Embedded systems, often deployed in critical applications, require robust security measures to protect confidentiality, integrity, and availability of transmitted data. Deploying secure communications in these systems presents unique difficulties due to their constrained resources, time-sensitive requirements, and volatile operating environments. T