Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Damjan Katusic is active.

Publication


Featured researches published by Damjan Katusic.


balkan conference in informatics | 2012

Communication in machine-to-machine environments

Iva Bojic; Gordan Jezic; Damjan Katusic; Saša Dešić; Mario Kusek; Darko Huljenic

It has been estimated that by the end of 2020 there will be 50 billion connected devices in Machine-to-Machine (M2M) networks. Such projections should encourage us to deal with the corresponding problems in heterogeneous M2M systems. First of all, devices can communicate through different access technologies (e.g. wireline, 2G/3G, WiFi, Bluetooth) and their communication can be classified as direct or indirect, internal or external. In this paper we explain differences between those types of communication and propose a new identification scheme that allows M2M devices to establish communication in every possible way. Secondly, there is a problem of device hardware and software diversity. To over-come this problem, we propose the usage of the Open Service Gateway Initiative (OSGi) framework.


international conference on software, telecommunications and computer networks | 2013

Quality-of-Service in Machine-to-Machine service provisioning process

Stjepko Zrncic; Iva Bojic; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic

This paper tackles the problem of Quality-of-Service (QoS) in heterogeneous Machine-to-Machine (M2M) systems. The concern for QoS guaranties has been widely expressed in the past for both wired and wireless networks. However, only recently when these two types of networks have converged into one, thus making one huge heterogeneous system called M2M, new concerns have emerged. In this paper we measured energy consumption for different communication technologies and proposed an energy consumption model for iOS devices that can be used in future QoS specifications. Finally, we defined a QoS metric that includes both energy and time consumption aspects of one simple M2M service.


international conference on telecommunications | 2015

Energy consumption model for devices in machine-to-machine system

Pavle Skocir; Stjepko Zrncic; Damjan Katusic; Mario Kusek; Gordan Jezic

The paper proposes an energy consumption model for energy constrained devices in Machine-to-Machine communication system. The model specifies generic tasks that are executed on M2M devices. It was implemented on devices on Waspmote and Arduino hardware platforms. Power consumption was calculated for the states of the proposed model. The model with calculated consumption values is applicable for testing algorithms and techniques for achieving higher energy efficiency. Furthermore, the paper presents a basic operating cycle in which tasks from the specified model are executed on M2M devices and M2M gateway in an energy efficient way. Energy consumption during 24 hours by using the suggested operating cycle is compared on Arduino and Waspmote hardware platforms.


international conference on software, telecommunications and computer networks | 2014

User privacy risk calculator

Marin Vuković; Damjan Katusic; Pavle Skocir; Dragan Jevtic; Luka Delonga; Daniela Trutin

User privacy is becoming an issue on the Internet due to common data breaches and various security threats. Services tend to require private user data in order to provide more personalized content and users are typically unaware of potential risks to their privacy. This paper proposes a risk calculator based on a feedforward neural network that will provide users with an ability to calculate risks to their privacy. The proposed calculator is evaluated on a set of real world example scenarios. Furthermore, to give more insight into privacy issues, each estimated risk is explained by several real life scenarios that might happen if the observed parameters are obtained by an attacker. In turn, this should raise user awareness and knowledge about privacy issues on the Internet.


international conference on software, telecommunications and computer networks | 2014

Data rate fluctuations from user perspective in 4G mobile networks

Pavle Skocir; Damjan Katusic; Ivan Novotni; Iva Bojic; Gordan Jezic

Approximately two thirds of users worldwide use mobile (i.e. cellular) network for Internet access. Downlink and uplink data rates are important factors for enabling certain level of QoS (Quality of Service) and QoE (Quality of Experience). In this paper the aforementioned data rates were measured using only equipment available to an ordinary subscriber. For Internet access, we used a mobile network technology that currently enables highest data rates - LTE (Long Term Evolution). Two different tools were used for determining the data rates - HAKOMetar and Speedtest. The measurements were carried out on four distinct locations in the city of Zagreb, Croatia and aggregated results are presented separately for weekdays and for weekends. The contribution of our paper is twofold. Firstly, we show how much the data rates fluctuate during the weekdays and weekends, and when maximum uplink and downlink data rates are achieved. Secondly, we compare the measured data rates with those advertised by mobile network operators, and propose the changes they should enforce to better inform mobile network subscribers about the achievable data rates at a certain location.


Wireless Networking for Moving Objects | 2014

Communication and Security in Machine-to-Machine Systems

Iva Bojic; Jorge Granjal; Edmundo Monteiro; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.


international conference on telecommunications | 2015

Estimating real world privacy risk scenarios

Marin Vuković; Pavle Skocir; Damjan Katusic; Dragan Jevtic; Daniela Trutin; Luka Delonga

User privacy is becoming an issue on the Internet due to common data breaches and various security threats. Services tend to require private user data in order to provide more personalized content and users are typically unaware of potential risks to their privacy. This paper continues our work on the proposed user privacy risk calculator based on a feedforward neural network. Along with risk estimation, we provide the users with real world example scenarios that depict privacy threats according to selected input parameters. In this paper, we present a model for selecting the most probable real world scenario, presented as a comic, and thus avoid overwhelming the user with lots of information that he/she may find confusing. Most probable scenario estimations are performed by artificial neural network that is trained with real world scenarios and estimated probabilities from real world occurrences. Additionally, we group real world scenarios into categories that are presented to the user as further reading regarding privacy risks.


agent and multi agent systems technologies and applications | 2012

Network-Centric operations in machine-to-machine networks

Damjan Katusic; Gordan Jezic

This paper explores the convergence of Machine-to-Machine (M2M) networks with Network-Centric Operations (NCO). An overview of the M2M communication paradigm and current standardization efforts regarding architecture are given. It includes an overview of the network-centric networking and analyses the idea of implementing NCO approach to achieve situational awareness and self-synchronization of autonomous and intelligent M2M devices in networked M2M environments. Case study involving M2M e-Health scenario is given and discussed as a proof of concept for the proposed convergence.


international conference on software, telecommunications and computer networks | 2017

Rule-based system for data leak threat estimation

Marin Vuković; Damjan Katusic; Renato Soic; Mario Weber

User data has become a backbone of todays ICT services and applications, where various providers compete to provide better services to their users based on a personalized content. However, user data is simultaneously becoming a tempting target for malicious individuals who try to get the data and exploit it for their own financial gain. The necessity for high-quality data loss prevention is obvious to protect the users and to comply with new regulations of the European Union, specifically General Data Protection Regulation (GDPR) which imposes strict restrictions regarding manipulation of user data. There are various solutions available that try to monitor sensitive user data, identify it, and prevent such data from exiting the service or application domain. This paper proposes a stand-alone system for data leak detection and prevention based on a rule-engine and threat estimation. Unlike the most of the widely used solutions, the proposed system can be customized to a specific purpose, where each service provider can select which type of data should be monitored and blocked if a leak is suspected.


IEEE Communications Magazine | 2017

Hands-On Education about Standardization: Is That What Industry Expects?

Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic; Carlo Ratti; Iva Bojic

Technical standards support compatibility and interoperability among numerous entities existing in the telecommunications market. However, the university curricula rarely include standards analysis and rarely encourage students to create solutions that are based on the standards. This fact poses a hindrance in the adoption of new technologies due to the fact that recent graduates as young professionals will most certainly have difficulties in using new standards they may get in touch with on their first job. In our approach, we acknowledge the need for students to work with standards before they graduate. Research activities, connected with industrial projects in which application of new standardized technologies is in focus, are combined with student projects, enabling students to get their own hands-on experience in analyzing and applying telecommunications standards. As the result, students gain valuable experience for their future careers, an academic setting is used as a safe environment for testing and possibly even enhancing new standards, and the industry attains deeper knowledge about standards and technologies that could be used in their real-world deployments.

Collaboration


Dive into the Damjan Katusic's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Iva Bojic

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge