Embedded systems, often deployed in sensitive applications, require imperative security measures to ensure confidentiality, integrity, and availability of shared data. Establishing secure communications in these systems involves unique difficulties due to their constrained resources, time-sensitive requirements, and unpredictable operating environm