“…This makes it an ideal platform for secure data transmission and authentication protocols in IoT networks. Additionally, ROSITA++ [20] was used to detect and eliminate higher order leakage, and to automatically protect a masked implementation of Chacha [21]. These measures help to ensure secure data transmission and protection from malicious actors, thus making it safer for sensitive information to be exchanged between network entities.…”