As the Internet of Things (IoT) expands, the requirement for robust security becomes increasingly vital. Traditional security measures are often insufficient in addressing the unique threats posed by IoT devices. These systems often have limited resources, entangled architectures, and exposed software platforms. To effectively counter these concern