Sticky Banner Visual Mobile 3

Don't miss the Spring Deal: Save up to 78% before April 21.

Don't miss the Spring Deal: Save up to 78% before April 21. Claim now!

Claim Now!
  • Wi-Fi security basics
  • What is Wired Equivalent Privacy (WEP), and why is it insecure?
  • What is Wi-Fi Protected Access (WPA)?
  • What is WPA2?
  • What is WPA3?
  • WEP vs. WPA vs. WPA2 vs. WPA3 compared
  • How to check your current Wi-Fi security protocol
  • How to improve your Wi-Fi security
  • FAQ: Common questions about WEP vs. WPA vs. WPA2 vs. WPA3
  • Wi-Fi security basics
  • What is Wired Equivalent Privacy (WEP), and why is it insecure?
  • What is Wi-Fi Protected Access (WPA)?
  • What is WPA2?
  • What is WPA3?
  • WEP vs. WPA vs. WPA2 vs. WPA3 compared
  • How to check your current Wi-Fi security protocol
  • How to improve your Wi-Fi security
  • FAQ: Common questions about WEP vs. WPA vs. WPA2 vs. WPA3

WEP vs. WPA vs. WPA2 vs. WPA3: Which Wi-Fi security keeps you safe?

Featured 13.04.2026 14 mins
Husain Parvez
Written by Husain Parvez
Ata Hakçıl
Reviewed by Ata Hakçıl
Lora Pance
Edited by Lora Pance
wep vs wpa vs wpa2 vs wpa3

Wi-Fi security standards protect wireless networks from unauthorized access and data exposure. These standards have evolved over time, from Wired Equivalent Privacy (WEP) to Wi-Fi Protected Access (WPA), WPA2, and WPA3.

Some older protocols are now considered insecure and therefore obsolete, while newer ones provide stronger defenses against modern attacks. Understanding how they compare helps to evaluate a network's security and choose the right standard.

This guide covers four Wi-Fi security protocols, their benefits, security vulnerabilities, and best practices for protecting your wireless connections.

Wi-Fi security basics

Wi-Fi uses radio signals rather than physical cables, so nearby attackers can intercept traffic if a network isn't properly secured. Wi-Fi security protocols address this through encryption and authentication.

What is a Wi-Fi security protocol?

A Wi-Fi security protocol defines how a wireless network encrypts data and manages access.

Since the late 1990s, Wi-Fi security protocols have gone through four major generations: WEP, WPA, WPA2, and WPA3. Each replaced the last after researchers discovered weaknesses that attackers could exploit.

How encryption and authentication work

Authentication determines whether a device is allowed to join the network. On most home networks, this process happens when a device enters the correct Wi-Fi password. In enterprise environments, centralized systems such as the Institute of Electrical and Electronics Engineers (IEEE) 802.1X authentication servers verify credentials before granting access.

Once a device is authenticated, encryption protects the data it sends and receives. Encryption converts readable information into ciphertext, so even if someone intercepts wireless traffic, they can’t interpret it without the correct cryptographic key.

Read more: How to protect Wi-Fi from neighbors and keep it secure.

TKIP vs. AES explained

Two encryption methods commonly associated with Wi-Fi security are Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).

TKIP was introduced with WPA as a temporary improvement over WEP. It was designed to strengthen security without requiring new hardware, allowing older Wi-Fi devices to improve security through software or firmware updates.

However, TKIP was never intended as a long-term solution. AES-based protection replaced it as a much stronger approach and is widely used in modern Wi-Fi security.

WPA2 commonly uses AES through Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), while WPA3 builds on stronger protections with improved authentication and mandatory security features, depending on the mode and implementation.A simple flow showing how Wi-Fi security protects a connection and the Wi-Fi protocols involved.

What is Wired Equivalent Privacy (WEP), and why is it insecure?

WEP is the original security protocol introduced with the IEEE 802.11 wireless networking standard in 1997. It was designed to encrypt data transmitted between devices and access points, aiming to provide privacy comparable to that of traditional wired connections.

Although WEP was an important early step in wireless security, it was later shown to have serious vulnerabilities that enabled practical attacks.

How WEP works

WEP uses a symmetric encryption system based on the Rivest Cipher 4 (RC4) stream cipher. On a WEP-secured network, devices typically share the same secret key, which is used to encrypt and decrypt data packets.

When a device sends data, WEP combines the shared secret key with a 24-bit initialization vector (IV) to generate a unique encryption stream. This stream scrambles the data before transmission so that intercepted packets can’t be read without the correct key.

WEP limitations and risks

Several design flaws make WEP vulnerable to attacks:

  • Shared static key: Devices on a WEP network typically rely on the same shared key. Attackers who capture enough traffic can analyze patterns and work toward recovering the key.
  • Short IV: WEP's 24-bit IV is too small for busy networks. It repeats frequently, giving attackers packets encrypted with identical keystream material to analyze.
  • Weak encryption implementation: Flaws in how WEP uses RC4 and the IV make it vulnerable to statistical cryptographic attacks.
  • Weak overall key handling: Longer WEP key sizes do not fix the protocol’s design flaws. In practice, WEP can often be broken by capturing and analyzing traffic rather than by brute-forcing a short numeric password.

Researchers demonstrated practical WEP-cracking techniques in the early 2000s, showing that attackers could recover keys by passively capturing traffic. Because of these weaknesses, WEP should be disabled entirely wherever possible.

Where WEP still appears

Despite its flaws, WEP can still appear on legacy routers, gaming consoles, and other devices that don't support newer protections. Networks sometimes isolate these devices on separate segments or add compensating controls to reduce risk. However, modern platforms generally discourage using WEP and recommend stronger options such as WPA2-AES or WPA3.

What is Wi-Fi Protected Access (WPA)?

WPA is a wireless security protocol introduced in 2003 by the Wi-Fi Alliance to replace WEP. It was designed as an interim fix that improved wireless security without requiring new hardware.

How WPA improved on WEP

WPA addressed several of WEP's weaknesses by introducing:

  • Per-packet key mixing: WPA uses TKIP, which improves per-packet key handling and reduces the risk of key recovery through traffic analysis.
  • Message integrity protection: A message integrity check (MIC) helps detect packet tampering during transmission.
  • Stronger authentication support: WPA supports the Extensible Authentication Protocol (EAP) through IEEE 802.1X, allowing enterprise networks to verify credentials against an authentication server before granting access. Home networks typically use pre-shared key (PSK) authentication.

Table showing the most useful improvements of the WPA security protocol over the WEP Wi-Fi security

Why WPA is no longer recommended

WPA relies on TKIP encryption, which has known weaknesses and is now considered legacy security. TKIP was designed to run on existing WEP hardware, so it retained RC4 as its underlying cipher rather than moving to a stronger long-term design.

Attackers within range can exploit TKIP weaknesses to forge packets, inject limited amounts of traffic, or recover parts of transmitted data under certain conditions. Although WPA was a meaningful improvement over WEP, it's no longer considered strong protection for modern Wi-Fi networks.

On some older routers, WPA may still appear in settings such as:

  • WPA-PSK (TKIP)
  • WPA/WPA2 mixed mode
  • WPA-TKIP encryption

These configurations exist mainly for compatibility with older devices, but enabling them can weaken the network's overall security by allowing connections over outdated encryption. Microsoft flags TKIP as insecure, and the Wi-Fi Alliance recommends removing support for it entirely.

What is WPA2?

WPA2 is a wireless security protocol introduced in 2004 as part of the Wi-Fi Alliance certification program for the complete ratified version of IEEE 802.11i.

It comes in two modes:

  • WPA2-Personal (WPA2-PSK): In home networks, devices connect using a shared Wi-Fi password.
  • WPA2-Enterprise: In corporate environments, devices authenticate through centralized IEEE 802.1X authentication servers.

Both modes use the same core security framework, but WPA2-Enterprise provides stronger identity verification and key management for large networks.

How WPA2 works

WPA2 commonly protects wireless traffic using AES through CCMP. When a device connects to a WPA2 network, it doesn’t use the password itself as the traffic-encryption key.

Instead, the device and access point perform a four-way handshake to confirm they share the necessary secret material and derive fresh session keys for that connection. These session keys are then used to protect traffic between the device and the network.

How WPA2 improved on WPA

WPA2 introduced AES-CCMP as the standard for stronger protection, replacing WPA’s interim reliance on TKIP for modern secure deployments. CCMP is based on AES and provides both confidentiality and integrity protection. This made WPA2 the dominant Wi-Fi security standard for many years.

WPA2 risks and how to mitigate them

WPA2 has known vulnerabilities. The most notable is the key reinstallation attack (KRACK), which manipulates the four-way handshake to induce key reinstallation, potentially allowing attackers within range to intercept, replay, or manipulate traffic, depending on the implementation and protocol details.

WPA2-Personal networks are also vulnerable to brute-force and dictionary attacks, where an attacker captures the four-way handshake and runs password attempts offline until one matches.

A dictionary attack checks passwords from a precompiled wordlist; a brute-force attack cycles through all possible character combinations. Both are far more likely to succeed when the Wi-Fi password is short, common, or predictable.

To mitigate these risks:

  • Keep routers and devices updated: Security patches fix known vulnerabilities, including KRACK.
  • Use strong Wi-Fi passwords: This is especially important for WPA2-Personal networks.
  • Disable outdated compatibility modes: Avoid settings that allow TKIP or mixed WPA/WPA2 modes. Upgrade to WPA3 when possible.

What is WPA3?

WPA3 is the latest generation of Wi-Fi security for personal and enterprise networks. The Wi-Fi Alliance introduced it in 2018 as a successor to WPA2. WPA2 remained in use during the transition, but WPA3 added stronger protections for modern Wi-Fi networks.

How WPA3 works

In WPA3-Personal, the old pre-shared-key authentication exchange used by WPA2 is replaced with Simultaneous Authentication of Equals (SAE). This means attackers can't simply capture authentication data and run large-scale offline password-guessing attacks as they can against WPA2-Personal, making such attacks more difficult.

WPA3 also strengthens protection for management frames, which are the signals Wi-Fi devices use to connect, stay connected, and disconnect from a network. WPA2 supports protected management frames as an optional feature, but WPA3 makes this protection mandatory, helping reduce spoofed deauthentication and disassociation attacks.

For enterprise networks, WPA3 adds an optional 192-bit security mode that uses a stricter set of cryptographic algorithms for higher-security environments such as government and other sensitive enterprise deployments.

WPA3 compatibility and upgrade tips

Not every device supports WPA3. If you're upgrading your network, start here:

  • Use WPA3 if all your devices support it.
  • Use WPA2/WPA3 Transitional mode if your older devices still need access.
  • Fall back to WPA2-Personal (AES) only when needed.
  • Avoid older settings such as WPA, WPA/WPA2 mixed mode, or TKIP-based options.

When buying a new router, WPA3 support is worth prioritizing. If your router already supports WPA3, enabling it is one of the simplest meaningful Wi-Fi security upgrades available.

WEP vs. WPA vs. WPA2 vs. WPA3 compared

Protocol Security strength Performance impact Compatibility Recommendation
WEP Very weak. Attackers can often recover encryption keys quickly after capturing enough traffic, especially on busy networks. Can limit network speeds by forcing legacy compatibility modes. Mostly found on very old routers and legacy devices. Avoid entirely unless required for isolated legacy hardware.
WPA Weak. Relies on TKIP, which has known vulnerabilities. Can reduce throughput by preventing newer high-throughput modes. Found on older routers and devices predating WPA2. Avoid unless needed temporarily for compatibility with older devices.
WPA2 Strong when configured properly. AES-CCMP is the standard secure mode. Good performance on most modern networks. Widely supported across routers, laptops, phones, and many Internet of Things (IoT) devices. Best fallback when WPA3 is unavailable.
WPA3 Strongest widely available option. Uses SAE in WPA3-Personal and is more resistant to offline password-guessing attacks. Comparable to WPA2 on modern hardware. Supported on newer routers and devices; older devices may need transitional mode. Best choice for new networks.

How to check your current Wi-Fi security protocol

To find out which security protocol your Wi-Fi network uses, check the network details on your device or in your router settings.

On Windows

  1. Click the Wi-Fi icon in the bottom-right corner of the taskbar.Wi-Fi icon in the Windows Taskbar.
  2. Click the arrow icon next to the Wi-Fi control to open Manage Wi-Fi connections.Manage Wi-Fi connections option associated with Wi-Fi control.
  3. Click the (i) icon next to the connected network.Info icon next to connected Wi-Fi network.
  4. Under Network & internet, find Security type. In the expanded Network & internet box, you might first need to click the arrow next to WiFi, then select your connected network again.Security type listed for the connected Wi-Fi network in Windows Network & internet settings.

This shows the security protocol your network uses, along with details that may include the Media Access Control (MAC) address, network band, and connection information.

On macOS

  1. Hold the Option key and click the Wi-Fi icon in the menu bar. Alternatively, open System Settings > Wi-Fi, and find the connected network, then click Details.
  2. Look for the Security field in the network details, if shown. If the exact security type is not clearly listed, check the router’s admin panel for the network’s Wi-Fi security setting.Security type listed for the connected Wi-Fi network in macOS.

On Android

  1. Open Settings, then tap Network & internet.Network & internet in Android settings.
  2. Tap Internet or Wi-Fi.Internet option in Network & internet on Android.
  3. Tap the gear icon next to the connected network.Gear icon next to the connected Wi-Fi network on Android.
  4. Check the Security or Network details section.Security type of connected Wi-Fi network on Android

Note: Menu names can vary by device and Android version.

On iPhone and iPad

Unlike Windows or Android, iPhone and iPad settings usually don’t show the exact Wi-Fi security protocol. You can tap the information icon next to a network in Settings > Wi-Fi, but this mainly shows connection details and may display a warning if the network uses weak security.iOS Wi-Fi security information and settings.

To confirm the exact security protocol, check the router’s admin panel or use another device that exposes the network’s security type more clearly.

On your router

The most reliable way to confirm your security protocol is through your router's admin panel. The interface varies by router manufacturer and model, but the general steps are the same.

  1. Open a browser and enter your router’s local address or login page. This is often 192.168.0.1 or 192.168.1.1, but it may be different depending on the router.
  2. Log in to the router admin panel.
  3. Open Wi-Fi settings, Wireless settings, or Wireless security settings.Wireless Settings option in router admin home page.
  4. Look for Security, Security mode, Security Options, or Encryption type.Security option in Wireless Settings of the router.

Note: Some newer routers use a mobile app instead of a browser-based admin panel. Linksys, for example, documents Wi-Fi security changes through its app for some models.

How to improve your Wi-Fi security

Even if your network already uses WPA2 or WPA3, a few changes can strengthen your Wi-Fi security.

  • Update your router firmware regularly: Firmware updates patch known vulnerabilities and improve protection against new threats. Check for updates in your router's admin panel or companion app.
  • Use a strong Wi-Fi password: A long, unique password makes offline guessing and brute-force attacks much harder, especially on WPA2-Personal networks.
  • Disable Wi-Fi Protected Setup (WPS): WPS lets devices connect with a button press or a PIN instead of a password, but the PIN-based method has known security weaknesses. Disabling WPS can remove an unnecessary entry point.
  • Change default router admin credentials: Many routers ship with default usernames and passwords that are easy to find online. Changing these credentials helps prevent unauthorized access to router settings.
  • Set up a guest network: A guest network lets visitors use your Wi-Fi without giving them the same level of access to the main network and its connected devices, depending on the router’s isolation features and settings.

FAQ: Common questions about WEP vs. WPA vs. WPA2 vs. WPA3

How do I tell if I have WEP or WPA?

You can check the Wi-Fi security type in your device's network settings or your router's admin panel. It may show a label such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2, or WPA3, or a related label such as Security type, Authentication, or Encryption. The router’s admin panel is usually the most reliable way to confirm.

What's the best encryption mode for Wi-Fi?

Wi-Fi Protected Access 3 (WPA3) offers the strongest protection commonly available on modern Wi-Fi networks. If your router or devices don’t support it, WPA2 with Advanced Encryption Standard (AES) encryption is still considered secure.

Should I use WEP, WPA, or WPA2?

Avoid Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) because they rely on outdated security mechanisms. WPA2 or WPA3 are the recommended options for most home and office networks.

How can I improve my Wi-Fi security?

Start by enabling Wi-Fi Protected Access 3 (WPA3) or WPA2 with Advanced Encryption Standard (AES). You should also use a strong Wi-Fi password, update router firmware regularly, disable Wi-Fi Protected Setup (WPS) if it's not needed, and change the default router admin credentials.

Why is WPA2 better than WEP?

Wi-Fi Protected Access 2 (WPA2) uses stronger modern protection based on Advanced Encryption Standard (AES), while Wired Equivalent Privacy (WEP) relies on outdated security that can be broken much more easily.

Is WPA3 necessary for home networks?

Wi-Fi Protected Access 3 (WPA3) isn’t strictly required, but it's the most secure option commonly available for home Wi-Fi networks. If a router and devices support it, enabling WPA3 can provide better protection against offline password-guessing attacks than WPA2-Personal.

Is WPA2 still safe to use?

Yes. Wi-Fi Protected Access 2 (WPA2) with Advanced Encryption Standard (AES) is still considered secure when properly configured and kept up to date. However, newer routers increasingly support WPA3, which is preferred when available.

Should I choose WPA2 AES or WPA3?

Choose Wi-Fi Protected Access 3 (WPA3) if all your devices support it. If some devices are older, WPA2 with Advanced Encryption Standard (AES) or WPA2/WPA3 transitional mode is usually the best balance between security and compatibility. Transitional mode is useful as a bridge, but WPA3-only is better once older devices no longer need access.

Take the first step to protect yourself online. Try ExpressVPN risk-free.

Get ExpressVPN
Content Promo ExpressVPN for Teams
Husain Parvez

Husain Parvez

Husain Parvez is a writer at the ExpressVPN Blog specializing in consumer tech, VPNs, and digital privacy. With years of experience simplifying cybersecurity and software topics into clear, actionable guidance, he helps readers navigate the online world with confidence. A hands-on tech enthusiast, Husain enjoys taking gadgets apart to see how they work, and when he’s not writing, he can be found debating the finer points of cricket or watching a horror movie marathon.

ExpressVPN is proudly supporting

Get Started