The article has an authentication scheme related to drones. I need the AKA scheme to be read, understood and implemented in Java. It involves cryptography and how the authentication process works and kept secure. By reading the document you will better understand what I mean and what is required. Thanks.