Embedded systems, often integrated in critical applications, require imperative security measures to protect confidentiality, integrity, and availability of exchanged data. Deploying secure communications in these systems demands unique difficulties due to their restricted resources, real-time requirements, and dynamic operating environments. To mi