Embedded systems, often integrated in critical applications, require imperative security measures to protect confidentiality, integrity, and availability of exchanged data. Deploying secure communications in these systems demands unique difficulties due to their limited resources, real-time requirements, and volatile operating environments. To miti