Maturity-Aware Cyber Insurance Optimization in IoT Networks
Abstract
1. Introduction
- Maturity-Aware Insurance Mechanisms: This work proposes insurance mechanisms that explicitly account for device-specific risk levels and organizational security maturity. The insurer premium-setting process is designed to incentivize better security practices while ensuring profitability and fairness in the IoT ecosystem.
- Topology-Aware Risk Modeling in IoT Networks: The paper develops a tractable framework that captures how cyber risk propagates across interconnected IoT devices. Unlike traditional models that ignore interdependence, this approach incorporates network structure, security maturity levels, and risk mitigation, enabling accurate assessment of systemic cyber threats.
- Optimization of Cyber Insurance Policies Using Game Theory: This work formulates a dual-optimization approach for both defender and insurer, leveraging game-theoretic principles. By balancing security investments, insurance premiums, and risk mitigation efforts, the model enhances decision-making for cyber insurance policies in interconnected IoT environments.
2. Related Work
2.1. Cyber Insurance for Infrastructure and IoT Networks
2.2. Game-Theoretic Models
2.3. Dynamic and Game-Theoretic Optimization in Cyber Insurance
2.4. Limitations of Existing Models
- Mean-field/homogeneous-mixing approximations: infection (or compromise) dynamics are modeled using a single aggregate prevalence state (or population-average infection probability), implicitly assuming homogeneous contact rates and ignoring device-to-device adjacency effects. This removes explicit graph/topology dependence and cannot represent localized cascades or high-degree “hub” exposure.
- Static expected-loss models: risk is computed from stationary vulnerability/exposure scores (or independent breach probabilities) without an explicit propagation process over network links. Under such models, devices are treated as conditionally independent and correlated loss amplification via neighboring compromise is not captured.
- Uniform risk parameters: heterogeneous IoT devices are often assigned identical (or class-agnostic) parameters (e.g., uniform infection/breach rate, uniform recovery/remediation rate, or uniform loss severity), which effectively assumes all devices share the same exposure and control effectiveness.
- Simplified topological dependence: when topology is included, it is frequently represented via coarse summaries (e.g., average degree) or unweighted links, rather than adjacency-weighted dependencies. As a result, the influence of specific neighbors and edge weights (i.e., ) on a device’s risk is typically omitted.
3. System Model
3.1. Components and System Workflow
- The attacker compromises IoT devices, thereby increasing the risk levels within the network.
- The defender evaluates these risks via risk assessment and applies mitigation measures along with security investments.
- In response, the insurer analyzes the assessed risk and offers cyber insurance through tailored premiums and coverage.
- The defender receives the insurance, which helps offset potential losses, and may further adjust their security posture based on the coverage received.
3.2. Risk Management Maturity Model
- (Partial): Security activities are largely ad hoc and reactive. Typical evidence includes incomplete IoT asset inventory, irregular vulnerability/patch practices (no defined cadence or SLA), limited centralized logging/monitoring, and incident response handled case-by-case with minimal documented playbooks.
- (Risk-informed): Some practices exist but are not consistently applied. Evidence may include partial inventories, periodic patching/scanning for subsets of devices, and monitoring enabled for some systems without routine review procedures.
- (Repeatable): Processes are documented and consistently executed. Evidence includes a maintained IoT asset inventory with ownership, defined patch/vulnerability management cadence (or SLA targets) that is routinely followed, centralized logging for major IoT segments with regular review, and a documented incident-response plan that is exercised at least occasionally.
- (Adaptive): Controls are measured and improved. Evidence includes continuous/near-continuous monitoring for critical assets, formal metrics tracking (e.g., patch compliance rates or response time targets), and post-incident reviews that drive process improvements.
- (Optimized): Security is continuously optimized and threat-informed. Evidence includes proactive testing, automation/orchestration for response or containment, and continuous control validation across the IoT environment.
Mathematical Mapping of Maturity to SIS Dynamics
3.3. Modified SIS Risk Propagation Dynamics
- Susceptible (S): A device is operational, but contains an unpatched vulnerability and can be compromised.
- Infected (I): The device has been successfully compromised by an attacker.
- Transition (Recovery): This transition, captured by the recovery rate , represents the successful remediation and patching of the device by the defender. This action removes the current infection, but the device returns to a susceptible state, meaning it can still be compromised again via a new vulnerability or attack vector (e.g., a new malware variant or zero-day exploit).
Formal Definition of Model Parameters
- Base Infection Rate (): The inherent transmission probability of a vulnerability traversing a network edge.
- Attacker Adaptivity (): A multiplier representing the attacker’s ability to intensify their efforts (e.g., deploying zero-day exploits or increasing scanning frequency).
- Maturity-Dependent Mitigation Factor (): An exponentially decaying function, , where . This multiplicatively scales down risk, reflecting how higher maturity suppresses exposure.
- Maturity-Aware Recovery Rate (): Defined as , this captures the transition representing successful remediation. It ensures recovery grows with diminishing returns under higher maturity while remaining bounded ().
3.4. Infection Propagation Model
3.4.1. Spectral Stability Condition
3.4.2. Maturity-Aware Recovery Rate
4. Optimization with Game-Theoretic Modeling
4.1. Defender Optimization Problem
4.2. Expected Effective Loss
4.3. Security Investment Cost
4.4. Insurance Premium (Tiered by Risk)
4.5. Objective Function
4.6. Insurer Optimization Problem
4.7. Stackelberg Game Formulation and Equilibrium
4.8. Equilibrium Behavior and Tiered Incentives
5. Validation and Numerical Results
5.1. Simulation Environment and Topology
5.2. Baseline Parameterization
5.3. Infection Dynamics
5.4. Defender Strategy and Economic Efficiency
5.4.1. Optimality Analysis
5.4.2. Marginal Cost–Benefit Analysis Across Maturity
5.4.3. Comparative Analysis: Maturity-Aware vs. Static Frameworks
5.5. Insurer Strategy: Premium Structure
- Uniform Pricing: Premiums are averaged across the network regardless of individual device risk, with an inefficiency penalty to model adverse selection. Under uniform pricing, all devices are charged the same premium computed from the average expected loss:The insurer profit is computed as total premiums minus total realized payout, and we apply a fixed penalty to the resulting profit as a simple proxy for inefficiency/overhead under uniform (non-risk-aligned) pricing.
- Risk-Proportional Pricing (proposed): Premiums are strictly proportional to individual device risk , following the standard pricing schedule defined in Equation (11).
- Aggressive Pricing: High-risk devices face a steeper loading factor [24,25]. Specifically, we apply a stepped multiplier to the loading factor based on the potential loss magnitude :This structure imposes a 150% surcharge on critical infrastructure (e.g., controllers) and a 50% surcharge on mid-tier devices (e.g., cameras), while leaving low-risk sensors at the baseline rate.
5.6. Comparison with State of the Art
- Static (non-propagating) risk and maturity-agnostic baselines: Many of the existing cyber-insurance models treat breach risk as static and independent across assets, and do not incorporate a propagation process over network links. Under such assumptions, premiums scale primarily with device value or a fixed breach probability, and improvements in organizational maturity can only be represented implicitly (e.g., via a single global risk scalar). In contrast, our SIS-driven propagation model explicitly captures correlated losses and neighbor-driven exposure via , which produces larger benefits from improving maturity at low tiers and explains the observed U-shaped total-cost curve with an interior optimum.
- Mean-field/homogeneous-mixing epidemic approximations: A common simplification in epidemic-style security modeling is to use a population-average (mean-field) infection level, which suppresses topology-specific effects and cannot represent hub-driven cascades. Our topology-weighted formulation preserves adjacency-driven dependencies and shows that risk-proportional premiums better align incentives in heterogeneous IoT graphs, because highly exposed devices face stronger pricing pressure, reducing cross-subsidization.
- Uniform pricing vs. risk-proportional pricing (adverse selection): Consistent with insurance theory, we observe that uniform pricing induces cross-subsidization, which can lead low-risk devices to overpay and high-risk devices to underpay. Our maturity-aware, risk-proportional pricing reduces this distortion by tying premiums to , yielding a more economically efficient equilibrium and improved incentives for security investment.
6. Conclusions and Future Work
- Dynamic Risk Modeling: Extending the static framework to a dynamic one that accounts for continuous network growth, device lifecycle changes (e.g., addition and removal), and time-varying attack patterns.
- Multiple Defenders: Exploring a non-cooperative game where multiple, self-interested defenders compete for resources and insurance, which may lead to different equilibrium outcomes and pricing dynamics.
- Data-Driven Risk Assessment: Integrating more advanced machine learning and AI models to provide real-time risk assessment and dynamic premium adjustment based on live threat intelligence and behavioral analytics.
- Heterogeneous and Device-Group-Specific Maturity: Extending this framework to incorporate subnetwork or device-specific maturity vectors ( or ). In such an extension, the topology-aware propagation model would directly couple with localized mitigation factors () and individual recovery rates (). This would allow the SIS dynamics to capture complex cascading effects at boundaries. For instance, modeling how a low-maturity legacy subnetwork serves as a persistent infection reservoir, and how a high-maturity target subnetwork successfully dampens that propagation through localized effective infection rates (). Consequently, insurers could offer highly granular, component-specific premium optimizations.
- Expanded Dimensions of Security Maturity: While the current model maps maturity primarily to vulnerability mitigation () and remediation speed (), comprehensive organizational maturity encompasses broader proactive capabilities. Future iterations could adopt a multi-dimensional maturity vector. For instance, integrating proactive threat intelligence could dynamically reduce the attacker adaptivity parameter () over time. Similarly, advanced threat hunting and detection capabilities could be modeled by making recovery rates explicitly time-dependent rather than static. Furthermore, integrating maturity-dependent incident response readiness directly into the loss function () could provide a higher fidelity economic model for how advanced planning mitigates catastrophic tail-risk before an infection propagates.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Radanliev, P.; De Roure, D.; Cannady, S.; Montalvo, R.M.; Nicolescu, R.; Huth, M. Economic impact of IoT cyber risk-analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Living in the Internet of Things: Cybersecurity of the IoT-2018; Institution of Engineering and Technology: Stevenage, UK, 2018; p. 3. [Google Scholar] [CrossRef]
- Pal, R.; Huang, Z.; Yin, X.; Liu, M.; Lototsky, S.; Crowcroft, J. Sustainable catastrophic cyber-risk management in IoT societies. In Proceedings of the 2020 Winter Simulation Conference (WSC); IEEE: New York, NY, USA, 2020; pp. 3105–3116. [Google Scholar] [CrossRef]
- Zhang, R.; Zhu, Q. {FlipIn}: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. IEEE Trans. Inf. Forensics Secur. 2019, 15, 2026–2041. [Google Scholar] [CrossRef]
- Huang, L.; Zhu, Q. A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. Comput. Secur. 2020, 89, 101660. [Google Scholar] [CrossRef]
- Zhang, L.; Zhu, T.; Hussain, F.K.; Ye, D.; Zhou, W. A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1349–1364. [Google Scholar] [CrossRef]
- National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. Available online: https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf (accessed on 25 February 2026).
- Choetkiertikul, M.; Dam, H.K.; Ghose, A.; Sunetnanta, T.T. A CMMI-Based Automated Risk Assessment Framework. In Proceedings of the 2014 21st Asia-Pacific Software Engineering Conference; IEEE: New York, NY, USA, 2014; Volume 2, pp. 63–68. [Google Scholar] [CrossRef]
- Rocha, A.; Alaba, F.A.; Musa, H.; Sousa, M.J.; de Vasconcelos, J.B.; Pereira, R. Cybersecurity Maturity Models: A Systematic Literature Review. In Proceedings of the The International Conference on Strategic Innovative Marketing and Tourism; Springer: Berlin/Heidelberg, Germany, 2024; pp. 179–206. [Google Scholar] [CrossRef]
- Boeckl, K.; Fagan, M.; Fisher, W.; Lefkovitz, N.; Megas, K.; Nadeau, E.; Piccarreta, B.; O’Rourke, D.G.; Scarfone, K. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks; NIST Internal Report NIST IR 8228; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar] [CrossRef]
- Minoli, D.; Sohraby, K.; Occhiogrosso, B. IoT Considerations, Requirements, and Architectures for Smart Buildings—Energy Optimization and Next-Generation Building Management Systems. IEEE Internet Things J. 2017, 4, 269–283. [Google Scholar] [CrossRef]
- Wang, Y.; Chakrabarti, D.; Wang, C.; Faloutsos, C. Epidemic spreading in real networks: An eigenvalue viewpoint. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems; IEEE: New York, NY, USA, 2003; pp. 25–34. [Google Scholar] [CrossRef]
- European Union Agency for Cybersecurity. ENISA Threat Landscape 2025; Catalogue Number: TP-01-25-025-EN-N; European Union Agency for Cybersecurity: Athens, Greece, 2025. [Google Scholar] [CrossRef]
- Lau, P.; Wei, W.; Wang, L.; Liu, Z.; Ten, C.W. A cybersecurity insurance model for power system reliability considering optimal defense resource allocation. IEEE Trans. Smart Grid 2020, 11, 4403–4414. [Google Scholar] [CrossRef]
- Lau, P.; Wang, L.; Wei, W.; Liu, Z.; Ten, C.W. A novel mutual insurance model for hedging against cyber risks in power systems deploying smart technologies. IEEE Trans. Power Syst. 2022, 38, 630–642. [Google Scholar] [CrossRef]
- Shah, S.B.H.; Wang, L.; Reddy, P.; Carie, A. Non-cooperative game to balance energy and security in resource constrained IoT networks. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); IEEE: New York, NY, USA, 2020; pp. 502–507. [Google Scholar] [CrossRef]
- Prova, N.N.I. Advanced machine learning techniques for predictive analysis of health insurance. In Proceedings of the 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI); IEEE: New York, NY, USA, 2024; pp. 1166–1170. [Google Scholar] [CrossRef]
- Jawhar, S.; Kimble, C.E.; Miller, J.R.; Bitar, Z. Enhancing cyber resilience with ai-powered cyber insurance risk assessment. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC); IEEE: New York, NY, USA, 2024; pp. 0435–0438. [Google Scholar] [CrossRef]
- Huang, Y.; Huang, L.; Zhu, Q. Reinforcement learning for feedback-enabled cyber resilience. Annu. Rev. Control 2022, 53, 273–295. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P. The economics of information security investment. ACM Trans. Inf. Syst. Secur. 2002, 5, 438–457. [Google Scholar] [CrossRef]
- Mazzoccoli, A.; Naldi, M. An Overview of Security Breach Probability Models. Risks 2022, 10, 220. [Google Scholar] [CrossRef]
- Zhao, L.; Tu, C.; Mu, R. Cybersecurity investment considering risk prevention and mitigation measures: A security insurance perspective. J. Ind. Manag. Optim. 2025, 21, 4624–4648. [Google Scholar] [CrossRef]
- Starfleet Research; Palo Alto Networks. The 2024 Benchmark Report on IoT Security; Starfleet Research: Chicago, IL, USA, 2024; Available online: https://www.paloaltonetworks.com.au/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/the-2024-benchmark-report-on-iot-security (accessed on 25 February 2026).
- Souppaya, M.; Scarfone, K. SP 800-40 Rev. 4: Guide to Enterprise Patch Management Planning; NIST Computer Security Resource Center: Gaithersburg, MD, USA, 2022. [Google Scholar]
- Liu, Z.; Wei, W.; Wang, L. An extreme value theory-based catastrophe bond design for cyber risk management of power systems. IEEE Trans. Smart Grid 2021, 13, 1516–1528. [Google Scholar] [CrossRef]
- Acharya, S.; Mieth, R.; Konstantinou, C.; Karri, R.; Dvorkin, Y. Cyber insurance against cyberattacks on electric vehicle charging stations. IEEE Trans. Smart Grid 2021, 13, 1529–1541. [Google Scholar] [CrossRef]





| Framework (Ref.) | Main Contribution | Limitations/Simplifications |
|---|---|---|
| Lau et al. [13,14] | Defense-aware and mutual insurance mechanisms for cyber risk management in critical infrastructures | Typically abstracts IoT topology and/or assumes static risk; does not explicitly model topology-driven propagation coupled with discrete maturity tiers |
| Zhang and Zhu [3] | Game-theoretic cyber insurance (FlipIn) for incentive-compatible risk management in IoT systems | Risk is primarily modeled through strategic payoff structures; limited integration of maturity-tier implementation costs with topology-weighted propagation dynamics |
| Shah et al. [15] | Non-cooperative game balancing security decisions under resource constraints in IoT networks | Often relies on simplified/homogeneous parameterization; does not capture correlated losses arising from topology-driven propagation |
| Pal et al. [2] | Sustainable catastrophic cyber-risk management in IoT societies using insurance-aware strategies | Focuses on catastrophic/system-level risk abstraction; does not explicitly link discrete maturity tiers to SIS-style propagation and premium optimization |
| This work | Maturity-aware SIS propagation + topology-weighted exposure + Stackelberg insurance optimization | Assumes organization-level maturity M (uniform across devices); device-group-specific maturity remains future work |
| Network Parameters | |
| IoT network graph | |
| N | Set of devices (nodes) |
| Total number of devices | |
| E | Set of connections (edges) |
| W | Weighted adjacency matrix |
| Spectral radius of the adjacency matrix W | |
| Probability of lateral links (Erdos–Rényi model) | |
| Base infection transmission rate in SIS model | |
| Base recovery rate in SIS model | |
| Attacker adaptation rate | |
| Risk Modeling | |
| Infection level of device n at time t | |
| Effective risk of device n at time t | |
| Steady-state effective risk for device n | |
| Loss magnitude per breach ($) for device n | |
| Risk propagation discount factor, | |
| Influence weight from device m to n | |
| Set of neighbors of device n | |
| Mitigation factor, | |
| Mitigation decay rate | |
| Maturity-aware recovery rate | |
| Effective infection rate, | |
| Defender Parameters | |
| M | Risk maturity level, |
| p | Continuous operational security investment level |
| Efficiency of continuous security investment | |
| Total security investment cost for device n | |
| k | Investment cost scaling factor |
| Organizational maturity cost function | |
| Scaling parameter for organizational maturity cost | |
| Exponential scaling factor for organizational maturity cost | |
| Security investment budget for device n | |
| Defender total expected cost | |
| Expected effective loss for device n | |
| Insurance Parameters and Optimization | |
| Insurance coverage level, | |
| Insurance premium for device n | |
| Uniform insurance premium | |
| Insurer expected profit for device n | |
| Average expected profit under uniform pricing | |
| Premium loading factor, | |
| Device-specific premium loading factor | |
| Minimum feasible loading factor | |
| Aggregate profit margin, | |
| Per-device fixed administrative expense loading | |
| Stackelberg equilibrium strategies | |
| Parameter | Value(s) | Justification |
|---|---|---|
| 60 | Represents a standard single-site enterprise IoT deployment. | |
| 0.35 | Base transmission rate. Models an environment with highly exploitable IoT vulnerabilities and rapid lateral movement (e.g., Mirai-like propagation). | |
| 0.12 | Base recovery rate. Reflects notoriously slow IoT remediation challenges, including limited maintenance windows and heterogeneous firmware support [23]. | |
| (k$) | Gateways: Cameras: Sensors: | Financial loss potential assigned uniformly within bands based on asset criticality and potential operational downtime. |
| 0.6 | Mitigation decay rate for . Selected to yield significant risk reduction at early maturity tiers, plateauing at higher tiers (diminishing returns). | |
| k | 800 | Scales fractional continuous investment into monetary cost (k$), ensuring comparability with loss severity coefficients. |
| (k$) | 210, 318} | Convex structural capital expenditure mapped to NIST CSF tiers. Derived to reflect the escalating costs of transitioning from ad hoc tools () to a fully automated 24/7 SOC (). |
| 0.15 | Premium loading factor (15%), standard in cyber-insurance to cover volatility and risk margin. |
| Maturity | Coverage | Expected Loss | Premium | Implementation Cost | Total Cost |
|---|---|---|---|---|---|
| (M) | (Cn) | (k$) | (k$) | (k$) | (k$) |
| 1 (Baseline) | 1.0 | 0.00 | 225.38 | 30.00 | 255.38 |
| 0.8 | 35.42 | 184.65 | 30.00 | 250.07 | |
| 0.5 | 88.55 | 123.55 | 30.00 | 242.10 | |
| 3 (Optimal) | 1.0 | 0.00 | 26.36 | 126.00 | 152.36 |
| 0.8 | 0.81 | 25.43 | 126.00 | 152.24 | |
| 0.5 | 2.02 | 24.04 | 126.00 | 152.05 | |
| 5 | 1.0 | 0.00 | 21.95 | 318.00 | 339.95 |
| 0.8 | 0.04 | 21.91 | 318.00 | 339.95 | |
| 0.5 | 0.10 | 21.84 | 318.00 | 339.94 |
| Coverage | Step | Impl. Cost | (Loss+Premium) | Total Cost | |
|---|---|---|---|---|---|
| Cn | (k$) | (k$ Saved) | (k$) | ||
| 2 | |||||
| 2 | |||||
| 2 | |||||
| 2 | |||||
| 2 | |||||
| 2 |
| Device Profile | Expected | Uniform Pricing | Risk-Prop. Pricing | ||
|---|---|---|---|---|---|
| Loss (k$) | Premium | Profit Margin | Premium | Profit Margin | |
| Gateway (High-Risk) | $3.50 | $1.25 | −180.0% | $4.13 | +15.1% |
| Sensor (Low-Risk) | $0.30 | $1.25 | +76.0% | $0.45 | +32.2% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Bhusal, B.; Li, D.; Wang, X.; Yu, G. Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics 2026, 15, 1038. https://doi.org/10.3390/electronics15051038
Bhusal B, Li D, Wang X, Yu G. Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics. 2026; 15(5):1038. https://doi.org/10.3390/electronics15051038
Chicago/Turabian StyleBhusal, Bishwa, Delong Li, Xu Wang, and Guangsheng Yu. 2026. "Maturity-Aware Cyber Insurance Optimization in IoT Networks" Electronics 15, no. 5: 1038. https://doi.org/10.3390/electronics15051038
APA StyleBhusal, B., Li, D., Wang, X., & Yu, G. (2026). Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics, 15(5), 1038. https://doi.org/10.3390/electronics15051038

