As the Internet of Things (IoT) proliferates, the requirement for robust protection becomes increasingly vital. Traditional security strategies are often insufficient in addressing the distinct risks posed by IoT devices. These gadgets often have restricted resources, entangled architectures, and exposed software platforms. To effectively counter t