**8. Conclusion and future work**

This chapter studies four RFID-based architectural patterns: centralized, semi-distributed, distributed and RFID-based DSM. It compares them according to nine aspects of three archi‐ tecture attributes: functionality, scalability and cost. Despite their specific limitations, each architectural pattern fits the requirements of existing applications.


**Table 2.** Comparison of the RFID-based architectural patterns in the case of the game *Plug: Secrets of the Museum* (italic values signal a limit for this architectural pattern)

The chapter proposes guidelines for choosing the RFID-based architectural pattern which will best fit a given application requirements. These guidelines are tested in the context of an RFID-based pervasive game.

Future work concerns the analysis of these architectural patterns with respect to security ar‐ chitecture attribute. Security is a measure of the system's ability to resist unauthorized usage while still providing its services to legitimate users [1]. This future work will determine the influence which the level of resistance to security attacks and the cost of implementing such resistance have on the guidelines provided in this paper. Another attribute we would like to study is the fault-tolerance of the different elements of the system.
