Abstract-The optimal power allocation for block fading (BF) networks with confidential messages is investigated under an M -block delay and power constraint. First, we study networks without channel state information (CSI) feedback to the transmitter and demonstrate that the optimal power allocation is the equidistribution of the power budget, denoted as the "blind policy". In blind scenarios secrecy can be achieved though receiver diversity; the probability of secrecy outage (PSO) is shown to decay exponentially with the the diversity order of the legitimate user. Then, we investigate networks with CSI feedback. For comparison purposes, we restate the acausal secure waterfilling algorithm with full CSI before moving to the causal feedback scenario. In the latter, an approximate "threshold policy" for the low SNR and an approximate "high power policy" for the high SNR regimes are derived. Furthermore, a novel universal transmission policy is proposed across all SNRs, denoted as the "blind horizon approximation" (BHA). Through numerical results, the BHA policy is shown to outperform both the threshold and high power policies when the legitimate user has an SNR advantage with respect to the eavesdropper, while it also compares well with the secure waterfilling policy.Index Terms-Secrecy capacity, probability of secrecy outage, block fading, BF-AWGN channel, causal channel state information feedback, dynamic program I. INTRODUCTION The increasing deployment of wireless networks introduces new challenges in the design of enhanced security next generation systems. A pressing need to develop alternative/complementary means to secure data exchange arises in many wireless settings with limited feedback and limited resources. Physical layer security (PLS) is an emerging technology from the area of information theory that can address open security issues in challenging wireless applications such as those envisaged for fifth generation (5G) networks. In PLS approaches [1], the issues of reliability and secrecy in the exchange of information are jointly addressed by employing novel double binning encoding schemes.PLS was pioneered by Wyner, who introduced the wiretap channel and established the possibility of creating perfectly secure communication links without relying on private (secret) keys [2]. Wyner termed the rates at which information can be transmitted secretly from the source to its intended destination as achievable secrecy rates, and the maximal achievable secrecy rate as the secrecy capacity (SC). Following Wyner's contribution, the SC of the scalar Gaussian wiretap channel was analyzed in [3]. In [4], Wyner's approach was generalized