Kismet->Aircrack->Wireshark->Aircrack-ng->johnTheripper ->Nailed
Morale of the story. DO NOT USE WEAK PASS PHRASES. THE STRONGER THE PASSPHRASE THE SLIMMER THE CHANCES OF IT GETTING NAILED.
Names, words in a dictionary, place names etc etc do NOT USE. Generate a passphrase with random characters long as possible. It will take them years to crack!
That "hacking time line" makes no sense and illustrates that you are just throwing out random semi-relevant information.
AirCrack is for WEP/WPAx-PSK networks.
Kismet does the same thing as Wireshark - they are packet sniffers. Aircrack-ng is the same thing as Aircrack - they are packet capture utilities.
JohnTheRipper I guess is in the right place as you will eventually have to attack the encryption key.
All that aside, unless you can guess the password, WPA2-AES is virtually immune to a brute force attack. Rainbow Tables are the only things that have *theoretically* had *some* success against the AES256 encryption employed by WPA2 Personal.
OP, there are a couple things to keep in mind here:
1. What incentive is there to hack your wireless network in the first place? What does someone have to gain? As others said, there are plenty of WEP/Unsecured networks around. There is no point in attempting to hack a WPA2 wireless network unless there is a very specific reason to target you.
2. If someone is going to attempt to break into your WPA2 network, they are going to need a lot of time - Do you think you would notice? While gear absolutely exists and is readily available that allows someone to pick up a wireless network for over 1 mile away, it brings us back to the first question - What is so important on your personal network that someone chose you at a target?
3. A password with strong entropy (complexity) is unlikely to be brute forced. Rainbow Tables are only a theory and would still require enormous amounts of computing power.
4. If you are really concerned, the best thing you could do outside of enforcing a strong password is to change the password often. Even if someone did manage to break in, the encryption cypher would be different.
*Keep in mind that this only covers hacking the actual wireless network and not compromising a machine and then compromising the network from inside out*
Honestly, someone hacking your wireless network, should be the least of your worries....
-GP
Edit: Also as said above, not broadcasting the SSID and turning on MAC Filtering is worthless. Not broadcasting the SSID is just playing hiding and MAC Filtering can be circumvented easily by spoofing the MAC Address.