Embedded systems, often integrated in critical applications, require robust security measures to protect confidentiality, integrity, and availability of shared data. Establishing secure communications in these systems involves unique obstacles due to their restricted resources, immediate requirements, and unpredictable operating environments. To ov