However, stronger security through authentication often results in reduced usability and efficiency. This study acknowledges these challenges and proposes a protocol tailored to military environments, ...