While individuals have some concerns about the security and
privacy of IoT devices and ISPs are concerned about their
networks hosting infected/vulnerable IoT devices, keeping
IoT secure is only a secondary priority for them. Individuals
and ISPs also faced various barriers that deterred them from
doing so.
Most of the key incentives are external to ISPs and individ-
uals; hence, the onus of implementing these incentives falls
onto other stakeholders in the IoT ecosystem. In the grand
scheme of things, these findings suggest that: 1) solutions
can not be unilateral on the part of one stakeholder, 2) good
solutions require ISPs, governments, device manufacturers,
and individuals to work together, and 3) the other stakeholders
must help support and motivate individuals in their role.
In summary, our contributions are as follows:
•
We investigate ISPs’ and individuals’ attitudes, barriers,
and incentives to secure IoT, being the first to undertake
an integrated approach — by examining three aspects
from two stakeholders in one study.
•
We provide evidence of these attitudes, barriers, and
incentives, the latter of which include the misaligned
incentive between ISPs and individuals.
•
We synthesise lessons learned and propose considera-
tions to encourage ISPs and individuals to secure IoT.
2 Background and related work
Along with its many benefits, the IoT also has disadvantages—
one of the most criticised being the risks to security and
privacy. Plenty of previous studies have produced evidence
of the vulnerabilities found on IoT devices. For example, Liu
et al [28] uncovered security issues in one smart home sys-
tem which allowed an attacker to compromise a passphrase
guarding the communication over the local wireless network.
Morgner et al [32] showed how an attacker can exploit a vul-
nerability in Zigbee 3.0, a wireless technology used in devices
such as door locks, and take over the devices from distance.
Alrawi et al [2] also evaluated and found vulnerabilities in a
long list of IoT devices, concerning as some of these devices
are popular products in the market.
More frightening than the theoretical attacks is the mount-
ing evidence of real-life attacks on IoT devices. Media reports
about the hacking of IoT such as Internet-connected CCTV
(e.g. [6,45,46]), and smart home systems [30] are not new
today. The most infamous IoT attack to date is the 2016 DYN
attacks in which millions of IoT devices infected by Mirai,
an IoT malware, were compromised and used to launch a
distributed denial-of services, causing a large-scale disruption
to Internet services [3,27].
With the IoT market expected to grow exponentially—
consumer spending is estimated to be 1.6 trillion US dol-
lars by 2025 [43]—the need to secure IoT devices cannot be
ignored.
2.1 The role of ISPs in keeping IoT secure
To understand ISPs’ roles in keeping IoT secure, understand-
ing their roles in mitigating botnets, a network of computers
infected by malware, paves the foundation.
In one of the earliest works in this area, Van Eeten et al [47]
analyzed a global set of spam data between 2005–2008 and
showed that a small number of ISPs accounted for a signif-
icant percentage of unique IP addresses used for sending
spam worldwide, demonstrating the ISPs’ unique position as
intermediaries in botnet mitigation. Their subsequent work
evaluating the role and performance of ISPs in botnet miti-
gation across 60 countries found that although the ISPs’ per-
formances varied, the ISPs can and do make a difference,
especially in identifying, notifying, and quarantining the in-
fected customer [4].
Pijpker and Vranken [37] established a reference model of
the ISPs roles in the anti-botnet life cycle from prevention
to detection, notification, remediation, and recovery. They
validated the model with a representative sample of Dutch
ISPs and showed that ISPs spent most effort on the preven-
tion and notification but less so on other activities [37]. The
OECD also reported various initiatives by the ISPs in the fight
against botnets in Australia, Germany, Ireland, Japan, Korea,
the Netherlands, the UK, and the US [34].
A large part of the role of ISPs in keeping the IoT ecosys-
tem secure is similar to their role in combating botnets; indeed,
many botnets comprise IoT devices. A prime example of such
an endeavour is the cleanup of Mirai in the Netherlands. Cetin
et al [15] examined the ISPs’ uses of walled gardens on Mirai-
infected IoT devices. Traditionally, this practice is used to
quarantine and notify customers whose computers were in-
fected by malware and turned botnet. They found that the
use of walled garden remediated 92% of the Mirai infections
within 14 days, and outperformed the uses of email notifi-
cation. Their findings provide compelling evidence of the
prominent role that ISPs play in keeping IoT secure, particu-
larly in the after-fact events (i.e., after customers’ IoT devices
were infected by malware).
ISPs can also play an important role in preventing the
spreading of customers’ infected IoT hosted in their network.
One approach is for the ISPs to scan for vulnerable IoT de-
vices and isolate them from the Internet before they are com-
promised [20]. Another approach is a wide scan of vulnerable
or infected IoT devices by central government agencies and
asked the ISPs to notify the owner of these vulnerable/infected
devices and ask them to take actions to remediate. This ap-
proach is being undertaken in Japan, under the ongoing five-
year NOTICE initiative [33]. In NOTICE, the National Insti-
tute of Information and Communications Technology (NICT)
identifies vulnerable or compromised IoT devices; partici-
pating ISPs are informed and assume the responsibility of
identifying and notifying their customers who own the de-
vices. While the effectiveness of this approach is yet to be
2