As the Internet of Things (IoT) proliferates, the requirement for robust safeguards becomes increasingly critical. Established security approaches are often unsuitable in addressing the unique threats posed by IoT devices. These gadgets often have restricted resources, entangled architectures, and susceptible software platforms. To effectively miti