I. Introduction
The Internet of Things (IoT) has revolutionized a wide array of sectors through its vast network of interconnected devices. However, alongside its benefits, the rapid expansion of the IoT introduces significant security and privacy concerns. These concerns are exacerbated as the devices often have limited computational resources, making them vulnerable to attacks [1]. Traditional security solutions, which sometimes rely on centralized systems, encounter scalability issues and introduce further vulnerabilities [1], [2].