1. Internet Engineering Task Force (IETF) RFC 4302
"IP Authentication Header":
Section 1 (Introduction): "The IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays... Integrity is provided by the use of a Message Authentication Code (MAC)
e.g.
HMAC-SHA-1. Data origin authentication is provided by the same mechanism." This directly supports AH's role in verifying packet integrity and origin
which is essential for detecting injection.
2. Internet Engineering Task Force (IETF) RFC 4301
"Security Architecture for the Internet Protocol":
Section 4.1 (Security Services): "AH provides data origin authentication and connectionless integrity for IP datagrams (hereafter referred to as 'authentication')." This document
which defines the overall IPSec architecture
clearly designates AH as the protocol for authentication and integrity services.
3. Stallings
W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Chapter 20
Section 20.1 "IPsec Services": This academic textbook
widely used in university curricula
explains that "The Authentication Header (AH) provides support for data integrity and authentication of IP packets... The authentication service confirms that the message was not modified during transmission." This confirms AH's primary function aligns with the question's requirement.