Tracking the position of cognitive radio without ____
(a) authorization violates user privacy
(b) authorization is an adversarial attack
(c) authentication violates user privacy
(d) authentication is an adversarial attack
The question was asked during an internship interview.
My question comes from Location Awareness topic in chapter Location and Environment Awareness in Cognitive Radio of Cognitive Radio