In the Internet of Things (IoT), security has become an increasing concern and a non-negotiable requirement. Resource-limited embedded devices are on the front lines of broader IoT solutions that are more frequently enduring malicious attacks. Unlike their PC or Internet counterparts, resource limitations mean these devices must employ unique security methods to defend against these attempts to breach and disrupt operations.