As the Internet of Things (IoT) grows, the requirement for robust safeguards becomes increasingly critical. Established security measures are often unsuitable in addressing the distinct threats posed by IoT devices. These systems often have constrained resources, interconnected architectures, and exposed software platforms. To effectively counter t