I. Introduction
Researchers and commercial information systems have become interested in IoT, an emerging technology in recent years. An organisational information system's smart devices can link to each other and share data with the centralised database because of the IoT, which creates a network for this purpose [1], [2]. The IoT's expanding number of linked devices and their vulnerabilities make cybersecurity in the IoT a serious concern. Many IoT devices' low processing and memory capabilities make it difficult to implement comprehensive security solutions on them [3]. Although this interconnection opens up new possibilities for efficiency and comfort, it also poses serious security dangers, including the potential for malware infestations [4]. Due to this constraint, manufacturers frequently choose utility over safety throughout the design management, leaving holes that hackers might use to their advantage [5]. IoT devices frequently collect and send private information, including details about individual users or vital infrastructure data [6]. Attackers can steal or alter this data if it is not effectively safeguarded, which could result in privacy violations [7], [8].