The WEP standard is considered vulnerable to attack, because the network key that is used can be determined quite easily, simply by recording and analysing data. The WPA standard that followed removed this vulnerability by introducing secure authentication, a dynamic key and the support of Radius services. With WPA2, the advanced AES encryption algorithm has been implemented and the previously used stream cipher RC4 replaced with the TKIP algorithm. WPA2 conforms to many of the basic security features of the IEEE 802.11i standard and meets stringent safety requirements, such as the requirements of FIPS 140-2, for the exchange of data in US authorities.
As WiFi networks protected with WPA2 are only vulnerable if the password is known, passwords that are as long as possible, with special characters, numbers and uppercase and lower case letters, should be used. In addition, it is advisable to avoid ordinary words that can be found in the dictionary.
Modern Internet access routers are usually equipped with a WPA2 secured WiFi Access Point, Voice-over-IP features and extensive telephone system functions. When devices use the WiFi to make calls via Voice-over-IP, the WPA2 encryption standard ensures that the data sent and received in the wireless local area network is protected from unauthorized access by outsiders. This means that, even if no encryption is used within Voice over IP, such as the Secure Real-time Transport Protocol (SRTP), users have at least a basic kind of data security.