Abstract: An unprecedented demand for robust security solutions designed to operate within embedded systems constraints has arisen due to the enormous expansion of Internet of Things (IoT) devices.