Damjan Katusic
University of Zagreb
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Damjan Katusic.
balkan conference in informatics | 2012
Iva Bojic; Gordan Jezic; Damjan Katusic; Saša Dešić; Mario Kusek; Darko Huljenic
It has been estimated that by the end of 2020 there will be 50 billion connected devices in Machine-to-Machine (M2M) networks. Such projections should encourage us to deal with the corresponding problems in heterogeneous M2M systems. First of all, devices can communicate through different access technologies (e.g. wireline, 2G/3G, WiFi, Bluetooth) and their communication can be classified as direct or indirect, internal or external. In this paper we explain differences between those types of communication and propose a new identification scheme that allows M2M devices to establish communication in every possible way. Secondly, there is a problem of device hardware and software diversity. To over-come this problem, we propose the usage of the Open Service Gateway Initiative (OSGi) framework.
international conference on software, telecommunications and computer networks | 2013
Stjepko Zrncic; Iva Bojic; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic
This paper tackles the problem of Quality-of-Service (QoS) in heterogeneous Machine-to-Machine (M2M) systems. The concern for QoS guaranties has been widely expressed in the past for both wired and wireless networks. However, only recently when these two types of networks have converged into one, thus making one huge heterogeneous system called M2M, new concerns have emerged. In this paper we measured energy consumption for different communication technologies and proposed an energy consumption model for iOS devices that can be used in future QoS specifications. Finally, we defined a QoS metric that includes both energy and time consumption aspects of one simple M2M service.
international conference on telecommunications | 2015
Pavle Skocir; Stjepko Zrncic; Damjan Katusic; Mario Kusek; Gordan Jezic
The paper proposes an energy consumption model for energy constrained devices in Machine-to-Machine communication system. The model specifies generic tasks that are executed on M2M devices. It was implemented on devices on Waspmote and Arduino hardware platforms. Power consumption was calculated for the states of the proposed model. The model with calculated consumption values is applicable for testing algorithms and techniques for achieving higher energy efficiency. Furthermore, the paper presents a basic operating cycle in which tasks from the specified model are executed on M2M devices and M2M gateway in an energy efficient way. Energy consumption during 24 hours by using the suggested operating cycle is compared on Arduino and Waspmote hardware platforms.
international conference on software, telecommunications and computer networks | 2014
Marin Vuković; Damjan Katusic; Pavle Skocir; Dragan Jevtic; Luka Delonga; Daniela Trutin
User privacy is becoming an issue on the Internet due to common data breaches and various security threats. Services tend to require private user data in order to provide more personalized content and users are typically unaware of potential risks to their privacy. This paper proposes a risk calculator based on a feedforward neural network that will provide users with an ability to calculate risks to their privacy. The proposed calculator is evaluated on a set of real world example scenarios. Furthermore, to give more insight into privacy issues, each estimated risk is explained by several real life scenarios that might happen if the observed parameters are obtained by an attacker. In turn, this should raise user awareness and knowledge about privacy issues on the Internet.
international conference on software, telecommunications and computer networks | 2014
Pavle Skocir; Damjan Katusic; Ivan Novotni; Iva Bojic; Gordan Jezic
Approximately two thirds of users worldwide use mobile (i.e. cellular) network for Internet access. Downlink and uplink data rates are important factors for enabling certain level of QoS (Quality of Service) and QoE (Quality of Experience). In this paper the aforementioned data rates were measured using only equipment available to an ordinary subscriber. For Internet access, we used a mobile network technology that currently enables highest data rates - LTE (Long Term Evolution). Two different tools were used for determining the data rates - HAKOMetar and Speedtest. The measurements were carried out on four distinct locations in the city of Zagreb, Croatia and aggregated results are presented separately for weekdays and for weekends. The contribution of our paper is twofold. Firstly, we show how much the data rates fluctuate during the weekdays and weekends, and when maximum uplink and downlink data rates are achieved. Secondly, we compare the measured data rates with those advertised by mobile network operators, and propose the changes they should enforce to better inform mobile network subscribers about the achievable data rates at a certain location.
Wireless Networking for Moving Objects | 2014
Iva Bojic; Jorge Granjal; Edmundo Monteiro; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic
Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.
international conference on telecommunications | 2015
Marin Vuković; Pavle Skocir; Damjan Katusic; Dragan Jevtic; Daniela Trutin; Luka Delonga
User privacy is becoming an issue on the Internet due to common data breaches and various security threats. Services tend to require private user data in order to provide more personalized content and users are typically unaware of potential risks to their privacy. This paper continues our work on the proposed user privacy risk calculator based on a feedforward neural network. Along with risk estimation, we provide the users with real world example scenarios that depict privacy threats according to selected input parameters. In this paper, we present a model for selecting the most probable real world scenario, presented as a comic, and thus avoid overwhelming the user with lots of information that he/she may find confusing. Most probable scenario estimations are performed by artificial neural network that is trained with real world scenarios and estimated probabilities from real world occurrences. Additionally, we group real world scenarios into categories that are presented to the user as further reading regarding privacy risks.
agent and multi agent systems technologies and applications | 2012
Damjan Katusic; Gordan Jezic
This paper explores the convergence of Machine-to-Machine (M2M) networks with Network-Centric Operations (NCO). An overview of the M2M communication paradigm and current standardization efforts regarding architecture are given. It includes an overview of the network-centric networking and analyses the idea of implementing NCO approach to achieve situational awareness and self-synchronization of autonomous and intelligent M2M devices in networked M2M environments. Case study involving M2M e-Health scenario is given and discussed as a proof of concept for the proposed convergence.
international conference on software, telecommunications and computer networks | 2017
Marin Vuković; Damjan Katusic; Renato Soic; Mario Weber
User data has become a backbone of todays ICT services and applications, where various providers compete to provide better services to their users based on a personalized content. However, user data is simultaneously becoming a tempting target for malicious individuals who try to get the data and exploit it for their own financial gain. The necessity for high-quality data loss prevention is obvious to protect the users and to comply with new regulations of the European Union, specifically General Data Protection Regulation (GDPR) which imposes strict restrictions regarding manipulation of user data. There are various solutions available that try to monitor sensitive user data, identify it, and prevent such data from exiting the service or application domain. This paper proposes a stand-alone system for data leak detection and prevention based on a rule-engine and threat estimation. Unlike the most of the widely used solutions, the proposed system can be customized to a specific purpose, where each service provider can select which type of data should be monitored and blocked if a leak is suspected.
IEEE Communications Magazine | 2017
Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic; Carlo Ratti; Iva Bojic
Technical standards support compatibility and interoperability among numerous entities existing in the telecommunications market. However, the university curricula rarely include standards analysis and rarely encourage students to create solutions that are based on the standards. This fact poses a hindrance in the adoption of new technologies due to the fact that recent graduates as young professionals will most certainly have difficulties in using new standards they may get in touch with on their first job. In our approach, we acknowledge the need for students to work with standards before they graduate. Research activities, connected with industrial projects in which application of new standardized technologies is in focus, are combined with student projects, enabling students to get their own hands-on experience in analyzing and applying telecommunications standards. As the result, students gain valuable experience for their future careers, an academic setting is used as a safe environment for testing and possibly even enhancing new standards, and the industry attains deeper knowledge about standards and technologies that could be used in their real-world deployments.