IETF RFC 2408, Internet Security Association and Key Management Protocol (ISAKMP), Section 1: "ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation."
NIST Special Publication 800-77 Rev. 1, Guide to IPsec VPNs, Section 2.2.1: Discusses how encryption algorithms like AES provide confidentiality. Section 2.2.2: Describes how hash functions (e.g., SHA) are used to provide data integrity.
Cisco Systems, IPsec Configuration Guide, "IKEv1 and IKEv2 Packet Exchange": Details the use of RSA signatures for the authentication method during IKE phase 1 negotiations.
Stallings, W., Cryptography and Network Security: Principles and Practice, 7th Edition, Pearson. Chapter 19 (IP Security): Explains the role of ISAKMP in defining the SA management and the use of HMAC-SHA for integrity.