As the Internet of Things (IoT) grows, the demand for robust security becomes increasingly essential. Established security approaches are often unsuitable in addressing the specific challenges posed by IoT devices. These devices often have constrained resources, entangled architectures, and exposed software platforms. To effectively mitigate these