**Author details**

Michel Simatic

We apply these numeric values to table 1. Table 2 synthesizes the results. In this table, values which are in italic correspond to criteria which are a limitation for this architec‐

Centralized architectural pattern requires a global network which costs 120 euros per month. The museum which hosts the game considers it is too expensive. We have to turn to one of the other architectural patterns. As the game must manage 16 tags and as the RFIDbased DSM can handle a maximum of 248 tags (as *s*=1 byte), we can choose this architectural pattern. However, if s had been 250 bytes, this pattern could have handled only 4 tags: It would not have fitted. As there must be no issue about avatar of read tags (the game would not be fun), we would have chosen distributed architectural pattern (or combination of dis‐ tributed and RFID-based DSM patterns, in order to reduce the costs of reinitializing tags).

This chapter studies four RFID-based architectural patterns: centralized, semi-distributed, distributed and RFID-based DSM. It compares them according to nine aspects of three archi‐ tecture attributes: functionality, scalability and cost. Despite their specific limitations, each

> 500 x 109 (2 x 109)

Cost of computer network (per month) *120 euros* 0 euro 0 euro 0 euro

Cost of introducing a tag (in seconds per tag) 80 s/tag 80 s/tag 80 s/tag 80 s/tag Cost of reinitializing tags (in seconds per tag) 0 s/tag 4 s/tag *49 s/tag* 4 s/tag

**Table 2.** Comparison of the RFID-based architectural patterns in the case of the game *Plug: Secrets of the Museum*

The chapter proposes guidelines for choosing the RFID-based architectural pattern which will best fit a given application requirements. These guidelines are tested in the context of an

Future work concerns the analysis of these architectural patterns with respect to security ar‐ chitecture attribute. Security is a measure of the system's ability to resist unauthorized usage while still providing its services to legitimate users [1]. This future work will determine the influence which the level of resistance to security attacks and the cost of implementing such resistance have on the guidelines provided in this paper. Another attribute we would like to

Cost of tag (per tag) 0.10 euro 0.10 euro *1.50 euro 1.50 euro*

**Central**. **Semi-distr. Distributed RDSM**

Infinite (Infinite) 248 (2)

109 (4 x 106)

architectural pattern fits the requirements of existing applications.

study is the fault-tolerance of the different elements of the system.

tural pattern.

**8. Conclusion and future work**

44 Radio Frequency Identification from System to Applications

Maximum number of tags if s=1 byte (s=250 bytes)

(italic values signal a limit for this architectural pattern)

RFID-based pervasive game.

Address all correspondence to: Michel.Simatic@telecom-sudparis.eu

INF Department, Télécom Sud Paris, Évry, France
