Embedded systems, often deployed in sensitive applications, require imperative security measures to protect confidentiality, integrity, and availability of transmitted data. Deploying secure communications in these systems presents unique difficulties due to their limited resources, time-sensitive requirements, and dynamic operating environments. T