Doing reasonable encryption and authentication on interfaces with MTUs on the order of tens of bytes (which is common for various low-power IoT radio interfaces) is actually pretty complex problem.
Essentially all widely used and safe cryptographic constructions have overhead (IV and MAC tag for example) that would consume significant portion of your packet (or in some cases is actually larger that the packet).
Essentially all widely used and safe cryptographic constructions have overhead (IV and MAC tag for example) that would consume significant portion of your packet (or in some cases is actually larger that the packet).