The Internet has become the backbone of remote communications, networking, and computing. It offers an incentive platform for many services and applications. People’s lives have been dramatically changed by the fast growth of the Internet. However, it also provides an easy channel for distributing contents that are unwanted by users. Unwanted traffic includes malware, viruses, spam, intrusions, unsolicited commercial advertisements, or unexpected contents. This chapter discusses applying trust management technology to automatically conduct unwanted traffic control in the Internet, especially the mobile Internet. The authors propose a generic unwanted traffic control solution through trust management. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a Global Trust Operator and traffic and behavior analysis at hosts. Thus, it can support unwanted traffic control in both a distributed and centralized manner and in both a defensive and offensive way. Simulation-based evaluation shows that the solution is effective with regard to accuracy and efficiency for Botnet intrusion and DDoS intrusion via reflectors. It is also robust against a number of malicious system attacks, such as hide evidence attack, bad mouthing attack, on-off attack, malicious attack of ISP, and combinations, which are playing in conjunction with various traffic intrusions. Meanwhile, the solution can provide personalized unwanted traffic control based on unwanted traffic detection behaviors. A prototype system is implemented to illustrate its applicability for SMS spam control.