As the Internet of Things (IoT) expands, the requirement for robust security becomes increasingly critical. Established security approaches are often inadequate in addressing the unique risks posed by IoT devices. These systems often have restricted resources, complex architectures, and susceptible software platforms. To effectively mitigate these