As the Internet of Things (IoT) expands, the need for robust safeguards becomes increasingly essential. Traditional security strategies are often inadequate in addressing the distinct threats posed by IoT devices. These devices often have constrained resources, complex architectures, and exposed software platforms. To effectively counter these chal