Abstract: With the advancement of information technology, numerous interconnected devices facilitate data access and transmission, leading to significant security vulnerabilities. Effective strategies ...