Next Article in Journal
Recent Progress of Millimeter-Wave Silicon-Based Integrated Mixers for Broadband Wireless Communication: A Comprehensive Survey
Next Article in Special Issue
Robust and Adaptive Dual-Defense Framework Against Data Poisoning Attacks in Recommendation Systems
Previous Article in Journal
Towards 6G C-V2X Networks: A Comprehensive Survey on Mobility Management, Multi-RAT Coexistence, and Machine Learning (3M) Framework for C-ITS
Previous Article in Special Issue
BERTSC: A Multi-Modal Fusion Framework for Stablecoin Phishing Detection Based on Graph Convolutional Networks and Soft Prompt Encoding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maturity-Aware Cyber Insurance Optimization in IoT Networks

by
Bishwa Bhusal
*,
Delong Li
,
Xu Wang
* and
Guangsheng Yu
School of Electrical and Data Engineering, University of Technology Sydney, Sydney, NSW 2007, Australia
*
Authors to whom correspondence should be addressed.
Electronics 2026, 15(5), 1038; https://doi.org/10.3390/electronics15051038
Submission received: 28 January 2026 / Revised: 25 February 2026 / Accepted: 26 February 2026 / Published: 2 March 2026

Abstract

As the rapid evolution and expansion of Internet of Things (IoT) devices continues to accelerate, modern infrastructures face increasing cyber risks, largely driven by device inter-connectivity, limited security maturity, and interdependent attack propagation across networks. Traditional cyber insurance models often overlook these IoT-specific characteristics, relying on uniform or simplified risk assumptions that fail to capture real-world vulnerabilities. To address this gap, this paper presents a maturity-aware cyber insurance optimization framework tailored for interconnected IoT environments. The framework integrates organizational security maturity, interdependent risk propagation modeled through a modified Susceptible–Infected–Susceptible (SIS) process, and a Stackelberg game formulation that captures strategic interactions between the insurer and the defender. Through numerical studies on representative IoT topologies, we demonstrate that maturity-aware, risk-sensitive premium structures quantitatively outperform uniform pricing baselines in cost-efficiency and insurer sustainability. Specifically, our experimental results reveal that operating at an optimal intermediate maturity level ( M = 3 ) reduces the defender’s total expected cost by approximately 40 % (from 255.38 k to 152.36 k) compared to the baseline state ( M = 1 ). Furthermore, this structural hardening triggers an 88.3 % reduction in full-coverage insurance premiums (from 225.38 k to 26.36 k). In contrast, our uniform-pricing baseline exhibits reduced profitability in our experiments due to cross-subsidization effects, reinforcing the value of tiered, risk-proportional pricing for mitigating adverse-selection incentives. In summary, this work establishes a tractable, economically viable framework for cyber insurance in IoT ecosystems and provides a foundation for future extensions to richer network settings.

1. Introduction

Cyber insurance has emerged as a critical risk management strategy for modern Internet of Things (IoT) infrastructures, serving as a necessary mechanism to mitigate the consequences of cyber incidents [1,2]. By transferring part of the cyber risk from IoT operators to insurers, cyber insurance incentivizes security investments while providing economic resilience against attacks. In this setting, multiple stakeholders interact strategically, where insurers design insurance contracts and premiums, defenders are responsible for securing IoT networks, and attackers adapt their strategies in response to deployed defenses [3,4,5]. However, a central challenge in IoT settings is that security effectiveness is strongly shaped by the organization’s security maturity to consistently implement, monitor, and improve cybersecurity controls and response processes [6,7,8]. While insurance provides economic resilience, it does not reduce the underlying probability of attack. On the contrary, investing in higher security maturity reduces risk at the source but incurs escalating implementation costs. This creates a complex decision problem: relying solely on insurance can lead to negligence (moral hazard), while striving for maximum maturity may be economically infeasible.
This trade-off is particularly drastic in the rapidly expanding IoT landscape, which forms the complex background of this study. The hyper-connectivity of modern infrastructures enables widespread connectivity across devices in homes, industries, transportation, and healthcare [9,10]. However, this widespread connectivity increases the attack surface and allows compromise to propagate across interdependent devices, so that local vulnerabilities can generate system-wide cascading risk [11,12]. Consequently, risk management in IoT requires models that jointly capture (i) dynamic infection/risk propagation, (ii) maturity-driven mitigation and recovery capability, and (iii) strategic insurance design that aligns incentives between insurers and defenders.
A central challenge in securing IoT systems is developing effective mechanisms to quantify and manage cyber risk under varying levels of network-wide security maturity in a way that aligns defender incentives with insurer profitability, while risk propagation across interconnected devices is important, conventional models often fail to capture both maturity differences and strategic interactions between insurer and defender. In this context, security maturity refers to the level of defensive capability of an organization or system, reflecting its ability to prevent, mitigate, and recover from cyber incidents, as characterized by established cybersecurity maturity models [8]. Despite its importance, security maturity is often treated implicitly or abstracted into a single investment variable in existing cyber insurance models. Such abstractions fail to capture how maturity-driven defensive capabilities interact with network connectivity and strategic insurance decisions. As a result, current models struggle to accurately reflect risk differentiation, premium fairness, and incentive alignment in IoT environments. This gap motivates the need for cyber insurance frameworks that explicitly incorporate security maturity alongside network-based risk propagation and strategic stakeholder interactions.
The existing research on IoT cyber insurance has laid valuable groundwork. Lau et al. [13,14] propose defense-aware and mutual insurance strategies for critical infrastructure. Game-theoretic frameworks such as FlipIn [3], and non-cooperative models [15] explore the strategic alignment of incentives and premiums. Meanwhile, AI-driven approaches [16,17,18] seek to improve prediction and risk assessment. Despite these advances, many models simplify the problem by assuming uniform risk parameters or ignoring complex topological dependencies and threat propagation. While our framework also adopts certain simplifying assumptions for tractability, it explicitly incorporates variations in organizational security maturity and interdependent risks across the network, which enables a more representative assessment of systemic risk than uniform models.
In this paper, we propose a maturity-aware cyber insurance framework tailored for interconnected IoT networks that models insurance design, defensive investment, and network-based cyber risk. The proposed framework enables insurers to price coverage based on maturity-aware, network-driven risk exposure, while allowing defenders to optimally balance security investment and insurance adoption. Our model captures variations in device-level risk exposure and network-wide security maturity, while also modeling interdependent risk propagation across the network. The interaction between insurer and defender is formulated as a Stackelberg game, capturing the strategic interdependence between premium design and defensive decision-making.
To address the challenges of cyber insurance design in IoT, this paper incorporates the following key contributions:
  • Maturity-Aware Insurance Mechanisms: This work proposes insurance mechanisms that explicitly account for device-specific risk levels and organizational security maturity. The insurer premium-setting process is designed to incentivize better security practices while ensuring profitability and fairness in the IoT ecosystem.
  • Topology-Aware Risk Modeling in IoT Networks: The paper develops a tractable framework that captures how cyber risk propagates across interconnected IoT devices. Unlike traditional models that ignore interdependence, this approach incorporates network structure, security maturity levels, and risk mitigation, enabling accurate assessment of systemic cyber threats.
  • Optimization of Cyber Insurance Policies Using Game Theory: This work formulates a dual-optimization approach for both defender and insurer, leveraging game-theoretic principles. By balancing security investments, insurance premiums, and risk mitigation efforts, the model enhances decision-making for cyber insurance policies in interconnected IoT environments.
Our formulation includes interdependent optimization problems, and we validate the framework through numerical experiments on a representative IoT network. The results illustrate that maturity-aware pricing can shift the defender’s optimal decisions toward improved security at lower total expected cost, while preserving insurer profitability constraints. Across the tested parameter settings, we observe a non-trivial trade-off in which intermediate maturity levels can be cost-efficient when implementation costs exhibit diminishing returns in risk reduction.
The rest of this paper is organized as follows. Section 2 reviews related work. Section 3 presents the system model, detailing the interaction flow, Susceptible–Infected–Susceptible (SIS)-based risk propagation dynamics, and the security maturity framework. Section 4 formulates the optimization problems and game-theoretic modeling to analyze insurer–defender strategies. Section 5 provides numerical results, demonstrating the effectiveness of the maturity-aware framework and its economic superiority over conventional baselines. Finally, Section 6 concludes the paper and outlines future research directions.

2. Related Work

Cyber insurance has been extensively studied as a risk transfer mechanism for digital infrastructures, particularly in contexts where direct prevention of all cyber incidents is infeasible. Prior works have addressed both the theoretical formulation of cyber insurance policies and their application to real-world systems, including IoT networks and critical infrastructure.

2.1. Cyber Insurance for Infrastructure and IoT Networks

Lau et al. [13,14] investigate cyber insurance schemes for power systems, focusing on defense-aware premium strategies and mutual insurance among smart grid participants. These models highlight how collaborative insurance pools and optimized premium structures can incentivize stronger security investments. Pal et al. [2] propose sustainable cyber-risk management frameworks, integrating insurance with proactive defense strategies to minimize long-term system-level risk.

2.2. Game-Theoretic Models

Game theory has emerged as a powerful tool in modeling the strategic interactions between insurer and defender. Zhang et al. [3] introduce FlipIn, a Stackelberg-based incentive-compatible cyber insurance model for IoT networks that aligns defender behavior with insurer goals. Shah et al. [15] develop non-cooperative models to optimize the balance between insurance premiums and individual device-level security investments under constrained resources.

2.3. Dynamic and Game-Theoretic Optimization in Cyber Insurance

Recent research has emphasized the importance of dynamic optimization and strategic decision-making in cyber insurance modeling. Building upon static frameworks, several studies have proposed game-theoretic approaches to capture the incentive alignment between insurers and defenders in interconnected IoT systems. For example, Zhang et al. [3] develop FlipIn, a Stackelberg-based model that aligns defender behavior with insurer profit strategies, while Shah et al. [15] investigate non-cooperative games that balance insurance premiums with device-level investments. Furthermore, Zhang et al. [5] explore game-theoretic defenses against Advanced Persistent Threats (APTs), and Huang et al. [4] investigate dynamic games for proactive defense, distinguishing time-varying strategies from static baselines. These studies highlight the need for maturity-aware and incentive-compatible insurance mechanisms that adapt to varying maturity levels rather than relying on uniform risk assumptions. Table 1 summarizes these representative cyber-insurance and network-risk frameworks and their limitations.

2.4. Limitations of Existing Models

While these efforts have laid a solid foundation for cyber insurance in digital ecosystems, several limitations remain. Most notably, many of the existing works assume simplified network topologies, uniform risk exposure, or centralized control, which do not reflect the topological complexity and volatility inherent in IoT systems. Few models explicitly incorporate time-varying device infection, or security maturity dynamics into the risk and contract formulation. This gap motivates the need for dynamic, topology-aware cyber insurance models that co-evolve with the IoT environment.
Many existing cyber-insurance and network-risk models adopt simplifying mathematical assumptions for tractability. Common examples include:
  • Mean-field/homogeneous-mixing approximations: infection (or compromise) dynamics are modeled using a single aggregate prevalence state (or population-average infection probability), implicitly assuming homogeneous contact rates and ignoring device-to-device adjacency effects. This removes explicit graph/topology dependence and cannot represent localized cascades or high-degree “hub” exposure.
  • Static expected-loss models: risk is computed from stationary vulnerability/exposure scores (or independent breach probabilities) without an explicit propagation process over network links. Under such models, devices are treated as conditionally independent and correlated loss amplification via neighboring compromise is not captured.
  • Uniform risk parameters: heterogeneous IoT devices are often assigned identical (or class-agnostic) parameters (e.g., uniform infection/breach rate, uniform recovery/remediation rate, or uniform loss severity), which effectively assumes all devices share the same exposure and control effectiveness.
  • Simplified topological dependence: when topology is included, it is frequently represented via coarse summaries (e.g., average degree) or unweighted links, rather than adjacency-weighted dependencies. As a result, the influence of specific neighbors and edge weights (i.e., w n , m ) on a device’s risk is typically omitted.
In contrast, our framework explicitly incorporates (i) topology-weighted propagation through neighbor influence terms, (ii) device heterogeneity via exposure/loss coefficients, and (iii) maturity-dependent mitigation that links organizational security posture to risk propagation and pricing incentives. These design choices enable us to capture systemic risk and adverse selection effects that are obscured under the above simplifications.
Furthermore, while our proposed framework introduces maturity dynamics, it currently models security maturity (M) as a uniform, organizational-level parameter. This approach effectively captures macro-level security governance and compliance but mathematically simplifies the Stackelberg game by constraining the defender’s strategy space to a single discrete variable. However, real-world IoT networks are highly heterogeneous. Treating M as uniform limits the model’s ability to precisely capture deeply segmented environments, such as those where highly vulnerable legacy sensors operate alongside heavily secured modern controllers. Consequently, device-specific or subnetwork-specific maturity variations ( M n or M s u b n e t ) remain an important limitation that future models must address to provide maximum fidelity.

3. System Model

In this section, we describe the system model, which consists of four key components: the attacker, IoT devices/nodes, defender, and insurer. Figure 1 illustrates the interactions among these components. A comprehensive summary of all mathematical notations used throughout this model is provided in Table 2.

3.1. Components and System Workflow

We consider an IoT network represented by an undirected graph G = ( N , E ) , where N is the fixed set of devices and E is the set of communication links. Each device n N can be in either a secure or compromised state. Attacks propagate along the edges E, with weights w n , m representing the vulnerability of communication from device m to device n. Defender invests in security controls to reduce infection and improve recovery. Security investments are represented through a maturity parameter M { 1 , 2 , 3 , 4 , 5 } , treated as a discrete variable, where higher values correspond to stronger security practices and resilience. This discrete scale is consistent with widely adopted cybersecurity maturity frameworks, such as the CMMI Cybermaturity Platform [7,8] and the NIST Cybersecurity Framework [6]. In this work, the security maturity level M is modeled as an organizational-level policy rather than a device-specific parameter. This reflects the fact that maturity corresponds to enterprise-wide governance, processes, and compliance practices that apply uniformly across all deployed IoT assets, rather than being tied to individual device capabilities.
The operation of the system can be summarized as follows:
  • The attacker compromises IoT devices, thereby increasing the risk levels within the network.
  • The defender evaluates these risks via risk assessment and applies mitigation measures along with security investments.
  • In response, the insurer analyzes the assessed risk and offers cyber insurance through tailored premiums and coverage.
  • The defender receives the insurance, which helps offset potential losses, and may further adjust their security posture based on the coverage received.

3.2. Risk Management Maturity Model

The mitigation factor μ ( M ) and recovery rate ρ M are modeled to capture the diminishing returns of security investments. We map the discrete maturity levels M { 1 , , 5 } to the tiers of the NIST Cybersecurity Framework (CSF) [6] using an expert rubric over governance, monitoring cadence, incident response readiness, and control coverage. For practical use, we assume M is assigned via a standard security maturity assessment aligned with the NIST CSF implementation tiers, based on evidence that is commonly available during internal/external audits and cyber-insurance underwriting. Such evidence typically includes security policy/process documentation, asset inventories, vulnerability/patch records, logging/monitoring configurations, incident-response plans, and records of exercises or past incidents. To make the mapping reproducible, we use the following evidence-based criteria:
  • M = 1 (Partial): Security activities are largely ad hoc and reactive. Typical evidence includes incomplete IoT asset inventory, irregular vulnerability/patch practices (no defined cadence or SLA), limited centralized logging/monitoring, and incident response handled case-by-case with minimal documented playbooks.
  • M = 2 (Risk-informed): Some practices exist but are not consistently applied. Evidence may include partial inventories, periodic patching/scanning for subsets of devices, and monitoring enabled for some systems without routine review procedures.
  • M = 3 (Repeatable): Processes are documented and consistently executed. Evidence includes a maintained IoT asset inventory with ownership, defined patch/vulnerability management cadence (or SLA targets) that is routinely followed, centralized logging for major IoT segments with regular review, and a documented incident-response plan that is exercised at least occasionally.
  • M = 4 (Adaptive): Controls are measured and improved. Evidence includes continuous/near-continuous monitoring for critical assets, formal metrics tracking (e.g., patch compliance rates or response time targets), and post-incident reviews that drive process improvements.
  • M = 5 (Optimized): Security is continuously optimized and threat-informed. Evidence includes proactive testing, automation/orchestration for response or containment, and continuous control validation across the IoT environment.
In our model, higher M represents stronger and more consistent security capability (e.g., better prevention/detection and faster remediation), which corresponds to lower effective infection propagation and higher recovery effectiveness.

Mathematical Mapping of Maturity to SIS Dynamics

To explicitly bridge the organizational maturity tiers described above to our dynamic infection model, we introduce two critical maturity-dependent modifiers to the standard SIS framework.
First, the mitigation factor, denoted as μ ( M ) = e α ( M 1 ) (where α > 0 ), captures the reduction in vulnerability exploitability. Higher maturity exponentially suppresses the effective infection rate, modeling the diminishing returns of preventative controls (e.g., transitioning from ad hoc patching to automated vulnerability management).
Second, the maturity-aware recovery rate, defined as ρ M = ρ M 1 + M , explicitly dictates the transition from the Infected (I) to the Susceptible (S) state. This formulation ensures that organizations with higher maturity remediate compromised devices faster due to better incident response readiness, while mathematically bounding the maximum recovery speed to reflect practical operational limits in IoT environments.

3.3. Modified SIS Risk Propagation Dynamics

We adopt a modified Susceptible–Infected–Susceptible (SIS) model to describe the infection dynamics within the IoT network. The traditional SIS framework captures the characteristic vulnerability lifecycle where devices transition between a Susceptible (S) operational state and an Infected (I) compromised state. However, standard SIS models assume static transmission and recovery rates. To capture the strategic realities of IoT environments, we modify this process to explicitly incorporate organizational security maturity (M) and attacker adaptivity ( λ ). In this context, the states of the model correspond to:
  • Susceptible (S): A device is operational, but contains an unpatched vulnerability and can be compromised.
  • Infected (I): The device has been successfully compromised by an attacker.
  • Transition I S (Recovery): This transition, captured by the recovery rate ρ M , represents the successful remediation and patching of the device by the defender. This action removes the current infection, but the device returns to a susceptible state, meaning it can still be compromised again via a new vulnerability or attack vector (e.g., a new malware variant or zero-day exploit).
This dynamic reflects the reality where complete and permanent immunity to cyber threats is practically unattainable in interconnected IoT systems. Thus, the SIS framework provides a tractable and representative baseline for modeling persistent cyber risk and mitigation efforts in our optimization problem.

Formal Definition of Model Parameters

The transition probabilities in our modified model are governed by the following dynamic parameters:
  • Base Infection Rate ( β ): The inherent transmission probability of a vulnerability traversing a network edge.
  • Attacker Adaptivity ( λ 0 ): A multiplier representing the attacker’s ability to intensify their efforts (e.g., deploying zero-day exploits or increasing scanning frequency).
  • Maturity-Dependent Mitigation Factor ( μ ( M ) ): An exponentially decaying function, μ ( M ) = e α ( M 1 ) , where α > 0 . This multiplicatively scales down risk, reflecting how higher maturity suppresses exposure.
  • Maturity-Aware Recovery Rate ( ρ M ): Defined as ρ M , this captures the transition I S representing successful remediation. It ensures recovery grows with diminishing returns under higher maturity while remaining bounded ( 0 < ρ M < ρ ).
We emphasize that μ ( M ) and ρ M are intended as simple, tractable mappings from discrete maturity tiers to reduce exposure/propagation and improve remediation capability, with diminishing returns. We adopt the exponential form μ ( M ) = e α ( M 1 ) because it is monotone, bounded in ( 0 , 1 ) , and captures diminishing returns in a concise way as each increase in maturity reduces the remaining exposure by a constant proportional factor governed by α . This type of bounded diminishing-returns behavior is widely used in security economics and breach-probability/risk-reduction modeling [19,20].

3.4. Infection Propagation Model

We model infection propagation in the IoT network G = ( N , E ) . Let I n ( t ) denote the infection level of device n at time t. The topology is assumed to remain fixed to reflect short-term underwriting periods in which IoT connectivity patterns remain effectively stable. The infection dynamics are given by:
I n ( t + 1 ) = ( 1 ρ M ) I n ( t ) + 1 I n ( t ) β eff ( M ) m N ( n ) w n , m I m ( t ) ,
where N ( n ) is the set of neighbors of device n. The term w n , m 0 represents the specific neighbor influence weight from device m to n. Unlike standard mean-field SIS models that assume uniform mixing and homogeneous contact rates, this topology-weighted propagation explicitly captures how a highly vulnerable or highly connected neighbor (e.g., a central gateway) disproportionately increases the risk to device n.
Within this dynamic process, the modifications explicitly manifest in two ways: the recovery of device n is directly governed by the maturity-driven recovery rate ρ M , dictating how quickly an existing infection is contained ( I S ); concurrently, the probability of contracting a new infection from compromised neighbors is scaled by β e f f ( M ) . To avoid unintuitive coupling between attacker adaptivity and defender maturity, we decompose this effective infection rate as:
β eff ( M , λ ) = β ( 1 + λ ) μ ( M ) ,
where β denotes the infection transmission rate, λ scales overall attacker aggressiveness, and  μ ( M ) decreases with maturity, so higher M suppresses the effective infection rate β eff ( M ) . Here, μ ( M ) ( 0 , 1 ] is a maturity-dependent mitigation factor that multiplicatively scales down the exposure-based risk (and thus expected loss/premium), with higher M implying smaller μ ( M ) . We use an exponentially decaying form
μ ( M ) = e α ( M 1 ) ,
with α > 0 , so that μ ( 1 ) = 1 (no mitigation at the lowest maturity) and μ ( M ) decreases monotonically with M. Hence, higher-maturity M reduces β eff ( M ) , while larger λ intensifies attack pressure against weakly protected systems.

3.4.1. Spectral Stability Condition

To ensure that the infection probabilities remain within the valid range ( I n ( t ) [ 0 , 1 ] ), we impose a standard spectral-radius-based stability requirement for discrete-time SIS models. Let W denote the weighted adjacency matrix and ρ ( W ) its spectral radius. A sufficient condition for preventing probability overflow in the update (1) is
β eff ( 1 , 0 ) ρ ( W ) < 1 ,
which constrains the worst-case effective transmission rate (at M = 1 and p = 0 ) relative to the structural amplification factor of the network. This condition is enforced when selecting ( β , λ , W ) in the numerical studies.

3.4.2. Maturity-Aware Recovery Rate

To ensure that the recovery rate remains bounded and numerically stable for all maturity levels, we define the effective recovery rate as
ρ M = ρ M 1 + M ,
which satisfies 0 < ρ M < ρ for any M > 0 , since M / ( 1 + M ) < 1 . Empirical and game-theoretic studies [21] show that mitigation effectiveness grows with diminishing returns under cyber insurance. Consistent with these findings, the bounded, saturating form in (5) preserves the monotonic increase in recovery with higher maturity M, while preventing instability in the infection dynamics of Equation (1). Maturity affects both exploitability (via μ ( M ) ) and remediation speed (via ρ M ), capturing two distinct stages of the attack lifecycle without double counting.

4. Optimization with Game-Theoretic Modeling

4.1. Defender Optimization Problem

The defender chooses their investment in security maturity M, coverage C n , and continuous investment p to minimize their total expected cost, which combines direct security expenditure with expected loss from infection. A linear risk model is adopted for tractability and consistency with additive actuarial pricing, while still capturing direct and propagated infections.
The effective risk of device n at time t is modeled as:
R n ( t , M ) = μ ( M ) I n ( t ) + η m N ( n ) w n , m I m ( t ) .
where R n ( t , M ) is a maturity-adjusted risk exposure at time t that incorporates both local and propagated infections. μ ( M ) decreases with maturity, and  η [ 0 , 1 ] scales the indirect liability risk. The term I n ( t ) captures the direct infection probability of the device itself, representing primary first-party loss potential. The summation m N ( n ) w n , m I m ( t ) accounts for risk propagated from neighboring devices, weighted by their influence w n , m , representing correlated liability risk (e.g., third-party damages or cross-contamination cleanup). Although both terms are expressed in terms of infection levels, they represent distinct risk channels: direct compromise versus indirect propagation.
Since the insurance contract covers a fixed period, the pricing and cost analysis rely on the long-term, asymptotic behavior of the network. For the economic optimization, we define the steady-state risk exposure, R n ( M ) , derived directly from the limit of the modified SIS process:
R n ( M ) = lim t R n ( t , M )
This metric, R n ( M ) , precisely quantifies the composite expected financial exposure of device n under organizational maturity level M. It encapsulates both the steady-state likelihood of direct compromise and the weighted collateral liability propagating from its topological peers. Consequently, R n ( M ) serves as the foundational risk signal used by the insurer to dynamically price the premium.

4.2. Expected Effective Loss

The loss faced by the defender is mitigated by insurance. The insurance coverage level C n [ 0 , 1 ] represents the proportion of risk covered for device n, while γ n denotes the unit cost incurred per unit risk. The expected effective loss depends on the infection level and maturity-based mitigation. Furthermore, continuous security investment p reduces the magnitude of losses by a factor of e θ p . The expected loss is given by:
L n ( M , C n , p ) = ( 1 C n ) γ n R n ( M ) e θ p ,
where θ represents the efficiency of continuous investment. A higher M reduces the effective risk R n ( M ) , while higher p mitigates the financial impact of residual breaches. The variable p represents severity-reducing controls (e.g., monitoring, backups) that lower financial loss but do not influence infection frequency, which is governed solely by M in the SIS dynamics.

4.3. Security Investment Cost

Security investments reduce risk but incur increasing marginal costs. The total security cost for device n is defined as:
c n ( p , M ) = k p 2 + ϕ ( M ) | N |
This cost function consists of two distinct components representing different economic realities of cybersecurity defense:
Continuous Operational Investment ( k p 2 ): Here, p 0 represents the fractional level of continuous operational investment (e.g., frequency of patch deployment, intensity of active network monitoring), and  k > 0 is a cost-scaling coefficient. The quadratic form, k p 2 , is widely adopted in classical security economics literature, such as the Gordon–Loeb model [19], to represent the strictly increasing marginal cost of day-to-day operational defenses. In practice, achieving initial basic coverage (low p) is relatively inexpensive, but incrementally pushing toward perfect, zero-day threat prevention requires an exponentially larger allocation of human and computational resources (e.g., expanding a security team’s hours to review diminishing numbers of edge-case logs).
Organizational Maturity Cost ( ϕ ( M ) ): The term ϕ ( M ) | N | denotes the per-device share of the global organizational maturity cost. ϕ ( M ) represents the discrete, structural capital expenditure required to achieve and maintain a specific NIST CSF maturity tier [6]. We model ϕ ( M ) as a strictly convex discrete function (e.g., ϕ ( M ) = c m a t ( e τ ( M 1 ) 1 ) , where c m a t and τ are scaling parameters) to reflect the disproportionate capability jumps required at higher tiers. From a real-world perspective, transitioning from M = 1 (Partial) to M = 2 (Risk-informed) may only require relatively low-cost investments like purchasing basic inventory scanning tools. However, advancing from M = 4 (Adaptive) to M = 5 (Optimized) demands massive organizational overhauls, such as deploying fully automated SOAR (Security Orchestration, Automation, and Response) platforms, hiring specialized red-teams, and maintaining a continuous 24/7 Security Operations Center (SOC).

4.4. Insurance Premium (Tiered by Risk)

The premium charged for device n is given by the insurer pricing rule in (11), and enters the total cost of defender through T n ( C n , M ) .

4.5. Objective Function

The total cost of the defender is given by:
min M , I L n ( M , C n , p ) + c n ( p , M ) + T ( C n , M )
subject to:
M { 1 , 2 , 3 , 4 , 5 } , c n ( p , M ) B n , C n [ 0 , 1 ]
As illustrated in Figure 2, the model forms a feedback loop in which defender decisions affect infection dynamics, which in turn affects premiums and subsequent decisions.

4.6. Insurer Optimization Problem

The insurer is modeled as the Stackelberg leader and sets the premium T n ( C n , M ) anticipating the subsequent choice of maturity of the defender M, coverage C n , and investment p.
The premium for device n is given by
T n = ( 1 + χ ) C n γ n R n ( M ) e θ p + A c ,
where χ 0 is the loading factor and A c is per-device fixed expense loading, chosen as 5% of the average per-device baseline risk at maturity ( M = 1 ). This component accounts for operational overheads (e.g., underwriting and administration) that remain fixed regardless of subsequent risk mitigation by the defender. The term R n ( M ) is interpreted as the insurer assessed risk level for maturity M, obtained from the SIS-based risk model. Thus, although  R n ( M ) arises from the infection dynamics, it is treated as a known quantity once M is chosen. In the premium model, we assume the continuous investment p (e.g., configuration hardness, patch frequency) is observable by the insurer. In modern IoT contexts, this is increasingly feasible through remote attestation protocols and automated compliance auditing, while moral hazard remains a challenge in general insurance, IoT devices allow for higher observability than traditional IT. We account for the cost of this monitoring in the fixed administrative loading A c .
The insurer’s expected profit for device n, denoted as Π n , is defined as the premium received minus the expected claim payout. The defender’s loss function L n Equation (8) represents the retained loss (the portion 1 C n not covered by insurance). The insurer is responsible for the covered portion. Thus, the profit function is:
Π n = T n C n γ n R n ( M ) e θ p ,
where L n ( M , C n , p ) is the expected loss expression of the defender defined in Equation (8) which already reflects the remaining loss of the defender after insurance (via the factor ( 1 C n ) ). It represents the insurer expected net balance, since the covered portion of the loss is implicitly accounted for through C n in the defender loss expression.
To avoid underpricing, premiums must satisfy the constraint
T n ( 1 + χ min ) C n γ n R n ( M ) + A c ,
which ensures that the loading factor χ remains above a minimum feasible value χ min .
Aggregating across all devices, an additional profitability constraint is imposed:
n N Π n δ ,
where δ 0 represents the minimum acceptable profit margin of the insurer. The insurer optimization problem is therefore
max { C n , χ } n N Π n s . t . T n satisfies ( 13 ) , n N Π n δ , χ χ min .
Under the Stackelberg timing, the insurer commits to the pricing parameters (e.g., χ and A c ) that define the schedule T n ( C n , M ) . After observing this schedule, the defender chooses ( M , { C n } , p ) to minimize total cost.

4.7. Stackelberg Game Formulation and Equilibrium

The interaction between the insurer and the defender is formally modeled as a single-leader, single-follower Stackelberg game. This structure captures the strategic interdependence between premium design and defensive decision-making, coupled entirely through the maturity-aware risk exposure R n ( M ) . The steady-state risk exposure R n ( M ) , derived from the topology-aware SIS process, acts as the central bridge in this game. The defender’s choice of maturity M structurally determines R n ( M ) . The insurer utilizes this explicit risk signal to price the premium T n , which in turn drives the defender’s economic optimization.
Follower’s Problem (defender): Given an announced premium pricing schedule by the insurer, the defender aims to minimize their total expected cost (TEC), which consists of residual expected losses, implementation costs, and insurance premiums. The defender’s decision variables are the organizational maturity level M, continuous investment p, and per-device coverage levels C n . For a given premium schedule T n , the defender solves:
( M * , p * , { C n * } ) arg min M , p , { C n } n N L n ( M , C n , p ) + c n ( p , M ) + T n ( C n , M )
subject to the constraints:
M { 1 , 2 , 3 , 4 , 5 } , c n ( p , M ) B n , C n [ 0 , 1 ]
where L n is the residual expected loss Equation (8) and c n is the implementation cost Equation (9).
Leader’s Problem (insurer): Anticipating the defender’s rational optimal response ( M * , p * , { C n * } ) , the insurer designs the premium structure to maximize aggregate expected profit. The primary decision variable for the insurer is the premium loading factor χ , which scales the premium relative to the assessed risk R n ( M ) . The insurer solves:
χ * arg max χ χ m i n n N Π n ( χ , M * , p * , C n * )
subject to the profitability and feasibility constraints:
T n ( 1 + χ m i n ) C n γ n R n ( M ) + A c n N , and n N Π n δ
where Π n is the per-device profit Equation (12) and δ is the minimum acceptable aggregate profit margin.
A Stackelberg equilibrium is reached at the strategy profile ( χ * , M * , p * , { C n * } ) where neither party can improve their respective objective by unilateral deviation. Because M is chosen from a finite discrete set and ( { C n } , p , χ ) lie in compact feasible sets, standard continuity arguments ensure that an equilibrium exists for this timing structure.

4.8. Equilibrium Behavior and Tiered Incentives

The interaction between defender decisions and insurer pricing naturally leads to an equilibrium under the Stackelberg structure. The insurer pricing rule influences the defender choice of maturity, coverage, and investment, while the defender response is taken into account when the insurer sets premiums. When both optimization problems are satisfied simultaneously, neither party benefits from unilaterally adjusting its decision, resulting in a consistent equilibrium outcome.
A key feature of the model is the emergence of tiered incentives. Higher maturity levels reduce the effective risk R n ( M ) and therefore yield lower premiums, while low maturity results in higher premiums due to elevated risk exposure. This structure aligns the incentives of both parties: defenders are encouraged to improve their security posture when economically beneficial, and the insurer maintains sustainable profitability across different maturity levels.

5. Validation and Numerical Results

We evaluate the proposed cyber-insurance framework using a numerical simulation of a representative IoT environment. This unified study validates the key components of the model: (i) SIS infection dynamics with attacker adaptivity, (ii) maturity-saturated recovery, and (iii) maturity-aware premium optimization.

5.1. Simulation Environment and Topology

To ensure the evaluation reflects modern deployment conditions, we construct a representative single-site enterprise IoT network. We refer to the 2024 IoT Security Benchmark Report (Starfleet Research/Palo Alto Networks) [22], the ENISA Threat Landscape 2025 [12], and established hierarchical IoT topologies [10] to motivate the device roles and structural hierarchy.
The network consists of | N | = 60 devices organized in a tiered hierarchical topology: 1 controller, 4 gateways, 10 cameras, 30 sensors/actuators, and 15 utility devices (APs/HVAC). Edges are deterministically connected vertically (Controller ↔ Gateways, Gateways ↔ Endpoints). To model localized connectivity and the risk of lateral movement across the same network segment, we introduce sparse lateral links among endpoints using an Erdós–Rényi random graph model with probability p l = 0.03 . This results in a hybrid topology with a heavily skewed degree distribution: gateways act as highly connected routing “hubs” (average degree 12 ), while endpoints have low localized connectivity (average degree 2.5 ).

5.2. Baseline Parameterization

Table 3 comprehensively details the parameters utilized in the numerical studies, alongside their justifications.
The baseline parameters are selected to represent operational constraints and threat conditions commonly observed in enterprise IoT deployments. We note that changing baseline parameters (e.g., β , ρ , and k) primarily shifts the magnitude and the exact location of the minimum total cost, but does not change the qualitative mechanism: diminishing returns in μ ( M ) combined with convex investment cost ϕ ( M ) preserves a U-shaped total cost curve, naturally yielding an intermediate economically optimal maturity level.

5.3. Infection Dynamics

Before evaluating economic outcomes, we validate the temporal behavior of the infection model. Figure 3 illustrates the network infection prevalence over time for varying maturity levels.
For low maturity ( M = 1 ), the infection rapidly spreads, reaching a high steady-state prevalence due to slow recovery and high transmission rates. In contrast, at high maturity ( M = 5 ), the combination of robust mitigation ( μ ( M ) ) and rapid recovery ( ρ M ) suppresses the outbreak almost immediately, maintaining near-zero prevalence.
Crucially, at the intermediate maturity ( M = 3 ), the system demonstrates a controlled but persistent infection level, confirming that the underlying SIS dynamics correctly capture the non-linear impact of security investments where total eradication is distinct from containment.

5.4. Defender Strategy and Economic Efficiency

In this section, we analyze the total cost minimization problem of the defender and quantify the economic advantage of the proposed framework against a static baseline. We further evaluate the impact of varying insurance coverage levels C n on the defender’s total cost.

5.4.1. Optimality Analysis

Table 4 details the numerical breakdown of the defender cost components across all maturity levels. The “Impl. Cost” column represents the total security expenditure, comprising both the fixed structural hardening cost ϕ ( M ) and the continuous operational investment cost k p 2 .
The results reveal a clear convex cost structure (a ‘U-curve’). At low maturity ( M = 1 ), costs are dominated by high premiums (up to $225.38 k) or significant residual losses (up to $88.55 k at C n = 0.5 ). Conversely, at high maturity ( M = 5 ), while risk is negligible, the implementation costs become exorbitant ($318.00 k), exceeding the potential losses they are meant to prevent.
The global minimum occurs at the intermediate maturity M = 3 , where the total expected cost is minimized at ≈ $ 152.02 k. This indicates under the chosen parameterization that the economically optimal strategy is not to maximize security at all costs, but to balance risk reduction with investment efficiency.

5.4.2. Marginal Cost–Benefit Analysis Across Maturity

The existence of an optimal intermediate maturity (here, M = 3 ) is driven by the interaction of two competing structural forces: increasing marginal implementation cost and diminishing marginal returns in risk mitigation. The organizational maturity cost ϕ ( M ) is convex, implying that progressing to highly adaptive security tiers requires disproportionately larger capital and operational expenditure. In contrast, the mitigation factor μ ( M ) = e α ( M 1 ) exhibits diminishing returns: increasing maturity sharply reduces exposure at low tiers, but additional reductions become progressively smaller at higher tiers. This is reflected in the numerical breakdown in Table 4. Moving from M = 1 to M = 3 yields a dramatic reduction in the risk-driven premium component (e.g., from  225.38 k to 26.36 k at full coverage), whereas moving from M = 3 to M = 5 produces only marginal additional premium reduction (from 26.36 k to 21.95 k) while implementation cost increases substantially (from 126.00 k to 318.00 k). Consequently, the total expected cost becomes U-shaped across maturity levels, and the minimum occurs at an intermediate maturity where marginal risk-related savings are approximately balanced by marginal implementation cost.
Table 5 makes the economic mechanism behind the intermediate optimum explicit by comparing (i) the marginal increase in implementation cost when moving to a higher maturity tier against (ii) the marginal savings in risk-related costs (expected loss + premium). Across all coverage levels, the transition M = 1 3 yields large risk-related savings (e.g., 199.02 k at C n = 1.0 ), which substantially exceed the added implementation cost of 96.00 k, producing a net reduction in total cost (negative Δ total cost). In contrast, the transition M = 3 5 provides only negligible additional risk-related savings (approximately 4–5 k across all C n ), while requiring a much larger implementation cost increase of 192.00 k, resulting in a strong increase in total cost (positive Δ total cost). This sharp drop in marginal savings reflects diminishing returns in maturity-driven risk reduction, whereas the implementation cost grows rapidly with M. Consequently, the total expected cost exhibits a U-shaped structure across maturity levels, and the economic optimum occurs at an intermediate maturity level (here, M = 3 ) where marginal risk-related savings are no longer outweighed by marginal implementation cost.

5.4.3. Comparative Analysis: Maturity-Aware vs. Static Frameworks

To demonstrate the superiority of the proposed framework, we compare the optimal state ( M = 3 ) against a traditional static model that does not treat security maturity as a decision variable (e.g., [3]) ( M = 1 ) where security maturity is not treated as a decision variable.
As illustrated in Figure 4 and detailed in Table 4, the static baseline ( M = 1 ) suffers from high costs, reaching a total expected cost of $255.38 k at full coverage. In contrast, our maturity-aware framework ( M = 3 ) requires a higher upfront implementation investment ($126.0 k vs. $30.0 k). However, this structural hardening creates a shielding effect that drastically dampens infection rates.
Consequently, at  M = 3 and full coverage, insurance premiums drop by 88.3% (from $225.38 k to $26.36 k). Overall, the proposed model achieves a significant reduction in total expected cost compared to the static baseline. This confirms that investing in structural security maturity is significantly more cost-effective than relying solely on financial risk transfer. We specifically compare against the M = 1 baseline because it represents the “factory default” state of many IoT deployments where devices are deployed with minimal security configuration. This comparison highlights the economic gap between negligence and the optimal maturity-aware posture. Furthermore, while the specific optimal maturity ( M = 3 ) depends on the cost function ϕ ( M ) , the convexity of the total cost curve is a robust structural property driven by the diminishing returns of the mitigation factor μ ( M ) .

5.5. Insurer Strategy: Premium Structure

Next, we evaluate the insurer profitability under different premium allocation as the defender increases continuous operational investment p. We compare three pricing strategies:
  • Uniform Pricing: Premiums are averaged across the network regardless of individual device risk, with an inefficiency penalty to model adverse selection. Under uniform pricing, all devices are charged the same premium computed from the average expected loss:
    Π ¯ = 1 N n = 1 N E [ Π n ] , T n uni = ( 1 + χ ) Π ¯ + A c , n .
    The insurer profit is computed as total premiums minus total realized payout, and we apply a fixed 15 % penalty to the resulting profit as a simple proxy for inefficiency/overhead under uniform (non-risk-aligned) pricing.
  • Risk-Proportional Pricing (proposed): Premiums are strictly proportional to individual device risk R n ( M ) , following the standard pricing schedule defined in Equation (11).
  • Aggressive Pricing: High-risk devices face a steeper loading factor [24,25]. Specifically, we apply a stepped multiplier to the loading factor χ based on the potential loss magnitude γ n :
    χ n = 2.5 χ if γ n 20 1.5 χ if 10 γ n < 20 χ otherwise
    This structure imposes a 150% surcharge on critical infrastructure (e.g., controllers) and a 50% surcharge on mid-tier devices (e.g., cameras), while leaving low-risk sensors at the baseline rate.
Figure 5 shows that insurer profitability tracks the reduction in systemic risk, decreasing slightly as the defender continuous investment level p rises, thereby ensuring that premiums remain fair and proportional to the actual threat exposure. The risk-proportional strategy (orange) and aggressive strategy (green) represent the efficient frontier. As shown in the top panel, these strategies maintain robust profitability (≈ $ 23.5 k) across all investment levels. The curves exhibit a marginal downward slope, which confirms the incentive compatibility of the model: as the defender increases investment p to reduce risk, the insurer dynamically lowers premiums (11). This prevents windfall profits and passes savings back to the defender, while the fixed administrative component ( A c ) ensures the insurer remains solvent even in a high-security state.
In contrast, the uniform pricing strategy performs significantly worse, yielding aggregate profits approximately 10–15% lower than the maturity-aware strategies.
To explicitly illustrate the magnitude of this inefficiency, Table 6 breaks down the per-device economics for two distinct device profiles operating at the optimal maturity level ( M = 3 ): a high-risk routing gateway and a low-risk peripheral sensor.
Under uniform pricing, the premium is fixed across the entire network based on average expected loss. Consequently, as shown in Table 6, the insurer suffers a severe negative profit margin (−180.0%) on the high-risk gateway. This loss is heavily cross-subsidized by the low-risk sensor, which is drastically overcharged, yielding an artificially inflated margin (+76.0%) for the insurer.
In a real-world market, this massive overcharging creates strong economic incentives for low-risk participants to exit the insurance pool altogether (a classic moral hazard scenario). Once the low-risk devices drop out due to adverse selection, the insurer is left holding only the loss-making high-risk devices, directly causing the 10–15% drop in aggregate profitability observed in Figure 5. In contrast, risk-proportional pricing correctly aligns premiums with individual exposure, maintaining sustainable, positive margins across all device types. This explicit quantification confirms that maturity-aware, risk-proportional pricing is necessary not only for fairness but for the long-term economic viability of the cyber-insurance market.

5.6. Comparison with State of the Art

Our results reinforce and extend key insights from prior cyber-insurance and security economics literature, while highlighting differences that arise when topology and maturity are modeled explicitly.
  • Static (non-propagating) risk and maturity-agnostic baselines: Many of the existing cyber-insurance models treat breach risk as static and independent across assets, and do not incorporate a propagation process over network links. Under such assumptions, premiums scale primarily with device value or a fixed breach probability, and improvements in organizational maturity can only be represented implicitly (e.g., via a single global risk scalar). In contrast, our SIS-driven propagation model explicitly captures correlated losses and neighbor-driven exposure via R n ( M ) , which produces larger benefits from improving maturity at low tiers and explains the observed U-shaped total-cost curve with an interior optimum.
  • Mean-field/homogeneous-mixing epidemic approximations: A common simplification in epidemic-style security modeling is to use a population-average (mean-field) infection level, which suppresses topology-specific effects and cannot represent hub-driven cascades. Our topology-weighted formulation preserves adjacency-driven dependencies and shows that risk-proportional premiums better align incentives in heterogeneous IoT graphs, because highly exposed devices face stronger pricing pressure, reducing cross-subsidization.
  • Uniform pricing vs. risk-proportional pricing (adverse selection): Consistent with insurance theory, we observe that uniform pricing induces cross-subsidization, which can lead low-risk devices to overpay and high-risk devices to underpay. Our maturity-aware, risk-proportional pricing reduces this distortion by tying premiums to R n ( M ) , yielding a more economically efficient equilibrium and improved incentives for security investment.
Overall, compared to state-of-the-art baselines that omit propagation or maturity, our results show that explicitly modeling topology-driven risk coupling and maturity-dependent mitigation yields materially different pricing and investment outcomes: the emergence of tiered incentives, reduced adverse selection under risk-proportional pricing, and an economically optimal intermediate maturity level rather than maximal security.

6. Conclusions and Future Work

In this paper, we have proposed a maturity-aware risk modeling framework for cyber insurance in interconnected IoT networks. We developed a tractable model that accounts for topology and exposure-driven device heterogeneity, security maturity, and network-wide risk propagation. By formulating the problem as a Stackelberg game between an insurer and a defender, we demonstrated how optimal strategies emerge that balance security investments, premiums, and risk mitigation across varying coverage levels. Our numerical results confirm that the proposed framework yields economically consistent outcomes and highlights a non-trivial cost–benefit optimum. Under the adopted baseline parameterization, the defender’s total expected cost is minimized at an intermediate maturity level ( M = 3 ). Relative to the baseline state ( M = 1 ), moving to M = 3 substantially reduces the risk-driven premium component (an 88.3% premium reduction under full coverage), resulting in a minimum total expected cost of 152.36 k compared to 255.38 k at M = 1 . This interior optimum arises because maturity-driven risk reduction exhibits diminishing returns (through μ ( M ) and the resulting decline in R n ( M ) ), while the implementation cost increases rapidly with higher maturity tiers, producing a U-shaped total-cost curve. Finally, the insurer-side results indicate that tiered, risk-proportional pricing better maintains profitability and incentive alignment than a uniform pricing baseline, which suffers reduced profitability in our experiments due to cross-subsidization effects. While this work provides a strong foundation, several avenues for future research exist:
  • Dynamic Risk Modeling: Extending the static framework to a dynamic one that accounts for continuous network growth, device lifecycle changes (e.g., addition and removal), and time-varying attack patterns.
  • Multiple Defenders: Exploring a non-cooperative game where multiple, self-interested defenders compete for resources and insurance, which may lead to different equilibrium outcomes and pricing dynamics.
  • Data-Driven Risk Assessment: Integrating more advanced machine learning and AI models to provide real-time risk assessment and dynamic premium adjustment based on live threat intelligence and behavioral analytics.
  • Heterogeneous and Device-Group-Specific Maturity: Extending this framework to incorporate subnetwork or device-specific maturity vectors ( M n or M s u b n e t ). In such an extension, the topology-aware propagation model would directly couple with localized mitigation factors ( μ n ( M n ) ) and individual recovery rates ( ρ M n ). This would allow the SIS dynamics to capture complex cascading effects at boundaries. For instance, modeling how a low-maturity legacy subnetwork serves as a persistent infection reservoir, and how a high-maturity target subnetwork successfully dampens that propagation through localized effective infection rates ( β e f f ( M n ) ). Consequently, insurers could offer highly granular, component-specific premium optimizations.
  • Expanded Dimensions of Security Maturity: While the current model maps maturity primarily to vulnerability mitigation ( μ ( M ) ) and remediation speed ( ρ M ), comprehensive organizational maturity encompasses broader proactive capabilities. Future iterations could adopt a multi-dimensional maturity vector. For instance, integrating proactive threat intelligence could dynamically reduce the attacker adaptivity parameter ( λ ) over time. Similarly, advanced threat hunting and detection capabilities could be modeled by making recovery rates explicitly time-dependent rather than static. Furthermore, integrating maturity-dependent incident response readiness directly into the loss function ( L n ) could provide a higher fidelity economic model for how advanced planning mitigates catastrophic tail-risk before an infection propagates.
By addressing these challenges, future work can further enhance the adaptability and applicability of cyber insurance in the evolving landscape of IoT cybersecurity.

Author Contributions

Conceptualization, B.B. and G.Y.; methodology, B.B. and D.L.; formal analysis, B.B.; investigation, B.B.; data curation, B.B.; writing—original draft preparation, B.B.; writing—review and editing, B.B., D.L., X.W., and G.Y.; visualization, B.B.; supervision, X.W. and G.Y.; resources, X.W. and G.Y.; project administration, X.W. and G.Y.; proposed the original research direction, G.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article. The numerical results presented in this study were generated using the mathematical models and baseline parameters detailed in Section 5.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Radanliev, P.; De Roure, D.; Cannady, S.; Montalvo, R.M.; Nicolescu, R.; Huth, M. Economic impact of IoT cyber risk-analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Living in the Internet of Things: Cybersecurity of the IoT-2018; Institution of Engineering and Technology: Stevenage, UK, 2018; p. 3. [Google Scholar] [CrossRef]
  2. Pal, R.; Huang, Z.; Yin, X.; Liu, M.; Lototsky, S.; Crowcroft, J. Sustainable catastrophic cyber-risk management in IoT societies. In Proceedings of the 2020 Winter Simulation Conference (WSC); IEEE: New York, NY, USA, 2020; pp. 3105–3116. [Google Scholar] [CrossRef]
  3. Zhang, R.; Zhu, Q. {FlipIn}: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. IEEE Trans. Inf. Forensics Secur. 2019, 15, 2026–2041. [Google Scholar] [CrossRef]
  4. Huang, L.; Zhu, Q. A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. Comput. Secur. 2020, 89, 101660. [Google Scholar] [CrossRef]
  5. Zhang, L.; Zhu, T.; Hussain, F.K.; Ye, D.; Zhou, W. A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1349–1364. [Google Scholar] [CrossRef]
  6. National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. Available online: https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf (accessed on 25 February 2026).
  7. Choetkiertikul, M.; Dam, H.K.; Ghose, A.; Sunetnanta, T.T. A CMMI-Based Automated Risk Assessment Framework. In Proceedings of the 2014 21st Asia-Pacific Software Engineering Conference; IEEE: New York, NY, USA, 2014; Volume 2, pp. 63–68. [Google Scholar] [CrossRef]
  8. Rocha, A.; Alaba, F.A.; Musa, H.; Sousa, M.J.; de Vasconcelos, J.B.; Pereira, R. Cybersecurity Maturity Models: A Systematic Literature Review. In Proceedings of the The International Conference on Strategic Innovative Marketing and Tourism; Springer: Berlin/Heidelberg, Germany, 2024; pp. 179–206. [Google Scholar] [CrossRef]
  9. Boeckl, K.; Fagan, M.; Fisher, W.; Lefkovitz, N.; Megas, K.; Nadeau, E.; Piccarreta, B.; O’Rourke, D.G.; Scarfone, K. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks; NIST Internal Report NIST IR 8228; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar] [CrossRef]
  10. Minoli, D.; Sohraby, K.; Occhiogrosso, B. IoT Considerations, Requirements, and Architectures for Smart Buildings—Energy Optimization and Next-Generation Building Management Systems. IEEE Internet Things J. 2017, 4, 269–283. [Google Scholar] [CrossRef]
  11. Wang, Y.; Chakrabarti, D.; Wang, C.; Faloutsos, C. Epidemic spreading in real networks: An eigenvalue viewpoint. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems; IEEE: New York, NY, USA, 2003; pp. 25–34. [Google Scholar] [CrossRef]
  12. European Union Agency for Cybersecurity. ENISA Threat Landscape 2025; Catalogue Number: TP-01-25-025-EN-N; European Union Agency for Cybersecurity: Athens, Greece, 2025. [Google Scholar] [CrossRef]
  13. Lau, P.; Wei, W.; Wang, L.; Liu, Z.; Ten, C.W. A cybersecurity insurance model for power system reliability considering optimal defense resource allocation. IEEE Trans. Smart Grid 2020, 11, 4403–4414. [Google Scholar] [CrossRef]
  14. Lau, P.; Wang, L.; Wei, W.; Liu, Z.; Ten, C.W. A novel mutual insurance model for hedging against cyber risks in power systems deploying smart technologies. IEEE Trans. Power Syst. 2022, 38, 630–642. [Google Scholar] [CrossRef]
  15. Shah, S.B.H.; Wang, L.; Reddy, P.; Carie, A. Non-cooperative game to balance energy and security in resource constrained IoT networks. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); IEEE: New York, NY, USA, 2020; pp. 502–507. [Google Scholar] [CrossRef]
  16. Prova, N.N.I. Advanced machine learning techniques for predictive analysis of health insurance. In Proceedings of the 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI); IEEE: New York, NY, USA, 2024; pp. 1166–1170. [Google Scholar] [CrossRef]
  17. Jawhar, S.; Kimble, C.E.; Miller, J.R.; Bitar, Z. Enhancing cyber resilience with ai-powered cyber insurance risk assessment. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC); IEEE: New York, NY, USA, 2024; pp. 0435–0438. [Google Scholar] [CrossRef]
  18. Huang, Y.; Huang, L.; Zhu, Q. Reinforcement learning for feedback-enabled cyber resilience. Annu. Rev. Control 2022, 53, 273–295. [Google Scholar] [CrossRef]
  19. Gordon, L.A.; Loeb, M.P. The economics of information security investment. ACM Trans. Inf. Syst. Secur. 2002, 5, 438–457. [Google Scholar] [CrossRef]
  20. Mazzoccoli, A.; Naldi, M. An Overview of Security Breach Probability Models. Risks 2022, 10, 220. [Google Scholar] [CrossRef]
  21. Zhao, L.; Tu, C.; Mu, R. Cybersecurity investment considering risk prevention and mitigation measures: A security insurance perspective. J. Ind. Manag. Optim. 2025, 21, 4624–4648. [Google Scholar] [CrossRef]
  22. Starfleet Research; Palo Alto Networks. The 2024 Benchmark Report on IoT Security; Starfleet Research: Chicago, IL, USA, 2024; Available online: https://www.paloaltonetworks.com.au/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/the-2024-benchmark-report-on-iot-security (accessed on 25 February 2026).
  23. Souppaya, M.; Scarfone, K. SP 800-40 Rev. 4: Guide to Enterprise Patch Management Planning; NIST Computer Security Resource Center: Gaithersburg, MD, USA, 2022. [Google Scholar]
  24. Liu, Z.; Wei, W.; Wang, L. An extreme value theory-based catastrophe bond design for cyber risk management of power systems. IEEE Trans. Smart Grid 2021, 13, 1516–1528. [Google Scholar] [CrossRef]
  25. Acharya, S.; Mieth, R.; Konstantinou, C.; Karri, R.; Dvorkin, Y. Cyber insurance against cyberattacks on electric vehicle charging stations. IEEE Trans. Smart Grid 2021, 13, 1529–1541. [Google Scholar] [CrossRef]
Figure 1. Overall system model showing the interaction between key entities. The directional arrows represent the flow of risk, information, and financial interactions. The attacker injects risk into the IoT network (Device 1–3). The defender monitors this risk signal to optimize security investments, which informs the insurer pricing model. The insurer returns tailored premiums and coverage, while the defender applies mitigation measures back to the devices to dampen infection propagation.
Figure 1. Overall system model showing the interaction between key entities. The directional arrows represent the flow of risk, information, and financial interactions. The attacker injects risk into the IoT network (Device 1–3). The defender monitors this risk signal to optimize security investments, which informs the insurer pricing model. The insurer returns tailored premiums and coverage, while the defender applies mitigation measures back to the devices to dampen infection propagation.
Electronics 15 01038 g001
Figure 2. The iterative feedback loop governing the optimization game. The attacker injects infection, increasing the network risk level R n ( t , M ) . This risk determines the insurer premium T n ( t ) . In response, the defender adjusts their strategy ( M , p ) to minimize costs, which modifies the mitigation factor μ ( M ) and subsequently suppresses the infection level I ( t ) for the next time step.
Figure 2. The iterative feedback loop governing the optimization game. The attacker injects infection, increasing the network risk level R n ( t , M ) . This risk determines the insurer premium T n ( t ) . In response, the defender adjusts their strategy ( M , p ) to minimize costs, which modifies the mitigation factor μ ( M ) and subsequently suppresses the infection level I ( t ) for the next time step.
Electronics 15 01038 g002
Figure 3. Temporal evolution of the network infection prevalence for different maturity levels M. The x-axis shows the simulation time steps, and the y-axis shows the fraction of infected devices at each step. Each curve corresponds to a different maturity level. Lower maturity (e.g., M = 1 ) results in fast-spreading and persistent infection, while higher maturity levels reduce both the peak and long-term prevalence.
Figure 3. Temporal evolution of the network infection prevalence for different maturity levels M. The x-axis shows the simulation time steps, and the y-axis shows the fraction of infected devices at each step. Each curve corresponds to a different maturity level. Lower maturity (e.g., M = 1 ) results in fast-spreading and persistent infection, while higher maturity levels reduce both the peak and long-term prevalence.
Electronics 15 01038 g003
Figure 4. Economic comparison across maturity (M) and coverage ( C n ): The proposed maturity-aware model ( M = 3 ) reduces the total expected cost compared to the static competitor ( M = 1 ) across all insurance preferences. As C n decreases, the reduction in premium is offset by the increase in uncovered (retained) loss.
Figure 4. Economic comparison across maturity (M) and coverage ( C n ): The proposed maturity-aware model ( M = 3 ) reduces the total expected cost compared to the static competitor ( M = 1 ) across all insurance preferences. As C n decreases, the reduction in premium is offset by the increase in uncovered (retained) loss.
Electronics 15 01038 g004
Figure 5. Insurer profitability as a function of continuous investment level p, assuming the defender operates at the optimal maturity level ( M = 3 ). The broken y-axis reveals two distinct market dynamics. Top panel: risk-proportional (orange) and aggressive (green) strategies maintain high solvency, exhibiting only a marginal decline that confirms incentive compatibility (premiums drop as risk drops). Bottom panel: the uniform strategy (blue) suffers a significant profitability drop, quantifying the economic inefficiency caused by adverse selection when risk cannot be accurately priced.
Figure 5. Insurer profitability as a function of continuous investment level p, assuming the defender operates at the optimal maturity level ( M = 3 ). The broken y-axis reveals two distinct market dynamics. Top panel: risk-proportional (orange) and aggressive (green) strategies maintain high solvency, exhibiting only a marginal decline that confirms incentive compatibility (premiums drop as risk drops). Bottom panel: the uniform strategy (blue) suffers a significant profitability drop, quantifying the economic inefficiency caused by adverse selection when risk cannot be accurately priced.
Electronics 15 01038 g005
Table 1. Comparison of representative cyber-insurance and network-risk frameworks and their limitations.
Table 1. Comparison of representative cyber-insurance and network-risk frameworks and their limitations.
Framework (Ref.)Main ContributionLimitations/Simplifications
Lau et al. [13,14]Defense-aware and mutual insurance mechanisms for cyber risk management in critical infrastructuresTypically abstracts IoT topology and/or assumes static risk; does not explicitly model topology-driven propagation coupled with discrete maturity tiers
Zhang and Zhu [3]Game-theoretic cyber insurance (FlipIn) for incentive-compatible risk management in IoT systemsRisk is primarily modeled through strategic payoff structures; limited integration of maturity-tier implementation costs with topology-weighted propagation dynamics
Shah et al. [15]Non-cooperative game balancing security decisions under resource constraints in IoT networksOften relies on simplified/homogeneous parameterization; does not capture correlated losses arising from topology-driven propagation
Pal et al. [2]Sustainable catastrophic cyber-risk management in IoT societies using insurance-aware strategiesFocuses on catastrophic/system-level risk abstraction; does not explicitly link discrete maturity tiers to SIS-style propagation and premium optimization
This workMaturity-aware SIS propagation + topology-weighted exposure + Stackelberg insurance optimizationAssumes organization-level maturity M (uniform across devices); device-group-specific maturity remains future work
Table 2. Summary of notations.
Table 2. Summary of notations.
Network Parameters
G = ( N , E ) IoT network graph
NSet of devices (nodes)
| N | Total number of devices
ESet of connections (edges)
WWeighted adjacency matrix
ρ ( W ) Spectral radius of the adjacency matrix W
p l Probability of lateral links (Erdos–Rényi model)
β Base infection transmission rate in SIS model
ρ Base recovery rate in SIS model
λ Attacker adaptation rate
Risk Modeling
I n ( t ) Infection level of device n at time t
R n ( t , M ) Effective risk of device n at time t
R n ( M ) Steady-state effective risk for device n
γ n Loss magnitude per breach ($) for device n
η Risk propagation discount factor, η [ 0 , 1 ]
w n , m Influence weight from device m to n
N ( n ) Set of neighbors of device n
μ ( M ) Mitigation factor, e α ( M 1 )
α Mitigation decay rate
ρ M Maturity-aware recovery rate
β eff Effective infection rate, β ( 1 + λ ) μ ( M )
Defender Parameters
MRisk maturity level, M { 1 , 2 , 3 , 4 , 5 }
pContinuous operational security investment level
θ Efficiency of continuous security investment
c n ( p , M ) Total security investment cost for device n
kInvestment cost scaling factor
ϕ ( M ) Organizational maturity cost function
c m a t Scaling parameter for organizational maturity cost
τ Exponential scaling factor for organizational maturity cost
B n Security investment budget for device n
C def Defender total expected cost
L n ( M , C n , p ) Expected effective loss for device n
Insurance Parameters and Optimization
C n Insurance coverage level, C n [ 0 , 1 ]
T n Insurance premium for device n
T n uni Uniform insurance premium
Π n Insurer expected profit for device n
Π ¯ Average expected profit under uniform pricing
χ Premium loading factor, χ 0
χ n Device-specific premium loading factor
χ min Minimum feasible loading factor
δ Aggregate profit margin, δ 0
A c Per-device fixed administrative expense loading
M * , p * , C n * , χ * Stackelberg equilibrium strategies
Table 3. Baseline parameterization for numerical studies.
Table 3. Baseline parameterization for numerical studies.
ParameterValue(s)Justification
| N | 60Represents a standard single-site enterprise IoT deployment.
β 0.35Base transmission rate. Models an environment with highly exploitable IoT vulnerabilities and rapid lateral movement (e.g., Mirai-like propagation).
ρ 0.12Base recovery rate. Reflects notoriously slow IoT remediation challenges, including limited maintenance windows and heterogeneous firmware support [23].
γ n (k$)Gateways: [ 15 , 30 ] Cameras: [ 8 , 15 ] Sensors: [ 2 , 6 ] Financial loss potential assigned uniformly within bands based on asset criticality and potential operational downtime.
α 0.6Mitigation decay rate for μ ( M ) . Selected to yield significant risk reduction at early maturity tiers, plateauing at higher tiers (diminishing returns).
k800Scales fractional continuous investment p [ 0 , 1 ] into monetary cost (k$), ensuring comparability with loss severity coefficients.
ϕ ( M ) (k$) { 30 , 60 , 126 , 210, 318}Convex structural capital expenditure mapped to NIST CSF tiers. Derived to reflect the escalating costs of transitioning from ad hoc tools ( M = 1 ) to a fully automated 24/7 SOC ( M = 5 ).
χ 0.15Premium loading factor (15%), standard in cyber-insurance to cover volatility and risk margin.
Table 4. Defender cost breakdown and coverage sensitivity across maturity levels.
Table 4. Defender cost breakdown and coverage sensitivity across maturity levels.
MaturityCoverageExpected LossPremiumImplementation CostTotal Cost
(M)(Cn)(k$)(k$)(k$)(k$)
1 (Baseline)1.00.00225.3830.00255.38
0.835.42184.6530.00250.07
0.588.55123.5530.00242.10
3 (Optimal)1.00.0026.36126.00152.36
0.80.8125.43126.00152.24
0.52.0224.04126.00152.05
51.00.0021.95318.00339.95
0.80.0421.91318.00339.95
0.50.1021.84318.00339.94
Table 5. Marginal cost vs. marginal savings across maturity (derived from Table 4).
Table 5. Marginal cost vs. marginal savings across maturity (derived from Table 4).
CoverageStep Δ M Δ Impl. Cost Δ (Loss+Premium) Δ Total Cost
Cn (k$)(k$ Saved)(k$)
1.0 1 3 2 + 96.00 + 199.02 103.02
1.0 3 5 2 + 192.00 + 4.41 + 187.59
0.8 1 3 2 + 96.00 + 193.83 97.83
0.8 3 5 2 + 192.00 + 4.29 + 187.71
0.5 1 3 2 + 96.00 + 186.04 90.05
0.5 3 5 2 + 192.00 + 4.12 + 187.89
Table 6. Quantifying cross-subsidization: uniform vs. risk-proportional pricing at M = 3 .
Table 6. Quantifying cross-subsidization: uniform vs. risk-proportional pricing at M = 3 .
Device ProfileExpectedUniform PricingRisk-Prop. Pricing
Loss (k$)PremiumProfit MarginPremiumProfit Margin
Gateway (High-Risk)$3.50$1.25−180.0%$4.13+15.1%
Sensor (Low-Risk)$0.30$1.25+76.0%$0.45+32.2%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bhusal, B.; Li, D.; Wang, X.; Yu, G. Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics 2026, 15, 1038. https://doi.org/10.3390/electronics15051038

AMA Style

Bhusal B, Li D, Wang X, Yu G. Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics. 2026; 15(5):1038. https://doi.org/10.3390/electronics15051038

Chicago/Turabian Style

Bhusal, Bishwa, Delong Li, Xu Wang, and Guangsheng Yu. 2026. "Maturity-Aware Cyber Insurance Optimization in IoT Networks" Electronics 15, no. 5: 1038. https://doi.org/10.3390/electronics15051038

APA Style

Bhusal, B., Li, D., Wang, X., & Yu, G. (2026). Maturity-Aware Cyber Insurance Optimization in IoT Networks. Electronics, 15(5), 1038. https://doi.org/10.3390/electronics15051038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop