you can implement such devices using winpcap library. Using this library you can capture the packets and as per your policy you writing rules. So many source code available for this. Google it.
I think that you should first consider the targeted IoT-device as a blackbox and launch commonly known ciphertext-only attacks to evaluate its IT security objectives "authenticity", "integrity", "nonrepudiation", "privacy", and "resilience". Then you can continue with more "dangerous" offenses.
The evaluation of any security devices is in fact an evaluation of security algorithms and security implemented protocols. However, the evaluation in not mainly related to Devices. For example we evaluate AES or RSA cipher algorithms regardless they are implemented in smart card or in a router.
Santosh Kumar Sahu thank you for your comment, winpcap will allow me to capture the packets yes i read that but how i can determine my policy while using it?