Embedded systems, often deployed in sensitive applications, require essential security measures to safeguard confidentiality, integrity, and availability of transmitted data. Implementing secure communications in these systems demands unique challenges due to their constrained resources, time-sensitive requirements, and unpredictable operating envi