978-1-7281-2827-6/19/$31.00 ©2019 IEEE A Trust Management Model for IoT Ahmed Abdlrazaq Department of Software Engineering College of Technology Firat University Elazig, Turkey Ahmed.abdulfattah87@gmail.com Serkan Varol Department of Engineering and Technology Southeast Missouri State University Cape Girardeau, MO svarol@semo.edu Abstract— The Internet of Things (IoT) is profoundly influencing our daily lives in many areas, covering small devices to large network systems. An IoT system may be a set of directing rules that rearranges the usage of IoT applications. This paper details a trust management model and security of IoT systems. Trust management models and security play a critical part in IoT to protect information and devices from attacks since it supplies security for all layers and networks. This review focuses on how a trust management model has a significant function in IoT in enhancing reliability, privacy, and security. In this survey, we explained the challenges along with the solutions in terms of IoT security and privacy and recognized the main security problem in the IoT framework. In addition, this paper explored the characteristics of trust and pointed out some IoT security challenges, explaining how middleware can affect the security of IoT. Keywords: Internet of Things (IoT), Trust Management Model (TMM). I. INTRODUCTION The IoT has created a new universe, where materials and smart devices are connected over networks and have been integrated into each other in order to supply a smart service for humanity. This study discusses how trust management models have a significant function in the IoT for reliability, privacy, enhancement, and security, in terms of information. The key challenge in this environment is not to just to create a smart technology system to connect several hardware devices through networks, but to provide a high-level, secure and a trust model process. Another challenge will involve a type of solution that can explain how an issue can be solved in terms of security if happened and can propose a robust solution or can provide advice for future cases. These kinds of smart systems require a management model with a security and privacy level high enough to guarantee that the system will be protected against any attacks. The IoT can be thought of as the interface which is based on the link between regular objects. With the rise of smart homes, modern cities, and everything intelligence, advances have risen as operations for unimaginable affect, potential, and development with Cisco—the company anticipating having 50 billion devices associated with it by 2020 [1]. In any case, most of these advances could simply be hacked, meaning that a TMM is needed to protect the identifying research issues and take on to the security processes. The techniques are another topic of interest that will be discussed, as well as identifying key security issues and operational processes. We classified these problems in terms of high, intermediate and low-level concerns, intermediate level of techniques processes. Looking for end-to-end secure operation technologies allows wireless devices to connect to any computer in the world with data and network security. The proposed plan can protect the solution of the techniques of operations against attacks such as the Denial-of-Service attacks and unauthorized access. Providing a secure management system requires a high level of security with cloud connectivity in order to enable process technologies [2]. In addition, the work carried out on different techniques needs to be implemented. It is essential that security has priority if the full range of opportunity for work process techniques is to be realized. The industry needs to be sure that it can stop hackers and ensure that the hardware linking with the network cannot transact with it. It needs to protect the infrastructure of customer technology and ensure the firmware can be updated in a secure manner [3]. IoT is still evolving as the next generation of networking and other services. Currently, there are a lot of applications, systems, and services related to IoT that have recently come on to the markets in different areas such as healthcare, transportation, security in general, etc. TMM has an important function in IoT for checking and ensuring the reliability of data, services, user confidentiality, and security information. This will support the users in the understanding of unbelief and risk regarding user agreement and the consumption of IoT applications and services. The word ‘trust’ is a very complex concept, with consideration as to dependability and ideas, as well as expectations on security, capability, accuracy, and safety [1].