Embedded systems, often utilized in sensitive applications, require imperative security measures to ensure confidentiality, integrity, and availability of shared data. Implementing secure communications in these systems presents unique obstacles due to their limited resources, immediate requirements, and unpredictable operating environments. To mit