardware or software) is often the weak point of the strongest cryptographic protocols: physical cryptanalysis, including tampering, side channel, faults injection attacks, has to be taken into account in the early phases of a development.
  • Authenticated encrypted token research for mobile payment solutions and related applications. 
  • Innovative cryptographic primitives and complementary non-cryptographic privacy- preserving mechanisms to enforce privacy at various levels 
  • New techniques, such as quantum safe cryptography, which are secure from quantum computers and other advances in computing and cryptanalysis. 
  •  Proposals on quantum key distribution addressing challenges such as improved performance.
  • Automated proof techniques for cryptographic protocols.
24
aug

Proposals should address the deployment of detection systems in large and medium cities, in existing networks, or a combination of such networks, for instance for the detection of explosive precursors and illegal chemicals (drugs). Proposals shall address sewage networks and quality of air monitoring networks, and may address other networks. The experiment should last a significant period of time (at least two years).

Proposals should also provide for a mobile platform equipped to ascertain the composition and location of suspicious measurements, once data have been provided by the networked detection systems.

Proposals should provide for the prototype of a system controlling the detection systems and capable of fusing data provided by a variety of such networks, and of interfacing with other networks, pay particular attention to ethical issues raised when using such systems, and address the sustainability of such systems.

24
aug

Proposals should take account of the four-tier access control model developed in the EU: measures undertaken in, or jointly with third countries or service providers (e.g. those managing Advance Passenger Information or Passenger Name Record systems); cooperation with neighbouring countries; border control and counter-smuggling measures; control measures within the area of free movement in order to prevent illegal immigration and cross- border crime inside the Schengen area.

Innovative, international alert systems can be developed further to more co-operative law enforcement and investigative efforts. Building upon lessons learned and field experience is essential.

The combination of a variety of arrays of sensors, new operational methods, and improved data management techniques can support appropriate law enforcement responses and enable better, transnational, interagency access to reliable and secure situational intelligence and information, on a real-time and cost-effective basis. 

24
aug

Systems should be developed that combine or improve surveillance technologies and techniques and arrays of sensors of different sorts capable to provide higher quality detection capabilities and imaging via the integration of different techniques, to achieve wide- and small-area through foliage detection, despite the canopy density, in a real operational context. They could build on airborne, satellite-based, and/or on ground based platforms.

Solutions should be tested and validated in terms of capabilities to control effectively the land border covered by a vegetation layer, in all weather conditions. 

24
aug

Strategies and tools are needed for the timely submission to customs authorities of relevant high-quality and comprehensive data on goods moving and crossing borders, whilst taking into consideration the national and EU legal, procedural and IT systems where they exist. Realistic methodologies and organisations need to develop, that facilitate collaboration among the relevant authorities (not only customs but also law enforcement, transport, security and border control agencies). Data governance policies and mechanisms for data sharing need to be agreed internationally.

Common repositories that take advantage of existing instruments such as the Advance Cargo Information System (advance electronic notification of cargo coming into EU before it leaves the third country) which are under-utilised and under-exploited for risk management purpose, can support the intelligent use and management of complex and large amount of data, exploiting unstructured data, supporting operational and situational awareness of customs authorities, adding intelligence (trends analysis, correlation analysis, etc.) by means of state- of-the-art technologies including in the fields of Big Data, Data Analytics.

24
aug

The assessment of the acceptability of such (combinations of) technologies and systems by citizens (who need to remain in control of personal data) and practitioners is needed, that takes account of human behaviour, gender, legal frameworks, societal issues, and possible risk of discrimination.

Methods developed to perform such assessments need also to generate information useful for decision makers to take informed decisions about future technology deployments, and for industry to design products that preserve privacy. 

24
aug

Two different foci are found:

a. Research and Innovation Actions –Situational Awareness

The focus of the proposals should be on the development of novel approaches for providing organisations the appropriate situational awareness in relation to cyber security threats allowing them to detect and quickly and effectively respond to sophisticated cyber-attacks.

a. Innovation Actions – Simulation Environments, Training

Proposals should develop innovative simulation environments and training materials in order to adequately prepare those tasked with defending high-risk organisations to counter advanced cyber-attacks. 

24
aug

Proposals may cover one of the strands identified below

  • Privacy-enhancing Technologies (PET)
  • General Data Protection Regulation in practice
  • Secure digital identities
24
aug

New knowledge and targeted technologies for fighting both old and new forms of crime and terrorist behaviours supported by advanced technologies;
Test and demonstration of newly developed technology by Law Enforcement Agencies (LEAs) involved in proposals;
Innovative curricula, training and (joint) exercises to be used to facilitate the EU-wide take-up of these new technologies, in particular in the fields of:

Sub-topic: 1.cyber-crime: virtual/crypto currencies des-anonymisation/tracing/impairing where they support underground markets in the darknet.

Sub-topic: 2.detection and neutralization of rogue/suspicious light drone/UAV flying over restricted areas, and involving as beneficiaries, where appropriate, the operators of infrastructure

Sub-topic: 3.video analysis in the context of legal investigation Sub-topic: Others.

Only the sub-topics not covered in 2016 will remain eligible in 2017. A list of topics that remain eligible in 2017 will be published in due time in the section "Topic Conditions & Documents" for this topic on the Participant Portal. 

Can your project get funding from Horizon 2020 Security?

Let us contact you to discuss your possibilities within Horizon 2020 Security

Can your project get funding?

We can tell you if your project is suited for public funding. Tell us a little bit about your project we can help you identify the funding potential.

Tell us about your project

or call (+45) 61 60 75 08

We help you succeed

We help companies obtain public funding by converting good projects to well-prepared applications.

Our services cover the entire application process:

Identifying funding opportunities
We identifying your best funding opportunities
Planning and scoping your project
We plan and scope your project to meet demands
Writing the successful application
We write the application that increases your chance of success